Posts

Showing posts from August, 2010

What is the Registry?

The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

Change Text on XP Start Button

Step 1 - Modify Explorer.exe File In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

Use Google Push on your iPhone to cut your text message bill down.

Google's "Google Mobile" app for iPhone now supports push notifications of emails. Combine this with Google Voice, and you can send/recieve text messages very easily and for free - just set up Google Voice to email you when you get a text message. Replies come instantly in the form of a push notification. You can reply to the email it sends you, and it'll reply as a text message. Just make sure that you remove the quoted reply and your mail signature. * If you only want push notification for texts and not all emails, make a new gmail account just for texts and tie your Google Mobile app and your Google Voice account to that gmail account. * Steps to enable this: make a gmail and a google voice account if you don't have them already download Google Mobile to your phone add your gmail account to Google Mobile enable email alerts set up your gmail to come to your phone if it isn't already (those making separate gmail accounts just for this: you ...

Backtracking EMAIL Messages, Tracking email back to its source:

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.

Suggestions please!

I have been writing alot of Apple related articles lately. I do apologize. This Is a an all around tech tips blog. I have been surrounded with alot of apple products and users for the past couple of months. I would like to post a variety of articles. So please leave some suggestions for topics or questions you would like answered. I look forward to hearing your suggestions.

Beginner: Deauthorize All Computers Associated with Your iTunes Account

Image
If you have had several different computers over the years that were running iTunes and authorized for your account, you might need to deauthorize them all. In this mini how-to we show you how. If you’ve authorized 5 computers over time to your iTunes account, you will see the following message when you try to download an app or song from the iTunes Store.

Reset your Mac password w/out Installer Disc

Image
So you forgot your Mac password… uh oh. Don’t worry, it happens and you aren’t out of luck. You’ll need to reset the forgotten password and there’s several ways to do this, we’ll focus on the two best methods; one does not require a Mac OS X installer CD and is a great hack, and the other is much more simple if you happen to have a Mac OS X DVD laying around.

Be careful of who repairs your computer!

People please be careful who you take your computers to. They have unrestricted access to your personal information. Always take your computer to a reputable technician. Below is a true story of a rogue technician that was stealing personal data form his customers. Dont let this happen to you.  A laptop repair man who was caught copying private photos and bank passwords in an undercover investigation has been jailed for nine months

Understanding the Blue Screen of Death (BSOD)

Image
 you get a Blue Screen of Death (BSoD), your first inclincation may be to turn of your computer, turn it back on again and hope if never comes back. Sometimes, this is a good option because the blue screen may have been a freak accident and, because the stars aligned that one time, may not happen again. However, if you receive more than one blue screen, I suggest you take some time to diagnose the issue and try to come to a resolution. In this guide, I’ll show you what each part of the blue screen means, how to diagnose the problem, and where to go for help when you’re not sure what to do it.