Sunday, September 29, 2013

Computer Maintenance - Step-By-Step Guide

When your computer is brand new, it runs quickly. Everything is lightning fast. Then, over time, it begins to slow down. Why? Because it's getting filled up with the accumulated rubbish of old broken files, flawed links and so on.

Here's what you have to do on a regular basis to keep your computer running smoothly:

Here's what you have to do on a regular basis to keep your computer running smoothly:
1-Remove temporary internet files (Twice in a week)
2-Disk cleanup (every two weeks)
3-Remove other files (once a month)
4-Remove Restore Points (whenever you do maintenance)
5-Cleanup the Registry (as necessary)
6-Defragment the Hard Drive (once a month)
7-Scan for malware infections (Once in a Week)
Sounds daunting, doesn't it? But rest assured that maintaining your computer is quite easy... provided you know what you are doing and approach the task in a logical manner.

I have put the recommended intervals at which you should do these maintenance tasks in brackets. But there is no reason why you should not do them more often, other than the fact that doing all seven tasks does take up an hour or so. But it's time well spent.

Personally I remove temporary internet files every day or so. You'll find out why in another minute. I do all the other tasks once every two weeks.

It's important that you do the seven maintenance tasks in the order in which I am showing them here. Here we go:

1-Remove temporary internet files
This is a must-do... often... because nearly everything you see on the internet is first downloaded to your computer before it is displayed in your browser.

These files are usually downloaded to C:Documents and SettingsUserLocal Settings Temporary Internet Files.Useris the name of the person who is currently logged on to the computer.

The problem with temporary internet files is that they can contain malicious software. Thus, to be on the safe side, the folders need to be cleaned out regularly. This should be done every week at an absolute minimum.
Personally I do it every day or so. It only takes a minute.

The actual procedure will vary slightly depending on the browser you are using. Open your browser and then:

If you are using Internet Explorer, go to Tools > Internet Options. Click the General tab if it's not open. Then, under Browsing History, clickDelete. That's it! If you are usingFirefox, go to Tools > Options. Click the Privacy tab. Then clickclear your recent history, which you'll find about have way down the screen.
If you are usingChrome, go to the menu option which is at top right hand corner. Select Tools > Clear browsing data.In the dialog that appears, select theClear browsing historycheckbox. Use the menu at the top to select the amount of data you want to delete. Select 'beginning of time' to clear your entire browsing history. ClickClear browsing data.
Simple, isn't it. Deleting temporary internet files where you use other browsers is done in a very similar way.

2-Disk cleanup Doing a disk cleanup means freeing up space on your hard disk by searching the disk for files that can be deleted safely. You can do this quickly and simply with the Disk Cleanup tool which is part of your Microsoft operating system.
You should use disk cleanup at least every two weeks. The more often you run this program, the faster it will perform the cleanup task. Again, it's a simple task:
Click Start > All Programs > Accessories > System Tools> Click Disk Cleanup. Then select the drive you want to cleanup from the drop-down box that appears and click OK.
In the Disk Cleanup window that opens, select the Disk Cleanup tab. You can tick the check boxes next to the types of files you want to remove. Most of these will be checked already and I usually just accept these. Click OK.
That's it... another piece of cake.
3-Remove other files There are lots of other files you can remove to free up space in your computer.
Uninstalls... when you install Windows updates, you can uninstall these updates later. But hardly anybody uses this feature, so all the uninstall files are kept on the computer. These can take up a lot of space. You can get rid of them by simply deleting them manually.

Malware - Everything You Ever Wanted to Know But Were Too Scared to Ask

Malicious software, ormalwarefor short, is a general name for software that has been designed with evil intent. It includes viruses, worms, backdoors, ransomware, rootkits, key-loggers, adware, spyware, and Trojan horses, among other malicious programs... all the horrors of the internet.

It comes in many forms to disrupt your enjoyment of computing and surfing the web. Malware causes computers to slow-down, perform badly or crash. It is used to spy on you while you are using the internet, or to steal details of your bank accounts and credit cards. In other words, it interrupts lives and causes massive financial losses.

Malware is not the same asdefective software, which is legitimate software that contains harmful bugs or errors that were not corrected before the software was issued.
Experts estimate that more malware than legitimate software is currently being created.

Types of malware Here's a brief overview of the most common kinds of malware. Acomputervirusis a program that infects executable software (i.e. software in which the name ends in .exe) such as an app. A virus cannot spread until the software in which it is hiding is activated, i.e. you only get a virus in your computer when you do something, such as open a file or email.

Most viruses are harmful. A virus will take up space on your hard disk or use up processing time, access your private information, corrupt data, spam your contacts with copies of itself or log your keystrokes. Viruses cause billions of Euros worth of economic damage each year.

Awormis a standalone program that actively transmits itself to other computers. Unlike a virus, a worm spreads automatically and does not depend on you opening a file or email.

Worms almost always harm your computer or network, if only by consuming bandwidth and increasing network traffic. Many also contain extremely dangerous code. They might, for example, delete files in your computer (e.g. the ExploreZip worm), encrypt files so that you can't open them and have to pay a ransom to regain access, or send documents via e-mail.

Worms often install a backdoor in the infected computer. A back door enables its creator to get illegal access to your computer from a remote location while remaining undetected. Using a backdoor, the author of the worm can turn your computer into a zombie. Azombie computeris one that is under the control of the person who created the worm. These can be linked together to formBotnets, i.e. networks of zombie computers.

Botnetscan be used for many malicious purposes. They are, for example, used by spammers to send junk email or store contraband products such as child pornography. They can also be used to launch denial-of-service attacks.

Denial-of-service (DOS) attacksuse botnets that link thousands of zombie computers to attack government information websites, internet banking sites, credit card payment gateways and even internet service providers. The target website is bombed by the network of zombies, all at the same time, with so many bogus requests that it is overwhelmed and is inaccessible to legitimate traffic. Your computer could be one of the zombies. If it is, you'll notice that it has slowed down quite a bit.

Ransomware(akascareware) is malware that restricts access to your computer and demands a ransom for the restriction to be removed. The Ukash or Gárda Síochána virus which is currently attacking computers in Ireland is a prime example of ransomware. Arootkitis a sneaky type of malicious software that is installed in the root (where it is very difficult to detect) and that gives its creator full control over a system. Therootis the top directory of a computer, i.e. the innermost part of the file system. Once a rootkit is installed, the attacker can modify the existing software, including the software that used to detect or get rid of it. This makes detecting a rootkit is difficult. It also means that removal can be practically impossible, and reinstalling the operating system may be the only solution.

Key-logging(akakeystroke loggingorkeyboard capturing) is recording (logging) the keys struck on a keyboard, usually in such a way that the user is unaware that their actions are being monitored.

Key-logging has legitimate uses in studies of the interactions between computers and humans, and in checking how employees are using computers at work. But it can be used to copy passwords and personal identification numbers (PINs) in order to steal money from bank accounts and credit cards.

Adware is software that shows advertisements automatically. Adware may be designed to analyse the sites you visit and to show ads related to the goods and services you seem to like. Having ads popping up every few seconds on your screen can be extremely annoying.

Protecting Your Computer From Malicious Software

An important aspect to all computers is security. This is especially true for computers used for businesses. We keep a lot of highly important information on our business computers, so it is imperative that they remain as secure as possible. Computer security consists of all of the processes and mechanisms by which computer-based equipment, information, and services are protected from unintended or unauthorized access, change or destruction. Not only does computer security protect you from hackers and malicious software, it also defends your computer system from unplanned events and natural disasters.

Common Terms for Computer Hazards
There are several different terms used to describe the software that can infiltrate your computer system, destroying and losing all of your important information. One of those terms is malware. Malware is short for malicious software. It is software that is used or programmed by attackers to disrupt your computer's operation, gather your sensitive information, and/or simply gain access to your private computer system.

The other term commonly used to describe hazardous software is the term computer virus. Computer viruses are a type of malware that, when executed, replicates by inserting copies of itself into other computer programs, data, files, or the boot sector of the hard drive. Computer viruses often perform some type of harmful activity on the hosts they infect, including stealing hard drive space or CPU time, accessing your private information, corrupting data on your computer, spamming your email contacts, and more.

Prevention
Computer software hazards are a pain, but they can be prevented in a few different ways. One of the most common is the use of anti-virus software. This is a computer program that attempts to identify, thwart, and eliminate computer viruses and other malicious software.

Firewalls are another way in which businesses protect their computers from disastrous viruses. A firewall is a system that helps to protect your computer and its network from attack and intrusion by restricting the network traffic that can pass through them based on a set of system administrator-defined rules. An example of a good firewall is Cisco's line of PIX (Private Internet eXchange) firewalls. Cisco PIX firewalls work by allowing intentional connections out, while only allowing inbound traffic that is a response to a valid request or is allowed by an Access Control List (ACL) or conduit in. A Cisco PIX firewallwill provide your office with excellent security and reliability.

Similar to a firewall, an intrusion-detection system is another form of preventing viruses from taking over your computer system. These systems scan a network for people that are on the network but who should not be and who are doing things that they should not be doing, like trying a lot of passwords to gain access to the network.

One of the absolute best ways to secure your important information is to regularly backup your data onto an external device, like an external hard drive, or a CD Rom. A backup is another copy of all of your important computer files and programs that is kept in another location. It's an excellent way to make sure that even if your computer becomes compromised, you won't lose any of your important data.

How to Fix Twitch Lag in Windows 8, Windows 7 and Earlier Versions

Twitch Lag Occurrence Causes
Twitch lag occurs while watching live-streams on Twitch. Every single stream lags a lot with no particular reason.

Detailed Instructions for Windows 8/ 7/ Vista/ XP:
Twitch lagging is a common issue complained by people across the world. This article contains useful information that can be used to fix the problem.
1. Change Firewall Outgoing Rules
2. Flush the DNS
3. Clear Internet History
4. Disable NPAPI Plug-In Element

Change Firewall Outgoing Rules
Change the outgoing rules of your Firewall software. Modify advanced settings containing outgoing rules.

For Earlier Versions of Windows:
1. Click Start | Control Panel.
2. Click System and Security | Windows Firewall.
3. Click Advanced Settings.
4. Right click Outgoing Rules from the left hand side panel, select New Rule.
5. New Outgoing Rule Wizard opens. Select "Custom" option from the "Rule Type" page. Click Next.
6. Select "All Programs" from "Program" page. Click Next.
7. In the "Protocol and Ports" page keep all default settings. Click Next.
8. In the "Scope" page select "This IP Address" option under both "Local IP Address" and "Remote IP Address" categories.
9. In both the categories given in the Step 8, add following IP Address:
95.172.94.1- 95.172.94.255 10. Click Next.
11. Select "Block the connection" option in the "Action" page. Click Next.
12. Set default profile in the "Profile" page. Click Next.
13. Provide a name for your rule, for example, Rule 1, in the "Name" page. Click "Finish" button.
14. Close all open windows and then restart the computer for the changes to take effect. This will fix Twitchtv lag.

For Windows 8:
1. Press the Windows Key.
2. Type "Windows Firewall" (without quotes) in the Search Box.
3. Click Settings icon.
4. Open it from the Search Results.
5. Repeat Steps 2-14 of the above paragraph given for earlier versions.
Flush the DNS
Repair problems with the DNS server by using Flush DNS command. Open Command Prompt and execute the command.

For Earlier Versions of Windows:
1. Click Start | All Programs | Accessories.
2. Right click "Command Prompt", select "Run as administrator".
3. Type the following command- ipconfig /flush dns
4. Press ENTER.

For Windows 8:
1. Press the Windows Key.
2. Type "Command Prompt" (without quotes) in the Search Box.
3. Click the Apps icon.
4. Select it and click "Run as Administrator" icon at the bottom.
5. Follow Step 3-4 of the above paragraph given for earlier versions of Windows.
Clear Internet History
Internet History needs to be cleared due to corrupt files and other elements. Use a Privacy Cleaner program to do this:
1. Download System Utilities software.
2. Use the Privacy Cleaner feature of this program to clean all temporary files, browser cache and temporary files.

Disable NPAPI Plug-In Element
NPAPI is a plug-in element which can be located from Google Chrome plugins list. Disable plug-ins that use NPAPI element for improving Twitch TV performance.
1. Open Google Chrome.
2. Type "about:plugins" (without quotes) in the Address Bar.
3. Click "[+] Details" link.
4. Press Ctrl + F, type "NPAPI" in the Find box and click "Find Next".
5. Disable any plugin that uses this component.
6. Close and reopen Google Chrome.

The best thing you can do to avoid manual steps is to use PC Fresher System Utilities and scan and repair the entire Registry entries throughout. It'll fix your problem instantly.

Download it here:
Download Fix Twitch Lagging here.

Tips and Tricks to Improve Performance of iOS 7

iOS 7 has performance issues right from the launch. There are several cases reported that it runs slow on older devices. It responds late, animations lag and typing takes a longer time. This article contains useful tips and tricks to improve iOS 7 performance.

Troubleshooting Steps
· Refresh Settings and Disable Parallax
· Use a separate Inbox for Important and unread mails
· Save Battery Power and find things faster
· Disable Control Center Access
· Disable Automatic Updates
· Reduce the Motion of UI
· Enable Do Not Track for Safari Refresh Settings and Disable Parallax
Refresh the settings if you're experiencing slow performance while typing. Here is how to refresh settings:
1. Go to Settings | iClouds.
2. Tap Documents and Data.
3. Toggle switch from OFF to ON.
4. Toggle Switch back to OFF.
If you are using iOS 7 on iPad, it would be distracting as the Parallax mode is enabled by default. Disable Parallax mode as instructed below:
1. Go to Settings.
2. Select General | Accessibility.
3. Tap Reduce Motion | Turn ON.

Use a Separate Inbox for Important and Unread Mails

One of the most interesting things about iOS 7 Mail is that you can add someone to the list of VIPs. If you are having difficulties dealing with your mails, use a separate inbox for all unread and VIP mails.
1. Find an email which you would like to move to the list of VIPs.
2. Tap Add to VIP option. Save Battery Power and Find things Faster
Battery is drained significantly when you run iOS 7 on 3G devices.
Disable app background refresh feature. Follow these steps to disable background apps.
1. Tap Settings } General.
2. Tap Background App Refresh.
3. Toggle its settings to OFF.

In iOS 7 you have to find apps, emails, phone numbers and text messages right on home screen.
To do so, follow these steps.
1. Open Settings.
2. Go to General.
3. In General select Spotlight Search and check the relevant boxes that you want to search from home screen.

Disable Control Center Access
There is new Control Center access feature in iOS 7 through which you can access things faster. You need to turn OFF control center in apps. Follow the procedure given below to disable control center access in apps.
1. Go to Settings.
2. Select Control Center.
3. Toggle Access within Apps OFF.

Disable Automatic Updates
The new feature in iOS 7 called the 'automatic app updates' is running in background with the help of iTunes. This is an interesting feature but it causes performance issues. Disable automatic updates through the steps given below:
1. Go to Settings and tap iTunes and App Store.
2. Toggle the Updates settings.
3. Set Automatic Downloads to OFF.
Reduce the Motion of UI
Reducing the motion will help speeding-up app opening. Here are the steps to do so:
1. Tap Settings | General.
2. Tap Accessibility and reduce Motion.
Enable Do Not Track for Safari
Do not track is another handy tip to keep your Safari running fine. Follow the instructions given below to enable do not track:
1. Open Settings.
2. Tap Safari.
3. Now Enable Do Not Track for Safari.

PDF Management Tools - An Effective Way To Easy PDF Management

With multiplication of the communication channels, we have seen explosion of the digital content. PDF (Portable Document Format) is the widely used medium that manages vast information database in the form of an electronic document. PDF files are very useful for the documents including product brochures, flyers, or magazine articles in which you want to preserve the exact graphical appearance. Whether you are downloading research manuals, e-books, gadget manuals or bank statements, possibility is that these documents are in PDF file format. PDF file include fixed-layout documents, texts, graphics, fonts and pictorial representations. It is the only format which can retain the original formatting styles and can be viewed in various devices including tablets, desktops, netbooks, smartphones and e-readers. It is extensively used across the globe for managing proliferated knowledge and information.

Managing a PDF is a stressful task. There is always a need to have an efficient and handy PDF Management tool that locates files from computers and accesses the information. An ideal PDF Management tool will enable the user to effortlessly combine multiple PDFs, edit a PDF file, add signature images to a PDF and to extract individual images and pages. You can perform easy management of files by using PDF Management Tools. These are readily available, user-friendly, 100% efficient, reliable and can effortlessly archive manage, retrieve and store files at the desired location.

PDF Management software can perform following functions:
Image Extraction/ Conversion:
PDF management software ensures extraction of the image from PDF. The extraction process is carried out from a damaged as well as a normal file without varying the image quality. Apart from that, we can use this tool to convert graphs and photographs can into PNG, GIF, BMP and JPEG file formats.
Splitting and Merging- PDF Management Software allows the user to effortlessly perform operations splitting and merging operations. By using this software, we can split a single file into a number of files and merge multiple files into a single file.

Imposing and removing the security- By using an efficient management tools, the user can impose varied security parameters over the PDF. In-addition to this, it also allows the user to remove all or any security restrictions that are imposed.
Repair and Recovery- Due to virus attacks, software corruption or improper system shut down, a PDF easily gets corrupted and becomes inaccessible to the user. A reliable management tool performs effective repair and recovery and restores the data from the file. The restored data remains intact and unchanged.

Effective PHP Training For Better Career Prospects

PHP training in itself is a great option for anyone who is looking to enhance his career opportunities in the long run. It helps you know more about different database functional specifications. Through this type of training one can easily learn how PHP supports for a superior connection to MySQL. One can even get to know about the process of installing PHP. However, for that you will have to get an appropriate web server configuration. If you wish to make use of Linux and UNIX then you should consider downloading the PHP source code effectively. There are several things which one can learn in PHP training. Some of these things are discussed below.

PHP Procedure of Encrypting
During this session, an expert is being taught the entire procedure of encrypting. This is all-inclusive safety based functionality for you. Therefore, one can easily encrypt a data he wishes to retrieve. Well, there is nothing as difficult as this part but with regular practice and guidance one can easily generate some fine results here.

Safeguarding the PHP Source
Once you have a source for the PHP the first step gets over. The entire PHP training session is going to teach you how you can keep your source private. Dispersing and handling the application is quite simple here. Here, you will learn basically the process of executing all the tasks successfully. In the training procedure, the web developer learns how to offer the best of coding protection.

PHP Data Protection
It is usually said in PHP training that along with some help of Zend Encoder and Source Guardian one can easily offer suitable protection to the intellectual data. Along with such safety products, one doesn't really need to utilize the software. One doesn't even need a module here. But the Zend optimizer needs to be installed carefully during the procedure.

Well, in the above mentioned PHP training phase everyone would come to know regarding the PHP session details. Such a session really helps in safeguarding a suitable piece of data in a single variable. There are several valuable sessions for the users and he/she can make the most out of it just by following the right tips and the right time. So, this was all that you should know about PHP training for better career prospects. It is really important to know your options beforehand so that no issues come up later on.

There are several benefits of going for PHP training. It adds a lot of credentials to your resume and so you are able to secure a better job in the industry. We all know that competition is really getting high in the industry and getting jobs is becoming much more difficult. This is the reason why one can easily generate some fine results in this regard. There are several benefits of going for a PHP training course. However, you need to consider your requirements beforehand so that no issues bother you later on. Enjoy going in for such a course as it would benefit you a lot.

Things you need to know about PHP programming.

PHP is an easy to learn language that brings websites to life in numerous ways. It uploads files through a web page, make website searchable and do so much more. In this article, we will discuss how PHP has evolved into the most widely used technology and so much more.

How PHP has started off?
Although PHP is now the most widely used technology for creating dynamic websites, it started out with modest ambitions. In 1995, it got it new name as Personal Home Page Tools which was further taken off soon due to the sophisticated features that were added to it.
Since then, it has evolved even further. One of the greatest attractions is that you can be confident that you are using a technology that has industrial-strength applications. It is the language that drives customer relationship management systems, content management systems, WordPress, Facebook and many others. In this sense, we can regard it as a mature technology. It has a larger user base, and has many advanced features.

How hard this language is to use and learn?
PHP is not a rocket science. However, it does not mean you can become an expert in minutes. It is a toolbox which has full of powerful features. It has multitude of built in functions that performs all sorts of tasks. To get the best out of this programming language you need to start experimenting with the tools to come up with your own solutions.

How secure it is?
This scripting language is akin to kitchen knives in your home. It is very safe, if handled properly. However, it can do a lot of damage if handled irresponsibly. The moral of the story is not that PHP is not a safe language; nor does it says that you need to become a security expert to use it. What is more important is to understand the basic principles of its safety. Probably, the best way to protect yourself is to understand the code you are using.

What software you will need to write PHP?
Strictly speaking, you need not have to buy any special software to write PHP Code. You can write your line of codes in Notepad, Windows or TextEdit. However, you can choose a PHP editor to detect a mistake in your code. You can choose a script editor that has syntax coloring, syntax checking, code hints and line numbering.
This article has provided with you a brief overview of what PHP can do to add dynamic features to your websites and what software you need.