Archives

Windows 10 Default Settings Issue

Microsoft has responded to Windows 10 users’ privacy fears by insisting that it does not scan emails, messages or files for advertising purposes.

When Windows 10 launched some users complained that Microsoft had compromised their privacy due to its default settings.

It was later revealed that even when all data collection settings were turned off Windows 10 still sent identifiable data to Microsoft.

Now Microsoft has moved to clarify the types of data it collects. Terry Myerson, Microsoft’s executive vice president of Windows and Devices said: “

No matter what privacy options you choose, neither Windows 10 nor any other Microsoft software scans the content of your email or other communications, or your files, in order to deliver targeted advertising to you.”

Myerson explained that Windows 10 collects two types of data. The first is designed to help Microsoft and third-parties identify bugs or problems in software – items such as crash logs, system information and other diagnostic data.

“This doesn’t include any of your content or files,” says Myerson. “And we take several steps to avoid collecting any information that directly identifies you, such as your name, email address or account ID.”

Behavioral data for Cortana and personalization

Windows 10 also collects information on user habits in the name of personalization. Microsoft’s digital assistant Cortana collects the most, but it and other settings that remember preferences such as favorite sports teams and commonly typed words can be disabled.

This type of personalization and behavioral data is commonly used by other platforms for digital assistants and other machine learning processes that adjust to the user, such as Google Now, Siri and autocorrect software for keyboards.

However, when all personalization features were turned off Windows 10 was found to send personally identifiable data associated with Microsoft’s OneDrive and an unknown content delivery network.

Microsoft has been under fire from privacy advocates with some describing Windows 10 as the most invasive Windows yet. It has also seen issues with compulsory automatic updates, and has been seen to download itself onto user machines without permission, but is considered to be the best Windows version yet.

What Is A PC Driver?

Your computer contains all kinds of hardware, such as disk drives, DVD/CD-ROM drives, network adapters, and sound and video cards, as well as external devices, such as printers, keyboards, monitors, and USB drives. When you install an operating system (OS), such as Windows or Linux, that OS needs to be able to talk to the hardware in your computer to display items, play sounds and videos, and write data to and read data from an external drive, as well as other tasks.

That’s where drivers come in. A driver is a small piece of software that acts as a translator between a device and the OS and programs that use the device. The driver tells the OS, and installed software programs, how to talk to the hardware in your computer. For example, when you buy a printer, it usually comes with a driver on a CD (or, in recent years, a URL for download the latest driver software from the internet) that tells the OS how to print information on each page. Without the driver, the printer will not know how to interpret the data sent to it, if the data even makes it to the printer.

NOTE: Many drivers such as keyboard drivers and mouse drivers are already installed with the OS when you buy a computer.

The drivers installed in your system to talk to the devices are managed using the Device Manager. To access the Device Manager in Windows 7, enter “device manager” (without the quotes) in the Search box on the Start menu. Click on the Device Manager link under Control Panel.

All your hardware device categories, such as Display adapters, DVD/CD-ROM drives, and Mice and other pointing devices, are listed and the specific devices are listed below each heading.

If you are having trouble with a device, it’s helpful to know the version of the driver currently installed in your system. You may need to email this information to the manufacturer, or tell them over the phone. It’s also helpful if you are trying to find a solution yourself on the internet on various sites and forums.

  • To find out the version of a driver, right-click on the driver in the Device Manager and select Properties from the popup menu.

On the Properties dialog box, click the Driver tab. The Driver Provider, Date, Version, and Signer are listed. You can find out more information about the driver using the Driver Details button. Notice that you can also update the driver from this tab, disable the driver, uninstall the driver, and even roll back the driver software to the previously installed version, in case an update caused a problem with the device.

 

Steps To Edit Keyboard Language

For Windows Vista and Windows 7, open the Control Panel and click on Region and Language. Now click on the Keyboards and Languages tab and then click on Change keyboards.

You’ll see the current default input language and installed services. To add a language, go ahead and click on the Add button.

Now scroll down to the language you want to add and expand the keyboard section. Depending on the physical keyboard you are using, choose the correct keyboard option. You might have to play around with the different options because sometimes one keyboard doesn’t work properly.

You can also click on the Preview button to see how the characters for your language are mapped to the keyboard you are using.

In my example, I chose Hindi Traditional for the keyboard language. Scroll down to the Using the Language Bar section to see how to type into different applications using the new language.

Change Keyboard Language in your Windows

For Windows, you want to go to the Control Panel and click on Regional and Language Options. Next click on the Languages tab and then click on the Details button.

This will load up the Text Services and Input Languages dialog box. Here you will see the list of installed services and keyboards on your computer. You can click Add to install a new keyboard layout and input language.

Choose the input language and choose the type of keyboard that you have attached to your computer. If you want to type Spanish on an English keyboard, choose Spanish as the Input language and United States-Dvorak.

Using the Language Bar

When you install a new language in Windows, it automatically enables the language bar. This is really useful for quickly switching between languages in Windows. You’re probably not going to be typing in one language for every application, so the language bar makes it easy to switch.

You’ll see the language bar in your taskbar with letters to denote the language you are currently using. If you click on it, a list will appear and you can simply click on another language to select it.

Now you can open an application like Word, select the language from the language bar and start typing. You should see the characters for your language appear as you type.

That’s about it! So if you want to type in another language, such as a foreign language, or if you want to switch the keyboard language back to English, the above steps should solve your problem!

What Is Host File?

The hosts file in Windows is like an address book for your computer. It is loaded into memory (cache) when Windows starts and associates host names, such as www.google.com with IP addresses, such as 74.125.224.72 for Google. The IP address is like the telephone number for that site. However, so we don’t have to remember a string of numbers for every site we want to visit, we enter easy-to-remember host names.

Because the computer uses IP addresses to find sites, it needs to translate the host name for a site into an IP address. If the IP address for a site is in your hosts file associated with a host name, your computer can use that to “call” the site when you enter the host name in your browser’s address bar. If not, your computer must contact a DNS (domain name server) computer on the Internet for the IP address before it can contact the site.

Initially, there are no host name/IP address associations in the hosts file. Examples of the format and layout of the IP addresses and host names are listed in the comments in the file.

If you add host names and their associated IP addresses into the hosts file for sites you visit often, access to those sites becomes faster. Your computer doesn’t have to query DNS servers on the Internet to get the IP addresses for those sites. If there are any sites that don’t have a domain name, you can enter the site’s IP address in your hosts file with a custom domain name which can serve as a “shortcut” to the site.

So how can you use a HOSTS file in Windows? Well, websites can collect various types of information about you as you surf the web. The hosts file can help block sites from tracking you, as well as block ads, banners, third-party cookies, and other annoying parts of web pages.

Each computer has a host address of its own, known as the “localhost” address. The IP address for localhost is 127.0.0.1. This can be used to block sites serving ads or objectionable content by entering a site’s host name in the hosts file and associating it with the localhost IP address. That refers the host name to your own computer, which then thinks it found the site and displayed it already, even though that site was never actually contacted.

 

What Is Windows MAC Address

Do you need to figure out what your MAC address is? I’ll explain how to do that in this article!

So what do you need to do to get your MAC address? It’s pretty simple actually! Let’s start off with getting a PC MAC address:

  • Click on Start and then click Run. In the text box, type in CMD. Click OK.
  • In the DOS window (the black box), type in the following without the quotes: “ipconfig/all” and press Enter.

You’ll notice a lot of stuff that might not make sense! Basically, this command gives you all the information for any network card in your system including the wired (Ethernet) network adapter, bluetooth adapter, any virtual adapters and the wireless adapter. So you’ll have to look under the specific heading you need because each adapter will have it’s own MAC address.

The MAC address is usually the last item in the list for each adapter and it’s called Physical Address. You’ll see a set of pairs of numbers separated by colons, i.e. 09:F2:96:3E…etc. This is your MAC address for that particular adapter.

You can then use the MAC address in your router settings if you are setting up MAC address filtering, which allows you to specify only certain devices that can connect to your WiFi network. Note that every device connected to your network has a MAC address including smartphones, printers, etc.

OS X Mac Address

If you have an Apple computer like a Macbook or Mac Mini, you can get your Mac address following the steps below.

  • Open System Preferences and click on Network.
  • Click on the connection that you want the MAC address for and then click on theAdvanced button at the bottom right.
  • Then click on the Hardware tab and you’ll see MAC Address written right at the top.

 

X Yosemite 10.10.3

Finally, Apple unveiled its latest operating system version 10.10.3 for Mac computers which is called X Yosemite operating system. And as far as the computer industry is concern, this operating system has a lot more to offer and is quite a pretty huge one compared to other operating system versions. The big revelation is just in perfect timing for Apple’s 12-inch Macbook.

For starters, the X Yosemite version 10.10.3 operating system features a new photo app that replaces the clunky and old iPhone at the same time, enables you to browse images by location and time in numerous new views. Storing photos to your iCloud library with original resolution and format is also possible with this latest version and you can also access all of them iCloud.com using any kind of Apple device.

It’s not a consolation to present Lightroom users and former Aperture user for this matter, but its Photo app introduces some consumer-level, and indigenous tweaking for images based on the slider adjustments similar to iOS 8.2 as well.

This newest desktop also Look Up Spotlight suggestions, improved connection reliability for Bluetooth, and Safari privacy and stability updates. There are numerous listed fixes for widely known problems included in the Yosemite OS as well. Wireless stability fixes are good example for this. Aside from that, Apple Yosemite version 10.10.3 also performs the following:

  • Enhances compatibility with Wi-Fi network environment
  • Enhances Wi-Fi connectivity and performance in several usage scenarios

There are plenty of reports surrounding the Internet today regarding user’s complaints on the Wi-Fi stability and performance of most Apple devices using both Yosemite versions 10.10.1 and 10.10.2 that includes unspecified Wi-Fi fix.

However, the version 10.10.3 of X Yosemite operating system also repairs a specific problem that makes Mac computers unable to response during start-up, and has few enterprise-level upgrades as well.

If you want to upgrade to this latest operating system version, you can use the Updates option from the App Store of your Macs to gain access to the latest OS X version, along with some other software upgrades available. You may also visit Apple’s Support Downloads to get copy of the installer needed. But be sure to have a backup for the operating system so that in case something wrong happens on the process, you can always start again by restoring its previous OS version. Mac computers tend to slow down just like any other Windows machine out there, that’s why it is very important to clean and install updates sometime in order to avoid problems that could harm your system and also your computer device.

 

A Click To Keep You Safe

Every day we are peppered with the television advertisements stating that one click loads a software program that tests your slow computer for viruses and spyware. It then speeds it up by removing them. These tests are free, but the removal and speed up is not. The true question is how effective is this virus removal?

It is possible for a computer program downloaded from the Internet to detect viruses and spyware. Internet downloads to detect and/or remove viruses have been provided by Trend Micro, Panda Software, and others for years. These to me are 2nd Opinion Virus Scans. If you primary virus/spyware scanning software Symantec, McAfee, AVG, Avast or others seems not to work, then using an Internet virus scanner that has the latest virus signatures is an effective way to check for and to catch virus and spyware escapees.

One definite fact illustrated to me every day is that no one virus detection and removal program detects and removes all viruses. You can run one program, then another and several more, only to find that the last program still detects and removes some viruses or spyware. Each program has its own plan of attack on how to do the best job. However, some viruses and spyware are always missed. So the $50 or $139 question is can one click PC repair programs catch enough viruses and spyware for your computer to be fully repaired. It is likely that the computer is repaired for that day, but probably not for that year.

Viruses and spyware tend to party in your computer. They invite all their virus and spyware friends into your computer for a giant beer keg party. Over time the computer in-perceptively slows down until it needs to be repaired. Once a virus and spyware has made its home in your computer it builds defences against detection and removal.

The first virus that prevented removal I encountered was the log-in to Windows and then Windows immediately logs you out removal prevention virus. It is like a log-in then log-out revolving door. Since you cannot log-in to Windows, you are unable to remove the virus or spyware. This trick is easy to repair. The trick has now all but disappeared only to be replaced by others like the virus that blocks EXE files from running. When EXE files are blocked, the error messages Windows displays are highly misleading lies. They are like politicians lying to their constituents to get re-elected rather than telling them the hard truth. Not only can you never trust a politician but you also can never trust a Windows error message. How does one click Internet virus removal software protect you from or fix this? One click Internet virus removal software could run because they are mostly Java and ActiveX scripts and not EXE files.

Windows corruption can easily be caused by simple changes to the Windows Registry (the primary control mechanism in Windows for Windows and all other programs). Such changes can cause severe dementia to Windows. Other configuration changes can block Internet access or prevent your computer from going to specific sites.

Some viruses are root kits that load into a computer’s memory at the start of the initial boot up process. Some root kits install themselves in the Master Boot Record (MBR). The MBR is the first information that is read from the disk drive when the computer is turned on. Can a one click Internet computer repair program detect this? It is possible. Can a one click Internet computer program repair this?

 

Backup Software For Free- Not From Microsoft

The ideal backup routine should be reasonably easy to set up and as automated as possible. Windows 7 offers a reasonable backup tool, and Win8 has a much better one; but there are also non-Microsoft backup apps that are both more powerful and easier to use. Here are three good options.

Of course, you also need to know that your backup system is completely reliable. I recommend considering the three backup apps discussed below because they’re more versatile. Two of them have more flexible scheduling options than Windows backup tools, and all of them give more control over where you store backups. They can all create incremental image backups, which let you use one backup for both Windows and data. Moreover, they include filters that can control which files are regularly backed up.

Of course, no backup is truly free. You’ll want an external hard drive, connected via USB or your network. But that’s a small price compared to what a data-recovery service, described in the May 9, 2013, “Hard-drive crash! A tour of a data-recovery lab” Briefing Session will charge to restore data from a crashed drive — if they can restore the data at all.

There’s one problem that virtually all backup programs have when working with external drives. They assume that the drive will be connected to the PC 24/7. That’s certainly the most convenient way to keep your data safe — you simply set a schedule, and your data is archived automatically. Unfortunately, a backup drive that’s always plugged in isn’t completely secure. For example, the same power surge or ransomware that destroyed your original data might also take out the backups.

Cloud-based backup services solve that problem — it’s a solution I recommend for people who just won’t back up (say, a certain teenager). But cloud-based backup is usually slow and, in the long run, expensive. So the focus for this article is on local backups to an external hard drive. I’ll also note how scheduled backups work when the external drive isn’t available.

Causes Of Windows Problems Associated With Windows Shutdown

Most computer users often complained for Windows problems that usually occur any time of the day. And among the most common complained issue is the shutdown problem of Windows XP operating system. All of the Windows problems out there, it is among all other problems that most users don’t worry that much because they thought that it’s just a simple thing and they just turn the system off thinking that everything will be okay soon after they turn it on again. Unfortunately, they’re wrong. This shutdown problem in Windows XP operating system will just keep on coming back not unless you pay attention to the issue, find out what really causes it and use some software programs to resolve the problem.

This simple shutdown problem in Windows XP may occur because of another bigger problem that’s happening inside this system that you’re not aware of. Taking this simple issue for granted can also lead to a more serious issue that can even affect your entire computer system. So it is recommended that when you noticed some unusual activities in any component of your system, just like this shutdown issue, then you have to do something to manage it and lessen down all other risks.

Here are some of the possible Windows problems that can be the primary cause of this shutdown issue to take place.

Hardware

The hardware component of any computer system is one of the most common causes of Windows problems that can also trigger shutdown issues to occur. If in case you own the latest version of computer drivers, then you’re more likely safer to be affected with this kind of Windows problems than those that don’t have the updated driver. However, during the installation of the new computer hardware and also during the process of updating the drivers, it’s not possible that you can damage some of the other programs inside and you have to re-install your latest drivers once again.

You can perform this procedure manually by simply visiting the main website of the manufacturer and from that site; you have to download the latest version of the program. You can also purchase the newest version available that can provide you more feature to manage the issue.

Software

Software is also another thing that can cause this shutdown issue to arise. While you are on the process of installing any of your software, there are some instances that you cannot play it well together with the other software that’s already installed in your system. You can also encounter problems when closing the software application causing Windows problems like XP shutdown issues to arise, or it can also slow down some of other processes that take place inside your computer system.

Registry Database

Another thing that can cause this Windows shutdown issue to occur is the registry error. If your registry database gets damage, most probably, it can affect all other components of your computer device because the registry section is the most vital component of your system. It works as the brain that stores almost all that’s inside your computer system, and any damage can definitely ruin the entire operating function of the device.

 

Keep All Your Contacts And Drop The Junks

Shifting to another email address is not that daunting like transferring to your new house. However, at some point, it needs to be done as well. You have to be sure that your mailing lists and all your contacts knew about your new email address, but you don’t have to share it to everybody for security purposes.

There are times wherein email addresses suddenly become obsolete. Maybe you are switching your ISPs or you don’t want to found yourself paying for an email address or relative domain names. Most likely, old email address becomes a magnet pulling lots of less dangerous, but very annoying spam messages and junk mails towards your address.

On the other hand, if you opt to just kill your email address immediately, you will surely lose that well-established communication links. Important credit card and bank notifications will not reach you and old friends might drop off from you completely. You will never receive the newsletters that you always want to read.

Transitioning towards a new address often takes a lot of planning before actually doing it. You have to wean first from your old email address, carefully and slowly, before rising up to your new one.

Switching Family and Friend To Your New Email Address

This part is the simplest part in changing email addresses. People who personally know you usually responds faster than those faceless corporations.

To begin the switch, send a message to your own email address and BCC everybody you want to receive that message. Simply explain to them that you are giving up your old email address and asking them to use the new one instead.

Why you have to use BCC?

You have to use the said option because if you will put all the names of your contacts in the “CC” or “To” field, somebody might click on the “Reply All” option before sending to you their response. Then others might also hit on the “Reply All” menu as well.

Usually, some contacts you listed might not follow your direction, so expect seeing private email messages occasionally in your old email address’ inbox as well.