How to disable simple file sharing?

  • Click Start -> My Computer
  • On the Tools menu, click Folder Options, and then click the View tab
  • In the Advanced Settings section, clear the Use simple file sharing (Recommended) check box
  • Click OK

For more information, please refer to Microsoft’s web support: HOW TO: Disable Simplified Sharing and Password-Protect a Shared Folder in Windows XP.

How to Prevent Virus?

    • Install Anti-Virus tool. F-Secure Anti-Virus is available for HKUST users to install on your computer which can help you to detect and fix virus problems.


    • Update Virus Definition regularly. New viruses appear almost everyday. Besides installing the latest anti-virus program, users are highly recommended to update the Virus Definition on a regular basis, say at least on a weekly basis. For details.


Good Practice

It is very difficult to guarantee a 100% virus-free working environment. Apart from the requirement of knowing how to detect and handle viruses, followings are some guidelines on preventing viruses :

    • Despite anti-virus protection in place, it is a rule of thumb NOT to open email attachment unless you expect to receive it. There is always a possibility that the attachments might contain new virus that the anti-virus software is not able to detect it at all.
    • Avoid provide file shares to others. Apply strong password policy if it is unavoidable. If you are using Windows XP, disable the simple file sharing.
    • Apply strong password to protect you machine. Do not leave administrator password blank or assigning trivial password with your Windows machine.
    • Avoid referring, storing or copying files (programs and documents) from unknown or untrusted source such as download from Internet or email attachments received from friends.


    • Consider to save a file in ASCII or RTF format when sharing your documents with others to reduce the risk of transmitting macro viruses.


  • Backup essential data files periodically.

Anti-Virus in Campus

To get a trail antivirus and or buy an antivirus which is verified by Microsoft, Please visit the link below;

The above link is dedicated to Windows 7 users only, however the antivirus listed on the link supports all Microsoft OS platforms.

If you have any question, you can contact us at info{@}masror{.}com.

Email Services in HKUST

Virus Precaution

Handling Email’s File Attachments

Nowadays, advanced email clients (such as Netscape Messenger, MS Outlook, Eudora, and PC-Pine, etc.) are powerful and user-friendly.  They provide features for users to run programs or open documents sent from  file attachments of emails directly and easily by a simple click or key-stroke.  Since a user may receive emails from many different sources, it could be dangerous if a user tries to open file attachments of emails from distrusted or unknown parties.  This situation is similar to invoking programs or opening documents from an unknown floppy disk.

Furthermore, email messages with file attachments from friends, relatives or colleagues might also be harmful some times because they might just be sent in an involuntary or unconscious condition (eg.  the sender’s machine is already infected by a virus).  Usually messages with malicious file attachments are unsolicited ones, and would look a bit weird and out of context (eg. a colleauge suddenly sending you an attachment which is said to be a joke).  In any case of doubt, it is always advisable for the recipient to double check with the sender before opening the file attachment.

While virus hoaxes (contain plain text messages only) are usually not harmful, emails with file attachments of unfriendly files (executable programs or documents with embedded macros/scripts) could be destructive.  For example, opening an infected MS Word document can cause problem because the infected document may have macro viruses which can make MS Word behave abnormally. ITSC’s web page on “Anti-Viruses” explains virus hoaxes and macro viruses in more details.

In general, the following precautions should be noted when handling email file attachments:

  1. Usually, for most email tools, user will need to issue a command (by clicking a button or hitting a key) before a email’s file attachment is opened.  User is recommended to think twice before opening an attachment from distrusted or unknown source as it could be an unfriendly program or document.
  2. According to our experience, when an infected Word document is opened, user will be prompted before a Word macro is executed.  In this case, it is highly recommended to response with “no” (to skip running the macro) unless user is very sure that it is safe to do so.
  3. Generally speaking, user is advised to be very careful when handling email attachments because opening an attached file from suspicious source is somewhat like opening a file from a suspicious floppy disk.

What is Computer Virus?

A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.

By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be “infected” by the same virus.

A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. (Please refer to our web page on Handling Email’s File Attachments for details.)

When a virus is introduced to a computer system, it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user being aware of it.

A virus program contains instructions to initiate some sort of “event” that affects the infected computer. Each virus has an unique event associated with it. These events and their effects can range from harmless to devastating. For examples:

  • An annoying message appearing on the computer screen.
  • Reduced memory or disk space.
  • Modification of data.
  • Files overwritten or damaged.
  • Hard drive erased.

Class C IP’s

Here is an SEO myth that has not really been proven one way or another yet. The myth is that having links from the same class C IP address will not help you. If you don’t know what I am talking about here’s how you breakdown an IP address.


So where the CCC is that number needs to be vary. The reasoning behind this is that someone could get web hosting and put 1,000 different sites on it and then link them all to one site trying to gain its link popularity. So the search engines put an end to that by using the IP of the sites to calculate how much weight to give the link.

There are quite a few people that don’t believe that this myth is true just for the simple fact of how popular shared hosting is. If this myth is true then all those sites on the same shared hosting server cant help each other out with ranking.

There is some evidence that can prove this myth though. I have followed many discussions on this topic and have seen some results that make me a believer. The results basically just prove how a site with far less links can out rank a site with a ton more links. This is because the site with less links has a ton more different class C IP’s links than the one with just more links.

Like I said I am a firm believer in this myth and I don’t even like to refer to it as a myth but until proven beyond a doubt I will call it that just to make people happy. So when you are doing link building be sure to check out the IP address on where your link will be placed in order to make sure your link will pull the most weight.


Boost Your SEO Facts

Search engine improvement in direct we just say it SEO. In SEO metropolis consort e-fuzion the scheme place owner, intend the prizewinning solution for own scheme site. In SEO process, the technology particularly targets for audience and makes more traffic. In see engine optimization, it just increases the height of the site. In SEO Delhi, consort e-fuzion the methodical ness offers all the basic services like scheme development, scheme promotion, scheme organization and many more. A see engine refers the fine set of the scheme site. SEO optimizes the key text spacing and prominence. On tender search, engine improvement makes the targeted scheme tender most popular among number of scheme pages. It is most belike focuses on noises redaction band noises is the most pivotal bourgeois for on tender optimization. Actually, in see engine optimization, you encounter two pages digit is on tender and the incoming digit is off page. For getting more knowledge, the searcher needs to log in The noises of your scheme place can ever use some theoretical enhancement. In addition, patch the re-wring is happen the contenter must keep in mind about the key words. For getting ranker see, engine improvement tries its best. In SEO Delhi, consort e-fuzion the contenter always, follow the unequalled and idealistic words, which are more attractive and beatific to read and listen. Keywords psychotherapy is the first travel in a trenchant see engine marketing campaign. Keywords should be chances to emit prospective client see characteristics. Through the database like articulate tracker or key articulate discovery, the scheme place owner can determine the most trenchant keywords for generating germane traffic. Search engine improvement searches assorted sites and choose the prizewinning one. The SEO metropolis consort e-fuzion makes the sites life more interesting and prosperous. SEO metropolis consort e-fuzion brings a new revolution in the online marketing. Through the theoretical enhancement, the searching impact makes the scheme place happier. In SEO metropolis Company, the e-fuzion methodical ness brings the prizewinning subject aspect for scheme place promotion. Which also helps revenue collection?

Fro the crowning discussion it is come to know that see engine improvement is just impact as a teacher. In addition, it enlightens the scheme place ranking providing the beatific technology. For building pages and upload the ranking, the scheme place makes the place more popular by selecting the better one. Search engine improvement is a process, which makes the sites happier and joyful.


5 Ways to Keep Visitors Coming Back

A lot of successful websites depend on returning visitors to account for a major part of their traffic.

Returning visitors are easier to convert into paying customers because the more often they return to a site, the more trust they have in that site. The credibility issue just melts away. Hence, keep your visitors coming back to your site with the following methods:


1) Start a forum, chatroom or shoutbox

When you start a forum, chatroom or shoutbox, you are providing your visitors a place to voice their opinions and interact with their peers — all of them are visitors of your site. As conversations build up, a sense of community will also follow and your visitors will come back to your site almost religiously every day.

2) Start a web log (blog)

Keep an online journal, or more commonly known as a blog, on your site and keep it updated with latest news about yourself. Human beings are curious creatures and they will keep their eyes glued to the monitor if you post fresh news frequently. You will also build up your credibility as you are proving to them that there is also a real life person behind the website.

3) Carry out polls or surveys

Polls and surveys are other forms of interaction that you should definitely consider adding to your site. They provide a quick way for visitors to voice their opinions and to get involved in your website. Be sure to publish polls or surveys that are strongly relevant to the target market of your website to keep them interested to find out about the results.

4) Hold puzzles, quizzes and games

Just imagine how many office workers procrastinate at work every day, and you will be able to gauge how many people will keep visiting your site if you provide a very interesting or addicting way of entertainment. You can also hold competitions to award the high score winner to keep people trying continuously to earn the prize.

5) Update frequently with fresh content

Update your site frequently with fresh content so that every time your visitors come back, they will have something to read on your site. This is the most widely known and most effective method of attracting returning visitors, but this is also the least carried out one because of the laziness of webmasters. No one will want to browse a site that looks the same over ten years, so keep your site updated with fresh bites!

Joomla Security is Up to Date

While Joomla 2.5 has a significant number of improvements and features over Joomla 1.5, our favorites are upgrade notification and one click upgrades.

In an increasingly complex world it is not only convenient but critical to stay on top of security updates. The automatic notification system clearly shows whether your CMS installation is up-to-date. Additionally, 3rd party extensions which have been setup for one-click updating will provide notifications. This system saves an immense amount of time and money compared to Joomla 1.5, prevents obsolescence, and keeps your site future ready.

Over the next two months there will be a number of opportunities to learn more about Joomla, including:

Sociology Chapter 3

[wpdm_file id=11 title=”true” desc=”true” template=”bluebox drop-shadow curved curved-hz-2″ ]

[wpdm_file id=12 title=”true” desc=”true” template=”facebook drop-shadow curved curved-hz-2″ ]