Search This Blog

Showing posts with label tips and tweaks. Show all posts
Showing posts with label tips and tweaks. Show all posts

Friday, July 20, 2012

How to check Windows for 32-bit OS or 64-bit OS

You can find out whether your system is installed with a 32-bit or 64-bit (Microsoft labels them as x86 or x64) based operating system, which requires specifically built software application.

For computer or PC that has been installed long time ago and user forgets about its version, or has changed owner several times, and user no longer sure whether he or she is running a 32-bit or 64-bit (x32 or x64) version of Windows operating system, use following methods to determine and find out which version actually it’s.


1. Windows Vista

* Method 1
a. Click Start, then click on Run or Start Search.
b. Type msinfo32.exe and then press Enter key.
c. In “System Information”, review the value for the System Type item:
- For 32-bit editions of Windows, the value of the System Type item is x86-based PC.
- For 64-bit editions of Windows, the value of the System Type item is x64-based PC.


* Method 2
a. Click Start, type system in the “Start Search” box, and then click system in the “Programs” list.
b. The operating system appears as follows:
- For a 64-bit version operating system: 64-bit Operating System appears for the “System type” under “System”.
- For a 32-bit version operating system: 32-bit Operating System appears for the “System type” under “System”.


* Method 3
a. Click Start, type system in the “Start Search” box, and then click System Information in the “Programs” list.
b. The operating system appears as follows:
- For a 64-bit version operating system: x64-based PC appears for the “System type” under “Item”.
- For a 32-bit version operating system: x86-based PC appears for the “System type” under “Item”.



2. Microsoft Windows XP Professional

* Method 1
a. Click Start, then click on Run or Start Search.
b. Type msinfo32.exe and then press Enter key.
c. In “System Information”, review the value for the System Type item:
- For 32-bit editions of Windows, the value of the System Type item is x86-based PC.
- For 64-bit editions of Windows, the value of the System Type item is x64-based PC.


* Method 2
a. Click Start, click Run, type sysdm.cpl, and then click OK.
b. Click the General tab. The operating system appears as follows:
- For a 64-bit version operating system: Microsoft Windows XP Professional x64 Edition Version appears under System.
- For a 32-bit version operating system: Microsoft Windows XP Professional Version appears under System.
Note is a placeholder for a year.


* Method 3
a. Click Start, click Run, type winmsd.exe, and then click OK.
b. In the details pane, locate Processor under Item. Note the value.
- If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of the Windows operating system.
- If the value that corresponds to Processor starts with ia64 or AMD64, the computer is running a 64-bit version of the Windows operating system.


3. Microsoft Windows Server 2003

* Method 1
a. Click Start, click Run, type sysdm.cpl, and then click OK.
b. Click the General tab. The operating system appears as follows:
- For a 64-bit version operating system: Microsoft Windows Server 2003 Enterprise x64 Edition appears under System.
- For a 32-bit version operating system: Microsoft Windows Server 2003 Enterprise Edition appears under System.


* Method 2
a. Click Start, click Run, type winmsd.exe, and then click OK.
b. In the details pane, locate Processor under Item. Note the value.
- If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of the Windows operating system.
- If the value that corresponds to Processor starts with EM64T or ia64, the computer is running a 64-bit version of the Windows operating system.

How to enable Private Browsing in Chrome, Firefox, IE and Safari

If Firefox and Internet Explorer 7 have functions effective to purge all traces of your activities on the Net, neither browsers proposed mode for the duration of a session to browse without leaving traces.

Google Chrome and Safari have such a private browsing mode that records no information about your browsing: the history of pages visited, form data, the list of files downloaded ... are not recorded on your hard drive.

Thanks to free extensions, you can have a similar system of private browsing in Firefox 3 and Internet Explorer 7. Now learn how to exploit this incognito in Google Chrome, Firefox, IE 7 and Safari.

1. Google Chrome:

Chrome, Google web browser has a private browsing mode to remain incognito on the internet. Here is how to add private browsing in Chrome:
Launch Google Chrome.
- Click Customize and control Google Chrome.
- In the menu that appears, click the Order New incognito window.
- A new window is open in incognito. Web pages visited in this window are not recorded in the history of navigation.
- When you close the incognito window, all new cookies are deleted.
- Note that you can both browse normally and in incognito mode, using two separate windows.

2. Mozilla Firefox

With the Firefox Distrust extension you can easily add an option for private browsing to Firefox:
- Run Firefox. Click on the Tools menu and then click Add-ons.
- In the search area of the Catalog tab, enter Distrust then click the magnifying glass.
- Then click the Add button to Firefox.
- Click the Install Now button.
- Click Restart Firefox to finish installing the extension. Finally close the window ons.
- When you want to start a private browsing session, go to the Tools menu and select Start Distrust Session.
- You can also click on the icon representing an eye on the bottom right of the window.
- A green cross on the eye tells you that Firefox will not record any trace of browsing.
- To exit the private browsing mode and return to normal mode, go to the Tools menu and select End Session Distrust or click again on the icon of an eye.

3. Internet Explore

There is a very easy way to enable private browsing in Internet Explorer.
- Right click on the shortcut and click on properites.
- In the target box there is the full location of application.
- In the end just type -private and launch the browser.
- Internet Explorer will by default run in private mode.
- Or else for security you can use any proxy server on the web for annoymous surfing. There are number of free proxis.

4. Safari

Like Google Chrome, Safari, Apple's browser has a default function incognito. This function preserves the time of a session, the privacy of your online activities. There is then stored: no cookies, no historic sites and downloads, no forms of information or research.
- Launch Safari.
- Click the Home menu and then click Private Browsing.
- Click the OK button.
- The history of sites visited, cookies, form data, files cached, etc.. are not stored on your hard drive.
- Now you can surf in Private mode on your Safari browser.
But there is something you need to know more. The private browsing feature in Safari when enable still keeps the web track. Those are hidden are not visible directly. I show you the way to remove them completely. For that you will need to run certain commands from Mac Terminal. Go in Terminal and type - dscacheutil -cachedump -entries Host. In that you can see the sites which are still recorded. Then run - dscacheutil -flushcache and done. Your system cache is cleared up.



How to Access 'Page not found' or Deleted pages

While browsing on the web many times we come across any web page that has been deleted or the site host use to be unavailable. In such cases you get an error saying "Page Not Found". But if that page is very useful for you and you want to read it anyhow, there are different ways to access such pages.

First, search engines like Bing or Google use robots which roam the Internet and record the pages visited in what is called a cache. By accessing the cache of search engines, so it is possible to find a web page or an article to view it disappeared. The page will be as it was at the time of robots.

WayBackMachine service works much the same way except that it keeps a history of passage of his robots. The opportunity to go back in time and see how a webpage was several years ago. This can also be a way to find a web page or site disappeared.

Finally, if a site is unavailable because it is overloaded, nothing like the Coral CDN free service that lets you streamline and pool requests to the server that contains the page you want to reach.

1. Using Google Cache:

When the robots of Google search engine roam on Internet, they record the pages visited. By browsing the Google cache, it is possible to find a web page or an article to view it disappeared. The page will be as it was at the time of robots of Google.
- Go to Google (or click in the Google search box on your web browser)
- In the search box, type the page address or find the title of the article and the name of the site on which it stands. Validate
- Google presents the results of research. Mouse over the double arrow that appears next to the page you want when you mouse over it.
- On the right side of the window, a preview of the page is displayed. Click the button to open the cached version recorded by Google.
- The saved page is displayed by Google. Note that the images on the page may be missing because the robots will only save the text.

2. Using Bing Cache:

Same as Google, the Bing robots also record the pages visited when browsing the Internet. If you can not find a page in the Google cache, it is perhaps that of Bing in which robots do not go to the same frequency.
- Visit Bing (or click in the search box Bing your web browser).
-In the search box, type the page address or find the title of the article and the name of the site on which it stands. Validate
- Bing presents the research results. Mouse over the arrow that appears next to the page you want when you mouse over it.
- Click on the link to open page cached version recorded by Bing.
- Recorded by Bing page is displayed. Note that the images on the page may be missing because the robots will only save the text.

3. Using WayBackMachine service:

WayBackMachine is a free service that lets you go back in time and see how a web page was in the past. This can also be a way to find a web page or site disappeared.

- In your Web browser, go to the address www.archive.org
- In the section WayBackMachine, enter the address of the page to find. Click the Take Me Back
- The list of shots is displayed in a calendar. Click on a date the page was.
- Page is displayed, as it was at the chosen date.

Thursday, February 23, 2012

How to Install Windows XP from USB

You would be thinking of Installing an Operating System from a Pen/Flash Drive.
So here is the tip for Installing Windows XP from a Pen drive.

1.You will need a special tool to copy the Installation files and making the
USB Pen Drive bootable.You need to download the zip file which is below.

Download

2.Unpack to any folder. The path to your folder must be simple.
3.Insert your Pen Drive.
4.Run USB_MultiBoot_10.cmd
~Format utility will apear. Choose NTFS for >=4Gb usb flash and FAT16 for other,
Start format, Close after finishing.


5.If you are doing this from a Vista machine, you may need to run PeToUSB.exe
as adminstrator
in order for this program to recognize the jump drive. (Right click PeToUSB.exe >
Properties > Compatibility > Run this program as an administrator checked.)
6.Set options 1 and 2. Set option 0 only if you want to use USB HDD instead of a USB Pen Drive.
7.Choose 3 after setting all other options. It will create the image and write it to
the USB Pen Drive as well as making the USB Pen drive bootable.
8.Answer Yes to all questions that come up.
9.When it finishes copying, remove your usb stick and insert it in the PC to install XP.
10.When you turn on the PC, hold down Esc to choose the boot device and select the USB Pen Drive.
You'll need to do this at each reboot until XP is fully installed and you've logged in.
11.Choose Text installation at first time and GUI INSTALLATION aftere reboot twice
( Choose step 1 to start installing, after reboot choose step two, after continued install
press step 2 AGAIN to log into XP - As soon as you arrive at the Windows XP Desktop you can
safely remove the USB Pen Drive.)

Thursday, November 3, 2011

Adding Memory to Your Computer

Your computer will lag behind and you want to give it a boost? Add them to memory.

By increasing the RAM on your computer's hard drive, which is slower, be less stressed when you open multiple windows or tabs at the same time,
when you manipulate large files when you launch your software when you play, etc. .

In the end, then you will reap improved performance of your computer and a greater working comfort. Whether to improve the performance of a desktop,
a laptop or netbook, adding memory is accessible to everyone.

Just as a first step to check the type and characteristics of the memory used by your computer to see which modules you must buy (DDR, DDR2, DDR3 SO-DIMM, ...) and how much memory you can add. The number of memory connector on the laptop is indeed limited. The manufacturer is Crucial to this analysis tool free online that will automatically give you this information.

Then, by a simple trapdoor under your laptop and your netbook and directly into the housing of your computer, you can easily add your new module and extend
the capacity of RAM your computer.

All you need to finally verify that the module is properly recognized by your computer and Windows.

Find memory compatible with your computer:

With the Crucial manufacturer's online scan tool, you can easily find the type of memory your computer's speed, but also the quantity that you can add.
~So open Crucial site and click the Scan button on my system under Tools Crucial System Scanner.
~Check the box By checking this box and clicking ... and click Scan my system.
~In the dialog box that appears, click Run.
~Allow the program to then make changes to your computer by clicking Yes.
~Your browser is then open to a page showing the results of the analysis. The amount of memory installed, the type and number of free sites are listed. Here,
two memory locations are present which is already used by a module 2GB
~Information on the system manufacturer and model of motherboard are also shown.
~Fill out the form with the information: the manufacturer of your computer or your motherboard in the case of a PC assembler, the range and the model name.
Click Search.
~The service presents you with the recommended memory module for your computer.
~Below, the characteristics of your computer or your motherboard are shown. We learn here that the maximum amount of memory is 4GB
~In our case, we have a site made by 2GB of memory, 1 free slot and 4 GB may not be exceeded. The 2GB module is therefore proposed.

Windows, Linux and the limit of 3 GB:

Most operating systems like Windows or Linux are available in two versions: 32-bit and 64 bit. The difference between the two? The 32-bit Windows or
Linux knows how to use a maximum between 3 and 3.5 GB of memory (depending on your device: graphics card, sound card ... which require a memory area).

The 64-bit version has virtually no limit (Family Premium Windows 7 handles for example up to 16GB of memory).

Note that to use a 64 bit system, only the processor must be compatible 64-bit. Currently, almost all processors on the market are 64-bit,
32-bit processors is at least anecdotal. The Intel Core 2 Duo, Core 2 Quad, Core i7, Core i5, i3 Core, or AMD Athlon 64 X2, AMD Phenom X2/X3/X4/X6
are all built on a 64-bit architecture.

If you have a 32bit system, so there is virtually no interest in going beyond 3 GB of memory.

If you want to go beyond, turn to a 64 bit system. Note that the box of Windows 7 offers two versions: 32 and 64 bit and you can install the one you want. Also,
be aware that it is not possible to update a 32-bit Windows for 64-bit version. You will need to perform a full installation.

Adding memory to your Desktop:

Installing a new memory module in a computer is fairly simple and accessible to everyone. Here is how:
~ Unplug all cables and open the box.
~ Locate the slots for memory cards.
~ Spread the lugs memory locations.
~ Insert the memory module in an open location (right next to one used), making sure to align the notches on the card with the connector.
Keyed to two thirds of the bar and the connector allows you to put the card in the right direction.
~ Firmly press the memory module: the lugs just block the card. Make sure they are well adjusted.
~ Your memory modules are properly placed. Close the PC case and reconnect all cables.
~ Turn on your computer. From the start, the new strip and detected and the overall amount of memory your computer is updated.
~ Windows also recognizes the new amount of memory available.
~ Windows Vista and Windows 7, Windows Experience Index should also be updated.

Add memory to your laptop:

To add your new memory module in your laptop, it's very simple.
~ Turn off your first laptop, unplug it and remove the battery.
~ Turn your computer.
~ Using a small screwdriver, remove the screws from the plate called RAM, or CM. Please consult the documentation for your computer to know where
the memory modules.
~ If you replace a memory module, spread carefully and clamps at each end of the connector of the memory module until the module so.
Then remove the module from the connector.
~ Then install the new memory module. Align the notch on the edge of the module with the guide pin located in the connector slot.
Slide the module firmly into the slot at an angle of 45 degrees, then slide it down until you hear click.
~ Then store the cache memory and screws. Insert the battery in its bay, connect the adapter to your computer and restart your computer.
~ At startup, the computer detects the additional memory and automatically updates the system configuration information. Press any key (F1 in our case)
to continue booting.
~ To check the amount of memory installed, click the right mouse button on the My Computer icon on the desktop and choose the Properties command.
~ In the window that appears, the amount of memory recognized by Windows is displayed.

Add memory to its netbook:

Installing the new memory module is very simple and will take about ten minutes. At first, you must remove the memory module already installed,
which occupies this unique position in the netbook.
~ Shut down your Netbook.
~ Unplug it and disconnect all USB devices connected to it.
~ Close it and return it.
~ Locate the small door giving access to memory. This usually involves a small token of memory or memory includes an indication.
~ Remove the screws using a small screwdriver.
~ Remove the lid of the trap. The memory module appears.
~ Remove the clips at both ends of the memory module.
~ It rises.
~ Carefully remove the memory module.
~ Now that the site is free, you can install your new memory module. Take your new memory module.
~ I ntroduce him to his location, taking care to coding.
~ Push the memory module, while leaving the ramp.
~ Then press on down.
~ The mounting clips on the ends are then slipped into their sockets and lock the memory module.
~ Replace the lid and close it with its screw.
~ Turn your netbook, open it and start it. Note that you can reconnect if the battery is not charged enough.
~ The netbook starts normally.
~ Go to System Properties (right click on My Computer then Properties command). The 2 GB of RAM are well recognized.

How to Recover from System Crash

When a Blue Screen Occurs, you'd better be prepared for the worst. If you absolutely must have a backup of your documents,
your setup and your software, some settings in Windows can also make a difference if a problem occurs.

We advise you to reap that your computer is working properly to collect the maximum information about your hardware and software.
You will necessarily need to know the configuration of your equipment. Regarding software, if you have lost your serial numbers,
it's time to get to not be blocked if you ever need to reinstall Windows.

You absolutely must also configure your system to facilitate the diagnostic work and repair that you should carry in case of failure seriously.

Study hardware configuration:
Do you know exactly what components and devices are installed in your computer? Certainly not all ... But if you have a problem,
and want to determine its origin, it is essential to know your setup in detail. This information will be very useful, whether on a discussion forum or
the hotline for a hardware manufacturer.
~ Download Sisoft Sandra Lite from here and Install it on your system.
~ When this is done, run it by double-clicking for example on its icon on the desktop.
~ Open the Tools tab.
~ Double click on the Create Report.
~ Double click on the Next button.
~ Uncheck all boxes except Overview of the computer. Click Next.
~ In the section Benchmarks, uncheck all the boxes and click Next.
~ Do the same for headings and Software Support and double click on the Next button.
~ Scroll Distribution and choose Print and Fax.
~ Click the Browse button and click Next.
~ Select your printer and click on the button Print.
~ The report is then printed. Put it somewhere safe.

Get the serial numbers of programs:
If you need to reinstall your system, you will need the serial numbers of your programs. You have their installation CD but can not get their hands on the documentation containing the serial number. Do not worry, you have a second chance thanks to the software Advisor.
This free little program will allow you to find,
on your PC, the serial number of some of your software.
~ First of all you'll need to download Advisor and install it on your system.
~ Once installation is complete, it examines your system. After a few seconds, a web page appears.
~ In the section Software Licensing, serial numbers for software you have installed are displayed. Print the page and put it somewhere safe.

Save the system from getting crashed:
You can ask Windows to record in an event log, time and exact date of crashes occurring on your system. Next computers,
this setting can be enabled or not be.
To activate, you must edit the registry.

~ Click Start, then Run.
~ Enter regedit in the Open text box and click the OK button.
~ Pull the key from HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, CrashControl.
~ Create a new value called LogEvent (unless it already appears in the right frame of the window). Just click on the Edit menu, New, DWORD Value,
and name the value LogEvent.
~ Double-click on the latter, then enter 1 in the text box data value. Click OK.
~ Then close the Registry Editor and restart your computer for the change is applied.

Save the user environment after a crash:
In most crashes, you can also save all information from the user environment: user profile, permissions, etc.. in an event log.
This information can be used to investigate the causes of a problem.
Once again, it is necessary to modify the registry to enable this setting.
~ Click Start, then Run.
~ Enter regedit in the Open text box and click the OK button.
~ Pull the key from HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, CrashControl.
~ Pull down the Edit menu, and click DWORD Value.
~ Name the new value UserEnvDebugLevel.
~ Double-click it to edit it. Select the category Hexadecimal Base.
~ Enter 10002 in the Value data field. Click OK.
~ Finally close the registry editor, then restart your computer for the change to take effect.

Saving the memory in case of crash:
When your system fails, you can create an image of the memory of your system that you can use to find the cause of the error.
You can choose between several types of memory dumps.
Complete memory: The full memory dump records the entire contents of memory before the system shuts down without explanation. Its size is equivalent to the amount of RAM installed on your computer, which you must add 1 Mo. It is therefore worth a lot of disk space to store this image. So if you have 512 MB of RAM, will dump a 512 + MB or 513 MB
Kernel memory: The kernel memory dump records only the memory allocated to the kernel of Windows XP, hardware, operating systems and programs executed by the system. It therefore excludes the memory allocated to software executed by users. The backup process on the hard disk and is accelerated in the event of a crash. The size of the kernel memory dump is approximately one third of the total amount of RAM installed on your computer. This type of image is most interesting, since it is much smaller than the complete memory dump, and it neglects only the memory areas that do not appear to have any relation with the problem.
Memory Dump: Finally, the memory dump records the minimum information necessary to identify the cause of the crash. The memory dump saves in less than 64 KB: the stop message and parameters, the list of drivers loaded, the process context, information on the process stopped, the information on thread that stopped.
The memory dump can be useful if you have limited disk space. But you have less chance of finding the cause of errors in the examination, because of the lack of information retrieved.

To set the type to create memory dump during a crash, you must change the system settings.
~ Click the right mouse button on My Computer, then choose Properties.
~ In the System Properties dialog box that opens, click the Advanced tab.
~ Then click the Settings button under Startup and Recovery.
~ Pull down list then Writing debug information, then select the type of image you want to create in a crash, Kernel memory, for example, and click OK.

Install the Recovery Console:
The Windows Recovery Console is designed to help you recover the system if your computer does not start properly or does not start at all.
The Recovery Console can be executed directly by starting your computer from the Windows XP CD. You can also install it on your computer for easier access.
Insert your Windows XP CD in your drive.
~Then click the Start button, then Run.
~Then enter in the Open text box the following command: E: \ i386 \ winnt32.exe / cmdcons where E: is the drive letter in which your Windows XP CD.
~Confirm the installation of the Recovery Console by clicking the Yes button in the dialog box that appears.
~If you are connected to the Internet, the installer tries to download the Recovery Console from the Microsoft website. Press ESC to install directly from your Windows XP CD.
~After a few seconds, a message appears to indicate that the Recovery Console is installed. Click OK, then restart your computer.
~When you next start the computer, Recovery Console will be added to Windows startup menu.

Improving the functionality of the Recovery Console:
By default, access to all drives and all folders on your hard drive and the diskette are not allowed in the Recovery Console. Only the folder where Windows is available.

To change this and allow you to access all folders on your hard drive and all your readers, which is convenient to perform a backup last minute of your sensitive documents, you need to change local security setting.
~Open the Control Panel by clicking Start, Settings, then Control Panel.
~Switch to Classic View if you're not there already, then double-click the Administrative Tools folder.
~Then double-click on Local Security Policy tool.
~In the Security Settings section, scroll element Local Policies, then click the Security Options folder.
~In the right frame of the window, double-click the policy Recovery Console: Allow floppy copy and access to all drives and folders.
~Click the Enabled option in the dialog box that appears, then confirm with OK. You can then close the Local Security Settings window.

Uses of DD Command

Linux provides a DD command which is the powerful UNIX utility. It makes use of Linux kernel makefiles to make boot images.
DD can be used to copy data from one device to another or from one location to another.
Administrator is the only person having rights to execute DD command. You can use the below DD command in Linux operating
system which will help you in various ways.

The uses of DD command are as follows:
~ If you want to take the backup data from one hard disk to another hard disk within the same system. The command is given below:
Code:
# dd if=/dev/sda of=/dev/sdb
~ In this “if” specifies input file name and “of” specifies the file where the data has to be copied. If you mention source device in target device and vice versa then you might loss all your data.
~ If you want to restore the hard disk with the image file of another hard disk then use the following command:
Code:
# dd if=hdadisk.img of=/dev/hdb
~ To copy the data from the floppy into the image format you need to type the following command:
Code:
# dd if=/dev/fd0 of=myfloppy.img
In the input file specify the name of floppy location and in output give the name of floppy image file.
~Type the below command to read data from one location and write it to another location. The command is given below:
Code:
dd if= of= bs= ("USUALLY" some power of 2, and usually not less than 512 bytes (ie, 512, 1024, 2048, 4096, 8192, 16384, but can be any reasonable whole integer value.) skip= seek= conv=< conversion >
~ If you want to remove CD, DVD or USB from the system then type the below command. This command will rescue it from the system.
Code:
ddrescue -b 2048 -d -e 20 -r 300 -v /dev/hdc /home/sam/dvd.iso log.txt
~ You can backup a partition. For taking the backup you need to specify the partition name in input file and then specify the path or image file where you want to take backup. The dd command for taking backup is given below:
Code:
# dd if=/dev/hda1 of=~/partition1.img
~You can create an iso file from the source file. So we can enter the CD or DVD and create an iso file from the data contained in them. The dd command for creating iso is given below:
Code:
# dd if=/dev/cdrom of=tgsservice.iso bs=2048
Thus dd command reads one block at time, executes it and writes to the targeted output file.

How to Add subtitles to your home made videos

You filmed your vacation and you want to add subtitles to your video to showcase places you have visited for example,
to provide additional information to sound and image, or to translate foreign dialogue.

Movie Maker software, which is built into Windows XP, Windows Vista and you can install in Windows 7 for free ,
you can easily perform the editing of your videos. It also allows you to add subtitles that are embedded directly to your video.
Thus, whatever the medium and the software with which you watch your movie, the subtitles will be displayed and legible.

You can view your subtitles between two clips in the form of a transition or directly involved in a clip.
To define the appearance of the subtitle, you need to use the timeline table. And for a perfect result, you can customize the font,
size and color of subtitles.

Importing a movie:

Open Windows Movie Maker built into Windows XP and Windows Vista. You'll find it in the Start menu.
~ Run Windows Movie Maker by clicking the Start button, click All Programs, then clicking on the shortcut Windows Movie Maker.
~ In the software window that opens, click the Task button to bring up the Task Pane.
~ Inside, drop down the list 1. Capture Video and choose Import Video.
~ Select your hard drive the movie you want to add subtitles and click the Import button.

Split the movie into clips:

Movie Maker cut your movie into smaller clips, which correspond to different sequences of the movie.
You can work more effectively on small pieces of film and arrange them in order of your choice.
~ If a video clip seems too long, click with right mouse button and choose Create clips.
~ Drag the different clips in your movie in a row in the storyboard.
~ The various clips are connected then make up your movie.
~ You can verify that your film is in the right order using the preview box on the right.

Add a subtitle:

You will now have to choose the moments when putting your subtitles.
~ Switch then to the pasteboard time by clicking the button displays the timeline.
~ Start playing your movie, and when you want to add a subtitle, press the Pause button.
~ In the task pane, scroll down the list 2. Edit Video. Click on the Create titles or generics.
~ Then click Add a title selected clip in the timeline.
~ Enter your text in the text box below to display it in the bottom of the video.
If necessary, move the text down by putting two newlines just before.
~ Then click the Modify font and text color.
~ You can then modify the font, size and color of the text. Choose a color quite readable, like yellow.
~ Then click the Add link under the video.
~ Then the operation again whenever you want to add a subtitle.
~ To adjust the appearance of a subtitle with the video, you can manually move the subtitles into the Title Overlay row.

Save Movie:

Here is how you can save your movie with subtitles.
~ After checking with the insight that all your subtitles are well placed, pull down list 3. Complete video of the left pane.
~ Then click Save to my computer.
~ Enter a name for your video and click the Next button.
~ Leave optimum quality and click the Next button. Your film is created.
~ Then click the Finish button.
~ Your film is then opened with Windows Media Player. The subtitles are embedded in the video, you can
burn your movie or send it to friends, everyone will have subtitles.

Cara Menghapus Virus Shortcut dari Flashdisk dengan Command Prompt(CMD)

Ok kita mulai:

1. Buka CMD [Command Prompt] : Klik "Start",pilih "Run" atau "windows logo" + "R", lalu ketik "cmd" dan Ok.
2. Cari tahu dulu dimana letak drive Flashdisk Anda, misal di disk "G:"],
maka pada tampilan box cmd tulislah kode : attrib -h -r -s /s /d g:\*.*
3. Enter
4. Kemudian Cek flashdisk Anda


Done.

Saturday, October 22, 2011

How to Protect your computer from Hackers while Online

o protect you from hackers on the Internet, we recommend the firewall Jetico: this is the best.
And to arrange everything: he is French and free.

After defining your trusted zone, that is to say the LAN between your computer and your Internet connection
before you will allow or not the software you use to connect to the Internet. Usage rules for Web browsers,
messaging software, or FTP clients are preset and enable the software to access the Internet safely.

For other software, you refuse to authorize ad hoc or permanent access to the Internet.
If you are unsure, you can reject the connection, even if the permit later if needed.

Follow the guide to properly deal with Jetico and have optimum protection.

Download and install Jetico:
Jetico is a free firewall. You can download it from here
~ Once the download is complete, click the Run button.
~ Confirm the launch of Setup Jetico by clicking the Run button.
~ The installation wizard opens Jetico. Click the Next button.
~ Check the box I accept this agreement and click Next three times.
~ Jetico files are copied to your computer. Check the Yes box, I now proceed to the configuration.
~ Click the Finish button when done.

Set the network monitoring:
You must now define your area of confidence, that is to say your computer or network on which you have your computer
(your router or your box for example).
~ The Setup Wizard opens Jetico. Click the Next button.
~ Jetico found himself the address of your network: 192.168.1.0. If in doubt, you can check the documentation for
your router or your box.
Click the Next button.
~ Ignore the setting of the sensitive area by clicking Next.
~ Finally click the Finish button.
~ Click OK to restart your computer.

Allow early access:
When you restart your computer, locate the icon Jetico in the taskbar (it is 2 small gray arrows).
This icon indicates that Jetico is operational. At the same time, one or more windows on the screen.
Jetico actually detects programs wishing to connect to the Internet.
Watch the online application to find out what software is.
If the software has the right to connect to the Internet, it may be your antivirus, for example,
select the Custom option (reject) and click Edit Rule.

In the window that appears, scroll down the list and select the option Verdict Accept. Click OK twice.
For software which you do not know whether or not allow access to the Internet, select the Block this activity.
You can change this permission later if needed. Windows and software that start at boot time to finish loading.

Manage Permissions:
Now you must assign the rules of predefined software the most important: your web browser, email software, your FTP client, ...
~ Start your first Web browser.
~ A window Setting the event network Jetico opens. Select Treat.
~ Scroll to the right, select the proposal that corresponds to your software, Web browser here.
~ Click the OK button.
~ Then do the same with your mail client, Outlook, Outlook Express or Thunderbird, for example,
and choose Treat Customer Messaging.

Improved browser protection:
Some predefined rules, like those that manage your Web browser, are content to allow certain types
of communication, without preventing other. To improve your security, you can force the blocking of
communications that are explicitly permitted.
~ Double click on the icon Jetico in the taskbar to bring up the main program interface.
~ Open the Settings tab.
~ Scroll down and click on Optimal protection Web Browser. Note that this option may also
be located in Racine, rules on applications, Ask the user.
~ Click the right mouse button in an empty space right frame of the window and then select the command
New Rules for application.
~ In the window that appears, scroll down the list and select the option Verdict Reject.
~ Click the OK button. The rule is added on top of the list of other rules.
~ Then click on this new rule and, while holding the mouse button down, move there at the end of the list.
~ Finally, click on the Save icon, shaped disk.

Manage Alerts:
As and when you launch the software, check if Jetico need access to the Internet and they must be
accessible from the Internet.
A dialog box Setting the network event opens for you to specify if the software is allowed or not to connect
to the Internet.
~ For specific needs, as for a research update, select the Allow this activity.
The software will then have immediate access to the Internet. Uncheck the box Save my answer.
Your review will then be asked again during the next attempt to connect the software.
~ To deny access to Internet software, select the Block this activity.
~ If the software require a simple access to the LAN (not internet) to play with friends in the network for example,
select Treat and select applications in trusted zone.

How to Select and Copy Text from Restricted Website

Many web pages that don’t allow you to select and copy text.
One of the intention is to prevent anybody from stealing the content and distribute it
for commercial purpose.In fact this is a little trick that is done by using javascript which
prevent you from selecting the text and eventually fail to copy it.
Here we would like to show some simple steps that you can turn
the situation around by able to copy the text without any restriction.

To overcome this restriction, follow below steps:

1) Go to the website which restricts you from selecting and copying.
2) Copy below javascript and paste it at the address bar and hit enter key.

javascript:void(document.onselectstart=null)

3) Now you can select and copy the text from this website using conventional way -
highlight the text followed by "CTRL + C" to copy, then paste it into notepad or word document.

Hope this simple trick will able to help you overcome some situation whereby you need to copy
the content for personal reference and please use this trick wisely.

How to Hide our File in Image

1. Gather the file you wish to bind, and the image file, and place them in a folder.
I will be using C:\New Folder
-The image will hereby be referred to in all examples as beauty.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip.
From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b beauty.jpg + secret.rar beauty.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG,
acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from beauty.jpg to beauty.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there.

Or u can choose this way:
Create a folder or change the name of an existing one.While maintaining write down the ALT key with the keypad on the right of the keyboard type 0160. This only works with the keypad, not the numbers on the top of the keyboard. Thus the folder will have no name. On this folder Right click on the folder Properties> Customize tab> Change Icon button, select one of the icons transparent. The best thing is that inside the folder that contains the hidden folder there is nothing more but may have other files.

Friday, October 21, 2011

How to Improve the performance of laptop

Many laptops have a function that extends battery life, but the performance decreases. If you want to make sure that you have a better performance, follow this tweak.

Please note that your battery life than declining!

1. Go to the Start menu and type "regedit" in search. Enter below. If you have classic start menu go to "run", type "regedit" and enter it.
2. Go to HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Session Manager "
3. Click the right mouse button on the Session Manager and select New / Key
4. Enter the key name: Throttle
5. Click with your right mouse button in the right window and ga through "new" to "DWORD (32-bit) Value. Give this new value named "PerfEnablePackageIdle.
6. Double click this value and it has the value "1".
7. Click "OK" and close all windows off.

How To Disable Thumbnail Previews in Windows Explorer

Thumbnails are reduced-size versions of your pictures and videos.
Their role is to allow you to quickly scan and recognize them while browsing your computer.
You can disable thumbnails to speed up the windows explorer.
Follow the following steps to disable thumbnails in windows explorer

* For Windows Vista:

1. Click on the Start button
2. Choose All Programs
3. Click on the Accessories folder
4. Then click the Windows Explorer link
5. Click on the Organize button
6. Choose Folder and Search Options from the menu.
7. In the Folder Options window, click on the View tab
8. Under the Files and Folders heading, check the box next to Always show icons,
never thumbnails.
9. Click on OK.

You can skip first four steps by pressing "windows logo + e" on your keyboard.

* For Windows XP:

1. Click the Start button
2. Click on Run
3. Type in Regedit in the box and press Enter
Then browse following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\ClassicViewState

4. Right click on it and change its value to 1

How to Disable Notification Balloons in windows XP

To disable balloon tips in the notification area, follow these steps:

1. Go to : Start > Run > type regedit, and hit the enter key.
2. Locate the following subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
3. Right-click the right side pane, create a new DWORD value, and then name it EnableBalloonTips.
4. Double-click EnableBalloonTips, and then give it a value of 0.
5. Close Registry Editor and restart your system.

DONE.

How To Fix Realtek HD Audio: Error 0xE0000227

This error sometimes appears when installing the Realtek High Definition driver in XP.
You can download the driver here.
Here are some more solution:

Open Device Manager (Start> Control Panel> System> Hardware)
In the "View" menu manager, select "Devices by connection":
Disable and uninstall by right clicking on "Bus Driver for Microsoft UAA High Definition Audio",
You can now install the drivers normally and without error.

Sunday, July 5, 2009

Alt code

For you I will share some Alt codes,
I hope this is useful for you.
Ok here we go:

* alt + 1 = ☺
* alt + 2 = ☻
* alt + 3 = ♥
* alt + 4 = ♦
* alt + 5 = ♣
* alt + 6 = ♠
* alt + 7 = •
* alt + 8 = ◘
* alt + 9 = ○
* alt + 10 = ◙
* alt + 11 = ♂
* alt + 12 = ♀
* alt + 13 = ♪
* alt + 14 = ♫
* alt + 15 = ☼
* alt + 16 = ►
* alt + 17 = ◄
* alt + 18 = ↕
* alt + 19 = ‼
* alt + 20 = ¶
* alt + 21 = §
* alt + 22 = ▬
* alt + 23 = ↨
* alt + 24 = ↑
* alt + 25 = ↓
* alt + 26 = →
* alt + 27 = ←
* alt + 28 = ∟
* alt + 29 = ↔
* alt + 30 = ▲
* alt + 31 = ▼
* alt + 32 = “space”
* alt + 33 = !
* alt + 34 = “
* alt + 35 = #
* alt + 36 = $
* alt + 37 = %
* alt + 38 = &
* alt + 39 = ‘
* alt + 40 = (
* alt + 41 = )
* alt + 42 = *
* alt + 43 = +
* alt + 44 = ,
* alt + 45 = -
* alt + 46 = .
* alt + 47 = /
* alt + 48 = 0
* alt + 49 = 1
* alt + 50 = 2
* alt + 51 = 3
* alt + 52 = 4
* alt + 53 = 5
* alt + 54 = 6
* alt + 55 = 7
* alt + 56 = 8
* alt + 57 = 9
* alt + 58 = :
* alt + 59 = ;
* alt + 60 = < * alt + 61 = = * alt + 62 = >
* alt + 63 = ?
* alt + 64 = @
* alt + 65 = A
* alt + 66 = B
* alt + 67 = C
* alt + 68 = D
* alt + 69 = E
* alt + 70 = F
* alt + 71 = G
* alt + 72 = H
* alt + 73 = I
* alt + 74 = J
* alt + 75 = K
* alt + 76 = L
* alt + 77 = M
* alt + 78 = N
* alt + 79 = O
* alt + 80 = P
* alt + 81 = Q
* alt + 82 = R
* alt + 83 = S
* alt + 84 = T
* alt + 85 = U
* alt + 86 = V
* alt + 87 = W
* alt + 88 = X
* alt + 89 = Y
* alt + 90 = Z
* alt + 91 = [
* alt + 92 = \
* alt + 93 = ]
* alt + 94 = ^
* alt + 95 = _
* alt + 96 = `
* alt + 97 = a
* alt + 98 = b
* alt + 99 = c
* alt + 100 = d
* alt + 101 = e
* alt + 102 = f
* alt + 103 = g
* alt + 104 = h
* alt + 105 = i
* alt + 106 = j
* alt + 107 = k
* alt + 108 = l
* alt + 109 = m
* alt + 110 = n
* alt + 111 = o
* alt + 112 = p
* alt + 113 = q
* alt + 114 = r
* alt + 115 = s
* alt + 116 = t
* alt + 117 = u
* alt + 118 = v
* alt + 119 = w
* alt + 120 = x
* alt + 121 = y
* alt + 122 = z
* alt + 123 = {
* alt + 124 = |
* alt + 125 = }
* alt + 126 = ~
* alt + 127 = ⌂
* alt + 128 = Ç
* alt + 129 = ü
* alt + 130 = é
* alt + 131 = â
* alt + 132 = ä
* alt + 133 = à
* alt + 134 = å
* alt + 135 = ç
* alt + 136 = ê
* alt + 137 = ë
* alt + 138 = è
* alt + 139 = ï
* alt + 140 = î
* alt + 141 = ì
* alt + 142 = Ä
* alt + 143 = Å
* alt + 144 = É
* alt + 145 = æ
* alt + 146 = Æ
* alt + 147 = ô
* alt + 148 = ö
* alt + 149 = ò
* alt + 150 = û
* alt + 151 = ù
* alt + 152 = ÿ
* alt + 153 = Ö
* alt + 154 = Ü
* alt + 155 = ¢
* alt + 156 = £
* alt + 157 = ¥
* alt + 158 = ₧
* alt + 159 = ƒ
* alt + 160 = á
* alt + 161 = í
* alt + 162 = ó
* alt + 163 = ú
* alt + 164 = ñ
* alt + 165 = Ñ
* alt + 166 = ª
* alt + 167 = º
* alt + 168 = ¿
* alt + 169 = ⌐
* alt + 170 = ¬
* alt + 171 = ½
* alt + 172 = ¼
* alt + 173 = ¡
* alt + 174 = «
* alt + 175 = »
* alt + 176 = ░
* alt + 177 = ▒
* alt + 178 = ▓
* alt + 179 = │
* alt + 180 = ┤
* alt + 181 = ╡
* alt + 182 = ╢
* alt + 183 = ╖
* alt + 184 = ╕
* alt + 185 = ╣
* alt + 186 = ║
* alt + 187 = ╗
* alt + 188 = ╝
* alt + 189 = ╜
* alt + 190 = ╛
* alt + 191 = ┐
* alt + 192 = └
* alt + 193 = ┴
* alt + 194 = ┬
* alt + 195 = ├
* alt + 196 = ─
* alt + 197 = ┼
* alt + 198 = ╞
* alt + 199 = ╟
* alt + 200 = ╚
* alt + 201 = ╔
* alt + 202 = ╩
* alt + 203 = ╦
* alt + 204 = ╠
* alt + 205 = ═
* alt + 206 = ╬
* alt + 207 = ╧
* alt + 208 = ╨
* alt + 209 = ╤
* alt + 210 = ╥
* alt + 211 = ╙
* alt + 212 = ╘
* alt + 213 = ╒
* alt + 214 = ╓
* alt + 215 = ╫
* alt + 216 = ╪
* alt + 217 = ┘
* alt + 218 = ┌
* alt + 219 = █
* alt + 220 = ▄
* alt + 221 = ▌
* alt + 222 = ▐
* alt + 223 = ▀
* alt + 224 = α
* alt + 225 = ß
* alt + 226 = Γ
* alt + 227 = π
* alt + 228 = Σ
* alt + 229 = σ
* alt + 230 = µ
* alt + 231 = τ
* alt + 232 = Φ
* alt + 233 = Θ
* alt + 234 = Ω
* alt + 235 = δ
* alt + 236 = ∞
* alt + 237 = φ
* alt + 238 = ε
* alt + 239 = ∩
* alt + 240 = ≡
* alt + 241 = ±
* alt + 242 = ≥
* alt + 243 = ≤
* alt + 244 = ⌠
* alt + 245 = ⌡
* alt + 246 = ÷
* alt + 247 = ≈
* alt + 248 = °
* alt + 249 = ∙
* alt + 250 = ·
* alt + 251 = √
* alt + 252 = ⁿ
* alt + 253 = ²
* alt + 254 = ■
* alt + 255 = “space”

How to Access the Internet with paint







If you have a problem with your browser, for example, exposed to malware or any
we can use the "paint" for internet access emergency.
Ok, now we begin:
1. Click Start> Programs> Accessories> Paint
use the script command or the Windows Logo + R, then type "mspaint"
2. Once paint is open, press F1 on your keyboard
3. Right click yellow question mark in the upper left corner
4. Select Jump to url
5. Enter the url that you want
6. done ^ ^

If there is a lack of understanding the order in the picture above.
Hopefully these tips useful ^ ^
Be Creative ....

Friday, July 3, 2009

Cara mengakali rapidshare premium

Jika Anda mempunyai account premium rapidshare tidaklah menjadi masalah untuk mendownload berbagai macam file yang Anda inginkan.
Namun jika Anda tidak memiliki account premium atau Anda mendownload sebagai free user, maka Anda akan mengalami berbagai macam limit dalam mendownload file dari rapidshare antara lain :
Anda hanya diperbolehkan mendownload satu file dalam jangka waktu tertentu, Anda harus menunggu beberapa detik sebelum download button ditampilkan serta batasan kecepatan download. Namun batasan rapidshare tersebut ternyata bisa kita hindari jika kita mengerti bagaimana trik download dan trik mengakali rapidshare. Untuk mempermudah dan menambah kenyamanan bagi Anda yang ingin mendownload file dari rapidshare, maka berikut ini saya tunjukkan trik download dan mengakali rapidshare agar proses download menjadi cepat dan nyaman :

1. Mempercepat download rapidshare Menggunakan Situs Rapidshare leecher
Cara termudah mendownload dari rapidshare adalah dengan menggunakan situs – situs rapidshare leecher. Dengan menggunakan situs rapidshare leecher ini anda akan bisa mendownload layaknya premium user. Anda hanya perlu mencopy link download rapidshare anda di kolom yang telah disediakan dan klik tombol download / get premium link, maka Anda bisa mendownloadnya dengan kecepatan maksimal layaknya premium user.
Anda bisa mencari berbagai macam situs yang menyediakan layanan leech rapidshare dengan mengetikkan “rapid leech“, atau “rapidshare leecher” , atau “rapidshare leech” di search engine google.

2. Menghilangkan waiting time rapidshare
Memang trik berikut ini adalah trik lama yang saya temukan dari situs sebelah, namun tidak ada salahnya Anda mencobanya. Caranya adalah silahkan anda paste link download rapidshare di browser mozilla firefox anda. Setelah itu pilih free user. Saat muncul detik waiting time hitungan mundur, paste kan kode “javascript:alert(c=0)” (tanpa tanda kutip) ke browser Anda. Jika Anda berhasil maka waiting time akan langsung muncul kotak dialog 0, selanjutnya Anda tinggal mengklik download buton.

3. Mendownload banyak file tanpa harus menunggu jeda waktu yang membosankan antar download
Jika kita telah mendownload file dan ingin mendownload lagi, maka biasanya rapidshare akan memblok dan memberi informasi bahwa kita harus menunggu beberapa menit sebelum mendownload lagi. Hal ini dikarenakan oleh karena IP kita telah tercatat oleh rapidshare. Hal itu bisa kita hinfari dengan cara berikut ini :

Copy link rapidshare yang ingin anda download
Klik Start > Run > dan ketik CMD
setelah muncul command prompt, ketikkan satu per satu perintah berikut ini :

ipconfig / flushdns
ipconfig / release
ipconfig / renew
exit

Buka browser dan clear cache dan cookies-nya
Paste kan link rapidshare tadi dan silahkan download lagi sepuasnya.
Ulangi trik ini jika Anda ingin mendownload file lagi dari rapidshare tanpa harus menunggu jeda waktu antar download.

alternatif :
selain perintah di atas, Anda juga bisa menggunakan perintah berikut ini dengan langkah – langkah yang sama seperti di atas :
@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
exit

4. Mengakali di bloknya situs rapidshare di kantor atau lingkungan Anda.
Rapidshare yang merupakan situs file sharing terbesar dan terlengkap membuat terkadang rapidshare di blok di tempat – tempat umum untuk menghemat bandwidth dan mencegah penyedotan bandwidth karena download dari rapidshare. Tempat – tempat yang biasanya memblok situs rapidshare antara lain kantor, lokasi pendidikan seperti sekolah maupun kampus serta lokasi – lokasi umum lainnya.
Jika tempat berinternet anda merupakan tempat yang termasuk memblokir akses ke situs rapidshare, jangan khawatir karena ada trik khusus untuk mengatasi dan mengakalinya. Berikut ini akan saya jelaskan trik tersebut kepada Anda :

Buka Browser mozilla firefox Anda.
Download dan install add on download rapidshare@office
Untuk proses download dan install add on tersebut maka Anda diharuskan register di situs resmi mozilla terlebih dahulu, namun Anda tidak perlu khawatir karena proses registrasinya sangat mudah dan tentu saja Gratis
Setelah Anda install add on tersebut, restart firefox maka Anda sudah bisa surfing ke situs rapidshare yang telah di blok oleh administrator jaringan Anda.

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal  that ask you for your SSN (Social Security Number). This is very Easy metho...