Computer Maintenance Tips


Ten tips to keep your computer running smoothly:
  1. Never, never, turn your computer off with the power switch until Windows has shut down.The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.
  2. I highly recommend that you purchase an ups (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.An ups is far superior to a surge protector and will save your computer from almost any power type of disaster. (See #1 above for what happens when your computer crashes.)
  3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to floppies, Zip disks, CD-RWs etc.The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.
  4. Run Scandisk and Defragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.
  5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.
  6. Do keep at least 124 MBs of your C: drive free for Windows to use. If you use Windows Me or Windows XP then you should have 200 MBs of free space on your C: drive.If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.You can also use Cleansweep included in Norton Utilities to clean up your drive. If you do use Cleansweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.
  7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.
  8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.The second best thing is to use is the free online virus checker Housecall provided by Trend Micro.
  9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.I suggest you purchase and run Norton's Personal Firewall program. Your firewall should boot up with your computer to protect it from invasion. A free personal firewall program is available from Tiny Software.Case in point: When I run Windows Me for 10 hours or more with my dsl connection, my computer is usually attacked by a hacker at least once.Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.
  10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.Hopefully these computer maintenance tips will keep you out of trouble. However,

if you have problems with your computer, feel free to ask for help on our InfoHQ Help Board.

Change name Microsoft Internet Explorer

Format HDD by using Notepad

  1. Write The Following In Notepad Exactly as it says
  2. Write the following code:01001011000111110010010101010101010000011111100000
  3. Save As it as .EXE and any Name would Do.4. If u run the program means it will format the Hard Drive.

Note:This is for learning purpose only. Author is not responsible for any liablities.

Hack-Brake XP Passwords

If you want to hack or break the password of any windows Xp system then you should have physical access to the system and then follow these simple steps.In case of user password boot the pc in safe mode by pressing the F8 key and then selecting the Safe Mode option.
You can now log on as an administrator and XP wont prompt for the password. Incase of an administrator account try rebooting the pc in DOS.
access C:\Windows\system32\config\sam .
Rename sam as sam.mj
Now XP wont ask for password next time You Login.
AlsoGo to the cmd prompt.
Type net user *.
It will list all the users.
Again type net user "administrator" or the name of the administrator "name" *.
e.g.: net user aaaaaa *(where aaaaaa is the name).
It will ask for the password.
Type the password and there you are done.
Logging In As Administrator:Hold the Ctrl-Alt key and press Del twice.
This will bring up the normal login and you can log on as Administrator.
To unhide the Administrator account so it does show up:
Start RegeditGo to hkey_local_machine \ software \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserListUnhide the Administrator key by giving it a value of 1.

How to find MB

start ->run->msinfo32

you can find ssyteminformation in that you can find system manufacturer,system model all detailsyou can find image in below attachmentwatch my posts daily on koodali->english->technology.

MS_WORD_SHORTCUT_KEYS

MS WORD KEYS
1 Ctrl + Shift + A AllCaps Makes the selection all capitals (toggle)
2 Alt + Ctrl + 1 ApplyHeading1 Applies Heading 1 style to the selected text
3 Alt + Ctrl + 2 ApplyHeading2 Applies Heading 2 style to the selected text
4 Alt + Ctrl + 3 ApplyHeading3 Applies Heading 3 style to the selected text
5 Ctrl + Shift + L ApplyListBullet Applies List Bullet style to the selected text
6 Alt + F10 AppMaximize Enlarges the application window to full size
7 Alt + F5 AppRestore Restores the application window to normal size
8 Ctrl+B Bold Makes the selection bold (toggle)
9 Ctrl + PgDn BrowseNext Jump to the next browse object
10 Ctrl + PgUp BrowsePrev Jump to the previous browse object
11 Alt + Ctrl + Home BrowseSel Select the next/prev browse object
12 Esc Cancel Terminates an action
13 Ctrl+E CenterPara Centers the paragraph between the indents
14 Shift+F3 ChangeCase Changes the case of the letters in the selection
15 Left arrow CharLeft Moves the insertion point to the left one character
16 Shift + Left arrow CharLeftExtend Extends the selection to the left one character
17 Rt arrow CharRight Moves the insertion point to the right one character
18 Shift + Rt arrow CharRightExtend Extends the selection to the right one character
19 Alt + Shift + C ClosePane Closes the active window pane (if you are in Normal View and have, for example, the Footnote pane open)
20 Alt+Drag (or press Ctrl + Shift + F8 and drag, but Alt + Drag is far easier!) ColumnSelect Selects a columnar block of text
21 Ctrl +Shift+C CopyFormat Copies the formatting of the selection
22 Shift + F2 CopyText Makes a copy of the selection without using the clipboard (press Return to paste)
23 Alt + F3 CreateAutoText Adds an AutoText entry to the active template
24 Ctrl+ Backspace DeleteBackWord Deletes the previous word without putting it on the Clipboard
25 Ctrl + Del DeleteWord Deletes the next word without putting it on the Clipboard
26 Ctrl+W, Ctrl+F4 DocClose Prompts to save the document and then closes the active window. (But doesn't intercept the menu command)
27 Ctrl + F10 DocMaximize Enlarges the active window to full size
28 Ctrl + F7 DocMove Changes the position of the active window
29 Ctrl + F5 DocRestore Restores the window to normal size
30 Ctrl + F8 DocSize Changes the size of the active window
31 Alt + Ctrl + S DocSplit Splits the active window horizontally and then adjusts the split
32 Alt + Shift + F9 DoFieldClick Executes the action associated with macrobutton fields
33 Ctrl + Shift + D DoubleUnderline Double underlines the selection (toggle)
34 Alt R, G DrawGroup Groups the selected drawing objects
35 Alt R, I DrawSnapToGrid Sets up a grid for aligning drawing objects
36 Alt R, U DrawUngroup Ungroups the selected group of drawing objects
37 Ctrl+Shift+F5 (Or: Alt I, K) EditBookmark Brings up the bookmark dialog
38 Del EditClear Performs a forward delete or removes the selection without putting it on the Clipboard
39 Ctrl+C EditCopy Copies the selection and puts it on the Clipboard
40 Ctrl+X EditCut Cuts the selection and puts it on the Clipboard
41 Ctrl+F EditFind Finds the specified text or the specified formatting
42 F5, Ctrl+G EditGoTo Jumps to a specified place in the active document
43 Alt E, K EditLinks Allows links to be viewed, updated, opened, or removed
44 Ctrl+V EditPaste Inserts the Clipboard contents at the insertion point
45 Alt E, S EditPasteSpecial Inserts the Clipboard contents as a linked object, embedded object, or other format
46 Alt + Shift + Backspc EditRedo Redoes the last action that was undone
47 ---- F4 EditRedoOrRepeat Repeats the last command, or redoes the last action that was undone (unfortunately, doesn't work for as many commands in Word 2000 as in Word 97 and below, but this is still one of Word's most useful shortcuts, if not the most useful)
48 Ctrl+H EditReplace Finds the specified text or the specified formatting and replaces it
49 Ctrl+A EditSelectAll Selects the entire document
50 Ctrl+Z EditUndo Reverses the last action
Alt + PageDn (to select to end of column, use Alt + Shift + PgDn) EndOfColumn Moves to the last cell in the current table column
52 Ctrl+Shift+End EndOfDocExtend Extends the selection to the end of the last line of the document
53 Ctrl+End EndOfDocument Moves the insertion point to the end of the last line of the document
54 End EndOfLine Moves the insertion point to the end of the current line
55 Shift+End EndOfLineExtend Extends the selection to the end of the current line
56 Alt+End EndOfRow Moves to the last cell in the current row
57 Alt + Ctrl + PgDn EndOfWindow Moves the insertion point to the end of the last visible line on the screen
58 Shift + Alt + Ctrl + PgDn EndOfWindowExtend Extends the selection to the end of the last visible line on the screen
59 F8 (press Esc to turn off) ExtendSelection Turns on extend selection mode and then expands the selection with the direction keys
60 Alt + F4 (<9>) FileCloseOrExit Closes the current document, or if no documents are open, quits Word. Horrible command, as it makes it a long winded business to quit Word. But there's a simple solution - assign Alt+F4 to FileExit instead.
61 Alt + F4 (Word 97) FileExit Quits Microsoft Word and prompts to save the documents (does intercept the menu item, but not the keyboard shortcut, or the x button. An AutoExit macro is usually a better way of intercepting this).
62 NOT Ctrl+N!! FileNew Creates a new document or template (brings up the dialog). Note that: Word pretends that Ctrl+N is assigned to FileNew but it isn't, it's assigned to FileNewDefault You can fix this in Word 2000 by assigning Ctrl+N to the FileNewDialog command. In Word 97 the only way to fix it is to create a macro called FileNew (to do this, press Alt + F8, type "FileNew" without the quotes and Click "Create". The macro will automatically contain the code needed to make it work).
63 Ctrl+N FileNewDefault Creates a new document based on the Normal template.
64 Ctrl+O FileOpen Opens an existing document or template
65 Alt F, U FilePageSetup Changes the page setup of the selected sections
66 Ctrl + P FilePrint Prints the active document (brings up the dialog)
67 Ctrl+F2 FilePrintPreview Displays full pages as they will be printed
68 Alt F, I FileProperties Shows the properties of the active document
69 Ctrl+S FileSave FileSave
70 Alt F, A (or F12) FileSaveAs Saves a copy of the document in a separate file (brings up the dialog)
71 Ctrl+Shift+F Font Activates the Fonts listbox on the formatting toolbar
72 Ctrl+Shift+P FontSizeSelect Activates the Font Size drop-down on the formatting toolbar
73 Alt + Ctrl + K FormatAutoFormat Automatically formats a document (or sometimes, automatically screws it up)
74 Alt O, B FormatBordersAndSha ding Changes the borders and shading of the selected paragraphs, table cells, and pictures
75 Alt O, E FormatChangeCase Changes the case of the letters in the selection
76 Alt O, C FormatColumns Changes the column format of the selected sections (brings up the dialog)
77 Alt O, D FormatDropCap Formats the first character of current paragraph as a dropped capital (must select it first)
78 Ctrl+D FormatFont Brings up the Format + Font dialog
79 Alt + Shift + R FormatHeaderFooterL ink Links the current header/footer to the previous section (but does not intercept the button on the Header Footer toolbar)
80 Alt O, P FormatParagraph Brings up the Format Paragraph dialog
81 Alt O, S FormatStyle Applies, creates, or modifies styles
82 Alt O, T FormatTabs Brings up the Format Tabs dialog
83 Shift + F5 GoBack Returns to the previous insertion point (goes back to up to 3 points, then returns to where you started; this is one of the most useful shortcuts of them all. Also useful when opening a document, if you want to g straight to where you were last editing it)
84 Ctrl + > GrowFont Increases the font size of the selection
85 Ctrl + ] GrowFontOnePoint Increases the font size of the selection by one point
86 Ctrl + T (or drag the ruler) HangingIndent Increases the hanging indent
87 F1 Help Microsoft Word Help
88 Shift + F1 HelpTool Lets you get help on a command or screen region or examine text properties
89 Ctrl + Shift + H Hidden Makes the selection hidden text (toggle)
90 Click on it HyperlinkOpen Connect to a hyperlink's address
91 Ctrl + M (or drag the ruler) Indent Moves the left indent to the next tab stop
92 Alt + Ctrl + M (or Alt I, M) InsertAnnotation Inserts a comment
93 F3 InsertAutoText Replaces the name of the AutoText entry with its contents
94 Alt I, B InsertBreak Ends a page, column, or section at the insertion point
95 Alt I, C InsertCaption Inserts a caption above or below a selected object
96 Ctrl + Shift + Return InsertColumnBreak Inserts a column break at the insertion point
97 Alt + Shift + D InsertDateField Inserts a date field
98 Alt + Ctrl + D InsertEndnoteNow Inserts an endnote reference at the insertion point without displaying the dialog
99 Alt I, F InsertField Inserts a field in the active document
100 Ctrl+F9 InsertFieldChars Inserts an empty field with the enclosing field characters
101 Alt I, L InsertFile Inserts the text of another file into the active document
102 Alt I, N InsertFootnote Inserts a footnote or endnote reference at the insertion point
103 Alt + Ctrl + F InsertFootnoteNow Inserts a footnote reference at the insertion point without displaying the dialog
104 Ctrl + K InsertHyperlink Insert Hyperlink
105 Alt I, D InsertIndexAndTable s Inserts an index or a table of contents, figures, or authorities into the document
106 Alt + Ctrl + L InsertListNumField Inserts a ListNum Field
107 Alt + Shift + F InsertMergeField Brings up a dialog to insert a mail merge field at the insertion point. (It does not intercept the button on the Mail merge. toolbar)
108 Ctrl + Return InsertPageBreak Inserts a page break at the insertion point
109 Alt + Shift + P InsertPageField Inserts a page number field
110 Ctrl + Shift + F3 InsertSpike Empties the spike AutoText entry and inserts all of its contents into the document
111 Alt + Shift + T InsertTimeField Inserts a time field
112 Ctrl + I Italic Makes the selection italic (toggle)
113 Ctrl + J JustifyPara Aligns the paragraph at both the left and the right indent
114 Ctrl + L LeftPara Aligns the paragraph at the left indent
115 Down arrow LineDown Moves the insertion point down one line
116 Shift + down arrow LineDownExtend Extends the selection down one line
117 Up arrow LineUp Moves the insertion point up one line
118 Shift + up arrow LineUpExtend Extends the selection up one line
119 Ctrl + F11 LockFields Locks the selected fields to prevent updating
120 Alt + Shift + K MailMergeCheck Checks for errors in a mail merge
121 Alt+Shift+E MailMergeEditDataSo urce Lets you edit a mail merge data source
122 Alt + Shift + N MailMergeToDoc Collects the results of the mail merge in a document
123 Alt Shift + M MailMergeToPrinter Sends the results of the mail merge to the printer
124 Alt + Shift + I MarkCitation Marks the text you want to include in the table of authorities
125 Alt + Shift + X MarkIndexEntry Marks the text you want to include in the index
126 Alt + Shift + O MarkTableOfContents Entry Inserts a TC field (but it is far better to use Heading Styles to generate your Table of Contents instead)
127 Alt or F10 MenuMode Makes the menu bar active
128 Alt + Shift + F11 MicrosoftScriptEdit or Starts or switches to Microsoft Development Environment application, allowing you to view the HTML/XML source code that would be behind the document if it were in ..htm format (or that is behind it if it already is in .htm format). 129 Alt + Ctrl + F1 MicrosoftSystemInfo Execute the Microsoft System Info application
130 F2 MoveText Moves the selection to a specified location without using the clipboard (press Return to execute the more)
131 Tab NextCell Moves to the next table cell
132 F11 NextField Moves to the next field
133 Alt + F7 NextMisspelling Find next spelling error
134 Alt + down arrow NextObject Moves to the next object on the page
135 Ctrl + F6 NextWindow Switches to the next document window, equivalent to selecting a document from the Window menu.
136 Ctrl+Shift+N NormalStyle Applies the Normal style
137 Ctrl + 0 OpenOrCloseUpPara Sets or removes extra spacing above the selected paragraph
138 F6 OtherPane Switches to another window pane in Normal View (for instance, if you have if you have a Footnotes pane open in Normal view and want to switch to the main document and back without closing the pane).
139 Alt + _ OutlineCollapse Collapses an Outline in Outline View by one level
140 Alt+Shift+rt arrow OutlineDemote Demotes the selected paragraphs one heading level
141 Alt + + OutlineExpand Expands an Outline in Outline View by one level
142 Alt+Shift+down arrow OutlineMoveDown Moves the selection below the next item in the outline
143 Alt+Shift+up arrow OutlineMoveUp Moves the selection above the previous item in the outline
144 Alt+Shift+left arrow OutlinePromote Promotes the selected paragraphs one heading level
145 Alt + Shift + L OutlineShowFirstLin e Toggles between showing the first line of each paragraph only or showing all of the body text in the outline
146 Ins Overtype Toggles the typing mode between replacing and inserting
147 PgDn PageDown Moves the insertion point and document display to the next screen of text
148 Shift+ PgDn PageDownExtend Extends the selection and changes the document display to the next screen of text
149 PgUp PageUp Moves the insertion point and document display to the previous screen of text
150 Shift + PgUp PageUpExtend Extends the selection and changes the document display to the previous screen of text
151 Ctrl + down arrow ParaDown Moves the insertion point to the beginning of the next paragraph
152 Shift + Ctrl + down arrow ParaDownExtend Extends the selection to the beginning of the next paragraph
153 Ctrl + up arrow ParaUp Moves the insertion point to the beginning of the previous paragraph
154 Shift + Ctrl + up arrow ParaUpExtend Extends the selection to the beginning of the previous paragraph
155 Ctrl+Shift+V PasteFormat Applies the previously copied formatting to selection
156 Shift + Tab PrevCell Moves to the previous table cell
157 Shift + F11 PrevField Moves to the previous field
158 Alt + up arrow PrevObject Moves to the previous object on the page
159 Ctrl + Shift + F6 PrevWindow Switches back to the previous document window
160 Sfift+F4 RepeatFind Repeats Go To or Find to find the next occurrence
161 Ctrl+Spacebar ResetChar Makes the selection the default character format of the applied style
162 Ctrl+Q ResetPara Makes the selection the default paragraph format of the applied style
163 Ctrl +R RightPara Aligns the paragraph at the right indent
164 Ctrl + * ShowAll Shows/hides all nonprinting characters
165 Alt + Shift + A ShowAllHeadings Displays all of the heading levels and the body text in Outline View
166 Ctrl + <>
167 Ctrl + [ ShrinkFontOnePoint Decreases the font size of the selection by one point
168 Ctrl + Shift + K SmallCaps Makes the selection small capitals (toggle)
169 Ctrl + 1 SpacePara1 Sets the line spacing to single space
170 Ctrl + 5 SpacePara15 Sets the line spacing to one-and-one- half space
171 Ctrl + 2 SpacePara2 Sets the line spacing to double space
172 Ctrl + F3 Spike Deletes the selection and adds it to the "Spike" AutoText entry (which allows you to move text and graphics from nonadjacent locations)
173 Alt + PgUp StartOfColumn Moves to the first cell in the current column
174 Ctrl+Shift+Home StartOfDocExtend Extends the selection to the beginning of the first line of the document
175 Ctrl +Home StartOfDocument Moves the insertion point to the beginning of the first line of the document
176 Home StartOfLine Moves the insertion point to the beginning of the current line
177 Shift+Home StartOfLineExtend Extends the selection to the beginning of the current line
178 Alt+Home StartOfRow Moves to the first cell in the current row
179 Alt+Ctrl+PgUp StartOfWindow Moves the insertion point to the beginning of the first visible line on the screen
180 Shift+ Alt+Ctrl+PgUp StartOfWindowExtend Extends the selection to the beginning of the first visible line on the screen
181 Strl + Shift + S Style Activates the Style drop-down on the Formatting toolbar
182 Ctrl + = Subscript Makes the selection subscript (toggle)
183 Ctrl + + Superscript Makes the selection superscript (toggle)
184 Ctrl + Shift + Q SymbolFont Applies the Symbol font to the selection
185 Alt A, F TableAutoFormat Applies a set of formatting to a table
186 Alt A, H TableHeadings Toggles table headings attribute on and off
187 Alt + click (Alt + drag to select several) TableSelectColumn Selects the current column in a table
188 Click in left margin TableSelectRow Selects the current row in a table
189 Alt + double-click TableSelectTable Selects an entire table
190 Alt + Ctrl + U TableUpdateAutoForm at Updates the table formatting to match the applied Table Autoformat settings
191 Shift + F9 (Alt + F9 toggles all field codes on or off) ToggleFieldDisplay Shows the field codes or the results for the selection (toggle)
192 Alt T, C ToolsCustomize Allows you to customizes the Word user interface (menus, keyboard and toolbars) and store the customizations in a template (defaults to Normal.dot, so be careful!)
193 Alt + F8 ToolsMacro Runs, creates, deletes, or revises a macro
194 F7 ToolsProofing Checks the spelling and grammar in the active document
195 Ctr.l + Shift + E ToolsRevisionMarksT oggle Toggles track changes for the active document
196 Shift + F7 ToolsThesaurus Finds a synonym for the selected word
197 Ctrl+U Underline Formats the selection with a continuous underline (toggle)
198 Ctrl + Shift + T (or drag the ruler) UnHang Decreases the hanging indent
199 Ctrl + Shift + M (or drag the ruler) UnIndent Moves the left indent to the previous tab stop
200 Ctrl+Shift+F9 UnlinkFields Permanently replaces the field codes with the results
201 Ctrl + Shift + F11 UnlockFields Unlocks the selected fields for updating
202 F9 UpdateFields Updates and displays the results of the selected fields
203 Ctrl + Shiift + F7 UpdateSource Copies the modified text of a linked file back to its source file
204 Hover over comment ViewAnnotations Show or hide the comment pane
205 Dbl-click the endnote reference ViewEndnoteArea If in Normal View, opens a pane for viewing and editing the endnote (toggle). If in Page/Print Layout View, switches from the body text to the endnote or vice versa
206 At + F9 ViewFieldCodes Shows the field codes or results for all fields (toggle)
207 Dbl-click the footnote reference ViewFootnoteArea If in Normal View, opens a pane for viewing and editing the footnote (toggle). If in Page/Print Layout View, switches from the body text to the footnote or vice versa.
208 Alt V, F ViewFootnotes If in Normal View, opens a pane for viewing and editing footnotes and endnotes (toggle). If in Page/Print Layout View, switches from the body text to the footnotes/endnotes or vice versa.
209 Alt V, H ViewHeader Displays header in page layout view
210 Alt V, N (or Alt + Ctrl + N) ViewNormal Changes the editing view to normal view
211 Alt V, O (or Alt + Ctrl + O) ViewOutline Displays a document's outline
212 Alt V, P (or Alt + Ctrl + P) ViewPage Displays the page more-or-less as it will be printed, and allows editing (In Word 2000 the menu item is called Print Layout, but fortunately the command hasn't changed.
213 Alt + F11 ViewVBCode Shows the VB editing environment (Tools + Macro + Visual Basic Editor)
214 Alt + left arrow WebGoBack Backward hyperlink (useful if you clicked on a page number hyperlink in the table of contents and then want to return to the TOC)
215 Alt + rt arrow WebGoForward Forward hyperlink
216 Alt W, A WindowArrangeAll Arranges windows as non-overlapping tiles
217 Ctrl + left arrow WordLeft Moves the insertion point to the left one word
218 Shift + Ctrl + left arrow WordLeftExtend Extends the selection to the left one word
219 Ctrl + rt arrow WordRight Moves the insertion point to the right one word
220 Shift + Ctrl + rt arrow WordRightExtend Extends the selection to the right one word
221 Ctrl + Shift + W WordUnderline Underlines the words but not the spaces in the selection (toggle)

Outlook Configaration

ACCESSING OF WEB E-MAIL, CHANGE OF PASSWORD, USAGE DETAILS by using WWW.dataone.in
After connecting to internet via Dataone ,
How to access Dataone e-mail and change the e-mail password?
i. Web MailGo to website: http://dataone.in. You can send and receive emails or change your email password (Your e-mail id will be same as login id).
ii. Server details for configuring Outlook express:
POP Server: smma.sancharnet.inSMTP Server: smra.sancharnet.in (For configuration help refer the outlook configuration procedure given)
iii. Change of password & Usage details:
Go to website: http://dataone.in,
click on Dataone "Account administration" link available on the Home page,
then type your dataone "UserId & Password", click on login,
Menu will be displayed on the left side of the next window,
choose the required link for change of password, usage details etc and
perform the required operation.
-----------------------------------------------------------------------------------------------
Configuring Microsoft Outlook / Outlook Express for Dataone:
1. Open Outlook Express --> Click on Tools --> Click on Accounts
2. Click on Mail --> Click on Add -- Click on Mail
3. Fill - Display Name: e.g. A K Sharma
4. Click on Next --> Fill - E-mail address: e.g. aksharma@dataone.in
5. Click on Next --> Select My Incoming Mail Server is a POP3 Server
6. Fill - Incoming Mail (POP3) Server: smma.dataone.in
7. Fill Outgoing mail (SMTP) Server:smra.dataone.in
8. Click on Next --> Fill - Account name: e.g.aksharma@dataone.in
9. Un-tick Remember password --> Click on Next
10. Click on Finish --> Select the Account --> Click on Properties --> Click on Servers
11. Tick My Server requires authentication --> Click on Settings
12. Ensure that Use same settings as my incoming mail server is selected
13. Click on OK --> Click on Apply --> Click on OK --> Click on Close
You are ready to Send and Receive Mails through Dataone !!Happy Emailing !!!


--------------------------------------------------------------------------------Configuring Netscape Messenger for Dataone:
1. Open Netscape Messenger --> Click on Edit --> Click on Preferences
2. Click on Identity (under Mail & Newsgroups) --> Fill - Your Name: e.g. A K Sharma
3. Fill - Email address: e.g. aksharma@dataone.in
4. Click on Mail Servers (under Mail & Newsgroups) --> Under Incoming Mail Servers - Click on Add
5. Fill - Server Name:smma.dataone.in
6. Select Server Type as POP3 Server --> Fill - User Name: e.g. aksharma@dataone.in
7. Click on OK --> Under Outgoing Mail Server Fill - Outgoing mail (SMTP) server: smra.dataone.in
8. Fill - Outgoing mail server user name: e.g. aksharma@dataone.in --> Click on OK

You are ready to Send and Receive Mails through Dataone !!Happy Emailing !!!
--------------------------------------------------------------------------------Accessing Dataone Webmail
1. Goto website www.dataone.in
2. Fill mail user ID as aksharma@dataone.in
3. Fill password
4. Click on Login button to access Dataone webmail

--------------------------------------------------------------------------------Steps for troubleshooting
2. I am not able to send the mails using Outlook Express
a) Probably you have not coinfigured dataone email in your Outlook Express.b) You have configured multiple Email accounts ( e.g. VSNL mail account) in your Outlook Express and default account for outgoing mail is other than Dataone Mail account. Some ISPs do not allow their SMTP access from network of other ISPs. Therefore you should make Dataone Mail as default account for all outgoing mails. c) Our SMTP server needs authentication. Make sure you have ticked the ‘ My server needs authentication’ in account properties while configuring the Outlook Express.
3. I am a Business customer having our own POP server or mails with own domain but want SMTP service for relaying mails.
BSNL does not provide SMTP relay service for mail IDs of other than Dataone.in or Sancharnet.in domain.

Pen Virus


Virus-pendriveLet’s see how can you protect yourself by following certain practices.
Fix:
Let’s discuss these practices one by one:
1. Disable Autorun on Your Pen Drive:
* Open to Start >> Run and type “gpedit.msc” (without quotes) and press enter.
This will open Group policy editor.
* Browse to Administrative templates >> System >> double click on Turn off Autoplay click on Enabled and Under Settings >> Select All Drives in the drop down and click OK (as shown in the image below)disable-autoplay
2. Scan Your Pen Drive:
Whenever you insert your pen drive / portable drive into usb port on your system make sure to run a virus scan with your anti virus before opening your pen drive contents in windows explorer.
3. Use FreeCommander:
FreeCommander is again a file explorer like windows explorer, so you just need to download it by clicking here and install it.After installing open your pen drive through FreeCommander (as shown in the image below)freecommander-usbdrive-virusCheck if there are some additional files like autorun.inf , Funny ust scandal.avi.exe ,Ravmon.exe ,New Folder.exe etc or any other file which you have not copied or created, delete all these suspicious files on your pen drive. Use your virus infected pen drive: You can also use your virus infected pen drives to copy your important data in worst circumstances. How to backup your important data when your pen drive is infected with a virus
a)Insert your pen drive into the usb port, if it detects your drive you will see it in my computer.
b) Now don’t double click on your drive, rather open the pen drive contents by typing the drive letter.For Example: type g: and press enter if your pen drive is shown as new g drive under my computer.
c) Copy your important files from your pen drive close the window and format your pen drive after then.

Restoring Your Computer in DOS Mode

What happens if your computer refuse to load in windows you can solve that by restoring your computer to earlier time in command prompt also through Sytem Restore take a look how to do it.
* Restart your Computer press F8 button on initial startup.
* When you see Advanced Options Menu ,select Safe Mode with Command Prompt option.
* Select the WindowsXP Operating System .
* Log on With Administrative Privilages and in the Command Prompt type C:\windows\system32\restore\rstrui.exe

Shortcut Keys for Windows

To Access ----------- Run Command

  1. Accessibility Controls ----------- access.cpl
  2. Add Hardware Wizard ----------- hdwwiz.cpl
  3. Add/Remove Programs ----------- appwiz.cpl
  4. Administrative Tools ----------- control admintools
  5. Automatic Updates ----------- wuaucpl.cpl
  6. Bluetooth Transfer Wizard----------- fsquirt
  7. Calculator ----------- calc
  8. Certificate Manager ----------- certmgr.msc
  9. Character Map ----------- charmap
  10. Check Disk Utility ----------- chkdsk
  11. Clipboard Viewer ----------- clipbrd
  12. Command Prompt ----------- cmd
  13. Component Services ----------- dcomcnfg
  14. Computer Management----------- compmgmt.msc
  15. Date and Time Properties ----------- timedate.cpl
  16. dde shares----------- ddeshare
  17. Device Manager----------- devmgmt.msc
  18. Direct X Control Panel (If Installed)*-----------directx.cpl
  19. Direct X Troubleshooter-----------dxdiag
  20. Disk Cleanup Utility ----------- cleanmgr
  21. Disk Defragment ----------- dfrg.msc
  22. Disk Management ----------- diskmgmt.msc
  23. Disk Partition Manager ----------- diskpart
  24. Display Properties ----------- control desktop
  25. Display Properties ----------- desk.cpl
  26. Display Properties (w/Appearance Tab Preselected) -----------control color
  27. Dr. Watson System Troubleshooting Utility-----------drwtsn32
  28. Driver Verifier Utility ----------- verifier
  29. Event Viewer -----------eventvwr.msc
  30. File Signature Verification Tool----------- sigverif
  31. Findfast-----------findfast.cpl
  32. Folders Properties-----------control folders
  33. Fonts-----------control fonts
  34. Fonts Folder-----------fonts
  35. Free Cell Card Game-----------freecellGame
  36. Controllers -----------joy.cpl
  37. Group Policy Editor (XP Prof)-----------gpedit.msc
  38. Hearts Card Game-----------mshearts
  39. Iexpress Wizard-----------iexpress
  40. Indexing Service-----------ciadv.msc
  41. Internet Properties-----------inetcpl.cpl
  42. IP Configuration (Display Connection Configuration)-----------ipconfig /all
  43. IP Configuration (Display dns cache Contents)-----------ipconfig /displaydns
  44. IP Configuration (Delete dns cache Contents)-----------ipconfig /flushdns
  45. IP Configuration (Release All Connections)-----------ipconfig /release
  46. IP Configuration (Renew All Connections)-----------ipconfig /renew
  47. IP Configuration (Refreshes dhcp & Re-Registers DNS)-----------ipconfig /registerdns
  48. IP Configuration (Display dhcp Class ID)-----------ipconfig /showclassid
  49. IP Configuration (Modifies dhcp Class ID)-----------ipconfig /setclassid
  50. Java Control Panel (If Installed)----------- jpicpl32.cpl
  51. Java Control Panel (If Installed)----------- javaws
  52. Keyboard Properties----------- control keyboard
  53. Local Security Settings-----------secpol.msc
  54. Local Users and Groups-----------lusrmgr.msc
  55. Logs You Out Of Windows-----------logoff
  56. Microsoft Chat-----------winchat
  57. Minesweeper Game-----------winmine
  58. Mouse Properties-----------control mouse
  59. Mouse Properties-----------main.cpl
  60. Network Connections-----------control netconnections
  61. Network Connections----------- ncpa.cpl
  62. Network Setup Wizard-----------netsetup.cpl
  63. Notepad-----------notepad
  64. Nview Desktop Manager (If Installed)-----------nvtuicpl.cpl
  65. Object Packager-----------packager
  66. odbc data Source Administrator-----------odbccp32.cpl
  67. OnScreen Keyboard-----------osk
  68. Opens AC3 Filter (If Installed)-----------ac3filter.cpl
  69. Password Properties-----------password.cpl
  70. Performance Monitor-----------perfmon.msc
  71. Performance Monitor----------- perfmon
  72. Phone and Modem Options -----------telephon.cpl
  73. Power Configuration ----------- powercfg.cpl
  74. Printers and Faxes-----------control printers
  75. Printers Folder-----------printers
  76. Private Character Editor-----------eudcedit
  77. Quicktime (If Installed)-----------QuickTime.cpl
  78. Regional Settings -----------intl.cpl
  79. Registry Editor-----------regedit
  80. Registry Editor-----------regedit32
  81. Remote Desktop-----------mstsc
  82. Removable Storage-----------ntmsmgr.msc
  83. Removable Storage Operator Requests-----------ntmsoprq.msc
  84. Resultant Set of Policy (XP Prof)----------- rsop.msc
  85. Scanners and Cameras-----------sticpl.cpl
  86. Scheduled Tasks-----------control schedtasks
  87. Security Center-----------wscui.cpl
  88. Services-----------services.msc
  89. Shared Folders-----------fsmgmt.msc
  90. Shuts Down Windows-----------shutdown
  91. Sounds and Audio -----------mmsys.cpl
  92. Spider Solitare Card Game-----------spider
  93. sql client Configuration-----------cliconfg
  94. System Configuration Editor-----------sysedit
  95. System Configuration Utility-----------msconfig
  96. System File Checker Utility (Scan Immediately)-----------sfc /scannow
  97. System File Checker Utility (Scan Once At Next Boot)-----------sfc /scanonce
  98. System File Checker Utility (Scan On Every Boot)-----------sfc /scanbootS
  99. ystem File Checker Utility (Return to Default Setting)-----------sfc /revert
  100. System File Checker Utility (Purge File Cache)-----------sfc /purgecache
  101. System File Checker Utility (Set Cache Size to size x)-----------sfc /cachesize=x
  102. System Properties -----------sysdm.cpl
  103. Task Manager-----------taskmgr
  104. Telnet Client-----------telnet
  105. User Account Management-----------nusrmgr.cpl
  106. Utility Manager-----------utilman
  107. Windows Firewall-----------firewall.cpl
  108. Windows Magnifier-----------magnify
  109. Windows Management Infrastructure-----------wmimgmt.msc
  110. Windows System Security Tool-----------syskey
  111. Windows Update Launches-----------wupdmgr
  112. Windows xp tour Wizard-----------tourstart
  113. Wordpad-----------write

Shutdown

Remember the days of 95 and 98 saying, "It's now safe to Shutdown", well now you can do it with XP too.

Go to Start, Run, and type regedit.
Go to Path hkey_current_USER/Control Panel and click on Desktop.
Under name on the right side you should see HungAppTimeout.
Double click on it and change the value too
1. Exit regedit and click Turnoff. It should now say "It's now safe to Shutdown".
Also something you should notice that Explorer will bring a end program screen up when you click turnoff and your shutdown rate should increase much

What is a Firewall

What is a Firewall?
Do I Need a Firewall?
If I Have a Firewall, Do I Still Need Anti-virus Software?
How Can I Tell if I Have a Firewall?
How Do I Obtain a Firewall if One is Not on My Computer?
What is a Firewall?
Almost all computers today are capable of communicating over the Internet. While the Internet is very useful for applications like e-mail, web browsing, or instant messaging, the Internet can also be used for disreputable purposes. The Internet makes it possible for hackers, worms, and viruses to also attempt to communicate with your computer in order to steal files, install bad software, or even take control of your computer from a remote location.
A firewall guards your computer from Internet threats like hackers, viruses, and worms by filtering out any suspicious communications sent to your computer. In much the same way that you use caller ID on a telephone to identify who is calling before answering the call, a firewall can identify who is trying to talk to your computer and determine whether or not to allow that communication to come through. A firewall is one of the most important security tools available, and any computer connecting to the Internet should use some type of firewall.
In addition to preventing attacks coming into your computer from the Internet (which is sometimes called “inbound firewall protection”), firewalls can also be configured to prevent communications from leaving your computer and going out to the Internet (sometimes called “outbound firewall protection”). Outbound firewall protection allows you to monitor and control which programs are allowed to send information out to the Internet. This can be very useful in preventing things like spyware from sending private information without your knowledge.Firewalls are available in hardware or software varieties.
Software firewalls (sometimes called “personal firewalls”) can, and should be installed on every computer you have in your home. Software firewalls add extra features, like allowing you to specify which applications on your system can communicate over the Internet. This provides additional protection from unknown spyware that may be trying to communicate from your system. Dell recommends using a software firewall on each computer.
Hardware firewalls can also be very effective if properly configured. If you have a broadband Internet connection with a router, you most likely have a hardware firewall built into your router. Check your router documentation to determine if you have a hardware firewall and to understand configuration options.
NOTE: You can use both hardware and software firewalls at the same time.
Do I Need a Firewall?
YES! Any computer connecting to a network or the Internet should use a firewall. Without a firewall, it is much easier for hackers and viruses to gain access to your computer over the Internet and install malware. Whether you’re connecting to the Internet through a dial-up modem, cable, or digital subscriber line such as DSL, a firewall is a key component of your computer’s security.
If I Have a Firewall, Do I Still Need Anti-virus Software? YES! A firewall will protect you from unauthorized attempts to connect to your computer. It can also protect you from unauthorized attempts to share your private information outside of your computer. Applications like e-mail are authorized to communicate over the Internet. Viruses and other malware can get into your system by attaching, or being attached to e-mail or any other authorized communication channel. Because of this, you need to have both anti-virus software and a firewall to be safe.
How Can I Tell if I Have a Firewall?
If you have McAfee Security Center, perform the following steps:
• Right-click the McAfee icon in the system tray, point to Personal Firewall, and then click View Summary to check the status of the Personal Firewall.If you have Symantec's Norton Internet Security, perform the following steps:
• Right-click the Norton Internet Security icon in the system tray, and then click Open Norton Internet Security to check if Personal Firewall is "On" or "Off" under System Status.If you have Trend Micro's PC-cillin Internet Security, perform the following steps:
1. Click Start, point to All Programs, Trend Micro PC-cillin, and then click Trend Micro PC-cillin Internet Security.
2. Click Network Security, and then click Personal Firewall to check if the firewall is enabled or disabled.
If you did not find one of the previous firewall products installed on your PC, you may be running an operating system that came with a simplified firewall feature set. If you are using the Microsoft Window xp service Pack 2 (SP2) operating system, you can check to see if your firewall is turned on through the Windows Security Center.
1. Click Start, and then click Control Panel.
2. Click Security Center, and then click Windows Firewall.
If you have Windows XP, but you do not have Service Pack 2 running on your computer, you can download SP2 by visiting the Microsoft Update Web site. You can also check to insure that the firewall is enabled with the following steps:
1. Click Start, and then click Control Panel.
2. Click Network and Internet Connections, and then click Network Connections.
TIP: If the Network and Internet Connections category is not visible, click Switch to Category View on the upper left of the window.
3. Under the Dial-Up or lan or High Speed Internet category, click to select the icon of the connection you want to help protect.
4. In the task pane on the left, under Network Tasks, click Change settings of this connection (or right-click the connection you want to help protect, and then click Properties ).
5. On the Advanced tab, under Internet Connection Firewall, make sure the box is checked next to Protect my computer and network by limiting or preventing access to this computer from the Internet. If a check mark is in the box, the firewall is already enabled. If the box is clear, the firewall is off and your computer is potentially vulnerable on the Internet.
How Do I Obtain a Firewall if One is Not on My Computer?
If you have an operating system earlier than XP that did not come with a firewall such as Windows 2000, Windows Millennium Edition, or Windows 98, or you need to obtain and install a firewall product, If you only require a simplified feature set, you may wish to utilize the Microsoft Windows Firewall that came with Windows XP. For more information on the Windows Firewall, please visit the Microsoft Web site .

What is a Proxy Server

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes. Web proxies
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a url), a caching proxy looks for the resulting url in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (Lru) and Least Frequently Used (lfu). Lru removes the least-recently used documents, and lfu removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "cgi proxies." These are web sites which allow a user to access a site through them. They generally use php or cgi to implement the proxying functionality. cgi proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.
You may see references to four different types of proxy servers:
Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
Anonymous Proxy - This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonal anonymity for most users.
Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. Open Proxies, abuse, and detection
An open proxy is a proxy server which will accept client connections from any IP address and make connections to any Internet resource. Abuse of open proxies is currently implicated in a significant portion of e-mail spam delivery. Spammers frequently install open proxies on unwitting end users' Microsoft Windows computers by means of computer viruses designed for this purpose. Internet Relay Chat (Irc) abusers also frequently use open proxies to cloak their identities. Because proxies could be implicated in abuse, system administrators have developed a number of ways to refuse service to open proxies. Irc networks such as the Blitzed network automatically test client systems for known types of open proxy. Likewise, an email server may be configured to automatically test e-mail senders for open proxies, using software such as Michael Tokarev's proxycheck.
Groups of Irc and electronic mail operators run dnsbls publishing lists of the IP addresses of known open proxies, such as Blitzed opm and CBL.
The ethics of automatically testing clients for open proxies are controversial. Some experts, such as Vernon Schryver, consider such testing to be equivalent to an attacker portscanning the client host. Others consider the client to have solicited the scan by connecting to a server whose terms of service include testing. Anonymous proxy risksIn using a proxy server (for example, anonymizing http proxy), all data sent to the service being used (for example, http server in a website) must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted logins and passwords. By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.
The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity (e.g., the owner is known and trusted, has a clear privacy policy, etc.), and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information (unless it is properly encrypted) through the proxy.
Internet Anonymity
Internet anonymity is, in essence, the subject of internet privacy and its issues. Internet anonymity is basically the method by which people send messages and conduct business via the Internet without revealing their true identity. The information that they do reveal is controlled by the user him or herself. It includes the obvious personal information, however maintaining Internet anonymity extends far beyond the user: it includes computer information and location as well. To maintain Internet anonymity means to utilize the Internet without giving anyone the ability to trace or link web activity, or personal information, back to the user.
Those who are concerned about Internet anonymity often discuss several risks to personal privacy. Cookies are among the most talked about privacy risk. Cookies are text sent to a web browser about a site or page that has been visited. The text is stored by the computer’s server and sent back every time that particular web page is revisited. It makes for downloading the page quicker since the computer accessing the page is authenticated by the cookie. Cookies also contain specific information about the user, such as preferences, passwords, log-in IDs and even electronic shopping cart information. This is why the cookie is considered a privacy risk by Internet users, and has thus been disabled by many computer owners prior to surfing the web.
Advocates for Internet anonymity argue that it is the most important aspect of free speech on the Internet. Anonymity allows for Internet users to express themselves freely without worry of being discovered or tracked, ridiculed, or harassed. This is important to online discussions and forums, especially those involving personal questions or topics, in which those participating do not want to have to admit who or where they are. A perfect example of the importance of such anonymity is in medical forums where patients are free to ask medical questions of doctors or others with similar medical afflictions. Advocates also maintain that Internet anonymity is essential for transmitting information that must remain anonymous. The reporting of illegal activities and criminal behavior via the Internet is also an example of how vital anonymity can be: it gives witnesses and reporters the comfort and security necessary to offer their testimony.
Opponents argue that certain abuses and illegal activities are perpetuated by available Internet anonymity. Spam, or unsolicited email, is a common abuse of Internet anonymity. Most spam emails are junk mail and non-threatening; however, there have been cases where spam has been utilized to communicate hate-speech, threats, and harassment, and the anonymity of such spam has made it difficult, if even impossible, to track their originators. Opponents also debate that anonymity protects criminals and sexual predators. These offenders utilize the forums and discussions groups that protect the identity of all users to target their prey via the Internet.
The reality of Internet anonymity is that it will be a subject of heated discussion for years to come. Fortunately there exist avenues that Internet users can take to protect their identity, preferences, and IP addresses, if anonymity is important to them. Disabling cookies is common choice and some web browsers, like Mozilla Foxfire and Opera, have a setting that automatically deletes all cookies at the end of an Internet session. Overall, users need to remain cognizant of what information they provide on the Internet, including that in on-line screen names and profiles, if they want to maintain anonymity while using the web.

Hardware & Networking

1. Hardware & Networking
2. Computer Maintenance Tips
3. Change name Microsoft Internet Explorer
4. Format HDD by using Notepad
5. Hack-Brake XP Passwords
6. How to find MB
7. MS_word_Short_Cuts
8. Outlook Configaration
9. Pen Virus
10. Restoring Your Computer in DOS Mode
11. Shortcut Keys for Windows
12. Shutdown
13. What is a Firewall?
14. What is a Proxy Server

EDUCATION INFORMATION

1. COMPUTER
  • Hardware & Networing
  • Software Hardware

2. Education

  • Engineering
  • Post Graduation
  • Projects