Install Windows from a USB drive

Install Windows from a USB drive

One might need to reinstall an operating system from time to time, but the netbooks and ultra-portable laptops gaining popularity today have no optical drives.

What do you do when there is no optical drive in your PC and you want to install a new operating system on it? Before you invest in an external drive, we will tell you about a more cost-effective solution. Why not install Windows XP or Windows Vista from a USB flash drive instead? All you need are the following items:
A desktop or laptop with Windows XP/Vista (according to the OS required to be dumped onto the USB flash drive).
An optical drive in the PC.
The original Windows XP or Vista installation disk.
A 1 GB or 4 GB USB flash drive for Windows XP/Vista respectively.
A software called ‘Komku-SP-usb.exe’ (for the Windows XP part) which can be downloaded from ‘http://download179.mediafire.com/b3tjl6ds2gfg/zlvkwwzmjmt/Komku-SP-usb.exe’.
This step-by-step workshop will be in two phases—Windows Vista and Windows XP.

Installing Windows XP from a USB flash drive

Step 1: Download the software ‘Komku-SP-usb.exe’ from the websites mentioned earlier and execute it. The executable file will extract the necessary utilities to a folder called ‘C:komku’.


Step 2: Once the package has been extracted, go to the folder ‘C:komkuPeToUSB’ using Windows Explorer. Execute the file ‘PeToUSB.exe’.  Plug in the USB flash drive and make sure you choose the following (see image below) before clicking the start button. Select ‘USB removable’, ‘Enable Disk Format’, ‘Quick format’, ‘Enable LBA (Fat 16x)’ and finally give the drive a name under ‘Drive Label’. Once it’s done, click start to let the utility format the drive.


Step 3: Next you will need to start the command prompt. Click ‘Start | Run’, type ‘cmd’ and press [Enter]. Then go to the ‘bootsect’ directory by typing the command ‘cd C:komkubootsect’ and pressing [Enter]. Now type the command ‘bootsect /nt52 F:’ and press [Enter]. (The ‘F:’ is the USB flash drive letter represented in ‘My Computer’. Check to verify the drive letter used by your USB flash drive). Let the utility do the needful. Do not exit the Command Prompt yet.


Step 4: Now you will need to change to the directory ‘Usb_Prep8’ by using the command ‘cd C:komkuusb_prep8’ and pressing [Enter]. Here execute the command ‘usb_prep8’ and press [Enter]. Press any key to continue and you will see a welcome screen with a menu appear in the Command Prompt.


Step 5: Now at this stage, you will have to insert the Windows XP installation disk into your optical drive. At the Command Prompt menu, type ‘1’ and press [Enter]. A new popup will appear asking you to choose the location (path) of the Windows installation disk. Select the optical drive and click ‘OK’. Next choose ‘2’ from the menu and change the drive letter to any drive letter which has not been taken. It is drive ‘T:’ by default and you can ignore this step unless you do have a ‘T:’ drive on your computer.

After this, choose ‘3’ from the menu and enter the drive letter of your USB flash drive (in this case it would be ‘F’). Finally choose ‘4’ from the menu and press [Enter]. Wait for a few seconds for the process to complete and you will see a prompt to allow the utility to format the USB flash drive. Type ‘Y’ and then press [Enter] at this stage to let the utility proceed and install the necessary files from the Windows XP installation disk to the USB flash drive. This process will take a few minutes and depends on the speed of the flash drive.


Step 6: After the files are copied, you will see a popup window asking you for permission to copy files from the temp drive to the USB flash drive. Select ‘Yes’.

Step 7: Next there will be another popup window asking you to allow the utility to change the boot drive letter of the USB flash drive from ‘F:’ to ‘U:’. Select ‘Yes’.


Step 8: Finally, after all the processes are complete, you will see yet another popup window asking if you want to unmount the virtual drive. Select ‘Yes’. Exit the Command Prompt now and you will see that your flash drive is ready to install Windows XP to another computer.

To install Windows XP to the computer, you will have to go to the BIOS and enable the option of booting from a USB removable device. This option is usually found under the boot sequence menu of the BIOS. Plug in the USB drive to the computer before you turn it on. Now your computer will boot from the USB flash drive and will be ready to install Windows XP. Follow the necessary steps to install Windows XP and your computer will be up, raring and ready to go and running Windows in no time.




 


Installing Windows Vista from a USB flash drive


Making a bootable Windows Vista installation USB drive is far simpler than doing so for Windows XP because the utility is built into the operating system and can be deployed from the Command Prompt itself. All you would need is a computer running the Windows Vista operating system, the original Windows Vista installation DVD and at least a 4 GB USB flash drive. Follow the simple steps ahead to make your own Windows Vista bootable USB drive.


Step 1: Start Windows Vista, insert the pen drive into the computer’s USB port. Start Command Prompt, type ‘diskpart’ and press [Enter].


Step 2: Type ‘list disk’ and press [Enter]. Carefully note down the USB flash drive’s disk number listed here. In this case it would be ‘Disk 1’


Step 3: Type ‘Select disk 1’ and press [Enter]. Here the Diskpart utility is instructed to choose the disk 1 as the drive to be worked on.


Step 4: Type ‘Clean’ and press [Enter]. This command clears out all the information of the volumes, partitions, boot sectors and the MBR from the USB flash drive.


Step 5: Type ‘Create partition primary’ and press [Enter]. This command will create a primary partition on the USB flash drive.


Step 6: Type ‘Select partition 1’ and press [Enter]. This command instructs the Diskpart utility to select the newly created partition.


Step 7: Type ‘Active’ and press [Enter]. This command will make the current partition (primary) active to enable the USB flash drive to boot from.


Step 8: Type ‘Format fs=fat32’ and press [Enter]. This command formats the selected drive partition using the FAT32 file system.


Step 9: Type ‘Assign’ and press [Enter]. This command assigns a drive letter to the newly formatted partition. As there is no drive letter specified in the command line, the next available drive letter is assigned to the drive.


Step 10: Exit from the Diskpart utility using the ‘exit’ command and pressing [Enter]. Now insert the Windows Vista DVD in the optical drive and type the command ‘xcopy e:*.* /s /e /f F:’ and press [Enter]. This command will dump all the contents of the Windows Vista DVD onto the USB flash drive. Your USB drive is now ready to install Windows Vista on any computer. Just set the boot sequence in the BIOS of the system to boot from the USB, insert
the USB flash drive into the computers USB port and turn on the computer. Follow the regular installation for Windows Vista.

Note: To know more about the Diskpart utility commands, browse through the URL ‘http://support.microsoft.com/kb/300415’.

Installing Windows XP or Windows Vista from a USB flash drive is much faster as compared to installing from a CD/DVD. A high-speed flash drive would make a difference.


 

 

Buy One, Get One Free

Buy One, Get One Free

There are many solutions to enable multiple simultaneous users to access one single computer. Here's how you can create a similar setup using a simple application.

 

Most computers are efficient enough to multi-task two or more applications. But we don’t actually use these resources completely. Networking computers together to utilize the multi-user environment created the server and client solutions, and domains were put into action. But what does a domain actually do? They are just regular servers with multiple user accounts and the client are complete PCs which the user uses to log into the server. Here, on the user's end there needs to be a full fledged computer, and it is still not cost-effective. Novel Netware is a good example to reduce the cost of hardware involved in a multi-user environment. But the only cost that could be saved is that of the hard drive. you would still need a complete computer without a hard disk. The system boots using the Ethernet card's boot ROM.

Thin clients can be deployed in places where the cost up to 50 percent or more can be saved on hardware. The Thinclient involves a simple and basic hardware on the client end, which boots and makes use of the complete processing power and resources from the server's hardware. It is a small piece of electronics that connects the monitor, keyboard and mouse using the local area network via the Ethernet card. The Ncomputing solution is an example which utilizes the resources of the server (host computer) and runs multiple simultaneous users. These users connect to one single computer by connecting proprietary hardware to the computer called 'MuStations'.

In this workshop, we make use of simple software which does pretty much the same thing. All you would additionally need (for each terminal) is a USB keyboard, a USB mouse, a monitor and a PCI/PCIe graphics card. If you have built a fairly new desktop computer, check if your motherboard supports hybrid graphics. If it does, you would need to install an additional graphics card to have BeTwin running. If your motherboard does not support hybrid graphics, then you would need two graphics cards for this workshop. The onboard graphics card won't work because the moment you install a PCIe card, the onboard graphics gets disabled.

You can also use PCI VGA cards which have been outdated. Each graphics card would create an additional terminal. Depending on the number of PCI slots available on your motherboard, you can create that many terminals for your system. The best use for this setup is in small offices, homes and cybercafe.

Note: A single graphics card with two D-Sub/DVI headers will not work for this setup. You would require two physical cards. Those of you who already have two display cards and want to try out the software can do so with a single user account for a trial period of 30 days. Additional users will need a license at $100 (approx Rs 5,000) each.

A live edition of this very same utility is available for trial and it is based on a Ubuntu platform but can only be used for testing. You can download the ISO image of this version from ‘http://www.download25.com/userful-live-cd-download.html’.

 



Data recovery for free!

Data recovery for free!

Recovering lost data is possible if your system can still detect your hard drive or memory card!

Many people accidentally delete important data and usually, most of them do not know how to
retrieve it. There are free utilities available online that can help you rescue your data to a certain extent. We will explain to you how you can recover accidentally deleted or lost data in just four simple steps using a free utility ‘Raid2Raid’ that can be downloaded from ‘http://raid2raid.com’.

Raid2Raid is a powerful utility that not only recovers deleted files, but also reads data from RAID volumes when hard drives in RAID are relocated from one computer to another. Here are four simple steps to recover files from hard drives, flash drives or memory cards. To recover the data from a medium, it needs to be connected and detected by the computer and the primary hard drive where the recovered data will be stored should be larger than the capacity of the data to be rescued.

You can also create an image of the hard drive, particular volume or partition for future analysis. This image is a mirror image of the drive and will be saved as a single file on your hard drive. You can later mount the image and recover more files. The physical hard drive can later be formatted and put to use again. 


 

WORK @ Night

WORK @ Night 

Working at home late into the night can keep your family members awake too. We show you a simple hack to illuminate your keyboard at night.

Working, gaming or surfing the Internet can actually keep the rest of your family members awake through the night. Leaving the lights on would be sure to disturb everyone around. But if the lights are switched off, you can't see what you are typing, which causes eye strain and frustration. A small dim light can illuminate the keyboard while keeping the lights of the room switched off.

One way is to buy a USB light, but you would need to have front USB ports which isn't possible if the cabinet isn't placed on your desk. It also has another disadvantage—uselessly blocking a valuable USB port. Another alternative is a small hack to your keyboard and spending as little as Rs 20. All you would need is two bright white LEDs, some stiff wire, a soldering iron, a drill machine and definitely, your keyboard.
Note: we would not advise you to try this workshop on a keyboard with an existing warranty. Do this hack at your own risk.

Let’s show you how you can hack your keyboard to power two white LEDs enough to sufficiently light up your desk and keyboard. The trick here is to draw power from the keyboard’s [Scroll Lock] LED and use the Scroll Lock key to switch the LEDs on and off. The [Scroll Lock] key is used for this trick as it is rarely used in any software applications. The Scroll Lock LED is usually switched off as it is never used.


 

Method

 

Carefully open the keyboard by removing all the screws. Locate the Scroll Lock LED (usually found on the small circuit board on one corner inside the keyboard). De-solder the existing LED and connect four wires (two each to one terminal) Drill holes at the two top corners of the keyboard. These holes should be wide enough for the wires to snugly pass through. Now pass each pair of wires through the two holes and neatly conceal the internal wires inside the keyboard. Solder the other ends of the wire to the LEDs. Check the positive and negative terminals and carefully solder the LEDs to the wires. Finally close the keyboard again. 

Your keyboard is now ready for use at night. Connect it to the computer and power up the system. You will now be able to switch on or off the LEDs by simply tapping the [Scroll Lock] key. The workshop demonstrated here is very crude, and you can make it neater by using LED sockets and other materials to give it a more professional look.


Security Redefined

Security Redefined
Make your drive virtually unhackable by enabling TPM on your machine
We all know how easy it is for snoopers to get their hands on private and confidential data. That’s the main reason we need to constantly refine our security policies to keep confidential data safe. While there are many software applications that will do the job they could be easy to crack; at least for a seasoned hacker. That’s not the only reason to be worried. Imagine losing your laptop or even your portable drive which contains important data.

What we are referring to is hardware based encryption rather than the more common software based methods. To begin with you will need a PC with a motherboard that has an embedded TPM (Trusted Platform Module) chip. So before we even get into the intricacies of setting up the encryption system, let’s go a little further and understand the basic functionality of a TPM based motherboard.

In very simple terms, a TPM chip basically generates random encryption keys where half of the key is stored within the chip and is encrypted/decrypted using an incredibly strong 2048-bit RSA algorithm. This essentially makes it impossible to recover data from the encrypted drive, making it unique to the machine that was used for encryption. In other words, the contents of a protected drive are unreadable when connected to another machine or read by any unauthorized person.

Before we start, make sure that your motherboard or laptop has the Trusted Platform Module chip. Refer to the manual to confirm this. If it does you will need to make sure it is enabled in the BIOS. Before we progress further make doubly sure that you have not already encrypted any files using this method. If the user information is ever cleared, encrypted files will become inaccessible. Please do back up any protected files first! We also suggest backing up important data before proceeding.

Start your machine and press the [Delete] key to get access to the BIOS. For laptops it should either be the [F12] or the [F8] key. Search for the term “Security Chip Configuration” or a similar title and press [Enter]. Now select “Enabled” for the Security Chip and move to “Clear Security Chip”. Once the user information has been cleared save changes to the BIOS by pressing [F10], and restart.

Once you have logged into Windows install the TPM driver (check your motherboard CD/DVD) and restart again. This workshop uses a Gigabyte board that had an Infineon TPM chip. If you have a different chip note that the steps will be a little different, so excercise caution and check all options first.

Activating the TPM chip

Step 1: Bring up the “Infineon Platform Security wizard” by double clicking on the TPM icon. Click “Next” and select “Security Platform Initialization”. On proceeding you will need to feed in a password to initialize the process. Consider this to be your master password as you will need it whenever you want to make global changes.

Step 2: The Features menu allows you to choose three basic options such as “Automatic Backups”, “Password reset” and “BitLocker Drive Encryption”. We suggest you use the “Automatic backup” and “Password reset” features. Click on “Next” and choose your backup location. You can also reschedule your backup if the default time is not convenient. Clicking on Next will take you to the “Password Reset” menu. Make sure “Create a new Token” is selected and choose a file location. Here it is advisable to save the token to a portable drive rather than the hard drive. Enter the password and click on “Next”. The wizard should now be ready to start initializing the TPM chip. Run an automatic backup once the wizard has initialized the chip.

 

User Initialization Wizard

Step 3: Double clicking the TPM icon will now bring up the User Initialization Wizard; choose “Next”. You will be asked to feed in your “Basic User Key”. This allows you to make user specific changes. On proceeding you will again be asked to create a Basic User Password reset key. We again recommend saving it to a pen drive. Confirm the setting and click on Next to initialize the setting for the user.

Step 4: The next couple of steps will allow you to enable and disable features such as “Encrypting File System” and “Personal Secure Drive”. On the Security Platform Features menu uncheck the “Secure e-mail” while keeping EFS and PSD checked before proceeding.

Step 5: To create an encryption certificate click on “Select” and choose “Create”. Select the created certificate and hit “Select”. You should now be able to view the certificate that was chosen. The next step allows you to create your own secure hidden drive.

Step 6: Map your drive to any one of the alphabets in the dropdown menu and give your new hidden drive a name. Leave the “Load my Personal Secure Drive at logon” option unchecked and click on “Next”. Decide on the amount of storage space that you want to assign to the secure drive. Now choose an existing drive where this virtual drive will actually reside. Make sure that the drive that’s chosen has enough free space to allocate. Click on Next and enter your basic user password following which the wizard starts configuring the features selected. Click Finish and you are all set to secure your files and folders.

You can load and unload your protected drive by simply right clicking on the TPM icon and navigating to “Personal Secure Drive | Load/Unload”. You can choose to either copy or send files and folders to your secure drive by simply right clicking and selecting the appropriate option.

 

 

Bitlocker Drive Encryption

For people who don’t own a TPM based motherboard or laptop there is yet another way of securing your valuable data. Windows itself comes with a utility known as BitLocker Drive Encryption. This feature can only be found in the Ultimate and Enterprise versions of Windows Vista, Windows 7 and Windows Server 2008 (Windows 7 comes with Bitlocker To Go for portable drives as well). This feature was designed to make use of a Trusted Platform Module (TPM) chip, but there is a way to work around this if you don't have one.

Follow the instructions carefully and back up your system before proceeding. Keep in mind that the Bitlocker Drive Encryption is designed to encrypt an entire partition or volume. Also the time taken to encrypt the entire drive depends on the overall size.

Step 1: Open the start menu and type “Group Policy” in the search box. Now in the Local Computer Policy window navigate to “Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption | Operating System Drives”. Right click on “Require additional authentication at startup” and click “Edit”.

Step 2: On the opened page select “Enabled” under “Require additional authentication at startup” and under options check “Allow BitLocker without a compatible TPM”. Once checked other options will automatically change; ignore the automated changes. After you have enabled it to start without a compatible TPM chip, click on Apply and exit the Group Policy editor. The above process basically enables BitLocker but without its full range of effectiveness.

Step 3: To enable BitLocker you will need to search for a file named “BitLocker”. Open the Windows Vista or Windows 7 start menu and type “BitLocker” in the search bar. Run the program “BitLocker Drive Encryption”. You should now be able to view all drives currently connected to your system. Select the drive that you want to encrypt and click “Turn on BitLocker”.

Step 4: Now select “Use a password to unlock the device” and type in your password. Further on you will be asked to “Save the recovery key to a file”. Save the file either to the hard disk or a portable pen drive to proceed. The recovery key is now your only option to able to access your device in case you forget the password. Once you are done click “Start Encrypting”.

Note: Do not save your recovery key on the same drive that is being encrypted else you will not be able to unlock the device in case you forget the password!

 

Your drive now cannot be accessed without the right password, even if stolen and connected to a new PC. You can change or remove the password as well as save/print a recovery key again via the BitLocker menu.

HIDE YOUR ENTIRE HARD DRIVE

HIDE YOUR ENTIRE HARD DRIVE

What do you do when loads of data on your computer needs to be cleverly hidden away from inquisitive family members or office colleagues? Software such as folder lockers, encryption utilities and others do a decent job, but is a costly method and leaves traces. We will show you a simple trick with which you can hide your data easily from others. This trick is very simple works against casual snoopers, but will not prevent a skilled spy from finding it! To do it, all you need is a separate partition to store all the data you want to hide.

Step 1: Create an additional partition and format it. Windows Vista and 7 users can use the Shrink Space option from the Disk Management Utility to create a new volume without repartitioning the hard drive. Windows XP or older users can use third party partition manager utilities to create a new partition. If you already have an additional partition or drive, then you can skip this part. Once you have created the partition, format it and transfer all your data to this new drive.

Step 2: Now let’s assume that you have your sensitive data on drive ‘D’ and want to prevent it from showing up in the Windows Explorer. To do this you need to start the Group Policy Editor utility. Click ‘Start | Run’ and type ‘Gpedit.msc’ and press [Enter]. Here scroll down to ‘User Configuration | Administrative Templates | Windows Components | Windows Explorer’ on the left pane. Double-click on the ‘Hide these specified drives in My Computer’ on the right pane. In the following window, select ‘Enabled’ and choose the ‘D’ drive from the drop down list under ‘Options’. Apply the settings and exit.

Step 3: The drive letter ‘D’ is now hidden from Windows Explorer. In order to access this drive in future, all you need is to enter ‘D:’ in the ‘Start | Run...’ dialog box nor in the address bar of Windows Explorer. Your drive will be accessible for your work since only you know it exists.

Note: This is not a fool-proof method and the hidden drive can even be targeted by viruses. Also, remember that this is not an encrypted partition. The lists of recently opened files in each program can also expose the hidden drive's existence. Use a utility such as Ccleaner or Window Washer to wipe out these tracks.

Same Router, Extreme Power

Same Router, Extreme Power

You can use alternative firmware to increase the transmission power of your router and ensure a longer range. CHIP shows you how to use DD-WRT

You’re constantly frustrated while surfing over a wireless network because your wi-fi range is simply too low. Signals are weak, and connections either constantly break off or can’t be established in the first place. You’ve tried tweaking all possible settings and changing the router’s position, but it just won’t satisfy your needs. What do you do? Get a new router with longer antennae, or add multiple access points, which would burn holes into your wallet?

You can choose to replace the router’s firmware (its operating system and configuration options) with a third-party, unsupported version. One open source option is called dd-wrt. It’s free and you can use it to increase transmission power and thus, the range of certain wi-fi routers over and above their default available values. Dd-wrt can help increase your router’s capabilities and revive an old failing router by infiusing it with additional uses.

Apart from the option of boosting the transmission power, the extendable dd-wrt linux firmware system offers a host of cool functions, such as running servers and clients for various functions, control via ssh commands, file transfer protocols (ftp) and smb hosting, and also the option of switching on your home pc using its wake-on-lan feature (wol) from the internet and then accessing files on it from wherever you are. Moreover, you have a server and client for openvpn on board, which you can use to configure a virtual, encrypted link between multiple computers on the internet.

In this workshop, the router we'll be using is a linksys wrt54gl with hardware revision 1.1. The wrt54gl is an 802.11 b/g router and cannot match up to the high range of modern routers, which use the new n standard. The radio network barely manages a 30-meter range when used indoors. Its default signal strength amounts to roughly -74 dbm. At times, the wi-fi signal is still detectable at 40 meters with -80 dbm, but surfing becomes impossible. Although the embedded (original) firmware from linksys offers numerous setting options, the transmission power cannot be increased.

Important note: if you download an inappropriate firmware version or make a mistake during the installation, the router may quickly and irreparably be damaged. It is very important that you look precisely for your router’s model number on the ‘www.dd-wrt.com’ website in the ‘router database’ section, inclusive of the correct hardware revision. There are precise installation instructions for every supported model on the ‘www.dd-wrt.com/wiki’ website, which you'll need to follow without errors. Even if the firmware upgrade works, the increase in transmission power will increase operating temperatures, which can affect the life of the router. Added tweaking of the router might be required to help cool it. Also note that the firmware replacement procedure is irreversible and will certainly void any warranty. Do this at your own risk.

Step 1: the firmware
Go to the website ‘www.dd-wrt.com’, click on the ‘router database’ and look for ‘wrt54gl’ (in your case, look for the model number of your router). Download the file ‘dd-wrt.v24_mini_generic.bin’ and save it on the desktop.

Step 2: disconnecting
Before installing the new firmware, detach all lan cables from the router, except for the lan cable of the pc that has the firmware file that you have just downloaded. Also disconnect any devices connected via wi-fi.

Step 3: hard reset
You will now need to hard-reset the router using the physical reset button located on its rear panel. You might require a pin as the reset switch is usually hidden inside the chassis and only a tiny hole is provided to reach it. Check your instruction manual if you cannot locate the reset button. You will need to keep the reset button pressed for at least 90 seconds for the complete hard-reset. Now carefully read these instructions before actually starting the procedure: pull out the power connector after the first 30 seconds, wait for another 30 seconds and re-connect the power again. After another 30 seconds, release the reset button. If you have made any mistakes during this procedure, repeat the whole step.

 

Step 4: flashing
Now that you have completely reset the router, it is time to start configuring the router. To do this, you will need to open your web browser and enter the address ‘http://192.168.1.1’ and press [enter].
Note: certain routers have a different default ip address. Make sure you have your user manual at your disposal.
Once inside, go to the firmware section and select ‘upgrade’. Browse and select the downloaded firmware file from your desktop (in our case it is the ‘dd-wrt.v24_mini_generic.bin’ file). Click on the upgrade button. Once the process completes, restart the router.

Step 5: configuring
You are almost there. Before you start the dd-wrt configuration, you will need to repeat the hard-reset procedure described in step 4. Once completely done, enter the configuration page of the router using the above ip address in the web browser. Firstly, assign a username and a strong secure password for the router before you proceed into any other configuration steps. Then safeguard your network with a wpa2 key under ‘wireless’ so nobody can intrude into your router at this time as your network is presently in an open state and can be easily hacked.

Step 6: tweaking
Now you can connect all the lan cables again. Configure your router as per your requirements. You can increase the specified value in the ‘tx power’ field under ‘wireless | advanced settings’ from around 71 mw to a higher value in small steps. Up to 100 mw is allowed by default, even though you can boost it to more than 200 mw with further tweaking. But be careful; increasing this value will force your router’s components to run at higher power levels, thus producing more heat, which could damage them permanently. Hence, increase these values gradually and stop when they are just about enough to serve your needs. If you increase the power more than you need, you also run the risk of boosting the wi-fi range enough for others in the vicinity to hook on to it. Trust us; you don’t want that to happen.
Now that you have successfully upgraded your router with the dd-wrt firmware, you have opened up a treasure chest of settings and features that were previously hidden. Browse through the features and enable any that you might want.
 

Rev the clocks!

Rev the clocks!

There are different approaches to overclocking your CPU and graphics card. Do it the way enthusiasts do it or simply hit the magic button!

Overclocking is one thing people keep away from because it’s perceived as complicated and risky. Yes, it can get complicated if you do it via the BIOS or registry. Hence, motherboard and graphics card manufacturers now provide easy means for overclocking, such as an OC button on the motherboard and bundled OC utilities. These tools are extremely user-friendly and allow you to overclock your hardware from Windows without requiring you to know the fundamentals of overclocking. One of the biggest advantages of these tools is that they aren’t risky to use because the values suggested by them are optimal.

Since the current-generation hardware are made using a small manufacturing process (45 nm and 32 nm) they run cool and have a good amount of headroom for overclocking. For example, the new Core i3 and Core i5 CPUs can run 1 GHz faster than the stock speed.

A word of caution before you try overclocking your hardware—make sure your cabinet has good cooling, because overclocking causes hardware to heat up more than usual.
Go to the overclocking/frequency settings section in the BIOS and look out for BCLK (base clock frequency). Increasing this value will step up the speed of the CPU and memory. Make sure that the memory runs at its rated speed by adjusting the memory ratio. To find out the effective speed of the CPU, multiply the BCLK value with the CPU multiplier. The latest CPUs can easily run 800 MHz to 1 GHz faster than their stock speed.

 


Bundled CPU overclocking utility
Certain motherboard manufacturers such as Gigabyte and MSI bundle overclocking software with which you can overclock your CPU and graphics card from Windows. In the Easy mode, you simply have to choose one of the listed presets, restart your PC, and you’re done. Here, the software increases the base clock (FSB) and accordingly adjusts the RAM speed in the BIOS. In Advanced mode, you have the freedom to set the FSB, memory speed and voltages manually. Such tools will appeal to both beginners and advanced users.


Automatic overclocking
Some motherboards have the automatic overclocking feature in the BIOS in addition to the manual mode to simplify things for beginners. All you have to do is select the target CPU speed from the listed preset values, save the BIOS settings, and restart your PC. For example, when you install an AMD Phenom II X4 945, the preset list will show Phenom II X4 955 and 965, which means you can run the Phenom II X4 945 at the speed of X4 955 or X4 965. The preset ensures the memory runs at optimal speed so as to maintain system stability. This technique allows overclocking the CPU by 200 MHz to 800 MHz.


Onboard overclocking switch
This technique is a no-brainer. It’s as simple as opening your cabinet, pressing the OC button on the motherboard and switching on the PC. The OC processor on the motherboard takes around half a minute to calculate the optimal CPU speed, memory speed and voltages, and applies them in the BIOS. Voila! You have overclocked your processor.

Bundled GPU overclocking utility
Overclocking graphics cards involves increasing the core speed, shader speed and memory speed. Graphics card manufacturers such as EVGA, Asus and MSI bundle an overclocking utility with certain models that allow users to overclock their card. The utility might or might not be specific to the card, meaning that it might work with other cards as well, for example, the EVGA Precision Tool.

Overclocking ATI Radeon graphics cards
The ATI Catalyst Control Center has a section called ATI overdrive from where you can overclock any ATI Radeon graphics card. You have to click on the unlock button to be able to adjust the GPU clock, memory clock and fan speed. We suggest increasing the GPU and memory speeds in small increments (25 MHz) until you reach the maximum stable limit.


CPUs with unlocked multiplier
AMD Black Edition and Intel Extreme Edition CPUs are special because they have an unlocked multiplier. With this feature, you can increase the multiplier beyond the rated value to overclock the CPU unlike in the case of regular CPUs. For example, the AMD Athlon 64 X4 955 BE which is clocked at 3.20 GHz (200x16) can be easily overclocked to 3.80 GHz by bumping the multiplier to x19. The advantage is that the memory speed doesn’t get affected by increasing the multiplier. These processors are an enthusiast's favorite toy.

PICTURE PERFECT

PICTURE PERFECT

Follow a few simple rules of photography to create stunning pictures.

 

As clichéd as it may sound, the truth is that a picture speaks a thousand words, and a well-shot picture always stands out. When you enter a living room, it’s common to see family portraits and vacation memories on the walls or show cases. Now, it can be embarrassing to have washed out or grainy pictures in those photo frames. In this workshop, we discuss the various aspects of shooting the perfect picture in different scenarios and enhancing them after they’ve been shot. Right from the initial steps of shooting, using proper cameras and equipment, to the post processing and printing of images, we’ll give you brief step-by-step guides on the various crucial aspects.

Photography
When shooting outdoors, the most important aspect to look at is lighting. With the right amount of lighting, you can achieve just about the same output as you would using in-house or studio lighting. However, there are certain factors to consider when shooting outdoors.

Camera settings and techniques

 

First and foremost, avoid shooting at noon or when the sun is directly overhead. Apart from the lighting conditions, you will also need to look into your camera settings. If you have a normal point-and-shoot, you should consider having settings like aperture, shutter speed and the manual mode. However, not all cameras come with a manual mode. In such cases, just the aperture and shutter speed controls will suffice. We have taken both indoor and outdoor shoots into consideration for the following tutorial as there are no fixed settings that apply to all situations.

Step 1: Rule of Thirds

A very common mistake that most of us make when shooting portraits is to place the subject right at the center. While it might seem like the most natural way of capturing portraits, it definitely has the makings of a very dull and unimaginative picture. The basis of this rule states that if you were to divide a rectangular frame with two equidistant vertical and horizontal lines into nine equal parts, then the point where the lines meet is where the subject should be placed. This rule is applied to prevent positioning the subject at the center. To make things simpler, you can enable the ‘grid’ view option that most cameras come with.

Step 2: Aperture and Shutter Speed

Both aperture and shutter speed are inversely proportional to one another, which means that if you increase the aperture range, the shutter speed will automatically decrease, and vice versa. However, this only happens when you choose to shoot either in aperture priority mode or shutter speed mode. The shutter priority mode is best used when you're shooting either in low light or when the subject that is being shot requires a really high shutter speed, like when you're capturing fast moving objects. If you want greater control over the depth of field, then the aperture priority mode should help achieve this. Decrease the number of f-stops to get a better depth of field. This is best used when you only need your product or subject to be your point of focus.

Step 3: ISO

The selection of ISO settings plays an important role in photography and how your images turn out. The lower the camera's ISO levels, the finer will be the overall image quality. However, the ISO levels all depend on the lighting conditions. Better the lighting conditions, smaller will be the ISO levels. However, we recommend not going beyond ISO 400 when using digital cameras, because anything over this value will produce visible noise. The same cannot be said when shooting with an SLR, because SLRs come with a larger sensor size along with better post-processing capabilities. The best way to overcome the noise issues with digital cameras would be to set it to manual mode (if your camera supports this) or switch to either shutter/aperture priority while not going above ISO 400. It is recommended that you make use of a tripod, especially when you are shooting under low light conditions.

Step 4: Flash Intensity

Depending on what you are shooting, you will need to selectively adjust the flash intensity, otherwise you might just end up burning your overall image. We do not recommend using the on-camera flash, as you will only end up spoiling the overall image. Try making use of the Bounce Flash method discussed later on in this workshop. For point-and-shoot cameras though, the Bounce Flash method won’t quite work since the flash comes fit with the device. So apart from reducing the flash manually, you can have a white sheet of paper placed in front of the flash to further reduce the flash intensity.


Camera gear

Lenses to look out for when shooting indoor and outdoor: As far as point-and-shoot cameras go, you obviously don’t have the choice of choosing the lens, as these cameras come fit with a decent amount of zoom out of the box. There are a few that offer upto 30x optical zoom, which is more than enough to capture objects that are at quite a distance. Adding to this are the preset scene modes that make the normal digital point-and-shoot a jack of all trades. So you get is a zoom lens, a macro lens and a normal lens all fit into one single unit.

However, the stock lens that you normally get with a DSLR gives a maximum of just 3x zoom, which isn’t much, especially if outdoor photography is what you are mostly into. Here, however, you have lenses to take care of each aspect of photography. There are three types of lenses that generally fit a DSLR - zoom lenses, prime lenses and macro lenses.

Zoom Lenses: A typical zoom lens (24 – 90 mm) will give an approximate zoom range of 3.5x. However, if you want the best of both worlds, try going in for a 28 – 200 mm zoom lens. That way, you wouldn’t need to carry an additional lens when travelling.

Prime Lenses: Prime lenses, on the other hand, don’t offer any kind of zoom. In other words, these lenses have a fixed focal length. But what they lack in zoom, they more than make up by delivering superior image quality. In addition, these lesnses are lighter and cheaper than traditional zoom lenses. They also have a larger aperture range that is capable of capturing images in low light conditions while maintaining the same shutter speed of a zoom lens. Prime lenses are best used when you require the picture to have a certain depth of field.

Macro Lenses: Macro lenses are best used when you want to capture extreme close up shots of subjects. They are best used to highlight specific parts of a subject while blurring out the rest. However, they require sufficient lighting to make the overall picture stand out.

Tripods: Tripods are an essential part of any photographer’s equipment. So making use of a tripod when shooting will undoubtedly produce much better results. There are a few things that you need to look at before taking the plunge. First and foremost, you will need to check the overall weight of the tripod. This will depend on your requirements. If you are the kind to make use of several lenses and camera flashes, it would be advisable to settle for a tripod that’s slightly heavy. But if you are always on the move and all you have is the camera, you should consider buying a tripod that’s light and compact enough to carry. Secondly, check the tripod for stability as there are a few that tend to wobble when fit with a camera. The best way to do this would be to mount the camera with the legs of the tripod spread out. If it feels wobbly or uncomfortable, you should consider looking at something else.

NNext, consider the extensibility of the tripod. Choose something that reaches your height when fully extended. However, this also depends on what you are trying to shoot. Tripod heads should also be taken into account i.e.: their ease of use, overall movement of the camera when attached to the tripod, and if they are easy to detach when the need arises. So make sure you take all these into account before purchasing a tripod.

If you are not too keen on purchasing a tripod, you can instead invest in a monopod. Monopods are much lighter to carry and since they only have a single leg, they wouldn’t take you more than a few seconds to set up. They are also considerably cheaper than their three-legged counterparts. However, keep in mind that a monopod will not eliminate camera shake as well as a tripod, but will only reduce it to a certain extent. Their usage all depends on what you're looking  to shoot. For example, a monopod would be best used when you need to shoot in cramped places, where setting up a tripod would be cumbersome or impossible. However, for outdoor shoots or when taking a slow shutter shot, a tripod would be a much better choice and would provide more stability.

Bounce Flash: The problem with using a flash is that it tends to make the overall image look too flat or burnt. For instance, if you are shooting a product that is dark and reflective, it won’t come out right if you have the flash directed at it. You’ll get an extremely over exposed picture that wouldn’t effectively grab the viewer’s attention. There are many ways to get around this problem, such as investing in a flash diffuser or by making use of the bounce flash method. Adding a diffuser helps soften the overall light, thereby making your pictures look more natural. However, bounce flash is a totally different technique of diffusing light. For starters, you can try the ceiling-bounce by tilting your flash towards the ceiling at an angle of 75 – 80 degrees. Here, the ceiling acts as a diffuser and reflector as it bounces the diffused light onto the subject. However, you will need a pretty low ceiling to make this work effectively. If it’s a person that you are shooting, you might notice shadows underneath the eyes as the light is being reflected from a higher surface. In such cases, the reverse ceiling bounce method is the way to go. Here, you have to tilt the flash 45 degrees backwards, allowing the light to hit the wall, then the ceiling, and finally on your subject. Here again, you will need to make sure that the rear wall isn’t too far away from the flash, otherwise the final image will turn out rather dull and dark, making the flash pointless.

For outdoor photography, you can make use of reflectors. There are various types of reflectors that one can make use of, such as lamp reflectors, board reflectors and portable folding reflectors. Unlike bounce flash, portable reflectors are flexible to use as you can have them positioned just about anywhere to help give you that perfect shot.

Polarizers: If you are into outdoor photography, you should consider investing in a polarizer. Such filters are mostly used when the requirement is to eliminate reflections. Moreover, they also help in saturating and darkening the overall image. When shooting with a polarizer, the direction of the sunlight should be perpendicular to the position of your lens.

Props: Adding props to your products can enhance the overall outcome of the photograph. For example, if you have a gaming laptop that you would like to sell/resell. Just photographing the product won’t quite define the product at hand. A better and more viable approach to this would be to have some kind of a gaming poster in the background along with the product. However props will vary from product to product. It is best to keep it simple and minimal. Moreover, make sure that the prop isn’t as big as the product, because then the whole focus would be on the prop rather than the product.

Here are two questions you should ask yourself when shooting with props –
1. Does it enhance the product that is being shot or does it simply overwhelm the subject?
2. Does it help define exactly what you want to convey to the potential buyer?

‘Save as’ for print and web
When giving photos for printing to a professional studio, there are certain specifications with regard to the DPI and resolution of an image that you must keep in mind. This is also the case when you want to upload images on websites. There are various sizes (in inches) of prints that studios offer, such as 16 x 20, 8 x 12, and, the most common, 4 x 6. Ideally, 200 dpi to 250 dpi images suffice for these sizes. But when you want to blow up an image, use higher dpi and resolution. The larger an image, the more pixels are required to maintain the image quality, or else the image would lose detail and cause pixilation. So a higher-quality image helps scalability. While 4-color (offset) printing machines, which are used for printing magazines, booklets, etc, need images in the CMYK format, photo printers use RGB. Therefore, to print photos, save the files in medium or high quality JPEG. For web, a 72 dpi value with a 1024 x 768 resolution JPEG should suffice.


Benefits of RAW over compressed

If your camera supports RAW, use it. Why? Because the unprocessed file contains pixel information that can be used to make fine adjustments to the image using an image editor such as Photoshop without sacrificing details. Consider it as the negative equivalent to a film camera.

Here are the benefits of RAW:

Better image quality.
Freedom to manually sharpen and remove noise
RAW formats make use of lossless compression or remain uncompressed. So the file contains maximum detail when compared to compressed formats such as JPEG.
RAW files allow you to make finer adjustments to a wide range of parameters such as white balance, hue, saturation, sharpness, etc.
Fewer artefacts when increasing the overall exposure of an underexposed photo.

RAW also has a few drawbacks:

RAW files are two to six times larger than a normal JPEG. So fewer images can be stored on the memory card.
Since the files are large, the write speed is much slower than clicking in JPEG.

Post Processing
 
As the terms suggest, post processing is the cleaning and enhancing of images to make them ready to use for high quality print or web publishing. In this workshop, we’ll be using Adobe Photoshop to show you step-by-step guides to various techniques to quickly and seamlessly enhance portraits, landscapes and indoor product shots.

Cut-out

When you shoot a product, even with a white background, the backdrop isn’t always appealing, which is why cut-outs are used. The idea with cut-outs is to get only a product without its jarred background so that you can place the product onto a fresh white backdrop or another background of your choice. Here’s how to do it:

Step 1: Open the image in Adobe Photoshop, zoom in to it (100%), and select the pen tool from the tool bar on the left. Create a digital trace along the edges of the product, we’ve used a laptop for illustration.

Step 2: Look for the edge of the product that runs in a straight line, and click on it to create your first node. Instead of creating multiple nodes, go to the end of this straight line and click to create the second node. Ensure that the line joining these two nodes matches the edge of the laptop.

Step 3: If the line doesn’t match, click in the middle of the line to add a new node. Hold down the [Ctrl] key and drag this new node to adjust the line. The same technique is used for curves.

TIPS: Use the [Ctrl] key whenever you would like to re-position or adjust a node. To delete a node, click on it and hit [Delete].

Step 4: When you come across a curve or a protrusion, click on the last node in the row, and click on the other end of the curve to create a new node. You notice a line running across the curve, where part of the product is falling out of the trail. Here, use step 3 to bend the line and match it with the curve.

Step 5: Now click on the last node to continue the trail along the edges. When you are nearing completion, at the starting point (the first node), you’ll notice a tiny circle next to the pen. Click on the starting point to close the loop. You’ve just created a cut-out path for the laptop.

Step 6: Now, go to the side panel, select the tab ‘path’, double-click on the work path, rename it, and save the file.

Step 7: Press [Ctrl] + [Shift] and click on the renamed path to activate the cut-out selection. Now press [Ctrl] + J to duplicate this selection to a new layer with a transparent background. Press [Ctrl] + [Shift] + N to turn this into a new layer and click OK.
TIP: Since the cut-out path gets saved along with the file, you can re-open the file and start from step 7, if an error occurs.

Step 8: In the side panel, switch to the ‘Layers’ tab, and press [Shift] + F5 (you’ll be prompted) to fill this layer with ‘White’. The canvas will turn completely white. From the menu bar, go to Layer | Arrange | Send to back. You now have the laptop with a clean white background. Go to file | Save as, and save the file as a PSD (default).

TIP: At this stage if you want this laptop on another background, import the background (File | Open | background file). Revert to the saved laptop document, right-click on the cut-out layer, and select ‘duplicate layer’. Here, in the ‘destination’ drop down menu, select the document that contains your background image, and click ‘OK’.


Retouching

 
Retouching and enhancing images is perhaps the most common practice in photography. Be it for product or glamour photography, all images are cleaned before they get published. Using the stamping tool is a very quick way when there is very little correction to be done. But what really makes a huge difference is the layer masking technique (especially for human faces). Let’s look at each of them step-wise.

Step 1: The clone stamping tool is useful for removing tiny marks, such as a finger print or stain, but it is tedious task when making major corrections. To use it, select the tool, push the [Alt] key and click on a clean area close to the mark. Then release the [Alt] key and paste the cloned portion onto the mark.

Step 2: When cleaning images with uniform colors, the spot healing brush tool is even more effective. It quickly and automatically cleans tiny spots. All you have to do is use it as an eraser.
TIP: If you’re looking to smoothen the skin texture, layer masking along with gaussian blur can prove to be magical.

Step 3: To use layer masking, first let’s duplicate the original image and turn it into a new layer. Press [Crtl] + J or go to Layer | Duplicate layer.

STEP 4: Go to Filter | Blur, and select gaussian blur. Keep the pixel count at 5.

STEP 5: Select the blurred layer, go to Layer | Layer Mask, and select ‘Hide all’. In the side panel, next to the blurred layer, you’ll notice a black (masked) layer. This layer acts like a coin under paper (original image), so when you shade it with a pencil, you get the impression of it.

STEP 6: To reveal parts of the blurred layer, which is underneath the original image, select white from the color palette and the paint brush from the tool bar, and start painting the marks on the original image. You’ll see the blurred layer partly surfacing, which makes the marks magically disappear, hence giving the face a smooth texture.

STEP 7: Do this carefully so that the details and sharpness are not lost, especially close to the nose and eyes. You can even control the opacity to give a more realistic look to the picture.
TIP: In case the blurring goes out of proportion, you can reverse the painting by switching to black (to retrieve parts of the original image).

STEP 8: To give a more vibrant look to a face or to tone it down a bit, press [Ctrl] + [Shift] + I and adjust the tones accordingly. You can also change the brightness and contrast level by using Curves. Simply press [Ctrl] + M to get the option on screen.

STEP 9: To flatten the image before saving it, go to Layer and select Flatten image. Now, to Image | Mode | CMYK and click Ok when prompted for conversion.

STEP 10: Finally, save the file as TIF if it is for print, or JPEG for the web.

Artificial DOF

Layer masking along with gaussian blur can be helpful in achieving artificial depth of field. The only addition would be that you’ll have to change the pixel count of the gaussian blur for different areas of the picture. The area in full focus remains sharpest (unchanged). As you move away from the focus point, you increase the pixel count for gaussian blur. For instance, in the closest area you can keep it at 2 pixels, and the most distant object can be blurred with about 5 or more pixels. It entirely depends on the perspective and how the image is shot.

 

Printing booklets

We checked with a couple of photo studios in Mumbai for printing prices. The starting price for a 10-page (20 sides) photo-booklet of 6 x 6 (inches) dimensions is approximately Rs 500 (the better the quality, the higher the price). Studios even take up printing jobs for pamphlets, brochures, etc, which can cost less because the pages could be fewer and they are usually printed in bulk. Also, in this case, you can ask for discounts of up to 10 percent.