Featured

DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7...??

DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7...??

-> Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ­ (efficient use of processor resources)
* 3-4 MB Cache
* 32 nm Silicon (less heat and energy)

-> Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading ­ (efficient use of processor resources)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

-> Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading ­ (efficient use of processor resources)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

hide your IP address

How do you hide your IP address?

The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):

VPN Services

A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs. VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

Website-Based Proxy Servers

A Website-based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:

Browser Configured Proxy Servers

There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server and proxy risks.
There are a variety of types of these proxy servers:
  • Transparent Proxy
    This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.
  • Anonymous Proxy
    This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
  • Distorting Proxy
    This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
  • High Anonymity Proxy
    This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.

Computer Fundamentals(Computer - Internet & Intranet)

Computer - Internet & Intranet

Internet

  • Internet is a world-wide / global system of interconnected computer networks.
  • Internet uses the standard Internet Protocol (TCP/IP)
  • Every computer in internet is identified by a unique IP address.
  • IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer location.
  • A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
  • For Example, a DNS server will resolve a name http://www.tutorialspoint.com to a particular IP address to unique identify the computer on which this website is hosted.
  • Internet is accessible to every user all over the world.
Internet

Intranet

  • Intranet is system in which multiple PCs are networked to be connected to each other.
  • PCs in intranet are not availble to the world outside of the intranet.
  • Usually each company or organizations have their own Intranet network and members/employees of that company can access the computers in their intranet.
  • Each computer in Intranet is also identified by a IP Address which is unique among the computers in that Intranet.
Intranet

Similarities in Internet & Intranet

  • Intranet uses the internet protocols such as TCP/IP and FTP.
  • Intranet sites are accessible via web browser in similar way as websites in internet. But only memebers of Intranet network can access intranet hosted sites.
  • In Intranet, own instant messengers can be used as similar to yahoo messenger/ gtalk over the internet.

Differences in Internet & Intranet

  • Internet is general to PCs all over the world where Intranet is specific to few PCs.
  • Internet is wider access and provides a better access to websites to large populcation where as Intranet is restricted.
  • Internet is not as safe as Intranet as Intranet can be safely privatized as per the need.

 

Computer Fundamentals(Computer - Networking)

Computer - Networking

What is a Computer Network?

A computer network is a system in which multiple computers are connected to each other to share information and resources.
Computer Networks

Characteristics

  • Share Resources from one computer to another
  • Create files and store them in one computer, access those files from the other computer(s) connected over the network
  • Connect a printer , scanner, or a fax machine to one computer within the network and let other computers of the network use the machines available over network.
Following is the list of hardwares required to setup a computer network.
  • Network Cables
  • Distributors
  • Router
  • Internal Network Cards
  • External Network Cards

Network Cables

  • Network cable are used to connect computers. The most commonly used cable are Category 5 cable RJ-45.
Network Cables

Distributors

  • Each and every computer can be connected to another one via a serial port but if we need to connect many computers to produce a network, this serial connection will not work. The solution is to use a central body to which other computers, printers, scanners etc. can be connected and, and then this body will manage or distribute network traffic.
Network Distributor

Router

  • Arouter is a type of device which acts as the central point among computers and other devices that are part of a network.
  • A router is equipped with holes called ports.
  • computers and other devices are connected to a router using network cables.
  • Now-a-days router comes in wireless modes using which computers can be connected without any physical cable.
Network Router

Network Card

  • Network card is a necessary component of a computer without which a computer cannot be connected over a network.
  • Also known as network adapter or Network Interface Card (NIC).
  • Most of branded computers have network card pre-installed.
  • Network cards are of two types: Internal and External Network Cards

Internal Network Cards

  • Motherboard has a slot for internal network card where it is to be inserted.
  • Internal network cards are of two types.
  • First type uses Peripheral Component Interconnect (PCI) connection.
  • Second type uses Industry Standard Architecture (ISA).
  • Network cables are required to provide network access
Network Card

External Network Cards

  • Comes in two flavour: Wireless and USB based.
  • Wireless network card need to inserted into the motherboard but no network cable is required to connect to network.
Externl Network Card
  • USB card, are easy to use and connect via USB port.
  • Computer automatically detects USB card and can install the drivers required to support the USB network card automatically.
Data Card

 

Computer Fundamentals(Computer - Number Conversion)

Computer - Number Conversion

There are many methods or techniques which can be used to convert numbers from one base to another. We'll demonstrate here the following
  • Decimal to Other Base System
  • Other Base System to Decimal
  • Other Base System to Non-Decimal
  • Shortcut method - Binary to Octal
  • Shortcut method - Octal to Binary
  • Shortcut method - Binary to Hexadecimal
  • Shortcut method - Hexadecimal to Binary

Decimal to Other Base System

Steps
  • Step 1 - Divide the decimal number to be converted by the value of the new base.
  • Step 2 - Get the remainder from Step 1 as the rightmost digit (least significant digit) of new base number.
  • Step 3 - Divide the quotient of the previous divide by the new base.
  • Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in Step 3.
The last remainder thus obtained will be the most significant digit (MSD) of the new base number.

Example

Decimal Number: 2910
Calculating Binary Equivalent:
StepOperationResult Remainder
Step 129 / 2141
Step 214 / 270
Step 37 / 231
Step 43 / 211
Step 51 / 201
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that the first remainder becomes the least significant digit (LSD) and the last remainder becomes the most significant digit (MSD).
Decimal Number: 2910 = Binary Number: 111012.

Other base system to Decimal System

Steps
  • Step 1 - Determine the column (positional) value of each digit (this depends on the position of the digit and the base of the number system).
  • Step 2 - Multiply the obtained column values (in Step 1) by the digits in the corresponding columns.
  • Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in decimal.

Example

Binary Number: 111012
Calculating Decimal Equivalent:
StepBinary NumberDecimal Number
Step 1111012((1 x 24) + (1 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10
Step 2111012(16 + 8 + 4 + 0 + 1)10
Step 31110122910
Binary Number: 111012 = Decimal Number: 2910

Other Base System to Non-Decimal System

Steps
  • Step 1 - Convert the original number to a decimal number (base 10).
  • Step 2 - Convert the decimal number so obtained to the new base number.

Example

Octal Number: 258
Calculating Binary Equivalent:

Step 1: Convert to Decimal

StepOctal NumberDecimal Number
Step 1278((2 x 81) + (5 x 80))10
Step 2278(16 + 5 )10
Step 32782110
Octal Number: 258 = Decimal Number: 2110

Step 2: Convert Decimal to Binary

StepOperationResult Remainder
Step 121 / 2101
Step 210 / 250
Step 35 / 221
Step 42 / 210
Step 51 / 201
Decimal Number: 2110 = Binary Number: 101012
Octal Number: 258 = Binary Number: 101012

Shortcut method - Binary to Octal

Steps
  • Step 1 - Divide the binary digits into groups of three (starting from the right).
  • Step 2 - Convert each group of three binary digits to one octal digit.

Example

Binary Number: 101012
Calculating Octal Equivalent:
StepBinary NumberOctal Number
Step 1101012010 101
Step 210101228 58 38
Step 3101012258
Binary Number: 101012 = Octal Number: 258

Shortcut method - Octal to Binary

Steps
  • Step 1 - Convert each octal digit to a 3 digit binary number (the octal digits may be treated as decimal for this conversion).
  • Step 2 - Combine all the resulting binary groups (of 3 digits each) into a single binary number.

Example

Octal Number: 258
Calculating Binary Equivalent:
StepOctal NumberBinary Number
Step 1258210 510
Step 22580102 1012
Step 32580101012
Octal Number: 258 = Binary Number: 101012

Shortcut method - Binary to Hexadecimal

Steps
  • Step 1 - Divide the binary digits into groups of four (starting from the right).
  • Step 2 - Convert each group of four binary digits to one hexadecimal symbol.

Example

Binary Number: 101012
Calculating hexadecimal Equivalent:
StepBinary NumberHexadecimal Number
Step 11010120001 0101
Step 2101012110 510
Step 31010121510
Step 5101012F16
Binary Number: 101012 = Hexadecimal Number: F16

Shortcut method - Hexadecimal to Binary

Steps
  • Step 1 - Convert each hexadecimal digit to a 4 digit binary number (the hexadecimal digits may be treated as decimal for this conversion).
  • Step 2 - Combine all the resulting binary groups (of 4 digits each) into a single binary number.

Example

Hexadecimal Number: F16
Calculating Binary Equivalent:
StepHexadecimal NumberBinary Number
Step 1F161510
Step 2F16110 510
Step 3F1600012 01012
Step 4F16000101012
Hexadecimal Number: F16 = Binary Number: 101012

 

Computer Fundamentals(Computer - Data & information)

Computer - Data & information

What is Data?

Data can be defined as a representation of facts, concepts or instruction in a formalized manner which should be suitable for communication , interpretation or processing by human or electronic machine.
Data is represented with the help of characters like alphabets (A-Z,a-z), digits (0-9) or special characters(+,-,/,*,<,>,= etc).
Computer Data

What is Information?

Information is organised or classified data so that it has some meaningful values to the receiver.
Information is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following characteristics
  • Timely - Information should be available when required.
  • Accuracy - Information should be accurate.
  • Completeness - Information should be complete.
Computer Information

Data Processing Cycle

Data processing is the re-structuring or re-ordering of data by people or machine to increase their usefulness & add values for particular purpose.
Data processing consists of basic steps input, processing and output. These three steps constitute the data processing cycle.
Data Processing Cycle
  • Input - In this step the input data are prepared in some convenient form for processing. The form will depend on the processing machine. For example, when electronic computers are used, the input data could be recorded on any one of several types of input medium, such as magnetic disks, tapes and so on.
  • Processing - In this step input data are changed to produce data in a more useful form. For example, pay-checks may be calculated from the time cards, or a summary of sales for the month may be calculated from the sales orders.
  • Output -Here the result of the proceeding processing step are collected. The particular form of the output data depends on the use of the data. For example, output data may be pay-checks for employees.
Computer Data Processing

 

Computer Fundamentals(Computer - Number System)

Computer - Number System

When we type some letters or words, the computer translates them in numbers as computers can understand only numbers.
A computer can understand positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number.
A value of each digit in a number can be determined using
  • The digit
  • The position of the digit in the number
  • The base of the number system (where base is defined as the total number of digits available in the number system).

Decimal Number System

The number system that we use in our day-to-day life is the decimal number system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the successive positions to the left of the decimal point represent units, tens, hundreds, thousands and so on.
Each position represents a specific power of the base (10). For example, the decimal number 1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position, and 1 in the thousands position, and its value can be written as
(1x1000)+ (2x100)+ (3x10)+ (4xl)
(1x103)+ (2x102)+ (3x101)+ (4xl00)
1000 + 200 + 30 + 1
1234
As a computer programmer or an IT professional, you should understand the following number systems which are frequently used in computers.
S.N.Number System & Description
1Binary Number System
Base 2. Digits used: 0, 1
2Octal Number System
Base 8. Digits used: 0 to 7
4Hexa Decimal Number System
Base 16. Digits used: 0 to 9, Letters used: A- F

Binary Number System

Characteristics
  • Uses two digits, 0 and 1.
  • Also called base 2 number system
  • Each position in a binary number represents a 0 power of the base (2). Example 20
  • Last position in a binary number represents a x power of the base (2). Example 2x where x represents the last position - 1.

Example

Binary Number: 101012
Calculating Decimal Equivalent:
StepBinary NumberDecimal Number
Step 1101012((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10
Step 2101012(16 + 0 + 4 + 0 + 1)10
Step 31010122110
Note: 101012 is normally written as 10101.

Octal Number System

Characteristics
  • Uses eight digits, 0,1,2,3,4,5,6,7.
  • Also called base 8 number system
  • Each position in a octal number represents a 0 power of the base (8). Example 80
  • Last position in a octal number represents a x power of the base (8). Example 8x where x represents the last position - 1.

Example

Octal Number: 125708
Calculating Decimal Equivalent:
StepOctal NumberDecimal Number
Step 1125708((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) + (0 x 80))10
Step 2125708(4096 + 1024 + 320 + 56 + 0)10
Step 3125708549610
Note: 125708 is normally written as 12570.

Hexadecimal Number System

Characteristics
  • Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
  • Letters represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15.
  • Also called base 16 number system
  • Each position in a hexadecimal number represents a 0 power of the base (16). Example 160
  • Last position in a hexadecimal number represents a x power of the base (16). Example 16x where x represents the last position - 1.

Example

Hexadecimal Number: 19FDE16
Calculating Decimal Equivalent:
StepBinary NumberDecimal Number
Step 119FDE16((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10
Step 219FDE16((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 319FDE16(65536+ 36864 + 3840 + 208 + 14)10
Step 419FDE1610646210
Note: 19FDE16 is normally written as 19FDE.

 

Computer Fundamentals(Computer - Hardware)

Computer - Hardware

 

Hardware represents the physical and tangible components of the computer i.e. the components that can be seen and touched.
Examples of Hardware are following.
  • Input devices -- keyboard, mouse etc.
  • Output devices -- printer, monitor etc.
  • Secondary storage devices -- Hard disk, CD, DVD etc.
  • Internal components -- CPU, motherboard, RAM etc.
Computer Hardware

Relationship between Hardware and Software

  • Mutually dependent.Both of them must work together to make computer produce a useful output.
  • Software cannot be utilized without supporting hardware.
  • Hardware without set of programs to operate upon cannot be utilized and is useless.
  • To get a particular job done on the computer, relevant software should be loaded into the hardware
  • Hardware is a one time expense.
  • software development is very expensive and is a continuing expense.
  • Different software can be loaded on a hardware to run different jobs.
  • A software acts as an interface between the user and the hardware.
  • If hardware is the 'heart' of a computer system, then software is its 'soul'.Both are complimentary to each other.

Computer Fundamentals(Computer - Software)

Computer - Software

Software is a set of programs, which is designed to perform a well defined function. A program is a sequence of instructions written to solve a particular problem.
There are two types of software
  • System Software
  • Application Software

System Software

The system software is collection of programs designed to operate, control and extend the processing capabilities of the computer itself. System software are generally prepared by computer manufactures.
These softwares comprise of programs written in low level languages which interact with the hardware at a very basic level. System software serves as the interface between hardware and the end users.
Some examples of system software are Operating System, Compilers, Interpreter, Assemblers etc.
System Software Features of System Software are following
  • Close to system.
  • Fast in speed.
  • Difficult to design.
  • Difficult to understand.
  • Less interactive.
  • Smaller in size.
  • Difficult to manipulate.
  • Generally written in low level language.

Application Software

Application software are the software that are designed to satisfy a particular need of a particular environment. All software prepared by us in the computer lab can come under the category of Application software.
Application software may consists of a single program, such as a Microsoft's notepad for writing and editing simple text. It may also consists of a collection of programs, often called a software package, which work together to accomplish a task, such as a spreadsheet package.
Examples of Application software are following
  • Payroll Software
  • Student Record Software
  • Inventory Management Software
  • Income Tax Software
  • Railways Reservation Software
  • Microsoft Office Suite Software
  • Microsoft Word
  • Microsoft Excel
  • Microsoft Powerpoint
System Software Features of Application Software are following
  • It is close to user.
  • It is easy to design.
  • More interactive.
  • Slow in speed.
  • Generally written in high level language.
  • Easy to understand.
  • Easy to manipulate and use.
  • Bigger in size and requires large storage space.

 

Computers tips

Computers tips

The biggest problem users have with their computers is their little knowledge of how to secure and protect their personal computers and their information. Computer tip number one for every user is to use an anti-virus program. Most use an anti-virus program already installed on their computer but like most some have no anti-virus installed at all.
What most users don’t know is that there are free programs available that work just as great if not better than paid versions. Protecting your computer is the 1st step that should be taken when using your computer. Knowing how to update the anti-virus program is 2nd. Malware, Trojans, spyware and many other types can render your pc or laptop useless, and may even make it vulnerable for hackers to steal bank information, passwords and other private data needed for identity theft.
Computers tips
Computers tips
Some computers tips the users can do themselves to help secure their data are to learn about safe –browsing. By using a program like WOT, you can browse sites knowing it’s a safe site to visit. It gives you a rating and warns you if it’s a potentially harmful site. Another computer tip is to know how to update your browser. Updates are readily available by going to the site of the browser and checking for new updates.
One of the most important of all the computers tips is to use a firewall. Windows has a build in firewall or you can use free programs as an added protection. User should also be wary of downloading files over the internet. Never download from site you don’t know, if you have question about the site use Google to search the site. Educating yourself and having good computer habits will reduce your stress and prolong the life of your computer.
Backing up your computer to an external hardrive will reduce the risk of losing precious date should your computer become infected or your hard drive fails you. These basic steps will help but so will making sure to password protect logons, bank accounts, even your pc. Using a strong password will make it harder for hackers to crack and keep you and your computer safe.

Computer Tips for New Users

In today’s tech savvy, electronic age, almost everyone has a laptop or home computer. We all know how to check e-mail, chat and use Facebook or tweet on twitter. But, the key to keeping your new gadget alive, well secure and clean is a little less known to the everyday user. So, to help keep your life simple, here are a few computer tips that just might save you from having to pay someone to fix the electrical beast or worse yet, pay someone to fix something that you think is broken.
Let’s talk about a few things that you should know, no matter what stage of user you are, from beginner to power user, these computer tips and descriptions should help you learn how to resolve the issues associated with them. First a “Cookie”, is a file that a web page stores on your computer. It allows the web page and therefore the company to remember what you looked at, what you purchased and even keeps track of things like page layout, etc. This can be good, but can also be used negatively by questionable companies. It is stored on your computer and should be cleaned often.
Computer Tips for New Computer Users
Computer Tips for New Computer Users
 It is up to you to keep your gadget clean. “Malware”, is simply a piece of software usually, accidentally installed by the user that can cause malicious intent, like switching your home page in your web browser or sending your search engine to another default engine. It is sometimes packaged with a piece of software that is downloaded from the internet and is installed without the users knowledge.
Remember this computer tip: It is best to always get software form a reputable source and refrain from clicking or downloading on links that can cause malicious intent. “Spyware”, is a little worse than malware, it can be installed the same way as malware, but can also attack your computer by just visiting a web page or by viewing an infected image. It’s important to watch your step; in as much if you were in a seedy part of town you might not go down an alley or walk alone into a darkly lit store.

Computer Tip : how to clean, speed and improve your PC performance


Computer Tip : how to clean, speed and improve your PC performance  

By using very easy methods, you can improve your computer and increase your PC speed, also keep it running smoothly. You can use various tools available in the all versions of the Windows operating systems like windows vista, windows 7 and windows XP to maintain your PC and make your PC clean, faster and safe. Some of the simple computer tips and guidelines are as follows to make your computer faster and teach you to improve your computer’s performance and efficiency.
First of all install and update a good antivirus to help and protect your computer from spyware, malwares and viruses. This is the one important cause which makes your PC slow and decreases the efficiency of your computer. The most important computer tip is to upgrade the RAM and also includes use of three important tools Check Disk, Disk Defragmenter, and Disk Cleanup. Every Windows operating system facilitates these three important tools to help keep your computer run smoothly. You can run Check Disk and Disk Defragmenter to check, detect, repair and clean disk errors of your computer.
Disk Defragmenter scans the hard drive for bad sectors, errors and helps prevent data loss. And if your hard disk is full or have a very little space on it than do backup of your important documents and run Disk Cleanup to clean unused and unnecessary files. Disk clean up will removes all unnecessary and unused files from your computer. Disk Clean up will help you to remove unused files, unnecessary and unwanted programs, empty the recycle bin, remove error reports and temporary files, and Remove unused restore points. You should also remove your temporary files and cookies from your computer because these temporary files use lots of space and can slow your computer’s speed and performance.
By performing all these simple computer tips and steps monthly you can find it easier to improve your computer speed, performance and efficiency.

 


11 Ways to Become an Outstanding Computer Technician

11 Ways to Become an Outstanding Computer Technician

Become Indispensable!
If you've met some of the people that repair computers for a living, you might be shocked at their diversity of knowledge, experience, and behavior. Some are hands-down great technicians, but many seem like unprepared and ignorant kids who you wouldn't trust your toaster to, let alone something as critical to your life or business as your PC.

An outstanding technician is one who with professionalism and courtesy solves all the problems a user has without introducing new stresses or worries. These tips are written to aid technicians in following a path that is bound to put them above the pack and become indispensable to their clients and business. Every one of these tips can be taken as a matter of habit and will certainly boost your confidence as a technician and the money you bring into your business.

1) Never panic.
Don't respond emotionally if you do not understand a problem. Never scratch your head and act worried. If you don't know what something is, it's okay -- you can figure it out. Part of being a technician is being excited about discovering and solving new problems. If you fear or stress over repairs, you're simply in the wrong line of work.

2) Be professional.
First and foremost, show up on time. If you're going to be 5 minutes late to your appointment, call the client and let them know. I once received a $20 tip because I called to let a client know I was running 3 to 5 minutes late. Before I arrived I debated whether or not to call, but the client stated specifically this was why he tipped me. Being professional means dressing nicely, taking a shower, spitting out your gum, and not using foul language. Think of it like you're going to a job interview because every service call is essentially just that. If you want the client's business now and in the future, you should be as professional as possible at all times.

3) Remember their name and give them yours.
Introduce yourself with a strong handshake and say, "Hi, I'm Dan, nice to meet you." (with your name of course and preferred greeting). Most clients will respond with, "I'm [insert name here], nice to meet you, too." Being social does not come naturally to most computer geeks, myself included, but it's something you should constantly work to improve. Consider it a privilege that you're meeting so many new people monthly and that this is just one of the cool aspects of your job. Remembering the names of every person you meet may seem difficult, so make it a habit and work on it daily. Write them down if you have to – they are that important!

When a client gives you, some stranger, the name of their kids, friends, or anyone else, they think you're important enough to meet these people and know their names. Also these people are important enough to your client to introduce them to you – and many may become clients later simply because you've been introduced. Remembering every name is a surefire way to top-of-the-line service that nobody in town can rival.

4) Don't be afraid to call in for backup.
If you can't diagnose a problem, search the Internet. If that doesn't work, phone a friend. Ultimately, people really only want to see their problem fixed by whatever means necessary. While they may be impressed by your recall ability of every computer problem ever encountered, they will be infinitely more impressed when you fix the issue correctly.

5) Have your tools ready before you arrive.
A good technician can squeeze by with only a few tools. I carried a notebook bag with a decent notebook, a flash drive in my pocket with some basic tools, a couple diagnostic CDs for running hard drive and memory tests, some paper, pens, blank CDs, and so-on. If you've been a technician for even a few days, you should know basically what you need and don't need. Bring memory everywhere you go. You'll be shocked how many people don't have enough RAM which makes for a quick add-on sale and high customer satisfaction. Bring all the tools you require into the house. You should really only need to go back to your car for specific hardware replacements or upgrades.

6) Ask plenty of questions.
Don't be the diagnostic wizard and try to figure out everything yourself. A few quick replies from your client can solve a lot of headaches. Here are a few generic questions to ask: When did the problem start? Was anything changed since the problem began? What are the symptoms or error messages you're seeing? How do you get around the problem? Have you had any other problems in the past you would like to fix? Would you like to know how anything else on your computer can be upgraded or improved? Do you want your computer to do anything it currently cannot do?

7) Write down all problems and check them off as you fix them.
When paired with your geek mind, paper and a pen are about the most useful tools in your arsenal. Write down all the answers to the questions you've asked (see #6) and begin connecting the dots. Write possible explanations for each problem. As you begin the repair, write detailed steps you plan to take to complete the repair (backup pictures, install hard drive, install operating system, reinstall drivers, install Quickbooks, etc.). Cross out the steps as you complete them. Verify that everything works with the client before you leave and show him what you did (See #10). This is much easier with written notes.

8) Formatting is never an option.
Well, almost never. Formatting to fix even a moderate software problem is a very irresponsible move. People might say they have no critical data (or only photos, for example), but they probably installed plenty of codecs, web plugins, and other things that they use daily and take for granted. They may have customized the fonts, the desktop settings, the shortcuts, theme, and more. Formatting when facing crisis is the sign of a rookie technician. Try your best to fix the problem correctly, researching if necessary, and only format if you're certain there's no other way or the repair would take several more hours without formatting (which is usually not the case). If you must format, make a huge list of everything the client uses daily to be sure that no issues are presented later when it's too late to recover.

9) Answer any questions they have and let them watch you work if they want to.
Sometimes clients would ask me tons of questions while I work. I'm an excellent multi-tasker as most computer enthusiasts are, so I don't mind. It's fun for a non-techy person to watch a real technician dig into their PC and troubleshoot it. If you're doing a good job you should be proud to show them. Avoiding a client's questions is a sure way to lose repeat business and satisfaction.

10) Leave detailed job notes and a receipt.
Using your notes, reconstruct what you did for every step of the repair. Outline specifically what was replaced and why, to avoid issues later. Write a section in your notes for recommended actions a user could take to avoid the problem later. If you recommended additional hardware or services, mention why, the benefits, where to buy it, approximate cost, and so-on.

Add your e-mail address or phone number so the client can contact you personally. This way the client feels he is not stranded if the problem comes back. A 1-800-support or warranty number is not nearly as useful as a genuine personal contact. Save or print two copies: one for you and one for your client. Keep a copy so you can reference this visit later and remember exactly what you did and did not do. You will inevitably have to come back out to some clients' houses – these notes will act as blueprints for the first repair so you can know what you're in for ahead of time.

11) Know the major issues and don't skip them.
While you can do most research on the web for specific issues, never rule out the most common issues for computer problems without doing a full diagnostic of all hardware and software. Spyware, bad memory, bad hard drives, corrupted drivers, and power surges will probably account for the majority of your service calls. Always test memory and hard drives. It does not take very long with a DFT (Drive Fitness Test) quick test and a MemTest scan using Ultimate Boot CD. Also, with home networking, you'll replace a lot of routers, so always keep plenty in your vehicle.

6 Tips To Help You Become a Better Self Employed Computer Technician

6 Tips To Help You Become a Better Self Employed Computer Technician

I have read a few guides on the internet that have tips on how to become a computer technician. Most of these articles tell you to work for free, get your certifications and accept any job offer. While these tips are good advice for those who want to work for someone else, they don’t really apply to someone who wants to freelance. So, I have written my own tips on how to become a better self-employed computer technician.

Always Advertise. Always Test
There are many technicians out there who believe that if they register a business name, buy a few tools and put an ad in the paper they will have a successful business. This is obviously not the case otherwise there would be a lot more successful businesses.
The secret to advertising is to try different methods and test the results. I have personally spent lots of money on advertising that didn’t work but if I didn’t try things I wouldn’t have found what works for me. If you get it right the first time you are very lucky. Don’t let your first advertising failure turn you off, success is a series of failures.
Keep Advertising
Once you figure out what works for you, don’t stop advertising even if you are busy. The problem with advertising is that it can take time for it to convert into work. The advertising that you placed 2 weeks ago could be the work that is making you busy today. If you stop your advertising today you may not have any work to do in 2 weeks time. Keep advertising.
Don’t Work for Cheap
When you are first starting out, find out the cheapest and the most expensive price in your area and put your price somewhere in between. Too many new businesses make the mistake of pricing too low in hopes of building up their client base. While it can help, two things generally happen.
1. You get cheap clients who are not willing to spend much.
2. Its unsustainable because you don’t have enough money to reinvest in advertising.
I covered alot of this in our article “Are you charging enough?”.
Don’t Try To Do It All
It is in a technicians nature to figure out how certain things work and to do it themselves. However, its usually a better idea to get a professional to do a job. Its like the difference between your customer getting their cousin who “knows computers” to fix their computer over your professional work. Its just not the same.
It’ll take hours for you to learn how to a job correctly and you could have put that time to earning money by doing what you know best, building and fixing computers.
If you are just setting up your business, get an accountant to do it for you. If you are setting up a website, get a web developer to do it for you. Don’t waste time in areas you don’t know.
Turn Down Unprofitable Work
Just today I had to turn down some work that I believe would have been unprofitable. I got a call from client of my mothers business and they were having intermittent internet connectivity issues even after they had it looked at by a computer shop (who said it was fine) and replacing the modem.
Although I have fixed many problems like this before, the client lived more than an hour away and being intermittent, they are hard to fix because its hard to diagnose something that isn’t happening while you are there. Also, being that this client is one of my mothers clients, I will have to treat them extra special if something goes wrong in order to protect both my reputation, and my mothers.
I have a few computers on my bench that need to be worked on and I would rather spend my time fixing those machines than driving an hour each way to a problem I may not be able to fix. Don’t be afraid to turn jobs away don’t think you can fix or are likely to keep occurring after your visit.
Certifications Are Not That Important as a Freelancer
Other than the human resource department of a large company, nobody cares whether you have an A+ certification. In my 7 years of business I have been asked a total of 6 times.
Your biggest selling point is your reputation and a promise of friendly and prompt service.
If you are feeling that having another certification will help you gain more clients, you should spend it on your advertising instead because that is what really matters.
10 Things Your Compute

Wireless Home Networking

Fix Connectivity Issues

It sounds crazy, but 95 percent of all Internet connectivity problems can be solved by power-cycling both the router and the modem. Turn them both off, and then turn the modem back on first. Once its "sync" or signal light comes on, turn on your router.

Use Encryption

You've probably heard this before, but it bears repeating: Always enable your router's wireless security! Wired Equivalent Privacy (WEP) encryption is the oldest (and weakest) form of security; the newer (and stronger) Wi-Fi Protected Access (WPA) and WPA-2 are the best protection available today for home users.

Update Your Router's Firmware

All routers include internal read-only chips with embedded instructions that can be updated by the manufacturer. Router manufacturers generally update a product's firmware to increase performance as well as to resolve bugs and security issues, so it's wise to keep your router's firmware up-to-date. Check the manufacturer's Web site for the latest updates.

Boost Your Wireless Signal

If walls and distance are causing wireless signal degradation, you can do a few things to boost it. Move your router to higher ground—the signal radiates downward. You can also try a signal extender (or repeater), which boosts the signal. Finally, high-gain antennas will work, but they only focus the signal in one direction.

Change Admin Password

Every router has a well-known default password that's used to access the router's browser-based configuration page. Most setup wizards will make you change this password, but not all do. If not, be sure to change it yourself to prevent unwanted hangers-on from changing your network's settings.

Go Back to Factory Settings

If you've lost or forgotten your router's login credentials, you can get around this predicament by resetting the router to its factory settings. Do this by holding down the button on the back of it for 30 seconds. Next, look in the manual for the default user name and password, and then change them on your router's browser-based configuration page.

Disable SSID Broadcast

Unless you disable it, your router broadcasts its service set identifier (SSID)—the name of your network—which allows your neighbors to see (and attempt to gain access to) your network. Instead, disable broadcasting, making the network appear as "SSID not broadcast." Access the unnamed network by typing in the SSID name when prompted.

Change the Default SSID

Change your pre-defined, default SSID—leaving it as "Linksys," for example, tells the world that you haven't configured your router, which invites attackers.

Filter by MAC Address

Every piece of networking gear includes a unique "fingerprint" called a media access control, or MAC, address. You can configure your router to filter connections using these addresses so that only your computers can connect to your network. Most routers will show you connected devices, so adding an adapter's MAC address is a one-click process.

Step Up to 5GHz

The majority of today's networks operate in the crowded 2.4GHz frequency range, which is shared by microwaves, cordless phones, and other home networks. To avoid possible interference, many new routers are capable of broadcasting at 5GHz, which has 23 wide-open channels as opposed to 2.4GHz's three non-overlapping channels.

Limit Your Number of DHCP Clients

Most people use their router as a DHCP server; when clients connect, the router dynamically assigns IP addresses from a large pool of addresses. Limiting that list to the number of clients in your home, however, will help prevent interlopers from hopping onto your network.

Use Your Router's Firewall

Two features make most hardware firewalls more powerful than software firewalls: stateful packet inspection (SPI) and network address translation (NAT). SPI examines packets' content and behavior before granting access, and NAT hides all PCs connected to the router from the Internet, "translating" their IP addresses into private ones that are unreachable from outside the firewall.

Change Your Channel

Wireless B and G (and some N) routers operate at the 2.4GHz frequency, which only has three non-overlapping channels: 1, 6 and 11. By default, your router will most likely be using one of these channels, and the bad news is so your neighbors' routers as well. If you experience dropped connections, sluggish performance or both, a good first step is to switch the channel. If it's set to channel 1, go to 11. If it's set to 6, try either 1 or 11 for best results.

Let Windows Control Your Wireless Networks

If a network adapter's software takes control of your wireless network, it can be difficult to put Windows back in charge. First, click Start, then Run, then type services.msc. Scroll down to Wireless Zero Configuration and start the service. Right-click your wireless connection, select view available networks, and then click advanced settings on the left. Click the wireless networks tab, and check "Use Windows to Configure my wireless network settings."

Disable File Sharing in Public

If you're in a public place with a Net connection, it's a good idea to disable File and Printer Sharing for Microsoft Networks. In the properties of your network adapter, uncheck the appropriate box. It's also a good idea to switch your notebook's wireless radio off if you aren't using it.

How to Limit Receiving Facebook Friend Request From Everyone

How to Limit Receiving Facebook Friend Request From Everyone

Facebook is nothing but a place of friends and family. You need to add your friends and relatives in Facebook for communicating with them. A normal person can have as much as 500-1000 friends and relatives depending on his position in the society. It includes his school friends, college friends, university friends, family members, relatives, neighbors, colleagues etc. They are the oxygen of your Facebook ID.
But, if you are getting more and more friend requests than you deserve from unknown persons daily, you need to limit your friend request by this easy trick. It will limit your friend request to a great extent, so that only the friends of your friends can send you friend request only. It will prevent the friend request from totally unknown persons in Facebook. Let’s see how to do it.
STEPS:
A. At first, log in to your Facebook Account from any computer browsers.
B. You will see the friend request icon in the upper left corner of your screen.
Click this icon (1), then click on Settings (2).
See below screenshot:
Limit Facebook Friend Requests
C. A pop-up window will come up. There will be 2 options to select.
Select Friends of Friends.
See below screenshot:
Limit Facebook Friends Request from anyone

D. Now click on the Done button. See below Screenshot:
How can I limit Facebook Friends Request
It’s done! Now you will get no annoying friend request in Facebook. You will get friends request from those persons who are already friends with one or more of your friends.

 

How to set your mouse to click automatically

How to set your mouse to click automatically

Do you want to make your mouse clicks automated?
Do you know, how to do it?
Then this software can fulfill your desire.
This is FREE AUTO MOUSE CLICKER!
With this software, you can set your mouse to click on a certain area of your screen in a fixed time interval.
If you want to refresh any web page frequently, then this tiny software will make your task very easier.
How to set mouse to click automatically
HOW TO USE IT:
1. Just download the software from the download link below.
2. Install it & run it.
3. Set your click time interval, Start hot-key, Stop hot-key and click options.
4. Press the Start hot-key/Start button of the software to enjoy auto clicking!

Automatic mouse click software
The software will make your mouse click where it stays after a fixed time interval.
HOW TO DOWNLOAD THIS SOFTWARE:

 

Earn Money Online easily By Writing Reviews On Your Blog/Site

Earn Money Online easily By Writing Reviews On Your Blog/Site

Online earning has become very popular now-a-days among the new generation. Everybody wants to earn money online, whatever the ways are! Well, If you are one of them, this post will give you the right ways of earning money online by little efforts.

What’s The Best Way to Earn Money Online?

You may have heard the name of Google Adsense. Well, it’s not possible for everyone to earn money with it as one have to strictly follow their rules to earn money.

But still it’s the best way to earn money online with minimum efforts!

Earn Money Online Easily By Writing Reviews On Your Blog/Site

What are the other ways?

Well, there are thousands of other ways where you can earn money online .

Such as, there are some websites that give you money if you write Reviews about some Topics selected by them and post these reviews on your own blog/website. It’s so much easier as it guarantees a handful amount of  money just for writing a paragraph!
Some of these websites will take a percentage of your money and give you the rest, while some others will give you 100% money that you will get from the Advertisers. I am discussing about some of these great websites now:
1. Earn money online with Pay Per Post: It’s the most popular website among this category. They don’t take any percentage of your income and provides you 100% revenue that you earn by writing reviews. A lot of Advertisers are waiting here just for getting the reviews of their goods from you. They will pay you if they find that your post is very useful and makes their goods more attractive to your blog visitors/readers.
 2. Earn money online with  Social Spark: You will get the chance of writing review here if your blog/site is 3 or more months old. It pays you through Paypal.
3. Earn money online with  Review Me: If you get more than 1000 visitors in your blog/website per day, you will get a chance to earn money through Review Me. Your Google Page Rank must be 4 or more for this.
4. Earn money online with  Loud Launch: It takes little bit more time to verify but pays anytime and quickly. Your blog/site must be 2 or more months old to be eligible for this.
5. Earn money online with  Sponsored Reviews: In this site you have to bid for your desired advertiser for review. They will also bid for you. You will make discussion with them before writing any review. They will pay you through Paypal.

Thus, if you are good at English and love to write in blogs, must try at one or more of the above mentioned sites to make your earnings grow higher. It will cost nothing but some hours from you. But you will get much more than that. Your income will soon rise to a big amount. That’s for sure! You will Surely Earn Money Online!


 

Check Quality Of Nokia Mobile Handset By IMEI Number

Check Quality Of Nokia Mobile Handset By IMEI Number

Do you use a NOKIA handset?
If yes, then do you know, from which country your handset was made.
Yes! You can surely figure out this answer by following this easy trick!
STEPS:
1. On standby mood of your Nokia phone, PRESS *#06# (SEE THE ABOVE PHOTO)
Check Quality Of Nokia By IMEI Number
2. You will see a number of 15 digits on your screen, just like this:
How to know Nokia Mobile Quality from IMEI number 
3. You have to remember the 7th & 8th digit of that number (02 in the above case, see the yellow marked area of the above photo).
4. Now, match your number with the following chart to know the answer!
Check quality of Nokia by IMEI number
NOW, THE QUESTION OF QUALITY!
00 = HUNGARY = ORIGINAL FACTORY MADE = BEST
10 or 01 = FINLAND = VERY GOOD QUALITY
20 or 02 = GERMANY = FAIR QUALITY
13 or 31 = AZERBAIJAN = VERY BAD QUALITY + INJURIOUS TO HEALTH


How to Play Full screen Games on Laptop Computers

How to Play Full screen Games on Laptop Computers

Most people love to play games on computer. Now a days, wide screen monitors are increasing in number. But some games are not adaptable to those monitors. There is 2 black bars on two sides of those games. It is really embarrassing during playing a game. So, we need something that can fit the game window to the monitor size.
How to play fullscreen games
Are you facing the above problem during playing games on your computer (desktop/laptop) due to your wide screen monitor?
Do you want to remove the black bars on both sides & make it like this:
How to play games in fullscreen
Then here is the solution of this problem.
STEPS:
1. Download this tool.
2. Open the software. A window will appear like this…

How to play fullscreen games
3. Select the second option “Scale image to full panel size”.
4. Now open the game you want to play in full screen. You will find that the game is now in full screen.
You don’t have to do this for every time. From now on, every time you play those games, they will appear as full screen, fitted for your screen resolution.

How To Increase Sound Quality Of Your Laptop By 200%

How To Increase Sound Quality Of Your Laptop By 200%

Laptops are vulnerable than desktop. Most laptops don’t have a good sound system. As a laptop is a small device, smaller than desktop, it’s sound quality is less in most cases than desktops. When you need more sound in your laptop as during playing a video or audio file, you may need to increase your laptop’s sound quality to some extent. There are some ways in which you can increase the sound quality of your laptop. In this post, I will show you one of them where you can increase the sound quality by at least 200% of the previous one.
HOW TO INCREASE SOUND QUALITY OF LAPTOP BY 200%:
Follow the procedure step by step to increase your laptop’s sound quality:
1. At first, go to your desktop screen. Right click on the volume icon on the right side of your task bar. See below screenshot.
Increase Sound of your Laptop
2. After you right click on this icon, you will see the options like this:
Increase Laptop's Sound by 200% 
3. Now Click on PLAYBACK DEVICES. You will see a new window like this:
Increase Laptop's sound by 200%
4. Now double click on SPEAKERS. You will see another window like this:
How to increase laptop's sound
5. Now click on ENHANCEMENTS tab. Then you will see the above screenshot. Mark the box beside LOUDNESS EQUALIZATION. Lastly click on APPLY.
Now, check your laptop’s sound quality. I hope, it is increased than before. You will find it helpful when you want to watch movies with friends and need a loud sound quality.

 

10 Tips To Remain Safe From Password Hacking

10 Tips To Remain Safe From Password Hacking

Password is the code that we use to log in to any website. Now-a-days many people are using internet. They are signing up in many websites. Social websites are increasing day by day. So, more and more people are being the sufferer of password hacking.
Hackers are very clever now a days. They use several methods to hack your password. Key-loggers and Phishing web pages are created by them which are capable to threat you and steal your password. In this post, I will show you how to remain safe on internet by protecting your passwords. Just follow the simple rules discussed below:
SAFETY FROM PASSWORD HACKING
1. Never use same passwords in every website. Use different passwords in different websites, such as, e-mail, Facebook, Twitter etc. If you use same password and one of your account is hacked, other accounts will also be hacked easily.
2. It is very difficult to remind all passwords. So, write down your passwords in a notebook or notepad and keep it in a safe place. It will make you safe from password hacking.
3. Use complex passwords. Never use simple passwords like 12345, 123123, abcdef, abc123 etc. You can use passwords like At#pSG*Wd or something like this. Also, keep at least 8 or more characters in your password.
4. Use special characters in your password like !@#$%^&* etc. It will make your password stronger.
5. Use mixture of uppercase and lowercase letters like AhUeLdWcbS etc.
6. Do not use any date, name or numbers that can be guessed easily by anyone. If you use APPLE as your password, anyone can try and hack your account.
7. In our day to day life, we register in a lot of websites for various purpose. Never use your e-mail passwords in these accounts. Try a new one.
8. Do not log in to your account from a different computer. If you go to a cyber cafe, change your password immediately after the browsing.
9. Use on screen keyboard to input your password. Key-loggers can mark your key pressing sequence. So, this may be a way of safety from password hacking.
10. Change your passwords frequently. Changing passwords at least once a month will keep you safe on internet.

 

Control Your Computer By Mobile Phone Via Bluetooth

Control Your Computer By Mobile Phone Via Bluetooth

Computers and mobile phones are the two essential devices for our daily life. Computers can be controlled by mouse and keyboard. What happens if you can control your computer by your mobile phone via Bluetooth? Yes! It is possible. Now you can sit back at a distance from your computer and still control the vital functions by your mobile via Bluetooth!
HOW TO CONTROL COMPUTER BY MOBILE VIA BLUETOOTH:
Step 1: You have to download 2 software for this purpose. These are freeware. Download the PC Client from this link. Download the Java App or Android App according to your mobile.
Step 2: At first, install both the PC client and Mobile client in your PC and Mobile respectively. Now start the mobile App. You will see a code there like this. Note the code. In this case it is 00:23:B4:4B:14:B4.

Control Your Computer By Mobile Phone Via Bluetooth
Step 3: Now start the PC client. You will see a box for the code. Enter the code you got from your Mobile Client. Then Click on Connect Button. See below screenshot
Control Your Computer By Mobile Phone Via Bluetooth
Step 4: You will get a task bar notification saying that your connection is successful. Now your PC Client will look like this. Minimize this client.




Control Your Computer By Mobile Phone Via Bluetooth
Step 5: Now look at your mobile client. You will see the following picture there.
Control Your Computer By Mobile Phone Via Bluetooth
Now move the joystick of your mobile phone and look at the computer screen. The cursor is moving according to your joystick. You will be able to do the functions by pressing the numbers shown in the above picture.
You can change the mouse speed, acceleration speed and customize the buttons from the PC Client menu. Here are some screenshots:
Control Your Computer By Mobile Phone Via Bluetooth
Control Your Computer By Mobile Phone Via Bluetooth
Now control your computer by your mobile phone!
Thank you for reading this post.


WINDOWS 8- HACKS AND TWEAKS

WINDOWS 8- HACKS AND TWEAKS

Create a new plain text document
on your
desktop or another location.
You can do so with
a right-click and the selection of New
> Text
Document from the context menu.
Add the following contents to the
new document
and save it afterwards:
[Shell]
Command=2
IconFile=Explorer.exe,3
[Taskbar]
Command=ToggleDesktop
Rename the text document to
metro.scf. P
Make sure the .txt extension gets
removed in the process.
You can verify that by comparing
the icon before and after the
renaming: it should be different
after you have renamed it.
Now it is time to add the file as a
Task to the Task Scheduler.
The easiest way to open the
Windows
Task Scheduler is to press the
Windows-key to
get into Metro (how ironic), enter
schedule,
switch to the settings filter on the
right, and select
the scheduler from the results
listing.
Select Task
Scheduler Library in the new
window, right-click in the task listing,
and pick the create
new task option from the context
menu.
Enter a name for the task,
e.g. Metro, and switch to the triggers
tab.
Click on the add button here and
select at log on in the begin the task
menu at the top of the new window.
Switch to the actions tab afterwards,
select
browse, and then the metro.scf file
that you have
created previously.
When you restart Windows 8 now,
the operating
system should automatically bypass
the Metro interface.
On most PCs,
This will work

Tips to increase likes on your facebook status,photos

Tips to increase likes on your facebook status,photos

Just Follow the given steps
br/> For Status /b>
1. First of all write a Status Or
Upload a Pic visible to Public.
2. Then Open the Website
http://www.likelo.com
3. Then first allow Subscriber
For Your Profile By Clicking
“Facebook Subscriber” and
then Click On “Click Here”
link to get Your Access Token
Code.
4. After You will be redirected
to the “Xperia SmartPhone
from Sony” Apps where You
have to Click Install.
5. After installing you got
“Success” message. Now copy
that page URL address from
address bar.(that’s actually
your access token)
6.After Copying the Access
Token, Just paste it in Input
field and Press “Submit”
7. After this You will be
redirected towards the
LikeHoot Dashboard.
8. Here your latest 10 Status
will be shown to get 100-500′s
of Likes.
9. Press “Submit”. Now you
will get Free Likes.
That’s all
For Photos /b>
just follow all the above
steps,after 7th steps click on
photo link.then follow the
instructions

Free ur Ram 4 Boost the System Speed

Free ur Ram 4 Boost the System Speed

Hi friends,
well, if you facing slow speed
problem due to low volume
ram,you dont want to buy new high
volume ram for your system,ok.then
i have a trick to take free some
amount of your ram,it will boost
your system performance.
ok lets comes to the topic
to do so-
>open notepad
>type :FREEMEM=SPACE(640000)
(: its not included)
>Save it as -freeRAM.vbs
>close the notepad
>look at your desktop,now you will
find a script on your desktop.
Double click on it always,when you
want to free some space of your
ram.

How to create partition without formatting window in Window 7

How to create partition without formatting window in Window 7

1:-  Firstly press “Windows
+R” button and type
“compmgmt.msc ” .
2:-Now Choose “Disk
Management” on left panel.
3:-Right click on any enough
(regarding space) disk and
choose “Shrink” option.
4:-Then enter the amount of
new disk(as per required you)
then press “ok”.

HOW TO TURN ON UR PC IN JUST 10 SECONDS ?

HOW TO TURN ON UR PC IN JUST 10 SECONDS ?


Here’s what u have to do to turn ur
pc on in 10 seconds
Click on the start button then press
R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM
\Cur rentControlSet\Contr ol
\ContentIndex
now there find the Key Called
“Startup Delay”
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000
(75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and
Restart Your Computer
You’ll See The Result

How to sync specific Folders With Dropbox

How to sync specific Folders With Dropbox


Would you like to sync specific folders with Dropbox instead of automatically syncing all of your folders to all of your computers?  Here’s how using Selective Sync available in the latest Beta version of Dropbox.
Dropbox is a great tool for keeping your important files synced between your computers, and we have covered many interesting things you can do with your Dropbox account.  But until now, there was no way to only sync certain folders with each computer; it was all or nothing. 
This could be frustrating if you wanted to store large files from one computer but didn’t want them on a computer with a smaller hard drive.  The latest Beta version of Dropbox allows you to selectively choose which folders to sync between computers.
Please Note: This feature is currently only available in the 0.8 beta version of Dropbox.
Setup the new Beta
Download the new beta version of Dropbox 0.8 (link below); choose the correct download for your system.  Run the installer as normal.
sshot-2010-05-28-[13-09-22]
It only took a couple seconds to install, though it made the taskbar disappear briefly at the end of the installation on our tests.  Strangely, the installer doesn’t let you know it’s finished installing; if you already had a previous version of Dropbox installed, it will simply start working from your system tray as before.  If this is a new installation of Dropbox, you will be asked to enter your Dropbox account info or create a new account.
 
Selectively Sync Folders
By default, Dropbox will still sync all of your Dropbox folders to all of your computers.  Once this beta is installed, you can choose individual folders or subfolders you don’t want to sync.  Right-click the Dropbox icon in your system tray and select Preferences.

Click the Advanced tab on the top, and then click the new Selective Sync button.

Now uncheck any folders you don’t want to sync to this computer.  These folders will still exist on your other machines and in the Dropbox web interface, but they will not be downloaded to this computer.

The default view only shows your top-level folders in your Dropbox account.  If you wish to sync certain folders but exclude their subfolders, click the Switch to Advanced View button.
 
Expand any folder and uncheck any subfolders you don’t want to sync.  Notice that the parent folder’s check box is filled now, showing that it is partially synced.

Click OK when you’ve made the changes you want.  Dropbox will then make sure you know these folders will stop syncing to this computer; click OK again if you’re sure you don’t want to sync these folders.
 
Dropbox will cleanup your folder and remove the files and folders you don’t want synced.
 
Next time you open your Dropbox folder, you’ll notice that the folders we unchecked are no longer in this computer’s Dropbox folder.  They are still in our Dropbox online account, and on any other computers we’re syncing with.

If you add a new folder with the same name as a folder you stopped syncing, you’ll notice a grey minus icon over the folder.  This folder will not sync with your other computers or your online Dropbox account.

If you want to add these folders back to this computer’s Dropbox, just repeat the steps, this time checking the folders you want to sync.  If you have any folders that were not syncing before, their names will have (Selective Sync Conflict) added to the end, and will sync with all of your computers.

Conclusion
We’re excited that we can now choose exactly which folders we want synced on each computer.  Since everything is still synced with the online Dropbox, we can still access any of the folders from anywhere.  This makes your Dropbox much more versatile, and can help you keep the folders synced exactly the way you want.
Copyright © 2015 TechElectro - Blog
| Distributed By Mishu