Jump to content

Search the Community

Showing results for tags 'tips'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • Forum Announcements
    • News & Offers
    • WiseCleaner Advices & Suggestions
  • Wise Products
    • Wise Care 365
    • Wise Anti-Malware
    • Wise Disk Cleaner
    • Wise Driver Care
    • Wise Registry Cleaner
    • Other WiseCleaner Products
  • Computer Help and Discussion
    • Computer Trouble-Shooting Discussion
    • Software
    • The Lounge

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 29 results

  1. The Microsoft Windows Installer Error 1320 may occur when you attempt to install software on your computer. For example, when you attempt to install the Statistical Package for the Social Sciences software by IBM, you may receive an error message similar to "Error 1320. The specified path is too long. C:\ProgramData\Application Data\SPSS." Several other programs that you attempt to install or uninstall an application may also produce the MSI 1320 Error. MSIExec.exe and InstMsi.exe Functions · When installing the SPSS software, the MsiExec.exe and InstMsi.exe functions return the MSI 1320 error if the installation folder named INSTALLDIR is mapped to a network drive. Path names that are too long will also return MSI 1320 errors. For example, if you work with Visual Studio and you place projects in directories other than the hard drive, commonly "C," this is likely to occur. DOS SUBST Command · If you placed the INSTLLDIR folder in a substituted drive using the DOS SUBST command, an MSI 1320 may be returned. The DOS SUBST command is used to associate a path with the letter of a virtual or physical drive. Errors will occur if you use the DOS SUBST command on a network drive. Temporarily Modify Shortcut · Modify the C:\ProgramData directory by removing the Application Data shortcut before you install the software. You'll have to show hidden files to locate the shortcut. To do this, navigate to the "Start" button and select the "Control Panel." Click "Appearance and Personalization," and then click "Folder Options." Click the "View" tab, and then click "Show hidden files and folders" located under "Advanced Settings." Click "OK." Drag the "Application Data" shortcut to your Desktop. If that's not possible, rename the folder to unlock it first, and then drag the "Application Data" shortcut to your Desktop. Place the shortcut back to the C:\ProgramData directory after you finish installing the software. Warnings and Considerations · Some of your settings may not be restored after you remove and then replace the Application Data shortcut. Workaround this by selecting the "Do not show hidden files and folders" option in the Folder and Search Options category. You'll also want select the "Hide protected operating systems files" option to restore your original settings. Contact the software or hardware manufacturer of the software or hardware you're trying to install to get the appropriate support. Visiting the manufacturer's website and posting a query on a forum may lead to a faster result.
  2. DIY Tips: How to Make Your Own Theme of Wise Care 365 (only applies to v2 edition) It would be a pleasure to see your favourite picture become the theme of Wise Care 365. You know what? You can do it all by yourself! It’s easy & fast! Let’s get started. Step-1: Get the template files here. 1. Download the skin template files package here WiseCare365Theme-Template-File-20130922.zip 2. Unzip it to a folder called “newskin”. Step-2: Replace the pictures. 1. Open the “newskin” folder, you’ll find the following files: (1) skin.ini (2) skin.png (3) frame.jpg (4) MainFrame (folder with 6 files) (4.1) checkup.png (4.2) privacy_protection.png (4.3) system_cleanup.png (4.4) wise_utilities.png (4.5) tabbg.png (4.6) btn.png 2. Please replace the pictures above with the ones you have prepared for the new theme. (The files with the suffix of “.jpg” & “.png” are pictures.) This time we only try to make simple skin, so please just simply replace the pictures named “frame.jpg” and “skin.png”. 3. Notice: a. Please keep your new picture the same name and format as the replaced. b. The size of the picture “skin.png” cannot be changed. (97*62 pixels) c. For aesthetic reasons, the sizes of other pictures can be changed but not suggested to. Only original size or minor modification is suggested. Step-3: Modify the configuration file. Please open the “skin.ini” file to modify the configuration information needed. 1. Name= (the name of your DIY theme) 2. Author= (the author name you prefer to display) 3. Comment= (introduction of the theme) Step-4: Wrap the skin files. 1. Select all the files and right-click to open the context menu. 2. Then click “add to archive…”. 3. Please refer to the screenshot. Fix the “archive format” to “zip” and type the file name above it. 4. Set the passward to “12345”. 5. Click “OK” to complete the process. Step-5: Modify the suffix of the zip file. Please change the suffix “.zip” to “.wsk” and save the change. Step-6: Start to use the skin. 1. On your desktop, right-click the icon of Wise Care 365 and click “open file location” on the context menu. 2. Open the folder of “skins” and copy the “.wsk” file from step-5 to this folder. 3. Open Wise Care 365 again, click “Theme”! 4. Voila! Enjoy! ------------------------
  3. Navigating long documents and Web pages requires the ability to scroll smoothly. Dealing with a monitor screen that jumps unexpectedly makes it difficult to read text and see Web pages properly. This jumpy behavior can occur due to numerous factors, ranging from software conflict or faulty hardware. Malfunctioning Mouse · In some cases, a jumpy screen is caused by a malfunctioning mouse. Many computer mice offer a scroll wheel in between the two selection buttons on the front, which helps scroll without the use of the scroll bar on the right of the screen. A faulty mouse may send incorrect commands to the computer, resulting in a jumpy screen. Try a different mouse on your computer to see if the screen continues to jump. If not, the original mouse was your culprit. Outdated Drivers · All the components within your computer require specialized files called drivers to communicate with each other properly. A jumpy screen could indicate out-of-date drivers in the graphics card or monitor. If these files are older, they may not work properly with each other or the operating system, causing odd screen behavior. Updates for your operating system are found at Microsoft.com, while your computer manufacturer's support Web pages may offer driver updates specific to your system. Monitor Issues · Monitor failure produces odd screen behavior, including flickering, jumping and color changes. Older, large CRT monitors contain components inside that degrade over time, and are susceptible to magnetic interference, both of which can produce a jumpy screen image. Failing monitors do not communicate with the computer and graphics card properly, regardless of driver version. Connect your jumpy monitor to another computer and see if the problem persists. If it does, it's a good indication that the monitor itself is at fault and needs replaced. Virus Infestation · Even if you have the most up-to-date drivers and operating system, a virus infestation can cause any number of problems within your computer and display. A virus can alter the way your monitor communicates with the mouse, graphics card or motherboard, which can in turn cause screen issues such as jumping. Run a virus scan to find and remove any hidden invaders that may be causing your screen issues.
  4. Most "freezes" are just software lockups, often limited to just one program, although they can cause the entire system seemingly to hang. The remainder are caused by hardware. Failing power supplies can cause all sorts of trouble, for example, including freezes. Memory is also a frequent culprit. Reseating the memory module fixes memory-related problems one-third of the time on desktop systems and one-quarter of the time on laptop systems, according to studies done by Microsoft. Instructions Is the Whole System Freezing? o 1 Press "Alt" and "F4." This may close the program without any further problems. o 2 Press the "Alt" and "Tab" keys together to switch to another program. If you are unable to see any change when you press "Alt" and "Tab," then try to bring up the Task Manager by pressing the left "Control" key, the left "Shift" key and "Escape." If that key combination doesn't open the Task Manager, press "Ctrl," "Alt" and "Del," then press the down arrow on the keyboard four times to highlight "Start Task Manager." Press "Enter." o 3 Determine the problem area. If your mouse cursor moves freely, then you have a locked up program and you need to find the process that's hogging the CPU. If the whole system seems jerky, and you can hear or see your hard drive being continuously active, then you are facing memory exhaustion. o 4 Go to the "Processes" tab. Sort by CPU or Memory as determined. If your mouse is functional, click the headers to sort the appropriate column. Otherwise press "Tab" to move forward or "Shift" and "Tab" to move back through the controls until you get to the header. Then use the arrow keys to select the header you want to sort by and press "Enter." o 5 Select the item at the top of the list, which should be the problem program. If your mouse doesn't work, use "Tab" or "Shift" and "Tab" to navigate to the list. o 6 Click the "End Process" button, or press "Alt" and "E." Then click "End Process" in the confirmation box or press "Spacebar" on the keyboard. If none of this worked, your computer may be totally frozen due to a component problem. Component Problems o 7 Power down the computer and unplug it from the power source. For a desktop computer, open up the computer case, consulting your owner's manual as necessary, to locate and reseat the memory modules. Pull the retaining clip back from the memory module and pull the module upward out of its socket. Push the memory into the slot while pulling the retaining clips gently toward the memory until it is fully seated. To reseat it, make sure the notch is aligned with the memory slot. For laptops, locate your memory, which is usually found behind a labeled door on the underside. Unscrew the door. Pull the retaining clips back from the memory module and pull the module toward you to a 45-degree angle. Then pull the module straight out of its socket. Push the memory into the slot at a 45-degree angle. Rotate the module gently until the retaining clips are securely fastened, and the module is fully seated. To reseat it, make sure the notch is aligned with the memory slot. o 8 Unscrew the retaining screw on the faceplate of the video memory card, if present in your desktop computer, and push the latch at the rear of the card toward the slot. Pull the card straight out, then push the card straight into the slot until the latch reengages. Screw the faceplate into the case. This does not apply to laptops. o 9 Reseat any other add-in cards present in the desktop computer. Overheating Problems o 10 Check the temperature. If your computer supports temperature monitoring, use the vendor-supplied utility to check temperatures. Anything above 140 degrees Fahrenheit should be considered suspect. o 11 Identify faulty fans. Any fans not moving under load with high heat showing should be immediately replaced in desktops. If your laptop has a faulty fan, you need to have it professionally serviced. o 12 Add more cooling fans to your desktop computer. Fan width is measured in millimeters. Common sizes are 80, 92 and 120 millimeters. You need to purchase fans that fit into your computer case's fan mounts. If your computer came with a jumper diagram for the motherboard, locate the fan connectors, usually labeled "FAN1" to "FAN4." Determine if the fan connectors have three pins or four pins. Buy additional fans with the same number of pins as those already in your case have. If you can't determine the number of pins, get fans that include "Molex" adapters to connect to your power supply. Start by mounting fans into the front of the case, blowing toward the back. If the problem persists, add more fans to the rear of the case, blowing outward. Laptop users can purchase a cooling pad that comes with extra cooling fans and typically connects via USB. o 13 Add a heat spreader to the memory modules in your desktop. This does not apply to laptop users. Open up the computer case, consulting your owner's manual as necessary, to locate the memory modules. Pull the retaining clip back from the memory module and pull the module upward out of its socket. If the heat spreader's manufacturer provided directions, follow them. Otherwise, remove the adhesive backing from one-half of the heat spreader. Apply the heat spreader to the memory module. Apply the other half of the heat spreader, ensuring that the screw holes or the clip slots are aligned. Screw or clip it together. Return the module to your computer case, as when reseating it in Section 2, Step 1. Power Problems o 14 Ensure your computer is plugged into a high-quality surge suppressor, not just a power strip. o 15 Try the computer in different outlets around the house, especially those on another electrical circuit. o 16 Plug the computer into an uninterruptible power supply, or UPS. o 17 Connect your desktop's internal components to different power supply cables. The internal power supply has several power converters in it, so connecting your computer's internal components to different cables or cable bundles can spread the power load to help avoid under-voltage problems. Tips & Warnings· Failures caused by mechanical or electrical problems inside the case often lead to random computer freezes and reboots. This class of problems is almost always caused by vibrations. If hitting your desk makes your computer lock up, this is probably the problem. · Modern CPUs have a thermal cut-off inside them that turns off the computer to prevent critical damage, but other components do not. Video cards, memory and the motherboard control chips, often called the north bridge, can all cause computer freezes. Signs are freezes that occur only when your computer is under high load or during heavy 3-D or video decoding. · Low voltage, unclean power, and overloaded circuits can all cause temporary, sporadic problems with your computer. Unclean power and overloaded circuits will seem random. Low voltage is usually be tied to specific actions like starting to play games or watch movies. With these problems, your power supply may not be functioning properly. You may need to replace the power supply. · Never open the computer's power supply. It presents a serious risk of personal injury due to high voltage. · Do not work inside a computer without protection from static electricity. Get an ESD wrist strap if possible and wear it while repairing your computer. If not, touch the unpainted metal of your case, usually on the rear, while performing the repair. Avoid wearing clothing that attracts static, such as wool, and stand up while working on the computer. · Wait one minute after turning off the power supply before unplugging the computer to give the capacitors time to drain. · Hold components by their edges and avoid touching the gold contacts.
  5. The Image Mastering API is an interface used to allow disc-authoring applications to communicate with your disc-burning hardware and the Windows operating system. In Windows, the Image Mastering API resources and instructions are located in dynamic link library files. When an application attempts to send IMAPI instructions, the instructions in these DLL files are used. If an error occurs while trying to author a disc, rebuild these files using the System File Checker utility. Instructions o 1 Save your work and restart your computer. Hold down your “F8” key continuously during startup. o 2 Select “Safe Mode with Command Prompt” and press “Enter.” This runs Command Prompt in a full window. o 3 Type “CD C:\Windows\System32” and press the “Enter” key to make the System32 folder the active directory. o 4 Enter each of the commands below one at a time to unregister the Image Mastering API module. Regsvr32 /u /s imapi.dll Regsvr32 /u /s imapi2.dll Regsvr32 /u /s imapi2fs.dll o 5 Type each command below one at a time to rename the Image Mastering API module files. Ren imapi.dll imapi.bak Ren imapi2.dll imapi2.bak Ren imapi2fs.dll imapi2fs.bak o 6 Input the following commands individually to run the System File Checker utility to replace the Image Mastering API module files. SFC /scanfile=imapi.dll SFC /scanfile=imapi2.dll SFC /scanfile=imapi2fs.dll o 7 Type “CD Drivers” and press “Enter” to change the active directory to the Drivers folder. o 8 Type “SFC /scanfile=cdrom.sys” and press “Enter” to run the System File Checker on the CDROM.sys file. o 9 Type “Shutdown –r –t 01” and press “Enter” to restart the computer.
  6. FileZilla is a File Transfer Protocol (FTP) program that website owners use to add, modify or delete files and directories on their website server. Although many FileZilla users have no problems retrieving their website's directory and files, you may find that Filezilla cannot retrieve your website's directory. There are five primary causes for issues with retrieving the website directory in FileZilla. By going over each possible cause and fix, you can usually get FileZilla to retrieve your website's directory. Incorrect Username/Password o Before you can view or create directories on your website's server, you must first log into it securely with your username and password. One of the first things to check when FileZilla cannot retrieve the directory for your website is your username and password -- if either one is incorrect, FileZilla will fail to log you in and retrieve the directory. Type in your username and password again and this will often fix the problem. If you do not know the username and password for your website server, ask your server administrator. Incorrect Host Address o In addition to the username and password, you must also know the correct host address for your website. If you type in the wrong host address for your site, FileZilla will be unable to retrieve your website's directory. Generally, the correct host address for your site is the website address itself, although this may vary depending on who is hosting your site. If you do not know the host address for your website, contact your server administrator. Directory Permissions o To modify or access folders on your website's server, you must have the correct permissions; without them, FileZilla won't be able to retrieve or modify your directories. Directory permissions typically are set up automatically by your Web host, but you can change them as long as you are able to see the directories. As FileZilla cannot retrieve the directory in this case, your best bet is to contact your server administrator and have him give you full permissions. FileZilla then should be able to retrieve the directory. Other Causes o FileZilla may be unable to retrieve your website's directory because there is a problem with your copy of FileZilla. You may be able to fix the problem by installing any available updates. FileZilla also may be unable to retrieve the directory because your website's server is down temporarily. In this case, you may be able to access the directory at a later time. Contact your Web host to determine if there are any outages or down times.
  7. When looking to secure your computer, you'll want to consider a few different factors: the security of your data against malware and hackers and the physical security of your machine. Operating systems come with basic levels of security and you can use free software to add additional security like data encryption and network firewalls. These options are available to any user, meaning you don't need to budget for expensive business licenses and complex installations. Security Software o There are a few different types of security software available to protect your computer against malicious software, or "malware." These programs range from spyware scanners and firewalls to anti-virus programs and full security suites like Comodo Internet Security, ZoneAlarm Internet Security and AVG Internet Security. The suites have many features tied into one program, so one suite is generally enough to protect your computers. If you want to use individual programs for each function so you have more control, you can download any anti-virus, anti-spyware and firewall program you like. Many of these options are completely free for anyone, so you don't need to purchase a company version with multiple licenses, which can be pretty pricey. Encryption and Passwords o You may know that you can enable a password on your user account, but this only goes so far. You can add an additional layer of security by enabling a secondary password through BIOS. This password will be required even to start the computer and access different settings. Enable this via the "Security" tab of your BIOS. You can also encrypt your data to make it harder for people to access your data. This protects your data even if someone else steals your physical hard drive. Use free software like TrueCrypt, AxCrypt or Cloudfogger (links in Resources) to encrypt your hard drive and all that data on it. Network Security o For any computer connected to the Internet, network security is very important. Enabling your router's firewall prevents incoming and outgoing traffic from being hijacked, and enabling your wireless network passwords prevents random strangers from accessing your account and thus any computers on your network. Access your router's control panel to enable these options. Remember to use a strong password of numbers, letters and symbols, and avoid using any personal information like names or birthdays. You can also use Windows Firewall to select how strict your firewall is depending on what type of network you're using. Alternatively, if you're a little more tech savvy, you can use replacement router firmware like Tomato or DD-WRT, though what you can use depends on the model of router you have. This upgraded firmware has plenty of options and additional security as well as greater end-user control. Physical Security o All the digital security in the world means little if a thief can walk away with your computer under their arm. A few methods of physical security exist to help combat or at least deter computer theft. Computer locks make use of a durable cable and lock and vary by whether you are using a laptop or desktop. Laptop locks tend to lock a laptop to a sturdy object with one cable, whereas a desktop lock will let you lock up to three devices -- like towers and monitors -- together. Companies like Kensington and Targus manufacture locks for all types of devices (see Resources). You can also use proximity detectors that sound an alarm whenever your computer is moved out of a specific area without your permission. If there are any lockers in your building you can use them to store your computer overnight when you aren't at work.
  8. Anyone who has worked on a Windows-based system and used Internet Explorer long enough probably has encountered the IE error 153. The error, while browsing the Internet, usually appears in a popup window with a message "Error:153 Unspecified Error." In higher versions of Internet Explorer, this standard error message may appear along with additional information, indicating "Object doesn't support this property or method." Error Reasons · IE 153 is a runtime error, and unlike stop errors, runtime errors will not fully arrest or freeze your computer. The IE 153 error may result in partial execution of a Web page, render a blank page or sometimes close the IE browser altogether. The error may occur due to improper or incomplete installation of a software application, if one or more software on your computer are incompatible with other software or hardware applications, or if the computer is infected with viruses or malware. Undesirable changes to the PC registry may also trigger the error. Virus Scanning · The error sometimes can be corrected with a full virus and spyware scan. Most PC users will have an "out-of-the-box" anti-software program already installed and running on their computers. The latest version of an anti-virus software should be installed before performing a full scan. Anti-virus software makers continuously develop and add codes into their programs to quarantine and remove newly recognized viruses. Typically, the built-in "live update" feature will automatically download the latest updates, helping the anti-virus program to scan for all known viruses. Windows Defender, for instance, helps detect several Windows-related malware and can be an option to perform a free scan. Registry Cleaning · IE 153 errors more often occur due to undesirable changes to the registry. Several free and paid registry cleaning software can perform diagnosis and correct potential registry problems. Registry Booster, Registry Mechanic and RegCure are among the highly rated cleaning tools. Some software makers offer free trials of their full version applications for a limited period. PC registry errors can be fixed manually. However, it requires expertise and precision to manually locate and fix registry problems. Wrongful changes to the registry can result in fatal and irreversible damages to the system. Re-Installation · Java, Adobe Flash Player, other plug-ins, add-ons and Web extensions, when incorrectly installed, commonly result in IE error 153. Some Windows system updates, which are installed automatically in most cases, can experience incompatibility with other software running on a computer and trigger the error. Two different versions of the same software running at the same time can also cause error 153. Users can re-install one or more recent applications and this often helps fix the IE 153 error. Error Prevention · It is important to have an anti-virus software running on the system at all times. Also, users should keep track of all changes that occur to their computer-- including software installations and removals. There should be sufficient Web security features on a computer to alert users to steer clear from high-risk and phishing websites. It is advisable to follow basic DIY-steps and contact free support avenues before having to pay a price for tech support to remove the error.
  9. When data requested from memory is not found, a memory fault is created. Windows then looks for the same data in the virtual memory on your hard drive. If the data is not there either, a stop message appears alerting you of the event. While this problem is usually the result of damaged memory or other hardware malfunction, it is occasionally caused by a corrupted file system. If you suspect or have confirmed that the problem is related to your file system, reformat the computer to correct the problem. Prior to reformatting, run the Check Disk utility while in Windows Safe Mode and back up your important files and documents. Instructions o 1 Turn on the computer and continuously hold the “F8” keyboard key during boot. This lists boot options for your operating system. o 2 Choose the “Safe Mode with Command Prompt” option and push “Enter.” This starts Windows in a Command Prompt with only the most basic services. This can help prevent or prolong the amount of time you can use your operating system before getting another BSOD (blue screen of death). o 3 Type “CD C:\” and press “Enter.” This changes the prompt to the root of your local drive. o 4 Type “Chkdsk /r” and press “Enter.” This runs the Windows Check Disk utility. While this utility is simultaneously run with a full format, you increase your chances of successfully completing the format by allowing the Check Disk program to repair any bad sectors beforehand. This will also repair damaged files, which will prevent problems when you create a backup of your files and folders. o 5 Restart your computer after the Check Disk utility completes. Upon restart, go back to the Advanced Boot Options screen by holding the “F8” key during boot, then select the “Safe Mode with Command Prompt” option to return to the Command Prompt. o 6 Insert a thumb drive into an available USB port. Alternatively, you could use an external hard drive or second internal drive. Whatever you use is not important -- you just need a storage medium for backing up your important documents and pictures. o 7 Type “WMI LogicalDisk” and press “Enter.” This populates the screen with all of the drives connected to your computer. Each drive is listed by name. Locate the device to which you want to back up your files and note the drive letter. o 8 Type “xcopy /e “C:\Users\YourName\*.*” “E:\Backup\MyDocuments\” and press “Enter.” Replace “YourName” with your Windows username, and replace “E:\” with the drive letter for the device you want to use as a backup. This process copies the Windows User folder to the backup drive. Remove the thumb drive once the backup process has completed. o 9 Insert the Windows 7 install disc and reboot your computer. As the computer starts again, look closely for “Press Key to Enter Setup” or a similarly worded phrase. Repeatedly press the specified key. This launches your BIOS. o 10 Look at the bottom of the BIOS screen. This should provide you with a navigation map with the keyboard keys necessary to use the BIOS. Generally, the arrow keys will let you move through the BIOS, and the “Enter” key is used to select an option. o 11 Locate the boot menu settings in the BIOS and change the priority so that your disc drive is the first drive in the list and the hard drive is the second. Press the “Save and Exit” key, which is usually “F10” and press “Y” or “Enter” to confirm. This reboots your computer. o 12 Press any key on your keyboard as soon as you’re prompted with a “Press Any Key to Boot from CD/DVD…” message. This loads the Windows installation disc. To confirm, you should see a “Windows is Loading Files…” message with a progress bar. Once finished, the Install Windows dialog appears. o 13 Leave the options at their default and click “Next.” On the second screen, click the “Install Now” button. You should see a “Setup is Starting” message. Once started, the License Agreement screen appears. o 14 Click “I accept…” then click “Next.” This takes you to the “Which Type of Installation…” screen. Click the “Custom (Advanced)” option. On the following screen, click to highlight the drive with the word “Primary,” then click “Drive Options (Advanced.)” o 15 Click the “Delete” option at the bottom of the following screen. This will delete the partition and all of its contents. Click the “OK” button on the confirmation dialog. Click to highlight the “System” drive and click “Delete.” Click “OK” to confirm. o 16 Click the “Next” button at the bottom. This starts the automated Windows 7 installation. Remove the disc from the drive when prompted and boot into Windows 7. Insert your USB thumb drive. Open Windows Explorer and transfer your documents back over to your computer.
  10. The error, "BrowseIt.GetFileText.Permission Denied," or any variation thereof, is caused by an error in the free, open-source Web browser, BrowseIt! If you've installed BrowseIt! on your computer or a program that incorporates BrowseIt! elements, that software may be corrupted. However, since the software is free, it's also known to be used in some viruses and adware, which may have infected your computer. BrowseIt! · BrowseIt! was first created in 2005 as a tabbed, open-source Web browser intended to replicate the functionality of Mozilla's Firefox browser. But, instead of using Firefox as the basis for programming, BrowseIt! is designed to run off of Internet Explorer's underlying framework. If you're seeing the error once and it goes away, a component that you installed probably contains BrowseIt! You might need to uninstall the offending program or contact the manufacturer for technical support. Virus or Adware · According to Prevx, the division of Webroot that catches and categorizes viruses, adware and malware, the file BrowseIt.exe can be used as a component in adware. If the error message continues to pop up, despite your efforts to close the dialog boxes, then it's likely that the error is due to an infection on your computer. Adware is a type of malware that can infect your computer. It functions as a program on your system, which is why it uses the -ware suffix, indicating that it's a type of software. The mal- prefix is appended to designate something malicious and the ad- prefix is used for software that attempt to gather information for advertisers and direct you to make purchases. Both adware and malware are similar to viruses in that they can be secretly installed on your computer, however, viruses are self-replicating while adware and malware are contracted from an infected site on the Internet. Uninstallation · If you think that you installed a program that is causing the error, you can uninstall it through the Control Panel in Windows. Click "Start" and then click "Control Panel." Click "Uninstall a Program" and scroll through the list to find the program you suspect is causing the problem. The most likely suspect will be the most recent program that you installed before the error appeared. Click to select the program and then click "Uninstall" from the bar above the list. Follow the on-screen instructions to complete the uninstallation. Restart your computer when you're done. If the error persists, you may need to restore your computer to an earlier date. Click "Start" and type "System Restore." When the window appears, follow the instructions to restore your computer's software to an earlier date. Choose the most recent date that is prior to the first time you saw the error. Your computer will restart when the process is done. Virus Removal · If you suspect that the error is caused by a malware, you need to clean off the infection. If you have antivirus and antimalware software installed on your computer already, update the definitions and run a scan. If you don't have software installed, you can download software from the Internet to help. Microsoft Security Essentials, AVG Anti-Virus and Trend Micro are tools that you can use to clean your system (links in Resources). If the infection is preventing you from using your computer, you may need to start in Safe Mode. Power off the computer and then turn it back on while pressing "F8" on the keyboard. When the option arises, use the arrow keys to select "Start in Safe Mode" and press "Enter." Use the antivirus and antimalware software of your choice while in Safe Mode to clean out the infection.
  11. Lsass.exe Referenced Memory Error is commonly caused by the Sasser worm, a malware that infects Windows-based systems. This worm sneaks in through a Windows’ security vulnerability and attacks using the lsass.exe file, which is connected to the Local Security Authority in Windows. The lsass.exe error message caused by the Sasser worm claims that a file could not be written to the referenced memory block and then crashes the computer. Shut DownAfter stating that there is a problem with Referenced Memory, the Sasser worm shuts the computer down within 60 seconds. Work quickly to stop the shutdown by opening the Start menu and type “shutdown –a” in the Run Command box. Hit “OK” and the reboot is aborted. If the worm beats you to the reboot, then restart the computer and tap F8 until the menu for the Advanced Startup Options appears. If the Windows splash screen appears, then the computer did not read the F8 key press and you will have to try again. When you arrive at the Advanced Startup Options menu, choose “Last known good configuration” and let the computer start up. Virus Protection Update your antivirus program with the newest virus definitions and scan your computer. The antivirus program will find a Trojan virus with an odd name. Remove the found threat and keep the antivirus updated. Run the scanner at least once a week or whenever something odd happens. The Sasser worm may block your access to antivirus websites, so updating your antivirus program can be a problem. Unblocking Antivirus Sites By the time the Sasser worm shows the lsass.exe error, it has most likely created bogus URL entries for antivirus websites. This is an attempt to stop the removal of the worm. Check for fake entries by typing “Notepad \windows\system32\drivers\etc\hosts” in the "Search programs and files" text field that appears when you press the Start button. Press “OK” to get the results. A healthy PC will only show information on the “localhost,” whereas the Sasser worm writes a large list with antivirus websites to this file. Close Notepad and open the directory containing the “hosts” file. Right click the file and rename it to “oldhosts.” In the "Search programs and files" text field type “nbtstat –R” and press “OK.” The window will flash and you will have access to the antvirus websites until the computer reboots. Prevention Patch the security breech once the Sasser worm is removed. Open the Microsoft Security Bulletin MS04-011 and run the patch for your version of Windows. This will prevent reinfection by the Sasser worm and the reappearance of the lsass.exe error. Use a firewall to stop unauthorized changes to your computer. A firewall blocks threats like the Sasser worm that are not email based . Turn on the built-in firewall in Windows or install one that is purchased or free from the Internet. Only install a firewall that you are sure is not malware in disguise.
  12. An exec error may appear when an executable file with an EXE extension encounters a problem or has corrupt data that prevents it from loading and running. Examples of Exec error messages are "Fatal Exec. Engine Error," "Compile error in hidden module: AutoExec" and "Excel has performed an error in module excel.exe and will be closed." Exec errors occur when saving a program with an EXE file name extension. They are caused by improperly installing or uninstalling software, cookies and temporary files stored by an Internet browser, third-party browser extensions and incompatible spyware or computer anti-virus software. Installing Software o Every time you install or uninstall a program on your computer, you are changing the PC's registry. If this is done without first creating a Restore Point or the System Registry is not changed by the PC when the program is uninstalled, it can cause Exec errors to occur. This can be fixed by downloading Microsoft Security Essentials and running the program (see Resources). Exec Engine Error o A fatal execution engine error happens when an app attempts to access an Exception object in a scripting engine. Usually this occurs when the wrong apps or programs have been added to the "Startup items" list in the "System Configuration Utility" of the computer. This can be fixed by going to the "Start" menu. Type "MSCONFIG" into the search text box and press "Enter." The System Configuration Utility will open. Click the "Startup" tab to go to the "Startup Items" list. The programs and apps listed in the Startup Items list are loaded by the computer whenever it is turned on. Click on the arrow to expand the column. Examine the list and begin a process of elimination by unchecking one startup item to disable it. Restart your computer and continue unchecking the programs until the computer starts up and you no longer get the Exec error. Uninstall the app or program that is causing the error. Adobe o Some Adobe users will encounter the Exec error when attempting to run Microsoft Office or Microsoft Excel. This is caused by the startup folder of Office or Excel containing the Adobe Acrobat PDFMaker add-in template files Pdfmaker.dot and Pdfmaker.xla. This can be resolved by downloading the Adobe PDF maker updates from Adobe.com, or moving the PDFmaker.dot and Pdfmaker.xla files out of the Excel or Office Startup folder and into the My Documents folder. Other Causes o Clear all of the cookies and temporary files from your Internet browser cache as this may be the cause of the Exec error. Another cause of the error is Norton AntiVirus software. Download updates for Norton AntiVirus from Symantec.com or uninstall the software and download Microsoft Security Essentials, which has anti-virus software on it. An alternative is to download a free open source anti-virus software such as Avast! from Avast.com.
  13. The motherboard on your computer contains a small program called the BIOS that manages connected hardware components and some low-level operations such as drive boot order. The BIOS works even when no operating system is installed and performs the Power-On Self Test each time you turn on your computer. The system POST uses a combination of screen output and beep codes to inform you of any problems at startup. Processor · Some computers beep once at startup to indicate a central processing unit failure. You can identify a faulty CPU as the cause of one beep if your computer has an AST motherboard and doesn't boot up after making the beep. Other manufacturers could use one beep to mean the CPU failed, and your owner's manual contains the beep codes generated by your motherboard. A processor can fail as a result of continued overheating or a faulty power supply unit. Memory · The main memory in your computer uses a capacitor for each bit of information it stores. Capacitors must be continually refreshed with the current state of a program or the data in them will fade over time. AMI motherboards emit one beep at startup if the dynamic random-access memory fails to refresh. Apple computers beep once at startup if no RAM is installed. If your Apple computer doesn't find any RAM during the POST, it skips the startup chime. On some models, the power light flashes twice. Default Beep · Your operating system uses the system beep from your motherboard to respond to some keyboard input. The sound scheme in Windows includes a mix of sounds from your speakers and motherboard to indicate an event, such as connecting or disconnecting a device or receiving email. Because some computers don't have speakers, Windows uses the system beep to confirm Ease of Access changes, such as enabling Sticky Keys or Filter Keys. Your computer could beep once if you type too quickly or press several keys at the same time. Normal Operation · Most motherboards beep once at startup to tell you that your computer is operating normally. If your computer beeps once before booting your operating system as usual, you may not have a problem. Apple computers beep once as a result of normal operation during a firmware update when you press and hold the power button. If you don't want to hear the startup beep from your motherboard, you may be able to turn it off in the BIOS settings.
  14. Microsoft’s Windows operating system includes integrated firewall software that can stop hackers and malicious software from accessing your computer when you go online. Sometimes the firewall prevents legitimate applications from connecting to the Internet. If some programs experience firewall connection problems, troubleshoot the issue by tweaking the firewall’s settings. About the Windows Firewall · The firewall feature in Microsoft Windows acts as barrier between your computer and the Internet, allowing only trusted programs on your computer to go online and communicate with the Internet. The firewall also blocks unrecognized, external online services from connecting to the data on your computer, thwarting attempts by hackers to hijack your computer or access your personal data. Firewall Permissions · The firewall automatically authorizes many of the standard applications on your computer to access the Internet. For other programs and third-party applications that you download and install, the firewall prompts you to authorize the application when you first try to use it. The firewall connection problem occurs when a legitimate program or application that you haven’t authorized tries to access the Internet from your computer. Because the program isn’t approved, the firewall automatically blocks the connection. Troubleshooting: Access Firewall Settings · Windows lets you configure the firewall to approve access for applications experiencing connection problems. To let a program through the firewall, select the “Control Panel” feature from the computer’s Start menu. Type “firewall” into the system search field at the bottom of the Start menu. Click “Windows Firewall” in the Control Panel section of the search results. Troubleshooting: Configure Firewall Settings · Accessing the Windows Firewall opens the firewall settings dialog in a new window. In the left-hand pane, click the “Allow a Program or Feature Through Windows Firewall” option. Click the “Change Settings” button with security shield logo. Before making changes, you may need to enter your Windows login password into the applicable input box. Windows Firewall displays a list of applications and programs in the main pane where you can select the program or application that you want to allow through the firewall. Save the changes and when you launch the program again, it should be able to go online normally.
  15. The good thing about computer lockups is that they probably don't happen every day unless you have a serious software or hardware problem. However, even periodic freezes may not only be frustrating but costly if you don't save a document before your computer stops responding. There's no need to panic when your computer locks up, but it does help to understand why your machine may freeze as you work. Application Lockups · When your browser or another application stops responding, it may be the only thing on your computer that’s not working. If you cannot interact with a program, try to switch to another program or open your Start screen. If you can get to the Start screen, the problem probably lies with the application that’s frozen. You can terminate that application by right clicking its name in the Task Manager and selecting “End Task.” Before you terminate the app, review its CPU and memory usage values. Those appear in the Task Manager table. If those values are high, the program may be consuming more resources than it should. Memory and Hard Drive Space · A computer may freeze or use extra resources for multiple reasons. If the same application keeps locking up, ensure that you install the most recent updates for that program. You can also check the program’s support site and look for lockup issues that the site may explain. Applications can also freeze when your computer’s memory or hard drive space runs extremely low. That could happen if you don’t have much memory while running multiple applications at once. The Windows Disk Cleanup unnecessary files and free up hard drive space. If you need to run many programs at the same time, consider purchasing additional memory. Viruses· It may seem like “run an anti-virus scan” is the main solution that people suggest for resolving a host of problems, but many times it is a possible remedy. Because a malware program has the ability to access all your files and system components, it may be causing your computer to freeze. Lockups can be random or occur when you perform certain tasks. In addition to running a full virus scan, tell your security program to run a boot time scan if it has that capability. A boot time scan can identify threats that regular scans miss because it runs before Windows starts. Memory Problems · One of your computer’s memory sticks may have a problem even though the computer still works. Faulty memory can cause programs to malfunction and your system to shut down. If your computer keeps locking up and you can’t discover why, check your memory by running the Windows Memory Diagnostic Tool. If it discovers a problem, visit your computer manufacturer’s website and seek guidance there. You could also remove your memory sticks and take them to a computer store for testing. Take the whole computer if you don’t feel comfortable removing those sticks. Hard Drive Issues · The hard drive, another critical system component, can also bring your computing to a halt. Sometimes, you can detect potential hard drive problems by listening for changes in the way your hard drive sounds as it spends. Windows has ability to diagnose many hard drive problems and repair them automatically. Trigger this process in Windows by searching for “Computer,” clicking the “Computer” icon and right clicking the hard drive you’d like to check. You can then click “Properties,” select “Tools and then click “Check.” A wizard will guide you through the repair process.
  16. Fatal exceptions occur when software programs encounter errors that prevent them from continuing. A fatal exception error message indicates that one of the applications you are using has attempted an operation that cannot be carried out. Exceptions do not necessarily stop programs from executing since programmers are able to build the ability to handle exceptions into the application code. However, a fatal exception is one that the program can't cope with. Exceptions · In programming, lots of operations can go wrong, particularly where input and output processing is involved. One example is reading from or writing to memory. When developers work on software applications, they can build coding structures to deal with such unforeseen problems. An exception is a coding object that is said to be "thrown" when such a problem occurs. Programmers can create code structures to "catch" such an exception, handling the problem and letting the application continue to execute. This is known as exception handling. Control · If the execution of a program causes an exception that is not handled by the application, a fatal error may occur. This means that the program is unable to continue, so processing control is handed back to the computer's operating system, such as Windows, for example. This process means that you can continue to use your computer when a fatal exception occurs, although the user interface may freeze for a few seconds or even several minutes before this happens. In some cases, an error may stop your computer from responding to any input until it is restarted. Causes · Fatal exceptions can be caused by many different types of programming instruction. Examples include when the programming code attempts to carry out an illegal process or an operation that the application does not have permission for or where the code attempts to read from or write to an invalid location in memory. Whenever a program uses data sourced external to it, there is a possibility of these types of errors since the programmers cannot know about the state of the user's computer outside of the application itself at the time of developing it. Solutions · If you encounter a fatal error as a user of a program, there is a limit to what you can do other than waiting for your operating system to take control back and end the application. If the problem relates to a program you use often, you could try checking if there are updates available for it in case the problem has been addressed by a new version. The only people who can really fix a fatal error are the application developers. However, sometimes these errors are isolated incidents, so when you run the program again, you may find that the error does not recur.
  17. A boot failure is a serious problem, because the boot process is an essential part of your computer's startup routine; your PC must first boot in order for it to be usable. A "boot failure" message typically comes from a hard drive problem, although certain settings in the computer's Basic Input Output System can also trigger the error. Boot Process The term "boot" is a shortened form of "bootstrap," so-called because the computer is "pulling itself up by its own bootstraps." At the moment you turn the PC on, its random-access memory is empty; it lacks even the simplest programming instructions. To facilitate startup, a small program in flash memory loads a bigger program from the hard drive, which in turn loads Windows or another operating system. Booting is the act of loading the program from the hard drive. If the computer cannot do this, the flash-based program displays the "boot failure" error message. BIOS Setting Your computer may encounter a boot failure if the BIOS is not set correctly. The BIOS stores basic information such as the current time and date, amount of installed RAM and hard drive information. To see the BIOS set-up screen, restart your computer and press the "F8" or other function key according to the on-screen instructions. Using the arrow and "Page Up/Page Down" keys, open the BIOS setup screen that has information on the hard drive. Check the drive information and make any necessary changes. This task is especially important if your computer has more than one hard drive. Note that BIOS settings seldom go bad by themselves; however, mistakes made configuring the BIOS can result in a boot failure message when you subsequently restart the computer. Hard Drive Hard drive problems are a likely cause of boot failure messages. For example, the cable connecting the hard drive to the computer's motherboard may have worked loose; in this instance, the computer can no longer communicate with the drive. Simply disconnecting and reconnecting the cable may solve the problem. Jumpers -- the tiny plugs that change the hard drive's configuration -- may also cause boot problems if misconnected. If your computer has two drives in a "master/slave" configuration, a jumper problem may result in a PC that won't boot. A hard drive failure will also cause a boot error; in this case, the only option may be to replace the drive. Other Causes Hard drives have standard "formats" -- frameworks of data set up so the computer can locate information. If the format is bad, such as from virus infection, the hard drive won't boot, even though it's properly connected and running. Other kinds of incompatibilities between the computer and the drive will also lead to boot problems. For example, when installing the 64-bit version of Windows 7 from a DVD to a computer that has the Unified Extensible Firmware Interface mode enabled, and which has a drive with more than four partitions, the computer attempts to start from the DVD but the boot process will fail. Microsoft has a "hotfix"-type software patch that solves this problem.
  18. The Windows garbage bin or "Recycle Bin" holds all deleted files you remove from your system. When you delete any file including a Windows system file, it is moved to the Recycle Bin. When you install a second operating system on the computer and delete the old folder on your system, it is placed in the Recycle Bin. Purpose · In the old MS-DOS operating system, a deleted file was removed from the system immediately. The Windows Recycle Bin is a method that protects you from accidentally deleting the wrong file. The file is actually left on the system, so you can restore it if you decide you want to keep the file in the future. The file is stored in its entirety until you decide to permanently delete it. Content · The content of the Recycle Bin is all the files you deleted on the system. If you install a new operating system on the system, your original Windows installation is stored in its folder. When you boot to the new operating system, the Windows folder is seen on the system. If you no longer need the folder, you can delete it. The files and folders for the Windows installation are transferred to the Recycle Bin. Recovery · First open the "Appearance and Personalization" utility in the Control Panel. Check the box to display the Recycle Bin and click "OK." After you set up the configurations, you can see the Recycle Bin on your desktop. Double-click it to view the content. Right-click a file and select "Restore." You can also click "Restore All" to recover all files in the Recycle Bin. Considerations The Recycle Bin can take up several gigabytes of data on your hard drive. If you need to free up hard drive space, you can empty the Recycle Bin. Right-click the Recycle Bin icon on your desktop and select "Empty Recycle Bin." The files are permanently removed from your system to clear up hard drive space.
  19. Kaspersky is a security program that is available in both a stand-alone program and Mozilla Firefox add-on. The Kaspersky Firefox add-on scans files that are downloaded in Firefox to ensure that they are safe for the computer. The Kaspersky add-on requires a special security certificate to run. Although many Kaspersky users don't experience problems with running the Firefox add-on, you may find that there are certificate errors with Kaspersky in Firefox. There are four primary causes for certificate errors, and by troubleshooting through each cause, you can fix the certificate errors issue. Firefox Problems · Although Mozilla Firefox generally handles Kaspersky security certificates well, sometimes it does have problems with them. This typically occurs when using a version of the Firefox browser that is either too new or too old for the Kaspersky plugin. The problem may also occur because the Firefox browser has become corrupt. In both cases, the fix is to reinstall or update Firefox on your computer. Follow Mozilla's instructions for doing so. Kaspersky Problems · Just as with Mozilla Firefox, occasionally Kaspersky may be the cause of the security certificate problems in Firefox. This usually happens when you are using a very old version of the Kaspersky add-on that doesn't work properly with the Firefox browser. Like Firefox, this may also happen because Kaspersky has become damaged, usually due to a virus or piece of malware. You can typically resolve this issue by installing the newest version of the Kaspersky add-on to Firefox. Certificate Issues · Even if your copy of Mozilla Firefox and the Kaspersky plug-in are fine, certificate errors may persist due to issues with the certificate itself. When Firefox reads the certificate, it checks to make sure that the certificate is valid. If the certificate is not valid, either due to being incorrectly configured or damaged, Firefox will display an error message. You may be able to fix the issue by re-loading the certificate. Other Causes · Certificate errors with Kaspersky in Firefox may be caused by problems with Firefox's security settings. If Firefox is not properly configured to work with certificates, it will show an error message any time a certificate is loaded. Consult Firefox's support page for help on configuring the security settings. The certificate errors may also occur because your computer's firewall is blocking Internet access for the certificate. You can fix this by temporarily disabling the firewall or adding an exception for Firefox.
  20. Intel Extreme Graphics, housed on a chip built into the motherboard, enables a computer to render graphics without a video card. However, desktop computers with onboard graphics nonetheless include an available accelerated graphics port, peripheral component interconnect, or PCI express slot to which a video card can be installed. You can upgrade the computer to a dedicated card to improve graphics performance, but the operating system won't recognize the new hardware unless you've first disabled Extreme Graphics in the BIOS -- the software that controls and manages hardware inside the computer. Instructions AMI BIOS 1. Turn on or reboot the computer. Follow the instructions on the boot screen to go to the BIOS. 2. Select the "Advanced" tab using the directional keys. Scroll down to "Chipset" and then press "Enter" to view the Advanced Chipset Settings screen. 3. Highlight "Graphics Adapter Priority" and then press "Enter." Select "AGP/Int-VGA" if a graphics card is installed to the AGP slot; select "PCI/Int-VGA" if a graphics card is installed to the PCI slot. 4. Press "Enter" to disable Intel Extreme Graphics. Select "Exit" from the tabs and then select "Exit & Save Changes." 5. Press "Enter" twice to apply your changes and restart the PC. Award BIOS 6. Turn on or reboot the computer. Follow the instructions on the boot screen to go to the BIOS. 7. Select "Advanced BIOS Features" from the main menu using the directional keys, and then press "Enter." 8. Select "Init Display First" and press "Enter." Change the setting to "PCI" or "PCIEx" and then press "Enter" again. Intel BIOS 9. Press "F2" when the Intel logo appears on-screen. Select the "Configuration" tab using the directional pad. 10. Select "Video" and then press "Enter." Highlight "Primary Video Adapter" and then press "Enter" again. 11. Choose "Ext PCIe Graphics (PEG)" if the card is installed to the PCIe slot, or "Ext PCI Graphics" if the card is installed to the PCI slot. Press "Enter." 12. Press "F10" and follow the on-screen prompts to save and quit. Tips & Warnings · If you've installed an AGP card to the computer, leave "Init Display First" set to "Onboard/AGP," unless the BIOS provides a separate "AGP" option. · The BIOS menu and its options vary depending on the make and model of the motherboard.Consult your product's manual, for further assistance, if necessary.
  21. Windows Easy Transfer simplifies the transition from one computer to another. The application locates all of the personal files and settings stored to your PC and condenses them into a single file to be exported to another location. After moving the data to an external drive, run Windows Easy Transfer on your new computer. The program imports, or unpacks, the file and copies all of your information to the appropriate libraries. Instructions 1. Press "Windows-Q" to open Search, type "Easy Transfer" and then select "Windows Easy Transfer" from the results. 2. Enter your administrative password or click "Yes," if prompted, to continue. Click "Next" on the welcome screen. 3. Connect an external hard drive to the computer, click "Take No Action" from the AutoPlay dialog box, if prompted, and then click "An External Hard Disk or USB Flash Drive." 4. Click "This Is My Old PC." Select the data to transfer and then click "Next." 5. Enter a password to secure your data, or leave the fields blank, and then click "Save." 6. Select a folder on the drive to store the data to and then click "Save" to begin copying the files to your external drive. 7. Click "Next" and then "Close" to exit the wizard. Disconnect the drive and connect it to the new PC. 8. Open Windows Easy Transfer, click "Next" and then click "Yes." Browse to the folder containing the file to import. 9. Click "Open." Enter the password you created in Step 5 and then click "Next" to unlock the data, if applicable. 10. Choose the data to import and then click "Transfer" to move the files to your new computer. 11. Select "See What Was Transferred" or "See a List of Apps You Might Want to Install on Your PC," if preferred, or click "Close." Tips & Warnings · To open Windows Easy Transfer in Windows 7, click "Start," type "transfer" into search and then click "Windows Easy Transfer." · If you're transferring data from Windows 7 to Windows 8, click "Customize" when selecting the data to transfer and then uncheck "Windows Settings." · Information in this article applies to Windows 8. It may vary slightly or significantly with other versions or products.
  22. The desktop is the mainstay for all users of laptop and desktop computers -- it's the place to store temporary files, post notes and do all the tasks that computer users do. Some people don't mind if their desktop is cluttered with lots of icons, while others feel the need to have a clean slate to work with. If you're having issues with deleted or unwanted items on your desktop -- including links to things you may have downloaded -- it can be frustrating when they won't go away. To fix the problem, start with the simple stuff and then move on to more involved steps for removing those unwanted items. Right-Click The first thing to try is to send the file to the trash. To do this, right-click on the file on the desktop and then select "Move to Trash" or a similar function from the menu that appears. In the best-case scenario, the item will peacefully be moved to your computer's trash; if not, you may see an error message that will give you information about how to remove the item. Task Manager If the item is in use, it may not move to the trash until you close it from the location where it is in use; this means you have to know where the item is in use. One way to find out is to look at the Windows Task Manager, which shows you all the current processes, programs and activity currently happening on your computer. To open it, right-click on your taskbar and then select "Task Manager." From there you'll be able to remove or delete any of the unwanted items. Download Manager If you've stopped a download in the middle of the download process, you may be encountering issues because the file is only partially loaded. One possible solution to this may be to remove it from your from your Web browser and find your downloads. Click on the name of the item that is stuck on your desktop -- if it's listed there -- and then press "Delete." Add/Remove Another option is to try removing the icon using your computer's Add/Remove function, which can safely remove applications. On a Windows computer, select "Control Panel" from the Start menu and then click "Uninstall a program." Look for the program or item you want to remove and click "Uninstall." If this process does not work, try a third-party removal tool such as Wise Registry Cleaner to scan and remove junk items.
  23. Streaming HD video can challenge the capabilities of even the most powerful cutting-edge computer. If you're seeing stuttering and buffering issues when attempting to play a video stream, one or more parts of your system is being pushed too hard and you may find that your CPU usage is extremely high. Before you replace your processor, take a look at how streaming works and why a new CPU may not be the answer. Network Slowdowns · One of the most crucial elements comes into play before the stream even reaches your local PC. It takes a robust network to transfer high definition video data in real time, and unfortunately a bottleneck can occur in many places. The video stream may be experiencing slowdowns before it even gets to your home, courtesy of heavy traffic or inefficient servers and network infrastructure. Your Internet connection may lack the bandwidth to support HD streaming, especially during "peak hours" on a shared connection such as a cable ISP. For example, Netflix recommends a minimum of 5 Mbps for streaming HD quality video. Residential Issues · Your home is likewise full of ways to thwart the free flow of video streaming data. Long cable runs, junctions and damaged wiring can introduce interference that intermittently slows down your connection, especially in older homes and multifamily dwellings. Wireless networks are prone to structural interference from walls and ceilings, and Wi-Fi bandwidth can easily be bogged down by simultaneous connections. In all these cases, you may have plenty of free bandwidth for most Internet activities, but watching streaming HD video pushes your connection to the point where minor inefficiencies become more obvious. PC Housecleaning · Assuming that your network is optimized for streaming video, your computer itself may be improperly optimized. There are a number of simple fixes that you can try to relieve your CPU and other system resources, such as closing down applications and browser windows, stopping unnecessary background tasks and services, and making sure that your operating system and hardware drivers are all up to date. Anything that will cause your PC to run slightly slower during normal use will have a drastic impact on demanding tasks such as HD video streaming. Video Card Demands · All video tasks on your PC will depend greatly on the performance of your graphics hardware. If your system sports a cutting-edge PCI Express 3.0 video card with plenty of onboard memory and a GPU that handles multimedia subroutines, you don't need to worry. However, if your graphics card or onboard video is a few years past its prime, much of the video processing will be passed along to the system CPU and RAM. Memory is Essential · The importance of RAM in streaming video cannot be understated; if you have a low amount of RAM or an older memory interface, you may be expecting too much from your system. Hulu Plus recommends at least 128 MB of RAM, but your performance will benefit from upgrading to 4 GB or more of DDR3. If you see significant CPU usage, your memory may actually be the weak link -- your processor manages system memory, especially virtual memory, and when the RAM capacity or bandwidth is stressed, much of the "overflow" burden falls on the CPU. CPU Transcoding · The CPU is also crucial for applications that utilize transcoding tasks (turning one video format into another) in real time, which can put a serious strain on available processing power. Like many video streaming providers, Amazon Instant Video uses Adobe Flash or Microsoft Silverlight, both of which access the CPU during streaming. Amazon recommends a Pentium 4 2.33GHz processor for PCs, and an Intel Core Duo 1.33 GHz as an absolute minimum, but the amount of data required by full-length HD video will likely require something much more powerful.
  24. Browser Issues Some laptop users have found that their fingerprint scanners are not compatible with their preferred browser. In particular, a number of complaints have been raised by users who have found that Google Chrome is not compatible with certain fingerprint-scanning software. Wear and Tear Over time, a scanner will need routine maintenance to continue to work correctly. For example, cords can fray or the reader can accumulate grime. Periodically clean the surface of the reader with an electronics cleaning putty or dry microfiber cloth. User Error One issue that can occur with any fingerprint scanner is user error. Always make sure that all cables are inserted completely into your computer's USB port.
  25. Corrupted memory can cause problems for computer users, ranging from sluggish software to operating instability and crashes. While there are utilities that are designed to perform memory tests from within the operating system, these programs can't always detect memory corruption because there are too many programs accessing the memory while the operating system is loading. To receive accurate results when testing for corrupted memory, use a a utility that tests the memory before the operating system boots up. Instructions 1.Burn the memory testing software that you wish to use onto a CD using your preferred CD authoring software. 2. Insert the CD into your computer's CD or DVD drive, clicking "Cancel" if AutoPlay attempts to launch the program on the disc. Reboot your computer. Download the Fix in 60 Seconds. Repair C Runtime Error R6034. pcunleashed.com/R6034 3. Wait for the first BIOS screen to appear, then begin pressing the key (such as "F2" or "F12") indicated to access the "Boot Menu" or "Boot Order Menu." Make sure that you aren't pressing the key to access the "BIOS Setup" menu. 4.Choose the CD or DVD drive in which your memory testing disc is located and press "Enter" to select it. When prompted to press a key to boot from the disc, press any key on your keyboard. 5. Wait while the memory testing software automatically begins checking your memory for errors. Allow the software to run for at least 15 minutes, though 30 minutes or longer is recommended. The longer the software is allowed to run, the more accurate your test results will be. 6.Close the software and reboot your computer once you are finished testing. Eject the disc from the CD or DVD drive and allow your operating system to boot normally.
×