Monday, 15 October 2012

Updated trick for enabling Folder option

Updated trick for enabling Folder option


Many times Windows users face a common problem. The “Folder Options” in “Tools” menu is not visible. Even It can’t be accessed from Control Panel. Also “Registry Editor” is disabled.
Follow the simple steps mentioned in this tutorial and your problem will be solved:

1. If Folder Options is disabled but Registry Editor is still working in your system, then you can enable Folder Options by editing Windows Registry.
Type regedit in RUN dialog box and press Enter.
it’ll open Registry Editor, now go to following keys:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\ExplorerHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer
In right-side pane, check whether a DWORD value named NoFolderOptions exists or not? If it exists, delete it.

2. If you are not familiar with editing the registry, then you can simply download following file, extract it and then run the .REG file:
Folder_option.zip

If u cant run regedit
Seems like your system is infected with a virus. Pls follow following link:
http://www.askvg.com/is-your-system-infected-with-a-virus-spyware-adware-trojan/

Some ppl find that "show hidden files and folders" option ll not b enabled
though enabled they cant c the hidden folders for that dont worry

  • open RUN
  • type regedit
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Explorer\Advanced

And in right-side pane, change value of “Hidden” to 1 and refresh My Computer window and you’ll be able to see hidden files again

All (Ctr+Alt+Del) Permanently deleted files Recovery solution

All (Ctr+Alt+Del) Permanently deleted files Recovery solution

Sometimes we delete the files permanently, and realize that deleting them is like a Blunder

For all those folks,
Here is the solution

Software called "Kiss-ass UN delete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.


To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take up to 10 secs.

When the files search has been completed, it will show you the results with the name, type, size and the last modified date of the searched file.

Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).

How to "Delete administrator Password" without any software

How to "Delete administrator Password" without any software


Method 1


Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2


Step 1. Put your hard disk of your computer in any other PC .
Step 2. Boot that computer and use your hard disk as a secondary hard disk(D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows----system32----config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer .,.

Tips to recover scratched CD's

 Tips to recover scratched CD's

1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longer-see the scratch,, wash the disc with water and let it dry before playing. Interesting isn't it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely definite by this Operation


  • Fingermarks/prints cause 43% of disc problems
  • General wear & tear causes 25% of disc problems 
  • Player-related issues cause 15% of disc problems 
  • Remaining Others

Safe Computing

Safe Computing

Computer security is everyone’s responsibility. Our goal is to make safe computing easier for everyone.

8 Steps to Secure Your Computer

Required
  1. Safely Install Your Computer’s Operating System
  2. Keep Your Operating System Up To Date
  3. Install and Update Anti-Virus Software
  4. Use Strong Passwords
  5. Strongly Recommended
  6. Enable Firewall Protection
  7. Install and Use Spyware Removal Tools
  8. Back Up Important Files
  9. Enable Screen Saver Passwords

1. Safely Installing Windows on Campus


Disconnect the computer from the network.
Run the installation and skip the network setup.
Install and configure a personal firewall.

2. Update your Operating System


Recent versions of Windows and Macintosh computers have automatic software updates.
Configure your computer to automatically download the latest patches and updates.

Instructions to set up automatic updates are on the Safe Computing Website.

3. Install and Update Anti-virus Software


How to Get Anti-virus software
On Campus
Faculty and staff can contact their local computer support.
Home Use
Purchase commercial anti-virus software.
Free Windows version for home use by Avast. (www.avast.com}

4. Set Strong Passwords


Set Your Computer Password - Do not leave it blank
Password Tips
Never share your password.
Never write your password down.
Change your password periodically.
Creating a Strong Password
Passwords should be 7 characters or longer. The longer the better.
Passwords should contain at least one alpha character (a-z).
Passwords should contain at least one non-alpha character.
Do not choose passwords that contain personal information, like pet’s or children’s names.
Do not choose a word that is in the dictionary. These are the easiest to crack.
Try using a pass phrase. For example, Hpatp0a = “Harry Potter and the Prisoner of Azkaban

5. Personal Firewall Protection


Enable Your Firewall Protection
Windows XP Service Pack 2, Macintosh OS X (v. 10.2 and later), and Linux have built in firewall software.
Instructions are available on the Safe Computing Web Site
Commercial Firewall Software
If you have an older Operating System or want a more robust firewall, consider purchasing a commercial version.

6. Spyware and How to Avoid It.


Spyware is often installed by you without your knowledge by piggybacking on other software or by tricking you into installing it.
Some anti-virus software also has anti-spyware capability.

7. Back Up Important Files

8. Set a Screen Saver Password


Windows XP and Vista allow you to set a screen saver password. This will lock your screen when you are away, requiring you to enter your system password to access the computer.
Macintosh OS X and Linux also have screen saver password capability.
See the Safe Computing Website for instructions.

Wednesday, 10 October 2012

E-mail safety tips | email safety | how to safety email | how to manage account | how to protect the mail

Email Safety Tips


Do not open unexpected attachments.
Use Spam Filters
Beware of Spoof Emails or Phishing.
Don’t send sensitive data in email.
Avoid clicking on links in the body of an email message. While these links may not be a phishing attempt, they may not go to the site you intend.  Unless you are completely comfortable that the email is legitimate, it is best to copy and paste the link or type it in directly in your browser.

5 Tips to Manage Email Attachments


  1. Do not open an attachment unless you are expecting it AND you know who it is from.
  2. If you receive an attachment from someone you don’t know, delete it immediately without opening it.
  3. Use anti-virus software and keep it updated.
  4. If you need to send an attachment, contact the recipient and let him know you are sending it.
  5. Use spam filters to block unsolicited email. Many viruses are sent as spam.

Managing Spam Email


  • Setting up spam filters on NACS MailBox Services.
  • Go to My Email Options at www.nacs.uci.edu/email/options and login with your UCInetID and password.
  • Click on the Spam Filtering tab.
  • Select the type of filtering you prefer, default or strict. Click the Submit button.
  • Click the Logout tab.
  • If you receive your email from another server on campus, you may have spam filtering as well. Check with your local computer support.

Spoof Email (Phishing)


6 Ways to Recognize Phishing

  1. Generic Greeting For example, “Dear Customer”.
  2. Sense of urgency. May include an urgent warning requiring immediate action.
  3. Account status threat. May include a warning that your account will be terminated unless you reply.
  4. Forged email address. The sender’s email address may be forged, even if it looks legitimate.
  5. Forged links to Web sites. There is often a link to a Website to “fix” the problem. These are usually forged.
  6. Requests for personal information. Asking for login and password info, either in email or via the link.

Don’t Send Sensitive Data in Email


  • The Risks of Sending Sensitive Data in Email
  • Sending email is insecure.
  • You are storing sensitive data on your computer.
  • You no longer control the sensitive data.
  • The sensitive data may be sent to others without your knowledge.
  • Alternatives to Sending Sensitive Data in Email
  • Faculty, Staff, and Grad Students can use their WebFiles account. You can then share the information by using permissions or tickets.

Incoming Search Tearms


E-mail safety tips
email safety
how to safety email
how to manage account
how to protect the mail

computer safety | safety computing | tips for computer safety | how to computer safety

Safe Computing

Computer security is everyone’s responsibility. Our goal is to make safe computing easier for everyone.

8 Steps to Secure Your Computer

  • Required
  • Safely Install Your Computer’s Operating System
  • Keep Your Operating System Up To Date
  • Install and Update Anti-Virus Software
  • Use Strong Passwords
  • Strongly Recommended
  • Enable Firewall Protection
  • Install and Use Spyware Removal Tools
  • Back Up Important Files
  • Enable Screen Saver Passwords

1. Safely Installing Windows on Campus


  • Disconnect the computer from the network.
  • Run the installation and skip the network setup.
  • Install and configure a personal firewall.

2. Update your Operating System


  • Recent versions of Windows and Macintosh computers have automatic software updates.
  • Configure your computer to automatically download the latest patches and updates.
  • Instructions to set up automatic updates are on the Safe Computing Website.

3. Install and Update Anti-virus Software

4. Set Strong Passwords


  • How to Get Anti-virus software
  • On Campus
  • Faculty and staff can contact their local computer support.
  • Home Use
  • Purchase commercial anti-virus software.
  • Free Windows version for home use by Avast. (WWW.avast.com)

5. Personal Firewall Protection

  1. Set Your Computer Password - Do not leave it blank
  2. Password Tips
  3. Never share your password.
  4. Never write your password down.
  5. Change your password periodically.
  6. Creating a Strong Password
  7. Passwords should be 7 characters or longer. The longer the better.
  8. Passwords should contain at least one alpha character (a-z).
  9. Passwords should contain at least one non-alpha character.
  10. Do not choose passwords that contain personal information, like pet’s or children’s names.
  11. Do not choose a word that is in the dictionary. These are the easiest to crack.
  12. Try using a pass phrase. For example, Hpatp0a = “Harry Potter and the Prisoner of Azkaban

6. Spyware and How to Avoid It.


  • Enable Your Firewall Protection
  • Windows XP Service Pack 2, Macintosh OS X (v. 10.2 and later), and Linux have built in firewall software.
  • Instructions are available on the Safe Computing Web Site
  • Commercial Firewall Software
  • If you have an older Operating System or want a more robust firewall, consider purchasing a commercial version.

7. Back Up Important Files


  • Spyware is often installed by you without your knowledge by piggybacking on other software or by tricking you into installing it.
  • Some anti-virus software also has anti-spyware capability.

8. Set a Screen Saver Password


  • Windows XP and Vista allow you to set a screen saver password. This will lock your screen when you are away, requiring you to enter your system password to access the computer.
  • Macintosh OS X and Linux also have screen saver password capability.
  • See the Safe Computing Website for instructions.

Incoming Search Tearms

computer safety
safety computing
tips for computer safety
how to computer safety