Wednesday, February 27, 2013

Test your latency ...too see how fast or slow it is....here's how

Internet speeds....find out where your websites are coming from and how many "hops" it takes to get to your router/modem....

here's how

How to Use Traceroute

Traceroute is run from a command prompt or terminal window. On Windows, press the Windows key, type Command Prompt, and press Enter to launch one.
To run a traceroute, run the tracert command followed by the address of a website. For example, if you wanted to run a traceroute on Tekkie's Tips , you’d run the command:
tracert tekkiestips.blogspot.com
(On Mac or Linux, run traceroute tekkiestips.blogspot.com instead.)
You’ll gradually see the route take form as your computer receives responses from the routers along the way.

try it and see how fast it comes through across the net waves!

Wednesday, February 13, 2013

File Extentions- watch out for them

Programs

.EXE – An executable program file. Most of the applications running on Windows are .exe files.
.PIF – A program information file for MS-DOS programs. While .PIF files aren’t supposed to contain executable code, Windows will treat .PIFs the same as .EXE files if they contain executable code.
.APPLICATION – An application installer deployed with Microsoft’s ClickOnce technology.
.GADGET – A gadget file for the Windows desktop gadget technology introduced in Windows Vista.
.MSI – A Microsoft installer file. These install other applications on your computer, although applications can also be installed by .exe files.
.MSP – A Windows installer patch file. Used to patch applications deployed with .MSI files.
.COM – The original type of program used by MS-DOS.
.SCR – A Windows screen saver. Windows screen savers can contain executable code.
.HTA – An HTML application. Unlike HTML applications run in browsers, .HTA files are run as trusted applications without sandboxing.
.CPL – A Control Panel file. All of the utilities found in the Windows Control Panel are .CPL files.
.MSC – A Microsoft Management Console file. Applications such as the group policy editor and disk management tool are .MSC files.
.JAR – .JAR files contain executable Java code. If you have the Java runtime installed, .JAR files will be run as programs.

Scripts

.BAT – A batch file. Contains a list of commands that will be run on your computer if you open it. Originally used by MS-DOS.
.CMD – A batch file. Similar to .BAT, but this file extension was introduced in Windows NT.
.VB, .VBS – A VBScript file. Will execute its included VBScript code if you run it.
.VBE – An encrypted VBScript file. Similar to a VBScript file, but it’s not easy to tell what the file will actually do if you run it.
.JS – A JavaScript file. .JS files are normally used by webpages and are safe if run in Web browsers. However, Windows will run .JS files outside the browser with no sandboxing.
.JSE – An encrypted JavaScript file.
.WS, .WSF – A Windows Script file.
.WSC, .WSH – Windows Script Component and Windows Script Host control files. Used along with with Windows Script files.
.PS1, .PS1XML, .PS2, .PS2XML, .PSC1, .PSC2 – A Windows PowerShell script. Runs PowerShell commands in the order specified in the file.
.MSH, .MSH1, .MSH2, .MSHXML, .MSH1XML, .MSH2XML – A Monad script file. Monad was later renamed PowerShell.

Shortcuts

.SCF – A Windows Explorer command file. Could pass potentially dangerous commands to Windows Explorer.
.LNK – A link to a program on your computer. A link file could potentially contain command-line attributes that do dangerous things, such as deleting files without asking.
.INF – A text file used by AutoRun. If run, this file could potentially launch dangerous applications it came with or pass dangerous options to programs included with Windows.

Other

.REG – A Windows registry file. .REG files contain a list of registry entries that will be added or removed if you run them. A malicious .REG file could remove important information from your registry, replace it with junk data, or add malicious data.

Office Macros

.DOC, .XLS, .PPT – Microsoft Word, Excel, and PowerPoint documents. These can contain malicious macro code.
.DOCM, .DOTM, .XLSM, .XLTM, .XLAM, .PPTM, .POTM, .PPAM, .PPSM, .SLDM – New file extensions introduced in Office 2007. The M at the end of the file extension indicates that the document contains Macros. For example, a .DOCX file contains no macros, while a .DOCM file can contain macros.

Viewing File Extensions

To help protect against this, you can enable file extensions in Windows Explorer’s Folder Settings window. Click the Organize button in Windows Explorer and select Folder and search options to open it.

Uncheck the Hide extensions for known file types checkbox on the View tab and click OK.

All files extensions will now be visible, so you’ll see the hidden .exe file extension.

.exe Isn’t the Only Dangerous File Extension

The .exe file extension isn’t the only dangerous file extension to look out for. Files ending with these file extensions can also run code on your system, making them dangerous, too:
.bat, .cmd, .com, .lnk, .pif, .scr, .vb, .vbe, .vbs, .wsh
This list isn’t exhaustive. For example, if you have Oracle’s Java installed, the .jar file extension can also be dangerous, as it will launch Java programs.

Courtesty HTG






Friday, February 8, 2013

Make free Wifi Calls on your Android wherever you are....here's how

 GrooVe IP Lite is an android app that that connects to Google Voice using Voice over IP (VoIP). What this means for you is you can make free unlimited calls to any phone in the US or Canada without using your voice minutes. GrooVe IP Lite works on any android device, phone or tablet, and allows you to make calls using a WiFi data connection. If you have a smartphone with Wi-Fi connectivity but no mobile plan, you can use this app to convert it to a free, full-featured working phone.Upgrade to the full version of GrooVe IP (https://market.android.com/details?id=com.gvoip) to remove ads and enable features:
- Calls over a mobile data connection not just WiFi
- Native dialer integration
- Proximity sensor support
- Change sign in status or sign in invisible
** NOTE ** Please ensure that your Google Voice account is associated with either a gmail or google apps account. To receive incoming calls you MUST go into your Google Voice account and forward calls to Google Chat.
** NOTE ** GrooVe IP Lite uses 1.2 MB per minute during a call
For requirements, setup details, answers to frequently asked questions, known issues, or more information, please visit http://snrblabs.com/snrb/grooveIp.aspx

Set Google Voice to make all your calls....then start GrooVe IP Lite....you can adjust all the call settings once the app is open.......tweak it if you need to.......it will pull up your phone book and you just call any contacts....remember.....hook on to WIFI where you are and you are off and chatting for free......enjoy   :)

Thursday, February 7, 2013

Problem installing-uninstalling Google Voice and Chat

Well, here we go again...there are many issues with this plugin..
I have deleted the registry entries and the google talk plugin remains in the add/remove programs...

so you have to run Microsoft Fix It registry repair


download the .exe and run it and go through the questions it is asking you for install or uninstall problems

Uninstall problems on Windows 7-Here's the Fix It

Microsoft has got a Fix It button which scans your registry and asks you how you want to repair the problems you are having...it works great...



Get it HERE


Using the Brave Browser How to's

when you install the Brave browser you will notice the toolbar on the top is small and also the tabs are small.....no one seems to have the ...