• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Tools

By Abhishek Ghosh March 8, 2011 8:47 pm Updated on March 8, 2011

Tips and tricks to start and continue a professional and successful blog

In this article we will give you some tips for a having a successful  and professional Blog. Which hosting platform to choose? How to write articles and what topics should I choose? What are the ways to make them known to readers... taking as example the experience of TheCustomizeWindows.com which went from 0 to over 500 visitors per day with more than 2000 pageviews perday in less than four … [Read more...]

By Abhishek Ghosh March 7, 2011 2:39 pm Updated on March 7, 2011

15 Tips to secure your WordPress site

Some time ago we had a problem with our Wordpress site suffered a little hacking. So to stop these happening again, we applied some tips to help secure our WordPress site. Here are some tricks that might help you too.   Updating and changing password: 1) We know it is boring but we will never repeat it enough, but a strong password is the best line of defense. Do not choose a traditional … [Read more...]

By Abhishek Ghosh March 5, 2011 5:22 pm Updated on March 5, 2011

Preview songs in WMP 12 on mouse hover in Windows 7

Windows Media Player (WMP) 12 in Windows 7 lets you preview and listen your songs or tracks automatically on mouse hover. The playing stops as soon you lift off the mouse cursor. To enable this, open Windows Media Player 12, click Tools and then Options on the menu bar:     in the Options window, go to Library Tab :     Now, check the box (where we have placed the … [Read more...]

By Abhishek Ghosh March 2, 2011 4:09 pm Updated on March 2, 2011

How to install WordPress on Windows 7 to test themes and plugins offline

Testing a new theme or plugin for developing them or just for normal usage in server is risky. Just imagine the risk when we try a new plugin or modify the theme's CSS file : there are always many visitors are surfing the website; it happens the plugin or the modification in CSS file was not done rightly and, as the Wordpress guy says "sky will fall on your head" : it really happens. We upgraded … [Read more...]

By Abhishek Ghosh February 28, 2011 8:39 pm Updated on February 28, 2011

Why there are pirated versions of Windows 7 and how they look?

Today, for real innocent Windows 7 users, we will discuss outline of what are the methods used to crack Windows 7, why people use them and how the sold packages looks in the real world. These are modified versions of Windows 7 where the WGA anti-piracy system is disabled. It is therefore possible to acquire a free version of the system by these methods. This is the summary of one computer … [Read more...]

By Abhishek Ghosh February 26, 2011 6:58 pm Updated on February 26, 2011

What are ASCII art and emoticons

Emoticons   Internet is an indirect exchange zone, when you talk to someone or writing something, you can not express your emotions because you are not in front of you. That is why we use emoticons (or smiley). They may consist of a sequence of characters or simply a picture or sequence of pictures (animated gif format). Most forums or blog often provide a list of clickable smileys those … [Read more...]

By Abhishek Ghosh February 12, 2011 8:34 pm Updated on February 12, 2011

Glossary of dangerous dll files of Windows operating system

A DLL (Dynamic Link Library) is a resource that is used to run Windows operating systems and various software packages installed. These resources are very vulnerable and often subject to attacks of all kinds. Sometimes a user may accidentally delete a resource. Here is a targeted approach to some problems when calling a resource incorrect or missing. Typically replacing crush, a resource must be … [Read more...]

By Abhishek Ghosh February 7, 2011 8:02 am Updated on February 7, 2011

Free ebook from Microsoft for using command line tools : Windows Command Reference

This ebook,Windows Command Reference; describes the use of the command-line tools used to perform various tasks related to Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 7, and Windows Vista. The Windows command-line tools are used to perform various tasks related to Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 7, and Windows Vista. You can … [Read more...]

By Abhishek Ghosh February 4, 2011 6:40 am Updated on February 4, 2011

Windows Double Explorer : manage two or more Windows Explorer in one application

Windows Double Explorer manages two or more Windows Explorer in one application. Also you can add your favorite folders with drag and drop to the toolbar for quick access. It is easier to manage your disc structure. It is developed by CodePlex, intended to be used for Microsoft Windows 7 and it is free. Click here to download. … [Read more...]

By Abhishek Ghosh February 2, 2011 10:37 am Updated on February 2, 2011

How to create a automated task that runs a program in a set time in Windows 7

This tutorial will show how to create task that will allow automated running of files and programs at a pre defined time as set by user in Windows 7. Click Start, type "task" in the Start Menu search bar without the quotation marks or by open it from All Programs -> Accesories -> System Tools : Windows Task Scheduler will open. Select 'Create Basic Task' from the right hand pane and the … [Read more...]

By Abhishek Ghosh February 1, 2011 9:32 pm Updated on February 1, 2011

Methodology hackers use for an intrusion to a network

This article aims to explain the methodology generally used by hackers to break into a computer system. It does not explain how to compromise a system but to understand how it may be better able to withstand them. Indeed, the best way to protect your system is to proceed in the same way that hackers to map the vulnerabilities of the system. So this article gives no details on how vulnerabilities … [Read more...]

  • « Previous Page
  • 1
  • …
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy