Lock Your Private Folder

Today tips is telling you how to hide and lock your private folder, in this case your private folder named ‘private’ . I tell you that this trick is very easy to do, just copy the code below and paste it in notepad:


lock your folder


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK



echo Are U sure want to lock the folder ??(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.



ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

attrib +h +s "Control panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

echo The Folder has been locked

goto End


echo waitz.... enter the pass first!!!

set/p "pass=>"

if NOT %pass%== private goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private

echo Folder Unlocked successfully

goto End


echo Invalid password

goto end


md Private

echo The Folder successfully made

goto End


After you paste the code above in notepad worksheet, save it with file name:LOCK.bat

I tell you not to forget to give the extension .bat.

And then run the batch file named LOCK which you have made earlier, and you’ll see there’s a new folder named private.

Save all your private data, document, music, video, etc in that folder. Then to lock the folder, you have to run the batch file again. If you sure want to lock that folder type Y on the command prompt line.

And then you’ll see that the folder had been disappeared. If some time you want to access that folder again, just double click the batch file named LOCK and enter the password, which is originally private.

You can change your password by making a little change on the command line situated in row 21:

if NOT %pass%== private goto FAIL

Change the word private with your new password characters.

And finally save the change.

Translated and adapted from Jatibarang blogspot.


Rapidshare Tips, Tricks and Hacks

Rapidshare is the biggest file sharing website nowadays. But many people feel disappointed when they have to pay some bucks to get the premium account. For you who don’t want to waste your money to get that damn premium account, follow this tips. I know that this tips below is kinda oldschool, but I bet some of you haven’t know about this tips.

First you have to install Grease monkey plug-in in Mozilla Firefox.

Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools. It changes how Web pages look and act by altering the rendering process. Greasemonkey is to Firefox what aftermarket parts are to cars -- it lets you personalize your browser by making it faster and more powerful or simply by making browsing more aesthetically pleasing. How and why you will use Greasemonkey (and I predict you will, if you don't already) will depend on how you browse now.



1) Install the Greasemonkey extension >>


2) Restart Firefox
3) Go to


4) Right click on rapidshare.user.js and choose "Install User Script".
Run FireFox.
From File Menu click on Open File then brouse to whereever you saved the 'greasemonkey.xpi' plug-in. Open it, wait a couple seconds for the install button becomes active. Click on it to install this plug-in then CLOSE FIREFOX.
Run FireFox again. From the File Menu click on Open File then brouse to whereever you saved the 'rapidshare.user.js'. Open it. Click the Tools Menu then click on Install User Script then click OK.
Close FireFox.
The script will let you enjoy "no wait" and multiple file downloads

Second, you have to try Rapidshare premium link generator

Right now the generator is working with only.de version of the website and doesnot support .com.They are trying to fix the code for .com website also
Proxylist :
Sometimes you might get error like this on your download page " The number of download slots for your country are over ".For those here is a web proxy.This site allows you to bypass rapidshare, megaupload download limits.Paste rapidshare url to form and then choose web proxy and click 'Go' - it will change your IP. If it wont works you should choose another web proxy.

All that you need in rapidshare include:

1-Rapidshare Download Resetter
2-Get RapidShare 6.0
4-MaC Rapid v1.6a Beta11
5-More RapidShare
6-Nuevas Cuentas Premium
7-Rapid Decoder 0.2
10-Rapidleecher php
11-Rapidmule Rapidshare Downloader
12-Rapidshare Decoder
13-Rapidshare Downloader
14-Rapidshare Links Decoder
15-Muchas Cuentas De Rapidshare!!
16-Rapidshare Accounts Checker
17-Rapidshare Premium Accounts Generator
18-Rapidshare Links Cheker
21-Rapidshare Leeching Script
22-The Grabber
23-Ilimitado Rapidshare Con IE
25-Rapidshare Anti-leech Decrypter
26-Rapidshare Leecher
27-RapGet v.11
28-RapidUp v1.31
29-Rapidshare Time Resetter
30-Tips Rapidshare Download Xtreme Neo
31-Rapidshare Spider
32-Grabber v1.4.5 P
34-Cambiar IP
35-Relentless Rapidshare Spyder
36-Rapidshare Spyder
37-Keygen Premium Accounts
38-Más de 1.000 Cuentas Premium
39-Spyder Rapid
40-.Reg IE Downloader Unlimited


RapidLeecher v 5 Alpha

RapidLeecher is the ultimate, easy to use and free software to leech links from file share service Rapidshare, you just paste the link and your download will automatically get downloaded to your desktop with maximum speeds and minimal user interaction. The free software also has support for using proxy servers so that you can download many files at the same time (using different proxy).It works with Rapidshare new website also.

  1. Automated Downloading.
  2. Auto start and system tray support.
  3. Clipboard monitoring.
  4. Silent operation mode, will sit and wait for links in system tray.
  5. Proxy Support for simultaneous downloads and unlimited downloading.
  6. Inbuilt Downloader with detailed static's.
  7. Full installer and uninstaller.
  8. Simple utility.
  9. Pleasant, easy to use interface.
  10. Constantly Updated.
  11. Adware & Spyware Free.
  12. Support is provided for users with quick BUG FIXES
  13. Best of All its FREE & SAFE.

After you click on the link below,you will find the countdown on the bottom right of the page,After the countdown is over you will get the download link

Download from this site

I updated most of the link of downloading.If you have any new tricks of getting premium downloads please post it as a comment

Source:trap17 and impcompfact.blogspot

Thanks for those sites…


Lime Wire 4.18

Download Now (4.67MB)

Tested spyware freeclip_image001

LimeWire 4.18.6 is the world´s fastest P2P file-sharing application, letting users share and search for all types of computer files, including movies, pictures, games, and text documents. The application´s other features include dynamic querying, the ability to preview files while downloading, advanced techniques for locating rare files, and an extremely intuitive user interface.

LimeWire is compatible with the Gnutella file-sharing protocol and can connect with anyone else running Gnutella-compatible software.

At startup, the LimeWire program will connect, via the internet, to the LimeWire Gateway, a specialized intelligent Gnutella router, at startup to maximize the user's viewable network space.LimeWire is a tool that allows you to share files over the internet.

Further, the most recent version of Lime Wire enables Group functionality, so that users can connect to other people interested in sharing the same kinds of files that they are.


  • Ease of use - just install, run, and search
  • Ability to search by artist, title, genre, or other metainformation
  • Elegant multiple search tabbed interface
  • "Swarm" downloads from multiple hosts help you get files faster
  • iTunes integration for Mac users
  • Unique "ultrapeer" technology reduces bandwidth requirements for most users
  • Integrated chat
  • Browse host feature--even works through firewalls
  • Added Bitzi metadata lookup
  • International versions: Now available in many new languages.
  • Connects to the network using GWebCache, a distributed connection system
  • Automatic local network searches for lightning-fast downloads. If you're on a corporate or university network, download files from other users on the same network almost instantaneously!
  • Support for MAGNET links that allow you to click on web page links that access Gnutella.

Size: 4.67 MB
Publisher: Visit Website
Release Date: 2008-08-22
OS: Win 9x/ME/2K/NT/XP/Vista

Download Now (4.67MB)


Easy Trick to Speed Up your Google Chrome

If you have know how to speed up Google Chrome with V8 benchmark suites or something like that. I have an easier trick for you to speed up your Google Chrome, this doesn’t need you to download V8 benchmark code or something like that. This trick called startup switch.

To use startup switch : create a new Chrome shortcut on your desktop (or elsewhere). Right-click it and choose Properties. In the Target field, add the switch in question immediately following the path to chrome.exe .

There are a lot Startup Switches that can be activeted when launching Google Chrome, some examples:


For a complete list of Startup switches see here

I got this tips from mygooglechrome.blogspot.com


Enjoy the speedy browser of Google Chrome

From pcworld.com and pctipsbox.com

Click here to download Google Chrome

Google takes aim squarely at Microsoft with the release of its new Web browser, Chrome. Even though it isn't jam-packed with features, Chrome lives up to its hype by rethinking the Web browser in clever and convenient ways that make using the Web a more organic experience than you'd get with either Microsoft's Internet Explorer 8 or Mozilla's Firefox 3.

Initially available for download for Windows Vista and XP, Google plans to expand its Chrome offerings to the Mac and Linux platforms as well. The company doesn't offer any timeline for these versions, though. (For additional PCWorld.com coverage of Google's new browser, see "Chrome vs. the World" and "Google's Chrome: 7 Reasons for It and 7 Reasons Against It.")

Good features of Google Chrome:

  1. Chrome automatically detects the Web browser you're using and prompts you through the process of installation
  2. Chrome's layout is very simple
  3. At the touch of a button, Chrome lets you make a desktop, Start menu, or QuickLaunch shortcut to any Web page or Web application
  4. There is a feature called Omnibar, it lets you search not just your history, but Google and other sites as well.
  5. Provides incognito mode, private browsing mode.
  6. Provides a feature called Bookmark Manager.

After you feel excited about Chrome, here are the tips to supercharge your Chrome experience I got from pctipsbox.com:

    1) Install flash player in Google Chrome

    After you have installed Chrome, some of you will find that you are not able to view Youtube video. This is especially true if you are installing Chrome under Ubuntu (or other Linux distro).

    Here is what you can do to fix the problem:

    • Download the flash player for windows xpi file.
    • Change the xpi extension to zip
    • Extract the content of the zip file into a folder
    • Copy the files flashplayer.xpt and NPSWF32.dll to the directory /home/USERNAME/.wine/drive_c/windows/profiles/USERNAME/Local Settings/Application Data/Google/Chrome/Application/Plugins.
    • For Vista, copy to the directory: C:\Users\\AppData\Local\Google\Chrome\Application\Plugins
    • For XP,copy to the directory C:\Documents and Settings\\Local Settings\Application Data\Google\Chrome\Application\Plugins
    • Create the Plugins folder if it does not exist.

    Restart your Chrome. Your flash player should be working now.

    2) Search from the URL bar

    Unlike Firefox, you can’t find a search bar in Chrome. To perform a search, simply type your search phrase in the URL bar and press ‘Enter’. Chrome will automatically perform a Google search with the phrase.


    If you want to go to a site rather than performing a search, press “Ctrl + Enter” instead. This will insert www and .com in front and behind of the term and Chrome will bring you to the site.

    3) Change omnibox suggestion count

    By default, Chrome only shows 5 URL suggestions when you type in the URL bar.


    o increase/decrease the suggestion count, simply add the command line switch


    where your_desirable_suggestion_count is the number of suggestions that you want it to show.

    In Windows, right click on the Chrome shortcut icon and select Properties. In the Target field, add the above command line switch to the end of the command.

    In Ubuntu, on the desktop, right click on the Application menu and select Edit Menus. Navigate to wine->Programs->Google Chrome on the left pane. Double click on Google Chrome on the right pane and edit the Command

    4) Creating multiple profiles

    If you are sharing your computer with others (such as your family members), you may want to create a separate profile for everyone others won’t have access to your search history.

    Open the User Data folder your Chrome installation directory.

    For Windows Vista

    C:\Users\\AppData\Local\Google\Chrome\User Data

    For Windows XP

    C:\Documents and Settings\\Local Settings\Application Data\Google\Chrome\User Data

    For Ubuntu

    /home/USERNAME/.wine/drive_c/windows/profiles/USERNAME/Local Settings/Application Data/Google/Chrome/User Data

    Copy the Default folder and paste it in the User Data folder under another name (say Your_name).

    Create a shortcut icon on your desktop and add the following command switch to your path:

    –user-data-dir=”..\User Data\Your_Name”

    For Vista:

    C:\Users\USERNAME\AppData\Local\Google\Chrome\Application\chrome.exe -–user-data-dir=”..\User Data\Your_Name”

    For Windows XP

    C:\Documents and Settings\USERNAME\Local Settings\Application Data\Google\Chrome\Application\chrome.exe –-user-data-dir=”..\User Data\Your_Name”

    For Ubuntu

    wine /home/USERNAME/.wine/drive_c/windows/profiles/USERNAME/Local\ Settings/Application\ Data/Google/Chrome/chrome.exe –new-http –in-process-plugins –-user-data-dir=”../User\ Data\Your_Name”

    5) Change Chrome theme

    If you don’t like the default theme, you can easily change it with the following steps:

    • Download a Chrome theme of your liking.
    • Extract the default.dll file.
    • Navigate to your Chrome installation directory and go to /Application/Chrome version/Themes folder. The Chrome version will be in the form of Replace the default.dll file in the folder with the default.dll file that you have just extracted.
    • Voila! Your Chrome is now dressed with the new theme.

    6) Email link with Gmail

    In Chrome, you can easily create a bookmarklet to email links with your Gmail account. Here is what you do:

    In your Chrome, press “Ctrl + B” to load the bookmark bar. Right-click on the bar and select ‘Add Page‘

    In the Name field, type Send with Gmail (or whatever name you like).

    In the URL field, copy and paste the following code:


    and press OK.

    If you want Gmail to load in a separate tab, insert this code instead:

    javascript:window.open(’https://mail.google.com/mail/?ui=1&view=cm&fs=1&tf=1&su=’+document.title+’&body=’+document.location);return false;

    Whenever you want to send a link to other, simply click the Send with Gmail bookmarklet and the Gmail compose mail window will appear.

    7) Download Youtube video

    This trick allows you to download Youtube video right from your Chrome.

    Same as the Send with Gmail trick, make a new bookmarklet and name it Download Youtube

    In the URL field, copy and paste the following code in:

    javascript:window.location.href=’http://youtube.com/get_video?video_id=’ + swfArgs['video_id'] + “&l=” + swfArgs['l'] + “&sk=” + swfArgs['sk'] + ‘&fmt_map’ + swfArgs['fmt_map'] + ‘&t=’ + swfArgs['t'];

    Now go to Youtube and watch any video. Click the Download Youtube bookmarklet and it will save the current video to your hard drive. Remember to add a .flv extension to the downloaded video.

    8 ) Zoom in/out

    For those who find that the font is too big/small for your viewing, you can zoom in/out the page by pressing Ctrl + Mousewheel.

    9) Drag and drop tab to load in a new window

    When you have more than one tabs, you can easily drag any tab and drop it on the menu bar to load a new window.

    10) Install Greasemonkey on Chrome

    Although Greasemonkey is an addon for Firefox, you can easily get it to work in Chrome with this simple tweak:

    Drag this Monkey to your Chrome bookmark bar.

    This Monkey bokmarklet will enable any userscripts to be automatically turned into bookmarklets.

    To install Greasemonkey script on Google Chrome, go to user script and search for the Greasemonkey script you want. Visit the installation script page which says “install the script” and click on the Monkey bookmarklet, this will change the script into Chrome compatible bookmarklet. Now drag “Install the script” onto the bookmark bar of chrome.

Click here to download Google Chrome


What is Torrent and How to Speed Up your Torrent

From what-is-torrent.com and pctipsbox.com

Torrent is a small file (around few kilobytes) with the suffix .torrent, which contains all the information needed to download a file the torrent was made for. That means it contains file names, their sizes, where to download from and so on. You can get torrents for almost anything on lots of web sites and torrent search engines.

Torrent is the most popular way of downloading large files, including movies and games (remember legality of downloading).

Downloading with a torrent is advantageous especially when downloading files, which are momentarily very popular and whitch lots of people are downloading. Because the more people download the file, the higher speed for everyone

Downloading with a torrent is actually very simple. You just need a rightly set torrent client (setting your connection speed is usually all you need to set). Then you open the torrent file inside your client, set a place where you want to download desired files and then just wait till it's downloaded. Downloading with a torrent is no more complicated than using any other p2p application, but even simpler.

Newest client versions:
uTorrent - 1.7.7(220 KB)
Azureus -,5 MB)

If you want to know more about torrents, continue to torrent principles or if you know enough, go pick a client to download.

Tips to Speed Up your Torrents:

1. Cap your upload (most important)

Limit your upload speed to approximately 80 percent of your maximum upload rate. You can check your upload speed over here (never trust your isp). Once you know your maximum upload speed, change the max upload (to 80%) speed in your torrent client’s preferences.

Don’t get me wrong, everyone should share as much as possible, but if your upload rate reached it’s max, your download rate suffers significantly.

2. Hack the max TCP connections

If you’re on XP sp2, your TCP connections are limited to a maximum of 10. This seriously hurts your downloading speed because it wont let you connect to a high amount of ip numbers. It is supposed to slow down viruses because their spreading strategy is to connect to a high amount of ip numbers, but it also cripples your torrent downloads.

A nice way to fix this is to download this patch, it allows you to set the maximum allowed connections to any number you want. Any number between 50 and 100 is ok .

3. Check seeds and peers

A simple tip, but o so important. Always look for torrents with the best seed/peer ratio. The more seeds (compared to peers) the better (in general). So 50 seeds and 50 peers is better than 500 seeds and 1000 peers. So, be selective.

4. Change the default port.

By default, BitTorrent uses a port 6881-6999. BitTorrent accounts for a lot of the total internet traffic (1/3), so isp’s like to limit the connection offered on the these ports. So, you should change these to another range. Good clients allow you to do this, just choose anything you like. If you’re behind a router, make sure you have the ports forwarded or UPnP enabled.

5. Disable Windows Firewall

It sucks. Windows Firewall hates P2P and often leads a life of it’s own. So disable it and get yourself a decent firewall, Kerio or Zone Alarm for example.


STARTUP BLASTER : make your windows startup faster

Just as usual,i will give you free software,and some review about it. In this moment,I give you Startup Blaster for free.Startup Blaster is a software made by XenCare,like it called,its function is to faster your windows startup. So,this software is right for those who fed up with slow startup on your windows operating system.

Actually,there are some reason behind slow startup on your computer,one most considerable is your startup system that contain:

  • Startup Entries to run associated services for programs
  • Startup Entries to run the program on windows startup
  • Startup Entries to load some DLL sometime to run the corresponding program
  • and some other entries within your startup system

Those things automaticaly added in your startup system when you install various programs on your computer. Therefore, you can filter what startup entries that windows should load it or not when windows startup. Just click Windows,point to Run,and type msconfig,click on the startup section,there you can check and uncheck startup entries windows should load it or not.



But,if this trick doesn't work effectively on your computer,you should spend some time to try Startup Blaster. I tell you, it has a simple interface, so it doesn't difficult you when you are using it.



There, you can wheter delete or delay Startup programs, which give you a flexibility of doing your computer things. Click this link below to download Startup Blaster.

Download Startup Blaster


Internet Monitoring Software free download and Reviews

1. Family Cyber Alert

Download Now (2.48MB)

Are you concerned about your children's online activities? Do you feel you should keep a closer eye on what they are doing in cyberspace? Concerned parents are using Family Cyber Alert, an all-in-one PC/Internet activity monitor, to keep a watchful eye on their family and monitor their PC/Internet activities. This parental control tool records everything your family members do online and offline, including e-mail, chat/instant messaging, Web sites, applications, file access, keystroke (keylogger), screen snapshots, and time and sequence.

2. Soft Activity Keylogger 3.8

Download Now (10.81MB)

Secretly record keystrokes, e-mail, chat and programs on your child's computer. Monitor how your computer has been used while you are away. Keep an eye on how your children use their computer online

3. Secunia Personal Software Inspector

Download Now (474.66K)

The Secunia PSI allows you to scan, detect, check, and secure the applications installed on your computer. Get an assessment of the applications installed on your computer are they insecure, end-of-life, or patched. The Secunia PSI enables you to secure your applications, and to quickly and easily upgrade to new and secure versions of applications installed on your computer. Providing a graphical presentation of your performance week by week. Version includes unspecified updates.

4. IMMonitor AIM Spy 2.2.8

Download Now (1.24MB)

IMMonitor AIM Spy allow you to monitor, block or record AIM (AOL Instant Messenger) chat conversations remotely, Is your spouse, child, or friend hiding secrets from you, or you suspect they're engaged in dangerous conversations, If so IMMonitor AIM Spy is your best choice for anyone that needs this information quickly and secretly. It's easy to use and no additional program installation is needed on the monitoring target computers. Version 2.2.8 may include unspecified updates, enhancements, or bug fixes

5. Optenet Web Filter PC 9.6
Download Now (29.94MB)

Manage your family's Internet environment. Block pornography, drugs, violence and other Internet content children should not access. Manage the time each child spends online. Control what your kids download onto the family PC. Keep your family safe and secure. Rated more accurate than any other solution available.

Version 9.6 is compatible with Windows Vista and adds improvements in the traffic capturing mechanism.

6. Total Spy 2.7
Download Now (590.48K)

Total Spy is an all-in-one spy program that intercepts everything that is typed on keyboard, controls started applications, and active windows, visited URLs, scans Windows clipboard for changes, makes invisible screenshots from time to time, and writes this all to hidden folder on a hard drive. This program is absolutely invisible for everyone except you. You will only have to press the specified hot key to view the program. Version 2.7 is compatible with Windows Vista.

7. SurveilStar
Download now

SurveilStar is the powerful and easy-to-use PC monitoring, employee monitoring software that improves productivity. It records every detail of computer and Internet activities - emails, chats and instant messages, web sites visited, search history, program activities, document operations, printing, disc burning, movable devices, and many more. With SurveilStar, you can monitor everything they do on computers and the Internet, nothing hides from you.
The surveillance screen snapshot feature enables you to see exactly what the monitored targets do on their computers, like you are watching behind them.


Refurbished Laptop Computers- Upgrade Or Purchase New?

From: http://www.wazzup.co.nz

It happens at least once in the life of every notebook computer-it slows down in performance, and just doesn?t have the get up and go that it used to. Like most people, you run your favorite antivirus program(s) to make sure that ?bugs? haven?t infected your system, and you even run spyware programs to make sure that spyware isn?t overloading your system resources. To take things a step further you clear out unnecessary items from your start menu, make bios adjustments and get rid of old programs you haven?t used in a while.

After all that, your laptop computer still runs slow and you realize - it?s time for an upgrade.

Once upon a time, laptop and notebook upgrades were considered ?technician only? activities because of the fact most notebook manufacturers have proprietary technologies in their systems. That is still true to some extent, but the main hardware components affecting system performance in most laptops are those that have become pretty much industry standard. These are:

1.) Hard Drive 2.) Memory 3.)Processor

These components can be easily replaced in most notebooks. The first thing to do however is to determine if the upgrade is worth the cost. Check prices online to see how much it will cost. If I pay $120 for a hard drive, $50 for memory and $150 for a new processor, it may not make sense to do all three upgrades, I may only want to choose 1 at first and then check system performance.

If my laptop wasn?t very expensive to begin with, I may want to consider just purchasing another one. If I can get a Refurbished Windows Vista HP laptop for $499.00, that may make more sense than upgrading components on an older system.

CNET.com offers an online course on how to upgrade a used notebook computer step by step. Check it out and determine which option is right for you.


11 Ways To Keep Your Kids Safe Online

From: parental-control-software.com

The Internet is one of the greatest inventions in the history of mankind, but it still largely unregulated and, often times, quite dangerous to children who may not understand that there are bad people out there with computers. There are several steps you can take to ensure the safety of your children online, however. The following list is far from complete, but it is a good place to start if you have a young child and a computer in your home.
1. Install monitoring software
No home that has a computer and a child should be without monitoring software. These programs allow you to create restrictions on various users who access the Internet in your home. You, as the administrator, would simply set up an account for yourself and a second one for your child. You can have the software forbid access to adult sites or any other sites that you don’t approve of. These software programs can also restrict access to things like chat programs or any other program that accesses the Internet. No home should be without one if you are concerned about your child accessing the Internet.

2. Forbid Internet Usage When Not at Home
Since it is impossible for you to monitor the Internet usage of your children when they aren’t at home, it is important for you to make a rule forbidding web surfing when not at home or in a classroom environment. This can include surfing alone at a friend’s house or even using the computer at the library. It may seem a bit draconian at first, and you can always lessen the restrictions as your child grows into a teenager, but while they are young, it is important for tight rules to be in place to keep your kids safe online.

3. No Instant Messaging Software
One of the most common ways Internet predators access their victims is with instant messaging software like Yahoo, AIM or MSN. Teens love these programs because it allows them to stay connected to friends, but preteens really have no use for them. Forbid access to these programs until they reach a certain age. No preteen needs a social life that requires a program like this to be in use, anyway.

4. Ask Permission Before Visiting a New Site Alone
It is a good idea to create a list of acceptable websites your child can access. You can even set up the monitoring software you have to only allow access to those websites when your child is logged in. You can also have your child specifically request access to new sites, that way, you always know what groups of websites they are visiting at all times. Again, as your child grows older, you can lessen these restrictions somewhat and still keep your kids safe online.
5. Use the Internet With Your Kids
If your child has a report do to for school and they will need to access to numerous new websites that they haven’t visited before, it may be a good idea to simply surf the web together. This can be even more helpful if your child’s report has to do with a somewhat controversial topic like the Holocaust or breast cancer. The chances of your child stumbling upon material that they may not be ready to see is high, so surfing together can help answer any questions that might come up.

6. Closely monitor social networking sites
Social networking sites like MySpace and Facebook are all the rage now on the Internet and, often times, even preteens have their own pages. These sites can also be an easy place for children to be contacted by people wishing to do them hard. Thankfully, these websites have special settings specifically designed for underage users that turns off the chat feature and limits the number of people who can access their page. You could always forbid these sites altogether, but if you do choose to allow them, there are safeguards in place to help protect your kids. Either way, closely monitoring their page is always a good idea to keep your kids safe online.

7. Keep computer out in the open
While your teenage son or daughter may not like the idea, keeping your computer out in the open is always a good idea. This will automatically help to curtail any unauthorized usage, especially if your child thinks they are a budding hacker. You don’t have to sit over your child’s shoulder the entire time online, but by having the computer out in the open, you are taking away the temptation to surf places they aren’t supposed to.

8. Separate account for teenagers, fewer restrictions
As your kids grow up, they are going to have different online needs. The websites your teenage children want to look at are going to be quite different than the ones your preteen kids want to look at. Monitoring software allows for multiple accounts with different levels of restrictions for different people so don’t be afraid to let your teen have a bit more leniency. If you should happen to find adult content on your computer, take the opportunity to talk to your teen about sex and staying safe online.

9. Install functioning anti virus and firewall software
Since kids aren’t always aware of the threats that are posed online, you can help to keep them, and your computer, safe by always having anti virus software and a functioning firewall up and working at all times. There is no telling when your child may download a piece of rogue software or click on a suspicious pop up window. If your computer isn’t prepared, you could lose everything in seconds.

10. Time limits
Many parents have taken to setting time limits for the amount of television their kids can watch during a day or the amount of time spent playing video games. The same can be done for the computer, which will likely teach your child to budget their online time in a productive way instead of possibly looking for trouble. Time limits can be a great way to keep your kids safe online.

11. Education
Finally, the best way you can keep your child safe is with the right education. You don’t need to explain how sexual predators track down innocent kids to your 8 year old, but telling them to alert you if someone were to message them or that it is OK to alert you if they find a disturbing picture online is a great first step. By the time they are teens, they will likely know almost as much about the Internet as you do and the lessons can get a little more adult.


Free Stuff: Orbit Downloader

Download free

Orbit claims to have come up with a quintessential download manager which is not only light and fast but can download virtually anything that is present on your screen. Here is what the techie dino has to say for it.

The Dino bats for orbit for the following reasons:

1. The Gamut

Orbit can download a wide variety of rich media. It supports HTTP/FTP/HTTPS/RTSP/MMS/RTMP protocols and is thus able to extract streaming audio, video, flash files and lots of other embedded items from a site.

2. The Grab++ tool

I found the Grab++ tool an amazing feature of Orbit downloader. It detects every downloadable media on an open website and lists them with details. One can select the items to download with the help of checkboxes present alongside.


3. Browser Integration

Orbit integrates well with all browsers and allows to download the media from your browser window itself. In IE 7, it pops up a ‘get it’ option whenever you roll in to a media while in FireFox it places an icon near the downloadable media which can be clicked to begin the download.

4. Its light and fast

Speed is the keyword when it comes to computers and Internet. Orbit downloads at a decent speed using p2p and multi-source downloading technology. Also it has pretty low CPU usage and the installation too is quite light thus making it least taxing for your system.

5. Features

There are certain features that make the orbit downloader stand apart from most download managers.

Orbit enables you to scan the downloaded items using an anti-virus, can create batch downloads and can monitor your clipboard links.It also supports various file sharing sites like Rapidshare.


The Cons of Orbit Downloader :

As for the cons of the software, do let me know if you find any. However, I would have loved to see the Grab++ window inside the main orbit window which would have saved me the hassle of switching windows.

Taken from reviewsaurus.com


Batch File encryption and free download

Sometimes when you just finished your own batch file, you want everyone use your batch file. But, it becomes a problem when you can’t encrypt the command line in your batch file. Don’t worry guys, cause I have a cool tip to solve it and tell you where to download the software FREE! Cause I know you all love freebies.

  1. First, you have to download the software on http://abyssmedia.com/quickbfc/
  2. After you finished the download, install the software on your computer.
  3. Screenshot :


4. After you done with the installation process, open the Quick Batch File Compiler.
5. Once you will see a window, just like the screenshot above.
6. To encrypt your batch file become exe file, click File on the toolbar and select Open (for shortcut, you can use Ctrl+O)
7. Locate where your batch file exist and click open.
8. Once you will see your batch file command line appear on the Source Tab.
9. If you sure about encrypt it become an exe file just click the Build Button on toolbar.


10. Once you will see a pop-up window, and specify the location where you want to place your new exe file.


Maximize your Processor speed

Today tip is very useful for those users who are still using computer with minimum processor speed. To increase the performance of slow computer, you can force your system to free up the idle tasks that are running in the background and sharing processor power. This end tasks method force the computer to devote its full processor resource to what you want it to do.

Follow the given steps to end the idle tasks:

  • To enable this feature, you will need to be logged into your computer with administrative rights.
  • Click Start button and click on Run option.
  • In the Run box, type the command Rundll32.exe advapi32.dll,ProcessIdleTasks command and press Ok button.


  • Here system will take some time to end the background idle tasks.

Top 10 Free Undelete Tools

Have you ever lost your important data or file saved on your computer? I know that pain. So, in this article I give you the best 10 undelete tool which you can download FREE!

  1. Undelete Plus.
    This one has a quite simple user interface. So it means, this software is easy to use. It can be operated in Windows 95, Windows ME, Windows NT, Windows 2000, Windows XP, Windows 2003 and Windows Vista. You can download this software in http://www.undelete-plus.com
  2. Restoration
    This software is also easy to use. Even more, you don’t have to install this software to can be operated on your system. Download this software http://www.snapfiles.com/get/restoration.html
  3. PC Inspector File Recovery
    Although this tools is not user friendly (rather complicated), but this tools is quite powerful to recover your removed data. http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1
  4. Recuva
    Has a simple appearance. It has advanced mode and basic mode, which you can switch anytime you want. It’s very easy to use it. You can download it on http://www.recuva.com/
  5. Handy Recovery
    Have you deleted important files that you need right now? Handy Recovery is the program that can recover them fast and easy. It can restore deleted files and data from formatted or corrupted partitions in various file systems: FAT, NTFS and others.
  6. Disk Internals Uneraser
    If you want a fast and easy uneraser then you came to the right place – DiskInternals Uneraser can recover all your precious files in a matter of seconds! No need to investigate the labyrinths of complicated software – a simple and intuitive interface of DiskInternals Uneraser will guide you through the recovery process, so you can restore any type of data from your hard-drive, memory cards, flash USB sticks, camera or other storage media.
  7. The Undelete Data Recovery Software
    The Undelete Data Recovery Software can recover all types of files. No matter what was the reason of data loss: hardware malfunction, power cutoff, virus attack, program failure or human fault – the Undelete Data Recovery Software can recover lost or accidentally deleted files. Give it a try!
  8. Free Undelete
    FreeUndelete is a freeware data recovery program for deleted files. In case of accidental deletion of files on a NTFS and FAT32 file systems FreeUndelete is the utility to help.
  9. File Rescue Plus
    File-Rescue Plus works on ALL Windows® (XP/2003/2000/NT/95/98/Me!) operating systems and offers several different methods for recovering deleted files. It can recover deleted files, photos and music from all types of media such as a hard disk.
  10. Final Recovery File Undelete Utility
    FinalRecovery is a powerful and convenient data recovery solution. It was developed to recover deleted files and folders from Hard Disks and Floppy Disks which were formatted in FAT12, FAT16, FAT32 and NTFS file systems.

Source:detikinet.com and recovery-reviews.com


How to Speed Up your Firefox

Open your Firefox browser and type about:config then press enter

  1. Once, you will be confirmed to tweak your firefox,


2. Click the button I’ll be careful,….
3.In the filter bar type network.http.pipelining, the value field should be set true, you can do it by double-click it.


4.Next, in the filter bar type network.http.pipelining.maxrequest . Double click this field and set its value to 8.

5. In the filter bar type network.http.proxy.pipelining . Double click this field to set the value field become true.

6. Right click on about:config window (for apple user ctrl+click) select new and then click Boolean


7. Type content.interrupt.parsing in the New Boolean pop-up window and then click OK.


8. Then, select true and click OK


P.S: I got this tips from www.pctipsbox.com, I just tried it and it works like a charm


IP Addres “What is it and How to Change it”

IP Address (Internet Protocol Address) is a row of binary numbers between 32 bit, until 128 bit. IP address is used as an identification address for each host computer in a network system.

How to see my IP Address?

It’s easy to see your IP Address of your computer. First, you need to click Windows and then go to run, type cmd. On cmd, type ipconfig and you will see your IP Address. Don’t forget to add ‘/all’ switch for more information about your IP Address.

"How do I change my IP address?"

Before trying any other methods to change your IP address, try turning off (or unplugging the power of) your Cable/DSL modem for five minutes. In many cases this will change your IP address. However, if that does not change your IP address, repeat the process for 8 hours (overnight works well) instead of 5 minutes. Hopefully this will result in an IP change.

If the above does not result in your IP address changing, please look through the below for the situation that best matches yours and attempt to change your IP address that way. Unfortunately you are not able to get your IP address to change in all cases, as it is ultimate determined by your ISP's DHCP configuration (when you've got a dynamically assigned IP address, that is.)

Windows - Computer connected directly to the modem

  1. Get to a command prompt. (START, run, cmd).
  2. Type "ipconfig /release" (without the quotes, on the command line by itself).
  3. Type "ipconfig /renew" (without the quotes, on the command line by itself).

Windows (second option) - Computer connected directly to the modem

  1. Get to a command prompt. (START, run, cmd).
  2. Type "ipconfig /release" (without the quotes).
  3. Shut down computer.
  4. Turn off computer.
  5. Turn off all ethernet hubs/switches.
  6. Turn off cable/DSL modem.
  7. Leave off overnight.
  8. Turn everything back on.

Network with Router

  1. Log into the router's admin console. (Often
  2. Release the IP address. (Method varies by router manufacturer)
  3. Turn off router, ethernet hubs/switches, and the cable/DSL modem.
  4. Leave off overnight.
  5. Turn everything back on.

If you are using a cable/DSL modem and a router, you may wish to connect your computer directly to the cable/DSL modem. Please note that this could significantly impact your system security. This allows your ISP's DHCP to issue you a new (hopefully changed) IP address based of the (hardware) MAC address of your computer's ethernet card.

If all the above has not worked to change your IP address and you have a router, check and see if there is a "Clone MAC Address" option. Using it should change your IP address; however, you'll only be able to do it once (in most cases).

These will not work in all cases. If all else fails contact your internet service provider (ISP) and ask them if they are able to change your IP address or how long your connection needs to be off for your IP address to change.

                                                Source : http://whatismyipaddress.com and other sites related to the topic


How to Change Computer Password Using Command Prompt

Ever thought to be a hacker? Well this article will show you a little tips to change someone account’s password with a simple line of command. All you need to do are:

  1. Open Command Prompt, if you don’t know where is it, click Start- All Programs-Accessories-command prompt
  2. After you see a black window pop-up type ‘ Net User ‘
  3. You will see a little information about all accounts in your computer
  4. You should choose account you want to hack
  5. For example you want to hack account Jenny, you should type ’ Net User Jenny and press enter ‘.
  6. Now you are seeing full information about Jenny’s account
  7. For changing Jenny’s password, you should type ’ Net User Jenny * ‘ and it then show you how to change Jenny’s password
  8. If you can’t understand the command line, you just type ‘ Net User Jenny the new password ‘.
  9. Say it you want to change Jenny’s password to 123456, you should type ‘ Net User Jenny 123456 ‘
  10. Now, you successfully change Jenny’s password to 123456.

Speed up your Internet Connection Speed

For you who have internet connection on your pc or laptop, it is annoying if your internet connection run too slow. By making a little change on your Windows XP system configuration, you are able to increase the connection speed of your internet.

So let’s make a little change on your system configuration:

  1. Click Start-Run
  2. Type gpedit.msc and then click OK


  1. Take a look on the left pane, expand the administrative Templates folder, and then Network, and next QoS Packet Schedule folder
  2. On the right pane, double click on Limit reservable bandwith


  1. Check the Enabled box and then change the Bandwith limit to 40%

MacBook Air 1.86GHz Test Results


At a media event on October 14, Apple announced a top-to-bottom refresh of its portable Macs. Along with new unibody MacBooks and MacBook Pros, the company also unveiled an updated MacBook Air that featured faster graphics and more storage.

The new US$2,499 top-of-the-line MacBook Air has arrived in the Macworld Lab, and our test results show that while the many under-the-hood improvements have helped to make Apple's ultraportable more competitive in terms of performance, it's still a product that you buy for its small size and light weight, not its speed.

The configuration we tested definitely offers better specs than the previous top-of-the-line MacBook Air. It's powered by a standard 1.86GHz Intel Core 2 Duo processor with 6MB of L2 cache, as opposed to the custom-built 1.8GHz Intel Core 2 Duo with 4MB of L2 cache used on the original high-end MacBook Air. The speed of the front-size bus has increased to 1066MHz, and the new MacBook Air models use faster DDR3 RAM as opposed to the slower DDR2 RAM found in the original Airs. In terms of storage, the new high-end Air uses a solid-state 128GB hard drive, twice the size of the SSD found in the original Air.

Both of the new MacBook Air models eschew the original Air's pokey Intel GMA X3100 integrated graphics for the much more powerful, though still integrated, Nvidia GeForce 9400M graphics system--the same graphics used in the new unibody MacBook Pro and MacBook models, albeit running at lower speeds in order to save power and reduce heat.

How do these internal updates translate in terms of real performance? It should come as no surprise that our overall system performance benchmark, Speedmark 5, found the 1.86GHz MacBook Air to be quite a bit faster across the board than the standard 1.6GHz MacBook Air from January of this year. The 1.86GHz Air turned in a 51 percent higher Speedmark score, with the most impressive individual results being the Quake 4 frames per second score and the Zip Archive test, which took nearly 10 minutes on the older Air and a less painful 6 minutes on the 1.86Ghz MacBook Air.

More telling were the new system's results compared to our build-to-order Air from earlier this year, the model that featured the optional 1.8GHz Core 2 Duo processor, but kept the standard 120GB Parallel ATA hard drive. The new high-end Air posted a 39 percent higher Speedmark 5 score than that old CTO Air. It was also 28 percent faster in our Photoshop tests and 22 percent faster in our Cinema 4D testing. Compressor, iMovie and iTunes were faster on the new system, but not by as big of a margin. Again, the biggest gains for the new Air were in our game frame rate tests. The new Air was able to display 24.8 frames per second in our Quake 4 tests, as opposed to the older CTO Air's 3.9 fps - that's more than a 6x improvement.

But the MacBook Air just can't match the speeds of other Mac laptops. In fact, the Core 2 Duo processor in the new low-end $999 white Mac Book runs 13 percent faster than the high-end MacBook Air. The Air was a little less than 3 percent slower in terms of Speedmark 5 scores. A closer look at the individual test scores shows that the Air's Speedmark score was helped tremendously by its Nvidia graphics, which helped it post an average Quake 4 frame rate of 24.8 versus the low-end MacBook (with Intel GMA X3100 graphics), which posted only a score of 7.6 fps. In other individual tests, the low-end MacBook was a clear winner in all but the Unzipping of a 2GB folder, which the solid state hard drive in the 1.86GHz MacBook Air helped the system to place the fastest time.

If you were to compare the top-of-the-line MacBook Air to the top of the new unibody MacBook line, a 2.4GHz Core 2 Duo model with the Nvidia GeForce 9400M graphics, you'd find a much bigger difference. The new high-end Air earned an 18 percent lower Speedmark 5 score, a 25 percent slower result in our Photoshop test suite, and a 71 percent slower time in our Compressor MPEG encode tests. Did I mention that the new 2.4GHz MacBook costs $100 less and has a built-in SuperDrive, built-in Ethernet, and a second USB port? The Air, on the other hand, weighs three pounds, versus 4.5 pounds for the MacBook.

We have the new low-end 1.6GHz MacBook Air on order, but it hasn't arrived in the Macworld Lab yet. When it gets here, we'll start testing and post results as soon as we can. And stay tuned for our full review of the new MacBook Air, coming soon.


Understanding DDR and DDR2 Memory

Memory Primer

DDR and DDR2 memory modules dominate the current desktop PC memory landscape. What are they and why are they different from the other memory types? Let’s find out.

DDR and DDR2 go by the full names of DDR SDRAM and DDR2 SDRAM respectively. The word “SDRAM” stands for Synchronous DRAM, which is a variant of DRAM (Dynamic RAM), a memory type widely used in PCs several years ago.

“RAM” stands for Random Access Memory. RAM is utilized in computer systems as main memory for temporary data storage. Most contemporary RAM is volatile, i.e. the information is lost once power is cut off. DRAM and SRAM (Static RAM) are the most popular RAM types used in computers. DRAM memory cells require constant refreshing because they utilize both transistors and capacitors; the latter of which loses the values it stores as time elapses if refreshing is not performed. Unlike DRAM, only transistors are used in SRAM memory cells, with no capacitors involved. SRAM, therefore, does not require refreshing, resulting in much higher performance. SRAM is much more expensive than DRAM, however, and is not used in the same memory sizes as DRAM. SRAM is implemented primarily in CPU caches (i.e. the CPU L1/L2 cache).

Going back to SDRAM, this type of memory utilizes a synchronous interface. This means it waits for a clock pulse to transfer data, and thus it is in sync with the computer system bus and the processor. SDRAM transfers one bit (per data line) of data per clock cycle to greatly improve the performance of system memory over previous FP/EDO memory, for which data transfer was possible only every other cycle. Typical PC100 and PC133 SDRAM modules provide maximum bandwidths of 800MB/s and 1066MB/s respectively.

DDR Basics

Short for “Double Data Rate”, DDR technology doubles the bandwidth of SDRAM under optimal conditions. This is to say that twice as much data can be transferred between the memory and system during the same amount of time. This is because DDR SDRAM sends and receives data twice as often as common SDRAM.

How does it do this? SDRAM transfers data on every clock cycle (to be specific, on the rising edge of every clock cycle), while DDR transfers data on both the rising edge (clock signal bounces from LOW to HIGH) and the falling edge (clock signal bounces from HIGH to LOW) of a clock cycle. Therefore, two bits (per data line) are transferred every clock cycle. In order to do this, two bits are accessed from the memory array (where data is actually stored) for each data line on every clock cycle, this process is called the “2-bit prefetch”.

A DDR200 module provides a data bandwidth of 1.6GB/s - we also call this PC1600 memory. Likewise, DDR400 is also called PC3200 memory, because it provides 3.2GB/s bandwidth. You can double the bandwidth by using same-speed memory modules in dual channel mode if your system supports it: dual channel DDR400 is capable of delivering 6.4GB/s bandwidth.

DDR2 Introduction

As 2nd generation DDR, the most important improvement found in DDR2 memory is its transfer data rate or bandwidth. As in the case with DDR SDRAM vs. SDRAM, the bandwidth of DDR2 memory can double the DDR’s.

The DDR standard stops at DDR400 (of course, there are lots of DDR500 and even DDR600 products on market, but these are for overclockers), which provides 3.2GB/s bandwidth (single channel). The DDR2 standard starts from DDR2 400 and goes all the way up to DDR2 800 or even higher. DDR2 800 or PC2 6400 can provide 6.4GB/s bandwidth (single channel), twice as much as DDR400. Dual channel DDR2 800 will offer an unparallel 12.8GB/s bandwidth, which is a huge leap from the 6.4GB/s bandwidth of dual channel DDR400 memory.

Since DDR already transfers data on both the rising and falling edges of a clock cycle, how does DDR2 double the bandwidth yet again? The answer lies in the I/O buffer frequency, which is doubled with DDR2. The memory controller in our systems only deal with the I/O buffer on the memory chip. To double the data from the memory array to the I/O buffer, DDR2 utilizes a “4-bit prefetch” as opposed to the “2-bit prefetch” with DDR. This means that 4 bits of data are moved from the memory array to the I/O buffer per data line each core clock cycle.

The core clock cycle here refers to the cycle time of the memory array, and the frequency of the memory array is half that of the I/O buffer and 1/4 of the data rates. Take DDR2 800 for example: it has an 800MHz data rate, the I/O buffer works at 400MHz, and the core frequency of the memory array is only 200MHz. The core frequency remains the same as DDR400. However, the DDR400 I/O buffer operates at 200MHz. The time of “a core cycle” is therefore the same whether it is DDR400 or DDR2 800.

DDR2 chips may look different than DDR as well, because most DDR chips use the TSOP-II (Thin Small-Outline Package) form factor while DDR2 utilizes the FBGA (Fine Ball Grid Array) form factor, which is smaller in size than TSOP-II. FBGA chips also feature less electrical noise than TSOP-II, thus resulting in improved signal integrity at high operating frequencies.

Here is a quick reference of differences between DDR and DDR2.

Data Rate 200/266/333/400 MHz
or higher
400/533/667/800 MHz
or higher
Prefetch Size 2-bit 4-bit
CAS latency 1.5, 2, 2.5, 3 3, 4, 5
Write Latency 1T Read Latency-1
Voltage 2.5V 1.8V
Package Type TSOP-II FGBA

Besides the enhanced bandwidth, DDR2 also uses less power than DDR by operating on 1.8V - a 28% reduction compared to DDR (2.5V). DDR2 has power saving features such as smaller page sizes and an active power down mode too. These power consumption advantages make DDR2 memory especially suitable for use in notebook computers.

DDR2 provides some other new features like OCT and OCD as well. We can find lots of resistors around the memory slots on a DDR-supporting motherboard, they are called termination resistors, which are used to eliminated excessive signal noise. You won’t find these resistors on motherboards utilizing DDR2 memory modules, since the termination resistors are built into each of the memory chips on the module, which is far closer to the source of the noise. This feature is called OCT or On-Die Termination, and it can reduce interference within the chip, thus guaranteeing the stability and reliability of DDR2 memory when working under high frequencies.

There are other features such as Posted CAS and Additive Latency, which work together to prevent data collisions and utilize the data bus more efficiently; and the Off-chip driver calibration (OCD), which increases signal integrity and system timing margin as well.


View previously open folder after shutdown

Sometimes you want to access certain folders on your computer regularly, but if you have to always open those folder every time you turn on your computer, obviously it takes so much times. So, you can set them re-open automatically every time you turn on your computer. Here is the tip:

  1. Open My Computer
  2. Click Tools and then select Folder Option


3. If you can’t find the Folder Option on the Tools menu, just read the article about Recover Folder Option.

4. If you have clicked it, select View Tabs.

5. Look at the Advanced Setting area, scroll down to bottom and then give checkpoint on the Restore previous folder windows at logon, and then click OK.

6. Now and forever when you log on or restart, your computer will open the previously opened folder for you, as the same location before.


7. Now, when you turn on, restart or log on to your computer, your windows will automatically open the previously opened folder on your computer.


Uninstall Windows Messenger

In this article I will show you how to uninstall Windows Messenger on your XP. Yes, for some people who already have MSN messenger on their XP apparently they don’t need 2 free messenger programs from Windows, because so far MSN messenger is better than Windows Messenger so I’ll show you how to uninstall Windows messenger that will save your drive space.

  1. First thing you need to do is go to drive C:, click twice on folder named Windows, and then click twice on ‘inf’ folder.
  2. After that, you need to find sysoc.inf , and click twice on it
  3. Now in this step you have to make some modification on the code. First you have to find this line on the component section.



4. The next thing you have to do is delete the words ‘hide’. And it should now look like this:


5.After you have done it, save the file and close it.

6. For uninstalling your Windows Messenger, go to Contol Panel – Add or Remove Windows Components. On the list you should see “Windows Messenger” Check the box beside it and click next and follow the next instruction.

7.Finally, you have done with your job. The last thing you need to do is just restart your computer to see the result.


Partitioning your Hard Drive

For people who have computers, surely they don’t want to have only a hard drive in their computers. Instead, they need some hard drive (commonly 2 or 3) in their computer, so they can group their private data, system files, or their other stuff. So, an ability to partition hard drive is needed in order to group your stuff in your computer.

Disk partitioning is the creation of separate divisions of a hard disk drive using partition editors. Once a disk is divided into several partitions, directories and files of different categories may be stored in different partitions. More partitions provide more control but too many become cumbersome. The way space management, access permissions and directory searching are implemented depends upon the type of file system installed on a partition. Careful consideration of the size of the partition is necessary as the ability to change the size depends on the file system installed on the partition.

Partitioning your Hard Drive in Windows XP & Windows 2000:

  1. Right click on My Computer, then click Manage
  2. Then, Windows will open up Manage Screen. On the left pane, select Disk Management
  3. Usually, Windows will open up wizard to help partition and format your new drive. If it does not, right click the new drive in the lower pane and select initialize drive.


  1. Right click on the new drive and select new partition
  2. Then it will open up a wizard to help you partition your hard drive.
  3. In this step it will then prompt you how much drive space you want to allocate to the new partition.
  4. If you choose not to use the full space of your main hard drive for your new partition disk, you can make up additional partition in the same way up to 4 partition hard drive per disk.
  5. If you have done, you will be asked to name your partition. (C: , D: )
  6. After you named all of your partition, you have to format your new partition hard drive, which Windows will prompt to do automatically.
  7. If the formatting is complete, you have to reboot your computer to see the result.

Before you buy laptop

At the moment, laptop is not a luxurious stuff for many people. Everyone owns laptop and everyone knows how to use it. Laptop is useful for the mobile person. But many people become hesitate when they are going to buy a laptop consider that laptop is not a low-priced stuff. Moreover, there are so many kinds of laptop offer different specs (specification) with different price also. Don’t worry, I tell you some tips which may guide you when you want to buy a new laptop. Here are 4 major tips you need to know before you buy laptop:

1. Consider between your budget and your purpose of buying laptop.

If your purpose of buying laptop is for gaming or designing, you have to choose the specification which offers high quality of VGA Cards, and also offers a high-speed memory.

For mobile person, you can focus on the battery, size of screen, and connectivity like: Wi-Fi, Bluetooth, IrDA, network card and modem.

2. Choose the longest time of warranty of laptop!

But you may consider with your budget.

3. Regardless of your purpose of buying new laptop, you should consider about the size of screen, weight of laptop, and the long-life of the battery.

If you often use your laptop on the road, you should choose a light laptop with a medium size of screen. It helps you feel comfort when you get used to travel somewhere.

You should also consider about the long-life of the battery. Mostly, laptop’s battery can last until 3 hours without being connected to adapter. If you want to economize the long-life of the battery, you may turn off the connectivity of your laptop like Wi-Fi or Bluetooth.

4. You should also consider about the selling-price of the laptop.

When you are going to buy a new laptop, you have to consider about its selling-price. I also recommend you not to buy a laptop which its spare parts are uneasy to find on the market.

I hope those tips will be helpful for you who are going to buy a new laptop. Thank you.


Computer Virus

What is the definition of computer virus exactly? Well, a computer virus is a program, a block of executable codes, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user.

There are many different types of computer virus: Boot sector virus, file virus, direct action virus, Multi partition virus, Polymorphic virus, Stealth virus, and Macro virus.

1. Boot sector Virus

This type of virus is a common virus; duplicate itself by oppressing the boot sector. So that when the computer is booting, the virus will be automatically executed in the computer’s memory.

2. File Virus

Attacking files which are executed by an operating system. Usually this kind of virus attack file that have .com or .exe extension.

3. Direct action Virus

This kind of virus will enter the computer’s memory to execute other files, and then execute the other program in order to deceive the user.

4. Multi partition Virus

This type of virus is the combination between boot sector virus and file virus.

5. Polymorphic Virus

A kind of virus which is designed to deceive AV program, by changing its structure, after executing some command.

6. Stealth Virus

Controlling DOS level instructions by controlling the interrupt table.

7. Macro Virus

Written in a programming language from an application, so that virus has platform independent characteristic.

The difference between Computer Virus and other Computer program

1. The ability to get some important information from the user’s computer.

Virus is designed to infect many files or programs. For example, virus will infect all .txt or . htt files, so that virus will look for information about the existing files or program. After they done it, those important information will be hidden in other directories in order to deceive the user.

2. The ability to check program or file

When a virus is infecting a file, virus should be able to check whether a file has infected or not.

3. The ability duplicating itself

This is the first ability which has to be had by a computer virus.

4. Ability to manipulate

This ability is used to show messages, picture, deleting files, stealing files or data, etc.

5. The ability to hide itself

All of the virus’s activity must be invisible either for the user and for computer.

The structure of Virus:

1. The virus identity code

Every single virus has a unique identity that no other virus has. For example, virus A has X identity, and virus B has Y identity, so those virus is recognized by antivirus from the unique identity.

2. Virus Duplicating Code

A program can’t be mentioned as a computer virus if it can’t duplicate itself. So this is one of the main structures of computer virus.

3. Protection and defend code

This code is needed by virus to deceive antivirus program. It can be done in many ways: encrypting the virus file, invisible the virus’s process on computer, or showing a redirecting message to prevent the user to open the antivirus program.

4. Manipulating code

The function of this code is to delete files, execute certain applications in order to steal or send data to an e-mail.

Because of the extraordinary development of computer technology, the variant of computer virus is going to be a huge in amount. Therefore, protect your PC with the latest antivirus and keep it update periodically, and not to send malicious data to your lovely computer.