All your technical support needs under one roof

Microsoft Windows

We support Windows Xp, Vista and Seven.

Browser Support

We support all browsers, you name it and we can help you with it.


Got Computer problems?, Log on and chill

Hardware Support

Desktops, laptops, handhelds, printers, scanners the list is never ending.

Email Clients Support

Outlook, thunderbird, eudora, outlook express we support all.

Jan 15, 2011

Identity Theft

  When you think of theft, you usually think of someone stealing your possessions. Modern thieves have gone high-tech and they can take your money, use your credit cards, and ruin your reputation by stealing your identity. Identity theft can happen to anyone because all of our personal information is scattered in a lot of places - from online shopping websites and corporate databases to wallets and scraps of paper. Identity theft, or identity fraud, occurs when someone steals information that defines your personal identity-such as your name, Social Security number, bank account numbers, and credit card numbers-to reap the benefits of posing as you. These benefits can be financial, such as, access to your accounts and credit cards, or they can be reputational in that thieves can use your identity to get a job or commit a crime.

Using your personal details, a thief can open a credit card account and run up charges, create counterfeit checks using your account number, or even obtain an official government document, such as a driver’s license, in your name. When this happens, you not only lose money, you also face losing the ability to take out a loan, receive medical benefits, or get a job due to bad credit and a damaged reputation. In severe cases, you could even get thrown in jail for mistaken identity. Most often, it takes a long time for victims to realize that their identities have been stolen, and by the time they become aware of the fraud the thief is long gone. This explains why it’s so easy for thieves to commit identity theft and why it’s so hard for law enforcement to catch them.

Important Identity Theft Facts
  • Javelin’s Identity Fraud Report for 2010 found that 11.1 million adults in the U.S. were victims of identity fraud
  • Americans incurred $54 billion in loss from identity theft in 2008
  • The average fraud amount per victim was close to $5,000
  • Victims who found out about their identity theft more than six months after it happened incurred costs 4x higher than the average
  • From 2005 to 2009, there have been more than 500 million consumers whose personal and financial data had been exposed.
  • Victims spend an average of 58 hours repairing the damage done to existing accounts and an average of 165 hours repairing damage done by the creation of new, fraudulent accounts.

Jan 14, 2011

Microsoft Outlook Hotmail Connector

Microsoft Outlook Hotmail Connector 


Microsoft Outlook Hotmail Connector (formerly named Microsoft Office Outlook Connector) is a free add-in for Microsoft Outlook that allows users to access Windows Live Hotmail or Office Live Mail accounts through Microsoft Outlook.

Jan 13, 2011

5 Quick Tips to Speed Up Your PC's Slow Internet Connection

Nothing's more frustrating than a slow internet connection. Sadly, there's often not much that can be done about it. A page that's slow to load usually indicates something wrong with its server, not yours, and experts say that at times of heavy virus activity – with malicious programs leaping from one machine to another – the whole internet can feel like it's crashing down.

Nonetheless, while you obviously can't fix the whole internet, there are a few things you can do on your end to keep your connection going as fast as possible.

XP: Changing/Editing Prefetch Settings

Change settings for your prefetch folder in Windows XP.

We can do this in Regedit.

This is helpful when you want to make changes to prefetch or disable it completely. Computers may need this functionality disabled to get the system to run more efficiently.

Once the registry editor window opens, you can chnage the way prefetch behaves by making a change in the registry
Start--> Run--> Type 'Regedit'--> Enter.

In the registry editor dialog box, navigate to the value below:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters

In the right side pane, look for the key named EnablePrefetcher. The value of this key represents how Prefetch will operate.

Values you can choose from:
0: Disable
1: Application Launch Prefetch
2: Boot Prefetch
3: Prefetch everything

Make the decision and type the required number of your choice in the EDIT DWORD VALUE, and click OK, and exit the registry editor and restart the computer.

Jan 12, 2011

5 good add-ons for Internet Explorer

These are the few addons you can consider while using Internet Explorer

1) Web of Trust - This addon is similar to McAfee Site Advisor. The Web of Trust Add-on integrates with search results pages and rates each link for safety.
  • Green means safe
  • Yellow means caution
  • Red means don't visit the page.

How to install wireless mouse?

Unpack the Equipment: -
Installing a wireless keyboard and mouse begins with unpacking all of the equipment from the box. If you purchased this as part of a rebate program, be sure to keep the UPC from the box.

Jan 11, 2011

Windows 7: Enable Run Command

Steps to Enable Run Command in Windows 7 Start menu

Windows 7 is really amazing as compared to Windows Vista and Windows XP. The main feature it missed out is the RUN command shortcut in Windows 7 start menu. We all know the importance of RUN command in our daily computer usage but due to some mysterious reason it is not available in Windows 7 Start menu. Even if the start menu is doing a great job as a substitute, it’s hardly a substitute to the almighty run command. 

Choosing Secure Passwords

Passwords are your protection against fraud and loss of confidential information.

Below are some tips on choosing Secure Passwords: 

Make your password as long as possible
The longer a password is, the harder it is to guess or to find by trying all possible combinations (i.e., a brute force attack). Passwords of 14 characters or more are vastly more difficult to crack.

Use different types of characters
Include numbers, punctuation marks, symbols, and uppercase and lowercase letters.

Don’t use words that are in dictionaries
Don’t use words, names or place names that are usually found in dictionaries. Hackers
can use a dictionary attack (i.e., trying all the words in the dictionary automatically) to
crack these passwords.

Don’t use personal information
Others are likely to know information such as your birthday, the name of your partner or child, or your phone number, and they might guess that you have used them as a password.

Don’t use your username
Don’t use a password that is the same as your username or account number.

Use passwords that are difficult to identify as you type them in
Make sure that you don’t use repeated characters or keys close together on the keyboard.

Configuring a Mother Board Which Uses Jumpers

Configuring a Mother Board Which Uses Jumpers

You need to have the manual for your board available. If you do not have the manual, log on to the manufacturer’s web site and see if you can find this info there. You can also try their tech support via phone. In some cases, too, some of the jumper settings are printed onto the surface of the motherboard. If you don’t have any of this info, you are just out of luck. Unfortunately, you must have some form of documentation available simply because motherboards have so many settings to adjust. If you’re dealing with an older board, you may need to spend some time trying to identify the manufacturer so that you can see if they do support it. You can many times use the BIOS ID numbers to identify the board online.

Jan 10, 2011

Outlook 2007: Quick Flags

Outlook 2007 makes some improvements to the Quick Flag feature. Outlook 2003 provided six colored flags. Unfortunately, you couldn’t customize the names of those flags. A purple flag was always a purple flag, even if you used it for items related to your department budget. Outlook 2007’s flags are arranged by date. You can flag an item for Today, Tomorrow, This Week, or Next Week, or you can create a custom flag. Outlook 2007’s Mail view still contains the Quick Flag column. You can click the Quick Flag column to instantly flag an item for Today, or right-click the Quick Flag column and choose from any of the available flags or create a custom flag.

Jan 9, 2011

Managing calendar in Outlook 2007

Managing Your Calendar

Many Office applications now use what's called the "Ribbon," which is a series of buttons with text labels that expose the important functions of Office.

Fake virus alerts (Rogue Software)

Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions.

What is rogue software?

Get Microsoft Silverlight

Windows 7: How to get the Quick Launch bar back?

Windows 7's new taskbar functions as a program launcher as well as task switcher. As a result, the old Windows XP style Quick Launch bar, the area on the left side of the taskbar that contained shortcuts for frequently used programs, has been banished. However, if you really miss the little applet, you can add it back. 


Clean Up Disk Errors in Windows 7

Run once a week

Whenever a program crashes or you experience some power outage, your computer may create errors on its hard disk. Over time, the errors can slow your computer. Luckily, the Windows operating system includes a Disk Check program to check and clean any errors on your computer and to help keep it running smoothly.

For Windows  7 User's:

1. Click the Start button, and then click Computer.

2. Right-click the hard disk drive that you want to check, and then click Properties.

3. Click the Tools tab, and then, under Error-checking, click Check now.

To automatically repair problems with files and folders that the scan detects, select Automatically fix file system errors. Otherwise, the disk check will simply report problems but not fix them.

To perform a thorough disk check, select Scan for and attempt recovery of bad sectors. This scan attempts to find and repair physical errors on the hard disk itself, and it can take much longer to complete.

To check for both file errors and physical errors, select both Automatically fix file system errors and Scan for and attempt recovery of bad sectors.

4. Click Start.

Depending upon the size of your hard disk, this may take several minutes. For best results, don't use your computer for any other tasks while it's checking for errors.

Note: If you select Automatically fix file system errors for a disk that is in use, you'll be prompted to reschedule the disk check for the next time you restart your computer.

Twitter Delicious Facebook Digg Stumbleupon Favorites More