Senin, 22 Agustus 2011

PCTechNotes

PCTechNotes


Domain Name Extensions And Their Purposes

Posted: 21 Aug 2011 09:38 PM PDT

domain name extensions Domain Name Extensions And Their PurposesDo you know that domain name extensions have meanings and purposes? Websites owners are not just using them because they sound good. Some domain name extensions are cheaper than the others. If you are planning to buy your own domain name for your business or personal use and want to use the appropriate domain name extension, then below are the lists of domain name extensions and their meaning and purposes:

  • .com (commercial) – this is the most popular and widely used extension. If you will notice, most online businesses and companies prefer .com extension because it is highly recognized symbol if you want to set your business presence on the internet.
  • .net (network) – commonly used by companies and businesses that directly involve internet service and infrastructure like internet service providers and Web hosting companies.
  • .org (organization) – usually used by non profit or trade organization and association
  • .biz – commonly used by small business websites
  • .info – signifies a resource or information websites
  • .mobi (mobile) – for websites on mobile devices.
  • .us – American Web sites
  • .cc – this was made actually for the country code for Coco’s Keeling Islands. This is unrestricted and may used by anyone regardless of the country.
  • .bz -  this was actually for the country code for Belize. This is unrestricted and may used by anyone regardless of the country. It is now being use by small businesses who can no longer have the name they want using the .biz extension.
  • .ws  – was originally made as the country code for Western Samoa, but nowadays, it is commonly used as an acronym for “Web sites.” This is unrestricted and may used by anyone regardless of the country.
  • .tv  – is for multimedia websites. This is commonly used by websites related to entertainment or media industry.
  • .jobs- this is usually used by websites related to human resource industry.
  • .eu – this was actually made for the European Union. If you want to use it, you must meet one of these requirements: must have  a registered office, the central administration office of your business must be within the European community, or your organization was established within the European community .
  • .fm – although made for the country code, it is now commonly used for FM radio.
  • .am – just like the .fm, .am is now used for AM radio, the fact that it was originally for country code Armenia.
  • .name- this extension is created for personal use. This is commonly used by websites that gives personal information or photos of a person.
  • .edu – commonly used by schools and educational institution websites
  • .ph -this was made actually for the country code for Philippines. This is unrestricted and may used by anyone regardless of the country.
  • .edu.ph -this is commonly used by schools and educational institution in the Philippines. This is unrestricted and may used by anyone regardless of the country.
  • .travel – is restricted to used by websites related to travel industry like travel agents and airlines.
  • .pro – intended to be used by qualified professionals.
  • .aero – is reserved for association, agencies, and organization related to aviation field.
  • .int -  claimed to have the strictest usage policies. It implies that the registrant is a subject of international law. If you are applying for this, you will be required to provide treaty based evidence like United Nations treaty registration number. It should also has independent legal status.
  • .asia – is made for companies, and organizations that are based in Asia, Australia, and the Pacific.
  • .coop – restricted to cooperatives
  • .cat – is for websites with or related to Catalan language and culture
  • .museum – restricted to legitimate museum.
  • .tel – This is a contact directory providing all types of contact information straight to the Domain Name System.

Related posts:

  1. How to Easily Create Randomly Generated Identity
  2. How to track how much time you spend online with Firefox
  3. Watch what your visitors are doing on your site
  4. How Google Search Works
  5. How to Use Email Fax
  6. How to create a screenshot of an entire Webpage
  7. Dress Up Your Firefox with Personas
  8. Abbott and Costello: How not to buy a Computer

Domain Name Extensions And Their Purposes - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Senin, 15 Agustus 2011

PCTechNotes

PCTechNotes


How The Back Of Your Favorite Websites Look Like

Posted: 14 Aug 2011 11:11 PM PDT

It can be really interesting if you’ll be able to peep the back part of your favorite website, isn’t it? Literally, I mean the back part or the inside part of the website. You want to know what I mean?

Have a look:
back of twitter How The Back Of Your Favorite Websites Look Like

Quiet interesting, right? Its just like an inverted version, but its really like you’re viewing the back part. Its an image created by Back of a webpage. I can’t say what you can do to them. I mean they have no special purpose, maybe just want to show you the back part. That’s all. *grin*

But admit it, very creative, right? There are lots of back view of different websites like Flickr and Youtube, and if you want to see them or want your images or website to be featured, then be their guest!

Related posts:

  1. 500 Worst Passwords
  2. Funny Video: The Corndog
  3. Technorati Love – Technorati favorite exchange
  4. Show Your Feelings with Facebook Emoticons
  5. How to Make Firefox Display Full Size Images
  6. How Google Search Works
  7. Mozilla Firefox Keyboard Shortcuts
  8. Widescreenwallpapers.org – A Site Worth a Peek
  9. Starcraft II Released!…Finally!
  10. Cool Vintage Computer Ads

How The Back Of Your Favorite Websites Look Like - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Computer Trivia # 6: 2011 Fastest Computer

Posted: 14 Aug 2011 09:00 PM PDT

k computer riken 1 300x199 Computer Trivia # 6: 2011 Fastest ComputerDo you know that as of August 2011, the fastest computer in the world is the “K Computer“  developed by two Japanese computer RIKEN and Fujitsu?

The said K Computer system has 672 computer racks, 68,544 CPUs and  8.162 petaflops calculation speed. It won the fastest supercomputer in the Top500 ranking of the world’s supercomputers considering that is only half completed, surpassing the 2.507 petaflops of China’s Tianhe-1A that won the 2010 fastest supercomputer in world. K Computer system is expected to be completed by the year 2012 with a performance to reach 10 petaflops. But with the U.S. aiming to home the fastest computer title once again with their “Titan” computer, to be built by Cray Computer with a predicted speed of 20 petaflops, let’s see if K Computer can maintain its title by the year 2012. The Titan computer first stage of computing array is expected by the end of 2011.

* petaflop = quadrillion floating-point operations per second.

Related posts:

  1. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  2. Computer Trivia #5: The Origin of Computer Mouse
  3. The Fastest Processor – Bulldozer or Sandy Bridge?
  4. Computer Trivia #2: The Magic of 0 and 1 Digit
  5. Computer Trivia #3: The Origin of the QWERTY Keyboard
  6. Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl
  7. The Importance of Choosing the Best Computer Virus Protection
  8. 3 Things To Consider When Buying Refurbished Laptop
  9. How Computer Virus Spreads Like Crazy
  10. Poor performance?… It’s time to upgrade your Computer

Computer Trivia # 6: 2011 Fastest Computer - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Sabtu, 13 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #5: The Origin of Computer Mouse

Posted: 12 Aug 2011 09:00 PM PDT

computer mouse Computer Trivia #5: The Origin of Computer MouseDo you know that the computer mouse you are actually using now was called “mouse” because  of the cord?

The computer mouse was invented by an American inventor named Douglas Carl Engelbart. The idea of the mouse started with his thoughts of finding way for people to interact with the computer screen. According to him, their team’s early ideas are having a big heavy tracking ball that looks like a cannonball, a different gadgets with pivot that moves around, a light panel and a joystick that when you wiggle will allow you to steer things. In the end, the mouse was invented. The first mouse looked like a wooden shell with two metals.

The mouse was first called x-y position indicator, then nicknamed mouse by one of Engelbert’s team mate. They were hoping that it would get a decent name once they released it to the world, apparently it did not and was called Mouse until now.

Incoming search terms:

Related posts:

  1. Computer Trivia #3: The Origin of the QWERTY Keyboard
  2. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  3. Computer Trivia #2: The Magic of 0 and 1 Digit
  4. Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl
  5. Computer Games and their Origin
  6. Computer Terms and Meanings
  7. Benefits Of Using A Computer Mobile Workstation
  8. The Importance of Choosing the Best Computer Virus Protection
  9. Computer File Recovery FAQ's
  10. What Computer Forensics Experts Can Find

Computer Trivia #5: The Origin of Computer Mouse - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Jumat, 12 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl

Posted: 11 Aug 2011 09:00 PM PDT

chernobyl virus Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl Do you know that on the  13th anniversary of Russia’s nuclear disaster that said to be the deadliest, a windows virus known as “chernobyl” damaged around 500,000 hard drive? Its screen name “Chernobyl Virus” was created because the first payload trigger of the said virus was coincidentally fall on April 16, 1999 which was the 13th anniversary of the Chernobyl disaster.

Chernobyl a.k.a. CIH or a spacefiller is a Microsoft Windows Virus that can literally destroy a computer. This virus that was written by Chen Ing Hau during his college days at Taiwan’s Tatung University way back 1998. Chernobyl is considered one of the most damaging viruses as it was created to infect Windows based operating system by overwriting crucial information on the infected system drives, and sometimes corrupting the system BIOS. It infects

Chernobyl virus transmit under the portable executable file format to some of Windows operating system like 95, 98 and ME. Luckily,Windows NT-based OS is free from this virus. It will then split its code into small bits and embed its parts into the inter-section gaps between files and then rewrite a re-assembly routine. Because of its method of just filling the gaps, the virus do not grow its size, making if difficult for the antivirus software to identify it. This acquired the virus its another name “Spacefiller

Related posts:

  1. Computer Trivia #2: The Magic of 0 and 1 Digit
  2. How Computer Virus Spreads Like Crazy
  3. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  4. The Importance of Choosing the Best Computer Virus Protection
  5. Computer Trivia #3: The Origin of the QWERTY Keyboard
  6. Tips on How You Can Avoid Virus Infections
  7. lsass.exe a system file or a virus?
  8. How to Check if you Antivirus is Working
  9. Computer Terms and Meanings
  10. What You Need To Know About Keyloggers

Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Kamis, 11 Agustus 2011

PCTechNotes

PCTechNotes


How To Disable and Remove Thumbs.db

Posted: 11 Aug 2011 12:48 AM PDT

What is Thumbs.db

thumbdb How To Disable and Remove Thumbs.dbWhen you open your Windows Explorer or Open any of your images folder, I’m sure you have notice a small file inside those folders called thumbs.db. The main purpose of this file is to speed up the showing of thumbnails when you are viewing a folder in Thumbnail view. It stores thumbnails of graphics files, certain documents and also movie files. The only disadvantage of this file is it eats up disk space. Although this file is very small if you have lots of thumbs.db files on your drive removing them will help you save valuable disk space.

Some users are annoyed by those thumbs.db files cluttering their system. So if you are one of those people that don’t want those little files littering your disk then follow the steps below to turn this feature off.

How to disable Thumbs.db in Windows XP

  • Open My Computer or Open any folder
  • On the Menu bar, Click on Tools
  • Click on Folder Options
  • Click on the View Tab
  • Put a check in the option “Do not cache thumbnails”
  • Click Ok
  • Close My Computer

How to disable Thumbs.db in Windows 7

  • Open Local Group Policy Editor by typing gpedit.msc in the search text box
  • Expand the User Configuration found in the left-side pane of the Editor window.
  • Click Administrative Templates
  • Under Windows Components
  • Click on the Windows Explorer item.
  • Find the setting "Turn off the caching of thumbnails in hidden thumbs.db files" (see below).

disable thumbs db How To Disable and Remove Thumbs.db

  • To make changes, double-click on "Turn off the caching of thumbnails in hidden thumbs.db files"
  • Check the "Enabled" radio button and click OK

how to disable thumbs db How To Disable and Remove Thumbs.db

Close the Local Group Policy Editor and all those annoying those thumbs.db will disappear.

Related posts:

  1. How to Disable Windows XP Balloon Notifications
  2. How to Disable or Enable Your Task Manager
  3. How to Display Hidden Files and Folders
  4. How to Search the Internet from the Start Menu
  5. How to Remove Shutdown Button on Logon Screen
  6. How to disable User Account Control (UAC)
  7. How To Speed Up Disk Access by Disabling Windows XP Last Access Updating
  8. How To Show Recycle Bin On Windows 7 Windows Explorer
  9. Hiding folders – How to create an invisible folder
  10. How to Disable Auto Reboot on Windows Update

How To Disable and Remove Thumbs.db - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Computer Trivia #3: The Origin of the QWERTY Keyboard

Posted: 10 Aug 2011 09:00 PM PDT

computer keyboard 300x195 Computer Trivia #3: The Origin of the QWERTY KeyboardDo you know that the computer keyboard you are using right now began with the invention of the typewriter? The transition of the typewriter into computer keyboard was made possible by some technological development. Computer keyboard is also known as “The QWERTY keyboard”. It was invented by American inventor , Christopher Sholes.

The early computer keyboard was either a teletype machines or keypunches, and it includes a lot of electromechanical steps to be able to transmit data between keyboard and computer that slowed the process. Around late 70′s until now, all computers already been using electronic keyboards and VDTs. But the computer keyboard owes it original layout to Christopher Sholes, the inventor of the QWERTY keyboard.

Related posts:

  1. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  2. Computer Trivia #2: The Magic of 0 and 1 Digit
  3. Computer Games and their Origin
  4. How To Effectively Clean Your Keyboard
  5. Computer File Recovery FAQ's
  6. Mozilla Firefox Keyboard Shortcuts
  7. Computer Backup Programs – Online And Local Systems
  8. What Computer Forensics Experts Can Find
  9. Planning to buy used computer?
  10. Computer Terms and Meanings

Computer Trivia #3: The Origin of the QWERTY Keyboard - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Rabu, 10 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #2: The Magic of 0 and 1 Digit

Posted: 09 Aug 2011 09:00 PM PDT

computer binary digit 289x300 Computer Trivia #2: The Magic of 0 and 1 DigitDo you know that computer only understand 2 digits? That digits are 0 and 1, and they are called Binary. When you type any letters or characters in your keyboard, computer does not understand it the way we do. The character you typed will be translated to binary code designated to it. Like for letter “M”, it has binary code of 01001101.

Complicated, isn’t it? But believe it or not, that’s the way it goes.  If you are interested on knowing how it works, then try searching for Binary Numeral System. Good luck!

Related posts:

  1. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  2. The Magic of the External Laptop Battery
  3. How To Make A Good Password
  4. Computer Terms and Meanings
  5. Poor performance?… It’s time to upgrade your Computer
  6. Swype Texting – Cell Phone Texting Is About To Change
  7. How Computer Virus Spreads Like Crazy
  8. 5 Signs to Know That You are a Computer Addict
  9. Benefits Of Using A Computer Mobile Workstation
  10. Computer Games and their Origin

Computer Trivia #2: The Magic of 0 and 1 Digit - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Selasa, 09 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer

Posted: 08 Aug 2011 09:00 PM PDT

ENIAC Computer Trivia #1: ENIAC, The First General Purpose Electronic Computer

The first general-purpose electronic computer was a turing-complete digital computer known as ENIAC or Electronic Numerical Integrator And Computer was invented by John Presper Eckert and John Mauchly at the University of Pennsylvania. The construction of ENIAC began in 1943 and last until 1946. ENIAC  measured around 8x3x100 feet had 1,500 relays, 7,200 crystal diodes, 17,468 vacuum tubes, 10,000 capacitors, 7 0,000 resistors, and 5 million hand-soldered joints, and consumed 150 KW of power. Its speed was a thousand times than other electro-mechanical machines. It was designed for the purpose of calculating artillery firing tables for the US Army’s Ballistic Research Laboratory and was programmed to solve different computing problems.

 

 

 

Incoming search terms:

Related posts:

  1. Poor performance?… It’s time to upgrade your Computer
  2. Great Tips in buying a PC
  3. Planning to buy used computer?
  4. Internet Explorer 7 problems
  5. How Computer Virus Spreads Like Crazy
  6. Computer File Recovery FAQ's
  7. The Magic of the External Laptop Battery
  8. Computer Terms and Meanings
  9. Benefits Of Using A Computer Mobile Workstation
  10. Computer Games and their Origin

Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


How To Easily Remove Google Redirect Virus

Posted: 08 Aug 2011 06:55 PM PDT

One of the most annoying computer infection I ever encounter is Google redirect virus. If you are reading this post,either you are my regular reader or  you’ve been a victim of this virus and wants to know how to remove Google redirect virus.

What is Google redirect virus?

For those who still don’t know how this virus works, let me give you a “hands on” explanation. Say you are searching Google for some research works, assignments or just random browsing. You found what you are looking for, you click the link, but to your dismay, you’ve been brought to a different site. The next link you clicked also brought you to the same site. And the site has no connection to your searches or to the site you are trying to open. In other words–you’ve been redirected! Some of your computer programs  won’t run, without producing any error. Also, this google redirect virus has a capacity to block sites.

Who  are usually the victim of this Google redirect virus?

Regular users like you are the usual victim of this Google redirect virus. This virus hijacks your Google searches and then redirect you to another website, that is usually a fake websites with advertisements or corrupted pages.

Where can you get Google Redirect Virus?

Don’t curse Google for this! Google has nothing to do with this virus. Blame it to the crazy head computer genius criminals who created and distributed the malware. You can usually get this annoying virus from visiting a malicious websites with unsecured browsers.

How can you get rid of Google Redirect Virus?

Of course that’s the question you want me to answer. You still don’t need to run to your computer technician or do some formatting to your computer. Follow the instruction below in removing the Google Redirect Virus.
If for some reason you are unable to download the file then TDSS may be blocking it. What you can do is to download TDSSKiller from a clean computer then transfer it to any external drive or USB flash drive.
  • Not that simple as  running a regular program. The creator of the google redirect virus is smart enough to know what TDSSKiller can do. But don’t worry we’re wiser than him. First, rename TDSSKiller by right-clicking the TDSSKiller.exe icon from your desktop and select RENAME. Now you can edit the name with any name you want but do not forget that it should end with the .com extension. For example,  asdfgh.com or 14344.com. Now that it is wearing a mask, you can proceed with the running of the program.

kaspersky tdsskiller scan How To Easily Remove Google Redirect Virus

  • Click the Start scan button to scan your computer for TDSS infection. It will then display a result screen to find out any infection was on your computer.
  • If the infection is on your computer, you can get rid of google redirect virus by clicking the Continue button. The TDSSKiller will now work on attempting to clear your computer from the infection. If you do not get the message Cure, then just choose the default action Skip and press Continue.  Do not attempt to change it to Delete or Quarantine as it may also delete the infected files that are needed for Windows to operate properly.
  • Once finished, it will give you a report stating whether the cleaning operation is successful. Reboot is required to finish the cleaning process, so click on the Reboot now button and let it finish the removal of the TDSS infection.
If you understand this, then this information may help in detecting TDSS:

Here is a list of antivirus vendors and their detection names for TDSS.

Definition Name
Anti-virus Vendor
Packed.Win32.TDSS, Rootkit.Win32.TDSS Kaspersky Lab
Mal/TDSSPack, Mal/TDSSPk Sophos
Trojan:Win32/Alureon Microsoft
Packed.Win32.Tdss Ikarus
W32.Tidserv, Backdoor.Tidserv Symantec
Trojan.TDSS MalwareBytes'
Backdoor:W32/TDSS F-Secure
BKDR_TDSS Trend Micro
Rootkit.TDss BitDefender
Generic Rootkit.d McAfee

 

Related posts:

  1. Get Rid Of The Google Redirect Virus
  2. How to Remove Virus from USB Device
  3. How to remove autorun.inf and prevent virus spreading and infection
  4. How to remove TAGA LIPA ARE! Virus
  5. How to Remove Huelar.exe (mscvhost.exe, winlogos.exe) virus
  6. How to Remove MSBLAST.exe worm virus
  7. How to Remove JAY.EXE and MVEO.EXE Virus
  8. How to remove SCVHOST.exe (W32/YahLover.Worm.gen or Win32/Autorun.R.worm)
  9. How to remove FUN.XLS
  10. How to remove Taga Xpress On Kami

How To Easily Remove Google Redirect Virus - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks