Computer And Programing
Computer Solution and Programing Solution

Clear Your Internet History After Online

Category: By zmoerf
why you must clear your data history in browser ?
many people can get your private data like your password, information about your data credit card, and many data again, the people can get your data from internet history in your browser where cookies safe all your internet history in the browser.

Using internet eraser software will make sure that no one can get into your system to steal your passwords, user names, account details, and credit card numbers. Some Internet eraser software has advanced features that erase your Internet browser history, your address bar history, your Internet browser cache, your cookies and junk files and your Internet search history. Make sure to get a software tool that allows you to delete your cookies one by one, so that you can choose which ones are important and necessary to keep.

Most of the Internet eraser software’s also has Google search history, Yahoo search history, and MSN search history eraser, and supports almost all major web browsers such as Internet Explorer, Opera, Netscape, and Firefox. If you do most of your work and financial transactions online, it is a good idea to take all precautions and purchase Internet eraser software. Your computer can also be safer from viruses that are frequently downloaded from unsafe sites you might have visited. Now you can delete all of this information permanently from your PC.

Most internet eraser software also comes with a built in shredder feature, which has been a very popular feature because it allows you to instantly shred all unwanted files that you can’t leave lying around on your hard drive. When you delete a file from your hard drive that file is still available on your hard drive, only it is covered by other files, but it can be retrieved with the right Internet eraser software. The shredder feature on the Internet eraser software gets rid of the file to the point where it is virtually impossible to retrieve.

Make sure you have an Internet software tool on your PC to ensure that your computer and your family are safe as well as your personal and private details. Now you can do Internet banking easily and with confidence and pay for items securely online. However, before downloading any Internet eraser software, spend a little time to compare several Internet eraser software programs and download the best one which comes with many added features.
 

Know Important File in Drive C:

Category: By zmoerf

Know Importan File In Windows before Backup

Currently, most Windows users install the system on the partition C, Windows will store all important system files and personal files on the C drive by default, which gives file security (in particular, is personal file security) bring greater risks. In order to avoid the harm C drive failure bring, you should divide the hard disk into more than several partitions, doing a good job of other security measures (such as antivirus, Hacking, and data backup),while you could transfer important personal files to other Logical Disk from the default save location C disk.

This Importan Location In Your Windows System Must Be Backup :

1, My Documents
Method 1: "cut" down "My Documents" folder from the C disk, "paste" it into other volumes,when the "Confirm File Transfer" dialog appear and ask you "Is it really want to move the system desktop.ini file? ", click" Yes "button,all documents were transferred to the designated locations.

Method 2: In any position to create a new folder (eg D: \ My File), then right-click on the desktop "My Documents" icon on the shortcut menu, select "Properties", open the "My Documents Properties "dialog box, delete the" target folder "project" C: \ My Documents ", type" D: \ My File "can be, you do not delete the original" C: \ My Documents "folder.

2, input method thesaurus
Open the C: \ Windows folder, and cut the two files and paste them into any other volumes(such as E: \ My Ime).Then run the Registry Editor (regedit.exe), navigate to "HKEY_USERS \. DEFAULT \ Software \ Microsoft \ Windows \ CurrentVersion \ PINTLGNT" branch, the "User Define Phrase File" key data "C: \ Windows \ p * p.upt "changed to" E: \ My Ime \ p * p.upt ", the" Learning File "key data" C: \ Windows \ p * l.imd "changed to" E: \ My Ime \ p * l.imd ", you can enjoy these words of the long-term.

Some input methods commonly used can not be transferred to other logical disk,then you have to manually backup in order to restore them in the event of a disaster.

3, e-mail
Many users choose Outlook Express to handle their own messages. Its location is the default e-mail to save C: \ Windows \ ApplicationData \ Identities \ (B5C7FF60-A138-11D3-9317-A6D78FF47163) \ Microsoft \ Outlook Express, it can also be transferred.

4, Address Book
Cutting down *. wab (* on behalf of Windows login user name) file which under C: \ Windows \ Application Data \ Microsoft \ Address Book,paste it into any other volumes(such as E : \ Mail), and then run the Registry Editor, navigate to "HKEY_CURRENT_USER \ Software \ Microsoft \ WAB \ WAB4 \ Wab File Name" branch of the "default" key data "C: \ Windows \ Application Data \ Microsoft \ Address Book \ *. wab "changed to" E: \ Mail \ *. wab ". Close the Registry Editor, you can use the address book in a new location.

5, the Favorites
Windows favorites recorded the wonderful web page once visited,which allows you to speed up the browsing speed of the classic web pages. Open the C: \ Windows folder, you can see "Favorites" folder. Select this folder,"cut" down it to any other Logical disk folder (eg E: \ Bak) and "paste" it, you will see a "moving ... ..." dialog box, After the dialog box disappears,the transfer of success. Even after the reinstall the system, as long as the Registry Editor window, navigate to the "HKEY_USERS \. Default \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ User Shell Folders" branch of the "Favorites" key data "C: \ Windows \ Favorites \ "changed to" E: \ Bak \ Favorites \ ", your favorite exciting web pages can be re-used.

6, history record
During operating the computer,your system will automatically record your operation to "History", which corresponds file is in C: \ Windows \ History.as moving "Favorites","cut and paste" it to any other volumes,this can guarantee your history is safe;The location of the history record in the registry is "C: \ Windows \ History \".The key is "History".

7, the network logon password
During visiting Internet, there are many pages need to enter the registered user name and password,it will pop up a dialog box that prompts you just do not select "no longer save passwords" complex option after entered and confirmed, Windows will automatically remember the password, next time when you log on this page, you only need to enter the registered user name, the system will automatically fill in passwords. Windows will store the user name and password in the C: \ Windows \ Cookies folder. To cut and paste this folder to another Logical disk, and then modify the registry of the "Cookies" key (the same location with favorites and history records),no matter reinstall the system how many times,do not have to re-enter the visited web pages login password.

8, web cache folder
Viewed a web page, the next time you can view this page offline, because when opening the web page,the browser has downloaded and saved this page to the specified folder in the cache.You can right-click the "Internet Explorer" icon the desktop,on the shortcut menu, select "Properties" to open "Internet Properties" dialog box,in the "General" tab,click the "Settings" button in the open "Settings" dialog box, click "Move Folder" button, open the "Browse for Folder" dialog box, in the local resource list, select a new folder, and then click the two "OK" in the "restart" dialog box, select "Yes", Windows automatically restarts to complete the transferring of the downloaded page.

The transfer of personal files is to move out of useful information,and no longer worry about C drive problems.Of course,transfer is not the most insurance way,because other the Logical disk except C drive is also not 100% insurance, risk still exists.Therefore,the best surefire plan is "file transfer + data backup."

 

Tips To Find Best Online Backup Services

Category: By zmoerf
You can find many Online Storage in Internet But how to find best Online backup service ?
Online storage companies which offer similar services are priced competitively - usually around $5 per month. However, depending on the exact services that you want, you may pay less or more, sometimes even nothing at all. Just be extra careful in accepting services with suspiciously low or free offers. While most of them are usually harmless, entrusting your important data with someone who does not necessarily offer the service that you need may not be a good idea. Furthermore, it is just about fair that you get what you pay for, for your online backup services.

File accessibility is also another factor to consider. Being able to retrieve your files immediately would not be such a major issue if you're just looking to have copies of old photos printed, but for a student who needs access to his notes ASAP or for an office employee who sometimes brings work at home, even a day of waiting could be too long. You would therefore want an online backup service that can best respond to this need. Different online storage companies have varying policies when it comes to file restoration so be sure to raise these concerns before signing up.

You also want to make sure that you can use the software that most of these companies require you to work with. Since each company has its own system, you often have to deal with different levels of user-friendliness. If the program you have to work with is written in a hard to understand way or even extremely technical, you may not be able to work with it. The idea of backing up online is to give you the protection you need without wasting your time so be sure the company has a decent backup wizard in their software suite.

Lastly, you need a secure service. Most companies offer encryption of your stored information as it travels between your computer and theirs. However, some companies can offer more than that. You can find companies which scatter your files across their services making it impossible for any outsider to decipher any important information. You may also choose to put a password on your files. All these added services work together to give you the top-level security that you need.
 

Ajax Response Progress Backround

Category: By zmoerf
When a user clicks a link on a web site, they expect something to happen. That something might be loader appearing in the status bar, or the page going blank and then refreshing. Or perhaps a pop-up message appears. In any case, users are quite accustomed to some sort of action occurring when they click something—if nothing happens, they tend to get antsy and continue pressing the link, or eventually leave the site entirely.

It is not very good, then, that Ajax requests can frequently lead to some serious response time concerns. Let’s face it, when you put forth a request to a server, there is going to be some time involved with sending the request, processing it, and then sending it back the browser. Now, with basic web-based navigation, the browser has a lot of builtin features to handle said latency—features that users are quite used to. Unfortunately, those features do not apply when putting forward an Ajax-based request.

When a user clicks an Ajax-enabled link, unless the developer has coded it in themselves, nothing will occur onscreen for the user to understand that something is indeed happening. This can lead to repeated clicking and overall frustration, and it is up to us developers to take care of the situation. A decent way of handling this issue is by placing a loading image into the element toward which a request is heading. If you want to get fancy, an animated GIF loading image is even ore user-friendly, as it truly gives the user the impression that something is happening.
 

Solution To Ensure Successful And Absolute Data Recovery

Category: By zmoerf
What are you doing to successful your backup data ?

You store a huge amount of data on your hard drive and other storage devices or media everyday, which is extremely critical for your business. You might have your significant tax files, project details, financial documents, important emails, contacts, personal information, family pictures, video and many other things. In case if the hard drive gets damaged and data loss takes place, you would panic if you do not have complete or proper backup of your mission critical data. But this is not the end of world although, your lost data could easily and completely be recovered with the help of Data Recovery solutions.

In order to ensure the possibility of recovering lost data or missing data, go through the underwritten steps. This is significant to follow below steps to avoid complete data loss:

If your system is making strange sounds like scrapping, clicking and grinding, then shut down your system immediately. You might experience complete or severe data loss as the read/write heads might hit disk platters, which actually store data.
Before you remove the affected hard drive from your computer, unplug the system. You should be quite careful while handling the disk as physical jerks might damage sensitive disk components.
Find out the cause of data loss and go for appropriate recovery solution. If the drive is physically damaged, never attempt any recovery procedure on your own.

You should always bear in mind that the very first recovery attempt provides highest chances of successful recovery. When the data loss problem occur, do followings things:

Backup data, if possible.
Do not power up your system if it has physical damage.
Never apply disk repair software to affected system.
As soon as you recognize the data loss, immediately turn off the system to avoid further data loss.
Identify the type of data loss and take related Hard Drive Recovery solutions.

If the data loss is due to physical damage to the hard drive, go for Data Recovery service. It is a personalized and sophisticated help, delivered by recovery experts in safe and sterile surroundings of Clean Rooms using cutting edge technologies.

On the other hand, logical data loss situations are quite easy to handle. You can get your lost data back with the help of Partition Recovery applications. These software are easy and safe to use and thus offers quick and absolute recovery.

Stellar Information Systems Limited is the foremost provider of superior recovery solutions. The software are available of Windows, Mac OS, UNIX, Linux and Novell operating systems. Service is delivered through Class 100 Clean Rooms under supervision of recovery specialists.
 

Best Tape Backup Rotation For Your Network PC Data

Category: By zmoerf
A reliable data backup solution should be a crucial component of any organizations computer network. Although many newer technically innovative backup solutions have emerged over the last few(5) years, tape backup solutions will still a viable option in today's computing environments. Tape backup provides the convenience of being readily available and portable. It also stores well long term in a controlled climate environment. Cartridge rotation is a key element of any comprehensive tape backup solution.

There are a few factors to consider before implementing a rotation schedule:
What is an acceptable restore and recovery time frame? Can you afford a day's worth of downtime or is the smallest recovery window possible a must. If the shortest time frame possible is required then consider running a full backup of all data at a minimum Monday through Friday schedule. If some leeway in the recovery time frame is acceptable then consider a combination full backup with corresponding differential or incremental backup jobs. An incremental backup will backup only the changed files since the last backup whereas the differential will backup all the files that have changed since the last full backup. Incremental provides shorter backup times but requires the full backup tape plus all the subsequent incremental tapes in the proper order to be able to complete a restore. The differential method only requires the full backup and the last differential.

If data retention needs are minimal then consider running a simple two week tape rotation utilizing ten to fourteen tapes. Ten tapes in a "Week One" and "Week Two" configuration would cover Monday through Friday if no one is available to swap out tapes on the weekend. To provide a more comprehensive coverage over a greater length of time consider implementing the following tape rotation.

* Two sets of Monday through Thursday tapes
* First through Fifth Friday designated tapes
* A month end or quarterly tape
* Year end tape

This rotation scheduled provides greater coverage and allows for recovery of data from throughout an entire years worth of backups. The year end tape could also be cycled out with a new tape every year for archiving. Off site rotation of the tapes in a safe and secure location should also be implemented in any tape backup strategy as a precaution to fire, natural disaster or other unexpected calamity.
 

Prevent Your Email In Internet

Category: By zmoerf
Email is very important for your, many people can be used your email for fraud. so this tips to safety your email.
1."Gone Phishing?" Do not give your life away!
If you are not aware of what "phishing" is, the name should give you a hint. Except the "phish" that ends up taking the bait has to spend countless hours restoring their identity. The more bait they email out, the better their chances. It's a numbers game. The more people they spam, the better their chances are for collecting personal and credit card information. This is especially true with the eBay community.

2.Protect yourself against trojan "phishing". This phrase comes from a time of war where trojan warriors would send a large gift to their enemies in the form of a horse. Inside the horse would contain Trojan warriors. Once they were on the inside of the enemies walls, they would attack. With trojan "phishing" when you download an unsafe file or spyware, the trojan will install keylogging software. Key logging software records your every keystroke and sends it back to the hacker. Once it's on your computer, your antivirus software or firewalls become useless. Only download from trusted sites.

3. Do not respond to emails that ask you to go to their website and update your account information. These websites and emails will appear to be your real bank, PayPal, eBay accounts...etc. If you aren't sure on whether it's real or not, then go to the URL in your browser and actually type the website's address. Whatever you do, do not click the link and enter your information!

4. Be aware of the "feeling out" email that a fraudster first sends you.
This email has a simple subject describing their interest in purchasing any products or services you might be selling. In this email, they want to know if you accept certain types of credit cards and they want to know if you ship internationally.

5.Be cautious of emails that ask you to shop at their online stores if you've never heard of the company. Scammers are known to set up phony websites, collect orders and credit card information, and then disappear. Once again, if you are not sure, type the url of a known e-commerce website and look for similar products. You can also type the name of the business in Google and if they have scammed others, someone will have written about them.

6.If you are not sure on whether the email is a scam, you can always check the Ip Address in the email header for a perfect match. This will verify the country the email was sent from. To find the email header and the ip address of the sender, right click on the title of the spam email and select "options". The real ip address is usually listed at the bottom of the email header. Most of the time the information provided at the top of the email header is fake. When you locate the ip address enter it into one of the following internet registries:

APNIC (Asia Pacific network)

RIPE (European)

ARIN (American Registry)

LACNIC (South America & Caribbean)

If there are any discrepancies, then you can be pretty certain it is a scam

7. Be extremely cautious if the email involves the following scams: lottery scams, the 419, "Nigerian scams, multimedia piracy, investment and securities scams, chain letters, and illegally selling prescription drugs. These are on the rise on the internet.
 

How To Add comments to your JavaScript

Category: By zmoerf
JavaScript Support Comment ?
JavaScript supports a one-line comment with the double slash (//) marker so you can add comment to you javascript, which means that JavaScript doesn’t read anything on a line after // javascript can't not be run or progress. if you want to add comments for people to read throughout your code, and they won’t interrupt how your JavaScript runs. See the comment line added in bold in the following code:






A First Script




I want to add several line comment ?
In fact, JavaScript also supports a second type of comment or several comment, which you can
use for multiple lines. This comment starts with /* and ends with */. When
JavaScript sees /*, it ignores everything else until it sees */. Here’s an
example:







A First Script

A First Script




now you can add comment in your javascript!!!
 

What Is SOAP Web Services

Category: By zmoerf
What Is SOAP ?
If you using ajax programing for devlop your application i recomendation are you using SOAP, SOAP is a simple XML (Extensible Markup Languagebased) protocol to let applications exchange information over HTTP.

Why Using SOAP ?

It is Very important for application develop to allow Internet communication between programs or client and server.

Ajax applications communicate using Remote Procedure Calls (RPC) between objects like DCOM and CORBA, but Hypertext Transfer Protocol HTTP was not designed for this. RPC represents a compatibility and security problem, firewalls and proxy servers will normally block this kind on your traffic.

SOAP is a better way to communicate between applications is over HTTP, because HTTP is supported by all Internet browsers and servers like firefox, IE, Opera etc. SOAP was created to accomplish this.

SOAP provides a way to communicate between applications running on different operating systems like windows and linux, with different platform and programming languages.

About SOAP ?
this web services stuff sounds pretty cool, but how does it work? Well, interestingly enough, it works in a similar fashion to your typical client/server relationship. You’re used to using a web browser to interact with a server in order to retrieve requested web pages. Web services works in quite a similar way; the only thing that changes is what constitutes a client and a server.

When a developer creates a web service, what he is actually doing is creating a set of functions that can be called remotely. The client code then connects to this URL and invokes one or more methods. Additionally, the client code can also get a list of the available functions (including details of the input parameters and returned data). For example, the PayPal SOAP (Simple Object Access Protocol) API provides a method you can execute called DoDirectPayment. If you ran a website that used PayPal to process customer transactions, you might call this method, passing in the customer’s details and credit card number. The PayPal web server would then return data, indicating the status of the transaction (such as whether it succeeded or failed).

SOAP is a protocol that allows remote procedures to be executed. All requests to and responses from a SOAP web service use XML. By using the SOAP library built into PHP, the requests can easily be generated and responses can easily be interpreted.

Although in this example the developer connects directly to a third-party API (i.e., PayPal’s API), in this chapter we are going to look at creating our own web service, as well as connecting to this service to use that data in a small Ajax application. There are several different standards available that can be used for web services—such as SOAP and REST (Representational State Transfer). We will be using SOAP in this chapter, and we will be using the SOAP library that comes with PHP 5.
 

Recovery Your Harddriver in Laptop

Category: By zmoerf
Do you have Laptop hard disk drives are considered for smaller form factor, high performance and various reliability characteristics. The popular 2.5” hard disk drives come available with 9.5 mm height and most often with a blue circuit board. With such minimized size parameters, these hard disks perform a major role in Laptop computing. But if exposed to factors like external shocks, extensive heat, wear and tear and others, these hard drives can get damaged and might prevent you from accessing stored information. You should replace such damaged Toshiba hard drives and restore from the recent data backup available. Data backup might not offer required data restoration in some cases (for instance, if data backup is not updated). Thus, to recover from such situations, you will need to call Laptop Data Recovery service for extracting lost data from physically crashed Laptop hard disk.

Laptop hard disk drive might exhibit following symptoms if get failed:

1)Before your power up the system, you observe that unexpected whining and clicking sounds from Laptop casing, which is otherwise not audible

2)You observe sounds as if motor is attempting to spin up many times

3)A failing Laptop hard disk drive shows peculiar performance degradation

4)You observe Laptop hard disk drive completely dead with no sound and movement

Note: You are recommended to immediately power off your Laptop and not to open its casing, freezing or kicking the hard disk drive. Performing such activities might introduce more damages to the hard drive and data.

Laptop hard drive failed due to physical crashes are required to be dealt using professional Laptop Recovery techniques, provided through Data Recovery Services. These failed hard drives are opened in safe Clean Rooms surroundings to prevent entering dust particles. Laptop Data Recovery service is provided by different data recovery companies, equipped with suitable inventory, recovery technicians, advanced tools and most importantly, Clean Rooms. The recovery technicians carry out steps, like replacing damaged Laptop hard disk internals, disk imaging, shifting hard disk platters and more.