Jan 062010
 

If you have more than one operating system installed along with your Windows 7 and Windows Vista then you may be aware that the Windows Boot Manager displays the multi OS menu for 30 seconds before choosing the default operating system and boot your PC or Laptop. However, this can be reduced or increased by one simple command from the Command Prompt.

Continue reading »

Incoming search terms:

Jan 052010
 

ThreatFire is zero-day malware protection tool from PC Tools which is free for personal use. ThreatFire works alongside your existing Antivirus, Anti-Spyware,Firewall software and employs behaviourial analysis techniques to catch malicous activities on the system like keystroke logging etc.

Continue reading »

Incoming search terms:

Dec 202009
 

SyncToy is a great free utility for Windows which allows you to sync or backup different directories on your system. SyncToy is a great way to keep to different directories in sync be it your documents directory and is backup on a USB stick or your Digital Camera memory and your Pictures directory or your backup to a Network Drive or NAS.

Continue reading »

Incoming search terms:

Dec 202009
 

Starting Windows 7, the indexing service indexes the contents of the files while they are created or modified. This means features like Instant Search readily provides results for your searches by looking into its index of file contents.

However, if you don’t search your  disk quite often or have multiple disks where the disk or paritions where content is not searched often (for example, you just have your Windows install and program files on C: and the rest of data on drive D:) then you can turn off this content indexing feature to improve performance.

Continue reading »

Incoming search terms:

Nov 022009
 

One of the many annoyance in Windows Vista was the User Access Control. While it is a good security feature, it was very badly implemented. I’m sure most if not all of you who read thus agree. To make it worse, while UAC clearly brought to ones eye what risk can there be to your system when an unauthorised program tries to take control of your system and make changes. The options one had were either to disable UAC and take the risk of a security breach or live with the UAC annoyance.

Continue reading »

Incoming search terms: