Wednesday, October 2, 2013

How to format your computer in a minute without software.

Every one of us each have our purpose for formatting or reformatting our computer system.

It might be for the reason of virus or software error. It might even be for fun.

We just have one or more reasons before we conclude to formatting or reformatting our computer.

There are two method of doing this;
Advanced system recovery.
Installing New OS.

I want to discuss the advanced system recovery with you in this article. I call it Advanced system recovery because it's different from Microsoft system restore.
PS: Formatting your system wipe away all files and partition on the hard drive including your Operating System (OS). It is imperative for you after formatting to install an OS. Otherwise, your system won't have any environment to boot.
For this reason I didn't include the third method of formatting system though it is quite similar to installing new OS.

In a situation where you want to keep the old OS, then this advanced system recovery is highly recommended for you because it restore your computer to its factory.

PSS: Before you proceed to formatting your system, backup all necessary document to an external storage. And make sure your computer system is plugged to a source.

After you've backup your files, restart your computer. Immediately the computer start, press the F11 key to boot into the system recovery window (you might need to press more than once and you might also need to press the function key (fn) along with the F11 key before you can get any response. All depend on your computer).

In the system recovery window, there are two restore there. The Microsoft system restore which restore your computer to a previous point in the past and System recovery which restore your computer to its factory.

Click on the System recovery and follow the instruction in the next window, either you back up your files or you continue without backing up (If you have do backup already or you don't want to back up at all).

Click on next and watch your system being restored. (Your system might require for disc.

Do you still remember where you keep the disc that came with your computer when you bought it? Bring it out and insert it into your computer. Restoration continues).

The remaining steps are left for you to do. It is all about your information (including personal) to register your new computer. (New indeed except for that scratched and bleached case *winks*).

Did this method work for you or you have any area where you need more clarification? Use the comment box to express yourself. share and tweet this post with Your friends.

How To Open Unknown Computer File Type With Unusual Extensions.

Have you come across a file having an unknown file extension and you are confused as to what program or software to open such file. am going to show us how to detect and find the appropriate software to open that mysterious file of yours using some unique website having large database of file extensions and their corresponding softwares.

*. OpenWith.org – free programs to open any file extension
OpenWith.org provides detailed information about most file extension and links to free programs that can open and create each type of file. There are plenty of great programs out there that will cost you hundreds of dollars to do what you need. What you probably don’t know is that there is usually free software that is just as good. You just don’t know about it.

Aside providing information on various file extensions and their free programs, they also have a Desktop tool which will tell you what type of file it is, and show you free programs that will open the file. It will even download them for you!

Read this post to learn more on how the desktop application works

*. FILExt – The File Extension Source
FILExt is a database of file extensions and the various programs that use them. If you know the file extension you want to learn about simply enter it into the search box above and click on the Search button. If it’s in any of the FILExt databases the data we have on that file extension will be shown on a results page. If it’s not in any of the databases you will be given a link to a page with hints on how to do further research. Don’t search on terms; just file extensions and only one at a time.

There are variety of ways to access FILExt.

*.Come directly from Windows.Use FILExt Directto change your registry so you come here when you click on a file Windows does not know how to open.
*.Come via Google Toolbar.Add a button to your Google toolbarso when you highlight a file extension and click on the button you come directly to FILExt with your search.
*.Come via Firefox Search.Add FILExt to your Firefox search boxand come directly via a search box entry.
*.Use a Google Desktop Gadget.FILExt has a Google Desktop Gadgetwhich allows you to add basic search to your desktop with links to specific pages once you’ve found what you want.
*.Query via Mobile Device Browser.Using a Boopsie channelyou can query the FILExt database using a mobile device like a web-enabled phone.

*. File-Extensions.org – File extension library
This library contains thousands of file extensions and the database is still growing.
A large number of file type entries have detailed descriptions, including their current use and the list of programs that can open, view, edit, convert or play unknown file you search for.
Similar to the two above, to help you easily find the information about file extensions that you are looking for, you might need to install and run it free application that offers you quick access to File-Extensions.org database and its associated software. you will be able to directly search in our website from a new option in Windows context menu by clicking the right mouse button on any file.

*. FileInfo.com – The Central File Extensions Registry
Similar to the above mentioned site, You can use FileInfo.com to look up information about unknown file types and find programs that open the files. it claim to be the central location for developers to submit new file extensions and provide information about file types. If you are a developer, you can easily register your file extensions with them.

To access their database, they have Firefox and chrome extensions, Windows and Mac File Viewer utility.

How To Open Multiple URL At Once In A Web-browser.

While doing some Googling, i stumble on these website that can help you open multiple website url at once in your web browser be it Firefox, Google chrome Opera e.t.c.
All you need to do is, input the various urls you want to open in the text area provided and submit.

Below are Free tool to Open Multiple URL at the same time. i call them Bulk Links Opener.
1. OpenMultipleURL.com
2. URLOpener.com
3. LinkOpener.com
4. Urlopener.blogspot.com
5. MultipleUrlOpener.com
6. BulkUrlopen.com
7. RapidLinkr.com

How To Save Or Bookmark Your Browser Open Tabs,

As a networker, i often have tens of tabs left opened for days on my web browser. to be frank, i hate keeping tabs open but i can’t do anything about it as they are very important to me.
Lately while surfing the web, i stumbled on Openupper website where one can create and save a page of links that you can open all at once later.
To use it, add the URLs or link of website to save, you will be given a unique URL to open all the tabs from once at your convenience later. No usernames, no passwords, no cost

You could also use it to save your favourite website for future reference. Since i started using this web tool, my Google Chrome browser is now free from numerous open tabs.

Sunday, September 29, 2013

Computer Maintenance - Step-By-Step Guide

When your computer is brand new, it runs quickly. Everything is lightning fast. Then, over time, it begins to slow down. Why? Because it's getting filled up with the accumulated rubbish of old broken files, flawed links and so on.

Here's what you have to do on a regular basis to keep your computer running smoothly:

Here's what you have to do on a regular basis to keep your computer running smoothly:
1-Remove temporary internet files (Twice in a week)
2-Disk cleanup (every two weeks)
3-Remove other files (once a month)
4-Remove Restore Points (whenever you do maintenance)
5-Cleanup the Registry (as necessary)
6-Defragment the Hard Drive (once a month)
7-Scan for malware infections (Once in a Week)
Sounds daunting, doesn't it? But rest assured that maintaining your computer is quite easy... provided you know what you are doing and approach the task in a logical manner.

I have put the recommended intervals at which you should do these maintenance tasks in brackets. But there is no reason why you should not do them more often, other than the fact that doing all seven tasks does take up an hour or so. But it's time well spent.

Personally I remove temporary internet files every day or so. You'll find out why in another minute. I do all the other tasks once every two weeks.

It's important that you do the seven maintenance tasks in the order in which I am showing them here. Here we go:

1-Remove temporary internet files
This is a must-do... often... because nearly everything you see on the internet is first downloaded to your computer before it is displayed in your browser.

These files are usually downloaded to C:Documents and SettingsUserLocal Settings Temporary Internet Files.Useris the name of the person who is currently logged on to the computer.

The problem with temporary internet files is that they can contain malicious software. Thus, to be on the safe side, the folders need to be cleaned out regularly. This should be done every week at an absolute minimum.
Personally I do it every day or so. It only takes a minute.

The actual procedure will vary slightly depending on the browser you are using. Open your browser and then:

If you are using Internet Explorer, go to Tools > Internet Options. Click the General tab if it's not open. Then, under Browsing History, clickDelete. That's it! If you are usingFirefox, go to Tools > Options. Click the Privacy tab. Then clickclear your recent history, which you'll find about have way down the screen.
If you are usingChrome, go to the menu option which is at top right hand corner. Select Tools > Clear browsing data.In the dialog that appears, select theClear browsing historycheckbox. Use the menu at the top to select the amount of data you want to delete. Select 'beginning of time' to clear your entire browsing history. ClickClear browsing data.
Simple, isn't it. Deleting temporary internet files where you use other browsers is done in a very similar way.

2-Disk cleanup Doing a disk cleanup means freeing up space on your hard disk by searching the disk for files that can be deleted safely. You can do this quickly and simply with the Disk Cleanup tool which is part of your Microsoft operating system.
You should use disk cleanup at least every two weeks. The more often you run this program, the faster it will perform the cleanup task. Again, it's a simple task:
Click Start > All Programs > Accessories > System Tools> Click Disk Cleanup. Then select the drive you want to cleanup from the drop-down box that appears and click OK.
In the Disk Cleanup window that opens, select the Disk Cleanup tab. You can tick the check boxes next to the types of files you want to remove. Most of these will be checked already and I usually just accept these. Click OK.
That's it... another piece of cake.
3-Remove other files There are lots of other files you can remove to free up space in your computer.
Uninstalls... when you install Windows updates, you can uninstall these updates later. But hardly anybody uses this feature, so all the uninstall files are kept on the computer. These can take up a lot of space. You can get rid of them by simply deleting them manually.

Malware - Everything You Ever Wanted to Know But Were Too Scared to Ask

Malicious software, ormalwarefor short, is a general name for software that has been designed with evil intent. It includes viruses, worms, backdoors, ransomware, rootkits, key-loggers, adware, spyware, and Trojan horses, among other malicious programs... all the horrors of the internet.

It comes in many forms to disrupt your enjoyment of computing and surfing the web. Malware causes computers to slow-down, perform badly or crash. It is used to spy on you while you are using the internet, or to steal details of your bank accounts and credit cards. In other words, it interrupts lives and causes massive financial losses.

Malware is not the same asdefective software, which is legitimate software that contains harmful bugs or errors that were not corrected before the software was issued.
Experts estimate that more malware than legitimate software is currently being created.

Types of malware Here's a brief overview of the most common kinds of malware. Acomputervirusis a program that infects executable software (i.e. software in which the name ends in .exe) such as an app. A virus cannot spread until the software in which it is hiding is activated, i.e. you only get a virus in your computer when you do something, such as open a file or email.

Most viruses are harmful. A virus will take up space on your hard disk or use up processing time, access your private information, corrupt data, spam your contacts with copies of itself or log your keystrokes. Viruses cause billions of Euros worth of economic damage each year.

Awormis a standalone program that actively transmits itself to other computers. Unlike a virus, a worm spreads automatically and does not depend on you opening a file or email.

Worms almost always harm your computer or network, if only by consuming bandwidth and increasing network traffic. Many also contain extremely dangerous code. They might, for example, delete files in your computer (e.g. the ExploreZip worm), encrypt files so that you can't open them and have to pay a ransom to regain access, or send documents via e-mail.

Worms often install a backdoor in the infected computer. A back door enables its creator to get illegal access to your computer from a remote location while remaining undetected. Using a backdoor, the author of the worm can turn your computer into a zombie. Azombie computeris one that is under the control of the person who created the worm. These can be linked together to formBotnets, i.e. networks of zombie computers.

Botnetscan be used for many malicious purposes. They are, for example, used by spammers to send junk email or store contraband products such as child pornography. They can also be used to launch denial-of-service attacks.

Denial-of-service (DOS) attacksuse botnets that link thousands of zombie computers to attack government information websites, internet banking sites, credit card payment gateways and even internet service providers. The target website is bombed by the network of zombies, all at the same time, with so many bogus requests that it is overwhelmed and is inaccessible to legitimate traffic. Your computer could be one of the zombies. If it is, you'll notice that it has slowed down quite a bit.

Ransomware(akascareware) is malware that restricts access to your computer and demands a ransom for the restriction to be removed. The Ukash or Gárda Síochána virus which is currently attacking computers in Ireland is a prime example of ransomware. Arootkitis a sneaky type of malicious software that is installed in the root (where it is very difficult to detect) and that gives its creator full control over a system. Therootis the top directory of a computer, i.e. the innermost part of the file system. Once a rootkit is installed, the attacker can modify the existing software, including the software that used to detect or get rid of it. This makes detecting a rootkit is difficult. It also means that removal can be practically impossible, and reinstalling the operating system may be the only solution.

Key-logging(akakeystroke loggingorkeyboard capturing) is recording (logging) the keys struck on a keyboard, usually in such a way that the user is unaware that their actions are being monitored.

Key-logging has legitimate uses in studies of the interactions between computers and humans, and in checking how employees are using computers at work. But it can be used to copy passwords and personal identification numbers (PINs) in order to steal money from bank accounts and credit cards.

Adware is software that shows advertisements automatically. Adware may be designed to analyse the sites you visit and to show ads related to the goods and services you seem to like. Having ads popping up every few seconds on your screen can be extremely annoying.

Protecting Your Computer From Malicious Software

An important aspect to all computers is security. This is especially true for computers used for businesses. We keep a lot of highly important information on our business computers, so it is imperative that they remain as secure as possible. Computer security consists of all of the processes and mechanisms by which computer-based equipment, information, and services are protected from unintended or unauthorized access, change or destruction. Not only does computer security protect you from hackers and malicious software, it also defends your computer system from unplanned events and natural disasters.

Common Terms for Computer Hazards
There are several different terms used to describe the software that can infiltrate your computer system, destroying and losing all of your important information. One of those terms is malware. Malware is short for malicious software. It is software that is used or programmed by attackers to disrupt your computer's operation, gather your sensitive information, and/or simply gain access to your private computer system.

The other term commonly used to describe hazardous software is the term computer virus. Computer viruses are a type of malware that, when executed, replicates by inserting copies of itself into other computer programs, data, files, or the boot sector of the hard drive. Computer viruses often perform some type of harmful activity on the hosts they infect, including stealing hard drive space or CPU time, accessing your private information, corrupting data on your computer, spamming your email contacts, and more.

Prevention
Computer software hazards are a pain, but they can be prevented in a few different ways. One of the most common is the use of anti-virus software. This is a computer program that attempts to identify, thwart, and eliminate computer viruses and other malicious software.

Firewalls are another way in which businesses protect their computers from disastrous viruses. A firewall is a system that helps to protect your computer and its network from attack and intrusion by restricting the network traffic that can pass through them based on a set of system administrator-defined rules. An example of a good firewall is Cisco's line of PIX (Private Internet eXchange) firewalls. Cisco PIX firewalls work by allowing intentional connections out, while only allowing inbound traffic that is a response to a valid request or is allowed by an Access Control List (ACL) or conduit in. A Cisco PIX firewallwill provide your office with excellent security and reliability.

Similar to a firewall, an intrusion-detection system is another form of preventing viruses from taking over your computer system. These systems scan a network for people that are on the network but who should not be and who are doing things that they should not be doing, like trying a lot of passwords to gain access to the network.

One of the absolute best ways to secure your important information is to regularly backup your data onto an external device, like an external hard drive, or a CD Rom. A backup is another copy of all of your important computer files and programs that is kept in another location. It's an excellent way to make sure that even if your computer becomes compromised, you won't lose any of your important data.