
Keywords: strangest phone, biggest mobile, biggest cell phone, largest
HKEY_CLASSES_ROOT\Directory\shell
Right click on the shell folder and choose New > Key.
new > key"> new > key">
Name the new key Command Prompt.
Right click on Command Prompt and choose New > Key.
Name it Command.
In the right page of the Registry Editor window, double click on the Default. See the picture below,
Type Cmd.exe /k cd “%1″ then click OK.
Now you obtain Command Prompt in Context Menu, try right-clicking on a folder you want to get in.
All Windows stores its configuration information in a database called the registry. The registry is the central storage for all computer configuration data.
Although the registry appears to be in one file, it is actually placed on your computer in several files. Depending on your system configuration, registry files can be found in any of the following locations:
C:\Documents and Settings\User Name\ on Windows 2000, XP.
C:\Windows\System32\Config\ on Windows 2000, XP.
C:\Windows\ on Windows 95, 98, ME.
C:\Windows\Profiles\ on Windows 95, 98, ME.
How To Back Up Windows Registry ?
In windows NT, 2000 and XP not possible to back up registry files while the operating system is running. Registry files remain fully locked all the time while Windows is running, But here You can use an integrated Windows XP's System Restore feature for registry backup.
But using registry editor (regedit.exe) you can to export partial or complete copies of the registry, while the Windows is up, and the exported files can then be backed up with any other traditional file backup utility. You can follow these simple steps to back up the whole registry or any particular registry subkey:
Click Start button and then type Regedit in Run option.
Locate and then click the root subkey that contains all the child subkeys and values that you want to back up.
On the File menu, click Export.
In the Save box, you can select the location where you want to save the Registration Entries (.reg) file, type a file name in the File name box, and then click Save.
The exported registry file is about 10-50 MB in size on a typical Windows NT/2000/XP installation.
A backup is a duplicate copy of a file, program or disk that can be used if the original copy is lost, damaged, or destroyed. Thus, if you regularly take backups of your sensitive data or programs and update them as and when needed, system failures can be covered easily through these backups. For example, in Norton Ghost, you can takes backup of your complete system within minute. Norton Ghost by Symantec provides us a complete solution of system backup. Norton Ghost has a very simple wizard base control panel to help the all level of users. Norton Ghost offerings with the full system backup and restore, partition backup, file and folders backup, backup using compression and encryption and incremental backups also.
Using Norton Ghost, you can create the image of full hard disk to another hard disk, or image of one partition to other partitions. You can store this image to almost any media CD/DVD, USB, external storage device, zip drive and network drive also. You can download this tool for any windows version using Symantec website. Download it and run the easy setup.
After installation launch Norton Ghost, the first screen will appear with title “Norton Ghost Year”. First click on “Backup” (Backup your computer to a Ghost image file) link and then click on Next button to start backup process.
Here you can select disk or partition to backup, If you want to create backup of your C drive (windows with all installed programs), then select only C drive under “Source” section. Now under destination section, select the option “File” (hard disk) or “Recordable CD or DVD” (if you have CD/DVD writer and empty writeable CD/ DVD) and click Next button.
Now click on Browse button to choose destination drive then enter image file name and click on “Save” button.
Again press the Next button to open Advance settings (optional setting), click on advance settings button, if want to choose compression, image password and others features.
Now click on Next button to view the summary. Press “Run Now” button to start process
Here a message will prompt you, save your data and close all open application.
When you pressed Ok button, your system will restart to run Norton Ghost (DOS base process).
In DOS mode, System will take time (depends upon your data size) to complete the process and then you view and verify backup file in normal mode.
Now you can use this backup files (using Restore option) to restore system backup when you will need or move to any other computer.
DSL (Digital Subscriber Line) is basically 24-hours on internet connection and working with high speed up to 10 Mbps. DSL service provider offering different packages with speed 128 Kbps to 10 Mbps. But the actual speed at user end may be different from user to user due to the modem speed, telephone line condition and the distance between services provider to user home. If you want your DSL working with good speed and error free then make sure there is no any joint between telephone line tower and modem line. Your DSL modem may be heat up, hang and slow, if your DSL modem continually on for 24-hours, then restart it to solve this problem.
There are many DSL providers offers free speed test software with Internet connection package to check speed frequently. Many third parties software provider companies offer free speed check software on internet, download and use it to monitor speed constantly. Yon can test speed using any website for this purpose, search speed test tools websites using any search engine. DSL speed test result will be different in different times, may be fast during early morning and slow at peak hours. You should get the results in different hours then with the help of average decide about the actual speed.
POP
POP stands for Post Office Protocol. POP is used to download email from the ISP provider's email server. Most ISPs offer either POP or the newer protocol, IMAP to subscribers. POP3 does not require the SMTP to send email from the subscriber's email client.
Telnet
The Telnet protocol is a service for internet service providers that provides a means to connect into the ISP. It is sometimes used for updating Web sites, and frequently used as a method of connecting into a shell account. It is however extremely insecure with how it handles passwords. More modern protocols like SSH should be considered instead.
FTP
FTP stands for File Transfer Protocol. It is an ISP service that essentially just provides a way to connect to the ISP. It is frequently used as a means of updating Web sites. It is however extremely insecure with regards to how it handles passwords. More modern methods like WebDAV should be considered instead. When shopping for an ISP, ones that do not offer more secure alternatives to FTP should not even be considered.
IMAP
IMAP stands for Internet Message Access Protocol. This protocol works like POP except that it keeps your email on the ISP provider's mail server until you decide to move it. IMAP service can cost more than POP because your account may take up additional disk space as your email remains on the ISP's email server.
Shell Account
Some ISPs offer shell accounts. A shell account is a special type of ISP service: it is essentially text-only access to the Internet. You may wonder why anyone would want such a thing. After all, while e-mail is mostly textual anyway, the Web is a different animal. Consider though that a blind user doesn't care about pictures on a Web site, but still may need its underlying information. Many blind users rely on shell accounts working in conjunction with special screen readers. Many users also enjoy the virus protection shell accounts provide.
X-Face
X-Faces were devised to make both e-mail and Usenet news a little more human-friendly. They are ISP-neutral and will work with any ISP provider that provides an e-mail and/or a Usenet ISP service. They do require a savvy e-mail / Usenet application to create and display them properly, though. When an e-mail message or Usenet news item has an X-face attached, it will be displayed as a small monochromatic image (usually somewhere in the header) by applications that support them when viewing the owning message or item. Sometimes they feature miniature portraits of the author, but more often they're used just to give a little insight into the author's personality.
APOP
The old POP3 protocol is probably the most popular ISP service for receiving e-mail. Unfortunately it is by default very insecure with regards to how it handles passwords. APOP is an option that fixes POP3's password insecurity, improving overall internet service provider safety and ISP security. Note though that it does nothing for e-mail privacy -- only e-mail security. Something like S/MIME or PGP is required to improve privacy, too. Note also that if SSL is being used, APOP isn't needed.
SSL
SSL stands for Secure Sockets Layer. It is a special type of ISP service used to encrypt communications between an ISP and a user. This is done not just for privacy, but also ISP safety. Unfortunately not all ISPs support SSL yet, so check with an ISP provider before making any commitments. Keep in mind that while e-mail sent and/or received via SSL will be encrypted for its trip to and/or from the ISP, it will not be encrypted for the remainder of its journey and will thus still be potentially open to snooping. To really protect e-mail one needs something like S/MIME or PGP.
Internet Service Provider
There are many different types of ISPs (Internet Service Providers). There are local ISPs and national ISPs. There are ISPs that focus on different types of connections, like modem dial-in, ISDN, ADSL, DSL, or broadband. There are business ISPs and residential ISPs. There are even ISPs that offer different access methods, like graphical (PPP/SLIP) or text-only (shell). Be sure to compare ISPs before choosing one.
WebDAV
Some ISPs provide WebDAV access to hosted Web pages. WebDAV (sometimes called DAV) is a type of ISP service that can be used to mount ISP resources as if they were installed locally. It provides all the benefits of FTP, but is significantly more secure. While a discount ISP will typically not offer WebDAV, a better ISP provider usually will. Remember that a free ISP offering only FTP access will end up costing you money if your account is cracked.
Picons, AOL Buddy Icons, and .Mac Icons
PIcons, AOL Buddy Icons, and .Mac Icons are similar to X-faces, but there are a couple important differences. First, they're stored in a master database (in the case of PIcons this database can be mirrored by each individual ISP provider as a regular ISP service). Second, they're in color. Third, (in the case of PIcons only) they can represent companies and organizations in addition to individuals. Savvy programs can display PIcons, AOL Buddy Icons, or .Mac Icons with e-mail messages or Usenet news items instead of (or in addition to) X-faces. PIcons are an open standard while AOL Buddy Icons and .Mac Icons are proprietary and only available to certain ISP users.
SSH
SSH stands for secure shell. It is an ISP service used for connecting into the ISP. It is often used for updating Web sites, and heavily used as a method of connecting into a shell account. When shopping for a shell account in this day and age, only ISP providers with SSH should be considered. A free ISP offering only Telnet access will end up costing you money if your account is cracked.
SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is used to send email from one mail server to another. SMTP work in conjunction with POP to send and receive email. Some ISP providers do not use SMTP because of spam issues, which may overtax their servers.
Syndication
Better ISPs provide an interesting ISP service: the ability to syndicate Web content. Calendar event type information can be syndicated through a technology called iCalendar. Journal entries or news event type information can be syndicated through either a technology called RSS (RDF Site Syndication) or a related technology called Atom. While traditional syndication is text-only, due to the popularity of the iPod music player more and more podcasts (RSS with attached audio files) are appearing. Many dynamic Web servers have the built-in capability to automatically syndicate appropriate content making the whole process effortless.
Paid Citywide Wireless Internet Access
Paid citywide wireless Internet access doesn't have the political resistance that free citywide Internet access does, but it's still not all that common. Most ISPs find that it is more cost effective to wire individual buildings for Internet access than it is to build a comprehensive wireless grid. It is more common for ISPs to provide a combination of wired and wireless ISP services than wireless access alone. Thus you may find that wireless Internet service is available all throughout a city's historic district, but only wired service is available elsewhere. It varies from place to place and ISP to ISP.
Wireless Internet Access Speed
Modern wireless Internet access is actually quite fast, and is comparable to DSL, ISDN, or cable. There are three different standards currently in widespread use: 802.11a, 802.11b, and 802.11g. The majority of sites use 802.11b; it's the least expensive but the slowest with a maximum theoretical speed of 11 Mbps. 802.11a was developed at the same time as 802.11b, but is significantly more expensive, has less range, and is less popular; it's faster with a maximum theoretical top speed of 54 Mbps, though. 802.11g is a newer standard that combines the best of both 802.11a and 802.11b. It's got a maximum theoretical speed of 54 Mbps, and is backwards compatible with 802.11b.
Wireless Internet Access Security
It's so easy to set up a wireless Internet network with an off-the-shelf base station like the Linksys or AirPort that people often forget about ISP security considerations. When setting up a wireless base station, it is important for you to change the default password. You should also turn on encryption. The reach of these base stations is often farther than you expect, and it's pretty common for people to be able to see your network from the street or a neighboring apartment. Keychain wireless network detectors are on the market, and they enable crackers to discover wireless networks unobserved. If such a cracker gets into your wireless network, it could conceivably make it possible for her to see all of your private information. Using encryption and safe passwords will protect you.
Wireless Internet Access
There are three related meanings of wireless Internet access in common use. The most frequent is when a home or business uses wireless access to share a single wired connection (like cable, DSL, or ISDN). Almost as common is the public-access wireless access provided in places like libraries, airports, and hotels so people can use their laptops and PDAs to access the Internet. Sometimes these are free, but more often than not they require a payment for a certain limited amount of usage. The least common is for large grids created by ISPs that offer wireless connectivity throughout a community. These can either be free (if sponsored by the local government) or require a monthly payment.
Free Citywide Wireless Internet Access
Free municipal wireless Internet access is currently extremely rare. There have been several cities and towns in the United States that have created such grids that blanket their entire surface and it makes the Internet essentially free and fast for all their citizens (and visitors). The only thing that one needs to utilize such a community-wide wireless grid is a wireless card. Unfortunately, traditional ISPs and telephone companies don't like big free wireless grids. They see them as being competition, and they have been working hard to make them illegal. There are already several states in the U.S. that don't allow free municipal wireless Internet access.
Travelers' Wireless Internet Access
These days there are many wireless Internet access options available for travelers. It is not uncommon for airports to offer wireless Internet connections (usually on a pay-per-usage basis, but sometimes free). It is now also quite common for hotels and motels to offer wireless Internet connectivity (usually on a pay-per-diem basis). Many libraries and parks also offer wireless Internet access, and usually for free. Internet access for road warriors is easier now than it has ever been. There are even portable wireless base stations available that'll enable you to use high speed wired connections with your wireless devices.
Sharing Internet Connections Wirelessly
It's pretty trivial to use a wireless base station to share a single ISP's Internet connection with multiple computers, and the firewall facilities built into some wireless base stations can improve your ISP security, too. Base stations like the Linksys or AirPort will function like routers; you connect their uplink ports either directly to your Internet connection or through a hub or switch. Individual computers can either be assigned IP numbers on-the-fly by the base station, or be given pre-set ones. The former case is easier to set up, and the latter case results in faster Internet access. Computers set up in a wireless network like this can also directly share information with each other.
Wireless Internet Access Hardware
If you want to have mobile Internet access by taking advantage of the public wireless Internet connections available in different places, you'll need some special hardware. Of course to be truly mobile you'll need a laptop, notebook, or PDA, but the key thing is the wireless card. Most public access points currently use a standard called 802.11b, although a few use 802.11g. The 802.11g standard is faster than 802.11b, but backwards compatible. That means that if you have an 802.11g card, you'll be able to utilize both 802.11b and 802.11g wireless Internet connections.
Speeding Up Internet Access
Most of what makes the Internet slow for people in their day-to-day activities resides in people's own systems, not in their ISP. It's pointless searching for a high-speed ISP if you're connecting to it with a modem over a telephone line. To get a fast Internet experience start with your own hardware. Get a relatively high-speed, low-latency connection to the Internet like cable or DSL, and then ensure your computer is ready for the load. Connect to the modem via an Ethernet port, not serial, parallel, or USB. Finally, ensure your computer has enough memory; in most modern computers this is more a bottleneck than speed.
ISP Speed
The overall perceived speed of an ISP is determined by four key factors: the ISP bandwidth, the ISP load, server delivery rate, and the latency. Bandwidth is usually pretty constant for a given ISP. Load will vary throughout the day. Server delivery rate is attached to the service being used. Latency is largely determined by how one is connected to the ISP. All four are important. For example, a high speed ISP may score very well in a bandwidth speed test one day but be slow the next day due to a heavy load.
ISP Bandwidth
The bandwidth of an ISP determines how much data it can move. If you think of data as water, an ISP's bandwidth is based on the size of its pipes. The top speed of an ISP is set by its bandwidth, but other factors can affect its actual speed. In particular, load will impact its raw speed and latency will impact its perceived speed. ISP bandwidth is usually measured in Mbps (megabits per second), but is often advertised based on its connection type (T1, T2, T3, T4, etc.)
T1 and T3
ISPs are often connected to the Internet at large via standard cables called (most frequently) T1 or T3 or (very rarely) T1C, T2, or T4. Each of these cables delivers a certain amount of bandwidth at a particular latency. For a quick comparison, a T1 can move 1.544 Mbps and a T1C 3.152. A T2 delivers 6.312 Mbps. A T3 is capable of 44.736 Mbps and the mighty T4 274.760 Mbps. Compare this with a 56K modem which can only handle 0.056 Mbps.
ISP Speed Tests
Since effective ISP speed is based on bandwidth, load (both global and service-based), and latency, it's not the most easy thing to calculate. There is a special ISP technology for performing such measurements; it's basically a stress test. There are different tests for different ISP services. One popular one is called Apache Bench. It is used for measuring an ISP's speed for serving Web pages. Note though that these ISP speed tests are used by ISPs on themselves; using one on an unsuspecting ISP will probably be considered a denial-of-service attack and can potentially get one in legal trouble.
ISP Latency
ISP speed is based in part on latency. In fact, it has an especially huge impact on perceived ISP speed. Latency is the minimum time it takes to perform any network operation, no matter how small. It is partly determined by the distance between one's computer and the ISP server (there are speed of light restrictions, after all). The actual hardware involved at each side of the connection though has a bigger impact. Most consumer hardware tends to have poor latency, and to the person browsing the Web pretty much all the perceived slowness comes from latency.
ISP Load
The load on an ISP will have a direct impact on its speed. If you think of cars as data and street size as ISP bandwidth, load is the amount of traffic in the street. An ISP provider with a light load will be able to serve your data more quickly than one with a heavy load when all other factors are equal. An ISP's load will be mostly determined by the quantity and popularity of its customers. ISPs typically experience their heaviest loads during business hours. Note though that business hours vary around the world, and ISPs with truly international appeal may be under relatively heavy loads all the time.
Server Delivery Rate
Even if an ISP has plenty of bandwidth for its load and low latency, it can still be slow serving Web pages (or e-mail, or whatever). The reason is that each ISP service is handled by a separate program (called a daemon) and an individual daemon can get overloaded. Each daemon can only handle so many requests per second regardless of bandwidth. Basically in addition to the ISP's global load, there's also individual service load. The number of requests an ISP service can handle per second is based primarily on its server software.
When you are browsing the internet, the Internet browser cached some file on the system as temp files for later use. Specially if your are viewing some private but your web browser will store all your information (visited websites) as a history and your co-workers, family members can trace your activates on the internet with clicking of toolbar history button or with simply press Ctrl+H. If your are using internet at any public place like internet cafe then you should clear your temp file history to safe yourself from cyber crimes.
If your are using Internet Explorer and wants to delete the history, then first open your Internet Explorer.
Click on Tools Menu then go to Internet Options. Here in General tab you will find the Delete Cookies and Delete files tab in the center of the screen.
First click on Delete Cookies option to delete all the cookies in the temporary files folder and then click on Delete files option to delete all the offline temporary files.
Now click on the Clear History button to clear your recently visited sites. You can set days to keep pages in history here. Be default it is 20 days, but you can change it from 0 to 99 days. If you set it 1 days, the system will clear your browser history automatically after one day.
Mouse events are the actions that can be performed by using the mouse. Following are the most common events triggered with a mouse.
Left Click
This event occurs when you press the lift mouse button. Windows captures this event and performs different task. Normally this event is used to select a graphical object such as a file icon or to press a button such as the Start button and closing, opening or minimizing an application windows.
Right Click
This event occurs when you press the right mouse button. This event is usually used to display a shortcut menu. The shortcut menu contains frequently used commands that are associated with the selected item.
Up and down Dragging
This event occurs when you press the left mouse button and move the mouse while keeping the left mouse button pressed. This event is used to select more than one item at a time, or to drop and object into another application.
Computer virus program negatively affects the working of a computer by altering user data or information without the permission or knowledge of its actual user. But you can prevent your computer data and resources from viruses, if you follow the given tips and tricks.
Never open unknown e-mail messages, and always scan first all email before downloading even if you know the sender of the message.
You should minimize the data transfer between computers through use of USB drives and MP3 player, if it is necessary then always scan first before open it.
While using the Internet, avoid downloading free ware software without first checking it for virus. Normally the key generator sites are the main source of virus.
Always use antivirus program with latest version, to detect and remove viruses from your system. You should update antivirus program periodically, because older versions of antivirus may not remove the new viruses.
Always keep backup your important data, because your can restore your data using backup if a virus deletes your data or modifies it.
If you want to get some information about any topic using search engine, the search engine will search the given information and will provide a list of links of websites along brief description about each website. You should use the right search terms for relevant results.
The following points must be noted to search the information on the internet.
· You can type all word in lowercase and also in uppercase, search engine will return the same result. But the best practice is type search keywords always in lowercase.
Use + sign between words if you want to search the all words. For example, to search history of Football in Europe, type as:
history+Football+Europe
To search the exact match, write the words in double quotation marks. For example to search the map of Europe, then type as:
"Map of Europe"
Always avoid to use "and", "or" with search keywords, because these words will affect the search result.
When you are downloading any program or file from the internet, for example any antivirus program or an email attachment from your friends. Here you will get a dialog box with three options to Run, Save or Cancel. Basically this is confirmation from a user "Do you want to run or save this file", even you can cancel it to abort the downloading.
Here if you select the Run option, only the setup file is downloaded as temp file in your computer temporary internet folder and your computer run this program setup automatically without your confirmation or virus scanning. This is unsafe for your computer if you are downloading this program from any new or unknown source.
But if you select other option Save, You can save this program on your computer in any location. Now you have the full source of program on your computer, you can scan the all program before open it.
Normally you should select the Save option, if you are downloading this program from any free software sites. You have extra security layer if you save the setup file before run it.
When you are browsing your internet, the website you visit placed some temporary files on your computer. The main purpose of temporary files to save your preferences that you specify for future reference. Normally internet temporary files are saved on C drive in windows folder but you can change the location of temporary folder to hide your internet browsing history from others.
If you are using Internet Explorer then follow the given steps to change the location of temporary folder.
Open Internet Explorer, click on the Tools then Internet Options.
Go to General tab then Settings button under the Temporary Internet Files.
Here click on Move folder button then select new location to save Temporary files on different drive or computer.
Now restart your computer for this change.
Today a special tip for those who are still using any slow dial-up internet connection due to unavailability of any broadband connection in their area. The Web Accelerator application designed to provide the full acceleration for your routine web sites browsing. With the help of Web Accelerator you can browse your internet 4 to 6 times faster than normal dial-up connection. Basically this services compressing the website text data, images and heavy graphics to open or download this data with high speed.
This technique is more useful for static websites and for email applications but don't accelerate with secure and downloading audio or video files. Some good web accelerator retains your system cache to reuse websites with faster speed and can also block windows pop-up. If you are using FTP sites and downloading any program using dial-up, then web accelerator is not for you. There are various web accelerator software are free available on internet, visit and download it to enjoy your connection.If you are visiting a website or reading an e-mail and there is some problem to read text due to color of page or the font too small. You can change the font and color as well to solve this problem.
To increase or decrease your font size and color of webpage in Internet Explorer, select the Tools option from the top of your Explorer window and go to the Internet options.
Here go the General option and then click on Accessibility button on right lower of the dialog box.
Now change the status of checkbox marked "Ignore font sizes specified on Web pages" and next Ignore Colors specified on Web pages", end with Ok.
For change the font size select to View option from the top menu and go to Text size option to change it.