Kamis, 21 Juli 2011

PCTechNotes

PCTechNotes


Tips on How You Can Avoid Virus Infections

Posted: 20 Jul 2011 12:59 PM PDT

computer virus infection Tips on How You Can Avoid Virus InfectionsI guess you know that computer viruses are everywhere. This guide will help you and your computer avoid being infected by viruses. There are many ways to help you prevent being infected by viruses having a good and an updated anti-virus will not always save you but it is one of the best way to prevent it.

Types of viruses

There are lots of types of viruses most of them are simply programs or scripts that will cause various problems or damage to your computer such as corrupted files, creating a copy of itself, deleting your hard rive files etc. Most of the viruses spreads itself by mailing themselves to people on your address book and some of them will try to convince you to open the attachment, But that trick never worked on me. In fact, I found myself emailing people just to make sure they really did send me something. It does not hurt to be safe.

Worms

Worms are different kind of virus but the same idea. Worms are designed to copy themselves a lot on a network and they usually eats up bandwidth by sending commands to servers to be able to get in. When the worm successfully infiltrate the system it will try and go into other servers from there. Some worms such as the SQL slammer will simply send themselves over and over so many times that they will clog up networks, and sometimes all of the internet. Worms usually affect servers more than home users, but again, this depends on what worm it is. It is suspected that most worms are efforts from the RIAA to try to stop piracy, so they try to clog up networks that could contain files. Unfortunately, the RIAA have the authority to do these damages and even if caught, nothing can be done.

Trojans

This type of virus is simply like a server that hackers use to get into the computer. An example of this is Subseven, it can enable a hacker to do various things such as control the mouse, eject the cd-rom drive, delete/download/upload files and much more.

MBR viruses

Boot Sector viruses are similar to file viruses but they go into the boot sector. These type of virus is hard to remove and can cause serious damage when the computer is booted, some of it’s kind can easily erase all the data on your PC just by booting your computer.

Most viruses have different characteristics. For example, a worm can also be a trojan and also infect the boot sector. It all depends on how the virus is written and what it is designed to do. That's why there are not really strong structured categories, as they can easily mix one in the other.

Know the potentially dangerous files

Just like any other files, viruses must be opened before they can do damage. Most of them comes from e-mail attachments. Most of this type disguise as someone you know and convince you to open the attachment. My great advice: Never open attachments at any cost! Some viruses will infect files in programs, so opening a program will actually open the virus, maybe the same one, or another part of it.

All files have what is called an extension; This is the 3 last letters after the last period. For example, setup.exe has a file extension of .exe.

Extensions to watch out for are .exe .com .bat .scr .pif .vbs and others, but these are the most seen. .exe .com .bat .pif and .scr are valid extensions for executables. A virus writer will simply rename it to one of these and it will work the same way. .pif is a shortcut to an ms-dos program and will have the ms dos icon, but will still execute whatever code is in it, so an .exe can be renamed to .pif and be run the same way. .bat is a batch file, which can contain instructions to do various file activities, but again, a .exe can be renamed to .bat and it will execute it! .vbs is a visual basic script. For some reason, Microsoft provides this scripting language along with the scripting host to make it more convenient to design and write viruses quickly and easily, I've never seen another use for this scripting language other than for writing viruses. There are programs that are written with that language, but it is compiled into an exe. Exe is the usual extension for programs, you would not have a software CD install a bunch of vbs files all over!

Bottom line is, if you don't know what a file is just don't open it. Some viruses will sometimes be named a way as to mask the real file extension to make it look like a harmless file such as a image file. This is easily noticed, but can still be missed. Simply don't open unexpected files.

If you get something that appears like something legit, just ask the person it came from if they sent it. Most viruses use a friend's address to make it look like it comes from them. The virus does this by using the person's address when sending itself to the address book contacts.

Downloads

Email is not the only source of viruses you can also get viruses from P2P file sharing programs such as Kazaa, Bearshare, Limewire, direct connect etc.

Watch out for the size when you are downloading programs. When you see a program that you expect to be rather large such as game don’t download it, don’t get files that is 10KB it is more like to be a virus than a legit file. File size is not the only thing to watch I've been caught with a virus even with large files, as an exe is still valid even if junk is added at the end, so a 64KB virus will still function even if it is turned into 650MB.

You should look for icons, fortunately, virus writers don't take time to put icons. If you are downloading a setup file your setup file should have setup icon if it’s blank that file is more or less a corrupted file or a virus.

Best advice after downloading and before opening a file is to scan it with an updated antivirus. but rely on your antivirus as we all know virus scanners are not perfect, if the virus has not been reported to them yet, they won't know to create a definition for it!

Changing settings to stay safe

If you happen to open a virus and you want to avoid the virus from infecting your friends the simplest to do is not to use the windows address book. It’s very easy for viruses to get through windows address book and unfortunately Microsoft is not doing anything to fix it. Just put them in a spreadsheet or even better write them down somewhere. Don't use the address book!

Avoid using the auto preview some viruses can open themselves just by opening the mail. There are security holes in Microsoft mail programs that allow this. To disable auto preview on Microsoft outlook just click on the menu and remove auto preview. remember to do this for every folder but the inbox is most important. In Outlook Express, click on the view menu and go to layout. In the dialog box, you will see a check box for show preview pane. Uncheck it and click ok.

Removing a virus

Sometimes a clean install wont remove viruses the best way is perform a low level format. This is especially true of you got a boot sector virus, as even repartitioning and formatting won't quite remove it, but sometimes you can get away with an fdisk /mbr, but not all the time. Use good virus removal tools but then again clean install is always the best way to ensure that it's gone for good.

Viruses are out there, don't be one of the many infected ones! Stay alert and stay safe! Don't open unexpected files, regularly update your virus definitions and scan downloaded files!

I hope this article was useful for you!

Related posts:

  1. lsass.exe a system file or a virus?
  2. The Dangers of Instant Messaging
  3. The Importance of Choosing the Best Computer Virus Protection
  4. The facts about CHKDSK
  5. How to Check if you Antivirus is Working
  6. Be vigilant and a little paranoid – How to avoid keyloggers
  7. How to Defrag Multiple Hard Drives at once in Windows XP
  8. How to Easily Clean IE7 Browsing History
  9. How to Fix Slow File Transfer in Windows Vista
  10. Great Tips in buying a PC

Tips on How You Can Avoid Virus Infections - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Rabu, 20 Juli 2011

PCTechNotes

PCTechNotes


Common Troubleshooting Techniques & Strategies

Posted: 20 Jul 2011 12:58 AM PDT

Here are my five common-sense techniques and strategies to solve common computer hardware problems.

Swap Components (Trial-and-Error)

Personal computers by design are highly modular. The most effective way to troubleshoot your PC is by isolating the problem to a specific parts by trial and error. In this method you swap compatible components and see if the system works. Try other components or peripherals on different machines and see if the problem still occurs. Remember also to make one change at a time. This is a very effective method on locating a PC problem.

Check the cables

Almost 80% of all PC problems are related to cabling and connections. You must ensure that all cables are connected firmly. IDE and floppy ribbon cables and power cables can often go loose. Check if your microprocessor, memory modules, Video adapters and sound cards are inserted correctly and didn't "pop-up" during transportation.

Don't get frustrated

Don’t get frustrated and don’t be afraid of the computer problems consider it as the best opportunity to learn. For me troubleshooting is a fun part of having a computer. Just think of the satisfaction, the knowledge and experience it will give you after you solve the problem.

If you feel frustrated just leave it for a while, take a minute rest then go back with your fresh ideas to solve the problem or if it’s too much to handle seek help call someone who can help.

Rule of thumb: You shouldn't spend more than three hours on the same problem at one time.

Take down notes

Taking down notes will be very helpful. Take notes of what you have done and all the error messages. Those notes will be valuable if you encounter the same problem. For instance, when you see an unusual blue screen with an error message, copy the entire message onto a piece of paper. In many situations, that message may point to the right direction in getting the problem solved quickly.

Look inside

Don’t be afraid to open and look inside of your computer. It’s OK to look inside your PC There is only 5V and 12V DC voltage supplied to the components outside the power supply. But always remember to power down and unplug the power chords before opening your computer.

Related posts:

  1. Email – The common route for viruses and frauds

Common Troubleshooting Techniques & Strategies - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


How to Disable Registry Access in Windows 7

Posted: 19 Jul 2011 08:50 PM PDT

disabled registry How to Disable Registry Access in Windows 7

The Registry area is a very dangerous place when you don’t know what you are doing. One bad move can really mess up your system. If you are sharing your computer with your friends or family members and afraid that they might access your registry and mess up your computer pretty bad then you should consider disabling registry access. You can disable registry access by using Local Group Policy Editor (Local Group Policy Editor is not available on Windows Home editions.

Type gpedit.msc into the Search box in the Start menu.

gpedit How to Disable Registry Access in Windows 7

Go to User Configuration –> Administrative Templates then select System

Under Setting, double-click on Prevent access to registry editing tools.

local group policy editor How to Disable Registry Access in Windows 7

Select the radio button next to Enabled, click OK.

Close Group Policy Editor.

disable registry editing How to Disable Registry Access in Windows 7

If you have a Windows 7 Home or Starter version, you can use this simple tool called Registry Enabler & Disabler to disable your registry. This utility also works on XP and Vista.

registry enabler 300x116 How to Disable Registry Access in Windows 7

Related posts:

  1. How to Restrict Other Users Access To Your Applications
  2. How to Protect the Privacy of your Explorer searches
  3. How to Disable Autoplay of USB Drives and CD's
  4. How to Disable Internet Explorer
  5. How to add Vista Home Directory to the Desktop
  6. How To Disable Automatic Hyperlinks in Microsoft Word
  7. Windows 7 Shortcuts
  8. How Create a System Repair Disk in Windows 7
  9. How to find the right Registry Cleaner
  10. How to disable PC speaker beeping on errors

How to Disable Registry Access in Windows 7 - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Minggu, 10 Juli 2011

PCTechNotes

PCTechNotes


How to Fix “Oops, Yelp is overworked right now”

Posted: 10 Jul 2011 04:20 AM PDT

Oops Yelp is overworked right now How to Fix Oops, Yelp is overworked right now

I was  about to help a client sign up on several high quality local listing such as Google Places, Local Yahoo, Bing Business Portal, Yelp etc. I was successful with other local listing site. I didn’t experience any troubles signing up and adding business with them. However, when it’s time for me to register on Yelp, a problem came up. I encoded all the required details but when I hit the submit button this error showed “Oops, Yelp is overworked right now“. At first I thought Yelp was having a bad time that day so I waited for several hours and hit the submit button again but still no luck. I waited a couple of days but Mr. “Oops, Yelp is overworked right now” showed up again.

That is the time I investigated the issue. My first suspicions were first they do not support Philippines or my IP is banned (disadvantage of using a dynamic IP). To solve the problem I tried signing up using a proxy site and that’s it problem solved. I successfully registered an account and continue adding the place. Even though I managed to solve the issue I still can’t figure figure what went wrong. Is my IP banned from registering from their site or they just don’t allow accounts from Philippines?

I’m sure I am not the only who experienced and still experiencing this problem. To also solve the same Yelp problem just sign using a proxy. There’s a lot of free proxy sites out there, just ask Google and he will give you lots of them.

Be careful in choosing a proxy site there some of them that has malwares. After signing up, login using your regular IP and change the password. It is also advisable to have a good anti malware on your computer.

Related posts:

  1. How to Fix “Twitter is Over Capacity” When Uploading Custom background
  2. DigiWallpaper.com – My Wallpaper Site
  3. FREE Instant Backlink Builder! – Build Unique Backlinks to Your Web Pages Everyday for FREE!
  4. Define A Word Using Google
  5. FREE Traffic Exchange / Stumbleupon Exchange
  6. How to know when someone Dugg your article
  7. Watch what your visitors are doing on your site
  8. How to Easily Create Randomly Generated Identity
  9. How to Search Effectively on Google
  10. Manny Pacquiao vs Ricky Hatton Live Stream

How to Fix “Oops, Yelp is overworked right now” - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Minggu, 19 Juni 2011

PCTechNotes

PCTechNotes


Hidden Skype Emoticons

Posted: 18 Jun 2011 07:27 PM PDT

skype emoticons Hidden Skype Emoticons

I’m sure you’ve heard of Skype, well if you have not not… Skype is a FREE call and chat software, it has the same function with Yahoo Messenger.  The main thing you can do with Skype is call and chat. Just like other chat applications you can use lots of emoticons available on Skype. But did you know that there are secret emoticons that you can use to impress and make fun of your chat mates?

Here are the list of hidden Skype emoticons you can use aside from the built emoticons of Skype.

emoticon 00173 middlefinger Hidden Skype Emoticons Finger (finger)
emoticon 00174 bandit Hidden Skype Emoticons Bandit (bandit)
emoticon 00175 drunk Hidden Skype Emoticons Drunk (drunk)
emoticon 00176 smoke Hidden Skype Emoticons Smoking (smoking)(smoke)(ci)
emoticon 00177 toivo Hidden Skype Emoticons Toivo (toivo)
emoticon 00178 rock Hidden Skype Emoticons Rock (rock)
emoticon 00179 headbang Hidden Skype Emoticons Headbang (headbang)(banghead)
emoticon 00180 bug Hidden Skype Emoticons Bug (bug)
emoticon 00181 fubar Hidden Skype Emoticons Fubar (fubar)
emoticon 00182 poolparty Hidden Skype Emoticons Poolparty (poolparty)
emoticon 00183 swear Hidden Skype Emoticons Swearing (swear)
emoticon 00184 tmi Hidden Skype Emoticons TMI (tmi)
emoticon 00185 heidy Hidden Skype Emoticons Heidy (heidy)

emoticon 00172 mooning Hidden Skype Emoticons Mooning (mooning)

Related posts:

  1. Will the iPad Be the Best Tablet for Long?
  2. Internet Explorer 7 problems
  3. How to Choose a Reliable Antivirus

Hidden Skype Emoticons - PCTechNotes :: PC Tips, Tricks and Tweaks - PC Tips,Tricks and Tweaks


Jumat, 03 Juni 2011

Your Yahoo! account information has changed

The following mobile number (+62 8-572-690-1505) was added to your Yahoo! account ‎(ar********)‎.

You can now use this mobile number to recover your account in case you ever forget your password. To ensure that your account information remains accurate and secure we notify you whenever this information changes.

This change request was made on June 04, 2011 at 01:48am UTC.

If the changes described above are accurate, no further action is needed. If anything doesn't look right, follow the link below to make changes:
https://edit.yahoo.com/commchannel/manage?ar=2&ea=JCKFE..gzdEJ8ixmPzQWkINOTIlc8XrdOWa6GQVa9TrIL4jlcOQCkIzV2t2_9jKQoB7aXPQ0Um5SpTFskiL8GgKK43OtHDOxf0ZQY.ZnVYqmdFXiDQ--&intl=us&done=https%3A%2F%2Fedit.yahoo.com%2Fconfig%2Feval_profile


Regards,
Yahoo! Account Services
-------------------------
Please do not reply to this message. Mail sent to this address cannot be answered.

Your Yahoo! account information has changed

The following email address (chipandale@plasa.com) was deleted from your Yahoo! account ‎(ar********)‎.

To ensure that your account information remains accurate and secure we notify you whenever this information changes.

This change request was made on June 04, 2011 at 01:47am UTC.

If the changes described above are accurate, no further action is needed. If anything doesn't look right, follow the link below to make changes:
https://edit.yahoo.com/commchannel/manage?ar=2&ea=W4_sSsjXzdEcrfL_GEr9lRkCZNVmqSTFP_..QJBG85hzqdVK32LTEt7VVGCp8pONx08vY9YebjVqzArp0ENKWsiRNisMqA4A3821_prt6jn6r4jnvQ--&intl=us&done=https%3A%2F%2Fedit.yahoo.com%2Fconfig%2Feval_profile


Regards,
Yahoo! Account Services
-------------------------
Please do not reply to this message. Mail sent to this address cannot be answered.

Verify this email address




  Verify this email address
 
 
  You recently added a new email address to your Yahoo! account, or initiated verification of an existing email address. To verify that you own this email address, simply click on the link below.  
 
  Your email address was added to the Yahoo! ID: ‎ar*.******‎. If this Yahoo! ID does not belong to you, or you did not recently add your email address to this Yahoo! ID, you may permanently stop receiving messages for this Yahoo! ID at this email address. Please let us know.  
 
  Verifying your email address ensures that you can securely retrieve your account information if your password is lost or stolen. You must verify your email address before you can use it on Yahoo! services that require an email address.  
 
  For your security, please keep your email address information up-to-date. If this information changes, you can always update it by signing in to your Yahoo! account and changing it from the "My Account" area.  



Verify "tanjakansekaran@gmail.com"


  If you can't click the sign in button, you can verify your email address by copying and pasting (or typing) the following address into your browser:  
 
  https://edit.yahoo.com/commchannel/verify?.intl=us&p=sSDrEIO3BwlnN_UxPunFBOdadjRfPNKnevXgC
jFyo2vPsEH8tHONjhI8IwzFPfEThrJMr3OInUmLKmqOMZKCqvHg9K36M9Wj.B54P1oSWgNU&.partner=&done=
 
  Not your account?

      If you did not create this account, click here

    Si vous n'êtes pas le créateur de ce compte, cliquez ici

    Si no creaste esta cuenta, haz clic aquí
 

 
 

Copyright © 2011 Yahoo! Inc. All rights reserved.Copyright/IP Policy | Terms of Service

NOTICE: We collect personal information on this site. To learn more about how we use your information, see our Privacy Policy.