28 Feb 2013

Norton Internet Security 2012 Full Version With Key


Free Download Norton Internet Security 2012 Full Version With Serial Key


Norton Internet Security 2012 Full Version With Key, Software, Antivirus Softwares, GDDon, Download,



Download


Description:

Norton Internet Security 2012 Full Version With Key is one of the best security software. Norton Internet Security 2012 Full Version With Key is very easy to understand and use. Norton Internet Security 2012 is the latest version of norton anti virus. Norton Internet Security 2012 is available here with key and its a great opportunity for every 1 to get this complete software absolutely free at zero cost with the support of Computer Training 2011 Blog. Just click at Download link above and get your free version of Norton Internet Security 2012.



Do you like Norton Internet Security 2012 Version?

Ref: http://computertraining2011.blogspot.in

Is Software to Clean and Speed Up Your PC Useful?


There is a multi-billion dollar business built around selling PC and Mac cleaning software. They come in all shapes, sizes and prices and tout the necessity to clean, tune, and fix your computer so that it runs smoothly and efficiently. I’ve even written about many of these programs myself on Help Desk Geek and Online Tech Tips.

But do you really need all that software? Are there any real gains or is it just a bunch of fluff? Well the answer is, it depends. Sometimes a third-party program can provide a valuable service if you know how to use it. However, I have found that most of the utilities recommended on the Internet are full of options and settings that can end up harming your computer more than helping. Not only that, but many big name sites like PC World have lots of articles on tools to “clean” your computer which are absolutely horrible.

When you talk about cleaning up a computer, whether it be a Mac or a PC, it could refer to any number of things. Let’s break down what each of those categories are and see if it makes sense to use them or not.
Registry Cleaners

Four years back, I wrote a typical 10 best registry cleaners and basically doled out a list of popular and semi-popular registry cleaners without really explaining anything. What does a registry cleaner actually do? Well, it basically (and theoretically) is supposed to remove unused or old entries, thereby “speeding” up your computer.

Even if you remove only those entries that are not needed, the performance impact is minimal. If you try to do a search for actual performance tests done before and after using a registry cleaner, you’ll find that there are very few actual tests and in the actual tests, there is basically zero difference in performance.

So that’s point one. The second issue is that a lot of registry cleaners will clean out the wrong entries. The only one that I have used and continue to use is CCleaner. It’s one that will not break your system. There is really not another one I can vouch for completely




At the end of the day, registry cleaners can break your computer, offer no real increase in performance and waste your time. If you want to speed up your computer, read my articles on how to speed up Windows 7 and speed up Windows 8. Also, uninstall useless programs on your system. That does a lot more in terms of performance than cleaning your registry.
File Cleaners

File cleaners are tools that will do their best to remove junk or unused files on your computer. This includes temporary files, cookies, Windows hot-fixes, cache files, history files, log files, clipboard data, etc, etc. In my view, there are only two decent programs for this that you would ever need: CCleaner and PC Decrapifier.

CCleaner does a great job of cleaning out files that you may no longer need. Again, I’ve never really saved a significant amount of space from using the tool, but if you really want to be super neat and tidy, that’s all you need. On average, I save about 1 GB in space when I run it every few months. Not going to give you back half your hard drive and with hard drives being so large today, it’s not really a big deal if you never do it.

PC Decrapifier is a program that helps you uninstall crap software that comes with new PCs you buy from Dell, HP, etc. I personally recommend just doing a clean install first and then using your computer. Here’s my guide on doing a clean install of Windows 7 and a clean install of Windows 8.
Uninstallers

If you install a lot of software on your PC, you can easily uninstall it yourself. However, there is a whole category of software to help you uninstall programs. Is this necessary? Kind of. I personally try not to install anything on my main PC that I won’t be using every day. If I want to try something or my kids want a game to play, etc, I use a secondary machine and install all the junk. That machine then gets wiped every few months and starts all over again. I also use a virtual machine and load other software there.

If you don’t have a second PC or don’t know how virtual PCs work, you might have software on your system that you don’t want anymore. Most software will have uninstallers to properly remove all the files, but a lot of times they leave stuff behind. On top of that, some programs simply do not come with uninstallers, which is really annoying.

In those cases, I only suggest Revo Uninstaller. It’s been around for a long time and does the best job. It’s not free, so I would only spend the money if you have a lot of programs that didn’t come with proper uninstallers. Otherwise, you can uninstall them and then run CCleaner to clean out any old or unused entries from those programs.

Also, like with most of these tools, it comes with some other utilities that you really don’t need. However, it’s still ok in my book for some users as uninstalling programs is not necessarily a smooth experience in Windows.
Startup Cleaners

Startup cleaners are the really useless programs if you ask me. Windows has built-in tools to see all the startup programs on your system and there is really no need to see the startup drivers, DLLs, etc, etc that some of these programs tout. Beyond simple programs, it really makes no difference unless you’re a tech geek





A lot of the programs claim they will give you descriptions and details on each of the programs and while this may be true, you really don’t need a program for that info. Just read my article on how to change startup programs in Windows (and startup programs in Windows 8, since it’s in a new location), then do a Google search on any startup item you’re not sure about!

I definitely do not recommend installing a startup cleaner as it’s something that can be done by the user with a little bit of time and research. Now can disabling startup programs make a difference? Yes! Startup programs can really slow down your PC, so it is a good idea to disable any you think you won’t need. Again, it’s like the registry because if you disable the wrong item, your computer may not work properly. Just do a little Googling before you disable something and you’ll be fine.
Duplicate File Finders

Another set of tools are geared towards removing duplicate files. I would have to say that this can be useful. I’ve had a lot of occasions where I copied the same photos or videos off my camera and then had a bunch of extra space being used because of that. A duplicate file finder can save your some disk space if you have a lot of photos, videos, or music that might be duplicated





A lot of the programs claim they will give you descriptions and details on each of the programs and while this may be true, you really don’t need a program for that info. Just read my article on how to change startup programs in Windows (and startup programs in Windows 8, since it’s in a new location), then do a Google search on any startup item you’re not sure about!

I definitely do not recommend installing a startup cleaner as it’s something that can be done by the user with a little bit of time and research. Now can disabling startup programs make a difference? Yes! Startup programs can really slow down your PC, so it is a good idea to disable any you think you won’t need. Again, it’s like the registry because if you disable the wrong item, your computer may not work properly. Just do a little Googling before you disable something and you’ll be fine.
Duplicate File Finders

Another set of tools are geared towards removing duplicate files. I would have to say that this can be useful. I’ve had a lot of occasions where I copied the same photos or videos off my camera and then had a bunch of extra space being used because of that. A duplicate file finder can save your some disk space if you have a lot of photos, videos, or music that might be duplicated


For photos, I’ve used Picasa to find duplicates because it looks at the actual picture to make sure it’s a duplicate, rather than just the file name. For videos and music, there are a lot of programs out there and I suggest you just Google it. Make sure you run the EXE file through VirusTotal before you install it. I would only download a tool that finds just duplicates rather than those all-in-tools that do X, Y, Z, etc.

Also, make sure you don’t buy anything. There are a lot of great free programs that can find duplicates, so don’t get suckered into purchasing something just to remove duplicates.
Browser/History Cleaners

Unless you can’t type and search in Google, you really do no need browser and history cleaners. I mean it’s a fairly easy thing to do. Don’t get tricked into thinking that the program can securely wipe or completely delete or any other useless hype they give you. You can delete your history just fine and make sure it can’t be recovered.

Most people end up buying this software because they have some shady browsing they need to hide and they get scared that someone will find it unless they use one of these tools that claim only their program can really delete your browsing history. Complete BS. Here are some previous article I wrote on the topic:

Delete Browsing History in Firefox

Clear Google Search History

How to Remove and Delete Cookies

Basically, you want to delete your browsing history using the browser and clear the cache. That’s it. You don’t need any fancy tool to do that. No one has ever been able to recover my history. I even tried to recovery my own history to see if this was good enough and it was.
Internet Speed Boosters

Internet speed boosters are another useless category of software you should never install. These programs are more likely to break your Internet connection or slow it down more than speed anything up. You want a faster Internet connection? Get a faster wireless router, clear up interference on your wireless network, and boost your Wifi signal.

There are some occasions where changing some TCP or network settings can speed up file write/read performance over the network, but that is usually for LAN traffic and not your Internet connection. Call your ISP and increase your download speed, but don’t install a speed booster!
Conclusion

As you can see from above, I don’t recommend installing too many so-called optimizers and tune-up utilities for your PC. There are a few good programs out there, but the majority suck. Try to do as much as you can by yourself and then only use trusted programs like the ones I mentioned above. What are your thoughts about clean up utilities? Do you use any? Let us know in the comments. Enjoy!

7 Ways to Child Proof a Computer


I have a 2 year old daughter and I have realized the importance of child-proofing my computer! The second I turn around, she runs to my desk, jumps on the chair and starts banging away at the keys. If the computer is already on, she has figured out how to move the mouse and click on anything she can. It’s great fun for her, but a major headache for me.

I didn’t really think she could do anything, but apparently randomly pressing a bunch of keys on the keyboard can accomplish a lot more than you think! My daughter sent emails, deleted folders, opened programs, and even moved files with her keyboard slamming. In this article, I’ll talk about a few ways you can child-proof your computer and hopefully save yourself some grief. If your kids are older, I’ll also give you some tips for them too!
Method 1 – Lock Your Computer

This simple option solved most of my problems with my daughter. If the computer was off and she slammed the keys, it would turn on, but remain on the locked screen. Thankfully, she’s too small to enter a password just yet




Before my computer goes to sleep, the screen saver usually comes on. I also enabled the password on the screen saver in case she gets to it before the computer sleeps. I have my computer sleep after about an hour, so there are a lot of times when the screen saver is on.
Method 2 – Use a Limited Account or UAC

The first method only works for really young toddlers, not with kids that are older than 3. By that age, they will probably scream and yell until you let them on the computer. At this point, you need to give them access to the computer so they can play games or do whatever, but also make sure they can’t do anything else





One way to do this is to use a locked down user account. You can use the Guest account in Windows, which has limited user rights across the system. The Standard user account still has a lot of permissions and can do quite a bit. The guest account is disabled by default, but you can enable it and it prevents the user from installing software, changing settings, etc.

Another feature in Windows is UAC (User Account Control). You can set this to the highest setting and any standard user account will have to enter a password in order to complete the task. UAC pops up quite a bit if you  have it set to the highest setting, so those users will not be able to change most of the settings on the computer




Method 3 – Parental Controls

Windows 7 and Windows 8 have built-in parental controls that let you restrict the programs that can be run on the computer, the time the computer can be used and even filter web sites the user can visit





You can Google on how to enable Parental Controls and this may suit your needs. It’s not total protection, but it can help you control what can be done on the computer. If you are worried about data being deleted or getting a virus, this method won’t work very well.

There is also a feature in Windows 7 (not the Home version) called AppLocker that prevents programs from being run. You can basically choose which programs you want to allow to be run and the user will only be able to open those programs. You can learn about AppLocker here.
Method 4 – Group Policy

Parental Controls is nice, but if you want access to a ton more rules and restrictions, you’ll have to familiarize yourself with group policy. You can restrict access to drives, restrict access to the Control Panel, remove tabs from IE options dialog, restrict access to the registry, command prompt or task manager, prevent users from deleting browsing history, and all kinds of other stuff. Group policy can control every aspect of Windows, so you can really lock down a computer hardcore by using it. To get to the local group policy for a PC, just type gpedit.msc when you click on the Start button
image---------------------------------------------------------------------------------------------
If you are running Windows 7 Home or Starter, you won’t be able to use local group policy settings. Unfortunately, it only works on Windows 7 Pro, Ultimate and Enterprise. If you have any of these versions, it’s super useful for locking down a PC. There are a ton of articles online that explain how to use local group policy, so have fun!
Method 5 – Encryption

If you’re looking for a way to keep your data safe, you may want to look into creating a secure encrypted container on your system. You can do this using a program called TrueCrypt. It’s a free program that has been around for a long time and does an amazing job.





If you have important files you don’t want anyone to access or accidentally delete, you can create a encrypted container that you can mount to the system only when you need to use it. Otherwise, it doesn’t even show up on the system. The HowToGeek has a great guide on getting started with TrueCrypt that explains how to do this.
Method 6 – Deep Freeze It

There is this amazing program for IT people called Deep Freeze, which is about $35, but is something that a lot of parents would love. Maybe you don’t care about setting up parental controls or learning group policy or encrypting your hard drives, etc, etc. What if you could let your kids do anything to the computer: delete files, change settings, install crapware, download viruses, etc and then magically get everything the way it was with a restart





Deep Freeze does exactly that. It’s absolutely awesome. A lot of companies and schools use this software because you can setup your system the way you want, let users wreak havoc, and then simply restart the computer to get it back to the original state. They can literally delete system files and it won’t matter. If you want need something like that, then buy this software. I’ve used it myself and it works amazing well. Read more about it on their site.
Method 7 – Install Another OS

One method I use to make sure guests coming over to my house don’t access my personal files or mess up my system is to install another copy of Windows on the same PC. You probably have some old computer running XP or something, so just install a dual boot system with your main OS and a secondary OS that you can boot up to for other users.

I have a Windows 7 machine that also has Windows XP installed along with Deep Freeze. Firstly, there are no perosnal files or programs on XP other than the basic stuff. Even if someone does something or installs a program, etc, I just restart it and I’m back to my clean install of Windows XP. Of course, you need to get another copy of Windows, but if you don’t have a copy, then just use Linux!

I also have Ubuntu installed and that’s totally free. You can even download a specific flavor of Ubuntu that matches the style of Windows, so users won’t be disoriented if they have never seen Linux before.

Those are seven quick tips that I’ve used in the past to secure my computers from children, nosy people and everyone else. How do you child-proof your computer? Let us know in the comments. Enjoy!
END///////////////////////////////////////////////////////////////////////////////////////////////

Tasks That Should Have Been Simpler in Windows 8


I’ve been using Windows 8 for a while now and even though I like using it, there are still some really annoying aspects of the OS that I just don’t get. For instance, why is it so hard to do things that used to be so easy? Restart your computer? Print from a Windows app? The OS has been “re-imagined”, but I find some of the new ways to get simple things done frustrating. Here’s my gripe list for Windows 8.



Shutting Down and Restarting Windows 8

I don’t restart or shutdown my computer often, but it really should be easier than opening the Charms bar and having to click three times! I’m not really sure why Microsoft didn’t put a shut down and restart option on the Start Screen somewhere just click they have the Lock and Sign out options. Instead you have to open the Charms bar, click on Settings, then click on Power and then click on Restart or Shutdown





You can add the shutdown and restart options to the right-click menu or create shortcuts on the Start Screen, but at the end of the day, it should have been a simpler task to accomplish.
Printing from Windows Apps

This one really gets me too! It took me a while to figure out how to print from a Windows app. I tried my best not to search on Google because I wanted to figure it out myself. I assumed it would be easy enough since that is something that just about everyone under the sun does quite often



Again, you have to open the Charms bar and click on Devices. There you will see your list of printers. Not very intuitive if you ask me. Thankfully, you can still press CTRL + P to print while inside of Windows apps. If you’re trying to print a PDF using the built-in Reader app, that’s how you do it!
Closing Apps in Windows 8

Going from clicking the X in a normal desktop app to closing apps in Windows 8 is going from Earth to Mars. Basically, Microsoft’s perspective is that you can just leave Windows apps open all the time and switch back and forth between them. I personally don’t like that idea too much.

There are a couple of ways to close an app in Windows 8. The easiest way is to move your mouse up to the top center of the screen, click your left mouse button and then start dragging down. The app windows becomes smaller and then simply disappears once you reach the bottom of the screen. You’ll be brought back to the Start Screen once the apps closes.





You can also read my previous post on using the hot corners on the left side of the screen to close running Windows 8 apps. However, that method still requires you to manually close each app. What if you have 20 apps open? Check out the last tip in my 5 tips for speeding up Windows 8 to see how you can close all running Windows apps at once.
Booting to Safe Mode

Gone are the days of pressing F8 to get your list of boot options. Now you have a multi-step process to get into Safe Mode in Windows 8. First, you have to boot into System Recovery Options. Once you are there, you then have to go through a bunch of prompts before you finally get the option to boot into Safe Mode





The new boot screens are a lot nicer looking than previous versions of Windows, but it makes the process a lot more complicated. Getting into Safe Mode used to be so easy, now it’s not!
Playing DVDs

Microsoft removed the ability of Windows 8 to play DVDs due to licensing costs, but if you have included something in Windows for that long, just removing it without any clear guidance is frustrating. Obviously, most consumers buying new Windows 8 PCs won’t be affected because the manufacturer will probably install some kind of DVD playing software.

However, if you are upgrading to Windows 8, even Windows 8 Pro, you still either have to download third-party software or purchase the Windows Media Center add-on pack. It’s not that expensive for the add-on pack and you can always download a program like VLC media player, but it is definitely confusing to novice users.

Over time, I’m sure everyone will get used to these new ways of doing things, but for right now, it’s something that makes me feel I have to do extra work. What do you think? Do you like Windows 8? Any tasks you feel take longer in Windows 8 than in previous versions? Let us know in the comments. Enjoy

How to Enable GodMode in Windows 8


October 30th, 2012 by akishore | File in: Windows 8
Advertisements
image---------------------------------------------------------------------------------------------
Windows 7 users were delighted when they found out about a secret feature called GodMode. It basically lets you create a folder with a special name that somehow then gives you access to just about all of the controls, options and settings for the OS.

Luckily, you can enable GodMode in Windows 8 too! To get started, just create a folder on the desktop and name it whatever you like. After that, right-click and it and choose Rename. Now just add the following to the end of the folder name:

    .{ED7BA470-8E54-465E-825C-99712043E01C}

As you can see, you need to include the . before the opening bracket. Here’s my mine looks like:

    All Settings.{ED7BA470-8E54-465E-825C-99712043E01C}



When you do this, the icon on the folder changes into one that is exactly the same as the Control Panel.



However, if you click on the new GodMode icon, you’ll get a folder with a bunch of links to all kinds of settings on Windows 8. It’s nice because it even breaks it down by category.



Now you can access every single setting and option in Windows 8 from one folder! So if you are having a hard time finding a particular setting or control panel item, just open this folder and do a search. It’s great because you can narrow down the huge list by typing in a few keywords.




Sweet! So that’s how you enable GodMode in Windows 8. However, there is also another way to get access to a lot of settings in Windows 8. The new Start Screen has a built-in search option that lets you search all system settings. Go to the Start Screen and type in the word Settings.




You get a pretty big list of 91 settings you can adjust. Just swipe with your finger or scroll with your mouse to access all of the settings.



OTT Guide to Understanding Google Chrome Advanced Features


Google Chrome is a pretty awesome browser and each new update always brings an additional cool or useful feature. Chrome is a special browser in my view because it’s created by Google. For this reason, Chrome has some features that utilize the advanced technology that Google has developed over the last decade with their other products like search, docs, etc.

In this post, I’m going to go through some of the advanced options and settings in Google Chrome and explain what those features do. In some cases, you may want to enable them and in other cases, you may want to disable the advanced options. Either way, it’s good to know what your choices are and how they can benefit you.


To get started, let’s go to the Advanced Settings section in Chrome. Click on the Customize button in the top right corner and click on Settings.




Then scroll down and click on the Show advanced settings link at the bottom of the page. Here you will see all of the advanced settings, some of which I will talk about more in this post.
Privacy/Web Services

All of the interesting advanced features of Chrome are under the Privacy section in advanced settings. Here you can clear the cache, manage cookies and pop-ups and enable or disable the use of a couple of web services.

Up until a couple of days ago, Google Chrome was the only major browser that did not have an option for enabling Do Not Track. It’s now been added as an option under the Privacy section.

do not track

If you want to enable this option, check the Send a ‘Do Not Track’ request with your browsing traffic box. This basically will notify each website that you wish not to be tracked while browsing. Note that this doesn’t guarantee your privacy in any way, it just tells a website that this is your preference. It’s up to the website to actually heed the request. They can completely ignore it if they like and capture any data they like. When you check the box, you’ll get a pop up message explaining this:



This option is not enabled by default, so you will have to manually enable it if you want the feature. Another advanced option is the Use a web service to help resolve navigation errors checkbox.



What exactly does this option do? Well, it basically can help you find an alternative website if the site you are trying to visit is down. Or let’s say you type in an address and it cannot be resolved to a web page, Chrome will try to give you helpful options. For example, if i type in abcnewsss.com, I will get the Oops! Google Chrome could not find abcnewsss.com, but will also get a suggestion for the correct site.



This has proved to be very helpful in a lot of situations when I could not remember the exact URL for a website, but had a slight inkling. Using their advanced algorithms and huge datasets, you always end up getting the right answer or the answer you are looking for.



This is another really useful feature that utilizes Google’s advanced algorithms to give you suggestions as you type in the address bar. The feature will show you related matches from your browsing history, related web searches and list popular websites that might match what you are typing.



As you can see in the example above, if I type in car prices, I automatically get a couple of extra options including car prices in india, kbb.com and car prices in usa. This is cool because I’m currently in India and it detected my location and then gave me a location-specific option. The next option, Predict network actions to improve page load performance, can speed up your browsing experience in Google Chrome.



Chrome has an awesome prerendering technology that will automatically prerender a page before you click on it if it feels there is a high chance you will visit that page next. I have found browsing to be faster, especially when using the Internet on a slow Internet connection.

The Enable phishing and malware protection is an advanced option you should definitely enable. Google is the king of indexing web pages on the Internet and therefore it knows a ton about each page, including whether the page is spammy, has malware, or is a phishing website.



Chrome will give you a huge warning page telling you that the site may contain malware and could harm your computer. You even have to check a box and then click Proceed Anyway to actually visit the site. I have found that this warning isn’t always accurate, but the percentage of false positives is tiny. There have been a bunch of times when I clicked on a link from an email or from Facebook and didn’t visit the site because Chrome notified me of possible malware.

The last web service in Chrome is the Use a web service to help resolve spelling errors checkbox. This is really great because you can basically upgrade your spell checker in Chrome to the same spell checker that is used in Google search and Google docs.



The basic spell checker will basically match words against a dictionary, which is good, but if you check this option, you also get an advanced spell checker that understands context also. For example, if I type in Icland is an icland, you can right click and see that Google managed to figure out you were trying to type Iceland is an island.



Pretty neat! You won’t get that kind of spell checking if you don’t enable this option. These are a couple of the really useful advanced features of Chrome that you should check out if haven’t done so already. Enjoy!

Prevent Google Chrome from Opening PDF Files in the Browser


I’ve been working on a project lately where I have to download a lot of PDFs from a website and then go through them and highlight text, add comments, etc. In Google Chrome, whenever I click on a link to a PDF file, it just opens the file inside the browser window.



This is pretty convenient for most people and it was fine for me until I started this project. Other than viewing the PDF file, you really can’t do anything else with the file if it’s opened in Chrome. So basically, I was clicking on the save button, saving it to the hard drive and then opening it from there. After a while, this started to become a little annoying and time consuming.



I was using Adobe Acrobat on my Mac to make the edits to the PDF files, so I wanted to use that instead of Chrome. Finally, after playing around with stuff for a while, I managed to figure out a good solution. In order to prevent Chrome from opening the PDF files, I had to disable the Chrome PDF Viewer. Here’s how you can do it. Open Chrome and paste the following into the address bar:

    chrome://plugins/

Now find Chrome PDF Viewer and click on the Disable link.



Once you disable Chrome PDF Viewer, when you click on a link for a PDF file, it will now just download it like a normal file as shown below:



Now when you click on the file, it will automatically open in the default application set for opening PDF files on your machine. Note that in addition to disabling Chrome PDF Viewer, you might also have to disable Adobe PDF Viewer in the Chrome plug-ins section. When you install Adobe Acrobat, it also installs a PDF viewer in Chrome too, so if you want to open the PDF files in the desktop Adobe program, you’ll need to disable all PDF viewers that are Chrome plug-ins.

In addition, you may have to change the default program for opening PDF files on your computer. For example, on my Mac, the PDF files were opening in Preview rather than Adobe Acrobat. To change the PDF viewer on a Mac, you have to right-click on a PDF file and choose Get Info.



Then you have to expand the Open with section and change the program to the desired PDF viewer of your choice. Then click the Change All button, which will ensure all PDF files open using that program.



For Windows users, you can check out my previous posts on changing the default program to open a file with and setting default programs in Windows 7. Hopefully, if you are one of those folks who doesn’t need the default PDF viewer in Chrome, you can use the technique above to solve the problem. Enjoy!



Websites using Facebook, Google or Twitter Accounts?


OTT Explains – Is It Better to Log Into Websites using Facebook, Google or Twitter Accounts?

Over the years, you may have noticed that a lot of websites let you use your Facebook, Google or Twitter account to log into their websites. You don’t have to create a new username or password and a lot of the sites will automatically share your activity on Facebook if you give authorization.

This makes logging into those websites very convenient because you don’t have to create another set of usernames and passwords that you have to remember. For example, you can log into sites like rottentomatoes.com, sears.com, citysearch.com, stackoverflow.com, friendfeed.com, getsatisfaction.com and a million other sites using Facebook, Google or Twitter.



By far, the most popular option is Facebook. Facebook released a set of APIs in 2008 called Facebook Connect that changed how people log into third-party websites. Just about every major sites now lets you use Facebook Connect to log into their websites.
The idea has exploded in popularity and you might be logging into a lot of websites using Facebook without even thinking about it. However, like with everything in the world, there are advantages and disadvantages to this type of login.

Advantages

The advantages of logging into multiple websites using the same credentials are fairly clear. Here’s what I find to be most useful:

1. No need to remember multiple sets of usernames and passwords for each site.

2. Credentials are less likely to be hacked since they are securely stored with Facebook, Google, or Twitter.

3. Sites are customized to use the Facebook API and therefore make it super easy to share your activity on those sites with your friends and family.

These are the three main advantages to using your current Facebook, Google or Twitter account to log into a third-party website. One of the main benefits I see is the fact that your credentials are more secure with the likes of Google and Facebook. There are a lot of websites that have great services, but don’t follow strict security procedures and can lose your information to hackers. I’ve gotten many emails over the years from companies that had their databases hacked and therefore my account was compromised.
Disadvantages

You probably have heard the phrase “Don’t keep all your eggs in one basket” and you’ve probably read online at least once not to use the same password for every website you log into. There are reasons why you hear these statements over and over again.

The disadvantages to using Facebook Connect to login to every website you visit or comment on also are pretty clear:

1. Facebook, Google, Twitter become a single point of failure. If you lose access to any of those accounts, you lose access to all of the sites that rely on that account.

2. Similarly, if your account is hacked, the hacker could potentially see what apps you use on Facebook, etc and then log into those websites as you.

That’s basically the only disadvantage, but it’s a really big one. The fact that you are entrusting that much information to one particular site or service could cause privacy issues later on. Does Facebook, Google and Twitter get to keep all of that information about your activity forever? What happens if they sell it to someone else later on? It’s definitely risky if you don’t like one company to have access to so much information about you.
Conclusion

In the end, you want to diversify. I personally have some websites where I login using Facebook Connect, others using Twitter, others via Google and the rest using the regular website login. This way you’re not relying on one service or company for logging into a bunch of different sites.

Also, note that using Facebook to log into other sites will reduce your privacy because of how data can be posted back and forth between the site and Facebook. If you log into a website using Google or Twitter, there is less chance of that activity being posted to your Twitter feed or on Google+. For whatever reason, Facebook apps that you authorize tend to collect a lot more information and also post that info to your Facebook account.

Even though you probably haven’t heard of many horror stories yet, there are bound to be cases of hacking, theft, outages, lost access, etc as this type of login option becomes more popular. As with everything, try to stay diversified and you’ll be safer on the Internet. Do you use Facebook, Twitter or Google to log into websites? Let us know in the comments. Enjoy!


OTT Explains – Is It Better to Log Into Websites using Facebook, Google or Twitter Accounts?

How to delete a user account in Windows 8?


How to delete a user account in Windows 8?

SOLUTION:-
1. Go to control panel.
2. Select "User Accounts and Family Safety".


3. Select "Remove user accounts".


4. Select that user which you want to delete.


5. Select option "Delete the account".


6. Now a dialoge box appearing for asking you to keep/delete the files of your user account.


7. After that again a dialoge box appear for confirmation of deleting your user account.


8. If you want to delete your user account click on "Delete account".


9. Now your user account is deleted.








How to delete a user account in Windows 8?

How to make a hidden folder in Window 8?


How to make a hidden folder in Window 8?

SOLUTION:-
1. Select a folder.
2. Right click on that selected folder.
3. Select properties.
4. By default you are in general tab(button).




5. Select hidden in Attributes.



6. Apply and then ok.






How to make a hidden folder in Window 8?

27 Feb 2013

About ASP.NET

                                                    About ASP.NET


ASP.NET is a server-side Web application framework designed for Web development to produce dynamic Web pages. It was developed by Microsoft to allow programmers to build dynamic web sites, web applications and web services. It was first released in January 2002 with version 1.0 of the .NET Framework, and is the successor to Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on the Common Language Runtime (CLR), allowing programmers to write ASP.NET code using any supported .NET language. The ASP.NET SOAP extension framework allows ASP.NET components to process SOAP messages.



HistoryAfter four years of development, and a series of beta releases in 2000 and 2001, ASP.NET 1.0 was released on January 5, 2002 as part of version 1.0 of the .NET Framework. Even prior to the release, dozens of books had been written about ASP.NET,[1] and Microsoft promoted it heavily as part of its platform for Web services. Scott Guthrie became the product unit manager for ASP.NET, and development continued apace, with version 1.1 being released on April 24, 2003 as a part of Windows Server 2003. This release focused on improving ASP.NET's support for mobile devices.

CharacteristicsASP.NET Web pages, known officially as Web Forms,are the main building block for application development.Web forms are contained in files with a ".aspx" extension; these files typically contain static (X)HTML markup, as well as markup defining server-side Web Controls and User Controls where the developers place all the rc content[further explanation needed] for the Web page. Additionally, dynamic code which runs on the server can be placed in a page within a block <% -- dynamic code -- %>, which is similar to other Web development technologies such as PHP, JSP, and ASP. With ASP.NET Framework 2.0, Microsoft introduced a new code-behind model which allows static text to remain on the .aspx page, while dynamic code remains in an .aspx.vb or .aspx.cs or .aspx.fs file (depending on the programming language used).

DirectivesA directive is special instructions on how ASP.NET should process the page.The most common directive is <%@ Page %> which can specify many attributes used by the ASP.NET page parser and compiler.

Examples[edit] Inline code<%@ Page Language="C#" %>
<!DOCTYPE html PUBLIC "---//W3C//DTD XHTML 1.0  //EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<script runat="server">
  protected void Page_Load(object sender, EventArgs e)
  {
    // Assign the datetime to label control
    lbl1.Text = DateTime.Now.ToLongTimeString();

  }
</script>

<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
  <title>Sample page</title>
</head>
<body>
  <form id="form1" runat="server">


      The current time is: <asp:Label runat="server" id="lbl1" />

  </form>
</body>
</html>
The above page renders with the Text "The current time is: " and the current time.

Code-behind solutions<%@ Page Language="C#" CodeFile="SampleCodeBehind.aspx.cs" Inherits="Website.SampleCodeBehind"
AutoEventWireup="true" %>
The above tag is placed at the beginning of the ASPX file. The CodeFile property of the @ Page directive specifies the file (.cs or .vb or .fs) acting as the code-behind while the Inherits property specifies the Class from which the Page is derived. In this example, the @ Page directive is included in SampleCodeBehind.aspx, then SampleCodeBehind.aspx.cs acts as the code-behind for this page:

Source language C#:

using System;
namespace Website
{
  public partial class SampleCodeBehind : System.Web.UI.Page
  {
    protected void Page_Load(object sender, EventArgs e)
    {
      Response.Write("Hello, world");
    }
  }
}
Source language Visual Basic.NET:

Imports System
Namespace Website
  Public Partial Class SampleCodeBehind
          Inherits System.Web.UI.Page
          Protected Sub Page_Load(ByVal sender As Object, ByVal e As EventArgs)
             Response.Write("Hello, world")
          End Sub
  End Class
End Namespace
In this case, the Page_Load() method is called every time the ASPX page is requested. The programmer can implement event handlers at several stages of the page execution process to perform processing.

User controlsUser controls are encapsulations of sections of pages which are registered and used as controls in ASP.NET.etc

Custom controlsProgrammers can also build custom controls for ASP.NET applications. Unlike user controls, these controls do not have an ASCX markup file, having all their code compiled into a dynamic link library (DLL) file. Such custom controls can be used across multiple Web applications and Visual Studio projects.

Rendering techniqueASP.NET uses a visited composites rendering technique. During compilation, the template (.aspx) file is compiled into initialization code which builds a control tree (the composite) representing the original template. Literal text goes into instances of the Literal control class, and server controls are represented by instances of a specific control class. The initialization code is combined with user-written code (usually by the assembly of multiple partial classes) and results in a class specific for the page. The page doubles as the root of the control tree.

Actual requests for the page are processed through a number of steps. First, during the initialization steps, an instance of the page class is created and the initialization code is executed. This produces the initial control tree which is now typically manipulated by the methods of the page in the following steps. As each node in the tree is a control represented as an instance of a class, the code may change the tree structure as well as manipulate the properties/methods of the individual nodes. Finally, during the rendering step a visitor is used to visit every node in the tree, asking each node to render itself using the methods of the visitor. The resulting HTML output is sent to the client.

After the request has been processed, the instance of the page class is discarded and with it the entire control tree. This is a source of confusion among novice ASP.NET programmers who rely on class instance members that are lost with every page request/response cycle.

State managementASP.NET applications are hosted by a Web server and are accessed using the stateless HTTP protocol. As such, if an application uses stateful interaction, it has to implement state management on its own. ASP.NET provides various functions for state management. Conceptually, Microsoft treats "state" as GUI state. Problems may arise if an application needs to keep track of "data state"; for example, a finite-state machine which may be in a transient state between requests (lazy evaluation) or which takes a long time to initialize. State management in ASP.NET pages with authentication can make Web scraping difficult or impossible.

ApplicationApplication state is held by a collection of shared user-defined variables. These are set and initialized when the Application_OnStart event fires on the loading of the first instance of the application and are available until the last instance exits. Application state variables are accessed using the Applications collection, which provides a wrapper for the application state. Application state variables are identified by name.

Session stateServer-side Session state is held by a collection of user-defined session variables that are persistent during a user session. These variables, accessed using the Session collection, are unique to each session instance. The variables can be set to be automatically destroyed after a defined time of inactivity even if the session does not end. Client-side user session is maintained by either a cookie or by encoding the session ID in the URL itself.

ASP.NET supports three modes of persistence for server-side session variables:

In-Process Mode
The session variables are maintained within the ASP.NET process. This is the fastest way; however, in this mode the variables are destroyed when the ASP.NET process is recycled or shut down.
ASP State Mode
ASP.NET runs a separate Windows service that maintains the state variables. Because state management happens outside the ASP.NET process, and because the ASP.NET engine accesses data using .NET Remoting, ASPState is slower than In-Process. This mode allows an ASP.NET application to be load-balanced and scaled across multiple servers. Because the state management service runs independently of ASP.NET, the session variables can persist across ASP.NET process shutdowns. However, since session state server runs as one instance, it is still one point of failure for session state. The session-state service cannot be load-balanced, and there are restrictions on types that can be stored in a session variable.
SqlServer Mode
State variables are stored in a database, allowing session variables to be persisted across ASP.NET process shutdowns. The main advantage of this mode is that it allows the application to balance load on a server cluster, sharing sessions between servers. This is the slowest method of session state management in ASP.NET.
ASP.NET session state enables you to store and retrieve values for a user as the user navigates ASP.NET pages in a Web application. HTTP is a stateless protocol. This means that a Web server treats each HTTP request for a page as an independent request. The server retains no knowledge of variable values that were used during previous requests. ASP.NET session state identifies requests from the same browser during a limited time window as a session, and provides a way to persist variable values for the duration of that session. By default, ASP.NET session state is enabled for all ASP.NET applications.

Alternatives to session state include the following:

Application state, which stores variables that can be accessed by all users of an ASP.NET application.
Profile properties, which persists user values in a data store without expiring them.
ASP.NET caching, which stores values in memory that is available to all ASP.NET applications.
View state, which persists values in a page.
Cookies.
The query string and fields on an HTML form that are available from an HTTP request.
For a comparison of different state-management options, see ASP.NET State Management Recommendations. Session

View stateView state refers to the page-level state management mechanism, utilized by the HTML pages emitted by ASP.NET applications to maintain the state of the Web form controls and widgets. The state of the controls is encoded and sent to the server at every form submission in a hidden field known as __VIEWSTATE. The server sends back the variable so that when the page is re-rendered, the controls render at their last state. At the server side, the application may change the viewstate, if the processing requires a change of state of any control. The states of individual controls are decoded at the server, and are available for use in ASP.NET pages using the ViewState collection.

The main use for this is to preserve form information across postbacks. View state is turned on by default and normally serializes the data in every control on the page regardless of whether it is actually used during a postback. This behavior can (and should) be modified, however, as View state can be disabled on a per-control, per-page, or server-wide basis.

Developers need to be wary of storing sensitive or private information in the View state of a page or control, as the base64 string containing the view state data can easily be de-serialized. By default, View state does not encrypt the __VIEWSTATE value. Encryption can be enabled on a server-wide (and server-specific) basis, allowing for a certain level of security to be maintained.

Server-side cachingASP.NET offers a "Cache" object that is shared across the application and can also be used to store various objects. The "Cache" object holds the data only for a specified amount of time and is automatically cleaned after the session time-limit elapses.

OtherOther means of state management that are supported by ASP.NET are cookies, caching, and using the query string.

Template engineWhen first released, ASP.NET lacked a template engine. Because the .NET Framework is object-oriented and allows for inheritance, many developers would define a new base class that inherits from "System.Web.UI.Page", write methods there that render HTML, and then make the pages in their application inherit from this new class. While this allows for common elements to be reused across a site, it adds complexity and mixes source code with markup. Furthermore, this method can only be visually tested by running the application – not while designing it. Other developers have used include files and other tricks to avoid having to implement the same navigation and other elements in every page.

ASP.NET 2.0 introduced the concept of "master pages", which allow for template-based page development. A Web application can have one or more master pages, which, beginning with ASP.NET 2.0, can be nested.[10] Master templates have place-holder controls, called ContentPlaceHolders to denote where the dynamic content goes, as well as HTML and JavaScript shared across child pages.

Child pages use those ContentPlaceHolder controls, which must be mapped to the place-holder of the master page that the content page is populating. The rest of the page is defined by the shared parts of the master page, much like a mail merge in a word processor. All markup and server controls in the content page must be placed within the ContentPlaceHolder control.

When a request is made for a content page, ASP.NET merges the output of the content page with the output of the master page, and sends the output to the user.

The master page remains fully accessible to the content page. This means that the content page may still manipulate headers, change title, configure caching etc. If the master page exposes public properties or methods (e.g. for setting copyright notices) the content page can use these as well.