Tuesday, July 28, 2009

Protecting Folders with passwords

Many times you have a group of documents stored in a folder and you would like to protect it from being viewed and edited by anybody.

Compress the folder that you want to protect using the windows default zip software.
You follow the following procedure:-
Right click on folder that you want to protect, click on send to compressed (zipped) folder.

Open the compressed (zipped) folder, right click anywhere in the blank space.
Click on add a password, type the password to protect the compressed folder


You can also choose to use third party software to protect your folders.
Some of the third party folder protection software in the market include:-
FILE LOCK, AXCRPT, ENCRYT4ALL

Saturday, March 21, 2009

Partitioning your hard drive using Windows Vista

With Windows Vista, you can partition your hard drive with out necessary using Partition Magic or any other third party partition software.

This is one of my few reasons I may fancy using Windows Vista over old versions of other windows operating systems.

Using the few steps below you can be able to partition your hard drive
Choose Disk Management from the Computer Management console to view your partitions.

Right click on the existing partition and choose “shrink volume” to create space for your new partition.

Enter amount of space to shrink

Right click on the new unallocated space and choose “New Simple Volume”

Format the new partition as NTFS and give it a name.

Windows Vista will format the new partition inside the Disk Management Console, after some minutes your newly created partition will be viewable and ready to read and write to.

Windows XP not Guinuine or Counterfeit error message

When you get a message on your computer screen showing that the copy of Windows XP you are using is not genuine or counterfeit do the following.

Go to this folder C:\Windows\Downloaded Program files; remove any files or folders associated with WGA.

Restart your computer and as soon as Windows logs off and restarts, press the F8 Key on your keyboard.

Windows Advanced Startup options will appear on your screen, select Safe Mode option.

Go to C:\Windows\System32 and the rename wgatray.exe to wgatrayold.exe.

Go to C:\Windows\System32\dllcache (Rename wgatray.exe to wgatrayold.exe)
Note: dllcache is a hidden folder, to view hidden folders do the following, go to Start, Control Panel, Folder Options,
Select the view Tab and under the Hidden Files option, select Show hidden files and folders

Go to the Safe Mode Registry

Click on Start, Run and within the open dialog box type regedit and click OK.

Within the registry locate the following folder:-

HKEY_Local_Machine\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\Notify\WGALOGON

Right click and export the WGALOGON Folder (your doing this as a backup, just incase of any eventualities).

After exporting the folder, DELETE the WGALOGON folder

After deleting close all applications and reboot your machine back to Normal Mode.

After being prompted for successful validation, reboot your Machine.

Monday, November 10, 2008

mobility impaired, blind or visual impaired windows users

Windows offers capabilities to help mobility impaired and blind or visual impaired users.
The utility manager helps user to start or stop accessibility programs.

These built in accessibility programs are magnifier, narrator and on screen keyboard.
Magnifier-is a display utility that makes the screen more readable.
The magnifier creates a separate window that displays a portion of the magnified screen.

Narrator- is a text to speech program, it gives users who are blind or have impaired vision ability to be able to use their computers.
It reads what is displayed on your screen, the contents of the active window, menu options, or the text you have typed. For the effectiveness of the narrator utility the computer should be sound enabled(able to output sound).

On screen keyboard (OSK) -this utility displays a virtual keyboard on screen and allows users with mobility impairments to use a pointing device or joystick to type data.
You can active utility manager by pressing the Windows logo key + U.
You can also open utility manager by clicking Start, pointing to All Programs, Accessories, Accessibility, and then clicking utility manager. You can active the Magnifier and on screen keyboard within the utility manager.

Wednesday, October 8, 2008

Network Problems

Multitasking environment creates increased demand for network resources.Also the use of network intensive applications like client\server software can cause congestion.Fault management- This involves the detection and isolation of the problem that caused the failure and restoration of the service. Fault management involves trouble ticket administration, security management which is physically securing the network as well as controlling access to the network.Many times some of the network problems can be resolved using intuition.Network management versus system managementNetwork management is concerned with network resources such as hubs, switches, bridges, routers, gateways and connectivity among them via a network.System management is the management of system and system resources.

Tuesday, July 22, 2008

data, information and computers

Basically in a nutshell a computer is a data processing device. Whatever the computer is able to do is data processing.

Data is raw facts or facts and figures in isolation.

Information is processed data, though many times the terms data and information are used interchangeably.

A computer is an electronic data processing device.

Data plays a very vital role in computer, network and information systems so it important to have good quality data.

Some qualities of good data are :-accuracy, completeness and consistency.

Friday, July 4, 2008

Bluetooth

The heart of Bluetooth brand identity is the name, which refers to the Danish king Herald ”Bluetooth” Blaatand who unified Denmark and Norway. In the beginning of the Bluetooth wireless technology era, Bluetooth was aimed at unifying the telecom and computing industries.

Bluetooth is a technology that uses short range radio frequency (RF) that operates at 2.4 GHz and is capable of transmitting both voice and data.

The most effective range is 32 feet (10metres).Bluetooth data transfer rate is
1 Mbps, which is from three to eight times the average speed of parallel and serial ports, respectively.

Bluetooth can be used to wirelessly synchronize and transfer data among devices e.g a phone to a phone or a phone to a computer and vice versa, it is thought as a cable replacement technology.

Bluetooth can be used to access a Local Area Network or the internet wirelessly by a cellular phone.