Click Here

Bollywood
Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

What’s Really Going on With Windows 8?

We all know that these days, guys at Microsoft are very busy preparing the next major version of their Windows family. Recently, they have finished the 2nd milestone of Windows 8… But that’s also leaked news! This time they are very strict about leaking information to the press. To tell you the truth, in Windows 7, we received a load of leaked info and screenshots at this stage. But what’s happening with Windows 8? It’s a big mystery
!
In Windows 7, we got the first public beta with their third milestone. But in Windows 8, we can’t say what will happen. Recently, at the CES, Microsoft officially announced that Windows 8 is going to support ARM and SoC (System on a Chip) devices. This will take it beyond our normal x86 and x64 processors to things like the ARM-based devices built by NVIDIA, Qualcomm and Texas Instruments.
Another leaked source has mentioned that Windows 8 is going to have a brand new graphics system which is said to have more Silverlight on it. But, these facts are unofficial! The biggest problem is we have no much information to tell you what they are really cooking in those lab…
Are they cooking something big and innovative which could change the whole world? Well, if that’s the case, then secrecy might be the best policy! But still, we cannot say anything until we get the public beta! So, what do you think? What are they doing with all these secrecy? Will we ever get a public beta?

USB hub with on/off switches: Buffalo does it right

It’s been over a year since I first posted the idea of a USB hub that would let you switch each port on or off. To save energy, avoid peripherals from waking up each time you fire up your PC or simply because you won’t be needing the USB missile launcher today. Soon
after that, Brando actually released one, but it wasn’t quite what I had envisioned.

Buffaloseems to have done a far better job, with what look to be decent switches and a power supply in case you need to connect things that need the full 500 mW of power that USB can supply. I’m sure I wasn’t the first person to think of this, especially since the Brando came out a month after my blog post. But it’s nice to see the idea catch on.

Windows 8: a reimagined OS with touch screens in mind

It's that time again. Windows 7 is two years old, and that means the next version of Windows is merrily percolating – and generating such enthusiasm that Microsoft managed to sell out its recent BUILD developer's conference without publishing a

word about content.


At the conference, Microsoft unveiled Windows 8, and although the shiny stuff has been grabbing headlines, there's plenty under the bling to interest business. 


But let's start with a bit of the shiny.
After the super-speedy boot (demo systems came up in the blink of an eye), the first thing that grabs you is the user interface (UI). This ain't your typical Windows. The new look, entitled Metro, with its colourful live tiles, is reminiscent of Windows Phone 7, not PC Windows. As such, it's an ideal interface for use with a touch screen. During BUILD, Microsoft presented each paid attendee with a Samsung tablet running a developer's preview version of the system.
The company has reimagined navigation with touch in mind, developing gestures that will be consistent throughout. Flick a finger from the right edge of the screen, and a menu of five icons, called Charms, appears. These icons – Start, Search, Share, Devices and Settings – also pop up if you point your mouse at the bottom left of the screen, where the Start menu appears on previous versions of Windows.
Swipe from the top edge down or bottom up, and you'll see what Microsoft refers to as “chrome” – buttons, tabs, menus, and other pieces of the UI. With Metro-style apps, these elements are hidden so the app can use virtually every scrap of the screen to display its content.
Since most touch screens tend to be used in landscape orientation, layouts are mainly horizontal and can be scrolled through with a quick swipe anywhere on the screen but the edges. The operating system supports multi-touch, if offered by the hardware, so you can, for example, drag a tile up and scroll the rest of the screen beneath it rather than resorting to the old-fashioned drag and drop if you want to rearrange things. Swiping from the left side of the screen lets you cycle through all open apps.
Microsoft presenters repeatedly demonstrated that the old mouse and keyboard are well supported too, with lots of keyboard shortcuts.
The familiar Windows desktop is still available, but as an app, not as the primary operating environment. Traditional Windows apps can be installed, and are also given a tile on the Metro start screen. The desktop does have one wrinkle that may frustrate users: Microsoft has opted to use its Ribbon menu interface (first seen in Office 2007) throughout.
All this adds up to some challenges for business. There will be a learning curve. There will be confusion. Users of Windows Phone 7 will have a slight advantage, since they’ve already been using the Metro interface.
However, there are also advantages for business that make this OS well worth checking out.
First, security. Windows 8 will include a full anti-malware component based on its Defender software. That doesn’t mean you’re stuck with it; it will gracefully disable itself if you install another product.
The boot sequence has been altered to load the anti-malware software much earlier, to prevent something from sneaking in while the machine is unprotected. Microsoft will also support a technology called UEFI that replaces the old BIOS (the software on a chip that starts the operating system load) with a more secure method that prevents malware from grabbing control of the system at the pre-boot stage.
Two related features will save a ton of time and tears when a computer is misbehaving. “Refresh” preserves the user’s settings and files, then returns the operating system to a known good state. “Restore” takes things a step further, wiping all vestiges of the user from the machine and returning it to its pristine state, ready for redeployment. That pristine state is defined by the administrator, so it can consist of a fresh operating system load, complete with company standard applications, all configured in the company-approved manner. The demo at BUILD took about six minutes to restore a computer.
Microsoft only mentioned management via group policy in passing, but it did say that there’s a new version of the Windows PowerShell scripting language coming. PowerShell is used by administrators for both desktop and server management.
Windows 8 will run on the same hardware as Windows 7, and should perform better, since things like memory management have been significantly improved.
Bear in mind that the version of Windows 8 presented at BUILD was an early one. Things will change. But if you want to play with the developer’s preview, you can download it here. Just remember, it’s pre-release software. Don’t try to use it for production. It will crash. It will do rude things. But it will also give you a preview of the future of Windows. 
Sorce : theglobeandmai

The Changing Brains may be ‘Internet’

Brain scans show a direct link between the number of Facebook friends a person has and the size of certain parts of their brain.
It's not clear whether using social networks boosts grey matter or if those with certain brain structures are good at making friends, say researchers.
The regions involved have roles in social interaction, memory and autism.
The work, published in the journal Proceedings of the Royal Society B Biological Sciences, looked at 3-D brain scans of 125 university students from London.
Researchers counted the number of Facebook friends each volunteer had, as well as assessing the size of their network of real friends.

A strong link was found between the number of Facebook friends a person had and the amount of grey matter in certain parts of their brain.
The study also showed that the number of Facebook friends a person was in touch with was reflected in the number of "real-world" friends.
"We have found some interesting brain regions that seem to link to the number of friends we have - both 'real' and 'virtual'," said Dr Ryota Kanai, one of the researchers from University College London.
"The exciting question now is whether these structures change over time. This will help us answer the question of whether the internet is changing our brains."
One region involved is the amygdala, which is associated with memory and emotional responses.
Previous research has shown a link between the volume of grey matter in the amygdala and the size and complexity of real world social networks. Grey matter is the brain tissue where mental processing takes place.
Three other areas of the brain were linked with the size of someone's online social network but not their tally of real-world friends.

Against Theft are Protect your Laptop.


Here are some tips to outline the steps should take your laptop will be lost. We also added some useful precautions, you can do in advance, so that the laptop has a better chance of getting home safely, if the two of you to stand out.

1. File a police report

Although it may seem obvious, many people do not bother to file police reports of lost property under the assumption that there are few law enforcement can do.
While this may or may not be the case (depending on your situation), by contacting the police receive word that your computer has. Even if the police can not find your missing MacBook, stolen hardware went into a national database, so if someone tries to sell a laptop, there is a good chance that a warning when they do, even if they are throughout the country.

If you live near a university, be sure and tell the police the campus of your laptop lacks both, and do not forget to warn all private security companies in the area where you work when laptop disappeared.

2. Inform local repair and pawn shops

Tell any pledge or repair shops in your area on your computer is missing. Be sure to give them the serial numbers and describe the characteristics of identification, as in the case of scratches or paint wear. Pawn most reputable repair shops will check with the local police department before buying used laptops, but it never hurts to be aware of their situation, either.

3. Contact your insurance agent

Many home insurance policies, and part of the tenants, to cover the purchase of stolen computers, even if the goal had not been taken into your home. If your laptop was stolen from the car, its loss may be covered by your insurance. If your laptop is owned by the company, certainly covers the business of insurance. Contact your insurance agent and find out about filing claims in order to restore some of the costs of replacing the laptop. You will probably need the offense to make this announcement, but your insurance agent can assist you with the details.



4. Continue spreading the word

Getting the word to friends, colleagues and members of the Community to leave Twitter and Facebook friends to know your laptop is missing. Please send ads like Craigslist and other local directories. You may also want to tolerate flyers in your local grocery store or remove an advertisement in a local newspaper. If you can afford it, consider offering the prize of a laptop back. Premium offering, which is responsible for the handset is not the true value can save a lot of money to replace equipment, but can help to ensure that the information is returned safely.


5. Remain vigilant

Once you have submitted allthe documents, getthe wordout to local businesses by chirping of your laptop and place a lost ad in the lost and found section of Craigslist. It may be tempting to sit back and let fate decide what happens next, but gon't give up being proactive. Check the lost and found ads themselves, and even go beyond. Many laptop thieves will try to sell the line laptop, because it is more difficult to follow, so keep an eye on sites like eBay and Craigslist. If you were a business, when your laptop is gone, check with them every day. Keep your eyes open for the local newspaper or community bulletin boards. Can screw up your laptop and if so, you should be aware of what you can qualify.

Protect data and prevent theft

By taking the steps above to maximize the chances that your equipment will be returned to you if stolen or lost, simply. But what precautions? Here are some things you can do in advance to help ensure that your laptop is gaining ground and that the data remain protected.

1. Install Prey

Prey is a monitoring program that you can enable remote access to your laptop is missing or stolen. Prey then "call home" Prey server (or your own server, depending on configuration) when the laptop connects to the Internet. Prey report provides the IP address, geolocation (with maps) and even a screenshot of your webcam. You can also use Prey to lock your device to prevent others from accessing it.
2. Encrypt sensitive data

Personal data such as credit cards, financial and medical records should always be encrypted, this is doubly true if your computer is portable. Encrypt data that will help ensure your identity is stolen laptop and helps protect from liability for any loss of sensitive work files.

There are several good encryption tools out there, and many modern operating systems have the encryption settings for the oven in a popular encryption tools for Mac, Windows and Linux TrueCrypt. Cross platform and free TrueCrypt is an inexpensive way to protect your personal files.


3. Make your laptop easy to Return

Consider placing a text file called a show on the desktop (for example, REWARD_IF_FOUND.TXT) that contains your contact information and any other information about the reward, if you can afford to offer. These details will be easier for someone who has stumbled across his team not to return without the need to look at the data. Even a repentant thief may cause a change of heart, especially if you can provide a way for the laptop to be returned anonymously.


4. Back up your data frequently

You should already be backing up your data regularly to protect your hardware or software, but if you do not have the possibility of missing laptop is just a motivation to do so. If you move the laptop a lot, you can take advantage of online backup services like Dropbox. If you want to back up an external hard drive, do not keep your laptop bag album! Although this is a great protection to your technical questions, please back up your hard drive with the stolen laptop that does not do you any good at all.

5. Consider an engraving

If you are serious about hanging on your laptop, consider having your company or your name and a piece of contact information such as your e-mail address or phone number engraved in a prominent location on your computer portable. This greatly reduces its resale value and make it clear that the laptop belongs. Engraving is a deterrent against theft and gives pretty good just another way to leave the viewfinder of your laptop does not know who to return it to the. Of course, the downside of this is that it makes the laptop more difficult for you to sell as well, unless you replace the burned portion of the case.

Virus Protection For Your Computers.

If you own a computers, the most important thing you can do for your computer is to safeguard it with a powerful virus protection program. There are many virus protection software available for computers in today’s market. Most of these soft ware come with FREE TRIALS VARSON!! Before choosing a virus protection program for your computer you must understand what a virus is and what its capabilities are.

A computer virus in a nutshell is a program, a block of executable code, which attaches itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of the computers user. This may not sound too harmful, but there are many different types of viruses. Such as viruses that use key loggers to steal all the passwords stored on your computers, credit card numbers you may typed on your computers. Also, viruses are known to delete software and important information off the computers hard drive, some viruses may even attack the computers boot sector and completely stop the computer from starting up. Since technology is always evolving so are viruses, viruses are more complex these days which makes computers more vulnerable to attack, and more difficult to eliminate the virus. Therefore all computers should be protected by a powerful virus protection program.
How do you know if your computer are infected with a virus or viruses? There are many symptoms that computers illuminate when they are infected with a virus or viruses. Your computer or computers run more slowly than normal, stops responding or locks up often, crashes and restarts every few minutes, restarts on its own and then fails to run normally, applications on your computer or computers do not work correctly, disks or disk drives are inaccessible, you can not print correctly, you see unusual error messages, you see distorted menus and dialog boxes, you are bombarded with pop ups. These are some symptoms computers illuminate when they are infected by a virus or viruses.
Investing in a top rated virus protection program would be worth your money. Unlike third party programs top rated virus protection programs are dedicated to serve your computers needs. All of the top rated virus protection programs come equipped with on guard protection. On guard protection stop viruses and other malicious programs before attacking your computer.
Most computers come with windows defender or windows firewall, but these programs are useless. A good quality virus protection program for your computer is a must have. Also top rated programs come with instant updates. This means as soon as a new malicious software is out on the world wide web, information on how to protect and disinfect your computer are downloaded to the virus protection programs core. This ensures the latest virus definitions are used to protect your computers.
All the virus protection programs come with 24 hour support, which means if you run into trouble assistance is always available for you.
If you do not want to buy the program right away all the virus protection programs listed in the website below come with 30 day trials,and free scans!!

Virus Removal Tips

There are many viruses infecting computers around the World. Virus Trojan and Worm are the common virus attacking computers these days. I have described a way to identify viruses in your computer, safely remove it using detection tool, using antivirus software to get virus protection.
Trojan horse which is also known as trojan, which in the computer language describes as a class of computer threats which is also known as malware that looks like to perform a desirable function or functions but in reality performs malicious functions, without giving notice, that allows unauthorized access to the host computer of the person who created this virus,
giving them ability to down load a file to monitor users activities, steal data, or even watch the user’s screen and control the computer remotely. This gives remote thieves full control of your computer using these types of Trojan or Trojan horse viruses.
This type of virus normally find a back door during let’s say when you are playing a computer game. By going through a back door, this virus can take control of the game. Trojan viruses gets down loaded when user is visiting a site, playing game online, shopping online, there are hundreds of way your computer can get inflected. This all happens without a notice or your permission. This Trojan virus term is derived from the story of the Trojan Horse.
There are many different type of Trojan viruses out there, here are the latest finding of some key viruses that your computer may have been infected.
wmisync.exe ; SpeedRunner.exe ; Srdshd.exe (Srdshd); Mlevsfdk.exe (Mlevsfdk); Sgxwd.exe (Sgxwd) ; Kva8wr.exe(Kva8wr) Trojan Virus; GetModule36.exe(Getmodule36) Trojan Virus; Gy.exe (Gy) Trojan Virus; Bkha.exe (Bkha) Trojan Virus; Perce.jpg.exe (Perce.jpg); Bogde.exe (Bofde) Trojan virus; Otdfi.exe (Otdfi); Cvsdfw.exe Trojan Virus; Viewtubesoftware.exe Trojan virus; Sdsxxdshd.exe ; Mswsivs.exe; Dwwnw64r.exe; Gsnd.exe(Gsnd) ; Gand.exe (Gand); Aspimgr.exe (Aspimgr).

To Get virus Protaction-3 Tips

Today, knowing how to get rid of a virus is essential for anyone who regularly uses a computer. While the internet continues to grow in popularity at what seems a blistering pace, more and more of our life seems to be moving online – working, shopping, playing, banking etc.
Here’s 3 easy things you must do right away:
1-Virus Scan Immediately.
To get rid of the virus you should run your anti-virus program and do a full system and registry scan. This can often identify the nasty virus and then “quarantine” it to prevent it infecting other parts of your system. If you don’t have any anti-virus software to get rid of the virus, you can perform a free scan by clicking on my link at the bottom of this article.

2/ Find Name Of The Virus.
Sometimes the name of the virus can be identified through your anti-virus program or it identifies itself through certain actions or dialog boxes. This can be extremely useful, as a quick look online can yield the exact solution to get rid of that particular virus. If you’re using Windows, then Microsoft will have all the latest info and download patches to get rid of recent viruses.
3/ Run Another Virus Scan To Check
Running another scan will enable you to verify that the nasty virus has been taken care of, and you can rest assured that it should not cause any further problems. Performing regular scans every week or so is good practice to limit the potential of any returning virus.
Bonus Tip:
Be careful about what you download, particularly if you use Peer-2-Peer sharing networks or Torrent sites. Hackers and other rogues often hide malware and viruses in these kinds of files, as most folks wouldn’t expect it. Even if the file is coming from a friend, they may have downloaded it themselves and not realised that it contained the malware.
Best practice is always to make use of an anti-virus software that will scan all downloads and get rid of virus threats before placing them on your system.
-By: Jake Unsworth
How many of your personal details do you enter on your computer on a regular basis? For instance, do you bank online, or pay bills or a credit card? Perhaps you buy gifts and other purchases online? According to CNN, if you use the internet there is a 90% chance that your computer is infected with spyware. How can you be sure that your information is not being viewed by a third party right now? Put your mind at rest and perform a FREE scan here ==> How To Get Rid Of Virus

Shortcut icon of the week: Windows 7 Taskbar

Dear friend today I yours acquaint of word and power point inages compress. Now begin. You can open any program on the taskbar by holding the Windows key [shown right] and pressing the item number on the taskbar. For example, to open Morzila fire1fox on the following taskbar you would press Windows Key + 1. The calculator is Windows Key + 2, and so on.



If Internet Explorer is already running, pressing Windows Key + 1 will open that session. To start a new instance of the web browser press Shift + Windows Key + 1.


You can also shift focus to the taskbar using Windows Key + T. You can then use the left and right cursor keys to cycle through the items and press Enter to open them.

You can pin new programs to the taskbar by right-clicking on the icon and selecting 'Pin this program to the taskbar'. Once the icon is pinned, you can drag and drop it anywhere you like on the taskbar.



Images compress in Word and Powerpoint

Dear friend today I yours acquaint of word and power point inages compress. Now begin Inserted images in Word and Powerpoint may appear small, but they are actually stored as their original size unless compressed. This can cause printing to take a long time and needlessly increase file sizes. Thankfully there is a way to compress images in both these applications.

Office 2000, XP and 2003

Open the view menu and select 'Pictures' from the 'Toolbars' sub-menu. The picture toolbar, as shown below, should appear.
 




Click on the 'Compress pictures' icon (highlighted in orange on the above picture).

This opens the following window.
















 Select 'Web/Screen' for the highest level of compression, or 'Print' for a lower level. Make sure that 'Apply to' is set to 'All pictures in document', and click 'OK'.

You may then receive the following warning. If you do, click the 'Apply' button.



 


Office 2007 and 2010

Click on any image to enable 'Picture Tools', and click the 'Format' tab shown below.





 Click the 'Compress Pictures' button (highlighted in orange on the above picture), to open the following window.












Select whichever level of compression best suits your purposes. Make sure that 'Apply only to this picture' is not selected, and click the 'OK' button.

How To Remove Above Virues From Your Computer .


Virus listed above are most probably a Trojan Vundo or in general called Trojan type virus and it resides at following location. %Documents and SettingsUsersApplication Datadriversxxxxx.exe. You probably got this virus loaded in your computer when you visited some site and down loaded a file from internet. Be extra careful in removing these types of virus from your computer. Just deleting the file xxxxx.exe will not help spreading or harming your computer. If you are not sure use the FREE detection tool and remove the virus professionally or use the following procedure. Procedure varies slightly depending upon the virus type but you should have success if your computer knowledge is sufficient to follow steps describe below.

The procedure described here may vary a little depending upon what AV and Operating System you are using for your Computer. If you are not computer savvy then just use the FREE detection tool and it will tell you what viruses are present in your computer.
If you could not remove the virus or spyware you can get help from Virus removal Toronto or Computer repair Toronto.
 
Copyright © 2013. Ten Listed - All Rights Reserved
Youtube