eb

Wednesday, November 5, 2008

Tips to Keeping Your PC Running Smoothly

Tips to Keeping Your PC Running Smoothly



A slow computer can be quite troublesome and may really affect your work. Given here are some simple tips that you can use to fix errors and speed up your PC.

Use a Registry Scanner Tool

A large bloated registry, filled with loads on unwanted, obsolete, and incorrect information, easily gets unstable and fragmented and as a result, considerably deteriorates the performance of your PC. Therefore, the first tip to keep your PC running smoothly is to maintain a compact, error-free, healthy Windows Vista registry. In order to do this, you must regularly scan and remove unwanted information from the registry.

You can easily perform this task using a reliable registry scanner tool. You can download a registry tool that meets your requirements from the Internet. Registry tools have a user-friendly GUI-interface and you can easily use their options to perform many registry maintenance tasks, such as scan and remove unwanted information from the registry, defrag the registry to make its files contiguous, and backup the registry.

Regular registry maintenance, not only helps you maintain your PC in a good working condition, but also enables you to repair and prevent several system errors, such as DLL errors, driver errors, and ActiveX errors.

Use a Disk Cleanup Tool

Over time, the hard disk of your PC gets filled up with several unwanted files. Therefore, your next step to improve the performance of your PC is to free up some disk space. You can do this with the help of the Disk Cleanup tool. You can open this tool from Start > All Programs > Accessories > System Tools.

Disk Cleanup is a one stop tool to compress old files, delete unwanted Internet Explorer files, empty the Recycle Bin and get rid of unwanted program setup files. You can also use this tool to free up disk space by uninstalling unwanted applications and Windows components, and also delete old System Restore snapshots.

Use a Disk Defragmenter Tool

After you have freed up disk space, you must defrag your PC. Defragging helps in making files and folders on your computer contiguous by collecting bits and pieces of a single file stored all over the hard disk, and then putting them together in adjacent data blocks on the disk. Defragging reduces a lot of load from your hard disk, makes data access a lot faster and consequently speeds up your computer.

Use Antivirus and Antispyware Tools

Any system speed up process is not complete unless you are sure that the system is free from virus and spyware infections. Viruses add several malicious files and entries in the registry and infect your applications with malicious codes to alter their normal function and generate errors. Spyware programs not only slow down your PC, but also steal your confidential data and trade it with external sources for malicious purposes.

Therefore, you need to regularly scan your PC with reliable antivirus and antispyware tools. Keep these tools updated with the latest definitions to ensure that your PC is protected against the latest malware. You must also turn on the real time protection feature included in these tools to prevent malware infiltration in the first place.

Labels:

Guide for beginner to crack DVD or VCD

Guide for beginner to crack DVD or VCD


Guide for beginner to crack DVD or VCD

What is DRM

DRM is an acronym for Digital Rights Management, a broad term used to describe a number of techniques for restricting the free use and transfer of digital content. DRM is used in a number of media, but is most commonly found in video and music files. There are many who argue that DRM is a misnomer, since it deals with use issues rather than the rights of the consumer. They therefore reinterpret DRM to stand for Digital Restrictions Management.

While DRM is most frequently used for movies, it is gaining more widespread use in other media as well. Audio files purchased through many online stores, such as Apple's iTunes Store, have various DRM schemes built in to limit the number of devices they may be played on. Many producers of eBooks are using a similar implementation of DRM to limit how many computers a book may be viewed on, and even how many times it may be viewed. In mid-2005, a number of content producers for television began requesting DRM of their shows via the popular TiVo system.

Therefore,if you want to free enjoy movie oraudio anywhere and anytime,first you should crack it whit some tools and then convert them to your portable player!

Labels:

Reason Why Internet Connection Work Very Slow

Reason Why Internet Connection Work Very Slow

There are several things to consider.

1. You are at, or beyond, the distance limits of your router (wiresless transmitter). Move closer to see if the problem is resolved.

2. There is interference between your PC and the wireless router, such as a 2.4GHz cordless phone, microwave oven, flourescent lights, etc. Temporarily disable the devices, one by one, until you determine the problem.

3. The antenae on either your router or PC is loose. Tighten each.

4. Your PC may be infected with a virus, trojan, or spyware that is eating up your bandwith, and causing packet loss.
Download the programs linked below. Install them. Update them. Scan your pc with them, and do so weekly.

If you have System Restore turned on, the Restore files may be infected, and trying to reinfect your pc. I turn off that feature, reboot to delete the files, then turn it on after a full system scan with AVG.
Turning off System Restore.
(right-click My Computer, Properties, System Restore tab, check the box to turn off System Restore on all drives.)

Restart your PC, and hold down the F8 key.
When you see the Boot Menu appear (black screen white letters), choose SAFE MODE.

Run a FULL SYSTEM SCAN with AVG.
You may heal or quarentine anything found.

You can also run Spybot and AdAware while in Safe Mode. I suggest you do a full system scan. Get rid of anything they find.

To exit Safe Mode, just restart your PC normally.

AVG Antivirus - Free Antivirus Software
Ad-Aware - Free Antispyware Software
Spybot Search&Destroy - Free Antispyware/Antitrojan Software
Trend Micro HijackThis - Free program to turn off Browser Hijackers
CW Shredder - Free program to remove the ability of malware to point your browser ot CoolWebSearch and its affiliates

One REALLY great feature of Spybot Search&Destroy, is its ability to help your PC block known spyware/hijacker sites. Just use the Immunize feature.

Hope this helps.

There are several things to consider.

1. You are at, or beyond, the distance limits of your router (wiresless transmitter). Move closer to see if the problem is resolved.

2. There is interference between your PC and the wireless router, such as a 2.4GHz cordless phone, microwave oven, flourescent lights, etc. Temporarily disable the devices, one by one, until you determine the problem.

3. The antenae on either your router or PC is loose. Tighten each.

4. Your PC may be infected with a virus, trojan, or spyware that is eating up your bandwith, and causing packet loss.
Download the programs linked below. Install them. Update them. Scan your pc with them, and do so weekly.

If you have System Restore turned on, the Restore files may be infected, and trying to reinfect your pc. I turn off that feature, reboot to delete the files, then turn it on after a full system scan with AVG.
Turning off System Restore.
(right-click My Computer, Properties, System Restore tab, check the box to turn off System Restore on all drives.)

Restart your PC, and hold down the F8 key.
When you see the Boot Menu appear (black screen white letters), choose SAFE MODE.

Run a FULL SYSTEM SCAN with AVG.
You may heal or quarentine anything found.

You can also run Spybot and AdAware while in Safe Mode. I suggest you do a full system scan. Get rid of anything they find.



AVG Antivirus - Free Antivirus Software
Ad-Aware - Free Antispyware Software
Spybot Search&Destroy - Free Antispyware/Antitrojan Software
Trend Micro HijackThis - Free program to turn off Browser Hijackers
CW Shredder - Free program to remove the ability of malware to point your browser ot CoolWebSearch and its affiliates

One REALLY great feature of Spybot Search&Destroy, is its ability to help your PC block known spyware/hijacker sites. Just use the Immunize feature.

Hope this helps

Labels:

Create Shortcut to Hibernate Windows XP instead of Shutdown

Create Shortcut to Hibernate Windows XP instead of Shutdown


Hibernate is great because it saves the status of your Windows XP session (all the programs and documents you have open) to the hard drive, so it can automatically restore it the next time you power up. The first step to making a Hibernate shortcut is to make sure you have Hibernate turned on. Go to the Control panel then click Performance and maintenance. Next, choose Power options, and select the hibernate tab. Finally, make sure Enable hibernation is checked.

Now to actually make the shortcut right click your desktop and choose New | Shortcut. Next, type this case-sensitive command into the dialog box

Code:
rundll32.exe powrprof.dll,SetSuspendState Hibernate

click next. Give the shortcut a name like Hibernate and click finish. From now on all you need to do to enter hibernation is double click the shortcut.

Alos you can put this shortcut to Windows task scheduler so that system Hibernate can be achived at a particular time automatically.

Labels:

Easy steps to enhance ur XP performance and looks....

Easy steps to enhance ur XP performance and looks....

Hi i have got this stuff from another site and its very intresting tips about Windows XP. So i wanted to share with u guys. Now that I have your attention. Let's make a thread of everyone's favorite tweaks or things they do to make Windows XP run smoother, work harder, and perform better. So if you've got something to bring to the table, bring it and make all of us better with XP.


Microsoft Windows XP Professional Configuration

--------------------------------------------------------------------------------
After Installing Windows XP follow these steps

Instructions:
Click Start
Click Control Panel
Click Switch to Classic View
Click View
Click Details

Click Display
Click the Desktop tab
Click Customize Desktop
Uncheck Run Desktop Cleanup, and then click OK
Click the Screen Saver tab
Choose (None) for the Screen Saver
Click Power
Change Turn off monitor to Never
Click Apply, and then click OK
Click the Appearance tab
Change the color scheme to Silver
Click Effects
Uncheck Use the following transition
Uncheck Show shadows under menus
Click OK
Click the Settings tab
Change Screen resolution to 1024x768 pixels
Click Advanced
Click the Monitor tab
Change Screen refresh rate to 75 Hertz
Click Apply
Click Yes
Click OK
Click OK

Click Folder Options
Click View
Check the following boxes:
Display the contents of system folders
Display the full path in the title bar
Display the full path in the address bar
Show hidden files and folders
Uncheck the following:
Automatically search for network folders and printer
Hid extensions for known file types
Click Apply
Click Apply to All Folders
Click Yes
Click OK

Click Internet Options
Click Use Blank, and then click Apply
Click the Content tab
Click AutoComplete
Check Forms, and then click Apply
Click the Connections tab
Click LAN Settings
Check Automatically detect settings, and then click OK
Click Setup
Type area code, and then click OK
Click OK
Click Next
Click Next
Select Set up my connection manually, and then click Next
Select Connect using a broadband connection, and then click
Next
Click Finish
Click the Programs tab
Change HTML editor to Notepad
Uncheck Internet Explorer should check to see whether it is the default browser, and then click Apply
Click the Advanced tab
Uncheck the following:
Enable Install on Demand (Other)
Enable page transitions
Notify when downloads complete
Show Go in the address bar
Check the following:
Use inline AutoComplete
Use Passive FTP
Do not search from the Address bar
Empty Temporary Internet Files folder when browser is closed
Click Apply
Click OK

Click Mouse
Click the Pointer tab
Change Scheme to 3D-White (system scheme)
Uncheck Enable pointer shadow
Click the Pointer Options tab
Uncheck Hide pointer when typing
Click Apply, and then click OK

Click Sounds and Audio Devices
Check Place volume icon in taskbar
Click Sounds Tab
Choose No Sounds for the Sound Scheme
Click No
Click Apply, and then click OK

Click System
Click the Advanced tab
Click the Settings button under Performance
Select Adjust for best performance
Check the following:
Show window contents while dragging
Smooth edges on screen fonts
Use drop shadows for icon labels
Use visual styles on windows and buttons
Click Apply, and then click OK
Click the Error Reporting tab
Select Disable error reporting
Uncheck But notify me when critical errors occur, and then click OK
Click the System Restore tab
Check Turn off System Restore on all drives
Click Apply, and then click Yes
Click the Automatic Updates tab
Select Turn off automatic updating
Click the Remote tab
Uncheck Allow Remote Assistance
Click Apply, and then click OK

Click Taskbar and Start Menu
Uncheck Lock the taskbar
Check Show Quick Launch
Click the Start Menu tab
Select Classic Start menu
Click Customize
Check Display Favorites
Check Show Small Icons in Start Menu
Uncheck Use Personalized Menus
Click OK
Click Apply
Click OK

Click User Accounts
Click Change the way users log on and off
Uncheck Use the Welcome screen
Click Apply Options
Close the Window
Exit the Control Panel

Open My Computer
Right-click on the hard drive icon and select Properties
Uncheck Allow Indexing Service to index this disk for fast searching
Click Apply
Select Apply changes to X:\, subfolders and files, and then click OK
Click OK
Reboot machine

Labels:

Refresh Your Windows (SPEED UP)

Refresh Your Windows (SPEED UP)


Does your PC seem to be inexplicably slowing down? If you�ve scanned your PC and ruled out viruses and malware, then it is the invisible, undetectable detritus that has collected on your hard drive which is mucking up the works. Incompletely removed software, unnecessary background tasks, malfunctioning device drivers and other such pesky problems can seriously slow down your machine. Let�s look at how to get your Windows back to its quick and reliable self�and solve an unfixable Windows setup.

A Windows Treatment

If windows stumbles but doesn�t fall, your PC likely needs only refurbishing, not a full operating system makeover. In fact, machines with startup problems can usually be repaired without a last gasp reinstallation. (Of course, if your PC experiences problems before Windows loads, chances are they have nothing to do with the OS). Follow these steps to reinvigorate your current Windows setup.


CUT BACK ON AUTOLOADS

You may be amazed at just how many programs load automatically at Windows boot-up and then run in the background as you work (not all of them appear as icons in the system tray, either). Each of these programs uses memory and other resources, which might even cause a conflict with another program.
To view your list of autostart apps, select Start, Run, type msconfig, and press Enter to open the System Configuration Utility. (Windows 2000 lacks this utility, download Mike Lin�s free Startup Control Panel alternative for that OS from www. mlin.net). Click the Startup tab Uncheck items in this list to keep them from autoloading.

Windows 2000 needs no autoload programs, and Windows XP requires only one�sort of. If you don�t use Microsoft Messenger, you may want to uncheck �msmsgs�, but doing so can cause problems with Outlook, Internet Explorer, or other Microsoft programs. Windows 98 and Me have several autoloading applications. In these versions, keep LoadPowerProfile, SystemTray, ScanRegistry, PCHealth, and TaskMonitor selected (including both instances of the first one if it�s listed twice, which can occur as part of Windows� boot process). If you use Windows� Task Scheduler, don�t uncheck SchedulingAgent (to find out whether a program is using the applet, select Start, Programs, Accessories, System Tools, Scheduled Tasks and see if anything is listed).

For Windows Me, keep StateMgr. Determining whether you need your other autoload apps requires a bit of detective work. You can usually figure out what application put the entry in your startup list by reading the information in the Startup tab�s Command column. For instance, if you see that the loading file is located in the Roxio folder, it�s a good bet that the entry is a Roxio program. Keep checked any listing related to your firewall or your antivirus program to make sure they�re always running in the background. On the other hand, some autoloaders put an icon in the system tray for launching an application that you could just as easily launch from the Start menu. Having these programs autoload is a waste of resources, so uncheck away.

Sometimes it�s a judgment call: If a utility enhances Windows in a way you like, running it at all times could be worthwhile. But even then, if Windows gives you trouble, consider disabling such a program�at least temporarily�to see whether it�s the culprit; life may be better without it.

Unfortunately some unchecked programs have a way of reappearing checked and autoloaded, even though you just unchecked them. Why? The application that installed the autoloading program sees what you�ve done, and responds by �correcting� your mistake. If this happens to you, unchecking the option will just create a cycle of frustration. Instead, launch the application and explore its menus, looking for a �load at startup� option. When you find it, uncheck it. If you don�t find such an option, check the vendor�s Web site. If you discover that there�s no way to turn off the autoloader, and you have no good reason to leave it on, ask yourself how badly you want that program on your PC. And uninstall it.


UNINSTALL UNUSED APPS


A program doesn�t have to be running to mess up Windows� performance. Getting rid of all the applications on your PC that you no longer use is a good idea. Doing so isn�t always easy, however. Most programs have their own uninstall routine.

Unfortunately, these routines seldom remove everything. All too often installing a program gives you both benefits and problems, and uninstalling it removes only the benefits. Nevertheless, the program�s own uninstall routine is the best place to start the removal process. You might find a shortcut to the uninstaller on the program�s Start menu entry. If not, select Start, Control Panel, Add or Remove Programs (in Windows XP) or Start, Settings, Control Panel, Add/Remove Programs (in all other Windows versions). Find the program you want on the �Currently installed programs� list (under the Install/Uninstall tab in Windows 9, click the Add/Remove or Change/Remove button and follow the prompts.

You haven�t really gotten rid of the program yet. Reopen the System Configuration utility to see whether the uninstalled application still autoloads anything; if it does, follow the steps in �Cut Back on Autoloads� above. Next, open Windows Explorer and delete the program�s folder inside the C:\Program Files directory (if it�s still there). And if a shortcut to the program is still on the Start menu, right-click the item and then select Delete.


PARE THE REGISTRY



There�s no bigger rat�s nest on a well used Windows system than the Registry. Whenever you install software, change hardware, or download something from the Web, you pour gunk into this vast, loosely constructed database that Windows relies on to work properly. Cleaning it out can make a world of difference in Windows� performance. Before you start, make sure you can restore the Registry to its previous state should you delete the wrong key.

Windows 98, Me, and XP (but not 2000) back up the Registry automatically, but it doesn�t hurt to make an extra backup before doing something that could hose your PC. With your personal data, it makes sense to store the backup at another location, but that�s not the case with the Registry backup. If your hard drive goes bad, it�s pointless to restore this Registry backup in another Windows setup. In Windows XP and Me, you can use System Restore to back up the Registry. Select Start, All Programs (Programs in Me), Accessories, System Tools, System Restore, Create a restore point, and then follow the prompts. To back up the Windows 98 Registry, select Start, Run, type scanreg, and press Enter. When you see no more errors, click Yes and then OK. Windows 2000 offers no reliable way to back up your Registry, so you have to use third-party software. I recommend Lars Hederer�s free Emergency Recovery Utility NT (ERUNT) that you can download from
Click Here To Download


Start Anew in Windows


Sometimes windows is beyond recovery, and there�s nothing left to do but reinstall it. If all goes well, you�ll be done in only a couple of hours�but be ready to survive without the machine�s services for a day or two if you need to troubleshoot the reinstall.

Before you do anything, back up: Make a copy of all your data files and place it on a CD or other removable medium. For optimal results, use a disk-imaging program like Norton Save & Restore or Acronis True Image, which duplicates your hard drive so that it can be quickly and easily restored if necessary. Next, locate your Windows installation CD (or the restore CD that came with your computer), plus the discs for every application that you want to keep. If you don�t have a restore CD, look for a restore utility on your PC, which likely has an option to create a restore CD.

If you downloaded a shareware program and don�t have a CD, make sure to track down the registration code needed to turn the free trial into the fully functional, unlimited-use version. With luck, you won�t need the CDs that came with your hardware, which are neither easy to access nor up-to-date. Put all of your current device drivers in a separate folder, away from C:\Windows, before the reinstall. But be forewarned: If a set-aside driver doesn�t work, you may still need the outdated one from the vendor�s CD.


GET SWEEPING


Take a deep breath, insert your Windows or restore CD, and reboot your PC. Restore CDs vary from vendor to vendor, so we can�t give you specific instructions. At their best, the discs are fully functional Windows CDs holding all the drivers you need. But at their worst, they only allow you to return your hard drive to its factory condition�with Windows but without any of your data and programs. If the only option on your restore CD is a fresh factory installation, make doubly sure you have your data backed up before you reinstall. After the reinstall, you�ll have to restore your data from this backup.

If your CD has a full copy of Windows XP or 2000, you�ll be prompted to �Press any key to boot from CD�. Do so. In the setup program, pick the options that will leave the previous file system in place while deleting (as opposed to repairing) the old operating-system files. Follow the other prompts. You�ll eventually be asked for your user name, as well as for the names of other users. Enter just one name�not your real name (problems can arise if Windows tries to make new folders with the same names as existing ones). Instead, enter the name �fake�, which you�ll delete later.

MATCH USERS TO DATA


When you�re back in Windows logged on as someone named �fake,� open Windows Explorer to C:\Documents and Settings, select Tools, Folder Options, View, Show hidden files and folders, and make sure �Hide protected operating system files (Recommended)� is unchecked. Click Yes, and then OK.

Now you�ll see six or more folders, among which will likely be ones named All Users, All Users. WINDOWS, Default User, Default User.WINDOWS, and �fake�. There will also be a folder for each of the old installation�s log-in names. Open the Default User folder and look for one or more files named �NTUSER� (they may have different file extensions). Delete these files, press Ctrl-A to select all the remaining files and folders, and then drag them all to the Default User.WINDOWS folder. At any dialog box, select Yes or, better yet, Yes to All. When you�re done, delete the empty Default User folder. Repeat the process with the All Users folder, copying everything except the �NTUSER� files (if they exist) to the All Users.WINDOWS folder. Return to the Documents and Settings folder and rename each of the folders for an actual user (rather than the All Users, Default User, and �fake� folders) by adding the extension .old to the name.

For instance, rename the folder �Lincoln� to Lincoln.old (click the folder name once or use the F2 key to rename folders). To create the real accounts, select Start, Control Panel, User Accounts in Windows XP or Start, Settings, Control Panel, Users and Passwords in Windows 2000. Create an account for each user from the previous install. At least one of the accounts must have administrator privileges. In Windows 2000 you may have to check �Users must enter user name and password to use this computer to create users�.

Once all of the users are in place, log off �fake� and log on to each new account one at a time. In XP, select Start, Log Off, Log Off; in 2000, click Start, Shut Down, Log off fake, OK. If you are the only user, log on as yourself, log off, and log on again as �fake.� If there are multiple users, first log on as one user, then log off and log on again as the next user, then log off again, and so on, until you�ve logged on and off as each user before logging back on as �fake.� XP users:

Resist the temptation to use the Switch User option (which does not exist in 2000); you need to completely log off each user, not just switch users. Once you�re logged back on as �fake,� your Documents and Settings folder should have two folders for each real user: �login name� and �login name.old�. Delete the �NTUSER� files and move the others as described above for Default User, but this time from the �login name. old� folder to the �login name� folder. In other words, if the user�s name is �Lincoln,� you would enter the �Lincoln. old� folder, delete all the �NTUSER� files, and drag the remaining files and folders to the �Lincoln� folder. When you�re done, log off �fake,� and then log on to one of the system�s real accounts with administrator privileges. Finally, return to Control Panel�s User Accounts applet and delete the �fake� account, using the option to delete files.


FINISH THE JOB

The last step is to reinstall your drivers. Listings with a yellow question mark need an update. But other drivers may be out of date as well. To reinstall a driver, double-click its listing in Device Manager and choose Driver, Update Driver. Select the option in the Hardware Update Wizard that lets you choose the location of the search and select the driver (the wording varies). Uncheck the option to search floppies, CDs, and other removable media, and direct the wizard to look in the folder c:\olddrivers. Click Next, and follow the prompts.

If you are prompted to insert a particular CD, click OK and point to c:\olddrivers, which is where your drivers are stored. If that doesn�t work, simply tell the installer to skip that file. The driver will likely install properly despite Windows� inability to find that specific file. However, if the device doesn�t work, dig out the CD that came with it and load the driver from it. When all the drivers are in place, delete the c:\olddrivers folder, or move it to a removable medium for safekeeping.

Your applications are still on your hard drive and listed on your Start menu (that is, unless your restore CD reformatted your hard drive), but most of them won�t work because Windows can�t see them yet. Reinstall the applications that don�t open when you try them. If you no longer want a program, delete its shortcut from the Start menu and remove its folder from the Program Files folder. You don�t have to properly uninstall the app this time.

At some point, you may have to reactivate XP. Since your hardware hasn�t changed, this should be no problem. And last but definitely not least, you should update Windows and your applications.

Hardware Fixes

Conventional wisdom urges us to frequently update our drivers�the programs that tell Windows what to do with hardware. If your PC is running well, there�s no reason to update your drivers. But if you�re having trouble, a driver update might help. First, open Windows� Device Manager by right-clicking My Computer and selecting Properties. In Windows XP and 2000, click Hardware, Device Manager. In Windows 98 or Me, click Device Manager.

Look for entries with yellow question marks or red exclamation points: The question mark indicates that Windows is using a generic driver for that device instead of one designed for it, and an exclamation point means that the device is not working. The drivers for graphics boards, sound cards, and printers are most likely to need an update. Drivers under �Computer�, �Disk drives�, and �Keyboards� rarely require updating.

To update a driver, double-click the component listing and choose Driver, Update Driver in the product�s Properties dialog box. The Hardware Update Wizard will search for an updated driver on your local drives as well as on Microsoft�s Windows Update site, and it will install the driver if it finds one.

Even if the wizard doesn�t find one, a driver update may be available. Search for a new version on the vendor�s Web site, or enter the full product name plus the word driver in a search engine. When you find an update, make sure it works with your version of Windows. Either the new driver will install automatically after you download and run it or it will provide you with installation instructions.
It is possible that updating a driver could make things worse. In Windows XP, click Roll Back Driver under the Driver tab in the Properties dialog box to return to the previous version. If you regret updating a driver in 98, Me, or 2000, your only option is to replace it with a generic driver (at least until the vendor releases a bug fix).

Labels:

Speed Up Boot-Time Connecting To LAN

Speed Up Boot-Time Connecting To LAN

Sometimes when connected to a LAN the boot time can take a few minutes. Load times shouldn't be anywhere near that! Signs of this include the system seemingly freezes after logging in, your desktop showing up but for some reason you just can't click on anything or run things for a minute or two. This can be traced back to mrxsmb.dll by using bootvis.exe. This can of course be a number of other things but most of the time it's your file and printer sharing.

1. Right click on Network Places --> Properties
2. Right click on your Ethernet Adapter connection --> properties
3. Un-check "File and Printer Sharing for Microsoft Networks" --> OK
4. reboot
5. If you need file or printer sharing, repeat the above, re-check the box and re-boot again

Labels:

Increase your hard disk speed....

Increase your hard disk speed....

To speed up your hard disk speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the disk.

This tip is only recommended if you have 256MB RAM or higher.

Follow these steps:

1) Run SYSEDIT.EXE from the Run command.

2) Expand the system.ini file window.

3) Scroll down almost to the end of the file till you find a line called [386enh].

4) Press Enter to make one blank line, and in that line type

Irq14=4096

Note: This line IS CASE SENSITIVE!!!

Click on the File menu, then choose Save.

Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.

Labels:

Meaning of BEEP in PC

Meaning of BEEP in PC

ERROR CODES IN A PC

One Beep :
Quote:
DRAM refresh failure
This may be due to - Bad memory chips
- A bad DMA Chip
- Bad memory addressing chips on the motherboard


Two Beeps :
Quote:
Parity error or Parity Circuit failure
Your memory may not be seated properly on the mother board.
Unplug and plug it properly


Three Beeps :

Quote:Bad memory or bad mother board


Four beeps :

Quote:Timer failure in the RAM.


Five Beeps :

Quote:CPU chip may be dead


Six Beeps :

Quote:Keyboard controller may have failed


Seven beeps :

Quote:CPU is dead. Retry the connections and test.
Replace the whole motherboard.


Eight Beeps :

Quote:Video card is missing or Bad.


Nine Beeps :

Quoteamaged ROM BIOS. BIOS chip has to be replaced if it persists.


Ten Beeps :

Quote:CMOS shutdown. Replace CMOS memory and associated chips.


Eleven Beeps :
Quote:
Cache memory test has failed.
To enable cache memory try CTRL+ALT+SHIFT++.


One long Beep and Three short Beeps:

Quote:Memory failure


One long Beep and Eight short Beeps :
Quote:Video card failure. Try to install video card in another slot.


No Beeps :
Quote:Check Power supply
Check mother board connections
Remove all cards except video card and check for system power up
Insert all cards one at a time and check their operation.
If system hangs on the installation of a particular card, then it is the cause for the problem and replace it with another of that type and check

Labels:

Windows virtual keyboard...just enable it....

Windows virtual keyboard...just enable it....

On Screen Keyboard
Did you ever know that Windows had its version of on screen keyboard which could be replaced for your typical keyboard.


?? want to RUN it??? CLICK ON START > RUN >type "osk"(without ")

Labels:

Side Jacking– Now Secure is not secure

Side Jacking– Now Secure is not secure
A security researcher at the Defcon hacker conference in Las Vegas demonstrated a tool that allows attackers to break into your Inbox even if you are accessing your Gmail over an encrypted session.

If you use Gmail and haven’t yet taken advantage of a feature Google recently provided to prevent hackers from hijacking your inbox, now would be an excellent time to do that (click here, and read Tip #1).

A security researcher at the Defcon hacker conference in Las Vegas demonstrated a tool that allows attackers to break into your Inbox even if you are accessing your Gmail over an encrypted session (i.e. using https://.. which you might recognize as the “gold lock” icon).

Here is a video demonstration of how an attacker would use an automated tool to hijack your login. The music may strike you as offensive, and there’s no narrative, so feel free to mute the sound.
(Well.. once again WordPress is preventing me from embedding the video. To watch it, please click here, Surf Jacking Gmail demonstration.)

While it may seem like Gmail is being singled out here, you should realize that other websites are vulnerable to side-jacking and cookie stealing too.. notably Facebook (I mention it because it has so many users), but Gmail is one of the few sites that allow you to thwart this attack method.

So how do you prevent side-jacking? Here are some simple, but inconvenient, solutions you can use to protect your data.

* If possible, avoid using public or open wireless networks.
* If you need to use a public wireless network, do not access Web sites that require personal information.
* Always use the “logout” feature when finished with a Website that requires a login ID/password.
* For Gmail, click the link in my first paragraph and set the “Always use” option.
* When you need to provide sensitive data in forms, such as if you are doing online banking, open a new instance of your browser and complete your transaction; logout, and close that Browser. Do not open any other websites in that browser.

Folks, the Internet is broken.. and it is the hunting ground for criminals. Please.. let’s be careful out there (and by careful, I mean “paranoid”).

Labels:

You have deleted or overwritten system files and now your system or application doesnt want to work? Or maybe you had the system corrupted by a 3rd pa

You have deleted or overwritten system files and now your system or application doesnt want to work? Or maybe you had the system corrupted by a 3rd party application or virus?

Its time to go back and restore a point in time when the system was stable and working fine.

On the Mac OS Leopard its the TimeMachine, in Windows XP and Vista its System Restore. Though both are not exactly the same they can serve the same purpose, to backup critical data, applications or system files only and create a restore point of these. Its up to you to control and decide what and when you want to backup your data.

However, since not everyone has terabytes of free space to have their system completly backed up incrementally every day, the average user really needs to pick and choose exactly what matters most. In other words make sure you are backing up your system files only at a minimum. Applications can always be re-installed with less hassle, but the operating system, well thats another story.

In Windows we want to backup the registery files primarily and a few other default files which the Windows system Restore takes care of automatically. System Restore enables you to restore your computer to an earlier state without losing data. This is ideal if your computer is not operating well because of a configuration change, a problem with an application, or the introduction of viruses or other unwanted software. By restoring to an earlier point in time before your computer began to have problems you may be able to get to stable or normal state.

On the Mac, OSX the Time Machine keeps a continual chain of backups over time, allowing you to turn the clock back in time to find the file you’re looking for. However needs to be told in the advanced settings not to backup all applications for example, all you want are your main user system profile files primarily, those are the ones that contain your system preferences amongst many other things which can be the cause of many system corruption issues

In my years of experience with Windows and users it seems to have the most issues with system file corruption, so lets focus on that in this article. In the case that your system has become unstable, no longer functions properly or your getting the blue screen of death. Don't despair , and definitely don't re-install the entire operating system with the Recovery CD you might have, there is a good chance that if you have enabled System Restore and done a regular restore point every so often you will be able to get your system back.

The key here is that before you do a major update, upgrade or do a change to your operating system you need to do the System Restore checkpoint. Most problems tend to occur after you install something new which didn agree with your system. We have seen this in Windows when you install drivers, applications or get a computer virus. We have seen this on the Mac with a simple upgrade of QuickTime which the OSX system depends on for much of its multimedia playback compatability.

Windows Vista Users should use - Windows Vista Backup and Restore Center
Follow Microsoft's step by step instructions here in using the Backup and Restore Feature in Windows Vista. Then follow these step by step instructions for using System Restore. Since Windows XP the System Restore feature has been carried forward in Windows Vista and
slightly improved, but are basically the same.

You can watch PCWizKid's video tutorial for using the Backup and System Restore (see below).

Windows XP Users should use - Windows XP Backup and System Restore
PCWizKid has put together a video tutorial for using the Backup and System Restore (which is similar in Vista).

Labels:

Convert To Basic And Dynamic Disks In Windows Xp

Windows XP Professional supports two types of disk storage: basic and dynamic. Basic disk storage uses partition-oriented disks. A basic disk contains basic volumes (primary partitions, extended partitions, and logical drives).

Dynamic disk storage uses volume-oriented disks, and includes features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes).

General Notes
Before you change a basic disk to a dynamic disk, note these items:

You must have at least 1 megabyte (MB) of free space on any master boot record (MBR) disk that you want to convert. This space is automatically reserved when the partition or volume is created in Microsoft Windows 2000 or Windows XP Professional. However, it may not be available on partitions or volumes that are created in other operating systems.

When you convert to a dynamic disk, the existing partitions or logical drives on the basic disk are converted to simple volumes on the dynamic disk.

After you convert to a dynamic disk, the dynamic volumes cannot be changed back to partitions. You must first delete all dynamic volumes on the disk, and then convert the dynamic disk back to a basic disk. If you want to keep your data, you must first back up or move the data to another volume.

After you convert to a dynamic disk, local access to the dynamic disk is limited to Windows XP Professional and Windows 2000.

If your disk contains multiple installations of Windows XP Professional or Windows 2000, do not convert to a dynamic disk. The conversion operation removes partition entries for all partitions on the disk with the exception of the system and boot volumes for the current operating system.

Dynamic disks are not supported on portable computers or Microsoft Windows XP Home Edition.

Before you change a dynamic disk back to a basic disk, note that all existing volumes must be deleted from the disk before you can convert it back to a basic disk. If you want to keep your data, back up the data, or move your data to another volume.

How to Convert a Basic Disk to a Dynamic Disk

To convert a basic disk to a dynamic disk:

1) Log on as Administrator or as a member of the Administrators group.

2) Click Start, and then click Control Panel.

3) Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management.

4) In the left pane, click Disk Management.

5) In the lower-right pane, right-click the basic disk that you want to convert, and then click Convert to Dynamic Disk.

NOTE:You must right-click the gray area that contains the disk title on the left side of the Details pane. For example, right-click Disk 0.

6) Select the check box that is next to the disk that you want to convert (if it is not already selected), and then clickOK.

7) Click Details if you want to view the list of volumes in the disk.

Click Convert.

9) Click Yes when you are prompted to convert, and then click OK.

How to Convert a Dynamic Disk to a Basic Disk

To change a dynamic disk back to a basic disk:

1) Back up all the data on all the volumes on the disk you want to convert to a basic disk.

2) Log on as Administrator or as a member of the Administrators group.

3) Click Start, and then click Control Panel.

4) Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management.

5) In the left pane, click Disk Management.

6) Right-click a volume on the dynamic disk that you want to change to a basic disk, and then click Delete Volume.

7) Click Yes when you are prompted to delete the volume.

Repeat steps 4 and 5 for each volume on the dynamic disk.

9) After you have deleted all the volumes on the dynamic disk, right-click the dynamic disk that you want to change to a basic disk, and then click Convert to Basic Disk.

NOTE:You must right-click the gray area that contains the disk title on the left side of the Details pane. For example, right-click Disk 1

Labels:

HIDE ur files one more secret

Hi friends. You always are in the search of various amazing tricks which helps you to hide the important folders. This is a simple but a cool trick which will help you gain command over your data in the folders.

HIDE THE FILE.
a) First open command prompt .
b) Then type ‘attrib +s +h “path of the file”.
E.g. Attrib +s+h c:\ example \Darani
c) And surprise the file will be hidden.

This will hide the file.


UNHIDE THE FILE

a) Again open command prompt.
b) Then type ’attrib –s -h path of the file’.
E.g. Attrib –s-h c:\ example \Darani
c) And you will again gain the file.

So njoy hide and seek....

Have a gr8 day
bye tc

Labels:

Find a virus.....

Find a virus.....

WHAT IS A VIRUS?

1) Virus is a little program whos activity can destruct/destroy some files and a computer system. If this program does not open, it's inactive and could not or will not destroy anything.

WHAT IS A VIRUS-EMAIL?

2) The virus program is brought to you by an email as attachment. It has a server itself (virus server). File virus attachments cannot go to another email, such as an email was sent by user (netter), member, moderator etc to be as their attachment. It must be brought to you by email itself,that we called EMAIL Of VIRUS.

WHAT'S THEIR ADDRES?

3) EMAIL OF VIRUS would be sent by any email address of any account, that it found and cracked from some mailbox or address-book of other person anywhere. So that why the email of virus looks like it was sent by our friend, our member,our moderator etc..... even it is able to email a virus by our own email address.

HOW TO SEE IS THAT A VIRUS ATTACHMENT?

4) To identification of virus attachment:

a). it has a small size ( <150KB )
b). it has extension file name such as below:

*.scr
*.clp
*.pif
*.bat
*.exe
*.com
*.txt
*.doc
*.lhz
*.rhz

and some time it's compressed by *.zip file.

Also by the fake name HotMovie.MPEG_ _________ scr.

Actualy the file is virus file with extension .scr


HOW TO SEE IS THAT AN EMAIL VIRUS?

5) You are would able to understand an email virus from their SUBJECT, most of them contains an amazing statement or unsusal word, such as below:

Weah ^_^ )
Hokki=)
Hi
ello!=))
Hello -)
Hey, dude, it's me ^_^
access Mpeg
Re:your text
Re:Text message
Re:Msg reply
Re:Is that your document?
Re:Hot Movie(MPEG)
Re:Information. ..
Re;Important info
Re:This is your photos!

and more, and more...

If you received emails with the subject matter as above, you
should delete even with out openin.


NOTE:

Don't have words in ur email subject which resembles a virus mail Otherwise your email would be deleted by recipient[s] .

BEAWARE it's dangerous.

*** If one of your file is infected by virus, it will change into function of a virus and might infecte all files in your hard disk.

Labels:

How To Block Websties Without using any Software

How To Block Websties Without using any Software

Code:


1. Browse C:\WINDOWS\system32\drivers\etc

2. Find the file named "HOSTS"

3. Open it in notepad

4. Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site

will no longer be accessable.

5. Done!

Labels:

Change your Windows XP Boot Screen

Change your Windows XP Boot Screen
This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.



Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.



Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.



Once there paste your new file into the folder and overwrite the existing folder.



Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear. You can download this bootscreen here.



ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.

Labels:

How LINUX boots?

As it turns out, there isn't much to the boot process:

1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm
S12kerneld S25netstd_nfs S99httpd
S15netstd_init S30netstd_misc S99rmnologin
S18netbase S45pcmcia S99sshd
S20acct S89atd
S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:

mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown( manual page.

To make the system reboot in 10 minutes, run this command:

shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.

Labels:

How to retrieve old copies of files- Ultimate style

How to retrieve old copies of files- Ultimate style
From time to time Vista creates ’snapshot’ copies of your files with a service called “Shadow Copy”. This allows you to retrieve older versions from files you accidentally delete or alter.

To go back to a prior version of your file/document, you simply right-click on the file and select “Restore previous versions”. Using the Shadow Copy service is a far easier way to recover your files than opening a backup you’ve made, and can get you out of some nasty jams.

Shadow Copy is enabled on all versions of Vista, but Microsoft grants user access to these copies only in Ultimate, Business, and Enterprise editions. (Clearly as a method to try to sell more copies of the pricier Ultimate Edition. Shame on you Microsoft; backup and recovery should be free.)

Tip of the day: Users of the “Home” editions of Vista can use Shadow Copy too.
The odds are pretty durned good that if you bought a new computer, and it came with Vista, it came with Vista Home Premium. I say that because if you walk into a store selling computers, I dare you to find the one that has Ultimate Edition on it. It seems to me that they all come with Home Premium!

Remember how I said Shadow Copy was “enabled” on all versions? Yes? Well, for owners of Vista Home Premium and Vista Home Basic, the service is running, but you need a way to “interface” with it (sometimes called a “front end”). To do that, download and install ShadowExplorer, and gain some of Ultimate Edition’s functionality. This cool piece of software is free, but donations are accepted.

Today’s free link: People who are using Windows 2000 or XP can get an almost identical file functionality with FileHamster from Mogware. This program is designed for people whose talents lie in the Creative Arts, so you don’t ave to be a geek to use it. There’s helpful user forums, too.

Please note: This ability is by no means a substitute for regular system backups. This is for small “oopsies”, not recovery/restoration.

Labels:

How is the back made up?

How is the back made up?

The major feature is the spine. This is a highly complex and delicate structure which is made up of 33 small bones called vertebrae.

In between each vertebra is a disc which acts as a shock absorber, and stops the bones rubbing together.

The discs are made up of a jelly like substance, which is protected by a tough, fibrous outer casing.

The spine is supported by specialised back muscles, and an array of ligaments, nerves and tendons.

What causes back pain?

As the spine is such a complex structure, it can often be difficult to pin down the exact cause of back pain.

Probably the most common cause is when the back muscles begin to spasm.

This can often occur after strenuous activity, or can be a reaction to repetitive strain.

The muscle is damaged, or irritated, and goes into spasm to protect the area from further injury.

This can be extremely painful, and can lead to muscle tears if undue stress is exerted.

Other causes of back pain include arthritis, fractures and infections.

In many cases experts believe back pain is a manifestation of emotional upset, rather than a physical problem.

More serious causes can include a prolapsed disc, or degenerative diseases of the spine - but these are relatively rare.

Are certain parts of the back more vulnerable?

Yes. The lower - or lumbar - region of the back is particularly prone to injury.

This because it bears the entire weight of the upper body, and is twisted and bent more than other parts.

As a result it inevitably suffers more wear and tear.

Why is back pain on the increase?

Experts believe that a major factor is the modern tendency to lead a sedentary lifestyle, both at work and home.

Spending long stretches of time sitting in one position - often with the back not properly supported - is not good for the spine.

The reliance on comfy soft furnishing may seem appealing - but often it encourages us to adopt a poor posture.

Back pain is much less common in places such as India, where many more people are used to sitting on the floor, which is thought to allow the back muscles to find their own natural position.

What is the treatment?

For most cases of back pain the only treatment is pain relief, often through the use of non-steroidal anti-inflammatory drugs such as aspirin.

Physiotherapy, heat therapy, massage and hydrotherapy can help.

How can you minimise the risk?

The spine is naturally curved into an S shape. The best way to keep it healthy is to try to maintain this shape as much as possible.

This is particularly important when performing tasks, such as lifting, that carry an increased risk of injury.

Strengthening the back muscles, keeping fit by taking regular exercise, and maintaining a healthy weight can all help to minimise the risk of back pain.

It is also important to have a mattress that properly supports the body while you are asleep.

If you do have a bad back probably the worst thing you can do is take to your bed.

Experts believe that it is best to stay as active as you possibly can.

Could there be another explanation for back pain?

Some lumbar and lower spinal pain is caused by patients having one leg longer than the other.

This puts the pelvis out of alignment causing pain, which without correction leads to long term compensatory problems such as back pain.

In this case it might be wise to consult a podiatrist who will measure the patient's limbs and if required provide either an orthoses - an orthopedic appliance used to support, align, prevent, or correct deformities - or arrange to modify the patients shoe to correct the difference.


=========================================================================

How is the back made up?

The major feature is the spine. This is a highly complex and delicate structure which is made up of 33 small bones called vertebrae.

In between each vertebra is a disc which acts as a shock absorber, and stops the bones rubbing together.

The discs are made up of a jelly like substance, which is protected by a tough, fibrous outer casing.

The spine is supported by specialised back muscles, and an array of ligaments, nerves and tendons.

What causes back pain?

As the spine is such a complex structure, it can often be difficult to pin down the exact cause of back pain.

Probably the most common cause is when the back muscles begin to spasm.

This can often occur after strenuous activity, or can be a reaction to repetitive strain.

The muscle is damaged, or irritated, and goes into spasm to protect the area from further injury.

This can be extremely painful, and can lead to muscle tears if undue stress is exerted.

Other causes of back pain include arthritis, fractures and infections.

In many cases experts believe back pain is a manifestation of emotional upset, rather than a physical problem.

More serious causes can include a prolapsed disc, or degenerative diseases of the spine - but these are relatively rare.

Are certain parts of the back more vulnerable?

Yes. The lower - or lumbar - region of the back is particularly prone to injury.

This because it bears the entire weight of the upper body, and is twisted and bent more than other parts.

As a result it inevitably suffers more wear and tear.

Why is back pain on the increase?

Experts believe that a major factor is the modern tendency to lead a sedentary lifestyle, both at work and home.

Spending long stretches of time sitting in one position - often with the back not properly supported - is not good for the spine.

The reliance on comfy soft furnishing may seem appealing - but often it encourages us to adopt a poor posture.

Back pain is much less common in places such as India, where many more people are used to sitting on the floor, which is thought to allow the back muscles to find their own natural position.

What is the treatment?

For most cases of back pain the only treatment is pain relief, often through the use of non-steroidal anti-inflammatory drugs such as aspirin.

Physiotherapy, heat therapy, massage and hydrotherapy can help.

How can you minimise the risk?

The spine is naturally curved into an S shape. The best way to keep it healthy is to try to maintain this shape as much as possible.

This is particularly important when performing tasks, such as lifting, that carry an increased risk of injury.

Strengthening the back muscles, keeping fit by taking regular exercise, and maintaining a healthy weight can all help to minimise the risk of back pain.

It is also important to have a mattress that properly supports the body while you are asleep.

If you do have a bad back probably the worst thing you can do is take to your bed.

Experts believe that it is best to stay as active as you possibly can.

Could there be another explanation for back pain?

Some lumbar and lower spinal pain is caused by patients having one leg longer than the other.

This puts the pelvis out of alignment causing pain, which without correction leads to long term compensatory problems such as back pain.

In this case it might be wise to consult a podiatrist who will measure the patient's limbs and if required provide either an orthoses - an orthopedic appliance used to support, align, prevent, or correct deformities - or arrange to modify the patients shoe to correct the difference.

Labels: ,

Home remedies for male impotency

Home remedies for male impotency

Sexual impotence in men is a common problem whose frequency tends to increase with age. So before you start losing your sexual power, understand that being impotent doesn't mean you have to suffer the problem forever.

Home remedies come in handy to help men achieve greater sexual potency. "Some of these remedies may help, but they may prove ineffective for others. Experimenting with different home remedies yields beneficial results for less advanced cases," cautions Dr. M.P. Mani, (Bachelor of Ayurvedic Medicine and Surgery).

Here are some of the most common home remedies for treating male sexual impotence.

Sexual Impotence treatment using Garlic

Garlic is one of the most common vegetables found at home that's beneficial in the treatment of sexual impotence. Dr. Mani says, "Garlic has often referred to as "the poor man's penicillin" because it serves as an effective antiseptic and immune booster. Being a sex rejuvenator, it can improve sexual activities that have been damaged due to an accident or a disease. Garlic is important for people who overindulge in sex to protect themselves from nervous exhaustion."

Do it at home: Chew two to three cloves of raw garlic daily. Regularly chewing two or three cloves of raw garlic helps treating sexual impotence. In addition, eating garlic bread prepared with whole grains helps in the production of healthy sperms.

Sexual impotence treatment using Onion

Onion is considered to be an effective aphrodisiac and one of the best libido enhancers, but its properties are not generally known.

Do it at home: Take a white onion, peel it off, crush and then fry in butter. This mixture can be taken daily with a spoon of honey, but make sure to consume this mixture when your stomach has been empty for at least two hours. This remedy helps to treat premature ejaculation, impotence and involuntary loss of semen during sleep or other times (known as spermatorrhea).

Also, dip thee powder of black gram in onion juice for seven days and then dry the mixture. This mixture is a strong aphrodisiac and can be taken daily for improving sexual performance.

Sexual Impotence treatment using Carrot

Carrots are considered valuable in curing impotence.

Do It At Home: Take 150 gm of carrots, finely chopped with a half-boiled egg and a tablespoon of honey. Take this mixture, once daily for a month or two. People who are usually tense and suffer from sexual disorders can find relief as this home remedy increases sexual stamina.

Sexual Impotence treatment using Lady's Fingers

Lady's finger are considered a remarkable tonic for improving sexual vigor.

Do It At Home: Take 5 to 10 grams of the root powder of this vegetable with a glass of milk and two teaspoons of ground mishri (candy sugar) daily. Regular use of this recipe helps in restoration of sexual vigour.

Sexual Impotence treatment using Asparagus

The dried roots of asparagus (or white musli ) are used in Unani medicine as an aphrodisiac.

Do It At Home: Take 15 grams of the dried roots of asparagus and boil it with one cup of milk. Take this mixture twice daily for satisfactory results. The regular use of this recipe is valuable to cure impotency and premature ejaculation.

Sexual Impotence treatment using Drumstick

Drumstick is very useful as a sexual tonic in the treatment of sexual debility and functional sterility in both males and females. The powder of the dry bark is also valuable in impotency, premature ejaculation, and thinness of semen.

Do It At Home: Boil 15 gm of drumstick flowers in 250 ml milk. This soup is an effective sexual tonic for both men and women. Alternately, boil 120 gm of powdered dry bark in ½ litre of water for 30 minutes and then mix 30 gm of this powder with 1 tablespoon of honey in it. Take this recipe 3 times daily for good results.

Sexual Impotence treatment using Ginger

The juice extracted from ginger is a valuable aphrodisiac and beneficial in the treatment of sexual weaknesses.

Do It At Home: Take half a teaspoon of ginger juice with a half-boiled egg and honey, once daily at night, for a month. This recipe is said to relieve impotency, premature ejaculation, and spermatorrhea.

Sexual Impotence treatment using Dried Dates

Dried dates are a highly-strengthening food and have the ability to restore sexual drive, increase endurance and improve overall vitality, while promoting a Zen state of mind.

Do It At Home: Pounded and mixed with almonds, pistachio nuts, and quince seeds in equal quantities, about 100 gm of dried dates should be taken daily foe excellent results.

Sxexual Impotence treatment using Raisins

Ayurveda recommends black raisins for the re-establishment of sexual vigour.

Do It At Home: Wash black raisins roughly in tepid water and then boil them with milk which makes them swollen and sweet. Eat these raisins with milk to get the desired results. You need to start with 30 gm of raisins, followed by 200 ml of milk three times a day and then the quantity of raisins can be gradually increased to 50 gm each time.

Sexual Impotence treatment using Saffron

In Ayurveda, saffron is used to treat infertility in couples as its fragrance is highly erotic. It can arouse sexual desire and can have a relaxing effect on the nerves.

Do It At Home: Use it as massage oil or consume it with food for improving sexual vigor.

Labels: ,

“Health is wealth,” said a wise man an eon back.

“Health is wealth,” said a wise man an eon back.


‘Gullible’ as we are, we believed him. But soon when money came pouring in from all directions, we understood what wealth really was. And life was never ever the same.

We keep a bottle of water on our desk so that we don’t have to move when thirsty. The cookie jar under our table helps us when hunger strikes. The only exercise regime that we have is a walk to the parking zone and a weekly visit to the supermarket. “Who has the time for a morning walk, yoga, exercise and the likes? It’s what retired and old people do who really need it,” defends a generation who’s full of aggression to make money while the sun shines.

And so, cases of obesity, slip disc, migraine, high blood pressure and depression have increased by leaps and bounds. We realize the threat, but we don’t act unless we suffer. Consider yourself blessed if all work and no play have kept you hale and hearty.

As time passes, these cases will increase. And therefore, to make sure your health is not disturbed, start managing your time.
Simple changes in your lifestyle can work wonders to your well-being.
-It could be as small as taking the stair case instead of the lift or
-A good laugh in between grueling work hours.
-You can push your group of friends to join an evening gym – that could be your hang-out with pals!
-Instead of a pizza, go for a salad Subway sandwich when in a mall.
-Learn basic exercises and do them while on your chair. Walk while talking on your cell phone.
-Get a good massage on the weekend.
-When you go to a disc, make sure you take on the dance floor!

Start smiling a little more often…

These are just a few examples. List a few things you love doing and see how you can include them in your lifestyle to stay fit. Fitness is not about a regime; it’s about how well you understand your body and gives it what it asks for.

And remember, tomorrow never comes. Just go and find your fitness mantra today for health is actually the real wealth.

Labels: ,

All u need to know about breast cancer

All u need to know about breast cancer

Here is what i came acroos on the net, found it informative n sharing with u, hoping its not a repost:

The truth behind some of the most common misconceptions about breast cancer.


Images from this article Public awareness about breast cancer has increased dramatically over the past 20 years. Yet misleading ideas still persist. Here, we explain the truth behind common misconceptions.

Myth: The "one in eight chance of breast cancer" statistic means that if eight women are randomly selected, one of them must have or will get breast cancer.

Fact: In reality, the statistic -- which comes from the National Cancer Institute -- is an estimate of a woman's chance of developing breast cancer during her entire lifetime. So if a woman lives to be 85, she has a one in eight (12.5%) chance of getting breast cancer. But for younger women the odds are much better. For example, a 50-year-old woman has a 1 out of 54 chance. At age 40, a woman's odds of getting breast cancer are 1 in 235. Of course, these probabilities are based on population averages, so an individual woman's risk may be higher or lower, depending upon various factors, including family history, reproductive history and other factors that are not yet fully understood.

Myth: Only women can get breast cancer.

Fact: Men have breast tissue, so it is possible for them to develop breast cancer. Like all cells of the body, a man's breast duct cells can undergo cancerous changes. Because women have many more breast cells than men do, and perhaps because their breast cells are constantly exposed to the growth-promoting effects of female hormones, breast cancer is much more common in women. This year about 1500 men are expected to be diagnosed with breast cancer in the United States.

Myth: Using deodorant or antiperspirant causes breast cancer.

Fact: This urban legend has suggested that chemicals in antiperspirants are absorbed through the skin, interfere with lymph circulation and cause toxins to accumulate in the breast that eventually lead to breast cancer. There is absolutely no experimental or epidemiological evidence to support this. Chemicals in products such as antiperspirants are tested thoroughly to ensure their safety.

Myth: Mammograms are painful and unsafe.

Fact: Mammograms can be uncomfortable, but the compression of the breast during mammography takes only a few minutes. To lessen discomfort, schedule your mammogram when your breasts are least sensitive (not right before your period). Mammograms result in only minimal exposure to radiation, so they are safe.

Myth: Any mass that shows up on a mammogram is most likely cancerous.

Fact: Most abnormalities will turn out not to be cancer. A mass could be a cyst or another benign breast condition. Your physician can perform an ultrasound or biopsy to investigate further.

Myth: Breast-feeding increases your risk for breast cancer.

Truth: A woman who breast-feeds can get breast cancer, but no studies indicate that breast-feeding causes breast cancer. In fact, some studies indicate that breast-feeding can reduce a woman's risk of developing the disease.

Myth: If breast cancer doesn't run in your family, you won't get it.

Fact: About 80% of women who get breast cancer have no known family history of the disease. Increasing age is the biggest single risk factor for breast cancer. If you have a family history of breast cancer, your risk may be elevated a little, a lot, or not at all. If you are concerned, discuss your family history with your physician or a genetic counselor.

Myth: Birth-control pills cause breast cancer.

Fact: Today's birth-control pills contain a low dose of the hormones estrogen and progesterone. They have not been associated with an increased risk of breast cancer and, in fact, can provide some protection against ovarian cancer. The higher-dose contraceptive pills used in the past were associated with a small increased risk in only a few studies.

Myth: A monthly breast self-exam is the best way to find breast tumors.

Fact: High-quality mammography is the most reliable way to find breast cancer as early as possible -- when it is most curable. By the time a tumor can be felt, it is usually bigger than the average size of one first detected by mammogram. However, breast examination by you and your health care provider is still very important. About 25% of breast cancers are found only on breast examination (not on the mammogram), about 35% are found using mammography alone and 40% are found by both physical exam and mammography. So it's important that you take a three-step approach: yearly mammograms (for women 40 and older), yearly clinical breast exams, and monthly self-exams.

Sources: American Cancer Society, National Cancer Institute, National Breast Cancer Foundation

Labels: ,

Aspirin Only Benefits Diabetics With History Of Heart Disease Or Stroke

Aspirin Only Benefits Diabetics With History Of Heart Disease Or Stroke

A new study by researchers in Scotland suggests that while there is evidence of benefit to non-diabetics with no history of heart disease or stroke, people with diabetes should not take aspirin to prevent heart disease and stroke unless they already have a history of these complaints.

The study was the work of Jill Belch, professor of vascular medicine at the University of Dundee in Scotland, and colleagues, and is published online in the BMJ 16 October issue.

Only one in two persons with either type 1 or type 2 diabetes diagnosed with cardiovascular disease is likely to survive another 40 years, whereas this figure is nine in ten for non-diabetic cardiovascular disease patients.

Allthough numerous studies have shown diabetics without heart disease do not benefit from taking aspirin, the current guidelines followed by doctors are inconsistent and a lot of patients with diabetes and peripheral arterial disease are prescribed aspirin for protection against heart disease.

In this study the researchers found that taking aspirin and antioxidant supplements did not prevent heart attacks among people with diabetes and asymptomatic arterial disease, even those at high risk. They said aspirin should be only taken by diabetic patients who already have an established history of heart disease, stroke or limb arterial disease.

Belch and colleagues carried out a randomized, double blind, placebo controlled trial involving 16 hospital centres and 188 primary care groups in Scotland. The 1,276 participants were aged 40 and over and had either type 1 or type 2 diabetes, an ankle brachial pressure index of 0.99 or less, and no symptomatic cardiovascular disease.

Ankle brachial pressure index is the ratio of blood pressure in the ankle to that of the arm. Around 0.9 to 1.3 is considered acceptable to normal.

The researchers randomly allocated the participants to four treatment groups, each taking a daily dose of either (1) a 100 mg aspirin tablet plus an antioxidant capsule, (2) an aspirin tablet plus a placebo capsule, (3) a placebo tablet plus an antioxidant capsule, or (4) a placebo tablet plus a placebo capsule.

The primary outcome measures comprised different combinations of the following events: death from coronary heart disease or stroke, non-fatal heart attack or stroke, and amputation above the ankle for critical limb ischaemia (loss of blood supply to the limb).

Belch and colleagues screened the participants between November 1997 and July 2001 and conducted follow up evaluations every six months where they recorded outcome events, adverse events and any interventions. They also recorded the results of electrocardiograms taken at the start of the study and then every year.

The results showed that:
Overall, 1,074 participants had their final follow up in 2006.

6 moved away and did not take part any more, one withdrew after 4 years and 195 died during the trial.

There was no evidence of interaction between aspirin and antioxidant.


Overall, 116 (18.2 per cent) of 638 primary events occurred in the aspirin groups.

This compared with 117 (18.3 per cent) of 638 in the non-aspirin groups (hazard ratio was 0.9.

There were 43 deaths (6.7 per cent) from coronary heart disease or stroke in the aspirin group.

This compared with 35 deaths (5.5 per cent) from coronary heart disease or stroke in the non-aspirin group (hazard ratio 1.23).

In the groups where participants took antioxidant there were 117 of 640 (18.3 per cent) primary events.

This compared to 116 of 636 (18.2 per cent) in the non-antioxidant groups (hazard ratio 1.03).

42 (6.6 per cent) of the deaths from coronary heart disease or stroke occurred in the antioxidant groups.

This compared with 36 (5.7 per cent) in the non-antioxidant groups (hazard ratio 1.21).
Belch and colleagues concluded that:

"This trial does not provide evidence to support the use of aspirin or antioxidants in primary prevention of cardiovascular events and mortality in the population with diabetes studied."

In an accompanying editorial, William R Hiatt, professor of medicine at the University of Colorado Denver School of Medicine, wrote that the evidence of this trial, when taken with that of six other well controlled trials, makes a strong case for revising the international prescribing guidelines followed by doctors so that aspirin is only prescribed for patients with an established history of heart and stroke disease.

Aspirin is one of the top 10 causes of adverse events reported to the Commission on Human Medicines, said the BMJ in a press statement. The drug causes gastrointestinal bleeding, the risk of which goes up with age and prolonged use.

"The prevention of progression of arterial disease and diabetes (POPADAD) trial: factorial randomised placebo controlled trial of aspirin and antioxidants in patients with diabetes and asymptomatic peripheral arterial disease."
Jill Belch, Angus MacCuish, Iain Campbell, Stuart Cobbe, Roy Taylor, Robin Prescott, Robert Lee, Jean Bancroft, Shirley MacEwan, James Shepherd, Peter Macfarlane, Andrew Morris, Roland Jung, Christopher Kelly, Alan Connacher, Norman Peden, Andrew Jamieson, David Matthews, Graeme Leese, John McKnight, Iain O'Brien, Colin Semple, John Petrie, Derek Gordon, Stuart Pringle, Ron MacWalter, Prevention of Progression of Arterial Disease and Diabetes Study Group, Diabetes Registry Group, and Royal College of Physicians Edinburgh.

Labels: ,

Calories of Various Foods based on......

Calories of Various Foods based on......

Calories of Various Foods

Some foods have significantly more Calories than others but what does the difference actually look like. Each of the photographs below represents 200 Calories of the particular type of food; the images are sorted from low to high calorie density. When you consider that an entire plate of broccoli contains the same number of Calories as a small spoonful of peanut butter, you might think twice the next time you decide what to eat. According to the U.S.
Department of Agriculture, the average adult needs to consume about 2000 - 2500 Calories to maintain their weight. In other words, you have a fixed amount of Calories to "spend" each day; based on the following pictures, which would you eat?








Celery
1425 grams = 200 Calories




Mini Peppers
740 grams = 200 Calories





Broccoli
588 grams = 200 Calories




Baby Carrots
570 grams = 200 Calories





Honeydew Melon
553 grams = 200 Calories




Coca Cola
496 ml = 200 Calories




Red Onions
475 grams = 200 Calories




Apples
385 grams = 200 Calories





Canned Green Peas
357 grams = 200 Calories





Whole Milk
333 ml = 200 Calories






Kiwi Fruit
328 grams = 200 Calories





Canned Sweet Corn
308 grams = 200 Calories






Grapes
226 grams = 200 Calories






Ketchup
226 grams = 200 Calories




Sliced Smoked Turkey
204 grams = 200 Calories




Balsamic Vinegar
200 ml = 200 Calories




Lowfat Strawberry Yogurt
196 grams = 200 Calories




Canned Chili con Carne
189 grams = 200 Calories







Canned Black Beans
186 grams = 200 Calories



Canned Pork and Beans
186 grams = 200 Calories

Eggs
150 grams = 200 Calories



Cooked Pasta
145 grams = 200 Calories




Avocado
125 grams = 200 Calories



Canned Tuna Packed in Oil
102 grams = 200 Calories








Fiber One Cereal
100 grams = 200 Calories



Flax Bread
90 grams = 200 Calories



Dried Apricots
83 grams = 200 Calories



Jack in the Box Cheeseburger
75 grams = 200 Calories



Jack in the Box French Fries
73 grams = 200 Calories



Jack in the Box Chicken Sandwich
72 grams = 200 Calories





French Sandwich Roll
72 grams = 200 Calories




Blueberry Muffin
72 grams = 200 Calories




Sesame Seed Bagel
70 grams = 200 Calories




Tootsie Pops
68 grams = 200 Calories












Hot Dogs
66 grams = 200 Calories



Wheat Dinner Rolls
66 grams = 200 Calories



Corn Bran Cereal
60 grams = 200 Calories





Bailey's Irish Cream
60 ml = 200 Calories



Smarties Candy
57 grams = 200 Calories



Uncooked Pasta
56 grams = 200 Calories




Blackberry Pie
56 grams = 200 Calories



Cranberry Vanilla Crunch Cereal
55 grams = 200 Calories



Cornmeal
55 grams = 200 Calories




Wheat Flour
55 grams = 200 Calories



Peanut Butter Power Bar
54 grams = 200 Calories



Puffed Rice Cereal
54 grams = 200 Calories






Jelly Belly Jelly Beans
54 grams = 200 Calories




Puffed Wheat Cereal
53 grams = 200 Calories






Brown Sugar
53 grams = 200 Calories





Glazed Doughnut
52 grams = 200 Calories




Salted Pretzels
52 grams = 200 Calories





Medium Cheddar Cheese
51 grams = 200 Calories




Fruit Loops Cereal
51 grams = 200 Calories



Gummy Bears
51 grams = 200 Calories



Splenda Artifical Sweetener
50 grams = 200 Calories



Salted Saltines Crackers
50 grams = 200 Calories



Werther's Originals Candy
50 grams = 200 Calories



Snickers Chocolate Bar
41 grams = 200 Calories
Take note...don't always sleep late!!


Good rest and sound sleep is very
Important... if u don't sleep well,
The toxic in your body will accumulate..
Affecting your health and your mood...

The main causes of liver damage are:

1. Sleeping too late and waking up too late are the main cause.

2. Not urinating in the morning.

3. Too much eating.

4. Skipping breakfast.

5. Consuming too much medication.

6. Consuming too much preservatives, additives, food coloring, and artificial sweetener.

7. Consuming unhealthy cooking oil. As much as possible reduce cooking oil use when frying, which includes even the best cooking oils like olive oil. Do not consume fried foods when you are tired, except if the body is very fit.

8. Consuming overly done foods also add to the burden of liver. Veggies should be eaten raw or cooked 3-5 parts. Fried veggies should be finished in one sitting, do not store.



We just have to adopt a good daily lifestyle and eating habits. Maintaining good eating habits and time condition are very important for our body to absorb and get rid of unnecessary chemicals according to 'schedule.'


Because: Evening at 9 - 11pm : is the time for eliminating unnecessary/ toxic chemicals (de-toxification) from the antibody system (lymph nodes). This time duration should be spent by relaxing or listening to music. If during this time a housewife is still in an unrelaxed state such as washing the dishes or monitoring children doing their homework, this will have a negative impact on her health.


Evening at 11pm - 1am : The de-toxification process in the liver, and ideally should be done in a deep sleep state. Early morning 1 - 3am : de-toxification process in the gall, also ideally done in a deep sleep state.

Early morning 3 - 5am : de-toxification in the lungs. Therefore there will sometimes be a severe cough for cough sufferers during this time. Since the de-toxification process had reached the respiratory tract, there is no need to take cough medicine so as not to interfere with toxin removal process.
Morning 5 - 7am : de-toxification in the colon, you should empty your bowel.


Morning 7 - 9am : Absorption of nutrients in the small intestine, you should be having breakfast at this time. Breakfast should be earlier, before 6:30am, for those who are sick. Breakfast before 7:30am is very beneficial to those wanting to stay fit. Those who always skip breakfast, they should change their habits, and it is still better to eat breakfast late until 9 -10am rather than no meal at all. Sleeping so late and waking up too late will disrupt the process of removing unnecessary chemicals. Aside from that, midnight to 4am is the time when the bone marrow produces blood.

Therefore, have a good sleep and don't sleep late.

Labels: ,