App Development Tips for Windows 8

April 23rd, 2014 by Rossy Guide

Some Tips:

Windows 8 launches a world of opportunity for student developers and it is Windows made faster, more fluid and responsive to touch. Also it puts apps and active live tiles at everyone’s fingertips. Windows apps are at the center of everything you do. Uniquely, they appear as a ‘tile’ on the Windows Start screen. To open a Windows app the content fills the entire computer screen. And the content is the focus, when UI controls and distractions are minimized.

To build your Windows 8 app, follow these steps.


1. Get your dev tools

2. Build and test your app

3. Publish your app


Get your development tools :


1. Start by getting Windows 8:

You must have Windows 8 installed on your computer and Windows 8 apps require the Windows 8 API for design and testing.

Ways to get Windows 8:

o Free subscription
o Free 90-day trial
o Special offers and upgrades

2. Get Visual Studio and all the tools :

Download Visual Studio 2012 Express for Windows 8, including:

o Windows 8 Software Development Kit
o Blend for Visual Studio to create and edit images
o The Windows App Certification Kit (WACK) to test your apps

After installing Visual Studio 2012 Express for Windows 8, install the developer license. Use the above collection of tools to create, code, debug, package, and publish your Windows 8 modern apps.

Build and test your app :

Before submitting your application, you must test it and find the Windows App Cert Kit in the Visual Studio 2012 Express software you downloaded and run the test from the Windows Start screen. Follow these steps:

o Get to your Windows 8 Start screen
o Run the ‘Windows App Cert Kit’ app
o Choose ‘Validate a Windows Store app’
o Select your custom app and select “next”

1. Choose a programming language :

To build a Windows 8 app, use a language you already know:

o HTML / JavaScript
o XAML / C#
o XAML / Visual Basic
o C++ / CX

2. Get hands-on help :

The lab is available in HTML / JavaScript or XAML / C#. Pick the one with which you feel most proficient.

3. Find hundreds of code samples.

Publish your app:

The certification process of Windows 8 app includes:

o Pre-processing
o Security tests
o Technical compliance
o Content compliance
o Release of your app
o Signing and publishing

1. Get the registration code

2. Submit your app


High CPU Usage: How to fix it?

April 19th, 2014 by Rossy Guide

What is this?

High CPU usage means that your computer processor is running at a high percentage, which is more than the required amount. This is usually caused by running too many programs and processes on the computer. High CPU usage can cause your computer to slow down or freeze altogether.

How to fix it?

A high CPU usage reading typically indicates that your systems processor is running at full capacity while the current applications are running. Random shutdowns, sluggish and intermittent performance are common symptoms of high CPU usage. The CPUs task is to process the data which initiates and runs your programs. The speed in which this data is processed is measured in cycles which are commonly referred to as hertz (Hz), with one gigahertz (GHz) being equivalent to 1,000 megahertz (MHz). All CPUs have a maximum rating; this is a measurement of the amount of cycles that it can handle per second. To put it simply, once the CPU reaches its limit, it’ll typically start to heat up, slow down and then shutdown in order to protect itself.

If you find that your system has started running very slowly, then your next cause of action should be to open Task manager, this can be done by pressing Ctrl+Alt+Del at the same time. Once the applet loads up, you’ll find the CPU Usage indicator at the bottom.

If the CPU usage is at 100% for prolonged periods of time, then you have a serious problem. In most cases, your processor should never cross the 50% mark, unless you’re running a very large program, such as an animation suite or a computer game.

Troubleshooting Your Running Processes:

All processors have their limit and thus can only handle so many applications running simultaneously. If your CPU usage is at 100%, the first thing you should consider doing is closing certain running applications. If you close down all your applications but your CPU usage still remains at 100%, then you should examine your background processes. The first thing you’re going to want to do is load up Windows Task Manager by pressing Ctrl+Alt+Del. Once you have the applet up and running, click on Processes, then CPU.

This will give you a synopsis of all the programs running in the background, along with their CPU and Memory Usage. It’s very important you have some understanding of the various types of processes before you attempt to kill any.

The User Name column indicates which group the process belongs to. Processes within SYSTEMS, LOCAL SERVICE and NETWORK SERVICE belong to the operating system; you should NOT attempt to kill any of these, as it could render your system inoperable.

Processes grouped inside your <username> belong to third party applications, these can be killed. In order to end a process, simply highlight it and click on End Process. Your objective is to end the process that is consuming most of your CPU.

If there is no spyware, disable the amount of services running in the background. The following is how to do this:

1. Open your Start menu
2. Click Run or type run into the search bar and click the result
3. In the window that pops up, type msconfig.exe
4. In the system configuration utility, click either service or startup tab
5. Uncheck all the programs that you are no longer using.
6. Click OK.

Common Culprits:

The numerous elements that contribute to high CPU usage vary somewhat. The issue could be due to a software error or a hardware fault, or possibly the combination of both. Before you can properly diagnose this program you must first have some ground knowledge of the common causes, so that you can better identify the root cause. A CPU consistently running at 100% is an abnormality. If your computer runs at an unusually slow pace and displays a CPU usage around the 100% in task manager, then something is certainly wrong there. Some of the more common causes of this issue are:

o Drivers out-of-date – ensure that all your drivers are up-to-date, by manually updating them or by running DriverUpdate.
o Running too many programs at once – you can determine whether this is the cause by clicking on the Processes tab (once Task Manager is loaded up) and then clicking on CPU.
o Malware/Virus infection
o Poor CPU ventilation/CPU Overheating
o Svchost.exe

There are so many reasons why your CPU usage is consistently at 100%, but these causes are the most common.

How to Disable User Account Control in Windows 7 and 8?

April 18th, 2014 by Rossy Guide

What is User Account Control?

User Account Control is a security component that enables users to perform common tasks as non-administrators and as administrators without having to switch users, log off, or use Run As.

User Account Control is a feature that was designed to prevent unauthorized changes to your computer. When functions that could potentially affect your computer’s operation are made, UAC will prompt for permission or an administrator’s password before continuing with the task. There are four different alert messages associated with User Account Control:

o Windows needs your permission to continue
o A program needs your permission to continue
o An unidentified program wants access to your computer
o This program has been blocked

How to disable it:

Disabling UAC on Windows 7:

1. Go to Start Menu -> Control Panel -> System and Security -> Action Center.
2. Click on the “Change User Account Control Settings” link.

3. Slide the slider bar to the lowest value (towards Never Notify), with description showing Never notify me.

4. Click OK to make the change effective.
5. Restart the computer to turn off User Access Control.

Disabling UAC on Windows 8:

1. Open the Control Panel and click/tap on the User Accounts icon.
2. Click/tap on the Change User Account Control settings link.

3. If prompted by UAC, then click/tap on OK.
4. Move the slider up or down to the setting for how you want to be notified by UAC, and click/tap on OK.

5. If prompted by UAC, then click/tap on OK.
6. When finished, you can close the User Accounts window.


How to Format an External Hard Drive

April 17th, 2014 by Rossy Guide


Formatting a hard drive or flash drive will erase the contents and set up a file structure so that it can be accessed on your computer. You might need to format if you get a drive that isn’t compatible with your computer. Follow these steps to format your external for any operating system.

Method 1: Windows:

1. Open Computer Management.

o Click on the Start button and right-click on Computer or My Computer.
o Select Manage from the right-click menu.


Windows 8 Users can skip directly to the Disk Management utility by pressing the Windows and X keys on the keyboard. This will open the Power Users menu. Select Disk Management from this menu.

2. Select Disk Management.

o This is located in the left frame, listed underneath Storage.
o When you click Disk Management, your connected drives will be displayed in the center frame.


3. Right-click the drive you want to format.

o From the right-click menu, select Format.
o Enter a name for the drive.

4. Select the File System.

o From NTFS is the standard for Windows computers, and if you are only using the drive with Windows, you should pick this. If you are planning on using the drive on both Windows and Mac, select exFAT.
o Do not select “Perform a quick format” as it will not efficiently erase all the previous data.

5. Click OK.

o You will be asked to confirm. After confirmation, your drive will begin formatting. The length of time required depends on the size.


Method 2: Mac OS X

1. Connect your external hard drive. You can connect your drive through USB, Firewire, or Thunderbolt. Depending on whether or not it is formatted already, your drive may appear on the desktop. You can ignore it for the moment.
2. Open Disk Utility. You can get to the Disk Utility in the Utilities folder under Applications.
3. Select the external drive. You can see a list of your connected drives in the left frame of Disk Utility. Click the drive.
4. Click the Erase tab. From the Format menu, select “Mac OS Extended”. Enter a name for the drive. You can change this name at any time.
5. Click Erase. A window will open asking you to confirm. After confirmation, the format process will begin. The time it will take is dependent on the size of your drive. Larger drives take longer to format.

Method 3: Linux

1. Install GParted. This is a free utility available on all Linux distributions. You can install it by opening the Terminal and typing “sudo apt-get install gparted ntfsprogs”.
2. Connect your disk drive. Linux should mount the drive automatically. You will need to unmount it before you can format. Right click on the disk icon on your desktop and click “Unmount volume.”
3. Open the Partition Editor. This can be found in System/Administration. Click the drive selection box in the top-right of the window and select the external drive from the list.
4. Format the drive. Right-click the drive in the main window.  Select “Format to” and then select the format that you want to make the drive. NTFS can be read in Windows, Fat32 can be read in any operating system, and ext3 is Linux only.

How to Skip the Login Screen on Windows 8 or 8.1

April 16th, 2014 by Rossy Guide

Basic instructions

1. From the desktop, open the Run box by pressing Windows Logo+R keys together.

2. Type in netplwiz and click OK button to highlight your account.

Type “netplwiz” and click OK

3. On the Users tab from the opened Advanced User Accounts program, uncheck the box next to Users must enter a user name and password to use this computer.

4. Click Apply and OK button at the bottom of the window.

Uncheck the checkbox and click Apply

5. From the automatically sign in box, enter your User Name and then your Password twice you wish to automatically login to Windows 8 or 8.1 with.


Enter your Username and Password and click OK

6. Finally click OK button [The Automatically sign in window, as well as the User Accounts window, will now close].

7. Restart your computer. And you have successfully enabled automatic sign-in and from now on, you won’t see the login screen but redirected to the Start Screen instead.

8. The login screen is not skipped successful that is if the wrong user name is entered in Step 5 above. Double check that what you enter here is actually your user name and not just the name associated with your account.


List of Common Network Problems

April 15th, 2014 by Rossy Guide

Many problems of your system may be network-related. Some of the most common network problems are as follows:

Cable Problem:

Cables that connect different parts of a network can be cut or shorted. A short can happen when the wire conductor comes in contact with another conductive surface, changing the path of the signal. Cable testers can be used to test for many types of cable problems such as:

o Cut cable
o Incorrect cable connections
o Cable shorts
o Interference level
o Connector Problem

Connectivity Problem:

A connectivity problem with one or more devices in a network can occur after a change is made in configuration or by a malfunction of a connectivity component, such as:

o Hub
o A router or a Switch

Excessive Network Collisions:

These often lead to slow connectivity. The problem can occur one of the following reasons:

o Bad network setup/plan
o A user transferring a lot of information or jabbering network card

Note: A jabbering Network card is a network card that is stuck in a transmit mode. This will be evident because the transmit light will remain on constantly, indicating that the Network card is always transmitting.

Software Problem:

Network problems can often be traced to software configuration such as:

o DNS configuration
o WINS configuration
o The Registry, etc.

Duplicate IP Addressing:

A common problem in many networking environments occurs when two machines try to use the same IP address. This can result in intermittent communications.

NIC Problem:

Network problem of another one is NIC settings mismatch. On large networks this problem can exist on 20% to 30% the network nodes, and with a concerted effort can be brought under control. Taken into context, the impact is much larger than expected because many of the systems are distributed and require the collaboration of multiple nodes and servers to function correctly.

Even a small system has a minimum reliance of 10 network nodes and if 2 or 3 of them are not functioning correctly it influences the whole system. Left unchecked and unmanagement the NIC problem could influence and undermine all your systems.

How to Delete a File in Use in Windows?

April 14th, 2014 by Rossy Guide


When a file is classified as “in use” by Windows, it is typically still opened by another process that is or could be making changes to it. Typically though this doesn’t tend to be the case. . If the file is displayed as “in use” but there’s no indication of a program whatsoever, you have two options to proceed: You can either use the handy tool Unlocker, which integrates itself into the Windows UI seamlessly, or delete or rename files over the command prompt without any third party software.

Delete a File in Use in Windows:

There are two methods:

1. Using Unlocker in Windows
2. Using Command Prompt in windows


Using Unlocker in Windows:

When using a computer is when you want to delete or rename a file or folder in Windows, but gets an error stating that it is open, shared, in use, or locked by a program currently using it. You start to shut down every program running on the computer hoping that you will be lucky and are able to delete the file, but it still won’t delete. This method provides that will allow you to delete or remove practically any file in Windows.

The most comfortable method of finding out which program is using particular files is offered by the freeware Unlocker. Download the tool and install it. This will give you an additional entry in the context menu called “Unlocker” that allows you to get an overview of all the processes that are currently trying to access this file. Choose an operation from the drop-down menu and click on “Unlock all” to close all so-called “Handles” that are blocking access to the file and to apply your operation of choice.

When attempting to delete or rename a file or folder you should follow these steps in the following order:

Ø  Shut down any programs that may be currently using that file.

When a program is using a file it tends to exclusively lock that file so it can’t be modified or renamed while it’s in use. By shutting down the program using it, you unlock that file or folder so that you can work with it.

Ø  Reboot your computer.

When you reboot your computer, this will shut down any open programs and hopefully on reboot allow you to work with the file in question.

Ø  Reboot into safe mode and try to rename or delete the folder.

When you are in safe mode a limited number of programs start up automatically. This provides a greater chance of being able to rename or delete a stubborn file or folder.

Ø  Download a file unlocking utility.

File unlocking programs will find the processes that are using the file and attempt to close them or disconnect their connection to the file or folder so they can be deleted, renamed, or otherwise manipulated.

Using Command Prompt in Windows:

1. Open Folder Options, then uncheck the Hide extensions for known file types box, and click on OK button.

2. Open a command prompt in Windows.

3. In the command prompt, type the command, press Enter.


DEL /F /S /Q /A “C:\Users\UserName\Desktop\File.txt”

4. The file(s) should now be deleted.

5. Close the command prompt.


Common Mistakes You Can Avoid While Using Your Computer

April 13th, 2014 by Rossy Guide

Like installing free software that is suspicious, backing up data…

Install unwanted Free Softwares and Offers that are suspicious:

Some pre-installed applications are bad and some you may have no use and others may even turn out to be sub-standard and slow down your computer. Checking your PC for each item you didn’t ask for will probably take you a while. For this, PC Decrapifier application helps you identify unwanted junk. Once you can run the wizard it shows you a checklist with recommendations and tick the programs, icons and start-up items that don’t want and then click the Next button as shown in the screenshot below.

Everyone loves free things. Free software is often ad-supported and in many cases the installer comes bundled with additional products or ad-ware, which can slow down your computer. So, anytime you download a free Windows application, you must do a custom install. And several other kinds of software that are alternatively offered or forced when installing free software and these can include several different types of software.

And another type of unwanted software are browsers, it could be easily modified and include unwanted piece of functionality that does something you don’t want, like monitor your activity or steal personal information. If you want a new browser, it is much safer to go directly to the source, and if you decided you preferred Firefox or Chrome to Internet Explorer to accept what comes bundled with other software.

Also, several varieties of trial software are also often offered. And these include games which may require an additional purchase to continue playing, or offers of security solutions. This latter option can be particularly risky to install, especially if you already have other security in place. Having two security solutions in place, with the same kind of functionality being offered, can lead to conflicts and computer crashes. Just like with browsers, it is better to make an informed choice and download and install security solutions from their official webpage, instead of using what comes bundled with other software.

Then finally, some software may ask or require you to sign your email up for spam, change your homepage to their website, or even buy into other promotions in order to enjoy the product for free.


Backing up data:

There are many reasons for data loss and some of the most common are: accidental deletion, hard disk damage or failure, viruses, power disruption and improper shutdown.

Also, please avoid the following common mistakes for backing up data.

o Save your work
o Close applications
o Configure new file types
o Update backup sets
o Rescue disk
o Database exports
o Check backup media
o Check log files
o Verify recent backup data
o Store backup media offsite during absence
o Critical data should be backed up 2 ways
o Run Error Check on the C: drive

Too Much Disk Defragmentation

Most people don’t need to defragment their hard disk manually. And you should only defragment your hard drive if it is 5-10% fragmented.


Not Restarting the Computer

Rebooting is considered a cure-all of sorts that fixes a ton of problems. So try to reboot and see if that solves the problem.


Viruses, Trojans, and Adware

Another one of those problems that can be a risk with any new software download. Having solid anti-virus software on your computer is a must for this.



Transfer Commands for Sysax FTP Scripting

April 12th, 2014 by Rossy Guide


There are two file transfer commands that are used with Sysax FTP Scripting.

o  ftpdownload

o  ftpupload

The ftpdownload command can be used to download either an individual file or an entire folder tree. The files and folders are downloaded to the current local working path. The ftpupload command can be used to upload either an individual file or an entire folder tree. The files and folders are uploaded to the current remote working path.

Obtaining folder listings:

The contents of a folder can be listed and stored into a user specified list name. Each item in the list can then be individually accessed. The ftpgetlist command can be used to obtain a listing of the current working path. The predefined keywords local or remote are used to specify either the local or remote system. The recurse level determines the number of levels of subfolders that need to be listed. If no recurse level is specified, it is set to 1 by default and lists only the top level files and folders in the current working path.

Syntax for obtaining folder listings

ftpgetlist <keywords: local, remote>, <list name>, <recurse level>;



Example of using the command for setting paths

ftpgetlist local, @local_list; #get the listing of the 
current local working path
ftpgetlist remote, @remote_list; #get the listing of the 
current remote working path
ftpgetlist remote, @remote_list, 0; #get recursive listing of the 
current remote working path
ftpgetlist remote, @remote_list, 3; #get up to 3 levels of 
listings of the current remote working path



Transferring files and folders:


For this command, the predefined keywords file and folder are used to specify either a file or a folder. An optional local name string can be provided to save the downloaded item to a new name.

Syntax for downloading files and folders

ftpdownload <keywords: file, folder>, <remote name string>
 [, optional: <local name string>];



Examples of downloading files and folders

ftpdownload file, "text.dat"; #download file

ftpdownload file, "*.doc"; #download all files in the current 
folder matching the pattern *.doc

ftpdownload file, "text.dat", "text_0503.dat"; 
#download file and save as text_0503.dat

ftpdownload folder, "www"; #download entire folder tree




For this command, the predefined keywords file and folder are used to specify either a file or a folder. An optional remote name string can be provided to save the uploaded item to a new name.

Syntax for uploading files and folders

ftpupload <keywords: file, folder>, <local name string>
 [, optional: <remote name string>];



Examples of uploading files and folders

ftpupload file, " out_text.dat"; #upload file

ftpupload file, "*.doc"; #upload all files in the current
 folder matching the pattern *.doc

ftpupload file, " out_text.dat", "out_text_0503.dat";
 #upload file and saving it as out_text_0503.dat

ftpupload folder, "www"; #upload entire folder tree



Modification time for remote file:

The ftpmodtime command can be used to get the modification time for the remote file in YYYYMMDDHHmmss format.

Syntax for modification time of a remote file

ftpmodtime <user variable>, <filename>;



Examples of modification time of a remote file

ftpmodtime ~remotefiletime, "remotefile.txt"; #get the modification 
time for remote file remotefile.txt


Corrupted User Profile in Windows 7

April 11th, 2014 by Rossy Guide

What is this, how does it show:

Your user profile is a collection of settings that make the computer look and work the way you want it to. It contains your settings for desktop backgrounds, screen savers, pointer preferences, sound settings, and other features. User profiles ensure that your personal preferences are used whenever you log on to Windows. If you tried to log on to Windows and received an error message telling you that your user profile might be corrupted, you can try to repair it. You will need to create a new profile, and then copy the files from the existing profile to the new one.

In Windows 7, it is very common that we come across corrupt user profiles. There are many solutions and tricks for us to fix it. Here we offer 2 ways to fix corrupt user profile. We will see the error message “The user profile cannot be loaded” or “The User Profile Service failed the logon” if we type the password and press Enter.

Fix the corrupt profile:

One of the reasons that cause corrupt profile is that antivirus software is scanning your PC while you try to log on. But there are still some other reasons. No matter for what reasons, we can fix it. First restart your PC and boot into safe mode. Do this by pressing F8 before you see the Windows loading screen and choosing Safe Mode from the menu that appears. Safe Mode logs you into the built-in Windows administrator account, but you might find that some options don’t work.

Step 1: Click Start and type regedit into the search box and press Enter.

Step 2: Registry Editor will launch and you need to navigate to the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList

Step 3: Try to find out which user account it relates to by clicking each S-1-5 folder and double-click the ProfileImagePath entry.

Step 4:  If you have located the folder for the corrupt profile, double-click RefCount and change the Value data to 0 and click Ok.

Step 5: Double-click on State, then make sure the Value data is again 0 and click Ok.


How it can be managed:

Create a new user profile:

You are able to create a new user account if you have another account which can access to this PC. Otherwise you need to boot into safe mode as the Trick 1. Then try to do as the following steps. In additional, you have to enable the hidden admin account if neither of them works. Then type cmd in the search box and right-click on Command Prompt. Choose Run as administrator.

Type “net user administrator /active:yes” at the prompt. You can see the response show that: The command completed successfully. Reboot to your PC and see your corrupt account and administrator account. Login the admin account (which has no password) and do as the following:

Step 1: Open Control Panel and click User Accounts and Family Safety

Step 2: Click on User Accounts. Then click Manage another account and type in the password

Step 3: Click create a new account and type the name.

Step 4: Restart your PC.

Copy User Files to the New Profile:

Step 5: It is better for you to log in as Administrator or if you need to transfer files properly. So enable one of them if you haven’t already done so.

Step 6: By clicking Start, Computer and then double-clicking on the hard drive on which Windows is installed, you can navigate to the corrupt user account. Usually c: – and then double-click on the Users folder. Find the folder containing your old user account and double-click it, then double-click My Documents.

Step 7:  It’s best to copy across the contents of sub-folders separately, and this gives you a chance to have a clear out as well. If you do want to copy the entire contents in one go, enable hidden files and folders and then make sure you DON’T copy across the following files:




You can click the Tools menu (press Alt if you can’t see it), to make these files visible. Then click the View tab and click Show hidden files, folders and drives. Be sure that any email stored locally may need to be copied separately using instructions specific to your email program. So please don’t delete the corrupt user profile until you are sure you have all the files you need from it.

Step 8: When all the files are copied across to the newly created user profile, restart your computer and log onto the new profile.

If you found this article helpful, please share it with your friends and family. Who knows, maybe they are facing this problem and need help to solve.