Saturday, January 29, 2011

Some awesome Google Search Tips and Tricks

You may be using Google search multiple times per day to locate something on the web. Learning how to use Google search effectively can boost your productivity instantly.
 
In this article let us review some awesome google search tricks that will improve the quality of your online life.



1. Identify Local Time for Any City in the World using Google

If you want to know current local time in a particular city, use the following method. To see the current local time in Los Angeles do the following. Go-ahead and try this yourself for your local city and see how it works.
Syntax: time in PLACE

time Los Angeles
Google Identify Time in a Place
Fig: Find out current time of any worldwide city

Some awesome Gmail Tips and Tricks

Gmail definitely has changed the way how we manage emails. Without Gmail, we cannot imagine processing 100′s of emails effectively every day without breaking a sweat.
In this article let us review some awesome Gmail tips and tricks that will help you to manage your emails effectively.

1. Attachment Alerter: Never Forget an Attachment

“Oops, I forgot the attachment in my previous email. Here it is” — I’m sure you would’ve either sent an email with this message to somebody  (or) received an email with this message from somebody.  When you are sending emails in a hurry you may forget to send attachments. It will look unprofessional when you are sending a very important business related email and forgot the attachment.
The cure is Gmail’s Attach Alerter. If you have the word ‘attach’ in the mail content, and did not attach anything, you will be alerted by Gmail before sending that email.  To enable this feature, do the following.
Fig: Attachment Reminder
Fig: Gmail Attachment Reminder
  • Click on “Settings” link,
  • Click on “Labs” tab,
  • Select “Enable” option button in “Forgotten Attachment Detector”
  • Click on “Save Changes” at the bottom
This will help your message recipient not to receive inevitable follow-up emails with attachments.

Wednesday, January 26, 2011

Delete temporary Internet files


This information applies to Windows Internet Explorer 7 andWindows Internet Explorer 8.
Follow these steps to delete the files and information that Internet Explorer stores on your computer. This information includes the list of websites you have visited, cookies, information you've entered into web forms (for example, your name and address), website passwords, and other temporarily saved information. Your links and favorites will not be deleted.

Delete temporary files in Internet Explorer 7

  1. Open Internet Options by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Network and Internet, and then clicking Internet Options.
  2. Click the General tab, and then, under Browsing history, click Delete.
  3. Click Delete all, click Yes to confirm that you want to delete this information, and then click OK.

Delete temporary files in Internet Explorer 8

  1. Open Internet Options by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Network and Internet, and then clicking Internet Options.
  2. Click the Safety button, and then click Delete Browsing History.
  3. Select the check box next to each category of information you want to delete.
  4. Select the Preserve Favorites website data check box if you do not want to delete the cookies and files associated with websites in your Favorites list.
  5. Click Delete. This could take awhile if you have a lot of files and history.
Note

Note

Deleting everything can free hard disk space, solve problems with your web browser, and provide some additional privacy, but it might inconvenience you by removing information you might need on the Internet. For example, you will have to retype passwords that were previously stored on your computer.

Stay Safer Online


The Internet has enhanced our lives in nearly every way. However, as more of the things we do every day depend on the Internet, online crime has risen in turn.

Cybercriminals are using increasingly sophisticated and deceptive methods such as:
Malware - software that a cybercriminal can use to steal your bank account information, track everything you type, send out malicious software or spam, or harm your computer.
Phishing - an attack where a cybercriminal pretends to be a legitimate organization, such as your bank, in order to deceive you into giving up personal information such as credit card numbers and account information.
Both of these methods often involve tricking you into clicking on a link or downloading a file that appears legitimate, but is actually harmful. But cybercriminals are also using more elaborate ways to attempt to compromise websites and attack your computer without your knowledge, including "cross-site scripting" and "click-jacking," both of which are becoming increasingly dangerous threats.
Internet Explorer 8 helps protect you from today's threats, including malware and phishing, as well as emerging threats that can compromise your computer without your knowledge. Other browsers either don't offer you this level of protection or require you to download and configure third-party add-ons to get it, but with Internet Explorer 8 you get it right out of the box, and turned on by default.

Safety tips for using a public computer


Public computers in libraries, Internet cafes, airports, and copy shops can be safe if you follow a few simple rules when you use them.


Read these tips to help keep your work, personal, or financial information private.

1. Don't save your logon information

Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address.
Many programs (especially social networking Web sites, Web mail, and instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.

2. Don't leave the computer unattended with sensitive information on the screen

If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.