Category Archives: WINDOWS

Which is secure Android mobile or Windows Computer

In this article we will analyse about which operating system is actor. Today we will learn about whether windows computer is better than Android mobile operating system for or vice versa. After Microsoft releases its own anti-virus in the name of windows defender or Microsoft security essentials slowly the performances of windows computer becomes absolutely secure as we also found various writing systems of antiviruses and and from within the parameters of performances in terms of security off windows defender or Microsoft security essentials comes within top 2 antiviruses of the world.

before the advent of windows defender seen many third party antiviruses used to protect computer but they still lack the basic images to keep secure the kernel and the booting processes of the windows operating system and due to this most of times the viruses coms from different zones and infect computer to the larger extent. That is why Microsoft a small antivirus and then continuity research and development team those antiviruses the number one antivirus in the world.

in addition to this Microsoft religious and security updates periodically as and when it is required directly to the computer those computer are connected with internet. The regular security updates windows defender or Microsoft security essentials comes directly through windows updates and for this user does not have to worry about update from time to time manually and this reduce size zero day vulnerability is the most of windows computer 2 worldwide which has been the main problem of windows computer prior to the emergence of windows defender and Microsoft security essentials.

If your computer have Windows support and you are connected to internet then Microsoft religious security through its older job dates and definition of dates of anti malware windows defender directly through windows updates so that your computer stay protected all the time and in this most commonly known by its fruit kids are now completely removed or blocked in windows computer.

Now will talk about Android operating system and Android security. the concept of Android operating system is that there is no fixed original equipment manufacturer or in the common word the hardware manufacturers. It changes from manufacturer from one design to other and that is Joy the coaching of integrated update security and security updates is never ever been is the possibility. who is the popularity of Android operating system more and more hackers are turning it to Android devices and also Windows operating system is the evolution of Windows 7 more and most organ in terms of security point of view and that is why now most of hackers moving to words Android operating system and especially the older Android operating systems.

Since the advent of Android 8 now Google communicated to original equipment manufacturers to create a common path so that it can send periodically security and cumulative updates from time to time to make Android device secure. Google ads on play protect services which scans downloaded application from Google Play Store to sandboxing environment show that any trace of viruses inside downloader app should should be detected then those can be cleared the prices inside operating system files of Android.

All the applications which appears inside Google Play Store have to go through Google’s strict application developer policy as well as constant scanning and cleaning fruits and boxing environment so that no compromised application would be downloaded by the users from Play Store by mistake. Despite all this provision stills there has been news of more and more some of the most popular apps Google Play Store downloaded millions of times and Google of let scanning all the apps and removing the jobs as and when necessary.

Android is for Google and Google is the master of internet and that is why it is a good idea to keep your internet connectivity solutions for that at any point of time there is the advent of virus then Google can automatically detect and remove and clean your device for greater and safe for use.

it is very important to keep your prime Google account connected with your Android device secure by any setting automatic password from Google prompt include two factor authentication system so that the hardware manufacture authentication can be initiated and hackers could not steal yours personal identity and your financial details. It it is important to understand that if you secure your Google account associated with Android device then your Google privacy is also secure and better protected.

in older version of Android phones can check out the Google settings and in the new version of Android phones inside the settings of Android you can find the Google Play protect and various ways to protect the primary Google account so that the hackers and intruders could not get into ear personal accounts and steel all the details from it. inside Google setting and in the account zone you can find the Google account and corresponding to eating can find the information security and personalization. scroll down to security and touch it and then you can find the find my device which remotely locate this device in case it is lost or stolen. Touch find my device it is the ways to locate your Android device find my device you can get it on Google Play as the separate installation in the case of older Android device and in the case of newer Android devices it is inbuilt in it. There there are other options are you can access the Android find my device in case you busy to turn on the way or inside Google find my device that helps my device to locate the device remotely and also helps to keep the data secure in the case of it goes with the hand of the intruder then you can’t delete all the data from distance so that they cannot find this data at all.

in the second version of Android security you can find the Google Play protect which regularly check your apps and devices for harmful behaviour. any point of time Google find the behaviour of a device is doubtful and finds that it is affected with some Milo hours then you will be notified and automatically Google remove originate from your device and want to about that that the concerned is removed and your device is now clean.

From the setting up Play fortnite settings there are two types of security scans one is the scanned device for security threads which Google regularly check your device and preventive on about potential harm and enable it. the second option is to improve harmful of detection send unknown apps to Google for better detection and Google if found anything suspicious on it. In its dashboard you can find recently stand apps and the time of application last stand and the resultant of application scanning and then the command line comes with no harmful apps found.

There are various ways you can secure your Android device and Google accounts by initiating better privacy and personalization. From there go to secure your account connect to internet automatically Google scan for security of your devices and it any user found that it will let you know about it. It comes of with various security events such as sign in and security. In sign in and security there are four verification methods through phone number second one through recovery email advanced through security questions and the last one through trusted mobile devices.

you can check the privacy checkup it is a step-by-step guide that will help you to choose the adequate and your personalization privacy that will be right for you for your Google Account. N you can say sev whether you want to turn on web and application activity and you can manage the web and application activity location history boys and audio recording YouTube search history YouTube watch history and your Google account profiles in this way you can secure your account from hackers and third party intruders.

Android is open source and there are various ways you can secure and accounts or if you do not know how to do it then it can open all of your financial details and depersonalization of your accounts. it is important to know in which we can secure and return so that I can use the safest and secure mobile operating system without worrying about third parties intruders and hackers.

Windows operating system is also highly secure desktop laptop and notebook environment can work with really use the genuine operating system from Microsoft. it is important not to use the pirated version so that you will not be eligible to receive the periodic and security updates from Microsoft. Most of time do you find that duty or negligence or intentional non purchase of genuine operating system most of fluids and other includes hackers reach to add devices easily due to non visible off updates from Microsoft or from Google. Use use of genuine and real softwares enable you to receive Android and Windows updates to secure your account from hackers and you can’t really work with their financial and other professional work without interruption.

Troubleshooting Windows 7 failed to run Windows Explorer

I have a Windows 7 laptop and it has been running smoothly still this a date of end of support ending to haunt me and then this a recurring problem of reaching to this windows explorer begins. From now and then this problem of failed opening of windows explorer which causes not being able to do work within windows operating system environment.

So, for this last few days I unattended my blog from windows computer as I wrote earlier I wrote ir from my back up option which is from tablets and connecting this wireless Bluetooth module display from wireless keyboard. Though writing becomes difficult but I Ahmed happy that I able to write articles and update posts and plugins from tablets through at times doing work from tablets is difficult than doing comfortable work from laptop.

Most of times it would say there is problem with memory dump and then it will scan for memory dump saying whether there is any problem of hardware or software recently used or not and then it will restart again and then show recovery option such as booting with safe mode, booting with networking and then booting with normal and there is 30 seconds for automatically selection of such features.

Then, it will go for system restore and then restart to move into the windows but failed to run windows explorer and it comes up with time and again and then at last I choose for safe mode with networking. After moving to safe mode with networking and then go to control panel and then go to system and security and then all control panel options and then go to performance information and tools then adjust the appearance and performance of windows and then go to performance options.

Then go to performance options and then go to visual effects, then go for adjust for best performance and save it. Then go to advance  and then go to virtual memory. In virtual memory the parts of hardware, is allocated as the RAM so that each every time more files is substituted as RAM in order to speeds up progress of operating system files. This is known as paging file and then go to total paging file size of all drives and then go to change.

Here, disable automatically allocation of paging file size of windows and then click on C drive considering that system is installed on system drive, At it go for custom size, and then in initial size write down the minimum default allocation and in the maximum size, provide the maximum size which is written on the highest size, of hard drive and remove the tick mark from system managed size to custom size, and then put in the initial size and maximum size as in the initial size put the earlier maximum size of system managed size from to initial size of custom size.

Then in the maximum size put the highest size put the recommended size from total paging size for all drives.  Then, set it to and then put it on the apply and then it will ask you to restart windows and then after restart you will find that after booting and then enter into operating system files and then go to windows and this time windows explorer works and then I work nicely with windows and my working with writing of articles with windows becomes a smarter and I can work nicely,

Do you really need a backup plan in Windows Computing

You have a windows computer and it works nicely and yours everything such as writings, articles, theme back up , WordPress file backup, wordpress SQL server backup inside logical drive of hard discs. Suddenly on a new day you find that, after booting up your computer is not working or is not entering into Windows. So, here the real tension begins and you ask yourself whether you have backed up everything or not and if not then you do not have back up plans then what you will do about it.

So, even if you do not have one more computer then also you can have back up plan for your website. Back up wordpress installation and others such as themes, plugins and database into external hard disc so that it will remain intact. Now a days we have faster internet connectivity and this means we can now use the internet to back up all of these backup files, to cloud drives such as Google Drive, Dropbox and so on.

Even if your computer goes out of order still you can keep back up of these files in safer locations and even most smartphones supports 64 GB or more and you can back up these above mentioned files to these flash drives of smartphones and you can carry those back up at your will and on the go and whenever you want to back up or reinstall WordPress then you can easily do it as open your chrome browser and then cPanel and then go to back up option and then restore backup and restore it from flash drive where the back is downloaded.

What if you want to update articles on your self-hosted wordpress website and your laptop or computer is down and out and you should have a back up plan for your website so much so that you can write through other sources without any difficulties. You must have smartphones or tablets or may be of older android operating system. I had an older android kitkat operating system of Lenovo tablet, and it is of 8 inch display so I decided to use it as a back up device.

I connect Lenovo tablet with wireless connectivity and then download wordpress app and then provide website address and then put username and password to enable that app and now the next question is how to write faster with it then I have also one beautiful plan for it to progress article writing process.

Now, buy a bluetooth keyboard and then pair with your secondary device and in my case it is Lenovo older Laptop and after connection now you can use bluetoothicle wireless keyboard to write an article on your android tablet even if your laptop is in the computer repair shop.So, in this way you created the perfect back up plan for your laptop when it becomes out of order still you can write an article on your self-hosted wordpress website as well as you can now update article without any difficulties.

How to install Microsoft Security Essentials on Windows 7

As per latest antivirus security and performance report, Microsoft Security Essentials of Windows 7 is same as Windows Defender in Windows 8 and beyond is becoming number one antivirus solutions. One caveat to install this is that, one must have, genuine windows installation to use these antivirus programs from Microsoft. Throughout all of these years, Microsoft developed these antiviruses into perfection.

MSE Installation

When, I reinstall Windows 7, I first have to download Microsoft Security Essentials from Microsoft website. If you have Windows 8 and beyond then the reincarnations of Microsoft Security Essentials is named as Windows Defender. For Windows 7 you have t do it as separate download. It has two versions such as Windows 32 and Windows 64 versions. My computer is of Windows 64 version is Windows 7. I download it from Microsoft website and install it.

Join Customer Experience Improvement Experience Program

It is presented with Microsoft Security Essentials installation wizard as you need to allow everything to have complete installation to have complete and secure anti malware installation. The latest update will install after searching for updates and then it will download updates. This will take time, in accordance with the speed of your internet download speed. If you have faster internet connectivity such as fourth-generation of internet then it will take hardly ten minutes of internet download.

Turn on Automatic Sample Collection

During installation of this antivirus program it will ask to join customer experience program and join it as it works as cloud antivirus and find the information immediately and secure computer immediately. You may opt out from customer experience program from anytime. Then go into Optimize security tab and here select each and every program. It will first check if firewall is tunable this if fired on or not and if it is turned on then no need to worry about it or if it is not enable then it will enable this automatically.

Scan Computer for potential threats

Then, turn on automatic sample submission so that whenever suspicious sample file will be sent to Microsoft for scrutiny. Microsoft Security Essentials while using its live access function, as it will scans files and may identify, certain files suspicious and if you turn on automatic sample submission, then it will sent Microsoft for analysis. Microsoft by investigating such samples and then secures file system of Windows.

Virus and Spyware Definition Updates

After allowing such installation then it will ask to finish installation of Windows, then it will start automatically check for latest virus and spyware definitions as remember to enable scan my computer for potential threats after getting the latest updates. During these installations of updates Microsoft Security Essentials will find viruses and other malware definitions and these updates will find such viruses and potentially unwanted software as virus definitions are update automatically. All virus definitions of Microsoft Security Essentials will update with regular Windows Updates.

1 2 3 6