Search This Blog

Sunday, February 7, 2010

Virtual Memory too low Warning Trouble in win xp and vista

When there is less physical memory than needed, then some virtual memory (virtual RAM) is created on the disk. When there is a limit set to the size of virtual memory usage and there is not enough of it present there is a warning that frequently comes “Virtual Memory too low”.

Solution 1 :
This problem occurs when physical RAM + Virtual RAM (usually created on hard disk) together are not sufficient to take care of the currently needed RAM size, or this situation is about to arise. This usually happens when some fixed upper limit for Virtual Memory has been set. To solve this problem, you can either upgrade you physical RAM on your computer (recommended), or you can set the Virtual Memory to system managed size or you can do both. Setting Virtual Memory to system managed size means windows will set it to higher size whenever needed automatically,for this,


Right click on My computer --> goto properties, goto advanced tab, click on performance settings, now click on advanced, now click on advanced, now click on change button for Virtual memory.

On this screen select the System managed size, press OK. After this re-start your computer. This will solve the virtual memory too low problem.

Solution 2: Recommended solution is to upgrade your physical memory (RAM) according to requirements of the kind of applications that you run on your computer. If you upgrade RAM or not, the following procedure will help prevent this warning by increasing the virtual memory limit.
  • Right click on My computer icon and click properties.
  • This will show system properties window. Click on a advanced tab and click on the settings button under heading performance.
  • This will open performance options window. Click on advanced tab and click on change button under heading virtual memory.
  • Check if the space available is set to some custom value or double the RAM size ?
  • If it is not double the RAM memory size , then select the size option set the virtual memory size double the RAM Size and press set button and press OK button.
  • Restart the computer.

Breaking The XP Password

In case of user password boot the pc in safemode by pressing the F8 key and then selecting the Safe Mode option. You can now logon as an administrator and XP wont prompt for the password. Incase of an administrator account try rebooting the pc in DOS. access C:\Windows\system32\config\sam . Rename SAM as SAM.mj
Now XP wont ask for password next time You Login. Also

Go to the cmd prompt .
Type net user *.
It will list all the users.
Again type net user "administrator" or the name of the administrator "name" *.
e.g.: net user aaaaaa *(where aaaaaa is the name).
It will ask for the password.
Type the password and there you are done.
Logging In As Administrator:

Hold the Ctrl-Alt key and press Del twice. This will bring up the normal login and you can log on as Administrator.

To unhide the Administrator account so it does show up:

Start Regedit

Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList

Unhide the Administrator key by giving it a value of 1

Increase Hard Disk speed in Windows

If you like to increase/optimize your Hard Disk I/O - read/write speed without buying expensive software utilities to do that job or changing the HD, just follow next steps. With doing these steps you will increase Hard disk speed (depends of manufacture and specification, but its worth to try). The most speed improvement is visible with IDE drives; however there are reports that this tweak also does good for SCSI disks.

In any case, it won't harm your system, so try it yourself and let me know what you find!

Steps:

1. Run SYSEDIT.EXE from the start & then Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file untill you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type
5. Irq14=4096 (note: This line IS CASE SENSITIVE)
6. Click on the File menu, then choose Save.
7. Close SYSEDIT and reboot your computer.
8. Restart windows!

The speed improvement will be noticed just after the system reboots, any system info. software can be used to check the improvement.

NOKIA Universal Codes

These Nokia codes will work on most Nokia Mobile Phones
(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced by approx. 5%
(2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
(3) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
(4) *#4720# Deactivate Half Rate Codec.
5) *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
(6) *#9999# Phones software version if *#0000# does not work.
(7) *#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )
(8) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(9) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(10) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(11) #pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(12) *#147# (vodafone) this lets you know who called you last.
(13) *#1471# Last call (Only vodofone).
(14) *#21# Allows you to check the number that "All Calls" are diverted to
(15) *#2640# Displays security code in use.
(16) *#30# Lets you see the private number.
(17) *#43# Allows you to check the "Call Waiting" status of your phone.
(18) *#61# Allows you to check the number that "On No Reply" calls are diverted to.
(19) *#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to.
(20) *#67# Allows you to check the number that "On Busy Calls" are diverted to.
(21) *#67705646# Removes operator logo on 3310 & 3330.
(22) *#73# Reset phone timers and game scores.
(23) *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible.
24) *#7760# Manufactures code.
(25) *#7780# Restore factory settings.
26) *#8110# Software version for the nokia 8110.
(27) *#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair
(0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. (Favourite )
(28) *#94870345123456789# Deactivate the PWM-Mem.
(29) **21*number# Turn on "All Calls" diverting to the phone number entered.
(30) **61*number# Turn on "No Reply" diverting to the phone number entered.
(31) **67*number# Turn on "On Busy" diverting to the phone number entered.
(32) 12345 This is the default security code.

How to Hack Into a Windows(without changing Password)

How to Hack Into a Windows XP Computer Without Changing Password:

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE:-
hxxp://rapidshare.com/files/32846408/dre
ampackpl.zip
Replace tt by xx.
3. Unzip the downloaded dreampackpl.zip and you'll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press "R" to install DreamPackPL.
7. Press "C" to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)
11. Type "exit", take out disk and reboot.
12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
14. Go to commands and enable the options and enable the god command.
15. Type "god" in the password field to get in Windows.

You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.

Laptop Tips

Battery charge - Laptop autonomy
Discharge completely your battery at least once per month. 
Security - Laptop tracking
Use the CyberAngel security solution to track your laptop in case it is stolen. 
Viruses
It is not enough to have an antivirus program installed. It needs to be kept up-to-date, and we recommend to update it at least once per week. 
Windows Updates
Make sure that your computer downloads Window Updates periodically and frequently. This will enhance stability and security of your operating system. 
Carrying
Always use an appropriate carrying bag when traveling, to enhance shock absorption. Whenever you need to ship your laptop through a carrier (SUPS, FedEx, UPS, etc...), always use packaging specifically designed for laptops transit. 
Shocks
Because of they are designed to maximize mobility, laptops are prone to shocks. Always turn your laptop OFF before you move your notebook from a place to another, unless it is well stabilized on a stand that is designed to absorb shocks. 
Humidity
Laptops are very sensitive to humidity. Avoid liquid exposure as much as you can (water, wine, etc...). 
Dust
Laptops are very sensitive to dust. Make sure the laptop is never left on a floor, but that it is always high on a table, desk, stand, etc... Check vents frequently to see if they are not obstructed.  
Preventing Laptop Computer Theft
Laptop computers are easy targets for thieves.  Laptop computers are small, valuable, can be removed quickly, and are easily hidden.  Laptop computers can be worth up to $5000 or more.  The laptop computer can be pawned at a pawnshop for half its value. 
Here are a few tips to reduce the risk of having your laptop stolen. 
  • Don’t leave your laptop out in the open even for a second.
  • Remember extreme temperatures can cause damage to your laptop.
  • Transport your laptop in a nondescript case.
  • Write down the serial number and keep it in a safe place.
  • Always back up your information on disks and store them in a safe place.

What features should you look for?

Most of the features to look for in selecting a mobile antivirus solution are the same ones you're familiar with in choosing one for your PC: 
·                                 Support for your device. You have to check that any software supports the operating system and device you want to protect. For instance, most antivirus vendors are updating their products to cover Windows Mobile 5.0—but, be sure to verify before you buy.
·                                 Easy-to-use. If it isn't easy, let's be honest, you're not going to do it. Not only must the installation be easy and foolproof; but the interface I use day-to-day needs to be clear and useful.
·                                 Automatic, over-the-air (OTA) updates. Antivirus vendors constantly update their products to recognize new threats, and over-the-air is the best way to deliver those updates. If you have to wait until you synchronize to receive updates, you could be going outside wearing yesterday's virus protection.
·                                 Real-time virus scanning. This may slow your device a little, but this is the best form of protection. Antivirus software should examine all attachments for viruses.
·                                 Intrusion detection. When you set up a Windows Mobile 5.0 device, you'll find that Bluetooth and Wi-Fi are "OFF" by default. If you have an earlier version of Windows Mobile operating system, check the Help files on your device or contact your device provider for instructions on how to turn off these services. In either case, read about how to activate them safely. Then, it isn't as crucial to have intrusion detection.
·           
                      Support for you. When I have a security-related question, I want a fast answer. My company is intentionally small, and we don't have an in-house support staff. So, the type of support that a vendor offers is often a deciding factor on whether I'll buy or not. Besides an easy-to-use Web knowledge base, I want rapid-response e-mail, live chat, and phone support.

Who should build the defenses?

We don’t need to panic, but we do need to be prepared. Theoretically, defenses built into the network layer are the most effective system of protection. Ideally, sophisticated network tools could detect anomalies in traffic and take action even before antivirus vendors can react to a new threat. We’ve learned that lesson in the evolution of improving desktop security. However, according to a Forrester survey, only 9% of the North American organizations surveyed actively track or manage PDAs in their organization. In addition, wireless providers disagree as to whether or not they should invest in antivirus protection at their cell network level.
It’s interesting to note that in Japan, which has approximately five times the devices in play per capita as in the U.S., McAfee's security software comes preloaded on some cell phones. Until network defenses are up to the task, it’s up to us to use antivirus software and take other steps to protect our devices and our data. Whether you are ready for antivirus software depends on your organizations' policies and protection-in-place, your usage patterns, and your willingness to take a few extra steps to improve security. (You should always check with your IT department before you install software on your own, however.)

Mobile Security Tips & Tricks

Just as it’s too late to lock the barn if your horse has already run off, it’s too late to think about security if you’re already under attack. Fortunately, it is not too late to secure your mobile data, and protecting your Windows Mobile powered devices is not difficult.
So far, cell phone viruses haven’t been much of a threat. The vast majority of viruses don’t do any damage at all; they simply aim to prove that such threats can exist and spread. The first Windows Mobile virus, Duts, simply asked the device owner for permission to spread. Another, a backdoor named Brador, could give attackers access to the files on the device, though it wasn’t much of a threat in practice. In February, the first crossover virus, aptly named Cxover, appeared. Cxover was designed to leap from infecting a PC to infecting, and then destroying documents, on a Windows Mobile device. While it could do serious damage, it hasn’t really spread.
Gartner, McAfee, F-Secure, Kaspersky Lab, and other security experts predict there will be more—and more serious—attacks over the next year or two. In addition, the newer blended threats—a virus or worm riding on spyware—and browser-based attacks make it more difficult to mount a defense. There are several ways mobile viruses can spread. They could be transmitted via Bluetooth, IR beaming, SMS text messaging, malicious Web sites, and e-mail attachments. According to Gartner research, 30% of cell phone users in the U.S. receive e-mail attachments. As this percentage increases, it will become a more attractive target for writers of malware.

Backup Tips

“Backup” means keeping one or more extra copies of your document, preferably in separate places.  Imagine the worst:  what would you do if your computer crashed and you lost everything on it right now?  What if the building burns to the ground?  How much work would be lost?  What would you have to do to replace it?
  • Compose your document with frequent saves to your computer’s hard disk, and always consider that version to be your "original" (modern hard disks are considerably more reliable than floppy disks, CD’s, or other removable media).
  • When you stop for the day, or when you reach a milestone representing a level of work that needs extra protection, “back up” by saving the file(s) to removable media:  floppy disk, CD-RW, flash drive, etc.  Usually, you can do so by selecting File, Save As while your document is open, or you can close the document and copy it with Windows Explorer or by some other means.
    • If you work on lots of different files, consider using Beyond Compare or a similar program to synchronize your hard drive data folders with your backup media. 
  • At the earliest opportunity, store the backup in a separate physical location.  The backup should be far enough from the original that the likelihood of both locations being destroyed is extremely small.
  • If you can’t immediately store the backup media in another physical location and the document isn't too big, consider e-mailing it to a friend or colleague.  You can also e-mail it to yourself.  That way, the document is safely stored on your e-mail server until the next time you check your e-mail.
  • The second time you create a backup of a document, make it on separate media from the first backup.  That way, you always have TWO backup copies of your document.  This will protect you from computer failure or user error that destroys both the original and the copy while doing your backup.
  • If you must do significant editing to the document, save it under a different name, for example, mypaper2.doc.  Continue to use new names with each successive edition, being careful not to delete the old ones until you are 100% sure that you will never need them.  This is especially important when combining documents to make a new document:  always give the new document a different name, and always save the original pieces in case they are needed later.
  • For extra protection, periodically print your document.  That way, the document can be re-typed if the disk version is destroyed or damaged.
  • If you have lots of software installed on your computer that would be time-consuming to re-install, consider doing a backup of the entire hard drive.  Many programs are sold for this purpose, but they are more practical if you have high-capacity removable media, such as a DVD-RW drive or a USB hard drive.  If you are using a computer with Windows XP Professional, a backup program is available under Accessories, System Tools.
    • If you do have media suitable for full system backup, periodically use the Windows XP backup program and choose the option to back up "all information on this computer."  This creates what is called an "ASR" (automated system recovery) backup.  When used with the recovery CD that came with your computer, the backup can quickly restore your entire system to the state it was in at the time of the backup, programs and data alike.  This is very helpful if you have to replace your hard drive or if there is massive data loss from a virus.
Finally, make your backup efforts proportional to the value of the document.  If you are doing something simple and short that could easily be reproduced, you may not wish to back up at all.

Internet Tips

  • Know who you’re dealing with. If the seller or charity is unfamiliar, check with your state or local consumer protection agency and the Better Business Bureau. Some Web sites have feedback forums, which can provide useful information about other people’s experiences with particular sellers. Get the physical address and phone number in case there is a problem later.
    • Look for information about how complaints are handled. It can be difficult to resolve complaints, especially if the seller or charity is located in another country. Look on the Web site for information about programs the company or organization participates in that require it to meet standards for reliability and help to handle disputes.
    • Be aware that no complaints is no guarantee. Fraudulent operators open and close quickly, so the fact that no one has made a complaint yet doesn’t meant that the seller or charity is legitimate. You still need to look for other danger signs of fraud.
    • Don’t believe promises of easy money. If someone claims that you can earn money with little or no work, get a loan or credit card even if you have bad credit, or make money on an investment with little or no risk, it’s probably a scam.
    • Understand the offer. A legitimate seller will give you all the details about the products or services, the total price, the delivery time, the refund and cancellation policies, and the terms of any warranty.
    • Resist pressure. Legitimate companies and charities will be happy to give you time to make a decision. It’s probably a scam if they demand that you act immediately or won’t take “No” for an answer.
    • Think twice before entering contests operated by unfamiliar companies. Fraudulent marketers sometimes use contest entry forms to identify potential victims.
    • Be cautious about unsolicited emails.  They are often fraudulent. If you are familiar with the company or charity that sent you the email and you don’t want to receive further messages, send a reply asking to be removed from the email list. However, responding to unknown senders may simply verify that yours is a working email address and result in even more unwanted messages from strangers. The best approach may simply be to delete the email.  
    • Beware of imposters. Someone might send you an email pretending to be connected with a business or charity, or create a Web site that looks just like that of a well-known company or charitable organization. If you’re not sure that you’re dealing with the real thing, find another way to contact the legitimate business or charity and ask.
    • Guard your personal information. Don’t provide your credit card or bank account number unless you are actually paying for something. Your social security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.
    • Beware of “dangerous downloads.” In downloading programs to see pictures, hear music, play games, etc., you could download a virus that wipes out your computer files or connects your modem to a foreign telephone number, resulting in expensive phone charges. Only download programs from Web sites you know and trust. Read all user agreements carefully.
    • Pay the safest way. Credit cards are the safest way to pay for online purchases because you can dispute the charges if you never get the goods or services or the offer was misrepresented. Federal law limits your liability to $50 if someone makes unauthorized charges to your account, and most credit card issuers will remove them completely if you report the problem promptly. There are new technologies, such as “substitute” credit card numbers and password programs, that can offer extra measures of protection from someone else using your credit card.
     

Saturday, February 6, 2010

How to speed up your slow internet connection

Today a special tip for those who are still using any slow dial-up internet connection due to unavailability of any broadband connection in their area. The Web Accelerator application designed to provide the full acceleration for your routine web sites browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster than normal dial-up connection. Basically this services compressing the website text data, images and heavy graphics to open or download this data with high speed.
This technique is more useful for static websites and for email applications but don't accelerate with secure and downloading audio or video files. Some good web accelerator retains your system cache to reuse websites with faster speed and can also block windows pop-up. If you are using FTP sites and downloading any program using dial-up, then web accelerator is not for you. There are various web accelerator software are free available on internet, visit and download it to enjoy your connection.

avoid fake Security Warnings or pop-up

When you are browsing the internet and suddenly a window pop up with different messages for example" free update for your computer ","scan your computer with free antivirus". May be some pop-ups messages helpful for you but you should read first in detail before clicking it. Pop-ups basically an advertiser message or unwanted program and website that might be disturb your computer performance.
If you are working with Internet Explorer and want to block the pop-ups windows and unwanted messages. Open the Internet Explorer and click on Tools menu and go to Pop-up Blocker option, here you can Turn Off Pop-up Blocker to block pop-up from all websites. But you have option to allow some websites for pop-up. For this purpose open the Pop-up Blocker Setting. Here you can add some specific websites name to allow for pop-up and click Add. If you feel any problem to block any pop-up message due to some problem, simply click on the X at the right top of the pop-up windows.

Headphones Cleaning Tips

You should clean your headphones on the regular basis because headphones are used by multiple people so that there are chances of spreading germs from one person to another.

  • Never leave your headphone in the sunlight because it can damage the magnet of headphone.
  • To clean the general area of headphone using lightly dampened cloth or spray any cleaning fluids.
  • Always use lightly dampened cloth with warm water to rub the head and earpieces of the headphones.
  • You should keep your headphones by hanging on the wall hook.

Mouse Cleaning Tips

he mouse is the most commonly used pointing device in windows environment on the personal computers. That is why mouse required extra care as compare to the other parts of the computer. You should clean your mouse when you feel the mouse is slow to move in different directions or making some strange movements.
  • First disconnect your mouse from the back side of the computer.
  • Now read the mouse manufacturer manual about your mouse model on how to safe and clean it.
  • Open the ball cover from the back side of the mouse and wash the ball then dry it with cloth.
  • Now clean dust in the inner side of the mouse specially removes the dust on the rollers with lightly dampened cotton bud. You can use the compressed air for this purpose.
  • At the end dry it and Re-assemble your mouse then connect with computer.

Motherboard Cleaning Tips

Motherboard is the main part of your computer that contains all hardware components. Your computer motherboard could fry, if you do not keep it clean on periodically basis. Dust is the main cause to heat up your system and heat link to hardware failure. You can save your computer maintenance cost if you clean your computer on the regular basis. This will improve the cooling and performance of the motherboard components.
  • To clean your motherboard first unplugs your system power from the electrical outlet.
  • Using the screwdriver remove the side covers of your computer case and put them to one side.
  • Check all data and power cables connections. Inspect all motherboard PCI and AGP slots.
  • Remove all add-on card of your motherboard for example RAM, modem, VGA, sound card and LAN card.
  • Now blow the air around all the motherboard sides and keeping away your blower nozzle 4 to 5 inches away from main board components. You can use vacuum cleaner also for this purpose but compressed air is the better solution to clean a system.
  • At the end assemble back all cards, cables and side covers of your system.
  • I recommend you doing this after every three months if you want to save your system life.

Keyboard Cleaning Tips

When the appearance of your computer keyboard is looking dirty, yellowish or some keys creating problem to work properly then you can understand about inner side of your keyboard keys dirty as outside.
  • To clean keyboard first shut down your computer then disconnect the keyboard.
  • Now use the compressed air with long nozzle and start clean all keys.
  • Use lightly dampened cloth or spray any cleaning fluids on the keyboard keys and use paper towel to dry it.
  • Try to use any cover of keyboard if you are working in high-dust environments.
  • Always be careful to eat or drink around the computer.

LCD Cleaning Tips

Flat panel monitors are commonly used in mobile devices such as laptop and table PCs. Similarly, smart phones, PDAs calculators have LCD screens. LCD screens are much softer than old CRT screens, so they required extra care as compare to the CRT Monitors.
  • First read the LCD manufacturer manual about your LCD model on how to safe and clean it.
  • To clean LCD monitor first unplugs your LCD power from the electrical outlet.
  • Never use dirty cloth, spray any cleaning fluids on the LCD screen and paper towel to dry it.
  • Always use dry cotton cloth to clean the fingerprints and dust on the LCD screen. You can use lightly dampened soft cloth if you feel any difficulty to clean the screen

Computer Cleaning Tools

Today there are many computer cleaning products and tools are available in the market. Many computer manufacturer guide the user about their products on how to safe and clean it. Some cleaning tools are available in market for internal computer components and for peripherals. Usually some household items are also helpful to clean the computers components.
  • Cloth - For computer cleaning use the lightly dampened cloth on the computer case and use paper towel to dry it. But avoid to cleaning inside computer components or other circuit board with damp or wet cloth.
  • Cleaning fluids - spray any cleaning fluids on the computer case and use paper towel to dry it.
  • Compressed air - use the compressed air and start clean from back to front of your computer case, specially casing and power supply fan.
  • Lens cleaning kit - Always use lens cleaning kit to clean drive lens that specially designed to clean the reading/writing devices.
     

GENERAL CLEANING TIPS

You can save your computer maintenance cost if you clean your computer on the regular basis. This will improve the cooling and performance of the computer components. Your computer components could damage, if you do not keep it clean on periodically basis, because dust is the main cause to heat up your system and heat link to hardware failure.
  • Never place your computer on the ground, always use computer table or shelf for this purpose.
  • To clean computer case first unplugs your system power from the electrical outlet. Remove all cables and connectors from the back side of your computer.
  • Now blow the air around all the hardware components and keeping away your blower nozzle 4 to 5 inches away from main board components. You can use vacuum cleaner also for this purpose but compressed air is the better solution to clean a system.
  • At the end using lightly dampened cloth or spray any cleaning fluids on the computer case and use paper towel to dry it.
  • Never clean inside computer components or other circuit board with damp or wet cloth.
  • Always be careful to eat or drink around the computer.

USB 2.0 - Hi-Speed USB

What is USB 2.0?
USB 2.0 is a complete overhaul to the Universal Serial Bus input/output bus protocol which allows much higher speeds than the older USB 1.1 standard did.

USB 1.1 allowed a maximum transfer rate of 12Mbits/second. That rate is now called 'USB.' Though some manufacturers label their products Full-Speed USB. Note that this seems a bit deceptive. It
s easy to mistake Full-Speed for Hi-Speed.
As an aside, USB mice and keyboards need only 1.5Mbits/s to function. That performance level is also named 'USB' by the USB Promoter Group.

To sum it up, USB 2.0 specification incorporates three speeds: Hi-Speed, Full-Speed and Low-Speed. You as a consumer don't need to figure out all the jargons. Just keep in mind that only 'Hi-Speed USB' and 'USB' host and devices exist.
How do I know if my PC has USB 2.0?
You can identify whether your PC has Hi-Speed or not relatively easy. Open Device Manager and expand the Universal Serial Bus section. There should be an "Enhanced" USB host controller present.

Windows 98 systems may use a different name, because Hi-Speed USB drivers in these operating systems are not provided directly from Microsoft (Windows ME, 2000 and XP get their drivers through Windows Update).

These drivers are provided by the manufacturer, and may carry the maker's name (i.e. ADS, Belkin, IOGear, Siig, etc.). There should also be two standard version USB host controllers present as well. They are embedded in the USB chip which routes the differing USB speeds accordingly without user intervention.

There are currently 6 manufacturers of the Hi-Speed USB host silicon themselves:
  • ALi (Acer Labs)
  • Intel
  • NEC
  • SiS
  • VIA
  • nVidia (shows as "Standard" controller
Any other brand name that appears in Device Manager would likely be an add-in Hi-Speed USB PCI card. The makers above do not make add-in cards, but they do make the chips that are used in them.
How do troubleshoot "unknown device" error listed in Device Manager?
  • The USB device or the USB adapter requires its own power source. If your USB device or adapter came with an AC power "brick", try connecting it.
  • Here's a likely one - the front USB ports on your PC case may be misconnected. I've seen them that way from the factory. It's a good idea to check the connections against specifications. The standard order of connection is Red, White, Green, and Black. No more than 4 wires per USB bank are needed.
  • Defective device. Do not assume that all PC components work correctly out of the box. I've seen many new USB devices that do not work. If you can, try the device on another PC.
  • All drivers are not installed. Some devices will require installing the driver package before plugging in the device. Some devices will also require basic USB files from the Windows CD before the unit will function. The general rule is to always follow installation directions precisely and to have the Windows CD ready.
How fast is USB 2.0?
USB 2.0 has a raw data rate at 480Mbps, and it is rated 40 times faster than its predecessor interface, USB 1.1, which tops at 12Mbps. Originally, USB 2.0 was intended to go only as fast as 240Mbps.
How will consumers benefit from USB 2.0?
With speed 40 times more than that of USB 1.1, USB 2.0 broaden the range of external peripherals that can be used on a computer. Even with multiple high-speed peripherals connected to a USB 2.0 bus, the system will less likely to hit the bandwidth bottleneck. The new specification also inherits the current USB's Plug and Play and hot-swapping capability as well as providing backward compatibility for USB 1.1 hardware, allowing existing user base to upgrade seamlessly.
Do USB 2.0 & USB 1.1 hardware work interchangeably?
You may have heard that USB 2.0 is "backward-compatible" with USB 1.0/1.1 (Full-Speed USB). While that's true, USB 1.1 is also forward-compatible with USB 2.0. Whenever a system has USB 2.0 ports, you'll find the "Enhanced" USB controller in Device Manager, but you will also find two other USB controllers. These two to maintain backward compatibility to USB 1.1 devices. Each USB 2.0 host actually has 3 chips onboard. The USB controller routes signals to the correct controller chip depending on how a device is recognized. Where a device is physically plugged in has no bearing on how it is routed. All ports on a USB 2.0 motherboard can host any USB devices at all as long as the system and devices are healthy.

The vast majority of USB 2.0 devices will work on older PCs and Macs. None should flat-out fail unless there are other issues with the system. Hi-Speed USB devices will revert to Full-Speed operation when connected this way. Understand that Hi-Speed is at least ten times faster than Full-Speed in actual operation, so the speed difference is quite noticeable - unless you have never experienced Hi-Speed, of course.

When it comes to USB hub compatibility between USB 2.0 and USB 1.1, here some facts:
  • A powered hub is always preferable to unpowered.
  • USB hub ports are not as capable or flexible as real PC ports so it's best not to expect the world of them.
  • USB 1.1 (obsolete) hubs will work fine on USB 2.0 ports, but they cannot utilize USB 2.0 capabilities. They will default to slower speeds.
  • Hi-Speed and Full/Low-Speed USB devices can coexist nicely on USB 2.0 hubs. Connecting such a hub to a USB 2.0 port is recommended.
  • USB 2.0 hubs can be used on older USB 1.1 computers.
  • Although it is said that you can "cascade" up to 4 hubs, problems may start to arise after two hubs, it's best to minimize hub usage if possible.
  • Many USB devices don't work well on hubs. Cameras, scanners and especially USB drives are known to have problems with hub connectivity.
  • Remember that "active USB extensions" are really just one-port hubs.
Will USB 2.0 replace USB 1.1?
Not entirely, because many products such as generic keyboards, mice, joysticks and audio speakers do not require the faster speed of the new USB 2.0 technologies. Only bandwidth-hungry devices, such as web cams and high-capacity storage systems, will need all the speed. However, next-generation systems will come with USB 2 ports rather than USB 1.1.
How do I distinguish between a USB 2.0 and a USB 1.1 devices? New logos designed by the USB Promoter Group allow consumers to easily identify the new USB 2.0 products. The new colorful logo for USB 2.0 is labeled USB Hi-Speed, and the new logo for USB 1.1 is labeled with USB Basic Speed. However, most people won't miss it as manufacturers often label USB 2.0 READY Or 40 times faster than USB 1.1, on the boxes.
Will USB 1.1 devices run any faster on a USB 2.0 bus?
No. However, the new USB 2.0 archiclecture allows more high-speed USB 1.1 devices, such as web cams, audio devices, to share the bandwidth. Developers need to follow USB 2.0 spec in order to design higher speed peripherals that can take advantage of the extra bandwidth. USB 1.1 devices still operate at 12Mbps at full-speed and 1.5Mbps at low-speed on a USB 2.0 bus. Even though USB 1.1 devices won't run any faster, they can work alongside of USB 2.0 devices on the same bus.
What are USB Hi-Speed and USB Basic Speed logos?
These logos are part of USB Promoter Group's branding program that ensures the quality of USB products. The USB 2.0 certified products would display a blue, white and red logo, bearing the words Certified and Hi-Speed. The classic USB 1.1 certified products would display a black and white logo with the words USB and Certified.
Under a license from USB-IF, products must pass the compliance tests before manufacturers can use one of the two trademarked logos. The Promoter Group will take legal actions on manufacturers that label either logo on their products, which have not passed the tests.
What happen if a USB 2.0 devices are plugged into a USB 1.1 systems?
The entire bus under the USB 1.1 root hub will slow to 12Mbps. The operating system will probably notify the user about the sub-optimal configuration and recommend for a better course of action.

If several USB 1.1 hubs are connected to a USB 2.0 bus, then each of the USB 1.1 hubs will get a full 12Mbps bandwidth.
What is the max? Length of a USB 2.0 cable?
5m. however, if you cascade 5 hubs with 5m USB cables, this will allow you to connect a device 30m away.
What do I need to use a USB 2.0 device?
The requirement is similar to that of USB 1.1, but all components will have to be USB 2.0 compliant. A successful USB 2.0 connection requires a USB 2.0 host controller card, a USB 2.0 driver and a USB 2.0 peripheral.
How much will it cost to upgrade to USB 2.0?
Around $80 to $150. Currently, Orange Micro., Adaptec and IO Gear are shipping USB 2.0 PCI cards, some of which even have FireWire ports. Interestingly, almost all USB 2.0 PCI cards include an internal port, which is probably for connecting internal USB 2.0 IDE enclosure or USB 2.0 front panel.
Will USB 2.0 arrive on mobile computers?
Yes, but not in integrated solution on laptops. You will need a USB 2.0 Card Bus card. Orange Micro. is shipping USB 2.0 compliant 4-port Card Bus card. Eventually, notebook vendors will adapt to USB 2.0 technology, and we will see USB 2.0 ports on laptops. This transition won't happen until 2002 at the earliest.
Which operating systems support USB 2.0?
Microsoft has released the official USB 2.0 driver for Windows XP and Windows 2000. The version is 5.1.2600. The software is available on-line at Windows Update website. (If you don't have a USB 2.0 card installed in your system, Windows Update won't list the USB 2.0 driver as an update.)

The software company is still considering USB 2.0 support for Windows ME, but it already has decided not to bring USB 2.0 to Windows 98 and Windows 98 SE. If you have Windows 98, you will have to rely on 3rd party USB 2.0 support from USB card manufacturer.

Do USB 1.1 cables work with USB 2.0 devices?
Ideally, yes. USB 2.0 architecture uses the same cables and connectors as USB 1.1 compliant products. Unfortunately, only 3 out of 11 cables on the market are certified as USB 1.1 compliant. You may run into the cables that cause problems connecting high-speed peripherals. To avoid negative user experience, most vendors include USB 2.0 compliant cables with their USB 2 PCI cards and peripherals.

adding your favorite image to a folder

Dear friends here I have a very useful and interesting tip for you. Sometimes you have to face some problem to distinguish the folders because in standard configuration of window explorer each folder seems closely the similar to others.            
If you want to explore your folder in windows explorer's thumbnail view and make these folders are prominent then it is easier to distinguish using text name, for example you're download audio files or digital photos. But if you want to add image to a folder to distinguish with others then you should choose that folder which you want to decorate.
First open Window Explorer and right click on the folder to display the folder menu. Now choose Properties option from the menu, here a new dialog windows will appear with title "Program Properties".
Select Customize tab and click on "Choose Picture" button to add favorite image./p>
The image which you want to use navigates to that image and then clicks "Open" to view a sample of the picture inside the folder icon. Click on Ok button, if you are satisfied from that image .If you are not satisfied then choose another image.
Now at the end, go to View menu to display the folder in Explorer's thumbnail with image.
  

restore the windows XP to a previous working state

Today tip is very useful to recover the windows XP problems and then restore it in previous working state. You can recover the windows critical components and return your computer to earlier state without loss of personal data using windows XP built-in system restore feature. With new programs being installed, viruses infecting and spyware creates problem in your browsers it is not unusual for your computer to suddenly stop behaving correctly. So you can perform the windows recovery process and return your computer to earlier state within a minute. 
Follow the given steps to run System Restore wizard:
To use this feature, you will need to be logged into your computer with administrative rights.
First click on Start button> All programs> Accessories> System Tools then click on System Restore.
Now a "Welcome to System Restore" wizard will start, first read the detail instruction on left side of the page.
On right side of the page, click on "Restore my computer to an earlier time" check box under "To begin, select the task that you want to perform" area and then click on Next button.
On the "Select a Restore Point" page, click on bold date option, but try to use a restore
date as close as possible to a time just before the problem started then click on Next
button.
Now a next page will appear with title "Confirm Restore Point Selection", to restore your
computer to this date and time then click on Next button to start the restore process
Now system restore process recover the previous windows settings and your computer
will restart with "Restoration Complete" message, click Ok button to finish the process.

login with multiple ID's at the same time in Yahoo messenger?

If you have multiple yahoo ID's and wants to login with more than one yahoo ID at the same time then don't worry, you can login with more than one yahoo ID at the same time using this tip. There is no need to install any other yahoo multi messenger version, you can easily covert your normal yahoo messenger into multi messenger and enjoy your many ID's at the same time.  
Follow the given steps to change the yahoo messenger registry value:
  • Click Start button and type regedit in Run option then press Enter for next
    Here locate the location to:
    HKEY_CURRENT_USER/Software/Yahoo/Pager/Test
Here in right side panel, right click to create a new Dword value with name Plural and give it value 1.

  • Now close the registry editor and restart your computer after any changes to go into effect.

  • For signing in with new YAHOO ID open another messenger open as many messengers you need.

  • If you want to disable the multiple messenger option then again open registry editor and change Plural value 1 to 0.

  • recover lost bookmarks on Firefox

    Today cool tip will help you to recover the lost bookmarks on Firefox. You can export the bookmarks folder to a specific folder or location using import and export option in Firefox. If you are new computer user, first you should learn about the importance and need of backup, because without backup yon can lose your favorite websites list any time due to any virus, power failure and hard disk problem. 
     
    So, what happen if your Firfox's bookmarks suddenly disappear? It is very frustrating and disappointing but don't worry, Firefox actually do this job for you to create automatic backup. 
    Follow the given steps to retrieve the lost bookmarks list
    Now go to your system C drive and navigate the following path "C:\Documents and Settings\your account name\Application Data\Mozilla\Firefox\Profiles\".

    Under profiles folder, you will see a folder with random name, in our case this folder name is awrvfkuo.default.
    Double click on awrvfkuo.default folder and you will see another folder with name "bookmarkbackups". Here is actual place where firefox store your bookmarks backup



    now copy the all latest bookmarks detail and go up one level then past it.
    Here rename the file to "bookmarks.html" and now your bookmarks should be restored.

    Change The Recycle Bin's Name

    You can change the name of Recycle Bin of your system if you wish. It is very easy and interesting but it require some changes in windows registry,  
    • First click on Start button > click on Run option.
    • Type here regedit.exe and press enter then you will find there regedit editor.
    • In regedit editor you will open HKEY_CLASSES_ROOT folder, In this folder open the CLSID folder then open the {645FF040-5081-101B-9F08-00AA002F954E} folder >ShellFolder folder at last.
    • Here simply change the data value from "40 01 00 20" to "70 01 00 20". 
    After performing all above steps restart your computer then you will find option to rename Recycle name after right clicking on Recycle Bin Icon. Now you can change new name as you wish.

    How to find a lost file on your Computer?

    Today tip will help you to enjoy the quick and easy way to find lost files on your computer. Here I recommends you, try to search a file with its file extensions (for example for word file, type *.doc, Excel *.xls, Acrobat *.pdf, *.ppt and *.exe for executable files. If you don't know the name of file but know that it contains a string of text then try to search for files containing specific text, type the text you want to find from any file or folder. This is time taking process but creates very precise result. In Look in, click the drive, folder, or network you want to search. To save time, always select the specified drive or location instead of whole computer.



    Click Start Button, point to Search, and then click For File or Folders, a Search Results dialog box will appear. In Search for files or folders named, type the file name or folder name you want to find in containing text



    To specify additional search criteria, click Search Options, and then click one or more of the following options to narrow your search:
    • Select Date to look for files that were created or modified on or between specific dates.
    • Select Type to look for files of a specific type, such as a text or WordPad document.
    • Select Size to look for files of a specific size.
    • Select Advanced Options to specify additional search criteria.
    • Click Search now.