Jump to content
xisto Community

abartar

Members
  • Content Count

    34
  • Joined

  • Last visited

Everything posted by abartar

  1. What type of connection are you using. You can check you download and upload speed as mentioned in the above post. It could be the problem because of the disturbances in the media that is being used to connect you to your ISP.Also it depends on the time of use. Some time Internet connection is damn slow depending on the load on the ISP. You try using your Internet at non peak hours atleast to rule out the probaility of a bug at your end.happy browsing
  2. Hi You have not mentioned the config and details of comp OS etc...You may try running a scan on the HDD. Hope it's not developing the bad sectors.Look for the processes/threads that are taking majority of CPU or memory utilisation.You will have to take a step by step approch to diagnose and resolve the issue.
  3. Friends it's not only Dell.. Most of the laptops vendor like IBM, toshiba etc... using the Sony batteries are recalling them. Please check your model nad battery part number and if it matches you can get it replaced free of charge. Nothing to PANIC it's more of a precautionary measure:Toshiba:has come out with a utility to run on the laptop to find out if your battery may require replacement. You can download it from thier site. The models having sony batteries are:Portege S100-S113TD, S100-S213TD, S100-S1132, S100-S1133, M400, M405-S8003, M400-S4032, M400-ST9113, M400-S4031, M400-S933, M300Qosmio G35-AV600, G35-AV650, G35-AV660Satellite A55-S306, A55-S3061, A55-S3062, A55-S3261, A55-S129, A55-S179, A55-S1791, A55-S1291, R10-S802TD, A55-S1066, A55-S1065, A55-S1064, R10-S820, R10-S804TD, R15-S829, A55-S1063, R10-S613, A55-S106, U205-S5021, U205-S5022, U205-S5012, U205-S5002, R20-ST4113, U200-ST3311, A50S-S1064, U205, U200, U205-S5034, U205-S5044, R25-S3513, R25-S3503, R15-S8222, R15-S822, A55-S3063, A55-S326Tecra A2, M4-S115TD, M4-S335, M4-S435, M3-S737TD, M5-S433, M3-S636, M4-S635, S3-S411TD, S3, M3-S316, M3-S336, M4-S535, M4-S515, M7-ST4013, M7, M7-S7311, M7-S7331, M6-EZ6611, M6-ST3412, M5-S5331, M5-ST1412, M5-ST8112, M5, M4-S415, M4-S315, M4, M3-S212TD, M3, M3-S311, M3-S331IBM:Model:T Series (T43, T43p, T60, T60p)X Series (X60, X60s)R Series (R51e, R52, R60, R60e)Battery Part/model number ASM P/N92P107292P108892P114292P117092P1174FRU P/N 92P107392P108992P114192P1169 or 93P502892P1173 or 93P5030
  4. By now freind you would have recived lot's of options. If you have not decide yet, I would llike to mention few things that will assist you decide on the OS that suits your need.Well regarding linux & windows you can refer to many sites and posts on this forum. I feel you might be the best judge for you requirement. Before selecting your OS consider these things:In-House vs. Outside Tech Support:1. Do you have in-house expertise to do necessary software maintenance if you're using freely available software? 2. Can you buy a product with vendor-supplied customer support? 3. Do you need to pay a third party for customer support? Freely-Available vs. Commercial Software1. If you know about a vulnerability and understand the problem, you may want to apply fixes immediately to the source code rather than wait for an upgrade or patch to be released through other channels. 2. If you select freely available OS versions and don't have the resources to maintain software in-house, it's important to know that you could be on a high risk of compromise. This risk can exist because youe will not be receiving security patches on a regular basis. Freely available OS versions but without the expertise to develop and install patches may remain at risk from the vulnerability. Understand Your NeedsWhen choosing an operating system, there are many things you need to consider.Availability of source code vs. binaries Availability of technical expertise (internal and external) Maintenance and/or customer support Regardless of the choice you make, you should first carefully review and understand your needs in terms of resources, cost, and security risk, as well as any other specific constraints; compare the available products and services to your needs; and then determine what product best matches your needs. I hope it will be helpful in deciding the best OS for your comp. Well why don't you look it in terms of long term investment rather just for the existing P3 comps.
  5. Well religion is nothing but the teachings to be and act in a socity. All religion teaches one thing broadly that is to be good to one another.What is wrong is how we interpret things...saying in religions and use it as per our whimps and fancy.Tell me which reliagion teaches to be cruel to other, to kill or hurt others but for the sake and name of religion we do what ever we wnat and what we our pleased with and then give it the name of religion. The way we preach religion . the way and the things that we our thought in the name of religion. We all our responsible citizens of our countries...so let's be good to others and to ourselves.If you hate the name religion give those teaching some other name. What is more important is to be good to others.Mind you Religion, rituals, sprituality, etc are not the same... they might be lingked some way or the other.
  6. I have never seen any post continuously active for that long....almost 1.5 months. Isn't it amazing how we start debating endlessly on topics which we feel are not true but still we keep them alive.....Most of us have said that God does not exists but we take all the pains and do write it.Let's try to keep other technical topics alive on the forum the same way we do these topics on debatable issues....
  7. Hey freinds why you all are against IE. Is it that you guys don't like IE or you all are not in favour of Microsoft & bill's policy.....If the hatered is something to do with Microsoft policies and the way they do thier bussiness....I too am in support of them...for that matter most of the companies are into the same process...what about HP...do you think they are managing thier business ethically????The way they do thier bussiness will make anyone feel the same for thier products as we all do for IE or windows etc....
  8. I had come across some type of IP hiding software like IP hider etc. Did some research on net but what I understood is that these programs spoof your IP address and give you some other address.This address is of some other range and that too of some other country. It's more like a directing you to a false proxy. But with these software most of the things like ads etc don't display. Moreover you get a different address every time you get in. Infact you have an option to select the address and range.They are good if you want to protect your privacy by not disclosing your address but nothing much. Well you can find out many practical reasons to do that.I personally feel it's not technically viable to get any address that you want. The basic concept of IP addresss scheme bares that locgic...
  9. Thank you friends but none of the options said are working.....Media player does not respond to any combination of keys except ctrl+alt+delete.
  10. I have a problem with my windows media player.It plays all videos in full screen mode. The media player does not show any menu bars etc when it starts playing video. hence I cannot reduce the size. I have tried pressing Alt + enter looking through options like video size, zoom etc, but to no luck. Even try uninstalling and reloading different version but in all case the problem persists.I have used ver. 9, 10 11 (beta). All versions are giving problems.Any help is appreciated.
  11. I am not sure of any free programs but you can certainly try out the liceneed softwares:There are lots of video imaging softwares that will solve your purpose of transfering video.. Usually the camera is shipped with these software. I use Sony vegas which transfer and edit the viddeo. it has many features.You may also try adobe premier
  12. One way to boost network security is to use Cisco's Port Security feature to lock down switch ports.A growing challenge facing network administrators is determining how to control who can access the organization's internal network—and who can't. For example, can anyone walk into your office, plug in a laptop, and access your network? You might argue that the wall jack has no connection to a switch, but couldn't someone just pull the Ethernet cable from a working PC and connect to the network that way?You might think this an unlikely scenario, but it does happen. At my organization, there are many times when people walk in and plug in thier laptops to the Info. outlet to get the n/w address.Networks having DHCP are more vulnerable to the attacks.In its most basic form, the Port Security feature remembers the Ethernet MAC address connected to the switch port and allows only that MAC address to communicate on that port. If any other MAC address tries to communicate through the port, port security will disable the port. Most of the time, network administrators configure the switch to send a SNMP trap to their network monitoring solution that the port's disabled for security reasons.This is true with most of the switches.... 3Com, Cisco etc....However, as you know, there's usually a downside. In this case, it's that the network administrator is the only one who can "unlock" the port, which can cause problems when there are legitimate reasons to change out devices.
  13. As said earlier the type and complexities of the camera depends on the object and the purpose of shooting..In my view a lense is as important as mega pixel and to an extent the lense should be considered above the resolution..There are several types of digital camera lenses:Optical zoom lens: An optical zoom is a true zoom. Its focal length actually extends and retracts. An image is magnified by the lens itself. An optical zoom produces the best quality images. A zoom lens is used to magnify an image 3X, 4X, 10X and more. Very long zooms are prone to camera shake, particularly in low light. To help prevent this, some digital cameras have image stabilization.Digital zoom lens: A digital zoom is not a true zoom. It is a simulated zoom that enlarges the central portion of an image. The actual length of the lens does not change. A digital zoom pre-crops the center area of an image. Resolution is reduced, giving the appearance of zooming in. It is similar cropping with photo editing software. A digital camera may have an option to turn off the digital zoom.Interchangeable and Converter lenses: Single Lens Reflex digital (dSLR) cameras accept a wide range of interchangeable lenses. Lenses used with a 35mm film SLR may be compatible with the same brand dSLR. Add-on converter lenses are available for many digital cameras.Resolution Affects Output:Most digital cameras allow you to change the resolution setting, so you can fit more or fewer images on your memory card. This can be a helpful feature if you only have one card or if you are on a trip and can't transfer photos to your computer. But if you take a photo of a spectacular sunset, and you capture it on a lower resolution setting like 800x600, you may be unhappy with the result if you want a 5x7 or 8x10 print. That's because the low resolution image lacks detail, and may also appear jagged. Carrying additional memory cards and keeping the camera set on its highest resolution setting is a better solution.The higher the photograph's resolution, the more plentiful printing and sharing options exist. With this in mind, the best bet is to shoot photos at the highest resolution your camera can capture. Moreover you can make more changes to the photograph on the computer if the resolution is good.To summarise if the lense is not good no matter how high your resolution is you will not get good output as output will depends on input which is through the lense...
  14. ALT+255 is for special character that represents blank space. so you are creating the folder with name as space. this can wven be done by pressing space bar ..... a single ley stroke inplace of 4 keystrokes....will save some energy and increase life of the keyboard.
  15. You can even remove red eye using the Microsoft Office Picture manger. It comes along with microsoft Office. To fix red eye:1. Select the picture you want to work with. 2. Make sure the folders that contain the pictures you want to work with are displayed in the Picture Shortcuts pane. If the folders aren't listed, add them to the pane.3. In the Picture Shortcuts pane, under Picture Shortcuts, click Add Picture Shortcut.Browse to the folder that contains the pictures you want to work with.Click Add.Select the folders containing the pictures you want to work with. 4. In the Picture Shortcuts list, do one of the following:To work with pictures in one folder, select the folder.To work with pictures in multiple folders that are next to each other, select the first folder in the group, hold down SHIFT, and then select the last folder in the group.To work with pictures in multiple folders that are not next to each other, select one folder, hold down CTRL, and then select each additional folder you want to work with.When multiple folders are selected, all the pictures from the selected folders are displayed in their current sort order in the preview pane.5. Select the picture you want to work with. If you're working in Filmstrip view, click the picture. If you're working in Single Picture view, the picture is selected by default. To move the selection, click Next or Previous . Note You can't fix red eyes using Thumbnail view.On the Formatting toolbar (toolbar: A bar with buttons and options that you use to carry out commands. To display a toolbar, press ALT and then SHIFT+F10.), click Edit Pictures. In the Edit Pictures task pane (task pane: A window within an Office application that provides commonly used commands. Its location and small size allow you to use these commands while still working on your files.), under Edit using these tools,click Red Eye Removal.Click all the red eyes you want to fix. If you want to clear the eye markers, click Reset Selected Eyes.When you are ready to make the correction, click OK.
  16. I too use FTP voyager. It is not a freeware but is a nice client software. You can download the trial version from http://forums.xisto.com/no_longer_exists/ is simple to use and has most of the features required to use..... Happy FTPing....
  17. It seems you have not used the recovery CD that comes with the Toshiba laptops. You need to install the drivers that comes along with the laptop. If you don't have the driver CD you can download it online from the following site: http://forums.xisto.com/no_longer_exists/ Basically the problem is that the OS is not recognising the hardware. It is most probably the DMI driver which helps in recognising the board and chipsets. You may download the DMI driver from the following site: http://forums.xisto.com/no_longer_exists/ If this does not work than probably try downloading the Intel chipset software utility from the following link http://forums.xisto.com/no_longer_exists/ Also update the BIOS and try other system drivers available for tecra S2. All the best.
  18. Whenever I give the control panel address it changes it to port number 2083. We are behind a firewall and uses internet thorugh a proxy server which do not allow this SSL port.It gives the following erro on Microsoft IE.Proxy Reports:12204 SSL port specified is not allowed. --------------------------------------------------------------------------------An error occurred while trying to retrieve your URL. This error could have been caused by:</e Is there any way to access control panel without this port number 2083.
  19. Every culture has had its gods. The ancient agrarian cultures had their fertility gods; the Greeks and Romans had their pantheon; Judaism, Christianity, and Islam have their one god of all. At all times and in all places people have thought that there is more to life than the material world around us.Belief in a God or Gods, it seems arises naturally the world over. It seems that there is some element common to all human experience that causes us to look for something transcendent on which to build our lives. Generally speaking, if we have an innate desire for a thing then that thing both exists and is good for us. The natural instinct to look to the transcendent, therefore, which is made evident by the fact remarked upon above that every culture of every time has had some form of religion, suggests that there might well be something transcendent out there to be found. Every effect must have a cause. This universe and everything in it is an effect. There must be something that caused everything to come into existence. Ultimately, there must be something “un-caused” in order to cause everything else to come into existence. That “un-caused” something is God. However, the existence of God cannot be proven or disproved. The Bible even says that we must accept by faith the fact that God exists.If God exists, then we are accountable for our actions to Him. If God does not exist, then we can do whatever we want without having to worry about God judging us. I believe that is why evolution is so strongly clung to by many in our society - to give people an alternative to believing in a Creator God. God exists and ultimately everyone knows that He exists. The very fact that some attempt so aggressively to disprove His existence is in fact an argument for His existence.As nations turn their backs on God, living as if He does not exist, sin abounds—political corruption, lying, slander, public displays of debauchery, violent crime, abortion, theft, adultery, drug-taking, drunkenness, gambling and greed of all kinds. Economic woes follow as taxes increase and governments borrow money to pay for bigger and bigger police forces, jails, and social security systems to patch up the problems.There is some unknown beyond which science and human thinking stops. We leave all our actions to this something unknown. This unkown is the super power which we belive is there and as we name is GOD.
  20. Does any one know where is the encryption key in Windows XP stored. In other words how can one get encryption key.Or how to retrive the data without the encrytion key.By encrypting a file or folder, we are converting it to a format that can't be read by other people. A file encryption key is added to files or folders that you choose to encrypt. This key is needed to read the file.
  21. Also you need to copy the folders which are created to store the additional scripts images etc. when you save any page. These folders will have the content to display the imgae.You may try using any of the freeware to download the page. It will download the complete page including the scripts etc...There are many freewares available online...All the best....
  22. As an alternative solution, you may even try any of the freeware mirroring software solutions. These software will copy the byte level changes from one hdd to another.- something that you would be looking for in case of mirroring.Some of the mirroring softwares provide various features like: Task log . Lets you know everything while the task is running. Task schedule. You can set any schedule you want: Specified time every day; specified time at specified day; every few minutes in one day; logout; shutdown; start up... Fully automated, unattended mode Run as service in Windows NT/2000/XP/2003. Run task automatically even if not logged in File history. You can backup original files to a third location before synchronization. Never ever lose your data! Fully bidirectional sync. All changes, for example: file deletion, updates and creation, in the main folder will update to the mirror folder; and Vice versa. Continuous, asynchronous, byte-level replication: Captures changes as they occur, ensure sequence of data as it arrives at target, all over customer's existing infrastructure. Granularity of replication: Byte-level replication copies just changed bytes, reduces network use, enables quicker replication and reduces latency.
  23. Wireless now a days is very much secure. It is as secure as any other stuff as long as you are following the security standards & guidelines.Upgrade 802.11b devices to 802.11g. 802.11b is the most common type of wireless network, but 802.11g is about five times faster. 802.11g is backward-compatible with 802.11b, so you can still use any 802.11b equipment that you have. If you're using 802.11b and you're unhappy with the performance, consider replacing your router and network adapters with 802.11g-compatible equipment. If you're buying new equipment, definitely choose 802.11g.You may also try some of these other ways to improve your wirless experience.Position your wireless router (or wireless access point) in a central location. When possible, place your wireless router in a central location in your home. If your wireless router is against an outside wall of your home, the signal will be weak on the other side of your home. Don't worry if you can't move your wireless router, because there are many other ways to improve your connection.Move the router off the floor and away from walls and metal objects (such as metal file cabinets). Metal, walls, and floors will interfere with your router's wireless signals. The closer your router is to these obstructions, the more severe the interference, and the weaker your connection will be. Replace your router's antenna. The antennas supplied with your router are designed to be omni-directional, meaning they broadcast in all directions around the router. If your router is near an outside wall, half of the wireless signals will be sent outside your home, and much of your router's power will be wasted. Most routers don't allow you to increase the power output, but you can make better use of the power. Upgrade to a hi-gain antenna that focuses the wireless signals only one direction. You can aim the signal in the direction you need it most.Add a wireless repeater. Wireless repeaters extend your wireless network range without requiring you to add any wiring. Just place the wireless repeater halfway between your wireless access point and your computer, and you'll get an instant boost to your wireless signal strength. Check out the wireless repeaters from ViewSonic, D-Link, Linksys, and Buffalo Technology.Replace your computer's wireless network adapter. Wireless network signals must be sent both to and from your computer. Sometimes, your router can broadcast strongly enough to reach your computer, but your computer can't send signals back to your router. To improve this, replace your laptop's PC card-based wireless network adapter with a USB network adapter that uses an external antenna. In particular, consider the Hawking Hi-Gain Wireless USB network adapter, which adds an external, hi-gain antenna to your computer and can significantly improve your range. Laptops with built-in wireless typically have excellent antennas and don't need to have their network adapters upgraded. Change your wireless channel. Wireless routers can broadcast on several different channels, similar to the way radio stations use different channels. Just like you'll sometimes hear interference on one radio station while another is perfectly clear, sometimes one wireless channel is clearer than others. Try changing your wireless router's channel through your router's configuration page to see if your signal strength improves. You don't need to change your computer's configuration, because it'll automatically detect the new channel. Reduce wireless interference. If you have cordless phones or other wireless electronics in your home, your computer might not be able to "hear" your router over the noise from the other wireless devices. To quiet the noise, avoid wireless electronics that use the 2.4GHz frequency. Instead, look for cordless phones that use the 5.8GHz or 900MHz frequencies. Update your firmware or your network adapter driver. Router manufacturers regularly make free improvements to their routers. Sometimes, these improvements increase performance. To get the latest firmware updates for your router, visit your router manufacturer's Web site.Pick equipment from a single vendor. While a Linksys router will work with a D-Link network adapter, you often get better performance if you pick a router and network adapter from the same vendor. Some vendors offer a performance boost of up to twice the performance when you choose their hardware: Linksys has the SpeedBooster technology, and D-Link has the 108G enhancement.
  24. Till now I too was under an impression that I can place single module and leave free slots on the computer for future expansion but recently I then came across an article that two RAMs are better than one. The article said that two smaller RAM sticks will perform better than one larger stick. - Because the PC can access both sticks in parallel, so your computer can (theoretically) have access to twice the RAM as it could if you had only the single RAM stick. No wonder in earlier days vendors use every possible RAM slot in order to take advantage of this effect. It wasn't uncommon to see a server with eight RAM sockets, each featuring a 128MB RAM chip, for a total of 1GB of RAM.Personally, I tend to buy the largest RAM sticks I can afford when I'm upgrading a machine. Since most PCs have two slots, a typical scenario is finding a PC with one 256MB stick already in place, and I'll just add a 1GB stick to that to upgrade the RAM to 1.25GB, rather than remove the 256 MB stick and replace it with two 512MB sticks. If I'm configuring a new PC, I usually just go with what's cheapest, and a single 1GB stick will be about 10 to 15 percent cheaper than two 512MB sticks.
  25. We are using Symantec Anti virus corporate edition (SAV CE). It has the server and the client side. The definitions needs to be updated on the server. The clients gets automatically updated from the server. You can even schedule it to download the definitions on the server at a particular time of the day when your bandwidth is relatively free. Some of the main features are: - Audit Network feature: includes a feature in the Symantec System Center that audits your network and reports whether each of the computers on the network has antivirus software installed and running. - Client Roaming Options: The Symantec System Center in Symantec AV 8.1 includes a graphical user interface for configuring client roaming. You can find the Client Roaming Options dialog by right-clicking the server or server group, and clicking All tasks > Symantec AntiVirus > Client Roaming Options. - Individual client configuration: you can configure individual client settings if necessary. You can even install the client from the server. not only that you can schedule to install the client on logon and that too in the background. - Offline client indication: The SSC can now display clients with a dimmed icon if they are offline. You may see the complete details at SAV features You have not mentioned about your budget as SAV CE is not free but is definitely good.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.