Showing posts with label Computer Tricks. Show all posts
Showing posts with label Computer Tricks. Show all posts

USB Device not recognized :Fixed


One day I plugged a USB Device into PC or Laptop. Suddenly I got a Pop up message like “USB Device not recognized” .
I unplugged and inserted again my USB. But same result i got. I tried again and again.I didn't get anything new.
This issue can be caused if any of the following situations exist:
  • The currently loaded USB driver has become unstable or corrupt
  • Your PC requires an update for issues that may conflict with a USB external hard drive and Windows
  • Windows may be missing other important updates hardware or software issues
  • Your USB controllers may have become unstable or corrupt
  • Your external drive may be entering selective suspend
  • Your PC motherboard may need updated drivers
usb not recognised

Then I searched on internet for this problem, then i got some solutions. I am going to share with you,
Method I:
  • Right click mouse on My Computer icon.
  • Click on Manage;

computer manage

  • Go to Device Manager 
device manager

  • Uninstall all of the devices under USB Controllers
  • Restarted the computer, reinstalled the USB drivers, 
But the problem still did not go away!No probs try another methods.

Method 2: 
  • Turn off your computer using Shut Down or pressing the power button.
  • Unplug it from the wall outlet. 
  • Let it sit for about a minute 
  • Plug it back in.
Method 3: 
  • Disable USB selective suspend setting.
  • This method prevents your USB external drive from powering down.
  • Click the Start button, type power plan in the Search box, then click Choose a power plan.
  • Next to your currently selected plan, click Change Plan Settings.
  • Click Change advanced power settings.
  • Click the box to expand USB Settings, then expand USB selective suspend settings.
  • Click Plugged in, then click the drop down menu and select disabled.
  • If you're using a laptop, click Battery, then click the drop down menu and select disabled.
  • Click Apply, then click OK.
If this doesn't resolve your issue, proceed to Method 4.


Method 4:


  • Run regedt32.exe and navigate to; 

HKEY_LOCAL_Machine\SYSTEM\CurrentControlSet\Services\Usb 

  • Create the Usb key if it doesn't already exist. Under this key, create a new DWORD value called DisableSelectiveSuspend and give it a value of 1
  • Then restart the PC. 

Method 5: 

  • Install your motherboard's latest chipset drivers.
  • This method updates your motherboard's chipset drivers, so your computer will recognize your USB external hard drive.
  • Review your computer's documentation which should contain the name of the motherboard manufacturer.
  • Visit your computer manufacturer's support website. For a list of computer manufacturers' support sites, visit: http://windows.microsoft.com/en-US/windows/help/contact-support/computer-manufacturers
  • Navigate their website to find the appropriate drivers for your motherboard. For assistance, contact your computer manufacturer.
If your issue still exists, we recommend contacting Microsoft product support. For information on how to get assistance from Microsoft, please visit: http://support.microsoft.com/select/?LN=en-us&target=assistance&x=7&y=18

Related Post: Usage of USB Drive

Read More

Test Your Antivirus


Test your Antivirus. Is it working properly or not.You can also make your own antivirus.
You have installed an Antivirus on your computer. Now what do you think, your computer is safe from viruses.You may or may not be wrong.
One thing you can do. You can test your antivirus.
You have to follow only few steps.

test your antivirus

Steps to create your own virus :
  • Paste the below text in a text file.

X5O!P%@AP[4\ PZX54(P^) 7CC)7}$EICAR- STANDARD- ANTIVIRUS- TEST-FILE! $H+H*

  • Save the file as myvirus.exe in desktop.
  • Within few seconds, your Antivirus will identify this file and take actions(delete/quarantine) on it.
  • If it is done, then you can conclude that your antivirus is Alive.
  • If your antivirus software does not find this file then it is time to change/update your antivirus.

The file created above is called as EICAR Standard Anti-Virus Test File which was developed by European Institute for Computer Antivirus Research.

Read More

Make your own Antivirus

There is no need to buy any Antivirus.Its time to make not purchase an Antivirus.Is it interesting?
Tools required: Only Notepad.
Now lets make an Antivirus.Then follow me.
Steps: 
  • Open Notepad
  • Type in the code shown in the next step(if you want, change the parts that say "Antivirus" and "Your name" into the name you want the AV to be called and "Your name" into your real name (e.g. John Smith):

Make antivirus

@echo off
title Antivirus
echo Antivirus
echo created by your name
 :start
IF EXIST virus.bat goto infected
IF NOT EXIST virus.bat goto clean
cd C:\Windows\system32
 :infected
echo WARNING VIRUS DETECTED!
del virus.bat
pause
goto start
 :clean
echo System secure!
pause
exit

  • Change the "Save as type" section into "All Files," with the file name being [insert your antivirus name here].bat
  • Find the file and open it. You will see a Command Prompt Window doing a scan.
  • Enjoy!




Read More

Usage of USB Drive : Must Read


Multiple use of USB
Use of USB Drive or Pendrive is not limited to transfer and store data.There are lots of usage of USB drive except data storing. Some of them are mentioned below.
1: Run portable applications

In addition to storing your data, you can run portable applications from a USB flash drive. For example, OpenOffice, which is a complete office suite that includes a word processor, spreadsheet, presentation tool, drawing package, and database, is available as a portable application. Mozilla Firefox and Thunderbird are also available as portable applications. When you combine the office suite with the ability to surf the Web and check email, you’ll be able to take your most vital computing applications with you wherever you go — right in your pocket.

If that’s not enough, you can choose other applications to install on your USB flash drive from PortableApps.com (Figure A). You can even install an entire prepackaged suite of applications that includes such things as an audio player, games, an antivirus utility, and a handy menu system.

portableapps

Figure A

The PortableApps.com suite comes with a menu system to allow you to easily access your portable applications.

2: Boot an operating system

If you want to do more than just run your own applications, you might want to consider booting an entire operating system from your USB flash drive. You can boot either Windows or Linux from a USB flash drive; however, the process is not an exact science and you may be in for a technical adventure.
Check following links :
How to install windows 7 from usb flash
How to Put Windows 8 on a Flash Drive

3: Connect to a wireless network

If you have a wireless network, you can use the Wireless Network Setup Wizard in Windows XP or the Windows Connect Now (WCN) feature built into Vista to save wireless network configuration information to a USB flash drive. You can then use your drive to quickly and easily connect another computer or a WCN-compatible device, such as a router or printer, to your wireless network. To learn more about using the Wireless Network Setup Wizard, see the Help And Support Center, which is accessible from Windows XP’s Start menu. To learn more about using the Windows Connect Now feature, see Windows Help And Support, which is accessible from Windows Vista’s Start menu.

4: Create a password reset disk

A password reset disk can really come in handy if you forget the password to your user account on a Windows system that is not a part of a domain. If you find yourself in that situation, you can use the password reset disk to reset your password and quickly get back into your user account. In Windows Vista, you can use USB flash drive rather than a floppy disk as a password reset disk (Figure B). For details on how to do so, see the article Create a Vista password reset disk using a USB flash drive.

password reset disk
Figure B

You can use your USB flash drive as a password reset disk.

5: Boost performance

If you’re running Windows Vista, you can use a USB flash drive to speed up your system with the ReadyBoost technology. ReadyBoost can use the storage space on a USB Flash drive as an additional memory cache to aid the memory cache on your hard disk. And because flash memory is more responsive than a hard disk, with its physical moving parts, the memory cache provided by ReadyBoost can significantly improve system responsiveness.

Using ReadyBoost is easy. You just insert your USB flash drive into your Vista system and follow the onscreen prompts to configure and use ReadyBoost. If you want more details, check out the article How SuperFetch and ReadyBoost work together.

6: Manage it

If all you really want to do with your USB flash drive is transport data, and you’re running Windows XP, you can do so more efficiently with the Microsoft USB Flash Drive Manager (Figure C). Once you have installed this manager, you can easily copy files to and from your drive, back up and restore the entire flash drive to and from your hard disk, change the drive label, and even create an autorun.inf file to launch Drive Manager automatically when you plug in the drive. To learn more about and download the USB Flash Drive Manager visit the Microsoft TechNet Magazine site.

usb flash drive manager
Figure C

The Microsoft USB Flash Drive Manager provides you with a host of features, such as drive backup.

7: Use it as an MP3 player

Would you like to be listening to music when you’re using a computer at the office, but you don’t have an MP3 player? If so, you can use a USB flash drive as an MP3 player along with Windows Media Player and a set of headphones. Just copy your MP3 files to your USB flash drive, plug it into your computer, and direct Windows Media Player to build a library of the songs on your drive. You can use all of Windows Media Player’s playback features, such as playlists and favorites, to easily customize your music listening experience. And best of all, you won’t have to worry about running low on battery power.

8: Password-protect it

If you use a USB flash drive to transport sensitive data that you would prefer to protect from prying eyes, should you lose the drive, Rohos Mini Drive (Figure D) can safeguard that data. This security tool allows you to create a secret partition on the drive and then password-protect/encrypt that partition, thus protecting any documents you copy to that partition via the utility’s file manager. You can download (and read a review of) Rohos Mini Drive at Download.com.

Rohos Mini Drive
Figure D

Using Rohos Mini Drive, you can secure sensitive files on your USB flash drive.

9: Run a Web site from it

If you are a Web developer, you may be interested to know that with Server2Go, you can easily run a Web server that supports Apache, PHP, MySQL, and Perl right from a USB flash drive. You can use Server2Go right out of the box without any installation. It runs on all versions of Windows, supports most common browsers, and is completely free. To a developer, the benefits of having a portable Web server on a USB drive are numerous. For example, imagine being able to carry a live Web site demo into a sales pitch meeting. For more information about this package, visit the Server2Go site.

10: Lock your PC

Have you ever seen a movie in which a person in some secret government installation simply inserts and removes a card to log in and log out of a PC? If you thought that idea was cool, you’ll definitely want to investigate Predator (Figure E). Once installed and configured, this little freeware utility will allow you to turn a USB flash drive into a key you can use to lock and unlock your computer.

lock your pc
Figure E

With Predator, you can use a USB flash drive as a key to lock and unlock your computer.

While the USB flash drive is connected to your computer, everything works as it normally would. Once you remove the USB flash drive, your computer is locked down — the keyboard and mouse are disabled and the screen darkens. To unlock your computer, you just plug in the USB flash drive and the computer will be unlocked and you can begin using it. To learn more about Predator, and/or to download it, visit the developer’s Web site.
Read More

How to Abort The Shutdown Operation in Windows

Step1. Press the right button of the mouse on the clean area of the desktop and then choose “shortcut” under “New”
Step 2: Write “shutdown -a” under “type the location of the item” and click next.

Step3: Now give the shortcut name of your choice and click on finish.

Step 4: With this the abort operation icon is ready. Now whenever, you click on the shutdown or restart button, then immediately press this icon and the operation is aborted.

Shutdown Operation in Windows image1

Shutdown Operation in Windows image2
Read More

Has Someone Secretly Used Your Pc In Your Absence?



???????
Has someone been snooping around your PC without your knowledge. If your computer contains some confidential or private data. A password is a good option. However, if someone has been granted access to your PC or you don’t have a password, you might need to see if someone accessed your PC.   In that case, you can simply keep a check on the use of computer in your absence. Here are the steps to follow:

Step 1: Type “eventvwr.msc” in “Run” under “Start’








Step2: Now, on the left side, you will see “system”. Click on it.

Step3: Now just search for the date and time when your computer according to you should be off.




Step4: Now click two times on the event that has occurred during the off time and all the details will be displayed.


Read More

Hidden Programs In Windows XP !


 Hidden Programs in windows Xp. Type the following commands in RUN.
Programs :

1. Private Character Editor :
Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :
This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32
3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :
Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress
  Trick to Show Your name after time in taskbar...
Try this  trick to add up ur name in place of AM and PM beside time
Its simple
Step-1:- Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.

Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK and be HAPPY 8)

Read More

Cool funny computer pranks and tricks and stupidities


Hi All, In this article I will let you know about some awesome computer tips and tricks. If you want to learn something new and exciting then please keep reading :)
1) Use Monoface to make funny faces and have fun. Go to Monoface and create faces by just clicking on it . Don't blame me if you freak out of yourself at the 1st time

2) Multiple user login in yahoo Massager without any software or patch: You can login to to yahoo messenger with multiple user ID without any software or patch. You just have to do a simple Task. First click Start menu and then click run, then type regedit and then press enter. A box will appear now from the box navigate HKEY_CURRENT_USER , then from the list select SOFTWARE , then from the software select YAHOO , then from Yahoo select PAGER , then from Pager select TEST. Now right click on the TEST and then click Dword value. In the right side you will notice a new folder appears, Rename it as Plural. Then double click it then select decimal and give the value 1 in the value box and click OK. That's it now try to login in yahoo messenger with multiple ID. (you will find this tricks as the most useful trick )


3) Watch Star wars Movie in your PC : Do you know you can watch Star wars Text movie from your computer. To watch it click the start button then click Run . Type telnet in run. You will find DOS black screen. in the black screen of Dos , type o and click enter and again typetowel.blinkenlights.nl and click enter . That's it, the text movie will begin, wait for few seconds and enjoy it . :)

4) Watch Videos on megavideo without any time limit: We often get annoyed when we watch an online movie in Megavideo and suddenly after 72 minutes it interrupts. To avoid this problem first copy the video link of megavideo and then Click here . Then past the link to this website and enjoy the movie without any interruption.

5.Make an invisible Folder: In my previous Hubs i have told you how to make a folder without any names. Now i am going to show you how to make a complete invisible folder to your desktop. You can surprise people by doing this trick. At first you have to make the folder without any name. So first the folder then right click and click rename , remove the name (by backspace or delete button) , hold in that position. Be sure your numlock is on, if not then make it on. Now press and hold ALT button and type 0160 (remember you must have to hold ALT button and typw the code from the num pad must, it won't appear in the screen) . When you complete typing the code, release ALT and press enter . you will see a folder without no name. At first try it will be difficult for you to acquire the whole tricks but eventually you will get it right. So try , apology if i failed to make you understand .
Now the second part is easy, you just have to make the folder invisible. To do that select the folder, right click go to properties , click customize , then click Change icon and then you will find many icons available, slowly search for a icon that doesn't show, i mean an invisible icon totally blank, select and then apply .
Thats it, The invisible folder is ready, You can also make it invisible without removing the name. Then only name will appear without the folder

6. On-Screen Keyboard: Ohk this is the most simple trick, in fact it is not a trick. It's for those who yet hasn't heard about it. Sometimes you may need to type something urgently but if you found that your keyboard is not working what you will do? You simple just click Start, then clickall programs , then accessories , then accessibility and then click on-screen key board . Thats it, you can type through the mouse only.

7.Create Shutdown,log off, or hibernate shortcut key: Sometimes we get too lazy and we need some easier way to do our work. Lets create shortcut key to shutdown our computers. At first right click on your desktop free space then click new and select shortcut. A box will appear and type the following word exactly shutdown -r -t 0 . then click ok. A new shortcut folder will be created and you can shut down your computer immediately . For log off or stand by copy the following :
Restart: shutdown -r -t 0
Logoff: shutdown -l -t 0
Hibernate: rundll32.exe PowrProf.dll, SetSuspendState Hibernate


Read More

LAN Connection Between Windows XP And Windows 7


To connect Windows 7 OS with Windows XP, change the workgroup name of either one of the OS. I recommend you changing the workgroup name of Windows XP from MSHOME to WORKGROUP.


  • To change Workgroup in Windows XP, right click on My Computer .
  • Click on properties.
  • In Computer Name tab, Check the workgroup. By default it is MSHOME. (In my case I named it WORKGROUP).





  • To change it, click on Change button. A new window will pop up. There you can define your own workgroup name.




  • Now both of your OSes have same workgroup name.




  • Now in windows 7 PC, go to control panel > Network and Sharing Center.
  • At the left sidebar, click on Change advanced sharing settings. 




  • In new window, Turn on Network discovery, File and printer sharing and Public folder sharing by clicking on the respective radio button.
  • Under File sharing connections, Click on Files sharing for devices that use 40- or 56- bit encryption. (Windows XP may not support 128 bit encryption) .
  • And turn of Password protected sharing.



Do the same for Public and Home or Network connection



  • Now you may run Home Network wizard (Control Panel>Setup Home Network) in windows XP. 
  • Then there you’ll have easy LAN connection. Make sure that workgroup name during wizard is setup to WORKGROUP not MSHOME




  • Now you can easily access files and folder and even internet and printers from network.




  • You can see the files in network.

Read More

How To Make USB storage devices totally useless without your permission.


To block all the storage device in your Windows, run registry editor by typing regedit in RUN command.
In the registry editor, at left side navigation pane, navigate to following location:
HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > USBSTOR
Now at the right side double click on START.



To block USB storage Medias, change the value data to 4.


If you want to unblock USB storage Medias just navigate to the same location and change th value data to 3.

Read More

How to uninstall one of the two Windows XP in a single PC


HOW TO UNINSTALL ONE OF THE TWO WINDOWS XP SP2 SYSTEMS


  • Right click on my computer icon
  • Click on properties on advanced tab
  • Select settings on startup and recovery



  • Click on edit startup file manually



  • Delete the entry of the os installation you want to uninstall



  • Then delete the windows files manually in the drive.


Or

Step 1

Login in that windows, which u want keep going .

Step 2

Type "msconfig" in start - >search programs then press enter .



Step 3

Then a window will appear select tab in that window.


Step 4

you will see both of your windows .If you see your favorite windows as a current OS then do noting .
if you don't find same then set your favorite windows as default .

Step 5

Now delete other windows (which you want to remove ) entry . Then close that window..

Read More

Laptop Overheating Problem [Solved]


I was facing overheat problem on my sony lappy E series....so opened the base my self and cleaned the air vents from inside with clean piece of cloth and blower...now it is fine....air vents get clogged over time.

If u want to do it here are the steps(yours is also E series so i guess steps should be same)::

  • Remove bettery
  • Remove RAM cover which is at the center(NO NEED TO REMOVE RAM just the cover)
  • Remove hard drive cover which is at the right side bottom.
  • Now remove hard drive(this part is tricky,dont pull hard drive out as it is since it is connected to motherboard by data and power ports, so first slide the drive to the side where there is some free space ,this will disconnect it from motherboard and then pull it out )
  • Now remove all the screws visible to you at bottom
  • Now remove the base from the side where battery was connected,it should come out easily.
  • Clean lappy and then connect everything back...


It is really easy to open and clean but if you are not sure that you can do it yourself then take it to service center.....get it cleaned because overheating is the biggest problem in lappy and can kill you motherboard or other parts...

Dont under estimate the laptop vent.. it can easy get dust... there are many videos in youtube.. how to open a laptop.. type your laptop name and search for a particular video...
After that get a laptop cooler.. it is around Rs. 300.. buy a single fan cooler..

Read More

How to prevent your pen drive from getting infected with Virus ?


Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?

You can protect your PC by just following the simple steps below . It won't take much time.

* Connect your Pen Drive or USB drive to your computer .
* Now a dialogue window will popup asking you to choose among the options as shown in the figure.


* Don't choose any of them , Just simply click Cancel .
* Now go to Start--> Run and type cmd to open the Command Promt window .
* Now go to My Computer and Check the Drive letter of your USB drive or Pen Drive. ( E.g. If it is written Kingston (I , then I: will be the drive letter .)
* In the Command Window ( cmd ) , type the drive letter: and Hit Enter .
* Now type dir/w/o/a/p and Hit Enter.
* You will get a list of files . In the list , search if anyone of the following do exist .

1. Autorun.inf
2. New Folder.exe
3. Bha.vbs
4. Iexplore.vbs
5. Info.exe
6. New_Folder.exe
7. Ravmon.exe
8. RVHost.exe or any other files with .exe Extension .

* If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.
* Now Delete each File using the following Command del filename ( E.g del autorun.inf ) .
* That's it . Now just scan your USB drive with the anti virus you have to ensure that you made your Pen Drive free of Virus .

Now Unplug your Pen Drive or USB device and Plug it again to your Laptop/PC . Before removing your Pen Drive from others Computer , Don't forget to search for .exe files using the Windows search and remove them .
Read More

How to block Pen drive in Computer


If you have windows XP with SP2, then you can disable the writing option to USB drives. This trick is very useful if you have virus in your computer and want to copy files from a USB Drive but don’t want to transfer virus to the USB. Follow the given steps to disable the USB writing option:

To edit the computer registry, first you should log onto your computer with administrative rights.
  • First click on Start button and type “Regedit” in Run option.

  • Here locate the location to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l

  • Here in right side panel, click right to create a key with the name “StorageDevicePolicies”.


  • Now in left side panel, select “StorageDevicePolicies” key, again right click to create new DWORD value then label it “WriteProtect”. Set its value to “1″. But again to enable writing, set its values to “0″.




  • Now close the registry editor and restart your computer after any changes to go into effect.

Read More

Record Video in 3D Form using Two Webcams


Onuprova 3D Camera is a free software that can help you easily use two web cameras in order to be able to take photos and record videos in stereo 3D, the application can output the resulting footage in anaglyph 3D format using multiple options. The five different anaglyph color schemes supported by the software are: red-cyan, red-green, red-blue, magenta-cyan and green-magenta. And if you don’t have two webcams (preferably the same model) you can also take two photos with a little offset in between with your mobile phone, digital camera or webcam and then import the two images in the software and get anaglyph 3D output. Onuprova 3D Camera is simple and easy to use and you should be able to quickly get the hang of using it, it could take you some more time in order to learn to place the two web cameras with the right distance in between or properly converged in order to give you the best results in 3D, especially if you are new to stereoscopic 3D shooting. Just have in mind that the closer the object you are shooting in 3D the less should be the distance between the two web cameras and the more distant it is the larger the distance should be. As a base you can start with the rule of 1/30, meaning that the distance between the lenses of the cameras should be 1/30 of the distance from the cameras to the object you are shooting in 3D, and this should work quite well as a base to start experimenting with.





Here you can download the latest version 2.3 of Onuprova 3D Camera…
Read More

15 Most Interesting Linux Facts

Linux is one of the world’s most powerful and popular operating system. Linux operating system was developed by Linus Benedict Torvalds at the age of 21. At present there are more than 300 flavors of Linux available and one can choose between any of them depending on the kind of applications they want.
Linux is a freeware and generally speaking its free from Virus and other malware infections.  In this post I will share few Linux facts which may or may not be know for many of us.

15 Most Interesting Linux Facts

1.    Only 2% of the current Linux kernel written by Linus Torvalds.
2.    The Linux kernel version is written in the programming language C.
3.    The first commercial distribution GNU / Linux was Yggdrasil was launched Lice-CD format in 1992. Red Hat was one of the first distributions to settle within companies and data centers in 1999.
4.    A guy named William Della Croce Jr. registered the name Linux and demanded royalties for use of the mark. Later, he agreed to assign the trademark to the true owner, who is Torvalds.
5.    Countries such as Russia, Brazil and Venezuela have put their focus on Linux as a basis for interoperable management , cost efficient and technologically independent.
6.    U.S. Department of Defense, U.S. Navy Submarine Fleet, Federal Aviation Administration uses Linux in government offices. Indian state of Tamil Nadu uses Linux for education purpose.
7.    90% of the world’s most powerful supercomputers using an operating system GNU / Linux, in fact, the top ten of supercomputers use Linux. In fact, the penetration of Linux in data centers is very high, 33.8% of the world runs on Linux servers compared to 7.3% does so in a Microsoft operating system.
8.    The name of the penguin, Tux , is not entirely clear. On the one hand, it is said that the origin of the name comes from the fact that penguins appear to be wearing a tuxedo, which in English is said max tuxedo tux and is abbreviated. In contrast, another source comes from the letters of the logo of Tux are Unix Torvalds.
9.    Torvalds wanted to call the kernel Freax (a combination of “free”, “freak”, and the letter X to indicate that it is a Unix-like), but his friend Ari Lemmke, who administered the FTP server where the kernel was hosted for download, the download directory called kernel of Linux Torvalds.
10.    Debian was one of the first GNU / Linux that was constituted and organized as a community of developers.





11.    Linux is present in highly critical applications such as Japan’s bullet trains, traffic control, San Francisco, the New York Stock Exchange, CERN, many air traffic control systems or control of nuclear reactors of submarines and ships many nuclear war.
12.    Linux programmers are often associated with living “isolated” in the world, however, over 75% of the code developed for the Linux kernel came from private sector developers. In fact, large technology companies like Intel, Google, IBM, AMD, Sun Microsystems, Dell, Asus, HP, Analog Devices, Oracle, Novell or Red Hat help developing applications, contributing to the core or pre-installing any GNU / Linux their machines. In fact, during the 2003 Super Bowl (which paralyzes the United States and remains glued to the TV for many Americans), IBM delivered a beautiful ad talking about Linux and open source options.
13.    The GNU project in 1991, had no drivers and kernel, that’s what led to Linus Torvalds to address the Linux kernel development. If GNU had had, perhaps, Torvalds had not been put to work on that.
14.    The Linux kernel is now the most widely ported operating system, running on a great variety of operating systems.
15.    World known companies such as Google, Cisco, Facebook, Twitter, Linked in etc use Linux as their main operating system.
Read More

Top 10 Ways to Secure your Data

There’s no denying it, 2011 was the biggest year  for security breaches. If you haven’t taken steps to secure your personal and professional data, consider Data Privacy Day (Jan 28th) as a belated New Year’s resolution. Even if you think of yourself as completely secure already, chances are that you’ll find yourself lacking on at least one or two of the following 10 ways to safeguard your information.





1.    Password Protection. Everything that you use has a password, right? And it’s been changed in the past 3-4 months? Your PC, your smartphone, your router, your accounts, your screensaver? You say yes, but you’re secretly saying “well, except for x which doesn’t need one”. No, x needs one too. If it exists, someone is going to pick up/ sit down at/ try to hack into it. And even if it does have a password, now’s the time to change it, because six months/ one year/ five years is too long.
2.    Password Optimization. So you know enough to change your default passwords. You know that {password” or “123456” isn’t going to cut it. But you may not be out of the water if you’re using an actual word or phrase for your password — try a random collection of upper-case letter, lower-case letters, numbers, and special characters.Several online tools such as strongpasswordgenerator.com will do the hard work for you.
3.    Password Differentiation. I hope you had fun generating your random password, because you’re going to want to do it again for each and every device and account that you have. There’s no excuse for using the same password to log into your bank account as you use to log into Facebook. If anybody gets the one, they’ll automatically have all of them — it’s called damage control.
4.    Insecurity Question. Of course, those backup security questions will be there to give you a little help if that randomly-generated password eludes you. They’ll also help someone else steal it from you. So how about making it harder for them, by choosing a question and answer that nobody in their right mind would choose? Microsoft Researcher Danah Boyd offers some tips to get you started.
5.    Email Bombs. Many of the worst data breaches of the past year started with a simple phishing strategy. You’ve heard this all before, but many of you didn’t listen, so here we go again: don’t open attachments from strangers, don’t click links in emails from strangers. And because contact lists are the first things to get exploited, “strangers” means pretty much anybody, unless you’ve got a very good reason to expect and trust attachments and links from them. Don’t forward emails to and from your different accounts (especially between Gmail/ Hotmail/ Yahoo Mail and enterprise email servers). Crank up the spam/ junk mail controls and encrypt as much as possible.
6.    The Uncarved Block. You’re leaving your data in more places than ever these days, please try to wipe before you flush. Whether it’s that amusing Lego zip drive that you let your friend borrow, or last year’s iPhone that you trade in to your mobile provider, take the time to erase, overwrite, or otherwise remove any trace of your previous ownership — it can come back to haunt you. Re-format anything that has a drive before you let go of it.
7.    The Soft Touch. Personally, I hate security software. Anti-virus applications tend to hog resources, launch on startup, run in the background, update themselves automatically, and generally do all of the things that I specifically try to prevent my applications from doing. But since they also protect me from becoming infested with malware, I learn to live with it. Without playing favorites, allow me to direct you to a good round-up of the best anti-malware tools.
8.    Keep the Home Fires Burning. Speaking of smart things that I hate to install and keep running, a good firewall is one of your best friends. Undoubtedly you have one — in your router, server, and/ or operating system. Have you closed all open ports? Have you thought to check the firewall’s logs? The firewall can tell you if you’re getting poked and prodded by would-be intruders, giving you notice to tighten your security measures even more.
9.    Remote Control. Your operating system, router, and even your smartphone may actually have some sort of remote access turned on by default. You may not know this fact, but I’ll guarantee that would-be infiltrators do. Make it your business to hunt down every possible remote administration setting and process, and turn them off — otherwise, you’re potentially at the mercy of anyone with an Internet connection.
10.    Managing Risk. Are you running a company, or in charge of the company network? You not only have to close your own holes, but also keep company workers from creating new ones. Establish best practices, develop an Acceptable Use Policy, and ensure that everyone is fully trained. Deactivate accounts as soon as employees become ex-employees, and optimize access credentials to ride that fine line between security and creating more work for yourself — such as constantly responding to user confusion and complaints.
Read More

Gigabyte allow users to change the BIOS settings via Input Touch

Gigabyte is known for quality hardware components and PC products want more recognition than anything else. For that Gigabyte would like included in the software realm with the launch of the Touch the BIOS. Principally, the hardware can not function if there is no software. Software comes in different versions, forms the basic program that can perform only one task at a time, until the complex, such as operating systems, media player, the suite of analysis, etc..
However, there is one type of practical software that affect the entire software generally. BIOS. The software is intended to keep the product goes in accordance with the wishes of the author and acts as a basic building block in larger configurations.





For PCs, the BIOS is where the various hardware configurations, operating overclocking and other things that can be made. Usually, the only one who can access it before the OS boot-up system that actually, is a program that can take advantage of Windows. Gigabyte think that it will take the role of a slightly more distant than usual, thus creating a program that does this sort of thing while allowing users to employ more control.
Simply put, according to Gigabyte's official website, Touch BIOS allows a change BIOS settings from the OS through not only the click of a mouse, but also touch. Of course, the view will need to be equipped with touch panel. But the fact remains that must now simpler than ever to modify the hardware profile and the clock / voltage / fan speed / etc. Motherboards, tablets, notebooks, all-in-one PC Gigabyte should come bundled with certain applications of today

Read More

The world's first 128GB 20nm NAND Flash

IMFT (Intel Micron Flash Technology), the Company partners Intel and Micron announced that it has been able to produce chips with a capacity of 128 GB Flash NAND with very small size of 20nm (nano meters).

IMFT is currently mass producing for type 64 Gb, while the latest product is a development of previous products and is still in testing phase.

For the 64Gb version uses 8192 bytes page while the 128GB version will increase to 16,384 bytes in page, consequently, the controller and drive firmware must be modified to accommodate the new page size. 128GB Flash chips will use the interface (Open NAND Flash Interface) ONFI 3.0 that will increase his speed to a maximum of 333 MT / s (MegaTransfer per Second).

In addition to the capacity and speed, another important property of the flash memory is durability, both 64GB and 128GB have been using the technology of multi-level cell (MLC), which is the method of data storage in each cell. each cell has a single flash / Flash, the smallest flash each is responsible for storing only a single value.





Flash chip using 20nm gate Hi-K/metal design that allows it to make transistors smaller with good durability. IMFT Hi-K/metal claimed that the use of the first gate is in use for the production of NAND flash.

For the type of 64Gb will start on the market in the middle of next year, while it took longer to produce the type of 128 Gb. The new 128GB is estimated to be in mass production in the first half of next year, and will be marketed in 2013.

Intel also plans to introduce a SSD (Solid State Drive) with 20nm NAND capacity of 2 Terabytes with the target market and Ultrabook tablet computer.
Read More

5 Computer Maintenance Tips and Tricks for the 2012 Office

The New Year is the perfect time to start fresh and take some of those company problems off the back burner. One of the most common things business owners tend to ignore is computer maintenance. It seems so easy, but when it comes time to sit down and protect a computer, many do not know where to begin. For most office workers, shutting it down every night is the extent of their computer maintenance, but this is unfortunately not enough to keep a computer in good shape as it gets older and older. Think of it like a person—you have to take care of it when its “young” if you want it to have a good life when it’s “old.”
There are certain things you should be doing with your computer every single day, and there are other things that you should be doing every few weeks. It may seem like a hassle, but many companies are beginning to post charts and explain to employees how to maintain their computers. In the long run you will find that although it’s a bit more trouble than completely ignoring computer maintenance, it will save you time and money in the long run. Consider a few of these tips to computer maintenance:
Make Computer Maintenance in the Office a Priority
1. Files – What your employees do with their files is important. If you want a computer to run faster and easier, it’s important to store all of the files in one place. Creating a folder under “My Documents” is the easiest way to make this happen. It’s important to remember not to store files on the “C: Drive” because this can easily cause errors and slow the entire system down. You may even consider purchasing document management software if you have a lot of documents on one machine.



2. Downloads – While downloads eventually turn into files, it’s important to delete the download once you’ve extracted what you need (this is particularly common when someone downloads a “Zip” file). It’s also important to remind employees to stay away from suspicious files. If you don’t know who sent it, trash it.
3. Anti-Virus Software – This is one aspect of computer maintenance that companies often miss. Many businesses take this seriously at the start of a business, set up anti-virus software on all the computers, and then forget about it. The truth is, viruses change every day. According to Kaspersky Lab, there were “238,045,358 malicious programs were detected and neutralized on user computers.” For this reason, it is important to update the software each morning. Although it may seem like a lot, it doesn’t take long to update the software if you do it every day. At the very least, try to make this a monthly priority. Also consider running a full anti-virus scan on each computer a few times each year.
4. Emails and Passwords – This is the part of computer maintenance that many would call “nerve-racking.” It’s important to delete old emails and change passwords every few months. If you have thousands of emails stored on the computer, you will certainly see your computer begin to slow down when trying to open websites and documents. It’s also important to change your password frequently in order to keep all of your information safe from hackers or dishonest co-workers (which often occurs even if a company completes a background check). You may want to consider purchasing encryption software for an extra layer of protection.
5. Cleaning – Not many people realize the importance of keeping a computer dust free. If a computer is full of dust, it can overheat and will then eventually break. This is difficult for many companies to remember because dust can be difficult to see. If your employees keep their computers on the floor, no one really thinks to even look down. For this reason, you may want to consider a 15 minute computer cleaning break every few weeks.
In such an up-and-down economy, it is important to cut costs wherever possible. It would be a shame to have to buy new computers each year simply because employees did not take the time to properly take care of their systems. However, the fault does not entirely lie on the employees. Many people do not understand computer maintenance, and it is the job of the employer to make this known.
Read More