Wednesday, June 30, 2010

The Security of Deleting Sensitive Files


Directory Client End

Image by openfly via Flickr

Some people might think that if they delete their sensitive files from their computers then those files cannot anymore be accessed by anyone. The common misconception is that files, once deleted, are permanently gone. This is not the fact. In reality, there are even some software products which are created particularly for the purpose of recovering those deleted files. The reason why deleted files can still be recovered is that the operating system does not actually remove the file physically from the hard disk. It merely marks those files as deleted and ready to be overwritten if necessary.

That is good if you happen to accidentally delete an important file and want to recover it using the right product. The problem is that unauthorized persons can also do the same thing to your deleted files. And if those files contain financial data, credit card information or user names and passwords, then you are in big trouble. The solution to this is to use specialized software to not only delete files but overwrite them with random bits of data. This is equivalent to a paper shredder. This is the way to go if you do not want others to access important files that you want to delete.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Tuesday, June 29, 2010

Using Google as Your Technical Support


She needs more power, Cap'n!

Image by FlySi via Flickr

You are doing your stuff on your computer one day when suddenly, a dialog box pops out of nowhere informing you of a computer error. What would you do? Maybe, you’ll just click OK or Cancel and be done with it; but if the error is persistent, say every time you run a particular program or each time you boot up your computer, then you might just have to do something about it.

If your company has a technical support group, then maybe you can just call them up. But there is also another way. Remember that for most of the errors that you will encounter, somebody else around the whole wide world must have also encountered that same error in the past. In which case, that computer error must have probably been solved already and the solution is floating somewhere around the Net.

That is how Google can help you. It will search for the documented solutions to your computer error.

  • The first thing that you will have to do is take a screen shot of the dialog box containing the error message;
  • Save it to a file for future reference;
  • Copy the exact error message and enter it as a search string in Google;
  • Check the search engine results page for entries relevant to your problem;
  • Most entries would include images of the actual error. Compare these with the screen shot you saved in a file.

There you go. You can now choose the most relevant solution.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Monday, June 28, 2010

CSRCS.EXE Removal


The Registry Editor in Windows Vista

Image via Wikipedia

It is an invisible process that loads during system boot. It is hidden and can monitor your system processes. It can also remotely connect and transfer data to external servers or IRC through a local area network or the Internet. It may even manipulate other programs and create a backup of itself in case it is identified and removed. This program is dangerous.

To keep this file from running, you need to delete references to it in the registry. To do that, run Regedit, the registry editor by pressing the Windows key in your keyboard and “R” simultaneously. In the dialog box, type “Regedit” without the quotes. When the registry editor opens, search for the string csrcs.exe and delete all occurrences. Then, search again for the string “Explorer.exe csrcs.exe”. Don’t delete this key. Just modify it and delete the csrcs.exe part and retain the explorer.exe part.

After doing this, csrcs.exe errors should be gone. Restart your system to confirm.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Sunday, June 27, 2010

The Different Faces of Malware


Ad-Aware removes spyware, adware and so on

Image by viZZZual.com via Flickr

Most users are only familiar with computer viruses. They are not familiar with the other types of malware that can equally wreak havoc on any computer system. There are three broad types of malware out there in the Internet:

  • Viruses
  • Spyware
  • Adware

Viruses are the worst of the bunch. They aim to destroy as much of your system as possible, replicate quickly and spread to other systems. Worms are similar to viruses except that they replicate without user intervention, unlike viruses which requires the user to run an executable file. Trojans are also similar to viruses except that they are part of a real application which also does other seemingly useful stuff. Rootkits are somewhat of a cross between viruses and trojans.

Spyware could also damage computer systems but the main goal of spyware is to conceal itself and gather data such as user accounts and passwords, credit card information and other personal data. It then sends these data to its creator. While it can be made to damage computer systems, it usually do not because then, it won’t be able to collect data. Keyloggers are a type of spyware.

Finally, there is adware. It normally installs itself along with a free program you install. It’s purpose is to display ads to you and gather surfing habits so as to present relevant ads. While not as nefarious as either viruses or spyware, it can eat a lot of bandwidth and system resources which can slow down your system and Internet connection.

Every Internet surfer needs to be aware of these threats and protect herself accordingly.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Saturday, June 26, 2010

Defend Yourself From Computer Viruses


Endpoint antivirus software developed by Symantec

Image via Wikipedia

You are having fun browsing the Web, watching movies in YouTube, chatting with your buddies in Twitter and downloading the occasional freeware. It'll only be a matter of time before you bring in a computer virus with that seemingly innocent freeware. Here are some ways to defend yourself from these malware lurking in every corner of the Internet.

  • Use a complete security software suite. Plain antivirus programs won’t cut it anymore. Be sure that your security software includes anti-spyware, anti-adware, anti-rootkit and checks your incoming mail. Look in reputable computer magazines or websites for recommendations to help you find the right one for you. Some websites would try to sell you bogus antivirus software that is itself a virus;
  • Always use your security software suite. Make sure that the anti-virus component of your security software suite is always turned on and scanning files, incoming and outgoing email messages, and any programs you run. Your security software is not of much use if it is just sitting there doing nothing;
  • Keep your security software suite up to date. Most programs come with a yearly subscription so make sure you take advantage of these updates. Some of the better programs allow you to schedule updates or full system scans during idle times like 2AM when you aren't likely to be doing anything;
  • Keep your operating system up to date. From time to time security holes and bugs in operating systems are discovered and manufacturers issue updates to prevent the exploits of these bugs. Always check regularly to make sure that you are running stable and up to date versions of your operating system;
  • Backup your data regularly. Backup media like DVD, flash drives, external hard drives and tape drives are cheap nowadays so there is absolutely no reason not to backup your precious data. With a reliable backup, you can always restore your computer or at least your data when worse comes to worst;
  • Scan any floppy disks or USB flash drives that you have used in public computers like your school computer lab, Kinko's, or even a digital photo printing store. Public computers are where viruses get transmitted and stored;
  • Don’t click any email attachments that you don’t know. Treat all email attachments as potentially dangerous. Never open attachments from people you weren't expecting. Even if the email came from someone you know, that person’s computer might have been compromised and the email was in fact sent by the virus using your friends email account;
  • Prefer text email to HTML. While HTML email is nicer on the eyes and allows you more control over formatting, it can also transmit computer viruses. In a text based email the only way to be infected by a virus is by opening an attached file;
  • Freeware and shareware files or software should be treated with caution. Only download them from popular and reputable sources that scan the programs before they are uploaded. But don’t rely on the site; make sure that you scan the program yourself before you run it on your computer;
  • Be careful of links in instant messaging or chat software. Don't just accept invitations from anyone you don't know and never click a link sent by someone you don't trust because they can easily redirect you to another site that will try to install malware on your computer system.
Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Friday, June 25, 2010

There’s No Need For a Keychain—Use a USB Flash Drive Instead


The device pictured is a 128MiB PNY Attaché US...

Image via Wikipedia

With the introduction of networking and specially the Internet, the need for sneaker net, where you carry floppy disks around wearing sneakers, ended. After all, floppy disks carry only a measly 1.44MB of data and is very unreliable that transferring data through them is more trouble than it is worth. Local area networks and even email attachments, are better for transferring files.

But a new type of removable device proves reliable and efficient—the USB Flash Drive. While using a USB Flash Drive, at first glance, seems like going back in time and using sneaker net with the flash drive instead of a floppy, there are major differences. First is the capacity. Modern flash drives can carry around 8 to 16 GB of data. Some might even carry more. That’s gigabytes. It is also more reliable and more portable than a floppy. To use it, you don’t need a drive like floppies used to. You just need a vacant USB port.

Imagine all the stuff you can stuff in that key chain looking stuff. You can carry a backup of all your text and word processing documents from your office to your home. With Windows 7, you can even encrypt it using Bitlocker so that it will be more secure in case it gets into the wrong hands. With this device, the question eventually arises: Who needs a keychain?

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Thursday, June 24, 2010

Remote Access Software and Troubleshooting


Photo of HP Tablet PC running MS Windows Table...

Image via Wikipedia

Has a friend ever called you over the phone asking for help because her computer has some problems she cannot solve? The problem with this is that it is very hard to troubleshoot a computer problem without being able to operate the computer in front of you. Sometimes, to properly diagnose the problem, you have to perform some steps and, depending on the results, you do different sets of steps.

For instance, if your friend says that she cannot connect to the Internet, there are many possible causes. You need to try a lot of stuff in order to isolate the problem. You need to operate her computer.

The solution to this is Remote Access Software. With Windows XP and above, this is easier to do as there is a built-in remote access software that helps you to connect to a friends computer after being invited. You can then help them by taking remote access control of their computer system and fixing the problem.

For this to work, both of you must have an internet connection and Windows XP or higher. Both of you must also have an email address or be signed in to Windows Live Messenger.

There are a couple of ways to connect both of your computers but the easiest is through Windows Live Messenger:

  1. First, sign in to Windows Live Messenger and have your friend do the same thing;
  2. The computer user that wants to invite must go to the start menu and choose Help and Support;
  3. Click on Invite a Friend to connect to your computer with Remote Assistance which is located under the Ask For Assistance menu;
  4. Then, press Invite someone to help you;
  5. Choose your friend’s name from the Windows Messenger contact list;
  6. Click on Invite this person;
  7. This will allow your friend to see your desktop. If they want to control your PC, they must press the Take control button and the other person must agree by clicking on OK.

There you go. You can now help someone in need.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Wednesday, June 23, 2010

Bootable Antivirus CD


Toshiba HDD2189 2.5" hard disk drive plat...

Image via Wikipedia

When browsing the Internet these days and downloading stuff like shareware, freeware or trial software, it is pretty easy to get infected by a stubborn computer virus. And viruses are not your only problem on the Net. Other malwares like trojans and spyware are in every corner of cyberspace waiting for a victim to infect.

It is nice if you have an antivirus software installed on your PC with real-time protection. If you do not have one and got infected, chances are that the virus cannot be easily removed if you install an antivirus after the fact. By then, the malware has embedded itself in the system in such a way that it runs as the system boots and prevents antivirus software from functioning properly.

In cases like this, it may help if you boot on safe mode and run antivirus and antispyware from there. Window’s malware removal tool is also good. But if this won’t work, then your only chance is to use a Bootable Antivirus CD.

When using this CD, we boot ourselves into an environment running a stripped down version of Windows in ram disk and not the Windows from the hard disk. This way, viruses, trojans, spyware, adware and rootkits that infected your hard drive won’t even have the chance to run. As a result, they will be helpless and you will have a 100% success rate of removing the malware. Restoring infected files is another story, though.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Tuesday, June 22, 2010

How to Make a Web Page


HTML_Editor_Syntax

Image by iStylr via Flickr

The number of computers connected to the Internet grows everyday. These new netizens will be content on browsing pages created by others—but only for a moment. After a few moons, these new members of the fold would desire to create webpages of their own. And why not? The barriers to entry in webpage creation is very low. With places where you can host your pages for free, the only problem now would be how to create those pages. Fortunately, it’s not that hard.

There are two approaches to creating your webpages: the first is by using webpage creation tools and the other is by using HTML editors including your very humble, souped-up text editor. Automatic webpage creation tools, like Dreamweaver and MS Expression Web are excellent pieces of software which allows you to visually design your page while it generates the necessary code. HTML editors, like  give you the freedom and flexibility to create your webpages. If it can be done, HTML editors can help you do it.

The approach to take would depend on each person. Webpage creation tools are much more expensive than HTML editors but they require less knowledge of the underlying code; although, it would be healthy for every webpage creator to know the basics of HTML and CSS in order for them to tweak things up a bit in case something just does not seem right.

If you want to create your own webpage, start with the trial versions of webpage creation tools, learn some HTML and CSS, then either move to HTML editors or spend more time with your webpage creation tool’s code view.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Monday, June 21, 2010

Application Development and Its Role in Our Modern Life


Process and data modeling

Image via Wikipedia

Application development refers to the process creating software in a planned and organized way. Software applications range from keeping track of inventory to billing customers and maintaining accounts, and to social networking and online games. You may say that software plays a big part in our lives and application development makes it all possible.

Software developers identify the needs of users through requirement gathering and analysis. They then formulate a solution to these problems using one of the many software development methodologies currently in use. The result is the software that we use.

The traditional methods used by software developers in building software are the bottom up and the top down approach. There is also the more modern object-oriented approach to software development. Different projects usually require different methods although the trend nowadays is towards software engineering.

With more software developers and much more refined and improved methodologies in creating software, we can expect better applications to make our lives easier and more fun in the years to come.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Sunday, June 20, 2010

Email Marketing Software for Real Estate Agents


Communication emisor

Image via Wikipedia

If you are a real estate agent, you might be interested software that can assist you in your email marketing. These software can perform functions like managing the mailing list, creating professional mails and tracking your success. There are a lot of software companies that provide these types software solutions to help the real estate agents in the e-marketing aspect of their business. In the past quality services were more than enough to attract customers. In today's stiff competition though, it is practically impossible to establish your business without the aid of such software packages. These software help a great deal in locating potential customers, managing contacts and converting them into real customers.

Creating emails is simple. However, doing it professionally and efficiently for a lot of clients and potential customers is almost a herculean task. With real estate email marketing software, attractive and professional emails are easy to create with the software’s built-in templates. You can be among the many real estate agents who have launched successful campaigns with the aid of software.

But simply sending emails is not enough. As a real estate agent, you need to manage and keep track of all customer communications. With a real estate email marketing software, creating and maintaining a huge mailing list is a snap. It has an array of list management tools that can automatically identify customer details and add the those details to your mailing list. By managing and maintaining your contacts, you can successfully increase the reach of your business.

Reporting tools are also some of the important things your software should do for you. These software can provide automatically generated reports that can aid you in making tough management decisions. They are capable of computing many ratios and thereby help you visualize the results of your efforts and document your success.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Saturday, June 19, 2010

Sending Text Messages to Friends …Using a PC? …For Free?


I love you

Image by Dimitri N. via Flickr

You might be surprised but if you live in the US, it is possible to send text or SMS messages to your friends using a PC—and also for free.

What is the benefit of doing this? Well, to start, it is free. :) That in itself is reason enough for a lot of people. There is also convenience. It is definitely more comfortable and fast to type on a full-sized keyboard or even on a laptop keyboard than it is on cell phone keypads. Additionally, it is easy to use.

There could be others out there but the site I found was www.cellphonemessagesender.com. You can send as many SMS or text messages online as there is no limit set by the website. The whole process is very easy. It can be used by a general user with basic knowledge of computers and Internet.

So, what are you waiting for? Send some jokes to your friends and put a smile on their face.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Friday, June 18, 2010

Unblocking Blogspot, MySpace and Facebook in School or Work Computers


A schematic representation of a proxy server.

Image via Wikipedia

If you use a computer at work or school, chances are that access to social sites are being blocked. But if ever you have a legitimate reason to bypass these filters and visit these blocked portions of cyberspace, try these two simple tricks:

  1. Use a web proxy
  2. Download Ultrasurf

With a web proxy, you can bypass restrictions. They work by acting as a middle man. These proxies download the requested pages to their proxy servers. You then download the page, corresponding images and other such objects from the proxy servers to your browser. This has the effect of bypassing any filters and annoying firewalls.

Ultrasurf is a program which you can download and save to a USB thumb drive. It does not need any installation process and any changes to system settings. It works by implementing almost all browser functions based on HTTP and user needs, like browsing websites, posting and login on web forums, using Web-based email, uploading and downloading data files, video, real time audio, and other multimedia programs. Happy surfing!

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Thursday, June 17, 2010

The Benefits of Social Media Marketing


The floor of the New York Stock Exchange.

Image via Wikipedia

First, what is social media marketing? Social media marketing is the process of advertising your website or business with the aid of social media channels; it is a very powerful strategy that will get you inbound links, attention, mindshare and massive amounts of traffic. If you think this marketing system is expensive, think again. Costs are minimal to nil—if you do it yourself.

In addition, you get:

  1. Natural as opposed to paid links which gets less weight from search engines;
  2. Advertising that complements rather than clashes with your other marketing efforts;
  3. The cool factor, not the boring corporate image;
  4. High returns for low cost;
  5. Higher search engine placements.

Quite a deal, if you ask me.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Wednesday, June 16, 2010

Improving Your Business With Social Media


Image representing Twitter as depicted in Crun...

Image via CrunchBase

Improving your business will be easier if you know what people are saying about your company, product or service. It also helps to know what your customers want and what competing businesses are doing. With Social Media such as Facebook and Twitter, technology is on your side.

Using the search capability of Twitter, it is possible to get a pulse on how people perceive your company and that of your competitors. A page in Facebook can help connect you to your customers. Additionally, you can find out trending topics which are relevant to your business or field. Most of all, these services are free. Talk about return on investment. Social media, you see, are not just for teens anymore. It can also be a business’ powerful ally.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Tuesday, June 15, 2010

Dogs are Man’s Best Friend but Can Technology Bring Them Closer Together Still?


This Smooth Collie retrieves an obedience dumb...

Image via Wikipedia

In friendship, communication is an important ingredient. Luckily for Dogs and humans, their friendship prospered even with only a crude form of communication between them—mostly, body language. But, can this relationship be strengthened with better communication? And can technology lend a helping hand? I’m not sure, but I do hope so.

I have just seen a dog training video where obedience training was done with the aid of an electronic collar that is controlled remotely. This collar sends impulses to the dog supposedly to aid in grabbing their attention. According to the video, it is not a cruel device as the collar merely causes a slight “weird sensation” to the dog which will vanish once they start to pay attention to their handler.

If instead of an electrical impulse, what if it would be an ultra sonic wave instead. And what if we could learn the way dogs think so that the wave could be synchronized to their way of thinking in a manner that we can transmit thoughts to them? Oh, this is all so science fiction-ey but it might be a reality in the future. After all, the satellite was once a fiction of science.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Monday, June 14, 2010

iPad Versus Kindle For Reading Books


Screen shot of Apple iPad in use

Image by Tom Raftery via Flickr

With the release of the new iPad from Apple, dedicated ebook readers, like Kindle, Nook and Sony reader, are taking notice. Kindle lately made a substantial price cut apparently in response to iPad’s release. But, is iPad better than dedicated ebook readers for reading ebooks?

For me, the short answer is no. I already have a laptop so I do not need a powerful, portable Web browsing machine. I can just bring my laptop and connect from any coffee shop or from places where wi-fi is available. The battery life of Kindle beats the iPad hands down. And that factor is important when on the go and reading a New York Times bestseller.

Weight is also an important factor. With the iPad almost twice as heavy as the Kindle, the latter would be more comfortable for a longer period of time. Tom Clancy’s novels will not be as unbearable in a Kindle as in an iPad.

The display is a no contest. Kindle almost reads like a real book because of its book-like size and dimensions, and its e-ink. The iPad is more computer-like.

Then there is the price. A Kindle is way cheaper than an iPad. Of course, the iPad can do more. But like I said, I already have a laptop to do those things. Why should I pay more for something I will not use? In my particular case, Kindle is the winner!

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Sunday, June 13, 2010

Windows 7’s (And Vista’s) New Interface


Image representing Windows 7 as depicted in Cr...

Image via CrunchBase

There were a lot of people who complained about the new Windows interface found on Windows 7 and Vista. I have not studied user interface design but I can say that some complaints are not valid.

One of such complaints is that the new Windows interface is radically different from the previous interface. Well, that is true. The new interface is indeed very different from the previous one but it is not something to loose sleep over. An experienced user can probably learn it in a few hours if not a few minutes.

Such changes in interface should be expected. Imagine where we would be had the command-line interface not been changed. We are moving towards the future and this sometimes means leaving familiar things behind.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Saturday, June 12, 2010

Windows 7 is Wow


Windows Vista is one of Microsoft's latest cli...

Image via Wikipedia

I have been using Windows 7 for a while now and I really like it. There are changes in the interface that might confuse a long time user of previous Windows versions specially those before Vista, but it is not really that much of a hindrance to doing your day to day tasks.

I heard that the chief designer of this new user interface is the same one who designed Office 2007’s interface. It was very well done—in my opinion, at least. After all, we cannot always stick only to what we are accustomed, can we? That would hinder progress. Somewhere along the way, we need to push the envelope and stretch our comfort zone.

But what is more interesting than the new paint job is the engine under the hood. It hums very smoothly and boots up quickly. Microsoft really tweaked the internals of this operating system for the better. I am doing lots of exploring with this system right now and will be blogging about interesting things as I encounter them.

Enhanced by Zemanta
Stumble Upon Toolbar Add to Technorati Favorites Delicious Add to Mixx!

Posts You Might Be Interested In