When you visit certain Web sites, you often get the error message of “Done, but with errors on page.” What does that mean and is there anything to do to fix it?

This error usually only shows up in Internet Explorer and it mainly has to do with JavaScript. If the Web site you’re trying to view uses JavaScript, you may run into a script related error, which triggers the “Done, but with errors on page” message. It is usually generated by an error in the site’s code. Only the developers of the site can get in and fix it.
In can be eliminated easily by Clicking: Menu: Tools – Internet Options – Advanced tab. Check “Disable script debugging” Uncheck “Display a notification about every script error” Unless you are the developer of the web site, you may not want this notification. And like magic; problem solved!

Using the invisible character

Do you have something that requires a name but you don’t want anything in it? You could just throw nonsense in there, but a blank space would be best. In actuality, there is an invisible character! This special character is the equivalent of a space:
Hold down ALT then type 0160 (Alt+0160) on the number keypad at the right side of your keyboard.

Ways to Use the Invisible Character

  1. You could use it as an email address when filling out forms: @ .com
  2. Giving your desktop shortcuts blank labels so all you see is the icon. (This will only work on shortcuts, not on My Computer, My Documents, or program icons.)
    You must have your shortcut labels set to drop shadow so that the they are clear.
    Then, follow the normal way to change the filename: click the name slowly two times to highlight the name. Or click the icon once and hit F2.
    Type in our invisible character code (Alt+0160). There you go–an icon with no label.
    Keep in mind that if you want to do this to other shortcuts you can’t have the same name, so just type the code more than once. That means that for the first shortcut you type Alt+0160 release the Alt key then type Alt+0160 again. For the third icon do it three times, etc.

How else do you use this invisible character? Let us know by commenting below!

When you start your Windows Vista or Windows 7 computer, by default the system makes you enter your password to log in. Here’s a way to get around it.
When you first install Vista or 7 and start using it, you are required to enter in a password for your account. But after that, you’re not really given a choice to remove the password if you don’t want it. You’re just sort of stuck typing it in every time and that can get old rather quickly!
If you’re not the only one who uses your computer, consider leaving it this way. It is a good security feature and it helps to keep all of the different accounts, files and preferences separate from each other. But if you’re the only one who ever uses your computer, you should be able to get rid of the password prompt if you want.
If you’d like to bypass the Windows Vista and 7 log on process and remove your password, just follow these steps:

  1. Go to Start, Control Panel.
  2. Click on the User Accounts and Family Safety link.
  3. Next, click on the User Accounts link.
  4. Under the “Make changes to your user account” section, click on the Remove Your Password link for your account.
  5. On the next screen that comes up, enter in your current password.
  6. Click on the Remove Password button to confirm everything.
  7. Close out of all the open windows and restart your computer. That will allow you to test the system to make sure your password really was removed.
From now on, when you start up your Vista computer, you will be taken to your desktop automatically and you will no longer have to worry about a password.

computer security virus tips

With millions of computer users browsing the web at any given time, there are plenty of targets for malicious coders. While computer experts don’t always know why coders choose to build harmful computer programs, the fact is that it happens all the time. Computer viruses can steal personal information, interfere with normal operations, attract spam and even shut down your computer’s hard drive. Protecting your computer is critical for browsing success.

Start With the Basics

Most computer systems come with security features already in place. For example, the Windows operating system is packaged with Microsoft Windows Security Center. When you first open, boot up and register a new computer, you should make sure that this program is functioning. It will give basic protection against spyware, viruses and malware. In addition, a basic firewall is built into this program, providing additional protection and stops for potentially harmful programs. Upon activation, don’t be surprised if your security system needs immediate updating. Software that protects your computer needs regular and consistent updating to stay useful. Viruses are constantly being generated and the several-month lag between when your computer was made and when you first started using it can mean that the database the security system is loaded with is severely out-of-date.

Upgrade to Meet Your Needs

Many people operate computers for a long time with only basic protection in place. However, heavy computer users or those who have risky browsing habits can sometimes benefit from upgrading their virus, spyware and malware protection, as well as using a fuller-featured firewall; this is especially important if you use a networked computer system. Basic or free virus protection will still scan and update for viruses. Paid programs, however, offer more features, including ease-of-use and convenience features. The most important thing is to verify the publisher and make sure you are getting what is promised. Most well-known virus protection programs, such as AVG and Norton Security, have reviews available to help you make your choice.

Learn About Spyware Risks

Spyware creates risks that many computer users are not aware of. If you are only protecting against viruses, you could be leaving your computer open to damage. Most people are familiar with spyware that initiates and attracts annoying ad programs. Spyware, however, can be much more malicious as well. Your shopping habits can be tracked by spyware. While not exactly harmful, some people consider this a breach of privacy. The worst spyware programs interfere with normal operations and can even track what you type, sending personal information to people who want to steal your identity. Some spyware redirects your browser to different web addresses, increasing your risks of virus infection and fraud.

How Viruses Work

The main difference between spyware and viruses is how they are spread. A virus reproduces itself and attaches to any document that the computer sends, while spyware can be stored as a cookie or tracking code. A virus is most often found traveling with a piece of computer software, such as a document, picture or piece of music. When dealing with email, it is necessary to open an attachment to become infected, indicating that, in most cases, the computer user must somehow invite the malicious software to replicate on their system. Of course, most people have no idea it is there or what is happening. Some of the sneakiest and most harmful viruses actually masquerade as virus protection software, making them extremely hard to detect. Because of this, it’s crucial to be familiar with your particular virus protection program and know what it looks like and what the normal scripts and prompts are during operation. Viruses do some of the same things that spyware does; they just accomplish it differently. An active virus can steal personal information, generate ads or shut down your system, including the very virus protection programs that can fix the issue.

Take Steps For Protection

Like anything, the best way to protect against viruses is to be educated. Become familiar with what malicious software may look like. If you get an email or are asked to download a file that you don’t recognize or looks suspicious, do your homework. Research virus protection, spyware, malware and firewall programs and use them to their fullest capacity. Set the software to update and scan automatically to make sure that the system is constantly monitored. In addition, regularly check on the databases published by various virus protection services; many will provide lists of symptoms and risks, as well as the standard way the file gains access for no cost to the public

computer tips

Few things are as frustrating as dealing with a slow, sluggish computer. When a computer is brand new, it works wonderfully well. Over time, though, its performance can slowly begin to worsen. This happens for a number of reasons, but the biggest culprits are things like spyware, adware and other computer threats that are unwittingly downloaded along with other content while online. You don’t have to download thousands of MP3s, movies or other items to experience these problems, either – nobody is immune to them. Instead of accepting the situation, there are plenty of techniques and strategies that you can use to make it better – a few of the best ones are outlined below.

Strategy #1: Clean Your Computer’s Windows Registry

The biggest cause of slow, sluggish PC performance is errors and problems within its Windows registry. Adware, spyware and other threats usually target the registry, damaging or misplacing important files within it. When it comes to PC cleaning, a daily Windows registry cleaning should be at the top of your list of priorities. However, this should never be done manually – there are too many opportunities for major errors that could seriously damage your PC’s operating system. Instead, invest in a high-quality Windows registry cleanup program and configure it to run once per day – you won’t believe the difference that it makes.

Strategy #2: Remove Unneeded Files

Every time you log on to the Internet or otherwise use your computer, temporary files are generated. They are usually only needed once; however, they don’t disappear on their own. Instead, they accumulate over time until they are cluttering up your computer’s file system and affecting its performance. While it’s possible to remove these files one-by-one, it’s much easier and quicker to use a PC cleaning tool that’s designed for the purpose. Try to do so about one time per week to keep your computer humming along with ease.

Strategy #3: Remove Unneeded Programs

Like many people, you probably download and try out many different programs each month. How many of them do you actually end up using on a regular basis? Chances are, not very many of them. By getting into the habit of uninstalling unused and unneeded programs, you can keep your computer’s file system a lot less cluttered. In turn, your PC’s performance will improve dramatically. You can optimize your computer in this way by using its Add/Remove Programs feature. Its location varies by operating system, but you should be able to find it somewhere in the Control Panel.

Strategy #4: Empty the Recycle Bin

When you click “delete” on a file or a program, it doesn’t go away for good – not immediately, anyway. Instead, it sits in a kind of purgatory in your computer’s Recycle Bin. As things pile up in the Recycle Bin, your computer can start exhibiting some very annoying problems. If sluggish startups and frequent crashes are occurring with increasing frequency – and your computer’s recycle bin is very full – go ahead and empty it. From then on, get into the habit of doing so about one time per week. This small but important strategy can make a huge difference.

Strategy #5: Perform a Disk Defragmentation

Windows isn’t very efficient when it comes to storing files. It actually splits them up, depositing them into whatever spaces are available. The more spaced apart the pieces of a file are, the harder your computer has to work to make them run. The Windows disk defragmentation system tune-up utility works to piece all of those files back together again. The process is a long one, though, and only needs to be done about four times per year. Set it up to run automatically once every three months. By doing so, you’ll be able to keep your computer running in tiptop shape.
When it comes to keeping your computer running optimally, small but regular maintenance is the best way to go. Protecting your PC only does so much; even the most careful Internet users in the world unintentionally download malicious software from time to time. By using basic system tune-up tools, cleaning your computer’s Windows registry regularly, performing regular file-cleaning maintenance and otherwise optimizing your PC, you should be able to keep it in like-new condition for a lot longer. Even if your computer has been performing slowly for some time, beginning this regimen is sure to produce results. In the end, you’ll be able to enjoy a computer that flies along – instead of one that spins its wheels.

PC Troubleshooting Tips

PC computer troubleshooting tips

Why is My PC Crashing?

Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files

Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files

Windows operating systems handle file organization in a way that isn’t very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software

Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory

When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this isn’t true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating

If you’ve run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and doesn’t work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan isn’t very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!

As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!

Sooner or later you will be desperate to find out how to recover deleted files, because accidentally deleting your precious pictures, photos, and files is bound to happen to anyone. I hope that you do not encounter this dilemma, however if you do, you may possibly have a chance to recover deleted files. One way is to get a professional IT guy that specializes in file or data recovery, which in itself can be very expensive. Maybe you are recovering files from a crashed hard drive and haven’t actually deleted anything or maybe you want to recover deleted pictures from your digital camera. This article is about how to recover deleted files free using software but if you have a crashed hard drive then this is a different story altogether.
Firstly we need to know what has happened to our deleted files so that we can learn which action is best to recover deleted files.

What does Windows do with deleted pictures, photos, and files?

When you delete a file from your computer, providing it is not a huge file, it is sent to the computer recycle bin. There is usually an icon on your desktop that will allow you to open your recycle bin and see the file in there. If you have gone to that extra step of deleting the file from the recycle bin, then this is when we are faced with this situation of trying to figure out how to recover deleted files. Here is a basic tutorial on how to recover a deleted file from your recycle bin.
Even when you have deleted a file from the recycle bin it is not really gone. Windows simply marks the file as deleted, and waits for the space to be overwritten by another file needing the space, for it really to be deleted. If you didn’t format or defrag the drive the file may possibly be there for years to come. This is what happened with my D drive.
People often have to buy a program that will recover deleted files and photos, because that’s how desperate they are to retrieve their precious data..
Well this is your lucky day because you have actually hit the jackpot by finding this fantastic free program called Recuva. I know I was ecstatic when I found it and actually rerecover deleted filescovered my irreplaceable family photos that I had accidentally deleted from the recycle bin. I seriously thought that it would not work, because after all, it is a free program after all.
“Recuva (pronounced “recover”) is a freeware Windows utility to restore files that have been accidentally deleted from your computer. This includes files emptied from the Recycle bin as well as images and other files that have been deleted by user error from digital camera memory cards or MP3 players. It will even bring back files that have been deleted by bugs, crashes and viruses!” Quoted from the Recuva website, it just sounded too good to be true.

When can you use Recuva to recover deleted files free?

  • When you have recently accidentally deleted a file, photo, or picture from your computer you can use Recuva to recover deleted files.
  • You can recover deleted pictures free when you haven’t used your computer too much and overwritten the deleted file.
  • When this program says “No overwritten clusters detected” and that the file is in Excellent state after scanning your drive.

When can’t you use Recuva to recover deleted files free?

  • When you have been formatting a hard drive you will not be able to recover deleted pictures free because the files would have been overwritten.
  • Sometimes if you have defragged your computer. In my tests, after defragging my hard drive I could not recover deleted pictures free as they were then damaged. At this point you would need a professional data recovery service.
  • If the program says the file has overwritten clusters. If you are trying to recover deleted pictures free using Recuva and you see the files have a red dot next to it, that’s not good.

Recover deleted files – What are the results from my tests with Recuva?

Data Recovery - 100% Guaranteed Success
  • I have two hard drives and scanned both. One is C drive and one is D drive. C drive is the main hard drive and D is storage. Nearly all the files that showed up were available for recovery.
  • D drive had very old files show up. Half the stuff I could hardly remember because I had been storing files on there for a few years.
  • C drive had less as I had recently formatted it, but all the recent deleted filed were available. Therefore I could recover deleted files easily, well the ones available.
  • Then I decided to defrag C: and then scan it again. This definitely reduced the number of files that were in Excellent condition to recover. It probably overwrote 75% of files by defragging.
  • I was amazed at what it actually recovered. It had every little thing that had been stored in my internet history, cookies, and other stuff that you thought would have been gone. It was almost scary how much detail this program went in to. All this from a free program.

Notes on how to recover deleted files:

  • Files that has Excellent state and with the comment No overwritten clusters detected can be recovered.
  • You should always recover deleted files to another hard drive as you might overwrite the file your are trying to recover.
  • You can also recover deleted files and photos from your camera storage card! How great is that?
  • This program is totally free and is made be the same guys that made Ccleaner. Their programs do no nag you to upgrade and they have no spyware contained in them. All they have is a donation button on their site. So if you find this free program handy then go and give these guys a donation.
  • You can also try The World Leader in Data Recovery Software! No Recovery, No Charge!
Also watch the video below to see how to recover deleted files,

How to create quality backlinks for free
Tool builds backlinks free
SEO for your website/blog

Fast Blog Finder is FREE blog commenter software that provides you with a great way to get backlinks for your sites without using any risky tactics that could destroy your search engine rankings. Blog Finder is designed to search for blog posts that rank in Google for a particular phrase and makes it easier to comment on them. Blog Finder searches for quality blogs that accept comments. It brings up blogs with both "dofollow" and "nofollow" tags. It also shows the Google PageRank for each domain and blog page post and has options that can be tweaked to filter by Domain PR, Page PR, link type, date and user note.

Quotes from its homepage
  • get the most relevant blogs for your keywords by limiting the program to the top 10, 20 or 50 results from the search engine — this means you can dramatically increase search engines and targeted human traffic to your web site after your comment is approved
  • post comments on the blogs directly from the program — big time saver!
  • determine the blog type [DoFollow, NoFollow, MIXED] – you get more link juice by posting comments on DoFollow blogs. We found through extensive research and testing that none of our competitors offer the same accuracy on determining DoFollow blogs as Fast Blog Find does. Fast Blog Finder determines DoFollow blogs with 99% accuracy because it analyzes links in the comment area to determine the blog type unlike other similar tools which checks all the links on the page.
  • determine the domain PageRank and page PageRank of found blogs — you can post comments on blogs with a higher PR to get more precious links and boost your natural search engine rankings
  • auto-fill the comment form using the desired user profile — no need to manually type your name, website URL and email! Just select the profile from the menu to pre-fill the form.
  • check blogs for approved comments — within seconds you will know whether your comment is approved or not!
  • skip duplicate posts between search queries — you avoid posting the comment for the same post twice or more times which means you don't act as a blog spammer in the eyes of the blog owner and have more chances to get your comment approved
  • skip posts where you must login or register to submit a comment — great time-saver if you don't want to create an account on the blog
  • load your own lists of blogs — if you obtained blogs somewhere outside of the program, you can load them into Fast Blog Finder, determine their types and comment on best blogs.
  • submit the pages with your comments to social media sites — for extra traffic!
  • add domains to the blacklist — you automatically filter junk blogs and exclude them from search results
How to get Fast Blog Finder
Download Fast Blog Finder Here
How to use Fast Blog Finder
For FREE version, you just need to submit your email address, then Fast Blog Finder will send an activation key in your email. Use the key on the software and enjoy!

Steps to build backlinks with Fast Blog Finder
  • type the keywords or a keyword phrase that you want to find blogs for and click "Start".
  • when the search is complete, click on an URL. The page opens directly in Fast Blog Finder preview panel.
  • read the post,  write your comment and click "Submit".
  • open the next blog and submit the next comment, etc.
To save your time, you can open multiple pages in different tabs. Hold down CTRL on the keyboard and click on the URLs. When you finished writing the comment on the first post, the next one is already loaded and waiting for you.

What is Blog Comment Spamming?

Comment spam occurs when a person leaves a comment on a blog post that overtly includes links to the commentor's blog or website solely for the purpose of building link count and boosting search engine results.

How to identify blog comment spam?
Keep in mind that not all spam comments include a spam link. Sometimes, spam bots are simply phishing for blogs that accept and publish their comments.

1. The Gibberish Comment

Some comments are written in another language that uses unrecognizable characters or they might include a bunch of letters in your native language that are meaningless. It's safe to assume these comments are spam. For example , if your blog is written in English, most people will leave comments in English, so if you're unsure if a gibberish comment is a legitimate comment in a foreign language, or on the side of caution and mark it as spam or delete it.

2. The Link-Filled Comment

Even if a comment isn't obvious spam filled with links leading people to sites to purchase or download pornography, it's a common belief that comments left on a blog that are loaded with links for the primary purpose of getting people to click on those links are spam. Mark them as spam or delete them.

3. The 'Good Info' Comment

Comments that include a word or two that provide no value to the conversation and are incredibly vague, are most likely spam. For example, comments that say, "good info," "great blog," and similarly useless information, could very well be spam. You could follow the link provided in the URL field of the spam comment to try to determine if the site adds value to your readers or not. However, most of the time it's safe to mark these comments as spam.

4. The .info, .ru, and Similar Comments

There are many legitimate Web sites with .info and .ru extensions, but if you come across a suspicious comment with one of these extensions, check out the site and mark it as spam or delete it if it still seems odd.

5. The Overly Complimentary Comment

If you get a brief comment that says something incredibly complimentary but adds little additional value to the conversation on the associated blog post, it's very possible that comment is spam. Follow the link provided and check out the site referred to in the URL section of the blog comment form. This is a common spam technique.
How to Avoid Being marked as blog comment spamming
To avoid being accused of comment spam, only include links within your comments if they provide added value to the conversation. Links should be relevant and useful, and they should not be included in excess. Even links in a comment signature can be considered blog comment spamming.

Instead of including links within your comment, include your blog's URL in the space provided when you enter your comment. On most blogs, your name will automatically link to the URL you enter when your comment goes live on the blog. This is a completely acceptable way of linking as part of commenting. However, it's also important that all comments you leave on blogs bring added value to the conversation or your comments will be disregarded and provide no real benefit for you or the blogging community.

Have you ever wondered how many visitors are browsing your blog in real time and which pages are they viewing? Today I will show you a very simple method to track people who is online on blog or website . Just follow these simple steps:

1. On Blogger, go to Dashboard>Design>Page Elements, click Add a gadget, then choose HTML/JavaScript
2. Go to whos.amung.us , at the middle of the page, you will see a Javascript code along with some options (left, bottom, right). Choose one that is the most suitable for your blog.
3.Copy and paste that code into the HTML/JavaScript gadget. Click on SAVE button. Done!
4. The button with a number at the middle on the right of my blog is an illustration. You can click on that button to track your site's status, for example, how many people online during the past 24 hours, what they are copying, which page they are browsing, where they come from


You are hosting your blog in Blogger and wish to use a custom domain. You have already purchased a domain from a website or hosting provider (e.g GoDaddy) and would like to point this to your blog hosted at free blogger.com




However, here is the Problem
Blogger.com: www.domain.com works but not domain.com!

In Blogger, you have setup your custom domain in Settings > Publishing > Advanced Settings. You have included your domain name as http://www.yourdomain.com and setup your DNS record for your domain. It works great when visitors try to access "www.youdomain.com".

The issue starts when your visitor types in "yourdomain.com" without the www prefix. It does not show your blog!

And here is the solution
You purchased your own domain from GoDaddy, so you just need to follow these super simple steps. 

1. Sign in GoDaddy, go to my domains, and click on your domain name

2.  On domain information section, locate the forwarding section, then click on Manage
3. A Forwarding and Masking window appears. Type your full website/blog address in the field. Select Forward Only, and Redirect type :"I am permanently forwarding my domain. (recommended)". Then, click OK.
4. Wait a moment for the setting taking in effect (about 15 minutes). After that, you will see this change in the Forwarding section
5. Done! From now, your (non-www) domain.com  will redirect to your www.domain.com
6. To test my trick, just click on this link mobimas.info and see what will happen.

Do you agree that it is boring to keep you blog icon unchanging for such a long time? Is your blog unique comparing to millions of other blogs. Recently, I have changed my blog icon. Is it different from other blogs. Yes, it is. Today I will show you how to make your blog different from others by creating and changing your blog icon (favicon). You can do this by following these simple steps:


1. Create your blog icon
There are many ways to create an icon for your blog both online and offline. For convenience, I use an online banner creator service called bannersnack to create my blog icon. The banner size should be 20x20. However, it is very hard for you to work on such a small size. I recommend you to create an icon size of 200x200. After publishing your icon, you should take a snap of your icon, trim unnecessary parts, then resize it to 20x20.
2. Upload your icon. 
You can upload your icon to any image hosting services such as imageshack, photobucket. However, I recommend you to host it right on blogger like this icon.. Just follow this simple steps:
  • Create "a new post"
  • Select "insert image" to upload the icon
  • Finally, copy the image url
3. Add code to your blog html template
  • Dashboard>Design>Edit HTML
  • Search for this tag
  • Put this code right above the tag
   
   
   
   
  • Remember to replace the phrase url of your icon
  • Done!
Note:  You can change your blog Favicon by click on edit, then upload your blog icon, like this:
Favicon is only used to distinguish your blogs. It does not change your blog icon.

Thanks for visiting our blog. Please leave your comment and share with us

Do you want to increase your blog pageviews from your unique visitors by showing them the related posts ( related articles) in the same category or label? Today I will show you the way to show related posts in your blogger that really on my blogger. I have tried several ways to show the related posts on my blog, however, it did not work as I expected. Out of them, this method is really WORK on my blog, so I decide to share it to you. Let's start.

How to host a website online

Web Hosting is the Internet service that allocates space for individuals, companies, and organizations to put up their own website and make it available to the readers via the Internet.. Web hosting companies provide their clients with space on a server. A website owner rents space to make their presence known on the Internet. Web hosting companies also offer web hosting packages. Depending on the type of packages, prices for web hosting services range from free to a couple of hundred dollars a year. So, do you want to learn how to host a website? It's a very simple process. If you are not unsure what you will do, just find a tutorial website, they will teach all stuffs that you need to host your own website.

Free SEO backlink tools

If you are a blog/website owner, then you need to know how important SEO is for your blog/website. There are many ways to SEO for your blog/website by either free method or paid method. There is a fast and free way that I really want to introduce to you is to use free SEO backlink tools. By using a SEO tool you can build a thousand of backlinks for your website without much effort and time.

Many people add signature texts to the end of their e-mails. Signatures may include:

* Job title and company
* BRIEF advertisement
* Humorous or inspirational quote

If you'd like to add a signature to the end of all messages sent via Gmail, do the following:

(Note the following instructions were current as of February 21, 2006 - Gmail's interface is subject to change.)

1. Sign onto Gmail.

2. Click "Settings" on the top-right of the Gmail webpage.

3. When the "Mail Settings" page appears, click "General".

4. Next to "Signature", click the radio button underneath "No Signature" to use a signature.

5. Now, in the text box next to the radio button you clicked, enter your desired signature text. It's best to keep it between 1-7 lines, 3-5 preferred.

6. Click "Save Changes" to save your settings.

To make sure everything looks correct, test your signature by composing an e-mail message to yourself. You should see your signature in the e-mail composition box.

Print E-Mail Messages

Need to print a message in one of your Gmail folders or inbox? Instead of clicking "File" - "Print" from your web browser, you may have missed a "Print" link - it's near the top-right of the page, to the right of the subject text. Click it to get a pre-formatted e-mail page that removes most of the clutter, making for cleaner printouts.

SUMMARY: Glance at your web browser's Tab Bar to see how many new messages are in your Gmail Inbox.
Do you keep a web browser tab or window open all the time waiting for an important message in your Gmail Inbox?

One way to more easily see at-a-glance whether or not new mail has arrived inside your Inbox is to place the number of new messages directly in the browser / tab icon - see the below screenshot for an example:


While browsing another website in one tab, you can see that two new messages have appeared in a Gmail account via its icon in another tab


To add this ability, access the Gmail Labs feature by doing the following:

1. Click the gears icon at the top right of the Gmail window, selecting "Labs".

If this option is not available, click "Mail settings", and then when the "Settings" page appears, click the "Labs" link.

2. When the Gmail Labs page appears, scroll down to the section "Unread message icon" and click the "Enable" radio button.



Enabling the Unread message icon feature in Gmail

3. Click the "Save Changes" button.

Note that this only counts mail marked as new in your Inbox. New mail that has been filtered away from your Inbox via archiving will not be counted.

Have you ever booted up your PC only to get a black screen? When this happens, something’s clearly wrong, so you’ve probably tried a number of steps to get your PC running again. But what should you do if those solutions don’t help? Try using Microsoft’s System Sweeper to get rid of the malware that’s messed with your system’s boot files.
Microsoft's System Sweeper
System Sweeper is a boot-up recovery tool that performs an offline scan on an infected PC to identify and remove rootkits and other advanced malware—without booting into Windows. You can also use System Sweeper if you cannot install or start your antivirus solution, or if the installed solution can’t detect or remove malware on your machine. Based on Microsoft Security Essentials, System Sweeper should get PCs back on track; however, it’s important to remember that System Sweeper is not a replacement for an antivirus solution that provides ongoing protection.
Let’s take a look at how to run System Sweeper when you cannot start your PC and quickly get rid of malware.
Step 1: Download System Sweeper. Go to Microsoft Connect to obtain the beta version of the program. Make sure to choose the right version (32-bit or 64-bit) depending on what your infected system is running. The supported web browsers are Internet Explorer 6 or higher, or Mozilla Firefox 2 or higher.
Step 2: Create a bootable recovery CD or USB thumb drive. System Sweeper can be installed on both a CD and on USB flash memory. You should first get a blank CD or a reformatted USB thumb drive with at least 250 MB of space. Then, go to your Downloads folders, and run the “mssstool32” or “mssstool64” files depending on which architecture you have. System Sweeper will download the latest antivirus signature files onto the disk, and then burn them onto either the bootable CD or USB thumb drive.
You should then insert the CD or plug the USB key into the computer you’re trying to clean up, and make sure to boot from the CD/DVD drive or the USB port. To do that, go to the BIOS of the machine by pressing DELETE, F2, F12 or another special key repeatedly right when the PC is turned on. Then, go to its boot section, make sure that the “Boot Priority” is set to either CDROM (DVD) or USB, and restart the PC.
Step 3: Use System Sweeper. Your PC should ask you to “Press any key to boot from CD or DVD”—follow this advice and wait until the recovery environment is loaded. Once System Sweeper appears on the screen, hit “Start full scan” to scan all of the hard disks for viruses and malware.
Once you’ve completed these steps, you can let System Sweeper run its course, but keep in mind that it might take a while depending on the amount of data. It will be worth the wait to enjoy a clean and bootable PC again.

If you open up your web browser and type the following in the address bar;

AND, after the “equals sign” type the web address of any site, that site will be checked against Google’s updated lists of suspected phishing and malware pages. It is a handy and quick way to help verify your suspicions of a potentially bad site.
This is all part of Google’s Safe Browsing Service.  The goal of this service is to:
  • Warn users before clicking on links that appear in your site when they lead to malware-infected pages.
  • Prevent users from posting links to known phishing pages from your site.
  • Check a list of pages againest Google’s lists of suspected phishing and malware pages.
For example if you wanted to get a report on For our pc, you would type the following in your browser’s address bar and hit enter.
You will then get the following diagnostic report from Google:

Safe Browsing

Diagnostic page for whatsonmypc.wordpress.com
What is the current listing status for 4ourpc.blogspot.com?
This site is not currently listed as suspicious.
What happened when Google visited this site?
Of the 3 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2011-09-09, and suspicious content was never found on this site within the past 90 days.This site was hosted on 3 network(s) including AS13768 (PEER1), AS16805 (LAYER3), AS22576 (LAYER3).
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, 4ourpc.blogspot.com did not appear to function as an intermediary for the infection of any sites.
Has this site hosted malware?
No, this site has not hosted malicious software over the past 90 days.

I have to question the safety of my file data when I save that data to an online file service. I know that these online services tell us that they would never do anything to compromise our data and that our data is safe in their hands. If you are like me, when it comes to any sensitive files that I store online, I will take a few moments to encrypt those sensitive files to practically eliminate any possibility of those files from ever being compromised.  This gives me some sense of satisfaction that my files are safe; plus, I am taking advantage of backing up those files off site (away from my main computer).
The encryption utility that I use, that can be installed on your PC or used as a portable application is called EncryptOnClick.
EncryptOnClick
EncryptOnClick is like hiring your own highly experienced data security guard who ensures the files you want to keep safe and out of view from others, stay that way.
I think what sells me on this application is its’ simplicity, that it uses a very secure encryption and decryption method (256-bit AES encryption), that it can encrypt multiple files in a batch, that it has file compression built in to reduce the file size during the encryption, that I can carry it around on my flash drive and that it is FREE!

An Online Lightning Fast Virus Scanner


To add another tool to your arsenal in the fight against malware, be sure to visit BitDefender’s QuickScan.
BitDefender’s QuickScan
BitDefender’s QuickScan is an online tool which uses a technology they call .in-the-cloud. scanning technology which is capable of detecting active malware in less than a minute.
BitDefender’s QuickScan
The benefit of this technology is that the scanner uses online scanning engines that only uses a fraction of system resources needed to perform the scan; PLUS,the entire database of signature updates, etc… is maintained online by BitDefender.
One thing I do want to point out here and this is important:
BitDefender’s QuickScan is a tool that is designed to “detect” malware that is already existent on your PC, which is already active in memory or present in files that are run at system startup. In other words this tool is used, as a second opinion, to determine if your system is infected or you have suspicion that your system is infected.  It is not designed to provide real-time protection; but, again it is another tool to add to that arsenal in the fight against malware.  Thank you BitDefender for helping keep us safe…

The Windows XP DOS command RMDIR removes a directory from your system and has the following syntax:

RMDIR directory_name

For example, to remove directory C:\BLAH, enter:

RMDIR C:\BLAH

Note that you cannot be inside the directory that you are deleting; else you will be prompted with the message "The process cannot access the file because it is being used by another process".

Normally the RMDIR command will not remove a directory if it is empty. However, if you add the /S parameter, all files and directories underneath the specified directory will be removed. USE WITH CAUTION! You will be prompted with an "Are you sure" question that lets you back out in case you entered the wrong directory name.

If you need to perform this task in a batch file, you can add the /Q parameter to the end. This will delete the specified directory, all files, and all subdirectories, WITHOUT ANY WARNING.

For example, the following command will remove directory C:\blah and all subdirectories and files contained therein. No prompt will be displayed.

RMDIR c:\blah /s /q

If you wish you can use RD as an abbreviation for RMDIR.

To pause a DOS batch file in Windows XP from continuing to the next command, you can use the PAUSE command. Doing so prompts the user with the text:

Press any key to continue . . .

Then the batch file waits for the user to press a key. However, what if you want to pause a batch file and not display anything? Just pipe the results to nul like so:

pause > nul

Since this may not be very useful (how will the user know they need to press a key to continue the batch file?) you should display a different prompt. Issue an ECHO command with your desired prompt, then issue the above pause > nul command.

For example, to pause a Windows XP batch file with the prompt "Press ENTER to execute the command", use the following commands:

echo Press ENTER to execute the commandpause > nul

By default, Windows hides files that it deems are system critical. In theory, hiding files keeps them from accidently being modified or deleted through Explorer or by virus.

However, there may be times when you need to display lists of such files, such as for system troubleshooting purposes. To do so, from the DOS prompt, type in one of the following commands:

* Display system files: DIR /AS

* Display hidden files: DIR /AH

* Display files with the system and hidden attributes set: DIR /ASH

Clean Your Computer

It is recommended to clean your input and output devices from time to time. Why?

Dirt on a scanner's scanning area can affect the scanned images' quality.

Toner, liquid, or dust can affect the quality of printed images.

Dirt can affect or destroy a keyboard.

Dirt can cause a mouse to behave erratically.

Dirt can propagate on a monitor, making it hard to see your work.

Check your equipment manuals for specifics on how to clean your equipment. All we are saying here is that it should be done for optimal computing quality

Keystrokes and Message Boxes

Here is another of those tips which I originally thought "everyone knows it, why bother?" After doing analysis and consulting work on various systems, however, I realized I had thought wrong.

Save yourself some mouse movement: When a message box appears on the screen asking you to click on an "OK" button to continue, most of the time you can press the "ENTER" key to substitute for clicking the "OK" button. Or, pressing the ESCAPE key usually works as a substitute for a "CANCEL" button.

Drive Defragmenters

It is generally known that in order to optimize your hard drive's speed and its life, you need to defragment the drives often. This places file contents closer to each other on the HD instead of spreading out information. Drive defragmenters are not all the same, however, and the numbers they provide can be dramatically different.

For a test case, I used a Win95 system and checked two drive partitions - a 1.63 gb partition and a 1.17 gb partitions. I tested Microsoft's OSR1 Win95 Defragmenter and Norton Utilities' V2.0 Win95 Defragmenter, SpeedDisk.

1.63 gb partition
Microsoft reported 1% fragmentation
Norton reported 3% fragmentation

A 2% difference. Which one do you believe?

1.17 gb partition
Norton reported a 7% fragmentation
Microsoft reported a 0% fragmentation

Again, which is the correct number? With differences like these, there is no way to tell. However, because of the differences and possible high fragmentation percentage, I would recommend defragging the drives in these scenarios.

 When you go out to purchase a laptop or desktop, models specify that they have a certain amount of megabytes of memory (RAM). The video card may have onboard RAM as well, the computer might support a certain amount of *shared* video memory, or the graphics card may use a combination of onboard RAM and shared video memory.

This means that when the video card is in use (all the time!), especially in higher display modes, it will take some of the memory normally dedicated to other computing activities and use it for its own tasks. Thus the computer 'shares' its memory with the graphics card.

For example, if you buy a laptop or desktop with 512 megs of memory and 64 megs of shared video memory and you frequently use a high display pixel depth, a 32-bit color palette, or if you play graphics-intensive games, you may actually only have 448 megs (512-64) of physical memory left for your computer.

While this may be fine for some people, if you have more money, you may want to go with a computer that has video memory dedicated to the video card, saving your physical memory for other uses.

Video Cards and Memory

Just because an ad for a video card claims it can handle a certain resolution and color depth doesn't mean the card you buy will handle such color / resolution combinations. Many video cards come in different models with varying amounts of ram installed (video card ram, not computer ram). The more ram on a card, the higher resolution and color depth the card can potentially support (up to the limits of the card hardware). Thus, read the specs carefully before purchasing.

Want to make your laptop computer more powerful and have it use less electricity? Impossible, you say? Perhaps not.

Remember that when you use a modern operating system and run out of memory for your software, the operating system swaps out part of the memory to the hard disk to free up the memory for more tasks. If you run several programs at once or have little RAM, this swapping can occur constantly, slowing the computer down.

Now, note that the laptop's hard drive is a power drain on your battery. The more you must use the hard drive, the more the laptop uses the battery.

Naturally, it would seem that if you increase the RAM on your laptop, you would reduce the amount of memory swapping. This will increase your computer's performance, and since your hard drive will be accessed less, could improve your battery life.

1. Slower boot due to installed software

If you install software, device drivers, or other applications that request to be loaded upon a computer's boot, naturally your computer will start up slower. Security software such as firewalls and antivirus applications must start up immediately to help increase your security. Some software partially loads at boot so when you launch applications they seem to start faster. Plus, device drivers and helper software for printers, multimedia devices, and other peripherals may require being loaded at boot to make using such devices in a plug-and-play environment as seamless as possible. All of this increases your overall boot time.

2. Slower overall experience due to installed software

Just as loading these applications slow your computer's boot time, they also may require additional CPU cycles, causing your main applications such as web browsers or word processors to run slower. Plus, more tasks require additional RAM, requiring your computer to use your hard drive as virtual memory. Paging information to and from your hard drive increases the disk thrashing, slowing down your computer further.

You can help offset this somewhat by installing additional RAM if supported by your computer.

3. Uninstall software doesn't always work well

While most applications support an uninstall procedure, these don't always work perfectly. Uninstallers may leave temporary files, items in the Windows Registry, startup tasks to now non-existing files, device drivers that now are not needed, etc. Install and uninstall many applications and the leftover garbage can drastically slow your computer's overall speed.

4. Hard drive fragmentation

As you write and delete files on your hard drive, the locations of files become scattered throughout, and files themselves can become fragmented. This causes longer times to seek for and load individual files, slowing down your computing experience.

This is more of a problem on Windows computers, and while it comes with defragmentation software, it may not automatically run by default and need to be executed manually. Plus, it is debatable how well it actually works. Third-party software claim to do a much better job in defragmentation, potentially increasing your computer's performance.

5. Updates require more power

Updates to your device drivers, software, and operating system just may require more computing power than older versions. This can be due to sloppy programming or the addition of newer features. Plus, as security holes are fixed and workarounds created, such software may require more CPU cycles, RAM, and overall storage space on your hard drive.

Security is one reason why an older version of Windows may run much faster than a newer version. While the older version may seem to work fine, its lack of protection features can expose your computer to all types of security risks.

6. Possible hardware problems

In some circumstances, failing hardware may be to blame. Bad sectors can form on hard drives, and if the drive repeatedly tries to access a file on a failing sector or has to block off certain sectors as unusable due to minor failures, this can increase file access time. Other problems such as software that never used to crash but now aborts continuously can be linked to malfunctioning RAM. Diagnostic programs found on the Internet can help confirm either of these problems if they are suspect.

7. The dreaded malware

Of course, viruses, spyware, and other malware may be to blame. These create additional processes that put more strain on a computer and can increase its overall boot time. Other users may be lurking around your PC via an open port, causing all sorts of nastiness. Malware may be running in the background using your computer to relay e-mail messages, attempt to shut down websites via denial of service (DoS) attacks, and more. Thus, while security software may decrease your computer's overall speed slightly, not having such software (and keeping it updated) can cause an even worse situation.

As you can see, perhaps the debated conspiracy theory of hardware and software makers teaming up to slow computers down as they get older may not be accurate. Installing and updating software can increase your boot time and decrease speed of other applications. Faulty uninstallers leave junk behind that can slow your computing experience. Hard drive fragmentation causes increased file seek and read time. Hardware failures may be to blame for other problems. And of course, there's always the possibility of a malware infection slowing the machine. By understanding the true reasons computers may slow down with age you can take steps to offset these problems.

Pingdom

If your page loads seem slow and you are looking for a way to analyze and ultimately optimize the performance of your website then take a look at the online application called Pingdom Tools. One of the tools that is available is called Full Page Test that will give you a full scale analysis of where your site stands.
Pingdom Tools
Feature Overview:
Examine all parts of a web page – View file sizes, load times, and other details about every single element of a web page (HTML, JavaScript and CSS files, images, etc.). You can sort and filter this list in different ways to identify performance bottlenecks.
Performance overview – We automatically put together plenty of performance-related statistics for you based on the test result.
Performance grade and tips – See how your website conforms to performance best practices from Google Page Speed (similar to Yahoo’s Yslow). You can get some great tips on how to speed up your website this way.
Trace your performance history – We save each test for you so you can review it later and also see how things change over time (with pretty charts!).
Test from multiple locations – See how fast a website loads in Europe, the United States, etc.
Share your results – We’ve made it easy for you to perform a test and share it with your friends, work colleagues or web host.

DesktopSnowOK

Add A Touch of Snow to Your Computer’s Desktop

 With winter at our doorstep snow will be on the way (which it already has in my region) you need to prepare yourself and get into the mood.  To help you along with this, I found a very small software application called DesktopSnowOK .
DesktopSnowOk
Simply download, unzip, run, adjust for how much snow you want falling and your desktop will become a winter wonderland.
DesktopSnowOK is a lightweight portable Windows program for 5 or more snow flakes on your windows desktop.
Installation!
“DesktopSnowOK” does not have to be installed and can be executed easily from the desktop, and can be carried on a small usb-stick or other memory device. It’s a small fun program for all Windows-NT systems.
Features:

  • Very Small
  • Low CPU usage
  • 5-64 snow flakes
  • Adjustable speed
  • Several flakes textures (bitmaps)
  • Optional transparency
  • Optional deactivation by mouse movement or keyboard input
  • Optional translation feature
  • Portable

PC On/Off Time

FREE Time Tracking Tool Shows Times Your PC Has Been Active (for the past 3 weeks)

An easy way to tap into this information is to use the small portable application called PC On/Off Time. No installation is required and no running in the background is required.  Simply download and run.
PC On/Off Time graphically displays the usage time for your computer for the last 3 weeks without having to start any logging (uses Win 7/Vista/XP/2000/2008 built-in feature). It displays the hours of operation, in a simple overview, so you can see at what times the computer was on or off. You can also connect to a network PC and create the report.
PC On/Off
What this graphic display will tell you is this:
image
A grey fade-out indicates that the computer switches into standby mode. (Windows 7/Vista or higher)
image
A red bar indicates that the computer was shut down unexpectedly (Windows event ID: 6008) with a following reboot.
In answer to the second part of the question; “What could you use this information for?
PC On/Off  Time could be used as a troubleshooting tool.  For example, I recently experienced an issue where my PC would abruptly shut down. This tool would have been helpful to determine the number of times this occurred and the date/time.
PC On/Off Time could be used to monitor the usage time that your children are on the the computer.
PC On/Off Time could be used to monitor computers on a network you are managing.  For example, you may have a rogue user who is showing up at work after hours to use a PC for personal gain.
PC On/Off Time could be used a a timesheet tool to document time spent on a special project.
PC On/Off Time could be used as a forensics tool to generate a graphical report, as supporting documentation in a criminal case.
Can you think of any other uses for this tool?  I would love to hear your comments.

When conducting projector based training presentations there are several ways to point out an object on the screen.  Some presenters will use a laser pointer; whereas others will simply use the mouse pointer or a pointer function that is built into the software (such as Powerpoint).
In the days prior to computers it was not uncommon for a presenter to use an actual stick, called a pointer stick, to point out the specifics. If you are still stuck in the old days of the pointer stick, it is now time for you to advance to the virtual pointer stick.  Yes, virtual in the sense that you can call it up on the screen when you need it or make it disappear. It is a portable app called PointerStick and it actually looks like a pointer stick.  It will definitely make your class taken notice.
PointerStick is a portable tool that presents on the Windows Desktop a virtual pointer stick, for example for Presentations to highlight the current mouse position and the emphasis on presenting will be better. The use of the virtual pointer stick is ideal for projectors (Beamer) and larger LED/LCD screens.
Features:
Very Small Program
Low CPU usage
Adjustable size of Pointer Stick
Several Pointing-Stick textures (bitmaps)
Optional alpha transparency
Optional deactivation by mouse or keyboard input
Optional translation feature
Portable

Newer Posts Older Posts Home

Blogger Template by pc4us