Sunday, December 14, 2014


Despite all the advances in security technology, one aspect remains constant: passwords still play a central role in the security of the system. The problem is that too often they are the easiest security mechanism to defeat. Despite the fact that there are technology and policy to make passwords stronger, still have to deal with the human factor. It's no secret that users often use as passwords friends' names, nicknames animals, etc. The main objective is to enable users were strong passwords. However, it is not always clear how to achieve this. The problem is that our actions are too predictable. For example, in the list of totally random words invented by the common man, certainly showed some general law. Selecting good passwords requires education. This knowledge, system administrators, and should be extended to the end users. Perhaps this article will help you understand the use of passwords in Windows XP (the entire family of the OS) ... So: Myth №1: password hashes are quite reliable when using NTLMv2 Many readers will be familiar with the weakness of password hashes LanManager (LM), which made so popular L0phtcrack. NTLM made ​​hashes somewhat stronger by using a longer hash and different characters in upper and lower case. NTLMv2 is more perfect, with a 128-bit key space and using separate keys for message integrity and confidentiality. Furthermore, it uses HMAC-MD5 algorithm for higher integrity. However, Windows 2000 still often sends LM and NTLM hashes over the network and NTLMv2 is vulnerable to attack during transmission (also known as replay). And, because password hashes LM and NTLM is still stored in the registry, and you are vulnerable to attacks against the SAM. It will still take some time until we finally free ourselves from the constraints of LanManager. Until then, it is not necessary to hope that your password hashes are reliable. Myth №2. Dj # wP3M $ c - best passwordconventional myth that totally random passwords obtained using a password generator - the best. This is not quite true.While they may in fact be strong passwords, they are usually difficult to remember, slow and nabiraemy sometimes vulnerable to attacks against the password generating algorithm. It is easy to create passwords that are resistant to cracking, but harder to create such passwords memorable. There are several simple steps. For example, consider the password "". This password is used letters in upper and lower case, two digits and two letters. Password length to 20 characters, but it can be stored with minimum effort, perhaps you have already involuntarily remembered.Moreover, this password is typed very fast. As part of the "Makeit20" alternate on the keyboard left and right hands, which increases the speed dial, reduces the amount of typing errors and reduces the chance that someone will be able to peek your password, watching the movements of your fingers (long established lists of English words, alternate keys for right and left hand, which is convenient to use as part of your password. For example, a list of eight thousand of these words can be found on ) The best technique for creating complex, but easy to remember passwords - use data structures that we are accustomed to remembering. Such structures also make it easy to include punctuation characters in the password, as in the example addresses e-mail, used above. Other structures that are easy to remember - it's phone numbers, addresses, names, file paths, etc. Please note some elements that allow us to simplify the memorization.For example, patterns, repetition, rhymes, humor, and even rude (including obscene) words creates passwords that we will never forget. Myth №3. 14 characters - Optimal Password Length With LM, password hashes were split into two 7-character hash. This actually makes the passwords more vulnerable because a brute force attack (brute-force) can be applied to each half of the password at the same time. That is, a length of 9 characters passwords are divided into one-character hash 7 and one two-character. Obviously, cracking a 2-character hash did not take long, and the 7-character part is usually cracked within hours. Often a short piece can greatly facilitate breaking long fragment. Because of this, many security professionals determined that optimal password length is 7 or 14 characters, corresponding to the two 7-character hashes. NTLM improved the situation by using all 14 characters to store the password hashes. Although it did make things better, but the dialog box NT limit passwords to a maximum of 14 characters; thus defining passwords of exactly 14 characters for optimal security. But everything is different in the newer versions of Windows. Passwords in Windows XP and 2000 may have a length up to 127 characters, thereby 14 symbols will not be limiting. Moreover, one small fact open onto Urity, is that if the password is 15 or more characters, Windows stores correctly even LanMan hashes. If your password is 15 characters or longer, Windows stores the constant AAD3B435B51404EEAAD3B435B51404EE as your LM hash, which is equivalent to a null password. And since your password is obviously not null, attempts to crack that hash to nothing lead. Taking this into account, the use of passwords longer than 14 characters may be good advice. But if you want to make mandatory the use of such long passwords using group policy or security templates, you will encounter difficulty - nothing will enable you to set the minimum password length to 14 characters. Myth №4. J0hn99 - A good passwordAlthough the password is "J0hn99" passes on the complexity of the requirements of Windows, it is not as complicated as it seems at first glance. Many programs, password crackers have rules that can try millions of word variants per second.Replacing the letter "o" with the number "0" and adding a couple numbers - is nonsense for such programs. Some programs even check-crackers set of methods that are commonly used users, allowing them to pick up even a fairly long and, at first glance, successful passwords. The best approach - to be less predictable. Rather than replacing "o" to "0", try replacing "o" two characters "()", as in "j () hn". And, of course, extending your password, you increase its stability. Myth №5. Any password will sooner or later be broken. Although a password can be opened in several ways (eg, via "keylogger" or through social engineering), however, there are ways to create passwords that can not be cracked in a reasonable time. If the password is long enough, his hacking take so long or require so much processing power that is essentially the same thing as if it was uncrackable (at least for most hackers). Of course, in the end, any password can be cracked, but it can happen and not in our lifetime, or even during the life of our great-grandchildren. Thus, if, of course not the Government hacking away at your passwords, chances are you are very high. Although perhaps achieve computer technology may one day make this myth a reality. Myth №6. Passwords should be changed every 30 days. Despite the fact that it is - good advice for some passwords with a high degree of risk, it does not fit the average user. Requiring frequent password changes often causes users to develop predictable patterns in their passwords or use other means that will actually decrease their effectiveness. Man in the street does not like constantly think of and remember new passwords every 30 days. Rather than limiting password age, it is better to focus on stronger passwords and better user awareness. Suitably, the time for the average user, - from 90 to 120 days. If you give users more time, it will be easier to convince them to use more complex passwords. Myth №7. You should never write your password Although this is good advice, sometimes it is necessary to write down passwords. Users feel more comfortable creating complex passwords if they are confident that they can read it in a safe place if you suddenly forget. However, it is important to educate users on how to properly write down their passwords.The sticker on the monitor - it is certainly silly, but storing passwords in a safe or lock box may be sufficient. And do not neglect security when it comes time to throw out the paper with the old password: remember many major hacking occurred precisely because of the fact that hackers are not too lazy to look through garbage in search of the organization recorded passwords. It may be an idea to allow users to store passwords in software utilities for storing passwords. These tools allow the user to store multiple passwords in one place, close the main master password. But if someone learns the master password, you will have access to the complete list of all passwords. So, before you allow users to save passwords in such a place, consider the risks: first, this method software, and therefore vulnerable to attack, and secondly, because everything is kept on a single master password, it can become a single point for the global failure of all passwords of all users. Best practice - to combine technology, physical security, and company policy. In addition, passwords can be simply be documented. There is nothing unusual in a situation where the system administrator is ill or retired. A number of organizations - the only person who knew all the passwords, including the password server. So sometimes you have to even approve writing passwords, but only when it is really necessary and well thought out. Myth №8. The password can not contain spaces Despite the fact that most users do not use it, Windows XP allows you to use spaces in passwords. In fact, if you can see this symbol on Windows, you can use it in a password. Consequently, the gap - quite valid password characters.However, because some applications trim spaces, it is better not to begin or end your password with a space. Spaces are easier for users to create more complex passwords. As the gap between the words can be used, its use can give users a real possibility to use long passwords of several words. Generally, space is a very interesting situation, it does not fall into either category password complexity requirements Windows. This is not a figure and not the letter, and not even considered a symbol. Thus, if you want to make your password more complex, the gap is no worse than any character and in most cases does not reduce the complexity of passwords. But I would say about one major drawback associated with the use of space - its key issues by clicking a unique sound, that with nothing to confuse. It's not hard to hear when someone uses a space in their password. In general, use spaces, but do not abuse it. Myth №9. Always use Passfilt.dll Passfilt.dll - library, forcing users to use stronger passwords. In Windows, this is done through a policy of "Password must meet complexity requirements."Although it is often a good policy, some users may find it frustrating when their passwords are rejected as insufficiently complex. Even experienced administrators have likely had to enter multiple passwords until one of them does pass complexity requirements. Sorry users certainly will not express support for the address of your password policy. If you see that users do not like complexity requirements, perhaps, the best way is to require long passwords instead of this policy. If you do the math, you'll see that the 9-character password consisting of lowercase letters, about the same complexity as the 7-character password that uses letters as lower and uppercase and numbers. The only difference is how the password cracking software handles different character subsets; some brute-force crackers have sorted all combinations of letters in lower case before use numbers and other symbols. Another option - to take the Platform SDK sample in the directory \ samples \ winbase \ Security \ WinNT \ PwdFilt \ and change it so that it is more forgiving with password selection. You can also teach users how can complicate passwords, and tell them some ideas for this. Myth №10. Use ALT + 255 for the Strongest passwordconsider the use of characters with large ASCII-code for a final complication password. These characters can not normally be typed on a keyboard but are entered by holding down the ALT key and a set of ASCII-code on the numeric keypad. For example, ALT-sequence 0255 creates a character. Despite the fact that in some situations it is useful also be considered disadvantages. Firstly, holding down the ALT key and set the numeric keypad can be easily observed by others. Second, creating such a character requires five keystrokes that you need to remember and then enter it each time you set a password. Perhaps it would make sense to create a password to five characters longer, which would actually make your password much stronger for the same number of keystrokes. For example, a 5-character password created characters with a lot of ASCII-code will require 25 keystrokes. Given the 255 possible codes for each character, and only five characters, the total number of combinations of 255 ^ 5 (or 1,078,203,909,375). However, the 25-character password created only lower-case letters has 26 ^ 25 (or 236,773,830,007,968,000,000,000,000,000,000,000) possible combinations. Obviously, it is better to create longer passwords. Another point that is worth considering - some laptop keyboards make it difficult to enter the numeric keypad and some command-line utilities do not support characters with large ASCII-code. For example, you can use the character ALT + 0127 in Windows, but will not be able to type it on the command line. Conversely, some character codes such as Tabs (ALT + 0009), LineFeeds (ALT + 0010) and ESC (ALT + 0027) can be used when dialing from the command line, but can not be used in dialog boxes Windows (that it may be desirable side effect in some rare cases).However, there are some cases where it is useful to use the extended character codes. If you have sensitive service or local administrator, which are rarely used, sometimes the extended character deserves a few extra keystrokes. Since few password crackers have rules set up to handle extended characters, that may be enough to make the password very difficult to crack. But in this case does not stop with high ASCII-code: there is a little known fact, which consists in the fact that you can actually use the full range of Unicode characters, which has 65,535 possible characters. However, such a character as ALT + 65206 is not as stable as the equivalent number of keystrokes using regular characters. Finally, pay attention to the use of non-breaking space (ALT + 0160) in a set of wide characters. This character appears as a space and can often fool those who are somehow saw your password. For example, say that an attacker could install a keylogger on your system. If you use a non-breaking space in your password in the log file it will look like a regular space. And if the attacker does not know about non-breaking space, and without seeing the actual ASCII-code, his password, which he hoped would not give him anything. But many people do not know about the existence of this character, though, it seems, after reading this article will already know. Conclusion Some may disagree with some given moment, but they do not claim to be the ultimate indisputable truth. This was not the purpose of writing this article. Myth - a half-truth. Many of the myths that are criticized, were once great advice, or even still are those in specific cases. But for many of these tips have become a set of rigid, fixed rules to be applied at all times. But any advice about passwords, including quoted in this article - no more than just advice. You must decide what rules you are suitable and which are not. Perhaps the largest and most erroneous myth of all and is that there is one strict rules on passwords. Sometimes John99 - a good password and sometimes passwords must be changed more frequently than once a month. Some passwords, for example, the administrator need much greater protection than the other - the user.


O8DsQpJypvY (604x340, 112Kb)
If you work a lot with the computer, then you know that for a quick and productive work should try to do without the mouse. In this edition of Science and Technology will explain how it is more convenient to use: Windows, Chrome, Firefox, Gmail, Mac, MS Excel, MS Word, Google
Ctrl + L or ALT + D or F6 - go into the address bar and select its contents;
Ctrl + K or Ctrl + E - go to the address bar and enter a query to the selected default search engine;
Ctrl + Enter - turn tratata in the address bar in www.tratata. com :)
Ctrl + T - new tab;
Ctrl + N - a new window;
Ctrl + Shift + T - return the last closed tab;
Ctrl + Shift + N - secret level "Chrome" :) New Window in "Incognito";
Shift + Esc - one more secret level :) Built-in Task Manager;
Ctrl + Tab or Ctrl + PageDown- as elsewhere, leaf through the tabs from left to right;
Ctrl + Shift + Tab or Ctrl + PageUp - leaf through the tab from right to left;
Ctrl + 1, ..., Ctrl + 8 - switches between the first eight tabs;
Ctrl + 9 - switches to the last tab;
Backspace or Alt + Left Arrow - go to the previous page in the history of the current tab;
Shift + Backspace or Alt + Right Arrow - go to the next page in the history of the current tab;
Shift + Alt + T - switch to the keypad instruments; thereafter it is possible to move left and right arrows, and select the button by pressing Enter;
Ctrl + J - open tab all downloads;
Ctrl + Shift + J - open the Developer Tools (View menu item code);
Ctrl + W or Ctrl + F4 - Close the active tab or pop-up window;
Ctrl + R or F5 - as elsewhere, update (tab open);
Ctrl + H - Open tab history (History);
Ctrl + Shift + Delete - window cleaning history;
Ctrl + F or Ctrl + G - search for text on the open page;
Ctrl + U - view the HTML-source code of the page; By the way, the address bar type of view-source: POLNYY_URL show from this source URL;
Ctrl + O - as elsewhere, a file open ... and the "File" menu does not need to look for;
Ctrl + S - similarly - to save the current page;
Ctrl + P - print the current page;
Ctrl + D - Bookmark, like most browsers;
Ctrl + Shift + B - open the Bookmark manager;
Alt + Home - to return to the home page;
Ctrl ++ (plus), Ctrl + - (minus) - Zoom in and zoom out; "Plus" and "minus" can be normal or gray;
Ctrl + 0 - return to the display scale of 100%;
F11 - full screen and back.
Open links in a "lame" is also useful if you get used to, and the right mouse button is not needed:
Ctrl + click on the link (option - click on the link to the middle mouse button or scroll wheel) - open the link in a new tab on it;
Ctrl + Shift + click on the link (Option - Shift + click on the link to the middle mouse button or scroll wheel) - open the link in a new tab switching to it;
Shift + click a link - Open link in a new window.
- Raise or lower the page. Spacebar - Drop Down Arrow, Shift + Spacebar - lift page.
- Find. Ctrl + F or Alt-N to the next page.
- Add this page to your bookmarks. Ctrl + D.
- Quick Search. /.
- New tab. Ctrl + T.
- Go to the search bar. Ctrl + K.
- Go to the address bar. Ctrl + L.
- Increase the size of the text. Ctrl + =. Reduce the size of tekstaCtrl + -
- Close the tab. Ctrl-W.
- Reload the page. F5.
- Go to the homepage. Alt-Home.
- Restore the page is closed. Ctrl + Shift + T.
- Bookmarks with keywords. This is the most productive. If you frequently visit a website, you are doing a bookmark (of course!), Then go to the properties tab (click on it, right-click). Add a short keyword in the keyword input, save, and then you can simply enter in the address bar (Ctrl + L) is the key word, and immediately proceed to the site.
- Write a new message. C.
- Reply to the letter. R.
- Respond vsem.A.
- Send a letter. F.
- Save the current message and open the next pismo.Y + O.
- Delete the message and open the next. # + O (or Shift-3 + O).
- Send a written letter. Tab-Enter.
- Search. /.
- Navigation. Moving down J and vverhK list of contacts.
- List of messages. N and P move the cursor to the next or previous message, and the message list.
- Ignore. M- letters with distinguished addresses are no longer exposed to the list of incoming messages and archived.
- Select conversation. X - The conversation will be selected. It can archive, apply a label to it and choose for her action.
- Save Draft. Control-S.
- Go to the message list. G + I.
- Go to the marked letters. G + S.
- Go to the address book. G + C.
- Create shortcuts to quickly switch. To create a keyboard shortcut to quickly switch, right-click on the icon create shortcut switch (there is one on your desktop) and enter the combination. For example, such as Ctrl-Alt-W to of Word.
- Switch between windows. Alt-Tab - select the window you want, then lower the key. Or hold down the Windows, click on Tab to go through the taskbar button and find the right window, and then, having found it, then press Enter.If you add the Shift key to any of these methods, the selection window will be in the opposite direction.
- Go to the desktop. Key Windows-D.
- Context menu. Instead of right click, press Shift-F10. Then scroll up or down using the arrow keys up and down.
- Shut down. To quickly turn off the computer, press the Window, and then U. With this button you can press on S to pause, to turn on the U or R to reload.
- The most common. You, of course, you know, but for beginners should mention the most famous combination: Ctrl-O- open, Ctrl-S - save, Ctrl-N - open a new document, Ctrl-W - close the window, Ctrl-C -kopirovat, Ctrl -V - paste, Ctrl-X - cut. Ctrl-Z - undo (back), Ctrl-Y - cancel (forward). To see the contents of the clipboard into MS Office, press Ctrl-C twice. Ctrl-Home- go to the top of the document, Ctrl-End - go to the end.
- Menu. When you press Alt, a menu appears in which you want to work, using the arrow keys. Alt plus the underlined letter of each menu option leads to the use of this option. Or simply remember the keyboard shortcut for this option for even more rapid use.
- Explore Windows (Explorer). Windows-E - program runs My Computer.
Operating system Mac
- Switch Dock. Option-Cmd-D - show / hide the Dock.
- Hide all the rest. Cmd-Option-H hides all other windows except the one in which you are located. Facilitates your screen.
- Close the window. Cmd-W closes the active window open. Option-Cmd-W closes all open windows.
- Open directory. Option-Cmd-right arrow - deploy directory and subdirectories in the list in the Finder.
- Forward and backward. Cmd- [andCmd-] worked with the Finder, Safari and Firefox.
- Copy screen. Cmd-Shift-3 - for the entire screen. Cmd-Shift-4 - creates a border to copy the selected part of the screen.
- Exit. Shift-Cmd-Q - output realized after 2 minutes. Shift-Option-Cmd-Q - output realized immediately.
- Empty Recycle Bin. Shift-Cmd-Delete.
- New window in Safari. Cmd-T.
- Help. Cmd-shift- ?.
- Load CD. Press C during startup (just after the melody), download CD.
- Boot from another department. Option-Cmd-Shift-Delete- starts to boot, until you find another department, such as a CD or disk.
- Additional Information. Cmd-Option-I open a window with additional information that allows you to see and compare in one window a lot of files and folders.
- Sleep mode, restart and shutdown. Cmd-option-eject, Cmd-ctrl-eject, and Cmd-Option-ctrl-eject.
- Forced OFF. Cmd-opt-Esc - basic, but very useful.
- Quick protocol FTP. Cmd-K open a connection to the server.
MS Excel
- Edit cell. F2. Perhaps this is the main key that you need to know.
- Select the column. Ctrl-Space.
- Select series. Shift-space.
- The currency format. Ctrl + Shift + 4 (or more precisely, Ctrl + $).
- Interest format. Ctrl + Shift + 5 (or more precisely, Ctrl +%).
- By the beginning. Ctrl-Home makes the cell A1aktivnoy.
- Enter the current date. Ctrl-colon.
- Enter the current time. Ctrl-division sign.
- Copy of the cell. Ctrl - double quotes copied upper cell (without formatting).
- Format Cells. Ctrl-1 will open the format cells.
- Navigation. Ctrl-PageUp and Ctrl-PageDown.
- Multiple input. Ctrl-Enter instead of just Enter, and the data entered in one of the few selected cells will transfer the data to all other selected cells.
MS Word
- Default Formatting. Ctrl-Space in normal style for the current selection and then enter text.
- Space between paragraphs. Ctrl-0 (zero on top of the keyboard) adds or removes the interval before the current paragraph. Ctrl-1 (above the keyboard) - single line spacing of the paragraph. Ctrl-2 (above the keyboard) - a double line spacing of the paragraph. Ctrl-5 (above the keyboard) changes the line spacing to one and a half.
- Update the date and time. Alt-Shift-D - making updates to date. Alt-Shift-T - making updates of time. 


Keyboard and mouse are already so familiar things in our lives that it seems there certainly we can not trap any surprises. Nevertheless, it happens that all typical products are not entirely obvious properties and functions. Today we want to introduce you, and some just to recall a few hidden ways to use a computer mouse.
xqoOIKkRTYo (450x450, 51Kb)
1. Highlight the text
We all know that it is necessary to highlight the text hold down the left mouse button and hold your cursor over the desired location of the text. However, if we need to highlight the text on the page length, that is scrollable, it is not always convenient. Therefore, use the following combination: click at the beginning of the desired location, then go to the end of the desired selection and click again, but holding the clamped Shift. All the space between the two clicks highlighted.
2. The transitions back and forth in your browser
In the browser to go to the previous or next page do not necessarily clicking on the appropriate button on the toolbar.You can simply hold down the Shift key and rotate the mouse wheel forward or backward.
3. Zoom in and out
You can zoom the display open page simply turning the scroll at the same time while holding the button on the keyboard CTRL. This method works in a large number of programs, including many image viewer.
4. Double-A and Triple-click
Everyone knows that in order to highlight the word you just need twice as fast on it to click. But if you do a triple-click, you can immediately select a paragraph of text. Try it, it is much more convenient than pulling selection cursor to the end of the paragraph.
5. Drag the right mouse button
To move files in Windows we use the drag'n'drop, that is, we take an element, drag it to the desired location and there throwing. But you can do the same thing, right click and then we will see a context menu allowing you to not only move but also copy the file and create a shortcut to the right place.
6. Selection of multiple images into text
If you are working with long text in which you need to cut only the fragments that interest you, then do not have to do it one by one. You can hold down the CTRL key and highlight the right words, sentences, paragraphs. Then copy it all in one fell swoop to the right place.
7. Open links in a new tab
Many users have long been accustomed to, that to open the link in a new tab, you can press the middle mouse button. However, if the wheel broke and do not click, it is useful to recall that the usual mouse while holding down the CTRL key leads to the same result.


What should I do if my computer (laptop) running slow? 

On all internet forums you can find complaints PC users about their new notebooks: the first months like everything was normal - all windows and programs open and close normally, but when only six months to go, then becomes noticeable as the speed of the laptop falls falls in dramatic fashion. 
So will it cost to buy a new one again? 

No way! 
First, you need to change all the desktop settings. For example, if the user on the desktop are animated "wallpaper", it is not the best way will affect the overall performance of your computer, as RAM and CPU computer will only be transferred from such "wallpaper."Remove them and "hang" stationary "wallpaper". 

Secondly, if you constantly install and uninstall new programs that form a set of temporary files. And this is not possible in any way to get rid of. And that temporary files tend to score HDD. In this case it is necessary to delete temporary files and to defragment the hard disk. There is another solution: buy an external HDD or a conventional HDD, which has a larger volume. 

Third, we must constantly clean up and fix all registry errors in Windows. 
The fact remains, but the main reason for slowing down the speed of the laptop is the registry Windows. But remove all the errors from the registry by yourself is not recommended. For this there are special registry cleaner. For Windows XP is fine traditsionnyyCSleaner.For Windows7 is better to use programs such as, Frontline Registry Cleanerili RegCure. The program is constantly updated as Windows7 so anything extra is not removed from the registry Windows7. 

Fourth, install on your computer more powerful memory. With a powerful memory will work much easier and user and his computer. 

Fifth, be a smart decision to uninstall any unwanted programs that do not use a computer. To do this, go to the Start menu, then Control Panel, then Add or Remove Programs. Then select the program that we do not use, click on the delete, and the program is removed. But as a rule, the "tails" of most programs remain in the registry Windows. To fully uninstall desirable at the outset to establish a program that has a useful function in the options Uninstall. If it is available, go to Start, All Programs, find the right and click on Uninstall.Everything there is nothing left. If there is no function Uninstall, it is better to use programs CSleaner, and even better Regcleaner, which are able to completely clean out all the unnecessary files from your computer. 

Sixth, to change all the settings to the optimal value. For the most part, these tips will be perfect for those users whose machines are on Windows Vista or Windows 7.  

Seventh, if the OS is legal, all the new settings and add-ons will be useful for 
Windows. Go to Start, All Programs, and update Windows. 
And last - defragmentation. Most users ignore this option. And all temporary files will still remain on the HDD even after deletion, since deleted the file headers. Defragmentation allows the files you want to combine into one. If the user does not want to defragment, then he would have nothing to remove from the HDD. In this case, with the help of useful applets Acronis broken hard drive to the desired number of bytes and the information that will not be removed in the near future, is entered in the new E or H disk. It's done. The laptop will run faster. 
2. Computer freezes. What to do? 
Well, let's look at three ways to help you do not restart the computer in such situations. 
1 Press and hold down the Num Lock, until the system returns to its previous state. This action frees the CPU from (pardon the pun) of processes that are currently taking place. 
If that does not work - go further: 
2 Let us try to bring the computer out of the coma by means of antiquity Task Manager. Press simultaneously Ctrl-Alt-Delete. In the drop down box, turn off the Apps that you do not need at the moment. If this works, click OK and continue working. 
3 If your computer has multiple users, again, open the Task Manager, go to the tab "Users" and select your user Nazhmaem "log out", and after re-enter the system . 
And now seven tips to help avoid computer freezes. 
1 At least once a week, clean history in the browser. Or even disable history saving when you turn off the computer. Well, that's if you have a computer very weak and old. 
2 poudalyat temporary files stored on your computer. And do clean cookie At least once a week. 3 Remove all unnecessary programs that you no longer use. 
4 Once a week, do defragment the hard disk. 
5 If your computer has multiple users, make sure that there was only one user is logged in. 
6 Try to periodically save your documents while you are on they are working on. 
7 And do not forget to turn off the computer as expected. The Start menu. I know some people who just turn off the computer button on sistemnike. Do not do it!


  I've tried many photo editors. A recently discovered a new one. He met me before, but for some reason did not lead it never work. And here recently downloaded and decided to try it. He impressed me with its simplicity, ease of operations and stunning end result! This Photoinstrument. The program of work with pleasure! After processing the photos in it for many years younger! I recommend to all!
The conversion of black and white photography in color


Glamour photo processing

And after ..

The program has a built-in tutorial video
The program has a function of removing unwanted objects from a photo.
If anyone is interested, you can download: file size 4.6 mb 
The installer program operates in a quiet setting. After you run the installation program does not appear any windows reflecting the installation progress. The program defaults to drive C: / Programm Files . After 2-3 minutes looking for it there. The "cured" and no codes and serial numbers are not required. Enjoy your work!