Wednesday, April 24, 2024
08:56 AM (GMT +5)

Go Back   CSS Forums > Off Topic Section > Computers and Technology

Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies.

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
 
LinkBack Thread Tools Search this Thread
  #1  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Thumbs up PC_Tweaks

Basics Of Dual-Core Process Computer

The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too.

The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip).
The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time.

The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned.

By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory.

Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`.

More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines.

Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart.

The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Friday, October 30, 2009)
  #2  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Increasing The Life Of Hard Disk

Increasing The Life Of Hard Disk

Taking care of your hard disk is important because this is the place where all the data is stored and once the hard disk crashes, data in most cases is not recoverable. There are data recovery softwares and programs which recover data from crashed hard disks but that is not for normal computer users.

But why do hard disks crash and what can be done to prevent them from crashing?. At the same time how can a hard disk be made more efficient? Here are the answers.

Hard disks crash due to many reasons. Voltage fluctuations, physical impact, improper alignment and of course mechanical failure due to wear and tear of internal parts. Let us start one by one and get the answers to the above problems.

1. Voltage fluctuations or spikes as they are called can be prevented by using voltage stabilizers or spike guards. This will limit the damage to the hard disk to a great extent.

2. Physical impact can be prevented by handling the hard disk carefully when installing/ re-installing. When installing the hard disk care should be taken to see that it sits perfectly horizontal and that it does not vibrate or shake once the computer is started.

3. The natural wear and tear of parts can be limited by defragmenting your hard disk from time to time.But what is defragmentation? All newly created files are stored in various places on the hard disk in a single cluster ( contiguous file ). But, as the number of files and programs increase, these files are not stored as one contiguous file but broken down and scattered in various places on the hard disk. In short files get fragmented. When these files are accessed by the user, the head on the hard disk moves to and fro to locate these fragments. These fragmented files puts lot of mechanical pressure on the internal parts of the hard disk. This leads to crashes. To start disk defragmenter from the start menu, click the start button and follow this path (All Programs / Accessories / System Tools / Disk Defragmenter). A minimum of 15 percent free space on your disk is needed for disk defragmenter to run. The disk can also be defragmented automatically by using schedule task. This program can can be accessed via system tools.

4. Power management tool can also be used to enhance the life of hard disk. To access this program go to start / control panel / power options and set the parameters for various hardware devices.

5. Disk cleanup increases the efficiency of the hard disk. So delete unwanted files and programs regularly.

Follow the above rules to increase the life of you hard disk.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Friday, October 30, 2009)
  #3  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default 10 Reasons Why PCs Crash

10 Reasons Why PCs Crash

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Friday, October 30, 2009)
  #4  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Top 20 Tips To Keep Your System Faster

Top 20 Tips To Keep Your System Faster

Follow these tips and you will definitely have a much faster and more reliable PC! Most of the below tips works for windows XP

1. Wallpapers:
They slow your whole system down, so if you're willing to compromise, have a basic plain one instead!

2. Drivers:
Update your hardware drivers as frequently as possible. New drivers tend to increase system speed especially in the case of graphics cards, their drivers are updated by the manufacturer very frequently!

3. Minimizing:
If you want to use several programs at the same time then minimize those you are not using. This helps reduce the overload on RAM.

4. Boot Faster:
The 'starting Windows 95/98' message on startup can delay your booting for a couple of seconds. To get rid of this message go to c:\ and find the file Msdos.sys. Remove the Read-Only option. Next, open it in Notepad or any other text editor. Finally, go to the text 'Options' within the file and make the following changes: Add BootDelay=0. To make your booting even faster, set add Logo=0 to remove the Windows logo at startup.

5. Restart only Windows:
When restarting your PC, hold down Shift to only restart Windows rather than the whole system which will only take a fraction of the time.

6. Turn Off Animations:
Go to Display Settings from the Control Panel and switch to the Effects Tab. Now turn off Show Windows Content While Dragging and Smooth Edges on Screen Fonts. This tip is also helpful with Windows XP because of the various fade/scroll effects.

7. Faster Start-Menu Access:
Go to the Start menu and select Run. Now type Regedit and hit Enter. The Registry Editor will appear on the screen. Now, open the folder HKEY_CURRENT_USER\Control Panel\Desktop. You should see a MenuShowDelay value. If you don't then do the following: right click on a blank space in the right pane and select New\String. Change the name in the new value to MenuShowDelay. Now that we have the MenuShowDelay value, double click on it and enter 0 in the value data field. This sets the start menu delay to 0 milliseconds.

8. Resolutions:
If you are willing to do anything for faster performance from your PC, then try lowering your display resolution. The lower it is, the faster your PC.

9. Turn off Active Desktop:
Go to your Display Properties and switch to the Web tab. Uncheck View My Active Desktop As a Web Page. Since the Active Desktop option under Windows 98 uses a lot of system resources, this option can have a dramatic effect on the speed of the whole system.

10. Defragment Often:
Windows 98's Defrag tool uses Application Acceleration from Intel which means that when you defragment your drive, data is physically arranged on the drive so that applications will load faster.

11. Take your PC to Bed:
Using the Advanced Power Management feature under Windows 98 gives you the option to use the sleep command. That way, you can send your PC to sleep instead of shutting it down and then restarting it. It's as simple as pressing a button and then pressing the same button to wake it up. You can tell Windows after how many minutes/hours of inactivity to automatically sleep the machine in the Advanced Power Management section of the Control Panel.

12. Faster Internet Access:
If you use the internet for reference and the sites you visit are rarely updated then try the following. In IE (the same can be done in Netscape) go to Tools, Internet Options. Next, click on Settings in the Temporary Internet Files section. Finally, select Never for the first option and double the amount of storage space to use, click OK!

13. Benchmarking:
Benchmarking can be very useful when run frequently. It can tell you how your PC's components are performing and then compare them to other machines like yours. For example, when you overclock your PC, you want to know how much more speed you have and whether it is stable. All this and more can be discovered using benchmarking. An excellent piece of software for doing this job is SiSoft Sandra which can be found in the Downloads File Archive!

14. Refresh the Taskbar without restarting:
If you in some way change the taskbar, either in Regedit or elsewhere, you can refresh the task bar without restarting. Hold down Ctrl Alt Del, and double click on Explorer. Say Yes to close Explorer, but no to closing Windows. This will refresh the Taskbar and system tray.

15. Quick CD Eject:
Instead of pushing the button on your drive, right-click your CD drive letter in My Computer and click on Eject. This will also remove any icons that have become associated with the CD drive.

16. Start Up Programs:
Windows can be slowed down when programs run on start up. To eliminate this, check your Start up folder. You can access it from the start menu: Start, Programs, Start Up. Another way to eliminate programs from loading even before Windows actually starts is by doing the following: Click on Start, then Run. Type msconfig. It will take quite a long time for this program to load, but when you finally see it on your screen, explore the different tabs. They all have to do with how quickly your PC boots, so select what you want, and uncheck what you don't want!

17. Fonts:
When Windows starts, it loads every single font in the Fonts folder. Therefore, the more fonts you have, the slower the booting process. To get rid of unwanted fonts, simply go to the Fonts folder under c:\windows and remove whatever you don't want. Fonts that have a red letter 'A' as their icon are system fonts, so don't delete them.

18. Stretching Wallpapers:
Don't "stretch" your wallpaper in Windows 98 since it actually slows Windows down when you drag icons around on the desktop.

19. RAM Matters:
If you have less than 32MB then you should seriously think of upgrading it to at least 64MB. Windows runs much more smoothly with 64MB or higher and tends to use less hard disk space for virtual memory.

20. Partitioning:
A very nice little thing you can do to boost system performance. By partitioning your hard drive, splitting one physical drive into several logical ones, you can gain several advantages.
1. If you get a virus or you accidentally format a drive, not all will be lost.
2. By placing the swap file (Win386.swp) on a separate drive, The swap file will be less fragmented and thus, faster.
3. Place Windows on a separate drive and whenever you need to reinstall it, you rest assured that your data is safe on a separate drive.
Partitioning can be done using a few programs such as FDisk which comes with DOS.
However, FDisk formats everything on the hard disk before partitioning. Alternatively, you can use Partition Magic fromPower Quest to partition your hard disk without losing your data.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 3 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009), salik_malik (Friday, October 30, 2009)
  #5  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default How to find drivers for Unknown Devices

Most of U members often seen or faced some problems in finding drivers specially of unknown devices. I almost tried maximum drivers guides etc but they are not that much effective as the following method is. I by my self use this method for my self. This method I got from google 1st time & now I am fully utilizing it when ever I need to find unknown devices drivers.

1. Open Device Manager (Control Panel>System>Hardware>Device Manager)
2. The hardware whose drivers are missing will appear as Unknown device, so it's easier to locate the device.
3. Right click on the unknown device and click on Properties.
4. Under the Properties window click on Details tab and select Device Instance Id from the drop down box.
5. You should see a code similar to this

PCI\VEN_8086&DEV_27DC&SUBSYS_30868086
&REV_01\4&1E46F438&0&40F0

6. The portion of the code highlighted in RED is the Vendor ID and the portion highlighted in GREEN is the Device ID. In this example:

Vendor ID = 8086
Device ID = 27DC
7. Once you have obtained both the IDs open the given site & put ur vendor ID & Device ID there & u will get full detail & model number of that unknown device so just by typing that device name correctly in google U can get exect drivers of ur unknown devices



Code:
www.pcidatabase.com
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
  #6  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

Sometimes online you need to know your IP address. This is the address which identifies your computer on the Internet, and it's how information you request gets sent to you correctly, instead of ending up on someone else's computer. If you play online games with others and in some other circumstances, you'll need your IP address to create a direct connection between you and another Internet user. As your IP is usually dynamically assigned – that is, you get a different IP each time you connect to the Internet – how do you know what yours is?

It's easy to find out:

1. Click Start -> Run.
2. In the Run dialog box, type winipcfg and click OK.

A dialog box will be displayed, containing your IP address as well as other information.

Note: Microsoft doesn't include the Windows IP Configuration (winipcfg) tool with Windows 2000 or Windows XP. However, you can download a version for those operating systems directly from Microsoft. It has a slightly different name (wntipcfg), so once you've installed it, to run it do this:

1. Click Start -> Run.
2. In the Run dialog box, type wntipcfg and click OK
Attached Thumbnails
PC_Tweaks-winipcfg.jpg  
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
  #7  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Install xp in 10 min without Ghost

Install xp in 10 min without Ghost

We all know that after loading the file or copying the file from the boot disk to temporary space the system requires a first time reboot.

Now if we press Shift+F10 then the task manager will open and there we will find that a process is running named setup.exe

now our task is to make the priority of this process maxm by right clicking on that.

We are done.

Find ur xp installed in 10 min with tolerance 2 min.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
  #8  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default

Rename a Series of Files

When you download photos from your digital camera, they often have unrecognizable names. You can rename several similar files at once with the following procedure. This also works for renaming other types of files.

1.Open the My Pictures folder. (Click Start, and then click My Pictures.) Or open another folder containing files that you want to rename.
2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.
3.On the File menu, click Rename.
4.Type the new name, and then press ENTER.


All of the files in the series will be named in sequence using the new name you type. For example, if you type Birthday, the first will be named Birthday and subsequent files in the series will be named Birthday (1), Birthday (2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type Birthday (10), the other files will be named Birthday (11), Birthday (12), and so on.
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
  #9  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default What'S a Virus

What'S a Virus



1) Virus is a little program that its activity can destruct/destroy
some files and a computer system. If this program does not open, It still stays
inactive and could not or will not destroy anything.

2) Virus program is brought by an email-virus as attachment, Where it
has a server itself (virus server). Virus attachments cannot go to
another email to be an attachment, Such as an email was sent by user
(netter), Member, Moderator Etc. It must be brought by its email
itself, Called EMAIL VIRUS.

3) EMAIL VIRUS would send by any email address of any account that it
finds from some mailbox and address-book's another person at anywhere.
So that a virus attachment could to become look like sent by our
friend, Our member, Our moderator etc... In this case even my be able
the virus attachment was sent by your email address yourself.

4) Identification of virus attachment: it has a small size file,

Quote:
100KB, And it has file name extension such as:


Quote:
*.scr
*.clp
*.pif
*.bat
*.exe
*.com
*.txt
*.doc
*.lhz
*.rhz
and some time it's compressed by *.zip file.
Also probably its name is HotMovie.MPEG__________scr.
Actualy the file is virus attachment file with extension . scr


5) Beside said above you may be able to know an EMAIL VIRUS from its
subject (an amazing name), Such as:

Quote:
Weah )
Hokki=)
Hi
ello !=))
Hello -)
Hey, dude, it's me
access Mpeg
Re: your text
Re: Text message
Re: Msg reply
Re: Is that your document?
Re: Hot Movie( MPEG)
Re: Information...
Re; Important info
Re: This is your photos!
and more, and more...

If you should received emails with extensions or subject matter as
above , You should delete it. And under no circumstances open it.
By the way don't give your email subject with a name look like EMAIL
VIRUS subject otherwise your email would be deleted by the recipient.

*** If one of your file in your hard disk has infected by virus, It'll
change into function to be virus and might could infected all of files
in your hard disk.
Classification of Virus:- Viruses can be subdivided into a number of types, the main ones being:

Quote:
*

Boot sector viruses
*

Companion viruses
*

Email viruses
*

Logic bombs and time bombs
*

Macro viruses
*

Cross-site scripting virus

Two other types of malware are often classified as viruses, even though they may not meet the standard criteria:

*

Trojan horses
*

Worms


Boot sector virus:-

A boot sector virus alters the boot sector, usually the 1st sector, of a bootable disk or hard drive. Boot sector viruses were prevalent in the 1980s.
Companion virus:-A companion virus does not have host files per se, but exploits MS-DOS. A companion virus creates new files (typically .COM but can also use other extensions such as ".EXD") that have the same file names as legitimate .EXE files. When a user types in the name of a desired program, if a user does not type in ".EXE" but instead does not specify a file extension, DOS will assume he meant the file with the extension that comes first in alphabetical order and run the virus. For instance, if a user had "(filename).COM" (the virus) and "(filename).EXE" and the user typed "filename", he will run "(filename).COM" and run the virus. The virus will spread and do other tasks before redirecting to the legitimate file, which operates normally. Some companion viruses are known to run under Windows 95 and on DOS emulators on Windows NT systems. Path companion viruses create files that have the same name as the legitimate file and place new virus copies earlier in the directory paths. These viruses have become increasingly rare with the introduction of Windows XP, which does not use the MS-DOS command prompt.

E-mail virus:-

An E-mail virus is a virus which uses e-mail messages as a mode of transport. These viruses often copy themselves by automatically mailing copies to hundreds of people in the victim's address book.

Logic bomb:-

A logic bomb employs code that lies inert until specific conditions are met. The resolution of the conditions will trigger a certain function (such as printing a message to the user and/or deleting files). An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts. A time bomb is a subset of logic bomb, which is set to trigger on a particular date and/or time.

Macro virus:-

A macro virus, often written in the scripting languages for Microsoft programs such as Word and Excel, is spread in Microsoft Office by infecting documents and spreadsheets.
Cross-site scripting virus:-A cross-site scripting virus (XSSV) is a type of virus that utilizes cross-site scripting vulnerabilities to replicate. A XSSV is spread between vulnerable web applications and web browsers creating a symbiotic relationship.

Trojan horse:-
Trojan Horses are impostor files that claim to be something desirable but, in fact, are malicious. Rather than insert code into existing files, a Trojan horse appears to do one thing (install a screen saver, for example) when in fact it does something entirely different, and potentially malicious, such as erase files. Trojans can also open back doors so that computer hackers can gain access to passwords, and other personal information stored on a computer.

Although often referred to as such, Trojan horses are not viruses in the strict sense because they cannot replicate automatically. For a Trojan horse to spread, it must be invited onto a computer by the user opening an email attachment or downloading and running a file from the Internet, for example. Trojan.Vundo is an example of a Trojan horse.

Worm:-

A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating anew.

Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. W32.Mydoom.AX@mm is an example of a worm.
Effects of computer viruses:-Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
Host types:-Viruses have targeted various types of hosts. This is a non-exhaustive list:

Binary executable files (such as COM files and EXE files in MS-DOS, Portable Executable files in Microsoft Windows, and ELF files in Linux)

Volume Boot Records of floppy disks and hard disk partitions

The master boot record (MBR) of a hard disk

General-purpose script files (such as batch files in MS-DOS and Microsoft Windows, VBScript files, and shell script files on Unix-like platforms).

Application-specific script files (such as Telix-scripts)

Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files)
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Saturday, October 31, 2009), khanzada_111 (Tuesday, November 10, 2009)
  #10  
Old Sunday, October 25, 2009
Waseemtabish's Avatar
Senior Member
 
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Svchost

Svchost

Viewer Shows Exactly What Each svchost.exe Instance is Doing

One of the most popular articles on this site over the last year has been our must-read feature explaining svchost.exe and why it's running, and now there's an even easier way to see what's going on behind all of those svchost processes in Task Manager.

The Svchost Viewer is a small application that lists all of the current svchost.exe instances, shows how much memory each one is using and what services are running beneath it. For the uninitiated, svchost.exe is an underlying Windows component responsible for Windows services (read our full guide for more).


Using Svchost Viewer
The cool thing about Svchost Viewer is it requires no installation and can run directly off your USB flash drive, coming in handy when troubleshooting. Just double-click on the application to launch, and then click Yes when prompted whether to get the data.



After taking a few moments to complete the scan you will be presented with the number of svchost.exe instances running along with the service name, description, memory usage, and program path.




This application is a great little tool to see what's really going on in your computer. Svchost Viewer is open source, requires the .NET 2.0 framework and should work on XP (SP2), Vista and Windows 7.


Download Svchost Viewer from codeplex.com


Code:
http://rapidshare.com/files/19304729....3.0.0_RC1.rar



This is a Free Download and you can get it from

Code:
http://www.codeplex.com/svchostviewer
Attached Thumbnails
PC_Tweaks-11-thumb.jpg   PC_Tweaks-11-thumb1.png   PC_Tweaks-11-thumb2.jpg  
__________________
~It is possible to fail in many ways...while to succeed is possible only in one way.~
Reply With Quote
The Following User Says Thank You to Waseemtabish For This Useful Post:
khanzada_111 (Tuesday, November 10, 2009)
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of CSSForum.com.pk (unless CSSForum.com.pk is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.