Category Archives: Windows Tips
Some newer games, such as PES 2009 and GTA 4 require a lot of system resources and a higher-end PC to run. Even when your PC meets those requirements, sometimes the games run slowly and the graphics shows glitches because of some other resource hungry processes interfering with your game. The post will introduce a solution to this problem.
Every program you run, and some that automatically run in the background, create processes that may consume memory that interferes with your gameplay. To terminate those processes open Windows Task Manager by pressing CTRL-ALT-DELTE.
After the Task Manager shows up, click on the “Processes” Tab. If you have not previously cleaned some unused startup items using STARTER or another startup manager, you might find there are a whole lot of resource hogging processes. Now sort the processes according to “User Name” by clicking on the header of the “User Name” column.
All of the processes belonging to your user name except “explorer.exe” can be ended by highlighting the process and clicking “End Process” at the bottom-right corner of the Task Manager. Click yes to confirm.
Now, run your game. Afterwards, pause the game and use ALT-TAB to return to the desktop. Open Task Manager again using CTRL-ALT-DELTE. Go to the “Process” tab again, and find your game process. The name should be same to the game executable. For example, Pro Evolution Soccer 6 would be “pes6.exe”.
Right click on that entry, then “Set Priority” and click “Real Time”. That should make the game run as fast as possible that your PC can allow. Enjoy playing your games faster!
Note: If you terminate the wrong process(es), just do a force reboot, and the processes will rerun themselves.
iPhone’s success might be partly due to the vast array of imaginative and entertaining software for that platform, so Microsoft are doing the best to persuade the community to make software of iPhone in the form of a “Windows Mobile Software Contest” that is going to be held worldwide. This means that Microsoft are eager to excavate new software for the Windows Mobile.
A successful program should achieve a balance among the following aspects: creativity, functionality, aesthetic design, interface operation, usability and entertainment factors. It is suggested that team members may divide their respective roles as below: (It is not a must to have all these roles in a team)Ø Playwright: Create characters and arrange the storyboard.Ø Research: Collect and consolidate information the program requires.Ø Interface Graphic: Arrange interface elements and design graphics.Ø Programming: Determine data structure, program code and server.Ø Debugging: Testing and debugging the program and suggest improvements.Each team is required to appoint a team leader. The team leader will be the only eligible person to claim any prizes of this Contest. The Organizers will not be involved in any prize assign issues within the team.
I’m sure some of the people who read this post follow “Welcome to the Underground” Blog and maybe other blogs by Twitter. However, did you know that some hackers send false Twitter invitations to lure people into installing spyware or downloading viruses?
Ever since Twitter became the major channel for information spread by Iran presidential election protestors, its popularity has rocketed upwards. Even the news of the Phoenix discovering ice on Mars was first announced on Twitter. However, all good things have a bad side. Cyber criminals are now sending false Twitter invitations to prompt installation of Trojans and virus worms!
From the format and content, the false invitations looks like that it’s a real one sent by the Twitter official site. However, if you look at it closely, you’ll find that the false invitation does not have the “inviting” link in contrary to the real invitations. In its place is a link that downloads a file called “invitation.zip” in the background that you cannot control, and lures the people who are considering joining Twitter into downloading the virus contained in the “invitation.zip”.
The virus in that zip file has been identified as a worm” W32.Ackantta.B@mm” by ESET nod32 antivirus (it’s definitelyNOT an email address!). This worm earlier appeared in February’s invitation card attack, which collects email addresses from the infected computers, and copies itself to those multiple addresses (this is how it’s supposed to work, but it’s usually blocked 90% by stronger av programs such as ESET or AVG).
I remind readers to upgrade their antivirus and communication software to prevent getting infected.
Share this Post
All right. Spam is rogue and unauthorized email that lures you into providing personal and private information, such as your job, credit card number, ID number by making you believe that you are about to win something that you would like, e.g. a car, money, or a gift of some kind.
Yesterday, I received this spam email, and had to laugh at the falseness of it. However, some novices might be tricked, so that I am going to quote it here.
From The Desk Of Ben Coroma. The Head Of File Department,
African Development Bank (A.D.B).
Ouagadougou Burkina-Faso West Africa.
Forgive my indignation if this message comes to you as a surprise and may offend your personality for contacting you without your prior consent and writing through this channel.I got your contact from the proffesional data base found in the internet Yahoo tourist search.When i was searching for a foreign reliable partner.I assured of your capability and reliability to champion this business opportunity. After series of prayers/fasting.i was divinely directed to contact you among other names found in the data base Yahoo tourist search.I believe that God has a way of helping who is in need. I am (Ben Coroma,the Head of file Department in African development bank (ADB).
In my department we discovered an abandoned sum of $15 million U.S.A dollars ( fifteen million U.S.A dollars) . In an account that belongs to one of our foreign customer who died along with all his family in the Asia Earth Quake Disaster (TSUNAMI DISASTER IN INDONESIA/INDIA http://www.cnn.com/SPECIALS/2004/tsunami.disaster/ .All of his Family lost there lives in the Disaster. Since then I have made several inquiries to his Country embassy to locate any of his client’s extended Relatives, this has proved unsuccessful. After these several unsuccessful attempts, unfortunately we learnt that all his supposed next of kin or relation died along side with him at the TSUNAMI DISASTER IN INDONESIA/INDIA leaving nobody behind for the claim. It is therefore upon this discovery that I and one official in my department now decided to make this business proposal to you and release the money to you as the next of kin or relation to the deceased for safety and subsequent disbursement since nobody is coming for it and we don’t want this money to go into the bank treasury as unclaimed bill.
The Banking law and guideline here stipulates that if such money remained unclaimed after five (5) years, the money will be transferred into the Bank treasury as unclaimed fund. The request of foreigner as next of kin in this business is occasioned by the fact that the customer was a foreigner, and a Burkinabe cannot stand as next of kin to a foreigner. We agree that 40% of this money will be for you as foreign partner, in respect to the provision of a foreign account,and 60% would be for me and my woman colleague. That means ($6 million) six million dollars for you,and ($9 million) nine million dollars for me and my partner.There after i will visit your country for disbursement according to the percentages indicated.
All I require is your honest cooperation to enable us seeing this deal through. I guarantee that this will be executed under a legitimate arrangement that will protect you from any breach of the law. Please consider my official positions, reputation and integrity, especially, the opportunities in the business itself, it is very necessary that all due care be taken so that we do not miss the opportunity due to carelessness. You are therefore expected and advised to display high degree of maturity, responsibility and understanding in handling this information. I will give you all the details in my next mail when you have indicated your interest and commitment to work with me. Always remember that this is the highest confidence and trust any person can repose on the other, especially when it is considered that we did not know ourselves I hope you will honor me too. I will come over to join you in your Country for disbursement when the funds hit your account. More so for an effective and easy communication I will advice that you furnish me with your telephone and fax number.Upon receipt of your reply, I will send to you by fax or email the text of the application I will not fail to bring to your notice that this transaction is hitch free and that you should not entertain any atom of fear as all required arrangements have been made for the transfer.
Ben Coroma. FROM (ADB) OUAGADOUGOU BURKINA-FASO. GOD BLESSINGS,PROTECTIONS AND GUIDIANCE TO YOUR ENTIRE FAMILY. (FILL THIS FORM BELLOW PLEASE AND RESEND IT TO ME). 1) Your Full Name……………………….. 2) Your Age………………………………… 3) Marital Status………………………….. 4) Your Cell Phone Number………….. 5) Your Fax Number………………….. 6) Your Country………………………….. 7) Your Occupation………………………. 8) Sex………………………………………… 9) Your Religion…………………………… 10) Your Private E-mail Adress……….. POST SCRITUM: You have to keep everything secret as to enable the transfer to move very smoothly in to the account you will prove to the bank. please write back with my private email adres firstname.lastname@example.org .
All right, that’s quite absurd, isn’t it? Well, in the financial crisis, my family could really make good use of $6 million, but of course I didn’t believe it. Here are some ways to spot spam email.
- Having “Urgent” or “Emergency” or something similar in the title.
- Not having your name in the email (a legal bank would really have to know your name to do a deal right?)
- Comes from an unknown host, however this does not happen in this case.
- Requires you to fill in personal information.
Share this Post
With the release of Crysis for PC only a few days old, we found the complete game ending for you to watch. Be warned! This is and will always be a spoiler!
Enjoy! (Take a break from reading)
Since Demonoid is down, once again… *sigh*… I, Voltaire, want you to know where to go to get your torrents.
However, my favorite is Torrent Search Engine Searcher. Yes, long redundant-sounding name. Heres the deal: Its a search engine that uses the search engines of many other torrent sites. Its real name is TorrentScan. All I will say is you can access The Pirate Bay, Mininove, Isohunt, and many other popular torrent sites from this site.
Alright, This is Voltaire once again with a “how to get free stuff” report. Those of you that have read my previous get a free iPhone article know what sticklers we are for free things. Well, I have found a really good site. Yes, it has iPods, iTunes cards, Wii games and extra Wii parts, xbox 360’s, HALO 3 (YES FOR FREE), xbox parts, xbox live cards, PS3’s with games and parts, music, DS’s with games, PSP’s with games, and much, much more!
And heres the deal: you dont need a credit card! Most of the offers available do NOT need a credit card. All you have to do is complete a little survey or sign up an account but you wont need a credit card. of course, for those of you that are willing to spend a few bucks, there are credit card and cell phone offers to be completed.
So, how do you get points? complete offers! or tell you friends to help you out.
Want to sign up? well, i didnt mention a link or a set yet.
So there it is! Click above to sign up and start getting free things!
(They have the Touch, so you better hurry!!!)
The site is reliable, and credits add up instantaneously. You will not have any problems!
Ignore the title. It will bore you, scare you, even make this article seem terrible.
Of course, we like to tell you what you are reading about.
So, feeling crowded? Looking for that extra space? Have just too many darn windows open and need to use all of them?
“Vern allows you to have many programs running at once with each occupying its own Virtual Screen. Vern displays a representation of each of the Virtual Screens in its selector, which, in total, we refer to as VernSpace. A mini window on the surface of the Vern selector is a representation of the actual program in VernSpace.”
Basically, VERN “results in a cleaner looking desktop and can actually speed up the look and feel of Windows.” Anything in the VERNSpace not used is not active and does not require as much physical memory. The programs not used but running are not redrawn. what does that mean? well, your computer spends a short time on doing everything. for example, 10 millisecond (ms) on program A, 10 ms on B, 10 ms on C, etc. till you go back to program A. then the loop repeats with minor modifications. as such, something not used in the VERNSpace is not redrawn and is partially skipped in the loop. Vern’s use of memory is minimal, for real.
I use this thing all the time, and its really amazing. much like Launchy from our earlier posts, VERN holds a space in our hearts as one of the top programs to use on your pc.
Click here to go to VERN
This is a program that I have been using for years called CCleaner. What it does is it cleans up your hard drive by removing temp files, bat files, internet files, and the like. Also, it has a built in registry cleaner. Ok, I don’t know how well this registry cleaner compares to Registry Mechanic, but I never had a problem with it.
Here is what the program can do for you.
CCleaner is a freeware PC optimization tool.
It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner!
CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space.
The best part is that it’s Small, Fast and Free!
Cleans the following Windows components:
* Internet Explorer
– Temporary File Cache
– URL History
– Hidden Index.dat files
– Last download file location
– Temporary File Cache
– URL History
– Download manager
* Recycle Bin
* Windows Temporary files
* Windows Log files
* Recent Documents (on the Start Menu)
* Run history (on the Start Menu)
* Windows XP Search Assistant history
* Windows XP old Prefetch data
* Windows memory dumps after crashes
* Chkdsk file fragments
Advanced Options allow cleaning of:
* Menu Order cache
* Tray Notifications Cache
* Window Size and Location Cache
* User Assist history
* IIS Log Files
* Custom Folders
As well as cleaning up old files and settings left by standard Windows components, CCleaner also cleans temporary files and recent file lists for many applications. Including:
* Firefox, Opera, Safari, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat Reader, WinRAR, WinAce, WinZip and more…
CCleaner uses an advanced Registry Cleaner to check for problems and inconsistencies. It can check the following:
* File Extensions
* ActiveX Controls
* Shared DLLs
* Help File references
* Application Paths
* Invalid Shortcuts and more…
CCleaner was designed from the ground to be safe and secure to use. It has multiple levels of checks in place to ensure that it cannot delete any useful information or documents you may still need. We also certify that it contains no Spyware or Adware.
For the super cautious users we also offer secure file erasing. By overwriting the files before deleting them, making it impossible to recover the data.
Thanks to the translators, CCleaner is available in 35 different languages:
English, Albanian, Arabic, Bosnian, Bulgarian, Catalan, Chinese (Simplified), Chinese (Traditional), Czech/Slovak, Danish, Dutch, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Portuguese (Brazilian), Romanian, Russian, Serbian Cyrillic, Serbian Latin, Slovak, Spanish, Swedish and Turkish.
Find the program at www.ccleaner.com
Do you have an extra PC lying around? How about turning it into a badass DVR machine? DVR stands for digital video recorder. Forget Tivo, forget DVD recorders, forget VCR’s. The beauty of your own personal DVR is that you can tell it to sync up with the web, and record tv shows that you want!
There are a bunch of open source programs to help you manage, like mediaportal is one. Sage TV and beyond tv are programs you have to pay for, but they do an excellent job also.
Go to this link at lifehacker that goes more into detail about turning your PC into a DVR machine.
Good read for techies.