Can I shut down my PC or Laptop using keyboard shortcut?


Can I shut down my PC or Laptop using keyboard shortcut?

Yap, you can! Press Alt+F4 together when you’re in Desktop mode [press Windows key+D to switch to Desktop mode if you're not in Desktop mode]. A new window (Shut Down Windows) will appear . Now decide what you want to do. Use Up & Down Arrow key to choose your selection or use mouse to click drop down menu. You will find there: Shut down, Switch user, Sign out, Sleep & Restart etc.

Intechmania

Try it now…

Submit your questions to our Inbox [ to see our email ID, visit our "About" page ], we’ll try our best to answer here in Intechmania > Answers.

I deposited some fund in the sum of 1,600,000.00 GBP with DHL UK a couple of weeks ago to deliver to you ~ OMG SPAM


SPAM is unsolicited email messages that is also called electronic junk mail. The sheer number of unsolicited email messages also wastes incredible amounts of computer resources. In 2009, a Microsoft security report concluded that 97% of all email messages are SPAM. How is that even possible? Thankfully, not all of that SPAM manages to get through. For every SPAM email you pitch, your Internet Service Provider (ISP) has blocked several more before they even land in your mailbox. Unfortunately, that still leaves a ton of SPAM in circulation.

Some people send you spam to inquire into your financial information (e.g. Bank account number, credit card number, income sources etc.).

Here is a SPAM that was sent to me via e-mail. But I’m highly thankful to Outlook. Because, Microsoft SmartScreen marked this message as junk in Outlook and they’ll delete it after ten days. I request you to read the SPAM e-mail carefully & beware of the SPAM. Don’t be fool in a SPAM trap. Intechmania is committed to ensuring your safety & security in Internet world.

From: Mrs.Wilcox (susanwilcox45@gmail.com).
Sent: Thu 8/01/13 6:32 PM
To: ********************

Greetings,
I am sure this mail would be coming to you as a surprise since we have never met before and you would also be asking why I have decided to choose you amongst the numerous internet users in the world, precisely I cannot say why I have chosen you but do not worry for I come in peace and something very positive is about to happen to your life right now and to the lives of others through you if only you can carefully read and digest the message below.

Before I move further, permit me to give you a little of my biography, I am Mrs. Susan Wilcox, 82 Years old and the wife of Late Sir Wilcox Alex a dual citizen of United States and Britain who died with our only daughter Petra in a Plane crash on Monday the 7th of September 1998 GMT 14:22 UK while they were flying from New York to Geneva. Please see website below for more information. http://www.cnn.com/WORLD/9809/swissair.victims.list/index.html

After the death of my husband I became the Head of his investment and now that I am old and weak I have decided to spend the rest of my life in my Ranch before i finally leave the world, but before the death of my husband we had a plan to use the last days of our lives to donate part of what we have worked for to the less privilege and charity homes and the other part for ourselves, family members and close friends, and it is so unfortunate that my husband is not alive today to do this with me and I am very weak and old now, hence I have decided to do this philanthropic work on behalf of my late husband.

SPAM e-mail

It sucks!

Presently, I have willed out almost half of our assets to several charity homes and to some of the less privilege in different countries. Despite the agreement between my late husband and I to give aid to the deprived, we also agreed to render support to an individual we have never meet due to the fact that when we were young, we received an anonymous help from an individual we did not know and we have not being able to know this individual till date, the impact we got from such gesture made us to do same.

I am sorry to inform you that you may never have the chance to meet me because I have just concluded the assignment which my husband and I have agreed upon before his sudden death and you happened to be the beneficiary of our last WILL, hence I need you to do me a favor by accepting our offer.

I deposited some fund in the sum of 1,600,000.00 GBP (One Million Six Hundred Thousand British Pounds) with DHL UK a couple of weeks ago to deliver to you, but I was very ill so I could not send you an email until today. what you have to do now is to contact the DHL COURIER SERVICE UK as soon as possible to know when they will deliver your package to you.

For your information, I have paid for the delivering Charge, Insurance Premium and Clearance Certificate Fee of the Cheque showing that it is not a Drug Money or meant to sponsor Terrorist attack in your Country.

You are to contact the dispatch director of DHL COURIER COMPANY immediately for confirmation and delivery of your cheque with the information below;

Contact Person: Mr. Mark Morrison
Email Address: mark_morrison1946@yahoo.com.cn
Phone: +44-702-405-6690

You are not to pay for the delivering Charge, the Insurance premium and the Clearance Certificate Fee of the Cheque because I have already paid for them, the only money you are expected to pay is 760 British Pounds for the security keeping of the cheque so far.

I would have paid the fee but the company insisted that I should not because they don’t know when you will be contacting them and to avoid demurrage or further cost. You are to reconfirm the below information to them to avoid any mistake on the Delivery.

Full Names:
Occupation:
Residential Address:
Direct telephone number:

Below is the security keeping code: (SCT/0477/F) of your draft, you are to also present it to them for verification before delivery.

Please, try to contact them as soon as you receive this mail to avoid further delay.

Be also notified that I will no longer be reading my email or surfing the internet as I have retired completely from the outside world to my ranch, at this moment I have nothing to do with cars, emails and other luxuries, all further correspondence should be forwarded to the courier company for the delivery of your cheque to you.

Yours Sincerely,
Mrs. Susan Wilcox

Confession: It’s like hit & run. This is a SPAM that is copied & later pasted by the Admin of Intechmania. As evidence, a real-time picture has been attached of the SPAM copy. This is just to make people conscious.

Cyberbullying is really a matter of concern


Cyberbullying is really a matter of concern now. It is increasing day by day.Common tactics used by cyberstalkers are performed in public forums, social media or online information sites and are intended to threaten a victim’s earnings, employment, reputation, or safety. Behaviors may include encouraging others to harass the victim and trying to affect a victim’s online participation. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. Cyberstalking may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.

Rehtaeh Parsons case: Two men have been arrested in the Canadian city of Halifax in connection with the death of a teenage girl who killed herself after she was allegedly cyber-bullied, police said. Rehtaeh Parsons, 17, died in April days after attempting suicide. In 2011, she was allegedly raped by four boys. A photo taken of the incident circulated on social media. Rehtaeh’s parents said she was bullied so severely she had to change schools and move out of the Halifax area. She received treatment in hospital for six weeks for depression and anger. The April, 2013, death of Rehtaeh Parsons, a 17-year-old from Halifax, Nova Scotia, focused international attention on the issue of bullying in the Internet era, where cellphone pictures can easily circulate on Facebook and other social media sites. People magazine put her photo on its cover to illustrate a story on the consequences of online harassment among teenagers. A police statement did not say what the two men were arrested for, only that they were taken into custody from their homes this morning. No charges have been filed. Parsons was taken off life support following a suicide attempt that her parents said came after months of sustained harassment following an alleged November 2011 sexual assault, when she was 15. Cellphone pictures of the alleged assault circulated among her classmates and on social media sites. Police closed an initial investigation without filing charges, citing insufficient evidence, only to reopen it following a national outcry and an Internet campaign that claimed to have uncovered new evidence of the assault and the bullying that followed. The arrests come the day after a new cyber-bullying law came into effect in Nova Scotia, the first of its kind in Canada. Under the new law, anyone who feels they are being harassed online can seek a restraining order or sue on behalf of themselves or their children. Cyber bullies can face up to 6 months in jail or a fine of up to C$5,000 ($4,800).

Death of Hannah Smith: Hannah Smith died after receiving online abuse via ask.fm. The controversy comes after the death of bullied 14-year-old Hannah Smith from Leicestershire. Police are investigating claims that, since her death, Hannah’s 16-year-old sister has also received abusive web messages. One of the greatest Prime Ministers of this century, David Cameron said social network sites must “clean up their act” or face boycotts from users. Her father has said she killed herself after being targeted on ask.fm where she faced anonymous taunts and comments urging her to end her life. David Cameron earlier: “Just because something is done online doesn’t mean that it’s legal”. A source at the Sun, which on Wednesday described ask.fm as a “suicide site”, told the BBC it would cancel the advertising package which saw an advert for the paper’s new online service appear on the site. It had said the men behind ask.fm were “troll kings” on its front page. Vodafone, Specsavers, Save the Children and Laura Ashley have also moved to withdraw their adverts. Advertising space is often bought through agencies. Organisations can buy “bundles” of advertising to showcase their brands on multiple sites – so can be unaware of exactly where their adverts appear. Ask.fm, the Latvia-based website used by Hannah, allows people to post comments anonymously. Her father David said he found posts telling her to die.

Impact: According to the Cyberbullying Research Center, “there have been several high‐profile cases involving teenagers taking their own lives in part because of being harassed and mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide indirectly or directly influenced by experiences with online aggression. “Cyberbullying is an intense form of psychological abuse, whose victims are more than twice as likely to suffer from mental disorders compared to traditional bullying. The reluctance youth have in telling an authority figure about instances of cyberbullying has led to fatal outcomes. At least three children between the ages of 12 and 13 have committed suicide due to depression brought on by cyberbullying, according to reports by USA Today and the Baltimore Examiner. These would include the suicide of Ryan Halligan and the suicide of Megan Meier, the latter of which resulted in United States v. Lori Drew. Kids report being mean to each other online beginning as young as 2nd grade. According to research, boys initiate mean online activity earlier than girls do. However, by middle school, girls are more likely to engage in cyberbullying than boys.Whether the bully is male or female, his or her purpose is to intentionally embarrass others, harass, intimidate, or make threats online to one another. This bullying occurs via email, text messaging, posts to blogs, and web sites.

The National Crime Prevention Association lists tactics often used by teen cyberbullies.

  • Pretend they are other people online to trick others
  • Spread lies and rumors about victims
  • Trick people into revealing personal information
  • Send or forward mean text messages
  • Post pictures of victims without their consent

Source: Wikipedia, BBC News & Reuters.

Don’t use technology as a weapon to hurt others


Megan Meier, a 13-year-old from Dardenne Prairie, Missouri, met 16-year-old Josh Evans online at MySpace. In a few short weeks, the two became close friends online, although they never actually met in person. Josh claimed to have recently moved to the nearby town of O’Fallon where he was homeschooled and didn’t yet have a phone. Still they corresponded online often and Megan’s family reported her in good spirits. But after a few weeks, what began as an online flirtation turned nasty. Josh reported hearing that Megan wasn’t very nice to her friends. He reposted Megan’s messages without her permission. Hurtful comments about Megan were posted online. Then Josh sent a final message stating that, “Everybody in O’Fallon knows how you are. You are a bad person and everybody hates you… The world would be a better place without you.” Shortly after that, Megan committed suicide.

Megan’s experience was tragic—even more so because Josh Evans didn’t actually exist. The MySpace account using his name was created by 49-year-old Lori Drew, the mother of a former friend of Megan’s who lived just four houses away. Prosecu­tors discovered that the hurtful messages were sent by Drew and her then 18-year-old temporary employee, Ashley Grills. In addition, Lori Drew was fully aware that Megan was being treated for depression before she initiated the hoax.

In response to Megan’s death, cyberbullying has become a nationally recognized problem. WiredSafety has initiated a program to encourage teens to take Megan’s Pledge and also agree not to “use technology as a weapon to hurt others.”

[Cyberbullying is a form of intimidation and harassment using electronic means such as email, text messages, chat rooms, and social networking sites. Netiquette means the polite way of expressing yourself or communicating with other people when you are using the Internet].

Photo Source: Unknown

Photo Source: Unknown

In any country, some people may not behave in a very responsible way. They don’t get enough religious and ethical values from their parents and so-called education system. So, they don’t have knowledge about online safety, security and manners. They consider Internet world as their bedroom. Making fun isn’t fun in Internet, ok? What is game to the cats may be death to the rats. Freedom doesn’t mean do-anything-as-you-wish.

A veteran teacher from a renowned engineering university of Bangladesh (BUET) had threatened to murder the honorable Prime Minister of Bangladesh (Sheikh Hasina) on Facebook. The teacher has been sentenced jail for seven years. In addition, some deviated young boys who defamed the holy prophet Hazrat Mohammad (SM) on blogs was remanded and brought under the aegis of law for their criminal activities on blogs. Thousands of young boys get involved in quarrel with one another through social networking sites. The nation can never see any ray of hope for those so-called young [deviated] netizens. They are of no use. Threatening someone, twisting figures using Photoshop and publishing those images in public without permission, obscene posing, insulting someone are different kinds of crime via Internet. To reduce and curve those criminal activities, a nation must have some certain rules and regulations. During drafting such laws, you have to remember and prioritize human rights issues and liberal suffrage of people. The sooner you realize it, the better you use internet responsibly.

Notice: There is no connection of this girl in image with the post and its content. The photo has been collected and its source is unknown.

Source: Own Your Space

Ribbon Hero 2: Clippy’s Second Chance


You can learn Microsoft Office 2010 & even 2007 by playing an interactive game named Ribbon Hero 2: Clippy’s Second Chance. It’s UI is really nice, excellently animated! Possibly, you can’t get such a great or nice application software to learn MS Office besides this. It will teach you MS Word, MS PowerPoint, MS Excel, MS OneNote step by step with ease and amazement. Hope you’ll enjoy it.

Ribbon Hero 2

It you haven’t played it, Download it now from Microsoft Download Center!

Visit News – Ribbon Hero 2 to know about it from Sarah Faulkner (Office Labs).

Reviews:

a) “The fun and innovating training game…has evolved to the next level” –Softpedia.

b) “I can’t imagine a better way to incorporate learning for a productivity application” –istartedsomething.

How can I update my BIOS version, change splash screen and logo?


Question-2: How can I update my BIOS version and change Motherboard manufacturer’s splash screen & logo?

Answer: BIOS [ Basic Input Output System ] software is stored on a non-volatile ROM chip on the motherboard. It is specifically designed to work with each particular model of computer, interfacing with various devices that make up the complementary chipset of the system. In modern computer systems, the BIOS contents is stored on an EEPROM chip so that the contents can be rewritten without removing the chip from the motherboard. This allows BIOS software to be easily upgraded to add new features or fix bugs. If your PC’s Motherboard is of Intel, you can update your motherboard’s BIOS version, splash screen & logo using Intel Integrator Assistant. It should be done by advanced users or professionals. But it’s very easy!

What you can do with Intel Integrator Assistant:

The Intel® Integrator Assistant software application is a Microsoft* Windows* based system configuration tool, that is designed for professional system integrators who need to customize Intel® Desktop Board. The Intel® Integrator Assistant easily customizes a subset of BIOS settings (for booting, device management, power, and security). It also aids in setting asset management values, updating system BIOS, adding a custom logo for branding, and providing a unique BIOS splash screen image. Customization work is done using a workspace and configuration file that can be transported to other similar target computers.

a) Customize BIOS settings without rebooting the system.
b) Lock and/or hide critical settings reducing downtime or support costs.
c) Add a custom logo to the BIOS splash screen.

Note: Read compatibility issues in Download page of Intel Integrator Assistant whether your Motherboard supports the software or not. Don’t do anything unknowingly, ok?

Can I burn any CD or DVD using my DVD-ROM?


Question-1: Can I burn any CD or DVD using my DVD-ROM?

Answer: No, you can’t. Because, DVD-ROM can’t write or burn any data, file, music and picture on a CD or DVD using DVD-ROM. It is known as a Read Only Memory, usually used to read commercial programs and data. You can’t add or delete information on a DVD-ROM.

Learn about different file systems in Windows


A file system is the underlying structure a computer uses to organize data on a hard disk. If you are installing a new hard disk, you need to partition and format it using a file system before you can begin storing data or programs. In Windows, the three file system options you have to choose from are NTFS, FAT32, and the older and rarely-used FAT (also known as FAT16).

1. NTFS: NTFS is the preferred file system for Windows. It has many benefits over the earlier FAT32 file system, including:

a) The capability to recover from some disk-related errors automatically, which FAT32 cannot.

b) Improved support for larger hard disks.

c) Better security because you can use permissions and encryption to restrict access to specific files to approved users.

Convert a hard disk or partition to NTFS format:

The NTFS file system provides better performance and security for data on hard disks and partitions or volumes than the FAT file system used in some earlier version of Windows. If you have a partition that uses the earlier FAT16 or FAT32 file system, you can convert it to NTFS by using the convert command. Converting to NTFS does not affect the data on the partition.

Notes: After you convert a partition to NTFS, you cannot convert it back. If you want to use the FAT file system on the partition again, you’ll need to reformat the partition, and this will erase all data on it. Some earlier versions of Windows cannot read data on local NTFS partitions. If you need to use an earlier version of Windows to access a partition on the computer, do not convert it. Although the chance of corruption or data loss during a conversion is minimal, you should back up all data on the partition before you begin.

To format a hard disk partition with NTFS:

Close any open programs running on the partition or logical drive to be converted. Click the Start button, click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

In the Command Prompt window, type convert drive_letter: /fs:ntfs, where drive_letter is the letter of the drive you want to convert, and then press ENTER. For example, convert E: /fs:ntfs would convert drive E to the NTFS format.

Type the name of the volume you want to convert, and then press ENTER. To view the available volumes, click the Start button , and then click Computer. The volumes are listed under Hard Disk Drives.

If the partition you are converting contains system files—which would be the case if you are converting your entire hard disk—you will need to restart your computer for the conversion to take place. If your disk is almost full, the conversion process might not succeed. If you receive an error, try deleting unnecessary files, or back up files to another location, to free up disk space.

2. FAT32: FAT32, and the lesser-used FAT, were used in earlier versions of Windows operating systems, including Windows 95, Windows 98, and Windows Millennium Edition. FAT32 does not have the security that NTFS provides, so if you have a FAT32 partition or volume on your computer, any user who has access to your computer can read any file on it. FAT32 also has size limitations. You cannot create a FAT32 partition greater than 32GB in this version of Windows, and you cannot store a file larger than 4GB on a FAT32 partition.

The main reason to use FAT32 is because you have a computer that will sometimes run Windows 95, Windows 98, or Windows Millennium Edition and at other times run this version of Windows, known as a multiboot configuration. If that is the case, you will need to install the earlier operating system on a FAT32 or FAT partition and ensure that it is a primary partition (one that can host an operating system). Any additional partitions you will need to access when using these earlier versions of Windows must also be formatted with FAT32. These earlier versions of Windows can access NTFS partitions or volumes over a network, but not on your computer.

Convert a hard disk or partition to FAT32 format:

You must be logged on as an administrator to perform these steps. Before you begin, note that the FAT32 file system has size limitations. In this version of Windows, you cannot create a FAT32 partition greater than 32 gigabytes (GB). In addition, you cannot store a file larger than 4 GB on a FAT32 partition.

To format a hard disk partition with FAT32:

Open Computer Management by clicking the Start button , clicking Control Panel, clicking System and Maintenance, clicking Administrative Tools, and then double-clicking Computer Management. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

In the Navigation pane of Computer Management (Local), under Storage, click Disk Management. Right-click the partition you want to format, and then click Format. In the Format dialog box, under File System, select FAT32, click OK, and then click OK again.

3. To determine what type of file system a partition is using:

Open Computer by clicking the Start button , and then clicking Computer. Under Hard Disk Drives, right-click a drive, and then click Properties. The file system the drive uses is listed on the General tab under File system.

Glossaries:

FAT: File Allocation Table

FAT 32: File Allocation Table 16

FAT 16: File Allocation Table 32

NTFS: New Technology File System

Some great sites for you to learn more about online safety…


Keep it positive! With the right security software and sensible precautions, there’s no need to be afraid of the Internet. Your teen should take advantage of the wonderful opportunities it provides, and you should too!

Get educated. You are the first line of defense when it comes to the safety of your kids on the Internet. Some great sites for you to learn more about online safety are Commonsense Media (commonsensemedia.org), Cyber Smart (cybersmart.org), FTC (ftc.gov), Get Net Wise (getnetwise.org), iKeepSafe (ikeepsafe.org), i-Safe (isafe.org), Look Both Ways (lookbothways.org), Microsoft Online Safety (microsoft.com/protect), NetFamilyNews(netfamilynews.org), Netsmartz (netsmartz.org), On Guard Online (onguardonline.gov), Stay Safe Online (staysafeonline.org), Stop Cyberbullying (stopcyberbullying.org), Web Wise Kids (webwisekids.org), and Wired Safety (wiredsafety.org).

Keep yourself and your stuff safe online: Own Your Space!


Smart Books for Smart People: Own Your Space [a book about Online security]

This is a book for every teen and an essential resource for every parent and teacher. Especially though, this is a book for the computer savvy, keyboard-comfy teens who use the Net every day and want to know how to secure their systems, preserve their Net lifestyles, and protect their data. This book provides important details to keep those teens, their privacy, their identities, and their reputations safe in cyberspace. In short, this book is for normal teenagers—like you. We realize that you understand quite a bit about computers, probably a lot more than your parents. We also know from our own teens where the gaps in your computer knowledge tend to fall. We wrote this book to address those gaps. Because we know your time is limited, we’ve kept this short and tried to focus
on the important aspects of security. We also kept it interesting by including real examples and case studies from real teenagers just like you. Even if you are a power user, this book is still for you! Sure, you’ll know a number of the details we cover. Still, we are willing to bet that you’ll find a number of details you weren’t aware of before. And you’ll certainly find a lot of detailed information you can share with a less enlightened friend, sibling, or parent.

Download this amazing book free in .pdf format:

a) From MySpace

b) From Facebook

c) Own Your Space

d) Microsoft Download Center