Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Keep any window Always on Top or Transparent

There can be several different reasons why you may want to keep a window always on top of all other open windows. For example, having a video always show while working in another program, keeping a chat always visible, or keeping your most important web page on top at all times. Although some programs may have an always on top feature other programs such as Internet browsers do not support this feature.

How to Completely Remove Chat from your Gmail

If you are like me who uses Gmail for emails but not for chatting, there’s a simple setting that will help you completely remove (and not just hide) the chat box from your Gmail mailbox.
Go to your Gmail Settings page, switch to the Chat tab, choose “Chat Off” and click the “Save Changes” button. Alternatively, you may use this link to directly access your Gmail Chat settings page. You can re-enable chat in your Gmail by using the “Chat On” option.

This setting to disable chat may have been available in regular Gmail accounts for some time (am not too sure) but it was only recently added to Gmail for Google Apps accounts.

Importance of Strong Passwords

The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.

All of us live in a password driven world.Without password protection, nothing is safe.It  protect our identities on websites, discussion groups, e-mail accounts and more.It is not easy to  remember them all.If  your password is weak,hackers try to break into a computer or secure account by guessing passwords one at a time.

If you use the same password everywhere, increases the risk of your accounts being compromised.Many of us are just recycling the same password for multiple accounts.A new study by security firm Trusteer found that 73 percent of Web users take their online banking password and use it at other Web sites.So always  remember to Use Different Passwords Everywhere.You should change them often, don’t share them,don’t leave them out for others to see.Thus make your password a total mystery to others.

How to create an ideal password?

An ideal password is long and has letters, punctuation, symbols, and numbers.

  • Whenever possible, use at least 8 characters or more. Remember, the longer the password, the stronger it is.
  • The greater the variety of characters in your password, the better.
  • Use the entire keyboard, not just the letters and characters you use or see most often
  • Use special characters such as ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \ < , > . ? /
  • Use both UPPER and lower case letters
  • Do not begin or end the password with a number
  • The characters should be random, and not follow from words, alphabetically, or from your keyboard layout.

 

There are plenty of tools  available in net which  will  create strong passwords for you. The PC Tools Secure Password Generator, for example, makes one based on your criteria: how long,include (or don’t) mixed case, numbers,punctuation, similar character replacement,etc. It even provides a phonetic pronunciation guide.

http://www.pctools.com/guides/password/

 

The Bit Mill  another password generator tool , which can create passwords from one to 128 characters in length, although the default is set to eight. You can vary capital letters, numbers and punctuation

http://www.thebitmill.com/tools/password.html

Others:-
To check your password — is it strong?

How to fix corrupt windows user profile

Every user in the Windows OS has a user folder associated with the account name which  stores computer settings and data.A common problem with Windows machines is a corrupt user profile.So windows fails to recognize the user profile and folder that is linked to the user account.This can be caused by a hard drive error, joining/leaving a domain, file system issues and a change of username.What will happen in this case is that the next time the user logs-on, a fresh, empty profile will be created, named 'user.domain' or 'user.computer' instead of just 'user' -and from that point on, the new profile will be used instead of the correct one.

Before we start learning how we fix any corrupt account make sure you have a an account which either is admin or is  admin privileged.

All the Windows User Profiles are located under C:\Users\UserName which contains all our settings. Now go to your account and unhide hidden folders and uncheck Hide Protected operating system files. You would see three files NTUSER.DAT, NTUSER.dat.log and ntuser.ini which you will need to be careful about.

  • Login with your admin account and  create new account.
  • Now identify which user profile is corrupted and  go to that folder which will be like C:\Users\UserName
  • Unhide Folders / Files and display system files
  • Copy everything from this folder  except three files NTUSER.DAT, NTUSER.dat.log and ntuser.ini
  • Go to new account folder located under C:\users and paste all the files you copied in above step.
  • Logoff and login to the new account to confirm.
  • Delete the old account.

This should fix your problems. Remember many a times because of some bug you might see Windows giving you a brand new profile but if you logoff and try logging in again you would see the issues getting fixed.

There is another alternative called as Reprofiler a software which can also help you in fix these issues by remapping users to their profiles, fixing registry settings and permissions which is required to fix any corrupt windows account.

image

It displays all the user accounts above and all the windows users folder below. Now to fix it or map to any other account you can just select first a user name above and a folder below and then hit Assign. This will make sure it copies and assigns proper settings. You can also remove / detach folders which is useful when it comes to erase the data.

Download

How to find whether your PC Supports 64 bit

How to determine whether your  computer is running a 32-bit Microsoft Windows operating system or a 64-bit Microsoft Windows operating system?  Or whether your PC supports 64 bit OS? Here is a  free tool-64bit Checker- which makes this task easier .64 bit checker supports all versions of Windows .

Features

  • Shows if your computer is running a 32bit or 64bit version of Windows
  • Detects whether your processor supports a 64bit operating systems (if you are not sure that you can install 64bit operating system on your computer)
  • Copy report information to clipboard, or save in text or html file


Download

MOBILedit! – Complete PC Suite for all Phones

MOBILedit! supports the widest range of phones on the market and   different smartphone operating systems including Android, iPhone, Blackberry, Symbian, and Windows Mobile.With   this you can connect your phone via cable, Bluetooth, or IrDA. You  can  view the entire contents of the phone where you  are able to  synchronize, add, edit, or delete anything you'd like.

The user interface is very easy to navigate .With one click you can manage your contacts, messages, photos and music or transfer contacts .Intelligent Phonebook Optimizer of MOBILedit! will analyze your phonebook and improve it by searching for invalid contacts and duplicates, merging partial contacts, and correcting numbers to full international format make your calls work from abroad. The Optimizer can also enhance your contacts with Facebook friends' information such as photos, links and full names.

Features

  • The only universal PC Studio with thousands of phones supported
  • Manage, improve and print a phonebook from the comfort of a computer
  • Copy phonebook from any phone to a new phone regardless of manufacturer or system
  • Backup all phone content to a PC or Internet cloud storage
  • Complete ringtone editor
  • Built-in video editor
  • Live view of phone and card memory, battery, signal, IMEI and more
  • Contact optimization and internationalization
  • Copy pictures and videos between phone and PC
  • Download, read, store and print text messages
  • Send text messages using PC keyboard
  • Install applications to the phone from a PC
  •  

    Supported Phones: http://www.mobiledit.com/phones.htm

    Download Download

    Microsoft Standalone System Sweeper

    These days many viruses and malwares  target  your PC , rendering the computer unbootable. Microsoft Standalone System Sweeper is a recovery tool that can help you start an infected PC and perform an offline scan to help identify and remove viruses, trojans, rootkits and other forms of malware effectively.

    It can also be used if you cannot install or start an antivirus solution on your PC, or if the installed solution can’t detect or remove malware on your PC.This tool installs itself to either a USB drive or a blank CD/DVD disc and creates a bootable media that can be used to recover your system in the event of a malware or virus infection.

    please ensure  that you have a blank CD, DVD, or USB drive with at least 250 MB of space, and an active Internet connection .To use Standalone System Sweeper ,users need to boot from the disc or USB device which in turn loads the tool that gives you the options to scan the PC and recover it.

    It will load the Windows preinstall environment to run the Microsoft Standalone System Sweeper application for scanning .This  will first scans your boot sector for any corrupted files or settings. It then scans your system for any known malware or infections.

    Download: http://go.microsoft.com/fwlink/?LinkId=215854

    How to Protect Your Flash Drive Data with TrueCrypt

    Are worry about your confidential files which is you are always carrying on your flash drive? here is the solution.

    With the help of TrueCrypt, you can easily protect the data stored your flash drive so that if it is lost or stolen, nobody will be able to get to your sensitive files.

    Creating a TrueCrypt Volume

    Plug in the flash drive you want to protect data on copy any data you want to protect onto a folder on your hard disk. We will move them to the encrypted volume once we are done.

    The process of creating an encrypted file container for a flash drive is no different from the normal TrueCrypt process. If you are familiar with how to do this already, you can skip this section or just scroll through it for a quick refresher.

    From the Tools menu, select Volume Creation Wizard.

    Select the option to Create an encrypted file container.

    We do not want to select the option to encrypt a non-system partition/drive because this would prevent us from loading the files required to mount a TrueCrypt volume on our flash drive. This would mean the computer we plug our flash drive into would have to already have TrueCrypt installed in order to access our data.

    Select the option to create a Standard TrueCrypt volume.

    Set the destination to a file located on your flash drive.

    Set your encryption options. The default values will do nicely.

    Set the size for the encrypted volume. Make sure you leave at least 10 MB free so there is room for the TrueCrypt files required for mounting and dismounting the volume.

    Set a strong password.

    Wait patiently while the TrueCrypt volume is created.

    Loading the TrueCrypt Binary Files on Your Flash Drive

    In order to access your encrypted volume on systems which do not have TrueCrypt loaded, you must load the required binary files needed to mount the container on the host system. Thankfully, TrueCrypt has a function which makes this easy.

    From the Tools menu, select Traveler Disk Setup.

    We will come back to what this notice means a bit later.

    Browse to the drive letter of your flash drive under the File Settings.

    Under AutoRun Configuration, select the option to Auto-mount the TrueCrypt volume and then set the following options:

    • Enter the file name only of the TrueCrypt volume file.
    • Select First available as the drive letter.
    • Select the option Open Explorer window for mounted volume.

    Create traveler disk with the set options.

    This is an important notice.

    In order for TrueCrypt to mount a volume on a host system, one of the following conditions must be met:

    1. TrueCrypt must be installed natively on the host system already.
    2. You must have administrative rights on the host system.

    The reason you need administrative rights if TrueCrypt is not installed natively is due to the requirement that a system driver must be loaded on the host system in order to mount the encrypted volume. Since only administrators can load and unload system drivers, you must have this level of access or you will not be able to mount the TrueCrypt driver.

    On the other hand, if the driver is already present on the host (i.e. TrueCrypt is installed natively), you should be able to mount your encrypted driver with normal user level access.

    Once the traveler disk setup is complete, you should see your flash drive shows with a TrueCrypt icon in Windows Explorer.

    Easily Opening the TrueCrypt Volume on the Host Machine

    Once you have configured your flash drive as a TrueCrypt Traveler Disk, opening the contents in Windows Explorer should look something like the screen below.

    Notice there is an autorun.inf file which was created during the setup. Getting back to the message box we said we would discuss later, this is intended to run automatically when the flash drive is plugged into the host machine, however most Windows machines have the AutoRun option disabled (as they should), so this will never execute. Because of this, you will have to mount and dismount your TrueCrypt volume manually.

    Of course, doing it manually isn’t acceptable so with a couple of batch scripts we can easily mount and dismount the TrueCrypt volume with a double-click.

    Open the autorun.inf file in Notepad and copy the text following the line which begins with “open=”.

    Create a new text file called MountTC.bat and paste what you previously copied into this file. When run, this batch file will mount the TrueCrypt volume stored on the flash drive onto the host system.

    Back in the autorun.inf file, copy the text following the line which begins with “shell\dismount\command=”.

    Create a new text file called DismountTC.bat and paste what you previously copied into this file. When run, this batch file will dismount all the TrueCrypt volumes on the host system.

    When finished, you should see the two batch files we created in your flash drive.

    Opening the TrueCrypt Volume

    After you plug in the flash drive to the host machine if the TrueCrypt volume does not attempt to mount itself automatically, simply run the MountTC.bat file. Remember, TrueCrypt must be natively installed or you have to have administrative rights on the host machine. You will get a UAC prompt if TrueCrypt is not natively installed, so confirm you want to continue.

    Enter your password for the TrueCrypt volume.

    Your volume will be mounted and your encrypted files will now appear.

    Copy any files you want to protect inside of your TrueCrypt volume and nobody will be able to access them without the password.

    Once you are finished, simply run the DismountTC.bat file and your TrueCrypt volume will be gracefully dismounted.

    Important Security Notice

    It is important to understand that while your files are encrypted on the flash drive, once you mount the TrueCrypt volume on the host machine, they are at the mercy of this machine. As a result, you should be careful where you decide to access your files.

     

    Download TrueCrypt

    Download

    How to change your Hard Drive or Flash Drive file system from FAT32 to NTFS Format

    You may face that you can’t copy large files to you external hard drive or flash drive even if there is many free space. So how do you fix that?

    The FAT32 file system, which most external drives and flash drives are still using, can’t handle files larger than about 4 GB in size—which means most full-length movies and anything really large, like a virtual machine. If you do try and copy a file, you will get an error just like below.

    It’s worth noting that FAT32 works just fine on just about any operating system, but NTFS is usually read-only on Linux and Mac OS X.

    Option 1: Convert the File System Directly

    If you have already copy huge sized of files on the drive and don’t have the free space to move them somewhere, you can convert the file system directly from FAT32 to NTFS. Just open up an Administrator mode command prompt by right-clicking and choosing Run as Administrator, and then you can type convert /? to see the syntax for the convert command.

    In our example, the drive letter is G: so the command we’d use is this:

    convert G: /FS:NTFS

    The conversion process might take a while, especially if you’ve got a really large drive.

    You are done

    Option 2: Reformat the Drive

    If you don’t have a ton of data on the drive, the best bet is to copy any data from the drive to somewhere else, reformat the drive, and then copy the data back.

    Right-click on the drive and choose Format.

    And then select NTFS in the file system drop-down.

    Finish the format, and copy your data back.

    You are done  clip_image005clip_image006

     
    Copyright 2008 IToxy