Friday, July 30, 2010

Your Windows 7 Reliability Monitor

Friendly Computers found this article useful to keep your PC on the right track and would like to share it with you.

One of the cool little features that arose from the ashes of the disaster known as Windows Vista was the Reliability Monitor. A little-known tool which is almost hidden within the action center, the Reliability tool is great for tracking your computers reliability.

I remember using it when I was running Vista and nearly forgot about it until I was reminded by a weekly podcast to which I subscribe. I did my best to see if we have ever covered the Reliability Monitor here on Windows7News and as far as I can tell, we haven’t.

“Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Any change you make to your computer or problem that occurs on your computer affects the stability index.”

Per Microsoft, the Reliability Monitor is intended for advanced computer users, such as software developers and network administrators, but it is easy to use, so even moderate users will have no problem using the tool to track their system over time.

There are two ways to find your PC’s Reliability history:

You can use Windows Search and begin typing the word ‘Reliability’ until the option shows.

Or

Right-click on the white flag in your taskbar to open Action Center.

Click Maintenance. Then, under Check for solutions to problem reports, clickView reliability history.

rel1 400x435 Your Windows 7 Reliability Monitor

In Reliability Monitor, you can:

  • Click any event on the graph to view its details.

  • Click Days, or Weeks, to view the stability index over a specific period of time.

  • Click items in the Action column to view more information about it.

  • Click View all problem reports to view only the problems that have occurred on your computer. This view does not include the other computer events that show up in Reliability Monitor, such as events about software installation.

The layout of the program is pretty self-explanatory and very basic.

rel2 Your Windows 7 Reliability Monitor

You can click on specific unreliable instances to view the details.

rel3 400x266 Your Windows 7 Reliability Monitor

The Reliability Monitor is a very basic program with a very basic use. It’s one of the many useful tools provided natively in Windows 7 which can help you keep your PC on the right track.

Source: http://www.windows7news.com/2010/07/28/reliability-monitor/

Wednesday, July 28, 2010

What's Useful in the Safari Extensions Gallery

Friendly Computers would like to help you to choose some useful Safari Extensions.

Safari's Extensions Gallery has gone live, and there's quite a bit to look through and add to your browser at launch. We took a gander through the offerings and picked out some of the extensions worth noting. Here's the list.

To use these extensions, you'll need to have Safari installed, and have it updated to the latest version. Both Macs and Windows installations have Apple's updating software you can use to grab the 5.0.1 copy, but if you've disabled Apple's Software Update on Windows, you'll need to grab a fresh copy manually.

We've provided links to the extension maker and a direct installation link for each extension we picked out, with each link coming from the extension maker. You may be asked whether you want to Open or Save the file we're linking to (choose "Open"), and if you're sure you want to install that extension ("Install," we presume). To manage these extensions once you've got them installed, head to your Safari preferences and look for the newly-enabled Extensions menu.

Social Networking

What's Useful in the Safari Extensions GalleryBetter Facebook: Automatically hides posts you've already read, removes some of the cruft from the site, notifies you of new comments and un-friendings, and more. [Install in Safari]

Shut Up: Kills comments on many sites where you might get sick of them. [Install in Safari]

Bookmarking

Procrastinate: Adds text articles to bookmarking and reading services like Instapaper, Read it Later, and Delicious from an all-in-one toolbar button. [Install in Safari]

Twitter Tools

What's Useful in the Safari Extensions Gallery
Twitter for Safari: Twitter's official client for sending tweets, but also reading tweets and seeing Twitter profiles related to the page you're on. You can easily tweet about a page you're looking at, too, with a pre-shortened URL. [Install in Safari]

E-mail

GmailThis: Sends an email through Gmail's compose window, with the page you're on pre-loaded in the subject and body text. Basically, a fancy bookmarklet, but with a nice button. [Install in Safari]

What's Useful in the Safari Extensions GalleryTrueNew Count for Gmail and Google Apps: More than just providing a count of the messages marked unread, TrueNew's counter shows you how many messages are unread since the last time you looked at Gmail or Google Apps. [Install in Safari]

Shopping

InvisibleHand: Like the Firefox and (slightly scandalous) Chrome extensions, InvisibleHand checks the shopping item pages you're looking at to see if the item is offered elsewhere—Amazon, Buy.com, and the like—at a cheaper price. [Install in Safari]

Entertainment

A Cleaner YouTube: Claims to transform YouTube into a "quiet and peaceful place" by cutting out most of everything except the video itself. [Install in Safari]

Turn Off the Lights: As with its nifty Chrome counterpart, this little button throws a shade over everything except the video you're watching on YouTube, Vimeo, or embedded clips. [Install in Safari]

Security

What's Useful in the Safari Extensions Gallery
LastPass: One of our favorite universal password systems, LastPass is an elegant little plug-in for storing your passwords, filling them in automatically, and yet keeping them encrypted and available anywhere you go. [Install in Safari]

Web of Trust: Reads out everything the very excellent Web of Trust community knows about the site you're on—encryption, trustworthiness, vendor reliability for various components, and so on. [Install in Safari]

Photos

Awesome Screenshot: Like its Chrome counterpart, Awesome Screenshot handles the capture, annotation, sensitive data blurring, and upload/sharing aspects of grabbing web pages, no extra software needed. [Install in Safari]

Source: http://lifehacker.com/5598524/whats-useful-in-the-safari-extensions-gallery

Friday, July 23, 2010

Add Some Visual Flair to the Task Manager Display in Windows 7

Friendly Computers would like to help you to customize Task Manager Display in Windows 7.

If you love to customize your system as much as possible, then we have a fun way for you to change the color scheme for the Task Manager Window. Those Performance and Networking tabs will have a fresh new look in only a few minutes.

Before

The default color scheme for the Performance and Networking tabs is not bad, but if you love customizing your system then even this can be changed.

task-manager-modder-01

task-manager-modder-02

Getting Started with Task Manager Modder

Task Manager Modder comes in .7z zip file and has a single file inside (Task Manager Modder.exe). All you will need to do is place it in an appropriate Program Files folder and create a shortcut. When you start Task Manager Modder for the first time you will have to agree to the EULA in order to use the program.

task-manager-modder-03

You will see an embedded Task Manager Window inside the program window for viewing color modifications and the color controls at the bottom.

task-manager-modder-04

Here is a closer look at the color adjustments toolbar. You can select from the set of included colors for each option or enter your own custom color codes if desired. During our tests we chose the colors included with the program.

task-manager-modder-05

Here are three examples that we set up on our system. You can have a lot of fun experimenting with the color schemes to get that “just perfect look��. When you have everything fixed just the way that you like click on Modify Taskmgr. Keep in mind that if you have the Task Manager Window open it will temporarily close while the colors are changed then restart. Click Exit when you are finished modifying the color scheme.

task-manager-modder-06

task-manager-modder-07

task-manager-modder-08

After

Our Task Manager Window definitely had a different look and feel to it afterwards.

task-manager-modder-09

task-manager-modder-10

If you need or want to change back to the default color scheme just click on Restore Taskmgr. As discussed above, if you have the Task Manager Window open it will temporarily close while the colors are reset then restart.

task-manager-modder-11

Conclusion

By changing the colors in Task Manager, it could actually help you identify performance issues easier. So if you love to customize as much of your system as possible, then you can definitely have fun with Task Manager Modder.

Links

Download Task Manager Modder

Source: http://www.howtogeek.com/howto/22470/add-some-visual-flair-to-the-task-manager-display-in-windows-7/

Wednesday, July 21, 2010

5 Ways to Use Bootable Linux Live Discs

Friendly Computers found this article useful and would like to share it with you.

In the almost 20 years since Linux was first released into the world, free for anyone to use and modify however they like, the operating system has been put to a lot of uses. Today, a vast number of servers run Linux to serve up Web pages and applications, while user-friendly versions of Linux run PCs, netbooks, and even Android and WebOS phones.

One incredibly useful way that Linux has been adapted to the needs of modern computer users is as a "live CD," a version of the operating system that can be booted from a CD (or a DVD or, in some cases, a USB drive) without actually being installed on the computer's hard drive. Given the massive RAM and fast CPUs available on even the lowest-end computers today, along with Linux's generally lower system requirements compared to Windows and Mac OS X, you can run Linux quite comfortably from a CD drive.

Live discs allow you to radically transform the nature of the machine you're working on -- without modifying the installed operating system and software at all. There are a number of reasons you might want to do this. The most obvious is to test a new version or different distribution of Linux before deploying it, saving yourself the surprise of incompatible software or nonfunctional hardware after installation. But even if your business does not plan to deploy Linux as a desktop or server operating system, there are still good reasons to have a live Linux CD or two on hand.

Live CDs are great for system diagnosis and recovery when disaster strikes; they're also useful for securing and testing your network. And for road warriors, the ability to boot up a familiar, customized operating system on any machine, anywhere in the world, has an obvious attraction -- as do specialized live distributions designed to provide security and anonymity for workers with sensitive data or communications to protect.

Live discs are read-only, which means they're quite secure, since malware can't make any changes to the core system. If you do get an infection, it disappears as soon as you reboot.

Here are five ways to use live Linux in your business, as well as pointers to distributions best suited to each particular task.

1. Test-drive Linux

Over the years, Linux has developed from a usability nightmare into a fairly straightforward desktop operating system. With professional-quality productivity tools like OpenOffice.orgfor creating documents, spreadsheets and presentations and GIMP for image editing, as well as versions of familiar applications such as Firefox, Thunderbird, Adobe Reader and Flash, most common business tasks can be done pretty easily on a Linux system.

You can see how well adapted Linux is to your business by running several of the most popular desktop distributions from a live CD. Perhaps the most refined and user-friendly desktop system available right now is Ubuntu, which includes just about every application you could ever ask for, from business productivity apps to programs for multimedia editing, Web design, running databases, serving up Web pages and chatting online.

Ubuntu's installation disk is itself a live CD, so if you decide to install the system later you can just run the installer from the Ubuntu desktop.

2. Recover aging hardware

Linux in general has lower system requirements than other contemporary operating systems, but there are a few distributions that are specially designed to take advantage of old, even ancient, computer hardware, letting you squeeze a few more years of life out of systems you wouldn't even think of running Windows on -- including machines with broken hard drives.

Both Damn Small Linux (DSL) and Puppy Linux are designed for older systems, requiring only a Pentium 486 or equivalent CPU and 128MB of RAM to run well. DSL can even run with just 64MB of RAM. Both launch a usable, if somewhat stripped down, user interface that's perfect for tasks like sending and receiving e-mail, creating documents and surfing the Web -- in other words, basic administrative tasks.

3. Secure your network

Linux is already one of the more secure operating systems, since it was designed from the start as an Internet-connected system. Running it from a live CD makes it even more secure, since the disk image cannot be modified. Several distributions take advantage of the inherent security of the live CD to transform old computer equipment into powerful secure gateways for your network.

Zeroshell can be installed on any PC with a 233-MHz processor and 96MB of RAM to transform it into a fully featured gateway router and firewall. All the advanced features you'd expect from a modern gateway are present, including authentication via RADIUS server, quality-of-service monitoring and traffic-shaping, VPN and the ability to act as an 802.11a/b/g router on machines with the appropriate wireless cards.

4. Restore failed systems and recover lost files

When Windows fails to boot, smart IT professionals reach for their live Linux CDs. Whether the problem is a corrupted operating system or a damaged hard drive, you can boot up Linux from the CD drive, allowing you to read and copy files, run diagnostics or perform other maintenance tasks like partitioning drives.

While most Linux distributions have an assortment of at least some useful diagnostic and recovery tools (and often, looking at a drive through another operating system can be immensely useful in itself), specialized distros like the Ultimate Boot CD (UBCD) designed to run from discs are ideal for dealing with technical problems.

UBCD is the Swiss Army knife of recovery discs, containing more than 100 tools for performing deep sector-by-sector analysis of a hard drive's physical surface, recovering deleted or damaged files, rebuilding file tables, examining boot-sector errors and plenty more.

5. Work anonymously

Transform any computer into a paranoia-inspired privacy powerhouse using a CD-based distribution such as TAILS, The (Amnesic) Incognito Live System. With TAILS, you can surf the Web in total privacy -- all outgoing traffic is anonymized using the Tor service, which bounces your packets through random servers worldwide before delivering them to their destination.

In addition, the software included with TAILS is configured for privacy by default: Firefox comes with JavaScript and cookies disabled; the e-mail client, Claws, includes integrated GnuPG encryption; the Pidgin IM client is configured for Off-the-Record messaging, which encrypts and strips identifying information from your messages; and so on. Since it boots from a Live CD and saves no information on the host machine, once you remove the disc all traces of your activity simply disappear.

Find more live Linux distros

These choices only scratch the surface of the available Linux systems that can be run from a live CD -- Wikipedia's "List of Live CDs" entry names about 100 different Linux versions with live CDs, as well as live CDs based on other operating systems such as BSD, Solaris and even Windows. If you have a preferred Linux version, check the list -- chances are it will run from a live CD, with all the portability and security benefits that implies.

Source: http://www.pcworld.com/businesscenter/article/201542/5_ways_to_use_bootable_linux_live_discs.html

See Image Previews in Craigslist Listings

Friendly Computers would like to share this article with you.

I love Craigslist, but does the service have to be souser-unfriendly? I mean, would it kill Craig (or whoever's in charge these days) to offer some kind of image preview in the listings? As it stands, you have to click through every single item to see whatever photos lie beneath.

To paraphrase a popular slogan, there's a Firefox add-on for that. CLIP (a.k.a. CraigsList Image Prefetcher) adds thumbnail image previews to all Craigslist listings and search results. (And speaking of thumbnails, click the one up top to see a larger version of what CLIP does.)

Even better, CLIP adds previews of the listings themselves. Just mouse over the little arrow to the right of any item and the underlying ad text appears in a pop-up box. That should save you a lot of unnecessary clicking.

While you're at it, be sure to check out CL Genie, a free service that sends you an e-mail whenever a new Craigslist listing matches your search term(s).

Source: http://www.pcworld.com/article/201530/see_image_previews_in_craigslist_listings.html

Wednesday, July 14, 2010

Remove Those Stubborn Files From Windows 7

Friendly Computers found this article useful and would like to share it with you.

Every so often you download a file, and when your finished with it, you go to delete it and then you get the famous error message. ” Windows was not able to remove the selected file because it is currently in use” this just drives me nuts when I see it. Ok, right so I just go and close whatever window I had open that caused the file to be in use and try again.

Nope still doesn’t work. Right then, I’ll close every single window and program, that should do the trick. Try to remove the file again, but nope still you keep getting that error message.

You’re getting worried at this stage, is this a virus or what? So you go and reboot your machine, then you go once more to delete the file, but still no luck, error message yet again.

So what do you do? Are you stuck with this file forever? Well not anymore, now there is a program called “Unlocker” which will solve all your problems.

recyclebin Remove Those Stubborn Files From Windows 7

It works with both Windows 7 32 bit and 64 bit (there is a different version for each so be sure to download the right one) and even better it’s free.

It works out which processes are running and causing the file to be in use, and kills them which then allows it to delete the file. What’s more, you don’t even have to reboot your machine unlike other file removal programs.

Just a word of note though, because of the nature of this program, several antivirus programs mark it as a false positive and think it’s malware. But rest assured, it’s not and there’s proof of that on the developers blog

You can download the

32 Bit version here

64 Bit version here

Source: http://www.windows7news.com/2010/07/08/remove-stubborn-files-windows-7/

Tuesday, July 13, 2010

Mount a Windows Share in OS X and Have it Reconnect at Login

Friendly Computers thought that this article will help you to mount Windows share in OS X and have it reconnect at login.

Something Mac users often need to do is be able to access files stored on Windows shares. Here’s a good way to mount those share, and keep t1hem mounting at login.

Mounting the Windows Share

When you are in Finder you can click Go and Connect to Server or you can type Command + K to get to the same menu.

In Server Address you will need to put the location of you Windows share with this formatsmb://server/share where server is the name or IP address of your Windows machine andshare is going to be the folder or drive you want to mount.

If your Windows share requires authentication it will ask you for that info here.

Now if you have Connected Servers showing on your desktop, it will show up on your desktop an in Finder.

Making the Share Mount at Login

To keep the share showing up when you have to log out seems pretty difficult. The internet is littered with ways to write scripts to allow you to do this. But OS X makes it pretty simple if you are just needing to add the share to your machine.

You will need to be in System Preferences for this, which you can get to by clicking on the Apple Menu and then going to System Preferences.

Then you will go to Accounts.

Once in Accounts, you will need go to the Login Items tab. Then you will just drag the share from your desktop or Finder window into the Login Items list.

If your share requires authentication, it may be possible to add the username and password into your keychain with the check box in the authentication window. Some shares will not work with the keychain though.

This is pretty nice if you are working a lot between OS X and Windows, and need to move files between the two.

Source: http://www.howtogeek.com/howto/21600/mount-a-windows-share-in-os-x-and-have-it-reconnect-at-login/

Friday, July 9, 2010

Change Your Wi-Fi Router Channel to Optimize Your Wireless Signal

Friendly Computers would like to share this article with you.

If you live in an apartment complex you’ve probably noticed more than just the passive-aggressive network IDs that your neighbors use—very likely you’ve had problems with your wireless connections dropping out, or just not being as fast as you’d like. Here’s a quick fix.

Of course, this isn’t the only thing you need to do to make sure your wireless network is running at maximum speed, but for today’s lesson we’ll show you how to pick the right channel to make sure you can stream the new Futurama episode to your laptop without skipping.

Note: if your Wireless network is working fine, please don’t mess with it. Or at least, don’t blame us if you break it.

Figuring Out the Right Wi-Fi Channel

The first thing you need to do is grab yourself a copy of the free inSSIDer utility, which will scan your wireless network and probably reveal some humorous names from your weird neighbors. If only they could learn how to park their cars like decent human beings.

image

Let’s take a closer look at that window… you’ll need to choose the right channel band, depending on the router you are using. Mine is a Linksys dual-band Wireless-N router, which has two separate networks… if you aren’t sure, go for the 2.4 GHz one first, and then click the Start Scanning button.

Note: If you have more than one network card enabled, make sure the drop-down has your wireless card selected.

image[25]

Ideally you’ve selected the right one, and after waiting for a minute or two, you’ll see your network in the list. For example, my test network is called lhdevnet, and it’s currently running on channel 6. If you looked closely at the screenshot earlier, you’d see that there are loads of networks in my apartment complex using the same wireless channel.

image

Looks like it’s time to change the channel. Hopefully Futurama is on.

Change Your Wireless Channel

If you’re using a Linksys router, you’ll need to browse to the address of your router, which is probably set to http://192.168.1.1 but could be assigned to another address. You can run a quick ipconfig command at the command prompt to check:

image

In my case the address is different (because I changed it, of course), but what you’re looking for is the Default Gateway for your Wireless connection, and then go to http://<Default Gateway> in your browser. Enter in the password that you hopefully remember, and head to the Wireless –> Basic Wireless Settings tab.

My router has two separate bands, but your router might just have a single band here. In my case, what I’ve done is set the 2.4 GHz band to only be used for Wireless-G, and the 5GHz one to Wireless-N only. Since I’m not having any problems with the Wireless-N settings, I’ve left those on auto.

image

Where I am having a problem, however, is my Wireless-G devices—so what I’ve done is chosen channel 9, since it’s the only channel that’s not being used by any of my neighbors, who are using mostly channels 1 and 6, though a few are using 11 as well.

Channels 1, 6, and 11 are the most common channels to choose, and most routers will use one of them as the default channel—but the general idea is to be as far away from everybody else as you can.

image

Note: I’ve also configured my router for 20 MHz only on the 2.4 GHz Wireless-G band, just because that was the only way it would let me choose the standard channel manually.

If you are using a different router, the IP address will generally be the same, but you’ll have to figure out how to change the Wireless channel without any screenshot tours. It’s usually fairly easy, though, once you know what you’re looking for.

Fun Technical notes

If you look closely, you’ll notice that each of the channels are 5 MHz away from each other, but the Channel Width for 2.4 GHz is actually 20 MHz. What this means is while that the channel might be set to channel 6, it’s also partially using 5 and 7, and probably slightly interfering with 4 and 8.

Source: http://www.howtogeek.com/howto/21132/change-your-wi-fi-router-channel-to-optimize-your-wireless-signal/

Two Ways to Remove People From Your Vacation Photos

Planning summer vacation? Friendly Computers found this article very useful and would like to share it with you.

No matter where you travel this summer, you're probably going to have some trouble taking photos--not necessarily because of any technical issues with your camera, but because there will be so many people in the way of what you're trying to shoot. I've explained before how to erase tourists from your photos using Corel Paint Shop Pro, but this time around I've got two different techniques to share with you: One you can use in almost any photo editor from Adobe Photoshop Elements to GIMP, and an even easier method that works in Adobe Photoshop only.

The Traditional Method: Cloning

One of the oldest and most beloved photo editing tricks, cloning is a handy way to discreetly remove small objects from a photo. To clone away an unwanted element, you just "paint over" it with some texture from a nearby part of the photo. When done well, it can be almost impossible to tell anything was changed, and it's a great way to eliminate tourists from vacation photos. Take this airshow photo, for example, with a distracting pole in the shot. Rather than cropping it out, I'll clone it away.

Most photo editors have a Clone tool. In Photoshop Elements, you can find it in the 15th cubby from the top of the toolbar on the left side of the screen; it looks like an old-fashioned ink stamp. (In GIMP, it's also an ink stamp, sixth from the end of the toolbar.) After you select the tool, find a part of the photo that you can use to paint over the unwanted bits. Look for a section of the photo that would naturally be there. If a tourist is standing in front of a tree, for example, can you copy bits of foliage?

Next, hold the Alt key and click on the part of the photo that you want to use as your source. Also, you might need to adjust the size of the clone brush--you can adjust that in the Tool Options palette at the top of the screen. Make the size big enough that you can dab and paint sections of the photo with each stroke. It shouldn't feel like you're etching with a sharpened pencil.

You can also experiment with the opacity control in the Tool Options palette. Setting the opacity at 100 percent will completely obliterate the unwanted element, but the source material that you're cloning might look unnaturally pasted in as well--reducing the opacity can help to blend the new and old parts of the photo.

When you're ready, just start painting. Wherever you paint, you'll replace the pixels under your brush with "borrowed" bits from the source location. There's an art to painting with the Clone tool. Like learning to play a musical instrument, you'll need to practice with it before your results look realistic and attractive--just like my airshow shot, without that annoying pole.

An Easier Method: Stacking Photos in Photoshop

If slaving over the Clone tool sounds like too much work, then I've got a fast and simple solution that you might enjoy. The downside? Not only does it require the full Creative Suite edition of Photoshop, but it's also a technique you have to plan for when you originally take the photo.

In a nutshell, Photoshop can take a series of similar photos and automatically remove parts that don't belong in all the photos, leaving behind only those sections that are identical in every one. Here's a crowded shot, for example, with people moving around in the scene.

Here's what to do: When you take a photo of something in which a bunch of tourists are cluttering up the photo, take a bunch of photos so that, over a handful of shots, you thoroughly photograph every bit of the scene. In each photo, you'll have unwanted people, but they'll move around from shot to shot, leaving the background consistent in every frame you shoot. It's best to shoot this on a tripod, but if you're hand-holding the camera it might be okay; just be sure to keep the framing as consistent as possible in every photo.

When you get home, load all the photos into Photoshop and then choose File, Scripts, Statistics. Change the Stack Mode to Median, and then click Add Open Files. Finally, click OK. That's all you need to do. Photoshop will think for a little while (depending upon how many photos you supplied), and you will end up with a photo with no tourists, almost like magic. I took a series of six photos to get this human-free photo.

Source: http://www.pcworld.com/article/200184/two_ways_to_remove_people_from_your_vacation_photos.html