Saturday, August 28, 2010

How to Increase Wifi Distance in your Home

You can extend the wifi range of your wireless network if you experiment with various techniques. Because there are so many variables involved with consumer WiFi, you will need to experiment to determine what works best with your scenario, the structure of your home and the equipment you use. All of those things play a roll in the range of your network as well as its reliability. While we always try to find the cheapest solution, you may find additional equipment is necessary to achieve your wireless goals.

Tips For Increasing The WiFi Distance

Centralize your router. This is one of the easiest things you can do to gain maximum coverage area for your WiFi network. Normal WiFi antennas emit signal outward in all directions. If your router is situated near a wall in the corner of the house, much of the signal is being absorbed by the wall behind it and leaking outside. If you place the router in the center of the living area, you will extend the range to all usable areas of your house.

Purchase a high gain antenna. If your router has a detachable antenna, you should be able to add a high gain antenna. These types of antennas are more directional than your standard antenna and allow you to focus your WiFi signal toward  an access point or your computer. You can also make these, which are often referred to as “cantennas,” but you’ll probably have better results if you purchase one. High gain antennas are a great way to shoot the WiFi signal across a house or even a yard. But in order to achieve maximum range, you should have line of site to the target.

Add a WiFi Repeater. You can add a Wireless Access Point (WAP) to considerably extend the range of your wireless network. These are often referred to as “repeaters” or “extenders.” Depending on the size of your home or office, usually one repeater will be enough to cover the entire area. You will want to place the repeated as far as you can away from the router without losing more than twenty percent of the signal. The WAP will then reconstitute the signal pass it along to any devices within its range. Here is an example of a WiFi Extender Cisco-Linksys Wireless-G Range Expander WRE54G.

Change the wireless frequency in the router. If you do not get the results you want by moving the router, you can try changing the frequency the router uses to broadcast the signal. You only need to do this in the router itself, as the wireless devices should recognize the new signal automatically. All makes and models of routers have different menus, but all you need to do is login to your router through your web browser and look in the wireless settings. Experiment and see if changing the frequency helps.

Buy a new 802.11n router. The latest wireless standard is 802.11n. It uses Multiple-Input Multiple-Output channels and has nearly double the range of a wireless-g. Here is an example of a Wireless N router: Cisco-Linksys WRT160N Wireless-N Broadband Router          

Check out our

PC Repair Course!

Wednesday, August 25, 2010

HP Pavilion N5445 hard drive Replacement

Cool article on replacing the HP Pavilion N5445 hard drive.  I want to cover as many replacement tutorials possible on Pc Repair course to create a go to source online for many different models.

Source: http://www.edmartechguide.com/2010/04/how-to-replace-hard-disk-drive-andor.html

Also, added a video on how to replace a desktop pc hard drive

Unlike other laptops, HP Pavilion N5445 hard drive is located under the keyboard. So you will need to remove it first to be able to replace it. Here are the instructions to disassemble this HP Pavilion N5445 laptop:

1. Unplug your laptop's AC adapted and remove the battery.

2. Remove the two (2) screws from the back panel located in the center of each hinge.

3. Open the LCD screen as far back at it goes. Use a small flat screwdriver to remove the top cover.





4. Unscrew the 4 screws that holds the keyboard and gently lift the keyboard.

5. Now you should see the hardrive sitting in the center. Remove the screws (4 of them) on each corner of the hard drive which connect it to the motherboard.


6. Gently lift or pull the hard drive by using the black ribbon at the top of the hard disk drive.
7. Once the hard drive is out, carefully remove the IDE connector that attached the hard disk drive to the motherboard.


8. Turn the hard drive upside down and remove the 4 screws which connect the hard disk to its carrier. You can now replace the hard drive with a new one. Remember that this laptop uses IDE type of hard disk drive, so be careful in finding a replacement. SATA drive will not fit/work in this one.


If you're replacing the CD/DVD Rom drive/writer, just remove the screw holding it in place and slide it all the way through. You will need to push the two clips at the top to be able to remove it.

Enjoy! Shane

Tuesday, August 24, 2010

Steps to Making a Passive Online Income Using Your Computer

Steps to Making a Passive Online Income Using the Internet 

If you are unemployed, unhappy with your job or in need of extra money, there can be a great deal of stress in your life. You may be unable to meet all your bills or purchase what you desire. Planning a vacation can seem impossible at this time in your life. Even for people that enjoy their work, the thought of continuing to go to an office for the rest of your life can be discouraging.

Fortunately, there are ways to enjoy a passive online income using the internet that are now available. This can be done part-time if you are working so you can build up residual income that matches your salary. If you aren't working now, you'll have more time to put into building your passive income and can get the results you want in even a shorter period of time.

There are many ways to make money online which include creating a product or ebook which you sell, being an affiliate for sites that pay you a commission, writing articles for marketers or having a membership site. Even if you are earning an income online that is a service such as article writing, website design or creating backlinks for others, by outsourcing some of these tasks your service can be a passive stream of income. This means that you don't have to perform the service yourself but instead train others to do the tasks for you.

In affiliate marketing, you will be given a code with your own unique nickname or identification number so that the merchant can track which sales are yours. You will get a set amount or a percentage of the sales you make. Do not worry if you are unsure how to make a web page. By using classified ads, people can contact you using email. There are also free websites that make it very easy for you to post up an article and to link back to the site you are promoting. 

The joy of a passive income is that you are not tied to a job and can have more time with your family as well as for travelling. There are computers at most libraries and you can also take your laptop when you are out of town so you can continue to be online as needed. Do not feel that your life needs to be tied to an employer but dream big. 

To find out more about how to stop working by the hour and start creating a passive online income then click the link below and watch a short getting started video!

Laptop Battery Repair and Preventive Maintenance tips.

Some of the most common problems in PC Repair or Mac Repair, usually come from the battery or power supply. Now more than ever, people are using laptops to perform desktop software functions and tasks.

 Video rendering, digital photo editing and many process and power consuming tasks such as these will drain your lap top battery dry.

Also, make sure that your charger cable is not being pinched or bent by any foreign objects.

 If you have extreme pressure on the cord, it can also loosen the solder bead that secures the power supply chip to the motherboard. This could cause a fire and cost you a ton of money to repair.

Usually, when your battery is dead, it could be from a faulty charger relating to a faulty cable.

For a laptop battery to die completely is not very common and can set you back a couple hundred bucks.

 Check out some cool stuff I ran across online that will help you preserve laptop battery life.  

http://www.pctechbytes.com/2010/08/24/extend-the-life-of-a-laptop-battery/

Is Your Laptop Battery Dead?

 

Check out video below on a Lap top battery hack that could save you money!

Shane Hale

Pc Repair Course

Friday, August 20, 2010

Windows Help Center Vulnerability Fix

While searching through some forums the other night I came across this short clip and thought I would share it.  This is a huge windows vulnerability! 

On June 10, 2010, security researcher Tavis Ormandy publicly disclosed vulnerability in the Windows Help and Support Center service in Windows XP and Windows Server 2003. This vulnerability would allow a remote hacker or exploit hosted on a web site to cause commands to be executed on a vulnerable computer. The way this disclosure was released has met with numerous criticisms from other security researchers, reporters, and companies. Since then there have been reports of exploits for this vulnerability being found on web sites, which has led Microsoft to create a tool that will disable the vulnerability.

Microsoft has released as temporary workaround that can be used to disable this vulnerability until an official Windows update is released. This fix can be downloaded from the Microsoft knowledge base article #2219475, and when run, will plug the vulnerability. It should be noted that Microsoft has stated that "Unregistering the HCP protocol will break all local, legitimate help links that use hcp://. For example, links in Control Panel may no longer work." In my testing with the fix, I have found no issues after running it.

In my opinion, regardless of what may become broken, it is better than being vulnerable to an exploit that could allows commands to be executed on your computer without your permission.

 Link: Microsoft Security Advisory (2219475)
 Link: Fixit information for Windows Help Center Vulnerability

Come visit the new PC Repair Course !  Thanks Shane H!

Wednesday, August 18, 2010

Keyboard Shortcuts to Remember

When getting into repairing or using computers, learning keyboard shortcuts is a must for everyone to save time everyday! Check out these cool links about keyboard shortcuts.  Coming soon Pc Repair Course !

Windows Key + R : start run prompt (XP)
Windows Key + E : start file explorer (XP)
Windows Key + M : minimize all windows (XP)
Windows Key + Shift + M : restore all windows (XP)
Ctrl + Shift + Esc : start task manager (XP)
Alt+Space : show current application's window controls (XP)
F2 : in explorer and office applications : change the text of an object
F4 : within Office Applications - Repeat last formatting option
F5 : refresh or reload page (explorer, browsers, etc.. )
F9 : Office applications : refresh selected text links (for TOC)
Tab : Advance to next field or clickable object
Shift+Tab : Advance to previous field or clickable object
Ctrl+Enter : In Excel : insert whitespace in this cell
In Email : send email
F7 : Spellcheck (MS Office, Email clients)
Ctrl+N : start new instance of program, MS Office: new document
Ctrl+S : Save
Ctrl+O : Open
Alt+(underlined character) : enable drop down menu with this character
Alt+F4 : close application in focus
ALt+PrintScrn : Take a screenshot of active application only and put into clipboard ( alt+printscr , win+r , mspaint , ctrl+v, ctrl+s saves your screenshot -- start to finish )
Menu button : brings up a menu on the current object you've selected -- your keyboard doesn't have it, lots do ( http://en.wikipedia.org/wiki/Menu_key )
Ctrl+Alt+Del : bring up login screen, can be configured to bring up taskmgr

http://www.tomsguide.com/us/pictures-story/189-shortcuts-keyboard-tips.html

Tuesday, August 17, 2010

Antivirus Live Removal Free Instructions

Antivirus Live Removal Free Instructions

This Virus is a complete bitch to remove. Reason being it looks like a Virus Scanner. I have found the best way to do this is to boot up in safe mode and hit F8 key while booting and use choose Windows Safe mode.  Then go to run and type “regedit” and delete the registry entries listed below.

Then run quick scan for Malware also download free avg virus scan if you don’t have it yet.

What this programs does:

Antivirus Live is a rogue anti-spy ware and ransom ware program from the same family as Antivirus System Pro. This infection is installed on your computer through Trojans that install it automatically without your permission. Once installed, Antivirus Live will be configured to start automatically when Windows starts. Once running it will scan your computer and display numerous infections, but will state it will not remove them until you purchase the program. In reality, the scan results it detects are all fake and do not actually exist on your computer.

This program is also very aggressive in how it protects itself from being removed. While the Antivirus Live process is running it will terminate almost all programs that you launch stating that they are infected. It will also change the Proxy settings in Internet Explorer so that you can not browse to any site other than the Antivirus Live site so that you can purchase the program. Using these two methods, the program essentially ransoms the normal use of your computer until you purchase the program or use the guide below to remove the infection.


Antivirus Live screen shot
For more screen shots of this infection click on the image above.
There are a total of 7 images you can view.

While Antivirus Live is running you will also see numerous security warnings, alerts, and windows appear that try to convince you that you are infected. For example, you will be shown a window that impersonates the legitimate Windows Security Center. The difference is that the infection’s version will suggest that you purchase Antivirus Live, while the legitimate version does not suggest any particular program. The infection will also show numerous alerts stating that your computer is infected, sending sensitive data to the Internet, or being attacked by remote connections. Just like the fake scan results, these alerts are just another method that the program is trying to convince you that you have a security problem and should be ignored.

As you can see, Antivirus Live was created with one purpose in mind; to scam you out of your money by making you think your computer is infected. It goes without saying that you should not purchase this program, and if you already have, please contact your credit card company and dispute the charges stating the program is a scam. Finally, to remove this infection please use the free removal guide below.

Threat Classification:

Advanced information:

View Antivirus Live files.
View Antivirus Live Registry Information.

Tools Needed for this fix:

Symptoms that may be in a HijackThis Log:

O4 – HKLM\..\Run: [<random>] %UserProfile%\Local Settings\Application Data\<random>\<random>sysguard.exe

Guide Updates:

12/07/09 – Initial guide creation.


Automated Removal Instructions for Antivirus Live using Malwarebytes’ Anti-Malware:

  1. Print out these instructions as we may need to close every window that is open later in the fix.
  2. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If you run into this problem when following the steps in this guide you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.
  3. Reboot your computer into Safe Mode with Networking using the instructions for your version of Windows found in the following tutorial:

How to start Windows in Safe Mode

When following the steps in the above tutorial, select Safe Mode with Networking rather than just Safe Mode. When the computer reboots into Safe Mode with Networking make sure you login with the username you normally use. When you are at your Windows desktop, please continue with the rest of the steps.

  1. This infection changes your Internet Explorer settings to use a proxy server that will not allow you to browse any pages on the Internet. Therefore, if you only have Internet Explorer installed, we will first need need to fix this problem so that we can download the utilities we need to remove this infection. If you already have another browser installed, then you can skip to step 8 to proceed with the removal instructions. I still advise that you do all of these steps so that Internet Explorer works as well.Please start Internet Explorer, and when the program is open, click on the Tools menu and then select Internet Options as shown in the image below.

  1. You should now be in the Internet Options screen as shown in the image below.

Now click on the Connections tab as designated by the blue arrow above.

  1. You will now be at the Connections tab as shown by the image below.

Now click on the Lan Settings button as designated by the blue arrow above.

  1. You will now be at the Local Area Network (LAN) settings screen as shown by the image below.

Under the Proxy Server section, please uncheck the checkbox labeled Use a proxy server for your LAN. Then press the OK button to close this screen. Then press the OK button to close the Internet Options screen. Now that you have disabled the proxy server you will be able to browse the web again with Internet Explorer.

  1. Now we must end the processes that belong to Antivirus Live so that it does not interfere with the cleaning procedure. To do this, download the following file to your desktop.rkill.com Download Link

If you are unable to connect to the site to download rkill, please go back and do steps 3-6 again and make sure the infection has not reenabled the proxy settings. You may have to do this quite a few times before you can get the rkill.com file downloaded. If you still cannot download the rkill.com program on the infected computer, you should download it to a clean computer and copy it to the infected one via a USB flash drive or CDROM.

  1. Once it is downloaded, double-click on the rkill.com in order to automatically attempt to stop any processes associated with Antivirus Live and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that rkill is an infection, do not be concerned. This message is just a fake warning given by Antivirus Live when it terminates programs that may potentially remove it. If you run into these infections warnings that close Rkill, a trick is to leave the warning on the screen and then run Rkill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that rkill can terminate Antivirus Live . So, please try running Rkill until malware is no longer running. You will then be able to proceed with the rest of the guide. Do not reboot your computer after running rkill as the malware programs will start again.
  2. Now you should download Malwarebytes’ Anti-Malware, or MBAM, from the following location and save it to your desktop:Malwarebytes’ Anti-Malware Download Link

If you are unable to connect to the site to download Malwarebytes’, please go back and do steps 3-6 again and make sure the infection has not reenabled the proxy settings.

  1. Once downloaded, close all programs and Windows on your computer, including this one.
  2. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.
  3. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked. Then click on the Finish button. If MalwareBytes’ prompts you to reboot, please do not do so.
  4. MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.

  1. On the Scanner tab, make sure the the Perform full scan option is selected and then click on the Scan button to start scanning your computer for Antivirus Live related files.
  2. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.

  1. When the scan is finished a message box will appear as shown in the image below.

You should click on the OK button to close the message box and continue with the AntivirusLive removal process.

  1. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.
  2. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.

You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  1. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.
  2. You can now exit the MBAM program.

Your computer should now be free of the AntivirusLive program. You may want to consider purchasing the PRO version of Malwarebytes’ Anti-Malware to protect against these types of threats in the future, as if you had the real-time protection component, that comes with the paid for version, activated it would not have allowed this infection to install.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Posting A Hijackthis Log


Associated Antivirus Live Files:

%UserProfile%\Local Settings\Application Data\<random>\
%UserProfile%\Local Settings\Application Data\<random>\<random>sysguard.exe

Associated Antivirus Live Windows Registry Information:

HKEY_CURRENT_USER\Software\AvScan
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “RunInvalidSignatures” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “ProxyOverride” = “”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “ProxyServer” = “http=127.0.0.1:5555″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = “.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “<random>”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “<random>”

Pre-infected hardware - is there any way to fight it?

At Pc Repair Course, we discuss all measures of protection and prevention.  Computer security is just one of the topics we will talk about on some of our training  modules.

“Recent incident on HP USB based drives revealed that even reputable companies can slip up.”

HP USD Floppy Drive Keys dedicated to ProLiant servers were altered at factory to infect the servers with two computer worms. Symantec has reported the infections as SillyFDC and Fakerecy.

http://www.2-spyware.com/news/post386.html