No Picture
General Article

The Answer to Home Fitness is Your Shape – Fitness Evolved For Microsoft Kinect!

The Answer to Home Fitness is Your Shape – Fitness Evolved For Microsoft Kinect!

If you’re like many of us, you like the idea of working out and becoming healthier. However, once you spend all day at the office the last thing you want to do is come home, change clothes and leave to get all hot and sweaty at the gym. Many of us have felt bad for feeling this way, but there’s no need for that any longer. The people at Ubisoft understand where we’re coming from and they’ve created the perfect solution for us! It’s the Your Shape: Fitness Evolved game for Microsoft Kinect!

Microsoft Kinect is an add-on for Xbox 360 and will be released on November 4, 2010. This gaming technology is astounding as it will allow gamers to play games controller-free! One of those games is Your Shape: Fitness Evolved by Ubisoft. This game is seriously going to blow your mind! First, with the technology behind Microsoft Kinect gamers will be scanned into the game. You will actually see yourself in the game. Not only will you see yourself in 3D, but Kinect will also scan all your dimensions in as well. It may not be what you want to see, but it will definitely give you the motivation to get moving!

The game Your Shape: Fitness Evolved is similar to Wii Fit – however, you need to realize there are some big differences! First, unlike Wii Fit, there are no controllers such as the Wii Fit Balance Board. Instead, your body is the controller! Therefore, once you purchase the game you’re ready to go. Also, since Kinect scans all your personal information in the game it can create workouts just for you. These workouts will be designed to specifically help you reach your personal goals.

Your Shape: Fitness Evolved helps you reach your fitness goals by giving you unlimited workout options. For example, you can opt to have a personal trainer for your workout or you can simply take one of the exercise classes available on the game. There are also fun interactive games that will allow you to get a great workout without feeling as if you were working out! Regardless of how you choose to use the Microsoft Kinect game Your Shape: Fitness Evolved, you will never get bored as you will be able to go and download new workout routines on a regular basis!

So, if you are one who loathes the idea of wasting more energy driving to and from the gym after a long day at work, the Microsoft Kinect game Your Shape: Fitness Evolved has been made just for you! All you have to do is come home, change clothes and walk to your living room and effortlessly start your customized workout. That’s it! It’s nice to finally have people like those at Ubisoft who understand people like us. The hardest part is waiting for November 4th to get here!…

No Picture
General Article

The Lost Art of Computer Troubleshooting 101

The Lost Art of Computer Troubleshooting 101

For many people, troubleshooting computer issues is mysterious and confusing. It doesn’t have to be. I have been in the computer field for about 18 years and learned something a long time ago that has saved me countless hours of frustration. I call it “DIP-CD” to help me remember the steps in order. Picture dipping a CD into chocolate!

This information is useful to anyone, computer savvy or not. However, the more that you understand computers, the better you will be able to fix the issue. Either way, this should point you in the right direction. So read on and enjoy the extra free time!

Step 1: Define the Problem

You have to understand what the real issue is. So ask yourself, what exactly is happening. Can it be reproduced or is it intermittent? Are you getting an error message? Computer reboots every time I open Internet Explorer. Etc…

Step 2: Isolate the Cause

Now that you know what the issue is, you need to figure out the cause. First and foremost, ask: Did it ever work? If so, what changed and when? If it did work and then broke, SOMETHING changed. It’s your job to find out what that something is. For example, a computer all of a sudden starts to give you an error when you open Word. Ask, when is the last time that you used Word without an error? (Yesterday) Did anything change since yesterday? (Yes, we loaded a new service pack or update last night). There is your starting point.

If you can isolate WHEN things changed or at least a date range, you have something to work with. If the user can’t help determine this, check event logs for errors related to this issue and find out when they started. Once you find the culprit, move on to the next step “Perform the Repair”.

If it never worked before then you will have to start from the beginning. Sorry!

Step 3: Perform the Repair

Now that you think you understand the cause, it’s time to fix it. This is where basic computer skills come in handy. Google the error or symptoms and see if someone else has had this issue and found a solution. This works for the computer technician or the non-computer savvy. Google is awesome.

If you have some computer skills, this is where they come in handy. You may need to boot into Safe Mode, try starting the computer without certain programs (i.e. MSCONFIG), uninstall or reinstall programs or updates, update drivers for video cards, motherboard chipsets, network cards, etc. If you are not comfortable with this, seek out professional help.

Step 4: Confirm the Results

This is where you will “test” your solution. If you think you have a fix, see if you can make the problem happen again. You want to be thorough here. Have the user try and see if they can make it happen. Be sure to do the exact same set of steps that you did to reproduce the error initially. If the problem still exists, UNDO YOUR LAST CHANGE and try something else. Once the problem goes away, move on to the next step.

Step 5: Document the Solution

This is mostly for the technical types. You will want to write down (in your Help Desk system, etc) what you did to fix the issue. Why? Because there is a good chance it will happen again to someone! You can use this information later to save time. It’s difficult to recall from memory what you did 6 months or a year ago if you do this for a living.

I hope that you can benefit from this simple but effective troubleshooting technique. Enjoy!

Mario in Dallas


No Picture
General Article

How to Manually Register DLL in Microsoft Windows Vista

How to Manually Register DLL in Microsoft Windows Vista

The article intends to describe the procedure of manually files in Microsoft Windows Vista. The methods described here are simple and correct until date. It is strongly recommended that instructions be followed accurately to avoid encountering problems and eventually looking for Windows Vista help.

Dynamic link library (DLL ) is a set of small programs (files) that are called upon simultaneously by various executable programs in Windows to perform certain tasks like connecting to a device etc. Sometimes, these files get corrupted and hence need repairing. The below mentioned guide will help you register these files on your own. This essentially means that you don’t need to contact Microsoft technical support for help.


Before beginning with the procedure, you must know that names and path of the files that needs to be registered. If you didn’t know the names and/or path, you would not be able to register them. Moreover, if you are not sure what to do, take help of an expert friend or person. It is because messing up with registry can lead to system crash and other severe problems in your computer.

Click on the Start menu and navigate to Run. If you don’t see Run anywhere in your programs, then press the Windows and the R keys together on the keyboard. This will immediately bring up the Run dialog box.

Type ‘regsvr32 C:\Windows\System32\’ in the blank field (without quotes and as it is) and then click on the OK button. This command is intended for the example purposes. You must replace the location (path) as well as name of the file (, here it should be the name of the file as the extension and not just Name). For example, you have your files stored in H:\ drive and not in C:\ drive, then you would type regsvr32 H:\location of the file\name of the file followed .

Once you are done typing and clicking on the OK button, you will see a dialog box showing that the file has been successfully registered. Click on the OK button to close the message window. If the program did not launch automatically, then open it manually.

If you get an error message like the specified module or entry could not be found, then it indicates that you are either typing the location or file name wrong or file that you are trying to register is not compatible with your version of Windows. If none of these is the case, then try disabling the UAC (User Account Control) in Control Panel.

Additional Tips:

You may need admin privileges to run such command or tweak around with the registry.

You can also download and install Dependency Walker 2.2, an automatic tool for registering missing libraries or fix common problems. Download it from its official website () and save the file to your desktop. Double click on its icon to open and install it using the wizard’s instructions. When the program is installed, run it to initialize the process. The program has been designed to support all the old and new versions of Windows.…

No Picture
Recent Technology News

Email Basics and Safety Tips

Using eMail is both productive and fun but it could be a source of agony if your account is hacked and hijacked as I’ve experienced. There are so many free email platforms available and the paid versions cost only a little. Gmail, Hotmail, Yahoo, and Fastmail are some of the more popular ones. Creating a mail account for yourself is so easy if you can follow simple instructions.
Tips on Maintaining and Creating an Account
1. User Name
Don’t use your real name. If you have a business, it’s best to use its name for publicity. For personal accounts, use an alias or initials with numbers. Using your real name as user name will expose you more to hackers.
2. Passwords
I already lost one mail account to hijacking and I think it was because of a weak password and an unsafe popular mail server -a disgusting experience.
The primary rule for safe passwords is to use an eight characters combination of numbers and letters -the letters a mix of caps and lower cases. And if you really need to be safe, you should change passwords every 3 to 6 months. If you see signs of hacking or of your account being infected, the first thing you do is change password. That way, you will also know for sure if your account is safe or not. If you can’t change your password anymore, then sorry but your account was already hijacked.
3. Avoid Third Parties with your Account
I experienced allowing a safe third party access to my account. At first, it made my mailing easier because the third party blocks spams and unwanted mails. But after a few months, it ended in frustration. I began receiving annoying and unwanted messages and was forced to stop the service. The account eventually became useless because I gradually stopped receiving messages and I’m not sure if the third party was involved.
4. Use an eMail Address Encoding App
If you want safety when you have to share your mail address with an untrusted site or person, the free service named will hide your email address into a safe and short URL.
Now I recommended this because I don’t think this is a third party app since you don’t have to reveal all your mail contacts. But if you think it is, then you don’t have to use it.
Here’s the main tip: use one mail server for your important mails and another for those not-so-important. You can be sure that we all will get at least one spam mail and if you use only one mail server, your whole account that includes your important mails will be exposed to hacking and malware infection.
If you value your personal mails more than your important business mails, you should go one step further and isolate your personal mails on a different mail server.
If you think I missed on anything, please do me a favor and inform me.…

No Picture
General Article

How to Rectify Error c1041724 in MS Exchange Server 2000

How to Rectify Error c1041724 in MS Exchange Server 2000

Are you facing problems in accessing mailbox folders in MS Exchange Server 2000? Usually, such things happen when some internal settings for the mailbox store are not correctly set. Also, it may also be possible that the mailbox folder itself has got corrupted. Such corruption can occur due to various reasons such as abrupt or improper system shutdown, database header corruption, corruption of transaction log files, etc. In such cases, you should try to resolve the issue using appropriate corrective measures. In you are not able sort the issue, then you should use a third-party Exchange recovery software to repair MS Exchange Server mailbox store.

Consider a scenario wherein you are unable to mount an MS Exchange Server 2000 mailbox store using Microsoft Exchange System Manager. An error message is displayed, that is:

“An internal processing error has occurred. Try restarting the Exchange System Manager or the Microsoft Exchange Information Store service, or both. ID no: c1041724 Exchange System Manager”

In addition, either or all of the following event IDs will be logged in the Application event log as well:

1. Event Type: Error

Event Source: MSExchangeSA

Event Category: MAPI Session

Event ID: 9175


The MAPI call ‘OpenMsgStore’ failed with the following error: The attempt to log on to the Microsoft Exchange Server computer has failed. The MAPI provider failed. Microsoft Exchange Server Information Store ID no: 8004011d-0512-00000000

2. Event Type: Error

Event Source: MSExchangeIS

Event Category: General

Event ID: 9546


Failed to create the Event Registration Mailbox for Database First Storage Group\Private Information Store (servername). Error – 0xbf69.

3. Event Type: Error

Event Source: MSExchangeIS

Event Category: General

Event ID: 9519


Error 0x80004005 starting database “First Storage Group\Private Information Store (servername)” on the Microsoft Exchange Information Store.


The root cause of this problem is that the System mailbox object exists in the System Objects container, which is created for this mailbox store. And when you try to mount it, Exchange Server creates another object for the same, which is causing the problem.


To resolve this issue, you should perform the following steps:

1.Start the Active Directory Users and Computers snap-in.

2.Click the Advanced Features option in the View menu.

3.Find the Microsoft Exchange System Objects container, and then look for the System mailbox object whose mailbox store you were trying to mount.

4.Delete the System mailbox. Now try to mount the mailbox store. It should run fine now.

However, there are few instances when the problem is not resolved using these steps. In such cases, you should use a third-party Microsoft Exchange Recovery software. Such read-only tools are highly interactive and user friendly in nature that ensure safe and secure Exchange Server recovery.

Stellar Phoenix Mailbox Exchange Recovery software is an Exchange recovery software that repairs corrupted Exchange mailboxes created in MS Exchange Server 5.5, 2000, 2003, and 2007. It restores the mailboxes into separate PST files for each user. This Exchange Server Recovery utility is compatible with Windows 7, Vista, Server 2003, XP, and 2000.…

No Picture
Latest It News

Wireless in Local Loop [WLL] Emerging Technology

Reasons of Using WLL

Any service provider or organization should strive to provide high quality service in the most economic method available to end-user, the customer.

Telecommunication is no exception and therefore, it is necessary to keep abreast of Technology advancements and innovations to provide the best quality of service at lowest cost possible to the subscriber.

In the last 20-30 years, we have seen switching equipment move from manual boards, Magneto exchanges, strowger etc, to the sophisticated Electronic SPC Switches now in use, viz E-10B, OCB-283 & EWSD etc.

Transmission technology has also advanced, thus far to optical Fibre Cable, Microwave Radio, Satellites Communications etc, and is continuously developing.

The local external Network or the local loop also needs adoption of new techno logies, as it is this part of Telecom Network which accounts for approximately 60% of the total cost of whole, Telecom network. By embracing newer technology in the External Plant, we can maintain a high QOS (Quality of service) and reduce the cost to the subscriber. This means we can offer “Voice and Data Communication” to a much greater percentage of the population, previously denied access (for reasons of insufficient disposable Income) to telephone, Fax and Internet Services etc.

This may be illustrated by:

The average household income in India permits affordable expenditure on Telecommunication services, apportioned across the population, as follows:

Average Affordable expenditure on Telecomm Services

By percentage of population

Rs. 120 per month

25 %

Rs. 160 per month

15 %

Rs. 200 per month

10 %

Rs. 400 per month

5 %

Rs.1000 per month

2 %

And also, the total investment required to install a telephone with conventional Wire Line technology, is approximately Rs.30,000/- to Rs.35,000/-. Looking at the above data/figures, it is evident that cost reduction in the external plant part of Telecom Network is very much essential.

The Radio in local loop, i.e. wireless in Local Loop, if not better service, than Wire Line or Landline, but is an equivalent local loop service compared to wire line services and at lower cost.

The economics of wire line versus wireless are

The cost of installing or Maintaining Wire line systems broadly depends on the cost of Labour (Laying Ducts, digging Manholes) whereas cost of wire less depends on cost of subscriber unit, which tends to fall over time, with increasing economies of scale.

Cost of wire line is more due to use of copper a costly metal in U/G cables whereas WLL is independent of this factor.

Cost of wire line system critically depends on the distance between houses and the penetration levels achieved. These factors are not applicable in WLL.

If a subscriber moves to a different operator in case of wire line system, the investment is lost, whereas in the case of WLL, the subscriber unit in such case is simply removed and installed elsewhere.

The cost of wire line system is incurred, even prior to Marketing to the users, whereas much of the cost of WLL is not incurred until the users subscribe the Network.

The widely used WLL systems are:

corDECT WLL: This is digitally enhanced cordless Telecommunication

The standard is defined by ETSI (European Telecommunication Standard Institute).

CDMA – WLL: An American System as per IS-95.

Requirements for a Wireless Local Loop System

The WLL must provide all services supported by the wired local loop with the same or better quality.

A Wireless Local Loop (WLL) system is meant as a replacement for the traditional copper twisted-pair local loop. The WLL system is expected to provide a superior alternative to buried cable. The main purpose of the WLL system is to substitute a wired local loop for providing fixed telephone access. The WLL must, in general, provide all services supported today by the wired local loop, and also those, that are likely to emerge in the near future. Further, it must provide these with the same, or better, quality.

The requirements of a WLL system can be broadly divided into five categories: services, capacity, PSTN connectivity, cost and maintainability.…