PC Supporter: We are writing reviews & overviews about latest Technology, Gadgets, Social-networks, HP Printers, Operating Sys, PC Games & Wallpapers

Showing posts with label Operating Sys Review. Show all posts
Showing posts with label Operating Sys Review. Show all posts

Monday, 5 November 2012

Advanced Gadgets - Need or Trend



Surely you will be excited if you buy a new advanced featured iPhone 5 after recycling your ancient one. But is it your Need or its just for Trend? 






Advanced Gadgets Need or Trend?
Gadgets

Of course this is actually depend on your needs and requirements what you choose and why, on other hand, do this new advanced gadget suites your personality? Rarely questions these are, but we are talking about why most of people advancing to modern gadgets? Is it theirs need or just its a trend?


Regarding to many survey reports and discussions, most of people using smartphones or even a camera phone for photo-shoot obviously, it means that a camera phone is your need somehow, but buying a smartphone for photo-shoot is either a trend.


Using advanced featured gadgets is very good if it fulfils your needs and the way you will use it, but for trend I should say its just waste of money. No doubt that an advanced and latest technology device gives you more features including security benefits and more reliability as well as user friendly environment. But again depends on your requirements, otherwise it stands in style / fashion category.



So it was all about cell phone devices, now if we talk about operating systems, there are many types of it and also many cases and options which force you sometimes to select only one single operating system for your gadgets to be easily sync with all your stuff around. But to be discussed, which operating system I should select. And again according to your need and requirements you can choose  which suits you most, but don't go and waste your money to buy an operating system you couldn't operate.





Suppose, if you are a good user and know every tweak about Windows operating system and you are going to buy a MacBook, only because you passionate about Mac operating system or just because its a trend  for you somehow, one thing for sure you would give it time to learn its features and again can waste your money for sure, so learning new things isn't bad, but if Windows operating system can give you everything you want then no need to waste your time and money.



Curiosity and eagerness of modern day gadgets isn't objectionable, they are the best one's. But problem is  that if we don't have time to use its full features then why we spend extra money for it?

For example, a person who is using Intel Pentium IV PC just for media (watching movies or listening music) in part time when he free from his work, then he actually don't need to upgrade to Intel i7 Computer, although Intel i7 stands to be more powerful and can give him full HD output. On other hand a Businessman should buy a device which connects him with co-workers & business society, he will get progress reports in Excel format via email hourly maybe on the go everywhere, so if he buy a Smartphone or a kind of gadget which suits his outputs, definitely he can choose a costly device.

Choose what suits you best, choose what fits best inside your budget and even, use an older device for your old days work, and also nothing is headache if you use them friendly.


Wednesday, 4 January 2012

5 Most Handy Questions about Smartphones

The cloud refers to storage at a remote site accessible from the Internet instead of locally on your computer. Backing up data to the cloud is convenient because you can access it from anywhere�

Here are 5 most common questions about smartphones.

How is a Smarphone different from a standard cell phone?

There�s no official definition, but smartphones let you connect to the Internet, manage email, run software (called apps), and often have robust multimedia capabilities to play videos and music and let you take pictures and record video.

What is a �platform,� and why should I care?

A platform is the phone�s operating system (much like Windows is an operating system for PCs) and determines what features the phone has and what apps it runs. Apple�s iOS and Google�s Android are two examples. Because Apple controls both the operating system and production of the phones that use it, upgrading to the latest version of iOS is easy as long as your hardware is fast enough to support it. Android is different because each smartphone manufacturer using it can modify the core operating system and doesn�t always make updates of the latest version available to its customers.

What hardware specifications should I worry about?

The simple answer is to not get hung up on the specs and instead find a phone that does what you need it to do. Does it work with your email? Does it run the programs you want to use? Does it integrate with your existing services such as Netflix? Is it available from a carrier that provides great coverage in your area? Does it have adequate battery life for the type of things you plan to use it for? If the answer to any of those questions is no, it could be the fastest smartphone on the planet and be useless to you.

The said phones, with 1GB of RAM are nice because they can run multiple programs simultaneously more smoothly than can phones with less RAM. Also look for dual-core processors, as they can dramatically boost the speed of apps designed to take advantage of them. Finally, 16GB of memory is plenty for most users who don�t plan to haul enormous music or video libraries around with them, though 32GB or more is better if you plan to use a lot of apps, music, and video.

What�s the difference between 3G and 4G?

There refer to the speed of the cell carrier�s wireless data network. 3G stands for Third Generation standards and 4G for Fourth Generation standards. Each company implements these standards in different ways, so maximum speeds vary. In general, 4G networks let you download data at least 10 times faster than 3G networks do. This is great for nabbing large files or streaming high quality video, although battery life often takes a bit of a hit when 4G is activated.

Some smartphones will let me use the cloud for backup. What does that mean, and should I use that feature?

The cloud refers to storage at a remote site accessible from the Internet instead of locally on your computer. Backing up data to the cloud is convenient because you can access it from anywhere, and most companies employ encryption and backup redundancy to protect your data. If you don�t have an unlimited data plan, set up the cloud backup to only operate when the phone is connected to a Wi-Fi network. Otherwise, you risk blowing through your data plan without doing much of anything with the phone.

Friday, 16 December 2011

The Future of Malware | News





The future of Malware | News from �PCadvisor.com�





Future of MalwareSecurity breaches look set to bet worse as hacker groups target smartphones and social media and release more information online. Jeff Vance reports.



Personal information leaked online is becoming an all too common occurrence. For example, Sony suffered a massive breach of its PlayStation Network earlier this year that led to the theft of names, addresses and possibly credit-card data belonging to 77 million users.


If you think the situation is bad now, just wait. Things will get worse as more information is dumped online by mischievous hacker groups such as Anonymous, and cybercriminals begin to target smartphones and social media.




In August, AntiSec (a collaboration between Anonymous and the disbanded LulzSec group) released more than 10GB of information from 70 US law-enforcement agencies. According to Todd Feinman, CEO of DLP vendor Identity Finder, AntiSec wasn�t motivated by money.


�AntiSec doesn�t like how various law-enforcement agencies operate and it�s trying to embarrass and discredit them,� he said.


But, he added, what it doesn�t realize is that when it publishers sensitive persona information, it�s helping low-skilled cybercriminals commit identity theft. Every week, another government department or business has its records breached � some 250,000 to 500,000 each year, estimated Feinman. Few details from those breaches are published online for all to see, however.


While certain high-profile attacks, such as the one on Sony, are intended to embarrass and spark change, the US law-enforcement breach could represent a shift in hacker thinking. AntiSec�s motivations appear to have a key difference, with the attackers consciously considering collateral damage as a strategic weapon. According to Feinman, AntiSec wrote online; �We don�t care about collateral damage. It will happen, and so be it.�




Social Networking




Facebook Malware

Experts say the future of malware is more about how potential victims will be targeted than how it will be engineered. Collateral damage won�t be limited to innocents compromised through no fault of their own.


Have you ever accepted a friend request on Facebook or connected to someone on Linkedin you don�t know? Perhaps you thought it was someone from school you�d forgotten about, or a former colleague whose name had slipped your mind. Not wanting to seem rude, you accepted them as a friend and quickly forgot about it. �When people make trust decisions with social networks, they don�t always understand the ramifications. Today, you are far more knowable by someone who doesn�t know you than ever,� said Kr Hugh Thompson, program chair of RSA Conferences.


We all know people who discuss everything they do on a social network or blog, from eating their breakfast to clipping their toenails. While most of us consider these people a nuisance and may hide their status updates, cybercriminals love them.


�Password-reset questions are easy to guess, and tolls such as Ancystry.com, while not created for this purpose, provided hackers with useful information,� said Thompson.


There are a few areas he believes the IT security industry needs to concentrate on: security for social media, ways to manage the information shared about you, and better methods for measuring evolving risks.




Enterprise Targets



mobile malware and your businessFake security software is the most common type of social-engineering attack that researchers at Blue Coat Systems come across. Chirs Larsen, head of the lab, explained that social network�s aren�t being used only to target individuals.


Larsen outlined a recent attack attempt where hackers targeted executives of a major corporation through their spouses.


The chances were at least one of the businessmen would have a poorly secured home PC that he shared with his non-tech-savvy wife. This would provide the backdoor needed to gain access to the company.


�Whaling is definitely on the rise,� said Paul Wood, senior intelligence analyst for Symantec.cloud. �Just a couple years ago, we saw one or two of these sorts of attacks per day. Today, we catch as many as 80.�


According to Wood, social engineering is by far the most potent weapon in the cybercriminal�s toolbox (automated, widely available malware and hacking toolkits are number two). Combine that with the fact that many senior executives circumvent IT security because they want the latest and trendiest devices, and cybercriminals have many valuable, easy-to-hit targets in their sights.


�Attacks on small businesses are increasingly dramatic because they are usually the weakest link in a larger supply chain,� said Wood.


There�s no sure way to defend against this. Until companies start scrutinizing the cyber-security of their partners and suppliers, they can�t say with any certainty whether or not they themselves are secure. While it�s common for large firms to keep a close eye on their suppliers, with factory visits that result in the implementation of an array of �best practices�, companies aren�t doing this when it comes to cyber-security.




Smartphone Threats



AndroidMalwareSmartphone threats are on the rise, but we�ve yet to see a major incident. This is partly due to platform fragmentation. Malware creators still get better results by targeting PCs or websites.


Larsen believes that platform-agnostic, web-based worms represent the new frontier of malware. Platform-agnostic malware lets legitimate developers do same of the heavy lifting for malware writers. As developers re-engineer sites and apps to work on a variety of devices, hackers can then target the HTML, XML, Jpegs and so on that render on any device anywhere.


Mobile phones are serving as a second identity factor for all sorts of corporate authentication schemes. Businesses that used to rely on hard tokens, such as RSA SSecureID, are moving to soft tokens, which can reside on mobile phones roaming beyond the corporation as easily as on PCs ensconced within corporate walls.


Two-factor authentication originally emerged because people couldn�t trust computers. Using mobile phones as an identity factor defeats two-factor authentication,� said Marc Maiffret, CTO of eEye Digital Security.


Today, Android is the big smartphone target, but don�t be surprised if attackers soon turn their attention to the iPhone � especially if third-party antivirus programs become more or less standard on Android devices. iPhone demographics are appealing to attackers, and security experts will tell you that Apple products are notoriously insecure.


Apple is reluctant to provide third-party security entities with the kind of platform access they need to improve the security of iPhones, iPads, MacBook Airs and so on. �Apple is very much on its own with security,� said Maiffret. �It almost mirrors late-90s Microsoft, and it�ll probably take a major incident or two to incite change.�


If we�ve learned anything about security in the past 20 years, it�s that another major incident is always looming just over the horizon. With the number of IP-connected devices climbing to anywhere from 50 billion to a Trillian in the next five to 10 years, tomorrow�s hackers could target anything from home alarms and air traffic-control systems to flood control in dams.




Wednesday, 7 December 2011

ARM Processors to increase Smartphone efficiency



ARM Processors to increase Smartphone efficiency | PC Supporter



ARM ProcessorSmartphones will no longer have to compromise between performance and battery life. ARM�s A7 microprocessor uses the company�s most energy-efficient chip design to date, and will bring improved performance to entry level smartphones.


Used alongside the forthcoming Cortex A15 in the �big.Little� power-saving architecture, the A7 will also feature in high-end smartphones.


By combining two types of core on the same chip, and assigning different applications to each depending on their requirements, ARM said it can resolve the conflict between the need for both higher performance and longer battery life.




big.Little can reduce power consumption by 70 percent, according to ARM. Gaming and video playback is performed on the more powerful A15 chip, while tasks that require less power, such as making a phone call, are assigned to the A7 to conserve power.


The A7 will be manufactured using a 28-nanometer process; combined with architectural improvements, this will make the processor one-fifth the size, with one-fifth the power consumption, compared with today�s Cortex A8 processor. But the A7 will still give a 50 percent performance boost compared to the A8, according to the company.


The big.Little architecture will have a die size of less than 0.5 square millimeters and draw less than 500 mill-watts of power, said Nandan Nayampally, director of marketing for the ARM processor division.


Furthermore, the A7 and the A15 will have identical features sets, so software applications will run on both cores without modification.


ARM�s designs are licensed and manufactured by companies such as Texas Instruments, Broadcom and Freescale. The chip makers are expected to produce the first A7 parts next year, and smartphone makers will begin fitting them to devices soon after that. It may take chip makers a little longer to implement the combined A7-A15 design, but ARM said this could also appear in smartphones by 2013.

Tuesday, 1 November 2011

Setting Up a New Hard Disk | Windows 7



Setting Up a New Hard Disk | PC Supporter



Whether you�re installing Windows on a brand new hard disk or simply adding a new disk to an existing system, it�s a good idea to consider how you want to use the new storage space before you begin creating volumes. If your goal is to set up a large space for backup or media storage, for example, you might want to devote the entire disk to a single volume. On the other hand, if your plan is to establish two or more separate volumes�perhaps one for each family member on a shared home computer, for example�decide how many gigabytes you want to assign to each partition. You can change your mind later, but it�s easiest to adjust the number of volumes on a disk and their relative sizes before you�ve put a lot of data on the platter.




Setting Up a New Hard Disk | Windows 7


Installing Windows on a New Disk



When you run the Windows 7 Setup program on a computer with a single, raw hard disk, Setup presents you with a screen identifying the disk and its size. If you want to create a single volume encompassing the entire disk, click Next to proceed . Otherwise click Drive Options (Advanced) . On the screen that follows, you can use the Size control to specify how large a volume you want to create for your Windows installation:

Installing Windows on a New Disk


If you decide not to use the entire disk for Windows, you can create additional volumes from within the Setup program. But there�s no particular need to do this. After you have installed Windows, you can use Disk Management to create one or more additional volumes in the unallocated space remaining on the disk.


 


Adding a New Disk to an Existing Windows Installation



In the graphical pane of Disk Management, a brand new hard disk, whether internal or external, appears like this:


Adding a New Disk to an Existing Windows Installation


To make this disk available for storage, you need to create one or more volumes, assign drive letters, label the volumes (if you don�t want them to be identified in Windows Explorer as simply �New Volume�), and format the new volumes. You can carry out all of these steps from within the New Simple Volume wizard.





Thursday, 13 October 2011

How To Fix Corrupt Registry Files

How To Fix Corrupt Registry Files

The information related to your hardware and software is contained in the files of your Windows registry. These comprise of the operating system that you are running in your computer, the application software that you are having, the preferences that you have set and your profiles, and the association between the files which provide information relating to the files that are being handled by each of the programs that you have in your computer.

Let us find out as why your Windows registry needs to be repaired, and how this repair is carried out.
registry-booster-currupt-registry-files-inside



There are several software tools available to repair and correct your registry problems, and the link below provides you with the address of the webpage where you can find a selection of the software tools that would help you to solve your problems in your Windows registry. Windows provide you with the facility to repair and clean the registry manually. You can get to the registry of your computer by using the program regedit.exe or by typing reg.exc at the command line provided by your windows software.



This facility is available in practically all the Windows versions, including Windows XP. It is not desirable that you try to repair or clean the registry files manually, for, if any of the files gets damaged or accidentally deleted, your operating system or the application software would not run anymore. Manual registry repair or cleaning is not recommended even if you have backed up your registry beforehand.



Although you can use the programs to inspect the registry contents, Microsoft does not recommend that you actually edit the contents, since one incorrect change may prove to be disastrous. In case you are trying to repair the registry manually, and something goes wrong, and your back up does not work either, you will need to completely re-instal your windows operating systems.



It is always recommended that you use specialized software that was designed and developed to repair and clean Windows registry. Now, let us find out what are the reasons that prompt registries to be repaired, and why does it become necessary.

NEXT
There are many varied reasons which require the Windows registry to be maintained. When the registry develops faults, your Windows operating system and other application software may not run correctly. A corrupt registry or loss of files in the registry may cause your computer not to boot at all. There are circumstances when you have removed your old application software which you used before. There may be files for the old application software left in the registry and because of those, your system gets slow. The system will be affected adversely as far as its stability is concerned, and at times freezes your monitor screen, or you may see a blue screen with the computer hanging up and stopping all your work. As you go on using your computer, the size of the registry keeps on growing, and this growth crosses the limit at one point.



As the registry grows in size, you will find that the performance of your computer is slowly degrading. You may find that the system becomes unstable with the installation of hardware in your computer. Here you just might need to get your registry back in original shape before you can trustfully install the hardware that you have been trying to do.



The encouraging part of all this is that you have a wide choice of registry software programs which will automatically clean and repair the registry in your system very rapidly, removing all unwanted files and repairing any which have been corrupted. Registry repairing and cleaning software would provide you with the facility to scan your computer and present you with a list of your registry errors. Such software tools are called registry cleaners or repairers. These are very easy to install and to use to maintain the registry from time to time. Good Registry repair software can clean and repair your Xp or Vista registry in just a few minutes. The repairing and cleaning of the registry will provide you with amazing results when you start using your computer after the registry has been scanned and repaired by the software.



If you're experiencing or suspecting you have Windows registry problems, you have no time to lose. Therefore we provide you with a free tool to detect all the registry problems on your computer. All you need to do is to download the software and scan your computer for the registry failures, after which you can easily run the software to repair your registry problems.

Top 10 New Features in iOS 5

iOS 5, Apple� very soon going to liberate Mobile Operating System for the iPhone, iPad and iPad 2, and iPod Touch (third and fourth generation), has more than 200 upgrades and improvements over the previous OS, according to Apple. Some of the changes are significant, even if they do riff on signature features of other platforms.
Developers have had a chance to push around at an appetizer of the new operating system for several weeks, although the public is only just now learning about what they can expect. We've trolled the information that's come directly from Apple and culled out the most exciting pieces�when a company touts 200 changes in a single product, you can bet that not all of them are highlights.
Top 10 New Features in iOS 5
The big picture is this: The iPhone, iPad, and iPod Touch will see more integration, both among the apps each device runs and between one another. The number of clicks, taps, and swipes it takes you to achieve a task will be reduced significantly�and maybe even reduce.
From the statements so far, at least one app that will be preinstalled on all new iOS devices is a variation on some other popular app that users formerly had to buy from a third-party developer, and my hunch is we'll see more of this in the future.
iOS 5 will be compatible with: iPhone 3GS, iPhone 4, iPod touch 3rd Generation, iPod touch 4th Generation, iPad, iPad2, and presumably the iPhone 5.
There's prosperity to be thrilled about. Here are the ten features that stand out the most in iOS 5.


[source]

Sunday, 12 June 2011

Windows 8 � Hints of Things to Come





Source: Brennon Slattery � PC Mag



image


What does Microsoft have up its wrapper for Windows 8? Details are limited, but cell phones, tablets, the cloud, and even gaming appear to be assuming strongly into Microsoft�s thinking for its next operating system. The company seems to be mixing the best of many of its products and services into once restructured computing experience called Windows 8.



Here are some things about Windows 8 I scrapped from the Web that hint at what we might see in the final release.






1. The UI: One small but expressive, change to Windows 8�s user interface steals a page from Windows Phone 7�s playbook. Windows 8�s welcome/lock screen has the same interface as Microsoft�s smartphone OS.



image


2. The Office Ribbon Returns: The context-aware Ribbon, which made a mess of Microsoft�s Office suite, will swap the drop-down menus and toolbar in Windows 8�s Explorer windows, making many more of Windows� hidden features visibly discoverable. And the Ribbon�s big buttons simply beg to be touched � perfect for a touch screen Windows 8 tablet.



image


3. The Cloud: A closer look at the Explorer Ribbon shows two placeholder buttons, Sync and Web Sharing. Microsoft has been spinning to push a lot of its services into the cloud, and that cloud functionality might be excavating deeper into the core OS. The Sync button may work like Windows Live Mesh, which syncs program settings across PCs and enables offline connectivity. Web Sharing may use Windows Live SkyDrive, cloud storage and sharing feature that hands out 25GB for free, integrates with Office, and works just like Dropbox.



4. Xbox integration: The possibilities of Kinect plus Windows 8 are limitless, but we know that Microsoft plans on using proximity detection and facial recognition to start up and unlock PCs. The company also apparently intends to meld the Xbox 360 and Xbox Live to the Internet as a whole, especially for social gaming. Such use of Kinect technology to interact with online buddies, plays PC games, and perhaps do much more could be the future of platform integration.



image


5. 128 bits of power: Windows 8 will employ 128-bit architecture, which would represent the next leap in computer performance.



6. Tablet hardware: Dropping the x86 platform, Microsoft has confirmed that Windows 8 will operate on the ARM microchip architecture the same tech that powers most of the world�s smart phones and tablets. Conclusion: Microsoft has gotten serious about a tablet, and wants to power it with the upcoming Windows 8.



image




Enhanced by Zemanta


Sunday, 5 June 2011

What to Expect From Windows 8?





 


What will Windows 8 look like? The first Service Pack for Windows 7 has only just landed, but leaked pre-beta builds of the next version can already be found on the web, offering a snitch peak at features ahead of their expected official opening at Microsoft�s Professional Developers� Conference in September. 


Windows 8 is broadly expected to assume a more tablet-focused design, but the leaked builds submit more changes are happening, with screenshots indicating a Windows Phone impact on the desktop OS and that the Ribbon interface from Office will show up in Explorer.


Another supposed change is the addition of an app store � which may explain the ongoing legal battle over that term with Apple � as well as ISO mounting, a new installation system, and Windows� own PDF reader. Other screenshots show a restored version of Task Manager, as well as cloud-based syncing of user profiles and settings, which should make this edition more �User Friendly�.


Rafael Rivera� is half of a Windows focused blogging and authoring duo, who considered the builds to pick out the most exciting features. He�s persuaded the build are genuine. �Microsoft, as part of its build process, digitally signs all operating system files.�



Enhanced by Zemanta






Sunday, 15 May 2011

How to Update Drivers in Windows 7?

Screenshot of the Device Manager tool under Wi...

Image via Wikipedia
This is one of the very common question to a PC owner, that �How he update drivers in Windows?�
Answer is that you might need to perform a driver update in Windows for all kinds of reasons. Usually, a driver update is used as a solution to an issue with how Windows works with a piece of Hardware.
Updating a driver can also enable new or updated features for the hardware, which doubles the role of a hardware in a PC.
PC Supporter answering for this question in these words �Drivers are updated in Windows by using a driver update wizard from within Device Manager, which is available under the right click menu by clicking on �Computer� or �My Computer� icon on your Desktop. The driver update wizard walks you through the entire driver update process, making updating drivers a fairly painless task.�
Windows 7, Windows Vista and Windows XP all have slightly different ways and processes to complete driver updates:-
Driver Update in Windows 7:  Updating drivers in all versions of Windows is necessary when a hardware device doesn�t install automatically, as well as in Windows 7.
When the hardware is having some kind of problem, or as part of some other troubleshooting with the hardware. Updating a driver is many times the solution to a Device Manager error code, and also updating drivers for a piece of hardware will also sometimes enable additional features for the hardware.
Follow the steps to update drivers from within Device Manager in Windows 7:
1. Download the latest drivers from the hardware manufacturer�s website. Drivers from the manufacturer will be most current but there are several other driver download options.
As part of this driver update process, you can choose to update drivers from a hardware installation disc or from Windows Update but updating drivers manually (as described below) is usually more effective.
Before going to read the steps below, Note one thing that many drivers come integrated with software that automatically installs the driver. The manufacturer�s website will tell you if the driver download is packaged this way and if so, the steps below aren�t usually necessary.
2. Open Device Manager from the Control Panel or right click on Computer icon in windows 7.
3. With Device Manager open, locate the hardware device that you want to update the drivers for.
4. After finding the hardware you�re updating drivers for, right click on the hardware�s name or icon and choose Properties. In this Properties window, click the Driver tab.
5. Click the Update Driver button.
Note: The Update Driver Software wizard will begin.
6. On the �How do you want to search for driver software?� window, click the Browse my computer for driver software.
7. In the next window labeled Browse for driver software on your computer, click on Let me pick from a list of device drivers on my computer, located at the bottom of the window.
8. Click the Have Disk� button located under the text box.
9. Click the Browse� button on the Install From Disk dialog box that appeared. In the Locate File dialog box that appears next, navigate to the folder that you extracted as part of the driver download in Step 1 above. There may be multiple folders within the extracted folder so be sure to work your way to the one for Windows 7 if it exists. Don�t worry if you don�t find one labeled for Windows 7.
10. Click any INF file that displays in the file list and click the Open button.
Note: INF files are the only files that Device Manager accepts for driver setup information. See the tips at the bottom of the page for some INF file troubleshooting.
11. Click the OK button back on the Install From Disk dialog box.
12. Choose the newly added hardware in the text box and then click the Next> button.
If you are prompted with a message warning you about how the device driver may not be compatible with your hardware, click the Yes button to continue installing the driver. Many drivers are not Windows 7 certified but are still perfectly safe to install and use.
Important: If you are installing a driver obtained from anywhere other than the manufacturer of the hardware, click the No button instead and obtain drivers from the manufacturer directly.
13. The Windows 7 Update Driver Software wizard will now use the instructions provided in the INF file from Step 10 to install the updated drivers for your hardware.
14. Follow any additional instruction on screen to complete the drive update.
15. You may be prompted to restart your computer after the driver update is complete.
Make Sure:- Not all driver update require a restart of your computer. Even if you�re not prompted, I always recommend restarting anyway. The driver update process involves changes to the Windows Registry and other important areas of your computer and restarting is a good way to confirm that updating drivers hasn�t negatively impacted some other area of Windows.
If a driver update causes a problem, you can always roll back the driver.
Tips:
a. Couldn�t find an INF file in a folder from your driver download? Try looking in another folder.
b. Couldn�t find an INF file in any folder from the extracted driver files? The driver download itself may have been damaged. Try downloading and extracting the device drivers again.
c. Find multiple folders with INF files? Try each folder until you find the drivers for your specific hardware.




Saturday, 30 April 2011

350 Million Windows 7 Licenses Later, Windows XP Just Won't Die





Microsoft (Nasdaq:MSFT ) said on Friday that Windows 7 has sold 350 million licenses, which is about twice the volume of Windows Vista in the same time frame. Windows 7 has saved Microsoft from a potential Vista disaster, but challenges remain.

Windows 7 has been available for just about 18 months (if we ignore the presale event from June 26 to July 11, 2009), and it appears that Microsoft can keep up a fast pace of Windows 7 sales. On average, Microsoft has sold about 19.4 million licenses per month, and if we include the presales period, we're still looking at 18.4 million licenses per month.

We tried to find some comparison numbers for how Microsoft operating systems sold in the past and found that Windows XP sold just 17 million units in the first two months after launch and about 46 million units within 10 months after launch. Windows 95 sold about 19 million units in its first entire year of availability (1995). Windows 3.11 reportedly sold about 34 million copies over its lifetime. Of course, the PC market was far smaller back then, and the success of Windows 7 also reflects the massive growth of the PC over the past two decades.

We know that Windows Vista sold about 180 million licenses within 18 months after launch (not including three months of Express upgrade sales in fall of 2006), which gives Windows 7 roughly a 2:1 edge. A direct comparison isn't exactly fair, as the PC market has grown since the launch of Vista in early 2006. However, we also remember that Windows 7 crossed the 150 million mark nine months after launch in June 2010, and it appears that the sales pace has accelerated since then: While the first nine months saw sales of 150 million, the second nine months reached 200 million. A total of 175 million Windows 7 licenses were confirmed as sold 10 months after the operating system's launch. Windows 7 is clearly doing well.

However, it should still be noted that Windows XP still holds the majority of the OS market -- more than 50% according to Net Applications, and about 47% according to StatCounter. At the current pace, it may take another 12 to 18 months until Windows 7 will be able to surpass Windows XP as the world's most popular operating system. By then, we're already in the time frame for the release of Windows 8. Counting down the usage of software it loves to hate has become a tradition a Microsoft. IE6 has its own counter, and there's now a counter for Windows XP as well (unfortunately, that counter works only on Vista and Windows 7). We doubt that those counters will accelerate the death of those programs.

Microsoft also highlighted the success of IE9 without offering any download or usage numbers. We previouslyran an article in which we estimated the usage share of IE9 on Windows 7 at just over 7%, while the overall market share appears to be stuck below 3%. IE9 can't quite follow the success of Windows 7 yet.

Friday, 7 January 2011

Keylogger Trojan?


By Mary Landesman



In its simplest form, a keylogger trojan is malicious, surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner.

Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for specific activity - like opening a web browser pointing to your online banking site. When the desired behavior is observed, the keylogger goes into record mode, capturing your login username and password.

Some sites attempt to thwart keyloggers by having the user respond to visual cues they must point to with their mouse instead of using their keyboard. However, some keylogger trojans also capture screenshots, thereby negating the effect of this strategy.

Keyloggers and other forms of remote-access trojans tend to be the most determined malware, taking extra steps to stealth its presence, including through the use of rootkits.

The best defense against keyloggers is prevention. One of the most common infection sources is peer-to-peer (P2P) filesharing networks, such as Kazaa, Morpheus, Gnutella, and dozens of others. Keyloggers are also commonly sent as email attachments and via links in instant messages that point to the infected file.

Too often, people are lulled into a false sense of security, believing, for example, that if they simply switch to a different browser they will be safe from harm. It's simply not so simple. To stay safe means becoming proactively engaged in your own security.