A little something about everything

internet marketing and website development made simple..

How to copy windows install from cd/DVD to USB without any extra software.

Open CMD.exe as administrator then do the following:

  • Type: "diskpart"

a new window may open or it may start in the current command window,

at the DISKPART> prompt type in the following.

  • list disk
    • (make note of the disk that is your usb drive, if you are not 100% sure do not continue as you may cause data loss)
  • select disk #
    • enter a number based on the previous noted disk(your usb drive)
  • clean
  • create partition primary
  • select partition 1
  • active
  • format fs=ntfs quick
  • assign
    • this will create a new drive on your system, make note of the drive letter.
  • exit

in the admin command prompt window type the following:

  • (DriveLetterofyourCD/DVDinstaller):
  • cd boot
  • bootsect.exe/nt60 (DriveLetterofUSB):
  • (DriveLetterofUSB):
  • xcopy (DriveLetterofyourCD/DVDinstaller):\*.* /s /e

That's it, your done. You can now boot and install from USB.

How to stay secure online: Passwords, security and compromised sites, Oh my!

Best things to remember for password and email security,

  • Passwords, Have a secure password with a minimum of 8 characters including small and capital letters, 1 or more symbols, as well and at least 1 number.
    • Don't use easy to guess passwords that contain pets, kids, parents and/or sibling names or birth dates.
    • Make your password something you would never share with anyone, many people use a favorite color, food, etc.. which they also post to social media sites like facebook.
    • Separate your passwords, never use the same password for everything, if a website that you use is compromised(updated: recent example linkedin database compromised) then all of the stuff you use could become compromised. Generally its a good idea to use three or more passwords with variations of those passwords that you can change around for example H3l!0WoR!D, Hell0w0r!d, HelloW0rlD. This allows you to use basically the same password in many places but if one place is compromised it will minimize the impact since you are using a variations of the passwords in each place.
    • Try to avoid needing password security questions and hints, don't give real answers that a potential hacker can find with little effort.
  • Public terminals, Don't use public terminals to check your email or bank information as they can contain key-loggers which will compromise your account to hackers including government agencies.
  • Free WiFi, Don't use public unencrypted free WiFi to send and receive email unless you are browsing and checking email with SSL only. (https:// for sites and webmail or SSL in your email configuration)

This may seem like a lot of work but having identity theft or compromised personal information will be a lot worse.

How to use Internet Explorers built in FTP Client with Active FTP

Open Internet Explorer, click tools > Internet options > Advanced > scroll down until you see "Use Passive FTP" and verify that this is unchecked.

This will force Internet Explorer to use Active FTP rather than Passive FTP.

Now type in ftp://_yourdomain .com_ in the address bar, when prompted enter the login credentials: your_username and then Your_Password after which depending on your version of Internet explorer you may need to perform the following steps; click view > Open FTP Site in Windows Explorer and reenter your login credentials. Now you can drag, drop and edit files as needed from windows explorer.

Donate

If one of my guides, tips, tools or articles helped you out and you would like to donate please consider the following projects I'm currently working on.

Current Projects

2000 through 2018, The 0spam Project ∙ https://0spam.org (mirror: https://0spam.fusionzero.com)

This project is a free self learning antispam system with dns based lookups which allows compatibility with most email servers via the dnsbl query functions. By integrating with dnsbl functions email service providers don't need to spend money on custom integrations and antispam filtering software or services. The next step to the project will create self learning content filtering based on usage, flagged user email submissions and a spam url parsing.

Currently the project is funded by the optional abuse notification service for service providers and a few larger providers with custom reporting needs.

 

When you donate it allows me to spend more time on the project(s).

Thank you!

Shawn Hyde