Wednesday, April 9, 2008

Diy Disk Cleanup Program No Programme Tech Need, No Tool Need

Have you ever noticed your computer system free space reduces from day to day? Does your computer runs slower and slower day by day?
WHY?! Because Windows will generate quite a lot of junk files during installing and using, For instance, temporary files. (*. Tmp, *. mp) log files (*.log), temporary help files (*.gid), Windows file fragment (*. Chk), temporary backup files (*. Old, *. Bak) and other temporary files. Especially if you does not clear up the temporary file " Temporary Internet Files " of IE, the buffer memory file will take up the disk space more than hundreds MB. Not only have these junk files wasted the valuable disk space, but also made the system as slow as a snail. Can you tolerate this situation?! No! It is suffering! It is torturing! So you should clear up the systematic junk files regularly to keep the system "slim" and that will make the Net surfing smoothly and easily!
Now let us learn how to clean the systematic junk out! Just two simple steps to DIY your own Disk Cleanup program.
Click "Start"->"All Programs"->"Accessories"->"Notepad", copy the follow text, click "Save as", choose "Save in" as "Desktop" ,type the filename as "DiskCleanUp.bat"(Without quotes), choose "Save as " as "All files? , then click "Save" button. Finish. Note: The file suffix name must be ".bat".
That s it. Your own "Disk Cleanup" program is done. Double click it will clear up junk files in your System. It may take 1 or 2 minutes until finish running.
The following is the file content. ======Copy the below lines(Exclude this line)============================= @echo off echo cleaning the system junk file, wait a moment...... del /f /s /q *.tmp del /f /s /q *. mp del /f /s /q *.log del /f /s /q *.gid del /f /s /q *.chk del /f /s /q *.old del /f /s /q recycled*.* del /f /s /q *.bak del /f /s /q prefetch*.* rd /s /q temp & md temp del /f /q cookies*.* del /f /q recent*.* del /f /s /q "Local SettingsTemporary Internet Files*.*" del /f /s /q "Local SettingsTemp*.*" del /f /s /q "recent*.*" echo ******************************************************************* echo Junk files cleaned. echo Need PC help? Visit http://www.pc-onlinehelp.com to fix your PC instantly echo ******************************************************************* echo. & pause =====Copy up to here(Exclude this line)================================
Double click this file whenever you need to clean those junk files. When screen displays" Junk files cleaned", a "slim" system is back! See your fast system back? Do you think it useful?!
P.S. Someone ask me whether it will delete the critical files in windows? Answer: NO! It just deletes the junk files and never damages your system.
http://www.pc-onlinehelp.com provide the remote desktop support. Recover your PC instantly. Lazy? You can download the file at http://www.pc-onlinehelp.com/thread-10007234.aspx



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Sunday, April 6, 2008

Protect your Computer and Internet Privacy

Is a well-known fact that every time you open a browser, a website, something online, or read your e-mail to a Web site based on the viewer, that the information stored on your computer are available for De l & 39; later use. If you are online, weather and reading, sports, catching up on the latest news of the world or the reputation of something private that all information stored on your computer. Windows, all systems & 39; operation of the equipment as part of & quot; Temporary Internet Files & quot; or cache. Websites bits to store information, you know who you are, if you have files and Web sites, cookies on your computer. Your browser saves a list of web sites you have visited, and the places that you have in the past history of a file on your computer. Even if you are not & 39; online programs, the stories are files that you have opened or played.
Generally it & 39; there may be no reason to worry about & 39; s all these files on your computer, but that & 39; is it when you make your computer and all that & l 39; information for someone & 39; an d & 39;. Maybe visit friends and relatives and enjoy your computer and you do not want that everybody knows what the files you have on your computer. So you want to know how to delete these files.
Even, if you do not know & 39; s concern for privacy on your computer, you will be surprised at how much disk space & 39; for & 39; all of this information is necessary. If you & 39; of disk space, you can delete these files.
How do I delete these files?
For Internet Explorer version 5 or later, you can use the following instructions to the temporary files and delete cookies.
1) Open Internet Explorer and click Tools
2) Click on Internet Options
3) & 39; In the General tab, in the center of & 39; screen, click Delete Files
4) You can also activate the checkbox & Daily; delete all offline content & quot;
5) & quot; Click OK & quot; and wait until & 39; that the hourglass symbol & 39; s arrest after erase temporary Internet files
6) You can now click Delete Cookies and then click OK to delete cookies, the Web sites on your hard drive.
To clear of & 39; Internet & 39; in the history of & 39; IE:
1) Open Internet Explorer and click Tools
2) Click on Internet Options
3) & 39; In the General tab, in the center of & 39; screen, click the Clear & 39; historic
4) Click Click OK
To clean d & 39; other temporary files on your computer running Windows 98 or later:
1) & amp; quot; Click Start, Programs (or All Programs), Accessories, System Tools, Disk Cleaning
2) Select the correct reader of Rule C:
3), check the box next in the list and delete the deleting files
This method is only good if you want a free, because normally the deletion of files will deletes a file in the directory entry, and leaves the data that it contains & 39; The file on your hard drive are easy to a new way of & 39; s & 39; computer user with an Undelete utility. If you delete cookies, or if you want to cancel the & 39; story, as well as traditional methods, anyone can! Even after & 39; formatting of a hard disk, files can be restored with the more expensive hardware and software, legal use & 39; latency tracks & 39; d d & 39; analysis algorithms.
There some good programs such as http://www.amicutilities.com/privacy-guard/ http://www.amicutilities.com/privacy-guard/?v=deletecookies http://www.amicutilities.com/ Policy Confidentiality - Guard /? V = deletehistory Business & Technologies.com



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Friday, April 4, 2008

Tips to Easily Choose Good Secure PINs and Passwords

As you must be able to remember passwords and PINs easily, we are tempted to use something that we are already very familiar with the order to make it easier. We are also tempted to opt for PINs and passwords for all universal because it is easier to remember one set instead of several different sets. Unfortunately, it is dangerous to do this as a smart identity thief can break with relative ease.

Basing a password in the actual name or user name of a user should always be avoided. Also avoid passwords based on the information that is available with a little research on you, as the name of his spouse, the child& 39;s name, type of car you own, a telephone number or a label of license vehicle, address, the name of a father, his date of birth, etc.

A common method used by identity thieves to break a password is the method of attack dictionary. This method uses a dictionary in any language to deal with a large number of words to see if a word is in the actual password. Inverted, ie frequent misspellings and likeness letter replacements are also controlled.

Breaking PIN addresses in the same way. The thief begins with number easy to remember, such as combinations of sequential numbers, doubled the number or numbers that may be years or birth dates.

One solution that is very popular is to use a phrase that is easy to remember and use the first letter of each word in the phrase for the password. Using this method, the Kennedy & 39; s " Ask not what your country can do for you " translates into password " anwyccdfy "

To make it more complex mixture in some capitals, and maybe " K " Kennedy. The speech was given year may also be added to the password " Anwyccdfy1961 ". It sounds complicated but is easy to remember the year, he and the price.

Since a large number of passwords are case sensitive, the use of capital greatly increases the difficulty of breaking that password. The symbols can be used with some systems, so that using an easy to remember the brand and a dollar sign will make " Anwy password? Ccdfy $ 1961 " makes it even better password.

A change like this adds to the length of the password, making it much more difficult for an identity thief to break. A password should be at least eight characters, but fourteen or more, like the example above, is the best.

With a PIN, their options are typically more limited, usually to four numbers. It& 39;s better to select numbers randomly, and avoid repetition. You can also use a combination dark as the extension of telephone an employer makes a few jobs, especially if the company no longer exists. Combinations obvious, as part of its phone number, vehicle tag number, or date of birth, are where a thief is likely to begin the test, so these must be avoided.

To enhance the security of your passwords, you should:

Use a password for each program or application, do not use a password common to all.

Keep all passwords private, not share them with anyone who does not really need to know.

Every three or four months to change their passwords.

So not use their passwords on shared computers, as in a public library or Internet cafe as keystroke could have software installed.

If someone says they are from your bank or somewhere and asks for your password, it is not. Banks and other similar places never ask for your PIN or password.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Monday, March 31, 2008

ElderCarePay Payroll Accounting System

Need help managing payroll and taxes for household employees? Try ElderCarePayTM accounting software. With a free 30 day download, you ve got nothing to loose.

Payroll services are very expensive. Save money by doing payroll yourself. ElderCarePay payroll system which is an easy to use is an inexpensive Windows payroll system. ElderCarePay software is very easy to setup and run on your PC. You will get all the appropriate withholding taxes; and generate payroll checks with a detailed pay stub for your employees. It tells you what to pay when tax time arrives. The software supports single or multiple employees.

The Main features of ElderCarePay include:

Set-up Wizard
W-2 and W-3 forms
Schedule H forms
Checks with pay stubs or Just pay stubs
Complete payroll record maintenance
Liability and federal form reporting
Customizable reminders
Customizable reporting
Drop-down calendars
Customizable pay stub messages
Cash advance handling
Vacation pay and bonus tracking
Transaction printing and exporting household staff payroll information.

ElderCarePay and its accompanying Employer s Guide give you the power to comply with federal and state payroll tax laws without buying complicated business software or hiring expensive payroll services or accountants. Make day-to-day routines a little less stressful with our product. This is a complete solution for your payroll needs! It s easy to use and specially designed for household employers of eldercare givers. The learning curve is small you re up and running within minutes

Roger K- It s saving me from a $750 payroll service or a painful manual lookup project. Thank you for two years of a terrific product... saved me hours of manual work or thousands of dollars with a payroll service (which I had initial agreed to use)." shelli hannelore



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com