Friday 29 July 2011

Boost Your System Performance By Selective Startup

There are a lot of Startup items in your Windows OS which are loaded automatically. Most of them won't be needed for you. So when they are loaded, it decreases your system performance. You can manually disable them and increase the speed of your computer to a great extent.
You may start doing this by taking:


StartRun
Type "msconfig" in the box as shown in fig:






When you press OK, a box appears and in that box choose the Selective Startup option as shown in fig:




Then choose startup from the Upper Tab and it will show the list of all startup items.
Now you  may select only the startup items which you need and exclude the rest as shown in fig:


After selecting, u gotta Click OK and restart your system for the changes to get effective.
This is a simple thing which most people already know. 
I've just posted to help Beginners.

This will increase your system performance to a great extent.













Sunday 24 July 2011

Intel Itanium Processors

Intel Itanium Processors

Intel® Itanium® processor-based servers deliver robust performance for UNIX and mainframe environments and support today's most demanding business applications. With superior virtualization performance and more virtual machines per server, Intel Itanium processors offer scalability for your most complex, data-intensive workloads.

Intel Itanium Processors

    INTEL ITANIUM PROCESSOR 9300 SERIES

  • Superior, built-for-virtualization performance with more virtual machines per server
  • Optimizes server efficiency with twice as many processing cores
  • Delivers up to eight times more physical memory capacity over previous generation¹
  • Increases core utilization with up to six times more memory bandwidth than previous generation¹
  • Supports real-time workload balancing
  • Support for up to 16 sockets while providing low voltage options
Intel Itanium processor 9300 series - Discover
Scalable servers powered by Intel® Itanium® processors enable system configurations of as many as 512 processors and a full petabyte (1024 TB) of RAM. With full support for both 32-bit and 64-bit applications, the capacity of these processors provides unmatched flexibility in tailoring systems to your enterprise needs.

















Saturday 23 July 2011

Access Pen Drive safely without being affected by a Virus even without the help of an Antivirus

There are many methods to access a pen drive and remove the virus in it without being affected by the virus.
I'm talking about the way to access it even  without installing any antivirus.

THE FIRST 4 STEPS ARE TO BE DONE ONLY ONCE IN YOUR COMPUTER.
At first you have to disable all Autoplay features permanently in your computer.
For that,

  1. Open the GPO editor as i discussed in my earlier post GPO Editing.
  2.  In the User Configuration Administrative Templates Windows Components Autoplay policies, Enable all the settings as shown in the figure below:
 
  1. Then save and close it. 
  2. In the Folder Options, Enable "Show hidden Files and Folders" as shown in the figure below:

  1. Then Click Start Run and type the drive letter of your pen drive and press enter. An example is shown in the figure below:


  1. Now you can see the virus files in the pen drive. Delete them permanently by using shift+delete.
NEXT TIME ONWARDS  WHEN YOU USE A PEN DRIVE,
YOU JUST HAVE TO DO THE LAST 2 STEPS ONLY.
















Friday 22 July 2011

Group Policy Object Editing



Group Policy Object Editing allows you to have complete control over your computer. 
  • You can make your system look the way you want.
  • Restrict others from using their pen drives without your permission (which helps in preventing your system from virus infections especially if you are staying in a hostel).
  • Hide or restrict specific Drives(C,D...) or block them so that others won't use or view your stuff......
There are many such tweaks in your system. You just have to find them thats all.
If you would like to learn such tweaks and use them Scroll down and read this post.


In order to do that,
1.      Take run and type mmc


2.      Click file and choose Add/Remove snap in

3.      From the Box that just appeared, choose Group Policy Object Editor and click Add


4.      In the Box that just appeared Click “Browse”.
5.      Then select the users tab.
You can see the list of users in your computer.
6.      Select a user other than your user account so that you will have full privileges and you can restrict the other person the way you want .


7.      Click OK.
8.      Click Finish.
9.      GPO is ready to be edited.

10.  Double click the settings you want to use and click enable->OK
11.  Whatever edits you do will be affecting the user you selected only.
12.  After editing just save it.
13.  Next time onwards you just have to open the file you have saved and you can edit it easily.
14.  If you want to use it for a different user you will have to select a new user next time and start from the beginning.


















Wednesday 20 July 2011

How to remove malware or spyware infections without formatting your computer

Combofix was designed to scan a computer for known malware, spyware (SurfSideKick, QooLogic, and Look2Me as well as any other combination of the mentioned spyware applications) and remove them. ComboFix allows the manual removal of spyware infections. It's a specialized effective cleaning tool, which is useful compared to other malware and spyware removers. After Combofix finished, a report will be created. You can use this report to search and remove infections which are not automatically removed. Works with Windows XP and 2000.

Download: http://download.cnet.com/Combofix/3000-8022_4-75221073.html#ixzz1SfsVajEK

Tuesday 19 July 2011

How To Install Windows 7 With a USB Flash Drive

Windows 7 is the perfect OS to run on a Netbook but how do you install it without a CD drive? Use a USB flash drive in place of the DVD. In this article I will show you how to create a bootable USB flash drive that will install Windows 7 so you can install Windows on any computer without an optical drive.
Before we get started you will need:
  • Windows 7 ISO file or a burned DVD with the install source files
  • 4GB USB flash drive.

Microsoft now has a free utility that will automatically make a bootable USB flash drive from a Windows 7 ISO image file. Simply download the tool, specify the location of your ISO file and the wizard will do everything for you.


Download the Microsoft Store Windows 7 USB/DVD Download Tool











Encrypt Removable USB Flash Drives with BitLocker

BitLocker was Microsofts first move into full disk encryption with support included in Windows Vista. Since then BitLocker has evolved and improved into a great software based full disk encryption solution. New for Windows 7 is support for removable disks. Using BitLocker on a removable USB flash drive provides a great way to protect your data in the event the drive was lost or stolen.
Not only will your data always be protected but it is possible to access your data on Windows XP and Vista through a read-only interface that is installed during the initial encryption. Now you are able to get your data anywhere, not just on your Windows 7 computer.
To get started you will need to plug in your USB flash drive and open Computer so you can view all your drives. Then, right click on your drive and select Turn on BitLocker.


Next, pick how you want to protect the drive. Set a password or use a smart card if your device has a smart card reader.


Click Next to continue.
It is a good idea to backup your recovery key so that you can always retrieve data in the event you forget your password.


Click Next to continue and then click Start Encrypting.


Encryption will now start. Depending on the size of your USB flash drive it can take a while. It took 14 minutes for my 2 GB drive.


When encryption is completed your drive is now protected.
Using BitLocker encrypted USB flash drive on another computer
When you plug your USB flash drive into a different computer it will still show up in Computer but the drive will have a different icon.


When you click on the drive it will ask you for the password.


Once authenticated, you will be see the special read-only interface where you can extract files off the encrypted USB flash drive.