Pages

New Improved Google Search !!!!!!

Custom Search

Feb 20, 2012

How To Secure Your Computer From Malware & Virus - Prevention Tips

Follow these tips to prevent any unexpected virus attack on your computer:



Try different protective software


You can enjoy a free trial of different antivirus software programs and select the one which you like the most and that suites all your needs. If you are a regular internet user, then you must install an antivirus, which provides maximum real time security and protection against all Trojans, Worms and Spyware. Even, Key loggers and Adware are not safe in front of such antivirus software. Software that can’t safeguard your computer on the internet is more than a trash. So, think again and get the most authentic software for protecting your computer.

Secure you files to a separate location


A virus can attack anytime and anywhere. It’s better to keep your files and data safe on some other location rather than keeping them on the same drive. In case, you get into some trouble and a virus attacks your PC, your data will be safe and secured. A back-up copy will do well and keep you out of stress and strain. To keep your data more secure, you can also save it in some external hard drive.

Get rid of the junk e-mails


Junk e-mail is more than a cyber menace and should be dealt with strictly. You can delete junk files and get rid of such clutter, rather than forwarding to your friends and other contacts. This way, you can stop a chain of spam mails and even help others to stay safe on internet. At least, you can stop a chain of intrusive mails and irritating spam.

Scanning is good


Regular scanning of your computer will let you know about any possible virus presence in your computer. Whenever you are performing a scan, never stop in middle of the scanning process and let the process completed itself. You can also set an automatic and regular scan through your antivirus software. No doubt, your virus scan will slow down your PC for a few minutes, but it’s good to follow this practice. Through this way, your computer will be safe than before. Scanning will keep your system well-protected and clean all the unwanted viruses and malwares from your computer and data components.

Delete cookies, clean recycle bin


Cookies can also become a lethal weapon for the hackers and virus programs to invade your PC without any restrictions. So, whenever you use internet and do some routine browsing, it’s recommended to delete your cookies and clean your browsing history. This practice will also pace up your computer and the chances of any virus attack can be narrow down easily.

Similarly, if you encounter some suspicious files in your computer and want to delete them, then destroy them permanently and clean your recycle bin as well. Removing a program from Add and Remove option can do well, but sometimes, your recycle bin can surprise you. Hence, it’s a good practice to delete all the rubbish from your recycle bin and keep your system working good.


This guest article is by Tim Edmonds, a freelance writer interested in Spyware Doctor Review.

Feb 17, 2012

How Backup or Restore MS Outlook 2007 Rules

1) To backup your MS Outlook Rules Go to Tools Menu & select Rules and Alerts.


2) Now click on Options & select Export Rules.


3) New Window will pop up where you will have to name the file (eg. Rules_Backup) & save it & make sure the  save as type should be Rules Wizard rules.

4) Now just in case your PC was rebuilt and you need to restore your MS Outlook Rules please follow the instructions. In MS Outlook click Tools Menu --> Rules and Alerts --> Options --> & then click on Import Rules... & select the file which u have saved earlier (eg . Rules_backup) & click on Open & then press OK.  




5 ) You can see all the rules are back --> Then click on Run Rules Now & select all the rules by checking the boxes..

6) Finally Click on Run Now to execute all the rules.


  
7. After restoring and running your MS outlook Rules close all window.


Feb 10, 2012

Recover the Unreadable and Corrupted File of Microsoft PowerPoint (Windows XP Only)

Recover the Unreadable and Corrupted File of Microsoft PowerPoint (Windows XP Only)

Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become corrupted when you are trying to save it or if you were working on it and your PowerPoint application or windows crashed due to power failure. Windows saves a duplicate copy of working file as a temporary version. There is no need to use any third party software to manage these types of corrupted files, because you can recover them from TEMP folder. 
  
 
Follow the given steps to recover the corrupted files in MS PowerPoint: 
 
First click on Start button then click on Search option to start your search process.
 
Here type the *.TMP in "All or part of the file name" box then choose the "Local Hard Drives" option in "Look in" box.
 

 
Now click on Search button to start the search process of temporary files on your system local drives. 
 
After some time, windows locate the list to temporary files. Here arrange the all temp files as Date modified.


Now open the PowerPoint and try to open these temp files or double click on that file to run in PowerPoint.

Feb 9, 2012

The Pirate Bay Says Goodbye to (Most) Torrents on February 29

The Pirate Bay has confirmed that all torrent files being shared by more than 10 people will be deleted on February 29. The decision is causing a small panic among the site’s users, but in reality little will change as all files will remain available through magnet links. The Pirate Bay crew told TorrentFreak that this is merely a “step forward in technology” and confirmed that the site is here to stay.


 http://blog.xyzsor.com/wp-content/uploads/2012/01/pirateMagnet.png



For half a decade The Pirate Bay has been the leading BitTorrent site, but soon its users will no longer be able to download .torrent files.
The first step in this direction will be taken on February 29, the Pirate Bay announced today.
Instead of deleting all torrent files at once, the Pirate Bay crew will start with all files that have more than 10 peers. This is to guarantee that people will still be able to download less popular files, which tend to start slower through magnets.
While there are fears that this is the end of The Pirate Bay, nothing could be further from the truth. For users of the site the upcoming switch is expected to go smoothly.
People will be able to download all files as usual, but instead of using a .torrent file downloads will be initiated through a magnet link. The actual content of the .torrent file will then be downloaded from other people instead of the Pirate Bay’s servers.
Although it might take a little longer for less popular downloads to get started, all files will remain available. Also, users will still be able to upload .torrent files, which will be converted into magnet links by The Pirate Bay.
The Pirate Bay team told TorrentFreak that the transition to a magnet site is “a step forward in technology,” and one that will make the site more resistant to being shut down.
Without torrents it takes less bandwidth to host a Pirate Bay proxy site which are used to circumvent ISP blockades in countries like Italy, Ireland, The Netherlands and Belgium. In addition, the Pirate Bay will become much more portable and thus easier to move around.
How easy it is to carry a copy of a torrent-less Pirate Bay became apparent last week, when a user reduced the entire site to 90 megabytes – small enough to fit on a tiny thumb drive. The Pirate Bay team likes the idea of a “portable” backup of the site and told TorrentFreak that they are considering releasing an official version in the future.
It’s quite remarkable to see how The Pirate Bay has transformed in recent years. The site is no longer hosting a tracker, and soon .torrent files will be entirely replaced by magnet links. Despite these changes the iconic file-sharing site is picking up new users every week.
The Pirate Bay crew told TorrentFreak that users can be assured that they have no intention of going anywhere in the near future. With or without torrents, the site is here to stay.

Feb 7, 2012

BTJunkie Shut down


BTJunkie was a BitTorrent search engine operating between 2005 and 2012. It used a web crawler (similar to Google) to search for torrent files from other torrent sites and store them on its database. It had nearly 4,000,000 active torrents and about 4,200 torrents added daily (compared to runner-up Torrent Portal with 1,500), making it the largest torrent site indexer on the web During 2011, BTJunkie was the 5th most popular BitTorrent site.


Features

BTJunkie indexed both private and public trackers using an automatic web crawler that scanned the Internet for torrent files. Cookies were used to track what a visitor downloaded so that there was no need to register in order to rate torrents. The ratings and feedback given by people were used to help filter and flag malicious torrents uploaded to the website.



Feb 3, 2012

World's First Bamboo Smartphone Adzero appears in UK

Kieron-Scott Woodhouse, a student of Middlesex University at UK designed the smartphone from Bamboo. The handset named Adzero is made from a four year old organic bamboo and claims to be the World's first Android Bamboo Smartphone. However, this is not the first of its kind (tech products) Bamboo is used in the world. Woodhouse designed this artifact during his spare time and got backing from a technology entrepreneur in the later stages.

bamboo-smartphone-1

bamboo-smartphone-2

bamboo-smartphone-8

According to Woodhouse, "Bamboo may seem like a strange material to use for a phone, but it's actually extremely strong and very durable, perfect qualities for this kind of application. I can't wait to see my mobile phone in shops this year." AD will have selected independent retailers stocking the handset. These will be boutiques and/or specialist shops. We are also happy to discuss other possible market routes, but these are our focus at the moment."

Adzero a.k.a AD is originally intended from the Chinese market and soon got traction during London Design Week. This smartphone is a prototype running Android 4.0 Ice Cream Sandwich and comes with a bigger screen than Apple iPhone. Though the detailed specifications aren't available, it sports a camera with circular flash around the lens. The pricing and availability is yet to be known. So, we shall try to keep our readers updated with more information.

Subscribe via email N get Tips

Enter your email address:

Delivered by FeedBurner

Label Cloud

2009 (1) 2010 (3) 2011 (1) 2011 IPL Player (1) 3 IDIOTS (1) 3G dongle (1) Academics (3) ACCOUNT (1) ACRTICALS (3) acta (1) Addons (1) ADSL Router (1) Adzero (1) AIRTEL (14) Airtel 3G (1) airtel Grps (1) airtel proxy (1) android (3) Android Phone (3) Android Phone codes (1) ANTIVIRUS (7) ARP hacking (1) BAT (2) BHUVAN (1) BIOS (2) bitcomet (16) BITTORRENT (21) BLOG (4) BLOGGER (5) blu ray (1) BOLLYWOOD LATEST MOVIES (4) BOLLYWOOD MOVIES (4) BOOK (2) British rapper (1) BROADBAND (4) BSNL (7) BTJunkie (1) BTJunkie Shut down (1) BTJUNKIES (17) Cabana (1) calender (2) Caller ID (1) CAM RIPS (8) CAPCHA (1) CAT (1) CCNA (6) CCNP (1) CES 2011 (1) CHAT (2) CHATING (1) CHATTING (1) CHINA (3) Christmas (1) CID (1) CISCO (8) CISCO PRESS (2) CLONING (1) CODE (5) COLLECTION (2) COMMAND (2) CRACK (26) crack key (3) CRACKSOFTWARE (11) CSS (1) DAILY MOTION (1) Dan Bull (1) DAP (1) data backup (1) data storage (1) dekstop (1) Delhi 100 Year (1) DESI TORRENTS (20) DISK (1) DIY (1) DOCOMO (2) Docs (1) DOWNLOAD (13) DragonBall Browser (1) dvd (1) DVD Rip (12) dvd vs blu ray (1) E-mail (1) Ebook (7) EDUCATION (3) ERROR (3) ESET (1) ET (4) EXAM (8) EXPLORER (2) EXRTA TORRENT (20) extratorrent (10) FACEBOOK (8) facebook hacking (6) FACEBOOK TIMELINE (2) FACEBOOK Tips (1) FAT32 (1) FILESHARNING (1) FIRE FOX (14) First Bamboo Smartphone (1) FIRST ON NET (1) FOLDER (2) FORMAT (1) Free DNS (1) FREE GPRS (22) FREE MMS (12) FREE SMS (16) freesoftware (6) FRIST ON NET (1) FTP (1) full software (25) FUNNY (3) G.D (1) G.D. (1) GAME HACKING (12) GAME KEYS (2) GMAIL (12) GMAIL HACKING (16) GMAT (1) GNS3 (1) GOOGLE (53) GOOGLE CROME (20) Google Doodles (3) GOOGLE EARTH (23) Google Global DNS (2) Google Map. (1) Google Nexus (2) Google Nexus mobile (2) Google Open DNS (2) google pulgins (16) google Search Tips (7) google software (5) Google Tip (6) Google Tricks (6) GOOLGE HACK (35) GSM (2) gsm hack (1) GTALK (7) GURU OF HACKING (8) H (3) HA (1) HAC (3) HACK (100) HACKER (39) Hackers (14) HACKING (76) HACKINGTOOLS (38) Happy holidays (1) Happy holidays 2011 (1) HARDWARE (2) HOLLYWOOD MOVIES (4) hotmai (1) How To (1) how to backup data (1) how to store data (1) HSTR (2) HTML (1) HUTCH (2) I-PHONE (4) I-phone 4 (3) I-Phone 5 (3) I-Phone 5 Leak (2) I-phone Leak Video (2) IDEA (6) IDM software (1) IE (8) IE8 (6) IE9 (6) India Delhi (1) INFORMATION (3) INTERNET (22) IP-ADDRESS (6) iPhone 3 (1) iPhone 4s (1) iPhone 4s Tariff plan for india (1) iPhone 5 (1) iPhone4 (1) IPL 2011 (1) IPL 4 Auction News (1) IPL4 (1) IPLT20 Schedule (1) ISOHUNT (2) ISP (2) IT (2) jingle bells (1) JOKES (2) JTO 2009 (1) KEY (4) KeyBoard (1) Keyboard Tips (1) Kieron-Scott (1) KUTCH (1) learning software . Photoshop (2) lightroom (1) long term data backup (1) long term storage (1) Lumia 710 (1) Lumia 800 (1) MAC (2) MAC OS (1) Malware (1) Mango (1) MANGO Mobile OS (1) MANGO OS (2) MAT (1) MBA (3) Meego (1) MESSENGER (3) METACAFE (1) MICROSOFT (7) Microsoft Onenote (1) Microsoft PowerPoint (3) MOBILE (41) MOBILE CODES (27) Mobile Memory Card (1) Mobile Repair. (2) Mobile Save (1) mobile software (1) MODEM (2) MOTOROLA (2) MOUSE (1) MOVIES (5) MS-DOS (4) MS-OFFICE (3) MS-OFFICE KEYS (2) MSN HACKING (7) MSN PASSWORD (11) MTV (2) MYSPACE (1) N-SERIES (1) Network (5) NETWORKING (6) new camera (1) New Year (5) NEWS (3) NOD32 (1) NOKIA (10) Nokia lumia (1) Nokia Lumia 800 (1) Nokia Lumia 820 (1) Nokia Lumia 900 (1) Nokia Lumia 920 (1) Nokia Mango (2) Nokia meego (2) Nokia N9 (1) NORTON 360 (1) NOTEPAD (1) NOTIFICATION (1) NTFS (1) OPERA (5) ORKUT (16) ORKUT HACKING (18) ORKUT VIRUS (8) OUTLOOK (4) P2P (10) PAPER (1) PASSWORD (7) PC SUITE (3) Peer To Peer (8) PENDRIVE (1) PHILIPS (1) PHOTO (2) photoshop (1) pipa (1) Piracy (13) PIRATESBAY (26) PRINTER (1) PROXY SITES (3) Ragaa.com (1) RAPID HACK (6) rapidshare (1) Rapper protests piracy (1) REGISTRY (4) Reset Your Mobile Memory (1) RESULTS (4) ROADIES (4) Roadies 8.0 Raghu Rajiv RAnvijay Bani Roadies 5.0 Roadies 6.0 Roadies 7.0 (2) ROUTER (4) RSS (1) S60 (5) SAGEM (2) SAMSUNG (7) SARDAR (1) SCPIRTING (5) SCRAP (2) Search by Image (1) secret codes (2) Secure Your Computer (1) SECURITY (6) Serial key (2) SETTING (2) Shirt (1) SIM (1) SIMULATOR (3) SITEMETER HACK (1) SKYPE (1) Smartphone (1) SMS (7) SOFTWARE (17) Songs (1) Songs.pk (1) SOPA (2) SOPA Cabana (1) SPAM MAIL (3) statcounter (1) STD (1) storage (1) suraj fake (1) SYSTEM (1) T (1) TAG (1) Tango OS (1) TECH NEWS (1) THEMES (3) Timeline (1) TIMEPASS (4) TIP (110) TIPS (126) TNA (1) TOOLBAR (1) TOOLS (7) torrent (23) TORRENT HACK (9) TRICK (187) TROJAN (4) TUTORIAL (1) TV (1) TWEAK (8) UK (1) Unlimited Download (1) unlocking (1) UNRATED EDITIONS (3) USB (9) USB dongle (1) UTORRENT (15) VIDEO (4) Virus (2) Virus google (1) Virus total (1) Virustotal (1) VODAFONE (5) w3 counter (1) WAY2SMS (2) website (1) WI-FI (14) WINDOWS (96) WINDOWS 7 (44) windows 7 GodMode (2) Windows 7.5 OS (5) Windows 8 (9) windows 8 installation (2) WINDOWS VISTA (27) WINDOWS XP (92) windowsphone (1) Winzip (1) WIRELESS (12) WORDPRESS (1) WP7 (3) WP8 (3) WVIL (1) WVIL unbelievable (1) WWE PAYPER VIEW (1) WWE RAW (1) WWE SMACKDOWN (1) www.extrattorrent.com (5) XAT (1) XP Password (2) Xvid (9) YAHOO (18) YAHOO HACKING (11) yahoo messanger (4) YOUTUBE (9) YOUTUBE dOWNLOAD (3) YOUTUBE DOWNLOADER (3) youtube new look (2) zip7 (1)