Saturday, 21 April 2012

How to Uninstall and Remove Software in Safe Mode in Windows Operating System


If you have installed software on your computer and for any reason it gives you issues, the best thing to do is to uninstall it.
(Learn how with this post...)


If you have installed software on your computer and for any reason it gives you issues, the best thing to do is to uninstall it. Period. But what happen if such a piece of software keeps restarting your Windows operating system or worst, disables certain services so that you won’t be able to performs some important operation anymore ? In this case Windows will help you with a special feature called Safe Mode. Basically, in Safe Mode you will be able to troubleshoot your computer in order to fix issues. However, if you need to uninstall and remove some software, you have to know that this kind of “limited state” Mode has the Windows Installer Service completely disabled. Let’s see how to turn it on and uninstall everything… even in the Safe Mode configuration. Windows Installation Service is responsible for the installation and uninstallation procedure. If you try to access it in Safe Mode you will get the following message: “The Windows Installer Service could not be accessed. This can occur if the Windows Installer is not correctly installed. Contact your Support Personnel for assistance”. The following tutorial will teach you how to turn the Windows Installation Service in Safe Mode:


1. Click Start
2. In the Search field, type regedit and press Enter.
3. Locate the following registry key: HKLM\ SYSTEM\CurrentControlSet\ Control\SafeBoot\ Minimal\
4. Right-click on the Mininal key and from the menu select New – Key. Now name the new key MSIService and change the value to Service by double-clicking it.
5. If you are in the Safe Mode with Network Mode, repeat the above steps for the following registry key: HKLM\ SYSTEM#92;CurrentControlSet\ Control\ SafeBoot\Network\
6. The newly created MSIService will make available the Windows Installation Service in Safe Mode. However, I want to remind you that it is necessary to turn the new service on.
7. To do it, exit regedit, click Start and in the Search field type: services.msc and press Enter.
8. From the list, locate Windows Installer. Right-click it and select Start.
9. If the procedure to turn on Windows Installer doesn’t work try this one:
10. Click Start.
11. In the search field, type cmd. Do not press Enter.
12. Right click the Command DOS icon and click the Run it as Administrator link.
13. In the command prompt, type net start msiserver.


At the end of the whole procedure do not forget to restart your computer for the changes to take effect.

How to Burn DVD’s The Easy Way


Chances are you’ve got a nice collection of DVD’s in your house that you wouldn’t want damaged. 
A smart idea would be to back them up, but with all these copy protections, how do you backup DVD’s easily?
A nice little program called RipItForMe, automates a few programs to bypass DVD protections and allows you to back them up. The program’s home page no longer exists, however it’s still avalible on the net. Just have a look in google. 
It’s very easy to use and even has a one click backup feature.
Oh, and did I mention its free? 


Check it out and enjoy!

Difference Between Core i3, Core i5, Core i7

Difference between Core i3, Core i5 and Core i7


Intel will stop selling Core 2 Duo and Core 2 Quad in 2010. Core is the new range of Intel processors.


Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)


Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 3-8 MB Catche
* 32-45 nm Silicon (less heat and energy)




Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 4-8 MB Catche
* 32-45 nm Silicon (less heat and energy)

desktop shortcut for locking your computer


Creating a desktop shortcut for locking your comp!






If you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here’s a recipe for a desktop shortcut that will lock your computer in two easy clicks:






Right click on an empty area of the desktop and choose ‘new’ then ’shortcut.’ The create shortcut wizard will open; in the first text box, type ‘%windir%\System32\rundll32.exe user32.dll,LockWorkStation’ and then give your shortcut an appropriate name on the next page, and hit ‘finish.’






You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit ‘properties.’ In the ’shortcut’ tab, click the ‘change icon’ button.






In the ‘look for icons in this file’ box, type ‘%SystemRoot%\system32\SHELL32.dll’ then click ‘ok’ to see a range of icons for your new shortcut. Choose an appropriate icon. Your desktop locking shortcut is now ready for use. Test it out.

secure YOUR WIRELESS LAN


Following actions should be taken.

* The most important thing is to change the default password of your access point.

* Firmware and the drivers of your wireless access point and wireless adapters should be up to date. They should be updates whenever necessary.

* There should be a combination of high level encryption and decent keys (WPA2/802.11i ) recommended.

* Wireless users should be authenticated with different protocols like 802.1X, RADIUS, EAP (including EAP-PAX, EAP-PSK, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-POTP, EAP-IKEv2, EAP-GPSK, PEAP, and EAP-SIM.

* The above protocols give credentials including certificates, usernames, passwords etc.

* Use Wireless LAN Security Tools for securing the wireless network. This software is specifically designed for securing 802.11 wireless networks.

* Use a proxy for outgoing requests.

* Always check the security of the wireless LAN using recent tools like Airbase, AirCrack-ng etc.

* Make strict system logging on all the devices, do check your wireless log files regularly.

secure your lan, lan security, firewalls, anti-viruses,tcp , udp,lan,lan security,networking