way to IT

Blogroll

Monday, June 18, 2012

On 9:41 PM by Unknown   1 comment
Find, Move or Delete Duplicate Files on Your PC

I do my best to have files on my PC organized and sorted so I know where every file is. And yet, when I ran this free software, during 3 minutes it found 1038 duplicate files on my system totaling 39 GBs. What a surprise! Imagine then how many duplicate files you have if you don’t pay much attention to organizing files on your PC?
Removing duplicate files from your PC will boost your system performance and speed it up immensely. Whether it be photos, mp3 files, text documents… Removing those files will enable you to have more disk space, reduce antivirus scan time, reduce the time it takes to defragment your hard drive and help you easily organize your files.
DuplicateFinder is a freeware program that will detect all the cloned files that you might have on your computer.


DuplicateFinder uses optimized detection algorithms and file filters so the scanning time is greatly minimized. The detected files can be removed in no time with the help of the automatic file selector and the predefined set of actions (copying, moving or deleting).


I must say it was pretty fast and efficient. Now I have additional 39 Gigabytes of space available when I cleaned up the unnecessary files in just 3 minutes. Of course, if you don’t want to delete them right away, you can always group them into a folder using “Move” option, and there you can see whether you want to keep some of them.


It works on Windows NT 4.0, 2K, XP, Vista, and Windows 7.
You can download Duplicate Finder http://www.bytessence.com/bdf.html


Thursday, May 31, 2012

On 5:53 AM by Unknown   No comments
[How to] Migrate to Windows 7 from Windows XP in simple manner

Microsoft released Windows 7 in 2009 and over the two years large number of users have migrated from Windows XP to Windows 7. This gives more concrete reason to migrate to newer platform from Windows XP. In this article we will discuss about the various way to migrate from windows xp to windows 7 in easiest manner. We will further take stock of the different ways that will help organizations in deploying Windows 7 flawlessly in their enterprise environment.

There are various ways to migrate from Windows XP to Windows 7. You can use the following tools to successfully migrate from Windows XP to 7 Migration:
  •     Windows Upgrade Advisor
  •     Windows Easy Transfer
  •     USMT 4.0 & USMT 4.0 using Hard-Link Migration

These are some of the ways in which you can take the backup of the your data in Windows XP and after migrating to Windows 7, you can restore that data using any of the tools mentioned above. However, even before you plan for a migration, make sure that you have a data backup in case of an unsuccessful migration.

First and foremost thing is to check whether  your machine is capable of handling Windows 7 or not. You can visit Microsoft’s website to identify the system requirements for Windows 7. The most preferred way to see the actual requirements and validate if the computer is capable of running Windows 7 is running Windows Upgrade Advisor.

Windows Upgrade Advisor


First download the Windows 7 Upgrade Advisor. Once the tool is downloaded, run the tool and see the report that will give detailed hardware information and accordingly you can plan for Windows 7 Migration.


Windows Easy Transfer

Windows Easy Transfer is free tool that is designed to take the user data and settings as a backup and store it on external USB device. This is recommended if you are migrating from Windows XP to Windows 7 on same machine. If there is network connectivity between the old computer and the new computer then you can directly transfer the data over the network. Lastly, if you have Windows Easy Transfer cable then you can use it to transfer data from the old computer to the new computer.


Once you are done with the data backup using Windows Easy Transfer, you can install Windows 7 on the computer. After the successful installation of Windows 7, you can run the Windows Easy Transfer on Windows 7 and restore the user data and settings back to the same computer.

Things to note, Windows Easy Transfer:

    does not take the backup of Program Files
    does not transfer the data from 64-bit Windows to 32-bit Windows

You can download Windows Easy Transfer for Windows XP and Windows Vista http://www.windows.microsoft.com/en-US/windows7/products/features/windows-easy-transfer
On 5:43 AM by Unknown   No comments
Install Android apps in Desktop [how to]

If you are using Android Smartphone and are in love with its applications and games,  you may want to use it on your desktop too. The other way, even if you don’t have Android phones and you may still like to enjoy its applications. In whatever cases there is a solution, an application called “BlueStacks – app player for Windows” will fulfill your wish. BlueStacks apps might be the great options for people who like to enjoy Android apps in desktop and don’t have an Android phone and Android powered tablet.  All you need to do is download and install BlueStacks application on your PC . This application is for free and you can find it in Google Play. BlueStacks, app player for Windows, is thus one of the best simulators for testing out Android apps.


After installation, when you run an application it automatically switch into the full screen mode.  At bottom you see the Menu, Rotate, Zoom and all Apps buttons in the center with app navigation and close buttons at either side. The zoom button switches the apps between full mode and standard mode. You can also download additional Android apps from BlueStacks channel. For this click on Apps button and then get more apps.

If you are using for the first time then you have to login with you Facebook account. Once you logged in then choose and subscribe the apps which you want.


The most exciting and interesting feature of this application is that you can synchronize the apps from your Android device to PC by using Bluestacks Cloud Connect. For this you have to install Bluestacks Cloud Connect apps on you mobile from Google Play. Once you have done with installation, to receive the PIN, open the Cloud Connect page on your PC’s browser, there you find Phone Pin of 9 digit. Now open the apps on your mobile and enter the pin no then you are almost done. Now select the apps which you want to sync with your PC but be careful while choosing the apps because there is a limit upto 35 applications at a time.

You might have to wait for some time for the apps to sync with your PC. When the  process is completed, you can run all your Android device’s apps on your PC. Limits maybe sensor and location aware apps which might search for the same in your local windows. All Android apps will be installed locally in your windows program files folder.


Tuesday, May 29, 2012

On 6:59 PM by Unknown   1 comment
Add caption
Make windows 7 genuine guarantee

Windows seven is the latest release of Microsoft corporation. Windows 7 is world’s highly used and trusted operating system till now. Microsoft hasn’t release any free edition of windows 7 to the current extent. You have to spend several dollars to purchase the genuine version of windows. It will make your pocket loose and I think you must be searching for the tips to make windows 7 genuine for free.


Make windows 7 genuine

Here I have a step by step tips to make windows 7 genuine guarantee. You have to follow the steps below in order to make windows 7 genuine for free. If you do not make  your windows genuine then you might face problem after the completion of 30 days trial period. You might seen a black screen and a message to make windows 7 genuine. So, to get rid of all these things you have to make windows 7 genuine. Just follow the simple steps listed below to make your windows 7 genuine :


Make windows 7 genuine



1.  First you have to download a small utility named RemoveWAT in order to make windows 7 genuine.

2. So, search, download and install the RemoveWAT free utility.

3. After the successful installation of RemoveWAT, you will see a screen with a Restore WAT button.

4.  Click on the Restore WAT button and wait for some time.

5. Now reboot you computer system.

6. Done, you have successfully made your edition of windows 7 genuine.

I hope you like this post about how to make windows 7 genuine, please like our facebook fan page to support us.
On 6:46 PM by Unknown   3 comments
Boost Torrent Download Speeds Using UTorrent Turbo Booster

uTorrent Turbo Enhancer is a latest plug-in designed to increase the performance of probably the most popular P2P computer file sharing program around – uTorrent. This application comes outfitted with today’s technology that is designed at getting your data transfer rate way up so you can pick up the information you want so horribly much faster than you have been used to. Films, music, games, programs, you name it – uTorrent Turbocom booster will provide at a fast rate. It will be there doing its job in the qualifications without disturbing any other action you might execute on your computer.



This tool is developed for getting your connections greater and making your downloading quick and much more constant by improving seed products which are almost missing during the deal. So now using this application you will be able to download  your files at much greater speed.

So Now Simply click On Link Given below to download UTorrent Booster Enhancer Plugin :

http://utorrent-turbo-booster.software.informer.com/

Monday, May 28, 2012

On 1:39 AM by Unknown   2 comments
How to make your IDM (Internet Download Manager)?

Make Your I.D.M. 5x faster [100%working]
1. Click the icon IDM
2. Click Option
3. On the Connection / Speed, select Other in bps type this value 10000000, and the Default Max conn.number select 16
4. Close IDM
5. Run Regedit> HKEY_CURRE NT_USER> Software> Download Manager> (see the right window) Connection Speed> double click> select decimal> content with 9999999999 999> press OK
6. Close regedit
7. Try performing the download.


Wednesday, May 16, 2012

On 6:55 PM by Unknown   No comments
Searching your history in Chrome is fairly useful, but it could use some improvement. Enhanced History Options is an extension that gives greater flexibility in searching and clearing your history.


Finding a page you visited last week, month, or year can be close to impossible, especially if you're diligent about clearing your browser history. Enhanced History Options is an extension for Chrome that lets you improve your history search and customize what you clear. Here's how to use it:
  • Install Enhanced History Options here.
  • Restart Chrome.
  • Press Ctrl+H to open your history. A new tab opens featuring Enhanced History Options. You can sort by title, number of visits, or date of most recent visit, and search easily from the top bar by keyword and date.
  • You have new clearing options, too. Of course, you can still clear all history with one click over on the right side of the page, but you can also clear a portion of your history by date range or keyword.
If you want to track your file and browser history in one place in Windows, read this post. Firefox has an add-on that allows threaded history viewing.
On 6:40 PM by Unknown   No comments


The guide to password security (and why you should care):
                  In a better world, vulnerable accounts like banks, medical records, e-mail, and cloud drives would be protected with biometric systems. A swipe of a finger or a retina scan would allow access to your most important data.
Alas, eight-or-more-character passwords still dominate Web service log-ins. Anything from your investment portfolio to your Facebook account is simply accessed with an e-mail address (or username) and a few characters.
Yet, many Internet users continue to use easy-to-guess passwords like "123456," "qwerty," or their first names. Even worse, users repeat the same password (or a variation of one) across many accounts, putting themselves at greater risk of being hacked.
From password creation to password management, follow this guide to ensure your data is safe, secure, and prepared to withstand a security breach.



How are passwords exposed?
Before we dive into the how-tos of creating secure passwords, it's important to understand why you need a supersecure password to begin with. After all, you might be thinking, "Who would want to hack little old me?"
There are a few ways your account passwords can be compromised.
Someone's out to get you.
                          Enemies you've created, exes from your past, a nosy mother, an intrusive spouse -- there are many people who might want to take a peek into your personal life. If these people know you well, they might be able to guess your e-mail password and use password recovery options to access your other accounts. (Can you tell I'm speaking from experience?)

You become the victim of a brute-force attack. 
                Whether a hacker attempts to access a group of user accounts or just yours, brute-force attacks are the go-to strategy for cracking passwords. These attacks work by systematically checking all possible passphrases until the correct one is found. If the hacker already has an idea of the guidelines used to create the password, this process becomes easier to execute.

There's a data breach. 
                    Sony, which wasn't careful in encrypting its user data, was targeted in a series of attacks where hackers (Lulzsec) exposed more than 1 million e-mail addresses, passwords, and accompanying data like home addresses and phone numbers. Most recently, a security hole was found in Max OS X's FileVault, where users' log-in passwords were available in plain text.

What makes a good password?
Although data breaches are out of your control, it's still imperative to create passwords that can withstand brute-force attacks and relentless frenemies. Avoiding both types of attacks is dependent on the complexity of your password.
Ideally, each of your passwords would be at least 16 characters, and contain a combination of numbers, symbols, uppercase letters, lowercase letters, and spaces. The password would be free of repetition, dictionary words, usernames, pronouns, IDs, and any other predefined number or letter sequences.

The geeky and security-savvy community evaluates password strength in terms of "bits," where the higher the bits, the stronger the password. An 80-bit password is more secure than a 30-bit password, and has a complex combination of the aforementioned characters. As a result, an 80-bit password would take years longer to crack than a 30-bit password.
Ideal passwords, however, are a huge inconvenience. How can we be expected to remember 80-bit (12-character) passwords for each of our various Web accounts?

Creating secure passwords
In his guide to mastering the art of passwords, Dennis O'Reilly suggests creating a system that both allows you to create complex passwords and remember them.
For example, create a phrase like "I hope the Giants will win the World Series in 2013!" Then, take the initials of each word and all numbers and symbols to create your password. So, that phrase would result in this: IhtGwwtWSi2013!
The next option is to use a password generator, which come in the form of offline programs and Web sites. The best choice here would be to use an offline generator, like the appropriately named Random Password Generator, so that your created passwords can't be intercepted.
While you experiment with different passwords, use a tool like How Secure is my Password? to find out if it can withstand any cracking attempts. This particular Web site rates your password's strength based on how long it would take to crack. If it's too easy, the meter will let you know what elements you can add (or remove) to strengthen it.

How Secure Is My Password site


Check the strength of your passwords at the How Secure Is My Password site, which indicates how difficult your password is to crack, and whether it's on the site's common-password list.
(Credit: screenshot by Dennis O'Reilly)
Microsoft offers its own online strength checker, and promises that the form is completely secure. Mac users can use the built-in Password Assistant to check their passwords' security.
Keeping track of secure passwords
If you follow one of the most important commandments of passwords, you know that you absolutely must have a unique password for every service you use. The logic is simple: if you recycle the same password (or a variation of it), and a hacker cracks one account, he or she will be able to access the rest of your accounts.
Obviously, you can't be expected to memorize dozens of crazy, 16-character-long passwords.
This guide thoroughly explores the different options for managing your passwords, including things like storing them on a USB drive, and even writing them down. Although it's ultimately up to you, he presents a strong argument for using the ol' sticky note method.

Using a password manager
Password managers store all of your passwords for you and fill out your log-in forms so that you don't have to do any memorizing. One of the most secure and intuitive password managers is LastPass.

The LastPass password vault in Firefox.

(Credit: LastPass Inc.)


LastPass is unique in that it is made of two parts, coupling an offline program with a browser plug-in. All encryption and decryption happens on your computer so that your data doesn't travel over the Internet and is not stored on any servers.
As you create new accounts or change your passwords, LastPass will ask you if you'd like to create them using its password generator, which is designed to generate hard-to-crack passwords.
If you choose those route, you'll still have to remember at least one thing: your master LastPass password. Do be sure to make it extra secure, and composed of at least 12 characters to ensure that it's not vulnerable to any brute-force attacks.
It's worth noting, however, that just like any software, LastPass is vulnerable to security breaches. In 2011, LastPass experienced a security breach, but users with strong master passwords were not affected.