Monday, April 28, 2008

Make Your Networked Pcs See each Other

If you have several PCs sharing an Internet connection, they should be able to share files with each other. But sometimes Windows falls short of automating file sharing between networked computers. Here's how you can force wayward machines to make the connection.

Start by checking your firewall. Third-party PC firewalls like ZoneAlarm and Norton Internet Security often block local networks. As a precaution, begin by disconnecting your Internet connection. Then turn off each PC's firewall.

If possible, turn on just one PC's firewall. Does the problem return? If it does check that machine's firewall settings and documentation to see how you can make it local-network-friendly. You may have to add your other PCs to a "Trusted Zone" or some such group.

Repeat this process with each PC. Don't reconnect to the Net until all firewalls are back up and working.

Here are some more good troubleshooting techniques
Make sure that all your PCs are in the same workgroup Press-R, type sysdm.cpl, and press . Then click the Computer Name tab. lf the workgroup name there does not match the workgroup name listed on your other computers, click Change
Make sure that file and printer sharing is on: Press -R, type ncpa.cpl, and press. Right-click the network connection, and select Properties If File and Printer Sharing for Microsoft Networks is unchecked, check it.

Make sure that you are sharing a folder. Browse to the folder you want to share. If the folder's icon doesn't have a little hand under it, right-click it and select Sharing and Security. Then in the Sharing tab, check Share this on the network.

In Vista, the folder's icon should have a tiny picture of two people in the lower-left comer. If it doesn't, right-click it and select Share in the resulting dialog box type everyone into the text field, click Add, adjust the permission level (if you wish), and click share.

If the computers still don't see each other, try a last-ditch trick that sometimes works: Press -R, type the other PC's network path, and press . That network path is probably two backslashes followed by the computer's name on the network, such as \\chris. If this succeeds, map the computer as a network drive.

*.* Source of Information : May 2008 PC World

Tuesday, April 22, 2008

Using Outlook on multiple machines

A variety of options let you use your Outlook 2007 data messages, calendar items, contacts, tasks, and so on in multiple locations. These include synchronization tools such as TrueSync, which is available on your Yahoo! account. But Outlook itself will do the trick, demanding only a little ingenuity to make it happen. Here'slow you can make Outlook receive your POP mail on several different machines, and keep all your records—sent mail, mail sub folders, everything—current on multiple machines.

LEAVE MESSAGES ON SERVER
POP3-email accounts work by accessing messages stored on a mail server (see graphic below). Typically when you download the messages, you simultaneously delete them from the server. But you don't have to; you may instead leave them on the server for subsequent downloading to other locations. Auto-deletion is part of the default setup of a POPS account and to change this behavior you must change the setting.

Choose Account Settings from Outlook's Tools menu and double click the account you want to change. On the resulting Change Email Account dialog, click More Settings, and then the Advanced tab of the Internet E-Mail Settings dialog. In the Delivery section check Leave a copy of messages on the server Then simply configure the samePOP3 account on your other PCs and you'll get the same messages on every PC.

Bear in mind, however, that this setting will result in your mail sitting indefinitely on your ISP's or organization's server clogging it after a while. So use the other options to help clean up, Remove from server after x days and/or Remove from server when deleted from Deleted Items.

DUPLICATE THE ENTIRE PST FILE
This is the brute-force method, and it works. Whenever you finish your stint at one machine, copy your entire PST file (Outlook's personal folders file) from that PC's hard drive to removable media or online storage. (The size of the PST file may encourage you to pare down your saved messages occasionally.) At the "target" PC copy the PST file into the appropriate folder on that machine. You can determine the location of your PST file by choosing Account Settings from the Tools menu in Outlook and then clicking the Data Files tab. The Filename column shows the full path for the file. The default path is a hidden folder; to see it in Windows Explorer use Folder Options in the Control Panel (or Tools I FolderOptions I View in Windows Explorer) to unhide hidden files and folders.

SETTING A PST PASSWORD
While you have the Data Files tab of the Account Settings dialog on screen, why not give your PST file a password to restrict access? Double click the Personal Folders line and click the Change Password button. Type the old password (leave blank if you haven't set one) and type the new password and its verification. Click OK. From this point on, when you open Outlook—or anyone else does Outlook will require the password to use the data file.

WHY LEAVE YOUR MESSAGES ON THE SERVER?
One option within Outlook lets you "Leave messages on server." This lets you download messages on a secondary PC—say, your office computer while ensuring that they're still available for downloading to your main PC.

*.* Source of Information : April 2008 PC Magazine

Monday, April 21, 2008

Recycle Your PC the Right Way

Bought a brand-spanking-new PC for the holidays? You're probably feeling pretty good about yourself. Not so fast. What do you plan to do with your old system? Don't just stash it in your basement or a closet, where it will come hack to haunt you during nest year's spring cleaning. Clearing the clutter out early will earn you a black belt in feng shui.

If your system still works, the best move is to donate it to a family member or local charity. Earth 911 (earth911.org), the CEA’s myGreenElectronics.org, and the Electronic Industries Alliance (www.eiae.org) all have resources for finding a donation center in your area. But if the system's truly farkakte, be responsible and recycle it. Here's how to get it ready for retirement.

BACK UP YOUR FILES
Make sure you have all the files you might need from the system. You can back up to an external drive using the included software or the Windows backup utility (for XP Professional users. you can find this in the Start menu under Programs I Accessories I System Tools I Backup; XP Home users can find the Ntbackup.exe program on the Windows XP disc. You can also use boxed software, such as ShadowProtect Desktop3.1 ($79.95. www.storagecraftcom) or Paragon Drive Backup ($49.95. www.driverbackup.com); online backup solutions such as SOS Online Backup or the free Drivelmage XML (www.runtime.org); or a free utility such as FolderShare.

WIPE YOUR HARD DRIVECLEAN
Although a recycled computer will most likely be ripped up, don't assume that someone down the line won't try to plug it in especially if the system still works. Just to be on the safe side, it’s a good idea to wipe the hard drive completely, including the operating system to remove your version of Windows and your administrator's account. To do this, you can use a number of utilities, including Wipelnfoon Norton System Works, Disk-Deleter Pro 2.2.0 ($39.95, www.bluestsoft.com) or 0 free onlineutility, Eraser 5.86. If you're really paranoid, you can remove the hard drive. Open it up and smash the platter with a hammer. (But before you do that, read step 3).

SALVAGE WHAT YOU CAN
Before you toss out the bytes with the bathwater take a moment to consider whether there's anything inside that's still in good working order. If there is, you may be able to use it down the road. Since your power supply, graphics card, sound card, and motherboard are most likely outdated. They probably aren't going to be of much use to you, but hard drives, RAM modules, IDE cables, cooling fan, and optical drives are good examples of components that are easy to remove and less likely to become obsolete.

FIND A REPUTABLE RECYCLING LOCATION
Keep in mind that many recyclers charge a fee to take a desktop tower, monitor or printer off your hands. The EPA's Web site has a useful page with a list and links to company take-back programs, big-box store recyclers (such as Best Buy and Circuit Coy), and local programs (www.epa.gov/epaoswer/hazwaste/recycle/ecycling/donate.htm). You can also check with your town's sanitation department. Some communities offer free take-back programs at certain times of year.

SPREAD THE WORD
Bring your good deed to friends, family and coworkers. Try to get your company to participate in a corporate take back program. Send around links to recycling locations and possible donation sites. If you had a particularly good or bad experience with a certain company or recycler, e-mail or log on to discussion forums and let everyone know.

*.* Source of Information : April 2008 Windows IT Pro

Sunday, April 20, 2008

Virtualization Products

Build your virtual environment from one of these great tools

You like free software, right? Virtualization is one of the fastest growing technologies, and one of the key driving factors behind its growth is the fact that many of today’s premier virtualization products are free. This lets organizations use virtualization for many different scenarios without spending a lot of money. Let’s look at the 10 best free virtualization products that work with Windows.

Microsoft Hyper-V Server—Hyper-V Server, as a standalone, costs $29. However, it’s bundled with certain editions of Windows Server 2008, making it essentially free for Server 2008 customers. Hyper-V uses modern hypervisor-based architecture. It requires an x64 processor with hardware-assisted virtualization, and can run Windows and Linux guests. You can download the Hyper-V beta as part of Server 2008 RC1 at www.microsoft.com.nsatc.net/downloads/details.aspx?familyid=8F22F69E-D1AF-49F0-8236-2B742B354919.

VMware Server—VMware Server runs on both Windows and Linux, and it provides 32-bit and 64-bit support for hosts and guests. VMware Server 2.0, currently in beta, also has experimental support for Windows Vista and Windows Server 2008. Its VM’s have audio and USB guest support as well as support for snapshots. You can get VMware Server at www.vmware.com/download/server.

Microsoft Virtual Server 2005 R2—Microsoft’s primary virtualization offering for Windows Server 2003 hosts, Virtual Server 2005 R2 is designed for production server virtualization tasks. It provides 64-bit host support but no support for 64-bit guests. Virtual Server 2005 R2 supports Windows Server guests as well as the popular enterprise Linux OSs. You can download Virtual Server 2005 R2 from www.microsoft.com/downloads/details.aspx?FamilyID=6dba2278-b022-4f56-af96-7b95975db13b.

Microsoft Virtual PC 2007—Virtual PC 2007 is Microsoft’s desktop virtualization product. It has host and guest support for Windows Vista. It also supports multiple monitors, x64 host hardware, and hardware-assisted virtualization. You can download Virtual PC 2007 from www.microsoft.com/windows/downloads/virtualpc.

Virtual Iron Single Server Edition—Best known for its virtual infrastructure management capabilities, Virtual Iron also offers Single Server Edition, a free, limited-feature version of its enterprise-class virtualization product. The free version can run no more than 12 VMs and supports a maximum Microsoft Virtual Hard Disk (VHD) import or export size of 18GB. You can get the Virtual Iron Single Server Edition from www.virtualiron.com/products.

Oracle VM—Not to be left out of the burgeoning virtualization market, Oracle began providing a free Xen variant in late 2007. You manage Oracle VM with a browser-based management console. Although the Oracle VM software is free, Oracle charges for support. You can download Oracle VM at www.oracle.com/technologies/virtualization/index.html.

QEMU—A bit different from the other virtualization products listed, QEMU is a processor emulator. QEMU isn’t an open-source project, but it is free software and is utilized by a number of other products, including VirtualBox and Win4Lin. Its system-emulation mode provides basic support for Windows guests as well as DOS, Linux, and BSD. QEMU is found at fabrice.bellard.free.fr/qemu/about.html

VirtualBox—VirtualBox runs on Windows, Linux, and Macintosh hosts, and can run Windows Vista, Windows XP, Windows 2000, Windows NT, and many Linux versions as guests. VirtualBox comes in both a commercial and a free version. VirtualBox VMs provide audio, USB, and iSCSI support. You can find VirtualBox at http://www.virtualbox.org/.

Xen—Xen is an open-source, hypervisor-based virtualization product. You load Xen from a Linux host, and the latest releases support both Windows and Linux guests. Xen-enabled Linux systems can also run under Microsoft’s Hyper-V virtualization, taking full advantage of the new high performance VMBus architecture. You can download Xen from www.xen.org/download.

VMware Player—VMware Player doesn’t let you create new virtual machines (VMs). However, it runs on both Linux and Windows hosts, and can run both VMware and Microsoft VM images. VMware Player is also the basis for VMware’s thriving Virtual Appliance Marketplace. You can download VMware Player from www.vmware.com/download/player .

*.* Source of Information : April 2008 Windows IT Pro

Saturday, April 19, 2008

6 New Security Features in IIS 7.0

When you host a Web server, you put a part of your organization on display and open it up to the poking and prodding of the anonymous masses. Remotely exploitable flaws in the Web server platform can be disastrous. Case in point: Microsoft Internet Information Services (IIS) 5.0 left a trail of lost productivity and revenue.

However, Microsoft redesigned IIS with security as a top priority. The result was IIS 6.0, which is widely held as the most secure commercial Web server on the market.

IIS 7.0 builds on the secure design of IIS 6.0 and has been modularized so that individual features can be removed entirely, thus reducing the overall attack surface of your Web server. Application pools, introduced in IIS 6.0 as a way to isolate applications from each other (and from the Web server process), are now more effectively sandboxed. New delegation features let site owners manage their sites without elevated privileges. Request filtering (aka URLscan) is now built into the server. And administrators can define rules right in IIS 7.0 that control which users have access to which URLs.

These features are among the security-related enhancements in IIS 7.0. They’re worth a closer look, and they might even change the way you think about managing and configuring Web sites.

Application Sandboxing
Consider a market research company hosting surveys or other low volume sites for competing companies on the same box. Or consider a server that hosts a payroll application used by a small number of users and a homegrown portal used companywide. In both cases it’s crucial that these applications running on the same servers be isolated from each other.

Web applications run in worker processes. Application pools map Web applications to worker processes. A specific worker process is used only to run applications that are part of the same application pool. In IIS 6.0 and IIS 7.0, the worker process is w3wp.exe.

In IIS 6.0, new Web sites and applications are put into the same application pool. This default application pool runs under the NetworkService account. As an administrator, you can create new application pools manually and assign Web apps to those pools. By default, those application pools will also run under the NetworkService account, which can lead to an undesirable runtime scenario as all Web applications run with the same permissions. An application in app pool A can read the configuration of app pool B and even access the content files of applications assigned to app pool B. Although it’s easy enough to create new app pools and to configure custom accounts for each, managing those accounts over time is cumbersome.

With IIS 7.0, a new application pool is created automatically for each Web site. By default, that application pool is configured to run as the NetworkService account. But when the worker process is created, IIS 7.0 injects a special SID unique to the app pool into the NetworkService security token. IIS 7.0 also creates a configuration file for the worker process and sets the file’s ACL to allow access only to the unique SID for the app pool. The result is that an application pool’s configuration can’t be read by other application pools.

As an additional precaution, you can change the ACLs on content files to provide access to the unique app pool SID instead of NetworkService. This will prevent an application in app pool A from reading the content files of an application in app pool B.

IUSR and IIS_IUSRS
Tangentially related to process identity is the question of which identity the server uses for anonymous requests. Previous versions of IIS relied on a local account, IUSR_servername, as the identity for anonymous users. IIS 7.0 uses a new built-in account called IUSR. You can’t log in locally with the IUSR account, so it doesn’t have a password (which means there are no risks due to attackers guessing the password). The IUSR account always has the same SID so ACLs are transferable between Windows Server 2008 machines (as well as Windows Vista machines). And if the IUSR account isn’t appropriate for your scenario (e.g., if anonymous requests require authenticated network access), you can turn off the anonymous user account and IIS 7.0 will use the worker process identity for anonymous requests.

Also new is the built-in IIS_IUSRS group. This group replaces the IIS_WPG group. In IIS 6.0, the IIS_WPG group provides the minimum rights needed to run a worker process, and you must manually add an account to this group to provide a custom identity for a worker process. The IIS_IUSRS group provides a similar role for IIS 7.0, but you don’t explicitly add accounts to this group. Instead, IIS 7.0 automatically enrolls accounts in IIS_IUSRS when they’re assigned as the identity for an application pool. And as with the IUSR account, the IIS_IUSRS group is built-in, so it always has the same name and SID on all Server 2008 installations, making ACLs and other configurations completely portable between Server 2008 machines (and Vista machines).

Feature Delegation
Not every Web server setting really needs to be protected by admin rights. Some settings are simple application-level decisions that can be made by developers or product managers. For example, in IIS 6.0 you need admin rights to change the default document for a Web application. But normally is there really any reason that the ability to change default.aspx to profile.aspx should require administrator rights?

In IIS 7.0, configuration decisions can now be delegated to site or application owners. IIS 7.0 uses a new XML-based configuration system inspired by ASP.NET. At the site and application level, both IIS 7.0 and ASP.NET configuration settings are found in the same web.config files. Delegated settings such as the default document can be changed at the Web site level or application level by editing the web.config file directly or using the IIS Manager GUI, as Figure 1 shows, which updates the web.config for you. In the web .config file, the system.webServer section contains the IIS 7.0 configuration settings, which Figure 2 shows.

The sections that are valid within are defined in a special configuration file called applicationHost. config. In applicationHost.config, each section has a default delegation mode. In the example in Figure 3, the default document and directory browsing settings can be overridden but not the asp, caching, or cgi sections.

But what if there is a good reason to prevent a Web site owner from changing the default document? No problem: IIS 7.0 lets you lock configuration elements so they can’t be set or overridden in web.config files. In the case of the default document, you can globally change the default override mode to Deny or you can explicitly set the override mode to Deny for specific locations (using location tags). The IIS team recommends asserting these kinds of changes in location tags, as Listing 1 shows. Feature delegation can be a great boon to a busy administrator because it safely empowers Web site and application owners to configure aspects of the Web server that affect only their sites and applications.


Administration Delegation
Many admins find it expedient to just give out admin access to whoever needs to apply a change to a site or application. This, of course, is a tremendous security risk. Unfortunately, the choice has been difficult: either liberally assign admin rights or impede updates by becoming the single point of administration. With IIS 7.0, server admins can grant administration rights for a specific Web site or application to one or more users without elevating user privileges.

In IIS Manager, which Figure 4 shows, users can connect to an IIS 7.0 server using Windows credentials or credentials specific to IIS Manager. The beauty of credentials specific to IIS Manager is that you provide a very specific and limited set of rights to a user: IIS Web site administration rights. The credentials are useless outside of IIS Manager.

For remote use, a standalone version of IIS Manager is available for Windows Vista, 2003, and XP. Before you can connect remotely with IIS Manager, remote management must be explicitly enabled on the Web Server by doing the following:
1. Install the Web Management Service (WMSVC)
2. Enable remote management via IIS Manager on the Web server (or via the registry)
3. Start the Web Management Service

Firewall rules or remote access policies can make it difficult to use remote management tools. For this reason, IIS Manager works over HTTPS, so it’s both secure and firewall-friendly. By default, the Web Management Service uses a self-signed certificate and listens on port 8172.

Microsoft offers IIS 7.0 Manager for remote management at www.iis.net/go/1524. For additional resources (including detailed configuration instructions), search for IIS 7.0 remote administration at iis.net. You can also find more information about the new IIS features at this Microsoft site.

Built-In Request Filtering
If you’ve administered IIS servers, you’re probably already familiar with UrlScan, a downloadable tool for IIS 4.0 and higher that restricts the types of requests that IIS will service. The intent behind request filtering is to protect your Web server from potentially malicious requests.

In IIS 7.0, UrlScan has been enhanced and bundled with the Web server in the Request Filtering Module. The Request Filtering Module rejects requests based on configurable criteria. For example, the module can reject double-encoded requests or requests of unusual size (such as large POST payloads or URLs that are too long). The Request Filtering Module can also reject requests for file types, paths, or HTTP verbs that your site doesn’t support.

With IIS 7.0, request filtering configuration can be delegated, allowing site admins to define their own request filtering rules in web.config files, which wasn’t possible with UrlScan and IIS 6.0. For more information about request filtering in IIS 7.0, see the Security ProVIP article “Unleash the Power of IIS 7.0’s Security Features,” InstantDoc ID 96999.


URL Authorization
Web applications often have restricted areas to which only certain users have access. Only a manager, for example, is allowed to access performance reviews in an HR system. These restricted pages are commonly grouped together into directories with names like Administration, Reporting, or Moderation. Properly securing these sections to prevent unauthorized access has been cumbersome at best with previous versions of IIS. Even with the URL authorization feature built into ASP.NET, you still have to deal with non-ASP .NET content such as PDF or Excel files that need to be protected. And ASP.NET URL authorization rules are managed by editing XML, which can be tedious.

In IIS 7.0, ASP.NET URL authorization is still available, but in addition, a URL authorization feature is provided by the Web server itself. Now access to all content types (e.g., static, PHP, ASP) can be controlled based on user, group, and URL. For example, you can easily restrict access to anything under the Reporting path to only those users belonging to the Managers group—without touching the file ACLs. Figure 5 shows URL authorization rules configuration in IIS Manager.

URL authorization rules are persisted in the system.webServer section of web.config files with a slightly different syntax than ASP .NET authorization rules, as Listing 2 shows.

Since the authorization rules are contained entirely in your configuration files (local web.config), they are easily transferred between applications and servers. And the URL authorization in IIS 7.0 works with Windows users and groups as well as ASP.NET users and roles.

Building on IIS
IIS 7.0 builds on the solid security legacy of IIS 6.0, and it retains the core architecture of IIS 6.0 with the app pool / worker process isolation model that has proven to be very effective. Although the new modular architecture changes receive a lot of the attention when discussing IIS 7.0 security, automatic application sandboxing, feature delegation, and URL authorization make it easier than ever to secure your Web server.

*.* Source of Information : April 2008 Windows IT Pro

Friday, April 18, 2008

Windows XP - Enable Hibernate in the Shut-Down Dialog

Putting your PC into Standby conserves power without shutting down your computer, but if there’s a power outage, any open programs and unsaved work will be lost. Using Hibernation tackles this issue by fi rst taking a snapshot of your desktop and saving it to your hard drive before powering down, but Microsoft neglected to include a Hibernate button in the shut-down dialog box. To fi x this, first make sure you’ve enabled hibernation under Power Options in the Control Panel. Next, go into the registry and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows and create a new key called System (right-click Windows and select New > Key). Highlight System and create another key called Shutdown (you should now be in HKLM \SOFTWARE\Policies\Microsoft\Windows\System\Shutdown). Now create a DWORD value named ShowHibernationButton and change the Data from 0 to 1. You should now see the Hibernate button in the Shutdown dialog. If not, you’ll need to request a hot fix from Microsoft.

*.* Source of Information : March 2008 Maximum PC

Windows XP - Stay Prepared with a Password Restore Disk

Open User Accounts in the Control Panel and select your account. Click the “Prevent a forgotten password” link in the left-hand pane and follow the prompts. If you’re on a domain, press CTRL-ALTDEL to bring up the Windows Security dialog box and then click Change Password. In the “Log on to” box, click the local computer, select Backup, and then follow the prompts. Both methods require a floppy disk.

*.* Source of Information : March 2008 Maximum PC

Thursday, April 17, 2008

Delete an Undeletable File from Windows XP

Windows won’t let you delete a file if it’s currently in use, which is usually a good thing, but that can spell bad news when trying to rid your system of a nasty malware strain. Luckily, there’s a workaround. Click the Start menu, select Run, and type CMD to bring up the Command Prompt. Now hit CTRL-ALT-DEL to open the Task Manager. Under the Processes tab, highlight explorer.exe and click End Process. ALT-Tab your way to the Command Prompt and then navigate to the directory of the fi le you’re trying to delete using the CD command (cd C:\Program Files\3DSaver). Next, use the delete command to delete the offending file (del 3DSaver.exe). ALT-Tab back to the Task Manager, select New Task under File, and type explorer.exe to bring back the Windows shell. Alternately, try Unlocker and delete stubborn fi les through a svelte GUI.

*.* Source of Information : March 2008 Maximum PC

Brand your Windows XP PC with a custom logo

OEM vendors often dress up the System Properties screen with a custom logo and support information, giving prebuilt PCs an air of professionalism. Well guess what? You can add the same personal touch to your own machine in just a few easy steps. Open up any photo-editing program and create a 180x114-pixel image. Save the image as a bitmap and name it oemlogo.bmp, then place it in C:\Windows\System32. Next, create a Notepad fi le in the same folder and save it as oeminfo.ini. OEM resellers use this fi le to enter customer-support information, but you can write whatever you wish as long as you use the following format:

[General]
Manufacturer=Maximum PC
Model=Dream Machine

[Support Information]
line1=For even more great
tips visit
line2=www.maximumpc.com

*.* Source of Information : March 2008 Maximum PC

Wednesday, April 16, 2008

Avoid under powering Your USB Devices

IF YOUR PC'S USB ports are filled tip with USB hubs that are packed with yet more USB devices, make sure that all of those gadgets are getting the power they need to run properly. A single USB root hub which typically supports two USB ports on your PC's motherboard, delivers a minimum of 500 milliamps of electricity to its attached devices. If the power demands of your systems connected USB devices exceed that number, the whole USB bus can shutdown.

Check your power needs in Windows by opening Device Manager. In XP click Start, right-click My Computer, and select Manage. In Vista click Start, right-click Computer, and select Manage, In the Computer Management window select Device Manager from the left pane. In the right pane, double-click each instance of USB Root Hub listed under Universal Serial Bus Controllers, and open the Power tab for each one (seethe screen shot above right). On that tab you'll see a listing of how much power each USB port or attached USB device uses. If you would like to identify a USB device on your system use NirSoft's USBDeview. This handy free utility provides names, serial numbers, USB ports and other useful data for keeping track of all your connected gadgets.

*.* Source of Information : April 2008 PC World

Tuesday, April 15, 2008

Manage Your Messages Masterfully in Gmail

Most E-mail users dream of an empty inbox evidence that we've read and deleted (or filed) all incoming messages, and are now free to take the rest of the day off. Because Gmail offers more than 6GB of storage, the only messages you need to delete are those you never want to see again. To banish messages from your inbox but keep them handy, add a check mark beside them under select on the left side of the screen, and then click Archive. This hides messages without expunging them.

To make your archived messages easier to find later, use labels to categorize them by topic, project, or other criterion. Most mail apps let you sort mail into folders. But Gmail's labels improve on folders in one powerful way Instead of requiring mail to go into one folder a time; they let you assign messages to multiple categories simultaneously. For example one message that pertains to both Project A and Project B can appear among messages labeled ‘Project A’ as well as in the ‘Project B’ group.

To categorize a message, open it and select one of the labels on the More Actions menu, or check one or more messages in one of the message list views, and choose the label from the More Actions menu. You can create new labels from the menu.

To modify your labels, select settingàLabels in the upper right-hand portion of the screen; this will open a page where you can rename or remove labels, view a list of messages tagged with each label or create new label (see the screen shot above).Unlike deleting a folder in a standard e-mail app, deleting a label doesn't kill the messages tagged with label, so you should feel free to delete labels you don't need. You can also remove labels from messages without deleting the labels. First, open a message or check multiple messages in the mail list: then choose More Actions. Scroll to and select the unwanted label under the Remove label' heading. To find messages those are no longer tagged with a label. Click All Mail, and you'll sec all your messages listed together.

Tag Restoration
Gmail’s inbox is simply another tag that incoming messages receive by default. If you mistakenly archive a message (which strips it of its 'Inbox' tag), you can return it to your inbox by clicking All Mail, selecting the message and clicking Move to Inbox. A similar method enables you to retrieve messages that you in advertently send to the Trash folder. Gmail's habit of grouping conversations into message threads means that messages you've archived will pop back into your mailbox when someone sends a response to an earlier message in the thread. If you no longer have any interest in the conversation, you can prevent it from reappearing in your in box by checking it and then choosing Mute from the More Actions menu.

*.* Source of Information : April 2008 PC World

Internet Social Networking Terms

Add: (n) The act of gaining a new friend, and social networking's common currency as in “Dude, thanks for the add”

Block: (v) To configure your social networking service to prevent a particular user from contacting you or viewing your profile.

Cheek-in: (n) In mobile social networking, an electronic message that alerts your group of friends that you have arrived at the local pub and are ready to Party,

Cyberbully: (v) To attack harass or ridicule a fellow community member via posted text, video, or other electronic means.

Defriend: (v) The inverse of adding a friend, and the very epitome of coldness. Same as unfriend.

Faceslam: (v) To ignore a Facebook friend request from someone you don't know and/or wish would just go away.

Facestalk: (v) To scan, jealously, the Face-book profiles and photos of people you know are going out with or are going out with in your dreams.

Friend: (v) To request that another user add you as a friend, sometimes an awkward moment for the social networker.

MySpace Suicide: (n) The act of deleting one's MySpace account forever.

Nudge: (v) On Twitter to send a message notifying someone you follow that they're not posting frequently enough.

Poke: (n) On Facebook a feature that lets other users know that you're looking at their profile, and possibly stalking them.

RL: (n) Real life the world of flesh, bone and face-to-face meetings that existed before the Web browser.

Slurping: (n) The ability of most social networks to import your Web-based mail contacts to see if any are already on the service. Watch out for slurpers that spam every contact with membership invites.

Twitterrhea: (n) A condition resulting in an excess of Twitter posts. For even more Twitter jargon, see the Twitter Fan Wiki's glossary.

*.* Source of Information : April 2008 PC World

Monday, April 14, 2008

Browser Boosters

Web browsers especially Firefox are built with plug-ins in mind. Thousands of these code snippets arc available, but here we present some of the most useful add-ons, plus a few tips that don't require any extra code.

Nuke Web ads: Though decried by many Webmasters for cutting into a lucrative revenue stream. Adblock Plus is practically a mandatory addition to Firefox, due to increasingly onerous glut of Web advertising. OE users can try AdMuncher free for 30 days and then pay $30. Put simply, Adblock Plus blocks ads—not just pop-up, but regular banners, towers, rich-media stuff, and Google ubiquitous advertisements. Adblock Plus doesn't stop everything, but it nabs enough that you'll mice the difference immediately.

Many PCs one set of bookmarks: If use numerous computers, you have undoubtedly had to deal with separate browsers on each of those PCs, each with its own set of bookmarks that must be managed separately. Unless you have a bookmark synchronizer, which is Foxmarks is one of a number of tools that can sync Firefox bookmarks among multiple machines. Just Foxmarks as an add-on to the Firefox installation on each system, never worry about manual syncing again. As a bonus, you can access your book-marks on the Foxmarks Web site, too.

Put an FTP app into Firefox: Even the most casual Web developer needs FTP application, but many of these are cumbersome and they require installing yet another full-blown program. FireFTP turns Firefox into an impromptu and speedy two-way FTP application. Once installed FireFTP appears in the Tools menu. Click it and a new FTP tab opens up offering simple two-pane system that lets you easily copy files between your desktop and your remote site.

Get a handle on downloaded files: If you are a download junkie who always has something in the queue to leech off the Web. You need a download manager to help handle every thing. FlashGet is a free and extremely popular download manager that can help you organize and queue up HTTP, FTP, BitTorrent, and other types of downloads, working in the background and letting you pause and resume downloads. It can even tell your computer to shut itself down when the downloading is done. It works on any browser.

Restore embedded passwords to IE URLs: Several years ago. Microsoft disallowed Internet Explorer to use an embedded password as part of a URL (of the format https://usermune:password@server.com/) when a user goes to a protected Website; instead the person must type in the password manually at the popup log-in screen. (This restriction was a response to phishers' employing phony password fields to deceive unsuspecting users.) Restoring IE's original ability takes a Registry tweak. Run Regedit and browse to the following Registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE

Here create two new DWORD values: iexplore.exe and explorer.exe. Leave the default DWORD value for each of these at '0'. Restart IE.

Grab a hard copy of any Web page: Did you (wet print a hard copy of a Web page only to have it come out garbled, missing images, and otherwise,nigh unreadable? One reason that may happen is because the newfangled Web 2.0 standards don’t play well with 0.1-era printers. Solution: Grab a screen shot of a Webpage and select Print. But how do you do that, when a single page has enough content to fill up three display screens? Simple: Install Screengrab for Firefox, which lets you save a full page, the visible portion of a page or just the tidbit you'd like to keep. IE Screenshot performs similar tricks for the Microsoft browser. Save images as digital files or print them out.

Company Web video: Various Web services let you punch in the URL of a YouTube flick or other Web video and receive a copy you can save to your hard drive. But they're often slow and buggy and you never know if they'll work on less popular video-sharing sites. Orbit Rich Media Downloader adds a context sensitive set of new menu items to your right mouse button in your Web browser. Now when you see a vid on Dailymotion or hear a so on MySpace that you like, just click to save it to your pc.

Save, protected media files: Some Websites cruelly disable the right click button on images and other media, preventing you from easily downloading them. Orbit (see above) is one workaround, but its overkill if all you want to do is to save an image occasionally. Good news: Firefox has a quick built in way to save protected media files with-out the hassle. Visit the Web page you want right click anywhere on the page (not in the image), and select View Page Info. Click the Media tab to see a list of all images on the page; scroll through the list (a preview will appear at the bottom of the window) and click Save As when you find that one you want.

One click to something new: Collected quotes of Albert Einstein? Winners of the “I Look Like My Dog” contest? Pictures of real-life sea monsters? All of these web pages can be yours at the touch of a button if you install StumbleUpon, a plug-in and toolbar available for both Firefox and Internet Explorer. StumbleUpon, like social news sites such as Digg, takes user submissions to point other users to cool stuff on the Web. Click the thumbs button if you like what you see or thumb down if you don't. Over time, StumbleUpon refines its suggestions for you, making it (eventually) the perfect time-waster and one that's always at your fingertips.

Easy access to deals and discounts: Smart shoppers perform a quick search for a coupon code before buying anything online, but forgetting to do so is easy. RegisteredCoupons.com’s toolbar for Internet Explorer simplifies bargain hunting by putting the information right where you're most likely to see it. A utilitarian drop-down box lets you select the retail outlet where you're shopping. Click the store in question and current coupon codes and promotions instantly arrive in their own window.

Relocate the Firefox sidebar: Want to move the sidebar to the right side of your screen? Edit your userChrome.css file or create a new one in your profile/chrome folder. Find it in C:\Documents and Settings\xxxxx\ApplicationData\Mozilla \Firefox\Profiles\yyyyyyyy.default\chrome. where xxxxx is your username, and yyyyyyyy is a random set of eight characters. (If you don't see the Application Data file in your user folder, go to the Tools menu, click FolderOptions and then the View tab and select Show Hidden Files and Folders) Rename the example file there userChrome.css and then add the following code to the bottom of the file:
/* Place the sidebar on the right edge of the
window */
hbox#browser {direction:rtl;}
hbox#browser > vbox {direction:ltr;}

Keep track of Adsense earnings: If you use Adsense on your Web site or blog you can use the Adsense Notifier Firefox plug-in to keep track of your daily earnings within the browser, in real time. Just check the bottom right corner for total ad impressions, CPM and your total daily earnings as they accrue.

*.* Source of Information : April 2008 PC World

Sunday, April 13, 2008

Five Essential Office Add-ons

International Character Toolbar: Add this toolbar to Office to gain one click access to a palette of the most common specie characters used in the foreign language of your choosing. Warning: You may have to sign on to the Office Genuine Advantage program to get this add-oh.

Toolbar Toggle: Not thrilled with Office 2007's radical new "ribbon-design in Lieu of good old menus and toolbars? Toolbar Toggle restores the2003 suite's arrangement. A single-user license costs $20 after a free five-day trial.

Word Frequency Count: This shareware application (full name: Word Frequency Count in Multiple Text &HTML Files) adds up the number of times that every word occurs in multiple text, HTML and Word documents. Unlocking the full utility will cost you$30.

Remove Hidden Data: You probably sometimes receive files filled with embarrassing "track changes” information and personal data that the creator accidentally left in. Don't be that person yourself. Thank Microsoft far this free add-in.

ClearType Tuner: Part of the Windows XP PowerToys suite (and available in an online version as well), this add-on gives you fine-grain control over how fonts look on your LCD screen. You’ll be amazed at how much of a difference a slight alteration in font thick-ness and smoothing can make on your eyes.

*.* Source of Information : April 2008 PC World

Five Essential Browser Add-ons

IE Tab: If you use Firefox as your primary browser, you probably get stymied occasionally by Web sites that don't look right in its windows. Don't fire up Internet Explorer {which maintains a separate history and won't have your bookmarks}; instead, use the IE Tab plug-in to instruct Firefox to temporarily use Internet Explorer's rendering engine. IE Tab resides in the bottom right corner of your browser. Click theFirefox icon to switch to IE mode and vice versa.

Duplicate Tab: Want a Copy of the current window you're visiting, complete with the history of that browsing session? IE users can accomplish this without having to install and use a plug-in: Press -N to open a new window with the entire history of the current window: For Firefox users, duplicate Tab Lets you obtain such a history with a single shortcut key stroke; or you can use the tool to merge multiple open windows into a series of tabs.

ErrorZilla: The standard "server not found" page is useless if you're looking for a Web site that's gone AWOL. ErrorZilia adds a series of buttons to the bottom of the standard “Firefox can't find the server” message, providing instant access to the Wayback machine, Google Cache, Whois lookup, and more.

Inline Search: IE users can obtain search as you type functionality that works the same way it does in Firefox with this free simple extension.

Extended Statusbar: this plug-in supplement the data that Firefox provides about a web page and your Internet connection, providing such details as the total size in KB) of the page, the transfer speed and the toad time.

*.* Source of Information : April 2008 PC World

Saturday, April 12, 2008

Does Your Security Suite Also Protect Your Privacy?

The major suites promise to safeguard your private data, but their protections vary.

PRIVACY CONTROL. Personal information protection. Identity control. All are great-sounding names for features you may have seen in your PC's security suite. But what do they actually do?

To find out, I dug into the privacy features of the top suites from PCWorld's latest security roundup. Symantec Norton Internet Security 2008's Privacy Control (part of its free Norton Add-on Pack), Kaspersky Internet Security 7.0's Privacy Control, McAfee Internet Security Suite's Personal Information Protection, and BitDefender Internet Security Suite 2008's Identity Control.

With Symantec, McAfee. and BitDefender, you must define the information that you want to protect such as Social Security and credit card numbers. Symantec and McAfee never prompt you to do so, but Bit Defender alerts you until you either comply or tell it to stop. With Kaspersky, you don't give any instructions, since it automatically blocks malware that attempts to access your Computer Windows Protected Storage area, including sensitive Web-form information such as credit card numbers,

If the Symantec, McAfee, or BitDefender suite notices that your PC is about to send the information you registered over the Internet, the program blocks the transmission or prompts you to allow or disallow it. Symantec checks Web email and IM connections,

BitDefender scans Web and email traffic, and McAfee handles just Web data. All three are limited to scanning no encrypted connections. So they won't see anything you send to secure sites, but such https:// sites are mostly already protected, and since many Internet service providers accept email only via an encrypted connection, the privacy apps can't scan those messages either. Generally, though they can scan Web based email such as Google's Gmail, because most providers require you to use a secure connection to log in but switch to a none secure connection once you are in.

Symantec and McAfee prompt you to allow sending personal data, and substitute asterisks for the data when you choose to block sending it, BitDefender blocks outright any email or web pages in which you've entered personal data without giving you any option to make it do otherwise, which can be annoying.

If you have Syrnantec's package or McAfee's suite, take the few minutes required to define your sensitive information. I can't think of a site that would ask for such details and not be encrypted, and setting up the privacy protections will allow you to receive warnings. BitDefender's features, however may irritate more than it protects because it doesn't allow sending protected data even if you trust the situation. Kaspersky's feature is both more and toss Limited, since its malware focused approach doesn't require any extra setup but protects only a subset of your information.

*.* Source of Information : April 2008 PC World

Thursday, April 10, 2008

‘Hacker Safe' Seal Under Attack Following Site Breach

Scan Alert
MORE THAN 80,000 Web sites display a small logo proclaiming them "HackerSafe." But the company behind this security seal, ScanAlert, found itself on the defensive recently after technology retailer Geeks.com, which carries the seal, warned some customers that their personal and credit card data may have been compromised by hackers.

ScanAlert's seal is the most widely used, and can be found on dozens of marquee-brand sites, such as Sony's. Its popularity attracted McAfee, which bought ScanAlert last year.

A ScanAlert spokesperson says that "preliminary evidence" suggests the Geeks.com breach, reported to art undisclosed number of customers in January, likely occurred during one of several periods last year when Scan-Alert had withdrawn its certification from Geeks.com after discovering vulnerabilities on the Web site. Nevertheless, the incident has rekindled a debate about the value of such seals. Web site managers say that ScanAlert's automated-scanning service can sniff out some security flaws and that the logo is a valuable marketing tool. Detractors say that it can give companies and customers a false sense of security.

"[The] seals are completely ludicrous,” says David Kennedy of Secure-State. Upon a request for testing from the owners of ten Hacker Safe sites. His company was able to break into and easily access financial and customer data from nine of the ten sites.

McAfee’s Tim Dowling acknowledges that "Hacker Safe is not perfect,” but says that the service does help users defend their sites.

*.* Source of Information : April 2008 PC World

Firefox Plug-Ins Pose Risk

Mozilla plugged a hole that could enable Firefox to leak information like a sieve, owing to a flaw in "flat packed" browser add-ons. Such add-ons—and there are a lot of them at risk—are the kind that are not stored as 'jar' files, The bug allows malicious program to hack into directories on your computer, looking for commonly named files that may contain information such as browser cookies holding user names and passwords.

If you have Firefox automatic up-dates on, you will be prompted to update. Otherwise, head to getfirefox.com to download Firefox version 2.0.0.12.

*.* Source of Information : April 2008 PC World

Wednesday, April 9, 2008

Choosing a Host for an E-Commerce Site

Appropriate disk space and traffic Limits are just the start. Here's what else to look for in your Web hosting package.

IF YOU PLAN to sell products and/or services choosing a host for your e-commerce site is an extremely important decision.

What factor should you consider? Cost, capacity and bandwidth of course — but those numbers don't tell the whole story. When one of my clients noticed that his Web site was going down two or three evenings a week, I discovered that the server hosting it was stored in the closet of a local IT services firm, If a glitch developed during the evening or on the week-end, no one could resolve it until the next business day.

To avoid such problems, look for a Web hosting service that offers 24/7 monitoring by on-site technicians in a major datacenter "Uptime" usually defined as the percentage of time during a given period that a site is accessible on the Internet—is crucial A good hosting service should deliver an uptime of 99.8 percent or better, that's less than 90 minutes of down-time (including Fretwork outages and scheduled maintenance) per month.

A good Web host should be willing to provide recent uptime statistics. Also, you should independently monitor your Website's uptime. Basic State (www. BasicState.com) offers a free service that checks the availability of your Web site every 15 minutes and alerts you when it's down.

If you sell more than a couple of products and services, you’ll want a site with a database, like MySOL, where you can store the details. Your host should support a programming language (such as PHP) to run shopping-cart software too.

An administrative control panel will help you track site visitors and manage your domain's email accounts. Many control panels also help you obtain and install open-source Web apps—say, a forum or chat room—but I prefer to get apps from their source Web sites. That way I know I'm working with the most recent version of the app, and I have access to all available support resources.

SSL and IP Address

To reassure customers about the safety of their data, consider obtaining a Secure Sockets Layer (SSL) certificate to support data encryption and to authenticate your business identity. You may purchase an SSL certificate from your host or from VeriSign. One caveat! You can get an SSL certificate only for a site that has a dedicated IP address, and most consumers IP assign addresses dynamitically – that one reason not to run a Web-based business from your home. Expect to pay extra for a fixed IP address.

If you need a larger site, Virtual Private Servers (VPSs) dedicate a range of memory, storage capacity, and data transmission for it. Typically a VPS server contains far fewer sites than a shared host. If your site keeps growing, you may want to host it on a dedicated server, either managed (your host handles software installations and updates, monitors performance, and the like) or unmanaged (you handle those services, and probably pay a biz Less).

Beware of services that charge unusually tow fees: They may be hosting too many sites or skimping on support.

Monthly fees for a good shared-hosting service should start at about $10. Man-aged dedicated servers start at several hundred dollars; and a VPS account should cost somewhere in between.

*.* Source of Information : April 2008 PC World

Monday, April 7, 2008

Sharing Files Between Windows and Linux

So, your Windows PC is already set up to dual-boot with Ubuntu Linux, and you’ve explored Linux enough to know that you want to live inside it for a while. Problem is, all your files are on an NTFS partition on the Windows half of your machine, and Ubuntu can’t see that partition, no matter what you do. That’s because Microsoft considers the workings of the NTFS fi le system a highly confidential trade secret (unlike the workings of FAT32, for example). What to do?

There’s the old standby of e-mailing the files to you, or uploading them to an FTP site or a Yahoo! Briefcase or some such storage location. It works. But come on—it’s 2008, already. For regular work you need something more direct, and Linux’s development community has come up with multiple ways to work around Microsoft’s roadblocks and help this happen.

Three quick and easy solutions present themselves: NTFS-3G, Samba, and NTFS for Linux. NTFS-3G is a driver that gives Linux users full access to NTFS drives installed on the same PC. Ubuntu’s new Gutsy Gibbon distro includes the driver in the Synaptic Package Manager. Samba (also found through Synaptic) is designed to provide fi le and print services to all SMB clients, including Microsoft Windows. It functions primarily as a network utility, in effect mounting your NTFS drives onto your Linux network. NTFS for Linux is a powerful tool for IT managers, but the personal version gets you simple read/write access.

1. USE THE FILE BROWSER
After installing either Samba or NTFS-3G, use Ubuntu’s File Browser to locate the NTFS partition you want to work with and double-click to open it.

2. CHECK THE VOLUME’S PROPERTIES
The Volume Properties dialog box in Ubuntu shows that this folder has indeed been formatted as NTFS.

3. GO PRO WITH NTFS FOR LINUX
Well-known Windows utility maker Paragon Software (www.paragon-software.com/products.htm) distributes NTFS for Linux, as an IT-targeted tool ($149.95), a full-featured package ($29.95), or a free download. The free version gives access to your Linux partitions but is read-only.

ON THE WINDOWS SIDE: LINUX READER AND EX2 IFS
Two programs provide access to your Linux drives from within Windows. The Linux Reader from DiskInternals (pictured) gives you read-only access and makes you use its included viewer, while Ex2 IFS provides both read and write access from Windows Explorer. But before installing Ex2 IFS, read the site’s troubleshooting page, which lists some issues you might experience (although I had no trouble with either program). Both give access even to protected Linux partitions, ignoring Linux security, so be aware of this before installing.

*.* Source of Information : March 2008 PC Magazine

Sunday, April 6, 2008

MICROSOFT OUTLOOK Tips Find What You’re Looking For

The first step in finding a particular e-mail message is often re-sorting by column date received or sent, subject, sender, or recipient then scrolling. Try this instead in Microsoft Outlook or Outlook Express or even in Outlook web mail: Click on the Name field to sort by name, then type the first letter of the name you’re looking for. The client will jump to names beginning with that letter. Type quickly and you can jump more accurately; if you’re looking for Smith, go straight to smith instead of starting with Sa. This can be faster than Find, particularly if all you remember about a message is the sender, not a unique phrase.

*.* Source of Information : March 2008 PC Magazine

Windows Vista SP1 and Windows XP SP3 Service Pack

I don’t expect Release Candidate 1 of Windows Vista’s Service Pack 1 to be dangerous in any way, but most people should avoid beta service packs nonetheless. Wait for the final version of SP1, available shortly.

The service pack is mostly invisible, making Vista faster and more secure, and of course it adds drivers. It’s not critical, however, the way SP2 was for XP. And Vista SP1 changes little you’d notice in your day-to-day experience. The bulk of the development effort has gone toward upgrading security subsystems—elements that enterprise clients find appealing but consumers and small-business users won’t really notice.

Improvements in security are what really define SP1. First—and particularly important if you’re a group administrator—the Group Management Policy Console (GMPC) has disappeared, and the Group Policy Editor (GPEdit) focuses on local instead of global policy. Second, with SP1 on 64-bit Vista, third-party anti-malware programs gain access to new application-programming interfaces. They allow these programs to extend the Windows kernel directly to provide lower-level detection of malicious code, giving security software a better chance of blocking or deleting such code— a useful advance. SP1 also allows Remote Desktop files to be signed, providing increased security for anyone using the Remote Desktop Protocol to connect with (and control) other PCs. Another enhancement affects, for the most part, only those who’ve purchased computers that shipped with Vista installed. BitLocker, built into the original Vista so that users could encrypt an entire drive, functioned only with the drive the OS boots from. With SP1 you can use BitLocker with any drive—an obvious improvement. BitLocker still requires a Trusted Platform Module (TPM) chip, of course. To see if BitLocker will work, click on the Start button and type bitlocker into the search field. If your system lacks a TPM chip, a message alerts you.

All these improvements will be a good thing. But remember, RC1 is time- limited. According to Microsoft, it “will no longer operate” after June 30, 2008. Does that mean Vista itself will not operate? We’re just not sure. You really will need to uninstall RC1 after that date and move on to the release version of SP1, which is expected in the first quarter of 2008.

XP SP3 APPROACHES Release Candidate 1 of Service Pack 3 for Windows XP is now available in a limited distribution. As with Vista SP1, you probably don’t want to mess with it—yet. It’s an important service pack, though, bringing XP up to date with the latest fixes and some new features. To sum up, some features are upgraded, among them Microsoft Management Console to 3.0, WPA (Wi-Fi Protected Access) to 2, and Internet Explorer to Version 7.

The two new features in SP3 are black hole router detection, in which the networking stack tries to determine whether routers are silently discarding packets, and support for NAP (Network Access Protection), which lets network administrators set policies for system configuration and health. For example, admins can require a client to have specific updates before it is allowed on to the network.

Much like Vista SP1, XP SP3 is an update you’ll almost certainly apply to your PC, but it won’t change your daily computing life. Still, if this really is the end for XP service packs, it’s an important step that will make your machine more secure. Security might not be much fun, but you certainly don’t want to do without it.

*.* Source of Information : March 2008 PC Magazine

Create Microsoft Outlook Appointments Automatically with Microsoft Excel

Do you work on projects whose due dates or events are kept in a spreadsheet? Wish you didn’t have to enter them manually into your Outlook calendar? Maybe you follow a sports team or have a child whose team’s schedule is posted online, and you have to type the times and dates into Outlook? You probably don’t realize it, but Outlook lets you import all these events with very little fuss. The key is to get the data into a Named Range in Excel, and then you can import it as appointments. For spreadsheet data, this is as simple as selecting all the cells you need, right clicking to select Name a Range, and then choosing a name. If the data you want to import is on a Web page in the form of a table, simply select the information on the Web page, copy it, and paste it into an Excel spreadsheet. You can then proceed with the import. One important note: It’s absurd, but Outlook 2007 can’t import Excel 2007 (XLSX) files. If you’re using Office 2007, remember to save your spreadsheet in the 97-2003 formats.

Excel Spreadsheet data1. PREPARE THE DATA
Importing your appointments can be very simple, especially if you format the data well. First, put column names over data, so that it’s easy to specify which data maps to which Outlook fields. If you make those column names the same as Outlook’s own field names (like Location and Subject), then the fields will be mapped for you automatically. Second, if there’s a chance that I won’t recognize the event’s subject, I add a column with some general term that I’ll recognize. For example, the Stanford Tennis calendar I import lists only the Opponent and Date. So I add a column called “Stanford Tennis” as the Subject before I import the events. Finally, I add a column with a term that I import as an Outlook Category. That way if the event’s times and dates are updated, I can simply View by Category and delete all appointments in that category before re- importing the information.

To add alarms to events, title a column “Reminder on/off,” and use the code TRUE to set the alarm. Choose the alarm time with the headings “Reminder date” and “Reminder time”—you can even use formulas to set the reminder date or time to a certain interval before the Start Date or Time.

Import File2. IMPORT THE SPREADSHEET
Importing appointments is fairly straightforward. Simply display your Calendar in Outlook and use the File Import and Export command, selecting Excel worksheet as the fi le type. Once you’ve selected the worksheet, you’ll get a list of named ranges in the fi le. Select the one (or more than one) you want to import. You can then map the columns in your data to Outlook’s native Appointment fields to customize your import. Then simply hit Finish and your appointments will be created.

Outlook Appointment3. CHECK YOUR CALENDAR
Once you’ve imported your events to Outlook, they appear just like any other appointments. For Outlook to get the times right, make sure you have your times and dates in the right format. For example, Outlook will recognize “3:00pm” as a time, but not “3pm.”






*.* Source of Information : March 2008 PC Magazine

AutoCorrect and AutoText in Word 2007

It’s important to distinguish Auto-Text (the correct name of the feature you’re calling Auto Complete) from AutoCorrect. AutoCorrect kicks in when you’ve finished with typing something (as evidenced by typing a space, a period, or other punctuation). AutoText entries appear in a tooltip while you’re typing; pressing Enter accepts the suggested completion. So, for example, typing four characters of your name and then hitting Enter would prompt Auto-Text to insert the whole name.

The problem is that in Word 2007, what was AutoText applies only to dates—type “wedn” or “febr” and you’ll see it. According to Microsoft, the new Building Blocks feature takes over this function for other types of text. To see this feature, click the Insert tab in the Ribbon, click Quick Parts in the text pane, and click Building Block Organizer. Each entry in this dizzying array represents text or formatting that you can invoke by typing the name and pressing F3. Type the wrong name and you may wind up reformatting your document instead of inserting your name. This is progress?

Word 2007Clearly, Microsoft wants you to use AutoCorrect instead of the now-missing AutoText. The first challenge is simply finding the AutoCorrect options. Click the round Office button at the top left and click the Word Options button at the bottom of the resulting window. Now click Proofing in the list at left and click the Auto Correct Options button. Create an AutoCorrect entry to replace the first four letters of your name with your entire name. You’ll have to remember to type a space afterward instead pressing Enter as you had in the past. But it will do the job.

In Word 2007, Microsoft replaced the AutoText feature with something called “Building Blocks.” The new feature is very different, and if you make a mistake, you can wind up reformatting your document instead of inserting your name.

*.* Source of Information : March 2008 PC Magazine

Controlling Defragmentation in Vista

In Windows XP that you could analyze the disk usage of your computer’s hard drive and see which parts of the drive were filled up. You would right-click on a drive, click Properties, go to the Tools tab, and choose Defragment. In the Defragment window you could right-click on a drive and select Analyze. Then a color image would appear at the bottom showing disk usage.

That’s not the Vista Way. In Vista, defragmentation happens automatically in the background without your intervention. Microsoft says it removed the fl ashy analysis report because defragmentation just isn’t something you have to watch. Makes sense to me!

But if you’re desperate to get some kind of analysis even though Vista doesn’t volunteer any, try this: Click Start and type cmd. You’ll see cmd.exe up above in the Start menu. Right-click it and choose Run as administrator. User Account Control will require you to confi rm this action (or supply an Administrator password). In the resulting window enter the command DEFRAG C: -A (that’s A for Analyze). This will yield a simple analysis of drive C:’s fragmentation level, with advice about whether the drive needs defragging. In most cases you won’t need it because defragmentation has already happened in the background.

If you really want to defragment the disk right away, even though DEFRAG has said it’s not needed, you can do that from the same Command Prompt. Simply enter the command DEFRAG C: -F –V (that’s F for Force, V for View). You still won’t see the nice, familiar color image showing fragmented fi les, nonfragmented files, and free space. To get that display, you’ll have to purchase a Vista-compatible third-party defragger such as Diskeeper or PerfectDisk.

Defragmentation in VistaBy default, Vista’s drive defragmentation happens in the background with no user interaction required. But if you’re desperate to perform hands-on defragmentation, it’s still possible.



*.* Source of Information : March 2008 PC Magazine

Turn Excel Data and Charts into JPEGs

In Excel 2003 there’s a little trick. Hold down the Shift key and choose Edit from the menu. Note that instead of Copy it offers Copy Picture— select that item. You’ll be asked whether to copy as Picture or Bitmap, and whether to copy the image As shown on screen or As printed. You’ll almost always want to choose Bitmap and As shown on screen. If you choose Picture, the image will be copied as a resizable Windows Metafile, and not all programs can use that format.

Naturally, it’s different in Excel 2007. To copy a range as a picture, in the Home ribbon’s Clipboard pane click the Down arrow under Paste, choose As Picture from the menu, and then Copy as Picture. (If you’re surprised at having to choose Paste when you want to copy, remember this is coming from the same company that makes you click Start when you want to shut down.) As in Excel 2003, you’ll generally want to copy it as Bitmap and As shown on screen. But wait! In either version it can be easier, much easier. Just highlight the data range, chart, or whatever and press Ctrl-C. Excel puts the data into the clipboard in a variety of formats, so different programs can make use of it. It includes both formatted and unformatted text, as well as a format proprietary to Excel. And it also copies the data area as an image—Excel 2007 supplies four distinct image formats. When you switch to your graphics program and press Ctrl-V, the program will choose the clipboard format that suits it best.

*.* Source of Information : March 2008 PC Magazine

Saturday, April 5, 2008

Determine Your Backup Process

As your storage increases, so do your backup needs.

There are nearly as many ways to backup your business data, as there are ways to lose the data and require that backup. Products available to perform archiving duties range from the venerable tape backup to newer technologies such as hard drive, CD, and DVD, or even remote storage facilities. No matter which you select, the principles of data backup are the same, and it’s important to understand which data needs to get backed up, how often, and for how long.

The first step is pure common sense, yet it is frequently skipped: Conduct a thorough analysis and inventory of existing systems with a focus on data storage. It will be tedious, but you need to catalog the location, owner, and importance of each bit of data.

The alternative is to back up everything, wasting time by writing extraneous files and wasting money on extra media. That “total backup solution” is what a lot of so-called experts advise, probably because they take advice from companies looking to sell more tapes. But you may not have to do it.

A good place to start is simply by listing the directories on each server or storage device in a spreadsheet and then adding columns for the type of data in that directory (the content, not the fi le type— “Contracts” or “Bookmarks,” not DOC or XLS), the owner (who would care if the files were deleted), and whether they are essential to your business. In a more complex environment—for example, an online business that has no off-hours—add another column for a time when no one is using the file and it can be backed up.

This brings up an interesting question: What is essential to your business? For a simple answer, ask yourself, “If I lose that file, could I lose money?” Note that the question is could rather than would; this casts a wider net—better safe than sorry. Next consider your backup schedule; there’s a whole theory and science to backup rotations.

There are three common methods. A full backup includes all fi les whether they have been changed or not; differential includes all files changed since the last full backup; and incremental includes only those files that have changed since the last backup of any kind. (For specific techniques, such as the Tower of Hanoi, see “Backup Methods and Rotation Schemes,” at go.pcmag.com/backupandrotation.) Beyond that, here’s some sound, basic advice for proper business backup.

Back Up Data Every Day, Applications Less Often Save your backups for longer than you think you have to something unexpected always comes up. (Why is it still unexpected? No one knows.) I tend to use an adapted version of Grandfather-Father-Son: I call every third Grandfather an archive and don’t overwrite it.

Test Your Backups. Like many of my clients, I have learned the hard way that just because you set up a job, load a tape, run the job, and even read a successful report does not mean that fi les were actually backed up. Tapes fail (they are mechanical), files are locked and can’t be copied, and software errors do occur. Frankly, backup software is notorious for reporting that everything is satisfactory when in fact the job has failed. As a fail-safe, at least once a month, you should select a few files at random and restore them, making sure not to overwrite newer versions. Then open the files and confirm that they are intact and usable. If you find that they aren’t, you have time to address the problem before an emergency arises. Make sure that you do so.

Always Keep Some Sort of Backup Off Site. The reason for off-site backup is simple: If something physically catastrophic happens at your place of work and your backups are there, they will be rendered inaccessible or destroyed. Store your offsite backup securely, in a lockbox or safe, and update it with a current backup every six months. Protecting something just long enough for someone to steal (or something to destroy) every bit of data your company cherishes is not going to help you.

BACKUP METHODSBACKUP METHODS
Each method has advantages and disadvantages. Some combination of on- and off-site methods is really the safest way to go.



*.* Source of Information : March 2008 PC Magazine

Friday, April 4, 2008

COMODO FIREWALL PRO 3.0 The Best Free Firewall

COMODO FIREWALL PRO 3.0 With its well-thought-out set of protection levels, Comodo Personal Firewall Pro 3.0 can conform to the needs of any user, from novice to über-geek. It also has a sleek new interface and uses significantly less memory than its predecessor. Best of all, it’s free—not just for noncommercial use but for any use—and the company assures us that it will remain so indefinitely.

CPF handles all basic firewall functions. It protects the system against hack attack, controls which programs get Internet access, and resists malware-style assaults that attempt to shut it down. To reduce the number of confirmation pop-ups, it automatically allows nearly a million known-safe programs.

Acting much like the Zone Alarm Firewall feature, CPF proactive Defense+ protects critical system elements. The default Clean PC Mode treats programs already on the hard drive as trusted; all others get serious scrutiny. CPF properly blocked a dozen leak-test utilities, but legitimate software that exhibits similar behavior (such as some PC Magazine utilities) may also be blocked unless installed under a handy special mode that the firewall offers. Analyzing all of a program’s behaviors would help prevent such false positives, but CPF’s single-action behavior monitoring is a fine implementation.

Super-techie users can configure almost every aspect of the program’s behavior, but the average user doesn’t need to touch these advanced configuration options. Its versatility and tough protection make Comodo Firewall Pro 3.0 our Editors’ Choice in free personal firewalls. —Neil J. Rubenking

*.* Source of Information : March 2008 PC Magazine

Thursday, April 3, 2008

How to Protect and Improve System Performance

The Top 10 Points to Know about Fragmentation

IT professionals are heroes of the workplace. Whether with cunning wit or a Phillip’s head screwdriver, they solve most any computer emergency. However, keeping a computer running at top speed is usually preventative maintenance instead of last minute, adrenaline-surging, virus-vaccinating heroics.

Here are 10 key points to maintain peak performance across any network:


1. The hard disk is the slowest part of any system.

Say you are operating a 2.5 GHz processor. That’s 2.5 billion operations every second. A large number of hard disks only spin at 7200 rotations per minute, or 120 cycles per second, or 120 Hz. This means your CPU is more than 20 million times faster than the hard disk. The hard disk still has mechanical components. Think Terminator 2®, when a mechanized Schwarzenegger is outclassed by the faster, smarter T-1000. When the slowest part of your computer is making unnecessary reads, the entire system is dragged down.

2. Fragmentation has severe effects.

It’s more than sluggish and crawling computer speeds; fragmentation leads to crashes, hangs, data errors, file corruption and boot-time failures. Files that suffer fragmentation are more difficult and take longer to back up. When systems are thoroughly defragmented, they run faster and more reliably—period.

3. Real-time defragmentation is necessary.

Many companies rely on 24/7, mission critical servers. Taking these systems offline for maintenance is not an option. But, having a server with I/O bottlenecks is also not an option. Only real-time, invisible defragmentation fixes this catch-22 situation.

4. Give your systems faster than new speeds.

NTFS best-fit attempts for file placement on hard drives are limited. Diskeeper® 2008 comes with a new technology called I-FAAST™ (Intelligent File Access Acceleration Sequencing Technology)1 that re-sequences your files. So, in addition to consolidating free space, defragmenting with Diskeeper boosts access to your most frequently used files by as much as 80%. I-FAAST gives systems faster-than new speeds.

5. Servers are especially susceptible.

While disk striping improves physical I/O capacity and performance, RAID and SAN systems simply do not fix fragmentation where it begins— at the file system. Enormous volumes with heavy read/write activity lead to astronomical fragmentation rates, making RAID and SAN work harder than they should. The efficiency of RAID and SAN may lessen some of the physical effects of fragmentation, but fragmentation is never eliminated. You’ll need to buy more and more equipment to compensate. Sooner or later, the tortoise catches the hare, and your system suffers I/O bottlenecks and slow server speeds.

6. Operate without interrupting productivity.

The new InvisiTasking™ technology makes software transparent. Diskeeper 2008 with InvisiTasking will work invisibly in the background; only using untapped resources. Systems are continually improved without any management or impact on a system’s usability.

7. Defragment despite minimal free space.

The purpose of defragmentation is to restore lost speed and performance. A defrag engine must be able to operate in limited free space, because drives with extremely limited free space are the ones in need of the most help. Diskeeper 2008 handles millions of fragments and can function with as little as 1% free space.

8. Stop fragmentation before it happens.

Diskeeper 2008 comes with Frag Shield™ 2.0, a technology that automatically defends against fragmentation of critical system files. Frag Shield 2.0 prevents crash inducing fragmentation. It’s like Superman® saving the day—two days before there’s problem.

9. Auto-defrag breathes life into systems.

It keeps systems at optimum speeds and eliminates fragmentation-related performance issues. Thoroughly defragging systems adds 2–3 years onto the hardware’s useful life.

10. Analyze your network’s performance.

Poor performance on a remote system can easily be mistaken for a slow network. Get Disk Performance Analyzer for Networks™. This free utility scans networked systems for fragmentation. See for yourself how fragmentation is affecting your systems. This groundbreaking program will provide comprehensive reports on how system speeds will improve with thorough defragmentation. Visit www.diskeeper.com/pcm1 and get this free, must-have utility. Diskeeper 2008 is the only fully-automated defragmentation program. It operates invisibly in the background and it dynamically adapts defragmentation strategies to fit the needs of individual volumes. With new defrag engines, Diskeeper 2008 restores performance on volumes with as little as 1% free space. Get rid of slows, bottlenecks, and fragmentation-induced crashes. Visit www.diskeeper.com/pcm9

*.* Source of Information : March 2008 PC Magazine