Sunday, June 28, 2009

Windows 7: Microsoft promises that its next OS will be tailored to netBook

Microsoft has not seen the phenomenon of coming netBook, these mini laptops that have emerged on the market for several months and for prices ranging between 250 and 400 euros. Later operating system, manufacturers have started to equip their systems Linux netBook, perfectly sized for small configurations (in Intel Atom and a limited amount of RAM). To track the movement and do not miss the boat, well Microsoft has a solution to manufacturers of netBook, as an alternative to Windows Vista, too greedy in resources. The editor had to cut out the good old Windows XP, whose lifespan was extended to serve this lucrative market. A solution can only be temporary.

At PDC 2008 (Professional Developers Conference), Microsoft has unveiled part of its next operating system Windows 7. During the presentation of the new OS, the editor pointed out that one of the key areas of development of Windows 7 was the platform that works well on modest hardware configurations.

The next Microsoft operating system would be lighter, and its interface and its embedded software such as Internet Explorer 8 and Windows Explorer. It is also bear (native) tactile manipulation. Capacity clearly put forward to address the emerging market for PC tactile, but also for netBook. Indeed, mini laptops with touch screens are part of plans for manufacturers like Asus, beginning in 2009.

Remains to be seen whether Windows 7 will not arrive a little late on the market currently netBook exploding. It's commercial launch in 22 October 2009, is still far from certain. The "pre beta" distributed to developers at the PDC should be
followed by a true beta in early 2009. The commercial launch of a finalized version is planned at the end of the year 2009 or even 2010.

Thursday, June 25, 2009

Importance of Antiviruses Software Programs

In today modern world, Anti-virus softwares program plays an important role in ensuring the proper function of the computer. An antivirus is basically a software code that is written to protect the computer from potential viruses. A virus is basically a program code that effects the computer function and performance. A virus is a unwanted piece of code that infect the computer function without the permission of the users.

There are generally some types of virus like :--
1. Malware :-- It is malicious software, Which is mainly responsible for the improper function of the computer that leads to the infected data, decrease in performance or allow multiple unwanted spams.
2. Adware :-- As it name is suggesting, It is a software program that display the advertisements on the screen. It is usually tracks the record of the users browsing habits. It is unwanted program and run on the computer without the knowledge and permission of the user.
3. Spyware :-- It is a software that is designed by third party to gather the informations of user or an organization. It is also a unwanted program and run on the computer without the knowledge and permission of the user.

All the above different types of viruses can be managed by the different kinds of anti-viruses. There are plenty of anti-viruses available in the computer market like Mcafee, Norton, Avg, Avast, Panda, Kaspersky and many more. There are also some which have been effectively used for the malware and spyware for example "Anti-Malwarebytes" and "Super-Antispyware". These two softwares are effectively and efficiently manage the spywares and malwares but before using these softwares we need to update them periodically.

An antivirus software program basically have all updated definition of the viruses. A virus mainly attacks on the user computer by targeting the "host file" and ".exe files" of the application programs and operating system. In this case, An antivirus software program recognizes the virus definition and performed the needful action based on that result. So, In this manner an antivirus software program block the functions of the viruses and protects the computer to perform the function efficiently and effectively. We have to remember one important point that we need to update an antivirus software program on the regular basis. It helps to get the new updated definitions of the viruses, otherwise an antivirus will be unable to recognize the viruses based on their definitions.

An antivirus software programs have some key features like :--
1. Internet Security :- Antivirus provides the protection against all the Internet threats.
2. Spam Filtering :- This feature is used to filter all the spams.
3. Email Security :- This feature is used to provide the email security
4. Firewall :- This feature is used to avoid the unauthorized access to the network.
5. Virus Alert :- This feature provide the warning alerts against the viruses.

Monday, June 22, 2009

Users will have 18 months to move from XP to Windows 7

Microsoft has finally decided to allow PC manufacturers to install Windows XP, replacing Seven Pro and Ultimate editions, until April 2011. The deadline has therefore risen from 6 to 18 months. The American publisher has reneged on its first ad: Microsoft had originally planned to allow the demotion of PC Seven for a period of 6 months from the release of its new operating system on 22 October.

OEMs would have been forced to cease on 22 April 2010 to offer their customers purchasing a computer equipped with Windows 7 (Professional Edition or Ultimate) to revert to Windows XP Pro. The builders were limited to offering "downgrade" to Windows Vista, which has never really convinced. Now a user can return to Windows XP when purchasing a computer equipped with Seven occurred before 22 April 2011. However, this new deadline of 18 months could still change. Microsoft states that the deadline for downgrading to XP will also be leaving the first service pack for Windows 7.

Migration easier, but costly, with Software Assurance. As a reminder of Vista SP1 was released 14 months after the launch of the operating system. More, this time for businesses acquiring via the Windows volume license customers and Contract for Microsoft Software Assurance. These companies can freely move to a higher or lower OS, flexibility will be total.

Companies in Software Assurance are therefore in no way forced to go back to Vista (only 10% have migrated to Vista by Forrester). If they are not convinced by the XP mode and Med-V, two applications available on Windows 7 ensuring compatibility with XP applications, companies can retain their old operating system or return after the migration tests inconclusive.

However, all companies do not subscribe to the Microsoft Software Assurance. The subscription represents a surcharge to the price of the license. "The annual prize for the Software Assurance for Applications and Systems is 29% of the license. Servers for the annual Software Assurance is 25% of the license, "says Microsoft.

Thursday, June 11, 2009

Bit Defender Paypal warns against false-mails

Other pay services such as Abbey or Halifax serve as alleged sender. The log-in information will be gradually stolen. No other mesh currently used so often. Pay Pal logo Bit defender warns of fake e-mails from online payment services like Pay Pal, Abbey or Halifax. They are currently among the most commonly used in phishing attacks, says the "E-Threat Landscape Report".

The cyber criminals use Bit defender as the strategy of gradual information theft (cascade effect). First, the potential victim receives a message to him is the ultimate open-source anti virus solution on a link to download offers. Bit Defender is an anti virus software suite developed by Romanian-based software company SOFTWIN. Bit Defender range includes anti virus products for home users, businesses, enterprise users and Internet service providers. Follow this link to the recipient, he is not the promised security software, but is run by a self-extracting EXE file requested, which contains malicious code. Their purpose is to provide the contents of C: \ Windows \ System32 \ drivers \ etc should be replaced and so the behavior of the Web browser to modify.

Would like the victim in the future, an online payment service like Pay Pal, Abbey or Halifax that directs the browser the user manipulated secretly on a similar looking phishing page. It contains further malware, enabling passwords, credit card numbers, security codes, home and e-mail addresses and other sensitive data step by step ausspioniert be. The analysis of Bit defender experts revealed that the fake pages of domains mainly from China and Korea come.
"The poor economic situation has led to a completely new phenomenon of cyber crime emerge, so Vlad Valceanu, Head of Bit Defender Anti-spam Research." The latest trends show alarming aspects: Firstly, the number of phishing attacks has increased since the beginning of the year. Secondly, the complexity and aggressiveness of the attacks increased dramatically. And thirdly, the number of victims has increased drastically. "

Tuesday, June 9, 2009

File Sharing in Windows XP

In Windows XP, we can share files and documents with other users on your computer and with other users on a network. There is a new user interface (UI) named Simple File Sharing and a new Shared Documents feature. Windows xp is capable of sharing files and folders among remote and local users, if they are part of the same home or office network. Sharing of file and setting of permission on the folder are two different things, Normally NTFs file system has advance features of setting permission on the file and folder, accoring to the requirement of the administrator of that file .
Every file or folder inside the parent folder will get the default permission as their parent folder , for example vista is a folder and vista 1, vista 2 and vista 3 are the 3 files inside vista folder and permission of read is given to a user named as Ram then ram can only read Vista 1, Vista 2, Vista 3 ram cannot edit these files at all.
We can share file and folder with group and user permission in the home network by following these steps:--
1. Open the folder which you plan to share, go to Tools and click Folder Options.
2. Folder Options window will appear. Click View tab, scroll down in Advanced settings section and uncheck Use simple file sharing. Click on "OK" tab.
3. Now Right click the folder and click Sharing and Security.
4. Your folder properties window will appear. Click Share this folder and proceed to change the quantity of users that allowed to connect to this shared folder at the same time. You can also change the shared folder name. Later click Permissions
5. Folder Permissions window will appear. Here is the place where you set the users or groups that can access this shared folder over the network. In this case, I only allow Alice to access this folder with read permission. Click on "OK" tab.
6. Back to your shared folder properties, select Security tab and here you can set the permissions for allowing the users and groups to access this folder from this computer. Here I only allow Administrators, my username Benny, creator owner
and Alice (read permission only) to access this folder. Click on "OK" tab.
7. Once you have shared the folder, you will see there is a hand supporting your folder. You have successfully shared your folder. Finally you can share file by putting in this folder.

Friday, June 5, 2009

Installation Error in Windows Live OneCare

Windows Live OneCare provides online scan for the viruses, malwares, spywares Windows Live OneCare is a computer security and performance enhancement service developed by Microsoft for some of its Windows operating systems.
Symptoms: You may face the following error messages during Windows Live OneCare installation:--
1. Urgent: Connect to the internet to finish installing OneCare – OneCare needs to connect to the internet to complete the installation
2. OneCare cannot complete the installation at this time because of a problem connecting to the service.
1. Damaged Windows System Files on the computer.
2. Connectivity issues exist that are caused by third-party security software such as firewalls, proxy servers, and Internet accelerator software.
Troubleshooting Methods: You can get rid off this issue by following these steps:--
1. Uninstall any third-party firewall or Internet security programs such as Parental Control. And remove any Internet accelerator programs. Then try to complete the installation.
2. If you are running Windows Vista or Microsoft Windows XP, download and then run the FixCompleteInst.exe tool to repair the cryptographic service files. To access the FixCompleteInst.exe tool, visit the following Microsoft Web site: (
If you are in an enterprise environment, such as an office building that uses a proxy server, try to complete the installation outside this environment.
3. Reset Microsoft Internet Explorer as the default browser by the following steps:--
* Open Control Panel.
* Double-click Internet Options.
* On the Programs tab, under Default web browser, click Make Default.
* Select the Tell me if Internet Explorer is not the default web browser check box.
4. Remove Proxy Settings in Internet Options. To do this, follow the steps that are appropriate for the operating system that you are using.
5. Verify that the system date and time are set correctly.
6. Repair the installation of the Microsoft .NET Framework 2.0 by the following steps:--
* Open Control Panel.
* Double-click Add or Remove Programs.
* Look in the list for Microsoft .NET Framework 2.0, and then highlight the entry.
* Click Change/Remove, and then follow the prompts to repair the installation.

Wednesday, June 3, 2009

Repair of Windows

Many users are using the windows operating system to run the computer. So, It is very necessary to aware about all troubleshooting steps regarding the "Windows Repair and Help". Microsoft provide a technical web portal by the name of "Microsoft Help and Support". This technical web portal is available online on the website "". It helps to handle different issues over the Microsoft products. Microsoft provide some alternative methods to handle the Windows repair issues.

Windows Repair process includes the following methods :--
1. Windows Repair using the Recovery Console :-- This method is used to recover operation system when your computer does not start correctly or does not start at all, Then we need to install and use the Windows Recovery Console. However, Microsoft recommends this method of system recovery for advanced users only. Recover Console should be use in the Safe Mode and must be logged in with the administrator account. We can install the Recovery Console by the following steps :--
i). Insert the Windows XP CD into the CD-ROM drive.
ii). Click Start, and then click Run.
iii). In the Open box, type d:\i386\winnt32.exe /cmdcons where d is the drive letter for the CD-ROM drive. In the case of 'Microsoft Windows XP Professional x64 Edition, type d:\amd64\winnt32.exe /cmdcons where d is the drive letter for the CD-ROM drive.
iv). A Windows Setup Dialog Box appears. The Windows Setup Dialog Box describes the Recovery Console option. To confirm the installation, click Yes.
v). Restart the computer. The next time that you start your computer, "Microsoft Windows Recovery Console" appears on the startup menu.

Now, We will discuss that how to use the Recovery Console from the Windows XP startup disks or the Windows XP CD-ROM, follow these steps :--
i). Insert the Windows XP startup disk into the floppy disk drive, or insert the Windows XP CD-ROM into the CD-ROM drive, and then restart the computer. Click to select any options that are required to start the computer from the CD-ROM drive if you are prompted.
ii). When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
iii). If you have a dual-boot or multiple-boot computer, select the installation that you must access from the Recovery Console.
iv). When you are prompted, type the Administrator password. If the administrator password is blank, just press ENTER.
v). At the command prompt, type the appropriate commands to diagnose and repair your Windows XP installation and for a list of commands that are available in Recovery Console, type recovery console commands or help at the command prompt, and then press ENTER.
vi). To exit the Recovery Console and restart the computer, type exit at the command prompt, and then press ENTER.We can also follow the Microsoft KB article on "" for the more details on Recovery Console.

2. Last Known Good Configuration :--It is a Windows XP feature. Last Known Good Configuration is used for the recovery option. We can rollback the computer settings to the previous state in which computer was working properly. Whenever we start computer by using the Last Known Good Configuration feature, Windows XP restores information in the following registry key:HKEY_LOCAL_MACHINE\System\CurrentControlSetWe can perform the Last Know Good Configuration by the following steps :--
i). Start the computer.
ii). When you see the "Please select the operating system to start" message, press the F8 key.
iii). When the Windows Advanced Options menu appears, use the ARROW keys to select Last Known Good Configuration (your most recent settings that worked), and then press ENTER.
iv). If you are running other operating systems on your computer, use the ARROW keys to select Microsoft Windows XP, and then press ENTER.