Friday, August 28, 2009

Reasons to Use Hard Disk Partitions.


A user may decide to split a hard disk into multiple partitions in order to organize his data more effectively. It is common to store the OS and applications on one hard disk partition and user data on another hard disk partition. When a problem occurs the one partition can be completely formatted and reinstalled without affecting the data partition. A computer user may decide to split a hard disk into multiple partitions because smaller partitions often have smaller cluster sizes. A cluster size is the smallest chunk of data which a partition can store. A large partition might have a cluster size of 16KB. This mens that a file with one character in it will occupy 16KB of space on the disk. In a smaller partition, that file might only require 4KB to store. This is a useful strategy if you are storing a large number of small files. Another thing a user may have to split a large hard disk into multiple partitions if the hard disk is larger than the partition size supported by the operating system.
Creating Hard Disk Partitions.
Most operating system use the `fdisk` (use at command prompt) command to create hard disk partitions. Many operating systems also have graphical tools which accomplish the same task.
Hard Disk Partitions and File Systems.
You don't actually store data in hard disk partitions. You store file systems in hard disk partitions and then you store data in these file systems. Some operating systems blur the lines between partitions and file systems.
The Partition Table.
Partition information is stored in the partition table, a reserved area at the beginning of a hard disk.
Extended Partitions
A standard partition table is only able to store information about four partitions. At one time this meant that a hard disk could have a maximum of four partitions.
To work around this limitation, extended partitions were created.
An extended partition stores information about other partitions. By using an extended partition, you can create many more than four partitions on your hard disk.
The four standard partitions are often called the primary partitions.
Partitions configured into an extended partition are often referred to as logical partitions.
Partition Types
When a partition is created, a special byte of data is written to record what type of partition it is.
Because one hard disk may be shared by multiple operating systems, operating systems tend to agree on the meaning of these values.
The table below lists some of the partition types in use.
Partition Number
Partition Type
00 -Empty
01 -DOS 12-bit FAT
02 -XENIX root
03 -XENIX usr
04 -DOS 16-bit FAT <=32M
05 -DOS Extended Partition
06 -DOS 16-bit FAT >=32
07 -OS/2 HPFS, WinNT NTFS
08 -AIX
09 -AIX bootable
0a -OS/2 Boot Manager
0b -Win95 FAT32
0c -Win95 FAT32 (LBA)
0e -Win95 FAT16 (LBA)
0f -Win95 Extended (LBA)
35 -OS/2 JFS
39 -Plan 9
40 -Venix 80286
51 -Novell
52 -Microport
63 -Unix System V, Mach, GNU HURD
64 -Novell Netware 286
65 -Novell Netware 386
75 -PIC/IX
80 -MINIX until 1.4a
81 -MINUX, Linux
82 -Solaris X86, Linux swap
83 -Linux native
85 -Linux extended
93 -Amoeba
94 -Amoeba BBT
a5 -FreeBSD, NetBSD, BSD/386, 386BSD
a6 -OpenBSD
a7 -NEXTSTEP
b7 -BSDI BSD/386 filesystem
b8 -BSDI BSD/386 swap
Be -Solaris 8 bootable
Bf -Solaris x86
c7 -Syrinx
Db -CP/M
e1 -DOS access
e3 -DOS R/O
Eb -BeOS BFS
Fb -VMWare filesystem
Fc -VMWare swap
f2 -DOS secondary
Ff -Xenix Bad Block Table

Tuesday, August 25, 2009

Tips to Avoid Viruses:

There are thousands upon thousands of viruses that exist today. With a couple easy techniques, you can avoid the majority of all viruses.
1- Don't open an email or attachment of an email if you don't know who or what it is. Email is an easy to way to put viruses on your computer and spread them to others.
2- Don't download anything if you haven't read any reviews on what you are downloading. If you want to download something, search the internet for reviews about that product, so you know whether the product is reliable or not. Make sure the review site you look at it reliable as well, as forging a website with reviews can be done easily.
3- Keep your viruses definitions, spyware definitions, and firewall up to date. Whenever an update is available, be sure to update. Since viruses are constantly being created, it is important to be scanning using the latest available information.

Friday, August 14, 2009

What are the F1 through F12 keys?

What are the F1 through F12 keys?
Commonly known as "function keys", F1 through F12 may have a variety of different uses or no use at all. Depending on the installed operating system and the software program currently open will change how each of these keys operate. A program is capable of not only using each of the function keys, but also combining the function keys with the ALT and/or CTRL keys, for example, Microsoft Windows users can press ALT + F4 to close the program currently active. Below is a short-listing of some of the common functions of the functions keys on computers running Microsoft Windows. As mentioned above not all programs support function keys and/or may perform different tasks then those mentioned below. If you are looking for more specific shortcut keys and function key examples we suggest seeing our shortcut key page.

F1..Almost always used as the help key, almost every program will open the help screen when this key is pressed.
Windows Key + F1 would open the Microsoft Windows help and support center.
Open the Task Pane
F2..In Windows commonly used to rename a highlighted icon or file.
Alt + Ctrl + F2 opens a new document in Microsoft Word.
Ctrl + F2 displays the print preview window in Microsoft Word.
F3..Often opens a search feature for many programs including Microsoft Windows.
Shift + F3 will change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word.
F4..Open find window.
Repeat the last action performed (Word 2000+)
Alt + F4 will close the program currently active in Microsoft Windows.
Ctrl + F4 will close the open window within the current active window in Microsoft Windows.
F5..In all modern Internet browsers pressing F5 will refresh or reload the page or document window.
Open the find, replace, and go to window in Microsoft Word.
Starts a slideshow in PowerPoint.
F6..Move the cursor to the Address bar in Internet Explorer and Mozilla Firefox.
Ctrl + Shift + F6 open to another open Microsoft Word document.
F7..Commonly used to spell check and grammar check a document in Microsoft programs such as Microsoft Word, Outlook, etc.
Shift + F7 runs a Thesaurus check on the word highlighted.
Turns on Caret browsing in Mozilla Firefox.
F8..Function key used to enter the Windows startup menu, commonly use to get into Windows Safe Mode.
F9..Opens the Measurements toolbar in Quark 5.0.
F10..In Microsoft Windows activates the menu bar of an open application.
Shift + F10 is the same as right-clicking on a highlighted icon, file, or Internet link.
F11..Full-screen mode in all modern Internet browsers.
F12..Open the Save as window in Microsoft Word.
Shift + F12 save the Microsoft Word document.
Ctrl + Shift + F12 print a document in Microsoft Word.

Microsoft Outlook

Create underlines without any text
This tip works with the majority of Microsoft Office applications. Easily create an underlined space by pressing CTRL + U to start the underline, then press SHIFT + Space for each underlined space you wish to create. An example of how this could be used is for printable forms, for example: Name: .
Print only sections of a document
Save on your printer ink by selectively printing in Windows programs such as Microsoft Word, Internet Explorer, WordPad, Outlook, etc. To do these highlight portions of text you wish to print and click print. In the printer dialog window under Page Range choose the option Selection. It is important to realize that not all programs or printer drivers support this feature.
Help control your incoming e-mail with the rules wizard
Use Microsoft Outlook Rules Wizard to help screen your e-mail and delete mail that you are not interested in.
Shortcut to quickly find users in your address book
Quickly locate a user in your address book or a company address book by typing portions of the name or alias and pressing CTRL + K. For example, if you wished to send a mail to John Doe, typing "jo do" and then pressing CTRL + K will automatically complete the name John Doe, unless other names exist with "jo" and "do." This is very helpful with a large corporations address book, especially when you don't know how to spell someone's name.
Quickly undo mistakes
Quickly undo mistakes in the majority of most PC Windows program by pressing CTRL + Z.

Virus

A software program first written Rich Skrenta in 1982 who was a 15-year old high school student. Known as The Elk Cloner this virus spread to other computers by monitoring the floppy drive and copying itself to any floppy diskette that was inserted into the computer. Once a floppy diskette became infected it would infect all other computers that disk was inserted into, each computer that was infected would then infect every floppy diskette inserted into it.
Fred Cohen in 1983 later coined the term virus in a 1984 research paper as "a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself." Today a computer virus is a software program, script, or macro that has been designed to infect, destroy, modify, or cause other problems with a computer or software programs. Users can protect themselves and remove any viruses on the computer by installing an antivirus protection program, which is designed to detect, protect, and clean any computer viruses.

Tuesday, August 11, 2009

About Internet


The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.With the meteoric rise in demand for connectivity, the Internet has become a communications highway for millions of users.

The Internet was initially restricted to military and academic institutions, but now it is a full-fledged conduit for any and all forms of information and commerce. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.

Internet!!!!


The Internet has become a communications highway for millions of users. The Internet was initially restricted to military and academic institutions, but now it is a full-fledged conduit for any and all forms of information and commerce. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.

Sunday, August 9, 2009

Physical Damages of Hard disk

When clicking sound starts coming from hard disk drive, this indicates that hard drive is facing some problem. This only happens when power fluctuate while you are working on the computer. This shows that your hard disk is physically damaged.

Linux Basic Commands

The Bais command of Linux..easy usage easy learn
For changing directory / to /etc
[root@pc1 /]# cd /etc
One step back /etc to /
[root@pc1 etc]# cd ..
Go to previous working directory
[root@pc1 /]# cd -
Go to current login user home directory
[root@pc1 etc]# cd ~
Show the contents of /etc in single color
[root@pc1 ~]# dir /etc
Show the contents of /etc in different colors with nature of contents
[root@pc1 ~]# Ls /etc
create a folder on root partition
[root@pc1 ~]# mkdir /disk
Create a folder in /disk
[root@pc1 ~]# mkdir /disk/dir
Create multiple folder in multiple directories with single command
[root@pc1 ~]# mkdir /etc/dir1 /var/dir2 /usr/dir3
Create multiple folder in same directory
[root@pc1 ~]# mkdir dir1 dir2 dir3
Copy a file in directory
[root@pc1 disk]# cp file dir
Copy a file from /disk/file and paste it in /disk/dir/
[root@pc1 disk]# cp /disk/file /disk/dir
Copy a directory with –r option
[root@pc1 disk]# cp -r dir dir2
Copy a file from /disk/file and paste it in /etc with myfile name
[root@pc1 disk]# cp /disk/file /etc/myfile
Remove a file
[root@pc1 disk]# rm file
Remove a file with forcefully option
[root@pc1 disk]# rm –f file
Remove a directory with out –r option and you face will an error
[root@pc1 disk]# rm dir
Remove a directory with –r option
[root@pc1 disk]# rm -r /disk
Remove a directory with forcefully option
[root@pc1 disk]# rm -rf dir
Move /etc/dir1 to /disk/ with different name
[root@pc1 disk]# mv /etc/dir1 /disk/mydir

Overview of the Linux file system


/bin All commands which are used by normal users
/etc System conf files
/var Server data logs Mail proxy cache
/dev All devices name stored in /dev
/sbin All commands which are used by supper user
/boot Linux kernel ( vmlinuz , initrd ) Grub directory
/usr All gui tools installed in /usr
/proc System information’s ( picture of RAM )
/home User's home dir's
/tmp Temporary files
/media Auto mounted devices mount point in /media

How to insert Flash Movies into PowerPoint slides?

First of all open the presentation in which you want to insert Flash movie file.
Now click on "Toolbar" option from the "View" menu and choose the option "Control Toolbox".Here a small floating menu will appear with the title "Control Toolbox".Using "Control Toolbox" toolbar, click on the icon that looks like hammer for more controls and scrolling the objects then choose the object "Shockwave Flash Object".Now using your mouse pointer, draw the box size and position where you want to play a flash movie.
Now right click on box and select the "Properties" option,A small properties dialog box will appear with different options.
Under the Alphabetic tab, click the option "Movie" and type the full file path of flash movie in blank cell next to Movie (for example d:\flash_file). Again under same tab, set the property "True" for "Playing" and "EmbedMovie" objects to add and play the flash file automatically with slide. Here you can also set the Quality, Width, Scale and Windows Mode objects for flash file.
Finally close the "Properties" dialog box. Save your PowerPoint presentation and run it for test.

How to disable the "Turn Off Computer" button in windows XP?

you will need to be logged into your computer with administrative rights.Click Start button and type regedit in Run option then press Enter for next.Here locate the location to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Here in right side panel, right click to create a new DWORD value with the name NoClose.Now assign number 1 in value data box and close the registry editor.Now close the registry editor and restart your computer after any changes to go into effect.But next time, if you want to enable "Turn Off Computer" button on start menu then simply change the value of data box to 0 or delete NoClose DWORD item.

Friday, August 7, 2009

Convert FAT-NTFS

You can convert FAT into NTFS perform the following tips.
Click start, and in the RUN, type there cmd. The command prompt will be appeared.
At the command prompt, type the following command.
CONVER [driveletter]: /FS:NTFS. Convert.exe will attempt to convert the partition to NTFS.

Note:Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, its best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command

Check out these funny trick Just 4u :)

1. Copy and paste the java script code to the address bar of your browser

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

2. Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)

How to disable the right click functionality on the desktop?


Today tip is very useful particularly for home users who want to protect their system default settings against unwanted changes that other users can make. For example changes in system desktop appearance, themes, and screen saver as well as other display settings. Using registry editor, you can disable the right click functionality on desktop to access the "Display Properties" dialog box and this will also prevent users to access windows explorer.
Follow the given steps to disable the right click functionality on desktop:

Follow the given steps to disable the right click functionality on desktop:
To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.

Here locate the location to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Here in right side panel, right click to create a new DWORD value with the name NoViewContextMenu (it is case sensitive), then assign number 1 in value data box.
Now close the registry editor and restart your computer after any changes to go into effect.But next time, if you want to enable right click functionality on desktop then simply change the value of data box or delete the NoViewContextMenu DWORD item.

Ping Error मेसेज in Networks

PING (Packet Internet Groper) is a program used to test whether a particular network host is online by sending an ICMP (Internet control message protocol) echo request and waiting for a response. It is used for troubleshooting connectivity between network devices such as servers, routers, workstations and printers. You can ping a host from a command prompt simply by typing ping IP address. For example type ping 192.168.0.1 to see if the host with the 192.168.0.1 IP address is reachable. You can also ping a website by typing ping www.microsoft.com to check its availability.When a PING is successful you get a reply back from the host showing its IP address and other information such as the time it took for the reply to go through.When a ping response is not successful you can get a variety of error replies। Here are the main error messages and what they mean.
TTL Expired in TransitThe TTL value determines the maximum amount of time an IP packet may live in the network without reaching its destination. It is effectively a bound on the number of routers an IP packet may pass through before being discarded. This message indicates that the TTL expired in transit. Number of required hops exceeds TTL. Increase TTL by using the ping -i switch.
Destination Host UnreachableThe host that you are trying to ping is down or is not operating on the network. A local or remote route does not exist for destination host. Modify the local route table or notify the router administrator.
Request Timed OutThe ping command timed out because there was no reply from the host. No Echo Reply messages were received due to network traffic, failure of the ARP request packet filtering, or router error. Increase the wait time using the ping -w switch.
Unknown HostThe IP Address or the Host Name does not exist in the network or the destination host name cannot be resolved. Verify name and availability of DNS servers.

Thursday, August 6, 2009

How can you Manage a “PASSWORD” Complete Detail……

Here’s how to select strong passwords that are easy to remember and fun to create.
Does your password training currently go something like this?
Select a password that is easy to remember, but hard to guess.
Do not use your name, your children’s, animal’s, or parent’s names
Do not use a word found in the dictionary
Include alpha and numeric characters
Password minimum is 7 characters
Do not write your password down
Do not share your password with anyone
Not bad…these are all valid, common rules you may have seen for choosing passwords. However, selecting quality, easy-to-remember passwords requires a little more effort — and can be a whole lot more fun!
Remember a favorite song. Is it “Ho Sakay To Mera Ik Kaaam Kro” Your password is like HSTMIKK or Use either song — or any other favorite — to create a password that is more difficult to crack. Take the first letter of each word and then add a special character or number and you will have a good password.
If you and music don’t mix, consider something about you, your friends or family. “My Son Attends a Funny Party at City School.” That becomes MSAAFPACS—or, add a special character or number and statistically it gets even stronger, MS@@FP@CS. “I Took My Son To See Shrek,” becomes ITMS2SS.
Your button still isn’t pushed? Another technique for creating passwords that aren’t in a dictionary or easily guessed is to combine words to create new words. Examples would include Party Animal, which becomes PARANI%. Happy New Year becomes HAPNEWY*.
No password is perfect, and even the best system can be broken with enough time, money and computing power. But by using creative techniques like these, you will create better passwords. This will strengthen security and help ensure patient confidentiality. It’s your turn. Be creative and select a first class password. It may even be fun!

Your r using Microsoft Office 2000, XP,or 2003. the file sizes tooo big! how u can manage.:)

Choose Tools > Options > click the Save tab, and Uncheck Allow Fast Saves

How can u find recently used files?

Click View in the Windows Explorer main menu, and then choose Details, then click on the Date Modified heading to show each file listed by date, most recent first.

How can u check for possible disk problems

Open My Computer right-click drive C, choose Properties, click Tools tab, and click the Check Now button. For other diagnostic hints, click Start, choose Help and type troubleshoot. Microsoft has some good troubleshooting pages

How can you quickly run the Windows Calculator or open the Windows NotePad in Windows Vista?

Click Start and type "calc" or "notepad" in the Start Search box. (It is similar in Windows XP.)

How can You download videos from such sites as YouTube

Step 1. Browse to the YouTube video page that you want to download.Step 2. In your browser open a new window or tab and go to www.keepvid.com.Step 3: At the top of the KeepVid site is a green text box that reads: “Copy the link of the page with the video on it and paste it here”So copy and paste the Web address of URL for your YouTube video then click the [Download] button.Step 4. The next part is a little confusing because shortly after you click [Download] a » Download Link « message will appear right below the Original Download button. Click on the Download Link link and save the get_video file to your computer.5. The downloaded file is in the Flash Video FLV format. But it does not have the FLV file extension. You will have to right-click on the file and rename get_video to get_video.flv. And while you are at it you can change the file name from get_video to any appropriate name you want.6. The FLV file requires a FLV Player to play. One place to get a free FLV Player is from Applian Technologies which also install a Freecorder toolbar on your browser that will allow you to record internet audio files as well.

If your Computer running slow! Or your Screen flooded with popups! Are you getting an error message and don't know what to do?.....plz follow

There are companies like www.PCLive.com that will remotely repair your computer for $49.95 per incident and www.support.com where prices range from $75 to $99 dollars. I am not recommending these services; I am just mentioning that there are alternatives.

How you can set a password for a Word or Excel document

With Office 2003, choose Save As. At the top of the Save As dialog window there is a Tools option. Click the drop-down arrow adjacent to the Tools item, and choose Security Options. Then enter your desired password in the Password to Open textbox. In Office 2007, the Tools option is at the bottom of the Save As dialog window; from the Tools drop-down menu you choose General Options.

Windows Vista: Creating Shutdown/Restart Shortcuts

Want to create a quick and easy to way restart or shutdown Vista from an icon in your desktop, quick launch bar or your Start menu? Follow the instructions below.
Right-click an empty area on your desktop and select New > Shortcut.
In the field labeled 'Type the location of the item,' type: shutdown.exe /s /t 00 (note: those are zeros, and not 'O's). You can also use the command shutdown.exe /r /t 00 to restart your computer instead of shutting it down.
Press the Next button, then give your shortcut a name (i.e.: Shut Down), then Press the Finish button
Optional: if want a different icon image. Right-click the new item you just created, then click the Shortcut tab and press the Change Icon button to select a different image to display.