Search This Site

28.10.11

Disable auto-start applications on windows startup

Using this tip, you can minimize the startup time of windows XP and Vista also. You can disable some optional windows applications like windows messenger, Yahoo messenger, QuickTime and many others auto startup programs that run automatically when you start your computer.

Follow the given steps to disable the windows auto run applications:

To use this feature, you will need to be logged into your computer with administrative rights.

Click Start button and type msconfig in Run option then press Enter for next.

A small System Configuration Utility dialog box will appear with many options like General, System.ini Win.ini, Boot.ini, Services, Startup and Tools.



Now select Startup tab and uncheck the applications that you want to disable from windows startup.

Now click on Apply button to implement the changes then click on Ok button to end the configuration process.

Again close the all program and restart your computer after any changes to go into effect.

How to select text Vertically in Word 2007?


Almost everybody who writes their documents in Microsoft Word knows how to select the text horizontally. You have to select the text horizontally in order to delete, underline, italicize etc.  But many times you face a situation in which you have to select the text vertically. For example you might have to delete the first few words in every line in a list in order to delete it. You need to do that as you reformat a Word document. Many people think that it is not possible to select text vertically in Word 2007 document. It is very easy to select text vertically in Word 2007. You just need to do this trick in order to make the vertical selection:


Point the mouse to the beginning of the text you want to select.


Hold down the Alt key.


Drag the mouse pointer downwards around the required area while still holding down the Alt key.


The text will be selected vertically.


How to set auto shutdown for your computer?


A cool tip to manage your computer shutdown process automatically. You can set your computer to shutting down at any convenient time (daily, weekly and when my computer starts) when you are not there.

A simple shutdown command set your computer to close all running applications and shutdown properly after predefined time. This tip is very useful to save energy and time. After the execution of command, a small window will appear to count time of system shutdown. You can cancel this auto shutdown process using same command.

Security Techniques against viruses.

Virus detection and its removal are mode through an antivirus or with some other security program. Different antivirus programs are available in the market and over Internet. The most common and famous security technique against viruses is as under:

Virus Signature/ Virus Definition

Virus signature is a known pattern of code of a code of a virus program; this pattern is used by antivirus program to detect viruses and then to remove these viruses. You should update virus definition continuously by downloading updates from Internet. This ensures that your antivirus is always able to detect changing viruses. 

Inoculation

Inoculation file is separate file created and maintained by antivirus program to record information like file size and file creation date. This information later on is used for virus detection and removal.
Quarantine

Quarantine is a separate area on a hard disk. It contains the infected files and folders that cannot be cleared or deleted by antivirus due to some reason, for example sharing violation or unknown virus for that antivirus.

Recovery Disk

Recovery disk is a removable disk that holds un-infected system commands and startup information. In case the boot record of actual hard disk fails, this recovery disk can be used to start the computer. Afterwards an antivirus program can be used to remove the virus.

Un-authorized access

Accessing a computer system without the knowledge or permission of its user is called unauthorized access. It is always recommended to restrict computer resources with the help of usernames and passwords. These are unique combination of characters to identify users and their secret codes respectively.

Firewall

Firewall is a security system consisting of hardware and software to prevent unauthorized access of a network or computer. Big companies use a separate computer firewall software or hardware to protect their date from unauthorized access. Firewall check outgoing and incoming traffic and manage data access to the authorized users only.

Biometric Devices

A biometric device reads personal characteristics like fingerprints hand structure, facial features, and voice recognition to authenticate a user for any further access to a computer system or other peripheral devices. A biometric device translates the personal characteristics into digital code that is matched to already store user data in that system. If the digital data matches with any of the stored data, it gives access to the person. In case of no match, the access is denied.
Related Posts Plugin for WordPress, Blogger...