Saturday, 9 January 2010

How to Filter the internet



Save our children from Adult Site !



Barracuda hardware based web and spam filters are expensive, they are definitely better but do you need such a powerful hardware? If you own a small to medium business, buying one of these hardware web filters can cost you a bomb, why waste money when OpenDNS allows you to filter out unwanted contents for free? If you’re a parent, do note that web filtering software can be cracked or patched by your kids to bypass them, however, a hardware based web filter is almost unbreakable and better, unless they reset the router.

How do set up your own ‘free’ hardware based p2p traffic and content filtering software? You’ll need a router and an OpenDNS account.
  • Step 1 – Sign up for the free OpenDNS account (Remember to verify your account, check your email)
  • Step 2 – Login to OpenDNS, go to the ‘Settings’ tab and click on the ‘Add this network’ button
  • Step 3 – When you’re done, click on the IP Link (Blue colour, underlined)



  • Step 4 – A new page will be loaded, select ‘Custom’ and choose the categories you want to block.
  • Step 5 – When you’re done, click ‘Apply’, you can add individual domains (max 25 for free accounts)



  • Step 6 – Open the preferences for your router, find the DNS server settings, put in the OpenDNS server addresses as your DNS server settings and save/apply. Please write down your current settings before entering the OpenDNS addresses, just in case.

          208.67.222.222
          208.67.220.220

  • Step 7 – Restart your computer and router



And the results:
    


There you go, why pay for an expensive hardware when OpenDNS has the ability to transform your cheap router into a powerful web filtering content system. OpenDNS has more on how to change your DNS settings for various router such as Huawei, Apple, D-Link, NetGear, 3 Com, Belkin and more.

Cheap and unlimited calls From Mobille Phone to Landline phone services

How to make international calls from landline to mobil? Which is the cheapest landline to mobile calls service? Which software allows call forwarding from landline to cell phone?

Jaxtr has a new feature, it is known as ‘Jaxtr On-The-Go‘, basically it allows you to make super cheap calls to your friends in over 50 countries at an affordable rate never seen before. To illustrate how this new feature of theirs work:

Traditional
You (your local number) — calls –> Friend (his/her local number)

Jaxtr
Friend (his/her local number) — calls –> You (Jaxtr local number)


Unlimited Free Landline Calls From Mobile
Get a local jaxtr number to reach your friend.
Dial that number on your phone and choose “FreeConnect” from the options.
Stay on the phone and wait for your friend to call in. Jaxtr texts your friend an SMS notifaction with a local number to call in and get connected to you while you wait.

If you are in a supported country, you can place any calls by either dialing a jaxtr number obtained online, or by using the click-to-call feature available to members only. If you are not in a supported country, the click-to-call feature will provide you with the most cost savings. You can even make international calls from landline to mobile with jaxtr or cheap cell phone to landline calls.

If calling a supported country, jaxtr will notify your friend with a local number to call in and get connected for free. If you like, bypass the call forwarding from landline to cell phone notification and get connected immediately at our cheapest landline to mobile calls. Please note that your phone company regular calling rates still apply when you dial a jaxtr number.

How to Disable Autorun of USB Drives and CD-Rom

How to disable the autorun feature in Windows? For your information, it is advisable to disable or remove the autorun autoplay feature for security reasons, this is because virus tend to spread by copying itself to your USB thumbdrive using the autorun feature.



Start Menu –> Run and type in ‘gpedit.msc’


Double click the ‘Turn off Autoplay’

A window will appear, under the ‘Turn off Autoplay Properties’, select ‘enabled’, under the drop down menu list choose ‘All drive’ and then click the ‘Apply’ button. Now you should be safe from the autoplay monster.

more click here

How to Remove Hidden tumb.db files

What are Windows Thumb.db files? How do find and delete Thumb.db files? Windows automatically creates a file known as Thumb.db for folders containing picture or images. Thumb.db file caches thumbnails of all the images in the folder, this allows Windows to display the images quicker whenever the folder is opened.

The Thumb.db is a hidden file only viewable when the ‘Show Hidden Files option is turned on in the Folder Option settings. To prevent the Thumbs.db file from being created, follow these instructions:
Open a folder, any folder in your Windows.
Go to Tools then select “Folder Options” as shown in the image below. 
(Step 1)
Select the View tab.
(Step 2)
Check the “Do not cache thumbnails option as shown in the image below 
(Step 3)
Click OK to apply the changes

let's Try...

Friday, 8 January 2010

Remote Access Support Guides

Using Remote Desktop with No-IP
OverviewThe use of Microsoft's Remote Desktop Connection to access another computer over the internet has been growing in popularity. One major obstacle to overcome is that most locations that you want to connect to will only have a Dynamic IP address instead of a Static IP address. With No-IP.com's services this problem can be overcome.Typically, when you want to access your remote computer over the internet, you enter the IP address of that computer into the remote access software. With a Dynamic IP address, the IP will be constantly changing and getting into your remote computer from off site will be impossible. No-IP.com can assign a fully qualified domain name to your Dynamic IP address so you will not have to worry about remembering the numeric address each time. With our software client running somewhere on the same network as the remote computer, anytime your IP address changes we will know about it and be able to direct you to that remote machine regardless of what IP address it's currently assigned.
ExampleLets say you signed up and configured your No-IP account to use one of our free domains. Next, install our No-IP.com DUC (Dynamic Update Client) client on any machine at the location you will want to access. You then give the DUC software your No-IP login information so it will list your available host names and then select the one you want to use for that machine. Now, whenever you want to access this remote computer over the internet, you just type in that host name, i.e., "myhome.myvnc.com" into your remote access client and you'll be connected to your remote machine.In the event you have more than one location that you need to access, you can just create another host name on our site and install the client at that location as well. On a side note, if you will be using our service to connect to more than one location, we highly recommend you implement the Sub-Account feature that is included with the Enhanced service and No-IP Plus Managed DNS service. You can read about it here
Step 1: Create an account
To create an account with No-IP.com simply click the "Sign-up Free!" link at the top of the page, or click here. Fill in the required fields on the new account form and click the "Sign Up Now!" button on the top of the page.
Step 2: Confirm your account
Once you have entered your account information into the new user form, and have submitted it, you will receive an email to the address you provided. You will need to check that account and look for the email from No-IP.com. Inside the email you will see a link to confirm your account, click this link. (Yahoo and Hotmail customers click here)
Step 3: Login to your account
Now that you have confirmed your account, you can login to No-IP.com. On the top of the page just below the No-IP logo you will see an area to enter your email address and password. Enter the information that you signed up with, and click "Login".
Step 4: Add a domain to your account
Note: If you're using our free service, you can skip to step 5 below.
You should now be logged into the No-IP.com members section. Here you can add a domain to your account by either going to "Plus Managed DNS" or to "Domain Registration" if you are buying a new domain name. Just follow the activation steps to the checkout area.
Step 5: Add a host to your domain
After checking out, you can log back into your account and add a host to your newly added domain name. Click on "Hosts/Redirects" on the left hand side and then click on "Add". Type in a host name, and select your domain from the drop down menu. Then click "Create Host" at the bottom of the page.
Step 6: Making it dynamic
Now that you have a host in your account, you will want to install the our Dynamic Update Client at the location that has the Dynamic Address. This is a free download from our downloads tab at the top of the site.
After installing the Dynamic Update Client, be sure to configure it with your Email address and password that you used to login to this site.Note: If you are using Sub-Accounts you will want to enter the sub account name with a colon then the email address for the username and the sub-account password.The client will run in the Tray on windows machines. Be sure to open it and click on the options button and check the box "Run on startup".
Step 7: Configure your computer to accept remote connections
Click Start, point to Settings, click Control Panel, and then double-click the System icon.On the Remote tab, select the Allow users to connect remotely to this computer check box, as shown in the image below.Ensure that you have the proper permissions to connect to your computer remotely, and click OK.Leave your computer running and connected to the Internet.It should now be ready to accept connections from the outside.
Step 8: Configure your router
If you can already reach your remote desktop system by IP address, then you can skip this step. Also, if your computer is directly attached to the ISP's cable/DSL modem you can skip this step because you do not have a router. If this is a new setup you will have to open some ports up on your router or firewall. You will need to open port 3389 (tcp) to allow the Remote Desktop Protocol (RDP) to operate normally. Most router vendors refer to this as "Port Forwarding" or "Virtual Services". You will want to forward port 3389 to the internal IP address of the windows machine you are trying to access. The internal IP address will be something similar to 192.168.x.x. For more information and some guidance on forwarding ports in your router, see our guide: A Primer on Opening and Forwarding Ports on your Router. To verify that your router is setup correctly, visit www.canyouseeme.org and enter in port 3389 into the port area. If the site reports a failure, check your router settings and retry. If you are running a software firewall, personal firewall or anti-virus internet protection you may have to configure it to allow port 3389 traffic.
Step 9: Run your Remote Desktop client
With the above configuration in place you can now run your remote access services using the host and domain name to access them. You will no longer have to remember the IP address of the machine you are trying to get to.Simply open your remote access client (we're using Remote Desktop Connection in this example), fill in your host name and your username and password for your account on the remote computer. Note that any computer systems accessible from the Internet should be configured to use a username/password to authenticate users.
more info click here

Troubleshooting

Searching for:
Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair, maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers

Troubleshooting is a form of problem solving most often applied to repair of failed products or processes. It is a logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again. Troubleshooting is needed to develop and maintain complex systems where the symptoms of a problem can have many possible causes. Troubleshooting is used in many fields such as engineering, system administration, electronics, automotive repair, and diagnostic medicine. Troubleshooting requires identification of the malfunction(s) or symptoms within a system. Then, experience is commonly used to generate possible causes of the symptoms. Determining which cause is most likely is often a process of elimination - eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.

In general, troubleshooting is the identification of, or diagnosis of "trouble" in a [system] caused by a failure of some kind. The problem is initially described as symptoms of malfunction, and troubleshooting is the process of determining the causes of these symptoms.

A system can be described in terms of its expected, desired or intended behavior (usually, for artificial systems, its purpose). Events or inputs to the system are expected to generate specific results or outputs. (For example selecting the "print" option from various computer applications is intended to result in a hardcopy emerging from some specific device). Any unexpected or undesirable behavior is a symptom. Troubleshooting is the process of isolating the specific cause or causes of the symptom. Frequently the symptom is a failure of the product or process to produce any results. (Nothing was printed, for example).

The methods of forensic engineering are especially useful in tracing problems in products or processes, and a wide range of analytical techniques are available to determine the cause or causes of specific failures. Corrective action can then be taken to prevent further failures of a similar kind. Preventative action is possible using FMEA and FTA before full scale production, and these methods can also be used for failure analysis.
Aspects

Most discussion of troubleshooting, and especially training in formal troubleshooting procedures, tends to be domain specific, even though the basic principles are universally applicable.
Usually troubleshooting is applied to something that has suddenly stopped working, since its previously working state forms the expectations about its continued behavior. So the initial focus is often on recent changes to the system or to the environment in which it exists. (For example a printer that "was working when it was plugged in over there"). However, there is a well known principle that correlation does not imply causality. (For example the failure of a device shortly after it's been plugged into a different outlet doesn't necessarily mean that the events were related. The failure could have been a matter of coincidence.) Therefore troubleshooting demands critical thinking rather than magical thinking.
It's useful to consider the common experiences we have with light bulbs. Light bulbs "burn out" more or less at random; eventually the repeated heating and cooling of its filament, and fluctuations in the power supplied to it cause the filament to crack or vaporize. The same principle applies to most other electronic devices and similar principles apply to mechanical devices. Some failures are part of the normal wear-and-tear of components in a system.
A basic principle in troubleshooting is to start from the simplest and most probable possible problems first. This is illustrated by the old saying "When you see hoof prints, look for horses, not zebras", or to use another maxim, use the KISS principle. This principle results in the common complaint about help desks or manuals, that they sometimes first ask: "Is it plugged in and does that receptacle have power?", but this should not be taken as an affront, rather it should serve as a reminder or conditioning to always check the simple things first before calling for help.
A troubleshooter could check each component in a system one by one, substituting known good components for each potentially suspect one. However, this process of "serial substitution" can be considered degenerate when components are substituted without regards to a hypothesis concerning how their failure could result in the symptoms being diagnosed.
Efficient methodical troubleshooting starts with a clear understanding of the expected behavior of the system and the symptoms being observed. From there the troubleshooter forms hypotheses on potential causes, and devises (or perhaps references a standardized checklist of) tests to eliminate these prospective causes. Two common strategies used by troubleshooters are to check for frequently encountered or easily tested conditions first (for example, checking to ensure that a printer's light is on and that its cable is firmly seated at both ends), and to "bisect" the system (for example in a network printing system, checking to see if the job reached the server to determine whether a problem exists in the subsystems "towards" the user's end or "towards" the device).
This latter technique can be particularly efficient in systems with long chains of serialized dependencies or interactions among its components. It's simply the application of a binary search across the range of dependences.
Simple and intermediate systems are characterized by lists or trees of dependencies among their components or subsystems. More complex systems contain cyclical dependencies or interactions (feedback loops). Such systems are less amenable to "bisection" troubleshooting techniques.
It also helps to start from a known good state, the best example being a computer reboot. A cognitive walkthrough is also a good thing to try. Comprehensive documentation produced by proficient technical writers is very helpful, especially if it provides a theory of operation for the subject device or system.
A common cause of problems is bad design, for example bad human factors design, where a device could be inserted backward or upside down due to the lack of an appropriate forcing function (behavior-shaping constraint), or a lack of error-tolerant design. This is especially bad if accompanied by habituation, where the user just doesn't notice the incorrect usage, for instance if two parts have different functions but share a common case so that it isn't apparent on a casual inspection which part is being used.
Troubleshooting can also take the form of a systematic checklist, troubleshooting procedure, flowchart or table that is made before a problem occurs. Developing troubleshooting procedures in advance allows sufficient thought about the steps to take in troubleshooting and organizing the troubleshooting into the most efficient troubleshooting process. Troubleshooting tables can be computerized to make them more efficient for users.

Searching for:
Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers

Thursday, 7 January 2010

Zip Code Error (Invalid Zip code)

Searching for:


My computer was shutdown incorrectly when the breaker in my apartment went off. Now, when I run a weather widget, I get an invalid zip code error. I uninstalled and reinstalled Desktop X, but it didn't help. I cleared the widget cache, but I still get the same error. usually in windows XP with setting vista or vista combine.
it must be delete sidebar desktop and it will be disappears. because it appear ever and ever when computer conected to the internet.


How To Disable And Remove Thumb.db Hidden File In Windows

What are Windows Thumb.db files? How do find and delete Thumb.db files? Windows automatically creates a file known as Thumb.db for folders containing picture or images. Thumb.db file caches thumbnails of all the images in the folder, this allows Windows to display the images quicker whenever the folder is opened.

The Thumb.db is a hidden file only viewable when the ‘Show Hidden Files’ option is turned on in the Folder Option settings. To prevent the Thumbs.db file from being created, follow these instructions:
Open a folder, any folder in your Windows.
Go to ‘Tools’ then select “Folder Options” as shown in the image below.
(Step 1)
Select the ‘View’ tab.
(Step 2)
Check the “Do not cache thumbnails” option as shown in the image below
(Step 3)
Click ‘OK’ to apply the changes

let's Try...

Replacing an Empty Ink Cartridge

This printer uses ink cartridges equipped with IC chips. The IC chips accurately monitor the amount of ink used by each cartridge. Even if a cartridge is removed and later reinserted, ink reserves can be measured and fully utilized. Please note that some ink will be consumed during reliability-confirmation operations each time the cartridge is inserted into the printer.

Warning:
Keep ink cartridges out of the reach of children. Do not allow children to drink from or otherwise handle the cartridges.
Be careful when you handle the used ink cartridges, as there may be some ink surrounding the ink supply port. If ink should come into direct contact with your skin, wash the area thoroughly with soap and water. If ink should come into direct contact with your eyes, flush them immediately with water. If you should feel discomfort or if vision is impaired, see a doctor immediately.

Caution:
EPSON recommends the use of genuine EPSON ink cartridges. Other products not manufactured by EPSON may cause damage to your printer not covered by EPSON's warranties.
Leave the old cartridge installed in the printer until you have obtained a replacement. Otherwise, ink remaining in the print head nozzles may dry out.
Do not refill the ink cartridges. The printer calculates the amount of ink remaining using an IC chip on the ink cartridge. Even if the cartridge is refilled, the amount of ink remaining will not be recalculated by the IC chip and the amount of ink available for use will not change.

Note:
You cannot continue printing with one ink cartridge empty, even if the other cartridges still contain ink. Before printing, replace the empty cartridge.
In addition to the ink used during document printing, ink is consumed during the print head cleaning operation, during the self-cleaning cycle which is performed when the printer is turned on, and during ink charging when the ink cartridge is installed in the printer.


For more information about ink cartridges, see When handling the ink cartridges.

Using the printer's control panel

The printer's indicator lights will inform you when it is time to obtain a replacement ink cartridge and when it is time to replace an empty cartridge.

Using the Status Monitor

You can monitor the remaining ink levels and view on-screen instructions for replacing a low or empty ink cartridge using the EPSON Status Monitor 3 (for Windows) or EPSON Status Monitor (for Macintosh).

When an ink cartridge is low or empty, click the How to button in the EPSON Status Monitor window. Follow the on-screen instructions to replace the cartridge.

For more information on using EPSON Status Monitor, see Using EPSON Status Monitor 3 for Windows, or Using EPSON StatusMonitor for Macintosh.

PayPal

Searching for:


PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. PayPal serves as an electronic alternative to traditional paper methods such as cheques and money orders.

A PayPal account can be funded with an electronic debit from a bank account or by a credit card. The recipient of a PayPal transfer can either request a check from PayPal, establish their own PayPal deposit account or request a transfer to their bank account. PayPal is an example of a payment intermediary service that facilitates worldwide e-commerce.

PayPal performs payment processing for online vendors, auction sites, and other commercial users, for which it charges a fee. It sometimes also charges a transaction fee for receiving money (a percentage of the amount sent plus an additional fixed amount). The fees charged depend on the currency used, the payment option used, the country of the sender, the country of the recipient, the amount sent and the recipient's account type.[2] In addition, eBay purchases made by credit card through PayPal may incur a "foreign transaction fee" if the seller is located in another country, as credit card issuers are automatically informed of the seller's country of origin.

On October 3, 2002, PayPal became a wholly owned subsidiary of eBay.[3] Its corporate headquarters are in San Jose, California, United States at eBay's North First Street satellite office campus. The company also has significant operations in Omaha, Nebraska; Scottsdale, Arizona; and Austin, Texas in the U.S., Chennai, Dublin, Berlin and Tel-Aviv. As of July 2007, across Europe, PayPal also operates as a Luxembourg-based bank.

Categories

Access Media Collection Add HTML facebook on site addurl Administration Tools Adsense All Cat Anatomy Virus Android Animator Anomymity Anti Virus Applications Install BELAJAR PHOTOSHOP Blog Blufftop CA-CLIPPER INTERNAL ERROR cara cari uang dari internet cari uang dari internet cashfiesta Celebs Computer Desk Computer Hang Computer Icon Computer Management Computer Repair Computer Set Up Computer Tablet Computer Touch Screen Computer Troubleshooting Cookies Cookies Definitions Crack Create DVD Create DVD Maker Create PDF Create PDF using Smart PDF Creator D-Link D-Link Router Definitions of Virus Device Device Manager DNS Doc Protect Dongle USB Drive partitions Drive parts Driver Printer HP DVD compress DVD Drive Earn Money Easy Gif Animator Elastomer Eror Solution Error Computer ERROR Solutions Error windows explorer External Hard Drive Facebook Facebook and Site File Sharing Football Game Free Articles Free Internet GAME Game Sport Googel Google Talk Hack Password Hard Drive Hard Drive Partitioning Healty Help and Support Help Support Household Aplieance How to How to Download HP Lapotop Reviews IM Google Inside Adsense intall Intall Windows 7 Ultimates Internet Internet Browser Internet Explore Ipad Java Programe Java Script JPEG JPG GIF PNG BMP Keyboard Keygen Smadav 8.7 Laptop Laptop Computer Skin Laptop vs PC Life Style Local Area Network Maintanance and Repair Make CD iso Make DVD Make money online Make Money with blog Make Your Own Copy-Protected CD with Passive Protection Messenger and Chat Microsoft Mobile Aplications Mobile Phone Modem MotorSport MOVIE Ms Word Applications MS Word to PDF Ms Words My Computer Network Set Up Networking Office Online Shoping Operating System Partitions drive Password Wifi PC Desktop PDF EDITOR PDF Remover Photoshop Picture Portable Prevent Windows XP Print Printer Error Protect CD from Copy Protect Your Computer Reboot Application Remove Pasword Excel Restore Windows Registry Router Search Engine Index Search Engines Optimizer Security Security System Shortcut Smadav 8.7 Smart PDF Creator Social Networking Software software Protection Solving Probelm Startup Programs SuperBike System Registry System Restore Table Manager Test DVD Test DVD Drive Troubleshooting all Tutorial Tutorial Java TUTORIAL PHOTOSHOP uang gratis dari cashfiesta uang gratis dari internet Upload File to blogger Upload Files USB Install USB REMOVE USB Repair VGA Card VGA Conector VGA Informations Virtual Memory is to Low Virus Viture Windows 7 Watermark What is Cookies Wifi Wifi Pasword Finder Win Pes2011 Windows Windows Device Windows DVD Maker windows explorer cannot open Windows Mobile Wireless Wireless router Word Password Remover words documents cannot open Words error XFBML and HTML Facebook