You have uninstalled the program completly and are sure that no reference is left on your computer. What if there is still one left that you probably did not know about ? Every item that appears on the left side of the clock in the taskbar will be cached by windows which means that the icon of the program is still available on your system. Check this out by yourself by right-clicking the taskbar. Select properties from the menu and click on the customize button at the bottom of that screen. If customize is not active activated it by enabling Hide Inactive Icons.
One phenomenon can be observed every year when the summer begins. Many users report problems with their computers who behave strangely or even reboot unexpectedly. If you experienced this once you might already know what is causing this behaviour. Pc components become warmer than usual because the air is hotter which can lead to reboots and even damaged components.
Hard drives are critical components in every personal computer. They store the data that you are working with and a failure or defect could lead to data loss sometimes without the possibility of recovering the data. Backups are of course a good idea but monitoring the hard drives performance is another method to check if it is likely that your hard drives might be at the end of their life cycle.
Sometimes sites are not accessible maybe because they are moving to a new webserver, have problems with their hardware or simply get slashdotted / digged and can´t handle that many requests which leads to timeouts for the user. This happens of course most of the time when you desperately need the information on that website.
The context menu pops up when you right click an item giving you some options based on the extension of the file. You could for instance select to rename the file, open it, open it with, take a look at the properties and so on. The tip I´am explaining right now will be helpfull for instance if you perform an action over and over again while the command is not directly available from the right click menu.
This poll results did not came unexpected: 41% of all voters stated that they feared the death of net neutrality the most, followed by trojans and virii (17%), spyware, hackers and nothing (10% each), phishing (5%), spam (4%) and finally Worms with 3%.
This is an overwhelming result and I thought I explain the net(work) neutrality concept for the ones who do not know what it is. Internet providers do one thing, they provide access to the internet and make sure that you recieve all the data that you request. It does not matter if you surf to the website of a big company like ebay (amazon, microsoft) or to my blog (hehe, or even smaller websites). All data get the same treatment, none is preferred over the other.
Sometimes it´s the small changes that make a big difference. I´am writing a lot of articles as you all know and I find it sometimes hard to locate the cursor in my articles, especially when it is late in the evening and I´am tired. Vippy is a small utility that does only one thing: It changes the color of the cursor to red. Take a look at the image to see the difference. The great thing about vippy is that it should work in nearly all windows applications including Microsoft Word and Open Office.
I can see the first question coming up pretty quickly. Special shortcuts, what´s that ? I had some trouble finding a heading that describes tooler and I decided to stick with the description that the author of this nice little tool used. Tooler is able to create shortcuts in three locations: desktop, startmenu, programs menu. You can create eleven different shortcuts with it that might speed up things a little bit.
IceSword is a new contender for the title of the best rootkit revealing and removing program out there at the moment. It is rather hard to find a working download of IceSword but as always I provide a fast way to download the latest version of Icesword named IceSword1.18.rar. Click the link to download the rootkit scanner from rapidshare. In contrast to other rootkit scanners like Blacklight Icesword can not be run automatically. Icesword only provides perhaps the most powerful utilities to scan your system for rootkits and other information.
You might have read about the google translate proxy that makes it possible for some to access blocked websites because the administrator did not think of blocking the translate function of google as well. What most people don´t know is that Google offers at least two additional services that can be used as a webproxy to bypass restrictions imposed upon you by your system administrator.
You have thirty days to activate a new installation of Microsoft Windows XP before it stops working until you finally activated the installation. Activation works this way that you have to provide an installation number to Microsoft either by internet or by phone. If you change hardware or install the operating system again you will have to activate the product again as well. This does not make sense in my opinion but hey, they surely have an important reason for this procedure.
Are you looking for a free lightweight alternative to Microsoft Word and Open Office ? Are you sick of endless loading times and office suits that occupy hundreds of megabytes of space on your hard drive ? AbiWord might be worth a closer look if you answered those questions with yes. What´s so different about AbiWord that I would recommend it ? There are several reasons, first it is only about five megabytes in size which is a good prerequisite for a fast loading application.
I´ve written a large article about Coral CDN just a few days ago. Here is a short introduction for those who might have missed this article. Coral CDN caches websites, basically every website that one of its users opens for the first time. After caching this website is available for all other users of the network and is accessible by appending nyud.net:8080 to the url. Now, in this article I mentioned a firefox extension which appends the nyud.net:8080 extension automatically to your links but what about the people who may not use firefox ?
P2P is in the news, every day. You see organizations like the RIAA hunting down fileshares, you read about trojans and virii that are spread through P2P networks. Everything seems rather risky at the moment. A new player is emerging from the shadows which is using a very old communication system, the Usenet. You might know a part of the usenet if you ever read something from google groups. Google Groups is an archive of the part of the usenet that looks similar to bulletin boards.
If you are looking for a fast lightweight alternative to Adobes heavyweight pdf reader you might want to try foxit reader. A new version of foxit reader has been released a month ago and I decided to give it a try. Mainly because of the positive comments about it whenever I wrote an article about the Adobe Reader. So, why would someone want to use foxit reader 2.0 instead of the "official" pdf reader by Adobe ?
I´am not sure if most of you will like this article or not. My second computer was an Amiga 500 which I used almost 100% for gaming. I loved many of the games that came out for that incredible machine and still yearn for some of them. I always wanted to play those games again but did not want to buy an Amiga because of several reasons. I don´t want to get into to much detail but it´s mainly a storage problem and a problem of availabilty. Sure, you can buy some cheap amigas on ebay and probably buy some games there as well, but most of the games are hard to come by this days.
AntiVir is probably the best free antivirus software. It´s free for non commercial use and updates its virus definitions regulary just like in the professional version. The free version however has the habit to display a advertisment popup after each update, which normally means that you see this ad every single day. It is always the same ad and I don´t see a reason for this at all, once is fine but everyday ?
When I bought my first mp3 player years ago I had to somehow transfer the music from my cd collection to my computer. I was lucky enough to find CDex pretty fast and I stick with it since then. It offers everything that I demand from an CD ripper, it´s fast, it checks CDDB for album and title information and is able to save the music in many formats including mp3 and wav. All you need is the program itself and the dll lame_enc.dll which you can download from rarewares.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.