Saturday, February 24, 2007

Tired of Using the mouse



Click the Start menu, and then click All Programs. Right-click the program that you want to start with a keyboard shortcut, and then click Properties


Click in the Shortcut key box. Now press the letter on your keyboard that you want to use to start the program. Make it easy to remember—for example, press I for Microsoft Internet Explorer


Click OK

Now test your shortcut. Hold down the CTRL and ALT keys, and then press the letter you chose

Friday, February 23, 2007

What is a Trojan

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just ad destructive. One of the most dangerous examples of a Trojan is a program that promises to rid your compute of viruses, but instead introduces viruses into your computer.
The Trojan can be tricky. Who hasn't been online and hand an advertisement pop up claiming to be able to rid your computer of some nasty virus? Or, even more frightening, you receive an email that claims to be alerting you to a new virus that can threaten your computer. The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their "free", attached software into your computer. You may be skeptical, but the software looks legitimate and the company sounds reputable. You proceed to take them up on their offer and download the software. In doing so, yo have just potentially exposed yourself to a massive headache and your computer to a laundry list of ailments.
When a Trojan is activated, numerous things can happen. Some Trojans are more annoying than malicious, such as changing your desktop settings or adding silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware such as viruses, spy on the user of a computer and secretly report data like browsing habits to other people, log keystrokes to steal information such as passwords and credit card numbers, phish for bank details (which can be used for criminal activities), and even install a backdoor into your computer system so that they can come and go as they please.
To increase your odds of not encountering a Trojan, follow these guidelines:
1. Remain diligent. Trojans can infect your computer through rogue websites, instant messaging, and emails with attachments. Do not download anything into your computer unless you are 100% sure of its sender or source.
2. Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.
3. Install reliable anti-virus software. It is also important that your download any update frequently to catch all new Trojan Horses, viruses, and worms. Be sure that the anti-virus program that you choose can also scan emails and files downloaded through the internet.
4. Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer

Where Is All The Vista Software?

Version 1.2 of Microsoft's list, dated Thursday, lists 104 apps that have earned the "Certified for Windows Vista" logo. Of those, 23 are Microsoft applications, meaning just 81 third-party apps have earned the Vista logo.
ADVERTISEMENT
Those numbers are slightly misleading, however; another 682 applications have been certified to "Work With Windows Vista" which means, that they, well, work. Of these, 80 are Microsoft applications.
The difference between the two lists seems to be the large number of older products that have been tested against Vista; for example, one of Microsoft's self-published games, Dungeon Siege 2, carries the "Works With Vista" logo but not the "Certified" logo— probably because the game was released in 2006, before Vista was launched.
Just a few popular apps carry the Vista certification: Cyberlink's PowerDVD, Nero 7 Premium, Raxco's PerfectDisk disk optimization tool, Trend Micro's PC-cillin, and Ulead's VideoStudio 10.
Slightly more worrying, though, is the relative unimportance of a vast majority of the applications carrying the "Works With" logo.

Vista Special


Almost all versions of Windows Vista come with enhanced Windows Media Center functionality, which allows you to create, store, organize, edit, and view personal and public media. The Start menu choices in Windows Media Center in Windows Vista are Pictures + Video, Movies, TV, Music, Spotlight, Tools, and Tasks. If your computer is outfitted with the proper hardware, you can turn your PC into a complete home theater system, including a DVD player and recorder, a movie theater, a movie studio, a television, a personal video recorder, a jukebox, a music server, and a photo library.
One feature of Windows Media Center really stands out for me though: the Spotlight. Here are a few more things you can do with Online Spotlight, including but not limited to:
Access free television shows, Internet radio, news, movie trailers, podcasts, and videos from AOL, Yahoo!, Reuters, MSN TV Today, and ABC.
Download and purchase movies and TV content through subscription services such as Movielink, TVTonic, CinemaNow, and Comedy Central.

Check out the new Photo Gallery in Windows Vista. You can sort pictures and videos by keywords, tags, the date the pictures or video were taken, ratings, and other metadata. You can even create Search Folders that contain up-to-date and "live" data, which changes each time you open the folder. You can create your own metadata to totally organize your photos and videos using any type of organizational set you'd like.

Windows Media Player 11 is another new feature included in Windows Vista. Windows Media Player 11 has a deeply integrated music library for both online and offline content, with an interface that looks more like a Web site than computer application. And with a new integrated feel, Windows Media Player 11 makes online, network, and offline content indistinguishable. Windows Media Player 11 also connects to additional hardware easily and offers easy-to-use tools for following the process of any task (downloading music, burning CDs, synching music, or streaming video, just to name a few). You can learn more about Windows Media Player

Automatic Restart

When you are running Windows XP, you may have noticed that every so often (rarely) that Windows reboots without you asking it to. This tends to be caused by a Blue Screen error. If you want to see what this error is, you will have to check the error log list because Windows reboots too quickly for you to read what happened. Well with this tip you can disable the Auto-Reboot so you can finally read, and see the blue screen error.
Go to Start -> Control Panel -> System
Go to Advanced
Under the Startup and Recovery section, click Settings...
Under System Failure un-check "Automatically restart

Turning Off System Restore

When you install Windows XP (Or when it comes pre-installed), Windows XP keeps a backup of system files in the System Volume Information folder. This system can take up large amounts of space on your Hard Drive which you may not want it to. If you no longer want Windows to back up your system files please do the following.:
Open the Control Panel
Double click on system
Click the System Restore tab
Check "Turn off System Restore on all drives
Click Apply
You can now delete the System Volume Information folder.
Warning! If you turn this off you will not be able to use Windows System Restore to restore your system in case of failure

Long Pause During Windows Startup

SymptomsAfter you choose to start Windows from the Boot menu, you may experience a long delay (or pause) before your computer finishes starting. Note that this delay may range from 10 seconds to a minute. Also, this delay occurs before the Starting Windows progress bar appears, and your computer may appear to stop responding (hang) during this time.
CauseThis behavior can occur if Windows is installed on a drive or a partition to which Windows cannot gain access with normal Basic Input/Output System (BIOS) INT-13 or INT-13 extension calls. When Windows Setup determines it cannot use BIOS calls to start, it uses scsi() or signature() syntax in the Boot.ini file instead of multi() syntax.
When booting a system that requires scsi() or signature() syntax, Ntldr loads an additional device driver (Ntbootdd.sys) to initialize and interrogate the boot controllers in your computer. Ntldr then seeks the associated boot drive attached to the controller to finish loading the kernel. These additional operations take more time in Windows because of the Plug and Play nature of the operating system.This behavior is expected, however, Windows Setup may use scsi() or signature() syntax, even if your computer can boot using the normal BIOS calls. This may occur on Integrated Drive Electronics-based computers when using a large capacity boot drive. In this case, you can try adding an additional entry in the Boot.ini file and use multi() syntax on the new entry to boot from. Note that if this works, your computer starts without pausing.

Change Drive Letter in XP

When you add drives to your computer, such as an extra hard drive, a CD drive, or a storage device that corresponds to a drive, Windows automatically assigns letters to the drives. However, this assignment might not suit your system; for example, you might have mapped a network drive to the same letter that Windows assigns to a new drive. When you want to change drive letters, follow these steps:
Right-click My Computer, and then click Manage.
Under Computer Management, click Disk Management. In the right pane, you’ll see your drives listed. CD-ROM drives are listed at the bottom of the pane.
Right-click the drive or device you want to change, and then click Change Drive Letter and Paths.
Click Change, click Assign the following drive letter, click the drive letter you want to assign, and then click OK.

Create a Password Reset Disk

Microsoft has enhanced security features in XP including the ability to create a floppy diskette to recover your password in case it is forgotten.
Click Start > Control Panel > User Accounts.
Click on the account which you want to create a password disk.
Click Prevent a forgotten password which starts the Forgotten Password Wizard . This is found under Related Tasks.
Insert a blank, formatted disk into drive A, and click Next.
Enter the password in the Current user account password box.
To use the recovery disk, at the Welcome screen:
Click the user name whose password is on the recovery disk.
Click the question mark button, this causes the "Did you forget your password message" to appear.
Click use your password reset disk. This will start the Password Reset Wizard

Stop Password Expiration

After you have run Windows XP for a while, you may receive this message when you log on: "Your password will expire in 14 days. By default, Windows XP is set up with passwords which will expire after 42 days. And 14 days in advance, Windows will start warning you of this fact

Go to Start > Run > type control userpasswords2
Select the Advanced tab in the User Accounts window.
Press the Advanced button below the Advanced user management header.
Select Users in the Local Users and Groups.
In the right pane, right-click the user name for which you want to change the setting, and select Properties.
On the General tab, check Password never expires.
Click Apply and OK (all the way out).

Disable error reporting

Open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click

How to turn off Auomatic Updates

Click Start , click Control Panel , and then double-click System.
Click the Automatic Updates tab, and then click Turn off automatic updating. I want to update my computer manually

Where has Scan Disk Gone?

Scandisk is not a part of Windows XP - instead you get the improved CHKDSK. You can use the Error-checking tool to check for file system errors and bad sectors on your hard disk.
Open My Computer, and then select the local disk you want to check.
On the File menu, click Properties.
On the Tools tab, under Error-checking, click Check Now.
Under Check disk options, select the Scan for and attempt recovery of bad sectors check box.
All files must be closed for this process to run. If the volume is currently in use, a message box will appear prompting you to indicate whether or not you want to reschedule the disk checking for the next time you restart your system. Then, the next time you restart your system, disk checking will run. Your volume will not be available to perform other tasks while this process is running.
If your volume is formatted as NTFS, Windows automatically logs all file transactions, replaces bad clusters, and stores copies of key information for all files on the NTFS volume.

Disk Error Checking in Windows XP

Double-click My Computer, and then right-click the hard disk drive that you want to check.
Click Properties, and then click Tools.
Under Error-checking, click Check Now.
Click Start.

Windows Defender

In 2004, Microsoft purchased existing antispyware technology from Giant Software and rebranded it Microsoft AntiSpyware beta 1. For beta 2, Microsoft has changed the name to Windows Defender beta 2, has given the app a face-lift, and has added a much more robust scanning engine. In testing done by Download.com, Windows Defender (tested last December as Microsoft AntiSpyware beta 1) did very well, finishing near the middle of the list for removing known spyware and better than average overall. With more than 25 million users currently running Windows Defender, Microsoft plans to include this free antispyware app in all editions of Windows Vista, due for release in the fall of 2006.
During our installation, we were asked whether we wanted to join Microsoft Spynet. Spynet is one way Microsoft builds its database of spyware. Members report suspicious code, which Microsoft then analyzes, and if the code is found to be malicious, Microsoft adds it to a spyware database. We also had the option of receiving automatic database updates but not join Spynet. And, of course, there's an option not to receive automatic updates as well. With beta 2, you don't have to have administrator status on a given PC to run Windows Defender. Microsoft wants other account holders and guests to be protected against spyware, as well. And Microsoft has added support for 64-bit editions of Windows in this release.
Once installed, Windows Defender beta 2 offers a cleaner look and feel compared to that of Microsoft AntiSpyware beta 1. Scanning and removal tasks are surfaced, and all administrative tasks can be found under the Tools toolbar. Microsoft says the system tray icon will disappear whenever your system is clean, and pop-up messages warning you of dangerous activity are sized in proportion to the threat involved. For example, low threats will be a simple pop-up balloon, and severe threats to your system will involve a large dialog box in which you will have to enter a response before continuing to work.
Under the hood, Microsoft has redesigned its antispyware scan technology, offering real-time protection against potential threats. This, in addition to tighter integration with Internet Explorer 6 and Internet Explorer 7 on Windows XP SP2 or Windows Server 2003 SP1 (currently in beta), means that when you surf to a potentially dangerous Web site, you'll see the threat messages from Windows Defender as the page is loaded. Windows Defender beta 2 also has the ability to scan Microsoft Outlook file attachments.
In Windows Defender beta 2, new antispyware definitions are automatic (if you so choose)--an improvement over the original beta 1 offered last year. Moreover, automatic updates are free, making this the only free antispyware app to make such an offer. Defender gives you three levels of scan: QuickScan, Full Scan, and Custom. All three scans dig deep into compressed files, ferreting out hidden malicious executables.
Tools included within Windows Defender beta 2 include Software Explorer, which provides a snapshot of apps in your Startup folder that are currently running, along with network-connected processes and Winsock service providers, with details about each listed item. This allows you to monitor real-time processes on your PC like never before.
A controversial feature in this beta is automatic removal. In the Tools section, if you select the box next to "Apply actions on detected items during scanning," Windows Defender will automatically remove those items without you giving further consent. Other antispyware vendors have faced lawsuits with definitions and automatic removal with spyware vendors arguing that the end user should specifically remove the item, not the antipsyware app. Microsoft says that by selecting this option, you are giving permission for Windows Defender to remove future detected spyware. We'll see if this option remains in the final release.
Testing for beta 2 was unavailable at the time of this writing. , Windows AntiSpyware beta 1 ended in the middle of the pack for overall performance. A full system scan required only 6 minutes, 55 seconds and identified many of the big-name spyware programs. Each trace was assigned a threat level, making it easy to identify particularly malicious threats. Microsoft AntiSpyware beta 1 also offered thorough definitions for spyware found on our system (something that remains true in Windows Defender beta 2). However, Windows AntiSpyware beta 1 left traces behind on our test machine for BookedSpace, eXact SearchBar, and Search Exe.

HAL.DLL Missing or Corrupt

Insert and boot from your WindowsXP CD.
At the first R=Repair option, press the R key
Press the number that corresponds to the correct location for the installation of Windows you want to repair.Typically this will be #1
Type bootcfg /list to show the current entries in the BOOT.INI file
Type bootcfg /rebuild to repair it
Take out the CD ROM and type exit

Stopping the Messenger Service



Click Start->Settings ->Control Panel
Click Performance and Maintenance
Click Administrative Tools
Double click Services
Scroll down and highlight "Messenger"
Right-click the highlighted line and choose Properties
Click the STOP button
Select Disable or Manual in the Startup Type scroll bar Click

Repair An Installation XP

If XP is corrupted to the point where none of the previous solutions get it to boot,you can do a Repair Install that might work as well as keep the current settings. Make sure you have your valid WindowsXP key.The whole process takes about half an hour depending on your computerIf you are being prompted for the administrator's password, you need to choose the 2nd repair option, not the first.
Insert and boot from your WindowsXP CD
At the second R=Repair option, press the R key
This will start the repair
Press F8 for I Agree at the Licensing Agreement
Press R when the directory where WindowsXP is installed is shown. Typically this is C:\WINDOWS
It will then check the C: drive and start copying files
It will automatically reboot when needed. Keep the CD in the drive.
You will then see the graphic part of the repair that is like during a normal install of XP (Collecting Information, Dynamic Update, Preparing Installation, Installing Windows, Finalizing Installation)
When prompted, click on the Next button
When prompted, enter your XP key
Normally you will want to keep the same Workgroup or Domain name
The computer will reboot
Then you will have the same screens as a normal XP Install
Activate if you want (usually a good idea)
Register if you want (but not necessary)
Finish
At this point you should be able to log in with any existing accounts.

Web Hosting


Web host is a service provider that places your web site on a computer which is connected to the internet. This then gives people who surf the internet a way to access your website. The computer that the web hosting company uses is typically just like the computer you have at home, the only difference being that it is set up to serve up web sites and is therefore called a "server".
A web host will typically have a fast connection to the Internet and they may host thousands of web sites on many servers. The web host essentially rents out space to you so that you can get your website up on the world wide web.
Some large web hosts own their own datacenter (collection of servers), some rent a server from a larger web hosting company and then resell the space under their own company name. In this case the web host will manage your account on the server, but they will be renting the actual web space from another much larger company.
Above is the picture of a datacenter. Which contains many PC's all connected to the Internet It is very expensive to own and operate a datacenter. Datacenters have reliable and fast connections to the Internet and also have backup power and high security.Most web hosting companies do not own a datacenter, but rent web hosting space in a datacenter.
There are literally thousands of web hosting companies available in the market, all with different types of plans and at different prices. It can be hard to wade through all the options, especially if you are completely new to web hosting and just want to get your website up on the web. All web hosting plans have some basic common features.
Server Type
This is the type of server software that is running on the server. Windows 2000 server, Linux and Unix are common server types. If you have a basic website then the server type does not matter. If you have a more complex website that has database functions and serves up dynamic pages, then the server type will be more important
Disk Space
This is the amount of actual space available to you for storing your website on the web server harddrive
Bandwidth / Month
This is a measure of how much website traffic is available to you. Every time somebody looks at your website, data has to be passed over the Internet from the web server where your site is hosted to the browser of the person looking at your site. Bandwidth is a measure of how much transfer is available. High traffic sites like Yahoo for example have very high bandwidth requirements, but the average site does not
Email Accounts
How many email accounts you can have with the web hosting account.
How Does My Website Get a Name ?All websites typically have a name - just like we are called www.FindMyHosting.com - This is a name that points to the space on the web where your website is physically located. In reality, your website will have an address which is just a set of numbers. This is called an IP address and it looks something like this 205.11.109.64 An IP address is a unique address (just like a street address) for your website location. Domain names like www.FindMyHosting.com are really just a pointer to the real address. This makes it much easier to remember websites.
When you buy web hosting it can be easier to let the web host handle everything associated with this. You just tell them the name that you want (www.yoursite.com for example) and so long as that name is available, they will set up your web hosting space so that when people type in that www address, it will automatically go to your website. If you already have a domain name and need to transfer it to a web hosting account, then the domain records have to be pointed to your web hosting company. Most web hosts will handle this for you, but if you need to do it yourself then you will need to contact the company where you registered your domain name and provide the Nameserver address of your web hosting provider. Your web host will tell you what their Nameservers address is.
You probably don't want to buy your web hosting plan until your website is ready, but you might want to buy your website name early to prevent somebody else taking the name you want. Almost all companies that sell domain names will park your domain on their servers until you are ready to buy web hosting.
Different Kinds Of Web HostingThere are different kinds of web hosting setups and dependent upon your website and budget, any of these may be the right type. This is not a discussion of the features a web hosting plan may offer - just a description general types of web hosting1. Free Web HostingIt is possible to get free web hosting accounts. These are great for small websites, but normally you have to have a banner ad at the top of every page. Some free accounts let you use your domain name (free virtual hosting) and with some your website address is a subdomain of the free hosting company (www.yoursitename.freehosting.com). This second type is called Free Sub-domain hosting.
Hosting for small websites can be very cheap, but If you can answer yes to all of the following questions, then free web hosting may be right for you.
I don't care about having ads at the top of every page in my website
I don't care about the performance / reliability of the website
I don't expect any customer support
My website is very small and will never grow
2. Shared HostingThis is the most common type of web hosting account and can be very low cost. With paid shared (virtual) hosting you pay a monthly fee and get a share on a server. For very low cost plans you may only have a small amount of disk space and a low amount of bandwidth (although this will probably not be a problem for the vast majority of websites). With cheap virtual hosting plans you maybe one site amongst hundreds on the same server - in this case reliability may suffer. For slightly more expensive plans you will probably find better reliability.
3. Dedicated HostingWith dedicated hosting you have a full server dedicated to your website. This gives you a lot more freedom and you can host potentially hundreds of your own websites. Typically you will have access to the server just like you have access to your PC at home. Dedicated servers are normally reserved for large ecommerce type websites, sites that get a lot of visitors (thousands a day), or for people that want to start their own hosting company and sell shared hosting accounts. A dedicated server is more reliable, but also much more expensive being at least $100 a month vs $1 - $20 range of a shared hosting plan.
4. Colocated HostingThis is very similar to dedicated hosting, except that you own the server rather than rent it. Your server is placed in the datacenter and connected to the Internet through the web hosting providers fast Internet connection. You will then pay a fee for maintenance and bandwidth.
So What Web Hosting Plan Is The Right One To Buy?You have a lot of choices in the web hosting market and it can be very confusing to find the best deal that meets your needs.
The 1st step before you start to look for a web hosting company is to determine what your needs are. It can be very tempting to look for plans that offer everything. There are many such deals available, even at a low price, but you will be storing up trouble for yourself. Take a step back and determine exactly what you need and then use FindMyHosting to find a plan that matches at the right price from a web hosting company that you are comfortable with.
Step1 - Determining Your Needs
1. DiskSpaceWeb pages (html) are normally very small - on average 40 - 50KB. This means you can store a lot of web pages in a small amount of diskspace. Images take up more space, but unless you have a big database driven site - it is unlikely that you will need very much disk space. Below is terminology used to describe disk space. If you have a computer at home or the office, then you will be already very familiar with this.
Disk Storage Space Terminology
1 Byte
1 character. This sentence is 25 bytes
1 KB
1000 Bytes
1 MB
1000 KB
1 GB
1000 MB
. If you own a computer at home you will already know that harddrives are very cheap these days. Many web hosting plans will offer large amounts of disk space. This is fine, it doesn't hurt to have the extra space - but unless you have a huge site - you will more than okay with 20MB.2. BandwidthBandwidth is always stated as a monthly limit in either MB or GB. This is the amount of actual data that can be transferred from the web server that holds your website, to the browser of the person who is looking at your website. If you go over the limit, then either you will have to be an extra fee, or your website will not be available. The amount of bandwidth you use is obviously related to the amount of traffic (visitors) that you receive.
There are web hosting companies that offer Unlimited bandwidth. This sounds like a good deal. The truth is that this is nothing but a lie and you should steer clear of web hosting companies that offer unlimited bandwidth. Bandwidth is a commodity that costs the web hosting company money - unlimited bandwidth is not only impossible, but would cost an unlimited amount of money. When web hosts offer unlimited bandwidth they are trying to trick you. They know that you will probably not use very much bandwidth. The moment you try to use a lot of bandwidth - then you will find your website shutdown.
For most web sites you will not need much bandwidth. Probably 99% of all websites use less than 2 GB of bandwidth a month. If you intend to have a lot of downloads of software, audio or video, then you may end up using a lot more bandwidth, maybe 50 GB. Adult sites typically use a lot of bandwidth. Sites like mp3.com require an enormous amount of bandwidth, but for the average site - a low level will be enough in almost all cases.

3. Email AccountsHow many email accounts will you need? Normally 10 is enough, but if you think you might want more then you can use
4. SupportYou need to ask yourself questions like do you want phone support, or will email support be ok? Do you want support 24 hours a day? If you have a small website that is not critical (i.e you don't pay your mortgage with website earnings) then you probably don't need phone support or 24/7 support. It costs web hosting companies to provide this type of support, don't pay more for a plan that offers this if you don't need it.
5. Server TypeIf you have a small website, then it is unlikely that you will need to select a particular type of server for your website. Windows 2000 server web hosting tends to be a little bit more expensive than Linux. If you need to run a Microsoft SQL server database, or use Microsoft Active Server pages then you should choose Windows2000. If you have no clue what these things even are - then you don't need Windows2000 - you will almost certainly be fine with any type of server.6. Other Features like Databases, Server Side Scripting Web hosting plans can offer a myriad of confusing features. For the small website it is unlikely that you will ever need to know about any of them. If you are a web designer creating complex database driven sites then you will already know what you need. If after creating your site you have never heard of ASP, ColdFusion, SQL Server, mySQL - then chances are that you don't need to worry about any of these things. If you plan to add a message board to your website then you will need a mySQL database. This is the most common database used with discussion boards.
Step2 - Finding The Right Web Hosting Plan To BuyFinding the right web hosting plan is the purpose of FindMyHosting.com - so you are at the right place. You can enter your needs into the easy or advanced search tools, or you can use one of the preset searches then refine your search.
There are many web hosting directories on the web. They all claim to be great resources. For the most part they are great resources...for the web hosting companies, but not for you, the web hosting consumer. Almost all of these web hosting directories are a place where web hosting companies advertise and they are in business only to generate advertising income from hosting companies. For the consumer they are worthless because you can not find any unbiased information. These advertising based web hosting directories have list of recommendations, top 25 lists, platinum lists etc...they are all just advertising lists similar to the ads in junk mail that might arrive through your mail slot. Avoid these sites, they have no value because you cannot trust any information you will find in them.
FindMyHosting has no advertising and no hosting company can buy an unfair advantage. When you do a search we return a list of web hosting plans that all match your search criteria that you can then evaluate. Read ratings from other customers, check real-time reliability numbers, look at other sites they host, check out their website and compare plans side by side with other plans.
Remember to use the Glossary if there are any terms that are unfamiliar and also click on any search option to open a window that will give you an in-depth explanation of what that term means.

Thursday, February 22, 2007

Restore desktop


Restore Desktop - is a Windows Context Menu addition that automatically saves and restores the icons´ positions on the Windows desktop after a resolution change.
How many times you change screen resolution and discover that your neatly placed icons have shattered all over the screen. No more! Restore Desktop magically restores icons´ positions after display resolution changing. You can also restore saved icons´ positions manually by control-click on the desktop.The utility is very small, works automatically and requires no training at all. Just install it and forget about improperly placed icons on your Desktop.

Wednesday, February 21, 2007

Is your Pc Windows Vista ready?




Mirosoft Power Calculator


Overview
This application allows you to complete many different types of conversions; it also includes all the mathematical functions offered in Microsoft Calculator. Download from http://www.microsoft.com/downloads/details.aspx?FamilyID=32b0d059-b53a-4dc9-8265-da47f157c091&DisplayLang=en

Adaware

Ad-Aware Personal remains the most popular anti-spyware product for computer users around the world, with nearly one million downloads every week. This free anti-spyware version provides you with advanced protection against spyware that secretly attaches and takes control of your computer, resulting in aggressive advertising pop-ups, sluggish computer activity, even identity theft through stolen bank details, passwords, and credit card account numbers. Key Features
User-controlled spyware removal
Customizable Scans
Code Sequence Identification (CSI) technology
Extensive Lavasoft Detection Database
ADS scan
Blocks browser hijackers
Quarantine manager
download free here http://http://www.lavasoftusa.com/products/ad-aware_se_personal.php