- Go into System Properties control panel
- Under “Computer Name, Domain, Workgroup Settings” section press the “Change Settings” link
- Press the Change… button.
- Select the Workgroup radio button (you might need to enter a value into the field), press the OK buttons.
- You will need to reboot your computer.
This blog is for users of the Microsoft Windows Operating System, it contains tips, tricks and secrets for both beginner and expert users.
Sunday, May 03, 2009
Windows Vista: Changing the Domain to a Workgroup
Changing the domain to a workgroup:
Firefox Easter Eggs
These are not the chocolate Easter eggs you eat, but they are hidden features in applications that you can access if you know what to do. Not all applications have Easter eggs, but sometimes programmers install these secret features for fun.
In this article I explain how to access two Easter eggs in Firefox 3.0:
In this article I explain how to access two Easter eggs in Firefox 3.0:
- First you need start the Firefox 3.0 (or greater) application,
- In the address bar you need to type the following and press the Enter key.
- about:robots
- about:mozilla
Tuesday, April 14, 2009
Check out BumpTop
BumpTop claims that they have "reinvented your desktop". The program replaces the Windows Explorer and offers a new way to organize your files that is suppose to help you become more productive. Personally I like the idea, but I am not sure how practical it is (for me).
Tuesday, February 03, 2009
Software: VIPRE PC Rescue Program
The VIPRE PC Rescue Program is a free command-line utility that can scan and help clean an infected computer. This is not a real-time scanner so it won't protect you from being infected in the first place.
These types of programs are great for trying to disinfect an infected computer, or just you give you a second opinion to make sure its not.
The VIPRE PC Rescue Program is a self-extracting executable file that contains the virus scanner and definitions. There is no pretty graphical interface that makes this program easy to use.
So to use this tool it helps to be familiar with the basic concepts of using other command-line based utilities. For more information, check out the web site.
These types of programs are great for trying to disinfect an infected computer, or just you give you a second opinion to make sure its not.
The VIPRE PC Rescue Program is a self-extracting executable file that contains the virus scanner and definitions. There is no pretty graphical interface that makes this program easy to use.
So to use this tool it helps to be familiar with the basic concepts of using other command-line based utilities. For more information, check out the web site.
Thursday, January 22, 2009
Millions Hit with Windows Worm as Infection Spreads
eWeek reports: "Nearly two months after Microsoft first warned of the Conficker worm targeting a vulnerability in its Server service, the number of infected computers is growing rapidly. While there is some dispute about the number of infections—F-Secure puts it at approximately 9 million, though others dispute that—the general consensus from companies such as Symantec and Kaspersky Lab is that the number of infections is in the millions."
One more reason to keep your system patched. There is some nasty malware out there that wants your computer.
If you have 'Automatic Updates' enabled your computer will download these updates for you in the background. Then when you shutdown your system these patches will be applied to your system. If you leave your computer on overnight they will automatically be installed and your system will be rebooted if necessary.
If you don't have 'Automatic Updates' enabled on your computer, I would suggest that you turn it on as soon as possible. If you don't want to enable this feature, you can always update your computer by visiting the Windows Update site and downloading and installing the patches manually.
To enable Automatic Updates (Windows XP):
One more reason to keep your system patched. There is some nasty malware out there that wants your computer.
If you have 'Automatic Updates' enabled your computer will download these updates for you in the background. Then when you shutdown your system these patches will be applied to your system. If you leave your computer on overnight they will automatically be installed and your system will be rebooted if necessary.
Warning: If you leave your computer on at night make sure you save all your work or you run the risk of losing it if your system has to be rebooted.Enabling Automatic Updates
If you don't have 'Automatic Updates' enabled on your computer, I would suggest that you turn it on as soon as possible. If you don't want to enable this feature, you can always update your computer by visiting the Windows Update site and downloading and installing the patches manually.
To enable Automatic Updates (Windows XP):
- From the Start menu, select the Control Panel folder.
- Double-click the System applet in the control panel folder.
- Click the 'Automatic Updates' tab.
- Check the 'Automatic (recommended)' option. (optional: if you don't like this feature, you can set it to: 'download but not install the update', 'just notify you', or 'disable this feature altogether' [not recommended])
- Press the OK button when done.
- From the Start menu, select 'All Programs' then 'Windows Update'
- In the left pane, click the 'Change settings' link.
- Check the 'Install updates automatically (recommended)' option. (optional: if you don't like this feature, you can set it to: 'Download updates but let me choose whether to install them', 'Check for updates but let me choose whether to download and install them', or 'Never check for updates' [not recommended])
- Press the OK button when done.
Note: For the latest Microsoft Security Bulletins, check out this site.
Friday, January 16, 2009
Software: RUBotted (Anti-Botnet Scanner)
Trend Micro has release a free anti-botnet detection tool called RUBotted. This software can help prevent your computer from being taken over and used for malicious purposes such as sending spam or remotely attacking other computers.
Here is excerpt from Trend Micro site about their product:
Here is excerpt from Trend Micro site about their product:
"Malicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities."If you have never heard of a Botnet, here is an article from Wikipedia that discusses it in more detail.
Monday, January 05, 2009
Microsoft Fix It LIve
A new feature of the Microsoft Knowledge Base system is called "Fix it live". Basically its a service from Microsoft that will attempt to fix certain problems outlined in the knowledge base articles.
Here is excerpt from the site: "Have you ever come across a Microsoft Knowledge Base (KB) article or been presented with a Windows Error Reporting (WER) solution and asked yourself, why can't Microsoft just fix this for me? Today KB articles and WER solutions provide you with a list of steps that can be followed to resolve your issue. However, tomorrow looks much different and we hope it helps you resolve any issues you have with our products faster and easier."
Here is excerpt from the site: "Have you ever come across a Microsoft Knowledge Base (KB) article or been presented with a Windows Error Reporting (WER) solution and asked yourself, why can't Microsoft just fix this for me? Today KB articles and WER solutions provide you with a list of steps that can be followed to resolve your issue. However, tomorrow looks much different and we hope it helps you resolve any issues you have with our products faster and easier."
Tuesday, December 30, 2008
Windows XP: Stop Security Center From Nagging You
Windows XP Service Pack 2 (SP2) added the Security Center, which centralize most security-related functions to one control panel. By default, if it finds a problem it will start nagging you to fix it. For example, if you turned off automatic updates or it doesn't recognize your anti-virus application. Here is how to turn off this feature:
- Open the Control Panel folder
- Open the Security Center control panel
- In the left pane, click the link labeled "Change the way Security Center alerts me"
- Uncheck the item(s) that it's complaining about (i.e.: firewall, automatic updates, or virus protection)
- Press the OK button.
Wednesday, December 17, 2008
Microsoft Security Bulletin MS08-078 - Critical: Security Update for Internet Explorer (960714)
Microsoft just released an Out-of-Band security bulletin MS08-078. Generally any Out-of-Band security patches are important, because they fix a problem that needs to be addressed now. MS08-078 (960714) is a critical security update for Internet Explorer.
Here is an excerpt from the Microsoft site about this patch: "This security update resolves a publicly disclosed vulnerability. The vulnerability could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
This security update is rated Critical for Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 Service Pack 1, and Internet Explorer 7."
If you can't or don't want to install the patch right now for some reason, here are some instructions on how to set the security level of IE's Internet zone to High. This can protect you by blocking any scripting technology (i.e: Javascript, Flash, Silverlight, etc.) from running on any web site. Although by using this feature you will disable most web sites functionality, such as dropdown menus and animation.
Here is an excerpt from the Microsoft site about this patch: "This security update resolves a publicly disclosed vulnerability. The vulnerability could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
This security update is rated Critical for Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 Service Pack 1, and Internet Explorer 7."
If you can't or don't want to install the patch right now for some reason, here are some instructions on how to set the security level of IE's Internet zone to High. This can protect you by blocking any scripting technology (i.e: Javascript, Flash, Silverlight, etc.) from running on any web site. Although by using this feature you will disable most web sites functionality, such as dropdown menus and animation.
- Open an Internet Explorer
- From the Tools menu select Internet Options..., and click the Security tab
- Click the Internet zone icon in the top part of the dialog box and move the slider control below it to High.
Note: To get around issue this you must add the sites to the Trusted Sites zone, its in the same dialog as the Internet zone outline in the instructions above.
Monday, December 15, 2008
Windows Vista: Starting Programs with Elevated Privileges
Do you need to automatically start applications that require elevated privileges when you log into Windows Vista? To accomplish this we are going to have to use the Vista Task Scheduler.
Follow the instructions below to learn how to do this:
Follow the instructions below to learn how to do this:
Note: You need an account with administrative privileges to the computer for this tip to work.
- Remove the programs from the Startup group if they are already there
- From the Search field in the Start menu type "Task Scheduler".
- In the Task Scheduler, press the "Create Task..." link in the Action panel on the right.
- Type a name for the new task, for example "Start Notepad"
- Check the "Run with highest privileges" checkbox
- Click the Triggers tab.
- Press the New button.
- From the "Begin the task" dropdown menu, select "At log on."
- In the setting section, choose the "Specific user or group" radio button (change if necessary).
- Press the OK button
- Click Actions tab, and press the New... button.
- Enter the path for the program that you want to be launched, the press the OK button
- Press the OK button
Monday, December 01, 2008
Windows Vista: Re-Activating the Built-in Administrator Account
In previous versions of Windows the built-in Administrator account was enabled default (this was before Vista). This was a major security risk because hackers knew which they account they needed to attack to get complete access to the computer.
In Vista if you do a clean install (not an upgrade), this account has been disabled by default. If for some reason you need to reactivate this account (which I recommend against unless there is a good reason) the instructions are below:
In Vista if you do a clean install (not an upgrade), this account has been disabled by default. If for some reason you need to reactivate this account (which I recommend against unless there is a good reason) the instructions are below:
- Log on to the machine with a local administrator account (if you don't have one already then these instructions will not work for you).
- In the Search field under the Start menu type MMC.EXE and press the Enter key. Press Continue button in the UAC prompt to open the console.
- From the File menu, select "Add/Remove Snap-in".
- In the "Available Snap-ins" list on the left, scroll down and select "Local Users and Groups", then press the Add button.
- In the "Choose Target Machine" dialog box, select "Local Computer" press the Finish button, then press the OK button.
- Expand the "Local Users and Groups" icon in the left pane and click the Users folder.
- In the right pane, right-click Administrator account and select Properties
- In the General tab, uncheck "Account is disabled" box, then press the OK button.
Monday, November 24, 2008
Software: Picasa 3 (Free Photo Editing/Management Application)
I have used Picasa for managing my photos for years. Its one of the best free photo editing and media management applications available (in my opinion).
The application has gotten better with several new enhancement that Google has added in this release. Below is a brief summary of changes in the new version of Picasa 3:
The application has gotten better with several new enhancement that Google has added in this release. Below is a brief summary of changes in the new version of Picasa 3:
- Improved automatic sync between your PC and the Picasa Web Albums site.
- Improved photo collage tool
- New editing tools include a : retouching, text, and smart cropping tool.
- A new movie making tool that allows you to create video slide shows from your photos, videos, and music. The tool also allows direct upload of your videos to Picasa Web Albums or YouTube.
- One of my favorite features is the new photo viewer for browsing photo on your hard drive.
Wednesday, November 19, 2008
Security: What is Clickjacking?
If malware, spam, phishing, and other threats were not bad enough, the latest Internet security threat is called Clickjacking. Basically its a way of tricking you to click on disguised Web links, so that an action is performed on your local computer without your knowledge.
For example, using this exploit you can be tricked into turning on your web cam, or installing malware. All browsers are vulnerable to this type of threat, so this is not just isolated to I.E., Firefox, etc.
The way the attack works is you go to a site that has been modified by a malicious attacker, then the content (i.e.: web pages, flash animation, etc.) of the site tries to trick you into clicking links and buttons that you might not realize you're clicking. They do this by disguising the content to look like something else.
If you're really worried about this type of attack, then you need to disable scripting technologies like Javascript, and Flash for all sites in your browser. Then you need to enable it for approved sites only. The drawback is that many sites rely on this technology to make them more interactive. Thus disabling this technology can cripple a web site's experience.
To help protect you, here are some resources:
For example, using this exploit you can be tricked into turning on your web cam, or installing malware. All browsers are vulnerable to this type of threat, so this is not just isolated to I.E., Firefox, etc.
The way the attack works is you go to a site that has been modified by a malicious attacker, then the content (i.e.: web pages, flash animation, etc.) of the site tries to trick you into clicking links and buttons that you might not realize you're clicking. They do this by disguising the content to look like something else.
If you're really worried about this type of attack, then you need to disable scripting technologies like Javascript, and Flash for all sites in your browser. Then you need to enable it for approved sites only. The drawback is that many sites rely on this technology to make them more interactive. Thus disabling this technology can cripple a web site's experience.
To help protect you, here are some resources:
- For Firefox there is a free open-source plug-in called NoScript that can block the execution of JavaScript except for sites that you approve.
- For Internet Explorer, under Internet Options... in the Security tab you can set the Internet security slider to high. This should block all scripting technologies from running on any web pages you visit. If you want grant permissions to specific web site, you need to add them to your Trusted Site list.
Monday, November 10, 2008
Software: FREE EASEUS Partition Manager Home Edition
Are you looking for a free alternative to the commercial version of Partition Magic? Then you might want to check out EASEUS Partition Manager Home Edition, its a free hard disk partition management application. It allows you to: create, format, re-size, delete, move hard disk partitions, and more.
It runs on Windows 2000/XP/Vista (32-bit) Operating Systems. This version of the software is only free for personal use, if you're a business you will have to buy a licensed version.
Windows Vista already has built-in functionality to create, shrink, extend and delete a partition. So I would suggest trying this built-in functionality first. If you're running Windows XP or below, then you might want to try this software.
It runs on Windows 2000/XP/Vista (32-bit) Operating Systems. This version of the software is only free for personal use, if you're a business you will have to buy a licensed version.
Windows Vista already has built-in functionality to create, shrink, extend and delete a partition. So I would suggest trying this built-in functionality first. If you're running Windows XP or below, then you might want to try this software.
Note: I need to note that I have not personally tested this program, so use it at your own risk.
Tuesday, November 04, 2008
Software: ShellRunas v1.01
Note: This tip is more technical then the way I generally write. Although, the people who would use this feature should understand what I am talking about.Sometimes when they upgrade software they change or remove things. Most of the improvements in Windows Vista I really like, but one small feature that was removed that I really used was the "Run as..." context menu command.
This Windows XP feature allowed you run a program under a different set of user credentials then the one you logged in with. You won't often need this functionality, unless you do systems administration. There is also a command line version of this utility that is still available, but its just not as easy to use.
Mark Russinovich and Jon Schwartz created ShellRunas v1.01 to add this functionality back into Windows Vista. To get this program to install, use the Run... command (press WinKey+R) and type "[path]\shellrunas.exe /reg" (you need to include the [path] where the executable is located.
Tuesday, October 28, 2008
Security: New Critical Security Patch
A few days ago Microsoft released a critical patch known as MS08-067 (958644). If you have Automatic Updates turned on, and have it setup to install the patches for you automatically then you should have received this patch already. If you don't, I would suggest that you manually install it (download information).
This patch fixes a new security vulnerability in the Server Service that could allow remote code execution. For those of you who don't know what that mean, it basically means that someone can run a program on your computer without your knowledge.
This patch fixes a new security vulnerability in the Server Service that could allow remote code execution. For those of you who don't know what that mean, it basically means that someone can run a program on your computer without your knowledge.
Tuesday, October 21, 2008
Windows Vista: Creating Shutdown/Restart Shortcuts
Want to create a quick and easy to way restart or shutdown Vista from an icon in your desktop, quick launch bar or your Start menu? Follow the instructions below.
- Right-click an empty area on your desktop and select New > Shortcut.
- In the field labeled 'Type the location of the item,' type: shutdown.exe /s /t 00 (note: those are zeros, and not 'O's). You can also use the command shutdown.exe /r /t 00 to restart your computer instead of shutting it down.
- Press the Next button, then give your shortcut a name (i.e.: Shut Down), then Press the Finish button
- Optional: if want a different icon image. Right-click the new item you just created, then click the Shortcut tab and press the Change Icon button to select a different image to display.
Monday, October 06, 2008
Software: Virtual Desktops
Microsoft's Sysinternals group has release a new utility called 'Desktops', which is a virtual desktop manager. Basically, it allows you to have several applications open, and assign them to different virtual desktops.
So for example, let say that you have eight different programs open, but they can be grouped into 4 different categories. You can assign related application windows to different virtual desktops. So when you switch to that desktop, those application windows will be visible to you.
The advantage to using a program like this is that it allows you to organize your application windows. You can also assign hot-keys, or you can use the icon in the Notification area to switch between desktops.
So for example, let say that you have eight different programs open, but they can be grouped into 4 different categories. You can assign related application windows to different virtual desktops. So when you switch to that desktop, those application windows will be visible to you.
The advantage to using a program like this is that it allows you to organize your application windows. You can also assign hot-keys, or you can use the icon in the Notification area to switch between desktops.
Solid State Drive (SSD) vs. Hard Disk Drive (HDD) Performance Test
I don't post a lot of these videos, but I thought this was a very good comparison of a Samsung Solid State Drive (SSD) vs a standard Hard Disk Drive (HDD). SSD uses the same type of memory as portable flash drives. The SSD wins in weight, reliability, speed, and power consumption.
The problems with SSD, is that its more expensive and the available capacities are limited right now when compared to HDD.
Monday, September 29, 2008
Cool Tip: Reducing the USB Power Charger Clutter
Here is a very cool tip to help reduce the power cord clutter that can be created when you're charging your USB gadgets.
Remember: You want to find a USB hub that has a power adapter.
You can see some examples of what I am talking about here.
Subscribe to:
Posts (Atom)