Prevent Outlook From Automatically ‘Marking your emails as read’



Sometimes, we like to go quickly through all the emails received but as we proceed, Outlook automatically marks these emails as ‘Read’ & by the time we decide to start over, we’ve already lost track of the emails or at least are in some confusion. The only option is to either mark them as ‘Unread’ or assign the ‘Read, Blue or Green’ tags.

Another situation is when, you’re reading someone else’s emails for some reason & then you don’t want Outlook to mark them as read automatically, so the owner can follow-up all unread messages at leisure.


Outlook 2007 & older: Go to Tools > Options > Others (tab) > Reading Pane (button)
Outlook 2010 & Outlook 2013: View > Reading Pane > Options

Mark item as read when selection changes” – this is the default selection which means, if you open one email & then select another, the previous email will be marked as read. If we disable this option, all emails remain “unread” unless we open each email in a new window by double clicking them.



Adding delay

Double clicking each email to mark as read is not a great solution for many of us… but, if you only need to quickly go through the whole set of new emails – then, adding a delay (duration) is a perfect way to handle it.

Now suppose, you’re quickly browsing your emails & approximately it takes about 10 seconds for you to review one email – then, “Mark items as read when viewed in the Reading Pane” is the most correct solution. You should consider activating this option & put the value as 15 or 20 seconds before marking emails as read.

Keyboard shortcuts

In addition to the menu or context menu options, we can also use the keyboard shortcuts to mark items as read or unread. Below are the easiest shortcuts to mark as read or unread:
  • To mark emails as read, you can use: CTRL+Enter or CTRL+Q
  • To mark emails as unread, use: CTRL+U
Outlook provides several different options to choose from that fits best in your situation. Some people prefer one way & some prefer the other. 

Root Kit-Painless Removal (Trust me)..You won't Feel a Thing!!

Now some information about Root Kits & the pain less removal 





 No  I'm not talking about your teeth!

A root kit is a piece of software that acts like the root user. Sometimes people actually use root kits for good, like logging into a compute remotely.
However, most root kits aren't so friendly. Instead of effectively managing your system resources, it does the opposite.

Root kits are especially nefarious pieces of malware because the can hide from the computer. Where normal pieces of malware can be easily detected with a scanner, many root kits don't show up in a scan. They can even survive a re install of your operating system, making them especially hard to remove.

You might need Root kit Removal if...


Need some work Done?

  1. Root kit removal performed by a qualified technician
  2. Free estimates - no obligation included
  3. Per-job pricing: no surprise costs
  4. I guarantee you'll be satisfied with your root kit removal or we'll finish the job for free
  5. Famous customer service

How to Install Windows 8 from USB & recover your Windows Product Key!

How to install Windows 8 from a USB -

This applies to Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2 and Windows Server 2012.

You can use it without any worries, for any version . The motherboard must also support boot from USB but unless you have a machine over 6 years it should be compatible.

The Windows USB installation is very fast,



Things needed
USB (minimum 4G)
Windows installations (ISO)
Your Windows Product key!



First things you will want to do is Recover your windows product key
Many programs were developed for recovering Windows 7 product keys but not that many work on Windows 8

Download Belarc Advisor

Not only will it show your Windows license key but also builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status and security benchmarks. When you run it, it spends quite a while analyzing the local network of your computer or device. 




Windows 10 Key logger DiagTrack -What is does and how to disable it!!

DiagTrack -What is does and how to disable it!! 


It looks like Microsoft may be collecting a lot more feedback from you behind the scenes. Microsoft collects information about you, your devices, applications and networks, and your use of those devices, applications and networks.

 " This isn't the only thing Microsoft is collecting, According to the Privacy Policy, the company is collecting things like text inputted into the operating system, the details of any/all files on your system, voice input and program information.



OK so if they're storing typed characters in some fields temporarily to help improve autocorrect, that's great. If they're storing every character I type, including all my passwords and personal information, I just want to know that so I can make an educated decision as to what I should and shouldn't do with the alpha/beta/whatever.  

In other words, if they're storing typed characters in some fields temporarily to help improve auto-correct, that's great. If they're storing every character I type, including all my passwords and personal information, I just want to know that so I can make an educated decision as to what I should and shouldn't do with the alpha/beta/whatever....

This from Microsoft:

We must stress that the feedback being collected in the Windows Technical Preview will only occur within the Technical Preview period. Once Windows 10 launches to the public as RTM, the data Microsoft collects will be removed from the operating system.
This isn't a permanent feature within Windows 10, and therefore should not be a concern to your average Joe.

Google Inbox: Review Tips & what you need to know

Google Inbox: Review

Google aims to reinvent email with Inbox. Here's a peek inside the invitation-only app, plus tips for using it.

Google knows you have  an email problem: the endless promotions from retailers, the droves of spam, and (hidden somewhere in that drivel) the stuff that actually matters, like messages from friends and family. That's where its Inbox app, Google's newest take on managing and using email, comes in.

Inbox, which debuted Wednesday, completely reimagines your inbox. The app doesn't replace Gmail on the Web or its mobile app, but it integrates with your account as an alternative way to organize and visualize your messages. While our online habits have changed since Google introduced Gmail 10 years ago, Google says, email hasn't evolved with us.

Inbox organizes your messages into bundles, such as Social, Promotions, and Finance. It also highlights important information like event details and photos emailed by friends and family, and lets you control what you want to see -- now, later, and never -- through a series of new actions.

Inbox's sweet ass new design and approach to email might not be for everyone, but it also could be the solution you're looking for.

Here's a look at what makes the app different, and a peek into its features.

1. Inbox is invitation-only.
Anxious to try Inbox? You may have to wait. Google's limited release of the app is reminiscent of Gmail's launch and requires an invitation from someone who already has access. If you're lucky enough to get your hands on one, it will point you to either Google Play or the Apple App Store to download it. Inbox isn't available for Google Apps business users.

An invitation will also give you access to the desktop version at inbox.google.com, but only via the Chrome browser. If you don't have an invitation, email inbox@google.com to get on the list for subsequent invitation releases.

Inbox doesn't replace your mobile Gmail app or the traditional desktop site, it's just an alternative. Google says Gmail "isn't going anywhere" -- Inbox is just "a new experience designed and developed alongside Gmail."

2. It Modern & Colorful but...
It can seem a little overwhelming at first. You'll notice that your messages are grouped by date, with Today at top, followed by Yesterday, and This month.
Inbox also corrals your messages into categories, which resurface as bundles of emails when you receive something new.

Two of these bundles include Social and Promotions, which you already had the option to use as tabs within the desktop version of Gmail. New categories that Inbox introduces include Finance, which files bills and statements; Purchases, which feature tracking numbers and receipts; and Travel, for updates from airlines and hotel confirmations. You can create your own bundles, too.

When you receive an email confirmation for a hotel you booked, for example, you'll see your Travel bundle bump to the top of Inbox and display booking details, such as the name of the hotel and dates you're staying there. Click or tap the bundle to view your new email, along with all the old stuff in 
ails on package deliveries. Google says this approach gives you more information at a glance.

3. Get to know the buttons.
Inbox introduces a series of buttons that can be a little confusing to figure out. From the main view of Inbox, you can "sweep" a category -- denoted with a check-mark icon -- which dismisses an entire bundle of emails. When you sweep a bundle, those messages are sent to a separate Done tab, which you can access from the menu in the top-left. The Done tab is an archive of your old emails.

By clicking or tapping the thumbtack icon, you can pin emails to your inbox that you still need to read or follow-up on. If the email is part of a bundled label like Promos or Social, it will show up individually in your inbox. To dismiss a pinned item from your inbox, click the check mark button or swipe right. If you need to find it later, you'll find it in your Done tab.

Replying to, forwarding, and creating emails is a little hard to find, too. To reply to or forward something, open up the individual email. You'll see a button with three dots above or beside the email header, and another inside the email next to the time it was delivered. Click or tap the latter to open the reply or forward options.

To send an email from within Inbox, click or tap the big red + button. Your most-recent contacts will appear as an icon, which you can tap or click for quick access. To compose a message, tap the red pencil icon. Inbox doesn't appear to have all the compose options that Gmail does; you can't upload a file from Drive or send and request payments, for example.

4. Use Snooze and Reminders to prioritize.
Inbox's two best features are Reminders and Snooze. Neither option is particularly new; Reminders is Inbox's version of Tasks, and Snooze is akin to the Boomerang add-on -- but Inbox does a better job of integrating them.

On the desktop version of Inbox, hover over an email and click the clock icon to open up your snooze options, which will bump that email to the top of your inbox at the date and time you choose. On mobile, swipe left. This option is handy for messages that you don't have time to reply to at the moment.

Reminders is another useful tool to help you keep on top of tasks. To set a reminder, click the red + button and choose the blue finger icon. Type in your reminder and set a time. On mobile, you can set a location-based reminder by tapping the "Pick a place" option. This requires that you turn on Location Settings. Your reminders will appear in your inbox and in Google Now, if you use it.

5. Give Inbox time.
Inbox uses a very different approach to managing your email, so there is a fairly steep learning curve. (I started using the app Wednesday night and, Thursday morning, am still getting used to the bundling and sweeping and organization of it all.) If you're a casual email user who prefers the chronological nature of Gmail, Inbox probably isn't for you. But if you feel like you're drowning in email and are looking for an alternative way to manage it, give Inbox a try, and give it time.

Phone Numbers for Hardware & Software Vendors ( Time to add some new Contacts )


Computer hardware\Software
Manufacturers Support\Service website link's and phone numbers


3COM
847-262-0070

3Ware
877-883-9273


Acer
408-533-7700

Actiontec
408-752-7700

Adaptec
408-934-7274
Addonics Tech.
408-433-3855

AG Neovo
866-333-3686
Altec Lansing
800-ALTEC-88

Ambicom, Inc.
408-562-0168
AMD
408-749-3060

AMS
510-353-0211
Antec Corp.
510-770-1200x330

Aopen America
408-232-1216
APC
800-555-2725

Asus
502-995-0883x3
Asus Notebook
888-678-3688

Atech Flash
866-852-8324
ATI
900-733-2841

B

BTC
510-657-3956

Belkin
800-223-5546x2263

Brother
800-284-4329



C

Cable Unlimited
800-609-7550

CardExpert
510-252-1118

Cooler Master
909-673-9880
Corsair Micro
510-657-8747

Creative Labs
405-742-6655
Cyber Acoustics
360-883-0333

Cyber Cooler
626-820-0999


D-Link Systems
949-788-0805



Edimax
408-988-6092

Epson
562-276-1300

Exabyte Corp.
303-417-7792


Fujitsu
800-626-4686

Gigabyte Int.
626-854-9338

Hewlett Packard
800-474-6836

Hitachi
888-426-5214

Imation
888-466-3456

Intel
916-377-7000

Iogear
866-946-4327
Iomega Corp.
888-446-6342

Ione
510-413-9018
Iwill
949-753-5488

J

Just Cooler
1-886-3-3296023-4

Jet Way Computer
510-683-6588


KDS
800-283-1311

Kensington
800-535-4242

Keyspan
510-222-8802
Keytronic
800-262-6006

Kingston Tech.
800-435-0640
Kingwin
888-588-5733

Kinyo Company
800-735-4696
Koutech Systems Inc.
562-699-5340

Labtec Inc.
702-269-3612

Laser Publishing Group
510-222-0199

Lifeview
510-661-2968
Linksys
800-326-7114

Lite-On
888-454-8366
Logitech (Retail)
702-269-3457

Macally
626-338-8787

Matrox
514-822-6000

Maxtor
800-262-9867
Microsoft (Retail)
800-227-6197x299

Minolta Corp.
201-825-4000
Monster Cable
415-840-2000

Motorola
800-521-6274
MSI
626-581-3001

NEC Monitors
800-632-4662

Netgear
888-638-4327

Orinoco (Proxim)
866-674-6626

open-e
678-666-2880

Palm
408-503-7000

PC Power & Cooling
760-931-5700

Phoebe Micro
510-360-0800
Pioneer Elect.
800-421-1404

Plantronics
800-544-4660
Plextor
800-886-3935

PNY Tech.
800-234-4597
PQI USA
510-651-7281

Proxim (Orinoco)
866-674-6626 

Qumax (Qtronix)
510-413-9018


Recortec
800-729-7654

Ricoh Corp.
800 327-8349

Samsung
800-726-7864

Sandisk
408-548-0275

Sapphire
909-594-0597
Seagate
800-468-3472

Sharp Elect.
888-467-4277
Shuttle
626-820-9000

SIIG
510-657-8688
SMC
800-762-4968

Sony
866-357-7669
Stardom Storage
886-2-2278-9697

STI
800-274-3475
Supermicro
408-503-8000

Swann Communc.
510-441-2133

Targus
714-765-5555

726-0303

TDK Elect.
866-629-3893
Thermaltake USA
626-968-9189

Toshiba
800-222-5805
Twinbridge
323-263-5931

Twinhead Corp.
800-995-8946
Tyan Computer
510.440.8808

USR
801-401-1141


Vantec
510-668-0368

Vaster
1-866-9-Vaster

Vastech Inc.
408-577-1888

Viewsonic
800-688-6688

Wacom Tech.
360-896-9833

Western Digital
800-275-4932

Wintec
408-856-0701


Xerox
800-821-2797


Zoom Telephonics
617-423-1072


Google Chrome Remote Desktop Setup & Helpful Tips

Google Chrome Remote Desktop Setup & Helpful Tips

Chrome Remote Desktop allows users to remotely access another
computer through Chrome browser Mac or PC from your Android device,
whether smart phone or tablet


You will need a Goggle account.
  • Chrome Remote Desktop service, as a host, is not supported on, Mac OS X 10.5, Chrome OS (meaning Chromebooks), Linux and Windows OS below XP.
  • Remote access is available to any devices that runs Chrome.
 
Install the Chrome Remote Desktop app on every computer you want to access remotely and every computer you'd like to connect from.
  1. Visit the Chrome Remote Desktop app page in the Chrome Web Store.
  2. In the upper-right corner of the window, click the blue + Free button to download Chrome Remote Desktop.
  3. Click Add in the confirmation dialog.






Once the extension is installed, click on the Apps button on Chrome's bookmarks bar.












Then select Chrome Remote Desktop in the tab that opens.
Once the app has been added, the Chrome Remote Desktop icon Chrome Remote Desktop App will appear in the App Launcher
When you open Chrome Remote Desktop app for the first time, you’ll be asked to authorize it. This will allow the app to do the following:
  • See your email address
  • See your Chrome Remote Desktop computers
  • Receive and send chat messages (this is how we get the two computers to “talk” to each other)

Chrome Remote Desktop requires extended permissions the first time it starts up.

With Chrome Remote Desktop open, you'll be asked to give the extension "extended access permissions" to your PC by clicking Continue. This process is really self-explanatory and includes choosing a Google account to associate with Chrome Remote Desktop. That way, you can just sign in to Chrome on any PC and be able to access your list of PCs.

After that's done, you should see two options: Connect to a computer to offer remote assistance or access your own computers. Tap the Get started button under "My Computers."





You'll then see a list of PCs connected to your account. If this is the first time using Chrome Remote Desktop then you'll only see one PC, which is the one you're currently on.

Since this is the first time using the service, you'll see an Enable remote connections button. This is required if you plan on accessing the PC remotely.

Select the button and you'll be asked to create a PIN to associate with the PC.
After a few seconds you will also be asked to enter that PIN a second time in a new window. All the PCs that use Chrome Remote Desktop require a PIN to prevent unauthorized access.
After that's done you are all set-up and ready to access your PC remotely.

You must enter your remote PC's secret PIN to access it.

Ok so your on a laptop and you want to access your desktop at home, with the Chrome Remote Desktop extension already installed and set-up on both.

Simply open the extension and click on your home PC from the list of computers in the remote access list, then enter the home PC's PIN in the pop-up window that appears.

Within a couple seconds you'll have complete access to your PC at home within the Chrome tab—

When you enter your PIN to access a remote PC you also have the option of telling Chrome Remote Desktop to not prompt you for the PIN in the future.
Just keep in mind that if you enable this feature, anyone who has access to your laptop could then gain access to your desktop at home.

Any PC that will be accessed remotely requires you to enable remote connections.






 







Perform a Clean Installation of Windows 8

This article provides a step-by-step guide for performing a clean install of Windows 8 on a computer,

 

  1. Insert the Windows 8 DVD into your optical drive and restart your computer, tap the F12 key repeatedly until the Please Select Boot Device: menu appears. Select CD/DVD/CD-RW Device and press Enter.
  2. The Windows 8 Setup appears.
     
  3. Select Language to install, Time and currency format, and Keyboard or input method and select Next.
     
  4. Select Install Now.
    The Product Key screen appears.  
    Locate your Product Key and type it into the box provided, then click Next to continue.
    The Product Key is a 25 character sequence, separated by dashes.

    At the Which Type of Installation do you Want screen, select Custom: Install Windows only (advanced).
       
  5. At Where do you want to Install Windows? screen, select Drive options (advanced). Remember that the next step will delete all existing information on your computer so be sure to back up what you want to keep. For a clean installation, delete all partitions that are shown by highlighting them one at a time and selecting Delete. After you have deleted all partitions select Unallocated Space and then select New. Click Apply to create your new Windows 8 partitions, then click Next.
     
  6. Windows will now be freshly installed on your computer.
     
  7. Your computer will restart several times. This may take some time to complete installation.

Upgrade to Windows 8 From a Retail DVD or USB Key

  1. Insert the Windows 8 DVD into your optical drive. If you are using a USB key, open the USB key folder in Windows Explorer and select Setup.exe
    The Windows 8 Setup will automatically appear on your screen.
     
  2. Select Go online to install updates now (recommended) and click Next.
    The Product Key screen appears.
     
  3. Locate your Product Key and type it into the box provided, then click Next to continue.

    The Product Key is a 25 character sequence, separated by dashes.
    If a correct key is typed into the box, the line below the box will state, "Your product key works! Continue when you're ready
    If an incorrect key is typed into the box, the line will say, "This product key didn't work. Please check it and try again, or try a different key"

  4. Accept the license terms described in the License Terms screen. Click the checkbox at the bottom of the screen to accept and click Accept to continue.
     
  5. At the Choose What to Keep screen, select the desired level of retention for settings and files. For more information, click Help Me Decide at the bottom of the screen to get details on what will and will not be kept with each selection. When you have made your selection, click Next to continue."
     
  6. The Making sure you're ready to install screen will check your hardware and software for compatibility with Windows 8.
     
  7. When finished, you will get a list of items that may be affected by Windows 8 upgrade on the What needs your attention page. Be sure to visit our Windows 8 Upgrade Checklist for information on your specific computer's support of Windows 8 and drivers and software that may need to be updated or uninstalled before upgrading to Windows 8.
    To proceed, you may need to uninstall or restart some applications. Proceed through the list from top to bottom, until the Refresh button at the bottom of the screen has changed to Next. ClickNext to continue.

    You may need to restart the installation of Windows 8 multiple times to proceed past the "What needs your attention" page.
    If you have uninstalled software manually but it is still listed as needing to be manually uninstalled, restart your computer and restart the Windows 8 installation.
  8. At the Ready to install window, click the Install button in the bottom right to begin installation.
     
  9. Your computer will restart several times. This may take some time to complete installation.
     
  10. Windows 8 will boot up for the first time. Proceed to Windows 8 Post-Install Setup.

Windows 8 Post-Installation Actions

  1. Personalize - select a color to set your color theme for Windows 8. This setting can be modified later.
     
  2. Wireless - Connect to a wireless network to start updating your Windows files. If your network is not broadcasting its network name (SSID), click Connect to a hidden wireless network at the bottom of the screen. If your wireless network is not shown, click Connect to a wireless network later.
    When you have selected your wireless network, click Connect at the bottom of the screen.
     
  3. Settings - using the Express Settings to automatically set up Windows Updates and set automated controls to protect your PC.
     
  4. Sign in to your PC - Sign in with a Microsoft Account or use a local account to sign in.
     

Defense against Virus's n Spyware


 
Prevention Is Possible - Here are Seventeen Tips

Spam, viruses and spyware continue to grow exponentially,
.
There are ways to fight these menaces, however. Here are 17 tips to help you avoid spam, virus, spyware, adware and malware:


A - Be careful with the spam you receive
1 - Don't buy anything promoted in a spam message.

2 - Don't reply to spam or click on its "unsubscribe" link. That simply informs the sender that your e-mail address is valid.

3 - If your e-mail program has a preview pane, disable it to prevent the spam from reporting back to its sender.

4 - Use one e-mail address for family and friends, another for everyone else. When an address attracts too much spam, abandon it for a new one. Select an address with embedded digits, such as jane8doe2@isp.com.

5 - If you get lots of spam, check your Internet service provider's filtering features and compare them with those of competitors.

6 - To help the Federal Trade Commission control spam, forward it to
spam@uce.gov.

7 - Don't post your e-mail address in its normal form on a publicly accessible Web page. Post it in a form, such as "Jane AT isp DOT com," that can't be easily read by harvesting software.


B - Beware of viruses and hackers
8 - Don't open an e-mail attachment unless you were expecting it.

9 - Use anti-virus software and heed security alerts e-mailed directly from anti-virus vendors to download antidotes for newly circulating viruses and worms.

10 - Install a firewall with both incoming and outgoing protection.

11 - Regularly update your operating system, Web browser and other major software.

12 - Use passwords that are at least eight characters long that include at least one numeral and one symbol. Never disclose a password online.

13 - When you aren't using the computer, shut off the modem or the computer itself.

C - Beware of New Software Downloads

14 - Download and install software only from trusted sources. Close windows containing pop-up ads or unexpected warnings by closing the entire window, not by clicking within the window.

15 - clicking on "Agree" or "OK." Read any privacy statements. If they are difficult to find or include questionable practices, abort the installation by closing the window in which it's occurring.
16 - Adjust your Web browser's security settings. If you use Microsoft Internet Explorer 6, keep its security level at medium or higher to block Web sites from downloading a file without your authorization.

17 - Use updated anti-spyware software to scan your hard drive regularly. Always download it from a trusted site. Update the anti-spyware.






Boot into Safe Mode w/ Networking (on a dedicated VLAN, cell phone hotspot, or somewhere else not on your LAN to be safe) and use:

1. RKill to stop malware processes
2. TDSSKiller for rootkits
3. ComboFix for all threats
4. Malwarebytes for anything left
5. AV of choice to finish
In my experience, if this doesn't kill it, nothing will. Best bet is to Nuke it
 

Chrome Remote Desktop -Curtain Mode Blank Screen (Done the Easy Way)

How to enable Curtain Mode (Blank Screen) on remote computer



To enable Chrome Remote Desktop to prevent someone physically present at a host machine from seeing what a user is doing while a remote connection is in progress.

What this does is block anyone physically presents at the host (other machine) from seeing your actions on the device when you’re remotely connected. 

What you can do is copy the txt below

-------------------------------------------------------------

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\

Google\Chrome]
"RemoteAccessHostRequireCurtain"=dword:00000001

-----------------------------------------------------------------------------------

Ok now create a new .txt file on your Desktop and paste the txt into it and save it as
ChromeCurtainMode.reg

Now all you need to do is double click on the file and run it, You will see a confirmation that its been copied to the registry!





This is what the .TXT file should look like, Make sure to save it on your Desktop and rename it ChromeCurtainMode.reg
Make sure you Enable RDP connections to the machine by selecting Control Panel\System and Security\System > Remote settings > "Allow connections from computers running any version of Remote Desktop (less secure)".


Oh and reboot!!

  
  

Bitcoin auction

 The US government will auction $18 million worth of the virtual currency Bitcoin, which was seized by the FBI when it shut down the Silk Road online marketplace in October last year.

Is your IPhone getting Hot?

If you got your iPhone from Europe, there is a chance that you might have a faulty power adapter. The model number for the faulty adapter is "A1300". Apple has announced that they will be replacing it for free.

Surfing the web should be fast and fun- Maxthon Cloud Browser

Maxthon is a state-of-the-art, multi-platform web browser that regularly outperforms other top browsers and offers users a seamless browsing and sharing experience.
Thanks to our supporters, Maxthon is a global phenomenon: a community – of friends, colleagues
and fans – who believe surfing the web should be fast and fun



Maxthon Cloud Browser for Windows


Maxthon Cloud Browser for Windows uses a unique, innovative dual-core design Fast and efficient,  With its first-place HTML 5 support and ‘out of the box’ features you can‘t get anywhere else, Maxthon Cloud Browser for Windows frees people to share and send files among different devices and platforms, easily.

Maxthon Cloud Services

Cloud Push: Supports sending text, images, websites/links and tabs to Mac, Android and Windows operating systems.
Cloud Share: Supports sharing text, images, websites/links and files with friends.
Cloud Download: Supports downloading files in various formats and uploading them to 'My Cloud' for backup on any device.
My Cloud Tabs: Lets you pick up where you left off by automatically syncing your tabs to Android, iOS or Mac devices.
Cloud Sync: Syncs account data (Favorites, Settings and Magic Fill data) to other devices.

Easy-on-the-Eyes Reading

Reader Mode: Makes it easy to view articles by adjusting font sizes and removing ads and other distractions.
Night Mode: Adjusts the brightness of the screen for low-light reading.

Features that Make Web Browsing Less Annoying and More Convenient

Magic Fill: Maxthon securely saves the names and passwords of websites you visit and then fills in that information when you return.
Ad Hunter: Maxthon removes advertisements with one click, and automatically blocks annoying pop-up windows.
New Session: Users and gamers can simultaneously log into the same website with different accounts.
Source Sniffer: Extract all photos, embedded videos and audio files from a web page and download them with one click.
SkyNote: Save and access text notes anywhere, anytime. You can also sync them across Windows and Android.
"Do Not Track” protects your privacy by preventing ad networks from tracking you.

Extension Center

Maxthon has a diverse selection of extensions for entertainment, information and social media.
Extensions are easy to install and manage with just one click.

Easy Screen Grabs with Maxthon 'Snap'

Click the camera button in the toolbar to easily and quickly capture a screenshot of the entire web page in one click!

Security and Privacy

Safe site technology identifies websites you are about to visit and lets you know if they are safe and secure.
Maxthon blocks malicious websites and phishing attempts for you, automatically.
Easily launch a private browsing session that does not track history.

Download it today - 
 Maxthon.com

Companies are Tracking You On Facebook!


Do you know that many companies can track you on Facebook?

Yeah well let's put an end to that crap right now

Ok so while you are using Facebook, you are giving many companies a lot of information about yourself which it is selling to advertisers in one form or another. Do you want to know who the companies are and want to block them?

Most people forget that when they download or sign up for an app or website using their Facebook login, they're giving those companies a direct look into their Facebook profiles and some of their personal data. That can often include your email addresses, phone numbers, even your current location. However, if you want to know which companies can peep into your Facebook account, follow the steps below.

Step 1: Click on the Facebook's Settings button > Settings.

Step 2: Click on Apps.

Step 3: A Facebook Apps setting page will appear on the screen. Now click on the "Show All Apps" and you will see a list of all the apps that you use. Therefore, you get to know which app makers have the ability to peep into your Facebook account.

Step 4: For each app, there is an "Edit" function at the right side on that page (above image). By clicking any of the Edit function, you will be able to know what the app needs to provide you its service. If the app needs your basic info, that means it can view more info of you including your friends and your profile picture! But you can control this information by clicking on the "x" symbol (beside Edit) to delete the app's access to your Facebook account. If you want the app not to peep into your account, then simply remove the app.

It's better you check which apps you want to peep into your Facebook account. It's a bit time-consuming, but you can protect yourself from giving people or the app maker free data about yourself

Duck a What?...See who is after Google's search dominance


What sets DuckDuckGo apart is the claim that it doesn’t track your IP, or your search history. There are many other great features, like the ability to see official websites before Wikipedia answers, the ability to search directly on YouTube, Facebook, Amazon, etc…










When you do a search from DuckDuckGo's website or one of its mobile apps, it doesn't know who you are. There are no user accounts. Your IP address isn't logged by default. The site doesn't use search cookies to keep track of what you do over time or where else you go online. It doesn't save your search history.


When you click on a link in DuckDuckGo's results, those websites won't see which search terms you used. The company even has its own Tor exit relay, allowing Tor users to search DuckDuckGo with less of a performance lag.

Refresh Windows 8 without affecting your files.

Windows 8 includes a feature called Refresh your PC that allows you to refresh your computer without affecting your files. This can be useful to recover from a problem. The Refresh option is primarily a repair method - a way to return your computer to a known good state.


You can find the Push Button Reset options in PC Settings under General, near the bottom of the list of options.


If you choose the refresh option, you’ll be prompted with an explanation of what’s about to happen. Click through this full-screen notification and Windows will be re installed, with your personal data, personalization's and Metro apps all backed up and reapplied to the new install automatically.

The entire process takes just several minutes, though anything added by your PC maker will stretch things out a bit. In a test of my Ultra book, which was first reset as described below, it took about 10 minutes for the refresh process, including moving about 8 GB of data back and forth.


If you choose to reset, you’ll be prompted with a much shorter explanation as you’re essentially performing a clean install of the OS,


Sync Everywhere with Windows 8



If you've just upgraded to Windows 8, then you might still be using your old user accounts—and you may not realize the features available with the new Windows id s. Sign in with this ID (it's the same one you use for Microsoft services like Sky Drive and Hot mail/Outlook.com).

It will make syncing emails and photos easier, and it will transfer your Windows 8 settings and preferences instantly to any other location you sign in from. If you have Windows 8 machines in the home and in the office, for example, then this is a quick and painless way of keeping your preferences, desktop wallpaper, Internet bookmarks and other data constant across machines. 


You can also specify what is and what isn't synced in the Windows 8 settings, if you want to keep your personalization's without syncing your passwords.

Maintenance and Repair for your PC

Most home office users don't have time to hassle with bringing a computer to a retail repair shop. Thepcwhisperer makes it easy by going directly to your home or office to handle your computer troubleshooting and repair needs and problems solved quickly.


Repair Services include:
Spyware/Virus Removal: Trojan horse programs, adware, hijackers Data Migration & Back-Up: Operating System installs Windows 7 thru 8.1 and one on one or group training



Antivirus and Internet Security Solutions

At any given time, thousands of computer viruses, worms and spyware are in circulation on the internet. Millions of users with always-on high-speed internet connections are prime targets for email attacks, identity theft, and malicious hacker programs. We can help you with all your Computer needs. We providing software and hardware solutions to remoe and combat continuous attempts by unknown internet predators.

Tough on threats

Block poisoned web pages in real time Detect and remove Viruses, Spyware, Root kits, Worms and Trojans. Protect against exploits that automatically download dangerous content to your computer without your knowledge while you are surfing the Internet Stops spam without blocking the mail you want

805.512.1290

How to find your Windows 8 or 8.1 product key

How to find your Windows 8 or 8.1 product key

Product keys are like gatekeepers that prevent widespread piracy, but if there’s one drawback to them, it’s the fact that they can be misplaced quite easily.

There’s a good chance your Windows product key is deeply buried within an email inbox full of spam, entombed in the dark recesses of your closet, or otherwise inaccessible. 

Thankfully, Windows users can easily extract the key from the Windows Registry using a product key finder in less than 1 minute.


The Magical Jelly Bean Key finder is a freeware utility that retrieves your 
Product Key (cd key)  

Step 1: Download Windows 8 Product Key Viewer

Magical Jelly Bean Download

Step 2: Run the program

Once downloaded, Open the file and install 

Step 3: Take down your Windows product key

Once found, note the 25-character product key, ensuring the combination of letters and numbers is copied exactly as shown below




Google+ and Chrome Lagging Serverly - Check out this quick fix

The main cause : DNS Pre-Fetching Feature
If you’ve been to the "Show Advanced Settings" (Hidden inside the wrench) you would notice a setting called "Predict network actions to improve page load performance"

Everyone including me would have ticked this checkbox because it seems to bring only benefits and it sounds promising.

However, it is not the case here, while I still cannot explain why this is happening, just un-check the check box to bring your Chrome back to its speedy glory.

Well I tried it, and it makes a difference straight away..

Hit Shift Esc to bring up the Chrome task manager...
Try it and report back... Before I had up to 50% CPU, now, it is down to a reasonable 18 -20%