miércoles, 16 de diciembre de 2009

Use Twitter from Microsoft Excel!




Some companies restrict or block the use of certain programs or websites, if this is the case and can not use Twitter in your business, then now this is not an obstacle, because there are such programs 'costume', which are a great solution to stay in touch with twitter.

This program looks like an Excel spreadsheet, a financial report, but is actually a mask to use Twitter on the sly. Has version for Windows and Mac, as well as the appearance of the edition of Office that is in your office.

The only requirement is to have installed Adobe AIR runtime

Download from the author's homepage

lunes, 14 de diciembre de 2009

How to remove or block advertisements Hotmail

In the vast cloud normally available to us relevant content for free. The fact that it is free is a powerful reason to attribute its exponential growth over its short existence.

But "not everything that glitters is gold ', plus find it almost any content, the Internet is infested with advertising.
This is just normal because somehow must defray the expenses generated by any web site.

For example find all types of advertising: health, electronic roducts, courses, cars, auctions, matchmaking, natural products, pornography, etc..
There is a growing type of product that also is infecting the cloud, overloading it with its aggressive advertising, this is the products that rely almost solely on the website are those which the Internet is its rationale, I mean the type of products the type of "pay x click, web page hosting servers, domain registration, payment x read advertising, payments x online survey; Some of these types of products work with multi-mode, in which to take successful, you must find a large number of people or fans that provide the same product by multiplying the amount of advertising on the net hanging, making navigation a slow and tedious task than it should be.

In general, this type of advertising is centralized in a certain domain, a way to avoid that is shown by our browsers (Safari, Opera, Firefox, Crome, Internet Explorer) is to deceive.
That is, when your browser requests an advertisement for these companies (for example, to visit hotmail.com, altavista.com terra.es or advertising calls doubleclick.net) can not contact the domain that hosts these pages. This allows us to access content that is in our interest and at the same time avoid reading things we have not requested and of course to gain speed in loading pages when not using the bandwidth required for the ads, which generally are heavy flash animation, videos or photos.

How you can avoid publicity is to edit the host file content (applies to Windows-based and Linux operating systems).

Each time we access a website, previously the Hosts file is consulted, this is like a phone but containing IP addresses and web page names.

If the page you want to access is in the list of sites approved the Hosts file, then access is immediate. However, if in the list of sites banned, access is blocked. If the page is not found in the file, then it is our Internet service provider (ISP) who will relate the IP address of the requested Web page.

For Windows XP, The file is located at the following local path:
"C: \ WINDOWS \ system32 \ drivers \ etc \ hosts"

Assuming that the operating system is installed on drive c.



By default Windows puts this empty file.
The hosts file to be text can be opened with eg Notepad (notepad.exe).
On Windows systems the ip 127.0.0.1 equal to your own PC, and as your PC is not advertising to the final will be skipped. This is the trick, is assigned the IP address 127.0.0.0 to the domain you want to block, for example:

127.0.0.1 ad.es.doubleclick.net

A line like this means that when your browser requests something ad.es.doubleclick.net domain instead of calling the real domain request to the IP address 127.0.0.1, bone to your PC.

Well after this short introduction I want to teach how to block some of this annoying unsolicited advertising. Initially try the issue of Hotmail.

STEP 1:
Go to the Windows folder:
C: \ Windows \ System32 \ drivers \ etc

STEP 2:
Right click the file named host -> Properties-> uncheck read only-> accept.

STEP 3:
2 clicks above the host, select the notepad (notepad) to open it and add this Code:

127.0.0.1 ads1.msn.com
127.0.0.1 rad.msn.com
127.0.0.1 a.rad.msn.com
127.0.0.1 b.rad.msn.com
127.0.0.1 spe.atdmt.com
127.0.0.1 view.atdmt.com

STEP 4:
Then right click on the file called host -> Properties-> read-only brand-> accept.

Change, Install RAM in laptop, notebook or netbook laptop. Do it yourself!

Normally we add a board or card RAM to a computer with the aim of improving its performance in implementing the various programs or games, resulting in increased speed of execution of different tasks such as Internet Explorer , Word, Games, etc.. Another reason is the need to change a defective module with a new one.

Before purchasing a memory module, we know until memory capacity can grow our computer, ie the maximum amount of memory that can be installed, that depends on the specific hardware features of the motherboard. In this case there are two factors to consider:

1. The total memory capacity that can be installed on the computer
2. The maximum memory capacity that can be installed in each slot

This information can find out directly from the manufacturer's website or even some pages that facilitate this process, for example, and also http://www.memorystock.com http://www.memoryx.net

We must also know if there is available memory slots or "empty" on the motherboard, otherwise you can install the new memory this should remove some lower capacity module.

To find out if there are slots or sockets on the motherboard can uncover gaps and observe computer hardware or use any software such as Everest which is a program that provides detailed information on the hardware, plus many other things.

Materials Needed

To replace a RAM module of a portable computer or need the following tools:

1. (*) Screwdriver
2. Memory installed.

(*) In most cases we will need a screwdriver type star or stripe of small size. Depending on the brand of the computer the type of screwdriver may vary for example one type size 10 TORX (T10) or a spade.

Preliminary Process

Necessary materials and get ready before uncorking the computer performs a process of discharge of static energy body.


That is static energy body?

Our body under some special circumstances present in the environment of an electrostatic energy load through friction against the air, this effect is more evident in cold air or air-conditioned and carpeted floors.

Before you touch and manipulate any cards or electronic material such as reports, we download the electrostatic energy of our body, the procedure is very simple and is as follows:

We have close metal structure such as a door, a window, a chair or table, then played it with both hands. If the charge present in our body is very high, we feel as we transfer a small current from your body to the metal surface. Touching the metal object we are making a landing or grounding the energy accumulated in our body.

There antistatic bracelets or bracelets that can be used while constantly downloaded, these are used by connecting one end to a hand and the other to a metal object of considerable size (eg the metal chassis of the computer) which are recommended to use if scope.

It is recommended to be discharged periodically while performing the electronic manipulation of objects as once the electrostatic energy discharged from the body, it can be reloaded.

Process to find out how much memory is installed:
DXDIAG

Simple method

If we do not know how much memory is currently installed on the computer can perform the following procedure (Windows Vista/XP/2K)

1. Click on Start / Run
2. Write DXDIAG
3. In the window with the description of the system that appears look at the part where it says Memory: XXX MB

NOTE: The amount of memory reported by this method may be less than the amount of actual installed memory as if the computer has no video card, operating system reserves a fixed amount of RAM to operate the video .

Advanced Method

There is another way of accurately accessing this information, this is by using the "BIOS setup or BIOS Setup. This program allows us to view information including detailed hardware and define some advanced settings.

We can access the "BIOS setup" by pressing a key or special key combination at the time of turning on the computer before the operating system is loaded. This key or key combination depends on the manufacturer, eg HP uses [F2] or [F10], clones used normalmene [Del] or [Del], IBM usually uses [ENTER].

Unclogging the notebook or laptop

Before uncovering the laptop do the following:

1. We turn off the laptop.

2. I disconnected the cable from the power source.

3. I remove the battery: Remove the battery or cell must normally safe to slip some release. In some cases this may secured with a few screws.

4. Press the button to release any stored energy in capacitors on the motherboard, sometimes notice that the LEDs be apprehended by a few seconds.

NOTE: Make sure to disconnect power source (power source and batteries).

Normally all manufacturers like HP, DELL, IBM, COMPAQ, ACER, GATEWAY, including facilitating access to the memory slots. (installation slot), just enough to remove one or two screws a lid on the back of the laptop. Normally this cap measures a little more than the length of memory. Once we locate which is the access cover to the memory slots or you removed the screws and remove the lid.

There are some models of some brands also have memory slots in the this part, also have them under the keyboard to access this area should disassemble the computer from the keyboard and how to do this depends on the brand / model.

Installing memory

Depending on your present reports on the computer we can find for example:

1. That there are two slots and both are busy. In this case we remove the smaller memory module and replace it with the new.

2. That there is a slot occupied and the other free. In this case just insert the memory module into the empty slot.

We can see that the reports are secured with a clasp that are usually metallic, which we must move outward to allow freeing memory.

When removing a memory already installed, observe carefully how it was connected, usually depending on the type of memory, in the area of the golden pins or contacts there is a notch or space, this is the guide to install it in the correct position. We can also see the equivalent space in the slot.

The space or notch in the contact area of memory must match the space in the slot on the motherboard of the computer. Just go one way, not go wrong.

memory once installed correctly in the slot, the normally sure moving it to the bottom with light pressure as the retainers do hear click.

Final check

Now we have installed the memory, put the lid and make sure with or screws.

Install the battery, connect the power source and turn it on.
After the boot operating system, verify the amount of memory installed now ... as the "process to find out how much memory is installed."

Information Technology Consultant

Welcome to Blog nodotecnico, website containing computer-related issues, based on experiences or collected by the author। The information provided by the site will be published as articles, manuals, tips, reviews or tutorials, the format will text or video.
Versión español.