Wednesday, October 26, 2016

An Open Letter To My lovely Mother: Thank You For Being My Hero

An Open Letter To My Mother: Thank
You For Being My Hero
       To my Mom,
Thank you.
Thank you for being there for me. You have been my
biggest fan through every single stage of my life and I
couldn’t ask for a better cheerleader. Thank you for
knowing when I was wrong and spanking me when I
was being a brat. I may not have liked it then, but
looking back, I know I’m better off. Thank you for
holding me while I cried and promising me that
tomorrow would be a better day. You’ve been my rock
through breakups, life decisions, and new chapters.
You’ve carried me through when I was convinced I
couldn’t go on. I am eternally grateful. Most importantly, thank
you for showing me right from wrong, for encouraging
me in my walk of faith, and for teaching me the value
of respect not only for others, but for myself as well .
I love you, Mom. You’re my role model and even
though I laughed at everyone who told me this would
happen, you’re my best friend . I got my independence
and my sass from you, and I couldn’t be more
thankful. Sometimes, I know I get busy, but you are
so appreciated. Certainly I wouldn’t be the man I
am today if it weren’t for you. So, thank you – for
absolutely everything. You’re my hero.
Love always,
your Son
DICKSON ORENGO

Monday, October 24, 2016

Open letter to my crush

Hey you,

You beautiful girl. This one is for you. And the funny thing is, you will probably not even know that I wrote this for and about you.

I am crushing hard on you. From the moment I have met you I felt something I did not feel in a long time. You are special, so special and I do not even think you realize how special you are. When I saw you I felt this instant attraction and for me this was weird because you are not my standard ‘type’. You are So beautiful that I could not keep my eyes off of you.
Sometimes I noticed that I was just staring at you. Watching you move and watching you be in a moment and it made me smile. Busy reading your  whatsapp status. You really march to the beat of your own drum, and that is what I like about you and what I admire about you. 
.....missing part check again later...
Your Crush
DICKSON ORENGO.



A letter to my Aunts

Luckily, I was blessed with four loving aunts.

So i thank you all for all of the things done for me over the years and all of the things that are yet to come, and I appreciate all that you do.
I love you all. See you soon.

With All My Love,

Your Niece
DICKSON ORENGO.

A letter to my bestfriend

Dear bestie,
I want to take the time to tell you how very important you are in my life. It's hard sometimes to say these things in person, even to a best friend, so I'm writing you this letter to say it for me.
My friend, you are the most significant person in my life right now. You are my dearest friend, the one person I can be open and honest with, the person who knows me better than I know myself. When I'm with you, I can be myself, with no pretense, and I'm accepted and loved completely for who I am. There are no surprises with you; I know who you are, and you know who I am, and we are able to love one another completely. We aren't always able to spend as much time together as we'd like to, but when we are together, it's as if we had never been apart. Being with you makes me laugh, and it gives me a safe place to cry. You are sensitive and bright and altogether beautiful. I love you for being the wonderful person that you are and for the beauty you bring into my life just by being there. I love you for listening to all my troubles and for sharing yours with me. I love you for your acceptance of me, even when you don't agree with my actions or decisions. I love you for the fun we have together and the openness that characterizes our friendship. I love you most of all for being the best friend that anyone could have!
With gratifulness
ORENGO DICKSON

A letter to my dear ex.

I hope your doing fine, It frustrates me but I had to give it one last shot, chances are if you’re going to read this.
We became a couple in short period of time, you are so wonderful person, everything about you took my breath away, I couldn’t help help my self fallen in love with you. for all the late night talks we had. Some sort of music we are compatible to hear and thank you for taking an interest about learning my culture, that day you spoke to me  made me amazed,you learned it on your  you used to sing nice romantic song to me, I felt crying i love it so much. Then suddenly our relationship turned hard like finding squire roots of a negative number to some people. Finally i found my self single.
i tried my best to give our relationship a second chance because I loved you . I loved you with all my heart I told you I will respect your decision but I still give our relationship a chance, then after a couple of days, you blackmailed me.its a blackmailed I know it. I get into trapped but I realized it when it’s too late, that’s the reason I am letting you go, that’s enough. You still blamed me in all of what’s happened, you accused me easily to my bestfriend, your so mad at me sometimes. I was weak because of love, you made me to know the meaning of love.  I’m just a convenient part of your life, your throwed me easily, my heart broken into pieces, I’m so depressed about it.Everyone thinks I’m happy and okay but really I’m just drowning of sorrow.I already forgive you in all that happened , I learned my lesson to never trust and love too much.i hope someday if fate will meet us we will be okay.You will remain in my heart forever.
thank you for all the good memories you gave to me I will cherish it. I think i will  find a lover like you you though it will take time . I hope you will find also your true love without your insecurities. we should grow up in our own. Always take care and I wish you all Best. And i still love you because of the memory you left to me.
From Your Ex
DICKSON

A letter to my Ex.

Today I am so in love with the Man God made just for me!! Last year I thought I was in love with you. I was going through a really hard time, dude#1 dumped me,  We started off as friends. Then we became really good friends . For two years we were drawn to one another. i would talk to you until you fell asleep. You said my voice was soothing. Then dude#1 messed up and you saw an opening. I really didn’t want a relationship and neither did you. You took care of me and gave me comfort. You tried to convince me that you where not in some kind of twisted relationship .  Then you dumped me cause ?? I don’t know and today I really don’t care.
I really liked you. I would have always had your back and supported you and most of all loved you. Oh well. Only now can I say ………

THANK YOU FOR DUMPING ME

If I tried to hold on to you I would have missed my King!!

THANK YOU AGAIN !!

A letter to our lovely son Silvans

A letter from uncle, Dickson
Dear Silvans,
When you came into this world 2016, you brought a love into our family
heart that I had never before experienced because of my lovely Bro.  I reveled in joy and celebration.
With time you will become older,
You will have your own personality, your own thoughts
and opinions, and your own sense of humor. You  will have your
own interests, your own talents, and your own way of doing
things.
I celebrate your individuality and uniqueness and am
so honored to be part of your life silvans.
As you continue to grow and become an adult, you will live
your own life.
You will have times of happiness and times of
disappointment.
You will fall in love, and you will have your
heart broken.
 Life has its ups and downs and is not always
fair, but I know your strength and resilience will see you
through.

May you always know your worth and how incredibly precious
you are! As your uncle Dickson Orengo, it is my privilege to impart these
important truths to you.
Be true to yourself always. There is no one else like you, so
allow your uniqueness to shine through. You never need to
change who you are for someone else. You are magnificent
exactly as you are.
Live your own dreams. Figure out what makes you happy and
pursue it. Follow a path of your own choosing - not mine, not
your dad’s  Mrei , Mum Esther  anyone else’s. Your fulfillment is what I want,
and it will come from following your dreams and living a life
that has meaning and purpose for you.
Don’t take life so seriously. Have fun. Laugh at yourself
when you make mistakes.
Don’t worry about things you
cannot control. You get only one life, so enjoy it to the
fullest.
Love and accept yourself unconditionally. You will always
have yourself even when friends come and go, so make it
your best relationship. The way you treat yourself will show
others how to treat you, so treat yourself like you would your
own best friend. Be kind, respectful, and loving to yourself no
matter what.
Don’t be afraid to take risks. Take big, bold risks! You can
accomplish great things by taking risks. Living life too
cautiously and keeping the status quo will leave you with
regrets. Get outside of your comfort zone and watch as that
comfort zone expands. The more risks you take, the easier it
becomes.
Find your soulmate. You will meet someone one day with
whom you fall head over heels in love and want to spend the
rest of your life. Their gender, race, religion, and culture are
irrelevant to me. As long as you are loved, respected, and
treated well, I will always be happy with your choice.
And, last but certainly not least,
Know that I as yor uncle tunakupenda sana even your dad an mum love you and will always be there for you damu ni nzito kuliko maji. No
matter what, I’ve got your back. You are part of our family ORENGO'S and always will be. We adore you, and there is nothing you could possibly
do to change that. There may be times when we don’t
always see eye to eye, but we still love you and always will.
Love,
Your 
Dad Brother
ENGINEER
ORENGO
 DICKSON

Sunday, October 23, 2016

The computer is frozen

The computer is frozen

Sometimes your computer may become completely unresponsive, or frozen. When this happens, you won't be able to click anywhere on the screen, open or close applications, or access shut-down options. 

Solution 1 (Windows only): Restart Windows Explorer. To do this, press and hold winlogo+Xon your keyboard to open the Task Manager then press T. Next, locate and select Windows Explorer from the Processes tab and click Restart. If you're using Windows 8, you may need to click More Details at the bottom of the window to see the Processes tab. 

An application is running slowly

An application is running slowly

Solution 1: Close and reopen the application.

Solution 2: Update the application. To do this, click the Help menu and look for an option to check for Updates. If you don't find this option, another idea is to run an online search for application updates. 

Method 2

Solution 1: Run your virus scanner. You may have malware running in the background that is slowing things down.
Solution 2: Your computer may be running out of hard drive space. Try deleting any files or programs you don't need.
Solution 3: If you're using a PC, you can run Disk Defragmenter (called Optimize Drives in Windows 8). Doing so will make sure all pieces of each file or program are stored close together in your computer, so the computer will be able to access them more quickly. In most versions of Windows, the Disk Defragmenter can be found in the Start menu. In Windows 8, you can find it by typing defragment from the Start screen.

Dialog Box Keyboard Shortcuts

Keyboard shortcuts (Windows) 2

Dialog Box Keyboard Shortcuts

CTRL+Tab (Move forward through the tabs)

CTRL+Shift+Tab (Move backward through the tabs)

Tab (Move forward through the options)

Shift+Tab (Move backward through the options)

Alt+Underlined letter (Perform the corresponding command or select the corresponding option)

Enter (Perform the command for the active option or button)

Spacebar (Select or clear the check box if the active option is a check box)

Arrow keys (Select a button if the active option is a group of option buttons)

F1 key (Display Help)

F4 key (Display the items in the active list)

Backspace (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

What are the differences between hardware and software?

What are the differences between hardware and software?

Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive; it is intangible. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page is computer hardware. The Internet browser that allowed you to visit this page and the operating system that the browser is running on is considered software. 

Nearly all software utilizes hardware to operate properly. A video game, which is software, uses the computer processor (CPU), memory (RAM), and video card, all of which is hardware, to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents. 

In a computer, hardware is what makes a computer work. A CPU processes information and that information can be stored in RAM or on a hard drive. A sound card can provide sound to speakers and a video card can provide an image to a monitor. All of this is hardware. 

On that same computer, software can be installed and allow a person to interact with the hardware. An operating system, like Windows or Mac OS, is software. It provides a graphical interface for people to use the computer and other software on the computer. A person can create documents and pictures using software.

I can’t open email attachments

I can’t open email attachments

If you have ever encountered an attachment that you couldn’t open, it was probably because you didn’t have the software necessary to view the file. 
If you don’t have Adobe Reader or another PDF-compatible program, you won’t be able to open that TPS report. 

The usual suspect is the .pdf file, for which you can download a free PDF reader. If your problem involves a different file format, a quick search on the attachment’s file extension (the three letters after the period in the filename) should tell you what type of program you need. If the attachment lacks a file extension (which might happen if it was renamed), adding it back should set things right.

Saturday, October 22, 2016

Blue Screen Error

Problem: Blue Screen Error

Solution: The usual villains are beta GPU drivers and overclocked CPUs (but feel free to Google specific error messages). GPU drivers see the most frequent changes in enthusiast PCs, and beta versions are sometimes shaky. You can uninstall these drivers in the Add or Remove Programs section of your Control Panel (Programs and Features in Windows 8), where the files are labeled according to your brand (usually Nvidia or AMD, sometimes Intel). Then reboot and install an older version of the driver obtained from the manufacturer's website, preferably the drivers labeled "WHQL" (for Windows Hardware Quality Labs), Microsoft's seal of approval. Didn’t write down the BSOD info? Check out BlueScreenView .

I keep seeing ‘There is a problem with this website’s security certificate’

I keep seeing ‘There is a problem with this website’s security certificate’

Sometimes the biggest problems have the easiest fixes. According to support technicians, the lion’s share of issues are due to an incorrect system clock. 
The problem is probably with your computer. Website security certificates sync up with your computer’s clock. Old computers in particular run the risk of having a dead CMOS battery—the watch battery in your computer that keeps its system clock ticking. Click the clock in the system tray and select Change date and time settings to correct any issues.

My Wi-Fi keeps disconnecting

My Wi-Fi keeps disconnecting

Spotty wireless connections can be a puzzler. Is it your computer? Your router? Your ISP? Try a few things before calling your Internet service provider. 

Windows Network Diagnostics may not always solve your problem, but it will usually point you in the right direction. 

Confirm that your computer is within range of your wireless router. Weak signals mean weak connections. Next, make sure your PC’s wireless card has the latest drivers. Try letting Windows troubleshoot for you by right-clicking the Wi-Fi icon in the taskbar and selecting Troubleshoot problems.

Photoshop Shortcuts PC / Mac - CS6 CC

Photoshop Shortcuts PC / Mac - CS6 CC

SELECTING

Draw Marquee from Center..............................................................Alt-Marquee
Add to a Selection........................................................................................Shift
Subtract from a Selection................................................................................Alt
Intersection with a Selection....................................................................Shift-Alt
Make Copy of Selection w/Move tool.........................................Alt-Drag Selection
Make Copy of Selection when not in Move tool...................Ctrl-Alt-Drag Selection
Move Selection (in 1-pixel Increments)...............................................Arrow Keys
Move Selection (in 10-pixel Increments).....................................Shift-Arrow Keys
Select all Opaque Pixels on Layer..........................................Ctrl-click on Layer Thumbnail (in Layers panel)
Restore Last Selection........................................................................Ctrl-Shift-D
Feather Selection....................................................................................Shift-F6
Move Marquee while drawing selection.....................................Hold Space while drawing marquee

Installing applications 

Computers

Installing applications 

In order to work, an application usually has to be installed on your computer. Typically, installation is as simple as inserting the installation disc and following the instructions on the screen. For software downloaded from the Internet, you can usually double-click it after it is finished downloading and then follow the instructions on the screen. Many applications include a readme file (for example, readme.txt), which includes installation instructions and other information.

Files and applications 

Each application on your computer has a group of file types—or formats—it is able to open. You generally won't have to figure out which application will open your files. When you double-click a file, your computer will automatically use the correct application to open it, as long as the application is installed on your computer. 

If you don't have the correct application installed, you may not be able to open the file. However, in some cases you can open the file with a web application that runs in your browser. For example, if you don't have Microsoft Word, you can open Word documents with Google Docs. To learn more, you can visit our lesson on Understanding the Cloud.

What is CD-ROM?

Hard-Ware

CD-ROM

Short for Compact Disc-Read Only Memory, a CD-ROM (shown right) is an optical disc which contains audio or software data whose memory is read only. A CD-ROM Drive or optical drive is the device used to read them. CD-ROM drives have speeds ranging from 1x all the way up to 72x, meaning it reads the CD roughly 72 times faster than the 1x version. As you would imagine, these drives are capable playing audio CDs and reading data CDs. Below is a picture of the front and back of a standard CD-ROM drive. 

Interfaces 

Below are the different interfaces that allow a CD-ROM and other disc drives to connect to a computer. 

IDE/ATA - One of the most commonly used interfaces for disc drives.

Panasonic - Older proprietary interface.

Parallel - Interface used with old external CD-ROM drives.

PCMCIA (PC Card) - Interface sometimes used to connect external disc drives to laptop computers.

SATA - Replacing IDE as the new standard to connect disc drives.

SCSI - Another common interface used with disk and disc drives.

USB - Interface most commonly used to connect external disc drives.

What is an application?

Computers

What is an application?

You may have heard people talking about using an application or an app. But what exactly does that mean? An app is a type of software that allows you to perform specific tasks. Applications for desktop or laptop computers are sometimes called desktop applications, and those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it. Most of the time, you will have more than one application open at the same time, and this is known as multitasking. 

Types of desktop applications 

There are countless desktop applications out there, and they fall into many different categories. Some are more full-featured (like Microsoft Word), while others may only do one or two things (like gadgets). Below are just a few types of applications you might use: 

Word processors: A word processor allows you to write a letter, design a flyer, and create many other types of documents. The most well-known word processor isMicrosoft Word.Personal finance: Personal finance software, such asQuicken, allows you to keep track of your income and expenses and create a budget, among other tasks. Most personal finance programs can automatically download information from your bank so you don't have to manually type in all of your transactions.Web browsers: A web browser is the tool you use to access the Internet. Most computers come with a web browserpre-installed, but you can also download a different one if you prefer. Examples of browsers include Internet Explorer,FirefoxGoogle Chrome, and Safari.Games: There are many different games you can play on your computer. They range from card games such asSolitaire to action games like Halo 2. Many action games require a lot of computing power, so they may not work unless you have a newer computer.Media players: If you want to listen to MP3s or watchmovies you've downloaded, you'll need to use a media playerWindows Media Player and iTunes are popular media players.Gadgets: Sometimes called widgets, these are simple applications you can place on your desktop (or on theDashboard if you're using a Mac). There are many different types of gadgets, and they include calendarscalculators,maps, and news headlines.

My machine keeps restarting

My machine keeps restarting

Hardware problems are hard to diagnose and solve. First, confirm that you aren’t just getting the latest wave of Windows updates, which can automatically restart your computer during installation. Then work on updating all of your critical system drivers. Your graphics card, motherboard, and network card drivers are crucial. 

“Sometimes it can be viruses, sometimes it can be adware, sometimes it can be overheating, and sometimes it can be something as simple as making sure your video card is updated,” Geek Squad’s Meister says. 

Is your computer making weird noises? If you’re lucky all you’ll need to do is give the machine a thorough cleaning. Modern computers have safeguards that shut down the system if a component is overheating, which can be the cause of frequent restarts when you’re running resource-intensive programs or video games.

My computer makes strange noises

My computer makes strange noises

If your computer suddenly starts to buzz or vibrate, it can be due to a hardware failure. High, whining noises may indicate problems with the electrical components, while buzzing noises are often caused by lack of ventilation. 

Tips: 

Clean the filter and fan for dust and make sure that all air inlets are free. If you have a laptop, you can try to uninstall and reinstall your sound drivers. If it is a desktop, it may be that the sound card needs replacement.

Creating Files on Google Drive 

Creating Files on Google Drive 

Google Drive doesn't just store your files; it also allows you to create, share, and manage documents with its own productivity apps. If you've ever used a suite like Microsoft Office, some things about Google Drive's apps might seem familiar. For instance, the types of files you can work with are very similar to files that can be created with various Microsoft Office programs. 

These are the types of docs you can create and share with Google Drive:

Documents: For composing letters, flyers, essays, and other text-based files (similar to Microsoft Word documents)Spreadsheets: For storing and organizing information (similar to Microsoft Excel worksheets)Presentations: For creating and presenting slides (similar to Microsoft PowerPoint slideshows)Forms: For collecting and organizing dataDrawings: For creating simple vector graphics or diagrams

What is a printer?

Printer

A printer is an external hardware device responsible for taking computer data and generating a hard copy of that data. Printers are one of the most used peripherals on computers and are commonly used to print text, images, and photos. The picture is the Lexmark Z605 Inkjet, an example of a computer printer. 

Types of printers 

Below is a list of all the different computer printers. Today, the most common printers used with a computer are Inkjet and Laser printers. 

All-in-one (AIO) printer 
Dot Matrix printer 
Inkjet printer 
Laser printer 
Multifunction printer (MFP) 
Thermal printer 
LED printer 
3D printer 

Printer interfaces 

There are different interfaces or ways a printer can connect to the computer. Today, the most common way a printer connects to a computer is using USB. 

Cat5 
Firewire 
MPP-1150 
Parallel port 
SCSI 
Serial port 
USB

What is Google Drive? 

What is Google Drive? 

In the spring of 2012, Google introduced Google Drive, a cloud-based storage system that allows you to keep your documents, photos, videos, and other files online. Whenever you place files on Google Drive, they are stored on Internet servers rather than on your computer's hard drive. You can then access those files from any computer with an Internet connection or even a mobile device, like a tablet or smartphone. Drive even allows you to share files with your family, friends, and coworkers.

Why use Google Drive? 

Google Drive is one of the most advanced cloud storage services available today, offering  gigabytes (15GB) of free storage space. If you've never used a cloud-based storage service like Google Drive before, take a moment to consider the advantages of keeping your files online. Because files can be accessed from any computer with an Internet connection, Google Drive eliminates the need to email or save a file to a USB drive. And because it allows you to share files, working with others becomes easier than ever. With Google Drive, you can: 

Create and edit documents, spreadsheets, presentations, and more.

Open your files from any computer with an Internet connection.

Invite others to collaborate on your documents.

Retrieve your files even if your computer is lost, stolen, or broken. Your documents will still be safe in the cloud.

Access, create, and edit documents on the go with the Google Drive apps for your smartphone or tablet.

Save and edit files that you've created using Chrome's web apps, such as SlideRocket or AutoCadWS, right in the Drive.

Upload, share, and view many other types of files. Although Google Drive isn't designed to edit every file type, it's actually able to display previews for various types of videos, images, and other document formats.

How to fix slow startup pc

Reinstall the Operating System

Some people think that computers become slower over time and eventually need to be replaced – it’s sad, but true. Other people may take the computer to a repair place when it starts slowing down. When dealing with a computer that’s become bogged down by startup programs and toolbars, a simple Windows reinstall is often the fastest, easiest solution. 

This can also help if you’re experiencing other problems with your computer, such as file corruption or weird errors. While it’s often possible to troubleshoot these things by replacing corrupted files and bad drivers, it’s usually faster to just reset Windows back to its factory state. 
Most new computers come with factory restore partitions, which you can access by pressing the correct key during the boot process (check your computer’s manual). You may also have CDs or DVDs you can restore your computer from. If you installed Windows yourself, you can use the Windows installation disc. On Windows 8, use the Refresh or Reset feature to easily reinstall Windows. 

Be sure to back up your important files before doing this. Some places may back up your important files for you, while some may ask you to back them up ahead of time – that’s because they’ll just be reinstalling Windows for you.

Pictures will be upload.

How to synchronize smartphone with pc?

My smartphone will not synch with my PC

In order to ensure backup of your smartphone, it is important that you regularly synch your phone content with your computer. When synchronisation does not work as expected may be due to various factors, depending on the type of smartphone and PC. Sometimes it is required that all programs are closed, during synching or backup. 

Tips: 

Close open applications, if required. Be sure to download or reject the proposed updates that pop up along the way, so synchronization can be done. Look for the icon of synchronization to appear and check if for example the latest photos on your smartphone have been transferred to the computer. Verify the user manual for your device.

What is mouse?

Mouse

A mouse is a hardware input device that was invented by Douglas Engelbart in 1963 while working at Xerox PARC, who at the time was working at the Stanford Research Institute, which was a think tank sponsored by Stanford University. The picture is of a Microsoft IntelliMouse and is an example of what a computer mouse may look like. 

The mouse allows an individual to control a pointer in a graphical user interface (GUI) and manipulate on-screen objects such as icons, files, and folders. By using a mouse the user doesn't have to memorize commands, like those used in a text-based command line environment such as MS-DOS. For example, in MS-DOS a user would have to know the cd command and dir command to navigate to a folder and view the files. However, in Windows the user only has to double-click on the folder to view all the files. 

The Mouse was originally referred to as an X-Y Position Indicator for a Display System. Xerox later applied the mouse to its revolutionary Alto computer system in 1973. However, because of Alto's unfortunate success, it was first widely used in the Apple Lisa computer. Today, a pointing device is found on virtually every computer. 

How do I use a mouse? 

Move - Using your right or left hand drag the mouse up, down, left, or right to move the mouse pointer on the screen. If you reach the edge of your mouse pad, pick up the mouse and move it to the opposite side and then continue dragging the mouse in the direction you want the mouse pointer to move. 

Select - When your mouse pointer is on top of an object on your screen (e.g. an icon) click the mouse left button once to highlight the item. If you want to select text, click the left-button at the end of the text you want to select and then while continuing to hold down the button drag to the mouse to the left. 

Open - Click the left mouse button twice quickly (double-click) to open the icon, program or document. 

Viewing properties - To view the properties of anything on the computer select the object or text with your left mouse button and then click with your right mouse button (right-click) to view the properties. If you view the properties of text you'll be given a menu with options such as cut, copy, and paste.

What is an operating system? 

What is an operating system? 

An operating system is the most important software that runs on a computer. It manages the computer's memory, processes, and all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language. Without an operating system, a computer is useless.

The operating system's job 

Your computer's operating system (OS) manages all of the software and hardware on the computer. Most of the time, there are many different computer programs running at the same time, and they all need to access your computer's central processing unit (CPU), memory, and storage. The operating system coordinates all of this to make sure each program gets what it needs.

Types of operating systems 

Operating systems usually come preloaded on any computer you buy. Most people use the operating system that comes with their computer, but it's possible to upgrade or even change operating systems. 

The three most common operating systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux.

What is a file? 

What is a file? 

There are many different types of files you can use. For example, Microsoft Word documents, digital photos, digital music, and digital videos are all types of files. You might even think of a file as a digital version of a real-world thing you can interact with on your computer. When you use different applications, you'll often be viewing, creating, or editing files. 

What is a folder? 

Windows uses folders to help you organize files. You can put files inside a folder, just like you would put documents inside a real folder.

My computer turns off by itself?

My computer turns off by itself

Typically this is due to dying power supply, bad cable connections, defective battery or overheating when the computer shuts down by itself to cool down. 

Tips: 

Check first of all that the cables are properly connected. If the computer is very hot, check if the fan needs cleaning of dust. If it is a laptop, check whether your battery has deteriorated over time and may need to be replaced.

How to connection to Wi-Fi

Accessing the Internet 

Your device can connect to the Internet almost anywhere, either though mobile data (3G/4G or LTE) or nearby Wi-Fi. So what exactly is the difference? Most data plans only give you a certain amount of data per month, and there can be repercussions if you go over your limit. With Wi-Fi, you can use the Internet as much as you want, and it won't count against your data.

To connect to Wi-Fi (optional): 

Do you have access to a nearby Wi-Fi network (for example, at home or at work)? You can easily connect to it using the steps below. For networks that you access repeatedly, you generally only have to do this once. The next time you're in range, you'll be connected to the network automatically, as long as you leave the Wi-Fi feature turned on. 

Make sure you're on the Home screen, then open the Apps view. Your icon may look different from ours, but it's usually found in the Favorites tray near the bottom of the screen.Tap the Settings icon. You may need to swipe through a few screens to find it.Scroll through the list of settings until you find the Wi-Fi feature. If it isn't already set to ON, tap the control on the right.When you're done, tap the word Wi-Fi. This will open a list of nearby networks.To join a network, just tap the one you want. If the network is secured, you'll need to enter a password to connect to it.When you're done, your device will remember the details of the network (including the password if applicable), so you can connect to it automatically in the future. If you ever want to change these settings, tap and hold the network name, then choose Forget or Modify.

What is a keyboard

Keyboard

One of the primary input devices used with a computer, the keyboard looks very similar to those found on electric typewriters, but with some additional keys. Keyboards allow the user to input letters, numbers, and other symbols into a computer that often function as commands. For example, write an e-mail visit a Web page. The following image shows a Saitek keyboard with indicators pointing to each of the major key sections on it. 

Solving internet problem

Internet connection problems can be caused by many different things. The most common are network misconfigurations, hardware or software errors in the router, latency from your Internet Service Provider, incorrect IP address configuration, incorrect connection of network cables, firewall applications that block http traffic from your PC or temporary timeouts your ISP. 

Tips: 

Check that the Wi-Fi is enabled on your computer - laptops often have a button, switch or Function key combination somewhere on your computer or keyboard. Check that the network icon on your computer is connected or if there is a yellow warning signal or it is disabled. If it is connected, call your network provider or get hold on someone with more knowledge on IT. 

If Wi-Fi is disabled, you must check whether the cable is connected properly or if wifi is not on. If there is a yellow warning, you must reboot the router. If this does not work, try pressing Start in Windows XP, Vista or 7 and typing "cmd" into the search box and click enter. Then a black box pops up where you can type "ipconfig / release" then "ipconfig / renew". If the internet is not working now, call your ISP.

Solving CPU problems


CPU 

Alternatively referred to as the brain of the computer, processor, central processor, or microprocessor, the CPU (pronounced as C-P-U) was first developed at Intel with the help of Ted Hoff in the early 1970's and is short for Central Processing Unit. The computer CPU is responsible for handling all instructions it receives from hardware and software running on the computer. 

In the picture below, is an example of what the top and bottom of an Intel Pentium processor looks like. The processor is placed and secured into a compatible CPU socket found on the motherboard, and because of the heat it produces .



Problem: CPU Is Overheating

Solution: Don’t assume that high temps automatically warrant a new heatsink. The cooler is likely dust-clogged (try cleaning it), or the fan is dying (requiring a replacement). Or the heatsink has been poorly installed—remove it and remount it with new thermal paste. (Incidentally, degraded thermal paste alone can be the culprit. Here are our picks for the best thermal paste ). Other possible causes include the case fans—clean and check them. Or a newer, hotter GPU could have swamped your case’s ability to stay cool. A BIOS update could also change the fan profiles from what you had set. Also keep this in mind: If your CPU is seemingly running “hot” but the machine isn’t blue-screening or throttling clock speed, you probably don’t have to sweat it.

Problem: CPU Is Slow

Solution: CPU performance issues typically come from misconfiguration in the BIOS or overheating. First, verify your chip’s clock speed by running CPU-Z ( www.cpuid.com ) while running a CPU load in Cinebench 11.5 ( www.maxon.net ). If the clocks are correct (remember, chips don’t Turbo under heavy loads on all cores), compare your Cinebench 11.5 scores with others on the Internet. The scores should be within a few percentage points of others. If the scores are close, the CPU is not “slow;” it’s something else in your system. If the scores don’t match, you may have a thermal issue. Check that your heatsink hasn’t come loose, reapply thermal paste, and clean the heatsink and fans. A BIOS update could also be needed, as well.
Problem: CPU Is Unstable

Solution: CPUs rarely “go bad.” They typically work or don’t work. Usually, it’s everything around them that breaks. If you’re overclocking, stop. Try to isolate CPU problems by running a CPU-intensive app such as Prime95 . If it blue-screens, check thermal issues first (see “CPU Is Overheating”). Also check your RAM with Memtest86+ (www.memtest.org ). Check your power supply connectors to the mobo and GPU. If the PSU is overheating and failing, it could cause crashes. Failing PSUs cause power sags, which can look like a bad CPU, too. If you have a known good PSU you can swap in, do so. Oddly enough, a failing GPU can resemble a CPU failure, so if you have
Problem: CPU Is Always Under a Heavy Load

Solution: Heavy CPU usage can be a sign of malware, so make sure your AV is updated and run a full system scan. Also consider running a secondary scan using Malwarebytes Free ( www.malwarebytes.org ) and any of the free web-based scanners such as those from Trend Micro, Bit Defender , or ESET . Also check to see that your own AV app isn’t thrashing the system by doing a scan—check the running processes in Task Manager (Ctrl + Alt + Del, Start Task Manager, select Processes.) Click the CPU column to sort by usage and begin searching the Internet for each suspicious process name.

Problem: CPU Only Works in Single-Channel Mode

Solution: First, make sure the RAM is OK by running Memtest86+ (www.memtest.org ). If the RAM clears, check the slots for debris and swap out the DIMMs for known good RAM. If crashing persists when put into dual-channel mode, you likely bent a pin installing your CPU. We’ve seen this on LGA1366 and LGA1155 platforms several times. It can be fixed by taking a sharp knife and carefully straightening the pin in the socket (or on the CPU in AMD chips).

What is server?

Servers 

A server is a computer that serves up information to other computers on a network. Many businesses have file servers employees can use to store and share files. A server can look like a regular desktop computer, or it can be much larger. 

Servers also play an important role in making the Internet work: They are where webpages are stored. When you use your browser to click a link, a web server delivers the page you requested.

HOW TO FIX USB PORTS PROBLEM

USB Problems

What to do when it won’t plug nor play

Problem: Some USB Ports Don’t Work

Solution: Nonfunctional USB ports could be caused by a few things. If the ports are front-mounted, make sure the internal cables are connected properly and that the requisite USB header is enabled in your system BIOS. If the ports are soldered on the motherboard (and enabled), open up Device Manager and see if any USB root controller or hubs are reporting a problem. If so, a driver update/reinstallation may resolve the issue. It’s also possible that the physical connectors have been damaged (or a fuse has blown), in which case you’ll have to re-solder some new ones onto the board. If the USB ports are associated with a third-party controller, be sure its drivers are installed, because Windows may not recognize the controller automatically.

Problem: Slow File Transfer over USB

Solution: Windows Vista and 7 have some known USB performance issues, so the first thing to do is run Windows Update and make sure your OS is fully patched. We’d also advise installing the latest drivers for your motherboard’s chipset and any discrete USB controllers. You could also try setting the USB drive to performance mode. Open Device Manager, right-click the USB drive, and choose Properties from the menu. In the resulting window, click the Policies tab and tick the option labeled “Better performance.” Please note, this feature will enable write caching, so you’ll have to use the Safely Remove Hardware option when disconnecting the drive to prevent any data loss.
Problem: USB Hub Doesn’t Work

Solution: This problem is almost always caused by insufficient power being supplied to the hub. If the hub came with an AC adapter, make sure it’s plugged in and working properly. And if you’ve got the hub plugged into a front-mounted USB port, try connecting it to a rear port that is soldered onto your mobo. Rear-mounted ports can usually provide more power (or more stable power), which can resolve some issues with finicky hubs.

Problem: Charging Phone over PC’s USB Port Takes Forever

Solution: Standard USB 2.0 ports connected on a root hub have to share 500mA of current (USB 3.0 powers up to 900mA). If you’ve got a bunch of USB devices connected and the port your phone is plugged into is competing for limited power, it will take much longer than normal to charge. Try plugging the phone into a different port (preferably USB 3.0, if possible) or disconnecting other USB devices while charging.

It’s worth noting that some motherboard manufacturers—such as Gigabyte—have begun incorporating high-powered USB ports that can deliver up to 2.7A of current onto their boards. If you want to rapidly charge devices while they’re connected to your system, it may be worth checking out one of these boards.

Problem: USB Device Is Not Recognized

Solution: USB devices are usually as plug-and-play as you can get, but if a particular device isn’t recognized properly, it may be incompatible with your USB controller or require drivers to be manually installed. Compatibility is very good with USB controllers native to modern chipsets, but we’ve seen some incompatibilities with some discrete USB 3.0 controllers that are yet to be resolved. Should you need to install drivers for the device, plug it into a USB port, then go to Device Manager, right-click the device, and choose Update Drive Software from the menu. Then, you can search the web for drivers automatically or point the wizard to any drivers downloaded from the device manufacturer’s website.

What is database?

Access 2010 is a database creation and management program. To understand Access, you must first understand databases. 

In this lesson, you will learn about databases and how they are used. You will familiarize yourself with the differences between data management in Access and Microsoft Excel. Finally, you will get a look ahead at the rest of the Access course. 

What is a database? 

A database is a collection of data that is stored in a computer system. Databases allow their users to enter, access, and analyze their data quickly and easily. They’re such a useful tool that you see them all the time. Ever waited while a doctor’s receptionist entered your personal information into a computer, or watched a store employee use a computer to see whether an item was in stock? Then you’ve seen a database in action. 

The easiest way to understand a database is to think of it as a collection of lists. Think about one of the databases we mentioned above—the database of patient information at a doctor’s office. What lists are contained in a database like that? Well, to start with, there’s a list of patient names. Then there’s a list of past appointments, a list with medical history for each patient, a list of contact information.. 

This is true of all databases, from the simplest to the most complex. For instance, if you like to bake you might decide to keep a database containing the types of cookies you know how to make and the friends you give those cookies to. This is one of the simplest databases imaginable. It contains two lists: a list of your friends, and a list of cookies. 

However, if you were a professional baker you would have many more lists to keep track of: a list of customers, a list of products sold, a list of prices, a list of orders ... it goes on and on. The more lists you add, the more complex the database will be.

What is cloud?

Using the Cloud

Cloud computing is simply the act of utilizing a network, usually the Internet, to store information that you want to access from multiple network devices. By utilizing “The Cloud,” you can get to any of your uploaded information anywhere you have access to the Internet. The tutorials below can help you make the most of using the cloud.

What is hardware?

Hard-Ware

Abbreviated as HW, Hardware is best described as a device that is physically connected to your computer, something tangible. Most hardware will contain a circuit board, ICs, and other electronics. A perfect example of hardware is a computer monitor, which is an output device that allows the user to interface visually with the computer. Without any hardware, your computer would not exist, and software would not be able to run.

My computer is slow

My computer is slow

The most common problem of all. A slow computer can cause many frustrations, but fortunately there is something you can do yourself before you replace it. There may be several reasons for a slow computer; however, the most common is lack of maintenance. Fragmented data, a corrupted registry, spyware and dozens of unnecessary programs running at the same time, easily eat at the speed and performance of your PC. 

Tips: Keep track of your programs. Remove those of which you never use or shut them down when you've used them. Clean your registry with one of the many free or paid applications available for Windows. These two initiatives alone will easily be able to make your PC up to 30% faster.

How to make your data safe using Cryptography

How to make your data safe using Cryptography

Information plays a vital role in the running of business, organizations, military operations etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information. Cryptology involves transforming information into non human readable format and vice versa.

In this article, we will introduce you to the world of cryptology and how you can secure information from falling into the wrong hands.

What is Cryptography?

Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into non human readable formats and vice versa.

Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQYG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done.

The process of transforming information into non human readable form is called encryption.

The process of reversing encryption is called decryption.

Decryption is done using a secret key which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manages to get the information, it would not make sense to them.

 The encrypted information is known as a cipher.

What is Cryptanalysis?

Cryptology encrypts messages using a secret key. Cryptanalysis is the art of trying to decrypt the encrypted messages without the use of the key that was used to encrypt the messages. Cryptanalysis uses mathematical analysis & algorithms to decipher the ciphers. The success of cryptanalysis attacks depends on;

Amount of time availableComputing power availableStorage capacity available

The following is a list of the commonly used Cryptanalysis attacks;

Brute force attack– this type of attack uses algorithms that try to guess all the possible logical combinations of the plaintext which are then ciphered and compared against the original cipher.Dictionary attack– this type of attack uses a wordlist in order to find a match of either the plaintext or key. It is mostly used when trying to crack encrypted passwords.Rainbow table attack– this type of attack compares the cipher text against pre-computed hashes to find matches.

What is cryptology

Cryptology combines the techniques of cryptography and cryptanalysis.

Encryption Algorithms

MD5– this is the acronym for Message-Digest 5. It is used to create 128 bit hash values. Theoretically, hashes cannot be reversed into the original plain text. MD5 is used to encrypt passwords as well as check data integrity.  MD5 is not collision resistant. Collision resistance is the difficulties in finding two values that produce the same hash values.

SHA– this is the acronym for Secure Hash Algorithm. SHA algorithms are used to generate condensed representations of a message (message digest). It has various versions such as;SHA-0:  produces 120 bit hash values. It was withdrawn from use due to significant flaws and replaced by SHA-1.SHA-1:  produces 160 bit hash values. It is similar to earlier versions of MD5. It has cryptographic weakness and is not recommended for use since the year 2010.SHA-2:  it has two hash functions namely SHA-256 and SHA-512. SHA-256 uses 32 bit words while SHA-512 uses 64 bit words.SHA-3: this algorithm was formally known as Keccak.RC4– this algorithm is used to create stream ciphers. It is mostly used in protocols such as Secure Socket Layer (SSL) to encrypt internet communication and Wired Equivalent Privacy (WEP) to secure wireless networks.BLOWFISH– this algorithm is used to create keyed, symmetric blocked ciphers. It can be used to encrypt passwords and other data.

Task Management

Chapter 14 – Task Management

 

If you've used Windows for any length of time, then you've probably encountered the Task Manager – the graphical utility that lets you observe system performance, see which applications and processes are running on your system, and manually kill processes that become unreliable or freeze up. There are several commands that let you perform many of the Task Manager's functions from the command line. In this chapter, we'll show you how to manage processes from the command prompt. Using the commands in this chapter, you'll be able to list running processes on your computer, and terminate ones that become troublesome. 

 

WHAT IS A PROCESS?

 

In Windows, a “process” doesn't refer to the specific procedure you use to do something, or a standardized method for carrying out a task. Rather, a process is defined as the active instance of a computer program. For example, if you ran the Firefox web browser, Firefox would be a running process. Once you exit Firefox and close your browsing session, the process would exit and disappear. 

A process can also be a background program running on your computer, either a background program you installed yourself or a component of Windows. If you launch Task Manager (or use the commands described later in this chapter) you will see dozens of processes. Most of them will be background components of Windows itself, like the print spooler or the networking services. 

Generally, Windows handles its processes, whether applications or built-in Windows services, pretty well, and you don’t need to think about them. But like anything else, there can be problems. Sometimes a process will freeze up and refuse to quit, and you will need to forcibly terminate it. Additionally, some processes can seize so much of your computer’s available memory or CPU power that your system slows to a crawl and becomes nonresponsive. If that happens, you’ll need to find out which process is hogging the resources and terminate it. 

In the next section, we’ll show you how to list currently running processes on your computer. 

 

LISTING RUNNING PROCESSES

 

To view the running processes on your computer, use this command:

TASKLIST

This will immediately list every running process on your Windows computer. This will probably scroll off the screen, so you might want to pipe the output to the more command to let you view the output one screen at a time:

TASKLIST | MORE

By default, tasklist lists five different pieces of information about the processes running on your system. The first, Image Name, is basically a friendly name that allows you to find the process quickly in a list. The second, PID, stands for Process Identifier. Windows assigns a Process Identifier number to every process on your system, and the PID turns up in several log files. 

The third piece of information, Session Name, identifies whether or not a process is a Services session or a Console session. Basically, a Services process is one launched by Windows to run in the background, while a Console process was launched by the user logged into the computer. On a Windows Server system, you can also see RDP under Session Name – that means a user logged onto the server via Remote Desktop Services launched the process. 

The fourth piece of information is Session Number, listed as Session#. On a client Windows system, you’ll generally only see two numbers – 0 for processes launched by Windows, and 2 for processes launched by the logged-in user. On a Windows Server system running Remote Desktop, you will often see more numbers. 

The final piece of information, Mem Usage, simply lists the amount of memory a specific process is using.

You can get even more information from the tasklist command if you use it with the /v option:

TASKLIST /V

When used with the /v command, TASKLIST provides four additional columns of information. The first, Status, displays what the process is currently doing. Most of the time, this will say Running, but if a process has frozen up, it could say Not Responding. Processes launched by Windows will say Unknown, since Windows has control of them. 

The second piece of information is User Name, which lists the user that launched the process. Usually, this will be the user currently logged into the system. If you are using this command on a Remote Desktop Services system, this can help you track down which user launched which process, which is very useful if a specific process is hogging all the system resources.

The third piece of additional information is CPU Time, which shows how much CPU time each process has used. As with Mem Usage, this can help you track down a process that is using too many system resources. The final piece of information is Window Title. If a process has also opened a window on the desktop, the title of the window is listed here. If you have an errant application that refuses to close and you do not know the name of its process, you can help use the title of its window to find its process here.

 

TERMINATING PROCESSES

 

Generally, when processes work, you don’t have to think about them. If you are going to the trouble of listing processes, that probably means one or more processes have malfunctioned and you need to forcibly shut them down. Listing processes allows you to find which processes you need to terminate. To terminate a process from the Command Prompt, use this command:

TASKKILL

By itself, taskkill only spits on an error message. To make proper use of it, you need to specify either the image name or the PID of the process you wish to terminate. For instance, if you wanted to terminate a process with an image name of application.exe, you would use TASKKILL with the /IM switch to specify the image name:

TASKKILL /IM APPLICATION.EXE

This would kill the APPLICATION.EXE process immediately.

You can also use the /PID switch to specify TASKKILL to terminate a process with a specific PID. To return to our previous example, if APPLICATION.EXE has a PID of 1234, you can use this command to terminate it by PID:

TASKKILL /PID 1234

Additionally, the TASKKILL command offers two additional switches you can use with either the /PID switch or the /IM switch. First, the /F switch forcibly terminates the process, which is useful if you have a recalcitrant process that simply refuses to terminate. Second, the /T switch also terminates any child processes that the process launch. So, if you wanted to terminate a process with a PID of 1954, while also forcing it to terminate and terminating any child processes, the command would look like this:

TASKKILL /T /F /PID 1954

The process would then be terminated, along with any child processes. 

 

Batch files

Chapter 13 - Batch files

 

As you have probably realized by now, while using the Command Prompt is in many circumstances more efficient than using the GUI, it nonetheless involves a great deal of repetitive typing. However, there are way to automate commands, and the easiest way to automate commands from the Command Prompt is to use a batch file. With a batch file, you can launch a dozen commands (or more) in sequence simply by typing the name of a single file from the command line.

In this chapter we'll discuss how to use a simple batch file. 

 

WHAT IS A BATCH FILE?

 

To put it simply, a batch file is a text file containing a sequence of commands, one in each line. When you launch the batch file from the command line, Command Prompt reads the file, executing each of the commands in sequence. (That means Command Prompt first executes the command on the first line, then the second, then the third, and so on until it reaches the end of the file.) 

Using a batch file, you can automate tedious jobs, or tasks that require typing several command in sequence. For instance, let's say you have a daily task on your Windows computer that requires you to enter twelve commands in sequence to complete it. You could type out each command one by one, with the attending risk of making a typing error. Or you could put the commands into a batch file named JOB.BAT, and run it from the command line. Command Prompt will execute each of the commands in sequence, and you needn't worry about any typographical errors. 

 

CREATING BATCH FILES

 

How do you create a batch file?

Any text editor (an application that saves files as plain text files) will work to create batch files. The most popular application for creating batch files is the Microsoft Notepad utility included with Windows. Notepad has been included with every version of Windows since version 1.0 was released in 1985. (Which, I suspect, makes Notepad older than many of the readers of this book!) Notepad is very bare bones, but it will make a clean text file for you to use as a batch file. You'll need to make sure you save it as a BAT file instead of a TXT file - go to the File menu, and then to Save As, change the "Save As Type" to "All Files", and type the file name with a BAT extension.

It's a bad idea to use a full-featured word processor like Microsoft Office Word or LibreOffice Writer to create your batch file. The standard save formats of full-featured word processors are obviously not text files, and even when saving a Word document as a TXT file, it tends to be formatted incorrectly. If you want a more full-featured text editor, there are several free programs available - Notepad++ is one of the more popular ones.

Unfortunately, Windows does not include a text editor you can use from the Command Prompt. It's possible to create text files from the Command Prompt by using the ECHO command and output redirection, but even then, there's no way to edit the file once it has been created. This is one area where Mac OS X and numerous Linux distributions have the advantage over the Windows Command Prompt, since they include the vi text editor, which lets you edit text files from the command line (assuming you master vi's syntax and commands, of course). 

 

BATCH COMMANDS

 

You can put practically any command in a batch file. There are, however, a set of ten commands that are particularly useful for adding functionality to batch files (and some of them only work properly when used in a batch file). Using them, you can create limited programs that accept user input, complete with assigned variables. These will be simple programs - to create really complex effects, you'd need to learn WMI (Windows Management Instrumentation) syntax or a programming language like C# or Visual Basic. Nevertheless, you can use these commands to create useful batch files. 

The ten batch file commands are ECHO, CALL, FOR, PAUSE, CHOICE, GOTO, REM, IF, SHIFT, SET. Some of them are beyond the scope of this book, but we'll take a look at the simpler ones in this chapter. 

 

ECHO

 

The ECHO command does just what its name indicates - it "echoes" back a line of text. Entered from the command line, the command will "echo" back whatever text follows the command. For instance, this command would generate an output of "HELLO!"

ECHO HELLO!

The ECHO command has two uses in creating batch files. First, you can use it to display directions on the screen, or an explanation of what the batch file is doing. Second, you can use it to generate cleaner output from your batch files. By default, the batch file displays every command on the screen, along with its output. However, prefixing any command with a @ symbol prevents it from appearing on the screen. And if you use the @ symbol with the ECHO OFF command, it makes the prompt disappear for the duration of the batch file:

@ECHO OFF

This is useful if you don't want your batch file to clutter up the screen while it runs. 

 

PAUSE

 

The PAUSE command does exactly what its name says. It pauses processing of the batch file until you press a key to continue. Issuing the PAUSE command from the Command Prompt generates this output:

Press any key to continue...

The Command Prompt will wait until you press a key to return control to the prompt. When inserted into a batch file, PAUSE stops the execution of the file, which is useful when you want to view some output before it scrolls off the top of the screen. 

 

REM

 

The REM command doesn't actually do anything.

Despite that, it is quite useful. REM stands for "remark", and when used in a batch file, the Command Prompt will ignore any text that comes after it. This is handy for inserting "remarks", or notes, into your batch file. Why would you want to do that? The REM command allows you to document your batch files. If you write a batch file and need to edit it a year later (because, say, some server names or IP addresses changed) you might look at some of the commands and wonder why you put them in there. REM lets you make notes as you write the batch file, so you can examine them later and remember why you put the file together the way that you did. 

The second use of the REM command is for testing. Using REM, you can "comment out" a command by prefixing REM before it. The Command Prompt will then treat the command as a remark and ignore it. This comes in handy when you are testing a batch file that does not work properly, allowing you to pin down which part of it isn't working as you thought. 

 

GOTO

 

The GOTO command tells the Command Prompt to jump to a new location in the batch file. If you programmed old BASIC or Microsoft QBASIC programs, you might remember using GOTO statements with the numbered lines of code. GOTO in the modern Command Prompt works a bit different. GOTO jumps to a text line designated by a colon character (:) and resumes processing the commands in order. For instance, consider a GOTO command that looks like this in your batch file:

GOTO :SELECT

If you have a command like this, GOTO will jump to the line in the batch file beginning with :SELECT.

 

CHOICE

 

The CHOICE command does exactly what its name implies - it presents you with a choice. Typing the CHOICE command at the prompt generates an output that looks like this: 

[Y, N]?

This looks rather similar to other Yes or No choices offered by other Command Prompt commands. By itself, CHOICE does nothing. You need to use it in conjunction with other commands (particularly the SET command) in order to make it useful. However, you can alter the appearance of the CHOICE command with a few convenient command switches. The /M switch lets you add a custom message to the CHOICE command (with the message itself in quotation marks). This command is generates a message of "Hello! Press Y or N":

CHOICE /M "Hello! Press Y or N"

If you want to have different options than to press Y or N, you can modify the options with the /C switch. This command prompts the user to press 1, 2, or 3, rather than Y or N:

CHOICE /C 123

You can also use the CHOICE command with a default option, and set it to choose that default option after a timeout measured in seconds. This version of the CHOICE command sets the default option to Y, after waiting 90 seconds for user input:

CHOICE /D Y /T 90

Using these switches, you can customize the choice offered by CHOICE to fit your needs. 

 

SET

 

The SET command is a powerful tool that ties together the GOTO and CHOICE commands, allowing you to offer real choices in your batch files. By itself, the SET command primarily works with "environment variables." Environment variables are a number of system variables with preset values that control the way both the Command Prompt and Windows itself work. To see the environment variables for your system, use the SET command from the prompt without any switches:

SET

This generates quite a long list of output - Windows uses numerous environment variables. To quickly find the value for any one variable, you can use the ECHO command. However, you need to use the ECHO command with special characters. The TIME variable displays the system time, so you might be tempted to use this command:

ECHO TIME

However, this will only display the word "TIME" on the screen. To use ECHO to display system variables, you'll need to enclose the variable within a pair of percentage characters (%), like this:

ECHO %TIME%

This time, rather than just spitting out "TIME", the output will look like this:

22:13:30.56

You can also use the SET variable to create your own environment variables. To create a variable entitled "TODAY" with a value of "Wednesday", use this command:

SET TODAY=Wednesday

Then if you use that variable with ECHO, it will return with a value of "Wednesday":

ECHO %TODAY%

Assign your own variables might seem like a pointless game, but it becomes useful when working with your own batch files. Using the SET command, you can create a batch file that will execute instructions based on the user's choices. With the /P switch, you can instruct SET to create a new variable based upon the user's input - in effect, the /P switch combines CHOICE and SET into a single command. Let's say you wanted to create a variable named INPUT, and offer the user a choice between Option 1 and Option 2. The SET command to create such a choice would look something like this:

SET /P INPUT="Press 1 for Option 1, and Press 2 for Option 2: 1,2: "

Combined with the GOTO and the IF commands, this lets you create batch files that offer choices. (Note that the message text has to be in quotation marks, and the actual option keys themselves need to be enclosed in colon characters, as shown in the example.)

 

IF

 

The IF command ties together batch processing. The IF command responds to the variable created by the SET command. For every potential value of the previously created variable, you can then tell the IF command to perform a specific task. Generally, the best use of the IF command is to issue the GOTO command, which will then route Command Prompt to the section of the batch file containing the necessary commands. 

This example shows the best use of the commands we've explored in this chapter. This batch file offers the user a choice between pressing "C" for a listing of the root directory of the C drive and "D" for a listing of the root directory of the D drive. Depending upon which choice the user takes, he is moved to a different portion of the batch file, which then executes the necessary commands:

@echo off

set /p input="Press C for C:\, and press D for D: C,D: "

if %input%==1 goto C

if %input%==2 goto D

:C

dir C:\

goto end

:D

dir D:\

goto end

:end

By following this example, you can create your own batch files using variables and choices.

Remote access

Chapter 12 - Remote access

 

For several years, Mac OS X and Linux systems have had a significant advantage over Windows systems. Using a technology called SSH (SSH stands for Secure Shell), Mac OS X and Linux system administrators could remotely log into their systems via the command line. Once logged in, they could control their remote systems through the command line, operating the computer as if they were sitting in front of it.

Windows, of course, has had remote access technology for years, via the Remote Desktop or Terminal Services software. Using Remote Desktop, you could remotely log into a server computer, seeing an entire graphical desktop on your computer. This is useful, but Remote Desktop has a few disadvantages over the text-based SSH – it’s often quite slower, and on a slow connection with a lot of latency, Remote Desktop can become sluggish. And as with all GUIs, Remote Desktop is less efficient than the command line. To perform a task on a remote computer, you would have to fire up the Remote Desktop client, log in, and then execute the task via the mouse. Using SSH, it’s far quicker to execute tasks on a remote Mac OS X or Linux machine – you merely log in using the SSH shell, type the command, and the task is finished. Windows lacked a software feature that could perform a similar remote management function. 

All this changed with the introduction of WinRM – Windows Remote Management.

 

WHAT IS WINRM?

 

WinRM stands for Windows Remote Management. It is a Microsoft implementation of the SOAP protocol that lets you manage and control remote Windows machines over a network connection. The "SOAP" in the SOAP protocol stands for Simple Object Access Protocol, a set of rules for exchanging information over an HTTP web connection. One weakness of SSH is that it runs over specific TCP/IP ports (traditionally port 22, though most SSH server software lets you change the port), and that specific ports needs to be unblocked to allow SSH connections. SOAP runs over HTTP, and many firewalls allow HTTP traffic. Therefore, it’s possible to run WinRM without opening up any additional firewall ports.

WinRM runs on Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server 2008 R2. (Though you’ll need to install some patches from Microsoft in order to use WinRM on Windows XP.) WinRM has some substantial limitations, but it is quite useful, and hopefully Microsoft will improve it with future versions of Windows. 

In the next section we’ll walk you through doing a basic setup of WinRM.

 

ENABLING WINRM

 

Performing a basic setup of WinRM is extremely easy, and takes only one command. First, launch a Command Prompt as an administrator (the setup will not work if you run the Command Prompt as a normal user). After the Command Prompt window launches, type this command:

WINRM QUICKCONFIG

After you type this command, it will ask if you want to proceed. Hit Y to proceed, and WinRM will activate itself (though you may need to reboot before it functions). What exactly does this command do?

First, it starts the WinRM service, and sets it to delayed automatic start (this means the service will start automatically when your computer boots, but only after other, more important services have first launched). Second, it configures Windows to accept commands from remote computers, even commands that require administrative rights. Third, it tells the WinRM listener to accept requests from the HTTP port. Finally, it opens a firewall exception in the local Windows firewall, so that the HTTP traffic can actually reach the WinRM listener. 

Now that WinRM is enabled, you can use it to launch commands from a remote computer.

 

USING WINRS

 

To actually send commands to a computer running WinRM, you need to use the WINRS command. WINRS is short for “Windows Remote Shell”, and allows you to send command from your local Command Prompt to a remote computer running WinRM. Note that you must have an administrative account (or a domain account with administrative rights) on the target computer for WINRS to execute your command. 

In this example, we’ll assume you want to send remote commands to a computer named System1, and that the computer is a member of the Fake.com domain. The DIR command is a good one to test with WINRS. This command will produce a listing of the root directory of the C drive on System1:

WINRS –R:SYSTEM1.FAKE.COM DIR C:\

Let’s go through the options in this command step-by-step.

WINRS, of course, launches the WINRS shell for sending commands to a remote system. The -R switch tells WINRS which computer should receive the command. The -R switch is followed by the colon (:) character, and immediately after the colon is the name of the computer that should receive the command. For the basic set up of WinRM, you'll need to use the FQDN (fully qualified domain name) of the remote computer to receive the command. Finally, after the FQDN comes the command to send to the remote computer. 

You can launch any command you want via WINRS, with one important exception. The command cannot require any user input. Basically, if a command needs user input - like if it asks you to press Y to continue or N to cancel - it will not work. This does limit what you can do with WINRS, but with careful planning, you can avoid the limitations. (Like by using /Y switch with the XCOPY and COPY commands to keep them from asking for confirmation when overwriting a file.) However, some commands, like DISKPART, simply cannot be used via WINRS. 

 

USING WINRS AS A DIFFERENT USER

 

Sometimes, you may need to run a remote command as a different user than your current account. WINRS also gives you this ability. To run a command as a different user, use the -U switch with WINRS. For instance, if you wanted to view the root directory of the C drive on System1 using the camalas account, you would use the WINRS command with this syntax:

WINRS -R:SYSTEM1.FAKE.COM -U:CAMALAS DIR C:\

WINRS will ask you for camalas's password. Assuming you enter the password (and assuming that camalas has administrative rights on the target system), the command will list the files in the root directory of System1's C drive. 

Managing user accounts

Chapter 11 - Managing user accounts

 

To use a Windows computer, you need a user account on that computer. Most home computers generally have one local account with administrative rights, and the user never gives it another thought. Windows computers that are part of a large business network are usually members of an Active Directory domain, with their user accounts stored on one of the domain's controllers. Active Directory is beyond the scope of this book, but in this chapter, we'll show you how to create and manage local accounts from the Command Prompt. 

 

WHAT IS A USER ACCOUNT?

 

Before we begin, you should have a clear idea of what a user account is, and the difference between local user accounts and Active Directory user accounts. 

To put it simply, a "user account" is a set of credentials that allow a user to log into a Windows computer system. "Credentials", in this context, is the term that computer security experts use to describe the pieces of information a user must present in order to access the computer. Most of the time, the credentials consist of two pieces of information - your username, and your password. However, you can have additional credentials, as well - more secure computer systems might require you to present a username, a password, and a smart card, or a USB flash drive with an encryption key stored upon it. Advanced systems can even require biometric credentials - your fingerprints, for instance. The vast majority of home computers are not so secure, and usually require only a username and a password (and some home computers are configured not even to require a password, which is always a bad idea).

There are two kinds of user accounts you will encounter in a Windows system - local user accounts, and Active Directory domain user accounts. Local user accounts are stored on one specific Windows computer, and work only on that particular Windows system. If you have a computer named System1, and a user account called camalas on that computer, then the camalas account will only work on System1. If you tried to use the camalas user account on another computer named System2, it would not work. You could set up an identically named local account on that computer named camalas, but it would not be the same account. Local accounts work fine for individual computers, or for computers on smaller networks, but managing local user accounts on a large network of hundreds or thousands of computers quickly becomes impractical.

This where Active Directory user accounts come in. In Active Directory, individual Windows computers are joined to the Active Directory domain. Each Active Directory domain controller stores a database of user accounts, and a user can log into any domain computer using his Active Directory account. The local accounts still exist on the domain member computers - most organizations leave a local administrator account in case of technical trouble, and perhaps a restricted local account for guest users.

In this chapter we'll focus on managing local accounts from the Command Prompt.

 

FINDING USER ACCOUNTS

 

The first step managing local user accounts is to know what accounts you actually have on your system. As with managing file shares, you can accomplish this with the NET command. This time, we'll be using the NET USER variation of the NET command. To find out the names of all the local accounts on your Windows system, issue the NET USER command without any arguments or switches:

NET USER

The output should look something like this:

User accounts for \\SYSTEMNAME

------------------------------------------------------------------

Administrator            Guest                    camalas

The command completed successfully.

In this example, NET USER is listing all the local accounts for the \\SYSTEMANME Windows system. You can see that the computer has three accounts - the built-in Administrator account (which is disabled by default in Windows Vista and Windows 7), the built-in Guest account (also disabled by default), and the camalas account. 

 

DISPLAYING INFORMATION ABOUT A SPECIFIC USER ACCOUNT

 

NET USER without any options lists the accounts on a system, but provides no other information about them. To get specific information about an individual local account, use the NET USER command with the name of the account. For instance, to find out specific information about the camalas account, use this command:

NET USER CAMALAS

If the account name has a space in it (as local accounts on a home computer often do), you'll need to enclose the account name in quotation marks:

NET USER "CAINA AMALAS"

Regardless of the account name, the output should look like this:

User name                    Caina Amalas

Full Name

Comment

User's comment

Country code                 000 (System Default)

Account active               Yes

Account expires              Never

Password last set            4/20/2010 8:00:30 PM

Password expires             Never

Password changeable          4/20/2010 8:00:30 PM

Password required            No

User may change password     Yes

Workstations allowed         All

Logon script

User profile

Home directory

Last logon                   9/10/2011 12:32:42 PM

Logon hours allowed          All

Local Group Memberships      *Administrators       *Debugger Users

Global Group memberships     *None

There's quite a bit of information here, but we'll go over the more important bits.

"User name", obviously, is the actual user name, the name of the account. "Full name" is often blank, but it's sometimes used if the username is a truncated version of the user's full name - a username of "camalas" with a full name of "Caina Amalas", for example. "Account active" indicates whether or not the account is disabled, and "account expires" indicates when the account is going to expire - user accounts can be configured to expire on a certain date (for a temporary employee, for instance). 

The section of information dealing with the password is important. It shows when the password was last set, when it expires, and whether or not the user can change his password. It is possible to set a password policy forcing users to change their passwords after a set period of time. You can see the date of the password's expiration in NET USER's output, as well. 

"Last logon", as the name indicates, shows the last time the user account logged into the computer. "Logon hours allowed" displays the hours when the account can log into the computer. This is useful if you want to restrict the times a user can use his account - a work employee can log in only during business hours. Or if you have children, you can restrict the hours they can use the family computer.

Finally, the "Local Group Memberships" field shows the local groups to which the user account belongs. If you want a user to have administrative rights, the account needs to be a member of the Administrators user group.

 

ADDING A USER ACCOUNT

 

NET USER can be used to view information about accounts already on your Windows system, but you can also employ it to add additional accounts. The basic format is to use NET USER with the /ADD switch and the account name. So to add a user account named camalas to your system, you would use this command:

NET USER CAMALAS /ADD

This command will add a user account of camalas to your computer. Note that an account name can only have a maximum of twenty characters. 

However, you can also use NET USER and /ADD in conjunction with other command switches. You can also set the password associated with the camalas account right away through the use of the /PASSWORDREQ switch. To set camalas's account with a password of Cymr!Yy29 (note that passwords, unlike the rest of Command Prompt, are case senstive):

NET USER CAMALAS Cymr!Yy29 /ADD /PASSWORDREQ:YES

You can also set a full name for the account right away by using the /FULLNAME switch:

NET USER CAMALAS /ADD /FULLNAME:"Caina Amalas"

RESTRICING USER ACCOUNTS

Now that you know how to add user accounts, you may need to restrict the times that users can log into the system. You can do this by using NET USER with the /TIME switch. For example, to set that camalas account so that it can only log into the system on Mondays through Fridays from 6AM to 6PM:

NET USER CAMALAS /TIME:M-F, 06:00-18:00

This will restrict camalas from using the computer from 6 AM until 6 PM on Mondays through Fridays. 

 

DISABLING USER ACCOUNTS

 

You might find it necessary from time to time to disable a user account. Usually, this happens when an employee is fired unexpectedly, and you need to lock his account to prevent him from accessing sensitive information. Or, if you are a parent, and your child misbehaves, you can punish him by locking his account on the family computer. Disabling a user account deactivates it without deleting it entirely - the account is still there, but locked, and cannot be used to access the computer. To lock the camalas user account from the command line, use this command:

NET USER CAMALAS /ACTIVE:NO

This will disable the camalas user account. To reactivate it, use the same command, but change the /ACTIVE switch from NO to YES:

NET USER CAMALAS /ACTIVE:YES

This will reactivate the account.

 

DELETING USER ACCOUNTS

 

Disabling user accounts is a useful ability, but if you have no further need of an account, there's no reason to keep it on your computer. Furthermore, an unused account represents a security risk - if an attacker were to guess the password, he would have access the account. And if the compromised account is an administrative account, he would have complete access to all of your computer's files and settings. 

It is generally best to disable accounts rather than delete them entirely - there's always a chance you might need the account in the future, after all, and disabling an account is almost as secure as deleting it entirely. However, if you're absolutely certain you have no further need of an account, you can delete it using the NET USER command with the /DELETE switch. To delete the camalas account from our previous examples, you would use this command:

NET USERS CAMALAS /DELETE

This will delete the camalas user account. Note that the account is gone forever - if you need to bring it back, you will have to create a new account with the same name.