Thursday, December 29, 2011

Increase Computer Speed (Clean Up uC)

Is your PC running slow?
Keeping PC free of clutter can help in performance and can also increase valuable disk space.
Here are a few simple Steps for maintaining the performance of PC.

Run the Windows Live OneCare clean up scan

The clean up scanner itself checks hard disk for any unnecessary files and gives the option to delete them. Run the clean up scan in performing a disk cleanup—or run the complete full service scan to check for other PC issues as well.

Clear Internet browser cache

The clean up scanner handles most frequent types of temporary files, but Internet browser automatically caches, or stores, another type of temporary file while surfing the Internet. Browsers like Internet Explorer save copies of the Web pages visited in order to load these pages faster while visiting those sites next time. Outside of speeding up browsing, still, browser does not require this cache of temporary files in order to operate properly. Since most of the Web sites have large graphics, clearing out browser's cache can save important hard disk space.
To clear cache in internet explorer
1.      Click the Tools menu, and then click Internet Options.
2.      Select the General tab, and then click Delete Files in the Temporary Internet files section.
3.      In the Delete Files dialog box that appears, select Delete all offline content, and then click OK.
If it's the first time clearing the cache, or it's been a long while dumped the cache and the file accumulation is large, deleting these files might take several minutes. When the cache is cleared, click OK to close the Internet Options dialog box.

Remove unused programs

Just because of using a program doesn't mean it isn't consuming resources and affecting PC's performance. Removing unused programs from hard disk is an easy way to maintain system and maximize available hard disk space.
To remove the unwanted programs
1.      Click Start, and then click Control Panel.
2.      In this View, click Add or Remove Programs, then click Remove a program.
3.      Scroll through the list and look at each program. Windows XP lists how often the program is used and what day it was last started.

4.      Click the unwanted programs, and click Change/Remove, and then follow the prompts to uninstall it.
Then restart the computer after removing a program. After the computer is restarted, repeat this process to remove more programs.

Remove the optional Windows components

Remove optional Windows components from PC to free up space. Many components come normal with Windows, but may not use them frequently. Reinstall these components from Windows CD if it’s not needed later on.
In order to add or remove a Windows component:
1.      Click Start, and then click Control Panel.
2.      In this View, click Add or Remove Programs, then click Add a program.
3.      On the left hand side of the menu, click Add/Remove Windows Components.
4.      Follow the commands in the Windows Components Wizard.

Modify System Restore data
Windows XP provides the option to restore PC to a previous state by manually saving restore information. System Restore continuously monitors PC for changes, like file changes, application changes, or installations. System Restore takes a "snapshot" of PC at a given point of time and then stores each of these snapshots so that it can turn back any changes to a period before experiencing any problems.
These snapshots of whole system take up memory space. Delete older snapshots which are not required in order to clean up hard disk.

To delete System Restore snapshots except for the latest one:
1.      Click Start, point to All Programs, point to Accessories, point to System Tools, and click Disk Cleanup.
2.      Wait till the Disk Cleanup calculates free disk space.
3.      Click the More Options tab, in the System Restore area, and then click Clean up.
Our expertss are available round the clock, 24x7 at your service; you can give us a call on our toll free number 1 855 883 3366 or you can visit our website @ http://www.leniotech.com

Firewall configuration help for additional network security


A firewall helps to keep your computer more secure with additional security mechanism. A firewall restricts information that comes to your computer from other computers and gives you control over the data on your computer.


Additionally, a firewall provides defense against hackers or inappropriate programs, including viruses and worms that try to connect to your computer without any invitation.

Firewall act as a barrier that checks all information, also known as traffic, which comes from the Internet or from a different network. The Firewall is a medium between your network and out side world (Internet). The firewall either turns traffic away or let it pass through to your computer, depending on your firewall settings.

In Microsoft XP Service Pack 2 (SP2), you may turn off or turn on the WindowsFirewall. By default, Windows Firewall is always turned on for all the network interfaces. This is the configuration which provides network protection on new Windows XP installations and upgrades. This default configuration also helps you to protect your computer from the new network connections as and when they add to the system.

Although Windows Firewall is always turned on by default, but some computer manufacturers and the network administrators may turn the firewall off. You may not have to use Windows Firewall. You may install and run any of the firewall that you want. Firewall can be of software level or hardware level. Network admins favorite is hardware firewall as it provides more security. One can choose firewall according to the requirement. If you decide to install and run any other firewall, turn off the Windows Firewall.

How to configure Windows Firewall settings
Statutory Warning This workaround can make your computer or your network more vulnerable to attack by malicious users or by malicious software such as viruses. We do not recommend this but are providing this information to you so that you can implement it at your own discretion. You can use this workaround at your own risk.

To examine and configure your firewall settings, you can follow these steps:

1.) First Click on Start, then click on Run, and type wscui.cpl & then click OK.

2.) In Windows Security Center, click on Windows Firewall.

Windows Firewall will include the following tabs:
● General
● Exceptions
● Advanced

The General tab will have the following settings:
● On (recommended)
● Don't allow exceptions
● Off (not recommended)

When you click on don’t allow exceptions, Windows Firewall will block all requests to connect to your computer, including requests from all programs or services that are listed on the Exceptions tab. The firewall will also block discovery of network devices, file sharing, and printer sharing.

They don’t allow exceptions option is helpful when you have to connect to a public network, such as one that is linked with an airport or with a hotel. This setting will help to protect your computer by blocking all the attempts to connect to your computer.

When you are using Windows Firewall with no exceptions, you can still view the Web pages, send and receive your e-mail, or use an instant messaging program.

The Exceptions tab allows you to add program and port exceptions to permit certain types of inbound traffic. You can also set a scope for every exception.

For home and small office networks, we will recommend that you can set the scope to the local network only, if it is feasible. This configuration enables all computers on the same subnet to connect to program, but drops all the traffic that originates from a remote network.

The Advanced tab let you configure the following:
● Connection-specific rules apply for each network interface.
● The Security Logging configuration.
● Global Internet Control Message Protocol (ICMP) rules which apply to ICMP traffic. (This traffic is used for the error and status information transmission.)
● Default settings. 



About Author
Share your headaches with an expert who can fix all the issues related to computers, Printers, Scanners, HP, Dell, IBM, Lenovo, Acer, Toshiba, Windows XP, Windows Vista, Windows 7, MacBooks, Email Setup, Microsoft Outlook, Windows Live mail setup, Internet Explorer, Mozilla Thunderbird, and File management etc.
Get 24x7 online computer repair, online technical support services from LenioTech experts.

If you need more help in configuring the firewall for home and small networks or for windows 2003, vista and windows 7 you can contact the technical experts of LenioTech on 1 855 883 3366 or visit the website: http://www.leniotech.com

Saturday, August 27, 2011

Common Windows Shortcuts

Description
Press this key
Display or hide the Start menu
WIN
Lock the computer
WIN+L
Display the System Properties dialog box
WIN+BREAK
Show the desktop
WIN+D
Open Computer folder
WIN+E
Search for file or folder
WIN+F
Search for computers
CTRL+WIN +F
Display Windows Help
WIN+F1
Minimize all the windows
WIN+M
Restore all minimized windows
WIN+SHIFT+M
Open the Run dialog box
WIN+R
Show Flip 3D
WIN+TAB
Open Ease of Access Center
WIN+U
Open Windows Mobility Center
WIN+X

Friday, August 26, 2011

Get Rid of Duplicate Images on your Computer

You can have duplicate images on your computer for mostly three reasons:
#1. You transferred a set of pictures from the digital camera to your computer but did not erase them from the camera. Thus when you re-connected the camera, they got copied again to your hard drive but in a different location.
#2. You made some minor edits to a picture – let’s say you cropped it or fixed the rotation – and your image editing program saved the edited image as well as the original picture.
#3. You may also have images on your computer that are “loose duplicates” of each other.  That means the images are mostly identical except for very minor variations – often happens when you capture multiple frames in quick succession.
1. Deleting Duplicate Images
If you are only looking to find and remove images that are “exact” duplicates of each other, Google’s Picasa desktop software could be a good solution. Just import all your picture folders into Picasa and then choose Tools –> Experimental –> Show Duplicate Files to see a list of potential duplicates.




While removing duplicate images with Picasa, please remember that the software will list all copies that are found of an image including the original one. You therefore need to keep one of these copies and delete the rest as demonstrated in the above screencast.
Alternatively, create a separate folder that’s not included in Picasa and move all the potential duplicate photographs to that folder instead of deleting them.
Related reading: How to Backup your Photos
Now Picasa is a good solution for deleting identical duplicates but your disk may also be storing have pictures that look similar visually but may differ as far as pixels or bytes are considered. Such files won’t be recognized by Picasa as duplicates but VisiPic, a tiny utility for Windows, can come really handy here.
2. Deleting Similar Images
To get started, launch the program and click File –> Add Folder to add folder(s) that you want to scan for duplicates. Then slide the Filter to somewhere between “Strict” and “Basic” so that program may group images that are similar or only slightly different. Hit play to begin scanning for duplicates.
Duplicate Images
To eliminate the duplicates, just move your mouse over the thumbnails and left-click the pictures you want to delete. They’ll be marked with a recycle bin icon and you may then either choose “Delete” or even “Move” to transfer them to a separate folder.
The tool is also smart enough to auto-select images for deletion that either have lower resolution or lower file-size than the original image.

Online Account Security Enhancements.

A Security Checklist for Online Accounts

#1. I have enabled the “Always use HTTPS” setting for Facebook, Twitter, Gmail, Google and all the other online services that support secure HTTP. This is especially important when accessing Internet over a Wi-Fi network because without HTTPS, anyone (and not just skilled hackers) can capture your login details using Firesheep, a simple Firefox extension.
#2. I have a few Google Accounts and they all use 2-step verification now. That means if someone tries to log into my Google account from a different computer, they’ll have to type an additional code that is sent directly to my mobile phone as an SMS text message or over a voice call.
#3. The 2-step verification can also alert you to potential hacking activity. If I ever get an SMS (or a voice call) from Google with the verification code but without requesting one, it is an immediate hint that someone knows my password though they won’t be able to get in without entering the verification code.
#4. I have connected my mobile number with my Facebook account. This is extremely important because I get an instant SMS and an email alert whenever my Facebook account is accessed from a different computer or another mobile phone.
#5. I carefully reviewed third-party sites that have access to my online accounts and revoked access to all the unwanted apps that I no longer use. In case you wish to do the same for your accounts, here are the direct links for Facebook, Google and Twitter.
#6. I maintain two email addresses – one is public that is displayed on the blog while the other email address is known to a select few. Why?
6a. The public email address is associated with services like Twitter, YouTube, Facebook, Foursquare, LinkedIn, Flickr, Tumblr, Posterous, Skype and a couple of other social sites where I want people to find me if they have my email address in their address book.
6b. I use the other “secret” email address with services like Dropbox, Amazon, Google Apps, my bank, my hosting service, Apple iTunes, PayPal and few other places where account security is even more critical and where I am not looking to get social.
#7. If I am testing a new online service, I almost always use a disposable email address to create a test account with that service. Some online services reject disposable addresses to prevent fake registrations but the one I use goes through as it is only an alias (or nickname) of my main email address.
#8. I prefer using a virtual credit card with shopping sites that I am either using for the first time or where the fine print is too long and there’s a risk that I could be billed again if I don’t cancel the account. This also helps keep my credit card safe from relatively unknown sites.
#9. Once in a while, I do mock drill with my most important online accounts to test the various recovery options I would have in case I forget my password or if I lose access to my secondary email address or misplace my mobile phone.
#10. The last point - how do I remember and manage so many different passwords?
Some people prefer to use password managers which are very convenient but at this time, all I use is a simple 1-page document (see sample) to store information of all my online accounts and the corresponding passwords. This file is password-protected and I put it on Dropbox so the information is available on all my computers.
This may surprise some but I also have a hard copy of this file that family members can refer to in case I am travelling and they need urgent access to any of my online accounts. Also, since they would need my mobile phone to access my Gmail or Google account, I have included backup verification codes in the printed document itself – thus the Google account can be used without requiring the phone.
One more thing. If you have two email accounts, never ever set one emails as the secondary (or recovery) email address of the other. That’s because if one of your email accounts gets compromised, the hacker can easily take over the other account as well.

Thursday, August 25, 2011

Access your computer files from anywhere.


Scenerio: You have documents, photos, music and other important files on the home computer. How can you “remotely access” these files from your office computer or, when you are travelling, from your mobile phone?
Solution: The simplest solution would be that you copy all your data from the home computer on to a portable hard drive and carry it around but this is obviously a bit cumbersome approach as it requires you to manually sync the home computer and your portable disk.

Access Files on your Computer over the Internet

There are couple of ways by which you can retrieve files stored on your home computer from anywhere else using a regular Internet connection.

Option 1: Using Online Backup
You can use an online backup service like SugarSync, Carbonite, SkyDrive or even Dropbox – they provide desktop utilities that will automatically upload files on your home computer to the Internet and you can then access these files through the web browser of any other Internet connected computer.
The upside is that your files will always be available to you even if the home computer is not running. SugarSync and Carbonite have a mobile optimized website so you can access files from any mobile phone as well.

Option 2: Using Desktop Sharing Software
There are free desktop sharing software like TeamViewer and UltraVNC that also let you remotely access your computer files from anywhere else. LogMeIn Pro and CrossLoop Home are some other good options for transferring files from a remote computer but these are paid services.
If all your computers are running Windows, you can use the built-in remote desktop connection feature of Windows (available in XP and later) to access your home computer from another Window computer over the Internet.
With Desktop Sharing software, you’ll always have access to all your files but one big limitation is that it requires that the remote computer stays on. Also, none of these options will help you access files on a mobile phone except LogMeIn which has an iPhone app.

Option 3: Access Files Directly through the Browser
Online backup services, discussed above, will copy files to their own servers before you can access them for anywhere else. Screen sharing services are often slow and they won’t work on most mobile devices. Let’s now explore another set of services that allow you download files directly from the home computer.
Copernic, like Google Desktop, is a popular desktop search software that you may use to find emails, documents and other files on your Windows computer. They have a paid component called myCopernic on the Go that lets you remotely search for content stored on the home or office computer. You can preview the search results and then download them to your mobile phone or remote PC.
With Opera Unite, you can easily turn your computer into a web server and instantly access files and folders on that computer from any other web browser (including that of mobile phones). Opera Unite is a standard web server and therefore you’ll be downloading files directly from the computer – they’re not uploaded anywhere else.
Another option is GBridge that lets you setup a virtual private network using your existing Google Account. Companies use VPNs to let employees access corporate data over a public network (Internet) and with GBridge, even home users can build their own VPNs to access remote files more securely.
Windows Live Sync at sync.live.com is another great choice for remotely accessing files over the Internet. Just install the Live Sync client on your computer and you can then access the entire hard drive of that computer simply through the Windows Live Sync website.
Live Sync is available for both Mac and Windows. The new version of Live Sync is even better and it has integrated online storage (Live Mesh) so you’ll be able to access your important file even if the remote computer is off.
Finally, you may also want to check out HomePipe – this is an extremely easy and free service that lets you access your home files and media from any other computer or mobile phone. Install the HomePipe Agent and all files on that computer will instantly become available through the web. They also have apps for iPhone and Android phones.

Sharing Large files Over Internet.

A: Share Large Files over Email

The Gmail service cannot handle email attachments that are larger than 25 MB but the recently-revamped Hotmail service is a much better alternative as it lets you send email messages as large as 10 GB.
The maximum size of an individual file that you can attach to an Hotmail message is only 50 MB but you can use a file-splitting utility like HJ-Split to break a big file into smaller chunks and then attach them all to a single message. The recipient can then join these chunks to restore the original file and he can do without requiring external programs.

B: Share Large Files without Email

The downside with email attachments is obvious - most ISPs and web-based email programs (including Gmail) will reject incoming messages that have big attachments and therefore, if you are sending a bulky file via email, the recipients also have to be on Hotmail as well in order to receive that file.
One of the best options for sharing large files without email is Dropbox. Once you install the the Dropbox utility on your (Windows, Mac or Linux) desktop, you can upload files of virtually any size to the Internet - it’s only limited by the size of your Dropbox storage which is 2GB in the case of free accounts. Alternatively, if you don’t want to install Dropbox, you can upload files straight to the Dropbox website from your browser but the limit in this case is 300 MB per file.
You can even consider using Google Docs to share those big files over the Internet. Google Docs lets you upload files up to 250 MB in size and they can be in any format. You have 1 GB of free storage space for storing all the non-Office files on Google Docs but you can also buy more space for a reasonable fee.
Unlike FTP servers, services like Google Docs and Dropbox don’t support resumable downloads. That means if the connection breaks while the recipient is still trying to download your “huge” file, he or she will have to resume the download from scratch. That can be a deal-breaker for lot of people.
SkyDrive, part of the Windows Live family, can solve this problem in a way.
The service offers 25 GB of free online storage, with individual files limited to 50 MB. To upload a large file, split it into chunks of 50 MB each and then upload them all to a single folder on SkyDrive. The recipient can download the entire folder as a ZIP or, if he’s on a flaky connection, he can download files one by one and then join them all at his end.

C. Share Files without Registration

Finally, if you are looking for something quick and simple that doesn’t even require registration, talk to YouSendIt or WeTransfer (if the file size is really big). Just upload the files via the browser, enter the email address of the recipient and hit send. WeTransfer lets you send files up to 2 GB in size while the maximum allowed limit is 100 MB in the case of YouSendIt (free version).

Chart: Comparison of file sharing services

File Sharing - Size Limit

Saturday, August 13, 2011

XP Auto Log Off

Steps for rectifying this problem:

You need to Edit these values and type the correct path of shell :

Shell = explorer.exe
Userinit=X:\windows\system32\userinit.exe

NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD.
Log on to a networked computer.
Run Regedit.exe
Point your cursor to HKEY_LOCAL_MACHINE
Select File > Connect Remote Registry
Type computer name (infected computer)
Navigate to the following location in registry of destination or infected computer

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Edit these two values in right pane:
Shell
Userinit
Change these two values to
Shell=explorer.exe
Userinit = x:\windows\system32\userinit.exe
Exit from Registry
Restart Infected computer.
You should be able to log on to computer.
if it not work then go to back steps and just copy orwrite the file userinit.exe

For technical contact:-
Nike
support@leniotech.com or visit us at http://www.leniotech.com/

Friday, August 12, 2011

Virtual Memory is Low

If your computer lacks the random access memory (RAM) needed to run a program or operation, Windows uses virtual memory to compensate.
Virtual memory combines your computer’s RAM with temporary space on your hard disk. When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM to complete its work.
The more RAM your computer has, the faster your programs will generally run. If a lack of RAM is slowing your computer, you might be tempted to increase virtual memory to compensate. However, your computer can read data from RAM much more quickly than from a hard disk, so adding RAM is a better solution.
If you receive warnings that your virtual memory is low, you'll need to increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file at the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB), and the maximum size at 3 times the amount of RAM installed on your computer. If you see warnings at these recommended levels, then increase the minimum and maximum sizes. To change the size of the virtual memory :
  1. Open System by clicking the Start button Picture of the Start button, clicking Control Panel, clicking System and Maintenance, and then clicking System.
  2. In the left pane, click Advanced system settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. On the Advanced tab, under Performance, click Settings.
  4. Click the Advanced tab, and then, under Virtual memory, click Change.
  5. Clear the Automatically manage paging file size for all drives check box.
  6. Under Drive [Volume Label], click the drive that contains the paging file you want to change.
  7. Click Custom size, type a new size in megabytes in the Initial size (MB) or Maximum size (MB) box, click Set, and then click OK.
Increases in size usually don't require a restart, but if you decrease the size, you'll need to restart your computer for the changes to take effect. We recommend that you don't disable or delete the paging file.

For technical contact:-
Sam

Error Message " NTLDR is missing"

NTLDR ( NT loader) is the boot loader for all releases of Microsoft's Windows NT operating system up to and including Windows XP and Windows Server 2003. NTLDR is typically run from the primary hard disk drive, but it can also run from portable storage devices such as a CD-ROM, USB flash drive, or floppy disk Drive.
NTLDR requires, at the minimum, the following two files to be on the system volume:
  • NTLDR, which contains the main boot loader itself
  • boot.ini, which contains configuration options for a boot menu
To Solve the Issues related to NTLDR you need the setup CD and need to repair the Operating System. Do the following:
Boot using Windows Setup CD and enter into "Recovery Console" by pressing "R". Now Log into windows installation and enter admin password. Now give following commands at prompt:

copy x:\i386\ntldr c:\
copy x:\i386\ntdetect.com c:\


Where "x" is your CD drive, change it acc. to your system.
For technical contact:-
Nike
support@leniotech.com or visit us at http://www.leniotech.com/

Wednesday, August 10, 2011

Fix Print Spooler Service Error

What is Print Spooler?
Print Spooler is windows service responsible for managing all print jobs currently being sent to the computer printer or print server. The print spooler program allows you to delete a print job being processed or otherwise manage the print jobs currently waiting to be printed.
How Print Spooler Error looks like?
Here are couple of examples of how it can look like:

spoolsv error
local print spooler error

Reasons of Print Spooler Error
There is 3 common reasons of Print Spooler Error:
1) Spooler Files corruption
2) Spooler registry entries corruption
3) Printer  driver incompatibility.

Files can become corrupted under the influence of printing software, malicious activity (spooler virus), and even after Windows Update. Printer driver incompatibility is an actual problem for old printers, when last released driver is not compatible with new operating system.
Fix Print Spooler Error!
Instructions
You can download files mentioned in manual from DLL files directory or even copy them from you friends PC.
A)
1) Run Spooler Fix Wizard, fix the problems
2) boot your system in safe mode
3) locate “spoolsv.exe” file in c:windows\system32\ folder
4) replace it with downloaded file
5) do the same with files spoolss.dll and localspl.dll
6) boot your system in normal mode
B)
1) press win + r on your keyboard
2) type in “regedit” without quotes
3) locate this tree node HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Spooler
4) to the right-hand side of the window locate “imagepath” icon
5) double-click on it and type in C:\WINDOWS\system32\spoolsv.exe and press enter
6) reboot
C)
1) right-click on “My computer”, select “manage”
2) locate “services in services and applications”, click on ‘services’
3) to the right-hand side locate “print spooler” service, double-click on it
4) set startup type as “Automatic”, apply
5) start the service.


For technical contact:-

Fix a corrupted user profile

If you tried to log on to Windows and received an error message telling you that your user profile might be corrupted, you can try to repair it. You will need to create a new profile, and then copy the files from the existing profile to the new one.

To create a new user profile

To create a new profile, you must first create a new user account. When the account is created, a profile will also be created.
  1. Open User Accounts by clicking the Start button Picture of the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts.
  2. Click Manage another account. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. Click Create a new account.
  4. Type the name you want to give the user account, click an account type, and then click Create Account.

To copy files to the new user profile

After you create the profile, you can copy the files from the existing profile. You must have at least three user accounts on the computer to complete these steps, including the new account you just created.
  1. Log on as a user other than the new user you just created or the user that you want to copy files from.
  2. Open Documents by clicking the Start button Picture of the Start button, and then clicking Documents.
  3. Click the Tools menu, and then click Folder Options.
    If you don't see the Tools menu, press ALT.
  4. Click the View tab, click Show hidden files and folders, clear the Hide protected operating system files check box, and then click OK.
  5. Locate the C:\Users\Old_Username folder, where C is the drive that Windows is installed, and Old_Username is the name of the profile you want to copy files from.
  6. Select all of the files and folders in this folder, except the following files:
    • Ntuser.dat
    • Ntuser.dat.log
    • Ntuser.ini
  7. Click the Edit menu, and then click Copy.
    If you don't see the Edit menu, press ALT.
  8. Locate the C:\Users\New_Username folder, where C is the drive that Windows is installed, and New_Username is the name of the new user profile you created.
  9. Click the Edit menu, and then click Paste.
    If you don't see the Edit menu, press ALT.
  10. Log off, and then log back on as the new user.
    If you have e-mail messages in an e-mail program, such as Windows Mail, you must import your e-mail messages and addresses to the new user profile before you delete the old profile. If everything is working properly, you can delete the old profile.

    For technical contact:-
    Nike
    support@leniotech.com or visit us at www.leniotech.com

How To Delete Cookies, Temp Files On A Computer

Cookies are small files that can be placed on your computer when you visit a website. They often serve as identifiers and sometimes to store custom parameters in
Temporary Internet Files is the name of a folder (directory) on your hard disk that is used by Internet Explorer to store Web pages, images, audio and video files, and other content from the Web sites that you are visiting. This folder is also known as the cache of Internet Explorer.
Despite these positive things about Temporary Internet Files, there is one big drawback: they compromise your privacy. They are called temporary but they are never deleted unless the cache is full and the Temporary Internet Files can reach very large size on the modern computers. Everyone with access to your computer can look into your Temporary Internet Files folder and see the sites that you have visited in the past.
All web browsers offer the means to delete cookies right in the browser.
Internet Explorer
To clear cookies in Internet Explorer do the following: Start the web browser and click on Tools > Safety > Delete Browsing History.
internet explorer delete cookies
Make sure Cookies is selected. A click on Delete removes all Internet Explorer cookies from the system. Sometimes you may want to delete specific cookies only. To do this click on Tools > Internet Options.
Locate the Settings button under Browsing History in the General tab. Click the View files button there.
view cookies internet explorer
This opens the temporary Internet files in Windows Explorer. My suggestion would be to change the folder view mode to details and sort the files by name or Internet address.
cookie temporary internet files
You can now delete cookies selectively in Windows Explorer.
Mozilla Firefox
Click on Tools > Clear Recent History or press Ctlr-Shift-Del to open the configuration window. Here you can clear all cookies stored in the Firefox web browser. Make sure to select everything from the time range pull down to delete all cookies.
clear cookies firefox
Click Tools > Options > Privacy if you want to delete only some cookies in the Mozilla Firefox web browser. Select Show Cookies from the interface. This opens a list of all cookies that are currently stored in the web browser.
firefox cookies
Simply select a cookie from the listing and click the remove cookie button afterwards to delete that cookie from the browser.
Google Chrome
Click on Wrench > Tools > Clear Browsing Data to delete cookies in Google Chrome.
cookies google chrome
Google Chrome is currently the only browser that links directly to Adobe Flash Player storage settings which makes it easier to delete Flash cookies as well.
The delete some cookies in Google Chrome open chrome://settings/content in the address bar and select the All cookies and site data button.
All cookies stored in Google Chrome are listed on that page. Just click on a cookie and then on the little x on the right side to delete that cookie.
google chrome cookies
Opera
Opera users need to click on Menu > Settings > Delete Private Data to delete cookies. They can delete all cookies under that menu, or click on the Manage Cookies button to see a list of all stored cookies on the system, and options to delete them selectively.
delete all cookies
cookie manager


For technical contact:-
Susheel Dhatwalia
info@leniotech.com or visit us at http://www.leniotech.com/

New Features Of Window 7

1. Opening multiple Instances of the same program
Want to open multiple instances of the same program? Maybe a second command prompt or another application that can be opened in multiple instances? Instead of opening the program again the usual way you can simply press the SHIFT key and left-click on the first instance in the Windows Taskbar to open a second one.
2. Problem Steps Recorder
If you ever had to do phone support you know how hard it can be to understand what the user on the other end of the phone did and wants. The Problem Steps Recorder is a sweet little tool in Windows 7 that can be used by the user to record his steps.
psr.exe
All that the user needs to do is start the recorder by entering psr in the Start Menu box and click on Start Record in the program interface. Screenshots will be taken from user actions. It is possible to add comments at any time if the user feels so. The whole recording will be saved as a zip file containing a slideshow of the actions.
3. Pin Favorite Folders
Want to add a favorite folders to Windows Explorer to be able to access them faster? Just drag and drop the folder to the favorites menu. It will remain there until you delete it with the delete key again.
4. Moving Windows and such
Windows 7 introduces several new keyboard shortcuts for window management. Some useful ones are:
  • [Windows Shift Left Arrow] or [Windows Shift Right Arrow] to move windows from one computer monitor to another.
  • [Windows Left Arrow] or [Windows Right Arrow] to dock windows to the left or right side
  • [Windows Up Arrow] to maximize a window
  • [Windows Down Arrow] to restore or minimize windows
  • [Windows Home] to minimize all windows but the active one
5. Shortcuts to start pinned taskbar items
Pressing [Win Number] will start a new instance of a pinned taskbar item. You should also note that the items can be dragged and dropped into different positions easily.

For technical contact:-
Nike
support@leniotech.com or visit us at http://www.leniotech.com/

How To Turn On Windows Games

  1. Click the Start button Picture of the Start button, click Control Panel, click Programs, click Programs and Features, and then click Turn Windows features on or off. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. Select the Games check box, and then click OK

Media Contact:-
Susheel Dhatwalia
info@leniotech.com or visit us at http://www.leniotech.com/

Restrict Usage Of USB Removable Disks

Portable USB flash drives are indeed very handy, but they can also be used to upload malicious code to your computer either deliberately or by accident or to copy confidential information from your computer and take it away. In that case if you want to restrict usb removable disk access than do the following:

To block your computer's ability to use USB Removable Disks follow these steps:
  1. Open Registry Editor.
  2. In Registry Editor, navigate to the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR
  1. Locate the following value (DWORD):
Start and give it a value of 4. Note: As always, before making changes to your registry you should always make sure you have a valid backup. In cases where you're supposed to delete or modify keys or values from the registry it is possible to first export that key or value(s) to a .REG file before performing the changes.
  1. Close Registry Editor. You do not need to reboot the computer for changes to apply.

Enable usage of USB Removable Disks

To return to the default configuration and enable your computer's ability to use USB Removable Disks follow these steps:
  1. Go to the registry path found above.
  1. Locate the following value:
Start and give it a value of 3. You can download a .REG file that configure this setting right HERE (1kb).

For technical contact:-
Nike
support@leniotech.com or visit us at http://www.leniotech.com/

Tuesday, August 9, 2011

Ways To Improve Display Quality


The visual appearance of your computer's display can be influenced by several factors. The monitor you use and its settings, how Windows is configured, and how you use your computer can all have an effect on display quality.
To ensure your monitor is calibrated correctly, refer to the instructions that came with your monitor. To learn how to configure Windows display settings, see Getting the best display on your monitor.
Trying to run too many programs at the same time can cause display problems such as jittery or choppy video. If you notice erratic or reduced visual performance on your computer, try one or more of the actions described below.
 Getting the best display on your monitor

Windows chooses the best display settings, including screen resolution, refresh rate, and color, based on your monitor. These settings differ depending on whether you have an LCD or a CRT monitor. If you want to adjust your display settings or, if these settings were changed and you want to restore default settings, use the following recommendations.
For both type of monitors, it's typical that the higher the dots per inch (DPI), the better the fonts will look. For more information, see Make the text on your screen larger or smaller.

Picture of the difference between high DPI and low DPIThe difference between high DPI and low DPI

The best display for an LCD monitor

If you have an LCD monitor, check your screen resolution, which helps to determine the clarity of on-screen images and objects. It's a good practice to set LCD monitors to the native resolution—the resolution a monitor was designed to display best, based on its size. The monitor manufacturer or reseller should be able to provide the native resolution. If you can't get this information, you can try setting the monitor to the highest available resolution, which is usually the native resolution. See Change screen resolution.

Picture of the Display Settings menuIf you don't know what your monitor's native resolution is, set it to the highest possible resolution
LCD monitors can technically support lower resolutions than their native resolution, but the image might be small, centered on the screen, and edged with black; or the image will look stretched.

Correct monitor flicker

Another consideration in getting the best possible display from your monitor is the screen refresh rate. If the refresh rate is too low, the monitor can flicker, which can cause eye strain and headaches. You should select a refresh rate of at least 75 Hertz. For more information about reducing or eliminating flicker, see Correct monitor flicker (refresh rate).

Picture of the screen refresh rateMake sure the screen refresh rate is high enough to prevent monitor flicker

Set the color for an LCD monitor

LCD monitors display vivid color. To get the best color display from your monitor, make sure the color is set to at least 32 bit.
  1. Open Display Settings by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Appearance and Personalization, clicking Personalization, and then clicking Display Settings.
  2. Under Colors, select Highest (32 bit), and then click OK.

The best display for a CRT monitor

For a CRT monitor, it's important to change the screen resolution to the highest resolution available that gives 32-bit color and at least a 72-Hertz refresh rate. For more information, see Change screen resolution. If the screen is flickering, or viewing the screen is uncomfortable, increase the refresh rate until you are comfortable with it. For more information, see Correct monitor flicker (refresh rate).

Resolution based on monitor size

Monitor size
Recommended resolution
15-inch monitor
1024 × 768
17- to 19-inch monitor
1280 × 1024
20-inch and larger monitor
1600 × 1200
Set the color for a CRT monitor
Windows colors and themes work best when you have your monitor set to 32-bit color. You can set your monitor to 24-bit color, but you won't see all the visual effects. If you set your monitor to 16-bit color, images that should be smooth might not appear correctly.

Set the color for a CRT monitor

  1. Open Display Settings by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Appearance and Personalization, clicking Personalization, and then clicking Display Settings.
  2. Under Colors, select Highest (32 bit), and then click OK. (If you can't select 32 bit, check that your resolution is as high as possible, and then try again.)
Media Contact:-
Susheel Dhatwalia
info@leniotech.com or visit us at http://www.leniotech.com/