Showing posts with label Computer Tricks. Show all posts
Showing posts with label Computer Tricks. Show all posts

Thursday, 4 August 2016

// // 1 comment

Seven easy tips to protect your PC from hackers and malware

Common sense alone isn’t enough to protect your Windows PC from malware – malicious software that disrupts your computer’s operations or gathers sensitive information about your online behaviour.

Hackers can attack your PC in so many different ways that employing several layers of anti-malware protection is the only way to keep your PC malware-free when it’s online.

Here are seven steps to protect your computer from Malware. Check out the video above to find out more.

Tip 1: Install, update and use anti-virus software
Installing antivirus software may sound like an obvious first step to protect against malware, but not everyone bothers to do it. With so many options now available, though, there really is no excuse. Microsoft offers its own free download in the form of Microsoft Security Essentials for Windows Vista and 7, while Windows 8/8.1 has Microsoft Defender built in.

Alternatively, BT NetProtect Plus is available free to some BT customers. Check out the box below to find out more.

Once installed, it’s vital to regularly update your anti-malware software’s database and run system scans at least once a month.

Tip 2: Keep Windows up to date
Hackers often discover new ways to bypass Windows’ built-in security features, which is why Microsoft issues small operating system updates every Tuesday and larger ‘service pack’ updates once or twice a year. These will be downloaded and installed automatically by Windows update, but only if this feature is properly configured.

To check that it’s working normally, type Windows Update in the Start menu search box in Windows Vista/7, or at the Start screen in Windows 8/8.1. Look on the left of the Windows Update window and click Change settings and use the drop-down list to check that Install updates automatically is selected - anything other than this risks a crucial update being missed.

Tip 3: Turn on the Windows firewall
Windows has a built-in ‘firewall’ that protects your PC from unwanted attention via the internet. This software firewall is enabled by default and works alongside any hardware firewall that’s built into your home broadband router. Check its settings by typing “check firewall” in the Start menu search box or on the Windows 8 Start screen and choosing Check firewall status from the results.

Two green tick marks mean the firewall is working normally, else you’ll need to select Turn Windows Firewall on or off on the left of the window and enable one or both options that appear.

Tip 4: Use the latest version of your web browser
Web browsers are vital applications, but just like other software, they can contain bugs. Hackers are quick to capitalise on these and create bogus (or infect genuine) web sites with data designed to exploit them. Once a web browser has been compromised in this way, a hacker can monitor everything you type, including passwords to credit card numbers. That’s why it’s vital to use the latest version of your web browser - anything other than this may be a security risk.

Microsoft includes updates for Internet Explorer. Search for Windows Update and check its optional updates section to ensure you’re also using the latest version of the application - which is Internet Explorer 11, if you’re using Windows Vista, 7 or 8/8.1.

Google Chrome and Mozilla Firefox will also update themselves automatically, but don’t ignore their requests to restart the browser when such an update has been downloaded and is ready to be installed.

Tip 5: Don’t fall for phishing emails:
Emails that appear to be from a recognisable online service asking you to log into a site to confirm some personal details are always fake.

These emails are usually caught by your email application’s spam filter, but if one does slip through and you click its link, your web browser should detect and block the site it takes you to.

This does depend on your web browser being aware of the fraudulent site, though, which is another good reason to always use the most recent version.

Tip 6: Use the Windows Malicious Software Removal Tool
If you suspect your PC has succumbed to malware and your anti-malware software doesn’t detect it, there are two steps to take.

The first is to download and run the Microsoft Malicious Software Removal Tool from the Windows Download Centre. This will detect and remove specific types of malware and is very simple to use, although it isn’t a replacement for a full anti-malware application.

Tip 7: Still infected? Use a boot CD.
Some malware can hide within Windows and make itself difficult to detect and remove. If your own anti-malware software and the Windows Malicious Software Removal Tool fail to shift it, you’ll need to download and burn a free anti-malware boot CD – refer to your computer’s manuals for instructions on how to boot from a CD as the process varies from manufacturer to manufacturer.

Kaspersky Rescue Disk 10 is a good one, but never download it on an infected PC -ask a friend to do it, if necessary. This will then scan your PC for malware without the need for Windows, which makes removal that much easier.

Are there any security tips we've missed? Let us know in the Comments box below.
Read More
// // Leave a Comment

Tips to Become Cyber Security Specialist

To become a cyber security specialist dedicated study and learning is the key step. Nobody can expect to become a specialist over night, it requires hands-on-experience, extensive training and management expertise.
Step-by-step

Do Your Own Research
The cyber security field is all about new trends and techniques, so it is necessary to do your own research to explore new trends, techniques and technologies in the field of cyber security whenever possible to prove you are an expert that can deal with a wide-variety of problems. It’s an ongoing process if you consider cyber security field for your future.
   
Study Hard
In the field of cyber security, you must be up to date to new research and studies. In-depth study is the only key to grow in this field. Nobody can expect success overnight, this field required dedicated hard work and knowledge to survive. Most of the security firms are seeking candidates with a bachelor’s degree, although master’s and post graduate degree along a few years of experience is a plus.

Pursue Security Internship
Although study and research give you enough knowledge to start as a cyber security professional, but practical experience is compulsory to get known by the world. So, start with the internship at any cyber security firm to begin your career.

Get Certified
Although, studies with knowledge and university degree is not enough for a better future in this field. You must earn security certificate in order to get recognized. Getting certificate will provide you with the proof of knowledge.

Some useful certifications include:
  • Certified Ethical Hacker (CEH)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Project Management Professional (PMP)
  • Certified Protection Professional (CPP)
  • Certified Information Privacy Professional (CIPP)
Learn Form Tutorials
Tutorials are not just about creating an excellent learning experience for students, but also a powerful instructional tool as well. Nowadays, we can find everything on the internet; various online academies are offering Cyber Security Trainings to provide the market with quality cyber security professionals. From online tutorial, it’s easy to manage time while learning in addition we can reach best teachers from overseas.
  
Apply for an Entry Level Job
Getting recognized by firms is the real challenge in this field as companies seek for the best cyber security professionals. Companies vastly depend on cyber security staff, so it’s a tough recruitment process waiting for cyber security professionals. Hence, you should consider some other relevant jobs that work as a bridge towards your cyber security professional career like network administrator.

Although, you must work to defend companies from cyber attack rather offensively to harm companies in any manner. Many cyber security academies are the best platform to begin with, it will develop an interest along practical knowledge and expertise as well.
Read More

Tuesday, 26 July 2016

// // Leave a Comment

How To Reset Windows 10 Login Password

How To Reset Windows 10 Login Password – Hack and bypass windows 10 login screen. Basically Microsoft has a feature that allows you to set a new password. Here you are not cracking or hacking the password, you just set a new password without knowing current password. It’s a nice way to open your locked Windows 10 PC or Laptop if you are unable to remember the password.Resetting Windows 10 Login Password is easy, you don’t need to be a hacker or a geek. Anyone can do this, just make sure you follow the step by step guide here-How To Reset Windows 10 Login Password.
How To Reset Windows 10 Login Password
  1. Boot your Windows 10 DVD and you will get like this.
  2. Now open command prompt by pressing SHIFT + F10
  3. Type or copy paste this command line and press enter to make a backup of utilman.exe
  4. move c:\windows\system32\utilman.exe c:\windows\system32\utilman.exe.bak
  5. Again type this command like to rename cmd.exe to utilman.exe
  6. copy c:\windows\system32\cmd.exe c:\windows\system32\utilman.exe
  7. Now close the command prompt and shut down the PC also remove the Windows 10 DVD
  8. Power on your PC, and on sign in page click on utility icon. As soon as click on utility icon command prompt will open.
  9. Type this command to add a new user with a password
  10. net user /add alltechtrick iloveyou
  11. Here “alltechtrick” is a new username and “iloveyou” is the password, you can set your own username and password.
  12. Now make that new user as administrator by typing this command.
  13. net localgroup administrators alltechtrick /add
  14. Restart your PC, and login with your new user here its “newhackingtricks”, give the password “iloveyou”.
  15. Now open Computer Management then selects Local Users and Groups
  16. Select your old user, that your forgot password and right click on it and set a new password without knowing the old password.
  17. Restart your PC and login to old user and delete the new user “newhackingtricks” from computer management.
Everything is fine except your utility icon becomes a command prompt, if you want to get it can then Put the Windows 10 DVD and do the method top open command prompt said in step 2. Now run this command

copy c:\windows\system32\utilman.exe c:\windows\system32\cmd.exe

Then you need to restore utilman that you made a backup by this command

move c:\windows\system32\utilman.exe.bak c:\windows\system32\utilman.exe
Hope you have successfully reset your Windows admin password with this post How To Reset Windows 10 Login Password
Read More
// // Leave a Comment

Check if your Online Account has been Leaked in a Data Breach

A data breach is defined as an incident where private and confidential information is illegally viewed, used or accessed by a malicious entity. In May 2016, passwords of over 100 million LinkedIn users were stolen by hackers in a major data breach.
Similar incidents of data breach have occurred in the past, and there are no signs that can tell that they won’t occur in the future. During a data breach, personal information such as email ID, passwords, date of birth, addresses, credit/debit card numbers, bank accounts, etc., are potentially exposed to hackers. Depending on the leaked data, hackers can:

• Commit identity theft – can open fake bank accounts under your name

• Hack other accounts – using the leaked password and email ID, they can access your other online accounts

• Launch phishing attacks – using personal information such as your name, date of birth, address, etc., they can target you with specially crafted phishing emails and steal more sensitive information

In short, data breaches are bad news. We have come across a site Haveibeenpwned.com where users can check if their online accounts were leaked in any of the data breaches that happened in the past. Using the site is simple. Just enter your online account (email ID or username) and click on pwned? as shown below.

# If your account was compromised in any breach, it will show up like this:

What should you do?
Change the account’s password. Choose one that is made up of a mix of uppercase, lowercase letters, special characters, and numbers. Something like this InoNothin@343#

# And if your account was not compromised, it will show up like this:

have i been pwned2

What should you do?
You don’t have to worry for now. But still, if you haven’t changed your password for quite some time, consider changing it. Better safe than worry.

So, pay a visit to Haveibeenpwned.com and run a quick check on your online account.

If find this post helpful, share it with your friends and peers.

Read More
// // Leave a Comment

How to use internal Hard disk memory as External Virtual RAM.

How to use internal Hard disk memory as External Virtual RAM (Random Access Memory) in Windows 7 and XP.

The process will use our Internal Hard disk memory as virtual memory to use it as External RAM. We can able to choose a different memory for our each windows drive to use it as Ram.

You have to just follow certain simple steps:-
  • Open System Properties Window
  • Navigate to “Advanced” tab.
Note: For Window Seven users first click on “Advanced System setting” on the left side of system property screen and then go to “Advanced” tab.
  • On the “Performance” Section Choose “Setting“.
  • On the open “Performance Option” window Navigate to “Advanced” tab.
  • On the “Virtual Memory” Section click on “change“.
  • It will open Virtual Memory Window.
  • Uncheck the option “Automatically manage paging file size for all drives” for manually allocate memory to use it as RAM from each Windows Drive.If you check the option then Windows will automatically use memory from each drive to use it as RAM.
  • On the drive name Select the drive where you want to allocate memory.
  • Below that you will find an option “Custom Size“. Click on that and allocate the memory from that drive to use it as RAM. Otherwise select the option “System Managed size” then Windows Will automatically allocate some memory from that drive to use it as External or Virtual RAM.
  • Now Click on “Set“.
  • Similarly you can also repeat the process for other drives also.
  • If you want to remove this then Choose “No paging file” on step9.
  • Now click on Ok. and save all the open Window by clicking on “OK“.
Video Tuts:

Note: This will create a “pagefile.sys” system hidden file whose size is same as the virtual Ram.
Read More

Thursday, 21 July 2016

// // Leave a Comment

How Hackers Can Hack Facebook Account Password In 2016

I will show number of ways to Hack Facebook Account that all hackers usually use to hack Facebook Account. So beware from hackers and protect your facebook account from hackers. Our site provides only security tips to protect your facebook account from hackers . We sharing only these methods because if you know how to hack you must know how to secure. Must read carefully all these methods, beware from all attacks, and protect your facebook account from hackers.
#1 Hack Facebook Account Password By Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims “Email Address” and “Password” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

#2 Hack Facebook Account Password By Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim’s computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

#3 Stealer’s

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer’s are software’s specially designed to capture the saved passwords stored in the victims Internet browser.

#4 Hack Facebook Account Password By Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

#5 Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it’s still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it’s more targeted towards WiFi users.

#6 Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are: Mobile Spy, and Spy Phone Gold.

#7 DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

#8 USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

#9 Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

#10 Botnets
Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.

Mostly hackers use these methods to hack facebook account password, We are shared this ways/post only for security purpose. We get numerous emails on a daily basis asking us to how to Hack friends Facebook or E-mail account  If your email falls into any of the above categories we will not help you.
Read More

Tuesday, 19 July 2016

// // Leave a Comment

How to Clean Out & Organize Your Computer

If you haven't been organizing and discarding files as you go, it's likely your hard drive is stuffed with downloads, unwanted photos, file copies and other digital dust bunnies. This can reveal itself in slower performance, that unsettling humming noise, and the Mac's dreaded spinning wheel or Windows' inverting hourglass.
You may even have, like me, taken advantage of the Mac's awesome Migration Assistant to shift all your documents, files and settings from one Mac to another -- only you now have duplicate Downloads and Documents folders in different destinations, causing bafflement every time a file is saved.

Deep cleaning your computer of unwanted files and streamlining your folder system can not only free up storage space, but improve your computer's performance. From decluttering tips to apps that do your organizing for you, here's how to spruce up your computer and make sure it stays that way.

1. Cleaning
Find duplicate files

You'd be surprised how much storage is used up by duplicate files, whether they're files you saved twice to different locations or multiple downloads of the same file. If you buy music on iTunes, you may have a few gigabytes of duplicate songs from, say, buying a greatest-hits album that contains tracks you already own.

The easiest way to find those superfluous files is to download a third-party app that will scan your folders for duplicate content, then let you review the dupes to decide if the extras should be deleted.

Mac: Head to the App Store on your computer and search for “duplicate cleaner.” We like Duplicate Detective ($2.99), a simple app with a straightforward interface for hunting down duplicates. Duplicate Cleaner For iPhoto (free) is an easy to use app for zapping double images, even if they've been edited.

If you fancy doing it manually, you can also click All My Files, order the files by selecting Name from the drop down sorting icon, then scan for files that have the same name. However, this method is less effective if you've saved the same file under different names.

Windows: There are quite a few good options for free duplicate zappers for Windows, so we'll skate over the manual method, and recommend Duplicate Cleaner (free) and DupeGuru (free, no official Windows 10 support), which comes in three versions: regular, a Music edition and a Pictures edition that can find duplicate songs and images even if the files are coded differently. For example, if you have the same music track at different bitrates, or if a picture has been resized or slightly edited, DupeGuru will flag it and let you decide which to keep.

Clear your system's cacheThe processes your computer runs through when you use files or programs creates tons of tiny, temporary files that help it retrieve the information you're need faster. Clearing your computer of all these can often help speed up its performance.

Mac: Start with Disk Utility (Applications > Utilities), and hit First Aid > Repair to scan and patch up your hard drive. Next, search for “Mac cleaner” apps on the App Store, such as Dr. Cleaner (shown), to clear your computer's cache of temporary files from browsers and other programs. Dr. Cleaner found 12.89GB out of my meager 140GB storage that could be reclaimed, with 12.82GB coming from application-cached files. This app also gives you to option to clear your Downloads folder, but unless you have a clever structure in place to automatically save important downloads (see the final section for relevant tips), don't check that box just yet.

Windows: For Windows 10, search for "Disck Clean-Up" in the search box, and for Windows 8, head to the Control Panel and find Disk Clean-up. If you're on older versions of Windows, find it in System Tools. You can then start cleanup for temporary and system files that are no longer needed.

Clear the downloads folder of unnecessary files
The Downloads folder can be expunged of detritus such as PDFs of old plane tickets, GIFs and humorous cat pics from emails, torrent links to files you now have, .dmg (Mac) or .exe (Windows) installers of apps you now have, and so on.

Mac and Windows: Open the Downloads folder, and view its contents by file type, then go through each category and drag the unneeded files to the Trash (Mac) or Recycle Bin (Windows) or right click and select Delete (both Mac and Windows). Make sure you Empty the Trash or Recycle Bin when you're done.

Leave the documents, photos, music and videos for now. They can be dealt with when you're ready to start sorting the files you want to keep (see the next section).

Delete applications
Mac: You can delete unused programs by dragging them from the Applications folder into the Trash. This deletes most files associated with the app, such as data generated, but not preference files and support files. Preference files contain info about your settings in the app and are usually only a few kilobytes, while application support files can range from kilobytes to gigabytes when it comes to large media apps such as DVD Studio Pro or GarageBand.

To delete these, head to Finder, click on Macintosh HD (or Home) > Library > Application Support, where the files will be listed by app. You may even find some old files from apps you'd thought you were totally rid of. Dump them in the trash by dragging and dropping. Be careful in here: only delete files from apps you know you deleted, otherwise you may end up deleting crucial files from, say, Microsoft, which makes the Silverlight video plugin you probably use regardless of whether you have any Microsoft programs. Alternately, try out AppZapper, which lets you delete five apps and all their associated files for free; after that it costs $12.95.

Windows: Windows PCs have a pretty spiffy uninstall feature that removes everything associated with an app, so on all versions of Windows, head to Control Panel > Programs and Features, select a program and select uninstall.

Although some programs may leave behind settings info in the registry, a database of configuration settings, the data is minimal and Microsoft recommends not modifying the registry unless you really know what you're doing.

Defrag? Still?
In the long-ago times of early 2000s computing, most of us incorporated disk defragmentation into our cleaning rituals. Disk fragmentation occurs as a file system loses its ability to keep related data together, causing the hard drive to work harder to bring up data related to current tasks, thus slowing down performance.

In general, Mac computers don't need to be defragged, especially newer Mac laptops that have solid state drives (SSD), use a different method of maintaining data. Windows 8  and Windows 10 automatically run a disk defrag (now called disk optimization) on a weekly schedule for machines with hard drives.

If you want to hasten a defrag (or optimization), Windows support has the lowdown for Windows 8 computers (says it's for Windows 8 but also works for Windows 10 machines with hard drives) as well as PCs running Windows 7 or older.

Zap spyware and trackers
It's possible that in the course of your internet browsing, you acquired some trackers, spyware or even minor viruses (unless, of course, you have been using up-to-date security software). Even so, malware is an ever-evolving beast, so it's a good idea to run a scan of your system with an anti-malware program such as Avira Free (Mac/PC), which scans for viruses, trojans, trackers and other malware.

Finishing touches
Mac: In Finder, if your Favorites column contains links to unused folders, delete them by right-clicking and selecting “Remove from Sidebar.” And don't be afraid to remove applications from your Dock unless you really need daily access to them. Just close the app first, then hold on its icon in the Dock, and drag it to the Trash.

Windows: Minimize the number of programs that get to be in the Start Menu (Windows 10 and Windows 7) or Start Screen (Windows 8) by right-clicking the unwanted app, and selecting “Unpin from Start Menu.”

2. Sorting
Now that we've cleaned things up a bit, we can get down to gathering all files of a type.

Merge duplicate folders
If you have two folders with the same name and they should really be the same folder -- say, two "Invoices" folders squirreled away in different parent folders (or in my case, two of every important folder) -- you can manually merge them.

Mac and Windows: Choose which folder will be the one you use henceforth, then select all the files from the other folder and drag or Copy/Cut+Paste into the desired folder. If files have the same name – either because you saved twice to different locations, or simply because you accidentally named different things the same – select to “Keep Both” and sort out the naming later.

Find a home for photosFirst, identify where all your pictures might be – for example, the Downloads folder if you often download from email or Facebook; folders for imports from phones and digital cameras; or a cloud storage service such as Google+ or iCloud where they may have auto-synced from your smartphone.

If you use an iPhone and a Mac, assuming you're on iOS 7 or newer, your photos will be synced to Photo Stream and viewable on iPhoto on the Mac.

If you use an iPhone and a Windows PC, Apple's My Photo Stream automatically downloads the most recent photos to your PC, viewable in C:\\Users\[user name]\Pictures\iCloud Photos\My Photo Stream. Make sure you have iCloud installed and that Photo Stream is turned on in Settings > iCloud > Photos.

If you use an Android phone, your photos may be auto-synced to your Google+ account (on the phone, open the Photos app > Settings > Auto-backup toggle), or you can import them via USB connection to a folder on your computer.

Mac and Windows: Next, create the master collection of photos. You may want to simply download all photos from, say, Photo Stream or Google+ to your computer, but with digital cameras allowing infinite shots of the same scenes, this can quickly fill up your hard drive.

Instead, consider purchasing an external hard drive specially for photos, then transferring photos from your phone and digital camera into the hard drive, followed by moving any other photos on hard drive folders into the external photos-only drive.

Alternately, a cloud storage service for your photos can be a handy means of ensuring a backup even if your devices are lost or damaged. Our list of the best photo-sharing sites includes ThisLife, which pulls together pictures from your social media accounts, including Facebook and Instagram, and allows uploads from your hard drive too.

Move all your documents to the Documents folder
Sounds obvious, but I have docs floating on my Mac desktop, in my Users folder and in Downloads. Comb each folder for documents then move them to their rightful home via copy/cut and paste.

Move all songs to the Music folder and all video to the Movies/Videos folder
There are a finite number of file types you use on your computer, and both Macs and Windows PCs come with predefined folders for them: Documents, Movies (Videos in Windows), Music, Pictures. Sort each file type into its appropriate “master” folder, and further sort the files into sub-folders later.

Alternatively...
Sorting your files manually is simple, albeit potentially time-consuming, but if you feel like taking a crack at creating some software rules to automatically organize photos, music, documents and videos across all your folders – and keep them organized -- check out the next section for Mac and Windows apps that do just that.

3. Getting Organized
Now that you're free of all digital flotsam, the next step is to build a folder system that will allow you to save files where they should go and incorporate an intuitive naming system so that when you forget where you put things, it's not so hard to find them again.

Make a nest
of folders and sub-folders. Take Documents: within this master folder, create sub-folders for major categories. For example, Work and Personal, or more specific folders such as Invoices, House Budget, or Ideas. Browse your Documents folder to get an idea of the types of files you've built up, then create the folders-within-folders you need.

Make sure to download new files to the Downloads folder
Then implement a regular Downloads cleaning schedule where you manually sort files into Documents, Movies, Music, or Pictures. If you have a bit of time to invest in building simple software rules, you can also check out a couple of apps that automate the process.

Organize new files as they arrive
Mac: Hazel (shown) is an intuitive, easy to use app for monitoring and auto-sorting any folder on your Mac. Setting up rules is extremely simple in an interface with dropdown options for each aspect of a rule (see screenshot). For example, when setting up a rule for moving music files out of downloads, instead of needing to specify file extensions (of which there may be several), you can simply select “Image” as a file type. You specify which folders that your rules apply to at the start of setting up each rule and then Hazel works in the background, popping up notifications when it moves files. It's $29, with a 14-day free trial and works on Mac OS X 10.7 or newer.

Windows: DropIt is a free, open-source app that allows you to set up rules for what to do with particular file types so that you can, for example, dictate that all .jpg files are to be moved to Pictures. To zing that rule to the Downloads folder, you can add a monitoring option so that DropIt scans Downloads for new files to apply the rule to. Other actions include copying, compressing, as well as extracting – handy to apply to downloaded .zip image or music packs that you want unzipped straight into the correct folder. Setting up a rule is a straightforward process: name the rule, select the file type, pick the action from a dropdown menu, then type in the destination folder the file should be sent to afterwards -- for example: C:\Users\[Your Name]\Pictures.

A similar app with a more novice-friendly interface is File Juggler, which costs $25 and features a 30-day free trial.

Back up efficientlySetting up a backup system is crucial. Better yet, it's a system you've taken the time to automate so that in the event of a computer crash or data loss, your most valuable documents will still be safe. For example, a cloud storage service such as Google Drive or Dropbox is handy for automatically backing up smaller files.

When you sign up for a cloud storage service, it will create a folder on your computer that constantly syncs to the cloud so that anything in the folder is saved online as well as on your computer. You might want to save all insurance applications or a long-term project to the cloud-synced folder. Depending how much storage you have, you may want to save special photos. Amazon Prime subscribers, for example, get unlimited storage for full-resolution photos. Check out our feature on cloud storage services to see what works best for you.

If you're backing up larger media files, such as songs or videos, you can purchase external hard drives with 1TB or more of storage (A terabyte is 1000GB, which can hold up to 250,000 photos or 1,000 HD movies). You can get the 2TB Western Digital Elements for $78.44 on Amazon or the sleeker Seagate Backup Plus Slim for $99.40 on Amazon.

LaCie and Western Digital both offer 1TB Wi-Fi drives— the LaCie Fuel ($179.99 on Amazon) and the Western Digital My Passport Wireless ($149.00 on Amazon), which allow you to send and back up files from your smartphone as well.  Some, like the Western Digital My Cloud external drive, offer 2TB to 6TB (starting at $123.23) of storage in a personal cloud, accessible from other connected devices and handy for creating two backups – one in the cloud, one on the drive itself.

The ultimate folder nest? Save long-term projects and other crucial files to a cloud-synced folder on your Wi-Fi hard drive for one-click multiple backups of your work that won't crash even if your computer does.
Read More
// // Leave a Comment

Top 10 Good Tech Habits Everyone Should Have

You've probably heard people tell you should back up your computer, or you should have more secure passwords. Good tech habits aren't just for geeks—they can save you money, keep your personal information safe, and help you avoid frustration down the road. Here are ten tech habits everyone should have.
10. Regularly Audit Your Privacy Settings on Social Networks
You probably already know that social networks like Facebook aren't the poster child for privacy. Unfortunately, the only way to keep your info private—short of quitting those networks altogether—is audit your privacy settings every once in a while. Learn what each of those settings does and tweak them accordingly. You might also check out sites like AdjustYourPrivacy.com to keep up with your privacy settings on all your networks.

9. Know When You're Paying Too Much for a Product
Technology isn't cheap, but it doesn't have to be a complete drain on your wallet, either. There are a lot of myths out there that'll cost you money—like buying expensive "gold plated" HDMI cables, or buying new gadgets when refurbished ones are just as good. Check out our list of money-saving tech myths for more, and never pay full price again.

8. Keep Your Desktop and Hard Drive Free of Clutter
If your desktop looks like the picture to the left, then it's time to clean things up a bit. Not only does a cluttered desktop make things harder to find, but if you're on a Mac, it can even slow down your computer. Once you've gotten that messy desktop under control, make it a habit of keeping it organized, and transfer those same ideas to the rest of your files and folders too. The easier it is to find what you're looking for, the less time you'll spend frustrated.

7. Avoid Getting Malware (and Spreading It to Others):
We all know viruses are bad, but many of us don't know exactly how they work—which is crucial to avoiding them. Do a little reading on what a virus is and examine the most common virus myths, then install a good, free antivirus program on your computer (and get rid of any existing viruses while you're at it). Also, even if you aren't getting viruses, you could still be spreading them—so watch out for that too.

6. Stay Safe on Public Wi-Fi:
When you're desperate for Wi-Fi, it can be tempting to connect to that open "linksys" network or the password-free network of a nearby Starbucks. However, doing so opens you up to all sorts of attacks. It sounds a little tin foil hat-y, but you really should be worried about your security. It doesn't take any hacking experience to sniff out someone's Facebook or other credentials, all it takes is a little evil motivation. And don't think just because a network has a password that means it's safe—if other users are on that network (besides you and your family members), they can access your data. Stay safe when you're on public Wi-Fi by turning off sharing and using SSL whenever possible.

5. Be Smart About Hoaxes, Scams, and Internet Myths:
The internet is rife with scams, hoaxes, and other misinformation that you probably run into all the time without realizing it. Sometimes it's harmful—like that fake bank email that gives your identity to scammers—while other times it's mostly harmless, like a misattributed quote going viral on Facebook. Either way, though, you should try to avoid falling victim to these hoaxes, and help stop the spread. It's actually very easy to identify these myths online, and just as easy to avoid getting scammed. Just remember: if something seems a little dubious, it probably is.

4. Know What Maintenance Your Computer Needs (and Doesn't Need):
We all know computers take a little maintenance to run in tip top shape, but there's no need to hand it over to some quack to get it done—most of it is easy enough to do right at home. Check out our list of maintenance tasks you need to do on Windows PCs and Macs for more info, or if your computer needs a little more help, read our guides to speeding up, cleaning up, and reviving your Windows PC, Mac, iPhone, and Android phone.

3. Use Secure Passwords:
Even if you think you have a secure password, you might be wrong. Yesterday's clever tricks aren't protecting you from today's hackers, and you need to be extra vigilant in this age of constant security breaches. Saving your passwords in a browser is pretty insecure too—so get a good password manager like LastPass and update those passwords for the modern age.

2. Back Up Your Computer:
You've probably heard people say it a million times, and there's a reason for it. You always think data loss won't happen to you, but it happens to everyone one day, and having a good, up to date backup is the only way to avoid frustration down the road. Plus, setting it up is insanely easy and is something absolutely everyone can do, so you have no excuse: start backing up right now. You'll be glad you did.

1. Search Google Like a Pro:


If you've ever wondered how us tech geeks know everything that we do, here's our secret: we pretty much just Google everything. With the right Google skills, you can find information about nearly any tech problem you're having, and fix it yourself without anyone else's help. Check out our top 10 tricks for speeding up and beefing up your Google searches to become a search ninja, and avoid frustrating calls to your resident computer tech for advice.
Read More

Friday, 15 July 2016

// // Leave a Comment

Free Easy Ways To Repair Your Computer At Home

Clean Your Registry
These tips particularly pertain to aged variations associated with Home windows as well as computer systems that have observed lots of motion during the last couple of years.

Each time a person create a main alter for your pc, Home windows improvements it’s Registry. Setting up applications, getting rid of applications, altering main configurations, along with a lot much more points just about all include info towards the Home windows Registry without having actually cleansing this.

Safe Mode
Many people I’ve spoken in order to relating to this topic appear to do not know exactly what Safe Modeis perfect for. Would you? The solution is actually which it’s with regard to repairing main issues with Home windows through switching away a few default measures:

Safe Modemay avoid the majority of applications through setting up instantly, therefore in case your issue is by using some of those applications, you’ll uncover this instantly.

Safe Mode won’t fill the actual motorists for many non-essential equipment, therefore in the event that a number of your own equipment is actually deterioration, you’ll uncover this instantly.

Safe Mode may also assist you to uncover harm through infections, however we nevertheless believe your own anti-virus software program is much better outfitted to cope with individuals difficulties.To access safe mode, press and hold the F8 key when your computer starts booting.

Blame Windows
Occasionally the issue together with your pc is the operating-system, Home windows. Which doesn’t suggest Ms messed up—it might be that the aged computer virus erased an essential document?

You are able to obtain the “Live” Linux COMPACT DISC that won’t set up something on your pc however that will trunk Linux provided the actual COMPACT DISC (or DVD) is within your own disk generate. It is best to make use of Ubuntu:

Navigate to the Ubuntu web site utilizing a operating pc, obtain the present COMPACT DISC or even DVD, whatever you want (DVDs convey more things however consider lengthier in order to download), burn off the actual COMPACT DISC or even DVD AND BLU-RAY, as well as place it inside your pc. Restart your pc and find out in the event that this functions.

In the event that Linux could possibly get your pc to operate, after that there’s absolutely nothing incorrect using the hardware—there’s some thing incorrect along with Home windows that provides all of us to the following suggestion with regard to how you can restore your pc.

Reinstall Windows
Within the Home windows ninety five as well as 98 times, all of us accustomed to reinstall Home windows regarding one per year simply to maintain points shifting efficiently. Which was the best thing regarding Home windows XP—it had been steady with regard to considerably longer intervals. However should you obtain a issue within Home windows that you simply can’t repair every other method, reinstalling Home windows continues to be your very best choice.

It’s vital that you back-up all your essential documents before you decide to reinstall Home windows. In case your pc won’t trunk Home windows, possibly make use of the Linux technique referred to over to get into your own documents as well as duplicate these phones Dvd disks or even exterior hard disk drives, or even consider the actual hard disk from your pc as well as make use of a good exterior hard disk adapter in order to duplicate the actual documents to a different pc.

Following copying your own documents, reinstalling Home windows ought to be simple. The majority of computer systems nowadays allow you to reinstall Home windows from the unique admittance inside your trunk menu—if a person can’t discover that choice, seek advice from the actual guide that included your pc or even make use of a operating pc to find your own type of pc on the web.

Blowing Your Problems Away
When the issue together with your pc is actually equipment, not really software program, presently there might not be a lot that you can do. Most contemporary consumer electronics aren’t area serviceable—if they’re shattered, they’re rubbish. Nevertheless, there’s something that you can do to create a few consumer electronics to existence: whack in it.

Particularly, hack the actual pull out of these. Dirt is really a effective insulator—it’s officially nearly a similar things (primarily cellulose) utilized in high-end house padding to keep warmth within your home throughout the winter season as well as outdoors throughout the summer time.

Using the dirt keeping heat within your pc, components start to fall short. Most contemporary consumer electronics are just made to build up till regarding thirty-five Celsius or even 110 Fahrenheit prior to instantly closing away to avoid serious harm or even fireplace.

Final Words:
In the event that not one from the methods referred to over assist a person repair your pc, It is best to demand assist. Phone the actual manufacturer—even in case your pc has gone out associated with guarantee. The majority of producers possess toll-free assistance amounts, therefore the phone won’t set you back something and also the most detrimental that may occur is actually which they’ll struggle to assist you to free of charge.
Read More
// // Leave a Comment

How to Disable USB ports on Windows PC via Registry

With this trick, you can disable access to your USB(Universal Serial Bus) ports on your Windows based PC to prevent people from taking out data without permission or spreading viruses through the use of USB (pen and flash) drives.

  1. To use this trick to disable USB ports, follow the steps given below:-
  2. Click on Start.
  3. Click on Run. If you cannot find RUN, type it in the search box.
  4. Type "regedit" without quotes. This will launch the Registry Editor.
  5. Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
  6. In the work area, double click on Start.
  7. In the Value Data box, enter 4.
  8. Click on OK.
  9. Close Registry Editor and refresh your desktop.
  10. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.

Try it yourself to make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

Note: This trick also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.
Read More

Thursday, 14 July 2016

// // Leave a Comment

Five Best Proven Ways To Speed Up Your Personal Computer

When you buy a PC, it will work very smoothly; day-by-day the performance of the personal computer will be automatically degraded. Most of the people will buy a new PC, if the performance of their personal computer gets worse. In this post, I have shared the simple ways from which you can easily speed up your personal computer.
Speed up the Startup: The foremost weapon to speed up your personal computer is speeding up startup programs. In sometimes, your coffee can brew in a same time your personal computer takes to boot. If the number of programs in the startup gets increased, it will reduce the speed. So it’s strongly advised to remove the unwanted programs from your startup program lists. You can remove unwanted programs in the MSconfig utility of your personal computer. If you want to remove unwanted programs from the list, open the Run and type MSConfig in it. Go to startup tab and uncheck other unwanted services and programs from the list.

Make updates automatically: It is always wise to turn your updates into automatic mode, updates will make your device work faster. But updates notification is annoying, and we can click remind me later to avoid annoying update information. If you were doing like that, soon your device will make you feel frustrated by slowing down. So that it is always wise to run the updates automatically, so that you can keep your device up to date. If any program requires manual updates, find out those programs manually and update them by yourself. This makes your PC to work faster than before, never feel irritated for updating the software on your personal computer.

Slim Down: Some programs cannot be easily removed; they play an important role in your daily life. I suggest you to replace heavy weight applications with low weight software, for example, a software package such as Microsoft Office require more amounts of RAM usages and require more data to install it on your personal computer. But you can use alternative software such as Open office to reduce the usage of RAM and storage space on your personal computer. Likewise, you can use VLC player for playing videos and audios rather than using other software.

Remove Unwanted Programs: By removing unwanted programs on your hard drive, the speed of the personal computer can be easily boosted up. Using programs such as CCleaner, you can uninstall unnecessary programs in the personal computer. This softwares not only uninstall the softwares, but also it will remove the temporary files that are found in your personal computer. Clean and fix unwanted registry files periodically and make your personal computer neat and clean.

Buy Some Upgrades: Upgrade your motherboard with some extra hardwares such as improving RAM, installing graphics cards. You an do this upgrades within a budget of 100$, this will make your personal computer workfaster.

By following this simple tips, you can easily speed up the performance of your personal computer very easily.
Read More

Wednesday, 13 July 2016

// // Leave a Comment

Top 10 Tips to Keep Yourself Safe While Using Public Computers

Within an period exactly where pc and it is utilization proceed together with this daily function, no-one can end up being disassociated using the globe associated with technologies. The planet isn’t any much more divided through the limitations but instead has turned into a nearer spot to reside in, the “global village”. This particular technology has a bane just like it’s regarded as the benefit for any big trigger. The actual improve within instances associated with cyber offences is simply a good example of this. Frequently we must make use of open public computer systems, whether it is within laboratories or even within cyber cafés. However all of us occasionally really are a little bit callous within our mindset as well as that eventually causes harm to all of us as well as the privateness in particular. Therefore it is crucial for all of us to consider greatest safety measure whilst focusing on open public computer systems. Those hateful pounds tend to be enumerated because beneath:
Select a Less Interrupted Computer
The very first thing we ought to be thinking about is actually that people ought to select a pc that’s disrupted not so frequently. Numerous the instances when we’re seated in a location exactly where it’s very possible for individual’s position close by in order to research from the displays, we ought to prevent getting into the security passwords or even additional guaranteed material. Regardless of exactly how uninterested the individual close by may appear, we ought to also have the safety measure available. Therefore we ought to usually choose the chair that is within the part or even a minimum of nicely guarded through common look at.

Use Portable Software or Live CD
It is usually recommended to transport transportable software program within the HARDWARE or perhaps a Reside COMPACT DISC is available in useful where ever it’s feasible. This can help within browsing within our personal atmosphere as well as therefore provides safety in the typical pc web browsers. Several resources with this respect is often as MojoPac, Transportable Opera, Transportable I’M answer such as Miranda or even Pidgin or even couple of internet Messengers such as Google Messenger, Meebo, Search engines Speak. Reside Compact disks such as Ubuntu or even Knoppix may also be very helpful.

Delete Your Downloaded Files
It’s very typical for that customer in order to obtain or even produce documents as well as files about the computer systems however all of us frequently overlook in order to remove this kind of documents as well as files as well as depart all of them on the pc by itself which may be utilized through additional customers. Therefore the 3rd indicate end up being considered is actually that people must always remove the actual documents as well as files that people possess produced or even down loaded in the hard disk drive. To make this much more guaranteed and become completely sure no-one can entry this kind of documents or even files we are able to make use of software program such as Ultrashredder, which is transportable as well.

Make use of home windows on-screen computer keyboard with regard to getting into e-mail accounts particulars

The most typical as well as simplest device with regard to cyber criminal offense is actually using Keylogger. Essentially the keylogger is really a software program which assists within monitoring exactly what you have tapped out within the computer keyboard. The actual power associated with this kind of software program is available in useful for that business workplaces given that they may monitor do you know the web sites which their own workers browse via as well as that they make use of their own pc. The program functions within the history as well as what ever is actually keyed in with the computer keyboard is actually delivered to a contact tackle inside a record type or even every other this kind of type because developed. Nevertheless the actual improper use associated with this kind of software program is necessary whenever 1 types-in guaranteed info such as the login as well as security passwords in order to open up the e-mail company accounts or even browse via numerous social network websites. Once we open up the company accounts such software program allowed computer systems the actual account is actually delivered to a contact tackle that is currently feeded plus they are submitted because basic textual content, this provides you with the actual recipient a good use of the accounts. To prevent this particular make use of home windows on-screen computer keyboard with regard to getting into account for the e-mail company accounts along with other individual company accounts.

To select on-screen keyboard got to Start-> All Programs-> Accessories-> Ease of Access-> On-Screen Keyboard
,
Check the status of security solutions installed
The issue offers its numerous options as well as each one of these offers it’s much more significance. However absolutely nothing may complement the actual deterrence associated with open public computer systems as well as only use individual types, reported by users “precaution is preferable to prevention”. Among additional options obtainable the first is to check on via numerous anti-virus software programs in the event that this kind of software program is actually set up or even not really. The anti-virus software program is probably not, occasionally, powerful sufficient in order to identify this or even even worse sufficient presently there isn’t such software program actually set up. Therefore the best choice available would be to possibly produce once security passwords that will get ruined following you have logged within therefore despite the fact that the actual pass word is actually delivered but nonetheless 1 can’t entry the actual company accounts because the next time a brand new pass word is needed.

KYPS is actually one particular web site that assists all of us to create this kind of several security passwords. Apart from that one could also choose to deliver the actual mails to some supplementary e-mail accounts. Therefore even though one’s account is actually hacked it’s the supplementary 1 as the main the first is nevertheless undamaged as well as safe.

Clear web browser history
You ought to keep in mind in order to obvious the actual remnants or even background from the web sites frequented. The actual short-term web documents as well as saved security passwords as well as cache ought to be taken off the actual internet browser to ensure that presently there isn’t any kind of info left out which may be utilized by somebody additional person. If you work with Mozila Opera you are able to consider the benefit of personal searching additionally.

A few software packages may cleanse all of the rubbish documents, identify Adware and spyware, remove abandoned registry secrets, Automated Car owner improvements, and much more. Not really most people are comfy cleaning background or even removing short-term documents therefore purchasing software program may be the solution for many. You will get a totally free check out for the pc to determine exactly how this functions before you decide to purchase.

Never forget to logout
Carelessness upon type’s component may usually result in the devastating impact. Therefore you ought to ensure that what ever account/s 1 firelogs in to, you ought to usually record from it. This can be a excellent guideline to assist safeguard your web company accounts. A lot of us believe that just by shutting the actual eye-port display or even the actual tabs we now have logged away however numerous social network websites or even e-mail providers maintain 1 logged within instantly even though you have shut the actual eye-port. Therefore you ought to always be certain in order to record from the accounts.

Online purchase while using public computers
Regardless of exactly how essential it might be however you ought to in no way make use of open public computer systems exactly where using private information will be provided or even you have to create repayment. You ought to in no way take on dealings which include charge cards or even PayPal company accounts on the open public pc.

Re-boot computer after your use
Finally, among the most secure and incredibly efficient calculate like a safety measure is usually to restart pc following its utilization because this particular not just obvious the actual MEMORY from the pc but additionally the actual pagefile is actually removed

Therefore all of us observe that of all of the resources as well as comfort and ease which technologies earns the existence we’re in no way as well really far through improper use with this techno-driven marketplaces. Therefore the next time whenever you take a seat on the open public pc maintain these types of preventive steps within the thoughts without a doubt.
Read More
// // Leave a Comment

How to Open / Access Blocked Sites Without Installing Any Software

What will you do if any site is blocked??? This issue become a hot potato in offices, colleges and schools etc. You may hear it on the grapevine that there are many ways to access the blocked sites and you cut corners for unblocking the sites. Then you may Google the solution for accessing those sites in crooked way. Then at last you may end up with some software solutions. At last after downloading and installing the software you might know that that cannot solve your problem.
When you get free time, you may opt for downloading some music or videos from sites like Torrent and YouTube. Most of the colleges and offices may block them including the social networking sites like Facebook, Google+ and Twitter etc. Here come some handy ideas for open/access blocked sites without installing any software and spending time and money.


Some fortune cookies for unblocking your favourite sites:

1) Access blocked sites using their IP address.
Mostly the admins block the websites by means of building a black list of domain names of the sites. The domain names of the website are the website URL and whenever a person, tries to access a site, the server checks whether the URL is in blacklist or not. If it is in blacklist, it will be blocked and cannot be accessed by the user. For solving this, the user has to input the IP address of the website in the address bar instead of URL. To grab the IP address of the website, just run the CMD and ping the website name. For example, if you ping www.facebook.com, the CMD displays the IP address of the website you wish to access.

2) URL shortens service for unblocking sites.
For your bad times the admin may block Command Prompt. Then you may feel blue. Then the utilization of URL shortens services can open blocked sites for you. Firstly you have to open a website URL shorten service such as http://goo.gl or https://bitly.com. In a URL shorten box you are supposed to put the website name you wish to unblock. Then click on the shorten URL. After clicking, you will be provided with a short URL of the website you have entered. Suppose you type www.facebook.com in the URL shorten box, then you will be provided with a Short URL like http://goo.gl/NFqs1i. Then paste this URL in the address bar of your web browser for the unlimited joy of surfing.

3) UseProxy server in a web browser
Are you still fed up with the blocked websites? Just open the web browser and click on the advanced settings in Settings. Then select ‘Change proxy setting’ by selecting ‘Show advanced settings’. Change the LAN settings by clicking on ‘connection’ tab. Then enable proxy server for LAN. Now enter the website address that you have to unblock with port number 80 and click OK. By this manner, you can surf any websites you want access.

4) Cut the mustard using Proxy sites
To add insult to injury, consider a situation that above mentioned solutions not working for accessing the site..!! Then you can rely on various proxy sites for bypass the proxy. This can be done without any installation and changing the settings of the browser. At the drop of a hat you can access the blocked sites with a mouse click. Just enter the site name and then bypass the proxy for unlimited access to that site. Some of the proxy websites includes Hidemyass.com, mybypassproxy.com, Anonymouse.org, filterbypass.me, Anonymizer.com, bypasslimits.com etc.
Read More

Tuesday, 12 July 2016

// // Leave a Comment

Best 5 Tips to Increase the Typing Speed

Typing speed is one of the main criteria that enhance the productivity and also efficiency in this technology world. People who have low typing speed will suffer very high while comparing to the high typing speed person. If you have faster typing speed then your efficiency will be more, in this post I have shared the best tips to improve the typing speed. And follow those simple tips; definitely it will work out for you.

Body Position: Body position is one of the best ways that allows you to type more quickly. Yeah obviously, if you have better body position, you can type faster. Let us consider the following phenomenon where you need to type a page with approximately 5000 words. If you were using a good posture for typing those bulk pages, you can easily type them without any sort of hassles. In the meantime, if you were sitting in a sitting bench and allows you to perform that task, it may take more time to complete the task. To type fast, you need to know which posture will helps you to type faster and quicker. So always sit straight in your chair and make a comfortable place to type more quickly. And if you were facing your palm in the surface of the keyboard, then you can increase the speed of the typing process.

Memorize the keys present in the keyboard: By memorizing the keys in your keyboard, you can easily increasing the typing speed of yours. If you memorize the keys, you can type without seeing the keys that are present in the keyboard. So this will let you to increase the typing speed of yours and at the beginning stage it will be more complicated for you. But after practice you can easily increase the typing speed and you can even type without seeing the keyboard keys.



Practice Practice Practice: This is the traditional method that allows you to increase the speed of our typing, it is the best way to increase the speed, in order to use this method, you need to choose a page in the daily newspaper and you should type them whenever you’re free. Either in WordPad or notepad just types the content and repeats this process daily until you see some improvements in this process.

Keep exact position of fingers: One of them main thing that is to be considered while typing is that whether you were keeping the fingers exactly on the correct words. For example, thumb finger should be placed in the space bar and index finger should be in f and j respectively.

Use shortcuts: Even if you were typing faster, using keyboard shortcuts will make you to work faster and saves your precious time. Not only with fast finger moments, we should use some sorts of keyboard shortcuts to save time and work faster.

Read More
// // Leave a Comment

How To Remove shortcut virus From Computer Latest Computer Tricks (without any software !!)

Suddenly, without any reason, he is full of computer files, shortcuts.Repeatedly to delete, again being made.Many file-folder is lost and simply unlocked.Nowadays almost everyone reading this problem.It is not a virus.This is VBS Script (Visual Basic Script).Follow the steps below to get rid of very easily.(remove virus from computer) Using the CMD.


1. Open CMD (Command Prompt - DOS)(remove virus from computer)
2. Enter the following command exactly attrib -h -s -r -a / s / d Name_drive: *. * This article Name_drive drive that you want the shortcut to enter the virus. For example: C drive to virus type attrib -h -s -r -a / s /dc:*.*3. Press the Enter button4. You will see the files and folders that the shortcut virus will become normal. I would like to delete the files and folders. Bat .bat file using the Notepad text file a ekajekiutebala. It is double-click on.1. Open Notepad.
remove virus from computer2. Copy the following code exactly - paste @echo offattrib -h -s -r -a / s / d Name_Drive: *. * Attrib -h -s -r -a / s / d Name_Drive: *. * Attrib -h -s -r -a / s / d Name_Drive: *. * @ echo complete.3. Name_Drive enter the name of the place, the virus infected drive.

If you are affected more than three drives, the command will simply just copy-paste.4. removevirus.bat diyephailati save the name.5. To close the file dabalaklika run.6. Now you see the folder shortcut virus file is normal.
remove virus from computerNow delete all.



The following strategies can also live from infected pen drive

1. Go to RUN.

2. wscript.exe written press ENTER.

3. Stop script after specified number of seconds: Apply through to the 1. The shortcut to the virus and your computer will not enter anyone's pen. Virus infected computer can

1. Press CTRL + SHIFT + ESC key on the keyboard.

2. PROCESS tab.(remove virus from computer)

3. Here, select the file wscript.exe.

4. Click End Process.

5. Now your computer's C: / drive back.

6. Wscript search using the search box.

7. SHIFT + DELETE all files in the name of wscript.(remove virus from computer)

8. The files are not deleted, skip the following day
.9. Now go to RUN.

10. wscript.exe written press ENTER.

11. Stop script after specified number ofseconds: with the 1 to APPLY. That shortcut to your computer virus-free.(remove virus from computer)

Shortcut virus and your computer will not enter the pen drive.(remove virus from computer)
Read More