Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

Computer access from anywhere with TeamViewer

Posted by umar ananda riyadi

There are times when we want to access a computer that is not in front of us with ease, whether it is to solve problems, collaborate with each other, want to access data / programs on other computers or other. If both computers are connected to the Internet, then it can be done easily using the TeamViewer software.

TeamViewer is one of the Remote Desktop software is quite popular and widely used because of its simplicity, excellence and be able to run on various operating systems, like Windows, Mac OX X, Linux, IOS as well as Android. We can use the free of charge for non-commercial use.

TeamViewer consists of two main programs, one program running on your computer and another on the computer that will be access through our computer (remote). Once they are connected then we can access your computer remotely with ease because it looks a remote computer desktop display (complete with the start menu, and program2 existing icon2).

Installer or portable version is available that we can choose. If you rarely use, or just want to try, you should choose a portable version that does not need installation. Besides the 2 main courses, there are additional applications that support or to get other features such meeting.

The use of TeamViewer

For computers that will be accessible, so easy and simple, can use TeamViewer QuickSupport portable applications. Download TeamViewerQS (about 4 MB) and then immediately run it, wait a while so we will get the ID and password

This ID is unique so we can not change, whereas we can change the password or made a random (right click on the password field and select the "Create new random password"). Then we just give the ID and Password to the people who will be allowed to access our computer.

For the computer used to access remotely, install or download TeamViewer Portable TeamViewer. Next run TeamViewer.exe. To access another computer, on the Remote Computer Control, fill in the Partner ID corresponding to the ID that we will access your computer (which has given our friends).

Then we can choose the Remote Control or File Transfer, and just click the Connect button to partner. After that if the computer that will be accessible online and TeamViewer Quick Support is active, then we will be connected and asked for the password. Once the ID and password is correct, we will be able to access the remote computer's desktop. With this TeamViewer.exe our computer was also available to other computers by providing the ID and password appears.

Originally both computers can access the Internet, usually both can run TeamViewer and can be remotely accessed. Because every time the program is sending the computer desktop is accessed, then they also have an Internet connection pretty quickly.

Download for a variety of operating systems can be obtained from page Download TeamViewer
More aboutComputer access from anywhere with TeamViewer

Beginner's Article - A Computer's Hardware

Posted by umar ananda riyadi

Beginner's Article: A Computer's Hardware
In our modern society the computer is an integrated and depended upon resource. Because they have been in our homes for quite awhile now many companies and individuals alike think that humans are "born" with computer knowledge. If you are age 25 or younger this may metaphorically be true but for the rest of us computers can be a challenge.
I am going to cover the bare basics of your computer here. It is going to cover the Hardware of your computer (Hardware meaning the hard items you can touch, pick up, and manipulate. Software on the other hand is referring to the programs on your computer...you can't touch these per se. Examples are Microsoft Word, Microsoft Excel etc.).
Your Computer's Hardware & Its Parts:
Your computer is comprised of 4 major parts we all know (this is not including printers, camera docks,etc) : the monitor, tower, keyboard, and mouse. The keyboard and mouse will not covered in this article because if you didn't know what they were you wouldn't be reading this!
The Monitor:
The screen you are looking at right now is the monitors function. It shows the visual data from your computer. A few key words related to your monitor are resolution and viewing size. Resolution refers to the shape and size of your monitors screen and how it processes the pixels which comprise the visual data you see in front of you. If you have a large screen then you will have more resolution (ability to process more amounts of visual data) than a smaller monitor. For instance, if you visit a website with a smaller monitor you may have a scroll bar appear at the bottom. You would move this bar to the right to be able to see the whole screen. Whereas if you view the same site with a larger monitor that scroll bar will not appear because you have a larger pixel resolution and see more data. Viewing Size is a term related to how big your monitors screen is. It is measured diagonally. Take a ruler or measuring tape and hold one end to the top right of the screen and finish measuring at the bottom left of the screen. You should come up with a number like 14.9 or 16.9. 14.9 means you have a 15 inch viewing size screen. 16.9 means you have a 17 inch viewing size screen.
The Tower:
The tower takes on several different names such as CPU, Hard Drive, or just Computer. Technically the "tower" is the case that holds your computers brains (I DO NOT recommend opening the case to see what I am referring to!). This is the outer box of your computer. Inside of the tower there are a lot of wires, circuits, and foreign looking items. We are only going to cover the essentials. The actual "brains" of your computer are screwed inside the tower and it is called the "motherboard". If you have ever seen the inside of a computer you have seen it - it is the largest item in there. On this motherboard sits a chip called the "CPU". CPU stands for Central Processing Unit. Technically it is the "brain" that runs the motherboard and controls the technical settings of your computer. It is a small chip that is usually placed in the middle of the motherboard. If you happen to open the case and want to see what I am talking about DO NOT touch or manipulate this chip - you WILL ruin your computer!
There are other parts that connect to the motherboard which are removeable and be changed out when they "go bad". Your Sound Card (how you get sound from the computer to your speakers) is connected to the motherboard and can be replaced when it goes out. Your Ethernet card (connects your computer to the internet via a special phone line that plugs in the back of the computer to your wall or DSL modem) is connected to the motherboard and can be replaced also. Your computer's memory connects to the motherboard too. These can all be replaced by novices but I must warn you - talk to a professional first to find out the correct tools to use. One static charge from your hand without being "grounded" can short out your computer and it will be un-useable!
This article should give you some basic knowledge about your computer's hardware. If you wish to learn more this should give a foundation for further research. Next time we'll cover Software so stay tuned!
Kellee is the owner of MontanaPA which is a freelance Web Design and Personal/Virtual Assistance firm located in Montana. For years being called out on Computer Tutor calls she came to realize that although the newest generation is extremely computer savvy, the rest of us aren't nearly as fluent! Knowing how wonderful computers can be in our lives, she has set out to write articles which are geared toward the Baby Boomer generation with computer explanations that are easy to understand. Her hope is that she can explain computers and their abilities in such a way as to excite this generation and show what fabulous possibilities await once they are understood!
More aboutBeginner's Article - A Computer's Hardware

Purchasing Computer Hardware From the Internet

Posted by umar ananda riyadi

If you want to purchase a computer or computer accessories, you can find plenty of opportunities on the Web. This article presents various options that have been chosen among online hardware vendors, computer hardware stores, computer shops and internet companies.
You can find online a wide selection of computer hardware and computer related items such as PC, laptops, notebooks, palmtops, computer accessories, printers, scanners, wireless networking, consumables, internet access, website hosting, computer software, software tools, games and much more.
Direct Vendors and IT and Technology Distributors
Some companies such as Dell or HP are Direct Vendors of Computer Hardware and you will find many good products on their Websites, which include also plenty of documentation and other useful information. Often very good prices of used equipment can be found in separate Outlets.
There are many Companies which act as IT Technology distributors and offer online:
  • Computer Hardware and Accessories such as Printers, Scanners etc.
  • Computer software such as Antivirus programs, Productivity programs, Operating Systems and more.
  • Consumables such as paper, envelopes, CDs, boxes, tools for the office, ink and toner.

Computer Online Auctions
Another way to find Computer Hardware, is to access an online auction, where often the prices are much lower than those requested for new items. You will find many cheap products( e.g. cheap PC, cheap laptops, printers, palmtops etc.) and you could make a bargain!
A special category is that of Mobile Computing products such as laptops, notebooks, PDAs, palmtops, drive storage, networking and even mobile phones. You will find plenty of good opportunities in online auctions sites.
Conclusions>
It is worthwhile to mention that recent changes in exchange rates make purchasing in the UK very convenient for other countries.
Therefore, if you are looking for Computer Hardware, use the browser.
More aboutPurchasing Computer Hardware From the Internet

What Are the Uses of Computer Hardware Repairing Tools

Posted by umar ananda riyadi

When we start off with computer repair, we might need to understand some simple ways of preparing our computer systems. One very important factor whenever we store files is to help make sure to always back up significant data or files that you have worked for on your computer or laptop. An individual should either make use of a USB flash drive or blank CD. Also you need a backup method particularly if you use your computer for business and important work. Another preparation would be to make sure your virus program is modified and running always. It will keep the operating system protected through all types of viruses. Another thing is to prevent from renaming or take away from directory to directory. It can bring about your computer to remove track of all your files.
The computer system will definitely execute far better if presently there are those computer hardware repairing tools used in the computer system. An individual could not be bound to get a brand new computer in the near future. It is mainly because these kinds of offered tools in the computer system will cause your computer be more efficient like before and may also give you enough memory space to use. Thus, a computer repair will offer you the speed you want pertaining to your system.
The presented computer tools can be found in the internet. Some of these are: Drive info gadget which usually monitors and exhibits free space in one or even more of your hard drives by GB and percentage. The second is the CPU meter gadget that works really well in tracking the systems physical memory and CPU. The next one which is furthermore significant is the Uptime gadget which usually shows you how long your pc has been powered on and also if your system is unpredictable. The additional one would be is the Marqu-Notebook info2 gadget which tracks system RAM and CPU utilization, power of your network, system uptime, and much more. The different tools are given and used depending on what you need to help you with getting your computer like new again.
Any Windows computer hardware repairing tools which you will use will assist your programs operate faster than ever. These types of tools will help you not have to use your current closest computer technician every now and then. And this will furthermore help you save money on repair costs in the future. These tools are usually not just suggested but also an essential component of looking after for your pc.
More aboutWhat Are the Uses of Computer Hardware Repairing Tools

Windows 8 Review,Features & Release date

Posted by umar ananda riyadi

Reimagining the windows from the origin, Microsoft is gonna arrive with an all new os in the year 2012 known as WINDOWS 8.Microsoft corporation officially unvieled their upcoming operating system WINDOWS 8 on 1 june 2011 at Taipei Computex 2011 in Taipei (Taiwan) and at the D9 conference in California (United States).users are gonna experience tiles instead of icons with the recreated user interface,which is incredibly optimized for touch as well as mice and keyboard. Start button or windows key activates a refreshing new "start screen" which introduces live application tiles through which we can get through to regular desktop or a usual desktop app.a new multi task feature SNAP is being introduced in windows 8 which allows user to operate two app's at the same time side by side,can also resize it to their convenience on screen.experience browsing with the new internet explorer 10 in touch User Interface.windows 8 comes with a on screen keyboard which can be further deduced to a thumb layout keyboard for a natural typing experience.
according to microsoft vice president julie larson greene windows 8 will be having a new developer platform which is based on HTML5 and java script.windows 8 will be a SoC[system on a chip] and mobile ARM processors supported.the solution to USB 2.0.Windows 8 supports USB 3.0.which is actually 10x faster than USB 2.0.with in the blink of an eye u can copy all your high definition data using USB 3.0.Theorotically the limit is 5Gb/s.2.Improved file management basics.with the today's amplifying storage capacity in PC's, file management tasks become higher in priority list.with improved file management basic operations in windows 8 you can pause one usb transfer process,when multiple are running or pause multiple transfers,allowing one to transfer rapidly.also Windows 8 comes with a new copy experience which allows user to digtinguish multiple files with same names.Win 8 comes with an advanced windows explorer with a new ribbon where users can find their most used file management tasks at the tip of their fingers.the ribbon in win 8 consists of most used management tasks such as move to ,copy to and also a new function "copy path"comes into light, which most of us don't know,actually copies the path in the address bar.the heart of the home tab,ribbon consists many more important management tasks such as share tab which allows to share files within a network instantaneously.3.Accessing ISO and VHD files.an added support for accessing ISO files and VHD files through explorer is really an worthy feature to look out in win8.now without the use of a third part software u can mount and rip ur data into iso's file with a single click from ur home tab.VHD are the same as iso files except u'll get a virtual hard drive by mounting a VHD,where as mounting iso's create a virtual dvd drive.the all new metro style windows 8 will be having some cool new applications which run on full screen.a twitter client,a stock tracking application, an RSS news feeder,a weather application, and a virtual piano.an updated task manager called modern task manager,and a PDF reader called modern reader will be available in win 8.Sources within MS say that Windows 8, will be a cloud based OS.Windows 8 will be using
OEM activation 3.0 which makes it less prone to cracks.The system requirements for Windows 8 will be the same as or lower than those of windows 7 and is expected to release in the year 2012.
wait till 2012 there's a whole lot more coming........




View the original article here
More aboutWindows 8 Review,Features & Release date

Computer Help On Defragmenting Computer

Posted by umar ananda riyadi

by Daina Thomas Delicious 0 Share this post:
Design Float
StumbleUpon
Reddit
In Windows Operating System the files are placed in the free space of the hard drive. The files are stored not in one physical place. As a result a file can be stored in a fragmented way. With the passing of time a computer could have hundreds of fragmented files. These files can be stored broken up in different locations in the hard drive which slow down the performance of the PC. The reason behind this slow performance is the fact that when the PC becomes fragmented with hundreds of files the response time of the computer increases because it takes more time to access information from the fragmented locations. As a result using a defrag program for you computer helps speeding up your computer.
If you defrag your computer with some computer help from experts the process can help your computer to place all pats of a file together on a same place. It organizes and places all the directories and files in a way how you use them. So after the defragmentation program it is certain that your computer will run faster than before.
Before defragmenting your PC you need to make sure you have back up of everything. Computer help experts suggest that you need to check your hard drive health too. They suggest using CHKDSK to scan and to fix any problem in the hard drive.
Now you need to close all the programs that are open. Computer help experts suggest that you need to make sure a constant power supply. If there is any possibility of power outrage you must use the battery backup. Your computer can crash or the operating system can corrupt or both of these can happen at a single time if in the middle of a defragmenatation process the power supply is broken.
Computer help exerts now want you to open the Defrag program. Now you need to click on the button ‘Start’. You will need to locate the Disk Defragmentation program. You need to open the program and click on the program icon. Then you should go to Accessories icon and click it. You must click on System Tools icon and then click on System Tools icon.
Now you must click the Analyze button and analyze the hard drive whether it needs defragmentaion or not. The result screen will tell you whether you should carry on a defragmentation or not. If the result says that your hard drive does not need it then you must not be benefited much by doing it. Otherwise, you should go on to defrag your hard drive.
If the analyze program result suggest that your hard drive needs defragmentation you can go ahead with it. Click on the button Defragment. Now you will have to give time to run the program. The program will take some time. The time can vary from 30 minutes to several hours depending on the issues like the speed of the processor, the memory, the fragmentation process etc. When the process complete, you will need to close the program.
Source: http://goo.gl/enxlA


View the original article here
More aboutComputer Help On Defragmenting Computer

Computer purchasing made easy

Posted by umar ananda riyadi

computer support
Whether your child needs a new computer to study or a webcam to stay in touch, John Lewis is your one-stop technology shop.
It will soon be time to wave the latest crop of university students on their way. This is an unsettling time for any parent, as you watch your son or daughter fly the nest for the first time - will they settle easily into their new digs, and are they going make friends with the right crowd?
As far as all that's concerned, you'll have to leave them to it. But at least you can make sure you send them on their way with the right equipment for the academic year ahead.
But where do you go for value for money, sensible advice and technical support? John Lewis is the perfect place for you to ensure they leave home with all their technology needs properly catered for.
Whatever your student offspring are looking to purchase for their new academic year ahead, it is a store you can trust to give unrivalled customer service and after-sales support.
Now is the time when your children put some serious thought into their technology shopping list. Whether it's a new laptop, netbook, printer, hard drive, webcam or the latest software they need, you can rest easy - John Lewis is a one-stop technology shop.
Of course, your children will want good-looking hardware, paired with the right software to make it work right for them.
The days of dog-eared student ring-binders are well gone. Students will need to type up coursework and access documents online. A new laptop will also double as an entertainment portal for tasks such as watching television shows, video calling and storing photos.
John Lewis is a store that will make everyone happy; you can shop with ease and know that you're getting value for money, with post-purchase support if you need it.
It has technical experts able to offer unrivalled, impartial knowledge close at hand in every store.
And whatever your budget - regardless of what equipment you are looking for - there is something to suit your child.
Meanwhile, the last thing you need to worry about is something going wrong with your purchases further down the line. John Lewis offers a free, two-year guarantee on all desktop PCs, so you can rely on the store to resolve any issues. This is in addition to a 90-day helpline service from the day of purchase.
As well as larger items such as computers, laptops and printers, at John Lewis you'll find all the add-ons you need to get the most from your purchase, from cables and connectors to software and accessories, print cartridges and laptop bags.
The Never Knowingly Undersold* commitment means that if you see or buy a product at a cheaper price from another high street competitor, then John Lewis will match the price or refund the difference. When you're looking to make a student budget stretch as far as possible, you can trust that it won't ever be beaten on price, quality or service.
All that's left is for you to decide how to shop with John Lewis - visit the website to read the online buyer's guides and read product ratings and reviews, shop via mobile phone or visit a John Lewis shop.
* Our commitment to value means that we match the prices of high street competitors (this excludes online-only or mail-order business), service conditions must be comparable. See our "Never Knowingly Undersold" leaflet in our shops or online for details.
Source : telegraph


View the original article here
More aboutComputer purchasing made easy

Thriving Computer Support Services

Posted by umar ananda riyadi

by Daina Thomas Delicious 0 Share this post:
Design Float
StumbleUpon
Reddit

These days, most businesses and home computer users are fast embracing online computer support services to handle their computer repair and support requirements. These services are certainly better than hauling yourself in the hassles associated with bringing a computer to a repair center.
Technicians offering the online support are masters in their profession and can do more than just fix computer problems. They work with the customers, listen to their computer problems, offer effective fixes, design as well as implement solutions to improve the efficiency of their computers.
Online technical support is gaining in popularity among tech consumers. One of the main reasons is increasing complexities in technology usage. And another reason is convenience. The customer gets the quality support at his/her own premises. The technicians make this possible with the help of remote desktop connection. This is known as remote support.
A remote computer technician watches everything on his/her computer screen while working on your problem. With advancements in technology, you can even control the actions taken on your PC while availing the remote support, just in case you feel that there is a breach of security. You can also ask for the support over phone. Here, you are given the instructions from a remote location over phone and you follow those instructions to fix your computer error.
Although the entire method is popular, it is always preferable that you take good references for online tech support companies from your friends and family. You may also search for good computer support resources on the Internet. Use keywords such as Computer Repair, Computer Support, Online Technical Support, and PC Repair Services to refine your search and narrow down on the best.
Article Source: http://goo.gl/NWcP0


View the original article here
More aboutThriving Computer Support Services

How to Enable Windows Installer Logging by Modifying Group Policy

Posted by umar ananda riyadi

by Daina Thomas Delicious 0 Share this post:
Design Float
StumbleUpon
Reddit
This post provides computer help to enable windows installer logging by group policy. You can use Group Policy to enable logging by modifying the appropriate organizational unit (OU) or Active Directory Group Policy:
Follow the Steps
1. Click Start, and then click Run.
2. In the Open box, type gpedit.msc to start the Group Policy Editor.
3. Expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Installer.
4. Double-click Logging, and then click Enabled.
5. In the Logging box, specify the options for what you want to log. The log file, Msi.log, appears in the Temp folder of the system volume.
For more information about MSI logging, refer to Windows support. Search Help by using the phrase "msi logging," and then click the "Managing options for computers through Group Policy" topic.


View the original article here


P
More aboutHow to Enable Windows Installer Logging by Modifying Group Policy

BlueScreenView Shows You the Errors Behind the Blue Screen of Death

Posted by umar ananda riyadi

BlueScreenView Shows You the Errors Behind the Blue Screen of Death Windows: With luck, blue screen of death is something that most Windows users don't see anymore, but if you do, sometimes it can go by so quickly that you don't get a chance to review the error displayed so you can look it up later. BlueScreenView is a free utility that will retrieve the error information for you later so you can research what caused it.
In order for BlueScreenView to work, you'll need to make sure Windows is configured to save crash information to your minidump folder-that's where the app goes to look for it. (In Windows 7, this is in System Properties, under "Startup and Recovery" in the Advanced tab.) Then, once you've restarted your computer after a blue screen error, you can open BlueScreenView to see what driver or module caused the error, what the error code was, and even perform a Google search for the error right from the File menu of the tool.
With BlueScreenView, you don't have to scramble for pen and paper if your system crashes: you can reboot in safe mode and search for what caused the error quickly. BlueScreenView is free, and supports all versions of Windows, including Windows Server 2003 and 2008.
BlueScreenView | Nirsoft via Addictive Tips
You can reach Alan Henry, the author of this post, at alan@lifehacker.com, or better yet, follow him on Twitter or Google+. Related Stories


View the original article here
More aboutBlueScreenView Shows You the Errors Behind the Blue Screen of Death

Diagramly Alternatives and Similar Software - AlternativeTo.net

Posted by umar ananda riyadi

Online diagram and flowchart software that supports Microsoft Visio import. The easiest way to draw flowcharts, wireframes, UML diagrams, network diagrams, mind maps, iPhone mockups, site maps and more. Work together in ...


View the original article here
More aboutDiagramly Alternatives and Similar Software - AlternativeTo.net

How to Make Gmail Play Nicely with Your Desktop Email Client

Posted by umar ananda riyadi

If you use Gmail as your email backend but prefer a good old-fashioned desktop email client for handling your day-to-day email, you're probably aware that many clients—like Outlook or Mail.app—don't play that nice with Gmail. Here's how to fix that.
While Thunderbird no longer needs any extra work to become the ultimate Gmail IMAP client, mail clients, such as Mail.app or Outlook, do not exhibit normal behavior when using Gmail's servers.
Gmail may have won our hive five for best email client, but there are still quite a few of you that preferred something like Outlook or Apple Mail. The trouble is, even though Mozilla has caught on and made Thunderbird integrate almost perfectly with Gmail, most other mail clients still don't work all that well with Gmail. If you set up Gmail in Mail or Outlook, you wouldn't necessarily see all your labels, your sent messages may go into different folders, and archiving and deleting a message would archive it by default (with no real delete function in sight). Worst of all, Gmail thinks it knows what's best for you, but its recommended settings don't match up with most people's instincts (for example, most people expect that the delete function means "delete" and not "archive"). Here's how to make your client behave properly, without sacrificing all of Gmail's more advanced options.
Note: While there are a plethora of email clients out there, this guide will give specific directions for both Apple Mail and Outlook 2007, each of which is slightly different. In general, though, most mail clients should have similar options to one of the two (most likely Apple Mail), and these guidelines should at least help point you in the right direction.

If you've tried to set up Gmail in a mail client before, this part isn't very different (in fact, if you already have Gmail set up in your IMAP client, you can skip this step). The very first thing you need to do is go to the Gmail web interface and go to Settings > Forwarding and POP/IMAP. Make sure you've enabled IMAP access to your account at the bottom of the page (see the screenshot at left). Save your changes and open up your mail client of choice.
You can find specific instructions for setting up most email clients with Gmail's servers on Gmail's support page, complete with screenshots for each specific client, but the key things that you'll want to pay attention to are your incoming and outgoing servers (imap.gmail.com and smtp.gmail.com, respectively, even for Google Apps accounts), and that your port numbers for each are 993 (using SSL encryption) and 587 (using TLS, if available, otherwise using SSL). Both servers will need authentication with your Gmail username (which is your entire email address including the @domain.com portion) and password. Again, check your client-specific instructions on Gmail's support page to make sure you've followed everything "correctly". If you have, you should be able to view at least your inbox in your mail client, if not all the other folders.
Once you've completed the basic setup, it's time to get your desktop email client working with Gmail the way it should.
One of the main problems with Gmail in most clients is that the client doesn't use Gmail's sent mail and trash folders by default, leading it to create its own labels that don't match up. In order to organize our folders and labels as best as possible, we're going to turn on a Gmail Labs feature that will allow us to customize which ones are shown in the mail client. In Gmail's web interface, go to Settings > Labs. Scroll down to "Advanced IMAP Controls", enable it, and save your settings.


If you're not seeing all of your Gmail labels in your client's sidebar (including Sent Mail, All Mail, Trash, and the like) you'll need to go to Settings > Labels in Gmail and enable them with your newly-installed lab feature. Check the new "Show in IMAP" box next to every label if they aren't checked already. This will make sure that we're able to use these folders in the mail client for what they were intended, and stop the mail client from creating its own sent or trash labels.
Note that labels in Gmail are the same as folders in pretty much every mail client, so from here on out I'll be referring to the two interchangeably.


Head back into your client and you should see all your Gmail folders in the sidebar. We're going to set them to the default sent and trash folders for the client. If you're using Apple Mail, click on a folder (such as the "Sent Mail" folder under [Gmail]) and go to the Mailbox menu in the menu bar. Hover over "Use This Mailbox For" and click Sent. This will make Apple Mail use Gmail's Sent Mail folder for sent messages instead of creating its own.


You'll notice that after you enable this, a label called "Sent Messages" will show up with your other custom labels. Gmail has half-fixed this behavior recently, but to be safe (especially if you've been using Gmail in a client for awhile) drag all the messages from the "Sent Messages" label to the "Sent Mail" label, to make sure they're all there (it shouldn't produce any duplicates, since the Gmail server recognizes them as the same message). You can then delete the "Sent Messages" label. Do the same thing for Gmail's Drafts and Trash folder. You can do the same for Spam, but I prefer not to have two junk filters going at once, so I turned this feature off.
In Outlook, this process is slightly more complicated. Any mail you send in Outlook will automatically go into Gmail's "Sent Mail" folder, but you'll also have a local duplicate in Outlook's "Sent Items" folder. Depending on how you organize your mail, you may prefer that, but I've found the best way to keep these duplicates from showing up is to actually set your sent mail folder in Outlook to Gmail's Trash folder. This is scary sounding (and extremely counter-intuitive), but Gmail will still make sure your sent messages get saved in the Sent Mail folder. The duplicate that would be saved in Sent Items is just sent to the trash, where Gmail will permanently delete it after 30 days.

To do this, go to Tools > Account Settings in Outlook, click on your Gmail account and then hit the "change" button. On the bottom left corner of the window, go to "More Settings" and click the Folders tab. Click on your Trash folder and hit OK. Then hit Next and Finish in your account settings to save that change.
Unfortunately, Outlook offers no way to remap the other folders, specifically Trash, meaning anything you delete will just be archived as before. You could just drag messages to the trash folder, but that isn't exactly ideal. Luckily, we can create macros to do what Outlook will not do for us. Go to Tools > Macros > Visual Basic Editor in Outlook and double click on ThisOutlookSession in the right pane. Being careful not to delete anything that may already be there, copy the following code into the box, courtesy of the Tap Consulting blog:
Sub TrashMessages() Set myOlApp = CreateObject("Outlook.Application") Dim myNameSpace As NameSpace Set myNameSpace = myOlApp.GetNamespace("MAPI") Dim myExplorer As Explorer Set myExplorer = myOlApp.ActiveExplorer 'Get the folder type, expected type is 0 i.e. mail folder. If other type of folder 'being used then abort macro as it should only be used with mail folders. folderType = myExplorer.CurrentFolder.DefaultItemType 'Check that folder is mail folder If TypeName(myExplorer) = "Nothing" Or folderType <> 0 Then GoTo invalidMailbox End If 'Locate root folder for this account Set thisFolder = myExplorer.CurrentFolder Do Until thisFolder.Parent = myNameSpace Set thisFolder = thisFolder.Parent Loop Set accountFolder = thisFolder 'Identify selected messages Dim selectedItems As Selection Set selectedItems = myExplorer.Selection Dim currentMailItem As MailItem Dim iterator As Long 'Move messages to Deleted Items folder Set trashFolder = accountFolder.Folders("[GMAIL]") Set trashFolder = trashFolder.Folders("Trash") Count = selectedItems.Count For iterator = Count To 1 Step -1 On Error Resume Next Set currentMailItem = selectedItems.Item(iterator) currentMailItem.Move (trashFolder) Next Exit Sub invalidMailbox: MsgBox ("Macro configured only to work with mail folders! ") Exit Sub End Sub  
Save the macro and exit Visual Basic Editor. Back in the main Outlook window, go to View > Toolbars > Customize. Hit the Category tab and scroll down to Macros in the sidebar. Drag Project1.ThisOutlookSession.TrashMessages up to your toolbar, wherever you'd like the button for this action to be (I put it next to the delete "X" button).


You can give it a better icon by clicking on the button in the toolbar, hitting "Modify Selection" in the Customize window, and going to Change Button Image. I used the trash can icon. You can also check "Default Style" in the Modify Selection menu instead of "Image and Text" so the name doesn't take up space. Also, if you rename it to something like &1Trash, you can even get a hotkey to send mail to the trash for you (the hotkey being Alt + whatever character comes after the ampersand, so in this case, Alt+1). Now, hitting Alt+1 or clicking the Trash button will delete the selected item. Note that you may need to restart your computer before the macro starts working.


The last major problem with most email clients is that they will see all mail in more than one label as a duplicate, meaning every time you receive a new message, your mail client will say you have two: one in Inbox, and one in All Mail. Additionally, there aren't any "archive" functions built in to a lot of mail clients, so we'll need to find another way to use this feature.
In Outlook, most of your work is cut out for you from the last step of the process. Since we've created our own "send to trash" button, the delete button still does what it always did: archives messages. So, when you want to delete a message, you can hit your new macro, and when you want to archive a message, you can hit the delete button. It isn't perfect, but as long as you remember the difference you should be fine (just remember that the delete key on your keyboard will archive the item).
To fix the All Mail duplicates problem, just go to Tools > IMAP Folders and hit the Query button to bring up a list of your folders. Unsubscribe from All Mail and uncheck the "When displaying hierarchy in Outlook, show only subscribed folders" box. This will keep All Mail visible in Outlook, but will not alert you to the new messages in that folder. If you want to hide folders from Outlook, you can still do so under the Labels section of Gmail's settings instead of unsubscribing from them in Outlook.


Since we can't unsubscribe from folders in Apple Mail, we'll have to do things a bit differently. In Gmail, create a new label and call it "MailArchive". Then, go to Settings > Labels and uncheck "Show in IMAP" next to All Mail. This will stop us from receiving duplicate notifications for new mail. If you'd like an All Mail folder to show up in your client, you can create a new smart folder in Mail by going to Mailbox > New Smart Mailbox and making one that includes every folder in the account. Make sure it is set to match "any" of the following conditions instead of "all" conditions. For some reason, this smart mailbox will show unread badges in the sidebar, but not on the dock icon. It also won't need to reload when you mark a message as read, so the badge will go away instantly when you read the message in your inbox.


Earlier, we set up Mail so that deleting messages actually deletes them (unlike our Outlook method), so we'll want to create our own shortcut for archiving messages instead. The easiest way to do this is to create a Service (note that this only works in Snow Leopard). Open up Automator, choose Service as your template, and set the top drop-downs to "no input" and "Mail". Then, find the Run Applescript action in the sidebar and drag it into the main window, copying and pasting this script from MacOSXHints into the text box:
on run {input, parameters} set target_account to "myaccount" set target_mailbox to "MailArchive" tell application "Mail" set theSelectedMessages to selection repeat with theMessage in theSelectedMessages tell application "Mail" move the theMessage to mailbox target_mailbox of account target_account end tell end repeat end tell return input end run  
You'll need to replace "myaccount" with the name of your account. Save the service as Archive Message.


Head into your System Preferences, click on Keyboard and then go to the Keyboard Shortcuts tab. Select Application Shortcuts in the sidebar, and hit the plus sign to add a new shortcut. You'll want the application set to Mail, the Menu Title set to Archive Message, and the keyboard shortcut set to whatever you want (mine is set to Cmd+1). Keep in mind you can't use keyboard shortcuts that are already taken.


Now, when you want to archive a message in mail, just hit your keyboard shortcut and it will move it to the MailArchive folder. This will archive the message in Gmail and add the "MailArchive" label to it, which shouldn't have any adverse effects since it will also show up in any other folders you want it in. If you have any unlabeled messages in your Gmail "All Mail" folder, you'll want to apply the "MailArchive" label to them so they show up in your new Smart Mailbox for All Mail. It's not pretty, but if you don't spend a ton of time in the Gmail web interface, you won't notice or care.
This certainly isn't the only way to do things, and depending on your personal preferences you may want to tweak a few of the above settings, or handle them differently altogether. This is the way I've found works best for me, though, for using Gmail in my native mail clients without losing all of Gmail's advanced features like archiving. If you have a different way of handling some of the above issues, lets hear about them in the comments.


View the original article here
More aboutHow to Make Gmail Play Nicely with Your Desktop Email Client

What’s the Difference Between Viruses, Trojans, Worms, and Other Malware?

Posted by umar ananda riyadi

Lifehacker's tech-savvy readers are the first people on speed-dial when it's time to heal an infected PC, but how much do you really know about viruses, spyware, scareware, trojans, and worms? Here's a helpful guide to understanding all the different types of malware.
The point of today's lesson, of course, is to help you teach your friends and family more about the different types of malware, and debunk a few of the common myths about viruses. Who knows, maybe you'll learn a thing or two as well.
The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.
The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared. Image by Joffley
Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you're dealing with a virus.
Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your expense, it doesn't usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you've got that many pieces of software spying on you, your PC is going to become slow.
What many people don't realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.
Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC.
If you manage to come across a PC infected with one of these, your best bet is to Google the name of the virus and find specific instructions on how to remove it, but the steps are usually the same—run a combination of MalwareBytes, SuperAntiSpyware, and maybe ComboFix if you need to.
For more on scareware, including a full walk-through of how a PC actually gets infected in the first place, check out the guide I wrote on removing Internet Security 2010 and other fake antivirus malware.
Trojan horses are applications that look like they are doing something  innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user. Image by otzberg
Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don't open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that's one of malware authors' favorite spots to hide a trojan.
Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses. Image by me and the sysop
Some of the most famous worms include the ILOVEYOU worm, transmitted as an email attachment, which cost businesses upwards of 5.5 billion dollars in damage. The Code Red worm defaced 359,000 web sites, SQL Slammer slowed down the entire internet for a brief period of time, and the Blaster worm would force your PC to reboot repeatedly.
Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down—you'll still need an updated antivirus software, of course.
Glad to finally put a name to the annoyingly threatening scareware? Does it irritate you when somebody calls spyware a virus? Be sure to send this article to them, and share your malware war stories in the comments.
The How-To Geek always laughs at viruses aimed at alien spacecraft. His geeky articles can be found daily here on Lifehacker, How-To Geek, and Twitter.


View the original article here
More aboutWhat’s the Difference Between Viruses, Trojans, Worms, and Other Malware?

File sort order reversed or wrong in File Open or File Save dialog box

Posted by umar ananda riyadi

An Independent Source for Technology Descriptions, Discussions, and Debates
File sort order reversed or wrong in File Open or File Save dialog box

After searching in vain for quite awhile for the fix for this little
annoyance, I found a similarly named thread from a while ago, that
contained wrong information.
Somehow or another, the sort order of the files can get changed in the
File Open Dialog Box, as well as any other common dialog box that lists
files based on the same control.
It is maddenly difficult to find the fix for this using Google.
Anyway, the fix:
Right click My Computer, choose Explore.
Click on the C: Drive in the left pane.
Click on the View Menu, then choose List.
Right click in the empty whitespace area in the right pane where the
files get listed.
Choose Arrange Icons By.
Pick "Name".
Verify files are sorted alphabetically. If not, repeat.
Press and hold the control key, then click on the "X" to close
Explorer.
Then you can reopen explorer and set whatever default view you want in
explorer.
The key here, is that the file open dialog box, and all other similar
controls, use the sort method saved when in "List" view. Nowhere else
have I seen this. If you do it using "Details" view, it won't fix the
dialog box sort order.
I post this in the hopes that it might show up in a Google search the
next time I screw it up and can't remember how to fix it.
The above might only be true for my computer, but I have verified it,
and finally squashed the little cockroach of a problem.
Cheers,
--97T--
Thumbs up Re: File sort order reversed or wrong in File Open or File Save dialog box
I had the same little roach in my lappy for some odd reason...It was fine till a few weeks ago and then....well I guess I most have done something.... It took me long enough to find a fix for it; it was driving me crazy!!
Thx
Re: File sort order reversed or wrong in File Open or File Save dialog box
Hey, thanks for the fix! I managed to contract it also, I have no idea how and it took me a while to find this page, but I was glad when I did! I was already getting really irritated by it.
Re: File sort order reversed or wrong in File Open or File Save dialog box
I have this same issue and it is driving me nuts. No solutions I have found online work for me. I tried the above several times, including with Restart. I found the issue posted a few other places online too -- I even found the xp_shellstate.exe that is supposed to restore the original sort order, but NOTHING works.
The problem occurs in both Internet Explorer (IE7) and Firefox.
Problem: When I am in the browser, I click Save-As, and it pulls up the directory in order by date. The result is the files are scrambled alphabetically. I have tried many times to restore the sort order to alphabetical by default, but nothing works. I routinely need to open files in this manner, as the work I do involves filing documents electronically, where I have to access files on the server while I am in my web browser.
I never have the problem in File Explorer or My Computer -- only when using a web browser.
Are there any other solutions??
Re: File sort order reversed or wrong in File Open or File Save dialog box
I mentioned the issue to another person in my office, and he mentioned another issue where some of his folders had been coming up as icons and others as list when viewed in My Documents. So we went to his computer, My Documents, and went to the root directory of the server. Then Tools, Folder Options, sorted by details, then clicked Apply to All Folders. Then, I went to the computer in my office and did the same. I don't know if it was doing those steps on his computer (if it is the dominant computer or something??) OR if it was from doing it on mine, but the result is now when I Open or SaveAs in my web browser, they come up alphabetically again. Finally!!
Re: File sort order reversed or wrong in File Open or File Save dialog box
Thanks for posting this fix!!!!
I've been living with this problem for weeks, but I finally got tired of re-sorting everytime I open a file.
salud!
Thumbs up Re: File sort order reversed or wrong in File Open or File Save dialog box
Such a simple fix for such an ANNOYING problem!
Sort the file the way you want.
Hold down the Ctrl key and click the X in the upper right-hand corner of the Window to close it.
Presto, problems solved!
THANK YOU!!
Re: File sort order reversed or wrong in File Open or File Save dialog box
Thank you so much for the post.
Saved my life. I was literally going crazy.
I will be posting an description and explanation of my experience on my site as well to also help others who might have the same situation.
Thanks again.
Re: File sort order reversed or wrong in File Open or File Save dialog box
Please include the older postings, too. Thanks.
"beingzoe" wrote in message news:3abae93fd00cfb1e8ab5dae05ca3801d@nntp-gateway.com...
>
> Thank you so much for the post.
> Saved my life. I was literally going crazy.
>
> I will be posting an description and explanation of my experience on my
> site as well to also help others who might have the same situation.
>
> Thanks again.
>
>
> --
> beingzoe
Re: File sort order reversed or wrong in File Open or File Save dialog box
Thanks for the tip. I think you're the type of person just like me that will share the solution of some tough question to other people. Way to go
Join DateJan 2011LocationUKPosts1Re: File sort order reversed or wrong in File Open or File Save dialog box
Yes, thank you for sharing this.
It works for me at the top level of the folder structure but if I go in to a folder, the files remain showing as 'details' and sorted by date modified. I try and change to list view, sort by name and then ctrl-X but no joy. Always reverts back. :-(
By AliilA in forum Windows Vista Replies: 10 Last Post: 05-05-2010, 04:00 AM By Ollie in forum Microsoft Office Replies: 10 Last Post: 08-03-2009, 02:30 PM By Rich Pasco in forum Windows XP Replies: 7 Last Post: 10-17-2008, 03:55 AM By Rick Hillier in forum Windows XP Replies: 1 Last Post: 06-28-2007, 09:20 PM By Evaldas in forum Windows XP Replies: 2 Last Post: 03-07-2007, 07:30 AM You may not post new threadsYou may not post repliesYou may not post attachmentsYou may not edit your postsForum Rules
Search Engine Friendly URLs by vBSEO 3.6.0


View the original article here
More aboutFile sort order reversed or wrong in File Open or File Save dialog box

Five Best Disk Defragmentation Tools

Posted by umar ananda riyadi

 Defragmenting your hard drive regularly is an important part of regular hard drive maintenance, and the best tools can defrag your drive regularly or on demand when your games start to slow down or you have trouble loading up large files. The trouble is that there are so many defragging tools that it can be difficult to choose. This week we're going to look at five of the best, based on your nominations.
Earlier in the week we asked you which tools you used to defragment your hard drive. You weighed in with more suggestions than we could possibly highlight, but here's a look at the top five.
The poll has closed, and the winner has been decided. Head over to the Hive Five Followup post to find out who won and by how much!

Defraggler is unique in that it allows you to defragment your entire drive, or specific files or folders (fantastic if you want to defrag all of your large videos, or all of your save game files.) The utility also supports "quick defrag," which can speed up your drive and do get a lot of work done without the time required to do a full scan and defrag. The app is portable, and you can run it from a thumb drive if you need to work on multiple PCs. You can schedule the app to defrag your drive at regular intervals, and even tell Defraggler to only clean up free space on your drive.

Formerly JKDefrag, MyDefrag is a disk defragmentation tool that's easy to use and difficult to master. The app is simple enough that you can fire it up and tell it to work its magic on your drive, but if you want to get under the hood, the app includes a number of scripts and a scripting engine that gives you access to the tool's underpinnings. There's a command-line version, and even a screensaver to run while MyDefrag tidies up your drive. MyDefrag is a little slow, but when it's finished, loading large files like games and video will be much faster.

DIsk Degfrag from Auslogics goes a little further than simple disk defragmentation. The app will also optimize your file system for faster file reads and writes, show you a list of fragmented files instead of a vague report of your hard drive's fragmentation status, and will even defragment single files and folders if you're having a hard time with a specific file or application. Disk Defrag will also automatically defrag your system at specified times or when your PC is idle.

Smart Defrag is one of the fastest defragmenting tools we've seen, and that's saying a lot. The app supports boot-time degfragmentation so your disk is optimized as soon as you turn your computer on, and just as easily allows you to schedule defrag sessions for times idle times or hours when you know you won't use your system. You can also leave the app running in the background (it does this by default) so it's working while you're working—you won't even notice it's there. If you have more time to spend, Smart Defrag will defrag your drive and optimize your file system to speed up everyday activities as well.

A number of you said you don't need a disk defragmentation tool: you're happy using the utility built in to your OS to get the job done. Windows' built-in app, Disk Defragmenter, can definitely analyze and defragment your drive at regular intervals, and by default is set to do defragmentation jobs every week, in the early AM when you're likely not using your system. While it doesn't offer advanced tools like the other utilities, like single file/folder defragmentation or idle-system defragmentation, it gets the job done and stays out of the way if you don't need those added features. Plus, it's built-in to Windows, so you don't need to install anything extra.
Now that you've seen the top five, it's time to vote for an all out winner.
There were a ton of other nominations in the call for contenders thread—far too many to decide on specific honorable mentions, but it's clear that these five aren't the only options for disk defragmentation tools. Did we leave out your favorite? Let us know why you prefer it to the top five in the comments below.
You can reach Alan Henry, the author of this post, at alan@lifehacker.com, or better yet, follow him on Twitter or Google+. Related Stories


View the original article here
More aboutFive Best Disk Defragmentation Tools

Windows Explorer Weirdness

Posted by umar ananda riyadi

Editor's Note: This is, by far, the most popular article I've ever written on any computing subject. And, ironically, instead of answering someone else's question, I was answering one of my own. We're republishing the article here, in the hopes that it will get spidered by more search engines and more users can rid themselves of this extremely frustrating situation. These excerpts from some of the "thank you's" I've received recently give you an idea how annoying it can be to be faced with this undocumented weird Windows problem.
"Thank you for the "Windows Explorer Weirdness" article about how an unintended holding of the Ctrl key messed up the File Open/Save dialog. You've saved me!"
"I just wanted to give you a quick thanks for your article. I was literally going CRAZY with the same problem (open dialogues using 'sort by date' rather than by alpha order. I am quite experienced with win98 and I had never found a solution. I personally wanted to thank those responsible for helping me fix this."
"I have wasted half a morning trying to find a fix and you are my saviour."
So, without further ado, here's the article that appeared in our CC Tips e-zine in August of last year.
For the past couple of months I have been coping with an incredibly frustrating problem. My files in the File Open dialog box mysteriously started appearing in order of the "Last Modified" date, instead of in alphabetical order. Let me tell you, this problem was driving me nuts. Our Web site has more than 200 files in it and wading through the list NONalphabetically has been one gigantic pain. I figured at some point I must have clicked just the right key combination to change some Windows default setting somewhere. But I couldn't put it back. (Oh the aggravation!)
I had my husband (the mega nerd) riffle through my Windows registry settings to see if he could find a setting somewhere that affects how files are listed. No dice. And I tried every combination of keystrokes I could think of in my effort to restore alphabetic order. One thing I did discover, which sort of mitigated the problem to a degree is that if you right-click over the file listing area of the File Open dialog box, you can change how the files are listed (choose Arrange Icons, then By Name).
Finally, I ran across a tip that contained the solution. As it turns out, you can force Windows to remember the file listing settings. I apparently did this accidentally at some point. Here's what you do: go into Windows Explorer and open a folder such as My Documents. Now choose View|Details. Along the top of the file listing area, you see Name, Type, Size, Modified. If you click any one of these, it will change how your files are sorted in the list. For example, you click Modified to sort your files by the date they were modified.
Now...here's the part that made Windows save this sorting information everywhere. Hold down the Ctrl key and click the X in the upper right-hand corner of the Window to close it. Now whenever you run a Windows application that uses the File Open, Save, or Save As dialog boxes, the files are listed in Date Modified order rather than Alphabetically.
It's sort of astonishing to me that I could have experienced so much aggravation just because I held down the Ctrl key at an inopportune time, but there it is. The mystery of computers just never ends.

View the original article here
More aboutWindows Explorer Weirdness

Setup ISCSI for NAS in Windows 2008 Storage Server?

Posted by umar ananda riyadi

SAN is an expensive product not everyone can afford it. On the other hand, NAS is affordable and can be configured as the SAN when you have the windows storage server installed. This document will show you how to configure the NAS and the iSCSI target and initiator.
Pre requisites 1- Windows Storage Server 2- 2 NICs in each server that will be involve in this setting 3- Separate switch not less than 1Gb
Procedures and steps
STEP 1: Setup the SAN and the Applications Server's NIC 1- Study the above diagram 2- Separate Gigabits switch and connect one of the NIC in each server that part of iSCSI setup to it. 3- Configure the NIC with an ip address different from the main network ip as in the above diagram. You don't need to configure GW or DNS
STEP 2: Setup the iSCSI Target in the NAS server 1- Under the Administrative Tools or Server Manager select the iSCSI Target Software and a wizard will start, Setup the name and description 2- Setup the IQN (this is what is the iSCSI initiator use to connect) In the IQN delete whatever there, if there is any and add something similar to the below may be XYZ-NAS1 3- Follow the wizard to the end without changing anything
STEP 3: Create the VDH 1- Create a folder in the NAS biggest drive called Virtual Disks 2- Right click on the target you created in the previous step and select Create a virtual disk. Wizard will start type the location of the VHD i.e. E:Virtual DisksVHD1.vhd 3- Set the size to the agreed one and give it a description to explain what is going to use for and where it is attached.
STEP 4: Install and Configure iSCSI Initiator 1- If you are running windows server 2003, download the initiator from http://www.microsoft.com/downloads/en/details.aspx?familyid=12cb3c1a-15d6-4585-b385-befd1319f825&displaylang=en 2- If you have windows 2008 or above it should already installed for you 3- Install the iSCSI initiator and select the top two only. 4- When you start the initiator it may ask you enable the service to start automatically and open ports in the FW 5- Under the General tab click on the Change button and type the IQN you typed in the previous step 6- Select the Discovery tab click on the Add button and enter the IP address of the NAS server click OK 7- Click on the Targets tab and you should see like below. If you didn't hit the refresh button. Then select the name and click on the Log On button and select Automatically restore this connection when the system boots 8- Click on the Bound Volumes/Devices tab and select the volume you want to add to the server as an extra storage and click on BindAll. Then click on Apply and OK
STEP 5: Use the Extra Disk you just add it 1- Open the Server manager or just Manager and click on Storage and then Disk Manager. 2- A wizard will pop up and ask you to initiate the disk choose only the disk(s) you just add and after that you know what to do this new DISK.
More aboutSetup ISCSI for NAS in Windows 2008 Storage Server?

Computer Communications Speed

Posted by umar ananda riyadi

Files have become larger and larger over time. Most computers and Internet devices today support streaming video and other large file transfers. A home may have several computers accessing the Internet and transferring large files simultaneously. Many on-line computer repair tools advertise speeding up your computer's communications speed. So what makes for fast information transfers? This article explains how communications speeds can be increased in your computer.
Communications speed depends upon the bits per second transmission speed, the amount of data in each chunk (packet-frame) of data transmitted and the error rate (e.g. one (1) bit error in 10,000 bits transmitted or a lot lower). Matching these to a communications channel is what makes the channel efficient and speedy in transferring data.
In the early 80's communications between computers used dial-up analog telephone channels. In the mid 1980's the first Small Office Home Office (SOHO) Local Area Networks (LANs) were sold. These permitted all computers in a home or office to share data amongst themselves. As time transpires communications speeds have increased substantially. This has made a difference in communications performance because the primary contributor to communications performance is transmission speed in bits per second.
Transmission speeds across a an analog telephone channel began at 300 bits per second (bps) or roughly 30 characters per second in 1980. It soon increased to 1,200 bps, then 9,600 bps, and upwards to 56 thousand bits per second (Kbps). The 56 Kbps speed was the fastest speed that an analog telephone channel could support. Internet connections now are broad band connections that started at speeds of 768 Kbps - up to the Internet and 1.5 Mbps down from the Internet. Coaxial Cable and Fiber Optic cable systems offer a variety of speeds ranging from 5 Mbps up/15 Mbps down to 35 Mbps up/ 150 Mbps down. Comcast and Verizon often state the down speed first because it is the larger and more impressive number. The speeds are mismatched because less data is sent to the Internet than is downloaded from the Internet.
LAN speeds in the mid 80's started at 10 Million bits per second (Mbps), then rose to 100 Mbps, and today we have 1 Giga or Billion bits per second (Gbps).
The early disk drive interfaces transferred data in parallel at speeds of 33 Mega or million Bytes per second (MBps). An equivalent bits per second speed would be roughly 330 Mbps. Speeds increased to 66.7 MBps, then to over 100 MBps. At that time the new Serial AT Attachment (SATA) interface was introduced which jumped the transfer speeds to 1.5 Giga bits per second (Gbps), then quickly to 3 Gbps, and to 6 Gbps today. These communications speeds were and are needed to keep pace with the volumes of data communicated between computers and within a computer.
When computers transfer data like web pages, video files and other large data files, they break the file up into chunks and send it a chunk at a time to the receiving computer. Sometimes depending upon the communications channel, a wired Local Area Network (LAN) channel or a wireless Local Area Network channel, there are errors in the chunks of data transmitted. In that event the erroneous chunks must be retransmitted. So there is a relationship between the chunk size and the error rate on every communications channel.
The configuration wisdom is that when error rates are high the chunk size should be small so as few chunks as possible have errors necessitating re-transmission. Think the opposite way, if we made the chunk size very large it would guarantee that every time that large chunk of data were sent across a communications channel it would have an error and would then be re-transmitted - only to have another error. Such a large data chunk would never be successfully transmitted when error rates are high.
In communications terminology my data chunks are often called packets or frames. The original Ethernet LAN packets were 1514 characters in size. This is roughly equivalent to one page of printed text. At 1,200 bps it would require about 11 seconds to transmit a single page of text. I once sent 100 plus pages of seminar notes to MCI Mail at 1,200 bps. Because of the high error rate it took several hours to transfer the complete set of course notes. The file was so large that it crashed MCI Mail. Oops!
When communications speeds are higher and error rates very low, as they are today, extra-large chunks of data can be sent across a communications channel to speed up the data transfer. This is like filling boxes on an assembly line. The worker quickly fills the box, but extra time is required to cover and seal the box. This extra time is the transmission overhead. If the boxes were twice the size, then the transmission overhead would be cut in half and the data transfer would speed up.
Most all computer products are designed to communicate across low-speed high error rate communications channels. The high-speed communications channels of today also have extraordinarily low error rates. It is sometimes possible to adjust the communications software and hardware to better match the speed and error rate of a communication channel and improve performance. Sometimes adjustments are blocked by the software. Many times you cannot tell if the performance has been improved or not. Generally, if you can increasing the packet (chunk) size should improve performance when the hardware and software products you are working with permit such changes. In Windows adjusting the Maximum Transmission Unit (MTU) adjusts the networking chunk size. There are non-Microsoft programs that help make the changes or this can be manually adjusted. The problem is that the error rate can vary depending upon the site which you are visiting.
For example, when the first Mars rover pictures were being published by JPL there were several mirror sites hosting the files. These sites had a lot of people with computers trying to download the pictures. There was huge congestion at these sites. I wanted the pictures badly but did not want to battle crowds, so I look at the available mirror sites and spotted one un Uruguay. At that time I figured how many people in Uruguay had computers and high-speed Internet access. So it seemed to me that there would be no congestion at that site and I could down load the Mars pictures easily. I was correct, but the download speed was not fast. It probably took twice as long to down the Mars pictures. That is because the communications speed to the servers in Uruguay was slower than the speed in the U.S. and likely the error rate was higher as well.
At this point it is good to remind you that "Defaults Work Best". When in doubt go with the default values. Do not try to out think Windows.
Since the communications speed and error rates vary depending upon whether you are visiting Yahoo, Google, Microsoft, or some little known site in Uruguay, it is best to pick a good all round chunk (packet) size and stick with it. If you do change the size, it is good to conduct periodic comparisons to see if performance really is better.
There is at least one simple thing you can do to improve performance when copying files from computer disk drive to computer disk drive inside your computer. Start three copying tasks going in the Windows Explorer and have the 1st Windows Explorer copying task copy one-third of the files, the 2nd copy the second third and the 3rd copy the remaining files. In this manner the three Windows Explorer copying tasks run simultaneously and increase utilization of the communications channel shortening the overall communications time. If you do the transfers across the network channel, you can see the network utilization increase in the Task Manager by starting multiple copying tasks in Windows Explorer.
There is a commercial (not free) program called Total Commander that acts similar to Windows Explorer. In addition, Total Commander does permit setting the transfer chunk size. This option is buried in the menus. As an experiment I tested to see if there was an impact on performance when the chunk size was increased. Normally, the default size is 32 Kb per chunk, but I found that increasing the size to 8192 Kb per chunk provided better overall data transfer performance. This has proved a boon because I routinely transfer 100's of Gigabytes of data between drives. Still running several copying tasks in Windows Explorer is improves performance as well.
So the bottom line is that as communications speeds increase and error rates decrease, transferring larger chunks of data (if we can) improves communications performance. When error rates are high on any communications channel, Windows stops dead in its tracks and times out waiting for the channel to respond. To us it looks like Windows has died. In this case go to lunch and come back before powering off the computer.
Please remember "Defaults Work Best" so do not get too creative.

Article Source: http://EzineArticles.com/6772676
More aboutComputer Communications Speed

Protect your computer from viruses

Posted by umar ananda riyadi

Is your network protected? As hackers get more and more sophisticated in their approach, it is important to counteract this threat through the use of antivirus software to protect your businesses computers from external harm.
Viruses can take many forms. Some look to infiltrate your computers simply to disrupt your operating systems. While these viruses may seem relatively harmless, this disruption or corruption of files can result in computer down-time and a subsequent reduction in productivity costing your business time and money.
Identity theft is on the increase and hackers are using tools such as spyware (or privacy-invasive software) to gather information in an attempt to gain information, passwords and financial information. A breach of security can be a serious issue for businesses. Even sensitive information such as trade secrets, customer lists and pricing can be targeted by thieves and miscreants.
In order to protect your business with the best virus protection possible, you may want to read up on the latest antivirus reviews, the newest virus protection programs and maybe even the familiarize yourself with the basics like answering the question: what is antivirus software? However, it is important to remember that simply installing antivirus software onto your business' computers is not enough. It is very important to ensure the antivirus program is robust and can be updated on a regular basis to keep up with new threats. It is also important to trust your antivirus protection to a professional IT support company which can provide antivirus protection, Trojan virus protection, spyware removal and a host of other IT services which will help protect your business.
Since no two businesses are alike, it is a good idea to consider delegating antivirus software issues to your IT support provider. These companies can provide services such as: network diagnosis, implementation of antivirus software, program training and ongoing IT support.
Managing software platforms can be a daunting task for any business. In turn, antivirus software management can be equally complex and may be best left to an IT professional. By choosing an IT service which can provide software protection and removal services, you will be helping to ensure your business interests are handled professionally. When it comes to protecting your business interests, it is best to partner with a specialist.

By
More aboutProtect your computer from viruses

History of Computer Viruses

Posted by umar ananda riyadi

History of Computer Viruses | So far we are already familiar with the term computer virus, even we know the dangers of computer viruses or even some of us can make a computer virus. But announcing you, how the history of computer viruses are created. But before we discusses about how the history of computer viruses, I had flashbacks to the meaning or definition of a computer virus.

Understanding or definition of Computer Viruses
Computer Viruses are malicious computer programs that deliberately for a particular purpose. Each virus has its own characteristics, in accordance with the purpose sipembuat virus. There are viruses that only the destruction done to the system, but there are also viruses that do not undergo a destruction of the system but to steal data from infected computers.

Okay, it is a fragment of a computer to know in terms of definition. Now let's look at the history of the creation of computer viruses.


The history of computer viruses - computer viruses tahuyn first discovered in 1981, its name virus 'in the wild'. The virus named Elk Cloner spread through floppy disks on the Apple II computer. 1983 Fred Cohen in his paper entitled "Computer Viruses - Theory and Experiments' provides the first definition of computer virus and describe experiments that have been done to prove the concept of a computer virus. Together with Len Adelman, he creates an example of a virus on a VAX 11/750 computer with the Unix operating system

It was the first version of the history of computer viruses. But there is also another version which says a computer virus was created in 1949 along with the creation of a computer. One computer creator John von Newman, who created the Electronic Discrete Variable Automatic Computer (EDVAC), says in his book entitled "Theory and Organization of Complicated Automata". That the possibility suattu program that can spread by itself. The development of computer viruses occurred at AT & T Bell Laboratory one computer lab in the world which has resulted in many things, such as C and C + + .1 In this laboratory, circa 1960's, every time off the researchers to make a game with a program that can destroy the ability to correct itself and behind the opponent's attack position. In addition, the game program can reproduce itself automatically. War of the program is called Core War, the winner is the owner of the largest remaining programs within a certain time interval. Because aware of the dangers of the program, especially if the laboratory is leaking out, then every game is completed, the program is always destroyed.

See both versions of the history of computer viruses, the most fundamental difference is the history of the creation of computer viruses for the first time. In my opinion, a more relefan and closer to the truth is the first virus created in 1949. While stating that the virus was first discovered kompuer is already entered a period of war-free virus.


Okay, I myself am not a historian. To view the history of the true or authentic Vedanta does not need support. If kuran satisfied please ask your computer historians. :)
More aboutHistory of Computer Viruses
Related Posts Plugin for WordPress, Blogger...