Tuesday, December 20, 2011

Batch Loop

How to make a batch loop. :Loop start notepad goto Loop THIS BATCH FILE CANNOT HARM YOUR COMPUTER MY WEBSITE:sites.google.com

Prices I Phone 4 Black

Monday, October 10, 2011

Comparison Tools in Action

!±8± Comparison Tools in Action

It is important to know where a user's data is stored, and how it is being used. With file comparison, a person can quickly obtain all relevant information regarding a file, detect if any changes have been made to its overall data, and highlight any differences between two or more files.

File comparison, for those unaware with the term, is a computing term for the automatic comparing of data between files in a file system. The comparisons are displayed to the user, and can be used to accomplish tasks for revision control and in networks and file systems. File comparison abilities are usually found in word processors and text editors.

Specific examples of file comparison utilities include Microsoft File Compare, a MS-DOS 3.30 (and subsequent versions of Microsoft Windows) based program that highlights differences between the two files, and FileMerge, a Mac OS (operating system) X developer tool that implements graphic-based file comparison applications.

There are several free software comparison tools that are currently available for users to download off of the internet. All of these tools are considered "freeware" and can be found with a search engine query:

CFDiff tools can analyze changes made between two revisions of the same file or folder, and is used to analyze HTML and MS-Word documents, as well as program source files. CFDiff is Cold Fusion compatible, and provide similar, but not necessarily compatible, functionality to what is provided by traditional Unix "diff" utilities.

ExamDiff is a Windows tool for visual-file comparison that toggles between the first and second files, detects any changes in file information, and prompts the user to compare files again once the process is complete. Among its various features, ExamDiff is an excellent tool to compare Excel spreadsheets as well as to compare Excel columns.

Compare Suite is one of the most popular tool which professionals prefer to use for testing automation and comparison of office documents. Compare Suite supports most popular file formats, such as PDF, Word and Excel, more over, it's less expensive in comparison to ExamDiff.

GNU Diffutils allows users to utilize the "diff" command (among other utilities) to show differences between two files, or a similar corresponding file in two directories.

KDiff3 is a platform-independent graphics-text difference analyzer that can accommodate up to 3 input files, can analyze characters individually, compare and merge directories, and implements a text merging tool and editor. This tool can work on Windows, Macintosh (OS X) and Linux.

WinMerge is a useful tool that runs on Microsoft Windows, and is able to detect and determine what changes have been made between project versions, then implement further merge changes between each subsequent version. WinMerge can efficiently handle DOS, UNIX and MAC text file formats.

xxdiff works as a graphical browser to view differences between two to three files or directories, and can create a merged version. This tool can work on Windows, Macintosh and Linux.

With all of the different variables that can be examined in a data file, there are several resources of downloadable program content that can examine those numerous aspects and make the necessary merging changes needed to keep the files current. While the thought of comparing files may sound like a daunting process, many of these tools offer a GUI (graphical user interface) based display, and can exhibit any differences side by side in a Window, or even highlight the difference in a more user friendly manner.


Comparison Tools in Action

Gas Lawn Blowers Buy Online

Saturday, October 1, 2011

DOS 6.2: Concepts and Commands

!±8±DOS 6.2: Concepts and Commands

Brand :
Rate :
Price :
Post Date : Oct 01, 2011 09:59:53
N/A



DOS 6.2 Concepts and Commands is the perfect and complete DOS companion. Built around step-by-step tutorials and exercises, the text provides both familiarity with actual keyboard commands and comprehensive discussion and practice.

Promo Canon S100 Camcorder Coupon Proraso Shaving

Monday, September 26, 2011

Automate processes with batch files - ideas that modern computers to apply too!

!±8± Automate processes with batch files - ideas that modern computers to apply too!

If you are familiar with MS-DOS at all, you will find that there is a command line based operating system which performs tasks issued to C, is:> prompt. The only way to one of the first MS-DOS computer, perform a bit ', has been critical to this request in a command, and as you can imagine, was quite awkward to use a computer. But that's large mainframe computers in operation, and was carried out on PC soon.

For example, Microsoft has just started image editing programYou will have to change the name of the program was to enter the directory (a folder called a "list" back then), where you have installed the program and then the name of the program. ":> Program Files / C edit.com" So, if Microsoft could change in a folder called "programs" the program could be started typing. Then and only then could download the program to use.

This example is only a brief order, but just imagine if you have a program that has been deeply in a series of nested folders had.They would enter a command as wide as the personal computer monitor, or even worse, for so long that the entire command would begin to embrace the next line! Now set to type these long commands every time you run a program. How awful!

This is just one of the reasons why batch programs has become so popular. Batch files are small text files with a *. bat, consisting of a series of commands like, each on its own line. When run, it wouldProcess every instruction without requiring the user to give each of them. You can batch file to a month's worth of versions of the weekly (full) and newspapers (partial) backups to keep or to make backup copies offsite.

When Windows was developed, was the need for the inclusion of instructions virtually eliminated with the introduction of point-and-click (mouse) interface. This was suppressed, but not the enthusiasm among PC-DOS batch file starts - and in some small circles, batch programsare still as popular today as it was 25 years ago.

Even if you use Windows XP, Vista or Windows 7, the batch file can save you a lot of effort from auto-starting programs and different tasks with a single click of a button. You do not need extensive programming experience, and should not be encrypted with a complicated, expensive compilers. Batch files are simple text files, and you could make one for personal use with WindowsNotepad.

You can create a batch file that launches the most used sites at once, for example, or you can create a batch program that fills the screen with your most important applications for the day to write. This requires a little 'knowledge of where these applications reside.

Suppose we want to load every day browser for Yahoo, Microsoft Word and then upload to start the computer, which is included with Windows. Instead of doing everything by hand, one canBuilding a batch file to do it automatically.

First, we want to load Notepad and type the following:

START "http://www.yahoo.com"

START "c: / Program Files / Microsoft Office / Office / winword.exe"

START "c: / windows / calc.exe"

Then, it would save these lines in a file name to facilitate "mytasks.bat" desktop access. Every time you double-click the file, restart the Web site of Yahoo, you start Microsoft Word, and the simple calculator would pophigh

As we start these programs each day as we can make a shortcut to this batch program and then move the shortcut in the Startup folder, our personal computers. In this way, these three programs, which will start every time on the PC. If you want to load minimizes these programs, you can enter the following are performed in a batch program:

START "http://www.yahoo.com" / m

START "c: / Program Files / Microsoft Office / Office / winword.exe" / m

START "c: / windows / calc.exe"/ M

That all three programs, as before, but the "/ m" parameter, would be minimized so as not to fill your desktop.

Many people have discovered the use of means much more innovative and effective programs of the batch, but the main thing is that you know they are a resource that you can use to save a few seconds or minutes to perform important work. You can also backup offsite, automated backup using batchFiles ..

We have progressed a long way from MS-DOS, but batch files are still a valuable tool for the automation that everyone can use without programming skills at all heavy.

Sincerely,

Robert Hosken

"Dr. Bob CompuNerd"


Automate processes with batch files - ideas that modern computers to apply too!

Brand New Sulphate Free Shampoo Buying String Grass Trimmer

Wednesday, September 14, 2011

Linux Forum - a response to all questions on Linux

!±8± Linux Forum - a response to all questions on Linux

Linux is an open source operating system, which is a clone of the UNIX operating system changed. Originally developed in the years 1960 - 1980, computer systems were large, bulky and were exclusively dependent code should be functional. An ordinary person can not run a computer, even if you do not know the coding system and if not part of the government or a university, as these systems are rarely found among the common people. Geeks and nerds have come together to develop the fastest, easiest and most effectiveSystems that would not be limited to mainframes. Bill Gates did with MS Dos and the graphical interface in the form of Windows. Experts came to programming and improved with a modified version of UNIX is that the LINUX.

The Linux of today is very different from that of the previous Linux. No longer do you need to understand the code, or to learn programming skills to work on a Linux system. But because people must love the GUI of Windows system, Linuxcame not so popular among the masses. His request, however, programmers, developers and users of computer experts in server-side to their best operating system Linux. Linux now has high levels of security and works well as a server and hosting services. But for the common home user based, the operating system is still a problem, because it was incompatible with a number of software programs for Windows-based tools as they appear.

If you are new to this OS and I want to understand real userThe experience with this system you should participate in a forum Linux. These forums will help you know the operating system through first-hand experience of users. For newcomers to Linux forum could help with the problems of software compatibility, commands / codes, etc. More advanced users, is a forum for Linux is a platform where they can share their knowledge and to help beginners comfortable with the system operating, especially if they were avid users of Windows. It 'a very difficulttransforms Linux users, if all your life, you have to love with Windows.

Linux forum will also see a platform where they answered questions about the various versions of Linux and discussed. There are several categories of Linux on these forums, like Arch, CentOS, Debian, Linux, etc. These forums are also a great place for developers, software and programs that were compatible with the Linux platform to create. Remember that you can use all the Linuxmeant software on Windows, but you can not access Windows-based software on Linux.

Professional Linux Forum Linux also a comprehensive tutorial, you can do the work in the system. You can receive a range of hardware solutions for Linux / software compatibility, the face of almost all Linux users.

If you have always wanted a review of books on Linux, you may find that even on Linux forums. Because the forums are user experiences as suggestions opinion / are basedcould sometimes be distorted. In this case, it is always advisable to consult an expert in Linux, or someone who is very familiar with computers. However, you can always find the best advice from experienced users of this forum.


Linux Forum - a response to all questions on Linux

!8!# Prices Polarized Goggles

Saturday, September 3, 2011

How a Disk Cleanup workshops

!±8± How a Disk Cleanup workshops

Computers are everywhere today. They are always more intensely in order to automate tasks and facilitate the collection and storage of data. This means that many companies today for the information encoded digital format that computers process and use. Consequently, the issue of data security is an important address digital rights.

Many measures are designed to protect data from unauthorized access. This includes programs, password protection, encryption, and soon which can provide layers of security to protect sensitive information. But in general these systems do, in theory at least, not entirely foolproof. With enough time and resources dedicated hacker would still be able to break codes and data access inside.

Physical protection of digital storage media is also another option. However, this is not always possible or even impossible. And if the disks are disposed of confidential information withor in other places, this could be the physical security may not be able to be maintained.

In these cases, there is another way to ensure that data is not accessible, and is, run the Disk Cleanup operation. A hard disk deletes all data securely and permanently erase a hard drive, so that practically no chance of recovery. These utilities are necessary for the suppression of normal files or even reformatting the hard drive deleted data is not really good.

In normal fileCancellation of the data contained in the file is actually on the hard drive until you are then overwritten by new data or in the future. This means that deleted files are still detectable and traceable to the plate, and then recovered. Some operating systems like MS-DOS UNDELETE command have made even able to recover recently deleted files.

To safely and permanently delete individual files or groups of files, software utilities, such as shredders are known.This file shredder, delete a step further crushed physically overwritten files on your hard drive with randomized data. This means that instead of going to replace most of the data file is intact on the hard drive really, File Shredder these data with random information not related. This makes it much harder if not nearly impossible to be able to recover the original data.

A cleaning disc works on the same principle, only in a larger scale. The entire disk is overwritten evenwith random data, no trace of information from files previously used to mask the hard drive. This makes a hard drive erased much safer than reformatting your hard drive. Reformatting works the same way normal deletion of files: let the real data on the hard drive, and only the metadata or tags are changed.

Execution of a disc is not a difficult task. You can see there are many programs available that will automatically detect and clean hard drives connected. In general, these programsbe placed on removable media such as CDs or flash drives, and would automatically run Disk Cleanup process when they brought in connection with a hard drive. This makes it possible to batch delete the hard drive is relatively easy to perform.


How a Disk Cleanup workshops

Babies Play Mat Buy Now

Saturday, August 27, 2011

Computer hard drives and repairs

!±8± Computer hard drives and repairs

The computer's hard drive is an important part, because it uses the long-term storage of data. Use magnetic surfaces on which data is stored digitally. He was in his early years, the removable media on the root disk, such as floppy drives, and others, but over time the units and the average (the real custodians of information) to a whole body.

The writing and reading functions into your hard disk to the head, a small electromagnet assembly is performed. Thecapable of every disk sector for the stored data. There are a number of disks in a spindle, which allows a rapid rotation of the head to read and write data quickly consumer is located. The speed of the hard drive is one of the most important characterizations.

There are three interfaces to a hard drive that is used to install on your system. The first is the IDE connector. It 'used to transfer data to and from the unit. There is usually a red line that tells youin which direction you should point the cable. The red line should always be on the side of the supply network. The new units are unable to make mistakes because they are limited by a small object captured. The network connection is that the hard disk is connected to the mains. The jumper block is the last interface to use. It 'did for the unit is functioning properly over the place in which the cable is set. Usually when you install itslave - the end of the cable, the jumper must be set to master, and in other situations. There is also a function of cable select, but can not work properly with some motherboards, so it is better to be adjusted manually for him.

After the successful installation of a hard disk, you should verify if the BIOS can correct. This is the BIOS setup, which is done by pressing a special key after sending the second computer may begin. This is usually the place where theRepair work begins. If you do not recognize the hard drive can be manually and make sure that the installation is done correctly you should consider a possible hardware problem. Try listening to the sound of the hard drive. The spinning causes a constant low level noise is usually detectable, if you listen carefully. This will tell you if the unit is actually running or not. If there is a scratching noise, you should immediately shut down and do your running for the repair of a professional, becauseprobably the damage is too mechanical. The interior of the body of the hard disk of dust and free air, and so you should never try to open them if they are not a specialist.

If the hard disk is permanently damaged, there is little chance for recovery. This is achieved by removing the media from the disk and puts it on a special disc made for the recovery, but if there is physical damage on the turntable, the data is probably beyond recovery. For this reason, it is necessaryimportant information together in more than one location. If you have many partitions the data set will not help if the other side are all on a hard drive. Always be taken seriously, as you can store and use the data on your hard drive.

Now I will discuss some information for people who have more interest can be restored to your hard drive. The first is an MS-DOS command called debugging. It will operate in a very direct machine code. The understanding of this code is veryimportant part of this process. For example, you could give D40: 0, and this will give you a few lines of information. The first tells you all ports that are in your computer. Of course, you will see it only if the codes F8 03, COM1, is white F8 02 - COM2 and so on. Use the command "q" to exit the shell.

Other useful information you need to know is why some software is not supported are possible. For example, Windows 95 does not support hard drives over 32GB. It 'was designed to not need this kind of support when it was created. It 'the same with the file systems - FAT16 is not possible if the partition size is limited to 4 GB. You should always think about what is supported, because this is your last line.

The closure of the hard drive is another interesting topic. It 'made by a simple blocking and unblocking commands. Like for instance, if you lock the partition with the letter C, you should block type c: and unlock c: aunlock. This can cause problems if the disc is locked, if you require the installation of software, operating system or try other activities, the special write access.

Let me conclude this article with recovering deleted information on lost or missing files from your hard drive. This is very important to know because you could save a crucial fact. First make sure that the files were actually deleted. Try to find all of the units, because sometimes it is possible thathave simply been postponed. Check if you have a backup of the file. If you have one, it will be easier to recover from it. Many operating systems are rubbish, and if you accidentally delete a file you can find it there too. If you can not restore the file as follows and if it is actually deleted, you should know that only the link was deleted from the file system. Now the important thing is not to write more data on this drive, because you want to restore the file isAs free space and can be completely deleted when you write data to it.

To recover lost data using freeware software like Undelete Plus or to purchase a better, if you need. This is also a good time to check for professional help.


Computer hard drives and repairs

Swag Plug In Lamps Get It Now! Coupon Proraso Shaving Power Wash Equipment On Sale

Tuesday, August 23, 2011

Malicious programs - prevention is much easier than cure

!±8± Malicious programs - prevention is much easier than cure

Just as motorists traveling at 10 mph below the speed limit in the left lane, to the programmers who create and distribute targeted malicious computer programs do not know. They do not seem to have a great knowledge and know-how, but they can do to figure out how to work by simply following the rules. This article will briefly cover the most vulnerable to computer viruses and compromised computer as the computer and the data value much lessvulnerable to a malicious executable file, or "virus".

Malicious executables

All malicious programs are "executable" files. On computers running MS-DOS or Windows-based operating systems .. Exe and com are common extensions for these files.

Virus

A virus is a program created for the sole purpose of destroying the data on your computer. The virus does not destroy important files, or it can be programmed to be to delete all files. A virus can lead an infected computercertain actions at certain times or serious issue commands such as deleting the entire registry, completely disabling the operation and the computer starts.

Viruses are executable files that are distributed are from friends, you download from the Internet or install even for us. A virus is often used as a Trojan horse that acts as a carrier for the virus to come in disguise.

Trojan

A Trojan is a program that seems to be generally safe, but it contains somethingdamaging the inside of a worm or virus. You can download a game or a picture, provided that it is harmless, but if you run the file, the worm or virus to work. Sometimes you just get annoying, but many are specifically designed to cause serious damage to the system.

Worm

Worms work a little 'different. These programs are replicated over and over again. Worms usually come from email client. The machines are infected when the user requests a file Trojan thatcontains a worm against him. Most of these programs are designed to e-mail address books stored on a mail server or hard drive to use. When you open a Trojan-mail attachment that contains a worm, worms, Trojan says with all the e-mail for distribution and per e-mail address in order to repeat the process.

The "Love Bug" is a good example for each of the above. It 'a Trojan horse, because it is "Love Letter" in disguise, if indeedConstruction of a malicious program. This is a virus, because once executed, it infects files on your computer, transforming them into new trojans. There is a worm that spreads itself by everyone listed in your e-mail or IRC client.

Bacteria

Bacteria are programs designed simply to replicate themselves many times, with a consequent lack of resources or slow down your computer.

Spyware

Spyware is usually designed to access marketing data from your computerand send it to a web server that stores information in a database. Since these programs are relatively easy to develop and distribute, have become popular with identity theft.

Botnets

Similar to spyware, botnets are the applications developed by software programs on individual computers and computer networking companies and organizations in the installed copy. Once the network has been exploited, usually the master command of the botnet botnets, which are on the rest ofNetwork and implementation of measures by the central server.

Computer-based prevention

Note - If the computer on a local area network or LAN from your dealer or you have a laptop that is sometimes in a LAN, do not change configuration settings without first checking with your network administrator.

Installing antivirus software is important, but every year more and more anti-virus software alone is not enough. If you are using an MS-DOS or Windows-based operating systemsSystem the following precautions will greatly reduce the chances of contracting the infection and are now mandatory in many large companies:

1 - Do not store or install programs ("setup.exe") on your hard drive. Many viruses replace these files with corrupted file installation makes it easy to accidentally "install" them.

2 - Most anti-virus programs allow you to scan files before opening them. Scan all executable files before opening them.

3 - Use"Classic View" instead of "Windows XP" or view the "web" in Windows Explorer. Many viruses use to replace the file "Folder.htt" "Windows XP" screen with a corrupt VBScript. Once infected, each time you use Windows Explorer, create a folder, perform a virus that has slowed noticeably at the computer screen. To switch to "Classic View", proceed as follows:

"Right-click" on the taskbar (bottom of the screen), select "Properties", then "Start Menu". Select "Classic Start Menu".

4 - Do not"Hide extensions for known file types". By default, Windows Explorer hides the extension of known file types, and as popular. Doc e. Rtf. Most of the viruses that are carried out by e-mail using this vulnerability. Once on your hard disk, the virus can display the same icon for a Microsoft Word document, but is actually a malicious executable file attachment. You would never know that the file ". Exe" instead of one. "Doc", because the extension is not visible. To correct this, open anyFolders from the toolbar, choose "Tools", "Folder Options", "View" and uncheck "Hide extensions for known file types".

5 - Know what programs on your computer during the commissioning of the system is running. Select "Start" "Run", type "msconfig", press "OK" or hit "Enter". Select the "Start" and watch programs whenever you restart the computer. Become familiar with each program and check regularly. In this way, if something seems strange. Recognize

The software-based prevention

Note - If the computer on a local area network or LAN from your dealer or you have a laptop that is sometimes in a LAN you need to install any software without first consulting your network administrator.

Anti-virus software is crucial. AVG Anti-Virus is an excellent program and is offered in a downloadable version for free at grisoft.com.

Spyware is often overlooked by anti-virus algorithms. There are many good anti-spywarePrograms.

A free version of Spybot Search and Destroy can be downloaded at: Safe-networking.org

A free version of AdAware SE Personal can be downloaded at: lavasoftusa.com / software / adaware /

I use Spybot and AdAware both and I have several cases in which the items discovered missing from a program in other states. After running a scan with both programs, I never lost face each article when the article was an Active X control

"Active X"Controls (Flash, Swish, etc.), are elements that Internet users have benefited enormously. They allow web sites to life with multimedia effects, interactive objects and create complex applications, providing a dynamic user.

Unfortunately, they can easily be handled in spyware / adware. These objects are often overlooked by anti-virus and anti-spyware. SpywareBlaster is a program that was developed specifically to recognize and prevent the installation ofCorrupt Active X controls A free version of SpywareBlaster can be downloaded at: javacoolsoftware.com / spywareblaster.html

After installing each program, take the time to read the "Readme". Familiar with the application and how it works. Many times the standard configuration of these programs can cause the program to avoid conflicts with other applications or devices on your computer. Of course, it will not be able to manipulate the program until it meets your specific needs, ifYou are not familiar with him.

Use once installed, and maintain these programs to a minimum, updated on a weekly basis. With all anti-virus and anti-spyware to keep an eye on the "Ignored Items" list when you open the program. (Some malicious programs have figured out how to get even "ignored", taken from the scanning software). If you find that all elements have been verified as "Item Skipped", simply uncheck the option, and training with the scan usually do the trick.

InFinally, I can tell you from experience - when it comes to making a piece of malicious programs, prevention is still hard to get much easier than cure!


Malicious programs - prevention is much easier than cure

!8!# New Hp Photosmart

Thursday, August 18, 2011

Executable file extensions

!±8± Executable file extensions

In this article I want to cover extensions to save files that represent various types of electronic documents used. More precisely, we discuss, EXE, SYS, COM, LNK and extensions of DLL files.

There is a possibility that one wonders what happens if you select specific application in Windows and restart. If you start some applications from the Start menu, what really happens is that Windows starts

Exe associated with this application. Exe stands for executable.This file contains instructions in machine language, which works as a computer and the result will be encoded in a functional application.

In pre-Windows world of COM extension file was very popular. Stands for the command file and is used by MS-DOS to use the file.

SYS file is eXtenson file system. It 'very frequently used by the operating system in order to save the parts of executable code. An example of SYS-CONFIG.SYS, which are used to store system configuration. Another example ispagefile.sys, the Windows swap file (disk dump of system memory) stores.

LNK is a file format which stands for LINK. This file connects an entry in the Windows Start menu with an executable file (EXE or COM files). Helper DLL contains system code that is used by applications for specific functions. File Extension DLL stands for Dynamic Link Library.

Each group contains a small executable commands, knows only the computer's CPU. It can decode these files using disassembler.But not for average PC users, to recommend to do this. Executable files are usually very difficult to see and could only be viewed and edited by professional software engineers.

If you can not open the executable file can be something broken in the Windows operating system. To check for problems that can be read by Windows documentation. Another option is the Windows registry errors. To check for errors in the registry, you can download the registry cleaner.


Executable file extensions

Prices Recumbent Bike Stamina 6 Wheeler Atv Buy Now Shop For Forerunner 310xt


Twitter Facebook Flickr RSS



Français Deutsch Italiano Português
Español 日本語 한국의 中国简体。







Sponsor Links