Thursday, September 17, 2009

How to add or delete user account

First, Go to START
Second, Control Panel
Third, User account
Fourth, select account you want to edit or delete
Fifth, add some restrictions to the account
Sixth, then click OK

that's it. . . .
note: restart or log off your PC to test your newly created aacount

How to remove program from your PC

First, Go to START
Second, Control Panel
Third, Add/Remove Program
Fourth, Select a program you want to remove
Fifth, then click change/Remove

that's it. . . .
note: some application required to restart your PC to effectively remove the program.

Free xml sitemap generator

Tuesday, September 15, 2009

WINDOW SYSTEM REGISTRY

REGISTRY is one of the important configurations to set-up the Microsoft Windows Operating system. Some viruses modify the normal sequence flow of the system and some of them will delete important registry files and windows will not work properly. When fixing a registry back to the default, it takes time to find the exact files. There’s an efficient solution for that.

Just follow my instruction.

First, open a notepad

Second, copy the code below and paste it to the notepad


[Version]

Signature="$Chicago$"

Provider=Symantec

[DefaultInstall]

AddReg=UnhookRegKey

[UnhookRegKey]

HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"

HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe ""%1"""

HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"

HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System,DisableRegistryTools,0x00000020,0

Third, save the notepad to your desktop and name it UnhookRegKey.inf, close the notepad.exe

Forth, go to your desktop and locate the UnhookRegKey.inf, just right click on it and choose install.

Lastly, congrats, you’ve done it, don’t worry everything’s fine, your system will reload and your registry is now already set to default.


Just leave me a comment. Good luck.

Thanks

Point to Point Protocol over Ethernet

Point To Point Protocol over Ethernet (PPPoE)

The working standard for the PPPoE protocol was published by the IETF in 1999. The IETF specification for PPPoE is RFC 2516. PPPoE expands the original capability of PPP by allowing a virtual point to point connection over a multipoint Ethernet network architecture. PPPoE is a protocol that is widely used by ISPs to provision digital subscriber line (DSL) high speed Internet services, of which the most popular service is ADSL. The similarity between PPPoE and PPP has led to the widespread adoption of PPPoE as the preferred protocol for implementing high speed Internet access. Service providers can use the same authentication server for both PPP and PPPoE sessions, resulting in a cost savings. PPPoE uses standard methods of encryption, authentication, and compression specified by PPP.

PPPoE is configured as a point to point connection between two Ethernet ports. As a tunneling protocol, PPPoE is used as an effective foundation for the transport of IP packets at the network layer. IP is overlaid over a PPP connection and uses PPP as a virtual dial up connection between points on the network. From the user's perspective, a PPPoE session is initiated by using connection software on the client machine or router. PPPoE session initiation involves the identification of the Media Access Control (MAC) address of the remote device. This process, also known as PPPoE discovery, involves the following steps:

Initiation - The client software sends a PPPoE Active Discovery Initiation (PADI) packet to the server to intitiate the session.

  1. Offer - The server responds with a PPPoE Active Discovery Offer (PADO) packet.
  2. Request - Upon receipt of the PADO packet, the client responds by sending a PPPoE Active Discovery Request (PADR) packet to the server.
  3. Confirmation - Upon receipt of the PADR packet, the server responds by generating a unique ID for the PPP session and sends it in a PPPoE Active Discovery Session (PADS) confirmation packet to the client.

When a PPPoE session is initiated, the destination IP address is only used when the session is active. The IP address is released after the session is closed, allowing for efficient re-use of IP addresses.

iMAC Design and Memory

Skeptics have already pointed out that the new iPod-influenced iMac is hardly a new concept, even from Apple. The 20th Anniversary Mac was a computer in a screen too, and while it was curved and black rather than flat and white, the overall concept is the same: put everything in the screen.

The screen itself is amazing. We ordered the 20-inch model, and it's sharp, bright and colorful. At a native resolution of 1680 x 1050, you have a very large work area - large enough to display two browser windows side-by-side and happily read both at the same time. Those of us with failing eyesight might find small text sometimes a little hard to read, but both our testers found the pixel size comfortable.

We're also impressed with the quality of the image when set to magnified resolutions, although we see little general need for them. Previously, we've found LCD displays don't look so good when you use other resolutions, but though there's some softening of high-contrast elements, the various other image sizes are still very useable in the iMac G5, offering a choice between letter-boxed and stretched formats in several cases.

This iMac has finally convinced us that CRT monitors will go the way of the dinosaur. Previously we'd found the price difference too high and some visual artifacts unappealing, and while price remains a concern, the remarkable quality of this screen made us want to throw out all our CRTs. The image on this LCD is bright and colorful, and the small footprint reclaimed much workspace. And if that is not enough, a widescreen display just seems to work better with applications like Final Cut Pro, Motion, and so on. We used to think that the solution was to have two monitors side-by-side, but a widescreen display is much easier to work with.

In addition to its size and aspect ratio (ideal for many applications with multiple tool windows) the iMac G5's screen is incredibly bright. Neither of the CRTs could hold a candle to it, in terms of brightness. Color reproduction seemed very good. Comparing photographic images on multiple monitors, the iMac always looked brighter and more colorful.

Using a Calibrate Your Monitor page, we attempted to compare the LCD with the CRTs. While this is a limited test, it provides a simple way to see any major problems in monitor calibration. We could distinguish the shades of gray, and the color swatches were similarly displayed (on both the LCD and the CRT, the yellow swatches blended at about the 70% level).

Finally, by going into Displays and dropping the brightness down considerably we were able to get a similar display to the CRTs we were comparing it to. This screen is bright.

Of course, we've so far omitted any mention of the heart of the beast, a G5 processor running at 1.8 GHz. Just a year ago we reviewed one of the first G5 Power Macs - the middle-of-the-line 1.8GHz model at that time. In the tests we performed for this review (see Benchmarks) the iMac G5 performed almost identically to that Power Mac, which is a fast computer, indeed. If you don't need the expandability of the big Power Mac (or the dual processors of the current model) the iMac G5 can handle the same workloads with aplomb.

One caveat: the basic configuration includes only 256 MBytes of memory. While this might be acceptable for a few people, it hobbles the computer in typical applications, and we strongly recommend that you at least install a second 256-MByte memory module, which only costs about $55. The computer performs better with matched pairs of memory, as Apple documents and our benchmarks demonstrated.

iMAC Accesibility and Services

Apple has created a new support web site for the iMac that includes a Troubleshooting Assistant that takes you through a series of questions and will link to tech notes, as well as offer to provide an online connection to a tech support person. It requires you to enter your computer's serial number to chat with an agent. If you quit the web browser, it even attempts to restart from where you were the next time you return to the site.

With the iMac G5, Apple has written a new chapter in computer accessibility. You simply lay it face-down on a flat surface covered with a cotton cloth, unscrew three captive Phillips-head screws, and tilt off the back with its integral stand. You then have complete, unfettered access to the entire computer, and it's very easy to add an AirPort card or upgrade memory. The hard drive is right there, too, along with the rest of the components. Apple seems to be setting up a new service system that encourages customers to do many of their own repairs

Blog Widget by LinkWithin
Subscribe to updates Search Engine Optimization
Computers Blogs blog directory DigNow.net free back link
Computers blogs Networking, tips and guide for PC troubleshooting, PC tweaks, windows tweaks, latest gizmo Technology blogs & blog posts Link With Us - Web Directory Webfeed (RSS/ATOM/RDF) submitted to http://www.feeds4all.nl
Free Search Engine Submission Hit 2 Hit Ranking On our way to 1,000,000 rss feeds - millionrss.comî Submit Your Site To The Web's Top 50 Search Engines for Free! Sonic Run: Internet Search Engine Entredropper
Your Ad Here