• Update to Windows for FREE

    Windows 10 Free AssistivechnologiesT


    Upgrade Ending Soon



    M icrosoft offered W indow s 10 as a free upgrade for som e tim e after it’s introduction, and in fact there is still a no-cost upgrade path if you have a legitim ate W indow s 7 or above key, or you can also visit the “assistive technologies” page and get an upgrade if you claim to have a need for such technologies.

    The “assistive technologies” m ethod w as som ething M icrosoft w inked at, not requiring any sort of evidence that the person upgrading actually required any kind of special accom m odation.

    N ow , how ever, that option appears to be com ing to an end in a couple of m onths, according to the site itself:

    If you use assistive technologies, you can upgrade to W indow s 10  at no cost as Microsoft continues to improve the Win 10

    experience for people who use technologies.

    Take advantage of this offer before it expires on December 31 2017.

    Here is the Link.




  • Reset Microsoft Account password from Login Screen in Windows 10

    Reset Microsoft Account password from Login Screen in Windows 10

    Did you change your Microsoft Account password just before going to bed and you are not able to remember that in morning? A possibility is that you might not be able to login to your Windows PC. Many times it happens that we are not able to remember our password and hence not able to sign into our computer. But with Windows 10 Fall Creators Update v1709, you can directly recover your password from the lock screen.

    We have seen how to recover lost or forgotten Windows passwords using Windows built-in tools like Password Hint and the Reset Disk or with other free password recovery tools. We have also seen how to reset your Windows password, if your computer is on a domain or if it is a workgroup. This tutorial shows how you can recover and reset your forgotten or lost Microsoft Account password from the Login Screen in Windows 10.

    Recover password from Login Screen in Windows 10

    This feature has been added in the latest Windows 10 Fall Creators Update and can be conveniently used from the Lock Screen. Now on your lock screen, just below the password field, you will see a new option that reads ‘I forgot my password’.

    Clicking on that option will take you to another screen which will help you recover your password. The flow is like what you might have already experienced on Microsoft website or on any other website in general. You need to enter your email id and a captcha to proceed.

    Recover password from Lock Screen in Windows 10

    In the next step, you need to select one of your Recovery Options that you might have specified while creating your account. It can be your alternate email address, your phone number or maybe a security question. Other than that, you can even use the Authenticator app to recover your account. The Authenticator lets you use your phone instead of your password for personal Microsoft accounts. If you do not have access to any of these, you might need access to another working computer to help you recover your account.

    Once you’ve chosen your recovery option, wait till you receive your one-time password. Enter the password and once you are verified, you can create a new password.

    The entire process is very simple and familiar. Very obviously, the computer must be connected to the internet to follow these steps. The recovery process does not take long and comes pretty handy if you’ve forgotten your password.

    Recovering the PIN in Windows 10

    If you’ve been using a PIN to sign in to Windows and you’ve forgotten the PIN somehow. Then a similar process is also available to recover the PIN. All you need to do is enter the password for your Microsoft Account and wait for the OTP. Once verified, you can directly change the PIN and use the new PIN to sign in.

    For Local Accounts, the recovery option is not available. Only users with Microsoft Account can recover passwords and PIN from the Lock Screen.

    This was how you can recover your Microsoft Account from the Windows 10 Lock Screen. This feature might prove helpful to a lot of users and is one of the most required features in Windows 10.

  • Take Back Control Over Driver Updates in Windows 10

    Take Back Control Over Driver Updates in Windows 10


    Forced updates is Windows 10’s boldest feature. It takes the responsibility of updates off your shoulders. At the same time, mandatory updates make life more difficult for those who like to tweak their system. And you won’t ever be safe from broken or incompatible updates. Pros & Cons of Forced Updates in Windows 10 Pros & Cons of Forced Updates in Windows 10 Updates will change in Windows 10. Right now you can pick and choose. Windows 10, however, will force updates onto you. It has advantages, like improved security, but it can also go wrong. What’s more… Read More

    The new Windows Update also covers hardware drivers:

    “In Windows 10, your device is always kept up to date with the latest features and fixes. Updates and drivers are installed automatically, with no need to select which updates are needed or not needed.” –Microsoft Support

    When you’re using non standard hardware, this process can introduce issues. Moreover, drivers provided by the original equipment manufacturer (OEM) are not always the best solution.

    If you’d like to keep your custom drivers or if you’re not keen on updating a running system, let us show you how to lock in your drivers.

    Undo & Temporarily Prevent Driver Updates

    Microsoft admits that “in rare cases, a specific driver or update might temporarily cause issues with your device.” To prevent the troublesome driver (or update) to reinstall automatically, Microsoft offers this solution.



    Roll Back Driver

    First, you need to remove the irksome driver. The best option is to roll back to the previous version. Right-click the Start button, select Device Manager, right-click the respective device, select Properties, switch to the Driver tab, and click the Roll Back Driver button.

    Roll Back Driver

    When you’re done, move on to blocking the automatic driver update, which will inevitably be initiated during the next Windows Update cycle.

    Remove & Replace Driver

    Should the roll back option not be available, a workaround is to uninstall the driver and replace it with your preferred version. Before you proceed, obtain the desired driver version from the OEM or a third party supplier.

    Note that some manufacturers offer utilities to uninstall old drivers, ensuring a clean removal of all driver-related files from your computer.

    If you need to manually remove the driver, right-click the Startbutton, select Device Manager, right-click the affected device, and select Uninstall.

    Device Manager

    In the following dialog, check the box Delete the driver software for this device and confirm with OK. This removes the driver file from Windows Update.

    Confirm Device Uninstall

    Next, you need to block future updates for this driver.

    Block Driver Update

    To prevent this driver from being reinstalled the next time Windows Update runs, you can use the Show or Hide Updates Troubleshooter (direct download), which we have introduced previously.

    Briefly, download and run the troubleshooter from Microsoft, on the first screen click Next, then select Hide updates, check the driver/s you would like to hide, click Next again, and you’re done.

    Windows 10 Hide Updates List

    You can reverse this setting. Select Show hidden updates from the troubleshooter, check the update/s you want to unhide, and click Next.

    How to Stop Automatic Driver Updates

    To stop Windows 10 from automatically updating your drivers, you have several options. Note that the Local Group Policy Editor is not available to Windows 10 Home users.

    Control Panel

    For this solution, you need to head into the System portion of the Control Panel. Right-click the Start button and select System. In the Control Panel sidebar, select Advanced system settings.Unlock Windows Potential: Control Panel Demystified Unlock Windows Potential: Control Panel Demystified If you want to be the master of your Windows experience, the Control Panel is where it’s at. We untangle the complexity of this power tool. Read More

    Control Panel System Settings

    In the System Properties window, switch to the Hardware tab and click Device Installation Settings.

    System Properties

    You will be asked whether “you want to automatically download manufacturers’ apps and custom icons available for your devices.” Select No and Save Changes.

    Device Installation Settings

    Note that if it works, this setting disables all your driver updates.

    Local Group Policy Editor

    On Windows 10 Pro and Enterprise editions only, you can use the Local Group Policy Editor to disable updates entirely. Some users report that this is the only setting that worked for them. The advantage of this method is that you can also disable updates for selected devices only.

    First, you need to collect the device IDs for hardware you don’t want Windows to manage for you. This could be your graphics or sound card ID.

    Right-click the Start button and select Device Manager. Double-click the respective device, switch to the Details tab, and select Hardware Ids from the drop-down menu under Property. Using one of the values in the next step should be sufficient.

    Driver Hardware ID

    Now we’ll head into the Local Group Policy Editor to exclude these devices from Windows Update.

    Press Windows key + R, enter gpedit.msc, and hit Enter. In your Local Group Policy Editor, head to Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions. Here, double-click on the setting Prevent installation of devices that match any of these device IDs.

    Local Group Policy Editor

    Enable the Setting, click the Show… button, then for each device, enter its Value, and finally OK all your changes.

    Prevent Driver Installation

    Attention: Once you have restricted a driver using the Group Policy Editor, you won’t be able to manually update that driver. To change a restricted driver, you need to disable the setting in the Group Policy Editor, make your changes, then enable the restriction again. Thank you for the hint, Guillermo!

    Alternatively, if you would like to disable all driver updates, you can also Enable the setting to Prevent installation of devices not described by other policy settings. However, we recommend only blocking updates for selected drivers, as described above.


    The Windows registry is your last resort. Press Windows key + Rto launch the Run dialog, enter regedit, and hit Enter. Now navigate to this registry string: How to Fix Windows Registry Errors & When Not to Bother How to Fix Windows Registry Errors & When Not to Bother In most cases, fixing our registry will do nothing. Sometimes registry errors cause havoc after all. Here we’ll explore how to identify, isolate and fix registry problems – and when to not bother at all. Read More


    Open the SearchOrderConfig value and set Value data to 0. Confirm with OK and reboot your computer.

    Registry Value

    Like other methods described above, this setting disables all driver updates and should only be used if Microsoft’s troubleshooter does not allow you to hide specific updates from Windows Update.

    Keep Your Drivers Under Control

    A bad or corrupted Windows driver update can ruin your PC experience. We’ve shown you how to prevent or reverse such a tragedy caused by automatic updates in Windows 10. This is not to say that all updates are bad, though.

    Updating your drivers is essential for maintaining performance, security, and accessing new features. When you do block automatic updates, remember to manually check for critical driver updates every once in a while. How to Find & Replace Outdated Windows Drivers How to Find & Replace Outdated Windows Drivers Your drivers might be outdated and need updating, but how are you to know? First, don’t fix it if it ain’t broke! If drivers do need updating, though, here are your options.


  • Every Advanced Google Search Operator & Command You Need to Know

    Every Advanced Google Search Operator & Command You Need to Know

    When it comes to SEO, there are many tools that can help you research opportunities. Tools of the trade can run the gamut from link research to on-page optimization to tools for performing SEO audits.

    Advanced Google search operators have their place in this ecosystem of tools, however. These operators can help you gain insight into SEO opportunities and audit points you otherwise would not have identified as a result; the possibilities are endless.

    After we talk about the advanced operators and search commands, I will also provide several examples of how these operators can be used in the real world. From content research to technical SEO audits, these examples will help you become more familiar with how Google’s advanced search commands and operators work in real-world situations.

    Advanced Search Operators

    Advanced Google Search Operators

    Here are the advanced Google search commands and operators you need to know.


    Using the cache operator, you can find out what the most recent cache of a specified webpage is. This is useful for identifying when a page was last crawled.

    Example use: cache:websitename.com


    This operator will help you find whether all the terms that you are looking for shows up in the text of that page. This operator, however, isn’t pin-accurate because it won’t look for text on the page that appears close together.

    Example use: allintext:content social links


    This operator is a more global operator that allows you to find any terms showing up on a webpage in any area – like the title, the page itself, the URL, and elsewhere. This is useful if you want to perform research into how others’ on-page SEO footprints are being categorized by Google.

    Example use: word one intext: other term


    If you are performing blog research, this operator is useful for finding blogs with certain search terms in the blog title.

    Example use: inposttitle:weight loss goals


    This search operator is a great way to find blogs that match the content you are writing about. For example, you could use allintitle to research what others are doing for that particular topic. Then, you could write your post to be better than theirs.

    Example use: allintitle:how to write content for seo


    This is a narrower operator that will help you find more targeted results for specific search phrases. If you wanted to find pages that are all about “drawing with micron pens” for example, the following is how you would use it:

    Example use: intitle:drawing with micron pens


    This one allows you to find pages with your requested search terms within the URL in internal search pages. For example, say you wanted to perform research on pages on a site that had the terms “drawing tablet”. You would use the following:

    Example use: allinurl:amazon drawing tablet

    This will bring up all internal URLs on Amazon.com that have the terms “drawing tablet”.


    If you wanted to find pages on a site that has your targeted search term in the URL, and the second term in content on a website, you could use this operator. This is useful for finding sites with strong on-page optimization for the topics you are researching.

    Example use: inurl:drawing portraits


    This operator is useful for performing research on pages that have all terms after “inanchor:” in anchor text linking back to the page. Using this operator can help you find

    Example use: allinanchor:”how to draw anime”


    It is possible to identify pages with inbound links that contain the anchor text specified. However, data is only sampled and doesn’t provide accurate global results.

    Example use: inanchor:”digital painting”


    Do you want to find images that only fall under a specific file type (e.g., .jpg, .png, or .gif)? This is a great way to narrow research on infographics or memes. But, it can also help you identify stray images and other files (like PDFs) that may have been picked up by Google.

    Example use: site:domainname.com filetype:txt – inurl:robots.txt

    This will help you find files on your site that were indexed by Google but will exclude robots.txt from appearing in the search results.


    Do you want to narrow the focus of your results to be super narrow? This is a great way to identify search results where two or more terms appear on the page, and also appear very close to each other (denoted by the number in the parentheses).

    Example use: digital drawing AROUND(2) tools

    Advanced Search Commands

    Advanced Google Search Commands


    This command will help you search for pages that have one word or the other.  If you wanted to find the words drawing or painting, but not both, you could use this command to do so.

    Example use: digital drawing OR digital painting

    Quotes (“word”)

    Using quotes around the phrases you are searching for will help you find results that are exact match results, rather than the broad results you will get with standard search.

    Example use: “search term 1”

    Exclude Words: (-)

    The minus sign is an exclusion symbol. This command will help you exclude words that you don’t want to appear in the search results. Say for some reason that you wanted to find pages that have the word content marketing but not pages from Business Insider that contain this phrase.

    Example use: “content marketing –businessinsider.com

    Add words: (+)

    You can use a plus sign to add words that you want to be included in the search results.

    Example use: “content marketing + SEO”

    SEJ’s new “Illustrated Guide to Link Building”
    Get the results you need from link building. Learn why, when, and how to execute tactics that deliver.



    If you are in need of more specific results that are catered to a single website, this command will help you bring those results up. For example, if you wanted to search your favorite SEO website for articles on 404 errors, you would use the following:

    Example use: “site:searchenginejournal.com 404 errors”


    If you’re in a situation where you need any results that have more than one website with similar content to a site you are familiar with, just use the following:

    Example use: “related:domainname.com


    This one will help you find information related to the domain that you are searching. It will help you identify things like pages with the domain text on-page (not necessarily linked), similar on-site pages, and the website’s cache.

    Example use: “info:domainname.com

    Using Advanced Google Search Operators

    Putting It All Together: How to Use These Commands & Operators in the Real World

    It isn’t always easy to identify the best combinations of search commands and operators that will help you accomplish your objective. But, once you do, you will probably think “that is downright cheating” because of all the information you can uncover.

    It’s not really cheating. You’re getting that edge you need to beat your competition.

    Below are a few ideas that you can use to take these operators and use them to their fullest potential for a wide variety of SEO uses. Feel free to use them to build your own SEO ideas and projects.

    Dig Deeper Into Website Content Research

    Many of these search operators can help you perform targeted, useful research on content. From today’s most recent content on SEO topics, to content talking about making the most amazing bacon potato volcano with cheese. If it’s specific enough, these operators are your friend when it comes to finding content ideas.

    Exclude Specific Terms That Aren’t Helpful to You

    Example use: term1 -term2

    Say you were doing research for SEO content that talks about secure URLs, but you wanted to exclude anything that mentioned 404 errors. Because, for your purposes, 404 errors won’t help you. The following would suffice:

    secure URLs -404 errors

    Exclude More Than One Term

    Example use: term1 -term2 -term3 -term4

    If your content research revolved around 404 errors, but all you want are pages that talk about 404 errors (and pages that do not mention 404 errors for canonicals, 500 errors, and the like), you can use this combination:

    Example use: secure urls -404 errors -canonicals -500 errors

    Exclude Terms That Are Exact

    If you want to find pages that mention technical SEO audits but do not include 404 errors or XML sitemaps in the topical discussion, this operator will help. Please note that it will include XML sitemap unless it’s specified to exclude.

    Example use: technical seo -“404 errors” -“xml sitemaps”

    technical SEO audits

    Technical SEO Audits

    When done right, technical SEO audits can be complex and can contain over 200 factors to consider fixing, especially for large websites. But, it is not just about spitting out the results of a tool and sending them to a client. Anybody can do that.

    Any SEO professional who is worth their salt, however, will put together a custom strategy the client can use to prioritize SEO tasks and get their site from where it is to where it needs to be. That’s where the power of a technical SEO audit comes in.

    Using advanced search operators can help you drill down to the nitty-gritty details of how Google sees and indexes a website. Without further ado, below are some ideas to get you started toward expanding your use of these operators.

    Identify How a Site is Indexed

    Example use: site:domainname.com

    A tiny window into how a site is indexed by Google can tell you so much about how to tailor your SEO efforts accordingly. Using the site: operator is one of the simpler ways to do this, and you can get an idea of the site’s index count as well.

    The index result count can help you identify massive technical errors on a large website. Say, for example, a site physically only has 270 pages but Google is indexing 15,000 pages from the site. This could range from incorrectly generated pages from on-site search, to issues arising from an http:// to https:// transition, and redirects not working properly.

    Remove Multiple Subdomains

    Example use: site:domainname.com -inurl:stage -inurl:dev -inurl:staging

    If you work on a messy, large international brand website that continues to have issues with staging sites being indexed, but you don’t care about the staging site, this operator can help you exclude all of those messy staging site subdomains.

    Drill Deep Down Into Non-Secure Pages and Audit Your http:// to https:// Transition

    Example use: site:domanname.com -inurl:https

    This example use excludes the https:// url, but you can also include it by removing the minus sign. Using the operator in this way can help you audit your http:// to https:// transition. This will give you an idea into how Google is indexing your new https:// pages as opposed to their http:// pages.

    Finding Duplicate Content

    Example use: site:domainname.com “content search term”

    Say you wanted to find out how much a website’s internal duplicate content was being indexed by Google. The combination of these operators will help you do this.

    This is useful for gaining a surface insight into how many results are returned by the search term. After finding this out, you can use a tool like Screaming Frog to really dig deeper and find those duplicate content pages that are presenting problems.

    Multiple Combinations of Search Operators

    Multiple Combinations of Operators Can Be Your Friend

    Have you ever heard the phrase “Google is your friend”? When using the vast array of search operators available, you can turn Google from your friend into your romantic lover extremely quickly. While the prior comparison is slight hyperbole, the comparison is used to illustrate how powerful the insights you can gain from advanced search operators really are.

    From hunting down plagiarism of your own content to auditing your http:// to https:// website transition, many infinite combinations of operators can be useful for content audits, technical SEO audits, whatever you want to use them for.

    It’s up to you to identify the combos that will help you the most in your search efforts. This way, you can gain a razor-sharp edge that will allow you to find the most pertinent information to help you beat your competition in the search results

    Continue reading  Post ID 4221

  • The Best Ways to Create High Quality Natural Backlinks in 2016

    The Best Ways to Create High Quality Natural Backlinks in 2016

    With so many algorithm changes that have taken place over the past few years, some SEO professionals have declared that traditional backlinks are dead. Although link building has experienced massive changes, it is still alive and kicking. The manner in which backlinks are to be built, however, has to be modernized.What does it take to build quality, whitehat, natural backlinks in 2016? Several SEO strategies will deliver the best possible results.

    Quality Content

    Natural backlinks are the ones that other websites use to point their audience to your content. Why would other websites want to do that? The answer is simple. Your site features quality content that their audience is going to benefit from.

    Thus, the best 2016 SEO link building strategy does not focus on links at all. It focuses on having a good content strategy.

    Come up with a content plan and get in the habit of updating your website on a regular basis. Stick to very specific, well-researched and unique topics. The more original your content is, the more others will be willing to share links.

    On top of making it easier to obtain quality backlinks, a good content strategy will boost exposure and help you establish your website’s online reputation. This is essential for getting your articles and other types of content to go viral. Thus, good content will also play a role in your social media marketing strategy.Boost Social Media Marketing Efforts

    Social media sites are considered high authority websites. This is the main reason why social media marketing can impact your link building strategy.

    Many social networks do not provide do-follow links. This means that links coming from such websites are not going to have an impact on your link building strategy. Facebook is one such website. Still, sharing content through Facebook makes sense because it impacts your online reputation. It also boosts audience engagement, which will have an indirect impact on your SEO efforts.

    Focus on content sharing via a big number of social channels. Use both social networking and social bookmarking websites.

  • 10 Forums Web Designers Must Know About

    There are loads of forums on the internet today, ranging from about every kind of niche you can think of, many forums of which are to do with web design / graphic design. Some stand out, and others don’t. We decided to make things easier for you and search for the best forums for web designers.

    What makes a forum great in our opinion is:

    • Having a great, friendly and knowledgeable community.
    • The users need to be active (sign on daily / every few days).
    • Needs to have a very targeted user base. In other words, most of the members need to have signed up to be members and become active in the community, not just sign up to gain access to a few things, not post, then forget about the community entirely.

    We could be here all day listing off factors. Of course, the forum needs to have a decent amount of traffic so designers get heard, and it needs to have a user-friendly design so web designers can use the forum with ease. Anyway enough talking, here’s the list of 10 forums web designers must know about.

    #Launch is a community of designers, developers, entrepreneurs, and marketers. Its homepage boasts of members who are “Y-Combinator founders, entrepreneurs, and investors.

    Your Content Here
    #frontendDevelopers is a great place to find new gigs. You can also get feedback from other developers, learn the latest trends and share ideas.

    CoffeeCup Software was started in 1996. The forum helps web designers create better websites.

    Designer Hangout is a great web designers’ community and you can join 9,700+ UX designers and researchers from around the world to discuss user experience in the UX Slack community.

    This forum may not be just about web design, but it has one of the largest forum communities on the internet with over 290,000 registered members! You can buy, sell and trade services on there, so it’s the perfect place for web designers. You can also pick up a lot of work on there, and clients too!

    This forum has a really nice simple layout, and their forums are always buzzing with new threads. They have many forum categories that are split in to more a less everything you can think of. They cover web 2.0, graphic design, flash, illustration, advertising, marketing, typography and much more.

    Although this forum is hosted on a .co.uk domain (it doesn’t mean it is just for UK people), and even though they only have around 10,000 registered members (compared to some big boy forums), they have an awesome community for web designers. Their forum categories cover all aspects of web design and I love the header design on their website.

    This forum covers web design and other webmaster aspects such as promotion and search engine optimization. Their nice simple forum design is very easy to navigate round. They have nearly 90,000 registered members, and there are always people online.

    This forum is insane! All web designers must be registered at this forum! It’s simply beautiful! They have a small user base of around 11,000 members, but there are always web designers online. Their forum covers many aspects of web design, and it’s worth checking out.

    Now Kirupa is usually for flash design and development, but as the years have gone on they have extended their forums to cope with web design. You can post your designs for critique, and you can also talk about HTML, css, and styling web design.

    Continue reading  Post ID 4221

  • 11 networking commands every Windows admin should use

    11 networking commands every Windows admin should use

    The Windows operating system contains numerous built-in, command line networking utilities. These tools range from the obscure to the commonplace. However, there are 11 built-in networking tools that Windows networking administrators should be familiar with.


    I am guessing that the ping command is probably the most familiar, and most widely used of the utilities being discussed in this article, but that does not make it any less essential.

    Ping is used to test the ability of one network host to communicate with another. Simply enter the Ping command, followed by the name or the IP address of the destination host. Assuming that there are no network problems or firewalls preventing the ping from completing, the remote host will respond to the ping with four packets. Receiving these packets confirms that a valid and functional network path exists between the two hosts.

    networking utilities


    If you are experiencing problems with network communications, then network statistics can sometimes help point you toward the root cause of the problem. That’s where the aptly named NetStat command comes into play. This command has a number of different functions, but the most useful of these is to display network summary information for the device. To see this type of summary information, just type NetStat -e.


    The ARP command corresponds to the Address Resolution Protocol. Although it is easy to think of network communications in terms of IP addressing, packet delivery is ultimately dependent on the Media Access Control (MAC) address of the device’s network adapter. This is where the Address Resolution Protocol comes into play. Its job is to map IP addresses to MAC addresses.

    Windows devices maintain an ARP cache, which contains the results of recent ARP queries. You can see the contents of this cache by using the ARP -A command. If you are having problems communicating with one specific host, you can append the remote host’s IP address to the ARP -A command.

    networking utilities



    As I am sure you probably know, computers that are running a Windows operating system are assigned a computer name. Oftentimes, there is a domain name or a workgroup name that is also assigned to the computer. The computer name is sometimes referred to as the NetBIOS name.

    Windows uses several different methods to map NetBIOS names to IP addresses, such as broadcast, LMHost lookup, or even using the nearly extinct method of querying a WINS server.

    Of course, NetBIOS over TCP/IP can occasionally break down. The NbtStat command can help you to diagnose and correct such problems. The NbtStat -n command for example, shows the NetBIOS names that are in use by a device. The NbtStat -r command shows how many NetBIOS names the device has been able to resolve recently.

    Like what you’re reading? Get the latest updates and tech guides in your inbox.


    The previously discussed NbtStat command can provide you with the host name that has been assigned to a Windows device, if you know which switch to use with the command. However, if you’re just looking for a fast and easy way of verifying a computer’s name, then try using the Hostname command. Typing Hostname at the command prompt returns the local computer name.


    Contrary to what a rather infamous YouTube video might lead you to believe, Tracert isn’t pronounced “Tracer T,” nor can it show you how many people are using Google right this second. Instead, Tracert, or “Trace Route,” is a utility for examining the path to a remote host.

    Functionally, Tracert works similarly to Ping. The major difference is that Tracert sends a series of ICMP echo requests, and the request’s TTL increased by 1 each time. This allows the utility to display the routers through which packets are passing to be identified. When possible, Windows displays the duration and IP address or fully qualified domain name of each hop.


    One utility that I find myself using constantly is IPConfig. At its simplest, the IPConfig command will display basic IP address configuration information for the device. Simply type IPConfig at the Windows command prompt, and you will be presented with the IP address, subnet mask, and default gateway that the device is currently using.

    networking utilities

    If you would like to see more detailed information, then type IPConfig /all. Doing so causes Windows to display IP address configuration that is much more verbose. This is also the command that you will have to use if you want to see which DNS server the Windows device is configured to use.

    The IPConfig command can do much more than just display IP address configuration information. It also contains options that can help you to troubleshoot problems related to DNS and DHCP. For example, entering the IPConfig /FlushDNS command purges the contents of the computer’s DNS resolver cache.


    NSLookup is a great utility for diagnosing DNS name resolution problems. Just type the NSLookup command, and Windows will display the name and IP address of the device’s default DNS server. From there, you can type host names in an effort to see if the DNS server is able to resolve the specified host name.


    IP networks use routing tables to direct packets from one subnet to another. The Windows Route utility allows you to view the device’s routing tables. To do so, simply type Route Print.

    The cool thing about the Route command is that it not only shows you the routing table, it lets you make changes. Commands such as Route Add, Route Delete, and Route Change allow you to make routing table modifications on an as needed basis. The changes that you make can be persistent or nonpersistent, depending on whether you use the -P switch.


    Earlier, I talked about the Ping utility and the Tracert utility, and the similarities between them. As you might have guessed, the PathPing tool is a utility that combines the best aspects of Tracert and Ping.

    Entering the PathPing command followed by a host name initiates what looks like a somewhat standard Tracert process. Once this process completes however, the tool takes 300 seconds (five minutes) to gather statistics, and then reports latency and packet loss statistics that are more detailed than those provided by Ping or Tracert.

    networking utilities


    Perhaps the most useful of the network utilities that are built into Windows is NetDiag. The NetDiag command is designed to run a battery of tests on the computer in order to help the technician figure out why the computer is experiencing networking problems.

    One of the things that I really like about this tool is that although there are a number of optional switches that you can use, you don’t have to use any of them unless you want to. Entering the NetDiag command by itself will cause all of the available tests to be run.

    In some cases, NetDiag can not only identify problems, but can also fix those problems. Obviously, NetDiag cannot automatically correct every problem that it finds, but appending the /Fix parameter to the command will tell NetDiag to attempt to fix the problem automatically.

    The Windows operating system is jam packed with command line utilities. Many of these utilities are left over from operating systems that were introduced decades ago. Even so, the utilities that I have discussed in this article are every bit as useful today as they were when they were first introduced.

    Continue reading  Post ID 4221

  • What’s the Difference Between a “Trojan Horse”, a “Worm”, and a “Virus”?

    There’s no shortage of confusing terminology in the computer biz. With the advent of malicious software, more terminology has been created that only make things less clear.

    The good news is that it’s not really that difficult; in fact, you needn’t understand most of the details (besides, not everyone agrees on the exact meaning of each definition).

    Let’s run down a few terms.


    The most important term to know is malware, which is short for malicious software.

    The name says it all: malware is any software that has malicious intent — destroy data, send spam, hold your data for ransom, steal your information — it doesn’t matter. It’s all malicious, it’s all software; thus, it’s all malware.

    You’ll find malware used as a catch-all term for all flavors and varieties of software that intend some kind of harm.


    In the human body, a virus is an organism that replicates, or makes copies of, itself and overwhelms the body’s defenses, making it sick.

    When applied to computers, the term “virus” is very similar.

    • A computer virus replicates itself in some way so as to spread within the computer, usually injecting itself into other programs within the computer.
    • A computer virus makes the infected computer “sick”. In the computer sense, “sick” can mean poor performance, crashes, lost files and data, or more.

    Very technically, the term virus does not necessarily imply that a piece of malicious software will replicate itself to other systems. In general use, it’s assumed.


    Spyware is a type of malicious software intended not to do damage, but to collect information, or “spy”, on you. Spyware might monitor and report back on your browsing habits and the programs you run, or access and send other information stored on your machine. One canonical form of spyware is the keystroke logger, which, as its name implies, records your keystrokes (and often more) and uploads this information to a third party.


    A worm is a program that replicates itself to other computers. It does so by infecting media, such as USB drives, that make contact with multiple systems, transmitting itself over a network somehow, or otherwise copying itself from one computer to another.

    Very technically, again, the term worm does not necessarily imply malicious intent or behavior, other than the replication. In practice, malicious intent is generally assumed.

    Trojan Horse

    A Trojan horse — often just a “trojan” — is a program that claims to be one thing but is, in fact, another. It uses that deception to gain access to a system that would not be given, were the true intent known.

    A trojan horse is not a virus per se, but it may carry them. For example, there are trojans that claim to be patches for various problems, but instead (or in addition) install malware. Software obtained from many download sites is often a type of trojan, using the promise of the software that is desired to install additional malicious software that is not.


    I think of phishing as a kind of email-based trojan horse. It’s email that looks like it comes from some official site, such as your bank, PayPal, or eBay, but actually comes from someone pretending to be them. They typically use some technique to fool you into thinking they are an official site of some sort, so you hand over sensitive information, like your username and password. Once you do so, they steal your other information, often leading to hacked accounts, identity theft, or worse.

    Regardless of the terms used, protect yourself

    The terms are important, but they’re less important than being aware that malicious software — malware — exists, and taking the steps you need to take to keep yourself safe.

    We shouldn’t have to, of course. Hackers shouldn’t exist, and operating systems and other software should be designed to perfectly protect us. The pragmatic reality, however, is that it remains our responsibility to keep our guard up.

    What does that mean? As outlined in what I consider my most important article — Internet Safety: 7 Steps to Keeping Your Computer Safe on the Internet — it all boils down to using common sense, keeping your software as up-to-date as possible, and running up-to-date anti-malware tools regularly.

  • What’s the Best Antivirus for Windows 10? (Is Windows Defender Good Enough?)

    What’s the Best Antivirus for Windows 10? (Is Windows Defender Good Enough?)

    Windows 10 won’t hassle you to install an antivirus like Windows 7 did. Since Windows 8, Windows now includes a built-in antivirus called Windows Defender (which used to be available separately as Microsoft Security Essentials). But is it really the best for protecting your PC–or even just good enough?

    Run Malwarebytes Alongside Your Antivirus for Maximum Protection


    Running antivirus is still very important, but these days the really active threats are from spyware, adware, crapware, and the worst of all: ransomware. That’s where Malwarebytes comes in.

    Malwarebytes not only protects your computer from malware, but does a better job of cleaning up an infected computer than anything else on the market. And it doesn’t just work on PCs — they have a Mac version too.

    And to protect your browser against zero-day exploits, Malwarebytes also includes Anti-Exploit and Anti-Ransomware features, which can stop drive-by attacks cold. And best of all, you can run Malwarebytes alongside your existing antivirus to keep yourself fully protected.

    Download Malwarebytes Today

    A One-Two Punch: Antivirus and Anti-Malware

    Here’s the short version: you need antivirus software on your computer, no matter how “carefully” you browse. Being smart isn’t enough to protect you from threats, and security software can help act as another line of defense.

    However, antivirus itself is no longer adequate security on its own. We recommend you use a good antivirus program and a good anti-malware program. Together, they will protect you from most of the biggest threats on the internet today: viruses, spyware, ransomware, and even potentially unwanted programs (PUPs)—among many others.

    So which ones should you use, and do you need to pay money for them? Let’s start with the first part of that combo: antivirus.

    Is Windows Defender Good Enough?

    When you install Windows 10, you’ll have an antivirus program already running. Windows Defender comes built-in to Windows 10, and automatically scans programs you open, downloads new definitions from Windows Update, and provides an interface you can use for in-depth scans. Best of all, it doesn’t slow down your system, and mostly stays out of your way—which we can’t say about most other antivirus programs.

    For a short while, Microsoft’s antivirus fell behind the others when it came to comparative antivirus software tests—way behind. It was bad enough that we recommended something else, but it’s since bounced back, and now provides very good protection.

    So in short, yes: Windows Defender is good enough (as long as you couple it with a good anti-malware program, as we mentioned above—more on that in a minute).

    But Is Windows Defender the Best Antivirus? What About Other Programs?

    If you look at that antivirus comparison we linked to above, you’ll notice that Windows Defender, while good, does not get the highest ranks in terms of raw protection scores. So why not use something else?

    First, let’s look at those scores. AV-TEST found that it still caught 99.9% of the “widespread and prevalent malware” in April 2017, along with 98.8% percent of the zero-day attacks. Avira, one of AV-TEST’s top rated antivirus programs, has the exact same scores for April—but slightly higher scores in past months, so its overall rating is (for some reason) much higher. But Windows Defender isn’t nearly as crippled as AV-TEST’s 4.5-out-of-6 rating would have you believe.

    Furthermore, security is about more than raw protection scores. Other antivirus programs may occasionally do a bit better in monthly tests, but they also come with a lot of bloat, like browser extensions that actually make you less saferegistry cleaners that are terrible and unnecesaryloads of unsafe junkware, and even the ability to track your browsing habits so they can make money. Furthermore, the way they hook themselves into your browser and operating system often causes more problems than it solves. Something that protects you against viruses but opens you up to other vectors of attack is not good security.

    Just look at all the extra garbage Avast tries to install alongside its antivirus.

    Windows Defender does not do any of these things—it does one thing well, for free, and without getting in your way. Plus, Windows 10 already includes the various other protections introduced in Windows 8, like the SmartScreen filter that should prevent you from downloading and running malware, whatever antivirus you use. Chrome and Firefox, similarly, include Google’s Safe Browsing, which blocks many malware downloads.

    If you hate Windows Defender for some reason and want to use another antivirus, we recommend Avira. It has a free version that works well, a pro version with a few extra features, and it provides great protection scores and only has the occasional popup ad. Just be sure to uninstall the browser extension it tries to force on you.

    Antivirus Isn’t Enough: Use Malwarebytes, Too


    Antivirus is important, but these days, it’s almost more important that you use a good anti-exploit program to protect your web browser and plug-ins, which are the most targeted by attackers. Malwarebytes is the free program we recommend here.

    Unlike traditional antivirus programs, Malwarebytes is good at finding “potentially unwanted programs” (PUPs) and other junkware. As of version 3.0, it also contains an anti-exploit feature, which aims to block common exploits in programs, even if they are zero-day attacks that have never seen before—like those nasty Flash zero-day attacks. It also contains anti-ransomware, to block extortion attacks like CryptoLocker. The latest version of Malwarebytes combines these three tools into one easy-to-use package for $40 per year.

    Malwarebytes claims to be able to replace your traditional antivirus, but we disagree with this. It uses completely different strategies for protecting you: antivirus will block or quarantine harmful programs that find their way to your computer, while Malwarebytes attempts to stop harmful software from ever reaching your computer in the first place. Since it doesn’t interfere with traditional antivirus programs, we recommend you run both programs for the best protection.

    Note that you can get some of Malwarebytes’ features for free, but with caveats. For example, the free version of Malwarebytes program will only scan for malware and PUPs on-demand—it won’t scan in the background like the premium version does. In addition, it doesn’t contain the anti-exploit or anti-ransomware features of the premium version—though you can get the beta version of Malwarebytes Anti-Exploit for free, if you’re willing to deal with a few bugs.

    You can only get all three features in the full $40 version of Malwarebytes, which we recommend. But if you’re willing to forego anti-ransomware and always-on malware scanning, the free versions of Malwarebytes and Anti-Exploit are better than nothing, and you should definitely use them.

    There you have it: with a combination of a good antivirus program, Malwarebytes, and some common sense, you’ll be pretty well protected. Just remember that antivirus is only one of the standard computer security practices you should be following. Good digital hygenie isn’t a replacement for antivirus, but it is essential to making sure your antivirus can do its job.

    Continue reading  Post ID 4221

  • 10 Rules to Create a Modern Web Design

    10 Rules to Create a Modern Web Design



    Creating a website that has a design which is keeping up with the times and is to the convenience of all those who use it is no longer optional in this world. The designs that are trending lately are much different from what they used to be just a couple of years ago. Popular websites are being updated every now and then.

    There are no specific rules that you absolutely must use for designing a website. There are just some considerations that you must keep in mind before starting with or finalizing a design. You may find some helpful web design tips below:

    Create a layout

    You may think that you are making the best design ever for your website, but, when you finalize it, you may realize it looks clunky and awkward. This is because you only see your work with full perspective when you are done with it.

    To avoid this, make it a rule to create a layout for the design you have in mind. Do this on a paper with a pencil, or use PhotoShop to attain a clearer perspective on what your design should look like. This should certainly be the first step in designing any website.

    Use a Style Guide

    A great way to achieve uniformity throughout your web design and not make it look awkward is by using Style Guides. You can find them on the web anywhere, or even design your own! Save in it a template for your design with all the proper fonts you will be using.

    Use big, simple fonts

    Fonts have gained much hype in web design recently. Unique typography is very pleasing to the eyes of the viewer. Using glittery and loud fonts, however, is thoroughly discouraged, unless you’re designing a website endorsing something that requires such design.

    Modern fonts are usually quite simple. They must always contrast with the background so that they are visible. They should also be big enough, so as to not make the viewer look around too much or strain his eyes to read what you are trying to convey. It should be such that as soon as the website is opened, the viewer should be greeted by whatever the website is endorsing.

    Use big, responsive images

    Make sure that all the imagery on the site is big enough to catch the viewer’s eye and is pleading his attention. Use high resolution images and make sure they are placed appropriately. Many websites start by placing big images on the top of the screen, just above the menu.

    These images are very often responsive as well. Clicking on an image instead of words to be taken to a certain part of the website is a very modern tactic. Be sure to not overuse this tactic, though, since as explanatory as an image may be, they could never replace the convenience that’s given by words.

    Make the rest of the design responsive too

    Back when programmers first realized how to make a web design responsive, it was considered very cool and amazing. Now, that is no longer the case. A responsive design is quite necessary when designing a website nowadays.

    Make sure that the website is able to function in its optimum form, not only on a computer screen, but also on a mobile phone screen. No viewer likes a website that is non-responsive in this day and age.

    Feature videos

    Many website make it a point to include a short video that features the product they are endorsing on the homepage. An auto-play option for this video is ideal as most users tend to not click on feature videos on their own.

    This video, if included, must explain the product in simple words along with its merits. This is to the benefit of the user since he will hesitate to use the product if he feels that it is complex.

    Appropriate Menus

    Hamburger menus were quite trendy for web designing for a while. They saved a lot of screen space and were quite handy. But, web designers soon realized all the inconvenience they caused.

    Hamburger menus were difficult to locate. Even when viewers finally located them, most of them had no idea how to get to the appropriate page they are looking for with their help. Hamburger menus are still very popular with app developers as mobile phone screens are considerably smaller than computer screens, but they are not quite as popular with websites.

    Back in web design fashion are now old school menus, that are easier to locate by the viewer and gives him all the appropriate information he needs to get to the page he wants. Other than these menus, phase-out side bars are also very trendy as they save considerable screen space.

    The Color Scheme

    Make it a point to use a vibrant color scheme for any website you are designing. Vibrant does not mean too bright or too loud. The colors of any website must be in contrast with the font of that website and also with the imagery. They should not strain the eyes too much. Also, the color scheme of a website must be appropriate with whatever the website is certifying.

    Live Chat

    Most good websites these days come with live chat support. These are quickly replacing the “Contact us” pages on most websites where it is extremely rare to get a response at all.

    Live chats require an employee of the main center of the website to stay online at all times, this is usually done in shifts, so he could listen to anything the viewer has to say and provide an appropriate response accordingly.

    Simple Navigation

    A viewer should be able to view any part of a website without feeling as if he is stuck with no idea where to go.

    For this purpose, it is imperative to use words in appropriate places, which easily direct people to what lies beyond.