Friday, July 17, 2009

Test MSN Messenger 8 / Windows Live Messenger

As mentioned in the article "MSN Messenger 8 beta, a new version of MSN Messenger is currently in development. However, it should be soon but say MSN Messenger Windows Live Messenger.

MSN Messenger 8 will join the Live range of Microsoft software. In any event announced on this site http://ideas.live.com/. It is for this reason that the software should take the name of Windows Live Messenger.

Some new additions are announced: more than winks and emotions, the video, calls to fixed or mobile phones with Windows Live Call, a function of shared folders. In short, it looks forward to the 8 MSN Messenger / Windows Live Messenger.

You will find some information about MSN Messenger 8 / Windows Live Messenger on the MSN Backstage.

It is also possible to test the next version of MSN Messenger even if it is only a beta version: Want to test Windows Live Messenger?.

Finally, the site Troubleshoot Your PC has made a test MSN Messenger 8: MSN Messenger 8: first contact. However, we can see that the test should not be the last because it is MSN Messenger 8 BETA and not Windows Live Messenger.

Some beta testers have already access to version 8.0 of MSN Messenger. Currently, little information is available on future features of MSN Messenger 8.0. At most, we know it will bear the contacts from Yahoo Messenger.

Among rumors of MSN Messenger 8.0 beta, there's talk:

* Management of skins (themes) to modify the
* Full integration of Windows Media Player
* Better management of the download (more details and Pause)
* Further integration of MSN Spaces (creation of blogs) and Hotmail
* Functionality localization
* A greater integration with Windows XP / Windows Vista
* The display of top 10 MSN Music Radio
* Support for animated images person
* The use of MSN Messenger on a mobile phone
* A rating of personal images

At the moment, it is difficile what will really part of the final version of MSN Messenger 8.0.

A beta version of MSN Messenger 8 should be available by the end of the year. As for the final version of MSN 8.0, it will have to wait until 2006.

Tuesday, July 14, 2009

Call via Internet

Call via Internet, it's all still new. And what can you do exactly that and what does it me? On these questions I will answer.

Call via Internet
This is also called VOIP, it stands for Voice Over IP. This is a way to a digital voice on an IP network to transmit. A home is such an IP network, but also the Internet. Call via the Internet is cheaper than calling a normal telephone network. Sometimes even free calls, for some companies, this is one reason for their telecom infrastructure to build. For home users, there are interesting possibilities. You can also 'voip' from your own computer with internet connection or your normal phone. In the latter case you should conclude a contract with a VOIP provider.

Call a normal phone
To call a regular phone through the internet you have to go into the sea with a provider of Internet telephony, or VoDSL (Voice over DSL). Some businesses that have Internet subscriptions on offer are:

* Tiscali
* UPC
* Multikabel
* @ Home

At this moment it is not possible to call via the Internet regardless of an Internet purchase. Well try this for the consumers to get to providers.

If you use a regular phone using internet you can connect directly to your modem. So you have no computer. Some advantages and disadvantages in a row.

Benefits
* Reliable as a fixed part of your internet connection for telefoonie reserved.
* Relatively easy to install
* No computer necessary

Disadvantages
* Call through a VOIP provider is cheaper than normal calls, but not free.

Calling from a computer
The call from computer to computer is free. By far the most popular program to make calls via the Internet is Skype. You will not call a number but a name. You can own username (nich name) call.

A prerequisite for using the Internet from computer to computer is to provide computer software (Skype) have been inverted tall. Furthermore you will need:

* A fast internet connection (cable or ADSL compliant)
* A sound card and speakertjes
* A microphone (or boxjes and microphone in one headset)


It is also possible from your computer to make real phone at home and abroad to call. The creators of Skype have this' SkypeOut 'mind. You paid for the call via the Internet a reduced rate. Some pros and cons in a nutshell:

Benefits
* Inexpensive. Computer-to-computer calls are free, where you are calling.
* Talk to real numbers as possible at low cost. (SkypeOut)

Disadvantages
* Slightly less reliable, because in internet and telephone line are the same.
* Software, computer and peripheral equipment required.

Thursday, July 9, 2009

Trojan removal steps

Trojan horses can sometimes be easy to remove spyware using Remove Programs. These programs can identify the horse's name or act. This should be your first step before it more difficult for removal procedures.

Step 1: determine the Trojan

If you know you have a horse to start Step 2. Before you begin to remove Trojans, you must be able to identify malicious software. Fortunately, your computer will already give you a clear indication that you have a Trojan horse virus. When you have a computer Trojan horse is usually a mistake to send you information, do not occur in the normal course of an application. This error is known as DLL errors. The process of the DLL is linked to a specific horse. Therefore, if you can identify the DLL, you can identify the horse. There is a net tons, this will help you determine the process DLL. Copy and paste the error so long as the DLL error as one of the sites www.processlibrary.com. And then give you all the information you it is a malicious software, or the normal process. If it has a Trojan horse which will give you the name of exe file.

Step 2: Show hidden files

Hidden files can be manually clear the Trojan horse is impossible. Usually need to find hidden content, digging your computer for malicious software. The best anti-spyware programs can search your hidden files automatically. You'll need to need to take several steps to show all hidden files and folders.

In XP

1. Close all programs
2. Click on My Computer icon.
3. Select Tools menu and click Folder Options.
4. Choose to view the new tab window.
5. Examination revealed the contents of system folders.
6. In the hidden files and folders, select Show hidden files and folders.
7. Unhide file extensions for known file types and Hide protected operating system files.
8. Click the Apply button and restart

In Vista

1. Close all programs so that you on your desktop.
2. Click the Start button.
3. Click Control Panel.
4. In Control Panel, click Appearance and Personalization.
5. Click Show hidden files or folders.
6. In the hidden files and folders section select Show hidden files and folders.
7. Unhide extensions for known file types and Hide protected operating system files.
8. Click the Apply button and restart.

Step 3: stop the Trojan process

And then try to remove the Trojan horse on your system, the first step is to load your personal computer into Safe Mode and stop all processes related to Trojan.

1. In Safe Mode, open the Task Manager by pressing Ctrl - Alt - Delete key.
2. Click to highlight the process of it.
3.Click the end of the process of


Step 4: Edit the registry

In order to completely delete the Trojan from your system, you need to delete the registry entries. In this way, will not be able to re-install itself. The Trojan horse is a "procedure" of the process, so you can find the interpretation of the RUN registry folder. The registry key: HKEY_LOCAL_MACHINE "software" Microsoft "Windows" CurrentVersion> "run
This action will help you eliminate and opportunities, it re-install itself. As follows:

1. Click Start
2. Click Run
3. Type regedit
4. Find this registry key:

HKEY_LOCAL_MACHINE /Software /Microsoft /In Windows /CurrentVersion /Run /

5. In the right part of this process click. Such as the Trojan horse "rusvdgpo". Delete all the EXE and DLL with the horse's name.
6. To delete the value.

Step 5: Check your start-ups

1. Open the Start menu.
2. Click Run
3. At the command screen type "Msconfig.exe in"
4. In the "System Configuration Utility", click "start" tab
5. To cancel any course, is linked to the Trojans.
6. Click "OK"
7. Restart

Monday, June 29, 2009

Message: Invalid boot ini error

Regularly come in for various people, the message: invalid boot.ini. What does this now and what can be done? The boot.ini file is a startup that makes allocations for the start-up and therefore is essential in Windows XP. How to solve this please read below.

Error Message "Invalid Boot.ini" or "Windows could not start" in the boot

When you start your computer after you have upgraded to Microsoft Windows XP, is one of the following error messages (or both) is displayed:
Invalid Boot.ini
Windows could not start because the following file is missing or corrupt: WindowsSystem32Hal.dll
Causes
This problem may occur if the Boot.ini file is missing, damaged or contains incorrect entries.
Solution
To resolve this issue by the computer to boot from the CD-ROM Windows XP, the Recovery Console to start and then the Boot.ini file again to make the tool
Bootcfg.exe.

To do this, follow these steps:

1. Configure your computer so that it can be booted from the CD-ROM or DVD-ROM drive. For more information, see your computer documentation or contact the manufacturer of your computer.

2. Insert the CD-ROM Windows XP in the CD-ROM or DVD-ROM drive and restart the computer.

3. Press any key to restart the computer to boot from the CD-ROM with Windows XP when the message "Press any key as the computer from a CD-ROM to boot" is displayed.

4. In the screen "Welcome to Setup" press R to start the Recovery Console.

5. Select the installation that you want to access from the Recovery Console on the computer can be selected from two or more operating systems on startup.

6. Request, type the administrator password and press ENTER.

7. Type bootcfg / list to the MS-DOS prompt and press ENTER. The entries in the current Boot.ini file appear.

8. Type bootcfg / rebuild at the MS-DOS prompt and press ENTER. With this command, the hard disk of the computer searched for installations of Windows XP, Microsoft Windows 2000 and Microsoft Windows NT, and the results are displayed. Follow the instructions on the screen to the Windows installations to the Boot.ini file to add. Here's how an installation of Windows XP can be added to the Boot.ini file:
a. If a message similar to the following, press Y:
Total Identified Windows Installs: 1
C: Windows. Installation to boot list? (Yes / No / All)

b. There is a message to the following:
Enter the identification at startup
This is the name of the operating system. Type this message in the name of the operating system and press ENTER. You type here Microsoft Windows XP Professional or Microsoft Windows XP Home Edition.

c. There is a message to the following:
Give the option for booting the operating system
Type in this message / fastdetect, and then press ENTER.

Monday, June 22, 2009

Select CPU fingertips

Usually most everyone is just buy a processor with the greatest speed is can meet the need. However this is not really true, when you buy a CPU with a high speed, can be high time to choose, but think the CPU has high speed so the savings will not need to buy RAM with the volume. It is not for the benefit of the optimization system.

In time the computer are the exchange of memory, a CPU with high speed will waste a lot of time in the waiting idle this. Period usually occur continuously so that the performance system is not high.

Therefore we make the definition of clear criteria for choosing the right CPU for your computer. This guide will help you choose the set of processor best suited for your system.

Criteria for system

Each system has its own purpose by it. You must make clear the purpose of use for your computer. For example, if the computer is used as a resource family is shared and surfing the web should not choose the computer configuration, such as high gaming machine. To consider all the objectives for the system before choosing CPU. That makes you a savings account may not need to buy the set of processors have speed too high. It also means you can use that amount for other purposes, such as buying a hard drive with larger capacity for example.

Considering the model in use

Most instructions say about choosing via CPU-based applications will use, but we believe that the model used is more important than the own applications. For example, you can see very clearly with a system used for office tasks will not need a high speed CPU. But conversely, with a number of images to the other, they really need a set of processors is very high.

In working days, a staff may open a browser window, editor window word, some Acrobat files are used for reference purposes and also while the slideshow is created by PowerPoint.

Some people collect some photos for the family photo albums, can conducting work such as get photos from camera, then upload them onto a website.

What model do you think it should require strict?

Note that the form used will change. Would be very difficult to predict accurately the performance of the form you will change how, and therefore you should not buy a CPU expensive to serve the application requirements strict.

Wednesday, June 17, 2009

UAC control in Windows 7

User Access Control should be the controversialists feature from Windows Vista. After moan and ignorance of users is Microsoft UAC system customize Windows 7.

"We have clearly received the message that you are frustrated. You find the UAC requests to frequent, annoying and confusing." Road system is not because, as emphasized the Windows team, User Access Control is more secure Windows yet.

In summary UAC ensures that whenever a system component of a program like Windows, the user must give his permission for this. When he became administrator of the computer, a simple press an OK button. In another case, the user an administrator password.

Initially UAC indeed caused much frustration. Many programs are unnecessary use Windows system - a deluge of UAC pop-ups delivered. In addition, many Windows components, other major components call and request a window trigger. Sometimes the ridiculous, if you, for example under some circumstances a piece of text to copy and paste.

But there is one major problem: most home users remain logged in as administrator and have developed a culture of just the UAC window away. The actual reading is almost nobody. A Microsoft research show that only thirteen percent of respondents could recall anything specific about the UAC windows that they have seen.

It is concerned that large numbers of users because of the requests as usual animals react instead of critical applications to read and correct decisions. In addition, the real power users to simply disable UAC system. Conclusion: the UAC system misses many (home) users purpose.

Therefore UAC in Windows 7 be adjusted, that the Windows team is concentrating on four areas. It should avoid unnecessary UAC windows deleted, so users can only be confronted with important warnings. Microsoft wants to consult with the developers of programs for most UAC heist worry.

For the power user, a more layered system, which should convince him to not fully UAC off. If an experienced user can specify in which cases User Access Control him to trouble.

Thursday, June 4, 2009

What is new in Windows 7

Microsoft has finally made official the release date of Windows 7 scheduled for Thursday 22 October. This confirms the rumors that circulated for several months with a launch at the end of the year and not 2010 as the Redmond company argued there is little time.

We know how the launch and success hoped for, this new OS is crucial for Microsoft. The Redmond company has to make us forget the disappointment caused by Vista, while turning the page to Windows XP endless play of overtime, including through the market for "low cost".

Migration program free to Windows 7

Precisely, Microsoft has already announced that Windows 7, unlike Vista, will be available for Ultraportables cheaply via a so-called Starter Edition. A strategic choice much at a time when a new major player, Android could come play spoilsport on the market if the carrier netBook and their little brothers, nettops.

Regarding desktops and laptops more conventional, the publisher has confirmed that a program of free migration to Windows 7 was scheduled for customers who purchased a machine with Vista, without giving further details.

Windows 7 features

> System Tray: In Windows 7, you have complete control over your system tray. You can remove, change, and even move around the different applications that reside there.

> DirectX is extended to 2D, animation and “fine-looking” text.

> Remote Desktop supports multiple monitors. Easier access to VPNs

> Windows 7 has a reduced memory footprint and they’ve reduced the disk I/O reads “substantially.” In the demo, a 1 Ghz/1 GB RAM netbook had 500 MB RAM available after boot.

> Overall, the system is faster. The taskbar responds almost instantaneously. The boot time is also faster.

> You can use BitLocker to encrypt a USB memory stick.

> Better power management in Windows 7 means longer battery life for notebooks and netbooks.

> You can both create and boot natively from a Windows 7 VHD.

> Touch support: On touch-enabled devices, you can interact with the OS via touch, gestures, flicks, etc. Windows 7 supports multi-touch. There’s also around 25% more space between items in the context menus to allow easier control when touching.

Friday, May 29, 2009

24x7 TECHNICAL SUPPORT

24x7 Technical support means that service provided Computer technical help and support in any time in a day. It is possible through connect your computer online. 24x7 technical
service provider diagnose and solve computer problems with tacking remote session Online and trouble shoot your Computer problem right in front of your eyes. Getting your
computer tech support online is very easy. For getting the online computer technical support you would have to visit and register into the service provider web site. They gives
you a time duration subscription. The subscription could be six month or one year, it is depend on your requirement.

At this point it 24x7 computer tech support can help fix your computer problem with phone tech support or using our specialized screen sharing software. Online computer
technician will suggest how long it will take to fix your computer problem as quickly and efficiently as possible. Mostly computer problems can be fixed in under an hour, in
fact some problems may take as little as 5 minutes to solve. Once you subscribe an account for getting computer technical help, you are ready to getting tech support. Through
Their website a technician can connect to your computer, then you grant them access to view your screen and take control of your keyboard and mouse. Sit back, watch and learn
as technician fix your problem for you right in front of your eyes! Its a great learning experience, its simple and fast.

Honesty is and always has been the best policy of this kind of online tech support. Their technicians priority is to provide you with computer tech support and fix your computer fast and efficiently; While ensuring customer satisfaction. We want to provide computer tech support to as many customers as possible quickly because They know your minutes are valuable. All of Their technicians who provide computer tech support are designated and highly qualified. Qualifications include Microsoft Certified Systems Engineer, CCNA Cisco Certified, and more. Technicians getting constant training so they can continue to improve their expertise for providing you with experienced computer help and technical service. When Online support provides you with computer tech support, They provide you service in the comfort of your own home. They enable you to maintain your privacy and still get that personal one to one service without letting a stranger in your home. Unplugging wires and driving to the service center to fix your computer will become a thing of the past once you sign up for our computer tech support plans. Live Tech Online makes fixing your computer easy.

Thursday, May 14, 2009

iYogi Acquires Clean Machine Inc.

Larry Gordon, Founder of Clean Machine appointed as President Global Channel Sales at iYogi


New York, NY, May 11th, 2009 : iYogi, a global direct to consumer and small business remote technical support provider, today announced it’s acquisition of Clean Machine Inc, a provider of remotely administered PC security and performance management services. Clean Machine will operate as a separate brand under the iYogi services umbrella along with the recently lunched Support Dock (www.supportdock.com) and its comprehensive range of 24/7 technical support services for computers, printers, MP3 players, digital camera, routers, servers and more than 100 software applications. Larry Gordon, Founder of Clean Machine is appointed as the President of Global Channel Sales for iYogi.

computer repair,help and support

iYogi will integrate technology and innovation that Clean Machine Inc. has developed for delivering an enhanced service experience by proactively managing the health and security for PC's and Apple Computers. This acquisition also broadens iYogi's access to key markets through Clean Machine's existing partnerships. Larry Gordon's past experience and successful track record will accelerate iYogi's expansion through his focus on global alliances.
Commenting on the acquisition of Clean Machine Inc., Uday Challu, CEO & Co-founder of iYogi, said,

"This acquisition will help iYogi to enhance our customer experience and extend our market reach to the millions of consumers that are challenged by the increasingly complex technology environment. Clean Machine's proactive maintenance and management of PCs in home and small business environment will be our launch platform for building the next generation of managed services for consumers."

"We are delighted to have Larry spearheading partnerships and global alliances for iYogi. His incredible experience in marketing, sales and building global alliances will help forge partnerships with retailers, multiple service operators, software publishers, original equipment manufacturers (OEM) and other such companies that are at the frontlines for managing tech support issues for consumers and small businesses",
added Challu.


With more than 20 years of experience, Larry Gordon has played a variety of strategic roles in marketing, sales and building alliances. Larry was the Executive Vice President at Capgemini and Kanbay. He was also VP of Global Marketing for Cognizant (Nasdaq: CTSH), a leader in global IT services and Director of Marketing for New York based Information Builders.

"I am excited to join a company that shares a common mission to Clean Machine in creating a global brand for delivering the best technical support to consumers and small businesses. We also share a common approach of utilizing highly skilled talent with leading edge tools, thereby delivering services at incredible price-points, with high margins for our partners",
said Larry Gordon, the newly appointed President of Global Channel Sales at iYogi.

ABOUT IYOGI


Headquartered in Gurgaon, India with offices in New York, USA, iYogi provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. IYogi's 24/7 phone and remote technical assistance, spans across a comprehensive range of technologies we use every day from a wide range of vendors. Utilizing its proprietary technology iMantra , and highly qualified technicians, iYogi delivers amongst the highest benchmarks for resolution and customer satisfaction. iYogi is privately held and funded by SAP Ventures, Canaan Partners, and SVB India Capital Partners. iYogi was recently awarded the Red Herring Global 100 Award, recognizing it as one of the 100 most innovative private companies driving the future of technology. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.net.

ABOUT CLEAN MACHINE


Clean Machine Inc. is a NJ-based and incorporated company that helps consumers and small business owners easily manage and protect their computing environments safely and cost effectively. The company is has a unique, powerful and inexpensive PC concierge service. Specifically, each customer is assigned a highly-trained tech concierge who remotely examines their computer system on a scheduled and very secure basis. The PC concierge will immediately fix software-based problems and prevent new threats to the customer's computing environment including offensive pop-ups, browser redirects and slow performance, and then provides a detailed report. Clean Machine's proprietary Radar(TM) technology (Remote Access Detection Audit and Repair) allows its expert technicians to remotely resolve any problems, eliminating the need for customers to go through the frustrating process of speaking with a tech support expert, and still having to do the work themselves. In other words, the Clean Machine PC concierges do it all. For more information on Clean Machine please visit www.pccleanmachine.com.