How can I prevent users from writing to USB removable disks (USB flash drives)?
USB removable disks (also known as flash drives or "Disk on Key" and other variations) are quickly becoming an integral part of our electronic life, and now nearly everybody owns one device or another, in forms of small disks, external hard drives that come enclosed in cases, card readers, cameras, mobile phones, portable media players and more.
Portable USB flash drives are indeed very handy, but they can also be used to upload malicious code to your computer...
SkyMAk
SkyMAk.
Google's Android L: 'One of the most comprehensive releases we have done'
New features for smartphone and tablet software include enhanced notifications and 'material design'
Fin is a trendy gadget you can wear on the thumb and make your whole palm as a digital touch interface.
Fin presents a thumb ring that turns your hand into a universal motion-based input
Monday, December 31, 2012
How do I delete an “undeletable” file?
How do I delete an “undeletable” file?
Method #1 - Kill explorer.exe
Do successfully delete an undeletable file that is caught be the explorer.exe process (and most of them are) do the following:
Open a Command Prompt window and leave it open.
Close all open programs.
You now need to close EXPLORER.EXE. The proper way to shutdown Explorer is to raise the "Shut Down Windows" dialog (select "Shut Down..." from the start menu), hold down CTRL+SHIFT+ALT...
How can I change the System partition drive letter in Windows XP?
4:55 AM
No comments
How can I change the System partition drive letter in Windows XP?
For the most part, this is not recommended, especially if the drive letter is the same as when Windows was installed. The only time that you may want to do this is when the drive letters get changed without any user intervention. This may happen when you break a mirror volume or there is a drive configuration change. This should be a rare occurrence and you should change the drive letters back to match the initial installation.
To change or swap drive letters on volumes that...
Excel Password Recovery Instructions (.xls)
4:47 AM
No comments
Excel Password Recovery Instructions (.xls)
Often when an employee departs, they take important Excel passwords with them. This guide outlines how to use a simple Excel password recovery application to crack lost or forgotten passwords, allowing you to unlock password-encrypted Microsoft Excel documents quickly as possible.
Step 1: Download and Install the Office Password Recovery Utility
To perform the following recovery steps, you'll need...
How can I disable the User Account Control (UAC) feature on my Windows Vista computer?
4:43 AM
No comments
How can I disable the User Account Control (UAC) feature on my Windows Vista computer?
Windows Vista has the built-in ability to automatically reduce the potential of security breaches in the system. It does that by automatically enabling a feature called User Account Control (or UAC for short). The UAC forces users that are part of the local administrators group to run like they were regular users with no administrative privileges.
Read...
what is V LAN
4:35 AM
No comments
What is a VLAN? How to Setup a VLAN on a Cisco Switch
Have you ever wondered what a Virtual LAN (or VLAN) is or been unclear as to why you would want one? If so, I have been in your place at one time too. Since then, I have learned a lot about what a VLAN is and how it can help me. In this article, I will share that knowledge with you.
What is a LAN?
Okay, most of you already know what a LAN is but let’s give it a definition to make sure. We...
Friday, December 28, 2012
watch 2008 server configuration video on this link..
9:28 PM
2 comments
http://www.trainsignal.com/blog/videos/install-server-2008-install-active-directo...
OSI reference model layer
8:58 PM
No comments
The standard model for networking protocols and distributed applications is the International Standard Organization's Open System Interconnect (ISO/OSI) model. It defines seven network layers.
Short for Open System Interconnection, an ISO standard for worldwide communications that defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one...
Microsoft natural keyboard shortcuts
Microsoft
natural keyboard shortcuts
Windows Logo (Display or hide
the Start menu)
Windows Logo+BREAK (Display
the System Properties dialog box)
Windows Logo+D (Display the
desktop)
Windows Logo+M (Minimize all
of the windows)
Windows Logo+SHIFT+M (Restore
the minimized windows)
Windows Logo+E (Open My
Computer)
Windows Logo+F (Search for a
file or a folder)
CTRL+Windows Logo+F (Search
for computers)
Windows Logo+F1 (Display
Windows Help)
Windows Logo+ L (Lock the
keyboard)
Windows Logo+R (Open the Run
dialog box)
Windows Logo+U...
how to recover a deleted item with software link
You have accidentally deleted important files from your hard disk permanently ? Most people think believe that the file is gone and it cannot be recovered. But that is wrong. You can still recover those files.Recover My Files 3.98 is a file recovery software that can recover deleted files even if removed from the Recycle Bin.It can be used to:
Recover formatted hard drives, even if you have reinstalled Windows!!!
Recover your files after a hard disk crash.
Get back files after a partitioning error.
Recover deleted documents, photos,...
check the working of a antivirus
If you want to check your anti-virus activity or effectiveness, you can use this notepad trick.
1. Copy this code:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Open Notepad and paste it.
3. Save it with .exe extension like checkantivirus.exe.
4. Your antivirus will detect this file and attempt to delete it as soon as you save this file.
5. That proves your antivirus is working properly, if not, try another reliable antivirus...
google drive steps
3:49 AM
No comments
Font Size
Gmail is really famous among users of all the email clients available on the web and that is not because it has a cool interface rather it is famous for its reliability and huge space which includes storage space of 6000 megabytes and increasing. Google doesn’t stop here and recently Google announced that users can now buy more online storage for Google services just by paying a little amount. So why not use this online storage space and...
Thursday, December 27, 2012
5 Computer Tips and Tricks commonly used
5 Computer Tips and Tricks .
Here are five popular tips from our current lessons that we think you will find helpful:
When an application freezes on your computer, use the keyboard shortcut Ctrl+Alt+Delete. This shortcut opens the Task Manager where you can then select the unresponsive application and quit it.
Triple-click your mouse to select a URL in your browser’s address bar. This makes it...
Wednesday, December 26, 2012
Monday, December 24, 2012
Use registry shortcuts to disable and enable screensavers in Win XP:
The steps in this tip will show you how to edit the registry for a time-saving shortcut for enabling and disabling your screensaver.When you perform maintenance operations such as defragmenting or backing up the hard disk, you probably disable your screensaver before you begin to prevent it from interfering with the maintenance operation. However, disabling your screensaver manually is a multistep operation that involves accessing the Display Properties dialog box, navigating to the Screen Saver tab, and setting the screen saver to None. Then,...
How to Create a Password-Protected Disk on Your PC
11:20 PM
No comments
You may want to encrypt that data to keep it from getting into the wrong hands.
When you encrypt data, you use a special algorithm to scramble the bits that make up that file into nonsensical information, which can be restored to its meaningful state only with the right password.
TrueCrypt is a free, open-source encryption application that works on Windows, Mac, and Linux. Given the right credentials, TrueCrypt creates a virtual hard drive...
Subscribe to:
Posts (Atom)