What is HSDPA?

Tuesday, November 24, 2009

High-Speed Downlink Packet Access (HSDPA) is also known as High-Speed Downlink Protocol Access. HSDPA is a protocol for mobile telephones. It is a third-generation (3G) High-Speed Packet Access technology designed to speed up network capacity and data transmission rate of cellular phones.

HSDPA is associated with various Universal Mobile Telecommunications System (UMTS) networks. These include the Global System for Mobile (GSM) Communications.

Currently, HSDPA can support speeds ranging from 1.8 Mbps to 14.4 Mbps. While this is not very fast compared to various wired networks, it is a major milestone considering the speed available to cellular technology.

Although HSDPA is mostly identified with its downlink speeds, it also has the ability to greatly expand transfer capacity. HSDPA networks can transfer up to 30 GB of data monthly and as much as 300 minutes of cellular television viewing and 1000 minutes of talk time.
Current HSDPA Technology

At present, there are 100 HSDPA-capable networks operating in 54 countries worldwide. A large number of these networks offer 3.6 Mbps downlink speeds. However, more networks are beginning to switch to faster 7.2 Mbps downlink speeds. Only a number of networks presently offer a full 14.4 Mbps speed

HSDPA competes with a rival format, the Evolution Data Optimized (EVDO) provided by Code Division Multiple Access (CDMA) cellular providers.
HSDPA Capable Devices

Aside from having a cellular plan with a company offering HSDPA access, the only requirement for logging into the HSDPA network is having a cellular device capable of using the technology. A current total of 171 handset models and other mobile devices can use an HSDPA network. Some of these HSDPA capable devices are famous cellular brand and model names such as the Nokia N95, the Palm Treo 750, and the Motorola RAZR as well as many of its various versions.

In addition to the various HSDPA handsets in the market, several HSDPA notebooks and laptops with access to the data network are available. Such products are offered by several major computer manufacturers including Dell, Acer, Hewlett-Packard, Siemens, Fujitsu, Panasonic, and Lenovo.
Future HSDPA Technology

Although 14.4 Mbps is the current cap on downlink speed over HSDPA, networks are preparing to be upgraded with a new type of HSDPA system. Dubbed as HSPA Evolved, this new HSDPA technology is designed to increase download speeds to 42 Mbps upon release, with the possibility of reaching greater speed values in the future.

Custom Search

Free Website Hosting

Computer Network Security

Thursday, October 22, 2009

Whether a business is large or small, computer network security is always a major concern. Networks are a series of interconnected computers. Connecting these systems yield some important benefits including the ability to share files or to share an Internet connection. The need to keep these systems secure has become a necessary fact of life in today's business world. Achieving business computer security involves keeping users who are not authorized to enter a system from gaining access. Equally important is the detection of intruders or other types of malicious use within the system. If intrusion is detected, a trained professional can find out how much damage has been done and take steps to repair this damage. Obviously, taking preventative measures before an attack can occur are a top priority for any organization. The risks to valuable information, not to mention the potential loss of business in the event of a successful attack, make the implementation of solid safety measures a mandatory step in building successful businesses.

The fact that an outsider could gain control of another person's PC without that person knowing it is an unfortunate reality. Individuals who use their system for personal work and communication value their privacy. Business owners do as well, and all the more so since their livelihood depends on a well defended system. Once an intruder gains access to a system or network, they can gain control of the device, use it to hack into other systems, or examine confidential records. These hackers can also do malicious damage, reformat hard drives or make changes in important data. Many software programs work to provide business computer security, but even as these programs are developed, malevolent intruders look for ways to take advantage of any weaknesses. Businesses need to know that confidential information will only be available to staff and employees who need access and that access should be available whenever it is needed. Changes in this information should only be made by authorized staff. An efficient security system should make sure that these important needs are continually met. Other risks could include hard disk failure, or physical damage to a system.

Achieving computer network security in the business world is generally best handled by an information technology professional or specialist in this area. In addition to confidentiality, integrity, and availability risks, there are any number of attacks that a business network faces. Other assaults could include attacks against Internet protocol as well as Internet protocol spoofing. In these attacks, an intruder impersonates a host or IP address that does not belong to them. Another method of harassment is the Internet protocol session hijacking. In an IP session hijacking, a hacker can see what a user is doing and take over control in anyway the hacker wishes. A major danger of this type of attack is that the user is generally not even aware that the intrusion has taken place. A skilled professional in computer network security will know how to prevent attacks like this.

Another type of assault on business computer security could come in the form of a DoS, or denial of service attack. This intrusion basically consists of sending multiple requests that overload a system. For example, if the host system can only process six hundred requests per minute, the attacker might create a program that will send seven hundred requests per minute. Stopping these attacks while still maintaining the ability to process legitimate requests can be a challenge. Up to date protection software can go a long way toward preventing such intrusions. More destructive aggression against a system could come in one of these two categories, data diddling or data destruction. The data diddler presents a major threat to computer network security by fooling with important information and making malicious but undetected changes. Not only is the problem difficult to detect until after the damage has been done, but it can also be very difficult to trace and locate the perpetrator. Data destruction happens when a hacker gains access to a system and then randomly damages or deletes important information. Other threats could include back door attacks, e-mail spoofing, Trojan horse programs, and viruses. Having an efficient system of data backup is an important protective step.

There are a number of precautionary measures that can be taken to insure computer network security. Anti-virus programs are a must and should be programmed to check for updates automatically and on a regular basis. Spyware and adware detectors are also vital tools that should not be ignored. These programs should also be updated on a regular basis to remain effective. A good firewall is an absolute necessity. Any programs that can be run from the Internet should be checked for viruses before they are installed or run. Extreme care should be taken in opening attachments to e-mails and all e-mails should be scanned for viruses. Important documents, files or e-mails should be protected by passwords. Frequent and extensive data back-up is crucial. Recovery plans in the event of a system crash should also be in place. Hackers can gain access to a system through a variety of ways including Internet connections or even by access to the actual device. Malicious attacks can come from the inside of an organization as well as from the outside. Whatever the source of attack, wise planning for business computer security will pay off in the long run.

Custom Search

Free Website Hosting

Speed up Mozilla Firefox

Tuesday, September 8, 2009

Speed up Mozilla Firefox
3-30x Faster!

1. Type in the address bar of Mozilla Firefox, "about: config"
Scroll down, find the following entries:
Normally the browser requests to the web page one time.
If you enable pipelining, the browser will request several times in a single moment,
This will speed up page loading.

2. Fill in the following entries:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to any number, 30 (for example).
This will make the browser do 30 requests at a time.

3. Right-click anywhere inside the browser page, and select New-> Integer.
Give the name "nglayout.initialpaint.delay", and set its value to "0".
Value = count the waiting time before your browser reacts to reply to the information.
It would be more felt when using a broadband connection, loading pages can be 2-30x more fast.

Try it ..

step 1

step 2

step 3

step 4

step 5

step 6

Custom Search

Free Website Hosting

Information Technology

Sunday, August 9, 2009

Information technology, as defined by the Information Technology Association of America

(ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." Encompassing the computer and information systems industries, information technology is the capability to electronically input, process, store, output, transmit, and receive data and information, including text, graphics, sound, and video, as well as the ability to control machines of all kinds electronically.

Information technology is comprised of computers, networks, satellite communications, robotics, videotext, cable television, electronic mail ("e-mail"), electronic games, and automated office equipment. The information industry consists of all computer, communications, and electronics-related organizations, including hardware, software, and services. Completing tasks using information technology results in rapid processing and information mobility, as well as improved reliability and integrity of processed information.

History of Information Technology

The term "information technology" evolved in the 1970s. Its basic concept, however, can be traced to the World War II alliance of the military and industry in the development of electronics, computers, and information theory. After the 1940s, the military remained the major source of research and development funding for the expansion of automation to replace manpower with machine power.

Since the 1950s, four generations of computers have evolved. Each generation reflected a change to hardware of decreased size but increased capabilities to control computer operations. The first generation used vacuum tubes, the second used transistors, the third used integrated circuits, and the fourth used integrated circuits on a single computer chip. Advances in artificial intelligence that will minimize the need for complex programming characterize the fifth generation of computers, still in the experimental stage.

The first commercial computer was the UNIVAC I, developed by John Eckert and John W. Mauchly in 1951. It was used by the Census Bureau to predict the outcome of the 1952 presidential election. For the next twenty-five years, mainframe computers were used in large corporations to do calculations and manipulate large amounts of information stored in databases. Supercomputers were used in science and engineering, for designing aircraft and nuclear reactors, and for predicting worldwide weather patterns. Minicomputers came on to the scene in the early 1980s in small businesses, manufacturing plants, and factories.

In 1975, the Massachusetts Institute of Technology developed microcomputers. In 1976, Tandy Corporation's first Radio Shack microcomputer followed; the Apple microcomputer was introduced in 1977. The market for microcomputers increased dramatically when IBM introduced the first personal computer in the fall of 1981. Because of dramatic improvements in computer components and manufacturing, personal computers today do more than the largest computers of the mid-1960s at about a thousandth of the cost.

Computers today are divided into four categories by size, cost, and processing ability. They are supercomputer, mainframe, minicomputer, and microcomputer, more commonly known as a personal computer. Personal computer categories include desktop, network, laptop, and handheld.

Information Technology's Role Today

Every day, people use computers in new ways. Computers are increasingly affordable; they continue to be more powerful as information-processing tools as well as easier to use.

Computers in Business One of the first and largest applications of computers is keeping and managing business and financial records. Most large companies keep the employment records of all their workers in large databases that are managed by computer programs. Similar programs and databases are used in such business functions as billing customers; tracking payments received and payments to be made; and tracking supplies needed and items produced, stored, shipped, and sold. In fact, practically all the information companies need to do business involves the use of computers and information technology.

On a smaller scale, many businesses have replaced cash registers with point-of-sale (POS) terminals. These POS terminals not only print a sales receipt for the customer but also send information to a computer database when each item is sold to maintain an inventory of items on hand and items to be ordered. Computers have also become very important in modern factories. Computer-controlled robots now do tasks that are hot, heavy, or hazardous. Robots are also used to do routine, repetitive tasks in which boredom or fatigue can lead to poor quality work.

Computers in Medicine Information technology plays an important role in medicine. For example, a scanner takes a series of pictures of the body by means of computerized axial tomography (CAT) or magnetic resonance imaging (MRI). A computer then combines the pictures to produce detailed three-dimensional images of the body's organs. In addition, the MRI produces images that show changes in body chemistry and blood flow.

Computers in Science and Engineering Using supercomputers, meteorologists predict future weather by using a combination of observations of weather conditions from many sources, a mathematical representation of the behavior of the atmosphere, and geographic data.

Computer-aided design and computer-aided manufacturing programs, often called CAD/CAM, have led to improved products in many fields, especially where designs tend to be very detailed. Computer programs make it possible for engineers to analyze designs of complex structures such as power plants and space stations.

Integrated Information Systems With today's sophisticated hardware, software, and communications technologies, it is often difficult to classify a system as belonging uniquely to one specific application program. Organizations increasingly are consolidating their information needs into a single, integrated information system. One example is SAP, a German software package that runs on mainframe computers and provides an enterprise-wide solution for information technologies. It is a powerful database that enables companies to organize all their data into a single database, then choose only the program modules or tables they want. The freestanding modules are customized to fit each customer's needs.


Computer software consists of the programs, or lists of instructions, that control the operation of a computer. Application software can be used for the following purposes:

  • As a productivity/business tool
  • To assist with graphics and multimedia projects
  • To support household activities, for personal business, or for education
  • To facilitate communications

Productivity Software Productivity software is designed to make people more effective and efficient when performing daily activities. It includes applications such as word processing, spreadsheets, databases, presentation graphics, personal information management, graphics and multimedia, communications, and other related types of software. Word-processing software is used to create documents such as letters, memos, reports, mailing labels, and newsletters. This software is used to create attractive and professional-looking documents that are stored electronically, allowing them to be retrieved and revised. The software provides tools to correct spelling and grammatical mistakes, permits copying and moving text without rekeying, and provides tools to enhance the format of documents. Electronic spreadsheet software is used in business environments to perform numeric calculations rapidly and accurately. Data are keyed into rows and columns on a worksheet, and formulas and functions are used to make fast and accurate calculations. Spreadsheets are used for "what-if" analyses and for creating charts based on information in a worksheet. A database is a collection of data organized in a manner that allows access, retrieval, and use of that data. A database management system (DBMS) is used to create a computerized database; add, change, and delete data; sort and retrieve data from the database; and create forms and reports using the data in the database. Presentation graphics software is used to create presentations, which can include clip-art images, pictures, video clips, and audio clips as well as text. A personal information manager is a software application that includes an appointment calendar, address book, and notepad to help organize personal information such as appointments and task lists. Engineers, architects, desktop publishers, and graphic artists often use graphics and multimedia software such as computer-aided design, desktop publishing, video and audio entertainment, and Web page authoring. Software for communications includes groupware, e-mail, and Web browsers.


Information processing involves four phases: input, process, output, and storage. Each of these phases and the associated devices are discussed below.

Input devices: Input devices include the keyboard, pointing devices, scanners and reading devices, digital cameras, audio and video input devices, and input devices for physically challenged users. Input devices are used to capture data at the earliest possible point in the workflow, so that the data are accurate and readily available for processing.

Processing: After data are captured, they are processed. When data are processed, they are transformed from raw facts into meaningful information. A variety of processes may be performed on the data, such as adding, subtracting, dividing, multiplying, sorting, organizing, formatting, comparing, and graphing. After processing, information is output, as a printed report, for example, or stored as files.

Output devices: Four common types of output are text, graphics, audio, and video. Once information has been processed, it can be listened to through speakers or a headset, printed onto paper, or displayed on a monitor. An output device is any computer component capable of conveying information to a user. Commonly used output devices include display devices, printers, speakers, headsets, data projectors, fax machines, and multifunction devices. A multifunction device is a single piece of equipment that looks like a copy machine but provides the functionality of a printer, scanner, copy machine, and perhaps a fax machine.

Storage devices: Storage devices retain items such as data, instructions, and information for retrieval and future use. They include floppy disks or diskettes, hard disks, compact discs (both read-only and disc-recordable), tapes, PC cards, Smart Cards, microfilm, and microfiche.

Information and Data Processing

Data processing is the input, verification, organization, storage, retrieval, transformation, and extraction of information from data. The term is usually associated with commercial applications such as inventory control or payroll. An information system refers to business applications of computers and consists of the databases, application programs, and manual and machine procedures and computer systems that process data. Databases store the master files of the business and its transaction files. Application programs provide the data entry, updating, and query and report processing. Manual procedures document the workflow, showing how the data are obtained for input and how the system's output is distributed. Machine procedures instruct the computers how to perform batch-processing activities, in which the output of one program is automatically fed into another program. Daily processing is the interactive, real-time processing of transactions. Batch-processing programs are run at the end of the day (or some other period) to update the master files that have not been updated since the last cycle. Reports are printed for the cycle's activities. Periodic processing of an information system involves updating of the master files— adding, deleting, and changing the information about customers, employees, vendors, and products.


Cannings, Terence, and Finkel, Leroy. (1993). The Technology Age Classroom. Wilsonville, OR: Franklin, Beedle, & Associates.

New Book of Knowledge, The; (1994). Danbury, CT: Grolier.

Saettler, Paul. (1990). The Evolution of American Educational Technology. Englewood, CO: Libraries Unlimited.

Shelly, Gary, Cashman, Thomas, Vermaat, Misty, and Walker, Tim. (1999). Discovering Computers 2000: Concepts for a Connected World. Cambridge, MA: Course Technology.

Swanson, Marie, Reding, Elizabeth Eisner, Beskeen, David W., and Johnson, Steven M. (1997). Microsoft Office 97 Professional Edition—Illustrated, A First Course. Cambridge, MA: Course Technology.

Webster, Frank, and Robins, Kevin. (1986). Information Technology—A Luddite Analysis. Norwood, NJ: Ablex.


Custom Search

Free Website Hosting


Thursday, July 30, 2009

DEFINITION - Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carrythe signal over part or all of the communication path. Some monitoring devices, such as intrusionalarms, employ acoustic waves at frequencies above the range of human hearing; these are also sometimes classified as wireless.

The first wireless transmitters went on the air in the early 20th centuryusing radiotelegraphy (Morse code). Later, as modulation made it possible to transmit voicesand music via wireless, the medium came to be called "radio." With theadvent of television, fax, data communication, andthe effective use of a larger portion of the spectrum, the term "wireless" hasbeen resurrected.

Common examples of wireless equipment in use today include:

  • Cellular phones and pagers -- provide connectivity for portable and mobile applications, both personal and business
  • Global Positioning System (GPS) -- allows drivers of cars and trucks, captains of boats and ships, and pilots of aircraft to ascertain their location anywhere on earth
  • Cordless computer peripherals -- the cordless mouse is a common example; keyboards and printers can also be linked to a computer via wireless
  • Cordless telephone sets -- these are limited-range devices, not to be confused with cell phones
  • Home-entertainment-system control boxes -- the VCR control and the TV channel control are the most common examples; some hi-fi sound systems and FM broadcast receivers also use this technology
  • Remote garage-door openers -- one of the oldest wireless devices in common use by consumers; usually operates at radio frequencies
  • Two-way radios -- this includes Amateur and Citizens Radio Service, as well as business, marine, and military communications
  • Baby monitors -- these devices are simplified radio transmitter/receiver units with limited range
  • Satellite television -- allows viewers in almost any location to select from hundreds of channels
  • Wireless LANs or local area networks -- provide flexibility and reliability for business computer users

Wireless technology is rapidly evolving, and is playing an increasingrole in the lives of people throughout the world. In addition, ever-larger numbersof people are relying on the technology directly or indirectly. (It has beensuggested that wireless is overused in some situations, creating a social nuisance.) More specialized and exotic examples of wireless communications and control include:

  • Global System for Mobile Communication (GSM) -- a digital mobile telephone system used in Europe and other parts of the world; the de facto wireless telephone standard in Europe
  • General Packet Radio Service (GPRS) -- a packet-based wireless communication service that provides continuous connection to the Internet for mobile phone and computer users
  • Enhanced Data GSM Environment (EDGE) -- a faster version of the Global System for Mobile
  • (GSM) wireless serviceUniversal Mobile Telecommunications System (UMTS) -- a broadband, packet-based system offering a consistent set of services to mobile computer and phone users no matter where they are located in the world
  • Wireless Application Protocol (WAP) -- a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access
  • I-Mode -- the world's first "smart phone" for Web browsing, first introduced in Japan; provides color and video over telephone sets
Wireless can be divided into:
  • fixed wireless -- the operation of wireless devices or systems in homes and offices, and in particular, equipment connected to the Internet via specialized modems
  • Mobile wireless -- the use of wireless devices or systems aboard motorized, moving vehicles; examples include the automotive cell phone and PCS (personal communications services)
  • Portable wireless -- the operation of autonomous, battery-powered wireless devices or systems outside the office, home, or vehicle; examples include handheld cell phones and PCS units
  • IR wireless -- the use of devices that convey data via IR (infrared) radiation; employed in certain limited-range communications and control systems

Custom Search

Free Website Hosting

GSM Technology

Wednesday, April 29, 2009

What is GSM?
GSM (Global System for Mobile communications) is an open, digital cellular technology used for transmitting mobile voice and data services.

What does GSM offer?
GSM supports voice calls and data transfer speeds of up to 9.6 kbit/s, together with the transmission of SMS (Short Message Service).

GSM operates in the 900MHz and 1.8GHz bands in Europe and the 1.9GHz and 850MHz bands in the US. The 850MHz band is also used for GSM and 3G in Australia, Canada and many South American countries. By having harmonised spectrum across most of the globe, GSM’s international roaming capability allows users to access the same services when travelling abroad as at home. This gives consumers seamless and same number connectivity in more than 218 countries.

Terrestrial GSM networks now cover more than 80% of the world’s population. GSM satellite roaming has also extended service access to areas where terrestrial coverage is not available.

GSM Roaming

Roaming is defined as the ability for a cellular customer to automatically make and receive voice calls, send and receive data, or access other services when travelling outside the geographical coverage area of the home network, by means of using a visited network.

Roaming is technically supported by mobility management, authentication and billing procedures. Establishing roaming between network operators is based on - and the commercial terms are contained in - Roaming Agreements.

If the visited network is in the same country as the home network, this is known as National Roaming. If the visited network is outside the home country, this is known as International Roaming (the term Global Roaming has also been used).

If the visited network operates on a different technical standard than the home network, this is known as Inter-standard roaming.

GSM Roaming, which involves roaming between GSM networks, offers the convenience of a single number, a single bill and a single phone with worldwide access to over 219 countries. The convenience of GSM Roaming has been a key driver behind the global success of the GSM Platform.

GSM Coverage Maps is a unique resource containing information supplied and approved by the members of the GSM Association.

Network, Services and Roaming information are continually updated to reflect the evolving situation worldwide. Interactive coverage maps, updated quarterly, allow you to navigate to see where exactly you can use your phone.

These definitions are provided simply to help industry discussion and do not indicate the scope of activities within the GSM Association.

Custom Search

Free Website Hosting

3G Technology

3G is one of the latest technologies to be incorporated into mobile devices today. With 3G people are able to gain access to data and information at almost anytime and from any place.

What is 3G?

3G (Third Generation) is also known as UMTS (Universal Mobile Telecommunications System) and is said to be the next generation of mobile network. 3G is described by Cellular (2004) as being a generic name for a set of mobile technologies which comprise a host of high-tech infrastructure networks, handsets, base stations, switches and other equipment. This technology enables cell phones to offer high-speed Internet access, data, video and CD-quality music services.

The introduction of 3G

3G cellular phones were first launched in Japan in October 2001 and were introduced into South Africa in December 2004. This phone was designed so users would be able to surf the Internet, view pictures of the people they are talking to, watch movies and listen to music on their handsets (BBC News, 2001).

The difference between 3G and GPRS

GPRS and 3G serve similar functions but 3G data services are the next step up from GPRS (Vodacom, 2004). The main difference between these two technologies is that 3G is able to achieve significantly faster data transfer rates and this enables one to work faster. 3G offers speeds of up to 384 kilobits per second – that is up to 7 times faster than a standard dial-up connection (Orange, 2005). For more information on GPRS websites see our GPRS article.

What are the benefits of 3G?

With 3G you can do everything you do now, but you can do it much better, a lot faster and from almost anywhere! Some of the main advantages are that 3G allows for higher call volumes and supports multimedia data applications such as video and photography (3G Newsroom.com, n.d).

The effects of 3G on society

Some of the latest features which have been brought about by this technology are mentioned by Orange (2005) and include:
  • Video calling
With 3G you can now actually see the person on the other side! As long as both people have a 3G phone you no longer have to imagine what they look like and you can see them face-to-face via your cell phone’s screen.
  • Obtaining information and news
With 3G technology it is possible to access any site on the Internet by using your phone as a modem with your laptop. You can use your favourite search engines to find information on the weather, the daily news, stocks and shares, or practically any other information you require to ensure that you are continually on top of things.
  • E-mail
Should you have left your office and forgotten to send an important e-mail, you are now able to quickly and efficiently perform this function directly by using your cell phone. Alternatively, you can use your cell phone as a modem to be connected to your laptop or PDA (Personal
Digital Assistant).

  • Games
Since the invention of cell phones, games have always formed a part of mobile devices. As technology has developed, the games we are able to engage in have become far more interactive, exciting and entertaining. For those who play games over their mobile devices for recreation purposes or for those who simply play to pass the time, 3G now makes it possible to download these games at anytime and from almost anywhere.
  • Film
The speed and quality of 3G really contributes to enhancing the quality of film over mobile devices. One is now able to view film trailers, reviews, and interviews, download ring tones, wall papers and enter competitions all by means of your cell phone.
  • Sport
With the incredible sound and video quality of your 3G phone you can view highlights from your favourite matches and you’ll always have access to the latest scores.
  • Music
It's now possible for you to download songs, music videos and interviews. You can even compose your own ring tone through your cell phone if you wish!

3G and its impact on websites

The importance of having a web site in today’s world is evident. Some have even gone so far as to say that if your company does not have a web site, you do not exist! With the introduction of 3G technology, this statement will probably become more and more true as people from across the globe will soon be able to access the Internet at almost any time and from almost any place.

How are 3G services charged?

Users are charged on how much data they transmit and not on how much time they are connected to the network. This is because with 3G you are constantly online and only pay for the information you receive (3G Newsroom.com, n.d).

The future of 3G

A great deal of potential exists for new applications in the future as 3G packet based networks will allow users to be on line all the time. The capabilities of wireless networks in terms of bandwidth must still, however, be improved upon (3GNewsroom.com, n.d.).


3G is an exciting new technology that is being incorporated into mobile devices across the globe. Users are now able to make person-to-person calls, download data and do a variety of other tasks they never imagined possible all via their 3G cell phones.


* BBC News. 2001. First 3G mobiles launched in Japan.
Available from: http://news.bbc.co.uk/1/hi/business/1572372.stm
* Cellular. 2004. Third Generation Mobile Technology.
Available from: http://www.cellular.co.za/technologies/3g/3g.htm#3G%20Outline
* 3GNewsroom.com. Not dated. 3G Frequently Asked Questions.
Available from: http://www.3gnewsroom.com/html/about_3g/faq_3g.shtml
* Orange. 2005. Types of connection.
Available from: http://www.orange.co.uk/business/corporate/office/moc/ohsd_gprs_3g.html
* Orange. 2005. Experience 3G.
Available from: http://www.orange.co.uk/3g/?flash=true

Custom Search

Free Website Hosting

CDMA Technology

CDMA (Code Division Multiple Access)

Stands for "Code Division Multiple Access." CDMA is a wireless transmission technology that was developed during World War II by the English allies to avoid having their transmissions jammed. After the war ended, Qualcomm patented the technology and made it commercially available as a digital cellular technology. Now CDMA is a popular communications method used by many cell phone companies.

Unlike the GSM and TDMA technologies, CDMA transmits over the entire frequency range available. It does not assign a specific frequency to each user on the communications network. This method, called multiplexing, is what made the transmissions difficult to jam during World War II. Because CDMA does not limit each user's frequency range, there is more bandwidth available. This allows more users to communicate on the same network at one time than if each user was allotted a specific frequency range.

Because CDMA is a digital technology, analog audio signals must be digitized before being transmitted on the network. CDMA is used by 2G and 3G wireless communications and typically operates in the frequency range of 800 MHz to 1.9 GHz.

Custom Search

Free Website Hosting

150 Tips and tricks basic Windows

Wednesday, April 15, 2009

After installing Windows and other applications that are required in the computer, there are several things you should do. Of them is to do some things to speed up and simplify the performance of the computer. For example, set the computer to restart more quickly, or display the hidden menu, use the shortcut for faster access and so forth.
All the above is a small tip and tricks from the basic Windows that we submit the following. All tips and tricks here we Pair 150 to be safe and easy step to be done. 150 tips and tricks, including some step-by-step guide that is easy to below, will make your computer work more comfortable. Of course, ultimately, productivity in front of your computer the more developed.

A computer is just not comfortable enough dibarengi without increasing the security. This is important, because the connection to the network, the Internet or to another computer, a little more certain risk. Start from the spread of virus to the data by our people that are not eligible. For that, we also include some basic tips to improve security in Windows.

Some tips and tricks and step by step guide in this paper using specific assistance programs, which can be downloaded from several sites on the Internet. However, to facilitate you, as usual all the programs mentioned in any posts is included in the following PC CD Media. Of course, all the program has been tested in labs PC Media.

Installing the program is in this paper comes mostly from the official Microsoft site. So the less likely these programs cause errors in your PC. So do not doubt, continue to follow the basic tips and tricks in Windows that is rarely revealed!

Install Windows Easy and Fun

01. Back-up first before the registry edit. How, click Start | Run, type regedit. After the registry window appears, select the menu File | Export. In the Export range, select All and specify the file name, end with the click of a button Save.

02. Many programs are actually installed in Windows, but not active. To activate it, go to Control Panel | Add / Remove Windows Components, and check on the program that have not been active.

03. Before installing the new program or make changes to Windows settings overall, it is better to make manual Restore Point first. How, Click Start | All Programs | Accessories | System Tools | System Restore and click Create a restore point.

04. If you decide to install a Windows Update that previously didecline, go to Control Panel | System, select the Automatic Updates tab and click Restore Declined Updates.

05. To set the Windows update in line with your needs, set the first Windows Update. How, open System in Control Panel and click the Automatic Updates tab. Set the option to disable or enable Keep my computer up to date.

06. If you do not have a bootable CD, do not worry. Microsoft already offers a free tool to create the floppy booting

07. If the current Windows installation suddenly stopped, turn off the computer and drop additional card. For example, sound card. Reinstall and re-install the card after the installation is complete.

08. To add the System Administration Tools are Start Menu, right click on Start | Properties. Entry in the Start Menu tab and click Customize and then enter in the Advanced tab. Slide down and check the Display option on the All Programs and the Start Menu.

09. To install Back-up Utility in Windows XP Home Edition look ntbackup.msi file in the directory \ valudeadd \ MSFT \ ntbackup \ in the Windows XP installation CD. Run the file and follow the langkahlangkahnya.

10. Windows XP will automatically highlight any new program that ter-install. How removed it, right-click Start | Properties. Go to the Start Menu tab | Customize, then click the Advanced tab and uncheck the checkbox option Highlight newly installed programs.

11. To view the film or the best game on the computer, make sure that the latest DirextX already installed properly. View the latest version in

12. Sometimes the hardware will be installed not support Plug-and-Play. For that, use the Add Hardware Wizard in the Control Panel | System | Hardware for mendeteksinya.

-> TOP TIPS! Computers speed of

13. Actually only take no more than 2 minutes to go to Windows since the computer is turned on. However, it sometimes feels very old. To speed up loading of Windows, there are some things you can do. For example, the icon on the desktop and not using the wallpaper can be a lot of memory. Change wallpaper with a background color, and use the Desktop Cleanup

Wizard that there can be found with a right click on the desktop icon to clean up. Do not forget, run defrag regularly.

If you frequently add or remove programs on the computer, clean registry regularly. Use software such as Registry Mechanic bantu's www.winguides.com site. Unfortunately, the trial version of this program can only be used to improve the course of 6 sections.

Other steps that need to be is me-remove programs that are loaded automatically when Windows starts. Of course, the only programs that are not needed. How, by removing all the startup folder and msconfig to open the Start | Run.

14. Use Files and Settings Transfer Wizard to move files and settings to a new computer. How, click Start | AllPrograms | Accessories | System Tools, and then run the File and Settings Transfer Wizard.

15. Use the exception of the security settings in Internet Explorer, so that the update through Windows Update page is running smoothly. How, open Internet Options in the Tools menu in Internet Explorer. Click the Security tab, select Trusted Site and click the Sites button. Fill in the name of the Windows Update site, uncheck the checkbox option Require server verification ... and click OK.

16. If you lose your serial number Windows XP, use the freeware Magical Jelly Bean Keyfinder from http://www.magicaljellybean.com/keyfinder.shtml.

17. If the name that teregister in Windows XP does not suit you, fix the registry. Do, open the registry and select My Computer. Click the Edit | Find and type RegOwner. If you have found, right click, select Modify and fill in the appropriate name. This change can also be done in the key RegCompany.

Performance Improvement Network and Internet

18. For men, share a folder on your computer to the network, right-click the folder and select Properties. Click the Sharing tab and enable option Share this folder on the network. Give your name and click OK.

19. Create a My Network Places icon on the desktop by clicking the blank area right in the desktop and click Properties. Select the Desktop tab | Customize Desktop. Then open the General tab and enable option My Network Places.

20. It's an easy way to send messages to other computers on the network, ie, using the Message Console. Open the Control Panel | AdministrativeTools | Computer Management | Action | All Task | Send Console Message. Type the text you want to send, add the name of the computer that would dituju and click Send.

21. To set the Internet Connection Firewall (ICF), open the Network Connection in Control Panel, right-click the connection and click Properties. Go to the Advanced tab and enable option Protect my computer and network by limitting or Preventing access to this computer from the Internet.

22. Set the Internet Connection Firewall (ICF) for each existing connection. Both dial-up or broadband. If your computer is part of a network that is connected to the Internet, just plug in the ICF computer server.

23. To find out your IP address, enter in DOS by typing in the Run command. Then type ipconfig / all.

24. If you receive a message from the Internet through the Messenger, immediately turn off. How, go to Contol Panel | Administrative Tools | Services, and then click Stop Messenger ganda. To prevent that do not recur, set so that Messenger becomes Disabled in the Startup.

25. Disable Windows Messenger with the regedit. Go to HKEY_LOCAL_MACHINE \ Software \ Policies \ Microsoft, then select the menu Edit | New | Key, and name Messenger. And then make a key again in this way in the directory with the name of Messenger to its key client. After that, click the Edit menu | New | DWORD Value, and name-Run prevent. Value PreventRun right click, select Modify, fill in the number 1 on the Value data, and click OK.

26. To find out information about the connection on your computer, click Start | All Programs | Accessories | System Tools | System Information. Select the menu Tools | Net Diagnostics. In the window that opens and select the option Scan your system. Wait until the process is complete to see the results.

27. Protect your privacy by preventing the application of Windows Media Player to send data about the habits and the computer you are using the computer through the Internet to certain addresses. How easy, in Windows Media Player, select the menu Tools | Options. Open the Player tab, and disable option Aloww Uniquely internet sites to your player.

28. To lock a computer in a network domain, press the Ctrl + Alt + Del at the same option and click Lock Computer. To open again, press the Ctrl + Alt + Deldan enter the password. Configuring the Windows Easy and Fast.

29. To men-disable autorun feature, right-click the CD drive icon, select Properties and enter in the AutoPlay tab. Then disable autoplay for each type of file is listed on the list.

30. Use Microsoft Clear Type Tuning Control http://www.microsoft.com/typography/cleartype/'s to set the Clear Type on the computer.

31. To view the system files by default in-hidden by Windows XP, select the View tab in the menu Tools | Folder Options in Windows Explorer. Enable the Display content of system folders.

32. To put the volume control icon in the taskbar, go in Control Panel | Sound and Audio tab and click Volume. Enable Place volume control in the Taskbar and click OK.

33. Set the Power button on the keyboard through Control Panel | Power Options in the Advanced tab. Define the Power button to select this option available.

34. Set to clean the Windows Pagefile when shut down for security. Do, open the registry and the entry in the directory HKEY_LOCALMACHINE \ SYSTEM \ CurrentControlSet \ Control | Session Manager. Edit the key value-Clear PageFileAtShutdown to 1. Consequently, the shut down process will take slightly longer.

35. Set Windows to display each file extension. How, in Windows Explorer, select the menu Tools | Folder Options and the View tab. Remove the check mark in the option Hide file extentions for known file types.


36. Removing the Installed Components Many components of Windows that does not appear in Add / Remove Windows Components, so can not uninstall it.

1. Open Notepad and select the menu File | Open. Navigate to the folder Windows \ Inf. Sysoc.inf contents of the file name. Click Open to open this file.

2. Select the menu Edit | Replace. Hide in the Type I, but the Replace With field empty, click Replace All. The goal is to remove all of the words in the Hide file. When finished, close and save the file.

3. Open the Control Panel and select Add / Remove Programs. Then select Add / Remove Windows Components, on the windows that will look out and then some components that were previously hidden.

37. Change the picture on the welcome screen with the entrance way to the User Accounts in Control Panel. Open your account and click Change my picture. Determine the image of your choice by clicking on the Browse to the disk image, or selecting between images that are available.

38. If you look more like the old version of the Start Menu, you can change it by clicking the right button Start, select Properties. Select Classic Start Menu and click Customize to set the contents.

39. To improve the appearance on the classic Start Menu, right-click the desktop and select Properties. Open the Themes tab, and select Windows Classic from the Theme list.

40. Add image to a folder, so that the image that will appear when the Windows Explorer in the thumbnails. How, right-click the folder to which you want to be treated, select Properties. Click the Customize tab and click Choose Picture. Select a picture and click Open | OK.

41. Adjust capacity to the Recycle Bin right-click the Recycle Bin icon and choose Properties. Fill in the capacity as you want and click OK.

42. At the time set in the View Details in Windows Explorer, right-click a column header untukmengatur columns are displayed. Click More if necessary set the other settings.

43. To add programs that you use most often in the Quick Launch, drag the program icon in the Quick Launch.

44. Add the address bar on the taskbar, so that speed up access to an address on the Internet. How, right-click the taskbar, select Toolbar | Address. Ganda click to open and close it.

45. Make the display look like Windows Explorer on the My Computer window. How, right-click Windows Explorer icon and select Properties. In the Target area, after the% SystemRoot% \ explorer.exe add / n, / e, / select, C: \ and click OK.

46. To add a program shortcut in the top of the Start Menu, right-click its icon in the Start Menu and click Pin to Start Menu. 47. So that a drive or folder can be entered in the Send To menu, drag its shortcut to the folder \ Documen Your Settings \ \ SendTo.

48. Search for SendTo folder? Just click Start | Run and type in SendTo and click OK.

49. To clear the list of documents in the My Recent Document folder in the Start Menu, right-click Start, select Properties. Customize and click open the Advanced tab and click the Clear button list. So that no longer appear in the My Recent Documents, disable option List my most recently opened documents.

-> STEP BY STEP 50. With Fast User Switching Fast User Switching, a user does not need to logoff the user login.

1. To enable Fast User Switching, entry in the Control Panel and select User Accounts. Click the option Change the way users log on or off, and enable Use Fast User Switching.

2. So that the dial-up connection is still running even though Fast User Switching in the-enable, go to the directory in the registry HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ CurrentVersion \ Winlogon.

3. Right-click on the right panel and select New | String Value. Name KeepRasConnections and give the value 1. Restart the computer.

51. To view the content indeed My Recent Documents folder, click Start | Run, then type% UserProfile% \ Recent.

Setting Multiple Users 52. To switch between user accounts, press the Ctrl + Alt + Del, and then on the Task Manager window that opens, select the Users tab. Right-click a user name which you want to use and click the Connect button.

53. Add Guest account so that others can use your computer. How, open User Accounts in Control Panel, click Guest | Turn On the Guest Account.

54. Remember to always log in as System Administrator before making changes berimbas on the performance of the computer.

55. To copy a user profile, enter in the Control Panel | System. Entry in the Advance tab and click the Settings button in the User Profiles. Highlight the profile you want copied, and then click Copy to specify the location and profile. To change the permission, click the Change button.

56. Change Welcome screen with a login dialog to increase security level. How, in the entry in the User Accounts Control Panel, select the option Change the way users log on or off and disable Welcome screen.

57. Use the Shared Documents folder to store which can be opened filefile other people in the network. This folder can be found in My Documents \ Other Places area.

58. On Windows XP Pro Edition, the password can expire if not used long log. To avoid this, set so that Windows does not do so. How, click Start | Run, and type userpasswords2 Enter. Go to the Advanced tab and select the Advanced user management, click the Advanced button and select the Local Users and

Groups. Right-click a user name and select Properties. Open the General tab and enable Password never expires option.

59. Give the name of each partition or drive with a different name. This is important to facilitate the search file. 60. Create a password reset floppy disk as an emergency when the lost password. How, go to Control Panel and open User Accounts. Select your account and select prevent a forgotten password to start the wizard.

Setting File and Folder 61. Create a compressed folder by clicking the right blank area on the desktop and select New | Compressed (zipped) Folder. Give the name and drag and drop the files you want in the compressed folder.

62. A compressed folders can be protected with a password. How, open the File menu | Add a Password. Fill in your password and fill it again to confirm.

63. A compressed folder can remain content with the added drag and drop the files you want compressed into it.

64. When running Disk Cleanup, select the option to compress old files compressing files that are not needed, so capacity can be hard savings.

65. Enkrip or random files can be done in Windows XP Pro Edition with right clicking My Computer, select Properties. Open the General tab and click Advanced. Activate the option Encrypt contents to secure data.

66. The easiest way to change the name of the file or folder is to select it, then pressing F2.

67. So you can switch between the folder quickly, especially on the folders that are frequently opened, make a shortcut to any folder that is accessed frequently.

68. Reset the file association with the menhakan the Shift key while right-clicking a file. Select Open With ... Select the program you want to use to open the file and enable the Open option use the selected program to open this kind of file. Then click OK.

69. Customize the music file storage capacity in a way to open Windows Media Player and select the menu Tools | Options. Open the Copy Music tab and adjust the size capacity of friction with the slider.

70. If you save all documents in the My Documents folder, all files are easier on the back-up and system restore is not affected.

71. If a file copy of the CD can not be accessed, then removed the Read only attribute. How, right-click the file and select Properties. Remove the check mark in the Read only option.

72. Arrange the display of each folder by clicking the right folders on My Computer. Select Properties and click Customize. Select the template that is available, or select a picture according to your wishes. Click OK to save the settings.

73. Me-you can rename multiple files at once that have the same characters in the same folder as well. For example, a photo or image collection. Way, select all the files you want in-rename, right-click the file and click Rename. Give your name, for example Koleksi.JPG, then all the other files will be changed into the name Collection (1). JPG, Collection (2). JPG, and so on.


74. Did you send a Fax, that Windows XP has a tool to send and receive fax?

1. Open the Control Panel, select Add / Remove Programs and click Add / Remove Windows Components. Enable Fax Services and click Next.

2. Click Start | All Programs | Accessories | Communication | Fax | Fax Console to run the Fax Configuration Wizard. Set all settings, including fax and modem numbers that are used and the incoming fax.

3. Create all of the fax Fax Console. Check all the content before it is transmitted, including the setting and so forth.

Set Print Quality
75. You can print multiple photos together, and set the layout and the other option with the easy way. First, open the image files in the My Pictures folder, then select the menu File | Print. Akan Photo Printing Wizard appears. Set the printer to which you want to use and the layout that will be used. Some of the printer allows printing of multiple photos in one paper.

76. Rather than have to set the printer settings each time you use it, make a copy of your printer. Set each with a different option as you need.

77. You can use a character that is not in the keyboard, but can be used with the features in the Windows Character Map. To open, you can find in the Start | All Programs | Accessories | System Toolss | Character Map. Or type in "charmap" without the quotation marks in the Start | Run.

78. To capture a scene in the movie file into an image, putarlah the film and press Stop when the desired scene. Click the Take Picture, save in your folder and name.

Bring Penampakan Hidden Features 79. You are interested in music with an original Windows? Find it in the file \ windows \ oobe \ system32 \ images \ tittle.wma.

80. There are two editions of Windows Plus! circulating, ie, Microsoft Plus! and for Windows Digital Media Edition (DME). See www.microsoft.com / windows / plus / PlusHome.asp trial version and try DME.

81. Type "iexpress" without quotes in the dialogue box Start | Run. You will find a utility to create and mengompres self extraction file.

82. You will find some tools that are less popular, but have tremendous advantages. Tools can be found in the folder support \ tools in the Windows XP installation CD. Use suptools.msi program to install the tools in your computer.

83. There are many wizard stepby-step or in Windows. To find out what the wizard, open the Help and Support and type "Wizard" without quotes in the search field. Windows wizard will display the list of available. You chose to live.

84. To create your own characters, click Start | Run and type Eudcedit. Create as you see fit, asalakan still in the 64x64 grid sizes. Save by selecting the menu Edit | Save Character.

85. To put the characters in the Character Map into a document, you simply open the Character Map and select the character. Then you copy and paste it into your document.

Caparison Desktop 86. You can set the mouse pointer in accordance with the desire to open a tab in the Mouse Pointer in the Control Panel. Click Browse to search for a pointer as you see fit.

87. To display a list of recent documents accessed in the Start Menu in Windows XP Home Edition, right-click on the Start button and select Properties. Click Customize, open the Advanced tab and enable option List my most recently opened documents.

88. If you want to display the Windows Explorer opens up to full cover the taskbar, press the F11.

89. You can create a shortcut key or keystroke key to access a program. How, right-click the program icon and select Properties. Open the Shortcut tab and specify which key you use to access the program

it. Windows will automatically add the keys Ctrl + Alt + your choice of shortcut key.

90. Sort the alphabet, all programs in the Start Menu for easy initialization. How, click Start | All Programs, right-click one of the existing program and select Sort by Name.

91. Munculkan penampakan icon indicator broadband connection or dial-up in the system tray for easier control. Do, open the My Network Places, select View Networks Connections, right-click the connection that you use and select Properties. Change the option Show icon in the area when connected notofication become enable.

92. You can edit the Start Menu in accordance with their needs. Good to add, subtract, or even change the name. How, right-click Start and select Open or Open All Users. Set each shortcut is available as needed.

93. You can open several programs simultaneously by pressing the Shift key while clicking on the program in Start Menu.

94. To remove the icon on the desktop, right-click the icon, and select Rename. Press the Alt key and numeric 255. Kemudan press Enter.

95. You can remove the arrow on the shortcut icon on the desktop. How, go to registry editor by typing "regedit" without quotes in the dialogue box Start | Run. Go to the directory in the HKEY_CLASSES_ROOT \ Lnkfile. Remove IsShortcut value. 85


96. Shortcut Here is a list of some of the shortcuts used when working day-to-day use of Windows.

[Windows] + [L] Lock the computer [Windows] + [U] Showing Utility Manager [Windows] + [R] Showing Run [Windows] + [F] Displays the search window [Windows] + [E] Opening My Computer [Windows ] + [D] death or the Toggle Desktop [Windows] + [M] Minimize all windows [Windows] + [Shift] + [M] Restore all windows minimize the [Windows] + [Ctrl] + [F] Search for computer network in the [Windows] + [F1] Showing page Help [Windows] + [Break] window display the System

Properties [Windows] + [Tab] button on the Taskbar Scroll If you use a keyboard that does not have the Windows key, use key combination Ctrl + ESC.

97. You can enable or disable grouping of several files in one program. How, right-click the taskbar and select Properties. Give a check or uncheck the option Groups similar taskbar buttons.

98. You can remove or display the icon on the desktop by clicking on the desktop and select the right arrange Icons By | Show Desktop Icons.

99. You can create a custom toolbar to the taskbar right-click, choose Toolbars | New Toolbar. Set in accordance with your wishes, for example, the My Documents as a toolbar in the taskbar to easily and quickly accessible.

100. Right-click Start Menu, select Properties, if not using the Classic Start Menu, Customize, and click open the Advanced tab. There are some who can munu activated with a checkmark on the option. Start from the Scroll Programs penampakan to bring some of the features in the Start Menu. 101. You can open the site without opening a browser first. How, type the full address of the site would be opened in the dialog box Start | Run. For example www.pcmedia.co.id. Then press Enter.

102. In every menu in Windows there is underlined in the letter that the use of navigation as a standard keyboard. For example, the File menu can be opened by pressing the Alt key + F. You can enable or disable the feature marked with a line under this. How, right-click an empty area on the desktop. Appereance then open the tab, and click the button effects. Set the check mark on the option Hide underlined letter for keyboard navigation until I press the [Alt] key.

103. Set the computer to issue a warning sound when the key Caps Lock, Num Lock or Scroll Lock is activated. To do, Open the Control Panel, go in the Accessibility Options. Open the Keyboard tab, and enable option-Use Toggle Keys.

104. To enable Hibernate in Windows XP Turn Off when pressing the Start Menu, hold down the Shift key. So stand by button on the Shut Down dialog box will change to Hibernate.

105. If your hardware Hibernate support, enable this feature soon. How, open Control Panel and open Power Options. Click the Hibernate tab and check the option Enable Hibernate. If your hardware does not support Hibernate, this tab can not be found.

Improving Performance 106 Computer. Add speed to your computer with a good penampakan but eat a lot of time, ie, animation. How, open Control Panel, and double-click System. Click the Advanced tab and press the Performance Settings. Adjust and enable option for the best performance.

107. To reduce the time booting the old feel, set in the BIOS so that booting from the start and then a new CD drive or floppy drive on the next option.

108. Set so that Windows will only load the program only when needed to start running faster loading time and the work computer is lighter. Type "msconfig" without the quotes in the Run dialog box and press Enter. On the General tab, select the Selective Startup option, and open the Startup tab and disable all programs that are not necessary.

109. You can monitor the processor by pressing the keys Ctrl + Alt + Del to open Task Manager. Then minimize the window, you'll see a graph of processor capacity in the system tray.

110. To increase the speed of storing data on a USB ZIP drive, open My Computer and right click the ZIP drive. Select Properties, open the Hardware tab click Properties, and open the Policies tab and enable the Optimize for Performance option.

111. To speed up the display Start Menu, open the Registry Editor (type "regedit" without quotes in the Run dialog box). Directory entry in the HKEY_CURRENT_USER \ Control Panel \ Desktop. Click ganda value called MenuShowDelay, change the number to 100. In this way, the delay Start Menu view the brief.

112. It's a fast way to turn off the computer. Press the Ctrl + Alt + Del, the Task Manager window that appears, press Shut Down menu and hold down the Ctrl key while clicking on Turn Off. Make sure first of all documents have been save.

113. You can view a graphical display performance computer based on several indicators. For example, the use of processor, memory, and so forth. How, open Control Panel and double-click Administrative Tools. Performance features open.

114. You can also add some other indicator in the Performance features (13 in number) by clicking the + icon and select a new indicator of what would appear.

115. You can merge a registry file or. Reg in your Windows registry, ganda by clicking on the file. To know the function, open with notepad.

116. If you use 512 MB of RAM, set it so that Windows does not create a paging to disk so that increasing computer performance. Do, open the Registry Editor and in direktory HKEY_LOCAL_MACHINE \ SYSTEM | Current ControlSet \ Control \ SessionManager \ MemoryManagement. DisablePagingExecutive Change the value to 1.

117. Bootcfg.exe use to edit the boot.ini of Windows XP. Way, type "cmd" without quotes in the Run dialog box to enter in the DOS Prompt, and type bootcfg: /? appear after the prompt to obtain information about the features in this program.

118. To select the operating system in use in a computer that has a partition the drive, open the Control Panel, go and open the System in the Advanced tab. Click the Startup and Recovery Settings and then Edit.

119. Use the chkdsk utility for classic men-scan disk and fix errors found. How, click Start | Run and type "chkdsk c: / f" without the quotes for the men-scan and repair the drive C. If you want to know more about the features in chkdsk, type "chkdsk /?". 120. You can skip Scanner and Camera Wizard when installing digital camera. To access it, use Windows Explorer or My Computer. Your digital camera will appear as a drive.

121. Have utility in Windows XP Pro Edition is rarely used, namely gpedit. Run this utility by typing "gpedit.msc" without quotes in the Run dialog box and press Enter. This utility can be used for each tool and the components of the Windows. Try one at a setting you want and then see the results.


122. Set the Schedule of Personal bother to clean waste in Windows, set Windows so that clean themselves regularly with the Schedule Task.

1. To set the schedule of the regular Windows, open Control Panel, double-click Scheduled Tasks. Add Scheduled Task wizard through. Click Next to go in the list contains programs that can be scheduled.

2. If the tool you want to schedule it is not listed on the list, click Browse and navigate to the folder where the tool is that you mean. Most of the tools in the Windows folder Windows \ system32. Select one and click Open.

3. Type the task name and specify the level of frequency or frequency of the schedule program. Click Next, set other settings that are required and add the username and the password to secure the Schedule Task.

123. Use PowerToys utility free from www.microsoft.com / WindowsXP / home / downloads / powertoys.asp very useful. PowerToys itself consists of several programs, including the Open Command Window Here, Alt-Tab Replacement, Tweak UI, Power Calculator, Image Resizer, CD Slide Show Generator, Virtual Desktop Manager, Taskbar Magnifier, HTML Slide Show Wizard, and Timershot Webcam.

124. Windows you can get extra speed, if Indexing Service is disabled. How easy, open the Administrative Tools in Control Panel, select Services and disable Indexing Service.

125. Develop capacity hard drive using Disk Cleanup. Open My Computer, right-click the drive and select Properties. Open the General tab and click Disk Cleanup. Clean all trash, including empty the Recycle Bin contents of all data that is not used anymore.

126. Eliminate all the shortcuts in the Startup folder in the Start Menu. For programs that have shortcuts in this folder will be automatically executed when you first run Windows.

127. Check the settings in the messenger of your computer, because almost every messenger akan load itself automatically every time Windows is started. Keep Login or option Automatically Load at Windows Start off.

128. You can access each program directly by typing the program's name in the Run dialog box. For example, a calculator for calc, winword for Microsoft Word, and others.

Troubleshooting Sederhana 129. If defrag when the computer suddenly stop, restart and enter in Safe Mode by pressing the F8 key right before Windows starts to run. Defrag your hard drive again from this mode.

130. Find out if your drive with FAT or NTFS drive right click and select Properties and then go to the General tab. Read the detail on the file system dialog box that appears.

131. Change a drive in FAT into NTFS format through DOS with the command convert c: / FS: NTFS. Enter in the registry editor and open the directory HKEY_USERS \ Default \ Control Panel \ Desktop and create value in AutoEndTask with a value of 1.

133. If the time to install a new driver hangs the computer, the computer to restore the previous configuration. How, to restart the computer and press F8 to enter Safe Mode option and select Last Known Good Configuration.

134. Use Event Viewer to track the application error. How, right-click My Computer, select Manage, and click the event viewer. Click ganda each application or system error that indicates an error to view the information.

135. It's the most appropriate way to set the hours in computer accuracy. Click ganda hour on the right bottom of the screen or in the system tray, select the Internet Time tab. Activate the option Automatically Synchronize with an Internet time server. Select the server that is available and click Update Now!

Tips and Tricks Special for Windows 98 and ME 136. Back-up dial-up settings to the way drag and drop the file connection in Dial Up Networking folder to a floppy drive. Back-up files will be stored in ekstensi.dun.

137. A quick restart, press Start | Shut Down | Restart, click OK temporarily, hold down the Shift key.

138. Use Tweak UI from the Windows 98 specific www.microsoft.com / ntworkstation / downloads / powertoys / networking / nttweak .... After installation is complete, open Tweak UI, via the Control Panel.

139. Use the F3 key to open the Find feature while in Windows Explorer or desktop.

140. Set the dial-up connection to the Telephony Location Manager. Telephony Location Manager feature will help you optimize your dial-up connection. How, click Start | Run and type "tlocmgr" without the quotes.

141. If your computer can not be set in standby mode or suspended, then fix with Pmtshoot from http://support.microsoft.com/?kbid=185949.

142. Always back-up registry before making changes in it. How, use the Registry Checker that can be found in Start | Programs | Accessories | System Tools | Tools.

143. Create a bootable disk for Windows 98 with memformatnya how to use the system files. Then copy the file c: \ windows \ command \ scanreg.exe and c: \ windows \ himem.sys to the diskette in it. Do not forget, edit the config.sys file in the diskette with the additional line "device = a: \ himem.sys" without the quotes.

144. To me-restore registry when the computer does not want to run, try booting with the boot disk. Then go to drive C: \ and type "scanreg \ restore", without quotes. Follow angkah-step to complete. Then out of the DOS.

145. Add shortcut to Control Panel to Start Menu by clicking the Start button and right click Open. Then right click in an empty area, select New | Folder. Fill in the "Control Panel. (21EC2020-3AEA-1069-A2DD-08002B30309D)" without the quotes and press Enter.

146. You can remove the password dialog box that appears before the first entry in Windows. How, go to Control Panel, open the Password and Change Password tabs open. Fill in the password field with a password of your own, and new password fields empty. After that, click the User Profiles tab and enable option All users of this PC use the same preferences and desktop settings. This change will be in the running after a Windows restart.

147. To cancel the Print command, open the Printer icon in the system tray by clicking the ganda. Then highlight the files that are in-print on the printer window and then right click Cancel.

148. Discover the tools under DOS that are still feasible in the folder tools \ msdos in the Windows 98 installation CD.

149. If Windows 98 or Me is running slow, check the memory. How, right-click My Computer and select Properties. Open the Performance tab and see the System Resource. If you reach 80 percent, restart the computer. Remember, close all programs before viewing the System Resource.

150. Sysedit use to edit the file system. For example Autoexec.bat and so forth. Type "sysedit" in the Run dialog box without the quotation marks are given.

Custom Search

Free Website Hosting