Pc repair course was developed by Shane Hale who has been in the computer repair industry as well and telecommunications for 11 + years.
Thursday, September 23, 2010
Internet Marketers Mental Block and Deadly Bears!
Tuesday, September 7, 2010
Different hard drives of a computer
Cool article on the different types of harddrives at pctips
What is a hard drive? Often people think a hard drive is their entire computer system as they see it, and others think that it is something hard or solid in the computer. It actually is a storage device inside your computer, and yes, it is hard. . This is hiding inside your computer and is where all your data is stored when you save it. You may never see your hard drive unless you happen to open up your computer to fix a problem. A hard drive is merely one of the many components that contribute to your computer system as a whole.
What is the difference between Hard disk and Hard drive?
It can be confusing when someone is talking about a hard drive and you call “it” a hard disk or hard disk drive. You think to yourself “what are they talking about?” Well this is crazy, but they are talking about the same thing. A hard disk and a hard drive have been made up over the years. Originally the main storage device was called a hard disk and we had floppy disk drives. Eventually the words got mixed up and blended.. That’s my theory anyway.
3.5″ Desktop Hard disk drive:
The picture below shows a 40 gigabyte (the size or capacity) hard drive, 7200RPM (the speed or revs per minute). The 3.5″ hard drive is pictured on the left. We used to only have one option when buying a hard drive, however now there are three or more types to choose from. See more pictures of hard drives .
2.5″ Laptop Hard disk drive:
A laptop hard disk drive is considerably smaller than a normal desktop hard drive and also cost more. If you wanted to buy a 500gb laptop hard drive it would be very expensive, whereas a 500gb desktop hard drive is around $100. See more laptop hard drives .
Cd rom or DVD Drive:
This is where you put a cd rom or a DVD disc in. It could be a drive that can also read and write on cds or DVD disks. Plain old Cd roms are nearly obsolete as everyone now wants a DVD burner.. With dvd rom drives you can backup your dvd’s onto a DVD writeable disc. There is no point buying a cd rom when dvd rom drives are the same price and have more features.
Floppy disk drive:
This is the smaller drive that takes those little plastic square shaped disks. They are rarely used now as they are no longer needed for a boot disk if you have a cd rom or DVD burner. In fact most new computers are sold without a floppy disk drive as they are obselette.
External Hard drive:
An external hard drive can come in two sizes like the desktop hard drive and the laptop hard drive. After all an external hard drive is just a case housing one of these hard drives. So if you have a 2.5″ external hard drive , this means it contains a laptop hard drive.
Now days we every second household owns an external hard drive. They are used to store files on safely away from the computer you are working on. For example, you can save your photos onto an external hard drive and if your computer crashes they will still be safe because they are not stored on your computer. There is no excuse if you do not own one of these fantastic storage devices as you can buy a 1 TB external hard drive for well under $100. That size hard drive can hold thousands of movie, songs, and more… It will store everything.
Shane
Saturday, August 28, 2010
How to Increase Wifi Distance in your Home
You can extend the wifi range of your wireless network if you experiment with various techniques. Because there are so many variables involved with consumer WiFi, you will need to experiment to determine what works best with your scenario, the structure of your home and the equipment you use. All of those things play a roll in the range of your network as well as its reliability. While we always try to find the cheapest solution, you may find additional equipment is necessary to achieve your wireless goals.
Tips For Increasing The WiFi Distance
Centralize your router. This is one of the easiest things you can do to gain maximum coverage area for your WiFi network. Normal WiFi antennas emit signal outward in all directions. If your router is situated near a wall in the corner of the house, much of the signal is being absorbed by the wall behind it and leaking outside. If you place the router in the center of the living area, you will extend the range to all usable areas of your house.
Purchase a high gain antenna. If your router has a detachable antenna, you should be able to add a high gain antenna. These types of antennas are more directional than your standard antenna and allow you to focus your WiFi signal toward an access point or your computer. You can also make these, which are often referred to as “cantennas,” but you’ll probably have better results if you purchase one. High gain antennas are a great way to shoot the WiFi signal across a house or even a yard. But in order to achieve maximum range, you should have line of site to the target.
Add a WiFi Repeater. You can add a Wireless Access Point (WAP) to considerably extend the range of your wireless network. These are often referred to as “repeaters” or “extenders.” Depending on the size of your home or office, usually one repeater will be enough to cover the entire area. You will want to place the repeated as far as you can away from the router without losing more than twenty percent of the signal. The WAP will then reconstitute the signal pass it along to any devices within its range. Here is an example of a WiFi Extender Cisco-Linksys Wireless-G Range Expander WRE54G.
Change the wireless frequency in the router. If you do not get the results you want by moving the router, you can try changing the frequency the router uses to broadcast the signal. You only need to do this in the router itself, as the wireless devices should recognize the new signal automatically. All makes and models of routers have different menus, but all you need to do is login to your router through your web browser and look in the wireless settings. Experiment and see if changing the frequency helps.
Buy a new 802.11n router. The latest wireless standard is 802.11n. It uses Multiple-Input Multiple-Output channels and has nearly double the range of a wireless-g. Here is an example of a Wireless N router: Cisco-Linksys WRT160N Wireless-N Broadband Router
Friday, August 27, 2010
My PC is Frozen: How to Diagnose Faulty Memory
Wednesday, August 25, 2010
HP Pavilion N5445 hard drive Replacement
Cool article on replacing the HP Pavilion N5445 hard drive. I want to cover as many replacement tutorials possible on Pc Repair course to create a go to source online for many different models.
Source: http://www.edmartechguide.com/2010/04/how-to-replace-hard-disk-drive-andor.html
Also, added a video on how to replace a desktop pc hard drive
Unlike other laptops, HP Pavilion N5445 hard drive is located under the keyboard. So you will need to remove it first to be able to replace it. Here are the instructions to disassemble this HP Pavilion N5445 laptop: 1. Unplug your laptop's AC adapted and remove the battery. 2. Remove the two (2) screws from the back panel located in the center of each hinge.
3. Open the LCD screen as far back at it goes. Use a small flat screwdriver to remove the top cover.
4. Unscrew the 4 screws that holds the keyboard and gently lift the keyboard. 5. Now you should see the hardrive sitting in the center. Remove the screws (4 of them) on each corner of the hard drive which connect it to the motherboard.
6. Gently lift or pull the hard drive by using the black ribbon at the top of the hard disk drive.
7. Once the hard drive is out, carefully remove the IDE connector that attached the hard disk drive to the motherboard.
8. Turn the hard drive upside down and remove the 4 screws which connect the hard disk to its carrier. You can now replace the hard drive with a new one. Remember that this laptop uses IDE type of hard disk drive, so be careful in finding a replacement. SATA drive will not fit/work in this one.
If you're replacing the CD/DVD Rom drive/writer, just remove the screw holding it in place and slide it all the way through. You will need to push the two clips at the top to be able to remove it.
Enjoy! Shane
Tuesday, August 24, 2010
Steps to Making a Passive Online Income Using Your Computer
Laptop Battery Repair and Preventive Maintenance tips.
Some of the most common problems in PC Repair or Mac Repair, usually come from the battery or power supply. Now more than ever, people are using laptops to perform desktop software functions and tasks.
Video rendering, digital photo editing and many process and power consuming tasks such as these will drain your lap top battery dry.
Also, make sure that your charger cable is not being pinched or bent by any foreign objects.
If you have extreme pressure on the cord, it can also loosen the solder bead that secures the power supply chip to the motherboard. This could cause a fire and cost you a ton of money to repair.
Usually, when your battery is dead, it could be from a faulty charger relating to a faulty cable.
For a laptop battery to die completely is not very common and can set you back a couple hundred bucks.
Check out some cool stuff I ran across online that will help you preserve laptop battery life.
http://www.pctechbytes.com/2010/08/24/extend-the-life-of-a-laptop-battery/
Is Your Laptop Battery Dead?
Check out video below on a Lap top battery hack that could save you money!
Shane Hale
Friday, August 20, 2010
Windows Help Center Vulnerability Fix
While searching through some forums the other night I came across this short clip and thought I would share it. This is a huge windows vulnerability!
On June 10, 2010, security researcher Tavis Ormandy publicly disclosed vulnerability in the Windows Help and Support Center service in Windows XP and Windows Server 2003. This vulnerability would allow a remote hacker or exploit hosted on a web site to cause commands to be executed on a vulnerable computer. The way this disclosure was released has met with numerous criticisms from other security researchers, reporters, and companies. Since then there have been reports of exploits for this vulnerability being found on web sites, which has led Microsoft to create a tool that will disable the vulnerability.
Microsoft has released as temporary workaround that can be used to disable this vulnerability until an official Windows update is released. This fix can be downloaded from the Microsoft knowledge base article #2219475, and when run, will plug the vulnerability. It should be noted that Microsoft has stated that "Unregistering the HCP protocol will break all local, legitimate help links that use hcp://. For example, links in Control Panel may no longer work." In my testing with the fix, I have found no issues after running it. In my opinion, regardless of what may become broken, it is better than being vulnerable to an exploit that could allows commands to be executed on your computer without your permission. Link: Microsoft Security Advisory (2219475)
Link: Fixit information for Windows Help Center Vulnerability
Come visit the new PC Repair Course ! Thanks Shane H!
Wednesday, August 18, 2010
Keyboard Shortcuts to Remember
When getting into repairing or using computers, learning keyboard shortcuts is a must for everyone to save time everyday! Check out these cool links about keyboard shortcuts. Coming soon Pc Repair Course !
Windows Key + R : start run prompt (XP)
Windows Key + E : start file explorer (XP)
Windows Key + M : minimize all windows (XP)
Windows Key + Shift + M : restore all windows (XP)
Ctrl + Shift + Esc : start task manager (XP)
Alt+Space : show current application's window controls (XP)
F2 : in explorer and office applications : change the text of an object
F4 : within Office Applications - Repeat last formatting option
F5 : refresh or reload page (explorer, browsers, etc.. )
F9 : Office applications : refresh selected text links (for TOC)
Tab : Advance to next field or clickable object
Shift+Tab : Advance to previous field or clickable object
Ctrl+Enter : In Excel : insert whitespace in this cell
In Email : send email
F7 : Spellcheck (MS Office, Email clients)
Ctrl+N : start new instance of program, MS Office: new document
Ctrl+S : Save
Ctrl+O : Open
Alt+(underlined character) : enable drop down menu with this character
Alt+F4 : close application in focus
ALt+PrintScrn : Take a screenshot of active application only and put into clipboard ( alt+printscr , win+r , mspaint , ctrl+v, ctrl+s saves your screenshot -- start to finish )
Menu button : brings up a menu on the current object you've selected -- your keyboard doesn't have it, lots do ( http://en.wikipedia.org/wiki/Menu_key )
Ctrl+Alt+Del : bring up login screen, can be configured to bring up taskmgr
http://www.tomsguide.com/us/pictures-story/189-shortcuts-keyboard-tips.html
Tuesday, August 17, 2010
Antivirus Live Removal Free Instructions
Antivirus Live Removal Free Instructions
This Virus is a complete bitch to remove. Reason being it looks like a Virus Scanner. I have found the best way to do this is to boot up in safe mode and hit F8 key while booting and use choose Windows Safe mode. Then go to run and type “regedit” and delete the registry entries listed below.
Then run quick scan for Malware also download free avg virus scan if you don’t have it yet.
What this programs does:
Antivirus Live is a rogue anti-spy ware and ransom ware program from the same family as Antivirus System Pro. This infection is installed on your computer through Trojans that install it automatically without your permission. Once installed, Antivirus Live will be configured to start automatically when Windows starts. Once running it will scan your computer and display numerous infections, but will state it will not remove them until you purchase the program. In reality, the scan results it detects are all fake and do not actually exist on your computer.
This program is also very aggressive in how it protects itself from being removed. While the Antivirus Live process is running it will terminate almost all programs that you launch stating that they are infected. It will also change the Proxy settings in Internet Explorer so that you can not browse to any site other than the Antivirus Live site so that you can purchase the program. Using these two methods, the program essentially ransoms the normal use of your computer until you purchase the program or use the guide below to remove the infection.
Antivirus Live screen shot
For more screen shots of this infection click on the image above.
There are a total of 7 images you can view.
While Antivirus Live is running you will also see numerous security warnings, alerts, and windows appear that try to convince you that you are infected. For example, you will be shown a window that impersonates the legitimate Windows Security Center. The difference is that the infection’s version will suggest that you purchase Antivirus Live, while the legitimate version does not suggest any particular program. The infection will also show numerous alerts stating that your computer is infected, sending sensitive data to the Internet, or being attacked by remote connections. Just like the fake scan results, these alerts are just another method that the program is trying to convince you that you have a security problem and should be ignored.
As you can see, Antivirus Live was created with one purpose in mind; to scam you out of your money by making you think your computer is infected. It goes without saying that you should not purchase this program, and if you already have, please contact your credit card company and dispute the charges stating the program is a scam. Finally, to remove this infection please use the free removal guide below.
Threat Classification:
Advanced information:
View Antivirus Live files.
View Antivirus Live Registry Information.
Tools Needed for this fix:
Symptoms that may be in a HijackThis Log:
O4 – HKLM\..\Run: [<random>] %UserProfile%\Local Settings\Application Data\<random>\<random>sysguard.exe
Guide Updates:
12/07/09 – Initial guide creation.
Automated Removal Instructions for Antivirus Live using Malwarebytes’ Anti-Malware:
- Print out these instructions as we may need to close every window that is open later in the fix.
- It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If you run into this problem when following the steps in this guide you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.
- Reboot your computer into Safe Mode with Networking using the instructions for your version of Windows found in the following tutorial:
How to start Windows in Safe Mode
When following the steps in the above tutorial, select Safe Mode with Networking rather than just Safe Mode. When the computer reboots into Safe Mode with Networking make sure you login with the username you normally use. When you are at your Windows desktop, please continue with the rest of the steps.
- This infection changes your Internet Explorer settings to use a proxy server that will not allow you to browse any pages on the Internet. Therefore, if you only have Internet Explorer installed, we will first need need to fix this problem so that we can download the utilities we need to remove this infection. If you already have another browser installed, then you can skip to step 8 to proceed with the removal instructions. I still advise that you do all of these steps so that Internet Explorer works as well.Please start Internet Explorer, and when the program is open, click on the Tools menu and then select Internet Options as shown in the image below.
- You should now be in the Internet Options screen as shown in the image below.
Now click on the Connections tab as designated by the blue arrow above.
- You will now be at the Connections tab as shown by the image below.
Now click on the Lan Settings button as designated by the blue arrow above.
- You will now be at the Local Area Network (LAN) settings screen as shown by the image below.
Under the Proxy Server section, please uncheck the checkbox labeled Use a proxy server for your LAN. Then press the OK button to close this screen. Then press the OK button to close the Internet Options screen. Now that you have disabled the proxy server you will be able to browse the web again with Internet Explorer.
- Now we must end the processes that belong to Antivirus Live so that it does not interfere with the cleaning procedure. To do this, download the following file to your desktop.rkill.com Download Link
If you are unable to connect to the site to download rkill, please go back and do steps 3-6 again and make sure the infection has not reenabled the proxy settings. You may have to do this quite a few times before you can get the rkill.com file downloaded. If you still cannot download the rkill.com program on the infected computer, you should download it to a clean computer and copy it to the infected one via a USB flash drive or CDROM.
- Once it is downloaded, double-click on the rkill.com in order to automatically attempt to stop any processes associated with Antivirus Live and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that rkill is an infection, do not be concerned. This message is just a fake warning given by Antivirus Live when it terminates programs that may potentially remove it. If you run into these infections warnings that close Rkill, a trick is to leave the warning on the screen and then run Rkill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that rkill can terminate Antivirus Live . So, please try running Rkill until malware is no longer running. You will then be able to proceed with the rest of the guide. Do not reboot your computer after running rkill as the malware programs will start again.
- Now you should download Malwarebytes’ Anti-Malware, or MBAM, from the following location and save it to your desktop:Malwarebytes’ Anti-Malware Download Link
If you are unable to connect to the site to download Malwarebytes’, please go back and do steps 3-6 again and make sure the infection has not reenabled the proxy settings.
- Once downloaded, close all programs and Windows on your computer, including this one.
- Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.
- When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked. Then click on the Finish button. If MalwareBytes’ prompts you to reboot, please do not do so.
- MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.
- On the Scanner tab, make sure the the Perform full scan option is selected and then click on the Scan button to start scanning your computer for Antivirus Live related files.
- MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.
- When the scan is finished a message box will appear as shown in the image below.
You should click on the OK button to close the message box and continue with the AntivirusLive removal process.
- You will now be back at the main Scanner screen. At this point you should click on the Show Results button.
- A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.
You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.
- When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.
- You can now exit the MBAM program.
Your computer should now be free of the AntivirusLive program. You may want to consider purchasing the PRO version of Malwarebytes’ Anti-Malware to protect against these types of threats in the future, as if you had the real-time protection component, that comes with the paid for version, activated it would not have allowed this infection to install.
If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:
Preparation Guide For Use Before Posting A Hijackthis Log
Associated Antivirus Live Files:
%UserProfile%\Local Settings\Application Data\<random>\
%UserProfile%\Local Settings\Application Data\<random>\<random>sysguard.exe
Associated Antivirus Live Windows Registry Information:
HKEY_CURRENT_USER\Software\AvScan
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “RunInvalidSignatures” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “ProxyOverride” = “”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “ProxyServer” = “http=127.0.0.1:5555″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = “.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “<random>”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “<random>”
Pre-infected hardware - is there any way to fight it?
At Pc Repair Course, we discuss all measures of protection and prevention. Computer security is just one of the topics we will talk about on some of our training modules.
“Recent incident on HP USB based drives revealed that even reputable companies can slip up.”
HP USD Floppy Drive Keys dedicated to ProLiant servers were altered at factory to infect the servers with two computer worms. Symantec has reported the infections as SillyFDC and Fakerecy.