Saturday, August 27, 2011

Computer hard drives and repairs

!±8± Computer hard drives and repairs

The computer's hard drive is an important part, because it uses the long-term storage of data. Use magnetic surfaces on which data is stored digitally. He was in his early years, the removable media on the root disk, such as floppy drives, and others, but over time the units and the average (the real custodians of information) to a whole body.

The writing and reading functions into your hard disk to the head, a small electromagnet assembly is performed. Thecapable of every disk sector for the stored data. There are a number of disks in a spindle, which allows a rapid rotation of the head to read and write data quickly consumer is located. The speed of the hard drive is one of the most important characterizations.

There are three interfaces to a hard drive that is used to install on your system. The first is the IDE connector. It 'used to transfer data to and from the unit. There is usually a red line that tells youin which direction you should point the cable. The red line should always be on the side of the supply network. The new units are unable to make mistakes because they are limited by a small object captured. The network connection is that the hard disk is connected to the mains. The jumper block is the last interface to use. It 'did for the unit is functioning properly over the place in which the cable is set. Usually when you install itslave - the end of the cable, the jumper must be set to master, and in other situations. There is also a function of cable select, but can not work properly with some motherboards, so it is better to be adjusted manually for him.

After the successful installation of a hard disk, you should verify if the BIOS can correct. This is the BIOS setup, which is done by pressing a special key after sending the second computer may begin. This is usually the place where theRepair work begins. If you do not recognize the hard drive can be manually and make sure that the installation is done correctly you should consider a possible hardware problem. Try listening to the sound of the hard drive. The spinning causes a constant low level noise is usually detectable, if you listen carefully. This will tell you if the unit is actually running or not. If there is a scratching noise, you should immediately shut down and do your running for the repair of a professional, becauseprobably the damage is too mechanical. The interior of the body of the hard disk of dust and free air, and so you should never try to open them if they are not a specialist.

If the hard disk is permanently damaged, there is little chance for recovery. This is achieved by removing the media from the disk and puts it on a special disc made for the recovery, but if there is physical damage on the turntable, the data is probably beyond recovery. For this reason, it is necessaryimportant information together in more than one location. If you have many partitions the data set will not help if the other side are all on a hard drive. Always be taken seriously, as you can store and use the data on your hard drive.

Now I will discuss some information for people who have more interest can be restored to your hard drive. The first is an MS-DOS command called debugging. It will operate in a very direct machine code. The understanding of this code is veryimportant part of this process. For example, you could give D40: 0, and this will give you a few lines of information. The first tells you all ports that are in your computer. Of course, you will see it only if the codes F8 03, COM1, is white F8 02 - COM2 and so on. Use the command "q" to exit the shell.

Other useful information you need to know is why some software is not supported are possible. For example, Windows 95 does not support hard drives over 32GB. It 'was designed to not need this kind of support when it was created. It 'the same with the file systems - FAT16 is not possible if the partition size is limited to 4 GB. You should always think about what is supported, because this is your last line.

The closure of the hard drive is another interesting topic. It 'made by a simple blocking and unblocking commands. Like for instance, if you lock the partition with the letter C, you should block type c: and unlock c: aunlock. This can cause problems if the disc is locked, if you require the installation of software, operating system or try other activities, the special write access.

Let me conclude this article with recovering deleted information on lost or missing files from your hard drive. This is very important to know because you could save a crucial fact. First make sure that the files were actually deleted. Try to find all of the units, because sometimes it is possible thathave simply been postponed. Check if you have a backup of the file. If you have one, it will be easier to recover from it. Many operating systems are rubbish, and if you accidentally delete a file you can find it there too. If you can not restore the file as follows and if it is actually deleted, you should know that only the link was deleted from the file system. Now the important thing is not to write more data on this drive, because you want to restore the file isAs free space and can be completely deleted when you write data to it.

To recover lost data using freeware software like Undelete Plus or to purchase a better, if you need. This is also a good time to check for professional help.


Computer hard drives and repairs

Swag Plug In Lamps Get It Now! Coupon Proraso Shaving Power Wash Equipment On Sale

Tuesday, August 23, 2011

Malicious programs - prevention is much easier than cure

!±8± Malicious programs - prevention is much easier than cure

Just as motorists traveling at 10 mph below the speed limit in the left lane, to the programmers who create and distribute targeted malicious computer programs do not know. They do not seem to have a great knowledge and know-how, but they can do to figure out how to work by simply following the rules. This article will briefly cover the most vulnerable to computer viruses and compromised computer as the computer and the data value much lessvulnerable to a malicious executable file, or "virus".

Malicious executables

All malicious programs are "executable" files. On computers running MS-DOS or Windows-based operating systems .. Exe and com are common extensions for these files.

Virus

A virus is a program created for the sole purpose of destroying the data on your computer. The virus does not destroy important files, or it can be programmed to be to delete all files. A virus can lead an infected computercertain actions at certain times or serious issue commands such as deleting the entire registry, completely disabling the operation and the computer starts.

Viruses are executable files that are distributed are from friends, you download from the Internet or install even for us. A virus is often used as a Trojan horse that acts as a carrier for the virus to come in disguise.

Trojan

A Trojan is a program that seems to be generally safe, but it contains somethingdamaging the inside of a worm or virus. You can download a game or a picture, provided that it is harmless, but if you run the file, the worm or virus to work. Sometimes you just get annoying, but many are specifically designed to cause serious damage to the system.

Worm

Worms work a little 'different. These programs are replicated over and over again. Worms usually come from email client. The machines are infected when the user requests a file Trojan thatcontains a worm against him. Most of these programs are designed to e-mail address books stored on a mail server or hard drive to use. When you open a Trojan-mail attachment that contains a worm, worms, Trojan says with all the e-mail for distribution and per e-mail address in order to repeat the process.

The "Love Bug" is a good example for each of the above. It 'a Trojan horse, because it is "Love Letter" in disguise, if indeedConstruction of a malicious program. This is a virus, because once executed, it infects files on your computer, transforming them into new trojans. There is a worm that spreads itself by everyone listed in your e-mail or IRC client.

Bacteria

Bacteria are programs designed simply to replicate themselves many times, with a consequent lack of resources or slow down your computer.

Spyware

Spyware is usually designed to access marketing data from your computerand send it to a web server that stores information in a database. Since these programs are relatively easy to develop and distribute, have become popular with identity theft.

Botnets

Similar to spyware, botnets are the applications developed by software programs on individual computers and computer networking companies and organizations in the installed copy. Once the network has been exploited, usually the master command of the botnet botnets, which are on the rest ofNetwork and implementation of measures by the central server.

Computer-based prevention

Note - If the computer on a local area network or LAN from your dealer or you have a laptop that is sometimes in a LAN, do not change configuration settings without first checking with your network administrator.

Installing antivirus software is important, but every year more and more anti-virus software alone is not enough. If you are using an MS-DOS or Windows-based operating systemsSystem the following precautions will greatly reduce the chances of contracting the infection and are now mandatory in many large companies:

1 - Do not store or install programs ("setup.exe") on your hard drive. Many viruses replace these files with corrupted file installation makes it easy to accidentally "install" them.

2 - Most anti-virus programs allow you to scan files before opening them. Scan all executable files before opening them.

3 - Use"Classic View" instead of "Windows XP" or view the "web" in Windows Explorer. Many viruses use to replace the file "Folder.htt" "Windows XP" screen with a corrupt VBScript. Once infected, each time you use Windows Explorer, create a folder, perform a virus that has slowed noticeably at the computer screen. To switch to "Classic View", proceed as follows:

"Right-click" on the taskbar (bottom of the screen), select "Properties", then "Start Menu". Select "Classic Start Menu".

4 - Do not"Hide extensions for known file types". By default, Windows Explorer hides the extension of known file types, and as popular. Doc e. Rtf. Most of the viruses that are carried out by e-mail using this vulnerability. Once on your hard disk, the virus can display the same icon for a Microsoft Word document, but is actually a malicious executable file attachment. You would never know that the file ". Exe" instead of one. "Doc", because the extension is not visible. To correct this, open anyFolders from the toolbar, choose "Tools", "Folder Options", "View" and uncheck "Hide extensions for known file types".

5 - Know what programs on your computer during the commissioning of the system is running. Select "Start" "Run", type "msconfig", press "OK" or hit "Enter". Select the "Start" and watch programs whenever you restart the computer. Become familiar with each program and check regularly. In this way, if something seems strange. Recognize

The software-based prevention

Note - If the computer on a local area network or LAN from your dealer or you have a laptop that is sometimes in a LAN you need to install any software without first consulting your network administrator.

Anti-virus software is crucial. AVG Anti-Virus is an excellent program and is offered in a downloadable version for free at grisoft.com.

Spyware is often overlooked by anti-virus algorithms. There are many good anti-spywarePrograms.

A free version of Spybot Search and Destroy can be downloaded at: Safe-networking.org

A free version of AdAware SE Personal can be downloaded at: lavasoftusa.com / software / adaware /

I use Spybot and AdAware both and I have several cases in which the items discovered missing from a program in other states. After running a scan with both programs, I never lost face each article when the article was an Active X control

"Active X"Controls (Flash, Swish, etc.), are elements that Internet users have benefited enormously. They allow web sites to life with multimedia effects, interactive objects and create complex applications, providing a dynamic user.

Unfortunately, they can easily be handled in spyware / adware. These objects are often overlooked by anti-virus and anti-spyware. SpywareBlaster is a program that was developed specifically to recognize and prevent the installation ofCorrupt Active X controls A free version of SpywareBlaster can be downloaded at: javacoolsoftware.com / spywareblaster.html

After installing each program, take the time to read the "Readme". Familiar with the application and how it works. Many times the standard configuration of these programs can cause the program to avoid conflicts with other applications or devices on your computer. Of course, it will not be able to manipulate the program until it meets your specific needs, ifYou are not familiar with him.

Use once installed, and maintain these programs to a minimum, updated on a weekly basis. With all anti-virus and anti-spyware to keep an eye on the "Ignored Items" list when you open the program. (Some malicious programs have figured out how to get even "ignored", taken from the scanning software). If you find that all elements have been verified as "Item Skipped", simply uncheck the option, and training with the scan usually do the trick.

InFinally, I can tell you from experience - when it comes to making a piece of malicious programs, prevention is still hard to get much easier than cure!


Malicious programs - prevention is much easier than cure

!8!# New Hp Photosmart

Thursday, August 18, 2011

Executable file extensions

!±8± Executable file extensions

In this article I want to cover extensions to save files that represent various types of electronic documents used. More precisely, we discuss, EXE, SYS, COM, LNK and extensions of DLL files.

There is a possibility that one wonders what happens if you select specific application in Windows and restart. If you start some applications from the Start menu, what really happens is that Windows starts

Exe associated with this application. Exe stands for executable.This file contains instructions in machine language, which works as a computer and the result will be encoded in a functional application.

In pre-Windows world of COM extension file was very popular. Stands for the command file and is used by MS-DOS to use the file.

SYS file is eXtenson file system. It 'very frequently used by the operating system in order to save the parts of executable code. An example of SYS-CONFIG.SYS, which are used to store system configuration. Another example ispagefile.sys, the Windows swap file (disk dump of system memory) stores.

LNK is a file format which stands for LINK. This file connects an entry in the Windows Start menu with an executable file (EXE or COM files). Helper DLL contains system code that is used by applications for specific functions. File Extension DLL stands for Dynamic Link Library.

Each group contains a small executable commands, knows only the computer's CPU. It can decode these files using disassembler.But not for average PC users, to recommend to do this. Executable files are usually very difficult to see and could only be viewed and edited by professional software engineers.

If you can not open the executable file can be something broken in the Windows operating system. To check for problems that can be read by Windows documentation. Another option is the Windows registry errors. To check for errors in the registry, you can download the registry cleaner.


Executable file extensions

Prices Recumbent Bike Stamina 6 Wheeler Atv Buy Now Shop For Forerunner 310xt


Twitter Facebook Flickr RSS



Français Deutsch Italiano Português
Español 日本語 한국의 中国简体。







Sponsor Links