Windows 7

You can also visit my other blog at www.softknowledge.wordpress.com

Tips and Tricks

You can also visit my other blog at www.softknowledge.wordpress.com

How To(s)

You can also visit my other blog at www.softknowledge.wordpress.com

Downloads

You can also visit my other blog at www.softknowledge.wordpress.com

Wallpapers

You can also visit my other blog at www.softknowledge.wordpress.com

Quote of the Day

Sunday, April 11, 2010

All about Hard Disk

All about Hard Disk

I don’t know about your computer, but my computer has an enormous amount of “stuff’ on it. Pictures, videos, software, downloads, documents of all kinds…when it goes down I go into a panic attack. Well, you know all of that “stuff” you have on your computer? You know it’s on your computer somewhere, and that somewhere is your hard drive!

The hard drive - which is short for hard disk drive (HDD) - is what stores all that “stuff” I was talking about. You may be thinking, “But what about a floppy disk? What about my CDs? They all hold my data, too”, and you would be right. The hard drive, however, is the most permanent of your computer’s storage methods. When your computer is turned off, all of your data is there, safe on your hard drive.

Without getting too technical (and believe me, I am not going to get technical; hardware makes my brain go numb), the “disk” part of hard disk drive refers to the actual disks inside the hard drive. The disks inside are actually what holds the media. They are located on a spindle, which is rotated by an electric motor, which causes the disks to spin. The faster the motor, the faster they spin; the faster they spin, the faster the data is retrieved. Thus a hard drive and its quality is very important to your computer. Below is cutaway of a hard drive.


So how much does a hard drive really influence your computer? Let’s take a look.

1.Performance.
The hard drive is very important when it comes to overall system performance, especially when it comes to working with large amounts of data, graphics, video editing, multitasking, etc. How fast your computer boots is directly related to hard disk speed.

2.Storage Capacity.
The bigger the hard drive, the more “stuff’ it can hold. Enough said.

3.Newer software support.
With all of the new (bigger, better, more) software coming out today, your hard drive has to be able to handle it; thus the critical quality component I was referring to earlier. 

4.Reliability.
There is absolutely without a doubt nothing worse than a hard drive failing and losing all of your “stuff”. You can replace hardware, but losing everything on your computer has got to make this part of a hard drive’s use the most important of it all.

So there you have it – a very brief summary of what a hard drive is and its importance. I did not go into all of the millions of details of how it is assembled and what goes where because frankly, I am just one of those people who care about the very basics of a computer, and when talking about hard drives and how they are made my eyes glaze over because the only thing I really care about is where my “stuff” is at.

What is the funny word, "CAPTCHA" ?

What is the funny word, "CAPTCHA" ?

Yes, CAPTCHA is rather odd sounding, but it's something we all have to deal with on the Internet from time to time. CAPTCHA stands for Completely Automated Public Turing [test to tell] Computers and Humans Apart. It's basically a kind of response test used with computers to determine if a user is human or not.

In other words, when you're on certain Web sites, have you ever had to type in a series of letters and numbers in order to continue on? If so, that's a CAPTCHA test! The code is sometimes distorted or it will have a design behind it that makes it a little harder to read. It's something like this:


CAPTCHA tests are usually used on sites that allow you to do your shopping online. Even sites like MySpace and Ticketmaster, among others, use them a lot too.

Now, I know what you're probably thinking. Yes, CAPTCHA tests are sometimes hard to solve, but they are there for our own good. They are mainly used for security, especially on Web sites that require you to enter in your personal information. See, sometimes hackers use what are called bots to attack users. The bots are generated by computers and in reality, computers are unable to solve the CAPTCHA tests. Only humans can type in the right code and continue on, so that really helps in keeping you safe. So, while it's true that these tests can be quite a nuisance, I always feel better when I see them. I know I'm in good hands when I do. I'm sure you'll think differently about them now too.

Thursday, April 8, 2010

Stop Not Responding Processes easily with KillProcess

Stop Hanged or Not-Responding Processes easily with KillProcess

Task Manager is the only medium for us, to know which processes and services are running on our personal computers and to terminate processes which we wish not to run on our systems. Every time you install a new software or program the likelihood of an unknown service adding into the processes list in the task manager, is more and all these subsequently eat up your computer’s speed.

No wonder users who even know a bit about these processes and services and how to kill them, are unwilling to get into such trouble of selecting each process manually and then terminating it. Moreover, the process of killing needs to continued for several times in order to remove all those unwanted processes from your list.

Significantly not every process is unwanted and people who are unaware of which processes are to be terminated should not try their hands on this. Most of the times even the task manager doesn’t allows one to kill a particular process and displays “Access Denied” ultimately annoying the user who quite sure about the process and doesn’t like the fact that its running on his/her PC.

With new softwares and programs being developed, targeting at better speed and functionality a small program called KillProcess occupying 1.81 MB of space is available which aims at killing processes with ease and quickness. It has a very user friendly interface with a user count of over 1 Million. The program’s speed depends only on your processor speed and not on operating system or the space you occupy on your hard disk.

Unique Features Of KillProcess

Very Fast(Responds in Milliseconds)
Can kill multiple processes either by selecting them or using Kill Lists for all operating systems.
It is more powerful than Task Manager in terms other than speed.
Can kill processes which Task Manager cannot kill.

Limitations of KillProcess

wowexec.exe runned 16-Bit applications cannot be terminated directly.
Processes which are being debugged with Microsoft Developer Studio or other similar products, cannot be terminated while they are in a stage like when stepping through the code etc.

Compatibility

The latest version 2.44 released supports both 32-bit and 64-bit versions of following Microsoft Windows operating systems:
  • Windows 2000
  • Windows XP
  • Windows 2003
  • Windows Vista
  • Windows 2008 (R1 & R2)
  • Windows 7



Load Start-up Programs After Window Boots

Load Start-up Programs After Window Boots with Time Delay
Installing Windows is a difficult and time consuming task and once installed the new operating system work quite fast and responds quickly as well. Time keeps on passing and users try new and different softwares and programs to enjoy the functionality of windows at the fullest.

Now after the process of installing new stuff on your computer is repeated several times, the symptoms of slowing down might not be seen while the computer is running but at windows startup these symptoms can be certainly observed with the Welcome screen holding for a longer duration of time than it normally does.

Another problem comes up when the system starts and applications in the system tray take hell lot of time to show up eventually annoying the user and forcing him to either uninstalling programs or stopping applications from running at the same time on startup. But what if a program could time other applications at the startup according to your requirement or preference ?

To sort this problem out a 70KB program known as Startup Helper is available at Codeplex and the most unique thing about it is that it doesn’t need to be installed since the executable file can be run directly. On the window of the program the applications are added along with the time duration after which they are scheduled to run.


In Step 1 the delay time is to be entered after which the user wants the programs to start. Step 2 is required to add the programs wished to be arranged in order and the portion of the screen with Step 3 shows the countdown for the applications once it is started.

To add programs click on Add New Item which opens a window with three fields to fill in namely:
  • Title – Give a name to the program to be added in the list.
  • Program Path – Provide the executable file path for the program.
  • Delay Time – Enter the time after which it should run.

Once you enter all the details and add several programs, click Start as shown in the first Image and the program countdown starts if one intends to test.

So now when you turn on your computer your programs will open in a sequence that is predefined by the operator.
Compatibility

The program runs on XP (SP2 or newer) and Vista with Microsoft.Net Framework 2.0 or newer version



Red-Xs... Go away

What are Red-Xs in place of images and how to get rid of it
image


Sometimes images show up as red x when you try to view them. It's so frustrating. Here's a list of the top reasons for the red X and some potentially potent solutions

Reason 1 – Your anti-virus or firewall might be set to disable web bugs. What is a web bug, you ask? Nothing important; just a teeny, tiny image used for statistic tracking on websites. Sometimes this setting prevents other images from being shown.

How you fix it: Go into your anti-virus settings and look for a setting called “Disable Web Bugs” and uncheck it. Not all anti-virus programs have it, mind you, so you might have to explore a bit!!

Reason 2 – You Internet Explorer security settings are set too high.

How you fix it: In Internet Explorer go to Tools>Internet Options and then click on the Security Tab. From there, take a look and see what your security level is at. I keep mine at Medium-High, which allows for most of what I want, and little of what I don't. Gauge how you use the Internet and where you go to adjust this accordingly.

Reason 3 – Windows XP Service Pack 2 introduced a feature called “Block images and other external content in HTML e-mail” This is a big one, and since it's automatically turned on in programs like Outlook Express, it's probably the most common.

How you fix it: For Outlook and Outlook Express you can fix this by clicking the info bar at the top of the message body. This is just a per-message thing, however. If you want a more permanent solution, click on Tools>Options>Security, and then uncheck the “Block images and other external content” check box. Click OK, and revel in visual amazement!

Friday, April 2, 2010

Back-up Firefox

Back-up Firefox About:config settings

I've posted about editing about:config in Firefox earlier. But if you are doing so, backing it up becomes very important. Here is how you do it. 

Note: You may need to show hidden files for this to work. For Windows 7, just type “Hidden Files” in the Search bar and pick “Show hidden files and folders” and choose the top choice. In any case, select the radio button next to “Show hidden files, folders and drives” and hit OK.


Moving on. This tip should apply to Firefox version 3.0 and up.

First, you'll want to browse to the file's location. Go into Windows Explorer and look in:

\Documents and Settings\\Application Data\Mozilla\Firefox\Profiles\ .default\

Once you've reached this location, look for the prefs.js file. What you need to do is copy that file and paste it in a backup folder somewhere. This can be anywhere, or even on a USB thumb drive for extra safety.


Now edit the about:config file with reckless abandon! If Firefox ever gets majoryly messed up all you have to do is copy and paste your backed-up prefs.js file to its original location!

How to Password Protect Outlook Express

How to Password Protect Outlook Express

Each person can have a separate mailbox in Outlook Express with separate message folders, contacts, and personal settings. You can do this by creating multiple identities. Once created, you can switch between them without having to shut down your computer or lose your Internet connection, and best of all, you they can be protected with a password.

To add a new identity, go to File / Identities / Add New Identity .



Type the name of the new user. To include a password for the identity, select "Require a password" then enter one.



It will then ask if you want to log on as the new user. If you answer yes, you will be asked for information about your Internet connection. Answer no and the current user remains logged on.

Once you've set up a few, switching identities is pretty easy. Go to File / Switch Identities and select the user you want.


Thursday, April 1, 2010

Use data streams to send and receive secret messages


Use data streams to send and receive secret messages

Everybody has secrets. In the computer world, secrets range from a simple password to an entire hard drive full of confidential information. 

Of course, there are many ways to protect your secrets in cyberspace. You can use password managers, secure connections, hidden partitions and many other methods to protect them from prying eyes. 

The problem with most of these methods is that they use encryption to safeguard your data. Encryption like AES is very difficult to crack, but not impossible. 

A better approach to protect your secrets is to hide them. If you make your secrets invisible to anyone but yourself, you don’t even need encryption.

Unbelievably, you don’t need expensive software or complex technical knowledge to make passwords or any kind of text invisible.

In fact, if you use Windows, you already have the means inside your computer. All you need to hide any text inside regular files is to download a free application and use the NTFS file system.

Windows uses alternative data streams to store thumbnails and other meta-data. Data streams exist only in the NTFS file system and were originally conceived to allow compatibility with Apple computers.

By using a free application called Streams Viewer, you can detect and even create your own hidden streams in any file. 

Streams Viewer allows you to attach a secret text message to the end of the stream. This works with any type of file, regardless of extension, and it does not change the file in any way.

The information in the stream cannot be detected by any other Windows applications such as Windows Explorer or even through the command line interface. This allows you to open an inconspicuous file, create your own streams and send it through email or post it on the internet without fear that someone will see your secret message. 

Alternative data streams also pose a dangerous security risk. Hackers frequently use hidden streams, as it allows them to get an anonymous foothold in a network. Streams Viewer allows you to detect and delete hidden streams already present on your computer.

Here are the steps necessary to view and create your own hidden data streams.


First, open your browser and visit http://www.pdfforge.org/other-projects
Then, scroll to the bottom of the page, locate the Streams Viewer section and click on the StreamsViewer-4_0_2.exe (2 MB)link. 

Save the .exe file to your desktop or any other folder on your hard drive and double-click to open it.

If you get an Open File – Security Warning, click on Run to give Windows permission to start the installation.

This opens up the installer program. Click on Next to continue.

In the License Agreement window, select the I accept the agreement option and click on Next to continue.

In the next window, click Browse to install Stream Viewer in a different location on your hard drive or click on Next to continue.

Again, in the next two steps, click on Next to continue.

Then, click on Install to start the installation process. 

Later, when the install process is complete, click on Finish to open the program automatically. If it does not open, double-click the Streams Viewer desktop shortcut to open it.


To start a search for hidden streams, click on the Search button located on the top left corner of the program.

Then, in the Search alternative streams window, click the … (browse) button. 

Next, select the partition to search (ex: C :) and click on OK.

Check the Recursive box and click on Start to begin searching. 

After the search is over you will see all the data streams on that hard drive partition in the results table. Repeat the steps above for each hard drive partition you have.

You can double-click each item in the results table to open it or click the Save button to save the list as a .csv file (you can open it with Microsoft Excel).


If you want to remove the hidden data stream without deleting the file, double-click the file in the results table, go to theAlternative streams section of the program and click on the Remove button.


Now, to create your own hidden data stream, go to the Folder and files section (on the left) and select a file to use. It can be any kind of file, although for best results you should use common files like wav, mp3, jpg, doc or txt. 

Warning! Do not use an important file for this operation as modifying the data stream may corrupt the file or cause it to behave unexpectedly. 

With the file selected, click on the Add button, located in the Alternative streams section. Browse your computer for the same file, select it and click on Open.

You should now see garbled text in the Text/Hex section of the program.

Use the scroll bar on the right of the text box and scroll down to the end of the box. Click at the end of the last line of garbled text and press Enter from the keyboard.


Now you can type in your secret message or password. It can be as long as you want, but you cannot use copy/paste from another file, you have to type it in by hand.

Be careful not to delete or modify any of the garbled text. If you do, the file might be corrupted.

Then, click the Update stream button, located below the text box. This will update the data stream to include your latest modification.

Lastly, click on the Save in file button, located in the Alternative streams section.

Again, browse through your computer for the same file, select it and click on Save. It will ask you to replace your original file with the file containing your secret message. Click on Yes to save your modified file.


You can then exit the application and look at the file you modified in Windows Explorer. As you can see, the file still has the same size and is fully functional. If you notice the file has no thumbnail, open it and it will revert to normal.

To view the secret message inside the file, use the search process detailed a few steps back, double-click the file from the list and scroll down to the end of the text box.

Desktop iCalendar

Desktop iCalendar




Desktop iCalendar is a customizable desktop calendar which can sync with Google Calendar. The program adds calendar, events, to-do list and weather on your desktop. It allows you to edit your calendar offline and sync with Google Calendar when network is available.

So you can edit your Google calendar offline, and share your calendar with your family, friends and colleague easily. With 7-day weather information, it allows you to plan your schedule without problems. It supports three types of reminder, popup, Email and SMS. With the reminder, you'll never forget your friends' birthday.

Desktop iCalendar is easily to customizable. It allows you to edit the font, color and background. It works well with different wallpapers. Desktop iCalendar offers you the liberty to set it as a transparent calendar.