Monday, November 28, 2011

Windows unable to connect to the select Network.

windows is unable to connect to the select network. the network may no longer be in range. please refresh the list of available networks, and try to connect again
"Windows is unable to connect to the selected network." The network may no longer be in range. Please refresh the list of available networks and try to connect again." Your in range of the network (right in the same room as the wireless access point). And when you refresh the list, the network still shows up there.

One possibility is that the wireless network is set to use shared authentication. The Windows XP wireless service assumes that all the WAPs it detects use open authentication. With shared authentication, you have to know the key (password) set by your friend on the WAP. Here's how to configure your computer to connect to a network that uses shared authentication:

Click Start | Connect to | Show All Connections.
Double click the icon for your wireless network adapter.
Click the General tab, then click the Properties button.
Click the Wireless Networks tab.
Click the Add button.
Enter the SSID (network name) that's set in the network's WAP.
Under Network Authentication, select Shared.
Uncheck the checkbox that says "The key is provided for me automatically."
In the Network Key box, type the key set on the WAP, and type it again in the Confirm Network Key box.
Click OK.
This should allow you to connect to your the wireless network.


Thursday, November 24, 2011

Cann't Access Account Yahoo?

Your Account Still lock temporaly ? I confusing because i can not reset my password by forgot, I had long time wasn't access my account. Please any body can help me.....

Protect Folder Files

The below steps for encrypting the files on Windows XP professional applies to users who are using a computer that has different accounts. If you're using a single account for all users who use the computer you will need to see the below other security solutions section.
  1. Select the folder you wish to encrypt.
  2. Right-click the folder and click Properties.
  3. Click the Advanced button.
  4. Check "Encrypt contents to secure data" option.
  5. Click Apply and then Ok.
Encrypt contents to secure data is grayed out
This will be grayed out if you're using the home edition of Microsoft Windows XP. See the below steps for securing the contents of your folders in Windows XP home.
Show "Encrypt" on the context menu
The newest version of TweakUI also enables you to show the Encrypt option in the context menu. To do this, follow the below steps.
  1. Open TweakUI.
  2. In the TweakUI window, select Explorer
  3. In the right side of the window under Settings, locate Show 'Encrypt' on context menu and check the box. This option should be below Prefix 'shortcut to' on new shortcuts and above Show 'View workgroup computers' in NetPlaces.
  • I'm missing Show "Encrypt" on the context menu in TweakUI.
Microsoft Windows XP home users
  1. Select the folder you wish to encrypt.
  2. Right-click the folder and click Properties.
  3. Click the Sharing tab.
  4. Check the box Make this folder private
  5. Click Apply and then Ok.
Make this folder private is grayed out
In order for this option to work in Microsoft Windows XP home you must meet the below requirements.
  1. The hard disk drive must be formatted in NTFS and not FAT32 File System.
  2. The folder you're attempting to encrypt must be in your own personal folder. For example, if your name is bob, you must be encrypting a folder that is or that is contained within the below folder:

    C:\Documents and Settings\Bob\

    You cannot encrypt any folders outside of this folder. If you wish to encrypt outside this folder see the below other security solutions.
Other security solutions for protecting your files and folders in Windows
File and folders not frequently used
If you need to password protect files or folders that you do not frequently use, one of the simplest ways is to compress the folder and files with a compression utility and password protect the compressed file. However, each time you wish to work or modify the files you will need to uncompress the files using the password.
Windows ME and Windows XP users - Microsoft Windows ME and Windows XP come with their own compression utility. This utility can also be used to compress and password protect files.
Tip When a file is compressed, users can still view a listing of the files in the compressed file. If you wish for both your file names and the contents to be hidden, move all the files into a single folder and password protect that folder.  
File and folders frequently used or accessed
If you need to password protect or encrypt data you frequently use, you will need to install a third-party program that will enable you to protect your files and folders. Below are some free and commercial solutions.
  • AxCrypt - An excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a passphrase (password) is known.
  • WinCry - A freeware utility that enables your files to be encrypted, secure deletion, as well as other helpful methods of protecting your files.
  • Folder Guard - A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.
Click here to search for more solutions to password protect files and folders in Windows.
Things to remember when encrypting or password protecting files and folders
  1. There is no such thing as a 100% protected file. There are numerous tools, utilities, and instructions for how to break a lot of the encryption and passwords on files. However, the protection methods listed above will protect your files from the majority of users who may encounter them. If you're working with really sensitive data we suggest a commercial product for protecting your files and data.
  2. Even though a file or folder may be password protected it still can be deleted (unless the program supports the ability to protect files from being deleted). Always remember to backup all your files, even those protected by passwords.
  3. If you forget the password, unless you're willing to spend the time attempting to break it or pay someone else to break the password, all your file data will be lost. Unless you've made a backup of the non-password protected data.

Monday, November 21, 2011

Unrecognized Database Format

Possibility 1: You are opening a later Access database in an earlier version, such as trying to open an Access 2000 database from Access 97.
Open the database in the newer version of Access it was developed or convert the database to the older version.
How to Convert database to previous version in Access 2000/XP/2003
Converting a database in Access 2000 or above to a previous version, will allow a database to work with an older version of Access. Of course, there is a catch! You need to have the newer version of access in order to convert backwards i.e. you can convert back, but obviously not forwards!
The screenshot below shows the menu option in Access XP for converting databases to Access 97, 2000 or 2002. If you need to convert your database tables to Access Version 2.0, this is also possible but more difficult! See the Microsoft Knowledge Base Article Q141886 - 'How to Create a Version 2.0 Database Using Access 95/97'.
Possibility 2: Your Access database may be corrupt or damaged!
Access database corruption is unfortunately, very common. But even if you don't have a backup copy of your database there are companies like us that specialize in recovering your data back when all else fails.
If you suddenly get the 'Unrecognized Database Format' error message for no apparent reason, the chances are very high the database is actually corrupted. This error message will PREVENT you from opening Microsoft Access and invoking its built-in 'Compact and Repair Database' option (see screen shot above).
If at all possible, restore from a backup if this will not cause too much grief.
Don't have a backup? We recommend Downloading Access Autopilot now to Automatically Compact and Backup your Access database .... get a 30 day FREE trial and you'll never be in this position again! (N.B. Its also got a neat admin feature that will help identify the computers that may have caused the corruption).
So because you can't open the database, you can't run the built-in repair right? Correct, but there may be another solution. Check out the resources below for further tips on repairing corrupt access databases and we recommend lodging your database for a 3HR Free Recovery report.
DataRevive engineers spend all day recovering data from damaged Access databases like yours and in 92% of cases we can get the critical tables back!

Sunday, November 20, 2011

Why should be NVDIA GeForce?

GeForce is a brand of graphics processing units (GPUs) designed by Nvidia. As of 2009, there have been eleven iterations of the design. The first GeForce products were discrete GPUs designed for use on add-on graphics boards, intended for the high-margin PC gaming market. Later diversification of the product-line covered all tiers of the PC graphics market, from cost-sensitive, [1] motherboard-integrated GPUs to mainstream, add-in, retail boards. Most recently, GeForce technology has been introduced into Nvidia's line of embedded application processors, designed for electronic handhelds and mobile handsets.
With respect to discrete GPUs, found in add-in graphics-boards, Nvidia's GeForce and AMD's Radeon GPUs are the only remaining competitors in the high-end market.
Along with its nearest competitor, the AMD (ATI) Radeon, the GeForce architecture is moving toward GPGPU (General Purpose-Graphics Processor Unit). GPGPU is expected to expand GPU functionality beyond the traditional rasterization of 3D graphics, to turn it into a high-performance computing device able to execute arbitrary programming code in the same way a CPU does.

GeForce 256 
Launched on August 31, 1999, the GeForce 256 (NV10) was the first PC graphics chip with hardware transform, lighting, and shading although 3D games utilizing this feature did not appear until later. Initial GeForce 256 boards shipped with SDR SDRAM memory, and later boards shipped with faster DDR SDRAM memory.
GeForce 2 Series 
Launched in April 2000, the first GeForce2 (NV15) was another high-performance graphics chip. Nvidia moved to a twin texture processor per pipeline (4x2) design, doubling texture fillrate per clock compared to GeForce 256. Later, Nvidia released the GeForce2 MX (NV11), which offered performance similar to the GeForce 256 but at a fraction of the cost. The MX was a compelling value in the low/mid-range market segments and was popular with OEM PC manufacturers and users alike. The GeForce 2 Ultra was the high-end model in this series.
GeForce 3 Series 
Launched in February 2001, the GeForce3 (NV20) introduced programmable pixel shaders to the GeForce family. It had good overall performance and shader support, making it popular with enthusiasts although it never hit the midrange price point. A derivative of the GeForce3, NV2A, was developed for the Microsoft Xbox game console.
GeForce 4 Series 
Launched in February 2002, the high-end GeForce4 Ti (NV25) was mostly a refinement to the GeForce3. The biggest advancements included enhancements to anti-aliasing capabilities, an improved memory controller, a second vertex shader, and a manufacturing process size reduction to increase clock speeds. Another "family member," the budget GeForce4 MX, was based on the GeForce2, with a few additions from the new GeForce4 Ti line. It targeted the value segment of the market and lacked pixel shaders. Most of these models used the AGP4x interface, but a few began the transition to AGP8x.
GeForce FX Series 
Launched in 2003, the GeForce FX (NV30) was a huge change in architecture compared to its predecessors. The GPU was designed not only to support the new Shader Model 2 specification but also to perform well on older titles. However, initial models suffered from weak floating point shader performance and excessive heat which required two-slot cooling solutions. Products in this series carry the 5000 model number, as it is the fifth generation of the GeForce, though Nvidia marketed the cards as GeForce FX instead of GeForce 5 to show off "the dawn of cinematic rendering".
GeForce 6 Series 
Launched in April 2004, the GeForce 6 (NV40) added Shader Model 3.0 support to the GeForce family, while correcting the weak floating point shader performance of its predecessor. It also implemented high dynamic range imaging and introduced SLI (Scalable Link Interface) and PureVideo capability (integrated DVD Video decoder, eliminates the need for software video decoders).
GeForce 7 Series 
The 7th generation GeForce (G70/NV47) was launched in June 2005 and was the last video card designed for AGP bus. The design was a refined version of GeForce 6, with the major improvements being a widened pipeline and an increase in clock speed. The GeForce 7 also offers new transparency supersampling and transparency multisampling anti-aliasing modes (TSAA and TMAA). These new anti-aliasing modes were later enabled for the GeForce 6 series as well. The GeForce 7950GT featured the highest performance GPU with an AGP interface in the nVidia line. This era began the transition to the PCI-Express interface.
A modified version of GeForce 7800GTX called the RSX 'Reality Synthesizer' is used as the main GPU in the PlayStation 3 from Sony.
GeForce 8 Series 
Released on November 8, 2006, the 8th generation GeForce (G80 originally) was the first ever GPU to fully support Direct3D 10. Built on a brand new architecture, manufactured in 80 nm, it has a fully unified shader architecture. Originally just the 8800GTX, the GTS was released months into the product line's life, and it took nearly 6 months for mid-range and OEM/mainstream cards to be integrated into the 8-series. The Die-shrink down to 65 nm and a revision to the G80 design, codenamed G92, were implemented into the 8 series with the 8800GS, the 8800GT, and 8800GTS-512. First released on October 29, 2007, almost one whole year after the initial G80 release.
GeForce 9 Series / GeForce 100 Series
The first product was released on February 21, 2008.[4] Not even four months older than the initial G92 release, all 9-series designs, both currently-out and speculated, are simply revisions to existing late 8-series products. The 9800GX2 uses two G92 GPUs, as used in later 8800 cards, in a dual PCB configuration while still only requiring a single PCI-Express 16x slot. The 9800GX2 utilizes two separate 256-bit memory busses, one for each GPU and its respective 512MB of memory, which equates to an overall of 1GB of memory on the card (although the SLI configuration of the chips necessitates mirroring the frame buffer between the two chips, thus effectively halving the memory performance of a 256-bit/512MB configuration). The later 9800GTX features a single G92 GPU, 256-bit data bus, and 512MB of GDDR3 memory.[5] Prior to the release, no concrete information was known except officials claiming the next generation products having close to 1 TFLOPS performance while the GPU cores still being manufactured in the 65 nm process, and reports about Nvidia downplaying the significance of Direct3D 10.1.[6] On March 2009, several sources reported that nVidia had quietly launched a new series of its flagship GeForce products, designated GeForce 100 Series, which consists of rebadged 9 Series parts.[7][8][9] The only official source of information on GeForce 100 Series at this time is "nVidia GeForce Family" web page and corresponding product pages.[10] According to this web page, GeForce 100 products are not available for individual purchase.
GeForce 200 Series / GeForce 300 Series
Based on the GT200 graphics processor consisting of 1.4 billion transistors, the 200 series was launched on 16 June 2008.[11] The next generation of the GeForce series takes the card-naming scheme in a new direction, by replacing the series number (such as 8800 for 8-series cards) with the GTX or GTS suffix (which used to go at the end of card names, denoting their 'rank' among other similar models), and then adding model-numbers such as 260 and 280 after that. The series features the new GT200 core on a 65nm die.[12] The first products were the GeForce GTX 260 and the more expensive GeForce GTX 280.[13] The GeForce 310 was released on November 27, 2009, which is a rebrand of GeForce 210.[14][15]According to Nvidia, the naming for the 300 series will be allocated for DirectX 10.1 compatible GPU rebrand in the future.
GeForce 400 Series / GeForce 500 Series
Nvidia announced[16] and released[17] the GeForce GTX 470 and GTX 480, the first cards based on the new Fermi architecture codenamed GF100, and the first to utilize 1GB or more of newer GDDR5 memory. They were released on April 7, 2010. Later that year, Nvidia introduced the GeForce GTX 465 as a cutdown, cheaper version of the GF100 chip to target at mainstream users. The GTX 465 was quickly replaced by the GTX 460, based on the GF104 architecture, which featured lower power consumption and better performance. Soon after, Nvidia released mainstream versions of Fermi architecture, also known as GF106 and GF108, for consumers as well as OEMs. NVIDIA also released a flagship GPU based on a revised GF100 architecture (GF110), called the GTX 580, that featured higher performance/power efficiency than the GTX 480. Nvidia also recently released two updates to the GTX470 and GTX460, the GTX570 and GTX560 Ti, both of which also feature better performance than their predecessor. They have now phased out the GTX480 and GTX470, while keeping the GTX460 in production as a lower budget high end card. Then came the GTX590, a combination of 2 GTX 580's on one single card. The GTX 590 is Nvidia's most powerful graphics card to date. Search: NVIDIA GeForce, Why should be NVIDIA GeForce, VGA NVIDIA GeForce

Friday, November 18, 2011

System Restore Windows 7

System Restore

Ever wish you could turn back the clock after a bad crash? With Windows, you can.
Sometimes installing a program or driver can make Windows run slowly or unpredictably. System Restore can return your PC's system files and programs to a time when everything was working fine, potentially preventing hours of troubleshooting headaches. It won't affect your documents, pictures, or other data.
In Windows 7, you can create more system restore points and see exactly what files will be removed or added when your PC is restored. For more information, see Create a restore point.
For more protection, use System Restore with Backup and Restore, which is designed to help safeguard email, pictures, documents, and other personal files.

To use System Restore

Before you start System Restore, save any open files and close all programs. System Restore will restart your PC.
  1. Open System Restore by clicking the Start button Picture of the Start button. In the search box, type System Restore, and then, in the list of results, click System Restore. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. Follow the steps in the wizard to choose a restore point and restore your computer.
Picture of System Restore System Restore in Windows 7 can prevent hours of troubleshooting headaches after a crash.

Wednesday, November 16, 2011

Anatomy of Viruses

What is a computer Virus and how do they work?
Viruses can create a technological holocaust for millions of computers around the world. Businesses fret over the potential for a catastrophic meltdown of networks. Individual consumers worry about zapping their computer's hard drive simply by clicking the wrong e-mail attachment. Experts say such worries are well-founded, but emphasize that a combination of the latest anti-virus software and common sense will drastically reduce the odds of being infected. The cost of not taking such precautions can be high.
How they work, and what to look for.
Dreaded computer viruses, you hear all about these nasty nasties, but do you really know what they are and what havoc they can wreak? The mere thought conjures up devastation and turmoil and can get your imagination rolling. Tall tales, such as the Good Times Virus and other hoaxes, have made it hard for most of us non-anti-virus researchers to determine fact from fiction.
The following description seeks to get to the bottom of just what viruses are, how to avoid infestation, how to determine if you've caught one, and what to do if you have.
In the simplest of terms, a virus is a computer program that reproduces itself and attaches that copy to other computer programs. It does so in such a way that its instructions (viral code) are carried forward when the infected program is launched or when an infected disk is left in the disk drive and allowed to boot. The most troubling part about this is that it is done without the consent or knowledge of the computer user.
Viruses can be as benign as a minor case of acne, such as those that display pleasant or annoying messages, or as malignant as a full spread disease, such as those that destroy your data files and system.
Rest assured, only a small percentage of viruses are of the latter type. In fact, there are nearly 20,000 known viruses for the PC (There are a lot less Mac viruses.) of which only 500 are currently "in the wild" (circulating on unsuspecting computers). Of that, only 20-50 are known to cause serious damage. For more information on the prevalence of viruses, visit http://www.virusbtn.com/WildLists.
All viruses follow pretty much the same course of action. When the virus code is run it reproduces and infects other programs. When it starts to spread is usually a characteristic of that particular virus. Some infect each time they are run. Other more tricky ones infect when triggered by a certain time, date, function, or other external event.
Then some have an attack phase, otherwise known as a "payload," associated with them. A payload is the damaging effect of the virus that runs the gamut from deleting files or randomly changing data on your disk to playing music or creating messages or animations on your screen. When the virus inflicts its damage is also characteristic of the particular virus.
But most delay doing so only until after they've had time to spread. Some are written to spread only which is bothersome as well because they take up space and slow down your system.
A graduate student at MIT, as part of a controlled experiment he was conducting, wrote the first virus in 1986. A year later, hackers caught on and began writing and spreading viruses. By 1990-1991 the number of viruses found in the wild started to flourish. There are several types of viruses: Boot Sector, File, Macro, Polymorphic, Stealth and Resident viruses. Some viruses can possess characteristics of more than one of these types.
"Many people will get a virus at one point or another, and some of them will be harmed by it," said Bruce Peters, a anti-virus and data recovery expert. "Some will lose data, some will suffer no damage other than the time, effort, and stress it takes to remove the virus. Some will spread the virus to others and damage the most valuable thing: their reputations."

Anatomy of a Virus
Though most computer users have learned to fear viruses, few really know what they are. Viruses are programs that replicate themselves inside a computer. The malicious bug cannot do its damage when a user simply surfs the Web or opens a plain text message such as an e-mail. However, viruses are unleashed when they are hidden in attachments to e-mail messages and someone opens that attachment. After viruses replicate, many carry out damaging instructions that have been programmed into them.
The Melissa virus from March 1999 is a good example of how viruses inflict damage. Melissa lurked inside an e-mail Microsoft Word attachment. The person who received the message had no reason to suspect anything dangerous; in fact, the e-mail's subject line appeared to be from someone the recipient recognized.
However, once the recipient clicked on the attachment, Melissa fused itself to a Word object and began rifling through the poor victim's address book. Soon, Melissa was e-mailing tainted attachments to the first 50 names in the recipients address book.
"Some viruses do nothing except replicate," Peters said. "Some will do damage, but not intentionally. Then again, there are those that attempt - and sometimes succeed - in destroying all files on the computer, or subtly altering data in documents, or whatever nasty thing you can conceive that a computer program is capable of doing."
To make matters worse, those who create viruses continually add new twists to their method of attack. Late in June, the Stages virus struck. Before Stages, computer users were assured that viruses could not be spread through text files. So, when Microsoft Outlook users saw an attachment that appeared as "LIFE_STAGES.TXT," many figured it was safe to open. When they did so, a humorous test file about dating appeared.
What users didn't realize was that the attachment was not a text file but had a hidden .SHS extension, which meant it contained infected computer code. Soon, the virus was on the loose and e-mailing itself to everyone in the recipient's address book.
Peters hopes the recent wave of high-profile viruses will cause lawmakers to treat the problem as the potentially serious crime that it is. However, he said the war on this scourge requires vigilance.
"Yes, we'll become more successful overall," he said. "But yes, things will get worse, too: my prediction is that while more viruses will be prevented on a percentage basis, there will always be a few high profile successes by the virus writers.
"Those successes, however, will be short-lived, because anti-virus companies will be quick to create a solution to each new threat."

Sponsor Link

Popular Posts

Sponsor Link