Monday, May 31, 2010

Remove "autorun.inf" virus from ur PC and Pen drive

How to remove autorun.inf virus from USB Drive?

Worms spreads by creating a copy of itself and starts by autorun.inf files. It is essential to remove the malicious and autorun.inf files not only from computers but also from the source, and that is the USB Drive. PreciseSecurity have created a procedure to delete the malicious files on infected drives.

PROCEDURE to follow to get rid of this virus:

1. While the computer is still off
2. Plugin the USB Drive
3. Insert the Windows XP CD-ROM into the CD-ROM drive. It must be the bootable Windows XP Installer
4. Start the computer from the CD-ROM drive. It will start Windows Setup screen
5. When the “Welcome to Setup” prompt appears.Press “R” to start the Recovery Console
6. If asked “Which Window installation would you like to logon to” select the number. Type “1? then Enter, if only one installation of Windows is present
7. Enter the administrator password, press Enter
8. It will bring you to command prompt, C:\Windows>
9. Proceed with the following command:
- Type d: (This is the drive letter of USB. It can be e: or f: defending on how many hard disk or cd drive is installed)
- Type attrib -h -r -s autorun.inf
- Type “edit autorun.inf” it will open DOS Editor and display contents as follows

10. Exit DOS Editor and return to command prompt, D:\>
11. Delete the file that was called to open on DOS Editor
- Type del /f /a file.exe
12. Delete autorun.inf file
- Type del /f /a autorun.inf
13. Exit Recovery Console by typing exit.

Sunday, May 30, 2010

How to prevent Gmail from Hacker or Phisher?

Nowadays, its very common to hear about various incidents of Gmail hacking by Gmail phisher. Today, online privacy is maintained only if the user is aware of various hacks used to hack email accounts. So there is some information on the same topic of preventing Gmail from being hacked by hackers. I highly recommend you to read this information to prevent ur future damages.

What is a phishing?

Phishing is the best working method of hacking email account. The advantage of phishing in email account hacking is that victim is not able to recognise the fake page (phisher) as this phisher matches with the original page(depends on hacker skills).

So, There are few tips which you should follow to prevent hacking of your email account by hackers:

Fishing filter:
It is recommended a use of browser which has phishing filter. Internet browsers like Firefox 3.0, Internet Explorer 7, Opera 7x which contain phishing filter should be used for safe browsing.

Do not provide sensitive information:
Yes, this is the main thing you have to remember. Unless and until, you know the person or institute, do not give your sensitive information like userids , passwords, bank account numbers as a reply to any email. In fact, 90% emails demanding such information are meant for hacking..remember !

Suspicious Filters:
Check whether there are any suspicious filters that is not created by you. For checking your email filters, go to Settings->Filters. If you find any such suspicious filter that is not created by you, delete it urgently.

Great offers, ads, winners:
Generally, Gmail users are received by emails which contain great offers, ads or declaring that you are lucky winner and you should provide listed query information to receive your cash prize. Never click or provide any information for such claiming emails.

Forwarding and POP/IMAP:
To disable forwarding and POP/IMAP, go to Settings-> Forwarding and POP/IMAP and disable forwarding and POP/IMAP.

The most important:
The most important precaution which one must follow is "do not click on the link" provided in the email without knowing to which page the link will take you.One more thing, always open link given in email by typing address of site in new tab/window.

Thus, if you will follow these guidelines, Your Gmail account will never be hacked by a phisher. Just remember the guidelines and prevent your Gmail account from being hacked by hackers.

Saturday, May 29, 2010

How to improve your next Power Point Presentation?

Are you looking for some ideas of how to improve your next PowerPoint presentation? Here are some PowerPoint ideas that could make your next presentation fly.

1. Add in pictures:
Nothing improves a presentation like the addition of pictures. According to research of information that we receive during a presentation 55% is visual.

To add in a picture select Insert > Picture > From File

2. Animate your presentation:
PowerPoint presentations have a tendency to be rather flat. A great way way of improving you PowerPoint is to add in animation or to use builds.

To get your slides animated you need to use the custom animation feature in PowerPoint. For a quick guide on how to animate read our PowerPoint animation guide.

There are a large number of animation types available in PowerPoint, but the ones that seem to work best are Appear, Wipe and Box Out.

By far the most professional animation feature is the Fade Fade feature. The only problem is that this only available in PowerPoint 2002 (often referred to as PowerPoint XP). If you send a file with Fade animation to a PowerPoint 97 user then these effects do not build properly. As much as I love the Fade feature - in practice I cannot use it.

A lot of speakers do not like using animation as when they are speaking they can get out of synch with the animation. This is easily solved by selecting build automatically feature rather than the build on mouse click feature.

3. Include screen shots:
Screen shots are really easy to include in a presentation.

To include a screen shot simply press the Print Screen button. This button, sometimes labeled "Prt Scrn", appears towards the top right hand side of the keyboard. If you are using a Microsoft keyboard you may have to select function lock first.

This will then copy the screen into the clipboard. You can then paste the screen shot into you presentation by using Edit > Paste or pressing the Control-V (press the Ctrl key and letter V at the same time).

I hope that this provides you with a few ideas..

Thanks and Good Luck

How to protect your GMail account from Hackers?

The solution is very simple. After logging in to GMail go to Settings (General tab). At the bottom of the page you will notice Browser Connection. Change it to Always use https. Now save the settings.

How To enable this feature

1. Sign in to Gmail.
2. Click Settings at the top of any Gmail page.
3. Set ‘Browser Connection’ to ‘Always use https.’
4. Click Save Changes.
5. Reload Gmail.

You are done! That’s all you need to protect your GMail account from getting hacked.

Thursday, May 27, 2010

How do you put background music in Power Point Presentation?

As we all know PowerPoint presentation is the most common way to present information. Usually a Power point Presentation is to be used in a professional way. No one will appreciate if you don't present it in that manner. So why don't you try something new which captures the viewers attention. what about to add some music into it. what say? Strange but yes you can put music into your presentation.

Follow the steps to make your presentation more attractive by putting music on it:

  • Choose music file(s) you would like to use. If they are not MP3 file you may use an online music file converter. The speed of this depends on your computer storage and such.
  • Open your previously made Microsoft Office Powerpoint presentation. Go to the slide where you want to start playing the music from and select Insert> Movies and Sounds> Sound from a file.
  • Search for the music file you would like to use for your powerpoint presentation. You will then see a Pop Up of playing options. Choose the playing option that best suits your Microsoft Office Powerpoint presentation.
  • Make a right click on the music icon and select 'Custom Animation'. Right click the name of your song and select 'Effect Options'. There you may choose what best suits you for the starting and stopping of your song.
  • Proceed to tab called 'Sound Settings'. There you select the box that says "Hide Icon During Show". Your Microsoft Office Powerpoint presentation is now ready for showing.

How to remove Internet Security 2010

Internet Security 2010 is a rogue anti-spyware program that is installed through the use of malware. Once installed, Internet Security will be configured to start automatically when you login to Windows. It will then scan your computer and display numerous infections, but will not remove anything until you purchase the program. These infections, though, are all fake and are only being shown to trick you into thinking you are infected so that you then purchase the program. It goes without saying that you should definitely not purchase this program.

Automatic removal guide

Step 1. In the process of eliminating Internet Security 2010 from your machine you will need to shut down the browser.

Step 2. You will have to install Malwarebytes’ Anti-Malware. In this regard you need to download the software’s setup executable.

Step 3. Double click the Malwarebytes’ Anti-Malware setup executable. It should be on the desktop under the name mbam-setup. This will launch the installation process. If you already know how to install a piece of software, proceed to step 4. If you do not know how to do this, we’ll walk you through it all:

Step 4. The Malwarebytes’ Anti-Malware application will launch automatically. The Perform quick scan option should be checked by default – if it isn’t then check it and then click Scan. You are well advised to close all running apps before clicking scan. This will ensure the scan for Internet Security 2010 will complete swiftly.

Malwarebytes’ Anti-Malware will start scanning your files for signs of Internet Security 2010. This may take a while, so be patient. It all depends on how powerful your computer is and how many files Malwarebytes’ Anti-Malware has to scan.

When the scan for Internet Security 2010 is complete you will be presented with a notification box. Click OK to close the notification box and go to the main Scanner screen. Click Show Results and you will be presented with a list of all the infected files Malwarebytes’ Anti-Malware has detected.

Step 5. Click Remove Selected and Malwarebytes’ Anti-Malware will remove all the infected files it has detected. It may be necessary to restart your computer in order to remove some of these files. After Malwarebytes’ Anti-Malware is done removing all the infected files, it will open Notepad and present the scan log to you.

Step 6. Close Malwarebytes’ Anti-Malware and you’re done. No traces of Internet Security 2010 should be left on your computer.

Manual removal guide:

Stop and remove the processes:

Access the Windows Registry Editor and delete the following registry keys:
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run "Internet Security 2010"
HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Run "winupdate86.exe"

Locate and delete the following files:
c:/Program Files/InternetSecurity2010
c:/Program Files/InternetSecurity2010/IS2010.exe
%UserProfile%/Application Data/Microsoft/Internet Explorer/Quick Launch/Internet Security 2010.lnk
%UserProfile%/Desktop/Internet Security 2010.lnk
%UserProfile%/Start Menu/Internet Security 2010.lnk

Disable the following DLL libraries:

Delete the following folders:
c:/Program Files/InternetSecurity2010

Wednesday, May 26, 2010

Symantec unveils SMB protection suite

The Symantec Protection Suite Advanced Business Edition aims to offer SMB customers more choice in how they protect their business information. And in order to help those on a budget, the firm will lower the price of the suite by 40%.

We’ve contacted Symantec for a specific price and release date regarding the New Zealand market.

As well as offering endpoint and messaging security, desktop, laptop and server backup and recovery, Symantec says it will also provide hosted options for email and web security. A 2009 Symantec survey found that SMBs 50% of SMBs do not have endpoint protection and 47% were not backing up their data.

The suite will protect endpoints like laptops and desktops, provide messaging security and prevent data loss with advanced content filtering at the mail gateway.

In case of an outbreak or a system failure, the suite's backup and recovery capabilities will help SMBs recover individual files and folders.


How to get rid of Security Tool Virus?

Security Tool Virus is a rogue anti-spyware program that’s distributed through websites that simulate virus scans.

How to manually remove Security Tool Virus

1. Stop Security Tool Processes: [random numbers].exe
2. Remove Security Tool Files
3. C:\Documents and Settings\All Users\Application Data\[random numbers]\
4. C:\Documents and Settings\All Users\Application Data\[random numbers]\[random numbers].exe
5. Remove Security Tool Registry Keys

*HKEY_CURRENT_USER\Software\Security Tool
*HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Tool

6. Remove Security Tool Startup Entry: [random numbers].exe

You can also download MalwareBytes Anti-Malware to remove Security Tool Virus.

Monday, May 24, 2010

Facebook to simplify privacy settings

Facebook is all set to simplify its privacy settings in the wake of criticism from users and regulators that the current controls are too complex.

e social networking site is likely to introduce a 'master control' to simplify privacy choices for users, so that the users could share content among three broad categories, such as everyone, friends of friends or just friends.

Facebook executives briefed Simon Davies, of Privacy International, the UK-based pressure group, over its proposed changes last week, following widespread criticism that its privacy settings are not tight enough.

This led to a string of meetings at senior level within the company, culminating in a privacy 'summit' at Facebook's Palo Alto headquarters, according to the Financial Times.

And now, Facebook hopes that the master control would offer a simple alternative to the complicated and frequently confusing settings users currently work with.

In briefings, the company suggested that it aimed to make it easier for its users to opt out of the instant personalisation feature, which automatically shares users' information with third-party websites.

"There is a fundamental revision going on about the company's approach to privacy," the Telegraph quoted Davies as saying.

Last December Facebook made changes to its privacy settings.

But, many users complained these were too confusing.


Launch of Studio XPS 7100 by Dell

Dell has launched its latest desktop offering Studio XPS 7100 which is powered by AMD six core processor. The desktop is touted as the cheapest six core processor based desktop available in the market and is packed with a range of powerful features too. A powerful PC, it has unmatched graphics and multimedia features.

For people who have been looking for a powerful PC to easily perform their multi thread tasks simultaneously, the PC is a perfect option to go with. This powerful PC has powerful multimedia features making the social networking experience for user a treat.

Some of the primary features of the device are AMD Phenon II X6 processor which is powered with AMD Turbo Core Technology and ATi Radeon HD graphics card. With the PC, buyers get 3D browser experience using AMD Fusion Media Explorer. Other prime specialties of this latest desktop include Dual channel DDR3 and 3TB hard disk.

All these features make the PC a perfect gaming PC which is enamored with some superb multimedia capabilities. In India, the Studio XPS 7100 will be priced at Rs. 49,990 which surely does not look costly at all in view of the powerful features, this Dell PC come with.


New security threat for wireless networks in Internet cafe

Your internet cafe might be housing a potential security threat-called the Typhoid adware, it works in similar fashion to Typhoid Mary, the first identified healthy carrier of typhoid fever who spread the disease to dozens of people in the New York area in the early 1900s.

Adware is software that sneaks onto computers often when users download things, for example fancy tool bars or free screen savers, and it typically pops up lots and lots of ads.

Typhoid adware needs a wireless Internet cafe or other area where users share a non-encrypted wireless connection.

The study demonstrated how Typhoid adware works as well as presents solutions on how to defend against such attacks.

Typically, adware authors install their software on as many machines as possible.

But Typhoid adware comes from another person's computer and convinces other laptops to communicate with it and not the legitimate access point.

Then the Typhoid adware automatically inserts advertisements in videos and web pages on the other computers.

Meanwhile, the carrier sees no advertisements and doesn't know that he or she is infected, just like symptomless Typhoid Mary.

U of C researchers have come up with a number of defenses against Typhoid adware.

One is protecting the content of videos to ensure that what users see comes from the original source. Another is a way to "tell" laptops they are at an Internet cafe to make them more suspicious of contact from other computers.

The study was presented at the EICAR conference in Paris, a conference devoted to IT security.


Saturday, May 22, 2010

How to Run System Restore in Safe Mode?

Restart your computer in Safe Mode. When you start, you will notice that the System Restore Option will not be available in the Applications folder as it would usually do when doing system restores in normal mode. In lieu of this method, go to the Help and Support Center which can be found in the start menu.

The Help and Support Center Window will open. Click on the Performance and Maintenance link and then click on System Restore to undo Changes. Lastly, Click on Run the System Restore Wizard.

The System Restore Wizard will open and the steps to completing the restoration will be the same as the performing the restoration in normal mode. Once the restoration is complete, your computer will automatically restart itself into normal mode.

Remember that your computer is limited to basic functions when in Safe Mode, and this does NOT include the automatic creation of restore points. This means that restorations in Safe Mode cannot be reversed like the usual. You can, however, do another restoration in normal mode to a date that is later than the date you restored to in safe mode, if the restoration in Safe Mode happened to be an earlier date.

Also, take note that you may have to re-install certain applications that were installed later than the date the computer was restored, since you can reverse the restoration as you will also recover the malfunctions you were trying to fix in the first place.

How to remove Desktop Security 2010?

This rogue software blocks installation and execution of other software to protect itself. Preferably use another computer to download the following free tools to a removable drive:

• HijackThis Executable
• MalwareBytes’s Anti-Malware (mbam-setup.exe Direct download)
• Start HijackThis by clicking on HijackThis.exe.
• Click on Do a system scan only. In the results of the HijackThis scan, carefully select only the following entries by placing a checkmark in the box provided:

1. R1 -- HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=;
2. O4 -- HKLM\..\Run: [Desktop Security 2010] C:\Program Files\Desktop Security 2010\Desktop Security 2010.exe
3. O4 -- HKLM\..\Run: [SecurityCenter] C:\WINDOWS\system32\p9tdwlvru6ww.exe
4. O4 -- HKLM\..\Run: [p9tdwlvru6ww] C:\WINDOWS\system32\p9tdwlvru6ww.exe

The file name in the last two entries above are made up of random 12 digit alpha-numeric characters.

• Click Fix Checked. Choose Yes to confirm your selection. Close HijackThis. This would have killed the Desktop Security 2010 executable and the “fake task manager”.
• Right-click on the Taskbar and open Task Manager, select Securitycenter.exe and click End Process. Confirm Yes in the Task Manager Warning. Now you are likely to have a “scare message free” desktop.
• Install MalwareBytes’s Anti-Malware (mbam-setup.exe Direct download), Open and choose a full-scan. Once the scan is completed, click “Show results“, confirm that all instances of the rogue security software are check-marked and then click “Remove Selected” to delete them. If prompted restart immediately to complete the removal process.
• Turn System Restore off and on

How to Set Up Web Browser History in Firefox?

In Firefox you can set how much web browser history you wish to save.

1. Click Tools in the top menu bar of Firefox.
2. Select Options from the list that appears.

The Options dialog box appears.

3. Make sure the Privacy section is selected from the list on the left.
4. On the right of the Options dialog box you will History with a plus sign in front of it. Click the plus sign.

A box appears with “Remember visited pages for the last” visible.

5. In the box type the number of days of web browser history you wish to save.
6. Click Ok to save your changes and exit the Options dialog box.

Once you have set the Firefox web browser history the next time you use the History feature it will only list the past number of days of web browser history that you selected.

How to Remove Antispyware Soft Manually?

Before we get started, you should backup your system and your registry, so it’ll be easy to restore your computer if anything goes wrong.

To remove Antispyware Soft manually, you need to delete Antispyware Soft files. Stop Antispyware Soft processes:


Remove Antispyware Soft registry values:

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “RunInvalidSignatures” =”1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “ProxyOverride” = “”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “ProxyServer” = “http=″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = “.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “”

Delete Antispyware Soft files:

%UserProfile%\Local Settings\Application Data\[random]
%UserProfile%\Local Settings\Application Data\[random]\[random]tssd.exe
Need help figuring out how to delete Antispyware Soft files? While there’s some risk involved, and you should only manually remove Antispyware Soft files if you’re comfortable editing your system, you’ll find it’s fairly easy to delete Antispyware Soft files in Windows.

How to delete Antispyware Soft files in Windows XP and Vista:

1. Click your Windows Start menu, and then click “Search.”
2. A speech bubble will pop up asking you, “What do you want to search for?” Click “All files and folders.”
3. Type a Antispyware Soft file in the search box, and select “Local Hard Drives.”
4. Click “Search.” Once the file is found, delete it.

How to stop Antispyware Soft processes:

1. Click the Start menu, select Run.
2. Type taskmgr.exe into the the Run command box, and click “OK.” You can also launch the Task Manager by pressing keys CTRL + Shift + ESC.
3. Click Processes tab, and find Antispyware Soft processes.
4. Once you’ve found the Antispyware Soft processes, right-click them and select “End Process” to kill Antispyware Soft.

How to remove Antispyware Soft registry keys:

Because your registry is such a key piece of your Windows system, you should always backup your registry before you edit it. Editing your registry can be intimidating if you’re not a computer expert, and when you change or a delete a critical registry key or value, there’s a chance you may need to reinstall your entire system. Make sure your backup your registry before editing it.

1. Select your Windows menu “Start,” and click “Run.” An “Open” field will appear. Type “regedit” and click “OK” to open up your Registry Editor.
2. Registry Editor will open as a window with two panes. The left side Registry Editor’s window lets you select various registry keys, and the right side displays the registry values of the registry key you select.
3. To find a registry key, such as any Antispyware Soft registry keys, select “Edit,” then select “Find,” and in the search bar type any of Antispyware Soft’s registry keys.
4. As soon as Antispyware Soft registry key appears, you can delete the Antispyware Soft registry key by right-clicking it and selecting “Modify,” then clicking “Delete.”

How to delete Antispyware Soft DLL files:

1. First locate Antispyware Soft DLL files you want to delete. Open your Windows Start menu, then click “Run.” Type “cmd” in Run, and click “OK.”
2. To change your current directory, type “cd” in the command box, press your “Space” key, and enter the full directory where the Antispyware Soft DLL file is located. If you’re not sure if the Antispyware Soft DLL file is located in a particular directory, enter “dir” in the command box to display a directory’s contents. To go one directory back, enter “cd ..” in the command box and press “Enter.”
3. When you’ve located the Antispyware Soft DLL file you want to remove, type “regsvr32 /u SampleDLLName.dll” and press your “Enter” key.

That’s it. If you want to restore any Antispyware Soft DLL file you removed, type “regsvr32 DLLJustDeleted.dll” into your command box, and press your “Enter” key.

How to save your Outlook Express Email?

Saving your Outlook Express email to a backup is very important, as this backup copy is the only way to recover your mail after a crash caused by problems such as viruses, hdd crashes, accidental deletion or other disasters.

If your Outlook Express deletes the email on the server after downloading ( by default it does ) all your emails are stored only on your computer inside .dbx files. If a virus or other malware cause your computer to crash, you can easily reinstall Windows and other software from their original CDs, but how would you recover your precious mail?

The only way to avoid losing your mail is to save backup copies of it. You could manually go and copy these files to an archived file every once in a while, but this is burdensome and inefficient. That's why you need a software tool that saves your Outlook Express email automatic at regular times to a backup file.

The best software tool for this is Outlook Express Backup Genie. Not only that is saves your emails automated at the specified time period, but it also can transfer it to an other PC, and it supports the top 8 popular email clients, such as Outlook Express, Ms Outlook, Eudora, Incredimail and more.

Friday, May 14, 2010

How to clean up hard drive?

Find how much RAM you have. The amount of virtual memory you set up is going to be proportional to how much RAM you have. To find this number, right click "My computer" and then "Properties." Under the "General" tab you'll see toward the bottom how much RAM you have. An example of what you might see here is, "504 MB of RAM."

Go to your virtual memory settings now that you know how much RAM you have. Click the advanced tab. You'll see a box for "performance." Click "settings," then the "Advanced" tab. In the box near the bottom it says "virtual memory." Click "change."

Set how much virtual memory you want. The way to figure this out is to set both the minimum and maximum as 1 and 1/2 the amount of RAM you have. So if you have 504 MB of RAM, choose 761MB for the minimum and 761MB for the maximum. Why put both the same? Well, your computer will start flip flopping between using your virtual memory and RAM as you open and close programs, and this can cause it to lag more. If you find that you don't like how this works out after you try it, you can always backtrack using the steps above to set it to the defaults. So don't worry, this isn't permanent.

Try this out. If you still don't have enough virtual memory, or if you found that your virtual memory is already set at 761 (or a different number that you calculated based on your RAM) you have 2 options to deal with a virtual memory error message. Either run fewer programs at the same time, or upgrade your RAM. This is a hardware installation, and it requires taking your computer in for service, either with the computer manufacturer, or to a retail store that has a service center. Just check your warranty to make sure this sort of upgrade does not void your warranty. Good luck!

Thursday, May 13, 2010

How to fix a computer that keeps restarting without warning?

There are many factors of your computer restarting. If it was a virus, your computer would tell you that there is no operating system found. Or, you get the Blue Screen of death.

When you turn on your computer, make sure that the fan in running in the very beginning. If it is a virus that attacked your computer, your fan will continue running without anything on the screen. Your fan is located in the back of the computer. That is where the power supply is at.

If your fan is still running, you must reinstall your windows operating system.

If your fan is not running, then this is good news for now. You must turn off all the power from your computer. I recommend you unplug the power cord behind the PC. You are going to have to open your PC.

The other reason your computer might be turning off is because the computer is overheating. The CPU is not getting a lot of air flow, when you turn on the computer, and when it goes into the operating system, the PC temperature goes up high, that's why computers need fans. But what is causing the PC to overheat? Well, it’s DUST!!!

It’s time for a PC clean up. Get your paper towel and q-tips. Have your magnetic strip handy, or if you don't have a magnetic strip, touch the power supply to ground yourself from any electromagnetic shock.

Get your q-tips and clean the Dust off your CPU fan. The air is not going through to the CPU, that's why the computer shuts itself down, so that the computer would not catch on fire. Clean every hole on the computer case, make sure it’s clear for air to enter.

Clean all dust off of the computer case. Once you are done, close the computer and plug everything back in. Start your PC is it should load up.

If none of this worked, you must open the computer case again and make sure all the Divers are plug in securely. Many times a technician installs a new drive or RAM into your system and it wasn't properly installed. Your computer will not start. Make sure the RAMs are nicely secured in the PCI slot. Make sure the 2 white side handles are inserted correctly on the ram. Close your case and start your computer. That should work.

If that did not work, it may be your RAM or Motherboard. You must go buy a new motherboard or Ram. I suggest you take it to a technician to install the motherboard, but if you know how to install a new one, good for you. Remember to back up your data. It’s very important.

Saturday, May 8, 2010

How to remove Firewall?

Click on the "Start" button located on the taskbar at the bottom left of the computer screen. Click on "Control Panel" to open up a list of categories.

Click on "Performance and maintenance." Under "Or pick a control panel icon," go to "Administrative tools."

Click on "Administrative tools." Go down to the bottom of the list and double-click on the "Services shortcut" icon.

Scroll all the way to the bottom of the "Services" windows. Point your mouse pointer on the "Windows Firewall/internet connection sharing."

Click the drop-down menu from the "Startup type" box. Choose "Disabled," then click on "Stop." Click "Apply" to apply the settings, then click on the "OK" button.

How to uninstall or remove Internet Explorer 8?

Click the "Start" button on the toolbar at the bottom of your desktop if you have Windows XP on your computer.

Choose "Control Panel" from the listed options.

Select "Add or Remove Programs."

Scroll down the list of programs in the "Add or Remove Programs" until you find "Windows Internet Explorer 8 Beta 1."

Click on the program. A "Remove" box will appear at the right of the listed program. Click on this box and the Removal Wizard will appear on your screen. Click "Next" to begin the removal of Internet Explorer 8 from your computer.

Go to the Control Panel in the same manner if you are using Windows Vista. Select the Uninstall Programs link.

Choose "View installed updates" on the Tasks pane found on the left.

Scroll to "Windows Internet Explorer 8" in the list of updates and select it.

Click the "Uninstall" button and then choose "Yes" in the box that appears to remove Internet Explorer 8 from your computer.

What's the difference between spyware, malware, adware, & trojan horses (& other viruses)?

*Virus is a program to cause damage to computer.

*Trojan is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. [Trojans are also known as Backdoors].

*Worm is a program which infects the computers which are connected by some network. Worms slow down the network.

* Spywares are the program which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal perpose. Example: Keylogger applications.

* Adwares are the programs which delivers ads to your computer (generally in POP-UP's form). They consume your network.

*Malwares are the program with malicious intention. It can be damaging your computer, spying on you or any other malicious task.

How to block Websites in Mozilla Firefox

Open Firefox, click "Tools" then "Add-ons." Click "Get Add-ons" and then "Browse All Add-ons." Type "blocksite" in the search bar after the Mozilla Firefox add-ons website opens and hit "Enter."

Click the "Add to Firefox" button next to the entry for BlockSite. Allow the add-on to load (usually less than 5 seconds), then click the "Install Now" button. Restart Firefox when prompted.

Go to "Tools," then "Add-ons," then click the BlockSite "Preferences" button after Firefox restarts. Make sure the "Blacklist" radio button is ticked, as well as "Enable BlockSite," "Enable warning messages," and "Enable link removal."

Check "Enable authentication," then enter a password if you would like to keep other users from deleting blocked websites or changing the settings in BlockSite without your permission.

Click the "Add" button, enter the URL of the website you would like to block, then click "OK." Repeat to add more sites, or click the "Clear" button to delete the list. Once the list of blocked sites is complete, click "OK" and restart Firefox.

How to reset your computer to Factory Settings?

Shut down your computer. You must first shut your computer down to initiate the factory restore.

Start up your computer and as the computer logo appears (such as Dell or HP) hit "Ctrl>F11" simultaneously. This may be different for different machines, but the most common keys to hit are "Ctrl>F11." If this does not work, the F8 key has been said to work for certain machines.

Select "Repair My Computer" from the list of menu options that appear and press "Enter."

Choose the language settings that you would like and then click enter.

Enter the administrator log in and password if it asks you for this information.

Choose the factory reset option. This should reset your computer to the factory settings when you bought your machine.