Friday, December 4, 2009

How to troubleshooting the starting problems of Word 2002, Word 2003 and Word 2007?

Today tip will help you to recover the default setting in Microsoft Word 2002, 2003 and 2007. Normally most of the options in Microsoft word are saved in the word data registry key. You can edit the word data registry key to troubleshooting the default settings problems. Word basic troubleshooting step is to delete the Word Data registry key. The next time that you start Word, Word rebuilds the Word Data registry key by using the default settings. These setting include the "Display, Proofing, Save and some Advance features options". You can also reset all settings that you customize in the Options dialog box.

In Word 2002 and Word 2003, you can view these options on the Tools menu and then click Options.

read more.........

Source : http://www.computerfreetips.com/


Monday, November 2, 2009

WordPress 2.8.5

It’s been a year now since I was first properly introduced to WordPress and started using it to create an online archive of my work. Over the last 12 months I have grown to appreciate the power and flexibility of this piece of online blogging software and feel the need today to go in to a little more detail.

WordPress is a free and open source publishing application which gives home users the ability to quickly and easily create an online blog using their own domain name. Blogging, the term used to describe the maintenance of a website used to chronicle information has become incredibly popular in recent years as more users realise that the Internet provides a global platform which can be used to broadcast their ideas or opinions.

For most, the prospect of coding a website from scratch is not just a daunting but potentially impossible task, and so it is down to worthy applications such as WordPress to make blogging accessible to the masses. Undeniably a small amount of technical knowhow is required however the process of the initial installation couldn’t really have been made any simpler.

read more...

source : http://www.computerarticles.co.uk/


Tuesday, October 6, 2009

How to connect your home computer from Remote location?

Using the Remote Desktop feature, you can connect your home computer (host) from any other remote computer (client) and can access all computer resources (installed programs, data and any network resources). You can run any computer application on the remote computer as you were running actually sitting in front of home computer.

Follow the given steps to configure your computer to connect remote computer:

To use this feature, you will need to be logged into your computer with administrative rights.

To perform this task, first make sure your both computers are connected to the internet.

First you have to configure the host computer that allows the users to connect it remotely. On the host computer, right click on "My computer" and click on Properties option.

Under the Remote tab, select the option "Allow users to connect remotely to this computer" and click Ok button.

Now get the IP address of host computer (type the "ipconfig /all" on the command prompt of host computer to find IP address).

Now make a connection on remote or client computer, click on Start button, go to All Programs> Accessories, and Communications, then click on Remote Desktop Connection, option. A Remote Desktop Connection, dialog box will appear.

Click on Options button for detail configuration, under the General tab, type the IP address of host computer in the Computer box and also type username and password of host computer then click on Connect button to make a connection to remote computer.

If your username and password is correct then a remote desktop windows will appear.

Source : www.computerfreetips.com


Wednesday, September 16, 2009

How to send a voice mail to your friend using Windows XP?

E-mail is a most popular and effective way to communicate with others through the internet. You can send documents, pictures and other types of files to any destination but the interesting thing is that you can send also your voice in a mail by attaching the file with e-mail. In windows XP, you can record your voice using Sound Recorder and a microphone options.

Follow the given steps to record your voice in windows XP:

To use this feature, you will need to be logged into your computer with administrative

rights.

To start recording process, first make sure you have attached a microphone

to your computer.

First click on Start button> All programs> Accessories> click Entertainment and then click on Sound Recorder option.

Now a small "Sound - Sound Recorder" will appear, go to File menu and click on New to start a new file for recording.

Click on Record button to start recording process and start talking then click on Stop button to stop the recording.

Now again click on File menu to save this file with .wav extension to a folder of your choice.

Now send this voice file as an attachment via e-mail message to your friends.

Source: computerfreetips


Wednesday, August 5, 2009

Recent Microsoft Collaboration

As most are aware in the security world, today Microsoft released guidance and security updates to help better protect customers from security vulnerabilities discovered in Microsoft’s Active Template Library (ATL). These are issues that IBM, iDefense, and Microsoft have collaborated very closely on in order to responsibly disclose and address the various issues outlined in the bulletins that were released for Visual Studio and Internet Explorer . As part of this collaboration between the researchers and the vendors, Mark Dowd, Ryan Smith, and David Dewey have published a guest blog on the Microsoft BlueHat blog about the nature of the collaboration, the challenge in addressing such vulnerabilities, and how these specific issues are just a portion of the overall presentation they are giving at BlackHat USA on Wednesday. We encourage everyone to take a moment and read the guest BlueHat blog from the three researchers as well as take some time to also reference the other Microsoft resources on this issue at the MSRC blog and the Microsoft Security Research Defense blog, in addition to the IBM X-Force advisories and the Microsoft bulletins MS09-034 and MS09-035. We hope this provides additional resources and analysis for our customers and the general public to better understand the vulnerabilities present in the Active Template Library as well as our collaboration with Microsoft and iDefense on these issues. We also hope to see you at both X-Force presentations on Wednesday at Blackhat USA.

source: http://blogs.iss.net/archive/MSCollaborationBH09.html

Monday, August 3, 2009

How to enable the Windows Task Manager and Regedit Editor?

Today tip will help you to unlock the windows Regedit Editor and Task Manager. Normally the reason of this message is that your computer has been infected by virus, trojan, or piece of spyware and message look like" Registry editor has been disabled by your administrator" or "Task Manager has been disabled by your administrator". By default Windows Task Manager and registry editor status is enabled, but a user can also disable or enable it manually. Some time a registry hack applies on both editors to disable it. Before proceeding further, first scan your system with up-to-date antivirus, and then follow the given steps to enable it.

To enable this feature, you will need to be logged into your computer with administrative rights.

First go to the link of registry tools to access the useful script file and download it to your computer hard disk.

Now double click on this file to run this .vbs file and .... more....

source : www.computerfreetips.com


Sunday, July 5, 2009

How to configure Linux Files Permissions?

Three types of permission read write and execute, Ever file and folder have three relations owner group and

others

[ Read = r write = w execute = x ] [ owner = u group = g other = o ]

[root@pc1 ~] # Ls -Ld /disk



1= nature of object [d=dir -=file L=link]

2= first three permission for owner [ rwx ]

3= second three permission for group members [ r-x]

4= third three permission for others [r-x]

5= number of inodes contain by this directory

6= owner of directory

7= group of directory

8= size of directory

9= creating date of object

10= name of object

[root@pc1 ~] # Ls -L /disk

Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir1

Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir2

Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir3

Changing permission = give write permission to other on /disk

[root@pc1 ~] # chmod 0+w /disk

Give read write and execute permission for group on /disk

[root@pc1 ~] # chmod g+rwx /disk

Assigning read writ and execute permission to user, group and other with single command

[root@pc1 ~] # chmod u+rwx , g+rwx, o – rwx /disk

Assigning different permission with different commands which separate with semicolon

[root@pc1 ~] # chmod u+rwx /disk ; chmod g+rwx /disk ; chmod 0+rx /disk

Using number system =----- [ Read = 4 ] [ Write = 2 ] [ Execute = 1 ]

rwx=7

r-x=5

---=0

Assigning full permission to owner and no permission for group and others

[root@pc1 ~] # chmod 700 /disk

Assigning full permission for owner and group no permission for other

[root@pc1 ~] # chmod 700 /disk

Assigning full permission to all

[root@pc1 ~] # chmod 777 /disk

Assigning full permission for owner and read, and execute for group and others

[root@pc1 ~] # chmod 755 /disk

Assigning no permission for all

[root@pc1 ~] # chmod 000 /disk

Assigning sticky bit permission for other

[root@pc1 ~] # chmod o+t /disk

Assigning suid permission for owner

[root@pc1 ~] # chmod u+s /disk

Assigning sgid permission for group

[root@pc1 ~] # chmod g+s /disk


Source : http://www.computerfreetips.com


Sunday, June 7, 2009

How to preview the Word documents without opening?

In Microsoft Word, you can preview the document list within Word without having to open the document. This tip is very useful, if you have many word files and are not sure which file contain the information that you need. Almost all versions of Word support this feature to view all word file as preview one by one.

Follow the given steps to preview the word document without having to open the document:

First click on Start button, go to Program then click on Microsoft Word to run the word application.

Now go to File menu and click on Open option to open any word file. Here a small dialog will appear with title "Open".

Now on the right hand side of the toolbar click the down arrow on Views and choose Preview.

This will open the preview pane. Click on any file on the left hand side and preview what inside the file. When you find the file you need just click Open button to open the file.


Source : http://www.computerfreetips.com/


Thursday, May 7, 2009

How to Insert your Digital Signature into Word Documents?

As usual today I have brought a different and surprising tip for you. This tip will increase your knowledge in the field of Computer. In fact you can't do your signature or your official work without papers. But you will be surprised to read this tips how you can insert your Digital Signature into Word Documents. Most people don't give value that there is any technique to sign files electronically and then send via fax or email.

Follow the given steps to insert your signature electronically in Word documents:

First of all scan your signature page and then save image using (.GIF or .JPEG) extension. Now you have scanned image of you signature, save the image on your computer and note that file name where you save it.

Click on Start button, go to Program then click on Microsoft Word to run the word page.

Now go to Insert menu, click on Picture> From File then browses your scanned signature file and click Insert button to add this file in word.

If your signature is not looking so good and its size is wrong then you should rescan your signature then repeat all the steps to insert it again.

To save your signature for reuse in future documents, highlight the signature graphic, and then choose insert AutoText-New. Here a new Create Auto Text dialog box will appear. Name your signature and click ok.

Now just type the name the file of your signature and press Enter to insert your signature in the future or choose insert AutoText-Normal then click on signature name. There is no need of ink, Word jump down in your digital signature.

I think this will help you and soon I will come back with another useful tip for you.

Source: Computer Tips


Monday, April 13, 2009

How to Customize Your Browser Toolbar?

You can customize your system web browser toolbar according to your need. There are many toolbar buttons you never used. You can add some mostly used buttons for example "Paste" or "Print Preview" in your browser toolbar or remove with same option.

If you are using Internet Explorer then right click on the empty area of the toolbar and select the option "Customize". Here you will find a list of options in left and right panel, if you want to add any toolbar button then simply highlight it from the left panel and click on the "Add" button. But if you want to remove any toolbar button then first highlight it from the right panel and click on the "Remove" button.

You can also change the order that buttons appear by moving them up and down from the list.

Wednesday, March 11, 2009

Database Tips

A database is a collection of related data stored in an efficient and compact manner. The word “efficient” means that stored data can be accessed very easily and quickly.
Similarly, the word “compact” means that stored data takes up as little space as possible. In the above definition of database, the phrase “related data’ is used. It means that a database contains data or information about a particular topic such as:
  • Database of employees that contains data of employees of an organization or department.
  • Database of students that contains data of students of college or university.

A database holds related data as well as description of that data. For this reason, a database is also defined as a self describing collection of integrated records. The description of data is known as the system catalog or data dictionary or metadata. For example when a table of a database is designed, the data type, size, format and other descriptions of fields are specified. This is an example of metadata, which describes the properties of data to be stored into fields of table.

The data of any organization is its integral part. The data is very important for developing new products and their marketing. The data must be accurate and available when needed. This is the reason that all organization must organize and manage their data into database. The databases are used for variety of purposes in as organization. For example, when you purchase goods from your local supermarket, the checkout assistant will pass the purchased product through a scanner device known as bar code reader. This device will read the bar code printed on the product and gives the accurate price of the item. Actually, the bar code reader is accessing the database, which contains the information about the products. The bar code reader is linked to a database application program, which uses the bar code to access price of item. The database program automatically updates the database. The assistant can also check whether a required item is in stock by running the database application program. Similarly, you can purchase goods using your credit card. Your credit is checked by a card reader linked to a computer system. In this case, there is a database somewhere that contains information about your credit. Almost all organizations and government departments of every country in world use database to maintain their records. Some examples of large databases that have been developed around the world are:

  • When you draw amount from bank through ATM card, you are accessing the database; your account is accessed and checked through auto teller machine. When you draw some amount from your account, your record in the database is automatically updated immediately.

  • When you visit your local library, there may be a computerized database containing details of the books in the library. There will be a computerized index, which allows you to find a book based on its title, its author’s name etc.

  • The meteorological organization contains databases having information about current and previous meteorological data. The meteorological department is totally dependent on the meteorological data.

A database may be generated and maintained manually or it may be computerized. The library card catalog is an example of a database that is created and maintained manually. On the other hand, a computerized database may be created and maintained either by using application program, which is developed specifically for that purpose or by a database management systems.


Monday, February 16, 2009

GENERAL CLEANING TIPS

You can save your computer maintenance cost if you clean your computer on the regular basis. This will improve the cooling and performance of the computer components. Your computer components could damage, if you do not keep it clean on periodically basis, because dust is the main cause to heat up your system and heat link to hardware failure.

  • Never place your computer on the ground, always use computer table or shelf for this purpose.
  • To clean computer case first unplugs your system power from the electrical outlet. Remove all cables and connectors from the back side of your computer.
  • Now blow the air around all the hardware components and keeping away your blower nozzle 4 to 5 inches away from main board components. You can use vacuum cleaner also for this purpose but compressed air is the better solution to clean a system.
  • At the end using lightly dampened cloth or spray any cleaning fluids on the computer case and use paper towel to dry it.
  • Never clean inside computer components or other circuit board with damp or wet cloth.
  • Always be careful to eat or drink around the computer.A

Monday, February 9, 2009

How to insert YouTube movies into PowerPoint slides?

You can insert the YouTube movies into your PowerPoint slides to express your idea or better way to communicate something. You can convey these ideas in more effective ways, if you are using movie files with your simple slides.

Follow the given steps to add YouTube movies into PowerPoint slides:

First of all download the YouTube.com movies and then save on your computer hard drive. Mostly movies are available in flash video file format on YouTube site. You can convert also the downloaded movies from YouTube into any common format, for example, windows media video file (wmv), windows video file (avi) and movie file (mpeg).

First of all open the presentation in which you want to insert movie file.

Now click on "Movies and Sounds" option from the Insert" menu and choose the option "Movie from File".

Now select your movie that you want to insert into slide and click on Ok button.

Here now you are asked "Do you want your movie to play automatically in the slide show? If not, it will play when you click it."


Recommend choosing Ok button to play automatically even if you want the movie to play when click. Finally save your PowerPoint presentation and run it for test.

Source: http://www.computerfreetips.com/

Wednesday, January 21, 2009

How to create your own Run Command for any specific application?

Today tip will help you to make your own Run Command (program shortcut) to run a program or a document directly. No more need to navigate the location of a program or document to run it, simply click on Start button to open Run box and type the programs shortcut name to open it directly.

Follow the given steps to disable the save settings functionality for desktop:
  1. To use this feature, you will need to be logged into your computer with administrative rights.
  2. Click Start button and type regedit in Run option then press Enter for next.
  3. Here locate the location to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App paths
  4. Now right click on App Paths and select New > Key, title the key and name it whatever you want your run command to be. In this case, we will try to create a run command for SecueCRT application.
  5. New > Key > SecureCRT.exe
  6. Now select the SecureCRT.exe folder and click right on (Default) string value then click Modify at the right hand side panel.
  7. Here enter the path of the program that you want to execute in the value data field. In our case, the path of SecueCRT application will be C:\Program Files\VanDyke Software\SecureCRT \SecureCRT.exe.
  8. Now again in right side panel, click right to create a new String value with the name SecureCRT and its values as C:\Program Files\VanDyke Software\SecureCRT\SecureCRT.exe.
  9. Now close the registry editor and restart your computer after any changes to go into effect


Tuesday, January 6, 2009

Want More Money? Here We Come

Yusuf Sulistyo Nugroho,
Welcome to GALESUS

Sebuah website duplikasi (sama persis dengan website ini) telah dipersiapkan untuk anda sebagai alat untuk melakukan promosi.

Daftar sekarang juga!

Klik Website Duplikasi ini:

http://www.galesus.com/index.php?id=mcnugroz

Gunakanlah URL duplikasi Anda untuk melakukan promosi, di berbagai iklan baris maupun forum website. Pengunjung yang mengunjungi www.galesus.com dengan klik pada URL duplikasi Anda tersebut, maka bila bergabung akan otomatis menjadi downline Anda.

Anda juga dapat melakukan perubahan profile Anda seperti nama, nomor rekening bank, dan melengkapi data-data yang belum lengkap dengan memasuki menu Member Profile.

Silahkan menggunakan semua fasilitas yang ada untuk membantu anda menghasilkan penghasilan yang tiada batasnya... Hasilkan keuntungan kapan saja dan dari mana saja...

Akhir kata, saya ucapkan Selamat Bergabung di "GALESUS dan Sukses Selalu !!

Dapatkan pengalaman yang berharga bagi Anda di sini.....


Daftar sekarang juga!

Hormat saya,

Yusuf Sulistyo Nugroho

Email : mcnugroz@yahoo.com