Hearty Welcome to Our Computer Safety Tips Website!

Try it free today!(projects and save a lot of money)

Outsourcing is the process of subcontracting network operations and support to an
organization outside your own company. Try it free today! Web Development doesn't have to be expensive.
Outsourcing will cut your expenses by more than 50%. Outsourcing is hiring an outside organization to perform services such as information processing and applications development. Our mission is to find the best possible workers at the best possible price. helps webmasters, web designers, programmers, software developers and business owners to develop .
projects and save a lot of money. Getting affordable freelance work, freelancer your choice programing and custom web design done for your website has never been easier.

Our site is global and we have freelancers from India, Romania, Russia, Ukraine, United States, UK and many other parts of the world. We have thousands of satisfied clients
around the world. Buy services with help from our secure escrow system.
and translator. We provide a safe escrow environment and you don't release the money until project is completed



Audio Services

Banner Design


Cold Fusion

Copy writing

Data Entry

Data Processing





Graphic Design

Handhold / PDA





Legal Advice

Link Building


Logo Design

Market Research




Project Management



Script Installation


System Ad min.




Virtual Reality

Visual Basic

Web Promotion

Website Design

Website Security




Keep Your Data Safe Behind a Firewall

Computer viruses! Worms! E-mail viruses! Trojan Horses! The media is always full of stories about computer viruses infecting computers all over the world, or companies scrambling to fix security holes in their software by releasing security updates. What can businesses or individuals to protect their computer? Installing a firewall may be one answer.

What is a firewall?
1]At its most basic level, a firewall acts as a barrier between your home network and the Internet. Just like a physical firewall was designed to stop fire spreading to certain parts of a building, a software firewall is designed to prevent viruses and out harmful software from spreading from the Internet onto your home network.

2]The firewall itself is a piece of software that is usually run by a piece of hardware like your cable modem or router. That way it can act as the first line of defense for your home network. I

3]f the firewall was only contained on your own computer, if you have other computers set up on a wireless network it would not be able to protect them.

4]The firewall’s primary function is to act as a gateway for all Internet traffic coming into your home network. Whenever the firewall receives any traffic, also known as a network packet, it will first analyze its contents to make sure it is safe.

5]If the firewall determines that the traffic is not dangerous, it will redirect it to your computer.

The Importance of Having a Firewall
1]While the first computer viruses were transported from computer to computer by floppy disks, computer viruses today can cover the globe in the blink of an eye over the Internet.

2]And they’ve probably made it to your computer. You have likely had to deal with the consequences of spy ware and other malicious programs that had have crawled onto your computer while you were browsing the Internet.

3] And as a consequences, you’ve probably spent hours and hours trying to get rid of all the spy ware and other malicious programs that have taken up residence on your computer.

2]Even if you think your computer is virus free, you are probably wrong. That is why spy ware and viruses are so dangerous; you could be using your computer with no idea that they’re there.

4]Firewalls Will Protect your Computer
A firewall puts a wall between your home network and the Internet. Just like a real firewall keep fire from spreading from one area to another, a software firewall tries to keep computer viruses from spreading from the Internet onto your home computer or home network.

5]The firewall itself is a piece of software that is usually run on your router or cable modem. By attaching itself to this hardware, the firewall is the first thing any incoming traffic from the Internet meets.

6]The firewall’s job is to act to filter all of the traffic from the Internet that comes onto your home network. Whenever a network packet tries to come onto your home network, it has to make it by the firewall first. The firewall will analyze the packet to make sure it isn’t a viruses or some other undesirable communication.

7] If the firewall gives it the all clear, it will let the packet continue on its journey to your home network.

How does a firewall works
1]How does the firewall determine what traffic is safe and what traffic is dangerous? The first way is user-defined parameters. You could, for instance, block traffic from specific IP addresses or Internet domains. However, this is of only limited use, since you can’t be expected to keep track of and list the thousands and even millions of sites on the Internet that could harm your computer.

2]More useful is the work the firewall can do itself by screening incoming traffic to make sure it corresponds to the kind of traffic you would want to receive. For instance, while the firewall would let traffic sent from a website through to your computer, it would block someone trying to log on to your computer remotely.

3]Connecting your computer will always expose your home network to some risk, no software or hardware can remove the problem completely. By using a firewire, however, you can limit the risk to a large extent and allow you to use the Internet without worrying about infecting your home computers.

How does a Firewall Know what Traffic is Good?
1]The firewall will use user-defined parameters and automatic parameters to decide whether the traffic should be let through or la belled dangerous and blocked. As the user, you could configure the firewall to block all traffic coming from a specific IP address. Obviously, you won’t be able to do this for all the malicious sites on the Internet – this list would be far, far too long!

2]For this reason, the firewall will automatically screen incoming traffic to make sure it corresponds to the kind of traffic you would want to receive by running it through a set of predetermined parameters. For instance, the firewall will usually let traffic sent from a website through to your computer, but it will not let someone remotely login to your computer.

3]No matter what software or hardware you use, you will always be putting your computer at risk when you connect it to the Internet.

4]You can limit this risk as much as possible, however, by using a firewall. A firewall will let you access all the wonderful resources of the Internet without staying awake all night worrying about your home network.

Spam Control Solutions

Approximately 98% of all email is spam. To most people that’s a frighteningly huge number, but also makes sense to most of us given all the garbage that flows into our inboxes.When I talk with clients about spam, their number one request is “Make it go away.” People just don’t want to ever see it, let alone have to deal with it. Sure it’s a nuisance, but what effect can it really have on the bottom line?

Studies have shown that the average computer user will spend 20-40 minutes each day dealing with spam. For a small business with just 15 employees, that would equate to 7-1/2 hours of lost productivity each and every day. It’s like having nearly one full-time employee on staff just to deal with spam. How would that look on the bottom line?

This number doesn’t even take into account the other destructive things that spam can bring along with it like viruses, trojans, worms, hijacks and phishing. If any of these make it through, it could cause untold amounts of damage in terms of lost productivity and cost for repairs.One important fact to understand is that spam cannot be 100% eliminated, no matter what hardware and software you install. However, with the right solution, spam can be dramatically reduced, practically eliminating its negative effect on productivity.

So what options do businesses have? There are basically three choices when dealing with spam: control by the hosting provider, control on each individual computer, or a custom solution that specifically addresses the needs of all users.

Spam Control by the Email Hosting Provider
1]Typically email hosting providers offer some sort of spam control which is either ON or OFF. ON means you never see any of the messages the host determines as spam. OFF means you get everything.

2]The main problem with this type of control is that there are too many “false positives.” A false positive occurs when a legitimate email gets marked as spam and is deleted before the recipient ever gets to see it. Some examples of false positives are occur in email blasts (for example, “Your bank statement is ready” or “You have an invoice”), or html-based or graphic-rich emails.

3]Because the recipient never gets to see it, he or she cannot control it at a granular, or individual email, level.

Spam Control on Each Individual Computer
1]On an individual computer, there is software available for Microsoft Outlook and other email programs that controls spam at a more granular level.

2]This level of control is fine for a single computer, but not a good solution for multiple computers.

3]The difficulty with this approach is that each user is responsible for determining what spam is. Imagine the labor that is duplicated with an office of 10, 20 or 50 people all managing the same spam, but doing it individually.

4]You can see how the wasted time can add up in a hurry.

5]So what is the best possible solution? Stopping this stuff from ever getting to the computer in the first place.

A Custom Solution Creates the Ideal Spam Control
1]The ideal spam control setup is a custom solution comprised of three main components: an Exchange Server, a Firewall, and an Email Filter.

2] These can be configured to address the needs of all users while also protecting the company. (Please note that for this article I will use the term “Exchange Server.” Microsoft also builds a Small Business Server, of which Exchange is a part. A qualified IT consultant should be able to help you decide which solution is best for your business.)

3]For any businesses of at least five users or more connected to the Internet, you must start by having an Exchange Server. An Exchange Server stores messages and effectively manages the processing of incoming and outgoing emails.

4] An Exchange Server also adds other benefits like providing Outlook Web access for increased productivity, and allowing users to share contact information and calendars with others throughout the network.

5]For an Exchange Server to operate optimally, connectivity has to be persistent (consistent?), or always up. To get this type of connectivity, a T-1 line is the best connection.

6]Next, you must have a Firewall. We recommend a Unified Threat Management Appliance (UTM) which is a hardware firewall and then some.

7]To turn a plain firewall into a UTM, it is necessary to add security software at your gateway, or the “front door” where your network connects to the Internet. This software includes anti-spyware, anti-virus, intrusion prevention, and standard content filtering software.

8]This complete Firewall solution basically builds a “wall” which secures the entire network, effectively stopping viruses and other destructive programs from finding their way in via attached files and emails. It also is configured to prevent dubious websites from putting spy ware, aware and other things on your computer which can dramatically slow down performance.

9]Once the network is secure, the next step would be to add an Email Filter appliance, which is hardware that allows you to set granular level filtering for the entire network.

10]The email filter will allow you to set characteristics ONCE for the network, and it can even learn preferences of your users over time (if you choose).

11]Also, this filter adds valuable anti-phishing capabilities, protecting your company and employees at a much deeper level by keeping scam artists away from financial data and confidential information.

12]This setup takes the responsibility away from employees to manage spam on their own, and immediately increases productivity for each employee. Bottom line benefits can be seen right away, and for most companies, a measurable return on investment can be achieved in a few months.

You Can Control Spam
1]After reviewing these solutions, clients often say, “You can really make all of these problems go away?” The answer is YES, but the best solution for each business does not lie in an “off-the-shelf” or canned package.

2]The best solution is a custom solution, including a thorough analysis leading to a phase-in plan of the appropriate hardware and software over a period of a few months. This approach also allows the business to smooth the financial investment (which will vary) over the implementation timeframe.

3]Jim Kerr is President and Founder of CRU Solutions, which is celebrating their 25th year in business, and 15th year as an Intel partner.

4]CRU is a comprehensive IT systems solution provider of exclusive, industry-leading hardware, software, connectivity, expertise and a unique approach to customer service. CRU’s intelligentTM brand of desktops, laptops and servers are custom built in Northeast Ohio exclusively with matched Intel components. You can reach Jim Kerr directly at jim.kerr@crusolutions.com. Additional information is available at

Natural Keyboard shortcuts You can use the following keyboard shortcuts with a Microsoft Natural Keyboard or any other compatible keyboard that includes the Windows logo key and the Application key.

Shortcut Keys Function
Windows logo key +BREAKDisplay
or hide the Start menu.
Windows logo key +D
Display the System Properties dialog box.
Windows logo key +M
Minimizes all Windows and shows the Desktop
Windows logo key +E
Minimize or restore all windows.
Windows logo key +F
Open My Computer.
Search for a file or folder.
Windows logo key +F1
Search for computers.
Windows logo key +L Locks the desktop
Display Windows 2000 Help.
Windows logo key +R
Open the Run dialog box.
Windows logo key +TAB
Switch between open items.

Display the shortcut menu for the selected item.
Windows logo key +U
Open Utility Manager

Accessibility Options keyboard shortcuts
Shortcut Keys Function

Right SHIFT for eight seconds
Switch Filter Keys on and off
Switch High Contrast on and off
Switch MouseKeys on and off
SHIFT five times
Switch Sticky Keys on and off
NUM LOCK for five seconds
Switch Toggle Keys on and off
Windows logo key +U
Open Utility Manager
If your mouse is unavailable or if you prefer using your keyboard, you can use the following keyboard commands to navigate within the Help Viewer. To expand the headings below using the keyboard, press F6 to switch from the Help navigation pane to the topic pane. Press TAB to select the desired keyboard shortcut heading, and then press ENTER to expand the listing.
Shortcut Keys
Display the system menu.
Display the Help Viewer shortcut menu.
Switch between the Help Viewer and other open windows.
Display the Options menu.
ALT+O, and then press T
Hide or show the navigation pane.
Switch to the next tab in the navigation pane.
Switch to the previous tab in the navigation pane.
Move up one topic in the table of contents, index, or search results list.
Move down one topic in the table of contents, index, or search results list.
Move up one page in the table of contents, index, or search results list.
Move down one page in the table of contents, index, or search results list.
Switch focus between the navigation pane and the topic pane.
ALT+O, and then press R
Refresh the topic that appears in the topic pane.
Scroll through a topic.
Move to the beginning of a topic.
Move to the end of a topic.

Highlight all text in the topic pane.
ALT+O, and then press P
Print a topic.
ALT+O, and then press B
Move back to the previously viewed topic.
ALT+O, and then press F
Move forward to the next (previously viewed) topic.
Close the Help Viewer.
Contents tab keyboard shortcuts Shortcut Keys Function
Display the Contents tab.
Open a book.
Close a book.
Return to the previous open book.
Select a topic.
Display the selected topic.
Index tab keyboard shortcuts Shortcut Keys Function
Display the Index tab.
Select a keyword in the list.
Display the associated topic.
Search tab keyboard shortcuts Shortcut Keys Function
Display the Search tab.
Start a search.
Display the selected topic.
Favorites tab keyboard shortcuts Shortcut Keys Function

Display the Favorites tab.
Add a topic to the Topics list.
Select a topic in the Topics list.
Remove a topic from the Topics list.
Display a topic from the Topics list.
Customizing Shortcut Keys
Shortcut key combinations make it easier to complete common tasks. For example, Carl+C allows you to quickly copy a selected item to the clipboard. You can select from a predefined list of mappings, such as Visual Studio 6.0, or you can create own unique mapping.

To select a predefined mapping
1]On the Tools menu, select Options.
2]In the Options dialog box, open the Environment folder, and choose Keyboard.
3]In Keyboard mapping scheme drop-down list, select the scheme you want to use.
If you want to create custom mapping scheme, you will get the best results, by basing the new scheme on an existing scheme. Whereas system shortcuts in default keyboard mapping schemes cannot be modified, custom mapping schemes can.

To create a custom mapping scheme
1]On the Tools menu, select Options, open the Environment folder, and choose Keyboard.
2] On the Keyboard page select a Keyboard mapping scheme and then choose Save As to create a mapping scheme that you can customize.
3] In the Save Scheme dialog box, type a name for your new scheme.
Note :Until modified, custom keyboard mapping schemes retain the shortcut assignments of the scheme on which they were based.

4]On the Tools menu, select Options, open the Environment folder, and choose Keyboard.
5] On the Keyboard page select a Keyboard mapping scheme.
6] In the Show commands containing text box, type a command-related keyword to locate the command you want in the list box.
For example, if you want to create a shortcut that opens a new solution, you might type "solution" in this text box.
7]In the scrolling list box, select the command you want the shortcut to execute.
8] On the Use new shortcut in drop-down list, select the environment in which you want to use the shortcut. Choose Global if you want the shortcut to work in all contexts.
9]Place your cursor in the Press shortcut key(s) text box and then press and hold a non-text key or combination of non-text keys (Alt, ctr l, or Shift, for example) and type the text key of your choice.
10] Choose Assign.
Note: You can overwrite the current shortcut assignment when a custom scheme is selected.

keyboard shortcuts keys

Learning a few useful Keyboard shortcuts doesn't seem like a big productivity booster, but you may be surprised how fast you can perform common tasks once you break the "mouse" habit. This is especially useful when working on a rack mounted server that either doesn't have a functioning mouse, or had an ill conceived trackball. Nothing will elevate your tech status to guru faster than being able to fly through the Windows 2000 menus without ever touching your mouse! One of our Lab Mice actually unplugged his mouse from his PC for a week to force himself to use the shortcut keys!
Note: Some keyboard shortcuts may not work if Sticky Keys is turned on in Accessibility Options. If you are connected to Windows 2000 through Microsoft Terminal Services Client, some shortcuts have changed. For more information, see the online documentation for Terminal Services Client.
Common Keyboard Shortcuts

Shortcut keys(Windows button)
function(Display or hide the Start menu.)

Windows button
Display or hide the Start menu.
Windows button+BREAK
Display the System Properties dialog box.
Windows button+D
Minimizes all Windows and shows the Desktop
Windows button+E
Open Windows Explorer
Windows button+F
Search for a file or folder.
Windows button+F+CTRL
Search for computers.
Windows button+F1
Dsplay Windows 2000 Help.i
Windows button+L
Locks the desktop
Windows button+M
Minimize or restore all windows.
Windows button+R
Open the Run dialog box.
Windows button+TAB
Switch between open items.
Windows button+U
Open Utility Manager
ALT+- (ALT+hyphen)
Displays the Multiple Document Interface (MDI) child window's System menu.
View properties for the selected item.
Cycle through items in the order they were opened.
Close the active item, or quit the active program.
Display the System menu for the active window.
Switch between open items.
ALT+Underlined letter in a menu name
Display the corresponding menu.
View the folder one level up in My Computer or Windows Explorer.
Select all.
Open an item.
Close the active document in programs that allow you to have multiple documents open simultaneously.
CTRL while dragging an item
Copy selected item.
CTRL+SHIFT while dragging an item
Create shortcut to selected item.
Move the insertion point to the beginning of the next word.
Move the insertion point to the beginning of the previous word.
Move the insertion point to the beginning of the next paragraph.
Move the insertion point to the beginning of the previous paragraph.
CTRL+SHIFT with any of the arrow keys
Highlight a block of text.
Delete selected item permanently without placing the item in the Recycle Bin.
Cancel the current task.
Displays Help
Rename selected item.
Search for a file or folder.
Display the Address bar list in My Computer or Windows Explorer.
Refresh the active window.
Cycle through screen elements in a window or on the desktop.
Activate the menu bar in the active program.
Display the shortcut menu for the selected item.
Display the Start menu.
Launches Task Manager
Underlined letter in a command name on an open menu
Carry out the corresponding command.
Open the next menu to the right, or open a sub menu.
Open the next menu to the left, or close a sub menu.
SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document.
SHIFT when you insert a CD into the CD-ROM drive
Prevent the CD from automatically playing.

Good anti virus purchaseTips&Computer Virus

Getting a good anti virus rating before spending your hard earned cash on buying an anti virus is crucially important these days, with the sea of anti virus software available, and with all of them claiming to be the product to end all troubles. However, like they say, there are ratings and there are ratings. How do you get to know if an anti virus or software product rating is genuine, unbiased, and worth wasting your time even considering? Here are 3 quick tips to help you be sure as you use an anti virus rating to get the product you desire.

How many products does it mention and recommend?
This is almost a no-brainier. Some ratings are specifically tailored to sell a specific product, and you can easily notice this if there is just one product recommended by the review/rating agency, while it belittles all others.

However, you have to be a bit careful when making this particular observation as sometimes, a unbiased product reviewer finds that it is just one product out of a couple he is reviewing which fits in with what, in his belief, would make a customer who gets and uses it happy. In a case like this, the reviewer might similarly recommend just one or two products, and you'd still be on the smarter side by listening to him.

Are you going for just one view?
With product ratings and reviews, it is always better to go for what are termed "review of reviews". This type of product rating does not just test and publish reviews, but collates the results of professional tests and ratings, reviews, and consumer
Eports on each particular product to get a more general and unbiased assessment of it. This kind of rating is always much better than one individual or company testing a product and giving just its own personal evaluation of it. also gives you a much less risky recommendation, as too many people cannot be wrong: while, with just one opinion, you might be looking at something written by someone whose tastes/preferences differ considerably from yours; and thus on getting the recommended product, you could be hugely disappointed on discovering that the product is not so superior, and that the reviewer(s) probably just liked some of the features, which are not really important to you.

Do they cite any reputable rating agencies as sources?
With this kind of rating, you can determine just how good the rating or review is by examining the quality of the sources quoted in the piece.

This could be a bit difficult for you to determine, but in the software review category in general, and anti virus reviews in particular, some of the more highly regarded rating outfits are: PC World, PC Magazine, CNet.com, Scott's Newsletter and Federal Computer Week. Others are Computer Shopper of the UK, PC Pro and Amazon.

Ensure that at least some among this list are mentioned as some of the sources for the research material used in writing the report/rating.
These are just 3 tips to ensure you get the best from using a rating before making your anti virus purchase.
Good luck in your purchase!

Computer Virus
In order to understand what a computer virus is, you must first understand what a virus is. It is actually a small organism that can only reproduce within a living cell or body. As such, it is usually harmful to the cell or body in which it lives. This is why a virus can make you sick or cause you to have a disease.

This relates to computers because a computer virus is actually a harmful computer program that can damage your computer's files. It is even possible for it to damage your computer. This is because a computer virus is able to duplicate and spread itself within a computer or computer network. However, you may not even know that your computer has a virus because it can usually hide itself really well within a program, file or document.

So, who would want to create a computer virus? A criminal who creates a computer virus would need to be somewhat talented and have nothing better to do with their time. Their only purpose for creating a computer virus is to cause both trouble and damage.

Today there are many different names that are used to describe a computer virus. The names that are used to describe these various viruses include Macro Viruses, Email Viruses and Trojan Horses. Of course, each of these different viruses has a slightly different description but they all act in very similar ways. Each of these viruses is able to spread through your computer and infect its files and documents. A computer virus can also spread itself throughout the Internet and local computer networks or removable storage devices. However, since the virus is hidden, it is hard to detect and easily spread.
Once a virus enters your computer it can either be very harmful or simply annoying.
What you can do to protect your Computer and important data.

Install Anti virus Software.
What is Antivirus Software - Antivirus or Anti-Virus software is computer program, the roll of antivirus is to protect computer against viruses and worms. This program actively guards computer from getting infected with Viruses and worms, it will stop people trying to heck your computer or stop viruses from deleting important data. The Antivirus software helps in protecting your personal data, corporate data from attacks on your personal computer or on servers. Like taking medicine helps in curing body virus, similarly by installing antivirus software helps in protecting computer and data. Apart from installing Antivirus software you should also install firewall on your computer, this helps stop malicious attack on your computer from people who are looking personal and credit card information, they steel your personal and financial information. Good antivirus software will scan your hard disk for viruses, scan your incoming email attachments and stop pop up ads appearing on screen etc.
If you don't have antivirus software installed on computer, you can buy one of several companies.
Microsoft has product called Windows Live OneCare - Usually starts from $50 per year.
Symantec has Norton product
PC Doctor
Kaspersky Antivirus Personal
Panda Anti-Virus Titanium & Platinum
NOD32 Anti-Virus
Command Antivirus
McAfee Antivirus Virus Scan Online

Computer Keyboarding Safety Tips.

We know that you or your employees or students are going to greatly benefit from our software, but we'd also like to ensure that you are aware of basic keyboarding safety issues. People that start out learning to touch type without a basic knowledge of Occupational Health and Safety Issues put themselves at risk of problems in the long term such as Carpal Tunnel Syndrome and back problems. The following are some basic guidelines that should be followed by not just people learning to touch type, but anyone who uses a keyboard for extended periods. Please consult an Occupational Health and Safety specialist for more complete information.
Sitting at the computer
1)Your feet should not be dangling, but flat on the floor. If this is not possible, a footrest is recommended. Your knees should be slightly higher than your hips.
2)A chair with lumbar support is the optimum arrangement, if this is not available, back cushions can be obtained - even a rolled up towel can offer some support.
3)Your back should be firmly supported by the back rest.
4)Adjust the seat so that you can fit 3 fingers between the front of your seat and the back of your legs
5)When extending your arms to the keyboard, your wrists should be parallel with your elbow, this minimizes strain on the muscles of your arm.
6)The top of your monitor should be level with your eyes, or just slightly below eye level. The monitor should be approximately 50 - 70cm (19" - 27") from your eyes.
7)Rest your wrists and hands when you are not typing, don't keep them in a typing position while reviewing work etc.
8)Use document holders where possible. These should be placed at the same height beside the monitor and the same distance away as the monitor.
9)It is recommended by many health professionals that a mini-break should be taken every 30 minutes for one or two minutes. During this mini-break you should try to focus your eyes on a distant object and carry out gentle stretching exercises. This could be as simple as getting out of your chair and walking a short distance and stretching your neck and arms.

Typist's chairs
1)A good looking chair isn't necessarily the best choice. If possible, your new chair should be fully adjustable i.e., controls for height, swivel, tilt. A gas lift chair is the best choice as it offers some shock absorption.
2)While armrests can be a very attractive option, they can sometimes get in the way while typing. Buy a chair that will at least allow you to remove the armrests.
3)Try and test the chair out in a "real-life" situation i.e. with a desk and keyboard in the showroom and try "air-typing" for a while. Most better office furniture stores will be equipped to allow this. If the chair feels even slightly uncomfortable after sitting in it for a minute, imaging what it will feel like after a couple of hours!
4)Sometimes a chair may look and feel comfortable in the showroom, but after extended sitting may reveal incompatibilities. Before you purchase a chair, enquirer about a returns policy. Good quality stores will give you around 7 days to "test drive" a chair.

Computer Table
1)The best kind of desk is the type with an adjustable keyboard/mouse area. If this feature is not available on your desk, special clip on trays can be purchased.
2)Organize your desk so that your most used pieces of equipment and paperwork are within arms reach.

1)Ensure that the retractable legs on your keyboard are pulled back, allowing the keyboard to lay flat.
2)Use a keyboard with a wrist rest - these can also be purchased separately - these wrist rests really do work and greatly decrease fatigue and strain.
3)Your mouse should fit comfortably and naturally in your hand without any need to move any of your fingers to reach a button.
4)Ensure that the contacts inside your mouse are clean to allow for smooth use
5)Keyboards and mice should be regularly disinfected as they are a breeding ground for all sorts of bacteria.
6)Using the seating guidelines above, your keyboard should be the correct distance from you.

1)Your monitor screen should be regularly wiped over. Fingerprints can cause slight picture distortions that will fatigue your eyes.
2)Even a small amount of glare can cause serious eye fatigue as your vision will be constantly drawn towards the glare.
3)Using the seating guidelines above, your monitor should be the correct distance from your eyes.
4)Most modern monitors allow for various presets. As the light in many office environments will change throughout a day, you should have a preset for morning/midday/afternoon/evening. small pains to follow under tips (A&B)


A: Upper forearm stretch
1. Sit with feet flat on floor.
2. Extend both arms in front of you, palms down.
3. Make a light fist with your left hand, thumb tucked in.
4. Grab hold of knuckles of your left hand so that your right thumb crisscrosses over your left
5. Bending, pull left hand down with your right hand, keeping both elbows straight.
6. Rotate your arms counter clockwise.
7. Rotate your arms clockwise.
8. Open the fingers of your left hand and gently stretch more.
9. Follow steps 1-8 above with the right hand.
Keep your shoulders relaxed.
Keep your shoulders relaxed.


B: Under forearm stretch
1. Sit with feet flat on floor.
2. Extend your lest arm in front of you, palm up.
3. Using the fingers of your right hand, pull left hand down with your right hand, keeping both
elbows straight.
4. Rotate your arms counter clockwise.
5. Rotate your arms clockwise.
6. Follow steps 1-6 above with the right hand.
Keep your shoulders relaxed.

Clean up registry to speed up your pc

The Windows Registry is a system of storing configuration information for computers running the Windows operating system. It keeps all of the settings information for the hardware, software, and user and system preferences for a computer. Using such a system deletes the random storage of INI files scattered throughout the computer. However, in spite of its usefulness, the Windows Registry causes some major problems for many users.

Step:1When you install software, uninstall software, or make any changes whatsoever to your computer that affect the control panel, system policies, file associations, or any of the software already on the system, an entry appears in the Windows Registry. So, the more you use your computer, especially if you're the type of user who makes a lot of changes, the more entries your registry will accumulate.

Step:2As with all information on your computer, registry entries require the use of memory. And, the more entries you have in your registry, the more space the registry takes up. A good number of the entries in the registry are unnecessary and even erroneous. All these entries can slow the system down to a snail's pace. Worse yet, they can cause the system to become unstable and crash.

Step:3While it is possible for users to manually edit the registry, it's far from advisable for all but the expert user. And, even the expert user needs to make a back up of the registry before making any changes. Making an error in editing the registry can render the system unusable, and possibly even irreparable.

Step:4Fortunately, there are things you can do to clean up your registry and speed up your system. There are many third-party registry cleaners available for cleaning up unnecessary and erroneous registry entries. In fact, for a short time, Microsoft even made an unsupported tool called Regclean available to users running any of the Windows 9x systems.

Step:5The older versions of Windows experience more problems with the registry than the newer NT and XP versions do. The newer versions don't crash as easily as the older systems did. However, they are still susceptible to slowing and, with severely affected registries, it is still possible for these versions to crash.

Step:6One situation in which NT and XP systems can benefit from using a registry cleaner is when a computer running Windows 9x is upgraded to NT or XP. When this occurs, the system keeps all the registry entries from the old system "just in case." Although this is meant to guarantee that the upgrade works, it does mean that the new operating system will run more slowly than it should.

Step:7Though there are many registry cleaners out there, they certainly aren't all equal. Some of them aren't even legitimate. There are some cleaners that don't accurately report the number of entries that could be removed. Some of them show numbers that just don't add up when the program is run back-to-back.

Step:8For example, you might run it the first time and come up with 600 errors, which the program will claim to clean up. If you then run it again immediately, it might report that there are still 300 errors, and the third time it might show 400 errors. In other words, it's either not cleaning up anything, it's not accurately identifying errors, or it's inflating the numbers to make you think it's doing some good.

Step:9To ensure you're purchasing a registry cleaner that's worth the money you're spending, take the time to do some research. Check out review sites and look for software sold by reputable companies. Don't be drawn in by free trials or outlandish claims.
Use this option before be care full good luck and enjoy your system.

How to Choose a Secure Password

Choosing a safe password is the key to protecting your computer data and/or your online activities.Here are some tips for choosing and managing your passwords.

Do NOTs:

- Do NOT use a password which is the same as your login or screen name. Most hackers try this first!

- Do NOT use your girlfriend/boyfriend/partner's name. Most hackers try this second. You are especially vulnerable if you partner happens to have a common name…

- Do NOT use an easily guessable piece of information about you (like part of your AOL or online profile) as your password

- Do NOT use a common English word as you password. Preferably do NOT use a English word at all. Hackers have access to dictionaries, and automated programs can work through these dictionaries, trying every single word!

- Do NOT use a sequence of keys on your keyboard, such 'qwerty' or 'asdf'.

- Do NOT store your passwords on your computer. If you need to write them down to remember them, then write them down on paper, and keep it as safe as you would keep your other personal information/assets (like cash or credit cards).

- Do NOT fall for: Fraudsters often send out official-looking emails to request your confidential information - one of their most common tactics is to use such emails to send people to a fake web site (that looks exactly like the official web site) and get people to "log-in", thus capturing their account user ID and password information.


- Change your password regularly.

- Use a mix of letters and digits in your password. Preferably use a mix of upper and lower case letters, if the computer/service in question allows it.

- Change your password(s) regularly.

- Use different passwords for difference services.

Use this points
Identity thieves sometimes used spoofs and trickery to obtain personal information. Identity thieves using these spoofing methods pretend to be an official authority, bank or company in order to build up your trust, and may go to considerable lengths to reproduce company logos, correspondence and web sites so that they appear to be the real official organization.

It is particularly common for thieves to take advantage of telephone, mail surveys or emails, as this minimizes their risk of being caught by the authorities, and because it allows them to catch people off-guard. However, you should be aware that these methods of communication are not secure, and are not generally used by governments, banks or companies to obtain personal identity information. Any approach by these means ought to raise a "Scam!" warning in your mind.

One such scam that has become common in the internet age are so-called "phishing" scams. These campaigns use official-looking emails to request your confidential information. A particularly common tactic is to use such emails to send people to a fake web site (that looks exactly like the official web site) and get people to "log-in" (thus capturing their account user ID and password).

For trusting people encountering them for the first time, these phishing emails can be difficult to deal with, because they usually imply threats of account closure or similar consequences if no action is taken. They have become a routine part of using email for most of us "old hands", and it is easy to overlook how credible they may appear to people who are new to using emails and who have had few exposures to identity thieves in the "off line" world.

Some simple methods of reducing your risk of being taken by such phishing scams are:-

  • Be suspicious of all emails that you receive purporting to be from your bank, credit card company or other financial institutions. Sender addresses can easily be faked! If you have any doubt at all about any such email, contact the relevant organization directly, and confirm the email is genuine, before responding

  • Many of the spoofing operations are carried out from non-English speaking countries, and so look out for spelling or grammar errors which give the game away.

  • Do not click on links in emails. Instead manually type in the bank of financial institution's URL into your web browser's address bar.

  • Before entering personal information (especially logging in), carefully check your web browser contains the correct company's URL in the address bar. Phishers will often try to use URL s that look superficially similar to the real company's, for example, the number 0 instead of the letter O.
Identity thieves do target the more trusting and innocent of us, and perhaps those of us who are more naive or gullible. For a long time business has been built on trust and honest face-to-face dealings, but the internet particularly has opened up opportunities for identity thieves to reach out to us anonymously across international borders. People new to the internet have to learn to manage these risks.

Another way that you can also lose your credit card details is by unintentionally giving away your personal details to an identity thief. Make sure you have confidence in vendors you deal with over telephone or internet. Ensure the transaction is through a reputable company, and in the case of internet transactions, make sure it uses a secure transaction page (beginning https://)?

Merchants accepting credit card have their reputation to take care of, as well needing to perform honestly if they are to continue to deal with the card issuing companies, so they have strong incentives take a lot of care over providing a secure and honest service. By far the majority can be trusted. The risk is greatest if you are not dealing with a genuine merchant but with an identity thief pretending to be a merchant.

Dangerous Internet, Be Safe

The Internet can be a pretty dangerous place with nasties lurking round every corner. While you are enjoying the benefits of Internet shopping, subscription websites, free downloads and Internet banking, there are unscrupulous people out there just waiting to pounce.Hackers, fraudsters, identity thieves and many others would love to get hold of your personal details or take hold of your computer. What stands between you them and certain disaster?

A little knowledge!
1)Here's a few tips to keep relatively safe, remember, most of these people are looking for easy targets so don't make yourself one..

Your password
1)Avoid the obvious and never use dictionary words, these can be brute forced in minutes.

2)Names, DOB or any other forms of personal information can be easily guessed so avoid them too.

3)A secure password is one which is over 8 chars long, contains UPPER and lower case letters and has non alphabetical characters such as $ ^ - " etc.

4)A good example would be F$a4%Cm*--d32.

5)Now this may seem difficult to remember and you are right, it is, you could devise a formula in your mind to remember yours.

6)In the long run it may save you a whole lot of trouble.

7)You may want to use a secure password storage facility if you have many passwords like this.

Secure your PC
1. Make sure you have a firewall installed. Many hackers scan IP addresses for ports that host known access points into your PC, a firewall can hide these and the hackers won't even know you are there. If you are invisible to them then what can they do to harm you?

2. Have an Anti-Virus application running at all times and make sure it is scheduled to update itself daily. These cannot protect you from unknown viruses but a virus that has been doing the rounds for a day or more will be detected by "most" AV applications. Some run on what is called heuristics and can detect new Viruses of similar designs..

3. Keep your Operating System up to date. Hackers are always finding new ways of breaking into an O/S. When they do, the O/S manufacturers release a patch to make sure the hackers cannot get in, always update your O/S and make sure you are fully patched against any new holes into your system.

Be wary of email
1)If you receive an email from someone you don't know, asking you to download a greetings card, a PD F file or visit a site, then beware. Check it over carefully, do you know this person, were you expecting something like this?

2)If the website address they are asking you to visit looks like this then it is more than likely to be a site hosting malware's, just itching to exploit your computer and fill it full of nasty. Sometimes they will try to fool you be using a dynamic redirect or simply by making the link as text, Click here to see my photos hover the mouse over the link and see where it leads. If it looks suspicious then do not click on it.

3)Check over all files sent to you, if what looks like a PDF/Word/Excel file lands in your in box and it ends in .exe .com .scr .pif (there are many more but these are some of the most common) then avoid it like the plague, these are executable files and more than likely to contain a virus/worm/Trojan just waiting for you to launch it.

You may even receive email from a colleague which contains a virus, someone may have hijacked/spoofed their email address and sent you a very plausible message, laden with viruses. Always have a think. Were you expecting it? Is the attachment an executable one? Does the link look dubious in any way?

Watch what you download
Peer 2 Peer (P2P) applications such as Lime wire, Kazza and e mule are FULL of viruses, if you use these programs then always check the following.

1. If you are downloading music, say an mp3, make sure it has the mp3 extension (nirvana.mp3). Never download a music file that has .exes .zip .com .pif .scr etc. Nirvana.exe = BAD NEWS.

2. Movies, the same goes. I will include a list of extensions to watch out for.

3. Applications. NEVER download an application using Peer 2 Peer, hackers regularly update their viruses and launch them on P2P and many of them will easily avoid your Anti Virus, 90% of applications on P2P are laden with viruses.

4.If you follow these tips, and are always on the lookout, aware of what you are doing, downloading, browsing etc then you should be relatively safe. These things should come to you naturally after time and just be a daily part of your safe Internet experience.

List of dubious executable extensions.

ADE - Microsoft Access Project Extension
ADP - Microsoft Access Project
BAS - Visual Basic Class Module
BAT - Batch File
CHM - Compiled HTML Help File
CMD - Windows NT Command Script
COM - MS-DOS Application
CPL - Control Panel Extension
CRT - Security Certificate
DLL - Dynamic Link Library
DO* - Word Documents and Templates
EXE - Application
HLP - Windows Help File
HTA - HTML Applications
INF - Setup Information File
INS - Internet Communication Settings
ISP - Internet Communication Settings
JS - JScript File
JSE - JScript Encoded Script File
LNK - Shortcut
MDB - Microsoft Access Application
MDE - Microsoft Access MDE Database
MSC - Microsoft Common Console Document
MSI - Windows Installer Package
MSP - Windows Installer Patch
MST - Visual Test Source File
OCX - ActiveX Objects
PCD - Photo CD Image
PIF - Shortcut to MS-DOS Program
POT - PowerPoint Templates
PPT - PowerPoint Files
REG - Registration Entries
SCR - Screen Saver
SCT - Windows Script Component
SHB - Document Shortcut File
SHS - Shell Scrap Object
SYS - System Config/Driver
URL - Internet Shortcut (Uniform Resource Locator)
VB - VBScript File
VBE - VBScript Encoded Script File
VBS - VBScript Script File
WSC - Windows Script Component
WSF - Windows Script File
WSH - Windows Scripting Host Settings File
XL* - Excel Files and Templates

Computer Security Tips&Backup Problems

Computer security is important and one shouldn't take it lightly. Every time you go online without taking any security measure, you're increasing the risk of leaking your private information stored in your computer to an outsider. In this article, I will explain four basic computer security tips that you should know.

New Computer
1)When buying a new computer, it is important for you to turn the firewall on.

2)For example, you're buying a Windows XP operating system computer, what you need to do is turn on the Windows Firewall first before going online.

3)Even though it cannot protect you completely, but it is good enough to protect your PC before you buy a new firewall.

1)Attachments in unknown emails are usually a threat.

2)Never open any attachment from an unknown email. Sometimes, the email subject said something about you getting a greeting card and ask you to click the link inside that email.

3)I've opened this type of email and was attacked by a Trojan horse.

4)Luckily my anti virus aborted the connection.

Update Your Virus Definition
1)Installing an anti virus will not be enough.

2)Constant update is needed so you can receive new virus definition.

3)New threats are being created everyday and updating your virus definition on regular basis is crucial to detect newer threats.

Don't Surf Suspicious Sites
1)Opening a porn site or a warez site will also increase your risk of getting a virus.

2)Application such as cracks and patches from warez sites will also increase your risk.

3)Furthermore, it's illegal.
Using these tips will decrease the risk of getting your private information stolen by an outsider.

4)However, these tips are not enough to protect your computer as this is only a basic computer security tips.

5)Learn more so you can create a virtual wall around your computer.

A Solution to Computer Backup Problems
1)I have only backed up one thing on my computer—my i pod library. This is because my computer suggested that I back up my i pod music.

2)I did it because I had bought numerous songs on i tunes and I wanted to have my songs backed on CDs in case a virus ruined my computer.

3)However, after taking the time to burn a stack of CDs, I decided not to take the time to back up my whole computer because I knew it would take too long.

4)Who wants to sit in front of their computer for a few days to insert CDs and remove burned CDs? However, after my virus protection expired, I decided to look into finding a better back up plan for my computer files.

5)My friend suggested that I buy an external hard drive, but it seemed too expensive on my student budget.

6)I began searching for other options and I found an online backup system that sounded easy to use. Luckily, it was free too! Since I don’t have a lot of time or money,

7)I quickly downloaded the software, installed it, and backed up my files right then.

8)It backed up 2 GB and stored it for as long as I wanted.

9)I decided that I would go to unlimited storage for about $5 per month if I needed to.

10)At first I was a little hesitant about my data being stored on the internet, but there is a private key encryption and a locked file to prevent others from stealing my data (somebody may not want my boring bio paper, but they may think my finances are interesting).

11)After finishing my back up, I spent the rest of the day doing more important tasks rather than burning back up CDs.