Saturday, June 30, 2007

Registering Hyphenated Domain Names for Search Engin

Note that a registered domain name may include a hyphen (-) but no other punctuation. This is often helpful when you want to register a two-word domain name and the non-hyphenated version is already taken. For example, you may not be able to register the domain name DomainNameRegistration. com because it is likely taken.  But, you may be able to instead register the virtually identical domain name: Domain-Name-Registration. com. In fact, you may want to intentionally register domain names using hyphens as word separators as your first priority if you're looking to create websites which can be most easily found in search engines.  Yes!  Multiple studies of the internal functioning of Google and Yahoo and other search engines reveal that using the hyphen as a word separator in domain names allows a search engine to more easily determine word breaks and is thus very effective at producing significantly higher search engine placement results than non-hyphenated domain names.  So don't fear the hyphen when you register domain name!

On the other hand, if you wish to create a domain name which is more memorable, you can safely estimate that the vast majority of your website visitors will assume that a domain name spoken to them does not include hyphens.  Also note that when domain visitors remember domain names, they typically do not remember the hyphen as easily as a domain name consisting of all letters (or letters and numbers) and thus they often omit the hyphens when trying to remember a domain name and type it into the address bar on their browser.
For this reason, many webmasters will register a domain name in both a hyphenated version and non-hyphenated version.  For example, typing into your browser's address bar will bring you to the website because we registered this alternate, hyphenated domain name in the event our customers mistakenly type it into their browser that way.   This is a good way to prevent competitors from stealing a portion of your business by registering mistypes (and alternate extensions) of your domain name.   As an example of an alternate extension, you'll find that if you type the name into your browser, you'll similarly reach the website because we registered that alternative extension as well.

Tuesday, June 26, 2007

Restrict permission to confidential information in e-mail messages

The purpose of IRM and its limitations

Information Rights Management (IRM) allows individuals to specify access permissions to e-mail messages. This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a message has been restricted by using IRM, the access and usage restrictions are enforced no matter where the information is, because the permissions to access an e-mail message are stored in the message file itself.

IRM helps individuals enforce their personal preferences concerning the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.

IRM helps to do the following:

  • Prevent an authorized recipient of restricted content from forwarding, copying, modifying, printing, faxing, or cutting and pasting the content for unauthorized use
  • Prevent restricted content from being copied by using the Print Screen feature in Microsoft Windows
  • Restrict content wherever it is sent
  • Provide the same level of restriction to e-mail attachments, as long as the attachments are files created by using other Microsoft Office programs, such as Microsoft Office Word 2007, Microsoft Office Excel 2007, or Microsoft Office PowerPoint 2007
  • Support file expiration so that content in documents and e-mail messages can no longer be viewed after a specified period of time
  • Enforce corporate policies that govern the use and dissemination of content within the company

IRM can't prevent the following:

  • Content from being erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain types of spyware
  • Content from being lost or corrupted because of the actions of computer viruses
  • Restricted content from being hand-copied or retyped from a display on a recipient's screen
  • A recipient from taking a digital photograph of the restricted content displayed on a screen
  • Restricted content from being copied by using third-party screen-capture programs

Configure your computer to use IRM

To use IRM in the 2007 Office release, the minimum required software is Windows Rights Management Services (RMS) Client Service Pack 1 (SP1), which can be installed on your computer either by you or your RMS administrator. The RMS administrator can configure company-specific IRM policies that define who can access information and what level of editing is permitted for an e-mail message. For example, a company administrator might define a rights template called "Company Confidential," which specifies that an e-mail message that uses that policy can be opened only by users inside the company domain.

Install the Windows Rights Management Services (RMS) Client

  1. In Microsoft Windows, click the Start button, and then click Control Panel.
  2. Do one of the following:
    • Microsoft Windows Vista  Click Programs, and then under Installed Programs, click Install a program from the network. In the list of programs, click Windows Rights Management Services Client, and then click Add.

       Note    In Classic view, double-click Programs, and then click Get programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.

    • Microsoft Windows XP  Click Add or Remove Programs, and then click Add or Remove Programs. In the left pane, click Add New Programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.

       Note    In Classic view, double-click Add or Remove Programs, and then in the left pane, click Add New Programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.

Alternatively, when you first try to open e-mail messages that have been rights-managed by using IRM, Office Outlook 2007 prompts you to download the Windows Rights Management Services Client. For more information about the Windows Rights Management Services Client, visit the Windows Rights Management Services Web site.

Download permissions

The first time that you attempt to open an e-mail message with restricted permission, you must connect to a licensing server to verify your credentials and to download a use license. The use license defines the level of access that you have to a file. This process is required for each file with restricted permission. In other words, content with restricted permission cannot be opened without a use license. Downloading permissions requires that Microsoft Office send your credentials (which includes your e-mail address) and information about your permission rights to the licensing server. Information contained in the e-mail message is not sent to the licensing server. For more information, read the Privacy Statement.

Send an e-mail message with restricted permission

  1. Start Outlook, and then open a new message.
  2. Click the Microsoft Office Button , and then click Permission.

    To use a custom permission policy (permission policy: An approach to restricting permission for a given document, workbook, presentation, or message. The policy defines which Office features are available, which information can be accessed, and what level of editing is allowed.) that an e-mail administrator has created for people in your company, click the arrow next to Permission, and then click a custom permission policy on the menu.

  3. The InfoBar of the new message displays Do Not Forward, indicating that the message is rights-managed. This means that recipients cannot forward, print, or copy the message content. Only the person initiating the message, known as the conversation owner, has no restrictions.

  4. Address and send the message.

    Each recipient will be able to view additional content when replies are sent by anyone on the conversation thread.

Tip  You can also restrict permission to a new message by doing the following: In the new message, on the Message tab, in the Options group, click Permission .


  • If you attach a document, workbook, or presentation to a message with restricted permission, Office Outlook 2007 automatically applies the same restricted permissions to the attachment.
  • If the attached document, workbook, or presentation has already been rights-managed in its originating program, such as Office Word 2007, Office Excel 2007, or Office PowerPoint 2007, those permissions remain in effect.

Set an expiration date for a message

Even though it is not an IRM feature in Office Outlook 2007, you might want to set an expiration date for the new message so that its content can no longer be viewed after a specified period of time.

  1. In the new message, on the Message tab, in the Options group, click the Options Dialog Box Launcher .
  2. In the Message Options dialog box, under Delivery options, select the Expires after check box, and then select a date and time.

Use a different Windows user account to rights-manage e-mail messages

  1. Open the message.
  2. Click the Microsoft Office Button , click the arrow next to Permission, and then click Manage Credentials.
  3. In the Select User dialog box, do one of the following:
    • Select the e-mail address for the account you want to use, and then click OK.
    • Click Add, type your credentials for the new account, and then click OK twice.

View messages with restricted permission in Outlook

Messages with restricted permission that you receive can be identified by the following icon, which appears next to the message in the message list of your Inbox.

If you attempt to open and view a message with restricted permission without first obtaining a certificate, Outlook gives you the option to obtain one. After the certificate is installed, you can view the contents of the message by opening the message.

 Note    You cannot view the contents of a rights-managed message in the Reading Pane.

 Note    If the recipient replies to the message, only the sender who restricted the message, also known as the conversation owner, has full permission to the reply content. In other words, replies have the same restrictions to recipients as the original message.

If you need to read or open content with restricted permission but the 2007 Office release is not available on the computer that you are using, you can download the Rights Management Add-on for Microsoft Windows Internet Explorer, which enables you to view the messages in Internet Explorer. With this add-on, recipients can only view messages. Recipients cannot reply to, forward, copy, or print the messages.

 Note    When using the Rights Management Add-on to view messages, attachments that might have been sent with the message cannot be viewed.

Resource adapted from Microsoft Outlook 2007 (MS Office Enterprise edition-2007)

Modem Features and Types

Modem Feature


Who Should Buy


MNP10EC support

Improves performance on poor-quality phone lines by quickly adjusting line speed up and down with changing conditions.

Anyone with poor-quality lines, especially if modem at other end also has MNP10EC support; users who want to use modem with cellular phones.

Don't buy MNP10 support by mistake; MNP10EC is much better and includes MNP10. Check with ISP to see whether cellular connections are supported; speed of such connections can be 14.4Kbps or slower.

PCI bus

Works in PCI slots that dominate current systems and have replaced ISA slots. PCI modems can share IRQs with other devices and be redirected to open IRQs.

Anyone without ISA slots or who is planning to move the modem to another computer in the future and prefers internal modems.

Verify one or more PCI slots are available; look for other features listed here to make change as useful as possible.

USB connection

Works with USB connectors on most current and all future computers; high-speed connection and capability to connect many devices via a hub.

Anyone who wants portability and has USB connectors along with Windows 98 or above.

Although Windows 95 OSR 2.5 (Win95"C") has USB support, many devices require Win98 or better; make sure USB ports have been activated in BIOS.

Gaming-optimized modem

Faster PING and response for gaming, which is more important than data throughput.

Anyone who plays a lot of online games or wants to get started.

Game optimizations are not useful for ordinary Web surfing. These modems are more expensive than others.

Call-waiting support

Allows you to answer the phone and not lose modem connection, instead of disabling call waiting, which most modems require.

Anyone who uses call waiting and doesn't like voice callers to get busy signals; check with manufacturer to see whether your existing modem can be upgraded with a driver.

Maximum talk time might be only a few seconds; make sure you have the phone near the computer for fast "hello, I'll call you later" answers to avoid exceeding time limit.

V.92/V.44 support

Faster uploads, faster connection negotiation, Modem-on-hold, better throughput on downloads.

Anyone whose ISP supports all V.92/V.44 features.

Check with your ISP to see when V.92/V.44 support will be introduced and to see whether all features will be supported.

Voice support

Allows digitizing of received calls; computerized answering machine and faxback; inbound and outbound phone calls via computer.

Anyone who wants to use PC as a telecommunications center.

Check quality of voice recording; can use up a lot of disk space.

Adapted from 12th edition of Que, Upgrading and Repairing PCs

Can Non-56Kbps Modems Achieve Throughput Speeds Above 115,200bps?

Yes. To achieve speeds above 115,200bps, a better UART chip than the standard 16550-series chip found in modern PC serial ports and internal modems is required. 16650 UARTs have a 32-byte buffer, as opposed to the 16-byte buffer found in the standard 16550 UART. The 16650 is seldom used in PCs' built-in serial ports or as part of an internal modem, but it can be added by installing a high-speed serial port interface card (which might require you to disable your current COM ports).

Thus, to achieve the highest possible speeds, you need the following: an external modem capable of running at 230.4Kbps throughput, a 16650 UART chip in the serial (COM) port connected to the modem, and appropriate software drivers for the modem. Note that a 56Kbps-compatible modem isn't required! 230.4Kbps connections are available with anything from V.34bis to ISDN modems if the device is designed for that speed and you have the correct UART chip and drivers. But, as with the lower-speed throughput rates mentioned earlier, these speeds apply only to data that has not been compressed already.
External modems connected to the USB port instead of a serial port are capable of speeds above 115,200bps because of the faster throughput of the USB port. If  possible, use the USB port rather than the serial port if you need to connect an external modem to your computer.

Monday, June 25, 2007

Add Rename and/or Delete to special folders

I have given my concentration to make these codes accurate as far as I know. While using these resources, you're responsible for any damages caused to your system. However, you can notify me of any confusions/errors occurred by the use of any of these codes. Simply, make a comment the this geek blog posting.
You can add a Rename or Delete command or both to the right-click menu for special folders like My Computer, My Documents and so on if you know the GUID (Globally Unique ID) for that folder. Just navigate to HICEY_CLASSES_ROOT\CLSID\{GUID}\ShellFolder and add or modify a Binary Attributes value (New > Binary value) to change the setting. In place of {GUID}, use one of these:


Globally Unique Identifier (GUID)

Administrative Tools



{ 85BBD920-42A0-1069-A2E4-08002B30309D }

Control Panel



{ D20EA4E1-3957-11d2-A40B-0C5020524152 }


{ FF393560-C2A7-11 CF-BFF4-444553540000 }



Microsoft Network


My Computer


My Documents


My Network Places


Network Computers


Network Connections


Printers and Faxes


Programs Folder


Recycle Bin


Scanners and Cameras


Scheduled 'I'asks

{ D6277990-4C6A-11CF-8D87-OOAA0060 F 5BF }

Start Menu Folder


Temporary Internet Files


Web Folders


Enter these settings in the Attributes
value to add the new context menu items: I
These will appear under the File Menu in
50 01 00 20-Rename only
60 01 00 20-Delete only
70 01 00 20-Rename and Delete

These will appear under the Edit Menu in
41 01 00 20-Copy only
4201 00 20-Cut only
4301 00 20-Copy and Cut
4401 00 20-Paste only
4501 00 20-Copy and Paste
4601 00 20-Cut and Copy
4701 00 20-Cut, Copy and Paste @

Saturday, June 23, 2007

DOS Command Reference

Even if the systems you support, upgrade, and repair are all running the latest version of Windows, you will inevitably find yourself occasionally troubleshooting these systems from the DOS command line. This is partial adaptation from Upgrading and Repairing PCs, 12th Edition by Que.
This blog post tends to provide you with all the basic essentials that a programmer need to know. Though this is an age of visual programming, I think the commands presented here may help you as they're doing to me. [Project : Basic Commands]
DOS Commands Found in DOS 6.22, Windows 95, and Windows 98

The Windows 98 Internal DOS Commands




Sets or clears extended Ctrl+C checking.


Changes to a different directory or, if run without parameters, displays the name of the

current directory.


Displays the number of the active character set (code page). You can also use this

command to change the active character set for all devices that support character-set switching.


Takes the same action as the CD command.


Clears the screen.


Copies one or more files to the location you specify.


Changes the terminal device used to control the computer.


Displays or sets the current date.


Deletes the files you specify.


Displays a list of the files and subfolders that exist in the current or specified folder.


Deletes the files you specify.


Quits COMMAND.COM and returns to the program that started the command inter-

preter, if one exists.


Loads a program into upper memory.


Takes the same action as the LH command.


Enables direct disk access.


Creates a folder or subfolder.


Takes the same action as the MD command.


Specifies which folders Windows 98 should search for executable files.


Changes the appearance of the command prompt.


Deletes a folder.


Changes the name of the specified file or files.


Takes the same action as the REN command.


Takes the same action as the RD command.


Displays, sets, or removes environment variables.


Displays or sets the current time.


Displays the contents of the specified text file.


Disables direct disk access.


Displays the operating system version number.


Directs the operating system to verify that files are written correctly to a disk and dis-

plays the status of verification.


Displays the volume label and serial number for a disk.


The Windows 98 External DOS Commands




Displays or changes the attributes of the specified files.


Checks a disk for (and optionally repairs) lost and cross-linked clusters. ScanDisk does a

better job at finding and repairing these errors.


Used in batch files to present the user with a list of options.


Starts a new instance of the command interpreter. This file is usually found in the root

directory of the boot drive.


(Windows 98 only) Runs Windows Script Host scripts.


(Windows 95 OSR 2 and Windows 98 only) Converts FAT drives to FAT32.


Tests and edits executable files.


Deletes a folder and all its files and subfolders.


Makes an exact copy of a floppy disk.


A memory-resident program that recalls commands, edits previous command lines, and

runs macros.


Starts a text editor you can use to create and edit ASCII text files.


(Windows 95/98 only) Extracts files from a compressed cabinet (CAB) file.


Compares two files and displays the differences between them.


Starts the FDISK utility.


Searches files for a specified text string.


Formats a disk.


Extracts a file from an Internet Explorer backup information (DAT) file.


Configures a keyboard for a specific language.


Creates or modifies the volume label of a disk.


Displays the amount of used and free memory on the computer.


Configures a printer, serial port, or display adapter; sets the keyboard repeat rate; redi-

rects printer output from a parallel port to a serial port; prepares, selects, refreshes, or displays the numbers of the character sets (code pages) for parallel printers or the key-board and screen; and displays the status of all the devices installed on the computer.


Pauses command output to display one screen at a time.


Moves files and renames folders.


Loads the real-mode CD-ROM driver.


Loads country-specific information for national language support.


The real-mode version of ScanDisk.


(Windows 98 only) Scans the Registry for damage.


Reads input, sorts data, and writes the results to the screen, a file, or another device.


Enables you to set various parameters for running Windows programs from the DOS



Substitutes a drive letter for a path name.


Creates a bootable disk by copying Windows 98's system files and

COMMAND.COM to the disk.


The extended copy command.


(Windows 95 and Windows 98 only) The 32-bit version of XCOPY.


DOS 6.22 Commands Not Installed by Windows 95/98 but Available on the CD-ROM

Old DOS Commands Available on the Windows 98 CD-ROM




Displays descriptions, syntax, and examples for all DOS commands. HELP.HLP is also



Runs the Microsoft Diagnostics program used to gather system information for trou-

bleshooting. Superseded by the System Information utility in Windows 98.


The programming environment for creating QBASIC applications. QBASIC.HLP is also


Old DOS Commands Available on the Windows 95 CD-ROM




Establishes a DOS search path for data files.


A device driver used by MemMaker to optimize memory use. You cannot use this driver.


Extracts a file from compressed format on the DOS distribution disks to a usable uncom-

pressed form.


Enables the Print Screen key to print the contents of a graphics screen on a suitable



Launches a full screen online help utility for the DOS commands.


Client device driver for an InterLnk network.


Server device driver for an InterLnk network.


Forces a program to load into the second 64KB of memory.


Utility for optimizing memory usage by device drivers and other programs loaded by



Runs the Microsoft Diagnostics program used to gather system information for trou-



Print spooler for ASCII text files.


Starts the Microsoft QuickBASIC development environment, a program for writing and

running BASIC language programs.


Replaces or adds files to a subdirectory.


Restores files created by the BACKUP program from one disk to another.


A program used by MemMaker to optimize memory use. You cannot use this program.


Displays the subdirectory stricture of a disk.


Undeletes a file or group of files.


DOS 6.22 Commands Not Available in Windows 95 or Windows 98

DOS 6.22




In DOS 2–5, attached an alias drive letter to an existing drive. Replaced by SUBST in

DOS 6 and later.


A utility to back up files from a hard disk to a series of floppy disks. Replaced by MSBACKUP in DOS 6 and with the GUI version of Backup for Windows 95 and

Windows 98.


Compares two sets of disk files of the same name and same length. Included in DOS

1–5 but only on supplemental disk in DOS 6.


In DOS 4–6, a full screen menu driven shell for the DOS command line. Included only

on the supplemental disk for DOS 6.2.


In DOS 1–5, edits an ASCII file, replaced by EDIT. Only on supplemental disk in

DOS 6.


Returns the same help information as including the /? switch with a DOS command.


A utility that sped up the process of opening files in DOS.


A DOS 3–5 utility for loading tables of additional character sets for CGA adapters.

Only on the supplemental disk in DOS 6.


In DOS 3.1–5, connects one drive to a subdirectory of another. Only on the supplemen-

tal disk in DOS 6.


In DOS 5, records information about the FAT, the root directory, and optionally the parti-

tion table which can be used by UNFORMAT and UNDELETE. Only on the supplemental disk in DOS 6.


Microsoft Anti-Virus for Windows 3.x.


Microsoft Backup for Windows 3.x.


Controls use of APM in laptop systems and other APM-enabled systems.


A file recovery utility with DOS 2–5 that was not distributed with DOS 6 or later. Not

recommended for use with any version.


DOS version control program that reports a different DOS version number to programs

requiring a specific version of DOS to run.


File sharing and locking capabilities for DOS.


SMARTDrive monitoring and configuration program for Windows 3.x.


Recovers a disk that was accidentally formatted. Note that using the /U switch with the FORMAT command will prevent the UNFORMAT command from being able to recover the



A memory resident utility that warns you of virus-like activity.

 posted @ i-geek blog

Subscribe to geeklog feed Bookmark and Share

Design by Free blogger template