Name Change for the Blog

I’ve changed the name of my blog from Around the World (Sky is the only limit) to Random thoughts (Views here are personal)..!! To stand unique in the crowd the change over was needed. I wish everyone to support me for this name too. I will be updating my blog very frequently in the upcoming days.

Please let me know what should i improve in the blog

Thanks and regards

Your fellow Blogger @ WordPress


Google Malaysia Site DNS Hacked, Credit Claimed By ‘Team Madleets’ Hacker 1337

Google’s Malaysian site has been hacked and replaced with a splash screen giving credit to a group called “Team Madleets.” The normal site has been offline for several hours as of late Thursday afternoon and the page lists a series of handles that are ostensibly part of the team responsible. Updated with brief statement from the hackers below.

The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts.

The stamp at the top says ‘[!] Struck by 1337′, which is apparently a reference to an individual hacker within the group called 1337, who has recently (allegedly) performed hacks on domain registrars of several countries. A message on 1337′s Facebook page says “Google Malaysia Stamped By 1337″ and references the and domains. The only other indicator about who the group could be is a reference to them being Pakistani in origin.

The Madleets address leads to a Facebook page for the team that has the following message posted:

We feel we need to alert anyone, that we don’t hack any country tlds for example as a result of any kind of hate, We don’t hate anyone, We love all humanity, there is no obvious reason for stamping the tlds.
Least the reason is not any kind of hate.
Whatever the reason is we can’t explain except we love all of you.

The page info states that “MadLeets is a Ethical and 1337 White Hat Hackers Community. We are Anti Hackers , we teach how to protect yourself from getting hacked.”

Screen Shot 2013-10-10 at 3.43.54 PM

If the reasoning on the team’s Facebook page is accurate, then this is simply a matter of doing it because they can and not to make a political statement. A link placed in the source code of the pageleads to a music video for the artist Instrumental Core.  The music is auto-played on the site while visitors are there.

Google Malaysia was hacked back in July, along with several other Malaysian sites, by a group protesting the treatment of Bangladeshi workers in that country. One possible motivation for the group taking action now, if it is indeed not simply “exposing vulnerabilities” would be the Global Entrepreneurship Summit in Kuala Lumpur, which will be attended by Secretary of State John Kerry in lieu of President Barack Obama.

We’ve reached out to both the email address given for the team on the site and to Google. We will update this story if we receive a response from either side.

There’s not much reason behind it, only to prove that security is just an illusion. It does not exist.
We have no political intentions whatsoever, as you have already stated.
Regards, LeeT

7 Dangerous acts after a meal

1. Don’t smoke —- Experiments from experts proves that smoking a cigarette after meal is comparable to smoking 10 cigarettes (chances of cancer is higher)
2. Don’t eat fruits immediately — Immediately eating fruits after meals will cause stomach to be bloated with air. There fore take fruits 1 -2 hours after meal or 1 hour before meal.
3. Don’t drink tea—— Because tea leaves contain a high content of acid. This substance will cause the protein content in the food we consume to be hundred thus difficult to digest.
4. Don’t loosen your belt———- Loosening the belt after meal will easily cause the intestine to be twisted and blocked.
5. Don’t bathe———- ——- Bathing after meal will cause the increase of blood flow to the hands, legs and body thus the amount of blood around the stomach will therefore decrease, this will weaken the digestive system in our stomach.
6. Don’t walk about———- — People always say that after a meal walk a hundred steps and you will live till 99. In actual fact this is not true. Walking will cause the digestive system to be unable to absorb the nutrition from the food we intake.
7. Don’t sleep immediately—- ——– The food we intake will not be to digest properly. Thus will lead to gastric and infection in our intestine.

Windows 8 – Tips & Tricks

Windows 8 keyboard shortcuts

Knowing at least some of the Windows 8 keyboard shortcuts will make your Windows 8 experience much more enjoyable. Try to memorize these top Windows 8 shortcut keys.

  • Press the Windows key to open the Start screen or switch to the Desktop (if open).
  • Press the Windows key + D will open the Windows Desktop.
  • Press the Windows key + . to pin and unpin Windows apps on the side of the screen.
  • Press the Windows key + X to open the power user menu, which gives you access to many of the features most power users would want (e.g. Device Manager and Command Prompt).
  • Press the Windows key + C to open the Charms.
  • Press the Windows key + I to open the Settings, which is the same Settings found in Charms.
  • Press and hold the Windows key + Tab to show open apps.
  • Press the Windows key + Print screen to create a screen shot, which is automatically saved into your My Pictures folder.

Use a picture password to log into your computer

Windows 8 includes a new feature called Picture password, which allows you to authenticate with the computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords.

  1. Open the Windows Charms.
  2. Click Settings and then More PC settings
  3. In the PC settings window click Users and then select Create a picture password

Bonus tip: A four digit pin password can also be created and used to access your computer.

Zoom in tight

The Start Screen is full of nice, big, chunky tiles that represent all your apps. The tiles are easy to see in small groups, but what if you have hundreds of apps installed? Most will be hidden from view, unless you want to do a lot of scrolling. Enter the new semantic zoom feature. If youre using a touch display, simply squeeze the Start screen with two fingers to receive a birds eye view of your entire screen contents. And the feature is also available to mouse and keyboard users: Simply hold down the Ctrl button, and use your mouse wheel to zoom in and out.

Categorize your apps

Your Start screen can become a cluttered mess if you collect too many apps and other elements that have been pinned to the screen as tiles, so take advantage of built-in organization tools that let you divide everything into labeled groups.

First, drag all the tiles you want to assign to a single group to the far right-hand side of your Start screen in vacant territory; the OS should sequester the tiles together. Once you’re satisfied with your assembly, use semantic zoom (described above) to get a bird’s eye view of your desktop. Now right-click the group (or simply drag down on it) and select the “Name group” option on the left of the bar that appears below. Type in the name and enjoy your newly organized Start screen!

Startup items are now on task manager

You no longer have to run the MSCONFIG program to change startup items. Startup items now show up in a tab on Task Manager. Simply hit Ctrl+Alt+Del and select Task Manager. Click the “More details” tab at the bottom and find the Startup tab at the top.

Create a picture password

Using a picture password is a fun way keep your device secure while not having to remember a complex password. To enable it, press (Windows) + I to get to the settings charm. Click “Change PC settings” at the bottom right, and go to the Users tab. Under “Sign-in options” will be the “Create a picture password” button. This will give you the option to choose any picture, and then define three gestures anywhere on the image. Your gestures can be circles, swipes and clicks.

For example, to set a picture password for the image above, you could click on the highest palm tree, draw a circle around the island, and then swipe down from the lens flare in the upper right. Just beware: The direction of each gesture matters! After confirming it a couple times, your picture password will be set.

Boot to the desktop without an app

One of biggest complaints about Windows 8 is that it boots straight to the Start screenan annoyance for many committed desktop users. The Start8 utility helps you avoid this indignity (among other cool features), but you can actually boot straight to the desktop without installing anything extra.

Go to the start screen and type in “schedule” to search for Schedule Task in Settings. Click on Task Scheduler Library to the left, and select Create Task. Name your task something like “Boot to desktop.” Now select the Triggers tab, choose New and use the drop-down box to select to start the task “At log on.” Click OK and go to the Actions tab, choose New and enter “explorer” for the Program/Script value.

Hit OK, save the task and restart to test it out!

Shut down with one click

Windows 8 hides the Power button in the Settings menu, forcing a multi-step process just to shut down one’s PC. But thanks to a crafty shortcut trick, you can pin a Shutdown button right to the bottom of your desktop. Here’s how.

Create a shortcut on your desktop (right -click, go to New, then Shortcut). Enter “shutdown /s /t 0″ (with no quotes, and, yes, that a zero not an “O”) as the location of the item, and hit next. Now name the shortcut (prefereably “Shutdown”) and hit Finish.

Right-click the shortcut and navigate to Properties. Choose “Change Icon” in the Shortcut tab, and OK out the warning box. Choose an icon of your choice from the list. In the screenhot above, you’ll see we chose a Power button.

Right-click the shortcut again and select “Pin to Start.” You can place the icon on your Start screen wherever is convenient. Hitting it will instantly shut down your computer.

Sachin Ramesh Tendulkar


“I have decided to retire from the one-day format of the game. I feel blessed to have fulfilled the dream of being part of a World Cup wining Indian team. The preparatory process to defend the World Cup in 2015 should begin early and in right earnest. I would like to wish the team all the very best for the future. I am eternally grateful to all my well-wishers for their unconditional support and love over the year” These are the words spoken by Sachin Ramesh Tendulkar the legend in the game cricket.  Which shook the entire nation today (23/12/2012) May be the Mayans would have predicted this as the end.

He is considered the most complete and successful batsman in modern cricket and one who was considered next only to the legendary Sir Donald Bradman, retires from the ODI format at the top of the run-getters’ list with 49 centuries in this format.

He made his ODI debut against Pakistan way back in 1989 and interestingly he is quitting the scene just ahead of another series against the arch-rivals.

His last ODI hundred came in the Asia Cup in Bangladesh in March this year — a feat that completed an unprecedented 100 international tons.

Born: Apr 24 , 1973, Bombay

Age: 39 years 8 months

Team: India, Mumbai Indians

Batting Style: RHB

Bowling Style: RAB

Test Debut: vs Pakistan -Nov 15-20, 1989

ODI Debut: vs Pakistan -Dec 18, 1989

Twenty20 Debut: vs South Africa – Dec 1, 2006

Sachin Tendulkar’s Batting Averages

CL 7 0 0 126 48 -126 96.92 0 0 17 2 72 0
IPL 63 34 2 2030 100 65.48 118.23 1 12 254 24 638 0
ODIs 463 452 41 18426 200* 44.94 86.22 49 96 2016 195 134 0
TEST 193 320 28 15645 248* 53.76 54.04 51 66 2023 67 104 0
Twenty20 1 40 0 10 10 10 83.33 0 0 2 0 1 0

Sachin Tendulkar’s Bowling Averages

CL 7 0 0 0 0 0 0 0 0
IPL 63 36 58 0 0 9.67 0 0 0
ODIs 463 8054 6850 154 5/32 5/32 44.48 5.1 52.3 2 0
TEST 193 4186 2459 45 3/10 3/14 54.64 3.52 93.02 0 0
Twenty20 1 15 12 1 1/12 1/12 12 4.8 15 0 0

“It seems while Time was having his toll on every individual on the face of this planet, he excused one man. Time stands frozen in front of Sachin Tendulkar. We have had champions, we have had legends, but we have never had another Sachin Tendulkar and we never will.”22-sachin-tendulkar100-ton-2

We Miss you hardly Sachin…. If Cricket is a Religion… You are “ The God“.

How to think logically in programming to develop logic

How to think logically?

This is the question in every beginners mind because Logical thinking is essential for every programmer. The students, who are into programming and learning it, should be capable to think logically but basically most of the beginners suffer a lot to think logical and improve logical thinking skills. In this post I will explain you about how to think logically while programming in order to develop logic for certain program.

What is logic? 

Logic is a small code snippet or the part of a program which consists of set of instructions to solve the given problem. Logic of the program consists of the actual statements which are to be executed by the computer in order to solve the problem. The logic for solving a problem is developed using set of instructions and embedded them in a program by following the rules of writing a program.

How to think logically in Programming?

Every programmer should think logically in order to develop logic for a program but the problem arises here is how to think logically? So in order to think logically we should learn how logic will work and how to develop logic for a program.

How to develop logic? 

To develop logic for a program we should be capable of thinking logically. Only a logical thinker can be capable of developing logic for a program but most of the programmers and beginners struggle a lot in order to improve their logical thinking skills.

Points to remember while thinking logically

  •  Feel you are talented than computer (Which is the truth)
  • Recall all programming concepts that you have learnt.
  • Imagine yourself that you are the machine.

Feel you are talented than computer (Which is the truth)

Always feel that you are talented than computer. This will increase your confidence level because computer cannot understand anything unless we write a code for it. We will write logic for a program to solve a particular problem using computer so without our logic a computer cannot solve any problem. A computer is in need of our logic to solve a particular problem. The computer works only on the basis of the code we write to it. This code is nothing but the logic for a program so what you say now? We (the code developers) are talented? Or The Computer?

Recall all programming concepts that you have learnt.

Developing logic is nothing but using the available resources in a particular way to find the solution for the problem. So it is necessary for a programmer to learn all the programming concepts and recall them while developing logic for a particular problem. Developing logic for the code becomes easy only if we have a good command over all the programming concepts because concept is the king in logic development without knowing the concepts, you cannot develop logic for any code. So first learn the concepts in programming and recall all those concepts while developing the code then you would become the king of the programming world.

Imagine yourself that you are the machine.

For a while, forget that you are a human being and imagine that you are a machine so as a feature of a machine that it can’t understand anything on its own. If a machine can’t understand anything, then we will give some instructions for the machine in the form of program to follow them in order to solve a problem.
So by thinking in a machine oriented way, you can be capable to write logic for a program which is used by the computer to solve the problem. Machine oriented thinking is nothing but just forget everything and imagine that you cannot able to think anything. Just imagine that you are just like a MP3 player which plays/resumes upon the instructions given to them. So if you think that you are a MP3 player then you will move forward if you receive an instruction to move forward. You pause for while if you receive an instruction to turn pause. So by thinking in this way you can have grasp over how a machine will work and how to give instructions to a computer or a machine so that they are made to understand the work to be done.

How To Recover Data From a Dead Computer?

One of the most dreadful feelings that you can have is having a pc computer or laptop die that hadn’t been backed up recently; especially if you have valuable pictures, music, videos, documents or other files on it.

Where to start

Computers are complex machines and when they work right, they are fun to use – but when something goes drastically wrong, it can feel as if your world crashed down around you. If your hard drive is still in working order, there is a very good chance that you’ll be able to recover your pictures, music, videos and valuable documents (and other data) simply with another computer; a specialized cable, a screwdriver; and a little time.

To start off, your best bet it to get a specialized USB cable that can plug directly into your hard drive that you’ll recover from the dead computer. There are several types, and I’d recommend getting one that can handle both PATA (IDE) and SATA hard drives (the two most common used in consumer computers) as well as 2.5” (laptop) and 3.5” (desktop) hard drives. You can also use a hard drive dock or external drive cases as well – but personally I find the specialized USB cable to be the easiest and most flexible option.

Next, remove the hard drive from the dead computer. On desktops it is usually held in with four Philips screwdrivers and on laptops it is usually under an access panel on the bottom of the computer. Remove any cables and caddies that the drive may have – all you need is the bare drive. Then plug in the USB cable into the hard drive (and a power cable if it is a desktop drive – also provided with the USB cable kit) and then plug the other end of the USB cable into a working computer. The computer will then set up the drive ad an external storage device and voilà! you’ll now have access to the files on that drive (provided that the drive is not encrypted or using some type of security feature).
Where to look

OK, so the drive is now plugged into your computer and seen as an external drive, now what? You have several options. One option is to simply look for the files on the drive from the dead computer that you plugged into the USB port and copy them onto the working computer. This is my preferred method personally. I like to “brute force” my way through the drive with Windows Explorer (or a similar file browsing tool) and manually copy/paste the data from one computer to the other. Another option is to follow a Windows dialog box (that usually pops up when you plug in an external drive) and have it help you copy your data from one computer to the other. If you are manually choosing to “brute force it” personal data is usually stored by default in the computers operating systems “home directory” for users.
Common Locations

for home directories (wheretakes the place of the drive letter):

Microsoft Windows 95-Me\My Documents
Microsoft Windows 2000/XP/ -2003\Documents and Settings\
Microsoft Windows Vista / -Windows 7\Users\

Other “What ifs”

What if the files on the drives are erased? If they are, you can use a free recovery program such as Piriform’s Recuva to look for and (hopefully) restore the files. This simple, easy-to-use tool is terrific for recovering pictures from a camera’s memory card that have accidentally been erased as well!

What if the hard drive is the reason that the computer died (actual hardware failure)? If the hard drive is the part that caused the computer failure, then you may be out of luck. Yes, there are specialty recovery services that will pull apart the drives data platters and attempt to recover data (and they are usually successful – such services were used, for example, to recover data from the hard drives that were used on computers from the space shuttle Columbia after it broke apart in 2003) but such services are usually very expensive.
A word to the wise

Backup, backup, backup! Whether using one of the Internet based cloud services or a separate external hard drive – if you make it a habit of backing up regularly, chances are good that you’ll keep the loss of such a failure to a minimum if a computer fails. Of course one of the benefits of using cloud-based backup services is that you can have access to your pictures anywhere you have Internet access.
Summing it up

A computer that dies can be a loss – but don’t lose hope that your valuable pictures (and other stuff) are gone forever. With a little work, you can retrieve your data off the hard drives from a dead computer!

Structure of C language

The structure of a C program is a protocol (rules) to the programmer, while writing a C program. The general basic structure of C program is shown in the figure below. The whole program is controlled within main ( ) along with left brace denoted by “{” and right braces denoted by “}”. If you need to declare local variables and executable program structures are enclosed within “{” and “}” is called the body of the main function. The main ( ) function can be preceded by documentation, preprocessor statements and global declarations.


The documentation section consist of a set of comment lines giving the name of the program, the another name and other details, which the programmer would like to use later.

Preprocessor Statements

The preprocessor statement begin with # symbol and are also called the preprocessor directive. These statements instruct the compiler to include C preprocessors such as header files and symbolic constants before compiling the C program. Some of the preprocessor statements are listed below.

Global Declarations

The variables are declared before the main ( ) function as well as user defined functions are called global variables. These global variables can be accessed by all the user defined functions including main ( ) function.

The main ( ) function

Each and Every C program should contain only one main ( ). The C program execution starts with main ( ) function. No C program is executed without the main function. The main ( ) function should be written in small (lowercase) letters and it should not be terminated by semicolon. Main ( ) executes user defined program statements, library functions and user defined functions and all these statements should be enclosed within left and right braces.


Every C program should have a pair of curly braces ({, }). The left braces indicates the beginning of the main ( ) function and the right braces indicates the end of the main ( ) function. These braces can also be used to indicate the user-defined functions beginning and ending. These two braces can also be used in compound statements.

Local Declarations

The variable declaration is a part of C program and all the variables are used in main ( ) function should be declared in the local declaration section is called local variables. Not only variables, we can also declare arrays, functions, pointers etc. These variables can also be initialized with basic data types. For examples.

Main ( )
int sum = 0;
int x;
float y;

Here, the variable sum is declared as integer variable and it is initialized to zero. Other variables declared as int and float and these variables inside any function are called local variables.

Program statements

These statements are building blocks of a program. They represent instructions to the computer to perform a specific task (operations). An instruction may contain an input-output statements, arithmetic statements, control statements, simple assignment statements and any other statements and it also includes comments that are enclosed within /* and */ . The comment statements are not compiled and executed and each executable statement should be terminated with semicolon.

User defined functions

These are subprograms, generally, a subprogram is a function and these functions are written by the user are called user ; defined functions. These functions are performed by user specific tasks and this also contains set of program statements. They may be written before or after a main () function and called within main () function. This is an optional to the programmer.

Now, let us write a small program to display some message shown below.
Sample Program:

# include
printf (“welcome to the world of C/n”);

I hope you have understood about the basic structure of C language.:)

5 ways to speed up your PC

 By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows 7, Vista, and XP Service Pack 3 (SP3) to more efficiently maintain your computer and safeguard your privacy when you’re online.

1. Free up disk space

The Disk Cleanup tool helps you free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.

Use Disk Cleanup to:

  • Remove temporary Internet files.
  • Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).
  • Empty the Recycle Bin.
  • Remove Windows temporary files such as error reports.
  • Remove optional Windows components that you don’t use.
  • Remove installed programs that you no longer use.
  • Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup

Window 7 users

  1. Click Start, click All Programs, click Accessories, click System Tools, then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.
  2. When Disk Cleanup has calculated how much space you can free, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.
  1. Clear the check boxes for files that you don’t want to delete, and then click OK.
    • For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, then click the More Options tab.
  2. When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and performing better.

For Windows XP users

  1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.
  1. In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

 Choose the files that you want to delete.

  1. Clear the check boxes for files that you don’t want to delete, and then click OK.
  2. When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and performing better.

2. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.

Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals—monthly is optimal—there are other times you should run it too, such as when:

  • You add a large number of files.
  • Your free disk space totals 15 percent or less.
  • You install new programs or a new version of Windows.

To use Disk Defragmenter:

Windows 7 users

  1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.

Click Analyze disk to start the Disk Defragmenter.

  1. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

  1. To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.
  2. To display detailed information about the defragmented disk or partition, click View Report.
  3. To close the View Report dialog box, click Close.
  4. You can also schedule the Disk Defragmenter to run automatically, and your computer might be set up this way by default. Under Schedule, it reads Scheduled defragmentation is turned on, then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or change the time or frequency, click the Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Then change the settings, then click OK.
  5. To close the Disk Defragmenter utility, click the Close button on the title bar of the window.

To use Disk Defragmenter:

  1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

Click Analyze disk to start the Disk Defragmenter.

  1. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

  1. To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.

After the defragmentation is complete, Disk Defragmenter displays the results.

  1. To display detailed information about the defragmented disk or partition, click View Report.
  2. To close the View Report dialog box, click Close.
  3. To close the Disk Defragmenter utility, click the Close button on the title bar of the window.

3. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

Run the Error Checking utility:

  1. Close all open files.
  2. Click Start, and then click My Computer.
  3. In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
  4. In the Properties dialog box, click the Tools tab.
  5. Click the Check Now button.
  6. In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.

 If bad sectors are found, choose to fix them.

Tip: Only select the “Automatically fix file system errors” check box if you think that your disk contains bad sectors.

4. Protect your computer against spyware

Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to usernames and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance. To combat spyware, you might want to consider using the PC safety scan from Windows Live OneCare. This scan is a free service and will help check for and remove viruses.

5. Learn all about ReadyBoost

If you’re using Windows 7 or Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory.