tag:blogger.com,1999:blog-71647299964483834482024-03-04T20:59:01.692-08:00Tech-Zone-TabloidKumarhttp://www.blogger.com/profile/04538749137668696741noreply@blogger.comBlogger54125tag:blogger.com,1999:blog-7164729996448383448.post-8876726401483550762012-09-19T02:40:00.000-07:002012-09-19T02:40:03.616-07:005 Things that iPhone 5 has to surprise you about<div dir="ltr" style="text-align: left;" trbidi="on">Finally iPhone 5 is out there in our hands, and people are coming up with all of their views and opinion that the much awaited and talked about new gadget has to offer.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT54hK7K7WGpwMXxy7sM6ZqXzdRkFl7kO-l-yTgg4Nf-Z85p7Wr7eB68brEMxeUl5aiS_-LPCyWC6LR3tAwYhl7xi43ltlp6EtmsEnBbapJyg9hupgVqC4Fa54S_0T4uDw5iM1VaQjAwcw/s1600/iphone+5.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT54hK7K7WGpwMXxy7sM6ZqXzdRkFl7kO-l-yTgg4Nf-Z85p7Wr7eB68brEMxeUl5aiS_-LPCyWC6LR3tAwYhl7xi43ltlp6EtmsEnBbapJyg9hupgVqC4Fa54S_0T4uDw5iM1VaQjAwcw/s640/iphone+5.PNG" width="640" /></a></div><br />
The iPhone 5 will surprise you in many ways some of the Top 5 can be the following ways.<br />
<br />
<b>The weight</b><br />
Shaving about an ounce off a phone's heft doesn't sound like a lot, and I've always been skeptical of incremental reductions (20 percent lighter!), but the first thing that shocked me when I picked up the iPhone 5 was how light it was, not how thin it was. There's a reason for this: many smartphones boast large screens and sleek looks, but few weigh as little as 3.95 ounces. Most other iPhones weigh about the same, so it feels different immediately. <br />
<br />
<b>The beauty of Maps</b><br />
Whenever you hear that an app is beautiful to behold, especially an app as integral to the use of the iPhone as Maps, it can't help but feel superfluous. Still, try to look at Maps on an iPhone 5 and not feel wowed. Right now, it's the best graphics demo the iPhone 5 has in its stable, and Flyovers feel intensely surreal, even if you're a Google Earth addict. Whether the graphical finesse of the new Maps and turn-by-turn navigation can make up for the lack of more-refined Google search terms, Street View, and public transit directions feels like a dicey proposition, but Maps is undeniably fun to play with. <br />
<br />
<b>The speed</b><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwo1y0JEWPBCyhHMn0C1s9c7UNt-_3AEIftmJbNj95UUiNj9pQRrRIc-HiYN991wAo9C9D2IUj6CvCLMe56KjZuXAFupGoNJXzr5_rNAYYs_vwVrlalvsr_dFZp00X1s-VImBLBqwD0fgV/s1600/iphone-5speed.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwo1y0JEWPBCyhHMn0C1s9c7UNt-_3AEIftmJbNj95UUiNj9pQRrRIc-HiYN991wAo9C9D2IUj6CvCLMe56KjZuXAFupGoNJXzr5_rNAYYs_vwVrlalvsr_dFZp00X1s-VImBLBqwD0fgV/s320/iphone-5speed.jpg" width="320" /></a>In particular, I'm talking about LTE. I'm not a 4G LTE user at home, and I never thought I'd need it in a phone. Still, the wake-up moment for me was when I opted for FaceTime over LTE instead of Wi-Fi because LTE was more than twice as fast as my home broadband wireless connection, and the connection was smoother. It's a seductive draw: would I end up paying through the nose for LTE for its snappy convenience? I've used it far more than I ever thought I would, at least on the review unit. The A6 processor's harder to appreciate right off the bat, but both combined give this iPhone a serious turbo kick. <br />
<br />
<b>Lightning doesn't support Thunderbolt</b><br />
For years, I've wondered when iOS devices would sync via Apple's incredibly fast Thunderbolt port. A new, smaller connector seemed like the ideal opportunity. Then came the name: Lightning. Lightning and Thunderbolt. Yet, the packed-in Lightning cable works via USB. The door could still be open for Thunderbolt (or USB 3.0) in the future. Does faster syncing matter? To me, it does. <br />
<br />
<b>Everything changed just a bit</b><br />
There's no Big Thing on the iPhone 5, but, try to name a part of the phone that hasn't changed. Usually, iPhones keep at least one or two things intact from one year to the next. This year: design, screen, speakers, microphones, cameras, data connection, even connector port and earphones were toyed with. Instead of investing in one game-changer, the iPhone 5's a top-to-bottom tune-up that makes me wonder, just a little bit, what Apple could do to top it next year. </div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com1tag:blogger.com,1999:blog-7164729996448383448.post-22628916738956364342012-08-21T05:52:00.002-07:002012-08-21T21:55:12.163-07:00How to remove a spyware<div dir="ltr" style="text-align: left;" trbidi="on">A spyware program generally installs itself on your computer without your consent. This program slows your computer and reduces the system memory. Spyware also infects computer through malicious email attachments or pop-up links(see:<a href="http://tech-zone-tabloid.blogspot.in/2011/07/how-does-spyware-affect-your-computer.html">How does spyware affect your computer?</a>). To remove a spyware from your computer, follow the manual removal process.<br />
<br />
<b>Step1:</b> Uninstall unwanted software from your computer and install spyware detection and removal software.<br />
<br />
<b>Step2:</b> You can also remove spyware using Windows Defender.<br />
<ul style="text-align: left;"><li>Click Start -> All Programs-> Windows Defender</li>
</ul><ul style="text-align: left;"><li>Click the "down arrow" next to Scan and select Full Scan.</li>
</ul><ul style="text-align: left;"><li>It will automatically remove any spyware that it detects.</li>
</ul><br />
<b>Step3:</b> Delete all temporary files and folders from your computer. And also clean the Recycle Bin.<br />
<br />
<b>Step4:</b> If your computer is connected to the Internet then disconnect it and reboot your computer in safe mode.<br />
<br />
<b>Step5:</b> Scan your computer using the anti-spyware software. It will remove infected programs or files.<br />
<br />
<b>Step6:</b> Clean registry where many installed programs store their settings.There will be <b style="font-weight: normal;">spyware in the Registry</b> on systems that are infected.You should run the <b>Registry Editor</b>, a program that lets you view and make changes to the Registry.<br />
<br />
<b>Step7:</b> If anti-spyware software cannot remove the spyware, format your hard drive and reinstall your operating system. This should be done only in the worst scenario.<br />
<br />
<strong>See also: <a href="http://ezinearticles.com/?How-to-Manually-Find-Spyware-on-a-Mac&id=6126345">How to Manually Find Spyware on a Mac</a></strong><br />
<strong> <a href="http://ezinearticles.com/?How-Adware-and-Spyware-Can-Harm-Your-Computer&id=6593801">How Adware and Spyware Can Harm Your Computer</a></strong></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-48359173817536402872012-08-14T03:47:00.002-07:002012-08-14T04:57:18.494-07:00How to Check if your PC is infected with Conficker Worm<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFNN_IZUChsAEv_3jsI405qdu8PlLXJgufMBQqwj2cxDwKtpIxjt9vnB0B9OvdEDmKLJrC_JJbi5KXmf4Z2Bw3AkJU_ETPKt9TsZIP4beDyfMELEArFAcje7TjZ2rsoYxgrRvK8EAR1V5i/s1600/conficker-worm.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="157" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFNN_IZUChsAEv_3jsI405qdu8PlLXJgufMBQqwj2cxDwKtpIxjt9vnB0B9OvdEDmKLJrC_JJbi5KXmf4Z2Bw3AkJU_ETPKt9TsZIP4beDyfMELEArFAcje7TjZ2rsoYxgrRvK8EAR1V5i/s200/conficker-worm.jpg" width="180" /></a></div>Conficker worm is a computer worm that affects the Windows operating system. A worm is similar to a virus, except that a worm can copy and spread itself without any human interaction. The Conficker worm has the ability to slow your computer and disable certain security software such as virus protection and firewall (see:<a href="http://ezinearticles.com/?How-to-Get-Rid-of-Conficker-Worm&id=6913500" style="color: #990000;">How to Get Rid of Conficker Worm</a>). Follow the given steps to check if your PC is infected with Conficker worm or not.<br />
<br />
<b>Step1:</b> Navigate to the Microsoft website and download the Malicious Software Removal Tool. This is a program that will scan your computer for the presence of viruses or malicious software and remove them.<br />
<br />
<b>Step2:</b> If your computer is not up-to-date with the latest security updates, then check the Automatic Update Service. And turn on Automatic update.<br />
<br />
<ul style="text-align: left;"><li>Click <b>Start</b>, and then click <b>Control Panel</b>.</li>
</ul><ul style="text-align: left;"><li>Click <b>Performance and Maintenance</b>, click <b>System</b>, and then click the <b>Automatic Updates</b> tab.</li>
</ul><ul style="text-align: left;"><li>Click the option that you want. Make sure Automatic Updates is on.</li>
</ul><br />
<b>Step3:</b> You can download free Microsoft Safety Scanner tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software (<a href="http://tech-zone-tabloid.blogspot.in/2012/08/how-to-fix-virus-infected-computer.html" style="color: #990000;">How to Fix a Virus-Infected Computer</a>). It works with your existing antivirus software.<br />
<br />
<b>Step4:</b> Update antivirus software and run a full virus scan. Delete temporary files from the "Temp" folder. Search the folder for any files that end with the extension ".tmp" and contain a random series of letters and numbers; for example, "fiajdihndnu12142.tmp." Conficker worm files often have these characteristics.<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-54295404469677685272012-08-09T03:18:00.003-07:002012-08-09T04:45:42.118-07:00How to Connect your iPhone to the Internet<div dir="ltr" style="text-align: left;" trbidi="on">Many of your iPhone's features viz. emails, browsing etc. require an Internet connection. Your iPhone has an integrated Wi-Fi capability. When you need Wi-Fi Internet access, you can connect wherever free Wi-Fi access is available. Follow the given steps to connect your iPhone to the Internet.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMc4G9h9Mr7r3NcxYGDJLgJ8hZ5pOm3GaqfJEilwIrkalrmzJl8uGbWLPy14HV2D_xV1cv0XK0mCaGDtzEpbtRqgXv-SeoISkJ5zhMFzYGQolNJnXuTDedW2x57ZW79cZW9D4Yp6YNiHqV/s1600/iphone_settings.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="How to Connect your iPhone to the Internet" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMc4G9h9Mr7r3NcxYGDJLgJ8hZ5pOm3GaqfJEilwIrkalrmzJl8uGbWLPy14HV2D_xV1cv0XK0mCaGDtzEpbtRqgXv-SeoISkJ5zhMFzYGQolNJnXuTDedW2x57ZW79cZW9D4Yp6YNiHqV/s200/iphone_settings.jpg" width="177" /></a></div><b>Step1:</b> Connect your device to your current Wi-Fi network, tap <b>Settings</b> > <b>Wi-Fi</b>.<br />
<br />
<b>Step2:</b> Turn on your Wi-Fi network. It may be necessary to enter a password (Depending on the Wi-Fi network).<br />
<br />
<b>Step3:</b> When it is connected to the network, the Wi-Fi icon displays the connection strength.<br />
<br />
<b>Step4:</b> Now you will see the correct settings viz. IP-Address, Default gateway, etc.<br />
<br />
<b>Step5:</b> You can also disconnect the Internet connection from <b>Settings</b> tab and sliding the Wi-Fi button to OFF.<br />
<br />
<b>See also:</b> <a href="http://tech-zone-tabloid.blogspot.in/2012/05/how-to-disable-mcafee-firewall.html" style="color: orange;">How to Disable a McAfee Firewall</a><br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-51244508593049003782012-08-07T05:32:00.001-07:002012-08-07T05:33:22.605-07:00How to Fix a Virus-Infected Computer<div dir="ltr" style="text-align: left;" trbidi="on">A virus- or malware-infected PC can do everything from running slow to putting sensitive information on your computer at risk. Computers can get viruses in several different ways viz. via the Internet or an already infected external device. Follow the given steps to fix your infected computer.<br />
<br />
To remove rootkit virus,follow this blog-<a href="http://tech-zone-tabloid.blogspot.in/2012/07/how-to-remove-rootkit-virus.html" style="background-color: #eeeeee;">How to Remove a Rootkit Virus</a><br />
<br />
<b>Step1:</b> Find the process which is using maximum resources in your computer. Try to delete this process from DOS window. From <b>Start</b> menu->click <b>Run</b>-> Type <b>cmd </b>and press <b>OK</b>.<br />
<br />
<b>Step2:</b> Type 'attrib/s -h -s -r 'file name’’ for displaying the attributes of the virus file. Hit Enter after typing the command. Now to delete the virus, type 'del drive name\'file name’.<br />
<br />
<b>Step3:</b> For example there is an Autorun.inf virus in your computer that you want to delete. You will type ‘<b>attrib -s -h -r autorun.inf</b>’ and hit Enter. Afterwards, you will type ‘<b>del c:\autorun.inf</b>’. This command assumes that the virus resides in the C:\ drive. You can change the drive letter accordingly. <br />
<br />
<b>Step4:</b> If antivirus is installed your computer then update it first and run a full virus scan on your computer.<br />
<br />
<b>Step5:</b> If antivirus is not installed then install one on your computer. Remove unwanted programs from Control panel.<br />
<br />
<b>Step6:</b> If the virus in your computer does not allow you to install the anti-virus, then restart the computer in safe mode. After successful booting of the system install the antivirus application in safe mode and then restart the computer in normal mode. Run the scanner and check for detection of virus.<br />
<br />
<b>See also:</b> <a href="http://ezinearticles.com/?How-to-Avoid-Computer-Virus-Infections&id=6521304">How to Avoid Computer Virus Infections</a><br />
<a href="http://tech-zone-tabloid.blogspot.in/2012/07/how-to-remove-win-hdd-virus.html">How To Remove Win HDD virus</a><br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-19606954282144522132012-07-31T05:33:00.000-07:002012-07-31T05:33:14.462-07:00How to Remove Windows 7 Fix Virus<div dir="ltr" style="text-align: left;" trbidi="on">Windows 7 Fix virus is a fake anti-virus scanning tool made to look like a legitimate Windows program. It displays false information that your computer has a lot of critical problems with hard disks, memory, etc. The virus hides all of your files and folders on your computer.<br />
<br />
While Windows 7 Fix is running, it will block legitimate Windows applications on your computer and won’t let you download anything from the Internet. Last, but not least, the rogue will display numerous fake warnings and nag screens. If your PC is infected with this virus, follow the <a href="http://www.vtechsquad.com/virus-removal/">virus removal</a> instructions below:<br />
<br />
If you want to remove win HDD virus from windows 7 computer, then follow this blog-<a href="http://ezinearticles.com/?How-to-Remove-Win-HDD-Virus-From-Windows-7-Computer&id=6929715">How to Remove Win HDD Virus From Windows 7 Computer</a><br />
<br />
<b>Step1:</b> From the Start button, go to the search field and type<b> %allusersprofile%</b>. Press Enter. It will open contents of the “ProgramData” folder.<br />
<br />
<b>Step2:</b> If the virus has hidden your system files and folders and you want to see them, follow this steps:<br />
Click Organize->select ”Folder and search options”->open View tab-> Select “Show hidden files and folders” option-> uncheck “Hide extensions for known file types”-> uncheck “Hide protected operating files”-> click OK.<br />
<br />
<b>Step3:</b> If file names are displayed with a series of number or letter (e.g. 2636237623.exe or JtwSgJHkjkj.exe), then rename them (right click on it->Rename) with .exe extension.<br />
<br />
<b>Step4:</b> Reboot your computer.<br />
<br />
<b>Step5:</b> If your desktop is empty then you can set desktop content through: click Start-> type in Search field <b>%UserProfile%\desktop</b>-> hit <b>Enter</b>. It will open all contents of your desktop.<br />
<br />
<b>Step6:</b> You can also restart your computer in safe mode. Install any reliable anti-malware software and start scanning your computer to remove Windows 7 Fix infection(see:<a href="http://ezinearticles.com/?Free-Antivirus-Software-2012-Editions:-An-Overview&id=6916035">Free Antivirus Software 2012 Editions</a>). <br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-18483916464052009922012-07-25T04:05:00.000-07:002012-07-25T04:05:27.555-07:00How to Remove a Rootkit Virus<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTRFxmESdr2NLCoZElE_K-a5RfD-m_J_mDQXlSjf8ANVZjX_jLNiujL1EJROT04icjhX13WEhpHqEaUTcmVh0b6kiYXLH73x9Xd6IsFg_cqdnidxtQvplTNqMSV6SsL-ANKPzj6VmayjS/s1600/rootkit_virus.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="How to Remove a Rootkit Virus" border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTRFxmESdr2NLCoZElE_K-a5RfD-m_J_mDQXlSjf8ANVZjX_jLNiujL1EJROT04icjhX13WEhpHqEaUTcmVh0b6kiYXLH73x9Xd6IsFg_cqdnidxtQvplTNqMSV6SsL-ANKPzj6VmayjS/s200/rootkit_virus.jpg" width="200" /></a></div>A rootkit virus is a software program that enables attackers to gain administrator access to a system. Some legitimate antivirus programs also use rootkit programs to counteract the actions of hackers. Follow the given steps to remove a rootkit virus manually.<br />
<br />
If you want to remove windows virus hunter then follow this blog-<a href="http://tech-zone-tabloid.blogspot.in/2012/07/how-to-remove-windows-virus-hunter.html">How to remove Windows virus hunter</a><br />
<br />
***it is recommended that you back up your system before attempting to delete any rootkits. <br />
<br />
<b>Step1:</b> From the <b>"Start" </b>menu, go to <b>“Run"</b> box and type <b>"msconfig"</b>. Click <b>"OK"</b>.<br />
<br />
<b>Step2:</b> Go to the<b> “Boot"</b> tab and check the box <b>“Boot Log"</b>.<br />
<br />
<b>Step3:</b> Click <b>"Apply"</b> and then restart your computer.<br />
<br />
<b>Step4:</b> Search for any files that start with the following names in all the folders and directories and remove them. The file names may be followed by some random alphabets.<br />
<ul style="text-align: left;"><li>rot </li>
</ul><ul style="text-align: left;"><li>gas </li>
</ul><ul style="text-align: left;"><li>gaopdx </li>
</ul><ul style="text-align: left;"><li>seneka </li>
</ul><ul style="text-align: left;"><li>win32k.sys </li>
</ul><ul style="text-align: left;"><li>uacd </li>
</ul><ul style="text-align: left;"><li>tdss </li>
</ul><ul style="text-align: left;"><li>kungsf </li>
</ul><ul style="text-align: left;"><li> gxvxc </li>
</ul><ul style="text-align: left;"><li>ovsfth </li>
</ul><ul style="text-align: left;"><li>msqp </li>
</ul><ul style="text-align: left;"><li>ndisp </li>
</ul><ul style="text-align: left;"><li>msivx </li>
</ul><ul style="text-align: left;"><li>skynet</li>
</ul><br />
<b>Step5:</b> Go to My Computer> C:> WINDOWS> system32> drivers and note down the entire path of above mentioned file names. Now open the Command Prompt and disable file permission using CACLS command.<br />
<br />
For example, "cacls C:WINDOWSsystem32drivers rot.sys /d everyone" and hit <b>Enter</b>. This will disable the .rot file. Do this for every virus file that you made note of. When done, exit Command Prompt. <br />
<br />
<b>Step6:</b> Then restart your computer and search for every file that you made note of and delete them. To delete a file, simply right-click on it and select <b>"Delete"</b>. Also clear the all temporary files from your system.<br />
<br />
<b>Note: </b>If the infected files are not deleted using manual method, you can run rootkit removal tools and scan your system. To get more help you can take <a href="http://www.vtechsquad.com/virus-removal/">online virus removal</a> support from online.<br />
<br />
<b>See also:</b> <a href="http://tech-zone-tabloid.blogspot.in/2012/05/how-to-run-virus-scan-in-safe-mode.html">How to Run Virus Scan in Safe Mode</a><br />
<a href="http://ezinearticles.com/?How-to-Detect-And-Remove-a-Virus-From-Your-Computer&id=6870154">How to Detect And Remove a Virus From Your Computer</a><br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-33568774211081429372012-07-17T04:03:00.001-07:002012-07-17T05:11:16.149-07:00How to remove Windows virus hunter<div dir="ltr" style="text-align: left;" trbidi="on">Windows Virus Hunter is a rogue malicious antivirus program which displays fake security alerts, reporting that malware has been detected on your computer. The rogue program detects false infections and displays numerous fake security warnings, alerts using pop-ups. Windows Virus Hunter disables the Windows system utilities, including Task Manager and Windows Registry and prevents you from running certain programs like antivirus. The browser also redirects you to fake websites when you try to visit security websites and also slows down your computer(see:<a href="http://tech-zone-tabloid.blogspot.in/2012/06/how-to-remove-google-redirect-virus.html">How to Remove the Google Redirect Virus</a>). Follow the given steps to remove the Windows Virus Hunter.<br />
<br />
<b>Step1:</b> Restart your computer and during the restart process, press <b>F8 </b>key on your keyboard repeatedly. Select <b>Safe Mode with Networking</b>, and then press <b>ENTER</b>. <br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHRecb5VJJKd5gMjDBfztyJrSFXn6txTYZzXf_F8gRQ_wfr7VcM9I3cSQDIWI9hhasln09VgDHFA2zUsW1CUO2W4-MTC7otfV5crIblixDL5T6TG2KgtN1magOvEKqsqGT3R3uEGzqGhL7/s1600/Windows-Virus-Hunter-rogue.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="How to remove Windows virus hunter" border="0" height="185" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHRecb5VJJKd5gMjDBfztyJrSFXn6txTYZzXf_F8gRQ_wfr7VcM9I3cSQDIWI9hhasln09VgDHFA2zUsW1CUO2W4-MTC7otfV5crIblixDL5T6TG2KgtN1magOvEKqsqGT3R3uEGzqGhL7/s320/Windows-Virus-Hunter-rogue.jpg" width="320" /></a><b> </b><br />
<b>Step2: </b> Windows Virus Hunter adds a proxy to your Internet connection, so we need to its settings. It's because of this proxy, your system display various errors when you try to access the Internet. To do this, open Internet explorer>click <b>Tools</b> >select <b>Internet Options</b>. Then select the <b>"Connections" </b>tab.<br />
<br />
<b>Step3:</b> In the <b>"Connections"</b> tab, click <b>LAN settings</b>. Uncheck if the "Use a proxy server for your LAN" box is checked. Click <b>OK</b>.<br />
<br />
<b>Step4:</b> Download any latest legitimate anti-spyware software to fully remove Windows Virus Hunter from your computer(see:<a href="http://ezinearticles.com/?How-to-Download-Free-Virus-Removal-Software&id=6870561">How to Download Free Virus Removal Software</a>). This software scans your computer and removes the virus.<br />
<br />
<b>Step5: </b>After removing Windows Virus Hunter, you will need to reset your Hosts file. It is because this virus modifies your Hosts files due to which you encounter browser redirect problems. To reset the Hosts file, rename the old one. Locate the Hosts file, right-click it and click <b>Rename</b>. Rename it to <b>Hosts.old</b>. Now create a new Hosts file in the same location by right-clicking anywhere on the blank space and selecting <b>New</b>> <b>Text Document</b>. <br />
<br />
<b>Step6:</b> A new Notepad file will open up. Make sure that the extension of this file is not <b>.txt</b>. Now copy and paste the text data from Hosts.old to this file. Save the changes and close the file. <br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-39364250753135265332012-07-05T05:59:00.000-07:002012-07-05T05:59:27.589-07:00How To Remove Win HDD virus<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDtkLcH-ruUiKfST3cNfG_yM_b5GDIHNoC2k0pN2cncui16kZTbMJ6yhk9cgqxbOodsGUD0l2LtIONytZ9ufkn9Z9fverfhePPrY09cTHQZ48MItQPuTTC93dYGezkdwaym1_f-uahJz4J/s1600/img18.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="How To Remove Win HDD virus" border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDtkLcH-ruUiKfST3cNfG_yM_b5GDIHNoC2k0pN2cncui16kZTbMJ6yhk9cgqxbOodsGUD0l2LtIONytZ9ufkn9Z9fverfhePPrY09cTHQZ48MItQPuTTC93dYGezkdwaym1_f-uahJz4J/s200/img18.jpeg" width="180" /></a></div>Win HDD virus infects your computer by acting like a security application that scans your computer for virus, malware infections. Win HDD is a fraudulent system diagnostic and hard drive defragmenter software which displays fake alerts and system errors on computers affected by it. This virus comes when you download files or software from the Internet. Basically it is a part of a fake system utilities family which includes HDD Diagnostic, HDD Defragmenter and HDD Control. This virus prevents you from accessing the Internet. Follow the given steps to <a href="http://ezinearticles.com/?How-to-Remove-a-Virus-From-a-Computer-for-Free&id=6870795" style="background-color: cyan;">remove virus from your computer</a>.<br />
<br />
<b>Step1:</b> First, restart your computer in safe mode. To start your computer in safe mode: Start> click Restart > click OK. As your computer restarts but before Windows loads, press F8 repeatedly. Use the arrow keys to highlight the appropriate safe mode option, and then press ENTER.<br />
<br />
<b>Step2:</b> Try to delete the temporary files and then empty the Recycle Bin folder also.<br />
<br />
<b>Step3:</b> Clean your Windows registry because it store all of your computer's device and file associations information , as well as critical information about drivers, directories, Windows applications and more. If you are using windows XP, then follow the given points to <b><a href="http://technical-support-squad.blogspot.in/2012/02/how-to-remove-virus-from-registry.html">remove virus from windows registry</a></b>.<br />
<ul style="text-align: left;"><li>Click the Start menu button >Click “Run”.</li>
</ul><ul style="text-align: left;"><li>Type "regedit" in the text field and press "Enter."</li>
</ul><ul style="text-align: left;"><li>Delete entries in the registry that you know are either causing conflicts or are no longer necessary (see: <b><a href="http://technical-support-squad.blogspot.in/2011/08/how-to-clean-windows-7-registry.html">How to clean windows 7 registry</a></b>). </li>
</ul><br />
<b>Step4:</b> Scan your computer using good antivirus tools. To protect your computer from virus, you need a strong and reliable antivirus software.<br />
<br />
<b>Note:</b> To get online virus removal support ,you can reach <a href="http://www.vtechsquad.com/" style="background-color: cyan;"><b>online technical support</b></a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-88663690297110005182012-06-26T04:32:00.000-07:002012-06-26T04:32:47.695-07:00How to Remove Achtung Virus<div dir="ltr" style="text-align: left;" trbidi="on">Achtung virus is malicious fake spyware application. If your computer is infected with this virus, you won’t be able to visit any websites but will see some alerts like-Visiting this web site may harm your computer. When your computer is infected with Achtung virus, you get the following symptoms.<br />
<ul style="text-align: left;"><li>Achtung virus can slow down your computer.</li>
</ul><ul style="text-align: left;"><li>Achtung virus can redirect your default home page to unwanted web sites. Achtung may even add new shortcuts to your PC desktop.</li>
</ul><ul style="text-align: left;"><li>Achtung virus shows the popup ads, even when you're not connected to the Internet, while secretly tracking your browsing habits and gathering your personal information.</li>
</ul><ul style="text-align: left;"><li>E-mails that you didn't write are being sent from your mailbox</li>
</ul>Follow the given steps to remove Achtung virus manually:<br />
<br />
<b>Step1:</b> Restart your computer in <b>Safe Mode with Command Prompt</b> (to run Safe mode in your computer, press “F8 key” on your keyboard repeatedly).<br />
<br />
<b>Step2:</b> When Windows boots, the Command Prompt will open up showing c:\WINDOWS\system32\cmd.exe. In Command Prompt, type<b> “regedit” </b>and press <b>Enter</b>. Then <b>Registry Editor Window</b> comes up.<br />
<br />
<b>Step3:</b> In Registry Editor, find the below entry and select the registry key named <b>Shell</b>. Right click Shell and select <b>Modify</b>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZZDvhCB0fBgmwCwKhc0Cfdi3mC7nbnfhcoMRG8ZjTCsu0hV2dI25g50etPAZ8tM9yQ5CuC_mIDWnyGZzcGwGp5o7XbotXcdFHiMFxJA_H52-ZRdwsUuYqSromF4FAzpa07XXkYam1vYCY/s1600/reg_entry_modify.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="How to Remove Achtung Virus" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZZDvhCB0fBgmwCwKhc0Cfdi3mC7nbnfhcoMRG8ZjTCsu0hV2dI25g50etPAZ8tM9yQ5CuC_mIDWnyGZzcGwGp5o7XbotXcdFHiMFxJA_H52-ZRdwsUuYqSromF4FAzpa07XXkYam1vYCY/s200/reg_entry_modify.jpg" width="185" /></a></div><b>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\</b><br />
<br />
<b>Step4: </b>The default value data is <b>Explorer.exe</b>. Change it to <b>iexplore.exe</b>. Click <b>OK</b>. Close Registry Editor also.<br />
<br />
<b>Step5:</b> Now in the Command Prompt window, type <b>“shutdown /r /t 0”</b> and hit the Enter key. Your computer will restart in the normal mode. <br />
<br />
<b>Step6:</b> When the computer restarts, you will not see any desktop icons. Now open Windows Task Manager using <b>“Ctrl+Alt+Del”</b> or <b>“Ctrl+Shift+Esc”</b> and run a new task from the <b>File</b> menu-> <b>New Task</b> (Run…).<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixUiNjvw-bBDsQierQlKrjFsjxyq82Gm16kfh6W6Mw9Fq3hjEyZKXFi6fwYKql1H6VyWgT7TLBej0TAFxw70MBPtb58uCp5RRGr-iLoDtIoDF110WvkoiXqxXYMi95OEi_uwA4HoKZiE2p/s1600/file_newtask.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="Remove Achtung Virus" border="0" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixUiNjvw-bBDsQierQlKrjFsjxyq82Gm16kfh6W6Mw9Fq3hjEyZKXFi6fwYKql1H6VyWgT7TLBej0TAFxw70MBPtb58uCp5RRGr-iLoDtIoDF110WvkoiXqxXYMi95OEi_uwA4HoKZiE2p/s200/file_newtask.jpg" width="200" /></a><b>Step7:</b> In <b>Create New Task</b> window, type <b>iexplore</b> and click <b>OK</b>. It will open up Internet Explorer.<br />
<br />
<b>Step8:</b> After completing the all above steps, scan your computer using a good antivirus. When <a href="http://www.vtechsquad.com/virus-removal/"><b style="background-color: orange;">virus scan</b></a><span style="background-color: orange;"> </span>completes, remove all the infected items. <br />
<br />
<b>Step9:</b> Again open the <b>Windows Task Manager</b> and click <b>File</b>-> <b>New Task</b> (Run…) -> Type in regedit and click OK.<br />
<br />
<b>Step10:</b> It will open up<b> Registry Editor </b>again. Find the same above entry (step3), right-click Shell and select Modify .Then Delete <b>iexplore.exe</b> and type <b>Explorer.exe</b>. Click <b>OK</b>.<br />
<br />
<b>Step11:</b> Now you can restart your computer to complete the above task.<br />
<br />
If you have any difficulties with manual virus removal instructions, then you can get online virus removal support from <a href="http://www.vtechsquad.com/" style="background-color: orange;">online technical support</a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.<br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-27313925320885092882012-06-21T05:50:00.000-07:002012-06-21T05:50:03.692-07:00How to Remove the Google Redirect Virus<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.vtechsquad.com/virus-removal/" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="How to Remove the Google Redirect Virus" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfoBmjZkMUrlWmAnhiCa4JMVQRoZcI6pEdP4x5BGmf7mD2X9uaUaBeSw85b4-NlbASDz_k81RUobPRopCTeHsae6C_nJz7vJiEgZMJ-0Bp-9CV4oQKlbZ7UoZrrQX6pgxs2dIKUgWcZsSZ/s200/google-redirect-virus-fix.jpg" width="153" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfoBmjZkMUrlWmAnhiCa4JMVQRoZcI6pEdP4x5BGmf7mD2X9uaUaBeSw85b4-NlbASDz_k81RUobPRopCTeHsae6C_nJz7vJiEgZMJ-0Bp-9CV4oQKlbZ7UoZrrQX6pgxs2dIKUgWcZsSZ/s1600/google-redirect-virus-fix.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a></div>Google redirect virus is usually a by-product of malicious software. Many people say that this problem remains after removing the rogue security software or Trojan. This virus redirects your Google search results to unwanted pages when you click the specific website. In some cases anti-virus and anti-spyware programs remove other Trojans or viruses, but unfortunately can’t detect changes made by the Google redirect virus. You should check in order to <a href="http://ezinearticles.com/?Tips-to-Remove-Google-Redirect-Virus&id=6456625" style="background-color: #0b5394; color: black;">remove Google Redirect virus</a> or fix Search Engine Redire<span style="background-color: #6fa8dc;"></span>ct problem.<br />
<br />
<b>Check Local Area Network (LAN) settings:</b><br />
<br />
• Open Internet Explorer. In Internet Explorer go to: Tools->Internet Options and click on “Connections” tab, then click “LAN settings” button.<br />
• Uncheck the checkbox under “Proxy server” and click OK.<br />
<br />
<b>Make sure that DNS settings are not changed:</b><br />
<br />
<b>Step1: </b>From “Start” menu, go to Control panel.<br />
<br />
<b>Step2:</b> Double-click the “Network Connections” icon to open it. Right-click “Local Area Connection” icon and click “Properties”.<br />
<br />
<b>Step3:</b> Select “Internet Protocol (TCP/IP)” and then click the “Properties” button. Choose “Obtain DNS server address automatically” and click OK.<br />
<br />
<b>Check Windows HOSTS file:</b><br />
<br />
<b>Step1:</b> Go to: C:\WINDOWS\system32\drivers\etc.<br />
<br />
<b>Step2:</b> Double-click the “hosts” file to open it. Choose to open with Notepad.<br />
<br />
<b>Step3:</b> The “hosts” file should look the same as in the image below. There should be only one line: 127.0.0.1 localhost in Windows XP and 127.0.0.1 localhost ::1 in Windows Vista. If there are more, then remove them and save changes.<br />
<br />
<b>Manage Internet Explorer add-on. Remove unknown or suspicious add-on:</b><br />
<br />
<b>Step1:</b> Open Internet Explorer. In Internet Explorer go to: Tools->Manage Add-ons.<br />
<br />
<b>Step2:</b> Uninstall unknown or suspicious Toolbars or Search Engine tools.<br />
<br />
<b>Use TDSSKiller tool to remove malware belonging to the family Rootkit.Win32.TDSS</b><br />
<br />
Download the file TDSSKiller.exe and execute the file TDSSKiller.exe.<br />
<br />
<b>Scan your computer with legitimate anti-malware software </b><br />
<br />
You should install proper anti-malware software and regularly scan your computer.<br />
<br />
<b>Use CCleaner to remove unnecessary system/temp files and browser cache</b><br />
<br />
CCleaner is a freeware system optimization. It’s not a malware removal tool. However, it’s always a good idea to get rid of the unnecessary internet/system files or corrupt Windows registry values that may cause various problems to your computer.<br />
<br />
<b>Note: </b>To get online virus removal support ,you can reach <a href="http://www.vtechsquad.com/" style="background-color: #f1c232;">online technical support</a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.<b><br />
</b><br />
<b>You can also see:</b> <a href="http://tech-zone-tabloid.blogspot.in/2012/06/how-to-remove-virus-from-system-restore.html">How to Remove a Virus from System Restore</a><br />
<a href="http://tech-zone-tabloid.blogspot.in/2012/05/how-to-run-virus-scan-in-safe-mode.html">How to Run Virus Scan in Safe Mode</a><br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-21562219201477802872012-06-07T04:20:00.000-07:002012-06-07T04:20:13.862-07:00How to Remove a Virus from System Restore<div dir="ltr" style="text-align: left;" trbidi="on">Windows System Restore is a feature that allows you to save a restore point of your computer's system files. This restore point is used to roll back your computer's files when your system file is corrupted or crashed. If a virus has infected your system files, your restore point may be infected with the virus, too. When your system restore is corrupted from virus that time System Restore virus will display many fake pop-ups and fake system scans in order to make people believe it is part of Windows. You can follow the manual process to remove virus by cleaning out your system restore points. Follow the given steps to remove virus from system restore in windows 7.<br />
<br />
<b>Step1:</b> From Start button, right click on the "Computer" button and choose "Properties" from the drop-down menu. This will open the Systems Properties window.<br />
<br />
<b>Step2:</b> Click the "System Protection" option in the top left hand corner of the window. This will open the System Protection options window.<br />
<br />
<b>Step3:</b> Select your computer's hard drive and click the "Configure" button.<br />
<br />
<b>Step4:</b> Click the option next to "Turn off system protection" under the Restore Settings .Then click the "OK" button. This will delete any infected system restore points and prevent Windows from making new infected restore points until you have cleaned the virus from your computer.<br />
<br />
To turn on System Restore again after the restore point deletion has completed, repeat these steps, but click to clear the Turn off System Restore for all drives check box.<br />
<br />
<b>Note:</b> To get online virus removal support ,you can reach <a href="http://www.vtechsquad.com/"><b style="background-color: cyan;">online technical support</b></a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-57753438067966205322012-05-31T05:27:00.000-07:002012-05-31T05:27:04.543-07:00How to Run Virus Scan in Safe Mode<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheFMzaCIAgNQJlYStkVK2mSLnAXkG1Is0B_ChIi4_WaT7Iznq6dQfLcJ96ax0jGl72HeP-aEAqd31YTSAswBHFam7maLQL7-ql9G-huXWGOHb9kgNz4CE4TNFyjruBKODSyGXFDwXDzCt3/s1600/safe+mode.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="Run Virus Scan in Safe Mode" border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheFMzaCIAgNQJlYStkVK2mSLnAXkG1Is0B_ChIi4_WaT7Iznq6dQfLcJ96ax0jGl72HeP-aEAqd31YTSAswBHFam7maLQL7-ql9G-huXWGOHb9kgNz4CE4TNFyjruBKODSyGXFDwXDzCt3/s200/safe+mode.jpg" width="200" /></a></div>Safe mode is a diagnostic mode used to trace and solve computer problems that cannot be fixed in the regular booting mode. Booting your computer in safe mode prevents many programs and malicious tools from automatically loading up during startup. Safe mode will allow you to delete a virus successfully because it stops it from running in the background. A powerful virus can easily dodge your antivirus and can prevent its detection when you run a <a href="http://www.vtechsquad.com/virus-removal/"><b>virus scan</b></a>. It is because the virus is running like any other normal application or process in the background when your computer is in the normal mode. <br />
<br />
Suppose your system doesn’t boot up correctly, chances are that it may have a virus. It is recommended that you start your computer in safe mode and run a virus scan. When your computer is the safe mode, it will not load non-essential processes and non-core components. In other words, only the minimum necessary programs will load. Follow the given steps to run virus scan in Safe mode.<br />
<br />
<b>Step1:</b> If your computer is on then shut it down and then power it on.<br />
<br />
<b>Step2:</b> When power comes on your computer and then repeatedly start pressing the <b>F8 key</b>.<br />
<br />
<b>Step3:</b> In the Windows Advanced Options Menu screen, use the Down arrow key to select<b> Safe Mode</b> and press Enter. Once you select Safe Mode, the computer will continue booting up.<br />
<br />
<b>Step4:</b> Windows will boot to the logon screen. When logon screen comes up, click "<b>Administrator</b>" and enter your password to log on if you have one. Windows will boot up.<br />
<br />
<b>Step5:</b> Click on your antivirus program and open it. Follow the onscreen steps to run a virus scan.<br />
<br />
<b>Step6:</b> After the virus scan is completed, delete all detected viruses.<br />
<br />
<b>Step7:</b> After completing all the steps, restart your computer in normal mode.<br />
<br />
<br />
<b>Note:</b> To get online virus removal support ,you can reach <a href="http://www.vtechsquad.com/"><span style="background-color: cyan;">online technical support</span></a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.<br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-19012810542278751822012-05-24T04:40:00.000-07:002012-05-24T04:40:03.883-07:00How to Fix McAfee Security Center<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM1QcMZ-eXuNyRPeX6MfvuvVWQVRdy-RyeQ31kHrY5zQ28YjP-gP9MJrrp4EPS3VhAAEBRh2CPF_Yj-3fMk2014Gh8UIpWJmN5y2EE4TTb3lp2nXNywwV6rar-aS216W8DwGhWDk7bqJ7o/s1600/McAfee-Logo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="fix McAfee Security Center" border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM1QcMZ-eXuNyRPeX6MfvuvVWQVRdy-RyeQ31kHrY5zQ28YjP-gP9MJrrp4EPS3VhAAEBRh2CPF_Yj-3fMk2014Gh8UIpWJmN5y2EE4TTb3lp2nXNywwV6rar-aS216W8DwGhWDk7bqJ7o/s200/McAfee-Logo.jpg" width="180" /></a></div>McAfee Security Center is a security package that includes antivirus and Internet protection suites to protect your computer from every day viruses, trojans, spyware, spam and malware. McAfee programs with time become corrupt from system changes, registry errors and begin to freeze, leaving your computer vulnerable to malicious attacks. Troubleshooting your McAfee Security Center helps fix common problems to ensure that your computer remains protected. <br />
<br />
<b>Step1:</b> Any other antivirus programs besides McAfee security center causes conflicts. To uninstall these programs, from Windows "Start" button and click the "Control Panel." Double-click "Add or Remove Programs" to open the programs window. Select programs and click "Remove" to uninstall it from your computer.<br />
<br />
<b>Step2:</b> Run a registry cleaner program to fix missing McAfee Security Center dll files and extensions. Mainly most of the errors with McAfee occur in the registry, and repairing the registry will solve a great deal of problems. If you do not have a registry cleaner, download free registry cleaner and install it.<br />
<br />
<b>Step3:</b> After install registry cleaner, click the "Registry" button on the left panel. Click "Scan for issues." CCleaner will search the registry for corrupt McAfee files. Then click "Fix selected issues" when the scan is complete and click "Yes" to back up your registry.<br />
<br />
<b>Step4:</b> Click on the "Fix all Selected Issues" option when the backup will complete and click "OK" to repair the corrupt McAfee registry entries.<br />
<br />
<b>Step5:</b> Download any available updates, patches and fixes if there are any from the McAfee website. To check for updates, navigate to the McAfee support page and click "Downloads" to see if there are any available security updates.<br />
<br />
<b>Step6:</b> Uninstall and reinstall your McAfee programs as a final resort if all other troubleshooting attempts fail. To uninstall your McAfee programs, click the Windows "Start" button and click the "Control Panel."<br />
<br />
<b>Step7:</b> Double click on "Add or Remove Programs" to open the programs window. Scroll through and click the McAfee program you want to uninstall. Click “Remove." Option Perform the same procedure to uninstall other McAfee programs. After completing the all steps, restart your computer.<br />
<br />
<b>Step8:</b> Insert your McAfee installation disk into the computer CD-ROM drive to re-install the McAfee programs. If you purchased a download, navigate to the McAfee website to download and install your McAfee programs.<br />
<br />
<i>Note: To get <a href="http://www.vtechsquad.com/mcafee-antivirus-support/">McAfee tech support</a> ,you can reach <a href="http://www.vtechsquad.com/" style="background-color: cyan;">online technical support</a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.</i><br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-45903778060470781822012-05-22T03:13:00.000-07:002012-05-22T03:13:42.266-07:00How to Get Automatic Adobe Security Updates<div dir="ltr" style="text-align: left;" trbidi="on"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHiG1jf8_IJM5KELbO8qYjM4kj7Js6_pnM-g-mB952OUPyVT3jGXrOr3bkIENV4xiCzeZsXbQRVmYIWKmnw87UOTVVGSALCEQQ5Aw-CW1WDMijwSjltK7Tn10l5lbXkoNdBQrNKk5CXwt-/s1600/adobe-logo.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="Automatic Adobe Security Updates" border="0" height="170" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHiG1jf8_IJM5KELbO8qYjM4kj7Js6_pnM-g-mB952OUPyVT3jGXrOr3bkIENV4xiCzeZsXbQRVmYIWKmnw87UOTVVGSALCEQQ5Aw-CW1WDMijwSjltK7Tn10l5lbXkoNdBQrNKk5CXwt-/s200/adobe-logo.jpeg" width="170" /></a>Update adobe flash player can easily fight the latest threats to your computers. When updates are released, they fix bugs and security threats within the old program, while also adding additional features and functionality. You can choose how often Flash Player updates from the Global Settings Panel. The program provides a message, notifying you whenever there is an updated version. You can set automatic Adobe security update; follow the given points to set automatic update.<br />
<br />
<ul style="text-align: left;"><li> Visit the Adobe homepage (See Resources). Scroll down and press the "Flash Platform" icon in the bottom right corner.</li>
</ul><ul style="text-align: left;"><li>Click on the "Flash Player" icon which is under the heading "Clients."</li>
</ul><ul style="text-align: left;"><li>Press the "Get Support" hyperlink, located below the download link on the right of the page.</li>
</ul><ul style="text-align: left;"><li>Click the "Flash Player Settings and Help" hyperlink on the right of the page.</li>
</ul><ul style="text-align: left;"><li>Press the "Global Notifications Settings panel" hyperlink on the left side of the page. You have the option of turning on (or off) automatic updates. You can have the program search for updates every seven, 14, 30 and 60 days. You are notified whenever an update is available.</li>
</ul><i>Note:To get technical support ,you can reach <a href="http://www.vtechsquad.com/"><span style="background-color: cyan;">online technical support</span> </a>service desk of V tech-squad at their Toll Free No +1-877-452-9201.</i><br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-76651876561912944672012-05-22T03:02:00.000-07:002012-05-22T03:02:55.242-07:00Update your Adobe Flash player immediately, as computers are vulnerable even if they have antivirus software<div dir="ltr" style="text-align: left;" trbidi="on">Adobe issued a critical update to its popular Flash player this week. According to Daily Safety Check, users should update their Flash Player immediately to avoid potential cyber attacks, even if they have antivirus software.<br />
<br />
(PRWEB) May 18, 2012<br />
<br />
Adobe issued a critical update to their popular Flash Player this week. Daily Safety Check, a computer security firm that fixes security weaknesses on home computers, recommends that users update their Flash Player right away.<br />
<br />
"This is what is known as a zero day threat, meaning hackers have already been attacking this weakness," according to Jim McKenney, Chief Technology Officer of Daily Safety Check. "Even if users have antivirus installed and up-to-date, hackers can take over your computer just by visiting a legitimate website that has a malicious advertisement."<br />
<br />
"Antivirus is a good tool," according to McKenney, "but on its own antivirus software will not protect you from hackers. Hackers are increasingly targeting security weaknesses in applications like Flash and Microsoft Office, that antivirus just can't protect against." Daily Safety Check provides a computer security service for homes and businesses that updates security weaknesses every day, provides hacker monitoring, alerts users in case of an attack. Plus, it includes state-of-the-art antivirus software for about the same price as antivirus software alone."<br />
<br />
To interview Jim McKenney or find out more about computer security issues, please contact media(at)dailysafetycheck(dot)com.<br />
<br />
About Daily Safety Check<br />
Daily Safety Check is a next generation computer security company, applying layered security principles to home and business computers. The Home Edition includes antivirus software, plus applies daily security fixes, monitors for hackers and alerts you if you are attacked. Visit DailySafetyCheck.com for more information.<br />
<br />
For the original version:<a href="http://www.prweb.com/releases/prwebDailySafetyCheck/MayFlashUpdate/prweb9521976.htm">http://www.prweb.com/releases/prwebDailySafetyCheck/MayFlashUpdate/prweb9521976.htm</a><br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-88906969134134590022012-05-17T03:31:00.000-07:002012-05-17T03:31:31.103-07:00How to Disable a McAfee Firewall<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP7sVQjl_TsAF6N_6fJBa3SMRLTQcI9Wf4j7WcTLCG-zJ-biwqzK8KHsMFwnk8YXJ3eNbwpwu6d_K1QQ3Vt873dYunUWyn8UVNOuncP_8Qwre53F-FlN93ZnYrIc3fJ8hbvZwmlwh-h2Cg/s1600/mcafee_security.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="disable a mcafee firewall" border="0" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP7sVQjl_TsAF6N_6fJBa3SMRLTQcI9Wf4j7WcTLCG-zJ-biwqzK8KHsMFwnk8YXJ3eNbwpwu6d_K1QQ3Vt873dYunUWyn8UVNOuncP_8Qwre53F-FlN93ZnYrIc3fJ8hbvZwmlwh-h2Cg/s200/mcafee_security.jpg" style="background-color: black;" width="200" /></a></div>The McAfee firewall is included in the McAfee security suite, it block hackers and other external virus. Due to its integrated security features, it can often interfere with the installation of applications and software packages. Some programs may even prompt you to disable the firewall before installation begins. When you install some program it may even prompt you to disable the firewall before installation begins. To disable your McAfee firewall in your system follows the given steps.<br />
<br />
<b>Step1:</b> Find the McAfee Security Center taskbar icon. This is located in the lower right-hand side of your screen next to the clock. You may have to click on a small expansion arrow if Windows is set to automatically hide taskbar icons.<br />
<br />
<b>Step2:</b> When you have found it, double-click on the icon. It may take a moment to load, but the McAfee Security Center window will come up, displaying multiple configuration options.<br />
<br />
<b>Step3:</b> Click on "Configure" on the left side of the screen. If you don't see this option, click "Advanced Menu" at the bottom left to bring up the advanced options. Click on the "Internet & Network" tab, and click the button labeled "Disable Firewall."<br />
<br />
If you want to delete Mcafee from your computer,follow this article-<b><i><a href="http://ezinearticles.com/?How-to-Delete-McAfee-From-Your-Computer&id=6991715">How to Delete McAfee From Your Computer.</a></i></b><br />
<br />
<i>Note: To get McAfee support ,you can reach<a href="http://www.vtechsquad.com/"> <span style="background-color: cyan;">online technical support</span></a> service desk of V tech-squad at their <b>Toll Free No +1-877-452-9201</b>.</i></div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-74914677047483270612012-05-15T02:30:00.001-07:002012-05-15T02:34:43.421-07:00How to Fix a Redirect Error<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl-1fzgxtMZ9QKUdiLDhKcmNM8hSsLYA_Kldtq-rshZ3HZW2zF6IQ2xA7D9mTgntOkQKlKuPQwgZosOaz04W0e7e1iwhvXfJW1raDxoIpGDk-i0lwYZPLMjfGMm5mIVVxXhc9KUEcuARp7/s1600/redirect_virus.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="fix a redirect error" border="0" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl-1fzgxtMZ9QKUdiLDhKcmNM8hSsLYA_Kldtq-rshZ3HZW2zF6IQ2xA7D9mTgntOkQKlKuPQwgZosOaz04W0e7e1iwhvXfJW1raDxoIpGDk-i0lwYZPLMjfGMm5mIVVxXhc9KUEcuARp7/s200/redirect_virus.jpg" width="200" /></a></div>Trojans and viruses are often the culprit behind website redirects. When your computer has been infected with a virus or Trojan of this sort, every Internet search you conduct is automatically redirected to another undesirable website dictated by the virus or Trojan creator. An antivirus program is needed to fix and get rid of a website redirect error. Windows computers come installed with a program called Windows Defender that scans your computer for harmful files and fixes errors, including redirect errors. <br />
<br />
<b>Step1:</b> Close your open web browser.<br />
<br />
<b>Step2:</b> Click the Windows orb located in the bottom-left of the screen. The Windows Start menu launches.<br />
<br />
<b>Step3: </b>In search box, type Windows Defender from the Start menu and press “Enter.” The Windows Defender program launches.<br />
<br />
<b>Step4:</b> Click “Scan” from the top menu and then select “Full Scan.” Windows Defender searches your entire hard drive for the files causing the redirect error. The files are quarantined and automatically removed. This could take several minutes to several hours depending on how many files reside on your system.<br />
<br />
<b>Step5:</b> Click the “X” located in the upper-right corner of the Windows Defender tool to close the program after the infecting files have been removed.<br />
<br />
<i>Note:To solve any technical related or virus problems in your computer system then you can reach <b style="background-color: cyan;"><a href="http://www.vtechsquad.com/">online technical support</a></b> service desk of V tech-squad at their <b>Toll Free No +1-877-452-9201</b>.<br />
</i><br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-16082508130824535262012-04-26T02:03:00.003-07:002012-04-26T04:53:33.730-07:00How to Temporarily Disable McAfee Virus Protection<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipq-jmeV1NhbHEU93kebfdcF3JsTZ77qYN7KVEBp18ORQRe_J5JIzz9oheKkcJS1GucZPUbGEpq6B5x57Rqf3oTSEYbqCTjV9PGTPdMBKnor9gtqHgThxudHQ-gO6KwdZi8XIBrQg9KGUT/s1600/mcafee_logo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="temporarily disable mcafee virus protection" border="0" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipq-jmeV1NhbHEU93kebfdcF3JsTZ77qYN7KVEBp18ORQRe_J5JIzz9oheKkcJS1GucZPUbGEpq6B5x57Rqf3oTSEYbqCTjV9PGTPdMBKnor9gtqHgThxudHQ-gO6KwdZi8XIBrQg9KGUT/s200/mcafee_logo.jpg" width="200" /></a></div>The McAfee anti-virus program protects your computer from malicious software which can install itself without your knowledge.Protect from malicious virus you need <a href="http://www.vtechsquad.com/" style="background-color: cyan;">Mcafee antivirus support</a>. But it can get in the way of legitimate programs you are trying to install, so you may need to temporarily disable it from time to time. Here is a different method of disabling the program depending on whether you are using the stand-alone McAfee virus scan software or you have the entire McAfee Security Center suite. <br />
If you want to delete Mcafee antivirus permanently from your system then follow this article-<i><a href="http://ezinearticles.com/?How-to-Delete-McAfee-From-Your-Computer&id=6991715">How to Delete McAfee From Your Computer.</a></i><br />
<br />
<b>McAfee Anti-Virus:</b><br />
<br />
<b>Step1:</b> Find the red "M" icon for the McAfee anti-virus program in the expanded system tray and right-click on it.<br />
<br />
<b>Step2</b>: And try to look for an option in pop-up menu that says either "Exit" or "Disable" and click on it.<br />
<br />
<b>Step3:</b> Click "Yes" when asked if you are sure you want to disable the McAfee anti-virus program. Double-click on the McAfee desktop icon or re-start the computer entirely to enable the program again.<br />
<br />
<b>McAfee Security Center:</b><br />
If you want to change from mcafee security center then follow the given steps:<br />
<br />
<b>Step1:</b> Locate the red "M" icon in the system tray at the bottom-right corner of the desktop. Double click on it to open the Security Center program.<br />
<br />
<b>Step2:</b> Click on the "Advanced" tab and then choose the option labeled "Configure."<br />
<br />
<b>Step3: </b>Click on the "Files" button on the top toolbar. Click on the "Disable" button at the center of the screen.<br />
<br />
<b>Step4:</b> Enter in a time for the program to automatically turn back on in the text field at the right or restart the computer to turn McAfee Security Center back on.<br />
<br />
If you want to repair Mcafee then follow this article-<i><a href="http://ezinearticles.com/?How-to-Repair-McAfee-Antivirus&id=6966757">How to Repair McAfee Antivirus.</a></i><br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-24768960082905309432012-04-24T01:40:00.000-07:002012-04-24T01:40:36.579-07:00How to Remove the System Volume Information Virus<div dir="ltr" style="text-align: left;" trbidi="on"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNMMtsrsGVfQn_yseENecuLKDsUv8c-J8rkfxmRANDAUa4Hv71KWSm2hy6bZ-mN1-vyCfEz59q_xp1LJpeH745RIxRr-Rgn6Bhf4sDuqqA2G3s_pzO6P9jYGFIFrGGxIADhSVBH1SRlIuk/s1600/virus.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="remove the system volume information virus" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNMMtsrsGVfQn_yseENecuLKDsUv8c-J8rkfxmRANDAUa4Hv71KWSm2hy6bZ-mN1-vyCfEz59q_xp1LJpeH745RIxRr-Rgn6Bhf4sDuqqA2G3s_pzO6P9jYGFIFrGGxIADhSVBH1SRlIuk/s200/virus.jpg" width="171" /></a>Windows uses the System Volume Information to store settings and information about your computer's system configuration. Restore points for your computer saves the windows system restore. System Restore allows you to roll your computer back to a restore point in case of a crash or computer corruption. Sometimes the restore points in the System Volume Information become infected by a virus. To remove this virus from the system volume information, you must delete the infected restore points.Here given list of points will help you to remove the system volume information virus .<br />
<br />
<b>Windows 7:</b><br />
<ul style="text-align: left;"><li>From start menu, right click on computer and choose properties. Then it will open the system properties window.</li>
</ul><ul style="text-align: left;"><li>Click on the System Protection link in the top left corner. This will launch the System Protection window.</li>
</ul><ul style="text-align: left;"><li>Select your computer's main hard drive from the drive select list, then click the "Configure" button.</li>
</ul><ul style="text-align: left;"><li>Select the option "Turn off system protection" under Restore Settings and click "OK." This will delete all restore points, including any that have been infected with a virus.</li>
</ul><b>Windows XP:</b><br />
<ul style="text-align: left;"><li>From start menu, right click on computer and choose properties. Then it will open the system properties window.</li>
</ul><ul style="text-align: left;"><li>Click on the "System Restore" tab in the properties window.</li>
</ul><ul style="text-align: left;"><li>Select the option "Turn off system restore" then click ok</li>
</ul><ul style="text-align: left;"><li>Click "Yes" to confirm that you want to turn off System Restore. </li>
</ul><ul style="text-align: left;"><li>Allow your computer to change the System Restore setting. This will delete all restore points, including any that have been infected with a virus.</li>
</ul>To solve any technical related or virus problems in your computer system then you can reach <a href="http://www.vtechsquad.com/virus-removal/"><b><span style="background-color: cyan;">online technical support</span></b></a> service desk of V tech-squad at their <b>Toll Free No +1-877-452-9201</b>. <br />
<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-7683373487821483072012-04-19T05:05:00.001-07:002012-04-19T05:06:35.622-07:00How to Repair PC Security after a Virus Attack<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNvWbOhEVHGmAsREg8JDsXsLq0l6m_yQtBDtAJapQhtPZp1oqtbLe2JV_hoiTXMl_sQuCQrFsmmkVdFUtq2fY6Y68mcFSayEqhPsHjljuxUHyNTavwBtiOME6CUP6LFNWEg6H3V7FXQ_Y0/s1600/virus_security.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="repair pc security after a virus attack" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNvWbOhEVHGmAsREg8JDsXsLq0l6m_yQtBDtAJapQhtPZp1oqtbLe2JV_hoiTXMl_sQuCQrFsmmkVdFUtq2fY6Y68mcFSayEqhPsHjljuxUHyNTavwBtiOME6CUP6LFNWEg6H3V7FXQ_Y0/s200/virus_security.jpeg" width="200" /></a></div>After a virus attack, Windows always gets damaged and with problems involving the registry and/or our folders and documents. Viruses change many different settings on your computer so that the virus can steal information and download additional files to your computer. Repairing your PC’s security after a virus attack needs to be a top priority to prevent further virus attack and infection. Follow the given steps to repair your PC security after a virus attack.<br />
<br />
<b>Step1:</b> update antivirus can easily protect virus, so you should update your antivirus software. Just click on the update button on the start page.<br />
<br />
<b>Step2:</b> Online virus is most dangerous for your pc. When update is completed then disconnect your computer from internet. You don't want your computer to be infected with another virus through your modem while your security settings are still compromised.<br />
<br />
<b>Step3:</b> After updating the software, you should restart your computer and hold down F6 to activate Safe Mode. Scan the system again in Safe Mode.<br />
<br />
<b>Step4:</b> Again restart your computer normally and access your security settings through the Control Panel in the Start menu. Click on the Security Center and click on the Firewall to make sure it is enabled.<br />
<br />
<b>Step5:</b> after completing the all above steps, then reconnect your system to the internet connection. Try to update your browser, which give better performance and closed the previous security breaches.And try to follow the given points.<br />
<br />
<ul style="text-align: left;"><li>Avoid Sharing Files via Unsecured Wireless Network</li>
</ul><ul style="text-align: left;"><li>Install Good Antivirus on Your PC</li>
</ul><ul style="text-align: left;"><li>Always Update Your Antivirus Software</li>
</ul><ul style="text-align: left;"><li>Avoid Transferring Data via Strange Removable Disks</li>
</ul><ul style="text-align: left;"><li>Avoid Browsing the Internet without Antivirus on Your PC</li>
</ul><br />
If you are unable to solve this problem then you can take online virus removal support from technical support company. To get online virus removal support, you can reach <span style="background-color: cyan;"> </span><a href="http://www.vtechsquad.com/" style="background-color: cyan;">online technical support </a>service desk from V tech-squad at their<b> Toll Free No +1-877-452-9201</b>.<br />
<br />
</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-40974481843978135832012-04-11T01:52:00.000-07:002012-04-11T01:52:09.735-07:00How to Partition Without Losing Data in Windows XP<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCzKkf73lNsv12fubjgqN7hJrxOQnyaQxnKOUyJ_lgCMtvcLRSmPp32uItGO6AL0TR4iqf-Ye91IXA_3e_QEUNM8G7xSWZWq-j0KJkyTPsW2rgu9ueMj6ovKOS43oIDBfKMQhx46oTXwX3/s1600/Windows+Xp.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="partition without losing data in windows xp" border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCzKkf73lNsv12fubjgqN7hJrxOQnyaQxnKOUyJ_lgCMtvcLRSmPp32uItGO6AL0TR4iqf-Ye91IXA_3e_QEUNM8G7xSWZWq-j0KJkyTPsW2rgu9ueMj6ovKOS43oIDBfKMQhx46oTXwX3/s200/Windows+Xp.jpg" width="180" /></a></div>Partitioning a drive is the process of creating dividers on the drive. You may find that you have to change the partition size to increase or decrease the space on a particular drive. Creating multiple partitions carries the risk of losing data, though Windows XP allows a user to partition without losing data. However, you must have access to the Administrator account for XP before you can attempt it. <br />
<br />
<b>Step1: </b>Login to XP under the Administrator account.<br />
<br />
<b>Step2:</b> Click the "Start" button on the lower-left side of the screen and select "Run" from the Start menu.<br />
<br />
<b>Step3:</b> Type "compmgmt.msc" in the Run window and click "OK." Select the "Disk Management" option.<br />
<br />
<b>Step4:</b> Right-click on the unallocated space where you want to create the partition and select the "New Partition" option.<br />
<br />
<b>Step5: </b>Click "Next" when the New Partition Wizard appears.<br />
<br />
<b>Step6:</b> Choose the "Primary partition" option and click "Next."<br />
<br />
<b>Step7: </b>Choose the size of the partition and click "Next." Assign a drive letter and click "Next."<br />
<br />
<b>Step8:</b> Choose the "Format this partition with the following settings" option. Select the "NTFS" file system and assign a drive name. Click "Next."<br />
<br />
<b>Step9:</b> Look over the options which you already selected and click "Finish" to create the partition.<br />
<br />
If you need help managing your hard drive or any technical solution for your pc then you can reach <a href="http://www.vtechsquad.com/"><b style="background-color: cyan;">online technical support</b></a> service desk of V tech-squad at their Toll Free No +1-877-452-9201. </div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-59299814341749978572012-04-03T21:41:00.002-07:002012-04-03T21:43:38.329-07:00How to Fix Microsoft Error Code Stop: c0000135 User32<div dir="ltr" style="text-align: left;" trbidi="on">The Microsoft Windows XP recovery console allows you to easily fix the error Stop: c0000135 User32. This error occurs because of the corrupt user32.dll operating system file. Once this file is replaced with a fresh one from the Windows XP setup CD, the error is rectified. You will need administrator rights to perform this process.Follow the given steps to fix Microsoft error code .<br />
<br />
<b>Step1:</b> Insert the Windows XP setup CD in the CD drive of your computer, and then restart your computer.<br />
<br />
<b>Step2:</b> Press “R” on your keyboard when you see the Windows XP "Welcome to Setup" screen. This will start the Windows XP recovery console. If you are asked to enter the administrator password, type it and press “Enter.”<br />
<br />
<b>Step3:</b> Type the following commands one by one, without quotes, at the command prompt, and then press “Enter.”<br />
“EXPAND drive_letter1:\i386\user32.dll_ drive_letter2\windows\system32”<br />
“EXPAND drive_letter1:\i386\userinit.ex_ drive_letter2\windows\system32”<br />
Replace drive_letter1 here with the CD drive letter of your computer in which the Windows XP setup CD is present (for example, E:), and drive_letter2 here with the letter of the drive in which Windows XP is installed on your computer (for example, D:).<br />
<br />
For <a href="http://www.vtechsquad.com/microsoft-support/" style="background-color: cyan;">Microsoft product support</a><span style="background-color: cyan;"> </span>you can reach online technical support service desk of V tech-squad at their Toll Free No +1-877-452-9201 </div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-26915969656400084152012-03-28T23:53:00.002-07:002012-03-29T03:45:17.236-07:00How to make your browser secure<div dir="ltr" style="text-align: left;" trbidi="on">Every browser has its share of security problems. Make Secure browser is the basic ways to protect your computer from potentially harmful online content or malicious software is easy, fast and free. Try to set your browser's security settings at the appropriate level.<br />
<br />
<b>No matter which browser you use, always follow these top five security tips:</b><br />
<ul style="text-align: left;"><li>Delete spam messages without opening them or replying to them.</li>
</ul><ul style="text-align: left;"><li> Use great caution when clicking on links sent to you in e-mail or text messages.</li>
</ul><ul style="text-align: left;"><li>Do not open e-mail attachments unless you know the sender and you're expecting the attachment.</li>
</ul><ul style="text-align: left;"><li>Create strong passwords. Use different passwords for your online banking accounts.</li>
</ul><ul style="text-align: left;"><li>Make sure you use firewall, as well as antivirus and anti spyware software that is automatically updated.</li>
</ul><b>How to check your Internet Explorer security settings:</b><br />
<br />
1. Open Internet Explorer.<br />
2. Click the Tools button and then click Internet Options.<br />
3. Click the Security tab.<br />
<br />
<b>You will see four security zones: </b><br />
<br />
Internet: The level of security for the Internet zone is applied to all Web sites by default. The security level for this zone is set to medium-high, but you can change it to either medium or high. The only Web sites for which this security setting is not used are those in the Local Intranet zone, or sites that you specifically entered into the Trusted or Restricted Site zones.<br />
<br />
<b>Local Intranet:</b> The level of security for the Local Intranet zone is applied to Web sites and content that is stored on a corporate or business network. The security level for the Local Intranet zone is set to medium, but you can change it to any level.<br />
<br />
<b>Trusted Sites:</b> The level of security for Trusted Sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information. The security level for Trusted Sites is set to medium, but you can change it to any level.<br />
<br />
<b>Restricted Sites:</b> The level of security for Restricted Sites is applied to sites that might potentially damage your computer or compromise your personal information. Adding sites to the restricted zone does not block them, but it prevents them from using scripting or any active content. The security level for Restricted Sites is set to high and cannot be changed.<br />
<br />
<b>Here is some steps to view or change the security setting on Internet Explorer 7/8:</b><br />
<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWRPAo_PGhlJ9qJ0iHy40aIENnvI1lnrXrugYJCbW097Cvh0h8F0P0lApWLUprFVcUor-sswmAzWrHNAOZCNWJjRGMhzI2Hezjr-LUxuKSsPWrqnAQMpz8T-2eOlnIjTmE_kYOu21sMa9A/s1600/ie7_trusted_sites.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="internet explorer security" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWRPAo_PGhlJ9qJ0iHy40aIENnvI1lnrXrugYJCbW097Cvh0h8F0P0lApWLUprFVcUor-sswmAzWrHNAOZCNWJjRGMhzI2Hezjr-LUxuKSsPWrqnAQMpz8T-2eOlnIjTmE_kYOu21sMa9A/s200/ie7_trusted_sites.jpg" width="158" /></a></div><br />
In addition to these default security levels, you can customize individual security settings.<br />
<br />
<b>Step1: </b>Open Internet Explorer.<br />
<br />
<b>Step2: </b>Click the Tools button and then click Internet Options.<br />
<br />
<b>Step3:</b> Click the Security tab.<br />
<br />
<b>Step4:</b> Click the "Custom level..." button.<br />
<br />
<b>Step5: </b>At the bottom of the pop-up box, you can reset the security setting to something higher or lower. Settings that are not at recommended levels will be highlighted in red. <br />
<br />
<b>Step6:</b> If you modify your security settings and want to change them back to the default level, follow the above instructions through step 4. Then click on the "Reset all zones to default level" button.<br />
<br />
To solve any technical related problem in your computer system then you can reach <a href="http://www.vtechsquad.com/" style="background-color: cyan;">online technical support </a>service desk of V tech-squad at their Toll Free No +1-877-452-9201. </div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0tag:blogger.com,1999:blog-7164729996448383448.post-13653462327423352802012-03-21T00:38:00.001-07:002012-03-21T01:03:23.553-07:00Safeguard your data against loss!<div dir="ltr" style="text-align: left;" trbidi="on">To safeguard your data from data loss, you need a secure, reliable, and functional and offsite data protection. Some data is also confidential and you don’t want lose it and also don’t want to give permission to access this file without your permission. Here are some points which will help you to protect your all-important user data from loss and/or unauthorized access.<br />
<br />
<b>Back up early and often</b><br />
<br />
The single most important step in protecting your data from loss is to back it up regularly. You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.<br />
<br />
<b>Use file-level and share-level security</b><br />
<br />
To keep others out of your data, the first step is to set permissions on the data files and folders. If you have data in network shares, you can set share permissions to control what user accounts can and cannot access the files across the network. With Windows 2000/XP, this is done by clicking the Permissions button on the Sharing tab of the file's or folder's properties sheet.<br />
<br />
<b>Password-protect documents</b><br />
<br />
Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, from tool option you can set password. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used.<br />
<br />
<b>Use EFS encryption</b><br />
<br />
There are many third-party products available that will allow you to encrypt an entire disk. Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it's written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the "outer" disk.<br />
Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users.<br />
<br />
<b>Make use of a public key infrastructure</b><br />
<br />
A public key infrastructure (PKI) is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party, certificate-based security is stronger.<br />
<br />
<b>Hide data with steganography</b><br />
<br />
You can use a steganography program to hide data inside other data. For example, you could hide a text message within a .JPG graphics file or an MP3 music file, or even inside another text file .Steganography does not encrypt the message, so it's often used in conjunction with encryption software. The data is encrypted first and then hidden inside another file with the steganography software.<br />
<br />
<b>Protect data in transit with IP security</b><br />
<br />
Your data can be captured while it's traveling over the network by a hacker with sniffer software .To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it. Windows 2000 and later Microsoft operating systems have built-in support for IPsec. Applications don't have to be aware of IPsec because it operates at a lower level of the networking model.<br />
<br />
<b>Virus protection</b><br />
<br />
Protect your computer against viruses and spyware. These are typically sent through email or your browser. Viruses can cause tons of damage to stored data. They can delete files and provide others access to your computer. Be sure to install a quality anti-virus/anti-spyware program onto your computer.Otherwise you can take <a href="http://www.vtechsquad.com/virus-removal.html"><b>online virus removal support</b></a> service from any third party.<br />
<br />
<b>Secure wireless transmissions</b><br />
<br />
Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely.<br />
<br />
<b>Use rights management to retain control</b><br />
<br />
If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, you can set rights so that the recipient can read the Word document you sent but can't change, copy, or save it. You can prevent recipients from forwarding e-mail messages you send them and you can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time.<br />
All above points are the basic guidelines to safe your data from data loss. To solve technical related problem in your computer then you can reach <a href="http://www.vtechsquad.com/" style="background-color: cyan;"><b>online technical support</b></a> service desk of V tech-squad at their Toll Free No +1-877-452-9201.</div>Gauravhttp://www.blogger.com/profile/01862242874520813930noreply@blogger.com0