Learn How To Deal With Defragmentation Tool (© All Computer Studies)

One of the famous ways to gain a little extra speed from your laptop or desktop computer is to Defragmentation the hard drive every now and again.As your computer uses files and folder it has a habit of splitting them up in to different clusters indexes of data on your hard drive which results in something called fragmentation. Other than storing everything in a neat arrange order your data gets dotted around the place.The result of this is that when your computer comes to use a file that has become fragmented it has to access from several places on the disk which results in slower loading times like slipping computer.
Learn How To Deal With Defragmentation Tool (© All Computer Studies)
A disk defragmenter is manufacture to organize your hard disk back in to some kind of order so that your computer has to do less work and hence becomes more faster.

Learn About Emoticons (© All Computer Studies)

Emoticons are ASCII codes designed to show an emotional state in plain text cheating. Over time they have turned into an hobby form as well. In most condition, emoticons are constructed to be see by tilting your head left so the another side of the emoticon is at the bottom of the “images.” These simple emoticons have, over time, merged with artwork produced as ASCII codes.If interested, perform a Google search on the word “ASCII art” and you should find multiple sites that host such collections.
Learn About Emoticons (© All Computer Studies)
Common Emoticons

 :-)  Basic smiley face; used for humor and sometimes sarcasm
 :-(  Basic frowney face; used for sadness or anger
 ;-)  Half-smiley or winkey face; more often used for sarcasm
 :-/  Wry face; used for wry humor

Learn Free Google Voice Search In Chrome Browser (© All Computer Studies)

The latest Chrome Beta version provide you to Search In Chrome Browser by voice or typing, clicking or hand-washing required. Simply open a new tab in web browser or visit Google.com in Chrome, say "Ok Google," and then start speaking your search. This will be rolled out to English Language users on Windows, Mac and Linux operating system over the next few days, with support for additional languages and Chrome OS coming soon. Here are a few examples to get you started:
Learn Free Google Voice Search In Chrome Browser
Perform searches: Say “Ok Google, all computer studies?”

Set a timer: Say “Ok Google, set a timer for 30 minutes”

Create a reminder for Google Now: Say “Ok Google, remind me to pick up dessert at 9am”

To enable this feature, visit Google.com, click on the mic icon, then click on “Enable Ok Google:"

Learn About Types Of Internet Connection (© All Computer Studies)

let’s Read some common Internet options and dissect which speed may best meet your own online needs.

Dial-Up

Using an internet service provider public telephone network to connect, the quality of the access is relatively poor compared to its competitors and reaches a meager speed height of about 56 Kbps, much too slow for quality streaming or downloading. Still, dial-up is the economical option for a family living on a low budget, or for anyone who desires basic access to Web pages, but not necessarily the flashy substance of video and audio.

DSL

The connection uses a two-wire copper phone line that avoids clogging your phone landline in the way dial-up is known to do. DSL is divided into three subcategories:

Asymmetric Digital Subscriber Line (ADSL).
symmetric digital subscriber line (SDSL).
Very-high-bit-rate digital subscriber line (VDSL).

Simple Mouse Operations You Can Use In Windows (© All Computer Studies)

Below is the windows operations that you can use on some occasions with windows operating System or associated software.

   Open new links in brand new tabs on Web Browser :

If your mouse has three buttons – then use the middle one to open new tabs. The mouse pointer over the link and press the mouse wheel to open up new tabs.  All you need to do is place the mouse pointer over a link and then press down on the middle mouse button (the mouse wheel).

The middle mouse button is able to roll Up or down, however, it is also able to be pressed down and clicked just like a button.  If you do this on a link then it will open up that link in a new tab.  This is a lot quicker than pressing right-click on any link and clicking on “open link in a new tab.”  It is an easier way to research certain items by simply clicking in order to open new tabs.

If you are feeling the super lazy you can hold CTRL key and press Tab key to scroll through your tabbed windows – or you can even hold Alt and press Tab to see a screen of windows – which shows all of the items you have active at the moment, including your tabbed windows.

Learn How To Determining The Type Of Memory (© All Computer Studies)

The best and recommend way of determining the type of memory (laptop/desktop) that should be used with your computer is through the computer or motherboard manufacturer documentation. If you don't have your product documentation you can still find it on internet through the company of laptop manufacturers or motherboard manufacturer official web site.

How Can I Add Accelerated Graphics Port Slot To Computer? (© All Computer Studies)

For Desktop Computers

If you have an older computer that does not have an Accelerated Graphics Port ,the  method of adding an AGP slot to your desktop computer would be to replace the motherboard with a new motherboard that supports AGP. Installing a new motherboard can be one of the most difficult things for most trainer, and in many cases we suggest purchasing a new upgraded computer that supports AGP.
How Can I Add Accelerated Graphics Port Slot To Computer? (© All Computer Studies)
For Laptop Computers

Almost all laptop and portable computers do not have the ability to have a new video card installed or an AGP slot to be added to it.

Learn New Latest Features Of Photoshop (© All Computer Studies)

Whether you work in print for web-Banner, video or mobile pictures, use time saving tips and essential skills to speed up your working speed and fast your creativity.
 Photoshop is the first of three new product focusing on bringing you professional design training - having core skills, best practice techniques and expert tips - in key software packages.

We bring you solutions to real-world designing problems.

The most useable sections are; image editing , web design, Photoshop for video and mobile design.Each features to make you life as a design professional easier.

Photoshop smart features are Below:

Image Editing
Photoshop for video
Web Design

Learn About How To Protect Orkut Account ? (© All Computer Studies)

I was asked by many people to tell me the way to protect your orkut account. Please reply and show your feed back. As you know you can hide your primary email address from non-friends but if by mistake you add a unknown person to your friend list, then he/she will be able to see your primary email address which you use to login. He can send dangerous emails (keyloggers etc.) and steal your Orkut account. There are two Methods to be safe:
Learn About How To Protect Orkut Account ? (© All Computer Studies)
1. Changing Primary Email:
Go To Edit Profile Page of your profile, then click on Contact tab and change your Primary Email address to some other id, which you don't use much. Your login id will remain same but your friends will see your other email id.

2. Using Fake Email id:
It is the most effective way of hiding email id, but it requires a new account, If you have some larger communities and want safety, then follow this method:

 Create a new Orkut account, On the Sign Up page enter any id which does not exist like yourname@gmail.com, myname@orkutaccount.com etc.

Then after entering other details, you will be redirected to your home page and with a message "Verify Your Email", Just ignore it and do as stated below:

Now Go to google.com, you will see your fake id on the top-right corner yourname@gmail.com, You can see "My Account" Option there.

Go To "My Account Page" and create a gmail id from there. (You can see it under Try Some More)
Done! You have your new login id but your friends will still see your fake id :| Enjoy 

Learn How To Create Strong Passwords? (© All Computer Studies)

As you know that passwords are the base of security now a days, Its really important for one to create a secrete passwords, Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc. So in this post I will tell you to create a strong password so you can secure your account from getting hacked.
What makes a strong password?

A password can be considered strong if it full fill the following point:

* It needs to contain special characters such as &#%$^@

* It must be at least eight characters long.

* It must not have any common words such as 123, abc, xyz, your phone number, your login name and any words that can be found in the dictionary,(This will prevent you from getting hacked by a Dictionary Attack)

* A variation of capitalization and small letters.

Learn About How To Finding A Spoofed Website With A Javascript (© All Computer Studies)

Lots of people think that Javascript is an lower language but Javascript is an highly powerful language and those people who think that they either don't know how to use it or are not familiar with it's capabilities, With javascript you can do lots of cool things such as edit any online webpage, make an image fly on your web browser etc, but it is a waste of time to spend your time on making images fly with javascripts or editing a webpage. Anyways coming to the main topic, did you know that javascript can be used to detect if a page is a spoofed website or phishing website or a scam one, well if you don't know just paste the following javascript (.js) code in to the address bar and a pop up will appear telling you whether the website is original or not.

Here is the JavaScript code:

javascript:alert("The original URL is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe full address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof/scam.");

Learn About How To Hide Keyloggers And Trojans With Binders (© All Computer Studies)

You would have likely heard that never run a .exe file if you are not confirmed about the authenticity of the person who send you that particular file, The reason why you might have heard that because Trojans, Keylogger, Spywares and Adwares use .exe format by default.

So what do you think are you completely safe that you run trusted MP4,gif files?

The answer is no, Its because you never know that virus has came with which format, It can take any extensions, It could be in JPEG, It could be in MP4 and it could be in almost any Format, So in this article I will tell you how hackers hide Keyloggers,Trojans and other harmful viruses in other files.

#1 With the help of Binder :-

 A Binder is a software used to join or combine two or more files under one name and extension, The files to be combine can have any name or icon, Its all your choice to select the name, icon and various attributes of binded file, The Binded files can be even worse when they are crypted, because Bintext would not be able to find it and at the same time it could also bypass antivirus detection then you are almost guaranteed to be infected.

Learn About How To Protect Your Computer From KeyLoggers? (© All Computer Studies)

Keyloggers having a big problem today as once they get installed in your computer/laptop the hacker can get almost all information of your PCs. Some of the best keyloggers available now a days The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger. Normally a keylogger is detected by a good antivirus or Antispyware program, but hackers use some methods such as crypting, Encripting, binding etc through which the keylogger can easily Antivirus as well as Antispyware program Zemana AntiLogger now covers pretty much every aspect of Windows including registry modification and dll injection prevention and protects Windows from other spyware-related techniques with Anti-Keylogger, Anti-SreeenLogger, Anti-WebLogger and Anti-ClipboardLogger tools of its own. Another useful feature this apps has is while-list approach meaning it automatically recognizes "safe" programs and does not treat them as "suspects".

Learn About How To Protect Your Computer From ARP Poisoning (© All Computer Studies)

I used different software to see which one works the best to protect computer from an ARP Poisoning attack I came across some excellent software's but they are highly cost, so I thought not to share it and searched for a Free Alternative finally I came across a Free Firewall Which helps you successfully block ARP Poisoning attacks.

Download Commodo Firewall from the link below:

Download Commodo Firewall

Learn About How To Protect Your Computer Against Spywares And Keyloggers (© All Computer Studies)

Spywares like Sniper spy and Remote spy are almost un find able by an antivirus program,to protect your computer against these harmful spyware,Dogs and key loggers you need to install a good anti spyware program .

The following are some of the major risks of spywares:

1. Spyware programs are designed specifically to monitor and record your behaviors, such as track websites you visit online, or monitor your use of other web-based programs.

2. Hackers mainly use spywares to steal sensitive information such as email passwords and credit card data. So it is a must to have an anti-spyware installed on your computer. Antivirus isn't just install today!

3. Spyware is also capable of performing activities such as completely shutting down your computer, or permanently erasing or damaging files. Valuable client files could be destroyed in a blink of an eye, making this type of spyware threat high-risk.

Learn About How To Check Effectiveness Of Your Antivirus (© All Computer Studies)

Have you ever worry that is your Antivirus perform there task properly? Do you want to sure that your antivirus works properly? So don't worry we have got a perfect working solution which will make you to Check Effectiveness of your system Antivirus.The test for this purpose is called EICAR Test. EICAR test is used by many antivirus developers to find whether there antivirus is working properly or not.lets starts...

Follow these steps to test your antivirus:

1. Open notepad Type the following Encrypt code and save it as virustestfile.com

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Now scan your computer or laptop If your antivirus detects it as a virus then your Antivirus is working properly and If it does not detect it as a virus then your antivirus is not effective and you need to look for alternative Antivirus.

Learn About What Is Secure Sockets Layer (SSL)? (© All Computer Studies)

You might have heard some people that not to give your secrete information (password or credit card) or any other sensitive information on public computers like cafe PC or on MSN,YAHOO massanger etc.The reason why you might have heard that the Attacker have some ways to you would have probably heard that Attacker have a way to sealed your your credit card numbers , passwords etc.
Learn About What Is Secure Sockets Layer (SSL)? (© All Computer Studies)
A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information Secure Sockets Layer (SSL) is the most popular used technology for inventing a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean.

HTTP protocol is used for standard communication between the Web server and the client.
HTTPS is used for a secure communication.

Learn About How To Secure Your WordPress Blogs? (© All Computer Studies)

As you know that the word press is a common and most popular plate form for blogging, but the security of the WordPress.com is always a great discussion and it need more and more concentration because scam discover everyday.
Learn About How To Secure Your WordPress Blogs? (© All Computer Studies)
Below are some tips to make your blog secure:

Secure WP-Admin By Internet Protocol

Let suppose if someone can get the access (username and Password) to enter into your website WP section, you can secure this area by your IP. It prevent brute forcing attack and only you can able to control on your website because of IP restriction.

Order deny,allow Deny from All 
Allow from 123.456.789.0 
You can allow and deny IP's from a range use this:
order deny,allow deny from all # allow my home IP address allow from **.**.***.*** # allow my work IP address allow from **.**.***.***

Protect WP-Config.php File

WP-Config.php page has a great importance on word press web form, it need more care and usually an attacker get the required information about the database of your website from WP-Config page. Basically if you use a strong database columns user-name and password while your WP-Config security is slow than an attacker can get your strong user-name and password from wp-config page, because it contain all the information about the security and other things of your website.
Access .htaccess file is located at the root your WordPress installation open it and copy & paste the following code.

order allow,deny deny from all

Hide WordPress Version Number

You must hide the version of your word press program because an injector may find the available exploit by searching it on different exploit database by version number and it may cause a great disease for your blogger so be care about it. This tag is in the header.php page that displays your current version of word press Copy and paste the code in the functions.php page of your themes and than you are safe.

remove_action('wp_head', 'wp_generator');

Learn About How Much RAM Need In Windows 8 ? (© All Computer Studies)

In Windows 8 and Mountain Lion powered Laptop Computers, the question of how much RAM a modern system needs is hitting my inbox with increased speed.

Below is my guide to how much RAM you need to increase speed .

Note : that dual-channel motherboards will support 1GB, 2GB, 4GB, 8GB, and 16GB of RAM, depending on motherboard, while triple-channel boards support 3GB, 6GB, 9GB, or 12GB,again depending on motherboard support.

About 3 - 4 GB :-

If you're running a 32-bit operating system then with 4 or 3GB of RAM installed you'll only be able to access around 3.2 GB (giga-bite). However, with a 64-bit operating system then you'll have full access to the whole 4GB.
Learn About How Much RAM Need In Windows 8 ? (© All Computer Studies)
The difference in performance between a system with 2 GB of RAM and one with 3 or 4GB is like day and night. Even on a 32-bit system that limits the RAM to a little over 3GB, the performance boost is well worth the cost. Not only do application play faster, you can read more applications simultaneously handy if you run suites like Microsoft Office 2013 or Adobe  Collection.

If you have a 64-bit operating system, then bumping up the RAM from 2GB is a no-brainer.

All but the most basic of Microsoft Windows 8 systems come with 3 or 4GB of RAM, while 4GB is the minimum for all new iMacs, MacBooks, and Red Hat Linex.

Learn About How To Copy a Large File Despite Having Larger Free Space (© All Computer Studies)

In these days of extra large hard disks many try to copy huge files from a DVD/CD but find that can not even though there is plenty of free space on the hard disk. The most likely cause for this is not some sort of copy protection but that the file being copied is too large for the file system to handle. Microsoft Windows 8 allows you to format a hard disk in two different file system formats: FAT32 and NTFS. These file systems differ in the size of file they can handle. FAT32, for example, can only handle files up to ~4GB in size. When it was developed, that size file was almost unheard of but now, a DVD can have files that large or larger routinely. So, if you are trying to copy a movie from a DVD onto your FAT32-formatted hard drive it likely won’t copy as most full-length movies are files larger than 4 gigabyte.

What Is a Country Codes And Domains? (© All Computer Studies)

The last characters on a domain name are usually known as country code (e.g., .pk, .in, etc.) or a top level domain (e.g., .com, .org, etc.).
What Is a Country Codes And Domains? (© All Computer Studies)
Domain names around the world often have a country code associated with them. The links are to the latest WHO is information for the top level domain.

Learn About How Do I Remove Add/Remove Programs? (© All Computer Studies)

Generally, you would use the Window's Control Panel’s ----> Add/Remove Programs tool or Vista's Default Programs | Programs and Features page to install/uninstall programs from your laptop computer. Some of these uninstalls will leave program names behind which, when clicked on it, either produce errors or no result. You can remove these invalid entries using these steps carefully.

Start the Registry Editor (Start ---> Run and then type “regedit” [without quotes] into the textbox)
Go to this key value in the left panel:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Right click on the Uninstall entry. Select the 'Export' option from the left menubar. Give the exported .reg file a name you can remember and store it in a location you can remember. Doing this makes a backup you can recover from if you make an editing error in the steps below.

* Locate the specific key you wish to remove. It will likely have the name of the program but, in case not, scroll down each entry and look at the value for DisplayName. The key you want is the key that contains the same display name as you are trying to remove from the Add Programs menu.
If you want to be extra safe, right click on this key and again select Export and save the .REG file.

* Close the Registry Editor.

* Open the Add/Remove Programs utility from the Control Panel and verify that the invalid entry is gone and that the other entries are still there.

What Is Computer Virus? (© All Computer Studies)

A virus is a program that produces its own language by attaching its self to other executable files (.exe) in such a way that the virus code word is executed when the infected executable file is executed. There are a large number of virus types. A virus reproduces, usually with out your permission or information. In general terms they have an injection phase where they produce widely and an attack phase where they do whatever damage they are manage to do.
What Is Computer Virus? (© All Computer Studies)
An famous example of an executable file would be a program (.COM or .EXE file) or an overlay or library file used by an .EXE file. But just as critical, would be the macro portion of what you might generally consider to be a huge data file (e.g. a M.S Word document). It’s important to also realize that the system sectors on either a floppy or hard disk contain executable code that can be infected even those on a data hard disk. More recently, code written for Internet Web sites included in Electronic mail can also be executed and infected.

Another way of looking at viruses is to consider them to be programs written to create copies of themselves. These programs attach these copies onto host programs . When one of these hosts is executed, the virus code executes, and links copies of itself to even more hosts.

Similar to viruses, you can also find malicious code in Trojan Horses, logic bombs. Often the characteristics of both a virus and a worm can be found in the same beast confusing the issue even further.