Search This Blog

Wednesday, September 28, 2011

Best Tricks to Extend Laptop Battery Life

20 Best Tricks to Extend Laptop Battery Life




Recently, mobile technology has become increasingly sophisticated with the new components, the better chips, and a faster processors. But there’s one part of Laptop or Netbook which is the “Achilles heel” – the battery. Operating systems, modern graphics, and various other advanced application rapacious spend your laptop battery every day. The average laptop battery life remains in the range of 3 – 4 hours. Of course, this is still a problem for workers who often travel long distance.Most effective way at this time is to bring some spare batteries in your trip. But, beside this there are at least a few tricks that can help you to save laptop batteries a long time.

1. Laptop HD defragmentation – Regular defragmentation can help you manage the data to be more efficient and make the hard drive (HD) a little faster to access the data. When HD works quickly, the more you can spare of laptop battery energy.

2. Turn off High Power Applications – Immediately turn off the background process that is not important. Watch energy use through the Windows Task Manager [Ctrl + Alt + Del]. If you are not using the internet, then your laptop is safe to turn off programs that are not that important to work on the taskbar, such as antivirus and firewall. Run – msconfig – Tab: Startup and remove n the programs that you do not want to launch your laptop and reboot once.

3. Suspend the Scheduled Tasks – This process can be defragmentation or virus scan, but make sure you schedule an activity at the time you are near the power source. If not, delay or combine alternately between them, to find the time and place to fill the battery.

4. Unplug External Tools – Tools that use the USB can spent battery power. After use, do notforget to pull out all the external equipment such as mouse, PC card, Wi-Fi, an external speaker, Bluetooth, and even an iPod or iPhone.

5. Clear Drive CD / DVD – Do not leave a CD / DVD any left in the laptop if it is not used.

6. Use Local Hardware Equipment – Try not to use an external DVD or other equipment

7. Remove lights – LCD laptop screen is also one of a battery waster. Configure light level to the lowest level that you can still see by using the Function or use the Display Settings in Control Panel.

8. Turn off Voters – Turn off the speaker and avoid the use of multimedia software. Sound scheme also spent laptop battery.

9. Do not Use a Screensaver

10. Visit the Power Options – Know energy management / power through the application “Power Options” in Control Panel. Both XP and Vista have this advanced feature to turn off components such as monitors and / or HD after specific intervals. “Max Battery” in the Power schemes can be chosen to maximize battery life time.

11. Use classic style GUI – On Vista, click on the “Desktop – Preferences – Color View – Appearance – Appearance Classic and Basic Windows graphical interface.” On XP, “Display Properties – Theme – Windows Classic”. Linux and Mac have a better system in this case to maintain the battery.

12. Hibernate is Better of Sleep – On the Stand By mode (or Sleep Mode), the computer will shut off and the HD display but the memory remains active while the CPU slowed. This is of course the battery. Meanwhile, hibernate is better because laptop save all of the conditions and the last off the total to save energy.

13. Do not run a lot of programs simultaneously – Working with many programs, of course, require more energy. We recommend using only one or two programs you really need at the same time.

14. Use More RAM – A large capacity RAM can reduce the burden of virtual memory that directly lead to effects on the HD and also lead to spent laptop battery life.

15. Maintain Hygiene of Your Laptop – Laptops with the dirty air ventilation will be greater heat and with that spent battery (ventilator always work). Clean the air vents on a regular basis to maintain the temperature remains the minimum. Leave the area around the ventilation as much as possible open or empty for easy air circulation.

16. Avoid Places with High Temperature – As much as possible avoid direct sunlight or other heat places.

17. Avoid Memory Effect – The battery type Li-Ion does not have this problem. This problem may increase for the battery type Ni-MH. This can be prevented with a charge when the battery is completely empty.

18. Update Software and Drivers – Usually, the drivers and the latest software is designed to work more efficiently than the previous version.

19. Use the Right Adapter – Make sure that you use to adapter for your of the original specification or match. The wrong type can lead to overload and damage the battery and your laptop.

20. Trim Laptops – If you don’t use laptop some time, make sure that the laptop is 40% filled, pull the battery, and store in some dark place.


source : http://www.detector-pro.com/2009/04/20-best-tricks-to-extend-laptop-battery.html

How to remove Windows XP Genuine Advantage Notification

1. First – click Start then Run and type “regedit” without quotes and press Enter

2. Go to My Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify. In this location delete the folder “WgaLogon” and all content with name WgaLogon. If there is no WgaLogon folder continue with next steps.

3. Restart your computer. After restart WGA will not be active and you can remove it completely following the next steps:

4. Set your folders options to show hidden and protected Windows files – go to My Computer/Tools/Folder Options and then choose View. From the View tab choose “Show hidden files and folders” and uncheck “Hide protected operating system files” and click OK

5. Now, Go to folder Windows\System32\dllcache, find and delete “WgaTray.exe”. Also, check for “WgaTray.exe” in Windows\System32\, and if you find it delete it, and search for “Wga*.*” with Start-Search-All files and folders and delete everything that starts with “Wga” (Wgatray.exe; Wgalogon.dll, Wgasetup; etc..)

6. Restart your computer again and live happy and free.


source : http://www.detector-pro.com/2009/03/how-to-remove-windows-xp-genuine.html

Tuesday, September 27, 2011

Tips to Setup Wi-Fi Easily

A wireless network is one that enables the connection of two or more computers together without cables involved. Wi-Fi, was published under the IEEE 802.11 standard, it has been updates, which work at different speeds. The Wireless Local Area Networks, allows highly mobile users, allowing them to minimize the cable connections, using radio frequency technology.

Some Points to Check Before setting up a Wi-Fi :

The wireless devices are sold with all the security turned off, so anyone can connect to the latch and / or damage to: need user intervention to activate the protection.
The security of wireless networks is much weaker than allow the manufacturers of these wireless devices.
The real performance is far lower than those advertised.

I realized my wireless network using devices that follow the 802.11g standard, so these notes are limited to devices that meet this standard. I do not have the actual time to write a treaty is valid for all possible variants of wireless connections. Most of the information given here is independent of the operating system. It is therefore whether you are using Windows, whether you are using Linux, whether you are using Mac or any other computer and operating system.

What you Need

To create a wireless network usually uses a configuration called star. In this each computer connects to a central point, called the access point. There are other trinkets as wireless routers and bridges, which have similar functions, but all will point to simplify them generically as an access point (the experts do not send me too many accidents). The access point is then connected to the wired network and / or the Internet. There are several other ways to connect computers with wireless cards, but I am here.

You can not separate the wired from the wireless network, interposing between the two networks is a hardware or software firewall. The firewall then allows wireless access to the machines to those of the wired network only under certain conditions, you can set to your liking, for example, you can allow access to the Internet via wireless or wired network in your Web server, but not the resources shared (disks and printers).

You can use a standard range of IP addresses. Normally, local networks using addresses in the range 192.168.1.x, where x is between 0 and 254 (there would also be the 255, but it is reserved). The intruder knows, and set your wireless card to use the same range. But if you use another range, the intruder is displaced (not forever, but enough to make his life difficult.) Warning: If your local network is connected to the Internet, you can not use a range of addresses any, why would you go into conflict with the addresses used by the rest of the Internet. The options allowed are 192.168.xx, 10.xxx, and 172.16.0.0 to 172.31.255.255.

Setup

Connect your computer to a local network (Ethernet) or internet either through the use of a standard network card (external or integrated into your motherboard) or using a wireless network card or wireless (WiFi). Must have the data connection if necessary as in other operating systems (IP, DNS, network password, etc..). Create different configuration profiles designed for portable computers that usually connect from different connections.
Connect your PC to phone cable internet through a standard internal or external modem, configuring the connection data (user, password, telephone access, etc..).

Wi-Fi : Each PC you want to use in a wireless network of computers need a wireless network card or a wireless connection. The laptops include more modern wireless connection. As mentioned above, there are several standards for speed and usually are downwards compatible, ie a computer with fast connection can communicate with slower components at the speed of the latter.

Access point (Access point) : Type access points bridge act as switches, allowing users to access the wireless network while establishing connection to wired computer. These are connected with cable to a router or a switch.

Router with access point : These routers perform the same function as the router wired and include a WAN port (Internet) to RJ45, several LAN ports with RJ45 cable to connect to other computers or peripherals and an integrated wireless access point.

Some Points to Take Care :

When installing a wireless network must take certain steps to minimize the risk of a security incident occurs. Thus, access to company information by outsiders, the use of the network for malicious or consumption of bandwidth (with the consequent drop in performance of the company) are possible scenarios in the context of a wireless network.

1. Every network card (wireless or not) has its own serial number, which is called MAC address. The access points can be set to accept connections only from cards that have a certain MAC address. This makes it very difficult to penetrate the intruder in the network, because it must first discover a MAC address allowed. It is not impossible, but it is a hassle that discourages most of the attackers.

2. DHCP is a system that simplifies network management by automatically assigning an IP address to every machine connected to the network. This is handy in a wired environment, but it is dangerous in a wireless environment, because it assigns an IP address automatically even an intruder.

3. The wireless network has its own identifier, called the SSID, the wireless cards are able themselves to know to connect. Even the intruder needs to know to do his dirty work. The trouble is that I know is simple: most wireless devices is set at the factory to use, such as SSID, the name of the manufacturer. Another nice tricks. Since manufacturers are not so, it's trivial for an intruder to one.

4. WEP is a sieve, but is still in its little more to interpose a barrier between your network and intruders. It should therefore be operated with all other countermeasures, and the highest possible level (usually 128 bits), but beware: do not use any predefined keys.

5. Turn off when not in use.

Thanks to : Zared

Recover Corrupted PowerPoint File

Many times when our computer is affected by malicious files or virus files, they tend to affect document files such as excel, word, powerpoint etc. At such situation, we don't have any other alternative but to delete or remove infected files from the computer hard disk drive. There is no possible way to recover corrupt file of Microsoft PowerPoint. The PowerPoint open files also tends to get corrupted while trying to save or while working on it and also during PowerPoint application or as when windows operating system gets crashed due to some unavoidable reasons. At such senario, Windows operating system try to save a duplicate copy of work file like a temporary version. In this type there is no requirement of installation of a third party software in order to arrange corrupt files, as you are able to recover it from TEMP folder.

Steps To Recover Corrupt Microsoft PowerPoint Files:

* Initailly click on Start button and then click on Search option to start search process.


* Inside the search text box, type *.TMP and then select the Local Hard Drives option in "Look in" box option available.


* Then just click on Search button in order to start the search process of temporary files available inside your system local drives.
* As search finishes taking some time, windows system will display a list to temporary files available.
* Try to manage all the temp files as per Date modified pattern.


* As you are able to view that file, open it with the PowerPoint application and open the temp files by double clicking on file in order to run in PowerPoint.

How Data Recovery Brings Back Deleted Files

Data recovery software has become a popular solution for accidentally deleted files and items lost due to crashes or system error. However, many people are not familiar with these programs and unsure how they work. In this article, you will know how your computer stores information so you will understand why the lost data can be got back.

In our daily life, many people don't know that the deleted files can be recovered; they think that the deleted files do not exist. In fact, the files are still in the hard disk, and you can get them back as long as you know the theory of data recovery. With the help of data recovery software, you can get back your lost data in just a few steps. In order to understand how data recovery works, you first need to know how your computer stores information. Every bit of information on your PC, from saved files to your operating system itself, is recorded on your hard drive. The hard drive is essentially the memory of your computer. Inside the hard drive are a few complex devices, primarily being the platters and the read/write heads.

Platters are rapidly spinning disks, and there can be a few of these. They are similar to CDs in their general design. Platters store data though magnetic regions, which make up the binary code of information. With binary information, the magnetic fields can have two positions only: 1 or 0. One of these positions is called a bit. Eight bits composes a byte, as in megabyte. Thousands of the magnetic regions record your information on the platters.

This magnetic information is detected and recorded by the read/write head. This is a finely tuned device which hovers just above the surface of the platter. It picks up the magnetic field, and sends the signal through the computer. The binary code is then converted into the file that you see as a picture, hear as a song, or interact with as a program. The same happens in reverse when you save a file - the information goes through your computer, is translated to binary code, and is recorded in magnetic regions on the platter by the read/write head. Besides hardware malfunction, most data loss is causes by software malfunctions or mistakes, such as accidentally erasing a file, emptying a recycle bin, formatting a disk, and so on. Virus and system crashes can also cause data to be erased.

In these circumstances, the binary magnetic information that makes up a file is not lost. Instead, just the icons, references, and file names are removed. As a result, the user is unable to access their file, but the data remains on the platters. This is due in part to the design and function of a hard drive - when a file is deleted, the information remains on the hard drive until new information takes its place. When new information is saved over top of old, this is known as overwriting. A data recovery program makes the read/write head detect all information on the platters, even where the computer seems to show that there is no information. This allows the program to pick up on the magnetic regions of deleted information. This information is then analyzed, the file type is determined, and the file is reconstituted on the computer. The user can then interact with the file just as before.

Thanks to : Canyd512617

Use Your Pen Drive as Ram

Yes with some modified settings you can use your pen drive as a RAM

1) Connect your pen drive to your PC [pen drive should be at least 1 GB or if you having 4 GB then its better]
2) Allow PC what he is supposed to do,let system to detect pen drive.
3) After your PC finished with its detection work,you have to do some little
4) Right click on the My Computer and select the properties
5) Goto advanced and then performance setting then advanced then
6) Select pen drive and click on custom size " Check the value of space available "
7) Enter the same in the Initial and the Max columns " You just used the memory of the PenDrive as a Virtual Memory "
8) Now restart your pc and enjoy your fast and super system

Thanks to : Hale

Share internet connection via bluetooth

1. Please recognize your two computers as usual.


(Start Menu / Config Panel / Network and Internet Connections / Bluetooth )

Only one computer needs to be added, the other is recognized and added automatically.


2. This is done on both computers and the host first.

Go to Start Menu / Config Panel / Network Connections
Click on Create a home network or corporate network light and follow the prompts. Once done, you share your files and your printer but not your Internet connection.

3. On the host computer:

Go to Start / Run
Type CMD
Type ipconfig / all

Parallel to AC, go to:
Start Menu / Config Panel / Network Connections
Then right-click on Network Connection properties bluetooth then click on Internet Protocol (TCP / IP) and properties.

Check Use the following IP address and put the one IP address as in ethernet card bluetooth network connection.

In use the following DNS server addresses that are being shown under 'PPP Map Nine' That's for me but you ca depends on the principle used for your Internet connection, or looking for servers there are marked DNS, there are 2, they are good then add the above. You turn the whole and that's it for the host.

4. You do the same in regard to the second computer except that you must add a bridge to the right function. It is in the Advanced tab, where you have set the ip / dns. And gateway is the ip of the host computer. But for the IP address change the last two values that you want.

Remember to check 'allow other network users to connect via the Internet from this computer' in the properties of your Internet connection.

thanks to : fanchon

Monday, September 26, 2011

Folder Lock n Unlock Without Any Software

Folder Lock Without Any Software :-

Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

thanks to : R.K

Easily convert your texts to MP3 file

You have to read a long report and you find it tedious? With the speech of Windows and the free Balabolka, you can make the text read by your computer and take the opportunity to do something else at the same time for example.

Balabolka also allows you to convert many types of documents: doc, docx, txt, epub, pdf, odt directly into MP3 audio files. You can then listen to texts read by the computer on your computer, on a Walkman, a phone, etc..

The software publisher is free to you two models of voice (man and woman) you can customize the playback speed and tone of voice to get smooth playback and fun that has nothing to do with the voice robot that can be imagined.

Download and install Balabolka:

Balabolka is free software that will allow you to read text aloud on your computer and save them to MP3. You can download it from here.

* Save the file, Once the download is finished, open it.
* Click Extract all files.
* In the window that appears, double click the file setup.exe.
* Select your language and click Next four times.
* Uncheck Launch Balabolka after installation and click Finish.

Import and prepare the text:

Balabolka can play MP3 and implement many types of files: doc, docx, txt, epub, pdf, odt, ... Here is how you can do the same:

* Run Balabolka by double clicking its shortcut on the desktop.

* Click the File menu and click Open.

* Select the document you want to read and click Open.

* Rid your text and formatting of images is imported into the software.

* Remove empty lines, notes and references superfluous.

* If you wish to split the document into audio files, separate each part with a double blank line.

* Click the File menu and click Save.

* Click Save to save the document in text format, in the same folder as the original document.



Set the voice:

Speaking rate, timbre, noise level, you can configure the diction. Go through the following steps to do that:

* Select your preferred language to be used from the Setup menu, Voice.

* Click Read aloud or press the F8 key to start playback.

* Adjust diction playing with the sliders Stamp, Speed ​​and Volume.

Final conversion:

Balabolka lets you choose the audio format you want (MP3, OGG, WAV, ...) and choose the method of separation into audio files that you used.

* Click the File menu and then click Split and convert audio file.

* Click the Choose button and select the folder where to put the audio file of your document read.

* Then select the audio file format, MP3 for example.

* Change if necessary the file name.

* In the split mode, check the box by two blank lines following and uncheck the other boxes.

* Finally, click on Split and convert.

* The program then shows you which files will be generated. Click Run.

* Click Close when the conversion is complete.

* You then read your text to MP3 format. You can listen on your computer, a phone, a Walkman, a car radio, etc..

to download balabolka click here


thanks to : maq. H

Mengganti Windows XP menjadi Asli

Kebanyakan pemakai windows XP di Indonesia menggunakan windows XP bajakan. Akan tetapi bukan berarti windows XP bajakan itu bukan asli....


Yang membedakan asli atau tidaknya windows XP ternyata terletak pada serial number yang digunakan ketika proses menginstall windows XP. Untuk mentes apakah windows XP kita asli, coba gunakan tool "Microsoft Genuine Advantage Diagnostic Tool", yang dapat mendeteksi keaslian windows XP anda.

Anda dapat mendownloadnya melalui om Google.

Kelebihan windows XP yang Asli adalah mampu update windows.

Kalo ternyata windows XP yang kita gunakan bukan Asli, tak perlu khawatir. Ada beberapa serial number windows Xp yang sudah terbukti Asli. Berikut merupakan serial number windows Xp yang sudah terbukti Asli :

V2C47-MK7JD-3R89F-D2KXW-VPK3J

H689T-BFM2F-R6GF8-9WPYM-B6378

WCBG6-48773-B4BYX-73KJP-KM3K3

Ada cara manual untuk mengganti serial number Windows XP menjadi Asli. Berikut adalah caranya :

1. Klik START lalu ke RUN dan ketik regedit

2. Masuk ke HKEY LOCAL MACHINE -> SOFTWARE -> Microsoft -> WindowsNT -> CurrentVersion -> WPAEvents

3. Pada panel sebelah kanan, klik dua kali OOBETimer

4. Hapus semua yang dapat dihapus dalam kotak value data

5. Close

6. Masuk RUN lagi lalu ketik %systemroot%\system32\oobe\msoobe.exe /a lalu enter

7. Pilih: Yes I will to call, lalu OK

8. Pilih Modify Product Key

9. Masukkan kode V2C47-MK7JD-3R89F-D2KXW-VPK3J lalu klik activate

10. Klik Remember Later

11. Restart Windows

12. Ketika sudah masuk windows lagi masuk RUN dan ketik lagi %systemroot%\system32\oobe\msoobe.exe /a lalu enter

13. Anda akan melihat kotak windows yang bertuliskan Windows Activated Press OK to Exit, lalu klik Ok

14. Selesai...Mudah Bukan ....


sumber : http://ary-putra.blogspot.com/2010/03/mengganti-windows-xp-menjadi-asli.html

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal  that ask you for your SSN (Social Security Number). This is very Easy metho...