
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.
The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.
All of us live in a password driven world.Without password protection, nothing is safe.It protect our identities on websites, discussion groups, e-mail accounts and more.It is not easy to remember them all.If your password is weak,hackers try to break into a computer or secure account by guessing passwords one at a time.
If you use the same password everywhere, increases the risk of your accounts being compromised.Many of us are just recycling the same password for multiple accounts.A new study by security firm Trusteer found that 73 percent of Web users take their online banking password and use it at other Web sites.So always remember to Use Different Passwords Everywhere.You should change them often, don’t share them,don’t leave them out for others to see.Thus make your password a total mystery to others.
An ideal password is long and has letters, punctuation, symbols, and numbers.
There are plenty of tools available in net which will create strong passwords for you. The PC Tools Secure Password Generator, for example, makes one based on your criteria: how long,include (or don’t) mixed case, numbers,punctuation, similar character replacement,etc. It even provides a phonetic pronunciation guide.
http://www.pctools.com/guides/password/
The Bit Mill another password generator tool , which can create passwords from one to 128 characters in length, although the default is set to eight. You can vary capital letters, numbers and punctuation
http://www.thebitmill.com/tools/password.html
Every user in the Windows OS has a user folder associated with the account name which stores computer settings and data.A common problem with Windows machines is a corrupt user profile.So windows fails to recognize the user profile and folder that is linked to the user account.This can be caused by a hard drive error, joining/leaving a domain, file system issues and a change of username.What will happen in this case is that the next time the user logs-on, a fresh, empty profile will be created, named 'user.domain' or 'user.computer' instead of just 'user' -and from that point on, the new profile will be used instead of the correct one.
Before we start learning how we fix any corrupt account make sure you have a an account which either is admin or is admin privileged.
All the Windows User Profiles are located under C:\Users\UserName which contains all our settings. Now go to your account and unhide hidden folders and uncheck Hide Protected operating system files. You would see three files NTUSER.DAT, NTUSER.dat.log and ntuser.ini which you will need to be careful about.
This should fix your problems. Remember many a times because of some bug you might see Windows giving you a brand new profile but if you logoff and try logging in again you would see the issues getting fixed.
There is another alternative called as Reprofiler a software which can also help you in fix these issues by remapping users to their profiles, fixing registry settings and permissions which is required to fix any corrupt windows account.
It displays all the user accounts above and all the windows users folder below. Now to fix it or map to any other account you can just select first a user name above and a folder below and then hit Assign. This will make sure it copies and assigns proper settings. You can also remove / detach folders which is useful when it comes to erase the data.
How to determine whether your computer is running a 32-bit Microsoft Windows operating system or a 64-bit Microsoft Windows operating system? Or whether your PC supports 64 bit OS? Here is a free tool-64bit Checker- which makes this task easier .64 bit checker supports all versions of Windows .
MOBILedit! supports the widest range of phones on the market and different smartphone operating systems including Android, iPhone, Blackberry, Symbian, and Windows Mobile.With this you can connect your phone via cable, Bluetooth, or IrDA. You can view the entire contents of the phone where you are able to synchronize, add, edit, or delete anything you'd like.
The user interface is very easy to navigate .With one click you can manage your contacts, messages, photos and music or transfer contacts .Intelligent Phonebook Optimizer of MOBILedit! will analyze your phonebook and improve it by searching for invalid contacts and duplicates, merging partial contacts, and correcting numbers to full international format make your calls work from abroad. The Optimizer can also enhance your contacts with Facebook friends' information such as photos, links and full names.
Supported Phones: http://www.mobiledit.com/phones.htm
These days many viruses and malwares target your PC , rendering the computer unbootable. Microsoft Standalone System Sweeper is a recovery tool that can help you start an infected PC and perform an offline scan to help identify and remove viruses, trojans, rootkits and other forms of malware effectively.
It can also be used if you cannot install or start an antivirus solution on your PC, or if the installed solution can’t detect or remove malware on your PC.This tool installs itself to either a USB drive or a blank CD/DVD disc and creates a bootable media that can be used to recover your system in the event of a malware or virus infection.
please ensure that you have a blank CD, DVD, or USB drive with at least 250 MB of space, and an active Internet connection .To use Standalone System Sweeper ,users need to boot from the disc or USB device which in turn loads the tool that gives you the options to scan the PC and recover it.
It will load the Windows preinstall environment to run the Microsoft Standalone System Sweeper application for scanning .This will first scans your boot sector for any corrupted files or settings. It then scans your system for any known malware or infections.
Are worry about your confidential files which is you are always carrying on your flash drive? here is the solution.
With the help of TrueCrypt, you can easily protect the data stored your flash drive so that if it is lost or stolen, nobody will be able to get to your sensitive files.
Plug in the flash drive you want to protect data on copy any data you want to protect onto a folder on your hard disk. We will move them to the encrypted volume once we are done.
The process of creating an encrypted file container for a flash drive is no different from the normal TrueCrypt process. If you are familiar with how to do this already, you can skip this section or just scroll through it for a quick refresher.
From the Tools menu, select Volume Creation Wizard.
Select the option to Create an encrypted file container.
We do not want to select the option to encrypt a non-system partition/drive because this would prevent us from loading the files required to mount a TrueCrypt volume on our flash drive. This would mean the computer we plug our flash drive into would have to already have TrueCrypt installed in order to access our data.
Select the option to create a Standard TrueCrypt volume.
Set the destination to a file located on your flash drive.
Set your encryption options. The default values will do nicely.
Set the size for the encrypted volume. Make sure you leave at least 10 MB free so there is room for the TrueCrypt files required for mounting and dismounting the volume.
Set a strong password.
Wait patiently while the TrueCrypt volume is created.
In order to access your encrypted volume on systems which do not have TrueCrypt loaded, you must load the required binary files needed to mount the container on the host system. Thankfully, TrueCrypt has a function which makes this easy.
From the Tools menu, select Traveler Disk Setup.
We will come back to what this notice means a bit later.
Browse to the drive letter of your flash drive under the File Settings.
Under AutoRun Configuration, select the option to Auto-mount the TrueCrypt volume and then set the following options:
Create traveler disk with the set options.
This is an important notice.
In order for TrueCrypt to mount a volume on a host system, one of the following conditions must be met:
The reason you need administrative rights if TrueCrypt is not installed natively is due to the requirement that a system driver must be loaded on the host system in order to mount the encrypted volume. Since only administrators can load and unload system drivers, you must have this level of access or you will not be able to mount the TrueCrypt driver.
On the other hand, if the driver is already present on the host (i.e. TrueCrypt is installed natively), you should be able to mount your encrypted driver with normal user level access.
Once the traveler disk setup is complete, you should see your flash drive shows with a TrueCrypt icon in Windows Explorer.
Once you have configured your flash drive as a TrueCrypt Traveler Disk, opening the contents in Windows Explorer should look something like the screen below.
Notice there is an autorun.inf file which was created during the setup. Getting back to the message box we said we would discuss later, this is intended to run automatically when the flash drive is plugged into the host machine, however most Windows machines have the AutoRun option disabled (as they should), so this will never execute. Because of this, you will have to mount and dismount your TrueCrypt volume manually.
Of course, doing it manually isn’t acceptable so with a couple of batch scripts we can easily mount and dismount the TrueCrypt volume with a double-click.
Open the autorun.inf file in Notepad and copy the text following the line which begins with “open=”.
Create a new text file called MountTC.bat and paste what you previously copied into this file. When run, this batch file will mount the TrueCrypt volume stored on the flash drive onto the host system.
Back in the autorun.inf file, copy the text following the line which begins with “shell\dismount\command=”.
Create a new text file called DismountTC.bat and paste what you previously copied into this file. When run, this batch file will dismount all the TrueCrypt volumes on the host system.
When finished, you should see the two batch files we created in your flash drive.
After you plug in the flash drive to the host machine if the TrueCrypt volume does not attempt to mount itself automatically, simply run the MountTC.bat file. Remember, TrueCrypt must be natively installed or you have to have administrative rights on the host machine. You will get a UAC prompt if TrueCrypt is not natively installed, so confirm you want to continue.
Enter your password for the TrueCrypt volume.
Your volume will be mounted and your encrypted files will now appear.
Copy any files you want to protect inside of your TrueCrypt volume and nobody will be able to access them without the password.
Once you are finished, simply run the DismountTC.bat file and your TrueCrypt volume will be gracefully dismounted.
It is important to understand that while your files are encrypted on the flash drive, once you mount the TrueCrypt volume on the host machine, they are at the mercy of this machine. As a result, you should be careful where you decide to access your files.
You may face that you can’t copy large files to you external hard drive or flash drive even if there is many free space. So how do you fix that?
The FAT32 file system, which most external drives and flash drives are still using, can’t handle files larger than about 4 GB in size—which means most full-length movies and anything really large, like a virtual machine. If you do try and copy a file, you will get an error just like below.
It’s worth noting that FAT32 works just fine on just about any operating system, but NTFS is usually read-only on Linux and Mac OS X.
If you have already copy huge sized of files on the drive and don’t have the free space to move them somewhere, you can convert the file system directly from FAT32 to NTFS. Just open up an Administrator mode command prompt by right-clicking and choosing Run as Administrator, and then you can type convert /? to see the syntax for the convert command.
In our example, the drive letter is G: so the command we’d use is this:
convert G: /FS:NTFS
The conversion process might take a while, especially if you’ve got a really large drive.
You are done
If you don’t have a ton of data on the drive, the best bet is to copy any data from the drive to somewhere else, reformat the drive, and then copy the data back.
Right-click on the drive and choose Format.
And then select NTFS in the file system drop-down.
Finish the format, and copy your data back.