Tuesday, May 26, 2009
Difference between 32-bit and 64-bit Microsoft Vista OS
- Vista 64-bit include a new secret security feature called Address Space Layout Randmonizer (ASLR) that helps eliminate remote system attacks for the first time on the Windows platform and is not available for 32-bit Vista.
- Vista 64-bit provide support for hardware-backed Data Execution Protection (DEP), which helps to prevent the buffer overflows that are commonly used in electronic attacks, whereas 32-bit Vista utilize a less effective, software-based version of DEP.
- 64-bit Vista has a feature called Kernel Patch Protection (also known as PatchGuard) which prevents malicious software from patching Vista Kernel. It prevents kernel-mode drivers from extending or replacing other kernel services and prevents third-party software from patching any part of the kernel.
- 32-bit Vista support up to 4 GB of RAM where as different 64-bit version of Vista support different size RAM as
Vista Home Basic - 8 GB of RAM
Vista Home Premium - 16 GB
Vista Business, Enterprise, and Ultimate - 128 GB
- You can upgrade from XP 64-bit to Vista 64-bit, but not from Vista 32-bit to Vista 64-bit.
Cisco Network Magic Pro 5.0.8282
* Connect and share content or a printer across a network
* Manage, monitor and control how computers on the network access the Internet
* Diagnose and repair connection and performance problems
* Optimize performance and reliability
* Track network history and usage through reporting capabilities
* Manage active connections and get status updates Control user
* Access and help secure the network from intruders
Features:
* Connect your devices together in minutes.
* Share Internet connections, printers and files.
* Protect your network with enhanced WPA security capabilities and
status alerts.
* Repair your network and Internet connections to stay online and
productive.
* Control access to the Internet and track online activity with remote
desktop screenshots.
* And much more!
Size: 13.3MB
http://rapidshare.com/files/157516749/Cisco.Network.Magic.v5.0.8282.rar
Drivers Pack Autorun v2 - AIO
Universal Driver CD
The program Of driverPacks makes it possible to establish automatically driver to the majority of devices for several cries. With reinstallation Windows on the computer, always, are necessary the specific routines - driver. Sometimes, producers give disk with the drivers users or lay out them on their sites. If there is no such disk or they lost it, then this creates large problems. Interface for the driver of pack will help you!
This assembling already contains all packets of drivers and it will work immediately after running off.
Advantage DRP:
- It is not necessary to search for and to draw off the influential of the driver
- It is not necessary to search for disks from the computer
- It is placed on one CD with 700 mb in size.
- It approaches practically all computers.
- Rapidly to establish!
- It is easy to use!
- Instantly are determined which of the archives of the packets of drivers it is possible to establish to this computer.
Clever regime of installation. Are unpacked only containing information about this device files, which reduces the time of unpacking and considerably accelerates the installation of drivers.
Manual regime of installation. Is unpacked entire archive the driver - pack and it is allowed the selection: what driver to what device to establish. Can be installed from DRP or from the dispatcher of the devices.
Rapidshare.com
http://rapidshare.com/files/189409973/DPA.part1.rar
http://rapidshare.com/files/189410225/DPA.part2.rar
http://rapidshare.com/files/189410495/DPA.part3.rar
http://rapidshare.com/files/189410775/DPA.part4.rar
http://rapidshare.com/files/189411032/DPA.part5.rar
http://rapidshare.com/files/189411431/DPA.part6.rar
Easy-Share.com
http://www.easy-share.com/1903397050/DPA.part1.rar
http://www.easy-share.com/1903397049/DPA.part2.rar
http://www.easy-share.com/1903397059/DPA.part3.rar
http://www.easy-share.com/1903397060/DPA.part4.rar
http://www.easy-share.com/1903397061/DPA.part5.rar
http://www.easy-share.com/1903397066/DPA.part6.rar
CBT Cisco CCDA Certification Package + eBooks
Instructor Michael Shannon has broken the topics down into easy to understand segments filled with information that you can readily put to use on the job. If you are already certified as a CCNA, this training will give you a lot of background and theory on network design to make you a more knowledgeable and effective IT professional.
Exam 640-861 DESGN is the only exam required to earn the Cisco Certified Design Associate certification. A basic understanding of Cisco networking such as a CCNA certification or equivalent knowledge is recommended before viewing these videos. The training contains 16 videos providing more than 8 hours of instruction.
CD-ROM Contents: Cisco CCDA-DESGN Certification Package
- Network Design Principles (Part 1): Policies, Procedures, and the PDIOO Method
- Network Design Principles (Part 2): Recognizing Customer Needs
- Network Design Principles (Part 3): 8-Step Design Methodology
- Modular Network Solutions (Part 1): The Cisco Enterprise Network Model
- Modular Network Solutions (Part 2): Modular Network Solutions and Intelligent Services
- Basic Switching Design Methods (Part 1): Layer 1 through Layer 3 Technologies
- Basic Switching Design Methods (Part 2): Enterprise Campus Switching Design Methods
- Choosing Your Routing Protocol (Part 1): RIPv2, IGRP, and EIGRP Comparisons
- Choosing Your Routing Protocol (Part 2): OSPF, IS-IS, and BGP4 Comparisons
- Basic WAN Design (Part 1): Enterprise Edge WAN Design, Planning and Technologies
- Basic WAN Design (Part 2): WAN, VPN, and Internet Backup Solutions
- IP Address Design Techniques
- Designing Voice Networks
- Assessing Network Security
- Designing Network Management
http://rapidshare.com/files/43032834/CBT_Nuggets_-_Cisco_CCDA.part2.rar
http://rapidshare.com/files/43018614/CBT_Nuggets_-_Cisco_CCDA.part3.rar
Trainsignal Exchange Server 2007 Training - LiBiSO
Exchange Server 2007 has made a significant impact on the messaging world. With newly redesigned architecture, a more robust email application, tighter security, and more options for users AND administrators... Exchange 2007's overhauled environment presents many new challenges.
So many in fact, Train Signal has responded with a new training course that breaks down the complexities of Exchange Server 2007 in plain language. You know you MUST learn Exchange Server 2007... why not choose the same proven training program being praised by IT professionals worldwide?
Featuring over 21 hours of original, premium training, you'll dive deep into the topics most professional Exchange and system admins are buzzing about:
- Understand the larger architecture changes, including how 64-bit servers change the playing field and shift resource needs for Exchange 2007.
- Learn how to deal with certificates in Exchange 2007
- Discover how to troubleshoot failures with Client Access technologies like Outlook Anywhere and Exchange ActiveSync
- Lock down your network security with Edge Transport Server
- Crash course in PowerShell for non-scripters
- Tackle initial setup issues regarding inbound and outbound mailflow
- The ONLY Exchange Server 2007 course on the market covering integration with Sharepoint document libraries!
- Learn about (and avoid!) the common misconfigurations and costly mistakes made by most admins (beginning AND pro)...
- And much more.... see full course outline...
http://hotfile.com/dl/1336540/47d7435/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part1.rar.html
http://hotfile.com/dl/1336196/414d1d4/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part2.rar.html
http://hotfile.com/dl/1336550/893ca31/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part3.rar.html
http://hotfile.com/dl/1336588/1bafcff/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part4.rar.html
http://hotfile.com/dl/1336589/7d0b69b/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part5.rar.html
http://hotfile.com/dl/1336707/a8570ca/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part6.rar.html
http://hotfile.com/dl/1336710/3b81326/0504.Trainsignal.Exchange.Server.2007.Training-LiBiSO.part7.rar.html
How to Install Windows Server 2008 Step by Step
Note: Windows Server 2008 can also be installed as a Server Core installation, which is a cut-down version of Windows without the Windows Explorer GUI. Because you don’t have the Windows Explorer to provide the GUI interface that you are used to, you configure everything through the command line interface or remotely using a Microsoft Management Console (MMC). The Server Core can be used for dedicated machines with basic roles such as Domain controller/Active Directory Domain Services, DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 web server and Windows Server Virtualization virtual server.
Follow this procedure to install Windows Server 2008:
1. Insert the appropriate Windows Server 2008 installation media
into your DVD drive. If you don't have an installation DVD for Windows Server
2008, you can download one for free from Microsoft's Windows 2008 Server Trial
website.
2. Reboot the computer.
3. When prompted for an installation language and other regional options, make
your selection and press Next.
4. Next, press Install Now to begin the installation process.
5. Product activation is now also identical with that found in
Windows Vista. Enter your Product ID in the next window, and if you want to
automatically activate Windows the moment the installation finishes, click
Next.
If you do not have the Product ID available right now, you can leave
the box empty, and click Next. You will need to provide the Product ID later, after
the server installation is over. Press No.
6. Because you did not provide the correct ID, the installation
process cannot determine what kind of Windows Server 2008 license you own,
and therefore you will be prompted to select your correct version in the next
screen, assuming you are telling the truth and will provide the correct ID to prove
your selection later on.
7. If you did provide the right Product ID, select the Full version of
the right Windows version you're prompted, and click Next.
8. Read and accept the license terms by clicking to select the
checkbox and pressing Next.
9. In the "Which type of installation do you want?" window, click the
only available option – Custom (Advanced).
10. In the "Where do you want to install Windows?", if you're
installing the server on a regular IDE hard disk, click to select the first disk,
usually Disk 0, and click Next.
If you're installing on a hard disk that's
connected to a SCSI controller, click Load Driver and insert the media provided by
the controller's manufacturer.
If you're installing in a Virtual Machine environment, make sure you read the
"Installing the Virtual SCSI Controller Driver for Virtual Server 2005 on Windows
Server 2008"
If you must, you can also click Drive Options and manually create a partition on
the destination hard disk.
11. The installation now begins, and you can go and have lunch.
Copying the setup files from the DVD to the hard drive only takes about one
minute. However, extracting and uncompressing the files takes a good deal
longer. After 20 minutes, the operating system is installed. The exact time it takes
to install server core depends upon your hardware specifications. Faster disks will
perform much faster installs… Windows Server 2008 takes up approximately 10
GB of hard drive space.
The installation process will reboot your
computer, so, if in step #10 you inserted a floppy disk (either real or virtual),
make sure you remove it before going to lunch, as you'll find the server hanged
without the ability to boot (you can bypass this by configuring the server to boot
from a CD/DVD and then from the hard disk in the booting order on the server's
BIOS)
12. Then the server reboots you'll be prompted with the new
Windows Server 2008 type of login screen. Press CTRL+ALT+DEL to log
in.
13. Click on Other User.
14. The default Administrator is blank, so just type Administrator
and press Enter.
15. You will be prompted to change the user's password. You have
no choice but to press Ok.
16. In the password changing dialog box, leave the default
password blank (duh, read step #15…), and enter a new, complex, at-least-
7-characters-long new password twice. A password like "topsecret" is not valid
(it's not complex), but one like "T0pSecreT!" sure is. Make sure you remember
it.
17. Someone thought it would be cool to nag you once more, so
now you'll be prompted to accept the fact that the password had been changed.
Press Ok.
18. Finally, the desktop appears and that's it, you're logged on and
can begin working. You will be greeted by an assistant for the initial server
configuration, and after performing some initial configuration tasks, you will be
able to start working.
For Official Microsoft information on Windows Server 2008, see the:
http://www.microsoft.com/windowsserver2008/en/us/default.aspx
Useful tips to start a small home based screen printing business
It is always grand to initiate a little sized dwelling based industry and if you have sufficient space in and around your residence, beginning a screen printing trade could be a better idea. You should primarily see all the portions of business, before you jump into the home based screen printing industry. Before starting the business, everyone must know the basic information. Screen printing could be done on flat surface regardless the material and it is broadly employed for the publicity as well as promotion principle. Many companies offer promotional gifts during their marketing plans screen printed with their logo, brands, products or slogan of the company to generate attentiveness amongst their established or potential customers. A fine computerized shade printing machine should be found out primarily, which has a erratic velocity. Primarily, a portable mechanism that runs on electrical supply would be sufficient to commence a residence based screen printing industry. You can do screen printing on articles as well as material.
Articled based screen printing is a manual process where the screen has to be designed using manual means in addition to printing up to two colors could be done also manually. Because, various screens are to be arranged correspondingly, the vivid printing would definitely cost you a opulence. Each screen would be printed with its own fitting paint as well as then you get the final perceptibility of the printing. Fonts also get through the same management along with then the printed articles go for the ventilation.The process alterations while reassigning the design precisely on the fabric. This procedure is also distinguished as screen printing as well as it is based on extremely unconventional technology. In order to transmit the printed designs on the textile, numerous transport papers are exercised. Shadowy or neutral dyed transmit papers are optimum. nebulization involves many other accomplices for the screen printing like inkjet papers, inkjet iron, inkjet photo papers, PC crafting kits, heat presses as well as many more to add on.
The pastel or shady transmit paper are used to print the opted for picture through a computer. After you have printed a appropriate design on the transport paper, it is then to be pressured with scorching iron till it bonds appositely on the material. You have to leave it to chill for a while, and then you can slowly shed of the transfer paper from the material. This is the method you can craft and transport striking design with the help of laptop along with create astonishing t shirts or sportswear as well as many other useful items.
Work from Home Employment needs the Meticulous Approach
However, if your employment is from home, it’s not necessary any ‘lesser’ than more traditional type of jobs. Data entry and assembling products from home are but just a few of the many options to make money.
Work from home employment required a particular mindset, if you want to reach your financial goals from your efforts. For the unwary with dollar signs in their eyes, remember to make money, you have to earn it. Bear this in mind. Nothing in life is free. Don’t expect too much, if you are not prepared to put in the effort, as you usually only reap from what you have sown. What happens is some folks make a half attempt, and when the big bucks don’t start to roll in, they give up, never really having made any real effort.
Although work from home employment can be rewarding, it can have some disadvantages also. In the real world, jobs have to be performed to a certain level of productivity and efficiency, and timekeeping is always important. But for those whose employment is of the work from home sort, sometimes these everyday work practices are not followed. Stopping and starting work when you want. Or not even working at all if you so desire, are all options when you are working from your home. There is no supervisor watching you and marking your progress.
How much you succeed, or not succeed, as the case might be, in working in home employment will very much depend on the sort of individual you are, and what your mindset is. Only two things are need to be successful in any venture, including work from home employment. Drive and Ambition. Nothing more. Nothing less. Money, contacts or even experience are not nearly as important as motivation, and the desire to succeed.
It’s certainly the case, money is a big motivator initially, but don’t let your initial motivation drop off if things are not working out as you planned. It takes time and effort to succeed, even in something as simple as work from home employment. Work out your plan of how you are going to get where you want, moneywise, and then keep to it. Have belief in your own capabilities and brush aside the first hurdle, instead of succumbing to despair. It’s only by being positive and determined that you will get where you wish in the quickest way
For more relevant information on work from home employment opportunities or for genuine companies hiring at home workers, follow the links
Web Based Video Conference Services Provide These 6 Benefits
1) Web based video conference solutions have the ability to save your business a great deal of money on travel expenses. Vital meetings with customers located far away can be very pricey, especially if multiple members of your business must attend. Meeting online costs next to nothing when compared to the high costs of business travel.
2) Internet based video conference services reduces the cost of long distance phone calls. Many online video conference services use the Internet to make phone calls, instead of traditional, costly long distance calls.
3) Customers respond more favorably to Internet based videoconference. Because you can see your clients via video, you can see how they react to the conversation in a way not possible in regular phone calls. Many clients feel more comfortable when seeing whom they are doing business with.
4) Presentations are easily shared when using online video conference services. Many web based video conference services give you the ability to share your computer desktop and other tools to share and interact with the members of the session. With this ability you get less confusion and more continuity of ideas than normal phone call business meetings.
5) Web based video conferencing is also effective when conducting team meetings. Whether the team members work from home or at various locals worldwide, web based video conferencing brings them into one virtual office where they can talk face to face. The online video conferencing makes for a more effective and fruitful team meeting.
6) Internet based video conference solutions are a excellent way for your business to go green. By reducing business travel your company is producing a smaller carbon footprint. Online video conference services fit in well with many businesses desiring to have a more green presence.
Web based video conferencing could be the tool that helps take your company to the next level by providing a more efficient way to meet. Online video conferencing can also help decrease costs and let a company have a more successful business plan.
A glossary of SEO terms
Within any professional industry there are some in house terms and phrases used that need definition and clarity to the uninformed. Search engine optimization is no different. I’ve written some post in the past that mention some of these, without elaborating on them - this post will hopefully serve as a reference post as time goes on, educating you guys who aren’t familiar with the terminology. It’s very easy to include some of these phrases within my writing, without realising that some people may not have a clue what I’m on about - so for completeness, here’s my SEO glossary.
Blackhats / Whitehats
Blackhat generally refers to a search engine optimiser who doesn’t play by the rules, and is constantly pushing the boundaries of what the major search engines will allow. If it is well known that for example links are important to rank well, a blackhat will perhaps spam or create automated programs to put links around the web. I think the term initially came from some connection with wizardry - search engine optimisers being the wizards of the web? Black being evil, white representing pure or good. Whitehats on the other hand are search engine optimisation professionals that plays by the rules and follows things like Google’s guidelines. A whitehat will err on the side of caution, and takes care not to trip any Google penalties, a Blackhat on the other hand is normally involved with naughty tactics on throw away domains, and uses this knowledge to bolster his Whitehat efforts.
Sitewide
A sitewide link is one which is available through your site, for example in the footer or on a menu which exists on every page within your website. A sitewide link will commonly not pass as much link juice as other links.
Nofollow
A link which carries the rel=”nofollow” attribute - this was a measure used to combat spam, and is implemented within common platforms such as Wordpress to avoid comment spam. A link with the rel=”nofollow” attribute, doesn’t carry any weight, and doesn’t count towards your overall pagerank.
Dofollow
A standard link which hasn’t been No followed. This type of link will pass page rank to another website or page on a website.
Link juice
Commonly used with the term Pagerank - Link juice can be defined as the amount of influence or Page rank being passed between webpages.
Pagerank
PageRank is Google’s algorithmic way of deciding a page’s importance. It is determined by the number of inbound links pointing at the page and used (as one of the many factors) in determining the results in the SERPS.
On Page techniques
Google uses both on page and off page techniques to determine the results in the SERPs - on page techniques refer to changes made to the web page code which help align the physical page code with relevance for a particular search phrase or term.
Off Page techniques
Off page techniques are used to enhance the relevance of a webpage by gaining links. Off page links may include traditional link building or link baiting
Traditional link building
Traditional link building refers to the practise of obtaining links from third party websites. This will commonly be performed by a human, asking for link exchanges from other webmasters, submitting websites to relevant directories or commenting on blogs which are dofollow.
Link Exchanges
Link exchanges or link swaps are used between two webmasters to share traffic and link juice between two websites. They are frowned upon generally as the two links cancel each other out, and look spammy. If in doubt don’t exchange links - you may end up getting into a bad neighborhoods.
Search phrase
A search phrase is the keywords someone uses to find your website in Google. Some search phrases are in more competitive niche’s than others, and are harder to rank for.
Link graph
When used in context a link graph represents the network of links that connect sites together. It is the overall picture of how a site is linked to and from.
Link bait
Link bait is content written solely for the purpose of gaining additional new links and a high influx of new traffic - simply from the content nature. I’ve written a post on link bait over here for further reading.
List bait
List bait is the same as link bait but takes the format of a list. e.g. 10 amazing widgets or 25 top tips for x y or z.
Competitive Niche
A hard to enter market online which caters for a particular niche, but is tough to rank for. For example pharaceuticals or mortgages. As the price paid per click is high for Adsense adverts,many people chase terms such as mortgages.
Keyword Research
Keyword research is the practise of working out how much potential traffic a keyword gets. See more over here. It may also cover Adsense keyword research (to figure out how much Adsense income a potential keyword may bring a website owner).
Keyword Density
Used within on page techniques keyword density refers to the distribution of a keyword within a web page. Each search engine favours its own keyword density. To figure out the keyword density get the word count of your webpage (WC), count the occurance of a particular keyword (OCC) in it, and divide into it. Want to know what the major search engines favour ? Have a peak at some of this keyword research.
(OCC / WC) * 100 = Keyword Density for a phrase
Internal Links
Internal links are any links which link (internally) to other pages on that website. A good internal linking structure is imperative for good SEO results. Linking back and forth with good link text can help Google determine what your website is about, and thus increase the likelyhood of you being found for particular terms. Internal links also help to improve the overall number of page views your website receives, as the pages are well linked together.
Outbound Links
Simply put - outbound links are links which link to other websites, and are sometimes known as external links.
Trust Rank
Trust Rank is a link analysis technique that many SEO’s believe is present somewhere within Google’s ranking algorithm, that uses the research conducted (PDF link) at Yahoo and Stanford University for identifying spam.
Link Text or Anchor Text
Link Text or Anchor Text are the words which are underlined when a link is created. For example Web Design Ireland - this will aid Google in identifying what a site is about. SEO’s commonly use the link text of a link to increase relevance for keywords or phrases.
Spider
A spider in the context of SEO, is an automated program which is used to collect and or mine data. In order for Google to find out about your website, it has to spider (or crawl) the web, clicking on link after link to find your website. The more links to your site, and the more frequently you update your content the more frequently you will get crawled. The information Google picks up from your webpage content is correlated in Google’s databases, and after your ranking has been decided, shown in the SERP’s. A search engine spider is also sometimes known as a robot.
Robots.txt
A robots.txt file contains instructions for spiders or robots on which pages they are allowed to index. If you wish to disallow access to certain parts of your website and not get listed for that page in Google, you need to have a robots.txt file in place. This is a good resource on the usage of a robots.txt file.
Backlink
A backlink is a link obtained from a third party website to a page on your website. The more of these that exist the more traffic you will receive. In addition, multiple backlinks has the added advantage of boosting your pagerank, and increasing your relevance in Google. Backlinks are sometimes referred to as inbounds.
301 Redirect
There are a variety of status headers that SEO optimisers need to be aware of, but one of the most important is the 301 redirect. This allows search engines to determine when a page has changed from one part of a site to another, or if a site has migrated from a subdomain to a main domain - or indeed completely changed. You can check the headers a particular webpage has, but if you are migrating, ask an expert.
Bad Neighbourhood
Bad neighbourhood’s describe areas on the web that have been penalised by Google in the past, and have engaged in dubious linking practises or cloaking. Gaining an inbound or more importantly adding outbound links to bad neighbourhoods can hamper your SEO efforts at best, or at worst; get you completely banned from Google.
Cloaking
Cloaking refers to the practise of sending human visitors one copy of a page, and the site engine spiders another. It is commonly performed by detected the User Agent of a browser or spider, and sending alternative content to Google. The perceived advantage to this is that keyword densities, link structures and other search engine ranking factors can be manipulated further without worrying about the readability of a page, or the navigation for humans. It is generally a serious faux pas to engage in cloaking of any kind, and it is well known to be a Blackhat technique.
Deep Linking
Deep linking refers to obtaining inbound links to content which is buried (deep) inside your site. Generally the majority of links to your website will hit the homepage. It is better to achieve links to content off the home page, which will improve the pagerank distribution across multiple pages. These are known as deep links.
Black Hole
A black hole site is created when a large tier 1 authoritarian site stops providing outbound links - or if it does provide outbound links they are made no follow. If another source is needed, another page is provided on the site for the citation, and as a result all inbound link juice is retained within the blackhole. A great example of this would be Wikipedia, which tends to dominate the SERPs for some keywords. A few newspaper sites have started to create blackholes to try and retain their linkjuice.
Rank
Rank is used to describe where abouts a particular site appears within the SERPs for particular keywords. Sometimes you will hear of SEO professionals talking about outranking someone else. This simply means that they have overtaken them in the SERPs.
SERPS
SERPS stands for search engine results page. It is the first page you see after you hit search on any major search engine, and lists the results for your particular search query.
Google Sandbox
The Google Sandbox is conceptually a place that new domains sit for a while once they are launched with a algorithmic lowered page rank. No one knows if the sandbox exists or not, and many dispute its existance. Matt Cutts has stated in an interview however that “there are some things in the algorithm that may be perceived as a sandbox that doesn’t apply to all industries”.
Domain Age
Domain age refers to how long a particular domain has been registered for. It is thought to be a ranking factor inside the Google algorithm, with older domains thought to be more likely to be relevant than new ones. Again this is something that is fraught with heresay.
User Agent
The User agent is the client application identifier that is used to access a web page. For example if you access a web page using Internet Explorer the user agent will contain a string that pertains to it - e.g. MSIE 9.0 beta or if the user agent is a search engine spider is browsing a web page it will likely identify itself as a bot of some sort. For example Google identifies its search engine spider as Googlebot. This is used by web analytics software such as Google Analytics.
Bait and Switch
The practise of attracting links for a term, think once ranking has been achieved for it, switching the content on the page. May be used for a landing page for a service or product.
Backing Up The Registry
Sure we like to fiddle around with the XP operating system, but sooner or later it's going to happen; the system won't boot or it becomes corrupt.The sure fire way is to do a complete system backup. Alternately you can create a Restore point using system restore. Or as shown in the above article, do a System State backup, which we'll outline below.
Microsoft has a Knowledge Base Article - 322756 which outlines the proper way to back up these settings.
Start Backup:
Start==>All Programs==>Accessories==>System Tools==>Backup
Choose "Back up files and settings" |
Select "Let me choose what to back up" |
Check off "System State" |
Choose a place to save your backup |
The file size can be quite large, so choose a source with ample space. A CD-R would be a good choice. A Zip drive would not! I save mine on a spare hard drive exclusively for backup. |
Completing the Backup! |
If everything looks good, click "Finish". |
The Backup Process |
Depending on the media you chose to save your backup, it could take a few minutes to the better part of an half hour to complete, From the example above, a 338 MB file took a little over a minute writing to a 5000 rpm 8 GB drive. A drive that I had sitting around collecting dust. |
Restoring Data |
When restoring, we'll go back to the very first example here and instead of choosing "Back up files and settings", we're going to select the obvious, "Restore files and settings". There's not much we can screw up here since you'll have no choice but to overwrite existing files when restoring a System State. I may cover that at another time since you made it this far, but there's no need to explain in detail, the reversal of the backup procedure. But I will supply these images to ponder! ;) |
Just choose the backup you wish to restore, click next: |
Then we're met with this warning. Click OK: |
So no matter what choice you make, we're always going to restore a saved state. After going through the motions as in backup, your system will be restored to it's previous glory! But, and a very big but, if your system refuses to start and allow you to use the Backup feature, then we're looking at repairing your installation. And that is for another day! :) |
System Restore Missing?
Over the past few months I've received several e-mails asking me why their System Restore is grayed out in System Properties. Well, while everyone enjoys freeing up resources by manipulating Windows Services, people tend to forget what they disabled or set as manual, until disaster strikes and they need to restore their system.
Check Control Panel ==> Administrative Tools ===> Services and scroll down to System Restore Service. Set it back to Automatic. You can try to Start it, but there's a chance it'll fail. But all should be good once you reboot. I recommend giving up a few resources to keep this XP feature active and running. But the choice is entirely yours.
Trojan Removal From System Restore
I've receive at least 10 e-mails a week regarding viruses, mainly because people have problems removing them. One of the biggest problems is the virus scanner removes or heals the infected file, only to have it pop up in System Restore.
The answer is simple. Shut off System Restore. This will purge all of the files set aside for this function. So, after you've run through the removal process using your AV or worm removal tool, just proceed with the following:
REMEMBER!!!!!
Pros: If you have infected files, this will remove them.
Cons: All of your previous restore points are gone!
In order to delete the files located in System Restore's folder you'll need to disable this feature.
For Windows XP:
1. Right click the My Computer icon on the Desktop and click on Properties;
2. Click on the System Restore tab;
3. Check the box Turn off system restore for all drives.
4. Click Apply. Up pops this box:
click "Yes", and after a moment of hard drive activity, your Restore points are gone.
Now to restore the feature, just uncheck the Turn off system restore for all drives box.
Same procedure, different approach For Windows ME (taken from here)
Manually Purge the Data Store
To completely and immediately remove the infected file or files in the data store, disable and re-enable the System Restore feature.
WARNING: Using the following steps will completely remove all restore points from the data store. Do not use this method if this will cause problems. When you enable the System Restore feature again, the System Restore feature will create a new restore point and then resume monitoring your computer.
Click Start, point to Settings, and then click Control Panel.
Double-click System, and then click the Performance tab.
Click File System, and then click the Troubleshooting tab.
Click to select the Disable System Restore check box, click Apply, click to clear the Disable System Restore check box, click Apply, and then click OK.
Restart the computer when you are prompted to do so. When the computer restarts, the data store is purged and the System Restore feature begins monitoring the system again.
Renaming a Series of Files
- Open the folder containing the target files in Windows Explorer.
- Highlight the group of files you want to rename
- Hit F2 or choose Rename under the File menu.
- Type in the new name
Windows Services Batch
A quick and effective way to start and stop Windows Services is by using a batch file. There's several reasons why you would want to do this, one of them being to free up gaming resources. This is an alternate method to bringing up the Windows Task Manager, and killing Processes individually. This way, starting and stopping is only one click away.
There is an alternate method (see bottom of page)
There a just a few commands to remember;
Net Stop and Net Start.
Create a new document in notepad. Now for every Service you want to stop:
Example:
Net Stop "Automatic Updates"
Net Stop "Remote Desktop Help Session Manager"
Don't forget the quotes!
In another batch file, do just the opposite to restart them, but by using Net Start.
Net Start "Automatic Updates"
Net Start "Remote Desktop Help Session Manager"
Don't forget the quotes!
Save both of these files in a convenient location, like your Desktop for easy access.
Some Items to remember:
- What you choose to start and stop is entirely up to you! Research before blindly starting and stopping services. Be smart about it!
- Save each (Start/Stop) file with the extension bat. For example services_start.bat or services_stop.bat.
- When saving the file in notepad, change the Save as type: to All files, otherwise you'll have to rename the file to end in bat
- A quick way to get all of your Services listed is to open Control Panel==> Administrative Tools ==> Services, and in the Action pull-down, choose Export. Now how you do this is entirely up to you. I choose to export as Tab Delimited CSV and opening in Excel. From there I just copied and pasted into notepad.
I prefer to create a Hardware Profile. Easier and cleaner than this method.
Why Some Files Show Up In Colors In Windows Explorer?
What Version of Windows Do I Have?
DISCLAIMER
WE USE LINKS TO SITES AND NOT DIRECT DOWNLOAD LINKS. THERE NO FILES HOSTED ON OUR SERVER,THEY ARE ONLY INDEXED MUCH LIKE GOOGLEWORKS.The hosting server or the administrator cannot be held responsible for the contents of any linked sites or any link contained in a linked site, or changes / updates to such sites.
BY ENTERING THIS SITE YOU AGREE TO BE BOUND BY THESE CONDITIONS
If you don't like the software posted here, please don't hesitate to let us know and we will unpost it.