Friday, March 6, 2009

Various Spamming Methods and How to Protect Yourself

Once reserved just for e-mail, there are now a variety of ways in which spammers are targeting the unsuspecting public. While much spam can be written off as an annoying marketing attempt, there are some spam messages that are dangerous to you and your computer. Spam is now being used as a vehicle to spread Trojan horses, viruses, worms, and other unwanted spyware and malware. Many of these dangerous programs are sent with the intent to steal your identity or your financial information.

In May 2007, the world’s most egregious spammer, Robert Alan Soloway, was charged with 35 criminal violations including wire fraud, e-mail fraud, mail fraud, money laundering, and identity theft. He had employed thousands of zombie computers – those he had created a “back door” into in order to use the users’ addresses as the originators of his spam – to bombard Internet users with e-mail spam in 2003. This is the first documented case of identity theft laws being used to prosecute a spammer for hijacking someone else’s Internet domain.

In this case, the use of a technologically advanced anti-spyware and anti-spam software program could have protected many of these users’ computers, preventing them from becoming victims at all. Anti Spam products would have been able to detect harmful e-mail messages, viruses, worms, Trojan horses, and other unwanted or dangerous software and eliminate them before they ever had a chance to invade the user’s computer.

Aside from hijacking domains and bombarding users with unwanted e-mail, spammers have begun to invade other aspects of our lives.

Spamdexing

This refers to the use of spam to modify HTML pages in order to increase their relevancy on search engine lists. Luckily, modern search engines have recognized the weaknesses in their systems that allowed spamdexing and have taken steps to prevent it.

Spam on Video Sharing Sites

Sites such as YouTube are not only highly popular with the general public, but they are now being targeted by spammers as well. The most common method is to post links to web sites in the comments section of random profiles or videos. Most of these links lead to pornographic or online dating sites.

YouTube has tried to combat the problem by banning the posting of links on their web site, but spammers have managed to circumvent the security measures by replacing any dots in the web site address, i.e. www.yourwebsite.com, with the word “dot.” It would then read, “wwwdotyourwebsitedotcom.” This allows the spam link to bypass the filters YouTube has in place.
Another problem YouTube had encountered was numerous, repetitive postings in the comments sections of various videos or profiles. They now utilize CAPTCHA technology to quickly detect repetitive messages, making it more difficult for spammers to bombard comments with repeated comments.

Spam in Online Game Messaging

Nearly all online games allow player to player messaging or offer player chat rooms or message boards. Many spammers will post repetitive or annoying messages in these areas until they are kicked out of the game by the administrator or monitor.

In most cases, spam can be avoided by employing the use of a high quality anti-spyware product such as ParetoLogic’s Spam Controls & PC tools Spam Monitor 3.0. Rather than taking chances with unwanted messages flooding your inbox, or rather than risk infection of your computer by a virus or worm, use Spam Controls to automatically scan your incoming messages and quarantine spam where you do not have to be bothered by it. Also rest easy knowing your anti-spam software is protecting you and your computer from phishing scams, Trojans, viruses, worms, and a variety of other forms of malware. You receive peace of mind while your computer is protected by the most technologically advanced product on the market today.

Sunday, February 15, 2009

The Need for Data Recovery

As technology finds more ways to transfer, store, and display data, Murphy’s Law ensures that people will find more ways to lose the data. 20 years ago, any company or individual who experienced a mishap of this nature was on their own. Experienced technicians were usually too far away to help in a timely fashion.

Change came about upon the forefront of the Information Technology industry. Notable improvements were taking place in both software and hardware. However, as the world of computers grew more technologically advanced and complex, so did the risks that involved a company’s sensitive data.

The evolution of data recovery

Approximately fifteen years ago, the field of data recovery really began to grow; specialists from various locations were called in to rescue information for many clients. At this time, most of the expertise was a combination of program tools scripted to enhance hardware devices and handle the recovery procedures. Since most data recovery issues called for physical hardware solutions, several large corporations invested significant amounts of money to create laboratories designated for disassembling and rebuilding machines – with the purpose of salvaging the data from damaged disk drives.

In modern times, the need for data recovery is one based on crisis. The consistently changing and emerging technologies, based upon the frequently changing needs, makes it nearly impossible to prevent data loss before it occurs.

Analyzing the data recovery tools available

The capability and reliability of today’s data recovery solutions can be measured by taking a look at available hardware and software products. Several are on the market, but few are actually able to completely handle situations that cover the areas of physical and internal losses. We witnessed a few companies stray away from the physical side of the industry, practicing in software-based solutions, while limiting their capability in media storage recovery. Others choose to specialize in hardware because they feel software will always be dependent upon these devices to operate.

There are also a few services that have capitalized on both hardware and software aspects, developing the ultimate data recovery solution. ParetoLogic Data Recovery Pro, File Recover form PC Tools and Stellar Phoenix's programs combines the power of restoring information lost on peripheral media, as well as an internal hard drive. This proven system will restore the data from various hidden areas on your computer and even files that have been purposely deleted. The program only claims a minimal amount of space on your hard drive, yet works diligently and quickly to restore information thought to be long gone - whether that data is internal or stored on a CD.

Data recovery of tomorrow
What does the future hold for the evolving data recovery industry? In a world that has grown to encompass technology in nearly every interaction, it is safe to say that the data recovery market will remain important. Though you can literally reach across the world to find best technicians to solve your problems, one must never underestimate the power of convenience. Why wait for your personal information to be victimized by common computer errors? With innovative recovery programs, the perfect data recovery solution to end the woes of deleted files rest at your fingertips.

Have Your Files Really Been Erased?

The Scenario: Your boss has recently called upon you to deliver those original files to complete the big project. The problem is that you deleted them long ago. Suddenly, you go into a frenzy, realizing that the file has been permanently erased with no way to recover it.

Thankfully, with certain techniques, you no longer need to hyperventilate with stress. In fact, deleted files can be easily restored to your hard drive, along with those that have been overwritten, damaged, or reformatted.

The Reality of Data Recovery: Recovering data and lost files is much easier than you may think. This is because the content is not actually erased from your computer. Instead, files are merely removed from the folder where you have known it to be.

Windows users who have deleted items via Internet Explorer can normally find those files in the Recycle Bin, the first place you always want to look. If this is the case, these files can be restored entirely in a few simple steps.

The Complicated Situation: What if the file you seek is not in the Recycle Bin? Perhaps you recently emptied the Recycle Bin or deleted in a manner that prevented the file from making it there. Do not despair - there is still a great chance that this item can be recovered. This simply means that the file has been removed from the list of folders or the Recycle Bin itself, and it has been made available for reuse by your operating system. In most cases, Windows will not need to immediately reuse the disk space – and this makes the possibility of recovering those files very strong.

Data can actually be recovered or completely undeleted immediately thereafter or after a significant period of time. Of course, the chances of a full recovery will decrease the longer the file remains dormant. Chances may also be decreased by using your system defragmenter. Performing this task will delete all pointers that lead to the location of the file, making recovery very difficult. In this instance, your only chance at restoring that data is to utilize advanced software designed to dig deep into the system’s registry.

The Solution: Tools that help you retrieve files outside of your Recycle Bin typically do not come standard with your operating system. To get the best results, you will need to call upon the aid of a powerful program, an application that comprehends the internal workings of your computer and can detail clues of where a lost file rests on your hard disk.

A great way to prevent future data recovery loss would be to use a second hard disk to backup important information. This could be a USB-based flash card or removable network drive. ParetoLogic Data Recovery Pro, File Recover from PC Tools and Stellar Phoenix quality software that can be installed onto your primary hard drive, and then used to save the files you recovered on the secondary drive to maintain disk space.
If you do not have another hard drive to use, this program has the ability to store recovered files directly onto a CD without creating temporary files on the hard drive of your computer. These types of exclusive capabilities make these advanced products ideal in many situations, giving you the best chance of successful data recovery.

Increase your PC Speed

There are many problems with PCs which are simply unavoidable. Here is one you are sure to endure. After you first purchase a computer the performance is immaculate. As time goes on things began to change. In as little as three months the lightning speed you were accustomed to has slowed to a painful stagnant pace. It takes light years for the computer to start up and your programs begin to operate at the slowest of speed. The whole system behaves like it has been in a twelve round heavyweight fight.

You may fear that your PC has come to the end of its short lived life span. Instantly you dread the hassle of upgrading your video and sound card, possibly the entire hard drive. These nagging complications may even force you to ponder long and hard about purchasing a new computer.

YOU ARE NOT ALONE

The decreasing speed that you experience with your PC has been a common problem for many users. The issue may become so severe that you are driven to a point where you do not even feel like being bothered with it. There is an easier way to solve these problems quickly and effectively. By using Registry cleaners your dragging PC problems will be a thing of the past. This dynamic software is guaranteed to increase the speed of your computer.

When your computer reaches a critical state this is the sign of a tainted registry. Your registry’s primary purpose is to send out the commands which instruct programs to operate your hardware and connect you to the internet. When information has been misplaced or damaged in this area your computer will suffer the consequences. This is the cause for many errors that plague the PC with slow and sluggish performance.

THE POWER OF Registry Cleaners

The advanced technology of Registry cleaners is equipped with unrivaled features. These software seeks out those file fragments left behind by drivers that may not be working, incomplete and failed installations, programs that have been installed and uninstalled too many times as well as intrusive spyware and viruses out to destroy your system. They also increase the speed of your computer by eliminating the weight that once held it down.

SIMPLE & AFFORDABLE

Registry Cleaners allows you to scan your registry for free. This is a fairly simple and painless process in which all of your hazardous items will be identified. With Registry cleaners you have the ability to conduct automatic repairs with a few simple clicks of the mouse. These options can be configured from the Startup Management area with ease.

MORE USES

Aside from enhancing performance and speed, Registry cleaners also repairs the following common computer errors:

* Installation and uninstalling of applications
* Windows boot, start up and system shut down
* Corruption of registry and all related files
* Complications with Active X and Javascript
* Those caused by disabled driverS
* Spyware and malware infections
* Discrepancies with partition space and much more

It allows you to speed up your PC and regain control. In a matter of minutes your PC can be on its way to a quick and speedy recovery.

Runtime Errors

Are you tired of runtime errors ruining your workday? Sick of programs being unable to run at the most crucial moments?

If you are looking at this page, you are probably very confused. Computers are supposed to be the height of modern-day technology. PCs were made with the user in mind - to provide maximum stability, comfort, and convenience, by professionals that know what they are doing. These things should not be breaking down, and your programs should not be crashing for seemingly no reason whatsoever. It is confusing and frustrating, and it certainly is not the way things should be done. So why does your PC keep crashing?

The deep dark registry truth behind PC errors

Problems within a PC can begin in a number of ways. First, and most frightening, is the inclusion of viruses, Trojans, and malware within your PC. You can accidentally download these in any number of ways, with email being a popular choice. Hackers and virus makers have literally hundreds of ways to gain access into your computer and cause severe damage to your software and operating system.

The second is problems to the registry. The registry in your computer is the collection of files that comprises the core foundation of what a computer is. The registry is the collection of files and programs that dictates how a computer is run. It is also the place where all the most important information is stored. You might even say that the registry is the “brain” of the computer’s software components. With this place in your computer’s system under so much duress, it is easy for it to get bogged down with the typical wear and tear of computer use. Installations can go awry, files can become corrupted, and a number of other problems can occur.

The biggest culprit of them all – runtime error

But first things first - what is a runtime error? A runtime error is basically a problem that occurs within the execution of a program. The term “runtime” defines the total time a program is in use, from start to finish. Sometimes, a problem with a runtime error can cause subsequent errors with the programs dependent upon it, thus escalating the situation further. If you see one program crashing, chances are there is a problem within your PC that will cause another error.

One solution to solving the runtime error is to contact the software publisher. However, this is not really much of a solution – all the publisher can do is advise you to reinstall the software. But what if even reinstalling does not work? Then you know you have a problem with the registry.

Shining a cure light on runtime errors – Registry Cleaners

Because the registry is such a crucial part of the computer’s software functions, and it is so frequently used, it is easy for it to get corrupted and stop working at maximum efficiency. In addition, because it is so crucial for the computer’s software, it is severely complicated. A trained professional with several years of experienced is to required to enter into the registry to solve problems. If an average computer user attempted to fix the problems with his or her own registry, the results could be disastrous. All it takes is the wrong movement of a specific file or folder, and the whole computer could come crashing down. There is no “save” feature when using the registry, so as soon as you do anything within it, it begins to take effect.

Some people believe that if something is wrong with your registry, then your computer is useless. This computer is useless unless you feel like spending hundreds of dollars buying a new computer or paying a professional to fix the old one. Sadly, the bulk of people are wrong. There are highly effective programs available, that can completely and efficiently restore your computer to its former glory. Regcure will move through your computer’s registry, fixing the problems while avoiding tampering with the good files, costing far less than a new computer or a paid professional.

Runtime errors can severely hinder one’s computer experience. Even just one runtime error can hint at the possibility of a much greater problem occurring within the registry; this is why it is important to solve the problem at its source as soon as possible. All Registry Cleaners requires is a quick and simple download. It will sweep the registry for the problem that is causing your programs to crash and accurately remedy these issues. It does the work of a paid professional for far less the cost and effort, and with a much greater efficiency and accuracy. After you run Registry Cleaners just once, you will be able to see the difference it will make within your computer. Your programs will run faster - there will be no more runtime errors, and you will see why Registry Cleaners are the best at getting the job done right.

Defending Against the Trojan Horse

As in the days of ancient Greece, a Trojan horse sent to your computer comes disguised looking like something good, yet cleverly disguises something potentially deadly to your computer or your personal information.

The computer Trojan horse is a program designed to infect your computer. The most common way for them to arrive is in the form of an e-mail with an appealing subject line. Once the user opens the e-mail, the Trojan horse is executed and infects the computer. Chat systems such as Yahoo messenger, MSN, and ICQ can also be used to disburse Trojan horses.

Trojan Horse Viruses

A typical Trojan horse is not a virus, and cannot replicate itself, nor can it spread itself. It must depend upon some other program or mechanism to carry it from one computer to another.

However, there is a form of computer virus that spreads itself like a Trojan horse, hence the name. These viruses will normally trick a user into opening a file, disguised as something enticing much as a Trojan horse is concealed in an intriguing e-mail. Once the user opens the file, the virus not only infects the user’s computer, but replicates itself and sends itself to everyone in the user’s address book.

Effects of the Trojan Horse

The most common use of a Trojan horse is to explore a victim’s computer and extract data about the victim, such as user names and passwords. More sophisticated Trojan horses will also seek out such information as bank account numbers or credit card information. The mined information is then transmitted back to the attacker for illicit use.

In other instances, the victim’s computer becomes an attacker, joined with a network designed to attack other computers. Victim computers essentially become slaves of the attacker.

Preventing the Trojan Horse Attack

One of the simplest ways to protect yourself from attack by a Trojan horse is to never open any software, e-mail, or message from a sender you do not know. No matter how intriguing the message may be, your best bet is to delete the message without opening it.

Anti-virus software will defend against known Trojan horses. The problem with these programs is that there are many unknown Trojan horses leapfrogging their way around the Internet. These harmful programs are much easier to create than viruses, and are much more difficult for anti-virus software to detect. Many times the anti-virus software can scan an infected hard drive and still overlook a Trojan horse.

Another, more effective option is to employ the use of good anti-malware software, such as those offered by Paretologic, PC TOols & Webroot.. Their technologically advanced anti-spyware program that is designed specifically to hunt down and eliminate Trojan horses, spyware, adware, and a number of other harmful computer programs.
A 2005 study by Symantec software showed that online security threats affected 85% of personal computers, meaning yours most likely has some sort of spyware hiding on your hard drive, whether you realize it or not. Your safest bet is to take steps today to protect your computer – and your personal information – from harmful computer Trojan horses and other threats

Protect Your Computer from Harmful Adware

Not all adware is bad. In exchange for putting up with some advertising, you receive computer programs that are useful to you either free or at a greatly reduced price. The integration of advertising allows the software developer to recoup costs and offer you a bargain.

Many popular programs, such as WeatherBug, Daemon Tools, and WinFixer are distributed as adware. Sometimes you will receive a free trial of the product that includes advertisements, with the option of purchasing a licensed copy if you like the software. The full-use versions have all of the user enhancements activated and do not contain any advertisements.

Adware as a Delivery Method for Spyware

While there are many legitimate shareware programs out there, with innocuous advertising included in the programming, there are many that will deliver spyware, viruses, or other harmful programs to your computer. When you allow the adware program to access your computer, it also has the ability to infect it. Once these programs are installed on your computer, they not only can steal your personal information, but they can be incredibly difficult to detect and remove.

Adding the use of a reliable spyware detection and removal program, such as Paretologic’s XoftSpyXE, is necessary to offer you the maximum amount of protection. In a very short period of time, this program can detect any spyware that has been installed on your hard drive, remove it, and restore your computer to optimal functionality quickly and easily.

How to Tell if Your Computer is Infected

The scary thing about adware and spyware is that your computer may behave normally, leaving you with no idea that someone else is digging into your hard drive and retrieving your personal information. They may track which websites you visit, or go as far as stealing bank account information, your name, or your social security number. Identity theft is one of the fastest growing financial crimes, and much of it is being committed through the use of spyware.

You may notice your computer running much more slowly than normal, you may be bombarded by pop-ups, or you may notice your modem working when you are not even on your computer. Your home page may be hijacked, or you may be automatically directed to websites you have no reason and no desire to visit.

Paretologic’s XoftSpyXE, Spyware doctor or Spysweeper can provide protection for your computer against 1,000's of different types of security threats. In just a matter of minutes, it will detect and remove any harmful software lurking on your hard drive, providing you with the ultimate in protection and peace of mind.

Adware is Just Another Parasite

So many adware programs are disguising spyware programs. They are essentially just another parasite designed to detect personal details about you. They could be tracking every single keystroke you make, without any knowledge on your part. Standard anti-virus and firewall programs just are not enough protection these days, as the programming becomes increasingly advanced. Utilize a good anti-spyware detection and removal program on your computer which are not only highly effective, but simple to use as well. After all, you never know who might be watching you.

Thursday, February 12, 2009

Basic of Windows (8-Complete)

126. Eliminate all the shortcuts in the Startup folder in the Start Menu. For programs that have shortcuts in this folder will be automatically executed when you first run Windows.

127. Check the settings in the messenger of your computer, because almost every messenger will load itself automatically every time Windows is started. Keep Login Automatically option or Load at Windows Start off.

128. You can access each program directly by typing the program's name in the Run dialog box. For example, a calculator for calc, winword for Microsoft Word, and others
Simple Troubleshooting

129. If the defrag when the computer suddenly stop, restart and enter in Safe Mode by pressing the F8 key right before Windows starts running. Defrag your hard drive again from this mode.

130. Find out if your drive with FAT or NTFS drive right click and select Properties and then go to the General tab. Read the detail on the file system dialog box that appears.

131. Change a drive in FAT into NTFS format via the DOS command convert c: / FS: NTFS. Enter in the registry editor and open the directory HKEY_USERS \ Default \ Control Panel \ Desktop and create value in AutoEndTask with the value 1.

133. If the time to install a new driver hangs the computer, the computer to restore the previous configuration. How, restart the computer and press F8 to enter Safe Mode option and select Last Known Good Configuration.

134. Use Event Viewer to track the application error. How, right-click My Computer, select Manage, and click the event viewer. Double-click any application or system error that indicates an error to view the information.

135. It's the most appropriate way to set the precise hour on the computer. Double click on the day the right bottom of the screen or in the system tray, select the Internet Time tab. Activate the option Automatically Synchronize with an Internet time server. Select the server that is available and click Update Now!

Tips and Tricks Special for Windows 98 and ME

136. Back-up dial-up settings to the way drag and drop the file connection in Dial Up Networking folder to a floppy drive. Back-up files will be stored in ekstensi.dun.

137. A quick restart, press Start | Shut Down | Restart, click OK temporarily, hold down the Shift key.

138. Use Tweak UI from the Windows 98 specific www.microsoft.com / ntworkstation / downloads / powertoys / networking / nttweakui.asp. After installation is complete, open Tweak UI, via the Control Panel.

139. Use the F3 key to open the Find feature while in Windows Explorer or desktop
140. Set the dial-up connection to the Telephony Location Manager. Telephony Location Manager feature will help you optimize your dial-up connection. How, click Start | Run and type "tlocmgr" without the quotes.

141. If your computer can not be set in standby mode or suspended, then fix with Pmtshoot from http://support.microsoft.com/?kbid=185949.

142. Always back-up registry before making changes in it. How, use the Registry Checker that can be found in Start | Programs | Accessories | System Tools | Tools.

143. Create a bootable disk for Windows 98 with memformatnya how to use the system files. Then copy the file c: \ windows \ command \ scanreg.exe and c: \ windows \ himem.sys to floppy disks in it. Do not forget, edit the config.sys file in the floppy with the additional line "device = a: \ himem.sys" without the quotes.

144. To me-restore registry when the computer does not want to run, try booting with the boot disk. Then go to drive C: \ and type "scanreg \ restore", without quotes. Follow angkah-step to complete. Then out of the DOS.

145. Add shortcut to Control Panel to Start Menu by clicking the Start button and right-click Open. Then right-click in an empty area, select New | Folder. Fill in the "Control Panel. (21EC2020-3AEA-1069-A2DD-08002B30309D)" without the quotes and press Enter.

146. You can remove the password dialog box that appears before the first entry in Windows. How, go to Control Panel, open the Password and Change Password tabs open. Fill in the password field with a password of your own, and new password fields empty. After that, click the User Profiles tab and enable option All users of this PC use the same preferences and desktop settings. This change will be in the running after a Windows restart.

147. To cancel the Print command, open the Printer icon in the system tray with a double click. Then highlight the files that are in-print on the printer window and then right click Cancel.

148. Discover the tools under DOS that are still feasible tools used in the folder \ msdos in the Windows 98 installation CD.

149. If Windows 98 or Me is running slow, check the memory. How, right-click My Computer and select Properties. Open the Performance tab and see the System Resource. If you reach 80 percent, restart the computer. Remember, close all programs before viewing the System Resource.

150. Sysedit use to edit the file system. For example Autoexec.bat and so forth. Type "sysedit" in the Run dialog box without the quotation marks are given.

Basic of Windows (7)

Improving Computer Performance

106. Add speed to your computer with a good penampakan but eat a lot of time, ie, animation. How, open Control Panel, and double-click System. Click the Advanced tab and press the Performance Settings. Adjust and enable option for the best performance.

107. To reduce the time booting the old feel, set in the BIOS so that booting from the start and a new CD drive or floppy drive on the next option.

108. Set so that Windows will only load the program only when needed to start running faster loading time and computer work is lighter. Type in "msconfig" without the quotes in the Run dialog box and press Enter. On the General tab, select the Selective Startup option, and open the Startup tab and disable all programs that are not necessary.

109. You can monitor the processor by pressing the keys Ctrl + Alt + Del to open Task Manager. Then minimize the window, you will see a graph of processor capacity in the system tray.

110. To increase the speed of storing data on a USB ZIP drive, open My Computer and right click the ZIP drive. Select Properties, open the Hardware tab click Properties, and open the Policies tab and enable the Optimize for Performance option.

111. To speed up the display Start Menu, open the Registry Editor (type "regedit" without quotes in the Run dialog box). Directory entry in the HKEY_CURRENT_USER \ Control Panel \ Desktop. Double-click the value named MenuShowDelay, change the number to 100. In this way, the delay Start Menu view the brief.

112. It's a fast way to turn off the computer. Press the Ctrl + Alt + Del, the Windows Task Manager that appears, press Shut Down menu and hold down the Ctrl key while clicking on Turn Off. Make sure first of all documents have been save.

113. You can view a graphical display performance computer based on several indicators. For example, the use of processor, memory, and so forth. How, open Control Panel and double-click Administrative Tools. Performance features open.

114. You can also add some other indicator in the Performance features (13 in number) by clicking the + icon and select a new indicator of what would appear.

115. You can combine a file or registry. Reg in your Windows registry, double click the file. To know the function, open with notepad.

116. If you use 512 MB of RAM, set it so that Windows does not create a paging to disk so that computer performance has been increasing. Do, open the Registry Editor and in direktory HKEY_LOCAL_MACHINE \ SYSTEM | Current ControlSet \ Control \ SessionManager \ MemoryManagement.
DisablePagingExecutive Change the value to 1.

117. Bootcfg.exe use to edit the boot.ini of Windows XP. Way, type "cmd" without quotes in the Run dialog box to enter in the DOS Prompt, and type bootcfg: /? appear after the prompt to obtain information about the features in this program.

118. To select the operating system in use in a computer that has a partition the drive, open the Control Panel, go and open the System in the Advanced tab. Click the Startup and Recovery Settings and then Edit.

119. Use the chkdsk utility for classic men-scan disk and fix errors found. How, click Start | Run and type "chkdsk c: / f" without the quotes for the men-scan and repair the drive C. If you want to know more about the features in chkdsk, type "chkdsk /?".

120. You can skip Scanner and Camera Wizard when installing digital camera. To access it, use Windows Explorer or My Computer. Your digital camera will appear as
drive.

121. Have utility in Windows XP Pro Edition is rarely used, namely gpedit. Run this utility by typing "gpedit.msc" without quotes in the Run dialog box and press Enter. This utility can be used for each component and tool in the Windows. Try setting one by one you want and then see the results.

122. Maintenance Schedule Set
Rather than digging in the garbage clean up Windows, in order to set Windows to clean itself periodically with the Schedule Task.

1. To set the schedule of the regular Windows, open Control Panel, double-click Scheduled Tasks. Add Scheduled Task wizard through. Click Next to go in the list contains programs that can be scheduled.
2. If the tool you want to schedule it is not listed on the list, click Browse and navigate to the folder where the tool is that you mean. Most of the tools in the Windows folder Windows \ system32. Select one and click Open.
3. Type the task name and specify the level of frequency or frequency of the schedule program. Click Next, set the other settings that are required and add the username and its password to secure the Schedule Task.

123. Use PowerToys utility free from www.microsoft.com / WindowsXP / home / downloads / powertoys.asp which is very useful. PowerToys itself consists of several programs, including the Open Command Window Here, Alt-Tab Replacement, Tweak UI, Power Calculator, Image Resizer, CD Slide Show Generator, Virtual Desktop Manager, Taskbar Magnifier, HTML Slide Show Wizard, and Timershot Webcam.

124. Windows you can get extra speed, if Indexing Service is disabled. How easy, open Administrative Tools in Control Panel, select Services and disable Indexing Service.

125. Develop capacity hard drive using Disk Cleanup. Open My Computer, right-click the drive and select Properties. Open the General tab and click Disk Cleanup. Clean all trash, including empty the Recycle Bin contents of all data that is not used anymore

Basic of Windows (6)

91. Showing icon indicator broadband connection or dial-up in the system tray for easier control. Do, open the My Network Places, select View Networks Connections, right-click the connection you use and select Properties. Change the option Show icon in the area when connected notofication become enable.

92. You can edit the Start Menu in accordance with their needs. Good to add, subtract, or even change the name. How, right-click Start and select Open or Open All Users. Set each shortcut is available according to needs.

93. You can open several programs simultaneously by pressing the Shift key while clicking on the program in Start Menu.

94. To remove the icon on the desktop, right-click the icon, and select Rename. Press the Alt key and numeric 255. Kemudan press Enter.

95. You can remove the arrow on the shortcut icon on the desktop. How, go to registry editor by typing "regedit" without quotes in the dialogue box Start | Run. Go to the directory in the HKEY_CLASSES_ROOT \ Lnkfile. Remove IsShortcut value. 85

96. Shortcut list
Here are some shortcuts that were most often used when working day-to-day use of Windows.

[Windows] + [L] Lock computer
[Windows] + [U] Showing Utility Manager
[Windows] + [R] Displaying Run
[Windows] + [F] Displays the search window
[Windows] + [E] Opening My Computer
[Windows] + [D] death or the Toggle

Desktop
[Windows] + [M] Minimize all windows
[Windows] + [Shift] + [M] Restore all windows that minimize the
[Windows] + [Ctrl] + [F] Search for the computers in the network
[Windows] + [F1] Showing page Help
[Windows] + [Break] window display the System

Properties
[Windows] + [Tab] button on the Taskbar Scroll
If you use the keyboard that does not have the Windows key, use key combination Ctrl + ESC.

97. You can enable or disable grouping of several files in one program. How, right-click the taskbar and select Properties. Give a check or uncheck the option Groups similar taskbar buttons.

98. You can remove or display the icon on the desktop by clicking on the desktop and select the right arrange Icons By | Show Desktop Icons.

99. You can create a custom toolbar to the taskbar right-click, select Toolbars | New Toolbar. Set in accordance with your wishes, for example, the My Documents as a toolbar in the taskbar to easily and quickly accessible.

100. Right-click Start menu, select Properties, if not using the Classic Start Menu, click Customize, and open the Advanced tab. There are some who can munu activated with a checkmark on the option. Start from the Scroll Programs penampakan to bring some of the features in the Start Menu.

101. You can open the site without opening a browser first. How, type the full address of the site would be opened in the dialog box Start | Run. For example www.pcmedia.co.id. Then press Enter.

102. In every menu in Windows there is the letter underlined in the use of navigation as a standard keyboard. For example, the File menu can be opened by pressing the Alt key + F. You can enable or disable the features that marked the line below. How, right-click an empty area on the desktop. Appereance then open the tab, and click the button effects. Set the check mark on the option Hide underlined letter for keyboard navigation until I press the [Alt] key.

103. Set the computer to issue a warning sound when the key Caps Lock, Num Lock or Scroll Lock is activated. To do, Open the Control Panel, go in the Accessibility Options. Open the Keyboard tab, and enable option-Use Toggle Keys.

104. To enable Hibernate in Windows XP Turn Off when pressing the Start Menu, hold down the Shift key. So stand by button on the Shut Down dialog box will change to Hibernate.

105. If your hardware Hibernate support, enable this feature soon. How, open Control Panel and open Power Options. Click the Hibernate tab and check the option Enable Hibernate. If your hardware does not support Hibernate, this tab can not be found

Basic of Windows (5)

74. Sending Fax
Did you know that Windows XP has a tool to send and receive fax?

1. Open the Control Panel, select Add / Remove Programs and click Add / Remove Windows Components. Enable Fax Services, and click Next.
2. Click Start | All Programs | Accessories | Communication | Fax | Fax Console to run the Fax Configuration Wizard. Set all settings, including the number and the fax modem that is used and the incoming fax.
3. Create a fax of all the Fax Console. Check all the content before it is transmitted, including the setting and so forth.

Set Print Quality

75. You can print multiple images simultaneously, and set the layout and the option with other easily. First, open the image files in the My Pictures folder, then select the menu File | Print. Akan Photo Printing Wizard appears. Set the printer to which you want to use and the layout that will be used. Some of the printer allows printing of multiple photos in one paper.

76. Rather than have to set the printer settings each time you use it, make a copy of your printer. Set each with a different option as you need.

77. You can use a character that is not in the keyboard, but can be used with the features in the Windows Character Map. To open, you can find in the Start | All Programs | Accessories | System Toolss | Character Map. Or type in "charmap" without the quotation marks in the Start | Run.

78. To capture a scene in the movie file into an image, putarlah the film and press Stop when the desired scene. Click Take Picture, save in your folder and name.

Bring Penampakan Hidden Features

79. You are interested in music with an original Windows? Find it in the file \ windows \ oobe \ system32 \ images \ tittle.wma.

80. There are two editions of Windows Plus! circulating, ie, Microsoft Plus! and for Windows Digital Media Edition (DME). See www.microsoft.com / windows / plus / PlusHome.asp trial version and try DME.

81. Type "iexpress" without the quotes in the dialogue box Start | Run. You will find a utility to create a file mengompres and self extraction.

82. You will find some tools that are less popular, but have tremendous advantages. Tools can be found in the folder support \ tools in the Windows XP installation CD. Use suptools.msi program to install the tools in your computer.

83. There are many wizard stepby-step or in Windows. To find out what the wizard, open the Help and Support and type "Wizard" without the quotes in the search field. Windows will display the list of available wizard. You chose to live.

84. To create your own characters, click Start | Run and type Eudcedit. Create your suit, still in asalakan size 64x64 grid. Save the menu select Edit | Save Character.

85. To put the characters in the Character Map into a document, you simply open the Character Map and select the character. Then you copy and paste it into your document
Caparison Desktop

86. You can set the mouse pointer in accordance with the desire to open a tab in the Mouse Pointer in the Control Panel. Click Browse to search for a pointer as you see fit.

87. To display a list of recent documents accessed in the Start Menu in Windows XP Home Edition, right-click on the Start button and select Properties. Click Customize, open the Advanced tab and enable option List my most recently opened documents.

88. If you want to display the Windows Explorer opens up to full cover the taskbar, press the F11.

89. You can create a shortcut key or key emphasis to access a particular program. How, right-click the program icon and select Properties. Open the Shortcut tab and specify which key you use to access the program. Windows will automatically add the keys Ctrl + Alt + your choice of shortcut key.

90. Sort the alphabet, all programs in the Start Menu for easy initialization. How, click Start | All Programs, right-click one of the existing program and select Sort by Name.

Wednesday, February 11, 2009

Retrieve Deleted Files, Photos, Music, Videos and Lost Emails

In the late 80's and early 90's, computers were primarily used for business purposes. Today, they have become a part of everyday life for most of us, be it work or play. The popularity of computers has resulted in paper free operations in many offices around the world, as emails and documents in data files are predominant. For this very reason, it is a must that computer users implement a dependable backup recovery system for both professional and personal needs.
How to resurrect your deleted files
Computer files and various forms of data are deleted or damaged for numerous reasons. Many times, the deletion is done accidently. Someone with little knowledge of the procedure can actually cause more harm than good when attempting to recover deleted files or lost data on their own.
Before probing deep into the system, your first approach should always be to check within your Recycle Bin to see if the missing file is there. On many occasions, you will be able to restore lost files from your Recycle Bill, a process known as un-deleting. If the file has been visibly erased from the computer, or the Recycle Bin has been emptied, you may actually need professional help to salvage this important data.

Reviving your lost emails
Lost emails have become a common problem for many internet users as well. These messages are not stored separately as individual files, but as separate folders in a mail server such as Outlook Express or similar applications. This means that recovering emails may require different methods than those used to restore typical files. Since many email servers have options that allow a user to completely clear the contents of a trash folder, the lost messages you seek may not be easily found there.
In the event that you were a bit too free with the mouse and mistakenly deleted a few important files or emails, rest assured that all hope is not lost. A smart option for protecting and restoring data is to backup that information on a secondary drive or alternate computer. You can also save data on writable CD or DVD media that have decent storage capacities. Then there are several portable devices that act as hard disks, such as flash drives. These are all great alternatives when you need more storage space, and they are certainly more affordable than purchasing a brand new computer.
How to recover your data – when it is too late
If you do not perform frequent manual backups of your data by computer or removable media, there are still other options that can be used to restore and protect your information. There are several programs available on the market specifically designed to handle data recovery. Some are free and limited in capability, while others are worth every penny and will pay for themselves in the long run.
For example, ParetoLogic Data Recovery Pro, File Recover form PC Tools and Stellar Phoenix's products are unique programs that specializes in recovering lost email messages, attachments, files, and much more. This software was designed to bring back your email, along with a variety other files on your computer that have been damaged or accidently deleted.
When seeking the right program to protect and restore your important information, it is best to find one that can be downloaded for a free trial. With a free trial, you can sample the product, become familiar with the interface, and learn if the software truly meets your needs.

The Basics of Your Computer Registry

Your computer’s registry is essentially your computer’s brain, keeping your computer’s functions in top form for optimal computer performance. Over time, bits of lost or scattered information creep into your registry, causing it to ultimately malfunction. You know you need to keep it safe, but have you ever wondered what exactly it does?
What the Registry Does
In technical terms, a registry is a computer’s main database, comprised of information detailing specific computer configurations, including hardware, software, system data, and your set preferences — like how your desktop is set up, for example. All of this information is kept there, securely out of view. Every action performed on your computer involves this vital key, the heart of the computer’s longevity. This is why it is so important to keep it in top form. The registry is accessible for editing, but Windows highly discourages this. Only trained professionals should attempt to manually edit the registry, and even then they must make registry backups in case they make a wrong move. All you need is one oddly-placed comma to render your computer inaccessible, causing immediate computer death.

Why it Collects Errors
Like any other equipment, registries need manual ‘cleaning’ also. After all, metaphorical dust collects in the registry, causing it to malfunction. After a while, this leads to that fateful blue screen. Your registry collects errors very easily. Something as simple as downloading a mp3 file or emptying your recycle bin causes these little fragments of data to float around in inner computer space, littering your computer’s registry. Each action you do causes an offset of these data fragments, and unless you clean it properly, these fragments will ultimately destroy your computer. Think of it as food for your body. If you eat food, leftover things such as dirty plates, crumbs, and utensils sit unless you put them in the dishwasher. A lazy person won’t clean up after themselves, and soon the entire kitchen is filled with dirt and grime. With no clean utensils or plates, the person either has to eat elsewhere or clean it up themselves. Conversely, if you make no effort to clean your registry, your computer suffers premature computer death. Case in point: your registry is the heart of your computer, so make sure to take care of it. If you don’t, you risk premature computer death.

Do You Have Spyware? 5 Symptoms To Look For

Symptom # 1 – Pop-Up Ads
This is probably the most common symptom to look for. Computer users may see pop-up or pop-under advertisements for pornography and other offers.
Symptom # 2 – New Internet Home Page
Certain types of spyware that can hijack your internet browser have the ability to change your default homepage. When you try to change it back to your original setting, you are unable to do so.
Symptom # 3 – Slowed Performance
If your computer system seems to suddenly begin running at a very slow pace, you may be infected with spyware or adware. These programs use up a lot of free space to gather information about your internet behavior which enables the programs deliver advertisements to your computer.

Symptom # 4 – Email Issues
If you begin to see emails that were sent without your knowledge and begin receiving messages that were bounced back to your inbox as undeliverable, it is very possible that spamware has been installed on your system. It works by stealing a copy of your email address book and delivers the information and email addresses back to the spammer.
Symptom # 5 – New Toolbars on Internet Explorer
Spyware that has been enabled to take over your internet browser has been known to install unwanted toolbars into Internet Explorer that are next to impossible to remove.

If your computer is experiencing any of these symptoms, your personal information is at risk. You should take immediate steps to rid your system of malicious programs by installing spyware protection software.

Basic of Windows (4)

50. Fast User Switching
With Fast User Switching, a user does not need to logoff the user login.
1. To enable Fast User Switching, entry in the Control Panel and select User Accounts. Click the option Change the way users log on or off, and enable Use Fast User Switching.
2. So that dial-up connection is still running even though Fast User Switching in-enable, go to the directory in the registry HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ CurrentVersion \ Winlogon.
3. Right-click on the right panel and select New | String Value. Name KeepRasConnections and give the value Restart the computer.

51. To view the content indeed My Recent Documents folder, click Start | Run, then type% UserProfile% \ Recent.

Setting Multiple Users

52. To switch between user accounts, press the Ctrl + Alt + Del, and then on the Task Manager window that opens, select the Users tab. Right-click a user name which you want to use and click the Connect button.

53. Add Guest account so that others can use your computer. How, open User Accounts in Control Panel, click Guest | Turn On the Guest Account.

54. Remember to always log in as System Administrator before making changes berimbas on the performance of the computer.

55. To copy a user profile, enter in the Control Panel | System. Entry in the Advance tab and click the Settings button in the User Profiles. Highlight the profile you want copied, and then click Copy to specify the location and profile. To change the permission, click the Change button.

56. Change Welcome screen with a login dialog to add a level of security. How, in the entry in the User Accounts Control Panel, select the option Change the way users log on or off and disable Welcome screen.

57. Use the Shared Documents folder to store filefile that other people can be opened in the network. This folder can be found in My Documents \ Other Places area.

58. On Windows XP Pro Edition, the password can expire if not used long log. To avoid this, set so that Windows does not do so. How, click Start | Run, and type userpasswords2 Enter. Go to the Advanced tab and select the Advanced user management, click the Advanced button and select Local Users and Groups. Right-click a user name and select Properties. Open the General tab and enable Password never expires option.

59. Give the name of each partition or drive with a different name. This is important to facilitate the search file.

60. Create a password reset floppy disk as an emergency when the lost password. How, go to Control Panel and open User Accounts. Select your account and select prevent a forgotten password to start the wizard
Setting File and Folder

61. Create a compressed folder by clicking the right blank area on the desktop and select New | Compressed (zipped) Folder. Give the name and drag and drop the files you want in the compressed folder.

62. A compressed folder can be protected with a password. How, open the File menu | Add a Password. Fill in your password and fill it again to confirm.

63. A compressed folder keep the contents can be added with the drag and drop the files you want compressed into it.

64. When running Disk Cleanup, select the option to compress old files compressing files that are not needed, so capacity can be hard savings.

65. Enkrip or random files can be done in Windows XP Pro Edition with right clicking My Computer, select Properties. Open the General tab and click Advanced. Activate the option Encrypt contents to secure data.

66. The easiest way to change the name of the file or folder is to select it, then pressing F2.

67. So you can switch between the folder quickly, especially on the folders that are frequently opened, make a shortcut to any folder that is accessed frequently.

68. Reset the file association with the menhakan the Shift key while right-clicking a file. Select Open With ... Select the program you want to open a file and enable the Open option use the selected program to open this kind of file. Then click OK.

69. Customize the music file storage capacity in a way to open Windows Media Player and select the menu Tools | Options. Open the Copy Music tab and adjust the size of the capacity with the friction slider.

70. If you save all documents in the My Documents folder, all files are easier on the back-up and system restore is not affected.

71. If a file copy of the CD is not accessible, then remove Read only attribute. How, right-click the file and select Properties. Remove the check mark in the Read only option.

72. Arrange the display of each folder by clicking the right folders on My Computer. Select Properties and click Customize. Select the template that is available, or select a picture according to your wishes. Click OK to save the settings.

73. -You can rename several files at once that have the same character in the same folder as well. For example, the collection of images or image. Way, select all the files you want in-rename, right-click the file and click Rename. Give your name, for example Koleksi.JPG, then all the other files will change its name to Collection (1). JPG, Collectibles (2). JPG, and so

Basic of Windows (3)

36. Removing the Installed Components
Many components of Windows that does not appear in Add / Remove Windows Components, so can not uninstall it.

1. Open Notepad and select the menu File | Open. Navigate to the folder Windows \ Inf. Sysoc.inf contents of the file name. Click Open to open this file.
2. Select the menu Edit | Replace. Hide in the Type I, but empty the Replace With field, click Replace All. The goal is to remove all of the words in the Hide file. Once finished, close and save the file.
3. Open the Control Panel and select Add / Remove Programs. Then select Add / Remove Windows Components, on the windows will look out and then some components that were previously hidden.

37. Change the picture on the welcome screen with the entrance way to the User Accounts in Control Panel. Open your account and click Change my picture. Determine the image of your choice by clicking the Browse for image on disk, or selecting between images that are available.

38. If you look more like the old version of the Start Menu, you can change it by clicking the right button Start, select Properties. Select Classic Start Menu and click Customize to set the contents.

39. To improve the display on the classic Start Menu, right-click the desktop and select Properties. Open the Themes tab, and select Windows Classic from the Theme list.

40. Add image to a folder, so that the image that will appear when the Windows Explorer in the thumbnails. How, right-click the folder to which you want to be treated, select Properties. Click the Customize tab and click Choose Picture. Select a picture and click Open | OK.

41. Adjust the capacity of the Recycle Bin right-click the Recycle Bin icon and choose
Properties. Fill in the capacity as you want and click OK.

42. At the time set in the View Details in Windows Explorer, right-click a column header untukmengatur columns are displayed. Click More if necessary set the other settings.

43. To add programs that you use most often in the Quick Launch, drag the program icon in the Quick Launch.

44. Add the address bar on the taskbar, so that speed access to an address on the Internet. How, right-click the taskbar, select Toolbar | Address. Double click to open and close it.

45. Make the display look like Windows Explorer in the My Computer window. How, right-click Windows Explorer icon and select Properties. In the Target area, after the% SystemRoot% \ explorer.exe add / n, / e, / select, C: \ and click OK
46. To add a program shortcut in the top of the Start Menu, right-click its icon in the Start Menu and click the Pin to Start Menu.

47. So that a drive or folder can be entered in the Send To menu, drag its shortcut to the folder \ Documen your Settings \ \ SendTo.

48. Search for SendTo folder? Just click Start | Run and type in SendTo and click OK.

49. To clear the list of documents in the My Recent Document folder in the Start Menu, right-click Start, select Properties. Customize and click open the Advanced tab and click the Clear button list. So that no longer appear in the My Recent Documents, disable option List my most recently opened documents.

Tuesday, February 10, 2009

Increase Your Computer’s Life with These 5 Simple Steps

Extending your computer’s life is not as difficult as it sounds. In fact, you can double your computer’s life in just five minutes a day. Here are five easy steps you can do each day to increase the life of your computer by 50%.
1. Check for updates with your local anti-virus software.
Some software, such as Avast, automatically updates without interrupting your Internet experience. Other software, such as Norton Anti-Virus, requires that you manually check for updates. Always make sure to check for daily updates, no matter what anti-virus program you own. Protecting your computer against viruses protects it from a unwarranted virus attack. Virus attacks can deplete a computer’s life instantly.

2. Check for updates with your anti-spyware software.
Increase your computer’s life — check for updates frequently. Some anti-virus software, such as Norton Anti-Virus, comes with anti-spyware protection. For ones that do not, make sure to install an anti-spyware program and check for frequent updates. Spyware attacks are just as common as virus infections.

3. Limit downloads.
Frequent downloading harms your computer, causing data to scatter. The scattered data clutters your registry, making it more prone to errors. The solution? Limit downloads from unauthorized sites. Also, never download anything from a peer-to-peer network, such as Limewire or Kazaa. It increases your chances of downloading harmful material by double-fold. Maintaining a healthy registry is essential to increasing the longevity of computer life.

4. Avoid sites with pop-up ads.
Not only are pop-up ads intrusive and annoying, they also clutter your computer with junk. If you are not careful, it can also add unwanted material, such as trojans or spyware. Official sites or company-owned sites usually do not have annoying pop-up ads. Stick with them if you can. As insignificant as this seems, you increase your computer life by 50% just by avoiding pop-up filled sites.

5. Clean out your computer with anti-spyware.
Before turning off the computer, always run an anti-spyware scan. Spyware and other malicious data are continuously collected in your computer, unlike viruses. Make sure to scan your computer every day for a clean, healthy computer. Take five minutes out of your day to complete these tasks — it will immediately increase the length of your computer’s life

Top 3 Tips to Prevent Spyware

As a computer user, it takes a little bit of work to keep your system free from adware and spyware. It is important to take these security measures however, because you will be protecting all of the private information you choose to store on your PC. This sensitive information may include passwords, personal documents, and sometimes even credit card numbers. These three tips will help you to ensure that you are never the victim of an adware or spyware problem.

Tip # 1 – Be Skeptical Of Every Download This may seem like common sense, but sometimes we think nothing of downloading programs that we find online for our personal use. The most notorious types of spyware and adware are programs that are offered online for free. This can include programs such as games, music files, and screensavers. These programs are free for a reason! They are used to generate pop-up ads and can even hijack your internet capabilities by directing your browser to bring you to websites you did not even want to go to.
Tip # 2 – Keep Your Windows Software Up-To-Date The updates offered by Windows includes a variety of security fixes to ensure your PC is not vulnerable to certain adware and spyware programs. The updates are offered for free from Microsoft.
Tip # 3 – Purchase and Install Spyware Protection Software Even spyware and adware cleaners that are offered for free online do not fully protect your system. Although the free spyware cleaners can be a temporary solution, many spyware and adware programs are written to re-install themselves later. The spyware protection software that can be purchased is better because it is specifically designed to locate and permanently disable all spyware, malware, and adware before they can attack your computer. Keeping your computer free of spyware will ensure the safety of your data as well as keep your PC functioning properly

The Basics of Data Recovery

When the words “data recovery” come to someone’s mind, the associated imagery usually consists of frustration spouted at the computer screen. In definitive terms, data recovery is the act of salvaging or restoring original data. The information may have been stored on various types of media, from CDs to the hard drive of a computer – but through certain processes and malfunctions, the data may have been corrupt or physically damaged and inaccessible.
Understanding the dynamics of data storage
Data is most often stored on media such as hard disk drives, CDs, DVDs, and portable USB drives. Through improper storage, attacks from viruses, and computer infections, this data can become damaged or corrupted. In other cases, the data may have simply been deleted.
Many users will give up in these instances, believing their information is lost forever. In actuality, data can be recovered by implementing a variety of methods, with strategies that often depend on the original media. This action can be successfully performed by using hardware or a form of advanced software, both of which might require the assistance of trained professionals.

Recovering Media Data

As mentioned above, this procedure can be applied to many aspects and different media. Recovering data for media used with an optical drive is often as easy as fixing a few nicks and scratches on a CD. You can find many available products at your local computer store that are strictly intended for this purpose. Sealing the nicks or smoothing over the scratches can be sufficient to enable the detection of data that was once inaccessible due to physical damage.

The difficulties overcoming data loss on a hard drive

Data errors are more complicated to troubleshoot on a hard drive. The loss of this information may be the result of physical, mechanical, or logical failures. Sometimes the problem may stem from an internal circuit board that is not functioning properly. When the issue becomes so severe that you are constantly losing data, the solution is indeed out of your hands. It is definitely time to call in a technician to diagnosis your machine - this problem may be more serious than you previously thought.
If the organs of your computer are working fine, the important data lost can usually be recovered. This is because files are not completely erased when you delete them. Instead, an entry in the computer’s index is deleted. This merely points to where the file is truly located. The actual file often remains untouched and sits in the registry. Location of the file can be unknowingly overwritten and misplaced by normal activity on the computer. This is the very reason why attempting to recover data on your own could be a bad idea.
The good thing is that an entire hard drive can never be completely erased. This means that any data that you have deleted can usually be recovered at a later time. Reinstalling or formatting an operating system also will not remove data beyond the point of recovery, even though the partition may have been written over.

How to effectively recover data without a technician

Restoring data on a hard drive works best when performed by reliable software. There are many programs available for restoring your important information, ranging from free to expensive. One of the leading data recovery software program is Stellar Phoenix data recovery too, ParetoLogic Data Recovery & PC Tools File Recover which happens to be very affordable and highly effective. This software has the ability to recover a wide range of data, from files that have been compressed and encrypted to those that have been emptied in the Recycle Bin. It also has the power to retrieve missing files from a variety of external storage devices.
The best way for you to tackle data recovery is to prepare for a mishap. Routine manual backups of your files combined with a reliable program will have you back up and running in no time when problems arise

Top 5 Signs That Your Registry Is Damaged

The number one reason why computers suffer computer stroke (you recognize this at the ominous blue screen of death) is not because of viruses or spyware. It is because we never bothered to repair our registry, the most important part in maintaining a healthy, fast PC. There are signs that your registry needs immediate repair, some subtle, some not so subtle. Including that blue screen of death, the virtual Mr. Reaper. Scary. Do you know these signs by heart? Here are the top five signs of a damaged registry.
1. Slow, sluggish performance. If you notice your computer performing slower and slower, your registry is corrupted. Over time, file data gets scattered, damaging your computer and causing to perform poorly. To remedy this problem, repair it with a cleanup tool.

2. Constant error messages. Yes, you have Windows, you will run into error messages. With that said, if error messages pop up every single time you use your computer, your registry is damaged. Repair it to fix the errors.
3. Continuous freezing. If your PC continuously freezes, say every start up or so, your registry is damaged. To solve this problem, simply repair it.
4. Continuous crashes. Having frequent crashes? Although it could be a virus, it could also be a damaged registry. You know what comes next. To fix it, repair it.
5. Sluggish startups. If your computer is slow when starting up, it is a tell-tale sign of a very, very damaged registry. You know what to do to - fix it. If you experience of these signs, repair it with a cleanup tool such as RegCure. It is available for free download on our website, Quick PC Solutions. Simply install, run, and have it analyze the data. If there are any errors, our recommended registry cleaners will clean it up for you. Simple as pie

Monday, February 9, 2009

Set the Security and Privacy IE 7

Internet Explorer 7 (IE7) offers a number of ways that you can browse the Internet safely. You can set the level of security and privacy in accordance with their needs.

OPEN INTERNET OPTIONS
1. IE7 provide flexibility in interacting with web pages, such as elements that want to see or blocked, cookies, ActiveX, pop-up; diprompt whether you want to do when an action, or simply done automatically, and add-on which you want to dienable or disable. The security and privacy we do IE7's Internet Options. To access them, click the Tools button on the right end of the toolbar and then select Internet Options at the bottom of the menu.

SET LEVEL security
2. When the Internet Options window appears, click the Security tab. Here you can set the security level of IE7 when browsing the Internet. Select the Internet zone and then drag slidebar to the desired security level: High, Medium-high or Medium. To find out the details of the settings for each option, click the Custom level button.

Set security details
3. Now you can set your browser security level to enable, disable, or prompt option on the Settings box, for example you want to automatically download the ActiveX controls that have not been marked or automatically download the file. IE7 will highlight the options that are considered unsafe. To return to the default settings of the security level, click the Reset button. If not, click OK, and then click Yes as Configuration confirmation.

PRIVACY SET LEVEL
4. Next, click the Privacy tab. Here you can change your browser's privacy settings. Click the Sites button to determine which sites may store cookies on your computer and the site which should not be.

SELECT SITE
5. That site can not save the cookies on your computer, enter its web address and then click the button block. Same, so that sites can store cookies on your computer, such as your online banking, type its web address and then click Allow. You can delete the site from the list by selecting the site and then click Remove. Click OK.


Set COOKIES (1)
6. You can set the privacy of the cookies from the web. Click the Advanced button and check ([1]) Override automatic cookie handling. Then select whether you want to Block, Allow, Prompt, or the first party cookies (placed by the site host) and third-party cookies (placed by advertisers). You can also give a check ([1]) Always allow session cookies to store login data sites and delete them when the browser is closed. Click OK.

Set COOKIES (2)
7. more you can set the privacy of the cookies by clicking the Default button on the Privacy tab. Here, you can use the slider bar to set the privacy level, starting from Block All Cookies (block third party cookies and first party cookies particular) to Accept All Cookies.

Turn on the pop-up blocker
8. After the cookies set, you can start to set up a pop-up. Check ([1]) Turn on Pop-up Blocker in the bottom of the Privacy tab and then click the Settings button.

Set the pop-up blocker
9. you can allow pop-ups from a site with the address webnya and then click Add or to block pop-ups from a site by selecting the site from the list and then click Remove. You can issue a sound when a pop-up blocked and set the filter level of pop-ups, ranging from Low (allow pop-ups from sites you trust) to High (to block all pop-up). Click Close.

Set Display POP-UP (1)
10. Similar to the browsing that you can use the tab, you can specify whether to open the IE pop-up on the new tab or new window. Click the General tab in the Internet Options window and then click the Settings button in the Tabs.

Set Display POP-UP (2)
11. In the Tabbed Browsing Settings window appears, in the When a pop-up is encountered, select whether the pop-up window is opened in a new window, new tab, or Internet Explorer to determine. In the below you can also set whether links from other programs open in new tab, new window, or in the tab or window now. Click OK.

Set ADD-ON (1)
12. Next, you can check the add-on is installed on your computer and ensure that no element of suspicious or who does not want to enable on-the IE7. Click the Programs tab, and then at the bottom of the Internet Options window, click the Manage add-ons.

Set ADD-ON (2)
13. from the menu at the top of the dialog box window Manage Add-ons, select the Add-ons that have been used by Internet Explorer. You will see a list of add-ons are installed on the box below, along with publisher information add-on that status, and type of file. If there are any suspicious items or unwanted in-enable, select the name and then click the Disable option at the bottom of the window.

Set the ActiveX
14. You can check the ActiveX control is installed in the same way. From the Show menu, select Downloaded ActiveX Controls (32-bit). Click the name of the ActiveX control is not desired or that may be dangerous, and then click the Delete key on the lower right corner to delete it from your system. Click OK to close the Manage Add-ons. You may need me to restart the computer to apply changes.

Set RSS Feed
15. Finally, you can set the frequency to check IE7 RSS feeds for updates. Click the Content tab and then click the Settings button in the Feeds section. Check ([1]) Automatically check feeds for updates and then select the time interval from the menu. You can also use the Advanced option to mark feeds as read, the feed-reading browser view, and remove the sound when there is a new feed. Click OK as rmasi Configuration and then click OK again to close the Internet Options window.

Increase IE7 With IE7Pro

It took five years for Microsoft to issue a new version of Internet Explorer. When finally released, IE7 is still a lack of features compared to many neighborhood rival Mozilla Firefox. Fortunately, there is IE7Pro to complete the missing elements.

DOWNLOAD AND INSTALLATION
Download and install add-on (http://www.ie7pro.com) and then restart Internet Explorer. IE7Pro automatically activate the following modules: Basic Function, Ad Blocker, Scripts & Plugins, Spell checker, Auto Form Filter, Mini Download Manager, Privacy Cleaner, Online Service, Inline Search, and FasterIE. You can adjust the settings or their men-disable any that are not needed from the Tools menu, and select IE7Pro Preferences.

Crash Recovery Switch
You can activate or turn off the module from the ba-gian Modules. Click to view the module deskripsinya. If separate, then view tour Crash Recovery (all the tabs that open when you crash will be back) now dimasuk-in module to a Basic Function. Select the Find box or tool IE7Pro Inline Search with a check mark ([1]) Inline Search. Settings in the IE, IE7 menu bar is missing can be displayed by clicking the right at any empty space on the toolbar and select Menu Bar. Top Menu will move the IE menu bar above the address bar.

Check Spelling
IE7Pro comes with integrated check your spelling. To use the spelling talker, check ([1]) Spell checker in the Modules. For example you are to comment on a news site, IE7Pro will be down (in red) at the wrong word. Right-click the underlined word to select an appropriate word. Dictionary of American English is the default. Click Spell Languages, Dictionary, Add to download the other dictionary.

On Block
Ad Blocker is enabled by default, but you can also activate the 'flash blocking' so that the content is written in flash is not displayed. You can filter material by entering the Web site to a secure White list of suspicious sites and to the block list. To do so, type the site name in the box to the Rule and select 'Filter type'. Another way to block the ad is to right click on the IE7Pro icon on the bottom of the browser window.

Save As Images
IE7Pro also have facilities of image display (screenshot) that you can use to take the entire web page and then save it in PNG image format, GIF, JPG, TIFF, or BMP. Right click IE7Pro icon in the bottom of the browser window, select Save Current Tab As Image To, and then click Files or whether the Clipboard.

Set Mouse Movement
With Mouse gestures, you can control the browser by moving the mouse in a certain direction. For example, holding the right mouse button and a movement letter L will close the current tab open. You can change the color impression that is displayed during the movement, see the form of a movement that is available and create your own.

Run the Add Script
Users in the Scripts section, you can run the script directly change the look and behavior of Web pages. Select the script you want and click OK to run it. For example, it is the script eg 'Download Videos from YouTube'. Now when you see the video on YouTube Download link will appear Games. Click Save, and name fi le with the extension '. Flv'. You can run a file with drag and drop in VLC Player (http://www.videolan.org/vlc)

Sunday, February 8, 2009

Optimize your PC Performance with a Registry cleaner

HOW COMPUTER PERFORMANCE IS EFFECTED

Unknown to most, every little thing you do on a computer takes a tremendous toll. This includes the constant installing and removing of programs, storing your music or spending time on the internet. These activities leave scattered file fragments in your registry, even when you think they have been removed by performing a full uninstall. As time elapses the performance of your computer suffers. You will find yourself the victim of constant freezing, Internet Explorer messages or even the fearful blue screen.

A malicious virus will certainly affect computer performance. These system infections are relative to the biological form in the way they pass from one unit to the next. Viruses are very similar to spyware programs. Viruses will litter your computer screen with pop-up ads, collect your private information or change the configuration settings of your system. Both viruses and spyware are very hazardous and are sure to have a devastating effect the performance of your computer.

HOW TO OPTIMIZE YOUR COMPUTER

If your computer has been giving you slow and sluggish behavior, it is certainly time to optimize. By doing this you can maintain performance and keep it running like new. Here a few ways this may be performed:

* Remove unused programs: You can begin to optimize your computer by removing programs of no current relevance. Let’s just say your PC came equipped with a chess game. Later you find one on the internet and decide to use that instead. While getting enjoyment from your new program the old one remains on your system taking up space. It is more efficient to remove the old, unused program to clear up your hard drive.
* Perform frequent disk cleanup: The ‘disk cleanup’ function can be used through the ‘My Computer’ icon. By performing this action you can compress old system files, clear temporary internet files and those you may have left sitting in the recycle bin. By enabling this simple function you can free up a few gigabytes worth of space on the hard drive. I recommend doing this at least two times per month.
* Registry scanning software: This is perhaps the best method of optimizing your computer. Quality programs such as RegCure, Registry Mechanic & Registry Booster take an advanced approach towards maintaining performance. They allow you to conduct a quick and easy scan of your systems registry. Thereafter, it analyzes and performs the complicated repairs for you. They are fast and affordable, putting you one step closer towards fully optimizing your PC.

It does not matter if you paid an arm and a leg for your computer; in due time you are liable to experience performance issues. Following these tips is a great way to optimize your unit and keep things flowing smoothly.

Errors Related to Windows XP Registry

When Windows XP came out, it was intended to be the next step into the future. It took the problems and design flaws of Windows 2000 and Windows Me, and improved upon them, creating a better, more efficient operating system. And, for the most part PC users which had Windows XP installed on their system were pleased. So then, why are there so many errors on it now?

For instance, it seems like the older a computer gets the more slowdown it experiences. Why is this? The hardware in the computer does get any worse as time goes by, so why will it take several minutes for a program to run or an application to start? You defrag your hard drive every so often, have an adequate virus protection program and check your computer for spyware as often as possible. So what gives?

The Truth about Windows XP Errors

Some situations cause the inability of a .dll to work. .dll’s are some of the most important files in one’s PC and without certain .dll’s, the PC will fail to work properly or even work at all. This can even cause the dreaded runtime errors, which will crash whatever program they are attached to.

You might even be experiencing some shutdown and startup issues. Is it taking five minutes or more for your computer to startup? Or worse, will it never shut down? Problems like these are common faire within the PC world, sadly. And most people just accept that things are the way they are and are, unaware of the ways to fix them.

Most of a PC’s problems originate in one place – the registry. The registry inside a computer is the software component that dictates how the rest of the computer can run. Programs within the operating system and without rely on the computer’s registry for information on how to run. The registry also controls the basic functions of Windows XP. Without the registry working in proper condition, many and various computer errors can occur within Windows XP. Just a small error within the registry will create a larger error later on, and the worst part is, you won’t even be aware of where the error came from.

The registry is also the most confusing and complicated place. Your average computer user, or even many advanced computer users for that matter, would be unable to go into the registry and figure out which programs and files are good and which are bad. It would take a trained professional with years of experience to even think about going in there to fix things. In regards to this, Trojans and viruses typically target areas within the registry, knowing that it is so hard to fix, most people will be unable to correct the problem. Sometimes the registry is damaged even without malicious intent. All it takes is an improper installation or a poorly coded file to be placed in the registry for things to start falling apart.

Registry Cleaners as a solution !

A robust and sophisticated Registry optimization software program is the best way to deal with problems relating to the registry. Trained professionals are far too expensive and inefficient. While a program can check your computer’s registry and fix it at any time you want.

Blue Screen Of Death - BSOD

The blue screen might as well be a red light. Stop. Your system has crashed and there’s nothing you can do about it. The blue screen or “blue screen of death” as it is unlovingly referred to, is a bright blue screen with white letters informing you, in the most ambiguous terms possible, that your computer is useless for the moment. The blue screen has given thousands of PC users immense amounts of frustration and rage.

At the time, the only option available to you is to restart the computer and pray to your deity of choice that nothing is permanently damaged. The keyboard and mouse become unusable, which makes the blue screen even more frustrating, because now you are unable take your anger out on them. The blue screen on startup or at any other time is an indication that no activity can be performed on your computer and your only possible recourse is the shut down the computer. This will, of course, lose any unsaved information you might have been processing.

The blue screen will also remain very vague on what the problem was exactly, using terms that a typical PC user wouldn’t have the slight bit of knowledge about, let alone those deemed as “technologically impaired”. Although you might not need it – the bright blue screen looks intimidating enough without having to explain to you how bad the situation is.

What causes this dreaded, although festively decorated, blue screen to appear?

A number of problems can lead you to the “blue screen of death,” but all of them involve your PC’s registry.

The registry on your PC is the storage unit of information on your computer. Your PC is constantly referring to the registry to be told how to perform tasks and programs. It is also the place where your PC will go to check the information about the programs and files on your computer. The registry is even the area that receives the most routine use in your computer, from program information to file components to hardware specifications. Think of it as your computer’s “brain”, the place where it goes to receive information and commands. The blue screen is simply a notification that something is wrong with the “brain”.

The registry is the place where everything can go wrong very quickly, leading to the appearance of the blue screen on startup. The information in the registry might be causing trouble due to misplaced or bad information. The bad information can sometimes cause a fatal error.

SOLUTION

The misplaced or bad information can easily be fixed either manually or automatically. To do so manually would require intense computer knowledge and the ability to sort the good information from the bad. To do so automatically would be easy and require a a good registry cleaner. Registry Cleaners will sort through the information in your computer’s registry for you, easily sifting through the information that is beneficial to your computer from the information that’s bringing you a blue screen. Registry Cleaners has helped many frustrated computer owners quickly and easily solve their registry problems

Saturday, February 7, 2009

Speed Up Internet Explorer (IE)

INTERNET EXPLORER Speed up STARTUP .
Isn't it annoying when you want to go to a new website, or any other site and you have to wait for your 'home' to load? This tweak tells Internet Explorer to simply 'run', without loading any webpages. (If you use a 'blank' page, that is still a page, and slows access. Notice the 'about:blank' in the address bar. The blank html page must still be loaded..). To load IE with 'nothing' [nothing is different than blank]:

1. Right-click on any shortcut you have to IE
[You should create a shortcut out of your desktop IE icon, and delete the original icon]
2. Click Properties
3. Add ' -nohome' [with a space before the dash] after the endquotes in the Target field.
4. Click OK
Fire up IE from your modified shortcut, and be amazed by how fast you are able to use IE!

INTERNET EXPLORER SPEED UP.
Edit your link to start Internet Explorer to have -nohome after it. For Example: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
This will load internet explorer very fast because it does not load a webpage while it is loading. If you want to go to your homepage after it is loaded, just click on the home button.
or
Open registry editor by going to Start then >> Run and entering >> regedit.
Once in registry, navigate to key.

HKEY_CURRENT_USER\Software\microsoft\Windows\CurrentVersion\InternetSettings. Right click @ windows right > New > DWORD.

Type MaxConnectionsPerServer > You can set value (the more higher the no, the more good speed u get, e;g : 99). [99 in hexa so 153 in binary]

Create another DWORD >type MaxConnectionsPer1_0Server. Then put a high value as mentioned above.
Restart I.E and you are done.

SPEED UP BROWSING WITH DNS trick.!!
When you connect to a web site your computer sends information back and forth, this is obvious. Some of this information deals with resolving the site name to an IP address, the stuff that tcp/ip really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although WinXP and win2000 has a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d

make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Then merge it into the registry.

START Internet EXPLORER WITH EMPTY BLUE SCREEN.!!
Set your default page to about:mozilla and IE will show a nice blue screen upon startup.

FIX IE 6 SLOWDOWNS AND HANGS.
1. Open a command prompt window on the desktop (Start/Run/command).
2. Exit IE and Windows Explorer (iexplore.exe and explorer.exe, respectively, in Task Manager, i.e - Ctrl-Alt-Del/Task Manager/Processes/End Process for each).
3. Use the following command exactly from your command prompt window to delete the corrupt file:
C:\>del "%systemdrive%\Documents and Settings\%username%\Local
Settings\Temporary Internet Files\Content.IE5\index.dat"
4. Restart Windows Explorer with Task Manager (Ctrl-Alt-Del/Task Manager/Applications/New Task/Browse/C:\Windows\explorer.exe[or your path]) or Shutdown/Restart the computer from Task Manager.

SPEED UP WEB BROWSING.
Iv'e personally found a dramatic increase in web browsing after clearing the Windows XP DNS cache. To clear it type the following in a command prompt: ipconfig /flushdns.

ALLOW MORE THAN 2 SIMULTANEOUS DOWNLOADS ON IEXPLORER 6.
This is to increase the the number of max downloads to 10.
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
3. On the Edit menu, click Add Value , and then add the following registry values:
"MaxConnectionsPer1_0Server"=Dword:0000000a
"MaxConnectionsPerServer"=Dword:0000000a
4. Quit Registry Editor.

IPV6 INSTALLATION FOR WINDOWS XP.
This protocol is distined to replace the Internet Protocal Version 4 used by Internet Explorer it uses hexadecimal ip addresses instead of decimal example (decimal ip 62.98.231.67) (hexadecimal IP 2001:6b8:0:400::70c)
To install To install the IPv6 Protocol for Windows XP:
Log on to the computer running Windows XP with a user account that has local administrator privileges. Open a command prompt. From the Windows XP desktop, click Start, point to Programs, point to Accessories, and then click Command Prompt. At the command prompt, type: ipv6 install
For more information on IPv6, visit the site below:
CODEhttp://www.microsoft.com/windowsxp/pro/techinfo/administration/ipv6/default.asp

ANOTHER WAY TO FIX IEXPLORER 6 SLOW PAGES LOADED.
Here's an easier way to get to index.dat file as addresse in another tweak submitted here.
1. click on Internet Explorer
2. go to to your root dir (usually C:)
3. open Documents and Settings folder
4. open "your username folder"
5. open UserData
6. **close IE if you have it open**
rename index.dat to index.old
logoff and log back on (don't need to restart) open up IE and go to a web page or site that always seemed to load slowly. It should load a lot more quickly now. NOTE. Always rename or backup .dat or other system files before deleting.
Disable Right Click!!
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions]
"NoBrowserContextMenu"=dword:00000001
Enable Right Click!!
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions]
"NoBrowserContextMenu"=dword:00000000
do u want to save entire Page For offline viweing??
Saving Web Pages with Internet Explorer 6

Occasionally, you may want to save an entire Web page on your computer (text, hyperlinks, graphics, and all). To save the Web page that currently appears in Internet Explorer, choose File-->Save As to open the Save Web Page dialog box shown in the following figure. Select the folder in which you want the page saved and then click the Save button.
After saving a Web page on your hard drive, you can open it in Internet Explorer and view the contents even when you're not connected to the Internet. If your motive for saving the Web page, however, is to be able to view the content when you're not connected to the Internet, you're better off saving the page as a Favorite marked for offline viewing. That way, you can decide whether you want to view other pages linked to the one you're saving and you can have Internet Explorer check the site for updated content.
You can also e-mail a Web page or a link to the page to a colleague or friend. To send the current Web page in a new e-mail message, click File-->Send-->Page by E-mail on the Explorer menu bar and then fill out the new e-mail. To send a link to the page instead, click File-->Send-->Link by E-Mail. To create a desktop shortcut to the Web page, click File-->Send-->Shortcut to Desktop.
Alternate trick
Before performing these steps you need to test your broadband speed you can test your speed at http://www.2wire.com/
The broadband connection speed can be increased by clearing the route from modem to server. Number of packets sent by modem to server should be increased.Internet speed can be increased by increasing more number of incoming and outgoing packets.The main reason why your internet connection is slow is because of harmful virus.If your system is infected with virus your number of incomming packets will be decreased.This leads to your slower internet speed.Internet speed can be increased by by clearing the route to the server.
This can be done by upgrading costly sofwares and hardwares.This will optimize your system speed.And Increase your system speed.Internet tweak is the best software which increases your system speed for further applications.Another software Windows power tools which makes windows faster and increases your internet speed.And decreases downloading time.It optimizes LAN,CABLE,DSN etc.Another software "internet cyclone"which increases your internet speed from 64kbps to 120kbps. This tip is designed for increased BROADBAND speed in Windows XP while using standard Network Interface cards (NIC) that are connected to ADSL modems, or when using any directly-connected USB ADSL modem.

To speed up the Internet connection speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the NIC or the USB modem. This tip is only recommended if you have 256MB RAM or higher.

Step #1 - Identify the IRQ used by the NIC/USB modem
1. Open the System Information tool by running MSINFO32.EXE from the Run command.
2. Expand System Summary > Hardware Resources > IRQs.
3. Look for the listing made for your NIC (in my case - a Intel® PRO/100+ Management Adapter). Note the IRQ next to the specified line (in my case - IRQ21).

In case of USB modems you will first need to find the right USB device used by your modem. Follow these steps:
1. Open the Device Manager tool by running DEVMGMT.MSC from the Run command (or by right-clicking My Computer > Hardware tab > Device Manager button).
2. Scroll down to Universal Serial Bus controllers and expand it.
3. Right-click the USB Root Hub and select Properties. Note that you might need to do so for all listed USB Root hubs (if there are more than one) in order to find the right one.
4. In the Power tab, look for your USB ADSL modem.
5. In the Resources tab look for the assigned IRQ (in this case - IRQ21).
6. This is the IRQ we're looking for.

Note: IRQs and modem names might vary...

Step #2 - Modify the system.ini file
1. Run SYSEDIT.EXE from the Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file till you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type IRQX=4096 where X is the designated IRQ number we found in step #1, in my case it's IRQ21.
Note: This line IS CASE SENSITIVE!!!

5. Click on the File menu, then choose Save.
6. Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.