Enough of Computer Tricks here...Hm... lets try some Pranks on the Novice and Rookies.. what say?So... here comes my another Exclusive...!Eject your drives in and out infinitely...A simle VB Script will serve the purpose......!!!Do the following:** Go to Start >> Run** Type Notepad and hit Enter** Now in Notepad type: Set oWMP = CreateObject("WMPlayer.OCX.7" ) Set colCDROMs...
Shutdown and Restart Trick !
My Exclusive... Again a contribution to Computer Tricks !Play pranks on your friends...****************************************************************************Shutdown TrickStimulate shutdown from command prompt !# Start >> Run# Type shutdown -s -t 10 -c "Shutting Down..."# Hit Enter and enjoy !****************************************************************************Restart TrickStimulate...
Trace Websites !
My Exclusive... another contribution to Computer Tricks !Surfing Internet...Type in the url and Hit Enter, that's it ?But...Have you ever thought what happens after that ?Lets Trace n see what happens !Do the following :# Start >> Run# Type cmd# This will open the Command Prompt# Type cd\# Type tracert www.google.com---------------------- Note ---------------------------You can replace...
Access Your Folders as Drives
Well, this is my EXCLUSIVE !!! Trick is all About : You can create Virtual Drives in your Computer. Now you can access your Favorite Folders as a drive in My Computer. What you can do ? ** Access your folders as a Drive ! ** Fool 'Computer Beginners' or your 'Friends' (Non-Expert) , as the drive will show Disk Space of the folder's drive so it seems that the disk space has increased ...
How to Clean your Keyboard- Part 1

by: Ray GeideI know most of you will not heed this advice, but KEYBOARDS CAN MAKE YOU SICK (how's that for tactfulness?). Germs live on your hands and fingers. When you type, many of them jump on to the keyboard. When someone else types on your keyboard, those germs transfer to their fingers. Or when you later type on the same keyboard, those germs reconquer your fingers. Regularly disinfecting the keyboard can prevent this.To disinfect the keyboard, turn off the computer. Then spray disinfectant on a cloth. Be sure to use disinfectant and not just any type of cleaner because not all cleaners disinfect. Also do not spray the disinfectent directly...
Web 2.0 And Why You Shouldn't Fake Reviews
by: Simon DanceThe latest offering from Ramsay's Kitchen Nightmares aired on Channel 4 last night, followed the somewhat disastrous adventures of ex-boxer Mike and his wife Caron Ciminera as they struggled to run the Fish & Anchor, a restaurant in Lampeter, West Wales. Whilst the couple's arguing appeared to better the food they were originally sending out (a mix of jarred sauces and home cook book trophy dishes) they did let slip on a fantastically poor bit of black hat optimisation, which I hope made all white hat SEOs laugh out loud.If there was one lesson to take away from the show, it would be - Don't fake reviews!In order to gauged the feeling of the local community for the failing restaurant come sports bar, Ramsay conducted a search on Google for the Fish & Anchor, to which...
Delete index.dat Files
by: Mil IncorporatedWhat are Index.dat files?Index.dat files are used by Internet Explorer and Windows to store history, Internet cache, cookies, UserData records and other information about what you have done in Internet or in your PC. Although some of their functions are useful, they are dangerous privacy threat - any person with even little knowledge about index.dat files locations and structure can see history of almost all of your computer activities. Index.dat files are not the only privacy threat but they are the most obscure and dangerous one because they are hard to find and even harder to delete. In fact, in most cases it is impossible to delete Index.dat files manually because Internet Explorer and Windows use them all the time.Where are located Index.dat files?Location of index.dat...
Ecommerce: Have Cart - Will Shop
by: Scott LindsayIn order for you to sell products or services online you will need a shopping cart application to facilitate ecommerce. While your customers simply want a way to make a purchase if they are interested in your product you will have already considered tough choices.For Instance...If you want a full solution for invoicing, statements, receipts and company financial history there are solutions that cover all of this with an application for a shopping cart that is tied to company financial data. One such company is COREsense based in New York. This service requires less redundant work because data entry on sales to a separate accounting software application is not required due to the full integration of financial data. For most companies this solution will fall outside normal budget...
Digital Signature
by: Wale WahabA digital signature is a data item, which accompanies a digitally encoded message, and which can be used to ascertain both the originator of the message and the fact that the message has not been modified since it left the originator. It is a form of authentication method which is used to authenticate the identity of the sender by convincing the recipient of a document that the person to whom the signature belongs actually signed it. An electronic document in other words can be described as any instrument that is created or stored on a computer. These include electronic mail (e-mail), letters, memos, contracts and images.Digital signatures are mathematically tied to the document they are intended to authenticate. The most widely used type of digital signature relies on public/private...
Operating Systems: File Systems
by: Sam HarnettFile systems are an integral part of any operating systems with the capacity for long term storage. There are two distinct parts of a file system, the mechanism for storing files and the directory structure into which they are organised. In mordern operating systems where it is possibe for several user to access the same files simultaneously it has also become necessary for such features as access control and different forms of file protection to be implemented.A file is a collection of binary data. A file could represent a program, a document or in some cases part of the file system itself. In modern computing it is quite common for their to be several different storage devices attached to the same computer. A common data structure such as a file system allows the computer...
Creating A Software Library
by: Jane SmithEvery business uses computer software. But not every business realises the importance of having a user friendly software library for cataloging all their software.While sharing software and using it on more than one computer is against the law, making a copy to keep in your software library in case it is ever needed is not only allowed, it is strongly advised.In this sense a company�s software library is the computer equivalent of the box that says �break glass in emergency�; it grants you access to the vital software your company uses to run its day to day business. If anything goes wrong or the original software is corrupted in any way, you have the back up you need to get you out of trouble.It�s obvious then that the library needs to be properly catalogued and kept fully up...
A History Into Microsoft Products

by: Mehmet OnatliMicrosoft Windows is the name of several families of software operating systems by Microsoft. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs). The most recent client version of Windows is Windows Vista. The current server version of Windows is Windows Server 2008.Windows 1.0 (1985)The first version of Windows provided a new software environment for developing and running applications that use bitmap displays and mouse pointing devices. Before Windows, PC users relied on the MS-DOS� method of typing...
Online Security Begins At Home
by: Scott LindsayIt is important to make sure the computer you use to access your online ecommerce site is secure. Too often a site owner takes great care to ensure the security of the site itself and may fail to take precautions to protect his or her own computer.If your website is not secure you may have difficulty accessing information, processing orders and securely accessing your own website.Most netrepreneurs will place password protections on their ecommerce site to deter hackers, but interestingly a hacker might gain access to your information by another means altogether.Personal Computer SecurityAnti-virus software � There are thousands of viruses and mutations throughout the web. Some are implemented by visiting a website while others are downloaded through email. The use of anti-virus...
The Different Between One Registry Cleaner Software And Another
by: Mehmet OnatliHere�s a fact: 92% of computers run on Windows, and every 32-bit edition of Windows has a storage sector where options and settings are saved. This sector is called the registry, and it is one of the busiest databases in a computer. As such, it is one of the databases that are most susceptible to corruption and breakage. This is why the demand for an efficient registry fix is consistently high.But there are many options on the internet when it comes to a quick registry fix.Which is the best one? Which registry fix is worth the download? Which registry fix will provide the best results?In this article, we will review five of the most popular registry cleaners available on the World Wide Web today. It is hoped that you, the reader, will be guided properly on how to choose the...
How to Clean Disc Drives

by: Ray GeideWhen your CD or DVD (disc) drive starts giving you problems, your first thought may be to replace it or take it to the repair shop, but a good cleaning may be all it needs.Below are three methods to clean the disc drive. The easiest method is the least effective. The hardest method is the most effective. Since the hardest method takes some time to do, I recommend that you start with the easiest method. If it solves your problems, congratulations. If not, try the next method.The Cleaner Disc method - this, the easiest method, uses a special cleaner disc which can be purchased in computer stores. The disc usually comes with a little...
Viewing an IP Network Camera over the Internet

by: Wes FernleyIP Network Cameras are designed to work in a Local Area Network (LAN) and over the Internet. Within a LAN, IP Network Cameras allow for motoring local to the computer network to which the cameras are attached to. With additional configuration of your computer network you have the ability to allow for your IP Network Camera to be monitored not only locally but remotely as well using the Internet.For advice on how to configure your network to allow for your camera to work over the Internet please follow this guide. Additional information can be found on www.networkcamerareviews.com.Configuration - Local Access Before you are able...
Blogging For Internet Newbies
by: Alex J. NewellBlogs means different things to different people: to journalists they are unofficial sources of information, to the ordinary Joe they are an Online diary or forum, to repressive governments they are subversive and a threat and to the Internet marketer they are a marketing tool!Starting as humble �Web Logs� kept by Internet Geeks, blogs have moved fast to occupy center ground. A good example of what a professional quality blog can look like is Jim Edward�s blog http://www.igottatellyou.com/blog/This is not a diary entry this is entertainment!Jim Edwards is an experienced journalist and user of multi media. But Newbies can learn some great lessons from this site. The obvious thing is that Jim Edwards character jumps off the page! You can do this. You have a character too! You...
Computer Security Against Data Loss And Identity Theft
by: Chris KaminskiThis week I was going to write about upgrading system RAM but while watching the news I saw the story about Hotels.com and their data theft. Last weeks big story was the data lose at the Veterans Administration. NOW .. to be clear, these were not computer security breeches but people actually carrying the data out on disk. But the point is data is valuable and this leads to computer securityThis past week alone we had 5 machines that were so loaded with spyware the machines literally stalled and were unusable. Now, knowing how low the response is when we run spyware ads I know many of you are not listening. Then, when you head to the repair shop it is already too late. Add to this the cost of the repair /clean out which usually costs many times is more then the actual machine...
Cost Of Spam And Why Use Anti-Spam Filter
by: Julia GulevichE-mail is now being abused. The flow of spam on the Internet is the proof. It is annoying to download hundreds of disgusting spam emails into the inbox looking for some legitimate messages. Not only you waste your valuable time to delete junk emails by hand, you also waste your money as each spam message in your inbox takes precious kilobytes of bandwidth you paid for. In addition, spam messages can contain viruses, which can infect your computer system, and hidden tracking codes, which work as soon as you click on the message and let the spammer know that your email address is valid. With all that said, it would be great to delete the messages that you don�t want to receive beforehand and launch your email client to pull down only good emails. Anti-spam software can do this...
Boost Up Internet Speed Without Software
Above 90% computers all over the world run Windows... and hence another computer trick.FACTBut do you know that about 20% of your internet bandwidth is reserved by Microsoft.---------------------------------------------------------------------------------------------------------Uses of Reserved Bandwidth** Windows Automatic Updates rely on this reserved bandwidth.** Fast loading Microsoft...
Choosing DVD Burning Media
by: Carolynn WongThere are many reasons why it's particularly important that we get to choose the most ideal type and, most of all, best DVD there is, especially if you're considering DVD burning. Low quality media can freeze or skip and may even not be recognized at all. Cyclic redundancy errors or �I/O� errors are also prevalent with these types of DVD media. These errors may mean that you are dealing with a dirty disco or that your DVD burner is not accepting the low quality media.Another error that you can face is a "power calibration error." This type of error can also often be due to low quality media. What you could try to help is shut down the DVD software, eject the disc, and restart the program while re-inserting freshly cleaned media.If you are trying to save up, cheap media can...
Wi-fi Wireless Internet Made Simple
by: Maxwell Z. RubinJust what is all this Wi-Fi wireless internet stuff they are trying to confuse and torment me with?It is actually quite simple, useful and most of all convenient.All you probably want to do is to share your internet connection throughout your home whether it be to other computers or so that you can sit in your bedroom and wirelessly surf the internet or send email. Perhaps as well you wish to share files such as songs throughout the computers in your house, apartment or condo.Don�t let them confuse with all this alphabet soup - b , g , a , 11 megabytes , 54 , 108.To begin with most any of the systems are beyond overkill. All will go faster than the even high speed broadband internet. Most use the same frequency as the standard cordless phones (2.4 GHz). . Be reassured the...
Printer Buying Guide

by: Microtek Lab IncPrinters are essential peripherals, performing a critical role as they render electronic information into tangible records or material output. You're simply not using your computer to its fullest potential if you are unable to print reports, presentations, letters, photos, or whatever it is you need to output. Choosing a printer can be confusing, however, in today's competitive, ever-changing landscape. This buying guide rounds out some of the more important criteria to consider before you make that all-important purchase decision.Printing TechnologiesThis is the biggest decision to make before anything else. Your choice should...
How Spammers Obtain Your Email Address And Why They Send Spam
by: Julia GulevichYou probably know that Spam is unsolicited and undesired e-mail message. Spammers are the people who send Spam. Spam is a serious problem. It is important today as never before because almost every other email message we receive is Spam. So, the question arises how spammers get your email address and why they send you Spam. Spammers can obtain your email address in three ways.One way is to guess a mailbox name for a publicly listed domain name. Many organizations have the email addresses where the first part of the email address is a general word such as �info�, �sales�, �accounts�, �support�, etc. People often use the email addresses beginning with their first name, for example, John, Sandra, Julia. Spammers simply put the first names before the @ symbol followed by a domain...