Get all information about Computer Repair Services in Canada. You can find here tips and trick for pc repair canada,pc support Canada,home pc repair,computer help canada, Technical Support, Tech Support for troubleshoot your PC.

Computer Support

| Monday, December 21, 2009
computer support
A computer support consultant is a seasoned consulting role which involves contract programming and system administration. Quite a tedious job, a computer support consultant is basically hired on a contract basis and usually the consultants are experts in computer administration and dealing.

Functions

The basic concept behind hiring computer consultants is to fit into the role of the expert and get services which are otherwise not found in the employees of the company. This skill of the consultant is hired by the companies to fill in the gap and ensure smoother functioning of the company.
The computer support consultants are required to train the employees in the company who have been hired on a permanent basis. The whole idea is to train the permanent employees in such a way that they will take over the services rendered by the consultant after the training process is over.
After the underlying issues are resolved by the computer consultant, the contract usually expires. The contract can be renewed if there are other areas or department in the company which have similar issues. Otherwise the consultant leaves the company.

Prospects

While this whole process is also a learning curve experience for the computer support consultant, the consultant can earn more money in the process. The difference between a permanent employee and a consultant is that while the former has a job wherein years might be spend on a single project.
It is a reliable and less-demanding job as compared to a consultant's. Because the latter have contracts of up to 3 months or even lesser and will have to apply for jobs every few months. The chief criteria to be qualified as a computer support consultant are to possess good and specialized skills which qualify the person to be a hired giving expert advice to companies.

Role of Tech Support Specialists

| Thursday, December 3, 2009
tech support
The role of computer tech support specialists are on the rise with the increasing demand on computers to enable all kinds of businesses in this time and age. Every business activity is inept without the help of computers and since computers are also vulnerable to technical glitches, there is the need of well-qualified and efficient computer tech support specialists everywhere. All established business is always on the look-out to employ tech support analysts at some point or the other.

To qualify as a tech support specialist, a degree in the respected field is sufficient. For some companies, computer proficiency and skills with experience in the related field certified by companies makes the grade. Excellent verbal and writing skills is a huge advantage to go further up the ladder. The support specialists are usually stationed at Helpdesks and Service desks providing technical support through telephonic calls and responding to emails related on technical support. The clientele can range from inviduals to big blue chip companies.

The tech support specialist cater to the needs of the users to resolve any problem which they can handle and send the call or mail across to a relevant technical team for further assistance. The clients should always be informed of what is happening and should be updated on any issue pertaining to them. Their role is to provide support to a company's web based products and services. But the work of tech support specialists is not getting down straight to technical or network support roles. Since these issues are related to the IT industry, it is as added bonus to be proficient with IT services. Normally the tech support specialists are trained to provide technical support to the company's products. As mentioned earlier, it is quite important to have a college degree to be suitable to qualify as a tech support specialist but then relevant experience in the field or good verbal and communicating skills is also sufficient.

AVG support

| Wednesday, December 2, 2009
antivirus support
AVG provides one of the best antivirus support for a host of anti-virus and Internet security software and has been developed by AVG Technologies. It used to be known as Grisoft before it got its present name. It supports Microsoft Windows, Linux and other software. The AVG support is easily trusted and has a good bunch of loyals who swear by it. It has gone down well over the ages and recently the AVG antivirus Free Edition 9.0 has been released.
The Avast! antivirus support software has been a prized software for users worldwide with a huge loyal fan club following. It has a lot of antivirus support programs in different editions serving various purposes and enterprises. It is quite an impressive software providing robust protection and is in the league clubbed with the best. And a user can avail all the features in the Avast! antivirus support for free.

The AVG Anti-Virus Free Edition 9.0 is the latest addition to the AVG support scheme of things. It provides flawless security to meet all the basic needs pertaining to issues regarding security to the user. The AVG support has always endeavoured to provide the correct basic computer security free of cost. It has upto 80 million loyal users and the numbers say a lot for itself. For a user who has to regularly spend time on the Internet and is regularly involved in recieving and sending files, the AVG support must be procured at any cost or rather, free of cost here.

It's unique LinkScanner® allows a user to surf and browse the Internet with no worries since the Scanner protects a user from malicious websites. The anti virus support enabled under AVG support gives both online and offline protection from viruses, spyware etc.. With it, a user can have the pleasure of consistent high-speed PC performance. It's regular automatic updates helps keep the protection up-to-date. It is compatible with all the Windows operating systems, including the new Windows 7.

AVG Anti virus Update

| Tuesday, December 1, 2009
Anti virus support
An important factor to remember when one needs to update AVG Anti virus support to Windows 7 is that, it is necessary to update AVG to Version 9.0 to enable the migration to Windows 7. This will also help in accumulating additional features in AVG antivirus support. The major problem with most computers is that, its present or existing AVG is usually not compatible for Windows 7.
It is not well-equipped and does not have the latest features to support the program. There is no guarantee that if one has installed Windows 7, the earlier version will work fine on it. So, it is absolutely necessary to have the latest version of a good antivirus support like the AVG version and install it on Windows 7. Usually, software that have worked on previous version of Windows should work just fine on Windows 7, with the exception of software that installs low-level system components like an Anti-Virus, firewalls, or similar. These packages often are developed to only run on specific versions of Windows.
AVG Anti virus support, by far, is the most popular anti-virus support software out there, and not only does it work just perfectly under Windows 7, but it’s on the list of a small number of software packages that are officially compatible as per the requirements of Microsoft.

Anti Spyware Support Built-in

| Monday, November 30, 2009
Spyware are general software that are installed in a computer without anti spyware support to gather facts and details about the computer user. It has been created solely for the purpose to gather information without actually the knowledge of the computer user. This can be seen as a breach of software protocol since it can pave the way for identity theft of the computer user. Not only that, the spyware can hack into the user's other information like credit card numbers, bank account numbers and social security numbers among other things.

Spyware are designed and developed by organized crime groups and it can be implemented and installed on a computer without anti spyware support by a virus. There is little chance that spyware can be created and abused by mere individuals. It is a much higher level of theft and crime.

Avast! has developed excellent antivirus support software in order to tackle such crimes with its built-in antivirus support. It aims at providing holistic protection to your computers. Stronger and more dangerous viruses evolve day by day to hack into your computer. Avast! has come up with its own antivirus support to ensure complete protection from viruses which can emerge from the most recent of threats which is trying to find a way into your computer system to disable your work process and security protection completely.

McAfee Antivirus Download Software for Your PC

| Thursday, November 26, 2009
The McAFee antivirus download is among one of the better and reliable antivirus support software available in the market today. It ensures smooth working of the system works by checking and weeding out malicious programs and files that might be a threat to your computer. It goes out of its way and also a long way to ensure this protection to your computer. To install and download this antivirus support, one will have to endure these steps:-
One can get an online, downloadable version of the McAfee antivirus download or can purchase a copy from the nearest computer retailer. Keep the manufacturer's directions in mind and load the program. Next up, go to "Start," "Control Panel" then "Add or Remove Programs." If the McAfee Antivirus Software is there, you will need to select "Change." The directions will allow you to put on the updated version.
If it is an antivirus support software, then insert the CD in the right drive and select the installation button so that the program will load into the computer.
When you are through with this, restart your computer and follow the directions given. Select the options saying the computer would be user friendly
Now, enable the system to choose and decide the correct times to automatically scan your computer for viruses.
You are more or less through with the antivirus download exercise now. Just start your computer which will enable all the changes happening to take its effect.

Templates for Microsoft Office Help

| Wednesday, November 25, 2009
Software giant, Microsoft, gives out free templates for its users in the forms of certificates, brochures etc. in order to enable work at home or at work. These templates are basically to help the users in having a greater control and knowledge of its various products. This article will be based on Microsoft Office help tips manual in order to give the users a deeper insight into Microsoff Office 2007 features and versions.
The templates help a user to look for a specific template in order to simplify his work process and they are all categorized for easier use. They support all the major Microsoft Office programs like Microsoft Excel, Word etc. While these programs can be used for most of the versions of Microsoft Office, there are some which can only be enabled in the newer versions.
A user can search for a template by right-clicking on the site and once the relevant template is found, simply click to download it and then open the following with the relevant Microsoft Office program. Then changing, editing and customizing the documents follow suit and the work can be saved as a document or a template.
A personalized template can shared for use with other users once it has been submitted on the appropriate site. There is also a provision to view the newly created template by making a suggestion for the same. Microsoft has enabled a lot of help services in its Microsoft Office help area for the templates. One can even participate in a discussion forum for using or creating these templates. Visit Microsoft Office Help for more resources.

Four new Operating Systems - Samsung

|
Word have been doing the rounds that Samsung has been thinking of dropping its Symbian and Windows Mobile operating systems. However, these rumors has been put down by Samsung with an iron hand and subsequently, it released a report saying that it was never in its interest to make any changes whatsoever in its strategy to support multiple open operating systems. The report was based on an official press release issued by the company on this issue.
It is noteworthy that Samsung has named its new operating system, Bada, but it is not certain how much effort and commitment they have incorporated on the new operating system. The company at present utilizes the operating systems of the Symbian, Google Android, Windows Mobile, and their new operating system Bada. From all of these, Google Android is the most previleged with permanent status in it's lineup. Samsung has also clarified, of late, of their direct involvement with Microsoft and also with the Symbian Foundation. In this way, it has calmed down the nerves of many disappointed Symbian fans.
Also, the Bada operating system is an open source operating system that shares the same advantages of the Linux OS in terms of adaptability and reliance on contributor inputs. A suspected Samsung Bada phone's images have been leaked leading to further concerns that the company will now concentrate solely on the Android and Bada. While speculations regarding the validity of this rumor are rampant, many doubted the claim as such a move is bad for any company.

Operating System and Application Upgrades

| Tuesday, November 24, 2009
Operating System is one of the chief fundamentals on which a computer functions. They are also frequently updated and everytime newer and fresher version are launched by various software companies. Prominent among the operating systems clientele is Windows and recently it has launched its latest operating system, Windows 7. It had also previously in the past released a lot of other versions of operating systems like 95, 98, ME, NT, 2000 and XP. The XP is the most popular from all of them. Upgrading to the latest Operating System gives a user the liberty to use a host of the latest applications. An upgrade will also make the computer efficient in all it's functions and will also allow the user to be adept to the most recent of software applications to enable the user to accomplish certain taks with ease and make life a lot simpler.
However, it is noteworthy that, usually, the price of the full version of a new operating system is quite high. Most people tend to stick to an upgrade since it is a lot cheaper and works with the same intensity. The upgrade versions are available anywhere with big retails stores who have collaborated with the software companies to sell them. They come in CDs and can be bought at a cheap price and upgraded on a computer.

Windows7 Evaluation An insight glimpse of Windows 7

| Monday, November 23, 2009
Windows 7 has several advantages over the previous version. It improve the “fundamentals”—performance, reliability, security and compatibility. Also improvements to get quick access to any file or information on the system.

Let's do a brief Windows 7 Evaluation.
Enhancements to the Aero User Interface (UI) helps you organize your open windows and other desktop components for easier and faster access
An enhanced start menu and taskbar puts commonly-used resources within easy reach
Performance improvements made in Windows Vista SP1 continue with Windows 7, including faster boot times and resume from standby
Battery life is extended through improved power management architecture and settings
Search Federation in Windows 7 provides results from multiple computers, servers, and Web sites, and delivers these results ranked by relevance

Besides, Windows 7 helps you manage and secure your computer infrastructure in a better way.
Windows 7 Evaluation reveals that extended data encryption will lead to better security of removable media files. Very often we come to listen News reports with stories about companies losing control over sensitive information. In some industries, this is an issue with grave legal implications, while in other circumstances the issue is inconvenience. Regardless, smart compliance policy dictates that sensitive information be safeguarded in the event of a lost or stolen laptop. Preventing sensitive information from being deleted from corporate resources is a pillar of effective compliance management. Windows 7 includes BitLocker technology, which provides full encryption of all boot volumes on a computer, along with introducing BItlocker To Go that offers data protection on portable storage, such as USB flash drives. Moreover, BitLocker Drive Encryption and BitLocker To Go can be managed via Group Policy, placing more control over sensitive information in the hands of the professionals.

Windows 7 Evaluation shows its powerful scripting keep an automatic track of the file management. That heps IT administrators to maintain a consistent environment and enhance personal productivity. Windows 7 includes an updated graphical scripting editor. Windows PowerShell™ 2.0—a powerful, complete scripting language that supports branching, looping, functions, debugging, exception handling, and internationalization. PowerShell 2.0 has an intuitive, graphical user interface that helps make script generation easier, especially for administrators who are not comfortable in command-line environments. It supports two types of remoting—fan-out, which delivers management scripts on a one-to-many basis, and one-to-one interactive remoting to support troubleshooting of a specific machine. You can also use the PowerShell Restricted Shell to limit commands and command parameters to system administrators, and to restrict scripts to those who have been granted rights. PowerShell 2.0, with the Group Policy Management Console (available as a separate download), allows IT professionals to use scripting to manage Group Policy Objects and to create or edit registry-based group policy settings in Windows 7. Similarly, you can use PowerShell to configure computers more efficiently, using richer logon, logoff, startup, and shutdown scripts that are executed through Group Policy.Windows 7 Evaluation shows it is easy to create, deploy, and manage images.
The Deployment Image Servicing and Management (DISM) tool in Windows 7 make a central place to build and service Windows images offline. With DISM, you can do many functions with one tool: mount and unmount system images; add, remove, and enumerate packages and drivers; enable or disable Windows features; configure international settings, and maintain an inventory of offline images that contain drivers, packages features, and software updates. Windows 7 also enables the same processes and tools to be used when managing virtual machine (VHD) and native file-based (WIM) image files.
Windows 7 Evaluation shows that Windows7 with its Mulitcast Multiple Stream Transfer permit fastest transfer rate within a given bandwidth. It can manages data to multiple clients at a time or to a group clients. Also it provide better support for client virtualization. Windows 7 delivers a richer experience when users are connected to a virtual desktop—much closer to the experience provides by a native Windows desktop. For example, Windows 7 provides multi-monitor support, bi-directional audio to enable Voice over Internet Protocol (VoIP) and speech recognition applications, and access to local devices, such as printers.

Windows 7 Evaluation shows enhanced troubleshooting tools of Windows 7 can resolve technical issues, by the end users themselves. These troubleshooting tools help to get speed resolution. The Problem Steps Recorder permits end users to reproduce and record their experience with an application failure. A screen shot is generated for each step which accompanies logs and software configuration data. A compressed file is then created that can be forwarded to support staff to help troubleshoot the problem. Windows 7 includes a suite of troubleshooting packs, collections of PowerShell scripts, and related information that can be performed remotely by IT professionals through the command line, with control through Group Policy Setting

Windows 7 Taskbar

| Friday, November 20, 2009
Let's start from the basic, the area at the bottom of the Windows screen and to the right of the Start button is known as taskbar, where you see icons of running programs.You can use the taskbar to switch between programs by clicking the icon for the application you want to use.

What's new in Windows 7 Taskbar?


Improved Taskbar: This feature and full-screen previews have made going back and forth of pages, extremely easier. Now, it is lot easier to work on multiple windows at the same time. Windows 7 enables user to pin any of their favorite program to the taskbar. When user hovers over the icon in the taskbar, he will be able to see thumbnails of windows open under that application and when the user hovers over that thumbnail, he will be able to see full-screen preview of that window. The users also have the option to click and drag any icon on to the taskbar.
When it comes to size, Windows 7 taskbar is different. It is bigger in comparison to that of Windows Vista or Windows XP. By default, Windows 7 easily pins any program to the taskbar for quick access (just drag and drop).

If you remember, when you opened a program in Windows Vista, a window was shown in the taskbar as a small rectangular bar, but in Windows 7 you will find just the big icon. All text is gone. Furthermore, you can pin the programs that you regularly use, so that they hang there at the bottom even when they are not in use.
Moreover, there is no quick launch any more. In Windows 7, you can pin any of the programs to the taskbar. You also have the freedom to rearrange the icons on the taskbar just by clicking and dragging. User experience has been further made interesting by adding some extra features. When you move over your cursor on the icons, you will see thumbnails of every file that is open in that program, and if you move the cursor over the thumbnail, you will be able to see a full-screen preview of that window.

A new shortcut to go to desktop has been introduced on right side of the desktop, next to date and time. It is always there and is easy to locate.
There is no need to open the Action Center through control panel any more. A new flag icon located on the left of the battery icon opens the Action Center in the Windows 7 taskbar. The Action Center provides you with notifications, updates, etc.
Besides being simplified, the taskbar of Windows 7 saves time and screen space. It organizes running applications in a systematic way and helps enable faster switching of windows. In a nutshell, the taskbar of Windows 7 has been greatly improved in every aspect and gives users a better experience. If you are still not impressed by the new taskbar, you have the freedom to switch back to the previous one.

Acoustica MP3 CD Burner

| Wednesday, November 4, 2009
Acoustica MP3 CD Burner is a music burning software. It has the feature of burning music in the way we want. It is capable of trimming the incomplete songs, removing extra applauses from the songs. It supports mixing of music, it means it can mix songs for the enjoyment of users. It has the ability of searching the songs, means it can easily browse for the user's songs. It supports smart burning of songs. It is capable of burning MP3 files to CD-R, so that users can play these songs anywhere they want. It can burn many audio file types, along with MP3, OGG,WMA and WAV. With its help users can create custom compilation of music mix CDs. Its features include an easy MP3 search interface, CD ripping, retagging, music library management and so on. This is the software that can easily be used by anyone and it is capable of doing much more tasks than burning disks.

Acoustica MP3 CD Burner is not a disk burning software but it is capable of doing many types of work in order to facilitate users. Its new version, that is compatible with Windows 7, has many exciting features available also. So, if users want to avail all these services they can use this software for their comfort and enjoyment on Windows 7.

Power2Go is a disk burning software with drag and drop facility. It supports for burning any kind of data on any kind of disc. It has newer and more user friendly interface. It can drag and burn contents in a single step. It can extract audio tracks from video files. Its one of the feature is , it can convert audio files in CD's for music players.

Power2Go has some requirements to work efficiently. These are:
1024 x 768 pixels, 128 MB SDRAM for data and music burning / 256 MB DDR RAM for video burning (512 MB recommended), CD/VCD (MPEG-1) production: Intel Pentium II 450, DVD (MPEG-2) production: Intel Pentium III 800 MHz, or AMD Athlon 700 MHz,Intel Pentium 4 2.0 GHz, AMD Athlon 2100+ or above recommended),1 GB for making VCDs / 5-10 GB for making DVDs / 15 GB for making HD DVDs / 25-30 GB for making Blu-ray discs.
Power2Go is not a disk burning software but it is capable of doing many types of work in order to facilitate users. Its new version, that is compatible with Windows 7, has many exciting features available also. So, if users want to avail all these services they can use this software for their comfort and enjoyment on Windows 7.

Power2Go has many security features also like-- it can add a password and also encrypt the data. It is capable of creating exact copies of discs. It can also erase disc and disc image applications. It has a simple burning process, it find files in less time with the help of tags and titles. It has full control over the burning process, auto-run. It can easily manage the number of files users want to burn.

There are many technical service providers like iyogi which provide remote support to users.

Understanding Windows 7 Desktop

| Thursday, October 22, 2009
Windows 7 displays its tools, commands, and structure through a graphical user interface (GUI). Graphical user interfaces has the following types of components:

Icon A graphical representation of a program, folder, file, or other object or function. It depends on your Windows 7 settings and the programs installed on your computer, you might have one or more icons on your desktop. Windows 7 assigns an icon to every item you see on your computer to make it easier to identify files, storage locations, and programs.

Desktop Its a area on which you can manipulate icons representing programs, folders, and files.

Pointing device A device such as a mouse that controls a pointer with which you can select objects displayed on the screen.

Menu A list from which you can give an instruction by clicking a command.

Window A frame, usually resizable, within which the computer runs a program or displays a folder or file.

Dialog box A fixed-size window in which you refine instructions by typing information or selecting from the available options.

Taskbar- A place to see all the running programs.

The desktop background you see when you log on to Windows for the first time might be one of the photographic backgrounds that comes with Windows 7. Default Windows 7 desktop background depicts a fish underwater, with the sun’s rays shining down through the surface of the water above. In either case, you can change the
background to one of the many beautiful photographs. You can have the background switch to a different image as often as every 10 seconds.

Windows 7, a Bold New Step Forward For Microsoft?

| Monday, October 12, 2009
Windows 7 is a bold step forward for Microsoft, or a gradual improvement in previous operating systems?

Windows 7 might even be a step backward? Microsoft already has two precedents for this: Windows ME and Windows Vista.

Although Windows 7 has had a bit of a facelift, it did not intend to shake with new features.

According to the design team, a goal for Windows 7 is fully compatible with Vista compatible software. It is also designed to work with Vista drivers.

Even during the beta testing of products, it is usually possible to use Vista drivers for the hardware before 7 specific Windows drivers to be released by the hardware manufacturer.

Some have described Vista as a beta version of Windows 7, and somehow this seems an accurate description. Many features of Windows Vista to carry 7, and some features of Vista before they were deleted, for example, the classic Start menu.

The most visible change is the taskbar. Since widows 95, has looked more or less the same, although there have been some changes and improvements from one version to the next.

Windows 7 has a completely new look to the taskbar, and some important developments. If this is change for change's sake, or actually a better system remains to be seen.

Finally, Windows 7 will probably end up being a more refined version of Vista. Hopefully this means an improvement in Vista, and without the many problems that create so many complaints about Vista.

For more information http://windows7.iyogi.net

Windows XP Blue Screen - How to Get Rid of This Error

| Thursday, September 24, 2009
Most likely, the blue screen is the worst mistake in all PC's. Indeed, the edition of Windows you are using has no bearing on whether it can suffer from blue screen error or not, because all the windows may experience this error. And so, this guide is intended not only for the Windows XP blue screen, but for all editions of Windows.

Here are 3 steps that can help resolve and avoid the blue screen error disturb your system. Just follow these tips and your computer is free of errors.

1. Inspect your computer's registry
all vital data on your computer are stored in the Windows registry. The hardware, software installed are listed here. But unfortunately, the registry entries may be damaged and then have your system miss important information necessary for the best performance of certain programs or tasks.
When information is lost, the blue screen error is developed and then freezes the computer. The majority of PC owners do not know how to fix some issues like this. Moreover, the availability of the registry cleaner and repair software makes everything easy and manageable for the average computer user because it is automated.

Furthermore, it is hard to find, download it and some are even offered for free. That's a big savings for you and which is free and you do not have to bring your computer to a technician as it can solve the problem yourself through the registry cleaner.

2. Spyware, adware, and virus scanning
When you have already tried the first tip and does not solve the blue screen error, then this time, try running the adware, spyware and antivirus. You can also obtain this software for free on the Internet. The analysis here can take a longer time compared with an analysis of registry cleaner, it scan your entire hard disk.

No blue screen errors are usually caused by viruses, but possible. Such scans are recommended to be done once a week for best results.

3. Deletion of a particular program and reinstalling
Finally, if the first and second steps are not effective and have not solved the bug in Windows XP blue screen, then a more drastic measures are necessary.

First, make sure that the windows restore function is active and has a set of restore points. After you do this, highlight the program running / s on the blue screen usually appears. Delete and reinstall the program through their control panel.

Take note, prior to the removal and re-installation procedure, make sure you have the original CD or downloaded files from the program. Otherwise, you cannot reinstall the program that has already been deleted.

This simple method must repair Windows XP blue screen error permanently. In short, a trip to the computer repair shop is not an option if you can test and repair equipment yourself. And this is what this article intends to do, to help identify and find solutions to some problems in its computer system.

For more information click below...
how to windows

How to Start Windows XP in safe mode

| Wednesday, September 23, 2009
Start in safe mode to bypass the typical Windows settings and startup programs, because those settings and programs may be affected by the issue that you are experiencing. Troubleshooting in safe mode might help resolve the problem. this post provide windows xp tech support to start windows in safe mode

To start the computer in safe mode, follow these steps:

1. Restart the computer. Press the F8 key repeatedly until you see the Windows Advanced Options screen.
2. Use the arrow keys to select Safe Mode with Command Prompt, and then press ENTER.
3. If you are prompted to select a version of Windows, select the correct version and then press ENTER.

Microsoft Windows Users and iYogi Predict a Surge in Tech Support for Windows 7 Upgrades

| Thursday, September 17, 2009
New York, NY (PRWEB) September 16, 2009 -- iYogi, the on-demand tech services company with a unique global delivery model, announced today the results of a consumer poll regarding support concerns and predictions for the upcoming launch of the new Microsoft Windows 7 operating system. Based on responses from more than 1,000 Windows XP and Windows Vista users, 52 percent think that moving to a new operating system and moving their data is a hassle, suggesting some real frustrations on the near horizon. Nearly half (47 percent) think upgrading to Microsoft Windows 7 may require a call to technical support - potentially causing a huge backlog of support needs, as up to 40 million copies of Windows 7 are expected to be sold in 2009, according to IDC.

"We predict that more than 40 percent of XP users will generate support calls and inquiries globally this year and even more in 2010 as mass adoption kicks in and people face the prospect of dealing with an entirely new interface," said Vishal Dhar, President Marketing & Co-founder of iYogi. "We estimate twice as many support calls for current Windows XP users than Windows Vista users, since Microsoft Windows XP users will require a 'clean' install including migrating applications, settings and drivers--a potentially arduous, time-intensive task."

We predict that more than 40 percent of XP users will generate support calls and inquiries globally this year and even more in 2010 as mass adoption kicks in and people face the prospect of dealing with an entirely new interface

Additional survey findings reveal:
* 58 percent of users think they will or may upgrade to Windows 7, an encouraging number considering some of the backlash surrounding Vista


* Only 39 percent of users are aware that Windows 7 is launching soon, suggesting an increased flurry of help questions in the coming months as more people become aware of the upgrade options


iYogi has more has more than 90,000 annual subscribers and provides thousands of single incident sessions every day on a 24/7 basis. Its Global Delivery Platform delivers on the highest customer satisfaction benchmarks in the industry and gets smarter with every customer interaction, building a powerful knowledge base that provides unique customer insights on predictive needs to tech support.

ABOUT IYOGI
iYogi is a global on-demand services company that provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. iYogi's unique model, including proprietary technology iMantra and highly qualified technicians, is designed to eliminate computer-related stress and keep millions of digitally dependent consumers and small businesses always protected and productive. Only iYogi -- with its proven global expertise delivery model, intelligent customer insight systems, easy-to-use self-help tools and automated PC optimization and computer support services - offers users a simple yet comprehensive path to digital serenity. iYogi has perfected the remote technical support model to overcome the current limitations of in-store, on-site, or call center services to become the fastest growing provider of support in the industry. Major resellers and technology companies are increasingly turning to iYogi to improve customer satisfaction, reduce return rates, and deliver a compelling new-value added offering to customers. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.net.

How to Disable CD Recording Feature in Windows XP

| Thursday, September 10, 2009
If you want to disable CD recording feature in windows xp. This blog provides windows xp support to disable CD recording feature. To disable this feature

Do this if you must:

1. Start - Run - type gpedit.msc (not available in Windows XP Home Edition).
2. Go to User Configuration - Administrative Templates - Windows Explorer.
3. Look for "Remove CD Burning Features" and double click on it.
4. Choose ENABLED and apply.
5. You may need to reboot the computer for settings to take place.

Drivers For Windows Vista

| Tuesday, September 1, 2009
Windows Vista is Microsoft's new generation of graphical operating systems used on personal computers. It is designed to host both managed and native applications on a productive and secure platform. Compared to its predecessor Windows XP, Vista has numerous new and reworked features which make it more reliable, secure, and powerful. In this section you get windows vista support for vista driver installation.

Windows Vista does not use drivers that the user specifies during installation for the storage device. Since Windows Vista does not support a number of older hardware and software, it generally requires an update or new driver to operate smoothly and efficiently.

As far as installation is concerned, it can be done with the help of a Windows Vista installation disc. While installing this operating system, the user requires using advanced settings in the Window Vista Setup to specify the storage device driver.

The storage driver which the user specifies during installation is loaded during the overall scenario. It only supports the drivers present in its installation disc.

Storage device features for the driver that the user specifies while installing the operating system are not available in Windows Vista. It will not show them even though Vista appears to use the .inf file which matches to the storage device driver the user specifies during installation.

To resolve the problem, the user requires loading the specific driver again. Outlined below are the required steps to complete the task:

• Insert the Windows Vista Installation Disc into the CD/DVD drive.
• Reboot the computer from the installation disc.
• Insert the media which has the new storage device driver.
• Configure the Windows Vista Setup program using the advanced settings.

Note: The user needs to click Load Driver to load the particular driver from the media. This will configure the Windows Vista Setup Program to use the specific driver.

Indeed, the drivers implemented for Microsoft Windows XP and Microsoft Windows Server 2003 may lead to technical default in Microsoft Windows Vista operating system. This is why when it comes to reliability of the Windows Operating System, the Microsoft is always the brunt of much criticism.

Windows Vista does not use drivers that the user specifies during installation for the storage device. Since it does not support a number of older hardware and software, it generally requires an update or new driver to operate smoothly and efficiently.


Source:http://ezinearticles.com/?Drivers-For-Windows-Vista&id=1654636

How to Change your Bootcamp Icon

| Tuesday, August 25, 2009
You've installed Windows on your Mac (for what ever unfortunate reason), but you've grown tired of the standard hard disk icon that OS X uses for Windows. Changing icons in OS X isn't exactly hard, but because the Windows side is NTFS formatted, OS X can't write to it. This post provides windows xp support to change the icon, with no extra software.

1.Format your USB drive as FAT32. You can name it whatever you please.

2.Change the icon on your newly formatted USB drive. Copy your icon to your clipboard. Then, right click the USB drive and select "Get Info." Click the icon next to the drive's name and paste your new icon onto it. The results should show immediately.

3.Reboot into Windows. Plug in your jump drive. Windows will prompt you, asking what to do; choose "Open Folder to View Contents." The drive will be empty, but only for now. Go to your Control Panel and choose "Folder Options." Click the View Tab, then click the "Show hidden files and folders" option. Click ok.

Now the jump drive should be showing two files: ".VolumeIcon.icns" and "._
_file". Copy both to the root level of your Windows drive.

4.Reboot into Mac OS X and enjoy your icon.

How to Stop Hiding the Pointer when Typing

| Thursday, August 20, 2009
This Windows XP Control Panel tweak will keep the mouse pointer on your screen as you type.This post provide windows xp support tips to mouse setting.

Normally, whenever you type in Microsoft Word, Notepad, or most other software packages, Windows hides the mouse pointer. While this may clean up the screen by removing a possibly annoying arrow, some people would rather know where their mouse pointer is at all times. To disable this 'feature', do the following:

1. First, open Windows XP's Mouse Control Panel.

2. On the "Mouse Properties" multi-tabbed dialog box that follows, select the "Pointer Options" tab.

3. Uncheck "Hide pointer while typing"

4. Press "OK" to close the dialog box.

How to Add a Restart Icon to the Desktop

| Monday, August 17, 2009
Add an icon to the Windows XP Desktop that, when double-clicked, restarts the computer.

If you want to restart your Windows XP machine in a hurry, are you tired of clicking the Start button, selecting "Turn off Computer", and then selecting "Restart"? Or do you not wish to memorize keyboard shortcuts that may speed up the process? Instead, the following shows how to add an icon to the Desktop that you can double-click to restart your machine. This blog provide technical support steps to create short cut icon on desktop.

1. Right-click an empty area of the Desktop and choose "New" - "Shortcut".

2. The "Create Shortcut" dialog box appears. Enter the following text EXACTLY as shown underneath "Type the location of the item":

shutdown -r -t 01

3. Click the "Next" button in the dialog box.

4. The dialog box title will change to "Select a Title for the Program". Underneath "Type a name for this shortcut", enter in a desired name such as Restart or Restart Computer or Shut It Down and Bring It Up!.

5. Click the "Next" button in the dialog box.

A new icon will appear on your desktop. Double-click it to restart your machine. But you may not like how it looks, so change it to look like the icon shown at the beginning of this tip:

1. Right-click the icon and choose "Properties".

2. The Properties dialog box appears. Click the "Shortcut" tab.

3. Click the "Change Icon" button.


4. A dialog box will alert you that the file contains no icons. Click "OK".

5. A group of icons located in the %SystemRoot%\system32\SHELL32.dll file appears. Find and click a desired icon or click the "Browse" button to choose a different icon.

6. Click "OK" on the dialog boxes to close them.

To test your new icon, first close all open files (just to be safe), then double-click it.

How to remove the 'Help and Support' Link from the Start Menu

| Tuesday, August 11, 2009
If you are an advanced Windows XP user, you may want to clean up your Start Menu by deleting a help shortcut. This post provides windows xp support to remove The "Help and Support" link on the Windows XP Start menu provides online documentation to Windows and the basic applets such as Notepad, WordPad, etc. It also displays links to online help documents, including those provided by your system manufacturer.

If you are an experienced Windows XP user and do not need this option, you can remove it from the Start Menu.

1. Right-click on an empty area of the taskbar, choosing "Properties".

2. When the "Taskbar and Start Menu Properties" multi-tabbed dialog box appears, select the "Start Menu" tab.

3. Click the "Customize" button.

4. The "Customize Start Menu" multi-tabbed dialog box should appear. Select the "Advanced" tab.

5. Underneath "Start menu items", uncheck "Help and Support".

6. Click "OK" on the dialog boxes to close them.

Windows 7 activation cracked

| Thursday, July 30, 2009
Since some Chinese hackers rumored to have cracked the code for Windows 7 activation, Microsoft is facing a security risk after the recent release of the final code for Windows 7 to manufacturers. The Windows Genuine Advantage antipiracy system in the Windows 7 Ultimate release to manufacturers (RTM) has been compromised by hackers.

This means the user can fully activate the software offline without connecting to Microsoft's activation server. The software's RTM code is usually the same as the retail code, which will be available to the public in October. Hackers must have used the leaked ISO file to get hold of the activation certificate that Microsoft digitally signed for the original equipment manufacturer (OEM) version of Windows 7. An OEM activation key will unlock multiple copies and it is rumored that this particular key will work on machines from Dell, Hewlett-Packard or Lenovo.

Addressing this, Microsoft released its statement, "We are aware of reports of activation exploits that attempt to circumvent activation and validation in Windows 7, and we can assure customers that Microsoft is committed to protecting them from counterfeit and pirated software." It also advises customers not to download Windows 7 from unauthorized sources.

In News: iYogi Re-Defines Technical Support – BizTech2.com

| Wednesday, July 29, 2009

Remote managed services are gaining a lot of attraction these days. Companies are looking to outsource the maintenance and monitoring of their IT infrastructure to a third party to improve efficiency and save costs. BizTech2.com caught up with Uday Challu, founding partner and CEO, iYogi, to see what the company has to offer in this space.

As far as Enterprise and SME customers are concerned, which verticals are you focusing on?

Our focus will mostly be on small companies with around five to 100 users and also firms that have multiple small branch offices like travel agencies, retail stores etc.

What kind of support services do you provide to your customers? What is the Green PC service?

iYogi provides the next generation of remote computer support services for consumers and businesses. For consumers, our live 24/7 support extends to technologies we use everyday, including hardware, software applications, devices, peripherals and networking equipment. iYogi also offers a full range of business IT solutions including managed monitoring, managed services, set-up and installation services, and incident-based services.

Green PC Service

With the current state of the global climate and increasing dependency on the computer, iYogi helps PC users reduce their carbon footprint and save money at the same time. iYogi’s Green PC service is the first in the independent computer support industry to offer customers a way to save money, conserve energy and protect the environment by optimising their PC’s efficiency. Consumers and businesses can save up to $200 per year, per desktop, in energy costs with iYogi’s Green PC application. This green application makes the computer environmentally friendly by reducing power consumption by almost 50 percent.

Our Green PC dashboard helps customise power settings and calculate power savings in kWh (kilowatt hour). The Green PC dashboard also gives a status on the reduction of CO2 and how responsible usage will benefit the environment by saving trees. A customised service that increases the energy efficiency of computers, undertakes the below-mentioned three primary initiatives:

- Computer assessment, analysing settings and PC energy use
- Customised efficiency planning geared specifically to the individual’s usage patterns
- Implementing setting changes to maximise the computer’s energy use

What are the technologies that allow you to offer 24/7 support and ensure there is no downtime at the client site?

We have invested significantly in developing a comprehensive monitoring and management tools stack. This enables us to manage and monitor all devices in the office network as well as for branch offices and mobile users. Our tools continuously monitor the customer’s network and notify our NOC (Network Operations Centre) in case of problems. Based on the set of events, tickets are automatically generated and escalated to corresponding teams. Over and above our proactive approach, the customer always has an option to call our 24X7 support line for issues that are not identified via the monitoring tools.

Please throw some light on your proprietary iMantra technology.

iMantra is a CRM system, which is tailor-made to suit the emerging business needs at iYogi. It allows for the formation of individualised customer relationships with the aim of providing personalised services to each subscriber. This tool is built on the latest java technology with a layered architecture that makes it scalable and secure. This architecture provides a seamless workflow and independent channels for various business needs: sales, support, quality and customer service. The entire system can be exposed in the form of secure APIs and Web services, which makes it a re-usable entity.

Your business model is similar to BPOs in India providing technical support to offshore customers. What unique values do you bring to this ecosystem that would help a potential client choose you over a competitor?

iYogi’s business model is different from traditional BPOs. Some key factors that differentiate iYogi include:

- Direct-to-consumer and -small business: iYogi delivers technical support services directly to consumers and small businesses and is a global technical support brand based out of India. Unlike traditional BPOs in India, iYogi does not provide any private label support and/ or work on behalf of large OEMs or software publishers.

- Optimised Processes: iYogi has developed proprietary processes for consistently delivering on a resolution rate of 87 percent, which is among the highest published benchmarks in the support industry, where averages hover in the range of 50 percent.

- Comprehensive technology platform: iYogi’s global delivery platform, iMantra, gets smarter with every customer interaction. It documents every problem, the solution and relevant hardware and software aspects, while capturing each customer’s demographic information and creating a behavioural profile. All of this information is at the fingertips of iYogi’s Global Tech Experts. This set-up combines a knowledge base with a comprehensive set of tools and technology expertise. iYogi offers a range of tools that complement its remote support services for helping customers maintain technology at peak performance levels. iYogi’s products include iYogi Smart PC Scan, iYogi Support Dock, iYogi Green PC and iYogi PC Optimisation.

How do you plan to move up the value chain in the times to come?

The growing use and penetration of the Internet and new Web-based applications has consequently opened the door to threats and vulnerabilities, which affect the system performance and ultimately lead to degrading performance. If the threats are diagnosed early on, the impact on efficiency can be minimised considerably. Currently, a user only realizes that he needs technical support once the damage has occurred and reactive methods of support are used to recover from the loss.

At iYogi, we are developing our capabilities to not only provide support when demanded, but to also monitor, pre-empt and fix threats before they can cause any damage to the computer. This will be possible only by combining technology with processes that are capable of re-defining the way technical support is delivered today.

What is your India strategy?

Technically, we are capable of servicing any geography including India. At this stage, we are looking for the right kind of partners to find access to potential customers and provide them a consolidated, 360-degree solution and services for issues relating to hardware, software, network etc. We aim to launch our India services in the coming six to eight months. Our services will offer clients a one-stop solution for all their business needs.

Source : BizTech2.com

Audio Problems with Windows Server 2003

| Monday, July 27, 2009
This post help you to troubleshoot sound problems with windows server 2003, If you Install Windows Server 2003 and getting Audio problems with your Windows Server 2003 and finally some Accessibility software features may not work properly.

It happening in following cases

1.A sound driver may not installed. windows server 2003 includes limited list of driver
2.Sound may be disable, By default.

To fix this issue follow the steps given below

1. Use Device Manager to verify that your sound device has a driver installed. To do so, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the Hardware tab, and then click Device Manager.
3. Expand Sound, video and game controllers, and then verify that your sound device is listed.
2. If no sound device driver is installed, use Microsoft Windows Update to see if a driver is available.

Note Windows Server 2003 may disable the Microsoft Dynamic Update Service. To manually see if Microsoft Windows updates are available, visit the following Microsoft Web site: http://windowsupdate.microsoft.com/
3. After you verify that you have the correct sound driver installed, you may have to enable the Windows Audio service. To do so, follow these steps:
1. Click Start, click Run, type services.msc in the Open box, and then click OK.
2. In the Services Management Console, double-click Windows Audio service.
3. In the Startup type list, select Automatic, click Start, and then click OK.
Note By default, this step applies to all versions except Windows Server 2003, Standard Edition.

Security Checklist for windows 7

| Wednesday, July 22, 2009
Use this checklist to make sure you are taking advantage of all the ways that Windows can help keep your computer as secure and safe as possible.

Action Center

Use Action Center to make sure your firewall is on, your antivirus software is up to date, and your is computer set up to install updates automatically.

Windows Defender

Use Windows Defender to prevent malicious software, like spyware or viruses, from infecting your computer.

User Account Control

User Account Control prompts you for your permission before installing software or opening certain kinds of programs that could potentially harm your computer or make it vulnerable to security threats.

Backup and Restore

it's important to back up your files and settings regularly so that if you get a virus or have any kind of hardware failure, you can recover your files.

Windows Update

Set Windows Update to download and install the latest updates for your computer automatically.

Windows Firewall

Use Windows Firewall to help prevent hackers and unwanted software from gaining access to your computer through the Internet.

Windows XP Optimization

| Thursday, July 16, 2009
Optimize Windows XP to improve home, work and gaming performance safely. This post guide will help you improve your overall system performance without having to manually edit the Registry. I avoid using or recommending "all-in-one" Windows XP Tweak programs since many blindly adjust settings that have no affect on performance and can cause future problems. This guide is designed to be performed top to bottom, in sequence since some steps are required to be performed before others. Before using this guide make sure your system meets the Windows XP System Requirements.

Read and follow the instructions carefully. This guide is not designed to be used in combination with other Windows tweaking guides or other Windows tweaking software. Before using this guide make sure all of your data is backed up. Viruses and Spyware can cause service pack installations to fail, make sure you have run through Step 1 completely before proceeding.

Remove Malware

Clean Adware, Root kits, Spyware, Trojans, Viruses and Worms. Malware is short for malicious software. It is a general term that refers to any software or program code designed to infiltrate or damage a computer system without the owner's informed consent. This guide will show you how to remove these infections and protect yourself from future infections using software.

Windows Update

Install All of the updates. Not just the critical ones. This may have to be run multiple times. Run it over again until it says 0 updates available. Non-critical updates are essential for improved performance, compatibility and enhanced features. They are all very safe to install.

Windows Drivers

Update your drivers using the Windows Driver Guide. Installing the latest Drivers improves system performance and application compatibility. Updated drivers include numerous bug fixes as well as system optimizations. It is recommended for optimal system stability to only use Official drivers and not Beta or Prerelease versions. Performance differences between driver versions including Beta or Pre-release drivers are negligible. The only time Beta or Prerelease drivers should be considered is when a serious application bug is fixed in the Beta or Prerelease version and the component manufacturer has not yet released the Official driver version that includes the bug fix.

Visual Effects
Disable Indexing Service
Increase the Mouse Pointer Speed
Prefetcher Fix

How to Delete files using Disk Cleanup

| Friday, July 10, 2009
If you want to reduce the number of unnecessary files on your hard disk to free up disk space and help your computer run faster, use Disk Cleanup. It removes temporary files, empties the Recycle Bin, and removes a variety of system files and other items that you no longer need.

1. Open Disk Cleanup by clicking the Start button Picture of the Start button, clicking All Programs, clicking Accessories, clicking System Tools, and then clicking Disk Cleanup.
2. In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
3. If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.
4. Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.
5. When you finish selecting the files you want to delete, click OK, and then click Delete files to confirm the operation. Disk Cleanup proceeds to remove all unnecessary files from your computer.

The More Options tab is available when you choose to clean files from all users on the computer. This tab includes two additional ways to free even more disk space:

•Programs and Features. Opens Programs and Features in Control Panel, where you can uninstall programs that you no longer use. The Size column in Programs and Features shows how much disk space each program uses.
•System Restore and Shadow Copies. Prompts you to delete all but the most recent restore point on the disk.

System Restore uses restore points to return your system files to an earlier point in time. If your computer is running normally, you can save disk space by deleting the earlier restore points.

In some editions of Windows Vista, restore points can include previous versions of files, known as shadow copies, and backup images created with Windows Complete PC Backup. This information will also be deleted. For more information about System Restore, search Windows Help and Support for "system restore."

PC Help - Personalized Support

| Tuesday, July 7, 2009
Late last night when we sitting out on the veranda, my little two year old remarked looking heavenward on how beautiful the clouds were looking and both my husband and I followed his gaze and realized that it was indeed a beautiful sight. My husband smiled and said that sometimes it pays to look at things through his eyes because he is only just beginning to enjoy the newness and joy in nature's bounty.

The point that I am seeking to drive home with this analogy is that the Personal computer is really a wonderful invention that gives us the whole world while we are seated right in our own homes. All of us who have been using the personal computer for a long while now quite forget all those new computer virgins who take tentative steps towards this technology beast that everybody feels that they just have to master.

A personal computer is on everybody's checklist and or definitely on their wish list. Be it parents' buying for their children or much older citizens realizing that the PC can be the best way to stay in touch with their kids and watch their grandchildren grow up.

Most new users who have not 'learnt' computers or studied it in school have a very tentative approach to the computer. They really could do with computer help on a regular basis. As an octogenarian aunt who is reinventing herself via the Personal Computer mentioned to me that it would be wonderful to have computer services that were tailor made for her needs. When I asked her what she meant by that she said that what she needed was help with her PC so that she did not need worry about computer virus and other such nasty things. Computer Help that worked on auto pilot, so to speak rather than having to get in touch with a computer help specialist all the time. She just wanted a computer service professional to check her system regularly and maybe teach her a new trick or two every now and then! Proactive tech support is what she wanted and given today's agile computer support companies, I am sure they have something suitable for my Aunt Sarah.

I cannot stress enough the importance of having a good trained, qualified and certified computer help company on board. When the world of computers is just opening up for a new users there can be numerous road blocks that can seriously inhibit new users; computer virus, spyware, e-mail issues to name just a few of the common but omnipresent issues. Having trained computer service persons around to help can ensure that your learning continues unabated and unhindered. As most tech support professionals work with multiple customers them on possible issues and road blocks. This will help new users identify and troubleshoot small problems on their own.

All computers regardless of brand come with help tutorials inbuilt into the system. I will admit that there are designed with care and are very easy to follow. However, for lay users who often have issues even launching their computers, this manner of computer help can be a little hard to follow. Sometimes even finding the tutorial on the computer can be a little difficult for some users!

In my opinion, if you are a lay user and have just begin to explore this wonderful world of computers, get some good tech support on board. A qualified computer repair technician will greatly enhance your learning curve and will also ensure that there no roadblocks in your wonderful journey down technology road.


Source: http://EzineArticles.com/?PC-Help---Personalized-Support&id=2417611

Remote Desktop Connection Manager

| Tuesday, June 30, 2009
This post provide computer support for how to work Remote Desktop connection Manager,
In Windows 2008 R2, we added a new MMC snap-in called Remote Desktop Connection Manager (SBMGR.msc on the Connection Broker machine). This Remote Desktop Connection Manager UI tool is available on a Remote Desktop Connection Broker server. It allows the administrator to easily configure and organize RemoteApp and Desktop Connections (RADC) resources. The end users can then access these resources with familiar methods such as Web Access and RADC. These resources include RemoteApp programs and virtual desktops. Virtual desktops include virtual machines in virtual desktop pools and personal virtual desktops.

Here’s a screenshot of Remote Desktop Connection Manager:The tree view is located in the left pane. The tree view lists all the resources grouped by type (RemoteApp programs and virtual desktops).

The results pane is located in the center. The results pane shows additional information/links, based on the currently selected items in the tree view.

The action pane is located on the right. The action pane lists the actions that are available to users, based on the currently selected items in the tree view or the results pane.

When the RD Virtualization Host Servers node is selected in tree view, the results pane lists all the RD Virtualization Host Servers added to the Connection Broker as below:

When a Pool node is selected in tree view, the results pane lists all the virtual desktops added to the pool as below:
With this useful, easy-to-use UI tool, an administrator can:

  • Configure settings for virtual desktops, such as redirection settings, Remote Desktop Gateway settings, common/custom RDP settings, etc.)
  • Create a virtual desktop pool
  • Assign a personal virtual desktop to a user
  • Easily diagnose configuration issues - The snap-in provides a report of your latest deployment status. It will flag misconfigurations with a red cross or warning sign, and also provide appropriate links to the documents/properties pages/wizards to correct the misconfigurations
  • Make RemoteApp programs from a RemoteApp source available to users
  • Create a client configuration file for RemoteApp and Desktop Connections to distribute to users
The following documents provide details on how to deploy RemoteApp programs and virtual desktops. You'll also find lots of examples on how to use the Remote Desktop Connection Manager UI tool:

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide
Deploying Virtual Desktop Pools by Using RemoteApp and Desktop Connection Step-by-Step Guide

Fix Authentication Tab is Missing in the Properties Dialog Box

| Thursday, June 18, 2009
This Post provide technical tips to fix Authentication tab is missing in the properties dialog box of the wired network adapter after you install Windows XP Service Pack 3After you install Windows XP Service Pack 3 (SP3), the Authentication tab is missing in the properties dialog box of the computer's wired network adapter. For example, when you open the Local Area Connection Properties dialog box of a wired network adapter, you see only the General tab.

In Windows XP Service Pack 2 (SP2), both the wired and wireless connections are handled by the Wireless Zero Configuration service (WZCSVC), and this service is always running. As part of Network Access Protection (NAP) integration in Windows XP SP3, this WZCSVC functionality is divided into two separate services:

  • The WZCSVC
  • The Wired AutoConfig service (DOT3SVC)

The WZCSVC in Windows XP SP3 manages only the wireless connections. The DOT3SVC manages the wired connections, and it displays the Authentication tab in the properties dialog box of the wired network adapter. However, in Windows XP SP3, the startup type of the DOT3SVC is configured as manual. Therefore, the Authentication tab is missing until you manually start the DOT3SVC.

To resolve this issue, manually start the Wired AutoConfig service (DOT3SVC). To do this, follow these steps:

1. Click Start, and then click Run.
2. Type services.msc in the Open box, and then press ENTER.
3. Locate the Wired AutoConfig service, right-click it, and then click Start.

Primary IPsec Troubleshooting in Windows 2000

| Friday, June 12, 2009
To troubleshoot IPsec, first enable Audit policy, and then verify the results of phase one and phase two exchanges. When you enable Audit policy, security events are logged in the Security log. By examining the Security log, you can determine whether IKE security association negotiation is successful. To enable Audit policy,
Follow these steps:
1. In Group Policy, expand Local Computer Policy.
2. Locate and then click Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy.
3. In the details pane, right-click Audit logon events, and then click Security.
4. Click to select Success, click to select Failure, and then click OK.
5. In the details pane, right-click Audit object access, and then click Security.
6. Click to select Success, click to select Failure, and then click OK.

Note If you are using a domain policy for auditing, the domain policy overwrites your local policy.

Next, type the following command to use the Netdiag.exe command-line tool:
netdiag /test:ipsec /debug
This command displays debugging information about phase two.

Note To use Netdiag.exe, the Windows 2000 Support Tools package must be installed on your computer. To install the Windows 2000 Support Tools, follow these steps:

1. Start Windows 2000.

Note You must log on as a member of the administrator group to install these tools.
2. Insert the Windows 2000 CD into your CD drive.
3. Click Browse this CD, and then open the Support\Tools folder.
4. Double-click Setup.exe, and then follow the instructions that appear on the screen.

You can also use Netdiag.exe to view the policy without an active connection. To do this, type the following command at a command prompt, and then press ENTER:
netdiag /test:ipsec /v
This command displays the current policy and IPsec statistics with regard to phase one.

If the logged events indicate that phase one Main Mode exchange fails, verify the IKE settings and the IKE authentication methods in your IPsec policy properties. To do this,

Follow these steps:
1. Click Start, click Run, type secpol.msc, and then click OK.
2. Click the IPsec rule that you want to click, right-click IPsec rules and then click Properties.
3. Click the General tab, and then verify that the settings are correct.
4. Click Advanced, examine the settings, click Methods, and then examine the settings.
5. Click OK two times.
6. Click Rules tab, click Edit, and then click the Authentication Methods tab.
7. Examine the settings on this tab.

If the logged events indicate that phase two Quick Mode fails, verify the IPsec security methods in the IPsec rules and in your IPsec policy properties. To do this, follow these steps:

1. Click the IPsec rule that you want to verify, click Edit, and then click the Filter Action tab.
2. Click the filter action that is enabled, click Edit, and examine the settings.

Google Chrome: First security flaws corrected

| Tuesday, June 9, 2009
Google has made an automatic update of its browser, Chrome, correcting some critical security vulnerabilities. The editor provides details and creates a blog to inform users of changes to the software.A week after the launch of Chrome, Google has given few details on two critical security holes sealed three days ago.The first hole (called SaveAs) was in the handling of files with very long names, can we read in the security bulletin released by Google. The second was that of Web site addresses displayed in the shaded box that appears at the bottom left of the browser window when the user positions the mouse pointer over a link.The vulnerabilities could be exploited to launch attacks, leading to the blocking of machines victims overflow the buffer. In this type of attack, once paralyzed machines, hackers take control.Google is opening a dedicated blogAlongside these two critical flaws, Google has plugged other, less serious. One plant was equipped with a computer when the Chrome user typing "about:%" in the address bar. A web page containing this text into a hyperlink and can block the browser from the simple overview of the pointer over the link.After having remained silent at first on these faults, the editor of search engine finally opts for the opening. To promote its browser, it creates a blog dedicated Google Releases Chrome, which is a preferred source of information for users, as its author says Mark Larson, Chrome program manager.It will present all kinds of announcements and technical details on the automatic updates of the software. Google shows meet the demand of the public who wishes to know the exact nature of the changes gradually introduced for the purpose of improvement.

Fix Low Disk Space Notification in Windows XP

|
When a Windows XP-based computer is running low on disk space, you receive a "Low Disk Space" message that, when clicked, starts the Disk Cleanup Wizard. This post describes the conditions in which you receive the "Low Disk Space" message. This post provide Technical support to fix Low Disk Space Notification.

When free disk space reaches 200 megabytes (MB), you receive the following message for 10 seconds, once per session:

You are running out of disk space on [drive]. To free space on this drive by deleting old or unnecessary files, click here.


When free disk space reaches 80 MB, you receive the following message for 30 seconds, every four hours, twice per session:

You are running very low on disk space on [drive]. To free space on this drive by deleting old or unnecessary files, click here.

When free disk reaches 50 MB, you receive the following message for 30 seconds, every five minutes, until free space is above 50 MB:

You are running very low on disk space on [drive]. To free space on this drive by deleting old or unnecessary files, click here.

Resolution
Note There is a registry value you can set to disable this feature. To disable low disk space checks, follow these steps, log off, and then log on again:

Follow these steps, and then quit Registry Editor:
1. Click Start, click Run, type regedit, and then click OK.
2. Locate and then click the following key in the registry:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
3. On the Edit menu, point to New, and then click DWORD Value.
4. Type NoLowDiskSpaceChecks, and then press ENTER.
5. On the Edit menu, click Modify.
6. Type 1, and then click OK.

Living with the limits of Windows 7 Starter Edition

| Monday, June 1, 2009
Microsoft has decided to release a cheap edition of the windows 7 for netbook users , the name of that edition is " Windows 7 starter edition " .As it is a cheap edition of windows 7 , so it of limited use .
Starter Edition's only runs three applications at once. Microsoft confirms that it is lifting the three-app limit "based on the feedback we’ve received from partners and customers asking us to enable a richer small notebook PC experience."

Restrictions of the Windows 7 Starter edition .
> No personalization options (changing background images/wallpapers or sounds)
> No Aero
> No DVD playback
> No Media Center features at all
> No domain support
> No XP virtualization mode
> No multi-monitor support

To understand this three applications restriction more clearly consider a senireo .Imagine you were running Starter Edition; you have your messenger running, you’re browsing on the net, and you’re listening to music. You have Skype running as a background process but when someone attempts to call you, you’re unable to receive the call because then you’d be running four simultaneous applications.

According to the microsoft official “ We believe these changes will make Windows 7 Starter an even more attractive option for customers who want a small notebook PC for very basic tasks, like browsing the web, checking email and personal productivity.”


But according to a research , this limit does not mean that we can only open three windows at a time , one of the senior researcher , he opened 16 seprated windows at a time , having paint , internet explorer ( with many tabs ) , goolge chrome .( http://blogs.zdnet.com/Bott/?p=844 )
So to know the , truth we need to wait till the release of the windows 7 starter edition .and after that we can able to de

How to use Safe Mode Boot Option in Windows 2000

| Thursday, May 28, 2009
Windows supports several Safe Boot options that load a minimal set of drivers. You can use these options to start Windows so that you can modify the registry or load or remove drivers.


Follow these steps to use a Safe Boot option

1. Restart your computer, and when the Boot menu appears, press F8.
2. When the Windows Advanced Options menu appears, select an option, and then press ENTER.
3. When the Boot menu appears again, with the words "Safe Mode" displayed in red at the bottom, select the installation you want to start, and then press ENTER.

WARNING: Do not select a Microsoft Windows NT 4.0 installation.

Description of Safe Boot Options

Safe Mode (Safeboot_Option=Minimal): A minimal set of device drivers and services to start Windows.
Safe Mode with Networking (Safeboot_Option=Network): A minimal set of device drivers and services to start Windows plus the drivers necessary to load networking.
Safe Mode with Command Prompt (Safeboot_Option=Minimal): This is the same as Safe mode, with the exception that Cmd.exe is started rather than Windows Explorer.
Enable VGA Mode: This starts Windows in 640 X 480 mode using the current video driver (not Vga.sys). This mode is useful for cases in which the display was configured at a setting the monitor cannot display.

NOTE: Safe mode and Safe mode with Networking load the Vga.sys driver instead.
Last Known Good Configuration: This starts Windows using a previous good configuration.
Directory Service Restore Mode: This mode is valid only for Windows domain controllers. It performs a directory service repair.
Debug Mode: This option enables debug mode in Windows. Debugging information can be sent across a serial cable to another computer running a debugger. This mode is configured to use COM2.
Enable Boot Logging: When the computer is started with any of the Safe Boot options except Last Known Good Configuration, logging is enabled. The Boot Logging text is recorded in the Ntbtlog.txt file in the %systemroot% folder.

An environment variable is set when you use one of the Safe Boot options. The environment variable is "Safeboot_Option." This variable is set to either Network or Minimal.

How Configure System Failure and Recovery Option

| Monday, May 25, 2009
In this section I am going to discuss How to configure System failure and recovery option in Windows XP. You can configure the actions that Windows takes when a system error (also referred to as a bug check, system crash, fatal system error, or stop error) occurs. You can configure the following actions:

  • Write an event to the System log.
  • Alert administrators (if you have set up administrative alerts).
  • Put system memory in a file that advanced users can use for debugging.
  • Automatically restart the computer.
You must be logged on as an administrator or a member of the Administrators group to complete this procedure. If your computer is connected to a network, network policy settings may prevent you from completing this procedure

Configuring System Failure and Recovery Options
You can use the System control panel to configure system failure and recovery options. IT Professionals can also modify system failure and recovery settings on local or remote computers by modifying the values in the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl

If this information help you to troubleshoot your computer. If you are facing any problems simply visit at Technical Support Services.

Microsoft Security Bulletin Summary for May 2009

| Wednesday, May 20, 2009
With the release of the bulletins for May 2009, this bulletin summary replaces the bulletin advance notification originally issued May 7, 2009. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.

For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications.

Microsoft is hosting a webcast to address customer questions on these bulletins on May 13, 2009, at 11:00 AM Pacific Time (US & Canada). Register now for the May Security Bulletin Webcast. After this date, this webcast is available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.

Microsoft also provides information to Microsoft help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates.

How to Detect and repair disk errors in Windows XP

| Friday, May 15, 2009
In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced. This post provide steps by step tips for computer optimization.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

To run the Error Checking utility:
1.Close all open files.
2.Click Start, and then click My Computer.
3.In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
4.In the Properties dialog box, click the Tools tab.
5.Click the Check Now button.
6.In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.














7.If bad sectors are found, choose to fix them.

Tip: Only select the "Automatically fix file system errors" check box if you think that your disk contains bad sectors.

IYogi Press Release: iYogi Acquires Clean Machine Inc.

| Wednesday, May 13, 2009

New York, NY, May 11th, 2009 : iYogi, a global direct to consumer and small business remote technical support provider, today announced it’s acquisition of Clean Machine Inc, a provider of remotely administered PC security and performance management services. Clean Machine will operate as a separate brand under the iYogi services umbrella along with the recently lunched Support Dock (www.supportdock.com) and its comprehensive range of 24/7 technical support services for computers, printers, MP3 players, digital camera, routers, servers and more than 100 software applications. Larry Gordon, Founder of Clean Machine is appointed as the President of Global Channel Sales for iYogi.

iYogi will integrate technology and innovation that Clean Machine Inc. has developed for delivering an enhanced service experience by proactively managing the health and security for PC's and Apple Computers. This acquisition also broadens iYogi's access to key markets through Clean Machine's existing partnerships. Larry Gordon's past experience and successful track record will accelerate iYogi's expansion through his focus on global alliances.

Commenting on the acquisition of Clean Machine Inc., Uday Challu, CEO & Co-founder of iYogi, said,

"This acquisition will help iYogi to enhance our customer experience and extend our market reach to the millions of consumers that are challenged by the increasingly complex technology environment. Clean Machine's proactive maintenance and management of PCs in home and small business environment will be our launch platform for building the next generation of managed services for consumers."
"We are delighted to have Larry spearheading partnerships and global alliances for iYogi. His incredible experience in marketing, sales and building global alliances will help forge partnerships with retailers, multiple service operators, software publishers, original equipment manufacturers (OEM) and other such companies that are at the frontlines for managing tech support issues for consumers and small businesses",

added Challu.

With more than 20 years of experience, Larry Gordon has played a variety of strategic roles in marketing, sales and building alliances. Larry was the Executive Vice President at Capgemini and Kanbay. He was also VP of Global Marketing for Cognizant (Nasdaq: CTSH), a leader in global IT services and Director of Marketing for New York based Information Builders.

"I am excited to join a company that shares a common mission to Clean Machine in creating a global brand for delivering the best technical support to consumers and small businesses. We also share a common approach of utilizing highly skilled talent with leading edge tools, thereby delivering services at incredible price-points, with high margins for our partners",
said Larry Gordon, the newly appointed President of Global Channel Sales at iYogi.

ABOUT IYOGI

Headquartered in Gurgaon, India with offices in New York, USA, iYogi provides personalized computer support for consumers and small businesses in United States, United Kingdom, Canada and Australia. IYogi's 24/7 phone and remote technical assistance, spans across a comprehensive range of technologies we use every day from a wide range of vendors. Utilizing its proprietary technology iMantra , and highly qualified technicians, iYogi delivers amongst the highest benchmarks for resolution and customer satisfaction. iYogi is privately held and funded by SAP Ventures, Canaan Partners, and SVB India Capital Partners. iYogi was recently awarded the Red Herring Global 100 Award, recognizing it as one of the 100 most innovative private companies driving the future of technology. For more information on iYogi and a detailed list of technologies supported, visit: www.iyogi.ca.

ABOUT CLEAN MACHINE

Clean Machine Inc. is a NJ-based and incorporated company that helps consumers and small business owners easily manage and protect their computing environments safely and cost effectively. The company is has a unique, powerful and inexpensive PC concierge service. Specifically, each customer is assigned a highly-trained tech concierge who remotely examines their computer system on a scheduled and very secure basis. The PC concierge will immediately fix software-based problems and prevent new threats to the customer's computing environment including offensive pop-ups, browser redirects and slow performance, and then provides a detailed report. Clean Machine's proprietary Radar(TM) technology (Remote Access Detection Audit and Repair) allows its expert technicians to remotely resolve any problems, eliminating the need for customers to go through the frustrating process of speaking with a tech support expert, and still having to do the work themselves. In other words, the Clean Machine PC concierges do it all. For more information on Clean Machine please visit www.pccleanmachine.com.

CONTACT:

iYogi Contact
Vishal Dhar
President Marketing
iYogi Inc.
Phone: 212 229 0901
Email: vishal@iyogi.net


The Press Release is available at its source: iYogi acquires Clean Machine Inc.