<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6584622094213569800</id><updated>2024-10-06T21:56:51.241-07:00</updated><category term="Hardware Maintenance and Repair"/><category term="Article"/><category term="Printer"/><category term="Fix Bad Sectors"/><category term="Tips"/><category term="diagnose"/><category term="Diagnose Hard Disk"/><category term="Monitor"/><category term="Graphics Cards"/><category term="Laptop"/><category term="Anti Virus"/><category term="BIOS"/><category term="CD"/><category term="Explorer"/><category term="Flash Drive"/><category term="Motherboard"/><category term="Recovery"/><category term="Registry"/><category term="Scanner"/><category term="power supply"/><title type='text'>Doctor Computer</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default?alt=atom&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default?alt=atom&amp;start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>167</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-1459217089111203762</id><published>2012-04-20T20:44:00.000-07:00</published><updated>2012-04-20T20:45:44.680-07:00</updated><title type='text'>http://www.bizontv.com/</title><content type='html'>The free TV Online. Provide most TV stations around the world. Watch your favorite TV channels online like sports, movies, news, music, education, and more</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/1459217089111203762/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2012/04/httpwwwbizontvcom.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1459217089111203762'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1459217089111203762'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2012/04/httpwwwbizontvcom.html' title='http://www.bizontv.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3791882745429543184</id><published>2010-01-23T04:52:00.001-08:00</published><updated>2010-01-23T04:52:42.378-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>Best Spyware Removers</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Finding the best spyware removers to detect and remove spyware and adware from your computer is much easier if you consider a few things before you make your purchase. Here are a few things to keep in mind when looking for a spyware protection program.&lt;br /&gt;&lt;br /&gt;The best spyware removers should offer you complete protection against spyware, adware, keyloggers, Remote Access Trojans (RATs), and browser hijackers. These are the main spyware infections that expose your confidential information and diminish your PC&#39;s performance.&lt;br /&gt;&lt;br /&gt;An important consideration for any spyware protection program is automatic updates for your software. There are new spyware programs invented on a regular basis just like viruses and automatic updates cover you against the latest spyware threats.&lt;br /&gt;&lt;br /&gt;Another important consideration to look for should be technical support from the manufacturer. A spyware protection program doesn&#39;t do you any good if you have a technical issue that you can&#39;t solve. Often, just a minor piece of technical advice will solve most software problems and it&#39;s important that your software run right. You also may need someone to answer questions that come up.&lt;br /&gt;&lt;br /&gt;Customer service is another feature you may consider looking for. It shows the&lt;br /&gt;manufacturer is a trusted source who cares about their reputation and will probably be around awhile.&lt;br /&gt;&lt;br /&gt;Spyware is quickly becoming a major threat to Internet security. It is reported that 9 out of 10 computers are currently infected with spyware, adware or both. Most people don&#39;t even realize it&#39;s there because spyware and adware is programmed to run silently. Microsoft estimates that spyware is responsible for 50% of all PC crashes.&lt;br /&gt;&lt;br /&gt;If you don&#39;t remove spyware from your computer it will eventually not work at all or your computer files will become infected by spyware programs. Your personal information, passwords and credit card numbers could end up stolen from you without you even knowing it.&lt;br /&gt;&lt;br /&gt;Once you remove spyware and adware programs from your computer you&#39;ll find it will run faster and your personal information will be much safer. Your security and peace of mind is worth spending a little time to find the best spyware removers possible.&lt;br /&gt;&lt;br /&gt;Copyright © 2005 Spyware Information.com All Rights Reserved&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3791882745429543184/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/best-spyware-removers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3791882745429543184'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3791882745429543184'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/best-spyware-removers.html' title='Best Spyware Removers'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-6142548734027199278</id><published>2010-01-23T04:49:00.001-08:00</published><updated>2010-01-23T04:49:52.591-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>Avoiding Spam, Scams and Computer Viruses</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt; One of the most popular pages on about-the-web.com is about&lt;br /&gt;avoiding scams, hoaxes and urban legends on the Internet&lt;br /&gt;(http://about-the-web.com/shtml/scams.shtml). Here are a&lt;br /&gt;few ways to avoid some of the perils associated with being&lt;br /&gt;connected to the rest of the world.&lt;br /&gt;&lt;br /&gt;As a general rule of thumb, beware of any offer that sounds&lt;br /&gt;too good to be true. This applies to products being offered&lt;br /&gt;on the Internet and especially to any unsolicited offer or&lt;br /&gt;spam you receive in your email. Many of these are scams.&lt;br /&gt;&lt;br /&gt;The term &quot;spam&quot;, in case you don&#39;t know, refers to any&lt;br /&gt;unsolicited bulk email. If it&#39;s not addressed to you, or&lt;br /&gt;you don&#39;t recognize the sender, or you&#39;re being asked to&lt;br /&gt;buy something or pass along questionable information, then&lt;br /&gt;that&#39;s spam. My advise is to &quot;can the spam&quot; by immediately&lt;br /&gt;deleting any email you receive from anyone you don&#39;t know.&lt;br /&gt;&lt;br /&gt;The best way to avoid spam, is to be very careful about who&lt;br /&gt;you give your email address to. My advise here is to set up&lt;br /&gt;a free email account and to give this email address to&lt;br /&gt;anyone you don&#39;t absolutely trust with your personal&lt;br /&gt;information. It almost never does any good to fight back&lt;br /&gt;against spam. Your best course of action is just to delete&lt;br /&gt;any unwanted email.&lt;br /&gt;&lt;br /&gt;A trick that has been pretty successful for me is to set up&lt;br /&gt;an email rule (or filter) that automatically sends any mail&lt;br /&gt;not addressed to me to a special folder. Most of this is&lt;br /&gt;spam and can be easily disposed of.&lt;br /&gt;&lt;br /&gt;In addition to spams and scams, the other thing to watch&lt;br /&gt;out for on the Internet is hoaxes, urban legends and false&lt;br /&gt;information. There are many of these floating around the&lt;br /&gt;Internet these days. Beware of any email that asks you to&lt;br /&gt;send money for any cause, or to forward the email to all&lt;br /&gt;your friends. Almost all of these are hoaxes. An excellent&lt;br /&gt;resource for information on hoaxes, urban legends and false&lt;br /&gt;information is http://urbanlegends.about.com/index.htm&lt;br /&gt;&lt;br /&gt;Another category of hoaxes involves virus warnings. If you&lt;br /&gt;receive information that indicates you can get a computer&lt;br /&gt;virus from doing anything except opening an email&lt;br /&gt;attachment or running an application, then this is probably&lt;br /&gt;false information.&lt;br /&gt;&lt;br /&gt;Most computer viruses are spread by users opening email&lt;br /&gt;attachments that contain the virus. NEVER OPEN AN EMAIL&lt;br /&gt;ATTACHMENT THAT YOU ARE NOT EXPECTING. Even if you know&lt;br /&gt;the sender, make sure the attachment is legitimate before&lt;br /&gt;opening it. It is much safer to delete any questionable&lt;br /&gt;attachments and ask the sender to resend them than to&lt;br /&gt;assume that the sender intended to send that email.&lt;br /&gt;&lt;br /&gt;Your best defenses against computer viruses are: 1) caution&lt;br /&gt;in downloading programs from questionable sources,&lt;br /&gt;2) regularly scanning your drive with virus protection&lt;br /&gt;software, and 3) backing up all your important data to a&lt;br /&gt;different drive or media (floppy, Zip or CD-ROM) as soon as&lt;br /&gt;possible. By doing all of these, if your system does get&lt;br /&gt;infected, you can restore it with a minimum of hassle.&lt;br /&gt;&lt;br /&gt;Always check out any offer or information you receive&lt;br /&gt;before sending any money or forwarding the information&lt;br /&gt;to someone else. That way you can rest easy knowing you&lt;br /&gt;aren&#39;t getting scammed or passing along an urban legend.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/6142548734027199278/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/avoiding-spam-scams-and-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6142548734027199278'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6142548734027199278'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/avoiding-spam-scams-and-computer.html' title='Avoiding Spam, Scams and Computer Viruses'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3023134622747856172</id><published>2010-01-23T04:47:00.000-08:00</published><updated>2010-01-23T04:48:27.991-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>3 Simple Steps to Stay Safe from Spyware</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt; There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&amp;amp;D. Using these two programs in conjunction will eliminate a vast majority of spyware problems from your computer. For the purposes of this article, &quot;spyware&quot; refers also to adware, malware, and other not-so-nice &quot;features&quot; of today&#39;s computing reality.&lt;br /&gt;&lt;br /&gt;These are some tell-tale warning signs that your computer may be suffering from spyware-&lt;br /&gt;&lt;br /&gt;* You receive many pop-ups&lt;br /&gt;&lt;br /&gt;* Your computer is running slowly&lt;br /&gt;&lt;br /&gt;* You may have invasive toolbars hijacking your browser&lt;br /&gt;&lt;br /&gt;* Your home page may have been hijacked&lt;br /&gt;&lt;br /&gt;Your first step to escaping spyware&#39;s wrath is to download and run Ad-Aware and Spybot - S&amp;amp;D, the two leading spyware fighting tools out there, boasting millions of downloads each. Please remember it&#39;s always safest to backup your system before installing a new program or executing one. After downloading the two programs, be sure to run the update feature to be sure they are current when it comes to detecting the latest threats. Remove the detected spyware using these two programs, then move to step two.&lt;br /&gt;&lt;br /&gt;The second step in staying spyware free involves you to be proactive. At this point your computer should be free from spyware. What you want to do now is keep it this way, to do that there are helpful tips to guide you. In Windows 98 you can use msconfig to view the startup programs on your computer. This is helpful because you can control what programs automatically load when you boot your computer. To access this invaluable tool, go to START &gt;&gt; RUN, type MSCONFIG. If you check the startup programs occasionally you may see a new spyware entry that will alert you it&#39;s time to clean out the spyware again.&lt;br /&gt;&lt;br /&gt;The third step involves your web browsing habits. It means you must never click on an activex screen that asks you if you want to allow an innocuous looking toolbar, or &quot;surfing aid&quot;be installed. By clicking &quot;allow&quot; you are effectively giving these perfidious spyware authors free reign over your system and personal information. If possible you should surf with the security settings on &quot;maximum&quot; for safest surfing.&lt;br /&gt;&lt;br /&gt;In summary, it&#39;s important to avoid spyware for your computer and personal identity health. To do so, use free tools available to you and be mindful of your computer settings and surf the Internet responsibly. Following these easy steps will ensure a safe and spyware free existence for you and your computer! Erich Bihlman is a technology pro specializing in PC/Internet Tutoring and website design services in Prescott, Arizona. Erich has owned and operated www.Bihlman.com since 1997.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3023134622747856172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/3-simple-steps-to-stay-safe-from.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3023134622747856172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3023134622747856172'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/3-simple-steps-to-stay-safe-from.html' title='3 Simple Steps to Stay Safe from Spyware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3982346492390497948</id><published>2010-01-23T04:46:00.001-08:00</published><updated>2010-01-23T04:46:39.206-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>Computer Security - It&#39;s Bigger Than Spyware And Viruses</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Computer security, in basic terms means keeping your computer and the data that&#39;s in it safe and secure. More of our personal data is stored in or accessed from our computer, now more than ever before. Yet most people lack even the basic understanding of how to keep their computers safe and secure. By following just a few simple rules you can dramatically improve the overall security of your computer.&lt;br /&gt;&lt;br /&gt;The first thing to understand is what exactly it means to be connected to the internet. Your computer connected to the internet is similar to your house in many ways. There are many ways into your house. Windows, doors, etc. The more windows and doors you have, the more ways someone has into your house. An open door doesn&#39;t necessarily mean you are going to be robbed, but it does improve the chances. Complicating matters, the ones that you think are locked, may not be because the lock is faulty or even the door itself may have an as of yet undiscovered flaw that would allow an intruder easy access to your home.&lt;br /&gt;&lt;br /&gt;Your computer has many windows and doors, not all of which are locked. New flaws are being found everyday, often with the fix not coming until days after. Just like you wouldn&#39;t leave your front door unlocked, you shouldn&#39;t leave your computer wide open either. The first two things we will discuss to help with this task are installation of a quality firewall and regularly updating your installed software.&lt;br /&gt;&lt;br /&gt;Updating your software is becoming easier these days, especially your Operating System. We don&#39;t have the time here to go into detail about the many ways to update the many software packages you may have or use, but generally speaking the software manufacturer will provide you a way to do this automatically via the internet. A good example of this is the Microsoft Windows Update feature. Be sure to get the updates for everything installed on your computer, nothing is too trivial.&lt;br /&gt;&lt;br /&gt;There are two basic types of firewalls and both perform the same functions. One is hardware the other is software. A hardware firewall is probably included in your router if you are using one, while you may or may not have a software firewall installed. To continue our house analogy, a firewall is like building a wall and gate around your home and giving the guard at the gate instructions on who to let in and out. While this does give a great deal of protection, it is not all that is required. Someone may know a way around or under your wall, or even be able to coerce the guard into letting them in.&lt;br /&gt;&lt;br /&gt;You yourself may unwittingly allow someone in. This could happen by simply opening an email or even simply surfing the net. Spyware, viruses, trojans and the like are ever more adept in their methods of fooling you and your guards. Emails may come from a trusted friend containing a dangerous virus without them even knowing it. This is where the next layer of protection comes in, anti-virus software.&lt;br /&gt;&lt;br /&gt;Anti-virus software is a large category these days. Often these packages come as &quot;suites&quot; including a firewall and Spyware scanner. While most of these programs are very effective in their promised tasks, it is not wise to be lulled into a false sense of security by them. They are simply one layer in what should be a multi tiered protection plan for you and your computer. One last important note about anti virus software is to be sure that it updates on a regular basis. New threats come out daily so check its updates manually to be sure they have happened.&lt;br /&gt;&lt;br /&gt;Back to our house analogy, we now have all of our windows, doors and other entry ways locked and fully updated. We have a wall around our house with a guard at the gate and we have software scanning everything that comes in past the gate. Sounds pretty good, but there&#39;s one last security hole we need to address, you.&lt;br /&gt;&lt;br /&gt;A large percentage of infections are caused by the computer user themselves. The internet is an ever changing place that requires it&#39;s users to be educated about its use. I&#39;m not suggesting that you need to be a computer expert to simply read your email. I am however suggesting that you take some time to educate yourself on some of the dangers that pop up everyday, and the precautions to take in order to avoid them.&lt;br /&gt;&lt;br /&gt;In summary, your computer is a powerful machine connected to one of the greatest things ever invented, the internet. This vast resource can be a dangerous place if you are not properly prepared and informed. Regular software updates, a good firewall, anti virus software and a little education are the basics in computer security. Having and understanding these basics will make your computer safer, more secure and more enjoyable.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3982346492390497948/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/computer-security-its-bigger-than.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3982346492390497948'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3982346492390497948'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/computer-security-its-bigger-than.html' title='Computer Security - It&#39;s Bigger Than Spyware And Viruses'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-926985654970995567</id><published>2010-01-23T04:39:00.001-08:00</published><updated>2010-01-23T04:39:54.854-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>Detecting and Eliminating Computer Viruses at the Gateway</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt;Traditional anti-virus software only stops known computer viruses – stopping undefined computer viruses requires a different approach.&lt;br /&gt;&lt;br /&gt;In the past, network administrators scrambled to apply new virus signatures whenever new computer viruses were discovered. While these signatures will stop a known threat, it takes time for anti-virus vendors to develop them. Unfortunately, the newest and most damaging viruses are able to spread so quickly that the damage is done before a signature can be developed and distributed.&lt;br /&gt;&lt;br /&gt;In fact, the independent testing laboratory AV-test.org found the response times for major anti-virus software publishers to range from just under 7 hours to almost 30 hours , with the four leading vendors (Sophos, McAfee, Symantec and Trend Micro) clocking in at no less than 12 hours.&lt;br /&gt;&lt;br /&gt;In January 2004, the computer virus known as “MyDoom” created mass disruption to corporate resources and reputations as it quickly spread through e-mail networks worldwide. At its peak, MyDoom infected one in every five e-mails transmitted over the Internet. The worm broke records set by previous malware, such as Sobig.F, to become the fastest-spreading virus ever. This incredible propagation speed left many networks vulnerable - despite the presence of anti-virus software - because of the lag time between when the virus outbreak began, and when a virus definition became available.&lt;br /&gt;&lt;br /&gt;As a result of recent malware threats, corporations and organizations have learned a painful but important lesson: simply deploying a signature-based solution is no longer enough. Detecting and eliminating computer viruses requires a multi-faceted, rapid-response approach that traditional anti-virus protection cannot provide. Even a single unprotected computer on an enterprise network can bring down the entire system in just minutes, rendering even the most expensive and up-to-date software useless.&lt;br /&gt;&lt;br /&gt;Why E-Mail is Particularly Susceptible&lt;br /&gt;&lt;br /&gt;In many organizations, e-mail has replaced the telephone as the most useful business tool available. Unfortunately, e-mail has also been a victim of its own success and presents a unique threat to the enterprise network as a whole.&lt;br /&gt;&lt;br /&gt;Detecting and eliminating threats has traditionally been the combined responsibility of firewalls, virus scanners, and intrusion detection systems (IDS) set up by enterprises to defend against attacks. Firewalls prevent unauthorized programs from accessing the network, virus scanners scan each PC in the network for malicious code, and gateway servers lock down extraneous ports to protect against unauthorized access.&lt;br /&gt;&lt;br /&gt;But key Internet-facing applications, including e-mail are unguarded by firewalls. In order to function, e-mail must expose firewall ports, including port 25, the port used by SMTP (Simple Mail Transfer Protocol) and port 110, the port used by POP (Post Office Protocol).&lt;br /&gt;&lt;br /&gt;When a firewall receives a connection on port 25, it generally assumes that the transmission is e-mail and allows it to flow through to the e-mail server. The transmission may very well be a valid e-mail; however, it could also be a virus, spam or something much worse. Firewalls are not able to distinguish between “good” mail and “bad” mail and therefore they are unable ot protect the e-mail application.&lt;br /&gt;&lt;br /&gt;Stop E-Mail Threats at the Gateway&lt;br /&gt;&lt;br /&gt;Therefore, some sort of protection is needed specifically for e-mail and, since the best place to stop a threat is before it gets inside the network, the protection should be at the e-mail gateway. Protecting the e-mail gateway requires a coordinated effort to combat a host of issues, including spam, viruses, corporate policy infringements, directory harvest attacks, denial of service attacks, phishing, spoofing, and snooping. As e-mail threats evolve, the distinction between each of these types of threats becomes blurred.&lt;br /&gt;&lt;br /&gt;Furthermore, accuracy in identifying “bad” e-mails is crucial. Extreme care must be taken to avoid filtering out legitimate e-mails (false positives), which could contain important information from customers or partners.&lt;br /&gt;&lt;br /&gt;Historically, enterprises have turned to multiple vendors to solve their e-mail security issues. They have relied on anti-virus vendors to protect them from viruses. They use a separate anti-spam vendor to help cut back on the spam. Then, there are the issues of content filtering, policy enforcement, encryption, and network security. Unfortunatley, attackers are now highly adept at exploiting these non-integrated solutions. This “Swiss cheese” defense has not only been costly, but increasingly ineffective at protecting corporate email systems.&lt;br /&gt;&lt;br /&gt;Computer Virus Risks&lt;br /&gt;&lt;br /&gt;Recent attacks from various types of computer viruses and worms have had profound effects on computer systems around the world. Enterprises have been brought to their knees and forced to spend billions of dollars cleaning up the mess and rebuilding their infrastructures. While the increased IT costs are clear, there are other risks corporations face with regard to e-mail borne viruses.&lt;br /&gt;&lt;br /&gt;System Downtime&lt;br /&gt;&lt;br /&gt;E-mail has evolved to be the primary communication tool for most organizations and the loss of e-mail due to attack can severely affect enterprise operations. Beyond the immediate expenses involved in restoring the network, an attack on your enterprise e-mail system can also result in lost hours and days for employees who have come to rely on it to accomplish their daily tasks.&lt;br /&gt;&lt;br /&gt;Resource Depletion&lt;br /&gt;&lt;br /&gt;The costs of cleaning up after an attack are significant. IT teams are forced to spend considerable time and money repairing virus damage. The damage, however, is rarely contained to network servers. Once inside the network, viruses can quickly infect large numbers of relatively exposed client machines - all of which must be individually cleaned, patched and repaired.&lt;br /&gt;&lt;br /&gt;Administration&lt;br /&gt;&lt;br /&gt;In the past, when a new vulnerability was discovered, network administrators scrambled to apply security patches from the makers of their anti-virus software and manually reviewed quarantine lists for virus-infected messages. Software manufacturers release patches so frequently that network administrators cannot reasonably be expected to keep up with them all. As stated by Gartner Research, “Enterprises will never be able to patch quickly enough. After all, attackers have nothing else to do.” The staggering damage caused by recent computer viruses and malware attacks is clear evidence that manual intervention to institute emergency measures or review quarantined messages is rarely effective against rapidly propagating threats.&lt;br /&gt;&lt;br /&gt;Compliance and Liability&lt;br /&gt;&lt;br /&gt;Recent Federal regulations such as the Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA) and Sarbanes-Oxley Act (SoX), require enterprises to protect data residing in mail servers and other internal systems. Security breaches violate these regulations, exposing sensitive data and opening the door to serious sanctions and costly litigation.&lt;br /&gt;&lt;br /&gt;Credibility&lt;br /&gt;&lt;br /&gt;Falling victim to a virus attack can also result in lost trust from business partners and customers. According to Gartner, “Enterprises that spread viruses, worms, spam and denial-of-service attacks will find not only that malicious software can hinder their profitability, but also that other businesses will disconnect from them if they are considered to be risky.” While an attack may not be your fault, it is most certainly your problem.&lt;br /&gt;&lt;br /&gt;The Solution&lt;br /&gt;&lt;br /&gt;Although signature-based anti-virus systems are inadequate to preventing virus attacks in the first few hours or days of an outbreak, it is possible to identify outbreaks before they infiltrate your organization’s network and become a problem. In fact, doing so successfully requires tight integration of several different technologies designed to analyze mail based on many different characteristics. One of the most innovative and important technologies for meeting these threats is known as Anomaly Detection.&lt;br /&gt;&lt;br /&gt;Large-scale virus outbreaks create anomalies in mail flow which are identifiable by the message content, source, volume, attachment or any of a number of other indicators. When a particular message appears to be a part of a sudden surge of anomalous messages moving across the internet, the message can be quarantined until virus definitions can be developed to address the new threat.&lt;br /&gt;&lt;br /&gt;Anomaly Detection&lt;br /&gt;&lt;br /&gt;CipherTrust’s IronMail utilizes a unique Anomaly Detection Engine (ADE), which dynamically identifies and responds to abnormal behavior in mail flow. By monitoring “normal” e-mail traffic rates across the Internet, the ADE allows IronMail to identify spikes in traffic that are often the first signal of a malicious attack. Once these spikes are recognized, IronMail units take appropriate action to prevent infiltration of the network.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/926985654970995567/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/detecting-and-eliminating-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/926985654970995567'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/926985654970995567'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/detecting-and-eliminating-computer.html' title='Detecting and Eliminating Computer Viruses at the Gateway'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-1990367478571812052</id><published>2010-01-23T04:36:00.001-08:00</published><updated>2010-01-23T04:36:47.484-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>How To Stop The #1 Cause Of Computer Slow Downs And Crashes!</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt; Wouldn&#39;t it be nice if your computer still ran like it did&lt;br /&gt;back when you first got it? Before you go and buy a new&lt;br /&gt;computer try this key maintenance step you can use to put&lt;br /&gt;life back into the computer you&#39;ve already got.&lt;br /&gt;&lt;br /&gt;Imagine that you start up your pc just to find yourself&lt;br /&gt;staring at a blue screen with white writing, termed &quot;the&lt;br /&gt;blue screen of death&quot; by those at Microsoft.&lt;br /&gt;&lt;br /&gt;So you push the power button to shut it down, and when you&lt;br /&gt;bring&lt;br /&gt;it back up it just crawls. Within a few minutes it goes&lt;br /&gt;back to the&lt;br /&gt;blue screen of death.&lt;br /&gt;&lt;br /&gt;This happened to a friend of mine. When she asked me what&lt;br /&gt;she could do, I asked her if she had ever defragmented her&lt;br /&gt;pc.&lt;br /&gt;&lt;br /&gt;She got that &quot;deer in the headlight&quot; look, so I knew she&lt;br /&gt;hadn&#39;t. Defragmenting her pc, after 3 years of never doing&lt;br /&gt;so, took about 14 hours to complete.&lt;br /&gt;&lt;br /&gt;One of the main reasons that computers slow down is poor&lt;br /&gt;maintenance practices.&lt;br /&gt;&lt;br /&gt;Unfortunately, when you buy a new computer you don&#39;t usually&lt;br /&gt;get much instruction on how to maintain it. Poor or no&lt;br /&gt;maintenance allows your hard drive to become more and more&lt;br /&gt;fragmented which will slow it down over time.&lt;br /&gt;&lt;br /&gt;To best explain hard drive fragmentation think of your hard&lt;br /&gt;drive as a file cabinet. In this cabinet there are folders&lt;br /&gt;with documents (files) in them.&lt;br /&gt;&lt;br /&gt;When you need to work on something you open the folder&lt;br /&gt;containing the necessary file, pull out what you need and&lt;br /&gt;put the folder back. The files go on your desk so you can&lt;br /&gt;work on them.&lt;br /&gt;&lt;br /&gt;Over time certain files don&#39;t get put back, or they get put&lt;br /&gt;back in the wrong places.&lt;br /&gt;&lt;br /&gt;When this happens on the hard drive it leads to&lt;br /&gt;fragmentation. Think of defragmenting as going through all&lt;br /&gt;of the files on your desk, and in the cabinet, and putting&lt;br /&gt;them all back in order in the correct folders.&lt;br /&gt;&lt;br /&gt;Just as staying in this state of disorganization would lead&lt;br /&gt;to a significant loss in your own productivity, the same&lt;br /&gt;thing happens to your computer.&lt;br /&gt;&lt;br /&gt;Eventually this even causes crashes because of how scattered&lt;br /&gt;all of the information gets.&lt;br /&gt;&lt;br /&gt;Disk fragmentation can even shorten the lifespan of your&lt;br /&gt;computer because your hard drive works so hard that it wears&lt;br /&gt;out faster.&lt;br /&gt;&lt;br /&gt;So the one step solution for this part of computer&lt;br /&gt;maintenance, run the defragmenting tool that comes with&lt;br /&gt;windows at least once every couple of weeks.&lt;br /&gt;&lt;br /&gt;Do this by clicking Start, click All Programs, click&lt;br /&gt;Accessories, click System Tools, then click Disk&lt;br /&gt;Defragmenter. Choose the disk you want to defragment and&lt;br /&gt;click the defragment button.&lt;br /&gt;&lt;br /&gt;Alternatively you can get software that will automatically&lt;br /&gt;keep your disk defragmented, like Diskeeper by Executive&lt;br /&gt;Software.&lt;br /&gt;&lt;br /&gt;Take care of your pc maintenance and you will continue to&lt;br /&gt;enjoy the speed you experienced when you first made that&lt;br /&gt;investment!&lt;br /&gt;&lt;br /&gt;(c)Chuck Moorefield - All Rights Reserved.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/1990367478571812052/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-stop-1-cause-of-computer-slow.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1990367478571812052'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1990367478571812052'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-stop-1-cause-of-computer-slow.html' title='How To Stop The #1 Cause Of Computer Slow Downs And Crashes!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3923935952854962395</id><published>2010-01-23T04:33:00.000-08:00</published><updated>2010-01-23T04:34:28.299-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hardware Maintenance and Repair"/><title type='text'>Computer Repair Is A Tricky Business</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt;Computer is a combination of analog and digital device which is used to compute complex mathematical problems. It is basically a programmable electronic device which performs high speed mathematical and logical operations. The main function of computer is to perform repetitive procedures very quickly and reliably.&lt;br /&gt;&lt;br /&gt;The computer can be broadly divided in two sections; one is hardware and the other is software. The hardware is made of electronic circuits and components while the software is the programs required to run the central processing unit or the CPU. Again the hardware is of four type i.e. CPU, input, output and memory device. Now a days looking at the vast uses of computer people are using computer at their offices and at homes for working as well as entertainment purposes.&lt;br /&gt;&lt;br /&gt;As we all know that each and every electronic goods need repairing and computer is not excluded from that list. Whenever there is any troubleshoot in this whole procedure the computer seems to function improperly. As a result we need to repair our computer to make it function properly. It is very tedious to repair ones computer and beside that it is also time consuming if the problem is unknown by the repairer. But if anyone has sound information regarding computer repair then it would seem to be rather easier. There are several organizations with trained and qualified technicians to help you out whenever you have problem with your computer. There are also various computer selling organizations who give after sell repairing service completely at free of cost. While there are other computers organizations, which have good computer technicians, provide only repairing service. Each of these companies serves their clients with best technical services. There are also different books or guidelines to provide us various information regarding computer trouble shoot and how to repair them. There are also technical colleges and training institute for technicians to learn more about computer problems and their repairing.&lt;br /&gt;&lt;br /&gt;There are computers of various brands such as IBM, HP, Compaq, Dell, Apple etc. in the market and they differ from each other in respect of hardware and software. Therefore their troubleshooting problems also differ from each other. So the technicians should know how to repair these different computers. A good computer technician is required to familiar with various operating systems such as Microsoft Windows, Macintosh, Linux, etc. A good technician must also know how to deal with different computer peripherals such as printers, scanners, fax machines, etc.&lt;br /&gt;&lt;br /&gt;Here are few troubleshoots of computers which are very common. They are 1) Power Supply Failure, 2) Motherboard Troubleshooting, 3) Hard Drive Failure 4), CD and DVD Drive Troubleshooting, 5) Modem Failure, 6) Sound and Game Card Failure, 7) Peripheral Failure 8) Virus Threats and many more. At first the technician need to do a complete diagnostic checkup. Then he needs follow those Basic Computer Repairing rules to repair a troubleshooting computer successfully. Beside these computer requires regular update, virus cleaning and modifications. At last we can conclude that if computers are maintained and handled properly then we can prevent our computers from various troubleshoots as we all know that &#39;prevention is always better than cure&#39;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3923935952854962395/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/computer-repair-is-tricky-business.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3923935952854962395'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3923935952854962395'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/computer-repair-is-tricky-business.html' title='Computer Repair Is A Tricky Business'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-146340645524265518</id><published>2010-01-23T04:32:00.000-08:00</published><updated>2010-01-23T04:33:29.597-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hardware Maintenance and Repair"/><title type='text'>Tackling Slow Computer Shutdowns</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt; Question : My problem is when the time comes to shut down or restart my PC - it takes about two to three minutes to shut down or restart. Please help.&lt;br /&gt;&lt;br /&gt;Answer : Slow shutdowns can be due to various reasons. The main reason for slow shutdowns is page file clearing. This is especially indicated if the hard disk light goes on and stays on while the operating system (OS) is shutting down.&lt;br /&gt;&lt;br /&gt;The page file is a file on the hard disk that&#39;s used as virtual memory. Virtual memory augments the random access memory on the system board. Since the page file may contain sensitive information, many OSes can be set to clear the page file when it (the OS) shuts down.&lt;br /&gt;&lt;br /&gt;Many Web sites state this improves the security posture of an OS. They&#39;re not wrong in this, except that saying this improves the security posture of an OS is a little like saying installing 12 locks and a biometric identification system with voice analysis improves the security posture of a house.&lt;br /&gt;&lt;br /&gt;Page file compromise is very low risk because there are many other ways to attempt to compromise the security and integrity of an OS, many of which would be easier and have better yield rates. Because of this, this option is not recommended for all but the most secure environments.&lt;br /&gt;&lt;br /&gt;In Windows, this option is controlled by a registry entry. The registry entry in question is &quot;ClearPageFile-AtShutdown&quot;. This key is usually located in the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management section of the registry.&lt;br /&gt;&lt;br /&gt;To attempt to turn off page file clearing, start (run) the program regedt32.exe and navigate to the HKEY_ LOCAL _MACHINE\SYSTEM\ CurrentControlSet\ Control \ Session Manager\Memory Management section. On the right pane, check if the entry &quot;ClearPageFileAtShutdown&quot; is visible. If it is, right-click on it and select Modify from the pop-up menu. When the EDIT DWORD window pops up, type &quot;0&quot; in the box under Value Data and click on the OK button. After the PC restarts, the next shutdown should take a little less time.&lt;br /&gt;&lt;br /&gt;Another possibility is that there are programs or services that take some time to shut down. In general, it is not advisable to have too many services or programs running in the background because all these will have to be terminated before the OS can shut down gracefully.&lt;br /&gt;&lt;br /&gt;To test for this, try closing all open programs and manually shutting down all background applications (including all firewall/anti-virus software) just before shutting down the OS.&lt;br /&gt;&lt;br /&gt;Most background applications can be shut down by right-clicking on the icon in the taskbar and selecting Exit or some similar option. If it shuts down faster after all the background applications have been shut down, it&#39;s possible that there are one or more background applications that take a long time to shut down. If this is the case, not much can be done other than shutting down the offending application or finding a way to configure the parent program so it doesn&#39;t load a background application when it starts.&lt;br /&gt;&lt;br /&gt;The offending application can be identified by looking through the event logs (Start --&gt; Control Panel --&gt; Administrative Tools --&gt; Event Viewer). If nothing looks amiss, it can also be identified in this manner: First, shutdown a background application and then shut down the OS. Not the shutdown time. On the next restart, shut down another background application and note the shutdown time. This should be repeated for every application that runs in the background. If at any time the shutdown time improves after a background application is shut down, the same application becomes a prime suspect in the &quot;slow shutdown time&quot; issue.&lt;br /&gt;&lt;br /&gt;It&#39;s also possible to decrease shutdown time by decreasing the time Windows waits for hung and slow applications to shut down.&lt;br /&gt;&lt;br /&gt;To change this time, open the registry editor (regedt32) and navigate to the HKLM\SYSTEM\CurrentControlSet\Control section. From here, right-click on &quot;WaitToKillServiceTimeout&quot; and select Modify. In the box under ValueData, enter the time (in millisecond) the OS should wait until it summarily kills the service. The default value is 20,000 (20,000 milliseconds or 20 seconds).&lt;br /&gt;&lt;br /&gt;Other settings that can be added here include &quot;Hung-AppTimeout&quot; and &quot;Auto-EndTasks&quot;.&lt;br /&gt;&lt;br /&gt;HungAppTimeout controls the amount of time the OS should wait before killing a hung or frozen application. AutoEndTasks tells the OS when to end hung applications automatically, or display the End Tasks dialogue. To add any of the two settings, right-click on the right pane and select New --&gt; String Value. Enter the name of the setting (HungApp-Timeout or AutoEndTasks as appropriate). Next, right-click on the added setting, select Modify and enter an appropriate value.&lt;br /&gt;&lt;br /&gt;For HungAppTimeout, an appropriate value is the amount (in millisecond) that the OS should wait before terminating an application. Suitable values for AutoEndTasks include &quot;0&quot; and &quot;1 &quot;, with &quot;0&quot; meaning &quot;end hung applications automatically, do not show End Tasks dialogue&quot; and &quot;I&quot; meaning &quot;show End Tasks dialogue when the shutdown time exceeds the value stated in HungAppTimeout&quot;.&lt;br /&gt;&lt;br /&gt;If using Internet Explorer, ensuring that the browser clears the Temporary Internet Files folder every time it shuts down (Tools --&gt; Internet Options --&gt; Advanced --&gt; Empty Temporary Internet Files folder when browser is closed) and defragmenting the hard disk drive may result in faster shutdown times.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/146340645524265518/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/tackling-slow-computer-shutdowns.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/146340645524265518'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/146340645524265518'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/tackling-slow-computer-shutdowns.html' title='Tackling Slow Computer Shutdowns'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-846942793491975921</id><published>2010-01-23T04:31:00.000-08:00</published><updated>2010-01-23T04:32:12.024-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anti Virus"/><title type='text'>Why Do I Need Anti Virus Software For My Computer?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt; If you&#39;ve recently purchased a computer, or are just learning about using email and the internet, you may have heard about computer viruses and anti-virus software. You may be wondering if this is something that you should be concerned about, and if so, what you should do about it. This article will attempt to answer these questions for you.&lt;br /&gt;&lt;br /&gt;First, you may be wondering just what a computer virus is. Basically a computer virus is one of many types of small programs that install themselves on your computer without your consent. Usually they enter your program through an email, or while you are browsing a website.&lt;br /&gt;&lt;br /&gt;When these programs run, usually without you knowing, they can cause all types of problems with your computer. Some viruses can be mildly annoying, slowing down your computer as they use your computer&#39;s resources for another purpose. Others can be very dangerous, collecting your personal information and sending it to another party, or damaging your hard-drive.&lt;br /&gt;&lt;br /&gt;True to their name, viruses are able to use your internet connection and email program and send themselves to the computers of other people you know, spreading themselves just like a contagious disease.&lt;br /&gt;&lt;br /&gt;Because of this, just like the health of your body, when it comes to computer viruses, an ounce of prevention is worth a pound of cure. It is much easier to prevent viruses from entering your computer than it is to get rid of them and cure your computer once it becomes infected. This is why Anti-Virus software is important.&lt;br /&gt;&lt;br /&gt;Once you realize that you need anti-virus software installed and running on your computer, you&#39;ll have to choose which one to purchase and install. This can be a complicated process, but here are some tips to make it a bit easier.&lt;br /&gt;&lt;br /&gt;First, check your computer to see if it came with anti-virus software. Many new computers are shipped with anti-virus programs already to go on them, you just need to turn them on. Check your instruction manual to see if this is the case with your computer.&lt;br /&gt;&lt;br /&gt;Check with the vendor. If you purchased your computer from a local retailer, check with them to see what anti-virus program they recommend. They should be more than willing to help you and may even be able to provide you with a discount since you purchased a computer from them.&lt;br /&gt;&lt;br /&gt;Once you have your anti-virus installed and running on your computer, be sure to contact the software&#39;s support if you have any questions. It is also important to keep your software updated. Many of these programs will automatically update themselves when you are online. This is very important since new viruses are always appearing and you want to make sure your computer is protected.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/846942793491975921/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/why-do-i-need-anti-virus-software-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/846942793491975921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/846942793491975921'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/why-do-i-need-anti-virus-software-for.html' title='Why Do I Need Anti Virus Software For My Computer?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-148787999656708505</id><published>2010-01-23T04:04:00.000-08:00</published><updated>2010-01-23T04:31:16.903-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="diagnose"/><title type='text'>Remove Rogue Desktop Icons Created By Spyware</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt; If you have used a Windows machine for a while, whether it&#39;s Windows XP, Windows 2000, or Windows 98, you&#39;re sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?&lt;br /&gt;&lt;br /&gt;1. When you buy a computer, many vendors place icons to selected products and services on your desktop, such as links to high-speed Internet Service Providers (ISPs) or add-on services vendors think you may need.&lt;br /&gt;&lt;br /&gt;2. As you install software on your Windows machine, icons may appear, either to start the application or link to the manufacturer&#39;s website. Installing just one program could add three or more icons to your desktop!&lt;br /&gt;&lt;br /&gt;3. It&#39;s easy to accidentally drag a Favorite, bookmark, text file, or other icon to your desktop, creating an icon.&lt;br /&gt;&lt;br /&gt;Normally, it&#39;s easy to delete Windows desktop icons. Just place your mouse pointer on the offending icon, then right-click it and choose &quot;Delete&quot;, clicking &quot;Yes&quot; to confirm if prompted.&lt;br /&gt;&lt;br /&gt;However, what if the rogue icons are for adult websites, unfamiliar search engines, or other websites you don&#39;t recall visiting? You may try removing these icons but get an error, or after removal they still reappear again and again and again!&lt;br /&gt;&lt;br /&gt;If so, then more than likely spyware, adware, or other malware has infected your machine. It may have been through file trading software, an inadvertent &quot;yes&quot; click when a popup window asked you to install software, &#39;freeware&#39; that included adware, or other means. To remove the rogue icons, you need to remove the malware creating these icons.&lt;br /&gt;&lt;br /&gt;Removing spyware and adware can be a time-consuming process, fraught with potential disaster as it is possible to accidentally remove files that render your operating system unusable. However, the following software products can help with this process as long as you read the instructions carefully, make backups, and get expert advice if you&#39;re not completely sure about removing what they ask you to do:&lt;br /&gt;&lt;br /&gt;* Ad-Aware: http://www.lavasoft.com/&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;* Microsoft Windows AntiSpyware: http://www.microsoft.com/athome/security/spyware/software/&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;* Pest Patrol: http://www.pestpatrol.com/&lt;br /&gt;&lt;br /&gt;* Spybot Search and Destroy: http://safer-networking.org/&lt;br /&gt;&lt;br /&gt;* Spy Sweeper: http://www.webroot.com/&lt;br /&gt;&lt;br /&gt;So, how can you prevent these icons from appearing in the first place? Practice safe computing.&lt;br /&gt;&lt;br /&gt;* Backup your machine. If it does get infected to the point of being unusable, at least you won&#39;t lose all your important files.&lt;br /&gt;&lt;br /&gt;* Install security-related operating system updates so spyware and adware cannot enter your system through well-known exploits.&lt;br /&gt;&lt;br /&gt;* Download or buy a virus scanner, and keep it updated! Virus scanners cannot detect all spyware, but it doesn&#39;t hurt to have one. Check online or visit your local computer software store.&lt;br /&gt;&lt;br /&gt;* Purchase a hardware or software firewall, and keep it updated! Firewalls help protect your computer from common exploits that spyware or adware can use to infect your machine.&lt;br /&gt;&lt;br /&gt;* Consider using a different web browser. Though it is not perfect, Mozilla Firefox at http://www.mozilla.org is currently less susceptible to spyware than Internet Explorer, mainly because it lacks certain technology (such as ActiveX) that is often exploited by malware writers. Note that depending on your web use, certain websites may not work correctly with other web browsers.&lt;br /&gt;&lt;br /&gt;By practicing safe computing and using spyware-removal software, you can help remove rogue desktop icons from your desktop and keep others from appearing.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/148787999656708505/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/remove-rogue-desktop-icons-created-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/148787999656708505'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/148787999656708505'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/remove-rogue-desktop-icons-created-by.html' title='Remove Rogue Desktop Icons Created By Spyware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3255158192341148362</id><published>2010-01-23T03:48:00.000-08:00</published><updated>2010-01-23T03:56:18.018-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="diagnose"/><title type='text'>From Settings and Preferences to Viruses and Crashes</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Copyright (c) 2007 Thomas Husnik&lt;br /&gt;&lt;br /&gt;With the extent with which we use computers today &#39; for both professional and personal use &#39; it&#39;s safe to say we&#39;ve all encountered the need for computer repair in some form. Whether it&#39;s spyware or a network crash, computer repair is what can save us from slowed computer performance, corrupted files, data loss, and time wasted.&lt;br /&gt;&lt;br /&gt;Not surprisingly, the birth of computer repair coincided with the rise of computer use. A complicated piece of technology, a computer is nonetheless used by most of us daily. We sit down at our computers and effortlessly check our emails, stock quotes, and the latest news. We research showtimes and restaurants. We work our 9 to 5 jobs, using laptops, virtual communication, and handheld devices. Indeed, much in our lives revolves around the computer. It&#39;s no wonder why computer repair is so valuable a solution and for the technician, a coveted skill.&lt;br /&gt;&lt;br /&gt;Given the many uses for computers, there are as many potential problems, errors, and failures. Thus for computer repair, there are at least as many possible fixes. As a result, knowing what to do to fix your computer can seem like an impossible task. However, if you think about it, most of us have picked up a few tricks along the way that have proven effective. For smaller problems, computer repair is entirely possible by ourselves. For more serious problems though, consulting a professional is the best route.&lt;br /&gt;&lt;br /&gt;The main reason why professionals should be consulted is because a person could do more damage to a computer by trying to fix an unknown problem on their own. To avoid such mishaps, it&#39;s best to ask an expert to take a look. Pinpointing the problem is really the biggest part of any computer repair, as it will reveal the exact fix that&#39;s needed to get the system working properly again.&lt;br /&gt;&lt;br /&gt;For computer repair technicians, this is the main aspect of their service. Diagnostics do not have to be performed in person necessarily, as most computer manufacturers and Internet service providers have call centers for troubleshooting and offer their advice over the phone, via live chat, or email. Business-wise, most companies have a tech-support staff that can help with most problems, from email to lost files.&lt;br /&gt;&lt;br /&gt;Computer repair can be as simple as choosing different settings to full-on data recovery using involved techniques such as zero-knowledge analysis. Given that most computer technicians are specialized, the chances are good that a team can help with all your problems: viruses, spyware, firewall protection, virtual private networks (VPN), emergency data recovery, RAID recovery, system upgrades, etc.&lt;br /&gt;&lt;br /&gt;Computer repair pertains to both hardware repair and software repair. At times, installation or uninstallation of software is needed. At others, a small adjustment to preferences will solve the problem. Again, computer repair is wide-ranging. Desktops, mainframes, and supercomputers can all encounter similar problems, but on a different scale. Portable devices will also have related problems, but knowing the system inside a laptop or notebook is a bit different than a PC. This is the reason why most companies have a number of technicians on staff, as one may be more specialized in one area of computer repair than another.&lt;br /&gt;&lt;br /&gt;Computer repair can be as basic as rebooting your computer, but it can also be as complex as taking the entire system apart. Overall, the service of computer repair is relatively new, but the demand for it is growing at a rapid pace. Naturally, the aim is to keep up with all of the new advancements in computer technology &#39; which seemingly change by the day.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3255158192341148362/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/from-settings-and-preferences-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3255158192341148362'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3255158192341148362'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/from-settings-and-preferences-to.html' title='From Settings and Preferences to Viruses and Crashes'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-1613381064160031780</id><published>2010-01-20T02:57:00.000-08:00</published><updated>2010-01-20T02:58:27.744-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Article"/><title type='text'>IE Out of Band Patch</title><content type='html'>&lt;!--– google_ad_section_start –--&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Microsoft will issue an out-of-band patch to fix a vulnerability in Internet Explorer version 6.&lt;br /&gt;&lt;br /&gt;Those who have Windows XP or 2000 need to install the upcoming patch to protect themselves from the “Aurora” vulnerability that attackers exploited to strike internet companies such as Google.&lt;br /&gt;&lt;br /&gt;The company recommend users to upgrade to version 8 but some companies refuse to make the move due to their way of depending on older online programs.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/1613381064160031780/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/ie-out-of-band-patch.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1613381064160031780'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1613381064160031780'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/ie-out-of-band-patch.html' title='IE Out of Band Patch'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-5262955009411025866</id><published>2010-01-20T02:53:00.000-08:00</published><updated>2010-01-20T02:56:35.580-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Article"/><title type='text'>Damaged docx2txt And Corrupt Excel xlsx2csv</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Damaged docx2txt is a freeware recovery tool designed to recover text from corrupt Word 2007 XLSX files. Word 2007 files are actually a collection of zipped XML files and the XML format is somewhat unforgiving of data corruption. This application unzips the partially corrupted XML files and tries to read what it can, not caring about malformed XML. This tool pretty much just dumps the text it finds in the XML file to text.&lt;br /&gt;&lt;br /&gt;Corrupt Excel xlsx2csv is similar to the above except it is designed to recover the content of corrupt Excel XLSX files. Again, XSLX files are based on XML files which is unforgiving to data corruption. This application has the ability to maintain the cell formatting and the cells content; including seperate workbooks in a single XLSX file. You can copy and paste the content out of the application or export the entire spreadsheet to CSV.&lt;br /&gt;&lt;br /&gt;Both of these applications were originally Perl scripts but have since had a GUI made for them (you will see a command window though). These applications are “mostly portable” as it doesnt need to be installed but requires .NET version 2.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Screenshots:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGxeBu46YrdKPb9-uYhlbY7xYwnaLmI1lkSWQ2QtpnKrK57d_873kSUg5bi74juKTDgM6DfqiM8T6L915D6EPmnscWA2ih986DX7cHgCn7Hz5fWJwilZSRHw3WtBZ_l83NB4UTAiHeqi8/s1600-h/8.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 284px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGxeBu46YrdKPb9-uYhlbY7xYwnaLmI1lkSWQ2QtpnKrK57d_873kSUg5bi74juKTDgM6DfqiM8T6L915D6EPmnscWA2ih986DX7cHgCn7Hz5fWJwilZSRHw3WtBZ_l83NB4UTAiHeqi8/s400/8.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428773639118355618&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Damaged docx2txt&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6WN0clSyuRMIGXbfQf3icUBd6N5DSeagrSVRLia7zNatcxApeeJMzqWAPu4ljRTdBoB18fXtc7BnrtjVQ2CnicQkSQGACFWsyv75yG8XiCcW_zyYXYAnOWM-7HuwHflO2HC2DnUQCKkY/s1600-h/9.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 260px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6WN0clSyuRMIGXbfQf3icUBd6N5DSeagrSVRLia7zNatcxApeeJMzqWAPu4ljRTdBoB18fXtc7BnrtjVQ2CnicQkSQGACFWsyv75yG8XiCcW_zyYXYAnOWM-7HuwHflO2HC2DnUQCKkY/s400/9.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428773960681723634&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Corrupt Excel xlsx2csv&lt;br /&gt;&lt;/div&gt;&lt;strong&gt;Downloads:&lt;/strong&gt;&lt;br /&gt;Damaged docx2txt: &lt;a href=&quot;http://www.s2services.com/hosted-freeware/dd2txt-1.0.zip&quot;&gt;Download from Official Site&lt;/a&gt; – 3.1mb&lt;br /&gt;Corrupt Excel xlsx2csv: &lt;a href=&quot;http://www.s2services.com/hosted-freeware/corrupt-excel2csv-1.0.zip&quot;&gt;Download from Official Site&lt;/a&gt; – 3.5mb&lt;br /&gt;&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/5262955009411025866/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/damaged-docx2txt-and-corrupt-excel.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/5262955009411025866'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/5262955009411025866'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/damaged-docx2txt-and-corrupt-excel.html' title='Damaged docx2txt And Corrupt Excel xlsx2csv'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGxeBu46YrdKPb9-uYhlbY7xYwnaLmI1lkSWQ2QtpnKrK57d_873kSUg5bi74juKTDgM6DfqiM8T6L915D6EPmnscWA2ih986DX7cHgCn7Hz5fWJwilZSRHw3WtBZ_l83NB4UTAiHeqi8/s72-c/8.gif" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-6004368698423885638</id><published>2010-01-20T02:48:00.000-08:00</published><updated>2010-01-20T02:51:08.416-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Recovery"/><title type='text'>Windows 7 System Recovery Discs</title><content type='html'>&lt;!--– google_ad_section_start –--&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Windows 7 is just about to be released (October 22) and you are going to start seeing it on clients machines when their new brand name laptop or desktop comes with it pre-installed. The problem with many brand name laptop and desktops is they often dont come with the Windows 7 disc.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This Windows 7 System Recovery Disc can be used to access the system recovery menu, giving you options such as System Restore, Complete PC Backup, Automated System Repair and Command-line Prompt. However, you cannot use this disc to re-install Windows.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If you already have access to a working copy of Windows 7, you dont need to download this because you can create this disk by going to the run dialog and type: recdisc&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Screenshots:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB-78qL_8RNb3OX61jq_6VBmFbLnicF4es7_GapTb3WAD72bPAU-TO-_PYNzUOoZQ0PQD_i4gMccnxbDPyXV_vcR7ylnvh0ByQOl1BkyzLRi4_hB3IWnXDukktEIayR1_oAgLFar114to/s1600-h/3.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB-78qL_8RNb3OX61jq_6VBmFbLnicF4es7_GapTb3WAD72bPAU-TO-_PYNzUOoZQ0PQD_i4gMccnxbDPyXV_vcR7ylnvh0ByQOl1BkyzLRi4_hB3IWnXDukktEIayR1_oAgLFar114to/s400/3.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428772619017183666&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Windows 7 Recovery Disc&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;strong&gt;Downloads:&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;http://neosmart.net/downloads/miscellania/Windows%207%2032-bit%20Repair%20Disc.torrent&quot;&gt;Download from Neosmart.net – 32-bit (x86) Edition Torrent&lt;/a&gt; – 146mb&lt;br /&gt;&lt;a href=&quot;http://neosmart.net/downloads/miscellania/Windows%207%2064-bit%20Repair%20Disc.torrent&quot;&gt;Download from Neosmart.net – 64-bit (x64) Edition Torrent&lt;/a&gt; – 145mb&lt;br /&gt;&lt;br /&gt;More Information&lt;br /&gt;&lt;br /&gt;Thanks to AtYourService for recommending this one.&lt;br /&gt;&lt;br /&gt;If you arent familiar with how to use Torrents:&lt;br /&gt;&lt;br /&gt;1. Download the appropriate .torrent file from above that corresponds to the version of Windows 7 you have installed.&lt;br /&gt;2. Download and run µTorrent.&lt;br /&gt;3. Open the .torrent file you downloaded with µTorrent. (File -&gt; Add Torrent)&lt;br /&gt;4. Select where you want µTorrent to save the 7 Recovery Disc.&lt;br /&gt;5. Wait for it to download.&lt;br /&gt;6. Burn the .iso file that µTorrent downloaded to a CD using these instructions.&lt;br /&gt;7. When you want to use the recovery center, put the CD in your drive and boot from it. This is usually done by pressing F8 at startup, or changing the boot drive order in the BIOS.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/6004368698423885638/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/windows-7-system-recovery-discs.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6004368698423885638'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6004368698423885638'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/windows-7-system-recovery-discs.html' title='Windows 7 System Recovery Discs'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB-78qL_8RNb3OX61jq_6VBmFbLnicF4es7_GapTb3WAD72bPAU-TO-_PYNzUOoZQ0PQD_i4gMccnxbDPyXV_vcR7ylnvh0ByQOl1BkyzLRi4_hB3IWnXDukktEIayR1_oAgLFar114to/s72-c/3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-9071030562388764134</id><published>2010-01-20T02:46:00.000-08:00</published><updated>2010-01-20T02:48:09.225-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Explorer"/><title type='text'>Fix IE Utility – Repair Tool of the Week</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Fix IE Utility is a small, freeware and portable application designed to help fix Internet Explorer after a Malware attack. Fix IE Utility will re-register 89 DLL and OCX files that are often de-registered in a Malware attack and are required for Internet Explorer to run smoothly. You will still need to run your usual malware removal applications but if Internet Explorer still wont work correctly after the system as been cleaned, its possible the malware de-registered some files and this is where Fix IE Utility helps. Many people would just suggest that the client could just switch to Firefox. However, the core of Internet Explorer is still used inside many other programs so it needs to be operational, even if you don’t use Internet Explorer as a web browser&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Fix IE Utility has been tested on IE7 and IE8 on both Windows Vista and Windows 7.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Screenshots:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCC3r0vXsovfzevgZcfvnyjp8IzH5xdVGcYN1kAeI5Qlde4g2pJWu4muCMOhv3Ppr-QRNkk-keWiH0RSOoRothstgwOlUg3jf5awWe5X-EA8Wp4v1GtzGyv94NYCD1rW9SLd_abvXoA7I/s1600-h/7.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 349px; height: 206px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCC3r0vXsovfzevgZcfvnyjp8IzH5xdVGcYN1kAeI5Qlde4g2pJWu4muCMOhv3Ppr-QRNkk-keWiH0RSOoRothstgwOlUg3jf5awWe5X-EA8Wp4v1GtzGyv94NYCD1rW9SLd_abvXoA7I/s400/7.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428771843674945378&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Fix IE Utility&lt;br /&gt;&lt;strong&gt;Downloads:&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;http://www.thewindowsclub.com/downloads/Fix%20IE.zip&quot;&gt;Download from Official Site&lt;/a&gt; – 405kb&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/9071030562388764134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/fix-ie-utility-repair-tool-of-week.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/9071030562388764134'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/9071030562388764134'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/fix-ie-utility-repair-tool-of-week.html' title='Fix IE Utility – Repair Tool of the Week'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCC3r0vXsovfzevgZcfvnyjp8IzH5xdVGcYN1kAeI5Qlde4g2pJWu4muCMOhv3Ppr-QRNkk-keWiH0RSOoRothstgwOlUg3jf5awWe5X-EA8Wp4v1GtzGyv94NYCD1rW9SLd_abvXoA7I/s72-c/7.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-135056435238718309</id><published>2010-01-20T02:39:00.000-08:00</published><updated>2010-01-20T02:43:36.497-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Monitor"/><title type='text'>In The Trenches – Troubleshooting a Blue Screen of Death</title><content type='html'>&lt;!--– google_ad_section_start –--&gt;Today while I was onsite, I came across a laptop that was getting a Blue Screen of Death (BSOD) every single time it started Windows. In this article, I’ll show you how I troubleshooted and solved this particular problem using two past “Repair Tools of the Week”.&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;When booted, this computer would show the Windows XP logo , show the cursor for a second and then suddenly produced a Blue Screen of Death with the following message:&lt;br /&gt;&lt;br /&gt;IRQL_NOT_LESS_OR_EQUAL&lt;br /&gt;STOP: 0×1000000a (0×49df8170, 0×00000002, 0×00000000, 0×804d9afa)&lt;br /&gt;BSOD IRQL_NOT_LESS_OR_EQUAL&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFHBevlTokom3jiK2gM9zS4h8hih_X_4g_qTOTMc5QrIjtdsemVk3nENJZlFsMFT536LqoTHMvE1-oiX7TYtEsrjeNTG3Xg7vnLRGntLJ0PC5hZlfQ3C-WKwT1kXyo6iiqyB0O7tDdauY/s1600-h/4.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 191px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFHBevlTokom3jiK2gM9zS4h8hih_X_4g_qTOTMc5QrIjtdsemVk3nENJZlFsMFT536LqoTHMvE1-oiX7TYtEsrjeNTG3Xg7vnLRGntLJ0PC5hZlfQ3C-WKwT1kXyo6iiqyB0O7tDdauY/s400/4.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428770403176819890&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;In most cases, “IRQL_NOT_LESS_OR_EQUAL” either means an incompatible or corrupt driver or bad RAM. I know this from past experience but don’t be afraid to Google it because you cant remember everything.&lt;br /&gt;&lt;br /&gt;I was obviously unable to do anything further now that the computer had BSOD’d so I rebooted it and tried to see whether I could get into safe mode and luckily for me, I could. This strengthened the argument that this blue screen is probably due to a corrupt or incompatible driver since Windows doesn’t load many drivers in Safe Mode and bad RAM would probably continue to cause problems even in Safe Mode.&lt;br /&gt;&lt;br /&gt;This job was made a little tougher because due to the maximum resolution of the screen I was working on, the information that tells me what driver caused the blue screen was either cut off or simply not there.&lt;br /&gt;&lt;br /&gt;So, I loaded the tool BlueScreenView which we have featured as a Repair Tool of the Week in the past and it showed me all of the previous Windows crash dumps this computer has generated and the information they contain.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQcr6C0aVOf6xgHE9Kqjh-_efCfTTNB8eanUROCBFKh6LmbnBV3l5RR-zWJqazOp-DJf0v_jfv4W8dFSzgOISukl_eD90lJgyP-EJzdblPB0KW4ucTd8h2voqho8V36hidF4f13D4QRq8/s1600-h/53.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 289px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQcr6C0aVOf6xgHE9Kqjh-_efCfTTNB8eanUROCBFKh6LmbnBV3l5RR-zWJqazOp-DJf0v_jfv4W8dFSzgOISukl_eD90lJgyP-EJzdblPB0KW4ucTd8h2voqho8V36hidF4f13D4QRq8/s400/53.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428770415806026882&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;BSOD Driver&lt;br /&gt;&lt;br /&gt;I chose the most recent crash dump and in the lower pane the application had highlighted the two files that caused the crash. One was “ntoskrnl.exe” which is a key system file. The other one was “w22n51.sys” which is an Intel wireless network driver and is most likely the cause of our problem.&lt;br /&gt;&lt;br /&gt;Armed with this new knowledge, I closed BlueScreenView and opened up another tool we have featured here called Autoruns. Autoruns will show the operator all of the files that will start with Windows such as services, applications and of course – drivers.&lt;br /&gt;I went to the “Drivers” tab and scrolled down until found the offending wireless driver and deselected it. This way, it will no longer load when Windows starts and hopefully not cause a blue screen of death.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBYo-HPI8a1984oFFYODmb77aUcIXJnVe5M2FmcjCxo-KI09Nsm2G7y7C09hxnE_kLIlwTuHjpvyHJyQ28M5IvJn504P9nMan1c5FyXAsPszu7dkBQizaNwzlFV_Hb1qS0I0hvz6gFnBM/s1600-h/6.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 288px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBYo-HPI8a1984oFFYODmb77aUcIXJnVe5M2FmcjCxo-KI09Nsm2G7y7C09hxnE_kLIlwTuHjpvyHJyQ28M5IvJn504P9nMan1c5FyXAsPszu7dkBQizaNwzlFV_Hb1qS0I0hvz6gFnBM/s400/6.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428770414511690994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;BSOD Driver&lt;br /&gt;&lt;br /&gt;I actually tried to uninstall these Intel wireless drivers from within safe mode using the “Add/Remove Programs” section. However, the uninstaller makes use of the “Windows Installer” service which doesn’t run in safe mode and while you can do a little registry tweak to get it running (which I tried), it still wouldn’t uninstall.&lt;br /&gt;&lt;br /&gt;I rebooted into normal Windows and it powered up to the desktop without any problems now that the offending driver no longer loads up. I went back into “Add/Remove Programs” and removed the old drivers in the proper manner (now that I could) and rebooted the computer.&lt;br /&gt;&lt;br /&gt;I then visited the laptop manufacturers site using its wired connection and downloaded the latest wireless drivers for the computer which were about 3 years newer than the previous drivers. My guess was that either the driver had become corrupted or a new Windows update was incompatible with it. In either case, reinstalling the drivers should fix the corruption or perhaps the manufacturer has fixed the compatibly problem in the last 3 years..&lt;br /&gt;&lt;br /&gt;Once I installed the new drivers, I connected the laptop to the clients wireless network and browsed around a few websites. Everything seemed to work and I rebooted again for good measure (should the current drivers also cause a BSOD) and everything seems to be working fine. I rebooted the computer once more and ran Memtest86 (which is on UBCD) for about 5 minutes to be certain it wasn’t caused by bad RAM. Memtest86+ will read and write to the RAM to find problems and while a proper test should be run for hours, I have found that most RAM that is bad enough to stop Windows from booting will fail the test within the first 5 minutes.&lt;br /&gt;&lt;br /&gt;After 5 minutes, I was confident that the issue was definitely the wireless driver and not the RAM.&lt;br /&gt;I was happy, the client was happy, so I got paid and went back to the office. The End.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/135056435238718309/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/in-trenches-troubleshooting-blue-screen.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/135056435238718309'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/135056435238718309'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/in-trenches-troubleshooting-blue-screen.html' title='In The Trenches – Troubleshooting a Blue Screen of Death'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFHBevlTokom3jiK2gM9zS4h8hih_X_4g_qTOTMc5QrIjtdsemVk3nENJZlFsMFT536LqoTHMvE1-oiX7TYtEsrjeNTG3Xg7vnLRGntLJ0PC5hZlfQ3C-WKwT1kXyo6iiqyB0O7tDdauY/s72-c/4.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-1108235025240391882</id><published>2010-01-20T02:36:00.000-08:00</published><updated>2010-01-20T02:38:28.420-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Article"/><title type='text'>How To Be A Better Computer Teacher</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt;Computer tuition is something I end up doing a few times every week. Most of the time the client calls me out to resolve a specific computer problem and I often end up fixing it in a very short amount of time.&lt;br /&gt;&lt;br /&gt;I need to charge my full hourly rate to cover the travelling time but the client may feel they didn’t get value for money if I just pressed a few buttons and charged them for the hour. So, I ask them if there is anything they want me to show them and if there is, I fill out the hour by teaching them something.&lt;br /&gt;&lt;br /&gt;One of the problems with computer tuition is that it is easy to tell someone how to do a certain task, but for them to understand it and to be able to reproduce it later is much harder. Most Computer Technicians tend to either give too little information or too much which confuses the client. We need to remember that some of the things we are referencing require prior knowledge on the subject.&lt;br /&gt;&lt;br /&gt;“Your operating system needs to..”&lt;br /&gt;“Whats an operating system?”&lt;br /&gt;&lt;br /&gt;To increase the chances of the client absorbing the information and be a better computer teacher all round, here are some great methods that work really well for me.&lt;br /&gt;&lt;br /&gt;Analogies&lt;br /&gt;I always use analogies when I am trying to teach something to my clients. For example, If I was trying to explain defragging to my client, I would say something like:&lt;br /&gt;&lt;br /&gt;   “Your computer is like your office space and as you use it, computer files (which are like pieces of paper) end up all over the place and make a mess. When it is messy it takes longer for you to find what you are after and the same thing applies with computers and their files.&lt;br /&gt;&lt;br /&gt;   Defragging is like cleaning up all the papers around your office and sorting them alphabetically. Once its properly filed you can find it much quicker and the same applies to your computer”&lt;br /&gt;&lt;br /&gt;I could “geek out” and tell them about how the Windows filesystem is messy, sectors can go bad and other relevant information – but they really dont need to know. After explaining the analogy above I would either schedule it to start defragmentation automatically or tell them “Press this icon once a week/month. Your computer will run a little slower while it is doing this”.&lt;br /&gt;&lt;br /&gt;Another thing I often have to explain to my clients is why their computer needs constant Windows and antivirus updates. This is what I would typically say:&lt;br /&gt;&lt;br /&gt;   “Windows is pretty much everything you see here (points to the Windows desktop). Imagine Windows as being your physical bricks-and-mortar house and hackers/viruses are like insects. These “insects” will try and find new ways to get inside your house looking for little cracks in the walls and open windows. New cracks in the wall are constantly forming and these Windows patches are like sealant glue to seal the cracks. I can make it so your computer automatically seals these cracks on an ongoing basis which will help keep the ‘insects’ out”.&lt;br /&gt;&lt;br /&gt;95% of the time, my clients will remember and understand it if I explain it like this.&lt;br /&gt;&lt;br /&gt;Let Them Drive&lt;br /&gt;The best way to make what you are teaching sink in is to do it yourself the first time and then let them drive.&lt;br /&gt;&lt;br /&gt;While you are doing it yourself for the first time, get them to write notes of each step in their own words and do this slow enough so they can keep up.&lt;br /&gt;&lt;br /&gt;Then, give them the drivers seat and ask them to do the task themselves based off their own notes. Dont say a word unless they get stuck. I usually give them about 20-30 seconds once they get stuck to figure it out themselves before I speak up and help them out.&lt;br /&gt;&lt;br /&gt;To help out the client further, I often record what I am doing the first time using Camstudio Portable. This freeware and portable software will record the screen and convert the video to a compressed format. I then name it something like&lt;br /&gt;&lt;br /&gt;“How-To-Download-Photos-From-Camera.avi” or something to that effect.&lt;br /&gt;&lt;br /&gt;Each To Their Own..&lt;br /&gt;One of the key things to remember when doing any computer tuition is don’t think someone is stupid because they aren’t good with computers. Everyone chooses where they want to focus their skills and many of them just aren’t interested in computers. For example, I’m not very good at diagnosing car problems but you wouldnt exactly call me stupid.&lt;br /&gt;&lt;br /&gt;Lastly, if someone doesn’t understand what you are saying, dont repeat what you just said louder. Instead, find a different way to say it and take your time.&lt;br /&gt;&lt;br /&gt;The client will be happy that they actually learned something because you did it slowly, weren’t condescending and made sure it sunk in – unlike their children who did it quickly and got angry with them when they didn’t understand it the first time.&lt;br /&gt;&lt;br /&gt;Computer tuition is an easy job if you have the patience for it and pays well.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/1108235025240391882/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-be-better-computer-teacher.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1108235025240391882'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/1108235025240391882'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-be-better-computer-teacher.html' title='How To Be A Better Computer Teacher'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-6980909095204229951</id><published>2010-01-20T02:34:00.000-08:00</published><updated>2010-01-20T02:36:11.163-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Article"/><title type='text'>Rizone Take Ownership Extension</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Microsoft has tightened up security in Windows Vista and 7 by disallowing access to critical system files using a Unix like permission system. While this is great for the average user because it helps protect them from viruses and themselves preventing them from being able to accidentally delete a critical system file. It isn’t so great for a Computer Technician who may need to access those areas.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Even if your user account is set to be an Administrator, there are many files and folders you cannot access including something as simple as changing the Start Menu under Windows 7. If you try, you will get an “Access Denied” error because SYSTEM owns this folder, not your user account. While there is a round-about way to assign yourself permission of these files, its a little long winded.&lt;br /&gt;&lt;br /&gt;This is where Rizone’s “Take Ownership” Extension comes in. It is a small, freeware and portable application that will add a “Take Ownership” option to your right click context menu. Just right click on the file or folder you want to be able to access, and choose “Take Ownership” and it will assign you the necessary rights.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVdk3B4F6y-HsQxKBEFmkI2whT8tCgW8NuAPV0TefNoJ3v1-HEIuBc1v_gE4uPxeFZyfi-A75cTGlULrFFwrY0-6mjyAowPaTQCLLR1C9NV0DzbWiKPpqZHD8ybR3Vc0sugSN_qckIaa0/s1600-h/3.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 263px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVdk3B4F6y-HsQxKBEFmkI2whT8tCgW8NuAPV0TefNoJ3v1-HEIuBc1v_gE4uPxeFZyfi-A75cTGlULrFFwrY0-6mjyAowPaTQCLLR1C9NV0DzbWiKPpqZHD8ybR3Vc0sugSN_qckIaa0/s400/3.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428768800273173138&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;strong&gt;Downloads:&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rizonetech.com/?download=TakeOwnership.zip&quot;&gt;Download from Creators Site&lt;/a&gt; – 335kb&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/6980909095204229951/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/rizone-take-ownership-extension.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6980909095204229951'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6980909095204229951'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/rizone-take-ownership-extension.html' title='Rizone Take Ownership Extension'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVdk3B4F6y-HsQxKBEFmkI2whT8tCgW8NuAPV0TefNoJ3v1-HEIuBc1v_gE4uPxeFZyfi-A75cTGlULrFFwrY0-6mjyAowPaTQCLLR1C9NV0DzbWiKPpqZHD8ybR3Vc0sugSN_qckIaa0/s72-c/3.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-7892999623410756105</id><published>2010-01-20T02:31:00.000-08:00</published><updated>2010-01-20T02:34:02.502-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Article"/><title type='text'>Rkill</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;The malware world is changing. It’s getting smarter.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In fact, some infections will detect that you have launched an anti-malware tool such as MalwareBytes and close it down as soon as you open it, which makes your job much harder. This is the exact situation Rkill is designed for.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Rkill is a small, freeware and portable tool designed to terminate active malware processes allowing you to use other removal tools. Rkill is made by a Microsoft MVP “Lawrence Abrams” and is available in 4 different extensions. An .EXE, .COM, .SCR and a .PIF file.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;The reason why Rkill comes in 4 different versions is because some malware will block .EXE files in an attempt to prevent you from running other malware removal tools, so this gets around that problem.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I tested this tool on a virtual machine which I had infected with a fake antivirus and Rkill killed the malicious processes without any problems. Of course, I then had to delete the malicious files manually as this is not a malware removal tool, but a malware process killing tool. It just stops the malware from running right now, allowing you work your computer technician magic.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Screenshots:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiboZBZusB8lpXCLliJaOFlm3AZzV8mQs2XpJVS20-E_Z0w8FFHqhrooRHxiRuHAU_2MN33bcGa433MbdFCFwGPcocArOTSmjGm_fXQOUdr5LhmQ4GmGtjO2G1lTWWDCzhLTbPUsaxrKQg/s1600-h/2.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 201px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiboZBZusB8lpXCLliJaOFlm3AZzV8mQs2XpJVS20-E_Z0w8FFHqhrooRHxiRuHAU_2MN33bcGa433MbdFCFwGPcocArOTSmjGm_fXQOUdr5LhmQ4GmGtjO2G1lTWWDCzhLTbPUsaxrKQg/s400/2.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428768145634886978&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Rkill - Kill Malware Processes&lt;br /&gt;&lt;strong&gt;Downloads:&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;http://download.bleepingcomputer.com/grinler/rkill.exe&quot;&gt;rkill.exe&lt;/a&gt; – Download from BleepingComputer.com – 257kb&lt;br /&gt;&lt;a href=&quot;http://download.bleepingcomputer.com/grinler/rkill.com&quot;&gt;rkill.com&lt;/a&gt; – Download from BleepingComputer.com – 257kb&lt;br /&gt;&lt;a href=&quot;http://download.bleepingcomputer.com/grinler/rkill.scr&quot;&gt;rkill.scr&lt;/a&gt; – Download from BleepingComputer.com – 257kb&lt;br /&gt;&lt;a href=&quot;http://download.bleepingcomputer.com/grinler/rkill.pif&quot;&gt;rkill.pif&lt;/a&gt; – Download from BleepingComputer.com – 257kb&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/7892999623410756105/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/rkill.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/7892999623410756105'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/7892999623410756105'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/rkill.html' title='Rkill'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiboZBZusB8lpXCLliJaOFlm3AZzV8mQs2XpJVS20-E_Z0w8FFHqhrooRHxiRuHAU_2MN33bcGa433MbdFCFwGPcocArOTSmjGm_fXQOUdr5LhmQ4GmGtjO2G1lTWWDCzhLTbPUsaxrKQg/s72-c/2.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-6492718913186213271</id><published>2010-01-20T02:25:00.000-08:00</published><updated>2010-01-20T02:29:52.399-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BIOS"/><title type='text'>How to Bypass or Remove a BIOS Password</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;A BIOS password is a protection measure that can be used to stop someone powering up a computer system or making changes in some of the computers most sensitive areas. Many big name computer manufacturers such as Dell and HP lock the customers out of this area because they don’t want the customer changing anything and potentially damaging the machine (which the manufacturer may have to warranty). However, when someone like a computer technician or hardware enthusiast needs to make some hardware changes to the computer, they will need to access the BIOS. Here are some methods to bypass or remove a BIOS password.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;NOTE: Do not try to guess the password on a passworded Hard Drive. 3 wrong guesses will often result in the information on the hard drive being lost forever.&lt;br /&gt;&lt;br /&gt;How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:&lt;br /&gt;The simplest way to remove a BIOS password is to simply remove the CMOS battery. A computer will remember its settings and keep the time even when it is turned off and unplugged because these parts are powered by small battery inside the computer called a CMOS battery. If we pull out this battery, the computer will forget alot of its hardware settings, including its BIOS password. This should not be performed on Laptops if you are not experienced working with laptop hardware.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Finding the CMOS Battery&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsbAGojhvXwhSIbmVDtLFJWxYQuhggYYn00Ine3w-pnI1RX6XZzrTkieRdgcwFw1YI7MQejXahFsR8LTYPWKNUWIAricPACaimxfuXhUEU9bY8zax6PnVjqjXqUNfBgqiuERo3Tt718Kk/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 128px; height: 78px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsbAGojhvXwhSIbmVDtLFJWxYQuhggYYn00Ine3w-pnI1RX6XZzrTkieRdgcwFw1YI7MQejXahFsR8LTYPWKNUWIAricPACaimxfuXhUEU9bY8zax6PnVjqjXqUNfBgqiuERo3Tt718Kk/s400/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428766893373473090&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Anyway, open up the computer case using a screw driver and locate the flat, circular and metallic CMOS battery. It should look something like the picture to the right. Some computers have this part standing upright.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Once you have located it, observe how the latches are holding it. There are many different ways to remove a CMOS battery but the most common way on newer computers can be seen in the picture below.&lt;br /&gt;&lt;/div&gt;Removing the CMOS Battery&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq-sxUNj3MdNhOld9vwIjnWRtsXueauqOnSnIicOxxIJKcuDAud7SfnNooXZmD3MTF36KH6SdYryIBNsLYvelT64Drr_nnBGRQiE6Yotisu7cHaNV2pg70_-iKT41dFlrvocFc0LrDhfE/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 128px; height: 96px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq-sxUNj3MdNhOld9vwIjnWRtsXueauqOnSnIicOxxIJKcuDAud7SfnNooXZmD3MTF36KH6SdYryIBNsLYvelT64Drr_nnBGRQiE6Yotisu7cHaNV2pg70_-iKT41dFlrvocFc0LrDhfE/s400/2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5428766901650459266&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Make sure to power down the computer, unplug the power cables and unplug any USB devices if they are powered. The computer must not be able to get power from anywhere for this to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back in. The reason for this wait is because the computer can still store power in its capacitors even though everything is unplugged. The waiting period allows enough time for them to discharge.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Plug everything back in, power up the computer and enter the BIOS again. If everything went well there should be no more password. In some cases, if you get weird error messages during bootup now, you will need to goto “Load BIOS Defaults” in BIOS and save the changes to fix them.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;If this method didn’t work, try one of the methods below.&lt;br /&gt;&lt;br /&gt;How to Bypass or Remove a BIOS Password using Software:&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;!BIOS is a freeware utility which is designed to be a whole BIOS and security suite. It has the ability to decrypt the passwords used in some of the most common BIOS makes such as Award, Phoenix, American Megatrends, IMB etc..&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;It also has the ability to brute force the password (known as “blasters”). However, this method is dangerous and can result in some unexpected and unwanted results.&lt;br /&gt;&lt;br /&gt;Note: Because of this applications password cracking abilities, some antivirus software may report it as a virus/trojan. This is a false positive.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;To start using !BIOS, reboot your computer and take note of the BIOS type and version you are running. For example, If your motherboard uses Award BIOS you should look for the text “Award Medallion BIOS 6.0″ or something similar.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Download !BIOS from here and save it to your desktop. Then, open a DOS command windows by going to Start &gt; Run and type: cmd&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Once you see a black screen in front of you, type: cd desktop&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You should now see something like:&lt;br /&gt;C:\Documents and Settings\YourUserName\Desktop&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Now type the name of the file you just downloaded, if you haven’t changed the name just type in: bios320.exe&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;!BIOS - Decrypting a BIOS Password&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Use the down arrow and choose “Crackers” and then press the right arrow. Using the up and down arrows, select the BIOS that the motherboard is using and press Enter.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You should now see a menu asking what you want to crack, in most cases its the Supervisor or System Passwords you want to crack, so press the 1 key on your keyboard. It will then show you another menu asking how you want it to be cracked. Option 1 is pretty good so try that first by pressing the 1 key on your keyboard. You should now have your BIOS password.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Reboot the computer, enter the BIOS and try it out.&lt;br /&gt;&lt;br /&gt;How to Bypass or Remove a BIOS Password using the manufacturer backdoor password:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;On many computers (especially old ones), computer manufacturers build in backdoor passwords for their own technicians to use so they can access the BIOS when the hardware is being serviced. Here are some of the ones that have been reported. You may need to try quite a few passwords before you find one that works&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;These passwords are CaSe SeNsItIve.&lt;br /&gt;&lt;br /&gt;AMI BIOS Backdoor Passwords:&lt;br /&gt;&lt;br /&gt; * A.M.I.&lt;br /&gt; * AAAMMMII&lt;br /&gt; * AMI&lt;br /&gt; * AMI?SW&lt;br /&gt; * AMI_SW&lt;br /&gt; * BIOS&lt;br /&gt; * CONDO&lt;br /&gt; * HEWITT RAND&lt;br /&gt; * LKWPETER&lt;br /&gt; * MI&lt;br /&gt; * Oder&lt;br /&gt; * PASSWORD&lt;br /&gt;&lt;br /&gt;Award BIOS Backdoor Passwords:&lt;br /&gt;&lt;br /&gt; * (eight spaces)&lt;br /&gt; * 01322222&lt;br /&gt; * 589589&lt;br /&gt; * 589721&lt;br /&gt; * 595595&lt;br /&gt; * 598598&lt;br /&gt; * ALFAROME&lt;br /&gt; * ALLY&lt;br /&gt; * ALLy&lt;br /&gt; * aLLY&lt;br /&gt; * aLLy&lt;br /&gt; * aPAf&lt;br /&gt; * award&lt;br /&gt; * AWARD PW&lt;br /&gt; * AWARD SW&lt;br /&gt; * AWARD?SW&lt;br /&gt; * AWARD_PW&lt;br /&gt; * AWARD_SW&lt;br /&gt; * AWKWARD&lt;br /&gt; * awkward&lt;br /&gt; * IOSTAR&lt;br /&gt; * CONCAT&lt;br /&gt; * CONDO&lt;br /&gt; * Condo&lt;br /&gt; * condo&lt;br /&gt; * d8on&lt;br /&gt; * djonet&lt;br /&gt; * HLT&lt;br /&gt; * J256&lt;br /&gt; * J262&lt;br /&gt; * j262&lt;br /&gt; * j322&lt;br /&gt; * j332&lt;br /&gt; * J64&lt;br /&gt; * KDD&lt;br /&gt; * LKWPETER&lt;br /&gt; * Lkwpeter&lt;br /&gt; * PINT&lt;br /&gt; * pint&lt;br /&gt; * SER&lt;br /&gt; * SKY_FOXSYXZ&lt;br /&gt; * SKY_FOX&lt;br /&gt; * syxz&lt;br /&gt; * SYXZ&lt;br /&gt; * TTPTHA&lt;br /&gt; * ZAAAADA&lt;br /&gt; * ZAAADA&lt;br /&gt; * ZBAAACA&lt;br /&gt; * ZJAAADC&lt;br /&gt;&lt;br /&gt;   Russian Award BIOS Passwords:&lt;br /&gt; * %øåñòü ïpîáåëîâ%&lt;br /&gt; * %äåâÿòü ïpîáåëîâ%&lt;br /&gt;&lt;br /&gt;Phoenix Backdoor BIOS Passwords:&lt;br /&gt;&lt;br /&gt; * BIOS&lt;br /&gt; * CMOS&lt;br /&gt; * phoenix&lt;br /&gt; * PHOENIX&lt;br /&gt;&lt;br /&gt;Other Manufcaturers Backdoor Passwords: (manufacturer name – password)&lt;br /&gt;&lt;br /&gt; * VOBIS and IBM – merlin&lt;br /&gt; * Dell – Dell&lt;br /&gt; * Biostar – Biostar&lt;br /&gt; * Compaq – Compaq&lt;br /&gt; * Enox – xo11nE&lt;br /&gt; * Epox – central&lt;br /&gt; * Freetech – Posterie&lt;br /&gt; * IWill – iwill&lt;br /&gt; * Jetway – spooml&lt;br /&gt; * Packard Bell – bell9&lt;br /&gt; * QDI – QDI&lt;br /&gt; * Siemens – SKY_FOX&lt;br /&gt; * SOYO – SY_MB&lt;br /&gt; * TMC – BIGO&lt;br /&gt; * Toshiba – Toshiba&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Join 10,800+ other readers and subscribe to Technibbles Email Digest and receive new posts sent directly to your inbox. All new signups get a copy of our Computer Technicians Quick Reference Guide free. Signup Now!.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/6492718913186213271/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-bypass-or-remove-bios-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6492718913186213271'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/6492718913186213271'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-bypass-or-remove-bios-password.html' title='How to Bypass or Remove a BIOS Password'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsbAGojhvXwhSIbmVDtLFJWxYQuhggYYn00Ine3w-pnI1RX6XZzrTkieRdgcwFw1YI7MQejXahFsR8LTYPWKNUWIAricPACaimxfuXhUEU9bY8zax6PnVjqjXqUNfBgqiuERo3Tt718Kk/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-9096257382371776333</id><published>2010-01-18T07:37:00.000-08:00</published><updated>2010-01-18T07:40:43.657-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="diagnose"/><title type='text'>Monitoring Hard Disks with SMART</title><content type='html'>&lt;!--– google_ad_section_start –--&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It&#39;s a given that all disks eventually die, and it&#39;s easy to see why. The platters in a modern disk drive rotate more than a hundred times per second, maintaining submicron tolerances between the disk heads and the magnetic media that store data. Often they run 24/7 in dusty, overheated environments, thrashing on heavily loaded or poorly managed machines. So, it&#39;s not surprising that experienced users are all too familiar with the symptoms of a dying disk. Strange things start happening. Inscrutable kernel error messages cover the console and then the system becomes unstable and locks up. Often, entire days are lost repeating recent work, re-installing the OS and trying to recover data. Even if you have a recent backup, sudden disk failure is a minor catastrophe. &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Many users and system administrators don&#39;t know that Self-Monitoring, Analysis and Reporting Technology systems (SMART) are built in to most modern ATA and SCSI hard disks. SMART disk drives internally monitor their own health and performance. In many cases, the disk itself provides advance warning that something is wrong, helping to avoid the scenario described above. Most implementations of SMART also allow users to perform self-tests on the disk and to monitor a number of performance and reliability attributes. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; By profession I am a physicist. My research group runs a large computing cluster with 300 nodes and 600 disk drives, on which more than 50TB of physics data are stored. I became interested in SMART several years ago when I realized it could help reduce downtime and keep our cluster operating more reliably. For about a year I have been maintaining an open-source package called smartmontools, a spin-off of the UCSC smartsuite package, for this purpose.&lt;br /&gt;&lt;br /&gt;In this article, I explain how to use smartmontools&#39; smartctl utility and smartd dæmon to monitor the health of a system&#39;s disks. See smartmontools.sourceforge.net for download and installation instructions and consult the WARNINGS file for a list of problem disks/controllers. Additional documentation can be found in the man pages (man smartctl and man smartd) and on the Web page.&lt;br /&gt;&lt;br /&gt;Versions of smartmontools are available for Slackware, Debian, SuSE, Mandrake, Gentoo, Conectiva and other Linux distributions. Red Hat&#39;s existing products contain the UCSC smartsuite versions of smartctl and smartd, but the smartmontools versions will be included in upcoming releases.  To understand how smartmontools works, it&#39;s helpful to know the history of SMART. The original SMART spec (SFF-8035i) was written by a group of disk drive manufacturers. In Revision 2 (April 1996) disks keep an internal list of up to 30 Attributes corresponding to different measures of performance and reliability, such as read and seek error rates.&lt;br /&gt;&lt;br /&gt;Each Attribute has a one-byte normalized value ranging from 1 to 253 and a corresponding one-byte threshold. If one or more of the normalized Attribute values less than or equal to its corresponding threshold, then either the disk is expected to fail in less than 24 hours or it has exceeded its design or usage lifetime. Some of the Attribute values are updated as the disk operates. Others are updated only through off-line tests that temporarily slow down disk reads/writes and, thus, must be run with a special command. In late 1995, parts of SFF-8035i were merged into the ATA-3 standard.  Starting with the ATA-4 standard, the requirement that disks maintain an internal Attribute table was dropped. Instead, the disks simply return an OK or NOT OK response to an inquiry about their health. A negative response indicates the disk firmware has determined that the disk is likely to fail. The ATA-5 standard added an ATA error log and commands to run disk self-tests to the SMART command set.&lt;br /&gt;&lt;br /&gt;To make use of these disk features, you need to know how to use smartmontools to examine the disk&#39;s Attributes (most disks are backward-compatible with SFF-8035i), query the disk&#39;s health status, run disk self-tests, examine the disk&#39;s self-test log (results of the last 21 self-tests) and examine the disk&#39;s ATA error log (details of the last five disk errors). Although this article focuses on ATA disks, additional documentation about SCSI devices can be found on the smartmontools Web page.  To begin, give the command smartctl -a /dev/hda, using the correct path to your disk, as root. If SMART is not enabled on the disk, you first must enable it with the -s on option. You then see output similar to the output shown in Listings 1–5.  The first part of the output (Listing 1) lists model/firmware information about the disk—this one is an IBM/Hitachi GXP-180 example. Smartmontools has a database of disk types. If your disk is in the database, it may be able to interpret the raw Attribute values correctly.&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  &lt;/p&gt;&lt;div class=&quot;simplesect&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;titlepage&quot;&gt;&lt;a name=&quot;N0xa50890.0xb45098&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;sidebar&quot;&gt;&lt;p class=&quot;title&quot;&gt;&lt;b&gt; Listing 1. Output of &lt;tt&gt;smartctl -i /dev/hda&lt;/tt&gt;&lt;/b&gt;&lt;/p&gt;&lt;pre class=&quot;programlisting&quot;&gt;Device Model:     IC35L120AVV207-0&lt;br /&gt;Serial Number:    VNVD02G4G3R72G&lt;br /&gt;Firmware Version: V24OA63A&lt;br /&gt;Device is:        In smartctl database [for details use: -P show]&lt;br /&gt;ATA Version is:   6&lt;br /&gt;ATA Standard is:  ATA/ATAPI-6 T13 1410D revision 3a&lt;br /&gt;SMART support is: Available - device has SMART capability.&lt;br /&gt;SMART support is: Enabled&lt;br /&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The second part of the output (Listing 2) shows the results of the health status inquiry. This is the one-line Executive Summary Report of disk health; the disk shown here has passed. If your disk health status is FAILING, back up your data immediately. The remainder of this section of the output provides information about the disk&#39;s capabilities and the estimated time to perform short and long disk self-tests. &lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;simplesect&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;titlepage&quot;&gt;&lt;a name=&quot;N0xa50890.0xb45358&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;sidebar&quot;&gt;&lt;p class=&quot;title&quot;&gt;&lt;b&gt;Listing 2. Output of &lt;tt&gt;smartctl -Hc /dev/hda&lt;/tt&gt;&lt;/b&gt;&lt;/p&gt;&lt;pre class=&quot;programlisting&quot;&gt;SMART overall-health self-assessment test result: PASSED&lt;br /&gt;&lt;br /&gt;General SMART Values:&lt;br /&gt;Off-line data collection status: (0x82) Offline data collection activity&lt;br /&gt;                                     was completed without error.&lt;br /&gt;                                     Auto Off-line Data Collection:&lt;br /&gt;Enabled.&lt;br /&gt;Self-test execution status:      (   0) The previous self-test routine&lt;br /&gt;                                     completed without error or no&lt;br /&gt;                                     self-test has ever been run.&lt;br /&gt;Total time to complete off-line&lt;br /&gt;data collection:                 (2855) seconds.&lt;br /&gt;Offline data collection&lt;br /&gt;capabilities:                    (0x1b) SMART execute Offline immediate.&lt;br /&gt;                                     Automatic timer ON/OFF support.&lt;br /&gt;                                     Suspend Offline collection upon new&lt;br /&gt;                                     command.&lt;br /&gt;                                     Offline surface scan supported.&lt;br /&gt;                                     Self-test supported.&lt;br /&gt;                                     No Conveyance Self-test supported.&lt;br /&gt;                                     No Selective Self-test supported.&lt;br /&gt;SMART capabilities:            (0x0003) Saves SMART data before entering&lt;br /&gt;                                     power-saving mode.&lt;br /&gt;                                     Supports SMART auto save timer.&lt;br /&gt;Error logging capability:        (0x01) Error logging supported.&lt;br /&gt;                                     General Purpose Logging supported.&lt;br /&gt;Short self-test routine&lt;br /&gt;recommended polling time:        (   1) minutes.&lt;br /&gt;Extended self-test routine&lt;br /&gt;recommended polling time:        (  48) minutes.&lt;br /&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The third part of the output (Listing 3) lists the disk&#39;s table of up to 30 Attributes (from a maximum set of 255). Remember that Attributes are no longer part of the ATA standard, but most manufacturers still support them. Although SFF-8035i doesn&#39;t define the meaning or interpretation of Attributes, many have a de facto standard interpretation. For example, this disk&#39;s 13th Attribute (ID #194) tracks its internal temperature. &lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;simplesect&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;titlepage&quot;&gt;&lt;a name=&quot;N0xa50890.0xb45618&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;sidebar&quot;&gt;&lt;p class=&quot;title&quot;&gt;&lt;b&gt;Listing 3. Output of &lt;tt&gt;smartctl -A /dev/hda&lt;/tt&gt;&lt;/b&gt;&lt;/p&gt;&lt;pre class=&quot;programlisting&quot;&gt;Vendor Specific SMART Attributes with Thresholds:&lt;br /&gt;ID# ATTRIBUTE_NAME          FLAG     VALUE WORST THRESH TYPE      UPDATED WHEN_FAILED RAW_VALUE&lt;br /&gt;1 Raw_Read_Error_Rate       0x000b   100   100   060    Pre-fail  Always      -       0&lt;br /&gt;2 Throughput_Performance    0x0005   155   155   050    Pre-fail  Offline     -       225&lt;br /&gt;3 Spin_Up_Time              0x0007   097   097   024    Pre-fail  Always      -       293 (Average 270)&lt;br /&gt;4 Start_Stop_Count          0x0012   100   100   000    Old_age   Always      -       10&lt;br /&gt;5 Reallocated_Sector_Ct     0x0033   100   100   005    Pre-fail  Always      -       0&lt;br /&gt;7 Seek_Error_Rate           0x000b   100   100   067    Pre-fail  Always      -       0&lt;br /&gt;8 Seek_Time_Performance     0x0005   125   125   020    Pre-fail  Offline     -       36&lt;br /&gt;9 Power_On_Hours            0x0012   100   100   000    Old_age   Always      -       3548&lt;br /&gt;10 Spin_Retry_Count         0x0013   100   100   060    Pre-fail  Always      -       0&lt;br /&gt;12 Power_Cycle_Count        0x0032   100   100   000    Old_age   Always      -       10&lt;br /&gt;192 Power-Off_Retract_Count 0x0032   100   100   050    Old_age   Always      -       158&lt;br /&gt;193 Load_Cycle_Count        0x0012   100   100   050    Old_age   Always      -       158&lt;br /&gt;194 Temperature_Celsius     0x0002   189   189   000    Old_age   Always      -       29 (Lifetime Min/Max 23/33)&lt;br /&gt;196 Reallocated_Event_Count 0x0032   100   100   000    Old_age   Always      -       0&lt;br /&gt;197 Current_Pending_Sector  0x0022   100   100   000    Old_age   Always      -       0&lt;br /&gt;198 Offline_Uncorrectable   0x0008   100   100   000    Old_age   Offline     -       0&lt;br /&gt;199 UDMA_CRC_Error_Count    0x000a   200   200   000    Old_age   Always      -       0&lt;br /&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt; Studies have shown that lowering disk temperatures by as little as 5°C significantly reduces failure rates, though this is less of an issue for the latest generation of fluid-drive bearing drives. One of the simplest and least expensive steps you can take to ensure disk reliability is to add a cooling fan that blows cooling air directly onto or past the system&#39;s disks. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Each Attribute has a six-byte raw value (RAW_VALUE) and a one-byte normalized value (VALUE). In this case, the raw value stores three temperatures: the disk&#39;s temperature in Celsius (29), plus its lifetime minimum (23) and maximum (33) values. The format of the raw data is vendor-specific and not specified by any standard. To track disk reliability, the disk&#39;s firmware converts the raw value to a normalized value ranging from 1 to 253. If this normalized value is less than or equal to the threshold (THRESH), the Attribute is said to have failed, as indicated in the WHEN_FAILED column. The column is empty because none of these Attributes has failed. The lowest (WORST) normalized value also is shown; it is the smallest value attained since SMART was enabled on the disk. The TYPE of the Attribute indicates if Attribute failure means the device has reached the end of its design life (Old_age) or it&#39;s an impending disk failure (Pre-fail). For example, disk spin-up time (ID #3) is a prefailure Attribute. If this (or any other prefail Attribute) fails, disk failure is predicted in less than 24 hours. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The names/meanings of Attributes and the interpretation of their raw values is not specified by any standard. Different manufacturers sometimes use the same Attribute ID for different purposes. For this reason, the interpretation of specific Attributes can be modified using the &lt;tt&gt;-v&lt;/tt&gt; option to &lt;tt&gt;smartctl&lt;/tt&gt;; please see the man page for details. For example, some disks use Attribute 9 to store the power-on time of the disk in minutes; the &lt;tt&gt;-v 9,minutes&lt;/tt&gt; option to &lt;tt&gt;smartctl&lt;/tt&gt; correctly modifies the Attribute&#39;s interpretation. If your disk model is in the smartmontools database, these -v options are set automatically. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The next part of the &lt;tt&gt;smartctl -a&lt;/tt&gt; output (Listing 4) is a log of the disk errors. This particular disk has been error-free, and the log is empty. Typically, one should worry only if disk errors start to appear in large numbers. An occasional transient error that does not recur usually is benign. The smartmontools Web page has a number of examples of &lt;tt&gt;smartctl -a&lt;/tt&gt; output showing some illustrative error log entries. They are timestamped with the disk&#39;s power-on lifetime in hours when the error occurred, and the individual ATA commands leading up to the error are timestamped with the time in milliseconds after the disk was powered on. This shows whether the errors are recent or old. &lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;simplesect&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;titlepage&quot;&gt;&lt;a name=&quot;N0xa50890.0xb45bf0&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;sidebar&quot;&gt;&lt;p class=&quot;title&quot;&gt;&lt;b&gt; Listing 4. Output of &lt;tt&gt;smartctl -l error /dev/hda&lt;/tt&gt;&lt;/b&gt;&lt;/p&gt;&lt;pre class=&quot;programlisting&quot;&gt;SMART Error Log Version: 1&lt;br /&gt;No Errors Logged&lt;br /&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The final part of the &lt;tt&gt;smartctl&lt;/tt&gt; output (Listing 5) is a report of the self-tests run on the disk. These show two types of self-tests, short and long. (ATA-6/7 disks also may have conveyance and selective self-tests.) These can be run with the commands &lt;tt&gt;smartctl -t short /dev/hda&lt;/tt&gt; and &lt;tt&gt;smartctl -t long /dev/hda&lt;/tt&gt; and do not corrupt data on the disk. Typically, short tests take only a minute or two to complete, and long tests take about an hour. These self-tests do not interfere with the normal functioning of the disk, so the commands may be used for mounted disks on a running system. On our computing cluster nodes, a long self-test is run with a cron job early every Sunday morning. The entries in Listing 5 all are self-tests that completed without errors; the LifeTime column shows the power-on age of the disk when the self-test was run. If a self-test finds an error, the Logical Block Address (LBA) shows where the error occurred on the disk. The Remaining column shows the percentage of the self-test remaining when the error was found. If you suspect that something is wrong with a disk, I strongly recommend running a long self-test to look for problems. &lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;simplesect&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;titlepage&quot;&gt;&lt;a name=&quot;N0xa50890.0xb45fb8&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;sidebar&quot;&gt;&lt;p class=&quot;title&quot;&gt;&lt;b&gt; Listing 5. Output of &lt;tt&gt;smartctl -l selftest /dev/hda&lt;/tt&gt;&lt;/b&gt;&lt;/p&gt;&lt;pre class=&quot;programlisting&quot;&gt;SMART Self-test log, version number 1&lt;br /&gt;Num  Test_Description    Status       Remaining  LifeTime(hours)&lt;br /&gt;LBA_of_first_error&lt;br /&gt;# 1  Extended off-line   Completed          00%      3525         -&lt;br /&gt;# 2  Extended off-line   Completed          00%      3357         -&lt;br /&gt;# 3  Short off-line      Completed          00%      3059         -&lt;br /&gt;&lt;br /&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The &lt;tt&gt;smartctl -t offline&lt;/tt&gt; command can be used to carry out off-line tests. These off-line tests do not make entries in the self-test log. They date back to the SFF-8035i standard, and update values of the Attributes that are not updated automatically under normal disk operation (see the UPDATED column in Listing 3). Some disks support automatic off-line testing, enabled by &lt;tt&gt;smartctl -o on&lt;/tt&gt;, which automatically runs an off-line test every few hours. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The SMART standard provides a mechanism for running disk self-tests and for monitoring aspects of disk performance. Its main shortcoming is that it doesn&#39;t provide a direct mechanism for informing the OS or user if problems are found. In fact, because disk SMART status frequently is not monitored, many disk problems go undetected until they lead to catastrophic failure. Of course, you can monitor disks on a regular basis using the smartctl utility, as I&#39;ve described, but this is a nuisance. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The remaining part of the smartmontools package is the smartd dæmon that does regular monitoring for you. It monitors the disk&#39;s SMART data for signs of problems. It can be configured to send e-mail to users or system administrators or to run arbitrary scripts if problems are detected. By default, when smartd is started, it registers the system&#39;s disks. It then checks their status every 30 minutes for failing Attributes, failing health status or increased numbers of ATA errors or failed self-tests and logs this information with SYSLOG in /var/log/messages by default. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; You can control and fine-tune the behavior of smartd using the configuration file /etc/smartd.conf. This file is read when smartd starts up, before it forks into the background. Each line contains Directives pertaining to a different disk. The configuration file on our computing cluster nodes look like this:  &lt;/p&gt;&lt;pre class=&quot;programlisting&quot;&gt;# /etc/smartd.conf config file&lt;br /&gt;/dev/hda -S on -o on -a -I 194 -m sense@phys.uwm.edu&lt;br /&gt;/dev/hdc -S on -o on -a -I 194 -m sense@phys.uwm.edu&lt;br /&gt;&lt;/pre&gt; &lt;p style=&quot;text-align: justify;&quot;&gt; The first column indicates the device to be monitored. The &lt;tt&gt;-o on&lt;/tt&gt; Directive enables the automatic off-line testing, and the &lt;tt&gt;-S on&lt;/tt&gt; Directive enables automatic Attribute autosave. The &lt;tt&gt;-m&lt;/tt&gt; Directive is followed by an e-mail address to which warning messages are sent, and the &lt;tt&gt;-a&lt;/tt&gt; Directive instructs smartd to monitor all SMART features of the disk. In this configuration, smartd logs changes in all normalized attribute values. The &lt;tt&gt;-I 194&lt;/tt&gt; Directive means ignore changes in Attribute #194, because disk temperatures change often, and it&#39;s annoying to have such changes logged on a regular basis. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Normally smartd is started by the normal UNIX init mechanism. For example, on Red Hat distributions, &lt;tt&gt;/etc/rc.d/init.d/smartd start&lt;/tt&gt; and &lt;tt&gt;/etc/rc.d/init.d/smartd stop&lt;/tt&gt; can be used to start and stop the dæmon. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Further information about the smartd and its config file can be found in the man page (&lt;tt&gt;man smartd&lt;/tt&gt;), and summaries can be found with the commands &lt;tt&gt;smartd -D&lt;/tt&gt; and &lt;tt&gt;smartd -h&lt;/tt&gt;. For example, the &lt;tt&gt;-M test&lt;/tt&gt; Directive sends a test e-mail warning message to confirm that warning e-mail messages are delivered correctly. Other Directives provide additional flexibility, such as monitoring changes in raw Attribute values. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; What should you do if a disk shows signs of problems? What if a disk self-test fails or the disk&#39;s SMART health status fails? Start by getting your data off the disk and on to another system as soon as possible. Second, run some extended disk self-tests and see if the problem is repeatable at the same LBA. If so, something probably is wrong with the disk. If the disk has failing SMART health status and is under warranty, the vendor usually will replace it. If the disk is failing its self-tests, many manufacturers provide specialized disk health programs, for example, Maxtor&#39;s PowerMax or IBM&#39;s Drive Fitness Test. Sometimes these programs actually can repair a disk by remapping bad sectors. Often, they report a special error code that can be used to get a replacement disk. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; This article has covered the basics of smartmontools. To learn more, read the man pages and Web page, and then write to the support mailing list if you need further help. Remember, smartmontools is no substitute for backing up your data. SMART cannot and does not predict all disk failures, but it often provides clues that something is amiss and has helped to keep many computing clusters operating reliably. &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Several developers are porting smartmontools to FreeBSD, Darwin and Solaris, and we recently have added extensions to allow smartmontools to monitor and control the ATA disks behind 3ware RAID controllers. If you would like to contribute to the development of smartmontools, write to the support mailing list. We especially are interested in information about the interpretation and meaning of vendor-specific SMART Attribute and raw values. &lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot; class=&quot;authorblurb&quot;&gt;&lt;p&gt; Bruce Allen is a professor of Physics at the University of Wisconsin - Milwaukee. He does research work on gravitational waves and the very early universe, and he has built several large Linux clusters for data analysis use.&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/9096257382371776333/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/monitoring-hard-disks-with-smart.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/9096257382371776333'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/9096257382371776333'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/monitoring-hard-disks-with-smart.html' title='Monitoring Hard Disks with SMART'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-2419661710760774242</id><published>2010-01-18T07:21:00.000-08:00</published><updated>2010-01-18T07:24:31.684-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>5 Ways To Speed Up Your PC</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--– google_ad_section_start –--&gt;By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows 7, Vista, and XP Service Pack 3 (SP3) to more efficiently maintain your computer and safeguard your privacy when you&#39;re online.&lt;br /&gt;&lt;br /&gt;1. Free up disk space&lt;br /&gt;&lt;br /&gt;The Disk Cleanup tool helps you free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.&lt;br /&gt;&lt;br /&gt;Use Disk Cleanup to:&lt;br /&gt;&lt;br /&gt;  *Remove temporary Internet files.&lt;br /&gt;  *Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).&lt;br /&gt;  *Empty the Recycle Bin.&lt;br /&gt;  *Remove Windows temporary files such as error reports.&lt;br /&gt;  *Remove optional Windows components that you don&#39;t use.&lt;br /&gt;  *Remove installed programs that you no longer use.&lt;br /&gt;  *Remove unused restore points and shadow copies from System Restore.&lt;br /&gt;&lt;br /&gt;Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.&lt;br /&gt;&lt;br /&gt;Use Disk Cleanup&lt;br /&gt;&lt;br /&gt;Window 7&lt;br /&gt;Windows Vista&lt;br /&gt;Windows XP&lt;br /&gt;&lt;br /&gt;2. Speed up access to data&lt;br /&gt;&lt;br /&gt;Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.&lt;br /&gt;&lt;br /&gt;Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer&#39;s hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.&lt;br /&gt;&lt;br /&gt;When to run Disk Defragmenter&lt;br /&gt;In addition to running Disk Defragmenter at regular intervals—monthly is optimal—there are other times you should run it too, such as when:&lt;br /&gt;&lt;br /&gt;  *You add a large number of files.&lt;br /&gt;  *Your free disk space totals 15 percent or less.&lt;br /&gt;  *You install new programs or a new version of Windows.&lt;br /&gt;&lt;br /&gt;Use Disk Defragmenter&lt;br /&gt;&lt;br /&gt;Window 7&lt;br /&gt;Windows Vista&lt;br /&gt;&lt;br /&gt;Windows XP&lt;br /&gt;&lt;br /&gt;3. Detect and repair disk errors&lt;br /&gt;&lt;br /&gt;In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.&lt;br /&gt;&lt;br /&gt;As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.&lt;br /&gt;&lt;br /&gt;If you use your computer daily, you should run this utility once a week to help prevent data loss.&lt;br /&gt;Run the Error Checking utility:&lt;br /&gt;&lt;br /&gt; 1.Close all open files.&lt;br /&gt; 2.Click Start, and then click My Computer.&lt;br /&gt; 3.In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.&lt;br /&gt; 4.In the Properties dialog box, click the Tools tab.&lt;br /&gt; 5.Click the Check Now button.&lt;br /&gt; 6.In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.&lt;br /&gt;&lt;br /&gt;    Check Disk Local Disk dialog box, with the Scan for and attempt recovery of bad sectors check box selected.&lt;br /&gt;&lt;br /&gt;    Example of Check Disk Local Disk dialog box&lt;br /&gt;&lt;br /&gt; 7.If bad sectors are found, choose to fix them.&lt;br /&gt;&lt;br /&gt;Tip: Only select the &quot;Automatically fix file system errors&quot; check box if you think that your disk contains bad sectors.&lt;br /&gt;&lt;br /&gt;4. Protect your computer against spyware&lt;br /&gt;&lt;br /&gt;Spyware collects personal information without letting you know and without asking for permission. From the Web sites you visit to usernames and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer&#39;s performance. To combat spyware, you might want to consider using Microsoft Windows Defender, which is included in Windows 7 and Windows Vista, and is available as a free download for Microsoft XP SP2. Alternatively, there are other free anti-spyware software programs available.&lt;br /&gt;&lt;br /&gt;5. Learn all about ReadyBoost&lt;br /&gt;&lt;br /&gt;If you&#39;re using Windows 7 or Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/2419661710760774242/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/5-ways-to-speed-up-your-pc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/2419661710760774242'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/2419661710760774242'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/5-ways-to-speed-up-your-pc.html' title='5 Ways To Speed Up Your PC'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3913150989333710592</id><published>2010-01-16T05:08:00.000-08:00</published><updated>2010-01-16T05:09:02.998-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="diagnose"/><title type='text'>Buy an Overstock Computer</title><content type='html'>&lt;!--– google_ad_section_start –--&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Increasingly, colleges and universities are expecting students to come to school armed with computers or to purchase one soon after arrival. Even at colleges where owning a computer is not a requirement its far more convenient for students to have their own than to wait in line at the library or computer center.&lt;br /&gt;&lt;br /&gt;Unfortunately, as computer companies continue to introduce newer and more High-End sophisticated systems the price for a personal computer is actually rising, not dropping as commonly perceived. While newer machines can do more than their predecessors, the cost to perform simple computing tasks such as word processing or balancing a check book is becoming prohibitively expensive. By purchasing overstock models, first time computer owners can meet their needs without spending thousands of dollars for a more expensive retail priced computer.&lt;br /&gt;&lt;br /&gt;When price becomes an issue, check the basics. Spending money for a computer which is faster and more expensive may not increase your productivity in the same proportion. Typing speed determines how fast you produce a letter more than the speed of the microprocessor. For most day-to-day uses such as writing papers or e-mail, the basics are more than adequate. The same is true for spreadsheet and database management applications on small files a low-powered computer will work just fine.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Processor Size and Speed&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;When comparing computers, two items to consider are the processor size and the speed. What does this mean? To use an analogy, suppose you have a tub full of water that needs to be emptied. You have a one gallon bucket to do the job and you can empty 2 buckets of water a second. Think of the water as information, the process of emptying the tub as information processing, the size of the bucket as the size of the processor, and the number of buckets you move per second as the speed. If you were to get a bigger bucket, maybe a two gallon bucket, and still move 2 buckets per second you would be emptying the tub (or processing data) twice as fast. If you keep the bucket the same but increase the speed you are moving to 16 buckets per second, you would again be processing twice as fast.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;RAM vs. Hard Drive&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Random Access Memory (RAM) is the temporary memory that is active only when the computer is on. This is the electronic space where the computer runs the operating system, the programs and the actual document you may be working on. Hard drive space does not lose its memory when the computer is shut off. As a rule, the computer will run more efficiently with more RAM as it can load more of a given program into memory without having to access the program electronically. If it has to access the program in the hard drive, it is slowed to the mechanical speed and access time of the hard drive.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Hard Facts on Hard Drives&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If your car sits in the driveway because your garage is so full of stuff, spring for the larger hard drive.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Final Considerations&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you&#39;re purchasing an overstock computer it&#39;s better to go with a reputable seller rather than an individual, that way you have some recourse in the event there is a problem. Most resellers will give you, warranty usually 30 days. Additionally, some will give you a money back guarantee minus a restocking fee. However, before you buy from any organization get some references and check with the Better Business Bureau to make sure they have a good track record.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3913150989333710592/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/buy-overstock-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3913150989333710592'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3913150989333710592'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/buy-overstock-computer.html' title='Buy an Overstock Computer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6584622094213569800.post-3680252062497185284</id><published>2010-01-16T05:07:00.000-08:00</published><updated>2010-01-16T05:08:10.790-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="diagnose"/><title type='text'>How to Choose the Right Computer Hardware - Top Tips For Zeroing on the Right Hardware</title><content type='html'>&lt;!--– google_ad_section_start –--&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;How to choose the right computer hardware is a question that almost all of us face at some point of time in our life, what with computers becoming part and parcel of our lives these days. With such a wide variety available though, the task of choosing the right hardware though, has become daunting indeed. If you are wondering then how to choose the right computer hardware, the trick lies in doing plenty of research before you zero in on your choice. Once you do your homework thoroughly, no dealer can take you for a ride.&lt;br /&gt;&lt;br /&gt;The first hardware that you need to choose is the processor of the computer. As we all know it is the heart of the computer. You need to check with multiple dealers before you narrow down your choice. Your ultimate choice will basically depend on the kind of applications that you are looking from your computer. Once you are sure about the things that you want to do with your computer, making this choice will become a lot easier.&lt;br /&gt;&lt;br /&gt;How to choose the right computer hardware is all about asking pertinent questions and getting the right answers from the various dealers that you meet. It is always preferable that you list down the entire hardware configuration that you want and keep it with you whenever you talk to a dealer. This will help you virtually &#39;talk the talk&#39;. Just in case you are not technically that proficient, you can always seek the help of someone in your family or a friend, who knows a thing or two about computer hardware.&lt;br /&gt;&lt;br /&gt;Patience is another key thing that anyone wondering how to choose the right computer hardware should have. You should not shop in a hurry, as you may end up making the wrong choice. Make sure that you do at least a bit of comparison shopping, as it will help you make the right decision, at the end of the day.&lt;br /&gt;&lt;br /&gt;People are always interested in finding an answer to the question, how to choose the right computer hardware as there are very few of them who know about it. You can come and check out my blog, computerhardwareblog.info to find something new and interesting about this.&lt;br /&gt;&lt;!--– google_ad_section_end –--&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onepcdoctor.blogspot.com/feeds/3680252062497185284/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-choose-right-computer-hardware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3680252062497185284'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6584622094213569800/posts/default/3680252062497185284'/><link rel='alternate' type='text/html' href='http://onepcdoctor.blogspot.com/2010/01/how-to-choose-right-computer-hardware.html' title='How to Choose the Right Computer Hardware - Top Tips For Zeroing on the Right Hardware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>