Welcome to IToxy.com
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Welcome to IToxy.com
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Welcome to IToxy.com
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Welcome to IToxy.com
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Welcome to IToxy.com
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Keep any window Always on Top or Transparent
How to Completely Remove Chat from your Gmail
Go to your Gmail Settings page, switch to the Chat tab, choose “Chat Off” and click the “Save Changes” button. Alternatively, you may use this link to directly access your Gmail Chat settings page. You can re-enable chat in your Gmail by using the “Chat On” option.
This setting to disable chat may have been available in regular Gmail accounts for some time (am not too sure) but it was only recently added to Gmail for Google Apps accounts.
Importance of Strong Passwords
The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.
All of us live in a password driven world.Without password protection, nothing is safe.It protect our identities on websites, discussion groups, e-mail accounts and more.It is not easy to remember them all.If your password is weak,hackers try to break into a computer or secure account by guessing passwords one at a time.
If you use the same password everywhere, increases the risk of your accounts being compromised.Many of us are just recycling the same password for multiple accounts.A new study by security firm Trusteer found that 73 percent of Web users take their online banking password and use it at other Web sites.So always remember to Use Different Passwords Everywhere.You should change them often, don’t share them,don’t leave them out for others to see.Thus make your password a total mystery to others.
How to create an ideal password?
An ideal password is long and has letters, punctuation, symbols, and numbers.
- Whenever possible, use at least 8 characters or more. Remember, the longer the password, the stronger it is.
- The greater the variety of characters in your password, the better.
- Use the entire keyboard, not just the letters and characters you use or see most often
- Use special characters such as ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \ < , > . ? /
- Use both UPPER and lower case letters
- Do not begin or end the password with a number
- The characters should be random, and not follow from words, alphabetically, or from your keyboard layout.
There are plenty of tools available in net which will create strong passwords for you. The PC Tools Secure Password Generator, for example, makes one based on your criteria: how long,include (or don’t) mixed case, numbers,punctuation, similar character replacement,etc. It even provides a phonetic pronunciation guide.
http://www.pctools.com/guides/password/
The Bit Mill another password generator tool , which can create passwords from one to 128 characters in length, although the default is set to eight. You can vary capital letters, numbers and punctuation
http://www.thebitmill.com/tools/password.html
Others:-
- http://strongpasswordgenerator.com/
- http://www.randompassword.com/index.php?id=Basic
- http://www.developertutorials.com/tools/secure-password-generator.php
- http://www.techzoom.net/tools/password-generator.en
To check your password — is it strong?
How to fix corrupt windows user profile
Every user in the Windows OS has a user folder associated with the account name which stores computer settings and data.A common problem with Windows machines is a corrupt user profile.So windows fails to recognize the user profile and folder that is linked to the user account.This can be caused by a hard drive error, joining/leaving a domain, file system issues and a change of username.What will happen in this case is that the next time the user logs-on, a fresh, empty profile will be created, named 'user.domain' or 'user.computer' instead of just 'user' -and from that point on, the new profile will be used instead of the correct one.
Before we start learning how we fix any corrupt account make sure you have a an account which either is admin or is admin privileged.
All the Windows User Profiles are located under C:\Users\UserName which contains all our settings. Now go to your account and unhide hidden folders and uncheck Hide Protected operating system files. You would see three files NTUSER.DAT, NTUSER.dat.log and ntuser.ini which you will need to be careful about.
- Login with your admin account and create new account.
- Now identify which user profile is corrupted and go to that folder which will be like C:\Users\UserName
- Unhide Folders / Files and display system files
- Copy everything from this folder except three files NTUSER.DAT, NTUSER.dat.log and ntuser.ini
- Go to new account folder located under C:\users and paste all the files you copied in above step.
- Logoff and login to the new account to confirm.
- Delete the old account.
This should fix your problems. Remember many a times because of some bug you might see Windows giving you a brand new profile but if you logoff and try logging in again you would see the issues getting fixed.
There is another alternative called as Reprofiler a software which can also help you in fix these issues by remapping users to their profiles, fixing registry settings and permissions which is required to fix any corrupt windows account.
It displays all the user accounts above and all the windows users folder below. Now to fix it or map to any other account you can just select first a user name above and a folder below and then hit Assign. This will make sure it copies and assigns proper settings. You can also remove / detach folders which is useful when it comes to erase the data.
How to find whether your PC Supports 64 bit
How to determine whether your computer is running a 32-bit Microsoft Windows operating system or a 64-bit Microsoft Windows operating system? Or whether your PC supports 64 bit OS? Here is a free tool-64bit Checker- which makes this task easier .64 bit checker supports all versions of Windows .
Features
- Shows if your computer is running a 32bit or 64bit version of Windows
- Detects whether your processor supports a 64bit operating systems (if you are not sure that you can install 64bit operating system on your computer)
- Copy report information to clipboard, or save in text or html file
MOBILedit! – Complete PC Suite for all Phones
MOBILedit! supports the widest range of phones on the market and different smartphone operating systems including Android, iPhone, Blackberry, Symbian, and Windows Mobile.With this you can connect your phone via cable, Bluetooth, or IrDA. You can view the entire contents of the phone where you are able to synchronize, add, edit, or delete anything you'd like.
The user interface is very easy to navigate .With one click you can manage your contacts, messages, photos and music or transfer contacts .Intelligent Phonebook Optimizer of MOBILedit! will analyze your phonebook and improve it by searching for invalid contacts and duplicates, merging partial contacts, and correcting numbers to full international format make your calls work from abroad. The Optimizer can also enhance your contacts with Facebook friends' information such as photos, links and full names.
Features
Supported Phones: http://www.mobiledit.com/phones.htm
Microsoft Standalone System Sweeper
These days many viruses and malwares target your PC , rendering the computer unbootable. Microsoft Standalone System Sweeper is a recovery tool that can help you start an infected PC and perform an offline scan to help identify and remove viruses, trojans, rootkits and other forms of malware effectively.
It can also be used if you cannot install or start an antivirus solution on your PC, or if the installed solution can’t detect or remove malware on your PC.This tool installs itself to either a USB drive or a blank CD/DVD disc and creates a bootable media that can be used to recover your system in the event of a malware or virus infection.
please ensure that you have a blank CD, DVD, or USB drive with at least 250 MB of space, and an active Internet connection .To use Standalone System Sweeper ,users need to boot from the disc or USB device which in turn loads the tool that gives you the options to scan the PC and recover it.
It will load the Windows preinstall environment to run the Microsoft Standalone System Sweeper application for scanning .This will first scans your boot sector for any corrupted files or settings. It then scans your system for any known malware or infections.
How to Protect Your Flash Drive Data with TrueCrypt
Are worry about your confidential files which is you are always carrying on your flash drive? here is the solution.
With the help of TrueCrypt, you can easily protect the data stored your flash drive so that if it is lost or stolen, nobody will be able to get to your sensitive files.
Creating a TrueCrypt Volume
Plug in the flash drive you want to protect data on copy any data you want to protect onto a folder on your hard disk. We will move them to the encrypted volume once we are done.
The process of creating an encrypted file container for a flash drive is no different from the normal TrueCrypt process. If you are familiar with how to do this already, you can skip this section or just scroll through it for a quick refresher.
From the Tools menu, select Volume Creation Wizard.
Select the option to Create an encrypted file container.
We do not want to select the option to encrypt a non-system partition/drive because this would prevent us from loading the files required to mount a TrueCrypt volume on our flash drive. This would mean the computer we plug our flash drive into would have to already have TrueCrypt installed in order to access our data.
Select the option to create a Standard TrueCrypt volume.
Set the destination to a file located on your flash drive.
Set your encryption options. The default values will do nicely.
Set the size for the encrypted volume. Make sure you leave at least 10 MB free so there is room for the TrueCrypt files required for mounting and dismounting the volume.
Set a strong password.
Wait patiently while the TrueCrypt volume is created.
Loading the TrueCrypt Binary Files on Your Flash Drive
In order to access your encrypted volume on systems which do not have TrueCrypt loaded, you must load the required binary files needed to mount the container on the host system. Thankfully, TrueCrypt has a function which makes this easy.
From the Tools menu, select Traveler Disk Setup.
We will come back to what this notice means a bit later.
Browse to the drive letter of your flash drive under the File Settings.
Under AutoRun Configuration, select the option to Auto-mount the TrueCrypt volume and then set the following options:
- Enter the file name only of the TrueCrypt volume file.
- Select First available as the drive letter.
- Select the option Open Explorer window for mounted volume.
Create traveler disk with the set options.
This is an important notice.
In order for TrueCrypt to mount a volume on a host system, one of the following conditions must be met:
- TrueCrypt must be installed natively on the host system already.
- You must have administrative rights on the host system.
The reason you need administrative rights if TrueCrypt is not installed natively is due to the requirement that a system driver must be loaded on the host system in order to mount the encrypted volume. Since only administrators can load and unload system drivers, you must have this level of access or you will not be able to mount the TrueCrypt driver.
On the other hand, if the driver is already present on the host (i.e. TrueCrypt is installed natively), you should be able to mount your encrypted driver with normal user level access.
Once the traveler disk setup is complete, you should see your flash drive shows with a TrueCrypt icon in Windows Explorer.
Easily Opening the TrueCrypt Volume on the Host Machine
Once you have configured your flash drive as a TrueCrypt Traveler Disk, opening the contents in Windows Explorer should look something like the screen below.
Notice there is an autorun.inf file which was created during the setup. Getting back to the message box we said we would discuss later, this is intended to run automatically when the flash drive is plugged into the host machine, however most Windows machines have the AutoRun option disabled (as they should), so this will never execute. Because of this, you will have to mount and dismount your TrueCrypt volume manually.
Of course, doing it manually isn’t acceptable so with a couple of batch scripts we can easily mount and dismount the TrueCrypt volume with a double-click.
Open the autorun.inf file in Notepad and copy the text following the line which begins with “open=”.
Create a new text file called MountTC.bat and paste what you previously copied into this file. When run, this batch file will mount the TrueCrypt volume stored on the flash drive onto the host system.
Back in the autorun.inf file, copy the text following the line which begins with “shell\dismount\command=”.
Create a new text file called DismountTC.bat and paste what you previously copied into this file. When run, this batch file will dismount all the TrueCrypt volumes on the host system.
When finished, you should see the two batch files we created in your flash drive.
Opening the TrueCrypt Volume
After you plug in the flash drive to the host machine if the TrueCrypt volume does not attempt to mount itself automatically, simply run the MountTC.bat file. Remember, TrueCrypt must be natively installed or you have to have administrative rights on the host machine. You will get a UAC prompt if TrueCrypt is not natively installed, so confirm you want to continue.
Enter your password for the TrueCrypt volume.
Your volume will be mounted and your encrypted files will now appear.
Copy any files you want to protect inside of your TrueCrypt volume and nobody will be able to access them without the password.
Once you are finished, simply run the DismountTC.bat file and your TrueCrypt volume will be gracefully dismounted.
Important Security Notice
It is important to understand that while your files are encrypted on the flash drive, once you mount the TrueCrypt volume on the host machine, they are at the mercy of this machine. As a result, you should be careful where you decide to access your files.
How to change your Hard Drive or Flash Drive file system from FAT32 to NTFS Format
You may face that you can’t copy large files to you external hard drive or flash drive even if there is many free space. So how do you fix that?
The FAT32 file system, which most external drives and flash drives are still using, can’t handle files larger than about 4 GB in size—which means most full-length movies and anything really large, like a virtual machine. If you do try and copy a file, you will get an error just like below.
It’s worth noting that FAT32 works just fine on just about any operating system, but NTFS is usually read-only on Linux and Mac OS X.
Option 1: Convert the File System Directly
If you have already copy huge sized of files on the drive and don’t have the free space to move them somewhere, you can convert the file system directly from FAT32 to NTFS. Just open up an Administrator mode command prompt by right-clicking and choosing Run as Administrator, and then you can type convert /? to see the syntax for the convert command.
In our example, the drive letter is G: so the command we’d use is this:
convert G: /FS:NTFS
The conversion process might take a while, especially if you’ve got a really large drive.
You are done
Option 2: Reformat the Drive
If you don’t have a ton of data on the drive, the best bet is to copy any data from the drive to somewhere else, reformat the drive, and then copy the data back.
Right-click on the drive and choose Format.
And then select NTFS in the file system drop-down.
Finish the format, and copy your data back.