Wednesday, March 28, 2012

How to make your browser secure

Every browser has its share of security problems. Make Secure browser is the basic ways to protect your computer from potentially harmful online content or malicious software is easy, fast and free. Try to set your browser's security settings at the appropriate level.

No matter which browser you use, always follow these top five security tips:
  • Delete spam messages without opening them or replying to them.
  •  Use great caution when clicking on links sent to you in e-mail or text messages.
  • Do not open e-mail attachments unless you know the sender and you're expecting the attachment.
  • Create strong passwords. Use different passwords for your online banking accounts.
  • Make sure you use firewall, as well as antivirus and anti spyware software that is automatically updated.
How to check your Internet Explorer security settings:

      1. Open Internet Explorer.
      2. Click the Tools button and then click Internet Options.
      3. Click the Security tab.

You will see four security zones:

Internet: The level of security for the Internet zone is applied to all Web sites by default. The security level for this zone is set to medium-high, but you can change it to either medium or high. The only Web sites for which this security setting is not used are those in the Local Intranet zone, or sites that you specifically entered into the Trusted or Restricted Site zones.

Local Intranet: The level of security for the Local Intranet zone is applied to Web sites and content that is stored on a corporate or business network. The security level for the Local Intranet zone is set to medium, but you can change it to any level.

Trusted Sites: The level of security for Trusted Sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information. The security level for Trusted Sites is set to medium, but you can change it to any level.

Restricted Sites: The level of security for Restricted Sites is applied to sites that might potentially damage your computer or compromise your personal information. Adding sites to the restricted zone does not block them, but it prevents them from using scripting or any active content. The security level for Restricted Sites is set to high and cannot be changed.

Here is some steps to view or change the security setting on Internet Explorer 7/8:
internet explorer security

 In addition to these default security levels, you can customize individual security settings.

Step1: Open Internet Explorer.

Step2: Click the Tools button and then click Internet Options.

Step3: Click the Security tab.

Step4: Click the "Custom level..." button.

Step5: At the bottom of the pop-up box, you can reset the security setting to something higher or lower. Settings that are not at recommended levels will be highlighted in red.

Step6: If you modify your security settings and want to change them back to the default level, follow the above instructions through step 4. Then click on the "Reset all zones to default level" button.

To solve any technical related problem in your computer system  then you can reach online technical support service desk of V tech-squad at their Toll Free No +1-877-452-9201.

Wednesday, March 21, 2012

Safeguard your data against loss!

To safeguard your data from data loss, you need a secure, reliable, and functional and offsite data protection. Some data is also confidential and you don’t want lose it and also don’t want to give permission to access this file without your permission. Here are some points which will help you to protect your all-important user data from loss and/or unauthorized access.

Back up early and often

The single most important step in protecting your data from loss is to back it up regularly. You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.

Use file-level and share-level security

To keep others out of your data, the first step is to set permissions on the data files and folders. If you have data in network shares, you can set share permissions to control what user accounts can and cannot access the files across the network. With Windows 2000/XP, this is done by clicking the Permissions button on the Sharing tab of the file's or folder's properties sheet.

Password-protect documents

Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, from tool option you can set password. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used.

Use EFS encryption

There are many third-party products available that will allow you to encrypt an entire disk. Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it's written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the "outer" disk.
Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users.

Make use of a public key infrastructure

A public key infrastructure (PKI) is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party, certificate-based security is stronger.

Hide data with steganography

You can use a steganography program to hide data inside other data. For example, you could hide a text message within a .JPG graphics file or an MP3 music file, or even inside another text file .Steganography does not encrypt the message, so it's often used in conjunction with encryption software. The data is encrypted first and then hidden inside another file with the steganography software.

Protect data in transit with IP security

Your data can be captured while it's traveling over the network by a hacker with sniffer software .To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it. Windows 2000 and later Microsoft operating systems have built-in support for IPsec. Applications don't have to be aware of IPsec because it operates at a lower level of the networking model.

Virus protection

Protect your computer against viruses and spyware. These are typically sent through email or your browser. Viruses can cause tons of damage to stored data. They can delete files and provide others access to your computer. Be sure to install a quality anti-virus/anti-spyware program onto your computer.Otherwise you can take online virus removal support service from any third party.

Secure wireless transmissions

Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely.

Use rights management to retain control

If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, you can set rights so that the recipient can read the Word document you sent but can't change, copy, or save it. You can prevent recipients from forwarding e-mail messages you send them and you can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time.
All above points are the basic guidelines to safe your data from data loss. To solve technical related problem in your computer then you can reach online technical support service desk of V tech-squad at their Toll Free No +1-877-452-9201.

Tuesday, March 6, 2012

Windows 8 support with metro style user interface

windows 8
With Windows 8 operating system, Microsoft has made some stunning changes when compared to its previous version. One of the major goals of Microsoft with Windows 8 was to make it suitable for touch screen devices. To fulfill this objective, Microsoft has introduced the Metro style user interface in Windows 8 to make it more attractive and compatible with touch screen devices. This article contains information provided by Windows 8 support team regarding its new metro style user interface.

Metro user interface explained in detail by Windows 8 support team

Windows 8 support team explains that the Windows 8 user interface of two different elements, the metro user interface and the traditional user interface. So with these improvements Microsoft has able to provide a stunning looks for its desktop and other components like Internet Explorer and a Copy File dialogue box.

Unlike the traditional Windows interface, the new Metro interface offers much more than visual affect. According to the Windows 8 support team, users can also feel the difference of Metro style interface while using some tools, APIs, languages, UI  etc.

Windows 8 support team explains that Windows 8 is having a no compromise design, which means it works well with old and new. Windows 8 support team also informs that users will get an attractive, quick and fluid metro style interface and a variety of different applications to use.

Windows 8 support team is of the opinion that if you like the metro style user interface so much, then you can choose not to use the ordinary desktop permanently, so that the role of desktop will be cleared.

Extended Taskbar
The taskbar is extended in Windows 8 natively across both monitors. All the pinned and running tasks on the taskbar are displayed on both the monitors and the start button is there on the primary monitor but that’s not it. The secondary monitor features a switcher button in place of the start button, clicking which will swap it with the start button, bringing it to the secondary monitor and taking the switcher to the primary one.
extended taskbar
This can come really handy when you want to be able to control Windows from both monitors, especially in scenarios when you don’t have both displays side by side or even visible at the same angle, like projector displays during presentations.

Extended Wallpaper
For extending the wallpaper, across both your monitors, you will need an image with the right dimensions that can span across both your screens, or it will appear pixelated or stretched. Once you have the image you want as your extended wallpaper, right-click the Desktop and click ‘Customize’. From the themes, select ‘Windows Extended’ under Aero Themes, as shown in the following screenshot.
windows 8
Once you have the theme selected, you can then select your extended wallpaper. Click ‘Desktop Background’ to bring up the wallpaper customization interface. From there, browse to the location where you saved your extended wallpaper if it isn’t already being displayed there. Right-click the wallpaper of your choice and from the menu, select ‘Set for all monitors’ as shown in the screenshot below.

Windows 8 also lets you set different wallpapers for each monitor. Simply follow the above procedure but instead of selecting ‘Set for all monitors’, select the particular monitor you want to apply it on.

Thursday, March 1, 2012

Microsoft unveils Windows 8 for consumer testing

BARCELONA, Spain — Microsoft is for the first time letting consumers try out its upcoming Windows 8 operating system, which it hopes will be used to power a new wave of computer tablets and traditional PCs.
The test “beta” version of the revamped system was introduced at the Mobile World Congress in Barcelona, the planet’s largest cell phone trade show.
Microsoft Corp. on Wednesday offered it up free for download, along with free applications in a new “Windows Store.”

Windows 8 doesn’t have the traditional “Start” menu and applications are spread across a mosaic of tiles in a design Microsoft calls “Metro.” seen as an attempt by the company as a scramble to preserve its market share. And executives said it powers up on PCs in eight seconds, much faster than the previous version.

The tiles, which resemble road signs, can be navigated with a finger swipe on the screen or with a keyboard and mouse.

Microsoft executives in Barcelona showed off how users can use their fingertips to swipe in and out of applications, and tilt upright computer screens to a flat position so they can be used as two-person gaming boards or big drawing tablets. A slim laptop had a hinge allowing it to be turned inside out so it could be used as a tablet instead.

The test version was downloaded by people from more than 70 countries as Microsoft gave its presentation about Windows 8, but the company didn't immediately disclose the number of downloads. The software can be downloaded at
Copyright 2012 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.