Sabtu, 13 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #5: The Origin of Computer Mouse

Posted: 12 Aug 2011 09:00 PM PDT

computer mouse Computer Trivia #5: The Origin of Computer MouseDo you know that the computer mouse you are actually using now was called “mouse” because  of the cord?

The computer mouse was invented by an American inventor named Douglas Carl Engelbart. The idea of the mouse started with his thoughts of finding way for people to interact with the computer screen. According to him, their team’s early ideas are having a big heavy tracking ball that looks like a cannonball, a different gadgets with pivot that moves around, a light panel and a joystick that when you wiggle will allow you to steer things. In the end, the mouse was invented. The first mouse looked like a wooden shell with two metals.

The mouse was first called x-y position indicator, then nicknamed mouse by one of Engelbert’s team mate. They were hoping that it would get a decent name once they released it to the world, apparently it did not and was called Mouse until now.

Incoming search terms:

Related posts:

  1. Computer Trivia #3: The Origin of the QWERTY Keyboard
  2. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  3. Computer Trivia #2: The Magic of 0 and 1 Digit
  4. Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl
  5. Computer Games and their Origin
  6. Computer Terms and Meanings
  7. Benefits Of Using A Computer Mobile Workstation
  8. The Importance of Choosing the Best Computer Virus Protection
  9. Computer File Recovery FAQ's
  10. What Computer Forensics Experts Can Find

Computer Trivia #5: The Origin of Computer Mouse - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Jumat, 12 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl

Posted: 11 Aug 2011 09:00 PM PDT

chernobyl virus Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl Do you know that on the  13th anniversary of Russia’s nuclear disaster that said to be the deadliest, a windows virus known as “chernobyl” damaged around 500,000 hard drive? Its screen name “Chernobyl Virus” was created because the first payload trigger of the said virus was coincidentally fall on April 16, 1999 which was the 13th anniversary of the Chernobyl disaster.

Chernobyl a.k.a. CIH or a spacefiller is a Microsoft Windows Virus that can literally destroy a computer. This virus that was written by Chen Ing Hau during his college days at Taiwan’s Tatung University way back 1998. Chernobyl is considered one of the most damaging viruses as it was created to infect Windows based operating system by overwriting crucial information on the infected system drives, and sometimes corrupting the system BIOS. It infects

Chernobyl virus transmit under the portable executable file format to some of Windows operating system like 95, 98 and ME. Luckily,Windows NT-based OS is free from this virus. It will then split its code into small bits and embed its parts into the inter-section gaps between files and then rewrite a re-assembly routine. Because of its method of just filling the gaps, the virus do not grow its size, making if difficult for the antivirus software to identify it. This acquired the virus its another name “Spacefiller

Related posts:

  1. Computer Trivia #2: The Magic of 0 and 1 Digit
  2. How Computer Virus Spreads Like Crazy
  3. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  4. The Importance of Choosing the Best Computer Virus Protection
  5. Computer Trivia #3: The Origin of the QWERTY Keyboard
  6. Tips on How You Can Avoid Virus Infections
  7. lsass.exe a system file or a virus?
  8. How to Check if you Antivirus is Working
  9. Computer Terms and Meanings
  10. What You Need To Know About Keyloggers

Computer Trivia #4: The Truth Behind The Virus Nickname Chernobyl - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Kamis, 11 Agustus 2011

PCTechNotes

PCTechNotes


How To Disable and Remove Thumbs.db

Posted: 11 Aug 2011 12:48 AM PDT

What is Thumbs.db

thumbdb How To Disable and Remove Thumbs.dbWhen you open your Windows Explorer or Open any of your images folder, I’m sure you have notice a small file inside those folders called thumbs.db. The main purpose of this file is to speed up the showing of thumbnails when you are viewing a folder in Thumbnail view. It stores thumbnails of graphics files, certain documents and also movie files. The only disadvantage of this file is it eats up disk space. Although this file is very small if you have lots of thumbs.db files on your drive removing them will help you save valuable disk space.

Some users are annoyed by those thumbs.db files cluttering their system. So if you are one of those people that don’t want those little files littering your disk then follow the steps below to turn this feature off.

How to disable Thumbs.db in Windows XP

  • Open My Computer or Open any folder
  • On the Menu bar, Click on Tools
  • Click on Folder Options
  • Click on the View Tab
  • Put a check in the option “Do not cache thumbnails”
  • Click Ok
  • Close My Computer

How to disable Thumbs.db in Windows 7

  • Open Local Group Policy Editor by typing gpedit.msc in the search text box
  • Expand the User Configuration found in the left-side pane of the Editor window.
  • Click Administrative Templates
  • Under Windows Components
  • Click on the Windows Explorer item.
  • Find the setting "Turn off the caching of thumbnails in hidden thumbs.db files" (see below).

disable thumbs db How To Disable and Remove Thumbs.db

  • To make changes, double-click on "Turn off the caching of thumbnails in hidden thumbs.db files"
  • Check the "Enabled" radio button and click OK

how to disable thumbs db How To Disable and Remove Thumbs.db

Close the Local Group Policy Editor and all those annoying those thumbs.db will disappear.

Related posts:

  1. How to Disable Windows XP Balloon Notifications
  2. How to Disable or Enable Your Task Manager
  3. How to Display Hidden Files and Folders
  4. How to Search the Internet from the Start Menu
  5. How to Remove Shutdown Button on Logon Screen
  6. How to disable User Account Control (UAC)
  7. How To Speed Up Disk Access by Disabling Windows XP Last Access Updating
  8. How To Show Recycle Bin On Windows 7 Windows Explorer
  9. Hiding folders – How to create an invisible folder
  10. How to Disable Auto Reboot on Windows Update

How To Disable and Remove Thumbs.db - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Computer Trivia #3: The Origin of the QWERTY Keyboard

Posted: 10 Aug 2011 09:00 PM PDT

computer keyboard 300x195 Computer Trivia #3: The Origin of the QWERTY KeyboardDo you know that the computer keyboard you are using right now began with the invention of the typewriter? The transition of the typewriter into computer keyboard was made possible by some technological development. Computer keyboard is also known as “The QWERTY keyboard”. It was invented by American inventor , Christopher Sholes.

The early computer keyboard was either a teletype machines or keypunches, and it includes a lot of electromechanical steps to be able to transmit data between keyboard and computer that slowed the process. Around late 70′s until now, all computers already been using electronic keyboards and VDTs. But the computer keyboard owes it original layout to Christopher Sholes, the inventor of the QWERTY keyboard.

Related posts:

  1. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  2. Computer Trivia #2: The Magic of 0 and 1 Digit
  3. Computer Games and their Origin
  4. How To Effectively Clean Your Keyboard
  5. Computer File Recovery FAQ's
  6. Mozilla Firefox Keyboard Shortcuts
  7. Computer Backup Programs – Online And Local Systems
  8. What Computer Forensics Experts Can Find
  9. Planning to buy used computer?
  10. Computer Terms and Meanings

Computer Trivia #3: The Origin of the QWERTY Keyboard - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Rabu, 10 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #2: The Magic of 0 and 1 Digit

Posted: 09 Aug 2011 09:00 PM PDT

computer binary digit 289x300 Computer Trivia #2: The Magic of 0 and 1 DigitDo you know that computer only understand 2 digits? That digits are 0 and 1, and they are called Binary. When you type any letters or characters in your keyboard, computer does not understand it the way we do. The character you typed will be translated to binary code designated to it. Like for letter “M”, it has binary code of 01001101.

Complicated, isn’t it? But believe it or not, that’s the way it goes.  If you are interested on knowing how it works, then try searching for Binary Numeral System. Good luck!

Related posts:

  1. Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer
  2. The Magic of the External Laptop Battery
  3. How To Make A Good Password
  4. Computer Terms and Meanings
  5. Poor performance?… It’s time to upgrade your Computer
  6. Swype Texting – Cell Phone Texting Is About To Change
  7. How Computer Virus Spreads Like Crazy
  8. 5 Signs to Know That You are a Computer Addict
  9. Benefits Of Using A Computer Mobile Workstation
  10. Computer Games and their Origin

Computer Trivia #2: The Magic of 0 and 1 Digit - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Selasa, 09 Agustus 2011

PCTechNotes

PCTechNotes


Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer

Posted: 08 Aug 2011 09:00 PM PDT

ENIAC Computer Trivia #1: ENIAC, The First General Purpose Electronic Computer

The first general-purpose electronic computer was a turing-complete digital computer known as ENIAC or Electronic Numerical Integrator And Computer was invented by John Presper Eckert and John Mauchly at the University of Pennsylvania. The construction of ENIAC began in 1943 and last until 1946. ENIAC  measured around 8x3x100 feet had 1,500 relays, 7,200 crystal diodes, 17,468 vacuum tubes, 10,000 capacitors, 7 0,000 resistors, and 5 million hand-soldered joints, and consumed 150 KW of power. Its speed was a thousand times than other electro-mechanical machines. It was designed for the purpose of calculating artillery firing tables for the US Army’s Ballistic Research Laboratory and was programmed to solve different computing problems.

 

 

 

Incoming search terms:

Related posts:

  1. Poor performance?… It’s time to upgrade your Computer
  2. Great Tips in buying a PC
  3. Planning to buy used computer?
  4. Internet Explorer 7 problems
  5. How Computer Virus Spreads Like Crazy
  6. Computer File Recovery FAQ's
  7. The Magic of the External Laptop Battery
  8. Computer Terms and Meanings
  9. Benefits Of Using A Computer Mobile Workstation
  10. Computer Games and their Origin

Computer Trivia #1: ENIAC, The First General-Purpose Electronic Computer - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


How To Easily Remove Google Redirect Virus

Posted: 08 Aug 2011 06:55 PM PDT

One of the most annoying computer infection I ever encounter is Google redirect virus. If you are reading this post,either you are my regular reader or  you’ve been a victim of this virus and wants to know how to remove Google redirect virus.

What is Google redirect virus?

For those who still don’t know how this virus works, let me give you a “hands on” explanation. Say you are searching Google for some research works, assignments or just random browsing. You found what you are looking for, you click the link, but to your dismay, you’ve been brought to a different site. The next link you clicked also brought you to the same site. And the site has no connection to your searches or to the site you are trying to open. In other words–you’ve been redirected! Some of your computer programs  won’t run, without producing any error. Also, this google redirect virus has a capacity to block sites.

Who  are usually the victim of this Google redirect virus?

Regular users like you are the usual victim of this Google redirect virus. This virus hijacks your Google searches and then redirect you to another website, that is usually a fake websites with advertisements or corrupted pages.

Where can you get Google Redirect Virus?

Don’t curse Google for this! Google has nothing to do with this virus. Blame it to the crazy head computer genius criminals who created and distributed the malware. You can usually get this annoying virus from visiting a malicious websites with unsecured browsers.

How can you get rid of Google Redirect Virus?

Of course that’s the question you want me to answer. You still don’t need to run to your computer technician or do some formatting to your computer. Follow the instruction below in removing the Google Redirect Virus.
If for some reason you are unable to download the file then TDSS may be blocking it. What you can do is to download TDSSKiller from a clean computer then transfer it to any external drive or USB flash drive.
  • Not that simple as  running a regular program. The creator of the google redirect virus is smart enough to know what TDSSKiller can do. But don’t worry we’re wiser than him. First, rename TDSSKiller by right-clicking the TDSSKiller.exe icon from your desktop and select RENAME. Now you can edit the name with any name you want but do not forget that it should end with the .com extension. For example,  asdfgh.com or 14344.com. Now that it is wearing a mask, you can proceed with the running of the program.

kaspersky tdsskiller scan How To Easily Remove Google Redirect Virus

  • Click the Start scan button to scan your computer for TDSS infection. It will then display a result screen to find out any infection was on your computer.
  • If the infection is on your computer, you can get rid of google redirect virus by clicking the Continue button. The TDSSKiller will now work on attempting to clear your computer from the infection. If you do not get the message Cure, then just choose the default action Skip and press Continue.  Do not attempt to change it to Delete or Quarantine as it may also delete the infected files that are needed for Windows to operate properly.
  • Once finished, it will give you a report stating whether the cleaning operation is successful. Reboot is required to finish the cleaning process, so click on the Reboot now button and let it finish the removal of the TDSS infection.
If you understand this, then this information may help in detecting TDSS:

Here is a list of antivirus vendors and their detection names for TDSS.

Definition Name
Anti-virus Vendor
Packed.Win32.TDSS, Rootkit.Win32.TDSS Kaspersky Lab
Mal/TDSSPack, Mal/TDSSPk Sophos
Trojan:Win32/Alureon Microsoft
Packed.Win32.Tdss Ikarus
W32.Tidserv, Backdoor.Tidserv Symantec
Trojan.TDSS MalwareBytes'
Backdoor:W32/TDSS F-Secure
BKDR_TDSS Trend Micro
Rootkit.TDss BitDefender
Generic Rootkit.d McAfee

 

Related posts:

  1. Get Rid Of The Google Redirect Virus
  2. How to Remove Virus from USB Device
  3. How to remove autorun.inf and prevent virus spreading and infection
  4. How to remove TAGA LIPA ARE! Virus
  5. How to Remove Huelar.exe (mscvhost.exe, winlogos.exe) virus
  6. How to Remove MSBLAST.exe worm virus
  7. How to Remove JAY.EXE and MVEO.EXE Virus
  8. How to remove SCVHOST.exe (W32/YahLover.Worm.gen or Win32/Autorun.R.worm)
  9. How to remove FUN.XLS
  10. How to remove Taga Xpress On Kami

How To Easily Remove Google Redirect Virus - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Senin, 08 Agustus 2011

PCTechNotes

PCTechNotes


How Computer Virus Spreads Like Crazy

Posted: 07 Aug 2011 08:57 PM PDT

Computer virus alert How Computer Virus Spreads Like Crazy

The most common ways that viruses spread are through email attachments, boot infections and program infectors. But aside from the given, there are some more ways by which viruses spread.

Computer Virus through disks

USB, Zip, CD's, tapes, etc. are the usual sources of virus spread from one computer to another. When you use disks to copy files from an infected computer, chances are, you can also copy the virus. To clean an infected disk, you can either reformat or use an anti-virus to clean and remove viruses. With CD's, there is nothing you can do to clean it. Once infected, you just have to throw it and never use it again.

Computer Virus Infections through networks

Networks such as peer to peer, LAN, WAN, wireless network, and internet are not safe. As they all serve the purpose of sharing network and information between computers, they are also sharing viruses.

Do you know that even a simple computer (like the one you're using) can be hijacked and used in attacking major online companies like Microsoft, Ebay, banks, etc. with the purpose of disrupting their online services. These attacks are also known as DOS Attack. DOS attack usually works by hijacking thousands of computers without the knowledge of the user, and then at a specific time, launch a combined attack from all the infected computers against the company they're targeting. You can protect your computer by using up-to-date anti-virus and firewall protection.

Other possible sources of computer virus spread

Other sources of virus spreads are downloading software, pirated programs, or even mp3 song and videos. As a matter of fact, the fastest growing sources of virus infections are the files and software downloaded directly from the internet. Make sure you are downloading your files from reputable companies to lessen the risk of downloading infected files.

The alarming and fast growing spread of viruses trigger the needs for proper knowledge of all computer users to protect themselves and their accounts from possible infection of virus. If you are using email or instant messaging system that is installed automatically with your operating system, you have to use the updated and current anti-virus software and change your default settings that leaves your system open even to minor attacks.

Incoming search terms:

Related posts:

  1. The Dangers of Instant Messaging
  2. Tips on How You Can Avoid Virus Infections
  3. Defining Worms – Worms and viruses are not the same thing
  4. The Importance of Choosing the Best Computer Virus Protection
  5. Your Computer Is Infected… And You Don’t Know It
  6. What are Rootkits?
  7. What You Need To Know About Keyloggers
  8. Email – The common route for viruses and frauds
  9. lsass.exe a system file or a virus?
  10. What Computer Forensics Experts Can Find

How Computer Virus Spreads Like Crazy - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks