background preloader

20 essential PC shortcuts

20 essential PC shortcuts
I've always liked that Windows gives me multiple ways to perform popular tasks. Say you want to print something. You could go to the File menu and select the Print command, or you can press the Ctrl button and the letter P. Ctrl+P is just one example of a keyboard shortcut. Shortcuts combine two or more keys to do something special that neither key does alone. I prefer to use shortcuts whenever possible. Get to know the basics There are certain shortcuts I use all day, every day. Copy a selected item: Ctrl+CCut a selected item: Ctrl+XPaste a selected item: Ctrl+VUndo an action: Ctrl+ZRedo that thing I just undid: Ctrl+YSelect everything: Ctrl+APrint: Ctrl+P Manage open windows Chances are, you use your PC to do a lot of things at once. Switch between open windows Alt+Tab If you have lots of open windows and you're not sure exactly which one you need, press Alt+Tab, and get a quick thumbnail view of all open windows. Get even funkier with window management Manage tasks Display your way Related:  Windows

7 Social Hacks For Manipulating People 1. Whenever someone is angry and confrontational, stand next to them instead of in front of them. You won’t appear as so much of a threat, and they eventually calm down. 2. Open with “I need your help.” 3. 4. 5. 6. How to Disable Java in Three Common Browsers The ongoing security problems with Java mean that many people will want to disable the Java plug-in for their web browsers. Here is how to do it for the most common browsers. Google Chrome In the Chrome address bar enter: Find the entry for the Java plug-in and click “Disable” Firefox Open the Firefox menu Click “Add-ons” On the left side of the Add-ons manager that opens, select “ Plugins” Click “Disable” by the entry for Java Firefox may have already done the disabling automatically Internet Explorer Disabling Java in the various versions of Internet Explorer (IE) is more complicated than it seems at first. Get your own favorite tip published! This tips section is maintained by Vic Laurie. Click here for more items like this.

Just Delete Me | A directory of urls to delete your account from web services Can't find what you're looking for? Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. show info... hard You have to call them in order to delete your account. Log in to your account and click the top-left link to 'Member Preferences'. Despite what it says in their FAQ there is actually no automatic way to delete your account. Follow the link to edit your profile and click cancel account at bottom. Just head to the account page and click the red button 'Delete your account' at the bottom left of the page. To close your account, contact Amazon by email (via this contact form) and request that your account be closed. You must login before visiting the link. impossible We do not 'delete' or 'terminate' accounts on ACC. Remove all applications and services from your account, then request deletion by emailing customer services. Response from support@argylesocial.com: We really don't have a way to delete accounts entirely. medium

80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack

Turn Your Home Router Into a Super-Powered Router with DD-WRT Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better. What Is DD-WRT? Here’s our router. DD-WRT is an open-source alternative firmware for routers. Router Support Turning your home router into an almost professional-level tool is a great project that has one major caveat: support. For our purposes, the important spec to consider is NVROM, or ROM. Preparation The most important thing in any project is research. The friendly forum gave us some useful info for our particular model. The Process

50 Life Secrets and Tips Memorize something everyday.Not only will this leave your brain sharp and your memory functioning, you will also have a huge library of quotes to bust out at any moment. Poetry, sayings and philosophies are your best options.Constantly try to reduce your attachment to possessions.Those who are heavy-set with material desires will have a lot of trouble when their things are taken away from them or lost. Possessions do end up owning you, not the other way around. Become a person of minimal needs and you will be much more content.Develop an endless curiosity about this world.Become an explorer and view the world as your jungle. Read “Zen and the Art of Happiness” by Chris Prentiss.This book will give you the knowledge and instruction to be happy at all times regardless of the circumstances.

Forty Ways To Free Up Disk Space By Bill Shadish Published in TechRepublic's Windows Support Professional (TechRepublic.com) You've probably heard the Paul Simon song "Fifty Ways to Leave Your Lover," which describes a number of tricks for breaking free from an undesired relationship. This article places a spin on the concepts used in that song. No, I can't guarantee that simply by reading this article you'll meet that special person. A simple lack of disk space is the most common disk-space problem. Figure A: Having no available disk space is a sad situation. On This Page What junk to go after Manually deleting unwanted programs Manually deleting unwanted files Manual file compression Controlling application parameters Disk compression Cleanup Defragmentation Conclusion What junk to go after You have several means of gaining back disk space on a Windows system. I'll detail each of these topics more thoroughly as we go along. Manually deleting unwanted programs Manually deleting unwanted files Cleanup

The 34 Simple Two-Ingredient Recipes | Crazy Food Posted by admin on May 22, 2013 in Recipes | 0 comments Cooking doesn’t get much easier than this. BTW, these are mostly desserts. I hope you’re OK with that. I know that you will enjoy in this amazing food tricks. All these food ingredients are amazing and with them you will enjoy in delicous food. 17 Portable Apps to Help Troubleshoot PC's Are you the one that your friends and family call every time they have a problem with their computer? Put these tools on your USB thumb drive and troubleshooting will be that much easier. Please feel free – encouraged even – to suggest other helpful, portable troubleshooting apps. AutoRuns (startup monitor) The most comprehensive tool for info on auto-starting locations of any startup monitor/utility. Avira UnErase (file recovery) File Recovery tool for Windows 2000 and XP. CCleaner (PC optimization) The popular PC optimization and privacy tool has a Portable Edition that you can download and install on your USB thumb drive. ClamWin (anti-virus) Following the instructions found here, you can carry the open-source anti-virus software ClamWin on your USB pen drive. DBAN (secure disk eraser) DBAN is a self-contained boot disk that securely wipes the hard disks of most computers. JkDefrag (disk defrag) K-MAC (MAC address changer) Useful for network troubleshooting. Restoration (file recovery)

create your own font from your handwriting This is a cool little 10-15 minute activity that will keep on giving back to you for years to come. That’s right add that final customizing touch to your Windows, Linux or Mac machine – Your handwriting as a font! With some free time a visit to a website called YourFonts.com, a scanner and a printer you can create a font for use in any application on your computer. To me this sounded way too cool to pass up. I went and downloaded the printable template from here and carefully followed the steps. The template looks like this: You print it out and add your letters to each corresponding box. So if you just wanted to have a font contain numbers, letters or characters just fill in those. I was pretty excited, I grabbed a sharpie and went to work on my page. Now I messed around with the scanning properties and decided to use the grey scale you see above at 200dpi. Most scanning programs can save as for you. I filled in the fields uploaded and then waited about a minute to be show this:

21 Incredibly Important Diagrams To Help You Get Through Life Working with the Windows Registry (Windows 8, 7, Vista, XP) [Updated] | Windows 7 Customization In this guide, you will learn what the Windows Registry is, how to access and configure it, and how to backup and restore it. This guide covers the following: What is the Windows Registry? The Windows registry stores Windows settings, individual program settings, and other important configuration information about your PC. Access the Windows Registry Editor In Windows 8, 7, and Vista, press the Start button, type regedit, and press Enter In Windows XP, click Start > Run (Windows Key + R), type regedit and press Enter When the registry loads you will be presented with a screen that looks like the screenshot below. KeysSubkeysValues To find out more about the root registry keys, check out this guide: What Do HKCR, HKCU, HKLM, HKU, and HKCC Mean? Back up the Windows Registry You may back up the entire registry, or a single key you are working on: Back up the entire registry using System Restore Note: This method only provides recovery capabilities if a system restore is performed. Add a New Key

13 Hacks to Improve Your Google Search Even the king of all search engines can be throttled up with a few simple tricks. From finding flights to discovering new music, here are 13 ways to hack Google. Ever since the Internet's dozens of Web crawlers (AltaVista, anyone?) were whittled down to a single alpha engine, pinpointing your online destination has been a relative breeze. Type in “set timer for” followed by a number of minutes, or a specific hour you’d like an alert, and Google will graciously comply with an obnoxious beeping once the moment has arrived. Sometimes a memory lapse leaves you searching for the right word. To encompass a wider definition than you’re currently searching for, add a “~” in front of the word, and Google will pull up results from similar terms as well. Instead of slogging through your airline’s website, just type in your flight number and get an easy look at all the important stuff: flight status, times, terminal, and gate. Skip doing math in your head and punch in the units you want to convert.

Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password. However, you aren't finished.

Related: