Receiving a file after a long wait, only to find it’s corrupt can be very frustrating. A corrupt file is a file which has been altered during the transfer in such a way that it can no longer be opened by a supporting program. This is a very common case with Microsoft Office files. If you try to open these corrupt files in Microsoft Office, it refuses to open them and shows information about the corrupt and damaged files. Perhaps this is why Microsoft has decided to add an option to repair or fix the corrupted office files. This way you can salvage whatever data is still remaining in the damaged files and rebuild it into a new file.
Archive for April, 2013
- Windows Vista
- Windows XP
- Windows 7
- Application Reviews
- Windows 8
- Windows 10
Unlike Mac or Linux, the file extension is very important in Windows. The extension of a file indicates the content type and which program should be used to open that file. But sometimes we stumble upon files without any extension and we don’t know what to do with them. If you try to double-click on a file without any extension, Windows would just throw up an error that ‘No program is associated with this file type‘. But using an open-source program called TrID we can find out the file types of such files and then look for a program that can open it. TrID scans the files based on signatures and can successfully predict the file types based on the data contained inside a file without having to depend on the file extension. Read the rest of this entry »
Unfortunately, many Internet users do not understand the necessity of using different, strong passwords for each site. A strong password should be at least ten characters long and should not use any dictionary word. But using so many different strong passwords for each site brings forth another problem – how do you memorize all of them? Fortunately, a free software StickyPassword presents an easy solution. Sticky Password is a centralized password manager, password generator and automatic form filler for all the popular web browsers. It can generate very strong passwords, store the login credentials of different websites in one place and share them with all the web browsers.
Read the rest of this entry »
I have a deal for you.
In exchange for a free piece of software that helps you keep track of your passwords and other log on information, I’m going to install other programs on your PC that will track your web surfing and display advertising that pops-up on your screen. There will also be other types of ads on your computer based on information we collect.
Does that sound like a good deal to you? Well, if you’re one of the many Windows users who have installed eWallet software from Gain Publishing that’s exactly what you agreed to do. But you already know that because you read the End User License Agreement
or “EULA” that was available prior to installing the program. You did read it right? Of course you did; before you could install the software you had to check a box certifying that you read the agreement. Legally speaking, that’s the same thing as signing a contract with pen and ink.
If you share your PC with others or let friends use it when they come to visit, you may find settings changed, files deleted, programs installed etc. when you next use it. With previous versions of Windows, I’ve used Windows Steady State, which provided a mode to allow access without setting complicated policies to protect your settings. Thankfully with Windows 7, Microsoft has made this level of protection much more readily accessible. Learn, in this guide how to set up a Guest account—available in all Windows 7 and 8 versions—for infrequent users of your PC.
Please note two things before getting started:
- You should not use a guest account if you have parental controls set on your children’s accounts
- You cannot use Guest mode in an Active Directory environment
In other words, you probably wont be able to add a guest account if you use company hardware