Sunday, October 7, 2012

Remove shortcut arrow from desktop icons completely

To remove shortcut arrow from desktop icons in any type of document:

a) Perform instructions described under ‘Remove shortcut arrow from desktop icons’. For your convenience, steps 1 to 3 are reported here.
b) Perform instructions described under ‘Remove shortcut arrow from desktop icons (2)’. For your convenience, steps 4 and 5 are reported here.
c) And finally, do the same with conferencelink, docshortcut, internetshortcut and wshfile.
So, here is a summary of all actions:
1. Start regedit.
2. Navigate to HKEY_CLASSES_ROOT\lnkfile
3. Delete the IsShortcut registry value.
4. Navigate to HKEY_CLASSES_ROOT\piffile
5. Delete the IsShortcut registry value.
6. Navigate to HKEY_CLASSES_ROOT\ConferenceLink
7. Delete the IsShortcut registry value.
8. Navigate to HKEY_CLASSES_ROOT\DocShortCut
9. Delete the IsShortcut registry value.
10.Navigate to HKEY_CLASSES_ROOT\InternetShortcut
11. Delete the IsShortcut registry value.
12. Navigate to HKEY_CLASSES_ROOT\WSHFile
13. Delete the IsShortcut registry value.
14. Close regedit.
Logoff and… Enjoy!




Remove Recycle Bin Icon from Desktop

How to remove Recycle Bin Icon from Desktop

If using XP Pro
Go to START > RUN
Type GPEDIT.MSC
Navagate to USER CONFIGURATION >ADMINISTRATIVE TEMPLATES >Click on DESKTOP,
On the right hand pane find ” Remove Recycle Bin icon on the desktop ” , double left click on it to ENABLE it.
Sorted!
If using XP Home
Create or modify the following registry entry
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel
{645FF040-5081-101B-9F08-00AA002F954E}
REG_DWORD
0×00000001

Disable Error Report In Windows


windows error
Microsoft’s Error Reporting in windows sometimes is disturbing, most of us don’t want to send that error report because it’s of no use.
There’s an easy way to disable Microsoft error report in windows.
Disable Microsoft Error report in Windows XP :
1) Open Control Panel (Start > Control Panel)
2) Open the Problem Reports & Solutions applet Under advanced options and disable error reporting.
Disable Microsoft Error report in Windows Vista :
1) Right click on my computer (Desktop) and click properties
2) Click the Advanced Tab
3) You’ll see a “Error reporting” button at the bottom, click it
4) Select Disable Error Reporting.
And you’re done….!

Saturday, October 6, 2012

How to Increase Website Traffic





Submit your sites to search engines!
Here is the free submission links:

Gooogle.com
http://www.google.com/addurl/?continue=/addurl

MSN.com:
http://beta.search.msn.com/docs/submit.aspx
http://submitit.bcentral.com/msnsubmit.htm

Yahoo.com:
http://search.yahoo.com/info/submit.html

Use the meta tags in a proper way,
add key words and description there at metatags!
Properly give Good Titles for Pages!

here is the Search Engine optimization link:
http://www.submit-it.com/subopt.htm

10 Tips on Using Public Computers Safely

Using public computers at colleges, libraries, Internet cafes, airports, and copy shops can be relatively safe if you heed the following tips.

The browser keeps a copy of many things in its cache and it may be passwords or other sensitive bits of information. The next person on the computer may be savvy enough to recover this information.

Always Log Out

Make sure you log out of Web sites by clicking "log out" on the site. Do not just close the browser and think you are safe. The next person may be able to open the browser and find you are still logged in.

Disable the Autocomplete Feature

Many programs (especially browsers and instant messengers) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.

Internet Explorer

Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.

1. click Tools | Internet Options | Content tab | AutoComplete

3. Click to clear both check boxes having to do with passwords.

Do not Save Passwords

Sometimes this feature is turned on, by mistake or on purpose. Make sure it is not enabled.

Internet Explorer

Go to Tools | Internet Options | Content. In the AutoComplete panel, click the Settings button and verify that the Prompt Me To Save Passwords check box is deselected. None of the other AutoComplete features needs to be enabled either, so deselect them as well.

Firefox

Choose Tools | Options | Security and deselect Remember Passwords For Sites

Do not Leave the Computer Unattended

Especially with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows. Then erase your tracks.

Erase Your Tracks

Web browsers such as Internet Explorer keep a record of your passwords and every page you visit, even after you’ve closed them and logged out.

When you finish your use of a public computer, you should delete all the temporary files and your Internet history.

Internet Explorer 7

Click Tools and then Delete Browsing History > Delete All

Older Internet Explorer

  1. click Tools and then Internet Options
  2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies
  3. Under History, click Clear History
  4. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\username\Local Settings\Temp

Firefox Browser

Go to Tools | Options, click the Privacy tab, and select Always Clear My Private Data When I Close Firefox. By default, this erases your browsing history, download history, saved form information, cache, and authenticated sessions. Click the Settings button and select the options to erase your cookies and saved passwords, too

Clear the Page File

The pagefile is the location on the hard disk that serves as virtual memory in Windows. Its purpose is to swap out data from RAM so that programs can operate as if they have more RAM available than you actually have installed in the computer. Anything that can be stored in memory can be stored in the pagefile. To have this automatically cleared on shutdown, you need to use Local Security Policy.

To access Local Security Policy, open Control Panel, double-click on Administrative Tools, and double-click on Local Security Policy. Then, click Security Options in the right-hand pane and scroll down to Shutdown: Clear Virtual Memory Pagefile. Double-click that item and make sure it’s enabled.

Note: On many public machines you won’t have the rights to get to Local Security Policy, and while this task can also be accomplished from the registry, on these machines you likely won’t be able to use regedit either. In this case, you can delete the page file manually. First you’ll have to change the settings in Windows Explorer. Click View | Folder Options and the View tab, then scroll down and click Show Hidden Files And Folders. Deselect the Hide Protected Operating System Files check box. Now, find the file named pagefile.sys. It is usually (but not always) on the C: drive. Delete it; a new one will be created when the system reboots

Reboot When Finished

When you’re finished using the public computer, the final thing you should do is a hard reboot. This will not only clear the pagefile, if you’ve enabled that option, but it will also clear out everything you did from the physical memory (RAM).

Create a Temporary Email Account

Most email accounts can forward to another one. If you are going away for a few days, create a temporary email account and forward your emails there. Once you are home, shut off forwarding and abandon the temporary email account.

Carry your Own Software

There are many software applications that can run off USB drives. For example, the portable Firefox browser will keep its cache and sensitive data on the USB drive, not the public computer's drive. Also you can save files to the USB drive rather than the public computer's disk drive.

PortableApps website contains a whole suite of portable apps...and they are free.

Watch for Snoops

When you use a public computer, be on the lookout for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.

A cell phone camera or someone with a good memory could capture your information easily. Don't forget people can watch your hands and see what keys you press.

Do not Enter Sensitive Information into a Public Computer

These measures provide some protection against casual hackers who use a public computer after you have. If you can, use a USB drive to store your information.

When you get home, change the passwords of any accounts you logged into while on the road. This will mitigate anyone tampering with your account.

But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief.

If you really want to be safe, avoid entering any sensitive information into any public computer.

Do not Forget to Take your USB drive

It happens. You get in a hurry and leave your USB drive (or floppy) on the public computer. You are forewarned.

Using Wireless Laptops in Public

Wireless laptops present a whole new set of security issues. Read about our laptop security tips.

Laptop Safety Tips


Laptop Security password tips
Do NOT leave your Laptop unattended. Laptops should not be stored in student lockers.Purchase a locking security cable to attach to your laptop around an immovable object.Set your BIOS password. The BIOS is required to boot the computers. If the BIOS is password protected, the computer will not boot (or you will not be able to enter or change the BIOS settings.) Check your laptop manual on how to set your BIOS password. (This is a separate password than a windows password).Regularly change access passwords (both BIOS and e-mail passwords).
1.Never use any option that “remembers” your password so that you do not have to re-enter it the next time you connect
2.Back up key data onto floppy disks. Carry all disks separately from the laptop.
3.Make hard copies of important files and documents.
4.Keep the amount of data stored on your machine to a minimum.
Write down the laptop model type, model number, serial number and specs.Mark your laptop to make it unique and easy to identify (i.e. engraved).

 
Laptop advanced safe tips:
1.Always back up your files.
Any file saved to your file server account (Explore, Learn, Reflect, or Discover) will be backed up daily by Computing Services. However, backing up files on your laptop is your responsibility. With a laptop, you are not only at risk for losing work due to a hard drive failure, but also at risk for losing all your files due to loss or theft.
1.We purchase insurance for all new laptops, but this will only help replace your laptop; your files will be gone permanently.
2.This can be devastating if your laptop is the only place you're storing your dissertation, a grant proposal, your tax records, or any other personal or confidential files.There are several ways to back up files from a laptop.
3.You can save a copy to a floppy or zip disk. If you have a modem, you can e-mail files to your office computer.
4.If you have a network card, you can plug your laptop into the LRDC network and save your files to your file server account.
 
2.Don't save your passwords on your laptop.
remember
e-mail and dial-up software allow users to save their passwords. Although this makes using your laptop convenient and easy, if your laptop is lost or stolen, complete strangers will have total access to your e-mail messages and Internet access.
 
3.Be careful when placing your laptop on an airport .
1.The most common laptop theft scam involves two people working together to steal your laptop directly from the security convener belt. After spotting your laptop carrying case, they get in line for the metal detector directly in front of you.
2.The first thief walks through the security check with no problem.
The second thief has a great deal of trouble, emptying pockets and checking for jewelry several times, which distracts you and the security personnel. At this point, you may have already placed your luggage on the conveyor belt.
3.This allows the first thief to walk away with your laptop, while the second prevents you from walking through the metal detector. To prevent this from happening to you, wait until the last possible moment to put your laptop on the conveyor belt to assure you will be the only person able to pick it up at the other end.
 
4.Label your laptop and all accessories.1.Many people at LRDC have identical laptops. Label or tape your business card to the top of your laptop and to all of your laptop accessories to help prevent someone from accidentally taking your equipment.
 
5.use a laptop carrying cases
2.In addition to being designed to carry all your laptop accessories, laptop carrying cases are designed to provide protection. Newer laptops are more robust, but it's still easy to crack the screen.
3.Replacement screens can cost almost as much as the laptop itself and are not covered by warranties or insurance. Also, repair time will typically be 1-2 weeks.
 
6.Be careful when plugging your laptop.
1.The modem and 10BaseT connections on your laptop look similar. A 10BaseT cable allows you to attach to a local area network. It is wider than a phone line and will not fit into your modem. However, a phone line will easily fit into a 10BaseT connection.
2.This of course will not work and if the phone rings while you have it plugged in, the voltage will be enough to potentially cause severe damage to your laptop. Also, when traveling to other sites, make sure you use an analog line.
3.Digital lines carry more electricity than analog lines and can also irreparably damage your modem.
 
7.Never allow other people to use your laptop.
1.When traveling to another site, it can be very tempting to allow someone to make changes to your network settings in order to allow you to connect to their local area network. This can result in them accidentally wiping out your current dial-up and LRDC network settings.
2.Allowing your children to use your laptop also puts you at risk.
3.If they install programs—especially games, shareware, and screen-savers—you are at risk for software incompatibilities, which can result in computer crashes.
4.This also puts you at an increased risk for computer viruses. Either situation can result in a full-days repair.
 
8.How to maintain laptop(In weather)
It’s that time of year again in North America where temperatures climb and weather becomes erratic. Add to that the possibility of power outages and you have new challenges to face when using your laptop. Take care in warm and hot weather to follow these tips to ensure you use your laptop safely and don’t have any problems with it.

1.Heat Range
1.Most laptop computers operate properly in the safe temperature range of 50 to 95 degrees Fahrenheit or 10 to 35 degrees Celsius.
2.Keep in mind that when bringing a laptop in from the warm hot air, the laptop must cool down to the interior temperature before you use it.
3.By the same token if you use your laptop outdoors, then let the laptop warm up to the outside temperature before starting it up.
2.In Cars

4.Just as you wouldn’t leave people or animals in a car in hot weather, you should not leave your laptop and other mobile gear either.
5.Leaving your laptop closed in a vehicle in hot temperatures will cause damage to your laptop.
6.The heat is not good for the internal components or the external casings.
3.sharp Sun

1.Never leave your laptop where it is exposed to direct sunlight, whether it is in use or shut down.
2.If you must use your laptop outside in bright conditions you can use either:
a laptop glare screen which cuts down on the glare caused by the sun
a laptop hood which cuts down on the amount of light directed at the laptop display.
4.Humidity
1.In warm weather people are fond of saying it’s not the heat itself that bothers them but the dreaded humidity.
2.Humidity is the amount of moisture in the air and the recommended safe range of relative humidity is 10-80%.
3.Moisture can cause damage to the internal components of a laptop and you may not even realize that the damage has occurred.
5.Take it Out1.If you use your laptop in hot temperatures consider using a removable hard drive to store your data on. This way you can help protect your data and ensure that your removable hard drive stays protected from exposure to heat and the sun.
6.Weather Watching
1.In warm, hot weather there are more storms, often with little or no warning and more severe weather occurrences which mobile professionals must face when traveling.
2.Equipment to help protect your mobile gear includes having surge protectors, power investors and spare batteries.
3.External battery charges that don’t require an electrical connection are another wise investment.
7.t Cool
1.Use a laptop stand to disperse heat that your laptop generates.
2.Laptop stands are available in a variety of styles to suit your working needs.
3.There are laptop stands which include fans to help dissipate the heat and keep your laptop working at its best.
Note :Laptop Desks & Laptop Stands
8.Pack it Wisely
1.Using a properly fitted and well-padded laptop case for your mobile gear will help keep it insulated against heat, moisture and direct sunlight.
2.When buying your laptop case make sure all your mobile gear will fit securely and be protected from the effects of weather

9. on the road
3.The newest laptops are powerful, light, and thin enough to fit easily into the slenderest of carry-on baggage. *This makes them a great accessory for flying or any other mode of travel, but also easier to lose or have stolen.
4.It pays to be extra vigilant at airport security checkpoints where thieves know people can be flustered.
5.You should also store your laptop in the seat in front of you, instead of in the overhead compartment when you fly.
6.But even if you're extra careful, it's still possible to lose your laptop.
7.If you spend some time securing your laptop before you go on the road, you could help keep your personal or financial information from falling into the wrong hands.
8.Here are our top tips to help you secure the information on your laptop.
Protect your information If you keep a lot of personal or financial information on your computer, invest in an operating system that includes file protection.
9.Windows Vista and Windows XP Professional have the tools to protect your information through a process called encryption.
10.To learn more, see Encrypt Your Data to Keep It Safe .
11.Protect your laptop with a strong password If you travel with your laptop frequently, you should secure it with a strong password.
12.Check your computer's Help and Support service to learn how to add or change your system password.
13.To find out how to create passwords that are tough for hackers to crack, but easy for you to remember, see Strong passwords: How to create and use them.
14.Back up before you go Always back up your information before you take your laptop on a trip.
15.You can't always avoid the financial loss of your equipment, but you can avoid losing all your information in the process.
16.To learn how to make copies of all of your information using Windows XP, see How to back up manually or by using the Windows XP Backup utility.
For Windows Vista, see Windows Vista: Windows Backup.
If you use Windows Live one care, see Windows Live one care Backup and Restore.

Remember
:-
Delete
e-mails from your in box folder and save important e-mails to a different folder.
Set your Identification: Under settings, choose control Panel. Click Network Icon and click Identification tab. Computer name: Type your Suffolk e-mail address (first 3 letters of last name followed by first 5 digits of your Suffolk ID number) Work group: law laptop Computer Description: your Suffolk e-mail address.

Computer Security Tips & Backup Problems

Computer security is important and one shouldn't take it lightly. Every time you go online without taking any security measure, you're increasing the risk of leaking your private information stored in your computer to an outsider. In this article, I will explain four basic computer security tips that you should know.

New Computer
1)When buying a new computer, it is important for you to turn the firewall on.
2)For example, you're buying a Windows XP operating system computer, what you need to do is turn on the Windows Firewall first before going online.
3)Even though it cannot protect you completely, but it is good enough to protect your PC before you buy a new firewall.
Email
1)Attachments in unknown emails are usually a threat.
2)Never open any attachment from an unknown email. Sometimes, the email subject said something about you getting a greeting card and ask you to click the link inside that email.
3)I've opened this type of email and was attacked by a Trojan horse.
4)Luckily my anti virus aborted the connection.
Update Your Virus Definition
1)Installing an anti virus will not be enough.
2)Constant update is needed so you can receive new virus definition.
3)New threats are being created everyday and updating your virus definition on regular basis is crucial to detect newer threats.
Don't Surf Suspicious Sites
1)Opening a porn site or a warez site will also increase your risk of getting a virus.
2)Application such as cracks and patches from warez sites will also increase your risk.
3)Furthermore, it's illegal.
Using these tips will decrease the risk of getting your private information stolen by an outsider.
4)However, these tips are not enough to protect your computer as this is only a basic computer security tips.
5)Learn more so you can create a virtual wall around your computer.
A Solution to Computer Backup Problems
1)I have only backed up one thing on my computer—my i pod library. This is because my computer suggested that I back up my i pod music.
2)I did it because I had bought numerous songs on i tunes and I wanted to have my songs backed on CDs in case a virus ruined my computer.
3)However, after taking the time to burn a stack of CDs, I decided not to take the time to back up my whole computer because I knew it would take too long.
4)Who wants to sit in front of their computer for a few days to insert CDs and remove burned CDs? However, after my virus protection expired, I decided to look into finding a better back up plan for my computer files.
5)My friend suggested that I buy an external hard drive, but it seemed too expensive on my student budget.
6)I began searching for other options and I found an online backup system that sounded easy to use. Luckily, it was free too! Since I don’t have a lot of time or money,
7)I quickly downloaded the software, installed it, and backed up my files right then.
8)It backed up 2 GB and stored it for as long as I wanted.
9)I decided that I would go to unlimited storage for about $5 per month if I needed to.
10)At first I was a little hesitant about my data being stored on the internet, but there is a private key encryption and a locked file to prevent others from stealing my data (somebody may not want my boring bio paper, but they may think my finances are interesting).
11)After finishing my back up, I spent the rest of the day doing more important tasks rather than burning back up CDs.

Thursday, October 4, 2012

Memory card corrupted? – Easy fixes and solutions


Memory card corrupted? Don’t panic just yet! Often, while transferring data if the memory card is taken out or if the power is shut off, it tends to get corrupted and unusable. We’re going to tell you how to fix corrupted memory cards, using a few common solutions that could solve your problem. But keep in mind that completely destroyed or physically damaged memory cards cannot be fixed easily, neither can data recovery be done from them other than using professional data recovery solutions which can be really expensive. For situations where the memory card is not recognized or cannot be used due to incorrect formatting, here’s what you need to do!
Memory Card Corrupted

Memory Card Corrupted - The Problems

Problem 1 – Memory card can be read but not accessed

When you take out a memory card during data transfer, the file structure can get scrambled and ultimately, your device or PC might not be able to read any data from it. However, the actual data is still present in it. This memory card corrupted can be fixed by the doing the following:
  • Step 1 – Plug in the memory card via an adapter, card reader or any way you can to your computer.
  • Step 2 – Check if the memory card shows up in File Explorer, it most probably won’t be accessible but will have the right file system and everything. Note the drive letter path.
  • Step 3 – Open command prompt, preferably as Administrator and typed “chkdsk x: /r” without the quotes. Here, X is the drive letter of your memory card.
  • Step 4 – Let the process complete. If it asks to “convert lost chains to files”, type “y” for yes.
If only the file structure was damaged but not the files themselves, you will be able to get back all your files and use the memory card like normal again. Yep, the usually annoying CheckDisk tool can fix one memory card corrupted problem!

Problem 2 – Memory card shows invalid file system (RAW)

A corrupted memory card can also lose its file system and cannot be used because it’s not in a file system that Windows recognizes. The simplest solution for this memory card corrupted problem is a format. Here’s how you go about it:
  • Step 1 – Connect your memory card to PC via adapter/card reader.
  • Step 2 – Locate the removable storage media in file explorer, right click it and click “Format”.
  • Step 3 – Set the file system to “FAT”, not FAT32, NTFS, exFAT or anything else as most portable devices are compatible only with the FAT file system. Leave the allocation unit size as it is and uncheck “Quick format”.
  • Step 4 – Click format, let it finish and your memory card should be good as new!
Of course, formatting a memory card erases all data so make sure that you have a backup or you have recovered the data.

Problem 3 – Memory card cannot be read by PC

Even a problem like this one can be fixed quite easily by simply downloading updated drivers from your PC manufacturer. Always make sure you have the latest drivers and updates and if you’re running an assembled PC, grab the latest motherboard drivers.
There could be another problem as well. Newer cards are SDHC (high capacity) and are not readable on regular SD card readers. Make sure to get a SDHC card reader and updated drivers for it installed in your PC if you want to access the memory card on your PC. It’s the same case with the really high capacity SDXC (Extra capacity) cards.
If none of these are the cases, and even after the obligatory plugging in all ports doesn’t work, then do the following:
  • Step 1 – Insert the memory card into the card reader/adapter and plug it in to your PC.
  • Step 2 – Go to Device Manager via Control Panel and look for any devices that show up with a yellow exclamation mark (!).
  • Step 3 (a) – Right click the faulty device and try to automatically update drivers. If you are unable to, uninstall it, remove your device and restart computer. Alternatively, you could also right click and click “Scan for hardware changes” once it’s uninstalled.
  • Step 3 (b) – If your device still doesn’t show up, go to the “View” tab and click “Show hidden devices”. Now you might be able to see more faulty or greyed out devices. Right click, uninstall them and restart your computer with the device unplugged.
  • Step 4 – Once it’s booted up, plug it in again and it should be recognized.
Oh also, make sure that the little lock on the side of your memory card is not engaged

Best Antivirus 2013 for Windows 8 – Top 5


It’s that time of the year, almost all companies have released the 2013 editions of security software and the race for best antivirus 2013 is on! With Windows 8 looming on the horizon, companies have been working overtime to make their software work with Microsoft’s new OS. If you observe, a lot of the products have had a complete makeover to keep in line with Microsoft’s new modern interface as well. Most of the older 2012 editions don’t work with Windows 8, and it’s pretty much mandatory to get a new 2013 edition of security software for people who buy new PC’s or decide to upgrade to Windows 8. So without further ado, here’s our best antivirus 2013 for Windows 8!

The 5 best antivirus 2013 for Windows 8:

AVG Anti-Virus 2013
Long time AVG users will see that there’s a big change in the 2013 edition of AVG Anti-Virus. With a new Metro based look, AVG remains a great solution at blocking malware and has a pretty good firewall as well. Heuristics suffers a bit though, and it lets some malware go unnoticed. The other downside is that AVG Anti-Virus 2013 is difficult to install and run on already malware infested computers, it’s better at keeping threats at bay than actually fighting them. Malware cleanup is also good, on par with BitDefender. If you’re an AVG fan and are mostly looking at keeping the nasties away, AVG Anti-Virus 2013 is a good choice. The interface of AVG’s free and paid antivirus is the same.
Best Antivirus 2013 for Windows 8 - AVG
Kaspersky Anti-Virus 2013
The Russian giant hasn’t changed much from the 2012 edition visually, but Kaspersky Anti-Virus 2013 remains attractive and has a few new tricks up it’s sleeve. With excellent malware detection and cleanup rates, Kaspersky makes a bold statement for the best antivirus 2013 for Windows 8. The Kaspersky Network constantly updates the program about threats, so you can rest easy knowing that even the newest threats will be accounted for. Installation is easy even on infected systems and the anti-phishing works well too. The ability to block programs from exploiting a vulnerability and fix common problems like a disabled task manager, registry editor etc. due to malware is great. But Kaspersky can be a bit too intrusive with some files and deleted them without asking. Furthermore, scans are rather long and most disinfection procedures will require a restart which will be done without asking, so better not do any work during that time. Overall great protection, but slightly heavy on the resources.
Best Antivirus 2013 for Windows 8 - Kaspersky
BitDefender Antivirus Plus 2013
BitDefender products continue to be excellent at malware detection and removal but have started becoming bloated of late. Amongst the five best antivirus 2013 for Windows 8 listed here, it’s the heaviest on resources, weighing in at almost 850 MB! Nevertheless, it provides great protection and the Rescue Mode is a fantastic addition which lets you boot into an alternate OS and perform a cleanup. Speaking of which, cleanup is thorough but takes quite a long time and it can cause problems with missing Windows files and such. It still remains a bit too intrusive and often flags safe programs and services as malicious. The bonus features are good, the vulnerability checker looks for any weak passwords, browser and program vulneratbilities and offers fixes. Anti-phishing works well too. If you’re okay with a slightly heavy but feature rich program protecting you, BitDefender Antivirus 2013 is for you!
Best Antivirus 2013 for Windows 8 - BitDefender
Webroot SecureAnywhere AntiVirus 2013
Webroot SecureAnywhere AntiVirus 2013 isn’t as well known as the other names here, but it has the distinction of being a really unique product. What’s so great you ask? How less resources it consumes and yet how much protection it offers. The installer clocks in at less than 3 MB and the total space used is around 15 MB! It still doesn’t skimp on the protection though, malware detection and cleanup are still top notch. It uses a unique system in which most of the files are stored on a remote server and thus there’s hardly anything actually on your computer. Scans are blazingly fast, and even complete hard drive scans which take 40 minutes on other programs are done in under a minute. While it omits some features like anti-phishing and parental control, we can’t really complain due to the tiny size it and protection it offers. Webroot SecureAnywhere AntiVirus 2013 does a great job of the core protection but doesn’t have many bonus features. So if you have an old computer bogged down by resource intensive programs, and just for the new technology it uses, we can’t recommend Webroot’s offering more.
Best Antivirus 2013 for Windows 8 - Webroot
Norton AntiVirus 2013
Norton has been facing a lot of flak over bloated and non performing software, but since 2011 editions it has really improved. The 2013 edition is a complete refresh and now features will be rolled out any time during the year instead of just with new editions. The interface has been changed keeping the Metro UI in mind. Norton AntiVirus 2013 installs easily on malware infested systems and even comes with a bootable utility to fix particularly troublesome malware. With almost 100% detection and removal rates of all kinds of malware including trojans, rootkits and excellent behavorial analysis, Norton rarely flags safe programs as suspicious. Blocking rates are very slightly behind competitors like Kaspersky and BitDefender, but the vulnerability detector built in is really very strong. The Norton toolbar also comes with Identity Safe which provides anti-phising features and keeps passwords safe. Norton AntiVirus 2013 is amongst the best antivirus 2013 for Windows 8, and offers great protection from threats old and new without being a resource hog. The only downsides are slow scan times and slightly less malware removal abilities compared to the top competitors. Overall, Norton AntiVirus 2013 is great security software that you can trust!
Best Antivirus 2013 for Windows 8 - Norton
So there you have it, our list of the 5 best antivirus 2013 for Windows 8!

Tuesday, October 2, 2012

Mozilla Firefox shortcut keys

Below is a listing of all the major shortcut keys in Mozilla Firefox. See the computer shortcut page if you are looking for other shortcut keys used in other programs.
Shortcut Keys    Description
Alt + Home    Go to home page.
Alt + Left Arrow    Back a page.
Backspace    Back a page.
Alt + Right Arrow    Forward a page.
F5    Refresh current page, frame, or tab.
F11    Display the current website in full screen mode. Pressing F11 again will exit this mode.
Esc    Stop page or download from loading.
Ctrl + (- or +)    Increase or decrease the font size, pressing '-' will decrease and '+' will increase.
Ctrl + Enter    Quickly complete an address. For example, type computerhope in the address bar and press CTRL + ENTER to get http://www.computerhope.com.
Shift + Enter    Complete a .net instead of a .com address.
Ctrl + Shift + Enter    Complete a .org address.
Ctrl + Shift + Del    Open the Clear Data window to quickly clear private data.
Ctrl + D    Add a bookmark for the page currently opened.
Ctrl + I    Display available bookmarks.
Ctrl + J    Display the download window.
Ctrl + N    Open New browser window.
Ctrl + P    Print current page or frame.
Ctrl + T    Opens a new tab.
Ctrl + F4 or Ctrl + W    Closes the currently selected tab.
Ctrl + Shift + T    Undo the close of a window.
Ctrl + Tab    Moves through each of the open tabs.
Spacebar    Moves down a page at a time.
Shift + Spacebar    Moves up a page at a time.
Alt + Down arrow    Display all previous text entered in a text box and available options on drop down menu.