Right Sidebar

Pages

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Thursday, 15 November 2012

How to Encrypt your USB Flash Drive

USB flash drives are great because they are really cheap and you can conveniently use it to move data between computers. The only problem is when you store sensitive data on a USB drive and it can gets lost by mistakenly deleting it.

Now, follow the process below to encrypt your USB and its contents

Format USB drive in NTFS format

Firstly, you have to make sure the USB drive is formatted in NTFS format. Most USB drives are formatted in FAT16 or FAT32 format, which does not support encryption at all.
Double click on ' Computer' on the desktop locate and right click on the USB drive

Under the File system, click on the small arrow to pick the NTFS. Then mark the ' Quick Format. Click 'Start' to start formatting


Create an Encrypted Folder

Ok, now that your USB drive is in NTFS format and all the data has been erased, we can setup a folder that will contain all the encrypted data.

Go to My Computer, open the flash drive, right-click and choose New Folder. Name the folder anything you want.
Now right-click on the new folder and choose Properties. Click on the Advanced button in the Attributes section.

Now check the Encrypt contents to secure data box as shown below. Click OK and click OK again to close out the dialogs.

Now you’ll see the folder is in green ( see the diagram below), which means the data is encrypted. That’s it! Now you have a folder on your USB drive that is fully encrypted and viewable only by your user account on that one computer.



Wednesday, 14 November 2012

Ways to Increase iPad Battery Life

 

IPAD  offers excellent battery life that should lasted for hours but after so many charges, battery life invariably begins to fade.
 
Also, part of the iPad's appeal is its long battery life -- Apple claims the wi-fi-only version will last ten hours, and the 3G iPad will last nine hours before needing a charge which make it  impressive.
 
However,  what happens in the real world is considerably different than what happens in Apple's laboratory  tests. Watch movies continuously at full brightness,  push e-mail notifications for a dozen accounts going in the background and you aren't likely to get six or seven hours out of the iPad.
 
 It is possible to get close to Apple's claims, provided you're willing to be disciplined and comply strictly with some of the finding stated below in extending  the life span of your iPad battery
 
 

Option 1 :Auto-Lock

From the first diagram, click Settings, General on the right plane, and Auto-Lock, you should set this value to the lowest possible, which is 2 minutes. The less the screen is on when you’re not using it, the longer your iPad battery will last.



Option 2 : Charge When Low Battery

 Always allow your battery to be fully charged to 100%, then unplugged immediately either from your system or from AC outlet ( whichever you're using) after reaching 100% charging. Do not allow the battery to completely drain  before charging. I suggest that you start charging when it get low to 10%. This habit of charging will increase the life span of the battery.
 

Option 3 :  – Turn Off Cellular Data

Turn off cellular data until you actually need it is not a bad idea.The question you should ask yourself is that why would you 'On' it if you're not actually using it. Just go to Settings and tap on Cellular Data and switch it to Off. Just tab the 'ON' button and it will immediately change to off
 

 

Option 4:   Screen Notifications

The next major tweak that made a whole lot of difference was disabling notifications on the lock screen. Basically, whenever you get a notification from any app store, it will appear on the lock screen and the display will turn on in order to show it.

All that time the display was on for showing notifications ( like facebook e:t:c) the battery was being slowly eaten up. I quickly realized that I had to just turn off notifications on the lock screen and no more constant screen light-ups.

You’ll have to go through each app under Notifications, but it’s well worth the time. You don’t have to turn off notifications completely, just click on to View in Lock Screen to turn it 'OFF' for any app you don’t feel is very important except a few apps you wanted to get  alerts for.

What’s nice is that once you unlock the iPad, you’ll then see all the notifications appear in the banner at the top. Make sure you also turn on Banners instead of Alerts.

Option 5 : Bluetooth

 Also disabling the  Bluetooth is not a bad idea if you do not use the featrure all the time. Just turn it 'ON' wheneber you need it and 'OFF' when is not actually doing anything.




Tuesday, 13 November 2012

How to Delete and Remove Cookies

 Cookies are a concern for Internet privacy because they track user behavior on the Internet.  The problem with cookies is that they may not always provide accurate identification of a user but they can be exploited by hackers.

A cookie is a file that is created by a Web site that stores information about you and your preferences.

Cookies are quite common on many major websites and do not contain any spyware or viruses. They are simply pieces of data that help differentiate users.

How to remove cookies in IE from computer :

Open Internet Explorer and scroll down and click Tools and then Internet Options.

On the General tab, click on the Delete button Under the Browsing History section

Now click on the Delete Cookies button. This will delete all cookies stored on your computer for Internet Explorer.

NOTE
If you don’t want to have cookies stored at all on your computer by any website, then  click on the Privacy tab while in Internet Options and then click on Advanced.

After clicking the ' Advance' another box tagged ' Advance Privacy Setting' will come up. Now check the “Override automatic cookie handling” . This basically turns off cookies on your computer so no tracking can be done.








Monday, 12 November 2012

How to prevent websites from tracking your location

At times you'll be surprised that when you open some website, it shows you the IP address of your gateway address. What this means is that your physical location of where your accessing or browsing the sites is being tracked based on your IP.

To prevent this tracking of your IP address, follow this very simple process.

  1. Open your internet expolorer
  2. Click on Tools , Scroll down to pick ' Internet Options

3.  After clicking the 'Internet Options, another box similar to the one below will come up. Then click on ' Privacy' on top of the menu bar.
 
4. Finally,  Check the box next to "Never allow websites to request your physical location", as shown below

5. Remember to  Click on Apply and the on the OK button.

Friday, 9 November 2012

How to change the yellow folder to a color

Many  folders within folders, it’s definitely not easy to spot the folder you are looking for at any point in time. With 'Folder Colorizer' it's now possible to colourize your folder with this desktop application

 
 
First, download Folder Colorizer to your computer. Once downloaded, run the FolderColorizerSetup.exe setup file. Click the small radio button beside ' i accept the agreement', then click next to proceed. Follow the instruction to complete the installation of the setup.
 
TO START COLOURIZING.

 diagram A
After the setup, right on the folder, select 'Colourize' and then pick any colour of your choice as indicated above.
 
NOTE: The diagram below will appear immediately you picked the clour of your choice. Type your e-mail to accept the free activation by clicking it ( this box only come up once at first usage).
 
 
Once you have selected a color your folder, the folder icon color will change automatically from the default yellow to the color you picked.
 
You can decide to customize your color in case your choice color is not included amoung the default colour as shown on diagram A. You can customize it by clicking 'color' as shown on diagram A and proceed to add a new color by clicking 'Add color' after picking a color. The new color will be added and saved with the default ones.
 
RESTORE BACK TO DEFAULT
Should you decide to restore the original color of your folder icon, right click on the folder, select ‘Colorize!’ and pick ‘Restore original color’ as shown in diagram A
 

Using Keyboard as Mouce

Your computer’s mouse may seem like an essential peripheral, but it’s not – it’s just nice to have. If you don’t have a working mouse around – or if you just feel like learning some new keyboard tricks – you can use your Windows computer entirely from the keyboard.

Find below the short-cut to using your keyboard instead of mouce

Windows system key combinations

  • F1: Help
  • CTRL+ESC: Open Start menu
  • ALT+TAB: Switch between open programs
  • ALT+F4: Quit program
  • SHIFT+DELETE: Delete item permanently
  • Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE)

General folder/Windows Explorer shortcuts

  • CTRL+C: Copy
  • CTRL+X: Cut
  • CTRL+V: Paste
  • CTRL+Z: Undo
  • CTRL+B: Bold
  • CTRL+U: Underline
  • CTRL+I: Italic
  • F1: Starts Windows Help

  • F10: Activates menu bar options

  • SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object

  • CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)

  • CTRL+SHIFT+ESC: Opens Windows Task Manager

  • ALT+DOWN ARROW: Opens a drop-down list box

  • ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)

  • SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature

  • ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)

  • ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)

  • CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program

  • ALT+underlined letter in menu: Opens the menu

  • ALT+F4: Closes the current window

  • CTRL+F4: Closes the current Multiple Document Interface (MDI) window

  • ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window)

  • General folder/shortcut control

    • F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
    • F5: Refreshes the current window.
    • F6: Moves among panes in Windows Explorer
    • CTRL+Z: Undo the last command
    • CTRL+A: Select all the items in the current window
    • BACKSPACE: Switch to the parent folder
    • SHIFT+click+Close button: For folders, close the current folder plus all parent folders

    Accessibility Keyboard Shortcuts

    • Right Shift for eight seconds (Switch FilterKeys either on or off)
    • Left Alt+left Shift+PRINT SCREEN (Switch High Contrast either on or off)
    • Left Alt+left Shift+NUM LOCK (Switch the MouseKeys either on or off)
    • Shift five times (Switch the StickyKeys either on or off)
    • NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
    • Win +U (Open Utility Manager)

    Wednesday, 7 November 2012

    List of Device Manager Error Code

    Below is the complete list of Device Manager error codes:

    Code 1

    This device is not configured correctly. (Code 1)
     

    Code 3

    The driver for this device might be corrupted, or your system may be running low on memory or other resources. (Code 3)
     

    Code 3

    The driver for this device might be corrupted, or your system may be running low on memory or other resources. (Code 3)
     
    Code 10
    This device cannot start. (Code 10)
     

    Code 12

    This device cannot find enough free resources that it can use. If you want to use this device, you will need to disable one of the other devices on this system. (Code 12)

    Code 14

    This device cannot work properly until you restart your computer. (Code 14)

    Code 16

    Windows cannot identify all the resources this device uses. (Code 16)

    Code 18

    Reinstall the drivers for this device. (Code 18)
     
    Code 19
    Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged. To fix this problem you should uninstall and then reinstall the hardware device. (Code 19)
     

    Code 21

    Windows is removing this device. (Code 21)
     
    Code 22
    This device is disabled. (Code 22)
     

     

    Yellow Exclamation Point in Device Manager?

     A yellow exclamation point next to a device in Device Manager means that Windows has identified a problem of some kind with that device.
     
     
    The yellow mark itself does not  give  any valuable information but what it does is to confirm that a Device Manager error code has been generated. To fix whatever problem is going on, you'll need to view this code and troubleshoot accordingly.
     
    How to determine the error code generated
     
    Double click the Unknown device as shown above, another box similar to the box shown below will appear. This will help in solving what the issues is . Click here to see the list of code that could be generated by the Device manager and there reason.


     
     

    How to View Device Status Driver in Device Manager

    The path between the operating system (OS) and virtually all hardware not on the computer's motherboard goes through a special program called a driver.
     
    Device drivers are essentially small programs that enable the operating system of your computer to communicate with various hardware devices like mice, keyboards, speakers and disk drives, making them an integral part of a computer system.
     
    For many hardware devices to work on a Windows ( OS)  system, they must have the appropriate version of driver installed; otherwise, the operating system will not recognize such devices. Sometimes you may need to update device drivers, find new ones or simply check if the currently installed ones are working properly. Start by finding out what drivers your Windows 7 system is running.
     
     

    Instructions

      NOTE : Log into a Windows  account with administrator privileges

    1. Click on the Windows "Start" button and type "devmgmt.msc" into the search bar. Press "Enter." The Windows Device Manager will appear showing all installed devices as shown below
     
    2.  Locate "Display adapters" from the list and click the plus sign beside it to expand the selection ( example, DVD/CD-ROM drives). The name of the display adapter  driver will appear below ( example, optiarc DVD RW AD-7561s). Double-click it. A dialog box will appear.
     
     
    3. Click on the "Driver" tab at the top of the dialog box.  Then, click the "Driver Details" button. A new window will appear, showing a list of associated driver files for the display device and their location on the computer as shown
     
    4. Click "OK" to close both dialog boxes.

    Tuesday, 6 November 2012

    Differences between SQL and MySQL

    SQL stands for "Structured Query Language", and is just a definition of a computer language ( not a computer application) that can be used to access data stored in relational databases. SQL is not itself a standalone computer application, but is rather part of many relational DB programs such as MySQL, Oracle, Sybase, Microsoft SQL Server, etc.

  • SQL can execute queries against a database
  • SQL can retrieve data from a database
  • SQL can insert records in a database
  • SQL can update records in a database
  • SQL can delete records from a database
  • SQL can create new databases
  • SQL can create new tables in a database
  • SQL can create stored procedures in a database
  • SQL can create views in a database
  • SQL can set permissions on tables, procedures, and views

    MySQL is the most popular because it is free,  because it is an open source management system, you don’t pay anything to use it.MySQL is an actual computer application you can download and install. It is the most popular open-source database management system. In addition to having an SQL interpreter, MySQL also has a database manager component, GUI database viewers, session monitoring tools, etc.


  • SQL stands for Structured Query Language. It's a standard language for accessing and manipulating databases.
    MySQL is a database management system, like SQL Server 2005, Oracle, Informix, Postgres etc. MySQL is a RDMS (Relational Database Management System). All types of RDMB use SQL.


    SQL is used to manipulate database or to create a database. It's actually a common language. MySQL is an actual computer application. You must need to download or collect it and install it. MySQL is one of the most popular open source database management system. MySQL has an SQL interpreter.
    MySQL can be used as the back engine database for several kinds of applications and it's one of the best choice for many web programmers for web-base application.
     

    How to Install VPN on Window 2008 Server

    VPN in my view is the best technological invention in recent times as it completely secures your data through highly grade encryption.

    Obviously, you will not like to risk your credit card information while you are making an online purchase or transferring extremely confidential document on internet. VPN comes to rescue on this and it provides users with required encryption to secure everything that flows on your internet connection.

    Follow the process below on how to use VPN on Window 2008

    1, Right on 'My Computer and click Manage'. The server Manager role wizard box would appear.



     3,Click on 'Roles' from the left side plane to display the roles content. Under the Roles Summary beside click 'Add Roles'

    4, After clicking the Add Roles, the next wizard that will appear looks like the one below. Then Click Next to continue.
     
     5, Check in the box beside of Network Policy and Access Service and click Next. Network Policy and Access Services wizard box appear and click next again
     

    7, Tick on Routing and Remote Access Services. Then authomatically, Remote Access services and Routing will be checked . Click Next and Install as shown in the two diagramx below
     
     
     
     8, After the install, Click Close.

     
    To Configure Routing and Remote Access Service

    1,  Back to Server Manager, Click on the + sign beside Roles to expand it. Click  Network Policy and Access Service from left pane to expand  and right click on Routing and Remote Access, then click on Configure and Enable Routing and Remote Access
    2, Routing and Remote Access Server Setup Wizard opens, click Next to continue
    3, Select Custom configuration and Click Next
     
    4, Check on VPN access and click Next and finish  and start service
     
     





     
     














    Friday, 2 November 2012

    How to recover Window 7 using System Restore

    There are times that your system Window becomes unstable probably as a result of new software or driver being installed. This could be devastating, worrisome and fear of loosing what you have on the machine start putting you under pressure.

    The inbuilt of system restore that was that came with the Window 7 could definitly restore hope as it will help restoring back to an ealier state before the machine became unstable.

    Follow the process to restore your machine back after the incident.


    The Process

    Type system restore into the search box in the Start menu and then press Enter.



     
    The System Restore wizard open, click next to continue
     
     
     Check the box beside 'show more restore point to get a list of different restore points and the description of what happened when it was created.
     
    Note: Click on the ' How do I choose a restore point? to understand how restore point work and how to use it to restore point before your system was unstable.
     
     
    Now scroll down to determine when to choose your restore point . Pick your  restore point a couple days before the insident that got your system unstable happened.
     
    NOTE : Click ' scan for affected programs' as shown below after picking your restore point
     

     
    Contiinue following the wizard untill you get to a window asking you to ' Confirm Your Restore Point'. After confirmation and you satisfied then click finish.
     
     
    Click Yes as shown below to the message saying that it cannot be undone until it has completed, or cannot be undone if running it from Safe Mode.
     
    You will continue seeing a series of messages display in the process untill it complete. The time it takes to complete will be  varied   between computers.
     
    Finally, after restaring a message will be displayed informing you  it was completed successfully and the time and date it was restored to.

     
     

    Difference between Shared and Dedicated Cloud Hosting

     Technical Skills: With shared hosting, you will not require much technical skills as maintenance and security are managed by the shared hosting provider. With a dedicated server, you will need webmaster skills to set up, administer, and manage the server. However, fully managed dedicated hosting plans are available which will be more expensive.

    Security: With shared hosting, the hosting company installs firewalls and server security applications and programs. Securing a dedicated server will be your responsibility. You will be able to control the security programs you install and because you are the only one on the server there are less chances of acquiring viruses, malware and spyware. There is a higher risk with shared hostingbecause of others using the same server.

    Blacklisting Of Website: In a shared server, there is more of a risk of being blacklisted by search engines because someone else on the server engaging in such practices as spamming may get the entire IP address blacklisted. On a dedicated server, you will not get blacklisted unless you engage in unethical internet practices.

    Server Performance and Response Time: On shared hosting, with other sharing the same resources, allot of traffic can be generated which could drain resources such as bandwidth which could lead to slow response time and slow loading time. This does not happen on a dedicated server because you are not sharing resources.

     
    Bandwidth or Disk Space: With shared hosting, the amount of disk space and bandwidth you are allocatted  is limited because there are others sharing the server and  be charged if you surpass the allocated space. With dedicated hosting, bandwidth and disk space are dedicated to you only so there is no sharing and no limitations on the amount of space available space.

    Costs: The cost is cheaper with shared hosting because server resources are shared among several clients  Because a dedicated server is dedicated solely to one user, it cost more.

    How to resist access to a programs with AppLocker in Window 7

    If you share a computer and don’t want other users accessing certain applications, there is a  feature in Windows 7 and Window 2008 R2 that allows you to block  certain application on the network

    We  look at restricting what programs other users can access using AppLocker.
    Note: AppLocker is only available in Ultimate and Enterprise versions of Windows 7.

    AppLocker is the successor of Software Restriction Policies introduced first in the Windows XP and Windows Server 2003 computers. The AppLocker can be used to allow or deny the execution of an application, file, EXE, DLL, etc. The AppLocker provides the following enhancements:

    The process
    To create rules in AppLocker you’ll need to  logged in as Administrator. Click on Start and type gpedit.msc into the search box and hit Enter.
     


    Under Local Computer Policy go to Computer Configuration \ Windows Settings \ Security Settings \ Application Control Policies \ AppLocker.
     Now you will see the overall controls for the applications on the right hand plane after clicking the AppLocker. Under Configure Rule Enforcement click on the Configure rule enforcement link, from the right plane

    Fig C

    Now under AppLocker Properties check the boxes next to Configured under Executable rules then click Ok.
    The Next process is how to block a particular operation. This could be achieved as a group policy on the domain or blocking individual from accesing a particular application on a computer.

    The process here for example highlight on individual on a particular computer, blocking window media player to be accessed on a particalar system.

    From fig C, scroll down the right plane frame untill you get to overview section. Under the Overview section click on Executable Rules. Then the diagram below would appear. Right click inside the white window to create a new rule

    This opens up the Create Executable Rules wizard and you can select not to show the introduction screen at start up for the next time you access it.

     under the permission, click the radio button deny. Add the user you intend to deny as shown on the small box tagged 'select user or group' ,  click OK and continue to next step.

     You can select from Publisher, Path or File hash. Select path if you do not want user (wumi) to have access to any of the window media player as shown below
     
    Click on Browse Folders and select the Microsoft window media player you intend to deny ( could be any application). In the next screen you could add Exceptions like allowing certain files, but because we are blocking the entire window media content we’ll skip to the next screen.

     
    The next box that appear is where you will add a description to the rule so you can keep track of them in case there are several rules already configured.Click on Create.

    Again, a  message pops up saying default rules have not  been created yet and it is important to create it, so click Yes to this message as shown below

     
     
    Now you will see the default rules and the new one you created showing denied access to the Microsoft Window medai in red alert.


    Finally, go to services and make sure that  Application Identification is started and  it’s set to automatically start ,  otherwise the rules won’t work. By default this service is not started so you will need to enable it as shown below.