My Computer Help

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 12 September 2011

Welcome screen and Fast user switching disabled in Windows Xp

Posted on 06:39 by Unknown
when you try to enable fast user switching in windows XP ,you may get this error message saying “client services for netware has disabled the welcome screen and fast user switching”

To enable welcome screen login, you need to disable the netware client services.

Follow the steps below to disable Netware client services:

How to disable netware client services?

1. Go to Control Panel > Network Connection . This will open up the network connections available on your computer.

2. Right click on the connection and select Properties.

3. In general tab, uncheck the option for Client Services for NetWare and press OK.

4. Repeat step 2 and 3 for all the connections shown in network connections.

5. Restart your computer.

6. To enable welcome screen now, go to Control Panel > User Accounts > Change the way users login and select the option Use Welcome Screen. We hope following the above procedure you will be able to fix the trouble.
Read More
Posted in Windows XP | No comments

Thursday, 28 July 2011

Google Chrome - Error 310 - There were too many redirects - net::ERR_TOO_MANY_REDIRECTS

Posted on 20:46 by Unknown
You may get this error while accessing some websites. In google chrome, it shows error 310.

The reasons for the issue might be different

Following are the solutions

1. If it is caused due to third party cookies, Delete all the cookies and restart the browser.

2. It may be due to the time sycronization between the website and your system. For this check whether your system time is correct or not. Also you can syncronise your system time with internet trime. Try the following procedure.


1. Right-click your clock, and then click Adjust Date/Time.

2. Click the Internet Time tab. Click the Server down arrow, and then click time.nist.gov. Notice that Internet time synchronization is enabled by default.

3. Click Update Now. Windows XP contacts the Internet time server and sets your clock. Click OK.

Now, your PC is connected to the Internet time server.

Restart your Browser and try again

If your issue is not been solved yet. post as a comment.

If it gets sloved, comment which method did u use.




Read More
Posted in Google Chrome | No comments

Friday, 15 April 2011

Log in into hidden built-in Administrator account in Windows XP

Posted on 21:11 by Unknown
The built-in Administrator account is hidden from Welcome Screen when a user account with Administrator privileges exists and enabled.

In Windows XP Home Edition, you can login as built-in Administrator in Safe Mode only.

For XP Professional, press CTRL + ALT + DEL twice at the Welcome Screen and input your Administrator password (sometimes there will not be any password) in the classic logon window that appears.

To have the Administrator account displayed in the Welcome Screen, try following method:  

Click Start, Run and type Regedit.exe

Navigate to the following key:

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList

(Use the File - Export option to backup the key - for safety :-))

Create a new DWORD Value named Administrator

Double-click Administrator, and set 1 as its data

Exit the Registry Editor.



If you have any questions post a comment
Read More
Posted in Administrator, Registry, Windows XP | No comments

Tuesday, 12 April 2011

Tips to keep your PC free from virus.

Posted on 08:41 by Unknown
1. Email
Email is the most common way of getting infected. While you can safely open any mail, NEVER EVER click on a link in email that you are not positive is from a trusted source! Here are two common scenarios:
You get an email from someone you DON'T know. You open it. It tells you (or, persuades you) to click on a link in the email. You do so. Bingo, that is when you get infected. Frequently, the email appears to be from your bank, a company you know, etc. Don't fall for it! It was actually malicious code executed in your browser that allowed it to look like it is coming from an actual business. A good way to avoid this is to use Mozilla Firefox, since it is known to be more secure. Businesses (almost) never send unsolicited email.
    You get (what appears to be) an email from someone you DO know. But, unknown to you, a virus or worm generated that email (and not your friend). It could be, your friend's PC is infected, but, not always. Obviously, the actual email writer doesn't know you and cannot say anything personal to you, so, typically, it says something like "Click on this link for some important information..." etc. Bingo! Infected!


2. Pop-ups
Don't click on pop-up windows that announce a sudden disaster in your city! A cracker (Crackers hack people with evil intent, hackers don't do things to damage your property, or steal data on it in any way. To confuse the terms will make many angry). has used your IP (Internet Protocol) address to determine your location. He then displays a headline that you will be very tempted to click on, in order to learn more about "the tornado that just struck your city" (or similar). You click...bingo...infected!


3. Outlook

Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox). You may also try Outlook anti-spam addons freely available on Microsoft's Web site.

4. Anti Virus
Install an Anti-Virus program(ex. Norton, F-Secure, Sophos, McAfee, or AVG.) Also available is the free AntiVir virus scanner. Make sure you keep your virus definitions updated and run a full system scan weekly.


5. Anti Spyware
Install an Anti-Spyware program(ex. Ad Aware SE, Windows Defender), that operates against internet malware and spyware. Just like Anti-Virus, keep it updated, and do a full system scan weekly.

6. Email Attachments
If someone sends you an attachment in e-mail or instant messaging, do not open it. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening. Many crackers know that people trust documents like those and the go out of there way to make you regret opening them. High risk file extensions include .exe, .bat, and .vbs, for their main purposes are to execute code, so the file openly admits that something will happen. You can negate the risk by preforming scans with your antimalware AND antivirus. If someone you know very well sends you a Word attachment or other type of file, e-mail them to ask them if they meant to send it to you. If they say yes, you can open it, but you might still be at risk if they are not good about running Anti-Virus scans or careful about what they download. Be wary of attachments with a double extension, such as .txt.vb or .jpg.exe, as the system will only recognize the extension to the extreme right, and run the file as such. Double extensions exploit an option in Windows to hide known file extensions thus hiding the second dangerous extension and showing only the first safe extension. Ensure that this options is disabled to more easily identify these files. Double extensions are often a good indicator that the file is malicious.

7. Unknown disks and drives
Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out, but AV programs are not 100% effective. If the disk (especially if its a hard disk) can be wiped using a bootable CD like DBAN (Google DBAN and you will see the page) and then the drive will be completely safe. Disable any autorun options so that you can scan contents of the disk before executing them.

8. Download programs
Do not download software from just any old website. If it is a reputable site that you trust, you are probably safe. The threat is not only from software; don't download Word documents or other non-HTML files that have something other than one of the extensions listed above, either.

9. Windows update

Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system (I.E Windows) and Internet Explorer. These updates fix security holes in both pieces of software.

10. Browsers
Consider switching to a different web browser. Other web browsers (such as Firefox or Opera) are considered to have better security than Internet Explorer; some people also see them as more flexible and extensible browsers.

11. Surfing
Be careful when surfing. You can get a malicious script from a webpage and not know it. If you have your IE set up for the maximum security settings, you are probably safe. You can try disabling javascript, but it may also break benign functionality on reputable websites. If you ever get a window asking if you want to allow an automatic install, say "No" unless you know the site requesting the install. Also, don't go to any porn sites. Those are almost always viruses.

12. Stay vigilant

Read about the latest virus threats so you are aware of the potential danger. Go to Symantec's page to read about them daily.

13. Common sense

Try to balance paranoia with common sense. Some people get really weird about viruses, spyware, etc. It's just a computer! Back up your data and follow these steps, and it shouldn't be a big problem. Some people would suggest that you make sure you have a firewall and run anti-spyware programs as well. I'm not sure either of those will protect you from viruses, but they will protect you from cracking and from spyware. Microsoft's Antispyware and Ad-Aware are the best anti-spyware/virus programs I have found. Good luck!

14. Firewall
Use a software firewall! Even if you have a hardware firewall, always use a software firewall (ex. Norton, Mcafee, there's also free ones- ZoneLabs ZoneAlarm).

15. Scan everything

Scan things you download! Be a total nut with this. Scanning new files is cheap, fast, and easy. Even if the file came from a trusted source, their computer might have been compromised without their knowledge. Anything you get from P2P software you should scan, as you are getting it from a stranger.

16. No to file sharing sites

Stay away from file-sharing sites. Sites that distribute illegal versions of software (sometimes referred to as cracks), music, or "free movies" are known to be riddled with virii and trojans. This include torrents or other forms of P2P activities. Staying away from these sites is in your computer's health's best interest, as well as a good way to avoid being sued for copyright violation.

17. Say no to piracy

Most important, never use pirated softwares. They are the main source of computer viruses! There are very few honest IT people producing freewares, and sharewares.
Read More
Posted in Virus | No comments

Monday, 11 April 2011

Pen drive, USB drive, Flash drive, Memory cards not gets detected in your PC

Posted on 03:24 by Unknown
This is one of the most common problem nowadays. Your flash drive fails to detect when connected to the USB port.


This can happen due to two problems.


Problem 1 : Pendrive not detected

1. First of all check wheter the pen drive is working by plugging it in some other computer. If it works well there then it means that the drive is not faulty.

2. Go to start menu - run -type “devmgmt.msc” - cilick ok

   a. Device manager will open up

   b. click on the plus sign before “Universal Serial Bus Controllers”

   c. Find your devce in the list (sometime it will be shown as USB Mass Storage Device)

   d. Right click and update the drivers by uninstalling and reinstalling the drivers.

3. But if the Pen Drive comes up faulty then just get it replaced.



Problem 2: Pendrive detected, but not showing up in the drive list

This problem is caused when Windows fails to assign a new drive letter to the Portable Drive inserted for the first time.

1. Open Run, type “compmgmt.msc” and hit enter.

2. Now click “Disk Management” on the left side.

3. On the right side, right click on your USB Drive that appears in the disk management window and click change drive letter and paths.

4. Assign a new drive letter to the USB Drive which is not assigned to any other drive.

5. Now the Pen Drive will get displayed in My Computer.

This fix can also useful for people who just wish to change the drive letter of their USB Drive.
Read More
Posted in Pen Drive, Windows 7, Windows XP | No comments

Saturday, 9 April 2011

How to search in Google effectively ?

Posted on 21:44 by Unknown
Search is simple: just type whatever comes to mind in the search box, hit Enter or click the Search button, and Google will search the web for content that's relevant to your search.

Most of the time, you'll find exactly what you're looking for with just a basic query (the word or phrase you search for). However, the following tips can help you make the most of your searches. Throughout the article, we'll use square brackets [ ] to signal a search query, so [ black and white ] is one query, while [ black ] and [ white ] are two separate queries.
Some basic facts

    Every word matters. Generally, all the words you put in the query will be used.
    Search is always case insensitive. A search for [ new york times ] is the same as a search for [ New York Times ].
    Generally, punctuation is ignored, including @#$%^&*()=+[]\ and other special characters.

    To make sure that your Google searches return the most relevant results, there are some exceptions to the rules above.


Tips for better searches


    Keep it simple. If you're looking for a particular company, just enter its name, or as much of its name as you can recall. If you're looking for a particular concept, place, or product, start with its name. If you're looking for a pizza restaurant, just enter pizza and the name of your town or your zip code. Most queries do not require advanced operators or unusual syntax. Simple is good.

    Think how the page you are looking for will be written. A search engine is not a human, it is a program that matches the words you give to pages on the web. Use the words that are most likely to appear on the page. For example, instead of saying [ my head hurts ], say [ headache ], because that's the term a medical page will use. The query [ in what country are bats considered an omen of good luck? ] is very clear to a person, but the document that gives the answer may not have those words. Instead, use the query [ bats are considered good luck in ] or even just [ bats good luck ], because that is probably what the right page will say.

    Describe what you need with as few terms as possible. The goal of each word in a query is to focus it further. Since all words are used, each additional word limits the results. If you limit too much, you will miss a lot of useful information. The main advantage to starting with fewer keywords is that, if you don't get what you need, the results will likely give you a good indication of what additional words are needed to refine your results on the next search. For example, [ weather cancun ] is a simple way to find the weather and it is likely to give better results than the longer [ weather report for cancun mexico ].

    Choose descriptive words. The more unique the word is the more likely you are to get relevant results. Words that are not very descriptive, like 'document,' 'website,' 'company,' or 'info,' are usually not needed. Keep in mind, however, that even if the word has the correct meaning but it is not the one most people use, it may not match the pages you need. For example, [ celebrity ringtones ] is more descriptive and specific than [ celebrity sounds ].

Here's some advanced tips


Explicit Phrase:
    Lets say you are looking for content about internet marketing.  Instead of just typing internet marketing into the Google search box, you will likely be better off searching explicitly for the phrase.  To do this, simply enclose the search phrase within double quotes.

        Example: "internet marketing"
 
Exclude Words:
    Lets say you want to search for content about internet marketing, but you want to exclude any results that contain the term advertising.  To do this, simply use the "-" sign in front of the word you want to exclude.

        Example Search: internet marketing -advertising

    Site Specific Search:
    Often, you want to search a specific website for content that matches a certain phrase.  Even if the site doesn’t support a built-in search feature, you can use Google to search the site for your term. Simply use the "site:somesite.com" modifier.

        Example: "internet marketing" site:www.smallbusinesshub.com

Similar Words and Synonyms:
    Let’s say you are want to include a word in your search, but want to include results that contain similar words or synonyms.  To do this, use the "~" in front of the word.

        Example: "internet marketing" ~professional

Specific Document Types:
    If you’re looking to find results that are of a specific type, you can use the modifier "filetype:".  For example, you might want to find only PowerPoint presentations related to internet marketing.

        Example: "internet marketing" filetype:ppt

This OR That:
    By default, when you do a search, Google will include all the terms specified in the search.  If you are looking for any one of one or more terms to match, then you can use the OR operator.  (Note:  The OR has to be capitalized).

        Example: internet marketing OR advertising

Phone Listing:
    Let’s say someone calls you on your mobile number and you don’t know how it is.  If all you have is a phone number, you can look it up on Google using the phonebook feature.

        Example: phonebook:617-555-1212 (note:  the provided number does not work – you’ll have to use a real number to get any results).

Area Code Lookup:
    If all you need to do is to look-up the area code for a phone number, just enter the 3-digit area code and Google will tell you where it’s from.

        Example: 617

Numeric Ranges:
    This is a rarely used, but highly useful tip.  Let’s say you want to find results that contain any of a range of numbers.  You can do this by using the X..Y modifier (in case this is hard to read, what’s between the X and Y are two periods.  This type of search is useful for years (as shown below), prices or anywhere where you want to provide a series of numbers.

        Example: president 1940..1950

Stock (Ticker Symbol):
    Just enter a valid ticker symbol as your search term and Google will give you the current financials and a quick thumb-nail chart for the stock.

        Example: GOOG 

Calculator:
    The next time you need to do a quick calculation, instead of bringing up the Calculator applet, you can just type your expression in to Google.

        Example: 48512 * 1.02

Word Definitions:
    If you need to quickly look up the definition of a word or phrase, simply use the "define:" command.

        Example: define:plethora
Read More
Posted in Google, Internet, Search Engines | No comments

Monday, 4 April 2011

Show hidden files option not working ??

Posted on 01:24 by Unknown

Click Start  > Run… (or press Windows key + R)

Type regedit and click Ok. (if registry editor is also blocked, find the below lnk - http://mycompuhelp.blogspot.com/2011/04/enable-registry-editor-regeditexe-in.html)

Find the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\Folder\Hidden\SHOWALL

Look at the CheckedValue key. This should be a DWORD key. If it isn’t, delete the key. Create a new key called “CheckedValue” as a DWORD (hexadecimal) with a value of 1.

Now open My Computer, on the toolbar go to Tools > Folder Option and click on the View tab.

The Show hidden files & folders check box should now work normally.
Read More
Posted in Windows 7, Windows XP | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

Categories

  • Administrator
  • Computer Games
  • Gmail
  • Google
  • Google Chrome
  • Hardware
  • Internet
  • Internet Connection
  • Laptop
  • Mac OS
  • MS Office
  • Notebook
  • Outlook
  • Pen Drive
  • Programs
  • Registry
  • Search Engines
  • Start up
  • Virus
  • Windows 7
  • Windows XP

Blog Archive

  • ▼  2011 (17)
    • ▼  September (1)
      • Welcome screen and Fast user switching disabled in...
    • ►  July (1)
    • ►  April (8)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (11)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (2)
    • ►  May (1)
    • ►  March (1)
  • ►  2009 (3)
    • ►  May (1)
    • ►  March (2)
Powered by Blogger.

About Me

Unknown
View my complete profile