Posts Tagged ‘use’
It is a little known fact that Windows 7 doesn’t use the entire available RAM by default. For example if you have 8GB of RAM and a 64-bit Windows 7, it will use around 7.1GB of it (in the case of 4GB of RAM and 32-bit Windows 7, it will use around 3.5GB). The reason for this behavior is not completely known, but it is quite possible to alter it – to force Windows 7 to use all available RAM.
How do we do this? First, open the Start menu and enter msconfig in the start search box:
and hit Enter. The System Configuration window will open:
Navigate to the Boot tab:
Click the Advanced options button. A new window will open:
In the BOOT Advanced Options window check the Maximum memory option:
Click OK to close the boot options dialog and another OK to close the System Configuration window.
Restart your computer for the changes to take effect:
1. Choosing a strong password is vital for services like e-mail, IM, World of Warcraft, etc.
2. Never reuse passwords. Especially a password that you use for “important” accounts. You can define “important” yourself.
While the second is pretty much impossible to enforce onto users, the first one is actually pretty easy. Many sites nowadays have password evaluators of some sort, but most of the restrain themselves to just pointing out “Your password is weak”. Well of course my password is weak, it’s “password”. However, Hotmail just changed the rules, ladies and gentlemen. From “please use a stronger password” to “no stronger password – no account” Hotmail apparently plans to take the matter of password security in its own hands.
Apparently Microsoft plans to enforce strong passwords on users, by denying them the right to create new Hotmail account until they enter a strong password for it. Passwords like “password”, “123456” are no longer accepted (as it should have always been). This concept is taken even one step further by discarding passwords made up of phrases like “ilovestuff”, “funnydogs”, etc. Changing a password will also require the new password to be a strong one. Some believe that this rule will be extended to existing users as well, by forcing them to change their password at login.
A quick look at the reports of the last few attacks on corporations reveal that, the main reasons for their success are weak passwords and password reuse. Apparently Microsoft has managed to learn something from these attacks and plans to put it to use.
In conclusion, in my own opinion, enforcing strong passwords should be accepted as a policy for all “important” web services and it should become a vital part of any organization’s policy. Sure it’s annoying, but believe me, recovering your e-mail or being responsible for company losses aren’t better.
Run applications in Administrator mode from the Start menu recent items and Start menu search box in Windows 7
By default, if you run an application in Windows 7 it will not run in Administrator mode (will not have Administrator rights). To run an application as an Administrator you need to right-click on it and select Run as administrator: Read the rest of this entry »
How to temporarily lock your PC after a given number of incorrect password entries in Windows 7 using the command prompt
Are you worried that your Windows 7 login password is easy to guess and that it is possible to crack it only after a few attempts? Well if you are I have two things to say to you. First, change your password. I know you have probably heard it a thousand times, but having a “smart” password is essential these days. You won’t feel comfortable if a thousand other people unlocked their front doors with a key identical to the one you use for your own front door, would you?
The second thing I have to say is, why don’t you at least lock your PC after a few incorrect entries? Surely this will make the password guessing process a lot longer.
Note: It is a good idea to have a second administrator account which you can use to unlock your PC. Just in case someone decides to do a trick on you.
Note: In case of physical access to your PC this will not slow down the use of System Rescue CD, Ultimate Boot CD or Ubuntu Live CD for resetting your password.
First, open the Command Prompt under Administrator Mode.
To do that, open the Start menu, type cmd in the search box:
Read the rest of this entry »
Many users think that Firefox 3 is way too slow and takes up way too much RAM. Well I partially agree with them. Still, there are certain tweaks that may modify the behavior of Firefox so it will use less memory.
For example, Firefox stores a certain number of pages in its memory (therefore in the RAM) to speed up the Back and Forward features. It is possible to modify that number. This may slow the browsing a little bit, but will limit the memory Firefox uses.
First, open Firefox and open a blank tab. Enter about:config in the Address Bar and press Enter:
Read the rest of this entry »
I never got used to using the new Windows 7 feature called Libraries. To be honest I find them quite pointless. Apart from the indexing feature which allows you fast searches, they have no other use. Not to mention that they fill way to much space in the navigation pane of Windows 7 Explorer. So, let’s hide them. Read the rest of this entry »
Namespaces can be considered as abstract containers that hold different entities – functions, variables, classes and objects. Since C++ provides a single global namespace, without the use of user defined namespaces the chances of global name clashes is pretty big.
Consider the following situation.
We wish to use to different libraries and include them like this: Read the rest of this entry »
In this tutorial we will demonstrate you something that most of you may need to use just for a few times in their Linux experience but will be very glad that such functionality exists. Others, like me, are so used to get everything through a proxy that I have actually forgotten what was without it. Anyway in case one day it happens that you find yourself in a corporate network and for example Pidgin fails to log you in ICQ as a new version of the ICQ protocol has emerged. A quick pacman -Ss pidgin fails right away if the network is build up fine. For such cases after you finish reading this tutorial you will know how to configure pacman for using proxy with authentication.
There are few general methods to make pacman use a proxy. Most common are to enable the proxy via wget or curl. I do not know why I never liked curl so I will show you how to do it only with wget. This actually will make pacman use wget as application for download and on the other hand we will setup wget to use the proxy. If you would need to download andything else with wget then you will be able to do it right afer we finish with the tutorial.
Ok the files that you will need to edit are two. First one and most important is /etc/wgetrc and second one is /etc/pacman.conf.
Here is what you need to set in wgetrc. Read the rest of this entry »
In the first part of our LVM tutorials we have shown general information about LVM (Logical Volume Management) concept and the management of physical volumes. If you have not read the first part of this tutorial we recommend you to check it out here.
The volume group creation process will add the physical volumes to the virtual storage.You could use one or more disks/partitions, but you could have only one volume group per partition.
Single drive example: Read the rest of this entry »