Jump to content

donut

Moderators
  • Posts

    148
  • Joined

  • Last visited

  • Days Won

    13

Everything posted by donut

  1. Hi there, We'd like to help you out, could you please send us the details and screenshots on your issue please? Thx!
  2. FileZilla is a File Transfer Protocol (FTP) program that website owners use to add, modify or delete files and directories on their website server. Although many FileZilla users have no problems retrieving their website's directory and files, you may find that Filezilla cannot retrieve your website's directory. There are five primary causes for issues with retrieving the website directory in FileZilla. By going over each possible cause and fix, you can usually get FileZilla to retrieve your website's directory. Incorrect Username/Password o Before you can view or create directories on your website's server, you must first log into it securely with your username and password. One of the first things to check when FileZilla cannot retrieve the directory for your website is your username and password -- if either one is incorrect, FileZilla will fail to log you in and retrieve the directory. Type in your username and password again and this will often fix the problem. If you do not know the username and password for your website server, ask your server administrator. Incorrect Host Address o In addition to the username and password, you must also know the correct host address for your website. If you type in the wrong host address for your site, FileZilla will be unable to retrieve your website's directory. Generally, the correct host address for your site is the website address itself, although this may vary depending on who is hosting your site. If you do not know the host address for your website, contact your server administrator. Directory Permissions o To modify or access folders on your website's server, you must have the correct permissions; without them, FileZilla won't be able to retrieve or modify your directories. Directory permissions typically are set up automatically by your Web host, but you can change them as long as you are able to see the directories. As FileZilla cannot retrieve the directory in this case, your best bet is to contact your server administrator and have him give you full permissions. FileZilla then should be able to retrieve the directory. Other Causes o FileZilla may be unable to retrieve your website's directory because there is a problem with your copy of FileZilla. You may be able to fix the problem by installing any available updates. FileZilla also may be unable to retrieve the directory because your website's server is down temporarily. In this case, you may be able to access the directory at a later time. Contact your Web host to determine if there are any outages or down times.
  3. When looking to secure your computer, you'll want to consider a few different factors: the security of your data against malware and hackers and the physical security of your machine. Operating systems come with basic levels of security and you can use free software to add additional security like data encryption and network firewalls. These options are available to any user, meaning you don't need to budget for expensive business licenses and complex installations. Security Software o There are a few different types of security software available to protect your computer against malicious software, or "malware." These programs range from spyware scanners and firewalls to anti-virus programs and full security suites like Comodo Internet Security, ZoneAlarm Internet Security and AVG Internet Security. The suites have many features tied into one program, so one suite is generally enough to protect your computers. If you want to use individual programs for each function so you have more control, you can download any anti-virus, anti-spyware and firewall program you like. Many of these options are completely free for anyone, so you don't need to purchase a company version with multiple licenses, which can be pretty pricey. Encryption and Passwords o You may know that you can enable a password on your user account, but this only goes so far. You can add an additional layer of security by enabling a secondary password through BIOS. This password will be required even to start the computer and access different settings. Enable this via the "Security" tab of your BIOS. You can also encrypt your data to make it harder for people to access your data. This protects your data even if someone else steals your physical hard drive. Use free software like TrueCrypt, AxCrypt or Cloudfogger (links in Resources) to encrypt your hard drive and all that data on it. Network Security o For any computer connected to the Internet, network security is very important. Enabling your router's firewall prevents incoming and outgoing traffic from being hijacked, and enabling your wireless network passwords prevents random strangers from accessing your account and thus any computers on your network. Access your router's control panel to enable these options. Remember to use a strong password of numbers, letters and symbols, and avoid using any personal information like names or birthdays. You can also use Windows Firewall to select how strict your firewall is depending on what type of network you're using. Alternatively, if you're a little more tech savvy, you can use replacement router firmware like Tomato or DD-WRT, though what you can use depends on the model of router you have. This upgraded firmware has plenty of options and additional security as well as greater end-user control. Physical Security o All the digital security in the world means little if a thief can walk away with your computer under their arm. A few methods of physical security exist to help combat or at least deter computer theft. Computer locks make use of a durable cable and lock and vary by whether you are using a laptop or desktop. Laptop locks tend to lock a laptop to a sturdy object with one cable, whereas a desktop lock will let you lock up to three devices -- like towers and monitors -- together. Companies like Kensington and Targus manufacture locks for all types of devices (see Resources). You can also use proximity detectors that sound an alarm whenever your computer is moved out of a specific area without your permission. If there are any lockers in your building you can use them to store your computer overnight when you aren't at work.
  4. Compared to Windows Server, the standard edition of Windows 8 limits what actions you can take on computers connected to your network. On Server, you can lock down applications on remote computers in your domain, but the consumer release of Windows 8 enables you to only modify the behavior of programs on the local PC. If you want to restrict someone, such as your child, from accessing the Internet on another computer on the network but don't have an administrative account on that PC, you can use the access controls on your router to block ports 80 and 443 -- ports Internet Explorer requires for establishing a connection to the Web. Instructions Linksys o 1 Type "http:/192.168.1.1" (without the quotation marks) into the address bar of your browser and then press "Enter." o 2 Type "admin" into the "User Name" and "Password" fields to log in to the router. Select "Status" from the main menu and then "Local Network" from the submenu. o 3 Click "DHCP Client Table" and review the Client Name field to locate the appropriate computer. o 4 Highlight the address in the "MAC Address" field and then press "Ctrl-C" to copy the address to your clipboard. o 5 Select "Access Restrictions" from the menu. Type "Internet Explorer" into the "Enter Policy Name" field and then change "Status" to "Enabled." o 6 Click the "Edit List" button to open a pop-up window, highlight the "01" field next to MAC Address and then press "Ctrl-V" to paste the address of the computer. o 7 Click "Save Settings" and close the window. Select "HTTP (80 - 80)" from under Applications and then click ">>" to add the port to the Blocked List. o 8 Select "HTTPS (443-443)" from under Applications and then click ">>" to add the port to the Blocked List. o 9 Click "Save Settings" to prevent the specified computer from using Internet Explorer. D-Link o 10 Type "http:/192.168.1.1" (without quotation marks) into the address bar of your browser and then press "Enter." o 11 Select "Admin" from the "User Name" drop-down menu, don't enter a password and then click "Log In." o 12 Select "Advanced" and then "Access Control" from the menu. Check "Enable Access Control," click "Add Policy" and then click "Next." o 13 Type "Internet Explorer" into the "Policy Name" field and then click "Next" until you reach the Select Machine page. o 14 Set "Address Type" to "Mac" and choose the appropriate computer from the "Computer Name" drop-down menu. Click "OK" and then "Next." o 15 Set "Method" to "Block All Access" and then click "Save" to create the policy. Netgear o 16 Type "http:/192.168.1.1" or "http://192.168.0.1" (minus quotation marks) into the address bar of your browser and then press "Enter." The address varies from model to model. o 17 Enter "admin" into the "User Name" field and "password" into the "Password" field to log in to the Netgear router. o 18 Select "Attached Devices" under Maintenance and refer to the Device Name field to locate the appropriate computer. o 19 Highlight the last digit or set of digits in the "IP Address" field and then press "Ctrl-C" to copy the number to the clipboard. o 20 Select "Block Services" under Content Filtering and then click the "Add" button. o 21 Type "80" into the "Starting Port" and "Ending Port" fields and then type "Browser" into the "Service Type/User Defined" field. o 22 Select "Only This IP Address" and then paste the number you copied earlier into the far right field. Click "Add" to save the rule. o 23 Follow steps five to seven to create another rule, this time blocking port 443. o 24 Set "Services Blocking" to "Always" and then click "Apply" to restrict the specified computer from using IE. Tips & Warnings To prevent others from reverting your changes, set a custom password on the router. For Linksys, select "Administration" and then "Management"; for D-Link, click "Tools" and then "Admin"; for Netgear, select "Set Password" under Maintenance. Enter the new password into the appropriate field. The steps to set up access restrictions on a TRENDnet are almost identical to those on D-Link. Check the product sticker on your TRENDnet for information on logging in to your router, and then follow the same process for D-Link to create a new policy.
  5. Microsoft Windows divides temporary data into two categories: Temporary Files and Temporary Internet Files. The "Temp" folder on the C drive contains new or modified files that an application is working with or have not been formally saved to the drive. Temporary Internet Files, on the other hand, are copies of websites you visit in Internet Explorer. IE automatically overwrites this data if it detects changes to a page, but Windows won't erase the data from the "Temp" folder unless Task Scheduler is set up to run Disk Cleanup at a scheduled interval. To keep your temporary files for recovery purposes, instruct IE to stop clearing the cache or change how often Task Scheduler runs Disk Cleanup. Instructions Temporary Files o 1 Press "Windows-Q" to open Apps, type "taskschd.msc" into the search field and then press "Enter" to open Task Scheduler. o 2 Select from the list of active tasks the task you want to change -- you can locate the appropriate task by name via the Task Name field -- and then choose "Properties" from the Actions pane. o 3 Select the "Triggers" tab and then click the "Edit" button to open the Edit Triggers window. o 4 Choose from the options how often you want the task to run -- "Daily," "Weekly" or "Monthly" -- and then choose the appropriate months or days. For example, to prevent Disk Cleanup from running the current month, click "Months" and then clear the box next to the applicable item. o 5 Click "OK" to close each window and apply your changes. Temporary Internet Files o 6 Open Internet Explorer, press "Alt-X" to open the Tools menu and then click "Internet Options." o 7 Click "Settings" under Browsing History on the General tab to open the Temporary Internet Files and History Settings dialog box. o 8 Change "Check for Newer Versions of Stored Pages" to "Never" and then click "OK" to close each window and apply your changes.
  6. Navigating long documents and Web pages requires the ability to scroll smoothly. Dealing with a monitor screen that jumps unexpectedly makes it difficult to read text and see Web pages properly. This jumpy behavior can occur due to numerous factors, ranging from software conflict or faulty hardware. Malfunctioning Mouse · In some cases, a jumpy screen is caused by a malfunctioning mouse. Many computer mice offer a scroll wheel in between the two selection buttons on the front, which helps scroll without the use of the scroll bar on the right of the screen. A faulty mouse may send incorrect commands to the computer, resulting in a jumpy screen. Try a different mouse on your computer to see if the screen continues to jump. If not, the original mouse was your culprit. Outdated Drivers · All the components within your computer require specialized files called drivers to communicate with each other properly. A jumpy screen could indicate out-of-date drivers in the graphics card or monitor. If these files are older, they may not work properly with each other or the operating system, causing odd screen behavior. Updates for your operating system are found at Microsoft.com, while your computer manufacturer's support Web pages may offer driver updates specific to your system. Monitor Issues · Monitor failure produces odd screen behavior, including flickering, jumping and color changes. Older, large CRT monitors contain components inside that degrade over time, and are susceptible to magnetic interference, both of which can produce a jumpy screen image. Failing monitors do not communicate with the computer and graphics card properly, regardless of driver version. Connect your jumpy monitor to another computer and see if the problem persists. If it does, it's a good indication that the monitor itself is at fault and needs replaced. Virus Infestation · Even if you have the most up-to-date drivers and operating system, a virus infestation can cause any number of problems within your computer and display. A virus can alter the way your monitor communicates with the mouse, graphics card or motherboard, which can in turn cause screen issues such as jumping. Run a virus scan to find and remove any hidden invaders that may be causing your screen issues.
  7. Most "freezes" are just software lockups, often limited to just one program, although they can cause the entire system seemingly to hang. The remainder are caused by hardware. Failing power supplies can cause all sorts of trouble, for example, including freezes. Memory is also a frequent culprit. Reseating the memory module fixes memory-related problems one-third of the time on desktop systems and one-quarter of the time on laptop systems, according to studies done by Microsoft. Instructions Is the Whole System Freezing? o 1 Press "Alt" and "F4." This may close the program without any further problems. o 2 Press the "Alt" and "Tab" keys together to switch to another program. If you are unable to see any change when you press "Alt" and "Tab," then try to bring up the Task Manager by pressing the left "Control" key, the left "Shift" key and "Escape." If that key combination doesn't open the Task Manager, press "Ctrl," "Alt" and "Del," then press the down arrow on the keyboard four times to highlight "Start Task Manager." Press "Enter." o 3 Determine the problem area. If your mouse cursor moves freely, then you have a locked up program and you need to find the process that's hogging the CPU. If the whole system seems jerky, and you can hear or see your hard drive being continuously active, then you are facing memory exhaustion. o 4 Go to the "Processes" tab. Sort by CPU or Memory as determined. If your mouse is functional, click the headers to sort the appropriate column. Otherwise press "Tab" to move forward or "Shift" and "Tab" to move back through the controls until you get to the header. Then use the arrow keys to select the header you want to sort by and press "Enter." o 5 Select the item at the top of the list, which should be the problem program. If your mouse doesn't work, use "Tab" or "Shift" and "Tab" to navigate to the list. o 6 Click the "End Process" button, or press "Alt" and "E." Then click "End Process" in the confirmation box or press "Spacebar" on the keyboard. If none of this worked, your computer may be totally frozen due to a component problem. Component Problems o 7 Power down the computer and unplug it from the power source. For a desktop computer, open up the computer case, consulting your owner's manual as necessary, to locate and reseat the memory modules. Pull the retaining clip back from the memory module and pull the module upward out of its socket. Push the memory into the slot while pulling the retaining clips gently toward the memory until it is fully seated. To reseat it, make sure the notch is aligned with the memory slot. For laptops, locate your memory, which is usually found behind a labeled door on the underside. Unscrew the door. Pull the retaining clips back from the memory module and pull the module toward you to a 45-degree angle. Then pull the module straight out of its socket. Push the memory into the slot at a 45-degree angle. Rotate the module gently until the retaining clips are securely fastened, and the module is fully seated. To reseat it, make sure the notch is aligned with the memory slot. o 8 Unscrew the retaining screw on the faceplate of the video memory card, if present in your desktop computer, and push the latch at the rear of the card toward the slot. Pull the card straight out, then push the card straight into the slot until the latch reengages. Screw the faceplate into the case. This does not apply to laptops. o 9 Reseat any other add-in cards present in the desktop computer. Overheating Problems o 10 Check the temperature. If your computer supports temperature monitoring, use the vendor-supplied utility to check temperatures. Anything above 140 degrees Fahrenheit should be considered suspect. o 11 Identify faulty fans. Any fans not moving under load with high heat showing should be immediately replaced in desktops. If your laptop has a faulty fan, you need to have it professionally serviced. o 12 Add more cooling fans to your desktop computer. Fan width is measured in millimeters. Common sizes are 80, 92 and 120 millimeters. You need to purchase fans that fit into your computer case's fan mounts. If your computer came with a jumper diagram for the motherboard, locate the fan connectors, usually labeled "FAN1" to "FAN4." Determine if the fan connectors have three pins or four pins. Buy additional fans with the same number of pins as those already in your case have. If you can't determine the number of pins, get fans that include "Molex" adapters to connect to your power supply. Start by mounting fans into the front of the case, blowing toward the back. If the problem persists, add more fans to the rear of the case, blowing outward. Laptop users can purchase a cooling pad that comes with extra cooling fans and typically connects via USB. o 13 Add a heat spreader to the memory modules in your desktop. This does not apply to laptop users. Open up the computer case, consulting your owner's manual as necessary, to locate the memory modules. Pull the retaining clip back from the memory module and pull the module upward out of its socket. If the heat spreader's manufacturer provided directions, follow them. Otherwise, remove the adhesive backing from one-half of the heat spreader. Apply the heat spreader to the memory module. Apply the other half of the heat spreader, ensuring that the screw holes or the clip slots are aligned. Screw or clip it together. Return the module to your computer case, as when reseating it in Section 2, Step 1. Power Problems o 14 Ensure your computer is plugged into a high-quality surge suppressor, not just a power strip. o 15 Try the computer in different outlets around the house, especially those on another electrical circuit. o 16 Plug the computer into an uninterruptible power supply, or UPS. o 17 Connect your desktop's internal components to different power supply cables. The internal power supply has several power converters in it, so connecting your computer's internal components to different cables or cable bundles can spread the power load to help avoid under-voltage problems. Tips & Warnings· Failures caused by mechanical or electrical problems inside the case often lead to random computer freezes and reboots. This class of problems is almost always caused by vibrations. If hitting your desk makes your computer lock up, this is probably the problem. · Modern CPUs have a thermal cut-off inside them that turns off the computer to prevent critical damage, but other components do not. Video cards, memory and the motherboard control chips, often called the north bridge, can all cause computer freezes. Signs are freezes that occur only when your computer is under high load or during heavy 3-D or video decoding. · Low voltage, unclean power, and overloaded circuits can all cause temporary, sporadic problems with your computer. Unclean power and overloaded circuits will seem random. Low voltage is usually be tied to specific actions like starting to play games or watch movies. With these problems, your power supply may not be functioning properly. You may need to replace the power supply. · Never open the computer's power supply. It presents a serious risk of personal injury due to high voltage. · Do not work inside a computer without protection from static electricity. Get an ESD wrist strap if possible and wear it while repairing your computer. If not, touch the unpainted metal of your case, usually on the rear, while performing the repair. Avoid wearing clothing that attracts static, such as wool, and stand up while working on the computer. · Wait one minute after turning off the power supply before unplugging the computer to give the capacitors time to drain. · Hold components by their edges and avoid touching the gold contacts.
  8. The Image Mastering API is an interface used to allow disc-authoring applications to communicate with your disc-burning hardware and the Windows operating system. In Windows, the Image Mastering API resources and instructions are located in dynamic link library files. When an application attempts to send IMAPI instructions, the instructions in these DLL files are used. If an error occurs while trying to author a disc, rebuild these files using the System File Checker utility. Instructions o 1 Save your work and restart your computer. Hold down your “F8” key continuously during startup. o 2 Select “Safe Mode with Command Prompt” and press “Enter.” This runs Command Prompt in a full window. o 3 Type “CD C:\Windows\System32” and press the “Enter” key to make the System32 folder the active directory. o 4 Enter each of the commands below one at a time to unregister the Image Mastering API module. Regsvr32 /u /s imapi.dll Regsvr32 /u /s imapi2.dll Regsvr32 /u /s imapi2fs.dll o 5 Type each command below one at a time to rename the Image Mastering API module files. Ren imapi.dll imapi.bak Ren imapi2.dll imapi2.bak Ren imapi2fs.dll imapi2fs.bak o 6 Input the following commands individually to run the System File Checker utility to replace the Image Mastering API module files. SFC /scanfile=imapi.dll SFC /scanfile=imapi2.dll SFC /scanfile=imapi2fs.dll o 7 Type “CD Drivers” and press “Enter” to change the active directory to the Drivers folder. o 8 Type “SFC /scanfile=cdrom.sys” and press “Enter” to run the System File Checker on the CDROM.sys file. o 9 Type “Shutdown –r –t 01” and press “Enter” to restart the computer.
  9. FileZilla is a File Transfer Protocol (FTP) program that website owners use to add, modify or delete files and directories on their website server. Although many FileZilla users have no problems retrieving their website's directory and files, you may find that Filezilla cannot retrieve your website's directory. There are five primary causes for issues with retrieving the website directory in FileZilla. By going over each possible cause and fix, you can usually get FileZilla to retrieve your website's directory. Incorrect Username/Password o Before you can view or create directories on your website's server, you must first log into it securely with your username and password. One of the first things to check when FileZilla cannot retrieve the directory for your website is your username and password -- if either one is incorrect, FileZilla will fail to log you in and retrieve the directory. Type in your username and password again and this will often fix the problem. If you do not know the username and password for your website server, ask your server administrator. Incorrect Host Address o In addition to the username and password, you must also know the correct host address for your website. If you type in the wrong host address for your site, FileZilla will be unable to retrieve your website's directory. Generally, the correct host address for your site is the website address itself, although this may vary depending on who is hosting your site. If you do not know the host address for your website, contact your server administrator. Directory Permissions o To modify or access folders on your website's server, you must have the correct permissions; without them, FileZilla won't be able to retrieve or modify your directories. Directory permissions typically are set up automatically by your Web host, but you can change them as long as you are able to see the directories. As FileZilla cannot retrieve the directory in this case, your best bet is to contact your server administrator and have him give you full permissions. FileZilla then should be able to retrieve the directory. Other Causes o FileZilla may be unable to retrieve your website's directory because there is a problem with your copy of FileZilla. You may be able to fix the problem by installing any available updates. FileZilla also may be unable to retrieve the directory because your website's server is down temporarily. In this case, you may be able to access the directory at a later time. Contact your Web host to determine if there are any outages or down times.
  10. When looking to secure your computer, you'll want to consider a few different factors: the security of your data against malware and hackers and the physical security of your machine. Operating systems come with basic levels of security and you can use free software to add additional security like data encryption and network firewalls. These options are available to any user, meaning you don't need to budget for expensive business licenses and complex installations. Security Software o There are a few different types of security software available to protect your computer against malicious software, or "malware." These programs range from spyware scanners and firewalls to anti-virus programs and full security suites like Comodo Internet Security, ZoneAlarm Internet Security and AVG Internet Security. The suites have many features tied into one program, so one suite is generally enough to protect your computers. If you want to use individual programs for each function so you have more control, you can download any anti-virus, anti-spyware and firewall program you like. Many of these options are completely free for anyone, so you don't need to purchase a company version with multiple licenses, which can be pretty pricey. Encryption and Passwords o You may know that you can enable a password on your user account, but this only goes so far. You can add an additional layer of security by enabling a secondary password through BIOS. This password will be required even to start the computer and access different settings. Enable this via the "Security" tab of your BIOS. You can also encrypt your data to make it harder for people to access your data. This protects your data even if someone else steals your physical hard drive. Use free software like TrueCrypt, AxCrypt or Cloudfogger (links in Resources) to encrypt your hard drive and all that data on it. Network Security o For any computer connected to the Internet, network security is very important. Enabling your router's firewall prevents incoming and outgoing traffic from being hijacked, and enabling your wireless network passwords prevents random strangers from accessing your account and thus any computers on your network. Access your router's control panel to enable these options. Remember to use a strong password of numbers, letters and symbols, and avoid using any personal information like names or birthdays. You can also use Windows Firewall to select how strict your firewall is depending on what type of network you're using. Alternatively, if you're a little more tech savvy, you can use replacement router firmware like Tomato or DD-WRT, though what you can use depends on the model of router you have. This upgraded firmware has plenty of options and additional security as well as greater end-user control. Physical Security o All the digital security in the world means little if a thief can walk away with your computer under their arm. A few methods of physical security exist to help combat or at least deter computer theft. Computer locks make use of a durable cable and lock and vary by whether you are using a laptop or desktop. Laptop locks tend to lock a laptop to a sturdy object with one cable, whereas a desktop lock will let you lock up to three devices -- like towers and monitors -- together. Companies like Kensington and Targus manufacture locks for all types of devices (see Resources). You can also use proximity detectors that sound an alarm whenever your computer is moved out of a specific area without your permission. If there are any lockers in your building you can use them to store your computer overnight when you aren't at work.
  11. Anyone who has worked on a Windows-based system and used Internet Explorer long enough probably has encountered the IE error 153. The error, while browsing the Internet, usually appears in a popup window with a message "Error:153 Unspecified Error." In higher versions of Internet Explorer, this standard error message may appear along with additional information, indicating "Object doesn't support this property or method." Error Reasons · IE 153 is a runtime error, and unlike stop errors, runtime errors will not fully arrest or freeze your computer. The IE 153 error may result in partial execution of a Web page, render a blank page or sometimes close the IE browser altogether. The error may occur due to improper or incomplete installation of a software application, if one or more software on your computer are incompatible with other software or hardware applications, or if the computer is infected with viruses or malware. Undesirable changes to the PC registry may also trigger the error. Virus Scanning · The error sometimes can be corrected with a full virus and spyware scan. Most PC users will have an "out-of-the-box" anti-software program already installed and running on their computers. The latest version of an anti-virus software should be installed before performing a full scan. Anti-virus software makers continuously develop and add codes into their programs to quarantine and remove newly recognized viruses. Typically, the built-in "live update" feature will automatically download the latest updates, helping the anti-virus program to scan for all known viruses. Windows Defender, for instance, helps detect several Windows-related malware and can be an option to perform a free scan. Registry Cleaning · IE 153 errors more often occur due to undesirable changes to the registry. Several free and paid registry cleaning software can perform diagnosis and correct potential registry problems. Registry Booster, Registry Mechanic and RegCure are among the highly rated cleaning tools. Some software makers offer free trials of their full version applications for a limited period. PC registry errors can be fixed manually. However, it requires expertise and precision to manually locate and fix registry problems. Wrongful changes to the registry can result in fatal and irreversible damages to the system. Re-Installation · Java, Adobe Flash Player, other plug-ins, add-ons and Web extensions, when incorrectly installed, commonly result in IE error 153. Some Windows system updates, which are installed automatically in most cases, can experience incompatibility with other software running on a computer and trigger the error. Two different versions of the same software running at the same time can also cause error 153. Users can re-install one or more recent applications and this often helps fix the IE 153 error. Error Prevention · It is important to have an anti-virus software running on the system at all times. Also, users should keep track of all changes that occur to their computer-- including software installations and removals. There should be sufficient Web security features on a computer to alert users to steer clear from high-risk and phishing websites. It is advisable to follow basic DIY-steps and contact free support avenues before having to pay a price for tech support to remove the error.
  12. When data requested from memory is not found, a memory fault is created. Windows then looks for the same data in the virtual memory on your hard drive. If the data is not there either, a stop message appears alerting you of the event. While this problem is usually the result of damaged memory or other hardware malfunction, it is occasionally caused by a corrupted file system. If you suspect or have confirmed that the problem is related to your file system, reformat the computer to correct the problem. Prior to reformatting, run the Check Disk utility while in Windows Safe Mode and back up your important files and documents. Instructions o 1 Turn on the computer and continuously hold the “F8” keyboard key during boot. This lists boot options for your operating system. o 2 Choose the “Safe Mode with Command Prompt” option and push “Enter.” This starts Windows in a Command Prompt with only the most basic services. This can help prevent or prolong the amount of time you can use your operating system before getting another BSOD (blue screen of death). o 3 Type “CD C:\” and press “Enter.” This changes the prompt to the root of your local drive. o 4 Type “Chkdsk /r” and press “Enter.” This runs the Windows Check Disk utility. While this utility is simultaneously run with a full format, you increase your chances of successfully completing the format by allowing the Check Disk program to repair any bad sectors beforehand. This will also repair damaged files, which will prevent problems when you create a backup of your files and folders. o 5 Restart your computer after the Check Disk utility completes. Upon restart, go back to the Advanced Boot Options screen by holding the “F8” key during boot, then select the “Safe Mode with Command Prompt” option to return to the Command Prompt. o 6 Insert a thumb drive into an available USB port. Alternatively, you could use an external hard drive or second internal drive. Whatever you use is not important -- you just need a storage medium for backing up your important documents and pictures. o 7 Type “WMI LogicalDisk” and press “Enter.” This populates the screen with all of the drives connected to your computer. Each drive is listed by name. Locate the device to which you want to back up your files and note the drive letter. o 8 Type “xcopy /e “C:\Users\YourName\*.*” “E:\Backup\MyDocuments\” and press “Enter.” Replace “YourName” with your Windows username, and replace “E:\” with the drive letter for the device you want to use as a backup. This process copies the Windows User folder to the backup drive. Remove the thumb drive once the backup process has completed. o 9 Insert the Windows 7 install disc and reboot your computer. As the computer starts again, look closely for “Press Key to Enter Setup” or a similarly worded phrase. Repeatedly press the specified key. This launches your BIOS. o 10 Look at the bottom of the BIOS screen. This should provide you with a navigation map with the keyboard keys necessary to use the BIOS. Generally, the arrow keys will let you move through the BIOS, and the “Enter” key is used to select an option. o 11 Locate the boot menu settings in the BIOS and change the priority so that your disc drive is the first drive in the list and the hard drive is the second. Press the “Save and Exit” key, which is usually “F10” and press “Y” or “Enter” to confirm. This reboots your computer. o 12 Press any key on your keyboard as soon as you’re prompted with a “Press Any Key to Boot from CD/DVD…” message. This loads the Windows installation disc. To confirm, you should see a “Windows is Loading Files…” message with a progress bar. Once finished, the Install Windows dialog appears. o 13 Leave the options at their default and click “Next.” On the second screen, click the “Install Now” button. You should see a “Setup is Starting” message. Once started, the License Agreement screen appears. o 14 Click “I accept…” then click “Next.” This takes you to the “Which Type of Installation…” screen. Click the “Custom (Advanced)” option. On the following screen, click to highlight the drive with the word “Primary,” then click “Drive Options (Advanced.)” o 15 Click the “Delete” option at the bottom of the following screen. This will delete the partition and all of its contents. Click the “OK” button on the confirmation dialog. Click to highlight the “System” drive and click “Delete.” Click “OK” to confirm. o 16 Click the “Next” button at the bottom. This starts the automated Windows 7 installation. Remove the disc from the drive when prompted and boot into Windows 7. Insert your USB thumb drive. Open Windows Explorer and transfer your documents back over to your computer.
  13. The error, "BrowseIt.GetFileText.Permission Denied," or any variation thereof, is caused by an error in the free, open-source Web browser, BrowseIt! If you've installed BrowseIt! on your computer or a program that incorporates BrowseIt! elements, that software may be corrupted. However, since the software is free, it's also known to be used in some viruses and adware, which may have infected your computer. BrowseIt! · BrowseIt! was first created in 2005 as a tabbed, open-source Web browser intended to replicate the functionality of Mozilla's Firefox browser. But, instead of using Firefox as the basis for programming, BrowseIt! is designed to run off of Internet Explorer's underlying framework. If you're seeing the error once and it goes away, a component that you installed probably contains BrowseIt! You might need to uninstall the offending program or contact the manufacturer for technical support. Virus or Adware · According to Prevx, the division of Webroot that catches and categorizes viruses, adware and malware, the file BrowseIt.exe can be used as a component in adware. If the error message continues to pop up, despite your efforts to close the dialog boxes, then it's likely that the error is due to an infection on your computer. Adware is a type of malware that can infect your computer. It functions as a program on your system, which is why it uses the -ware suffix, indicating that it's a type of software. The mal- prefix is appended to designate something malicious and the ad- prefix is used for software that attempt to gather information for advertisers and direct you to make purchases. Both adware and malware are similar to viruses in that they can be secretly installed on your computer, however, viruses are self-replicating while adware and malware are contracted from an infected site on the Internet. Uninstallation · If you think that you installed a program that is causing the error, you can uninstall it through the Control Panel in Windows. Click "Start" and then click "Control Panel." Click "Uninstall a Program" and scroll through the list to find the program you suspect is causing the problem. The most likely suspect will be the most recent program that you installed before the error appeared. Click to select the program and then click "Uninstall" from the bar above the list. Follow the on-screen instructions to complete the uninstallation. Restart your computer when you're done. If the error persists, you may need to restore your computer to an earlier date. Click "Start" and type "System Restore." When the window appears, follow the instructions to restore your computer's software to an earlier date. Choose the most recent date that is prior to the first time you saw the error. Your computer will restart when the process is done. Virus Removal · If you suspect that the error is caused by a malware, you need to clean off the infection. If you have antivirus and antimalware software installed on your computer already, update the definitions and run a scan. If you don't have software installed, you can download software from the Internet to help. Microsoft Security Essentials, AVG Anti-Virus and Trend Micro are tools that you can use to clean your system (links in Resources). If the infection is preventing you from using your computer, you may need to start in Safe Mode. Power off the computer and then turn it back on while pressing "F8" on the keyboard. When the option arises, use the arrow keys to select "Start in Safe Mode" and press "Enter." Use the antivirus and antimalware software of your choice while in Safe Mode to clean out the infection.
  14. Lsass.exe Referenced Memory Error is commonly caused by the Sasser worm, a malware that infects Windows-based systems. This worm sneaks in through a Windows’ security vulnerability and attacks using the lsass.exe file, which is connected to the Local Security Authority in Windows. The lsass.exe error message caused by the Sasser worm claims that a file could not be written to the referenced memory block and then crashes the computer. Shut DownAfter stating that there is a problem with Referenced Memory, the Sasser worm shuts the computer down within 60 seconds. Work quickly to stop the shutdown by opening the Start menu and type “shutdown –a” in the Run Command box. Hit “OK” and the reboot is aborted. If the worm beats you to the reboot, then restart the computer and tap F8 until the menu for the Advanced Startup Options appears. If the Windows splash screen appears, then the computer did not read the F8 key press and you will have to try again. When you arrive at the Advanced Startup Options menu, choose “Last known good configuration” and let the computer start up. Virus Protection Update your antivirus program with the newest virus definitions and scan your computer. The antivirus program will find a Trojan virus with an odd name. Remove the found threat and keep the antivirus updated. Run the scanner at least once a week or whenever something odd happens. The Sasser worm may block your access to antivirus websites, so updating your antivirus program can be a problem. Unblocking Antivirus Sites By the time the Sasser worm shows the lsass.exe error, it has most likely created bogus URL entries for antivirus websites. This is an attempt to stop the removal of the worm. Check for fake entries by typing “Notepad \windows\system32\drivers\etc\hosts” in the "Search programs and files" text field that appears when you press the Start button. Press “OK” to get the results. A healthy PC will only show information on the “localhost,” whereas the Sasser worm writes a large list with antivirus websites to this file. Close Notepad and open the directory containing the “hosts” file. Right click the file and rename it to “oldhosts.” In the "Search programs and files" text field type “nbtstat –R” and press “OK.” The window will flash and you will have access to the antvirus websites until the computer reboots. Prevention Patch the security breech once the Sasser worm is removed. Open the Microsoft Security Bulletin MS04-011 and run the patch for your version of Windows. This will prevent reinfection by the Sasser worm and the reappearance of the lsass.exe error. Use a firewall to stop unauthorized changes to your computer. A firewall blocks threats like the Sasser worm that are not email based . Turn on the built-in firewall in Windows or install one that is purchased or free from the Internet. Only install a firewall that you are sure is not malware in disguise.
  15. The Microsoft Windows Installer Error 1320 may occur when you attempt to install software on your computer. For example, when you attempt to install the Statistical Package for the Social Sciences software by IBM, you may receive an error message similar to "Error 1320. The specified path is too long. C:\ProgramData\Application Data\SPSS." Several other programs that you attempt to install or uninstall an application may also produce the MSI 1320 Error. MSIExec.exe and InstMsi.exe Functions · When installing the SPSS software, the MsiExec.exe and InstMsi.exe functions return the MSI 1320 error if the installation folder named INSTALLDIR is mapped to a network drive. Path names that are too long will also return MSI 1320 errors. For example, if you work with Visual Studio and you place projects in directories other than the hard drive, commonly "C," this is likely to occur. DOS SUBST Command · If you placed the INSTLLDIR folder in a substituted drive using the DOS SUBST command, an MSI 1320 may be returned. The DOS SUBST command is used to associate a path with the letter of a virtual or physical drive. Errors will occur if you use the DOS SUBST command on a network drive. Temporarily Modify Shortcut · Modify the C:\ProgramData directory by removing the Application Data shortcut before you install the software. You'll have to show hidden files to locate the shortcut. To do this, navigate to the "Start" button and select the "Control Panel." Click "Appearance and Personalization," and then click "Folder Options." Click the "View" tab, and then click "Show hidden files and folders" located under "Advanced Settings." Click "OK." Drag the "Application Data" shortcut to your Desktop. If that's not possible, rename the folder to unlock it first, and then drag the "Application Data" shortcut to your Desktop. Place the shortcut back to the C:\ProgramData directory after you finish installing the software. Warnings and Considerations · Some of your settings may not be restored after you remove and then replace the Application Data shortcut. Workaround this by selecting the "Do not show hidden files and folders" option in the Folder and Search Options category. You'll also want select the "Hide protected operating systems files" option to restore your original settings. Contact the software or hardware manufacturer of the software or hardware you're trying to install to get the appropriate support. Visiting the manufacturer's website and posting a query on a forum may lead to a faster result.
  16. An exec error may appear when an executable file with an EXE extension encounters a problem or has corrupt data that prevents it from loading and running. Examples of Exec error messages are "Fatal Exec. Engine Error," "Compile error in hidden module: AutoExec" and "Excel has performed an error in module excel.exe and will be closed." Exec errors occur when saving a program with an EXE file name extension. They are caused by improperly installing or uninstalling software, cookies and temporary files stored by an Internet browser, third-party browser extensions and incompatible spyware or computer anti-virus software. Installing Software o Every time you install or uninstall a program on your computer, you are changing the PC's registry. If this is done without first creating a Restore Point or the System Registry is not changed by the PC when the program is uninstalled, it can cause Exec errors to occur. This can be fixed by downloading Microsoft Security Essentials and running the program (see Resources). Exec Engine Error o A fatal execution engine error happens when an app attempts to access an Exception object in a scripting engine. Usually this occurs when the wrong apps or programs have been added to the "Startup items" list in the "System Configuration Utility" of the computer. This can be fixed by going to the "Start" menu. Type "MSCONFIG" into the search text box and press "Enter." The System Configuration Utility will open. Click the "Startup" tab to go to the "Startup Items" list. The programs and apps listed in the Startup Items list are loaded by the computer whenever it is turned on. Click on the arrow to expand the column. Examine the list and begin a process of elimination by unchecking one startup item to disable it. Restart your computer and continue unchecking the programs until the computer starts up and you no longer get the Exec error. Uninstall the app or program that is causing the error. Adobe o Some Adobe users will encounter the Exec error when attempting to run Microsoft Office or Microsoft Excel. This is caused by the startup folder of Office or Excel containing the Adobe Acrobat PDFMaker add-in template files Pdfmaker.dot and Pdfmaker.xla. This can be resolved by downloading the Adobe PDF maker updates from Adobe.com, or moving the PDFmaker.dot and Pdfmaker.xla files out of the Excel or Office Startup folder and into the My Documents folder. Other Causes o Clear all of the cookies and temporary files from your Internet browser cache as this may be the cause of the Exec error. Another cause of the error is Norton AntiVirus software. Download updates for Norton AntiVirus from Symantec.com or uninstall the software and download Microsoft Security Essentials, which has anti-virus software on it. An alternative is to download a free open source anti-virus software such as Avast! from Avast.com.
  17. The motherboard on your computer contains a small program called the BIOS that manages connected hardware components and some low-level operations such as drive boot order. The BIOS works even when no operating system is installed and performs the Power-On Self Test each time you turn on your computer. The system POST uses a combination of screen output and beep codes to inform you of any problems at startup. Processor · Some computers beep once at startup to indicate a central processing unit failure. You can identify a faulty CPU as the cause of one beep if your computer has an AST motherboard and doesn't boot up after making the beep. Other manufacturers could use one beep to mean the CPU failed, and your owner's manual contains the beep codes generated by your motherboard. A processor can fail as a result of continued overheating or a faulty power supply unit. Memory · The main memory in your computer uses a capacitor for each bit of information it stores. Capacitors must be continually refreshed with the current state of a program or the data in them will fade over time. AMI motherboards emit one beep at startup if the dynamic random-access memory fails to refresh. Apple computers beep once at startup if no RAM is installed. If your Apple computer doesn't find any RAM during the POST, it skips the startup chime. On some models, the power light flashes twice. Default Beep · Your operating system uses the system beep from your motherboard to respond to some keyboard input. The sound scheme in Windows includes a mix of sounds from your speakers and motherboard to indicate an event, such as connecting or disconnecting a device or receiving email. Because some computers don't have speakers, Windows uses the system beep to confirm Ease of Access changes, such as enabling Sticky Keys or Filter Keys. Your computer could beep once if you type too quickly or press several keys at the same time. Normal Operation · Most motherboards beep once at startup to tell you that your computer is operating normally. If your computer beeps once before booting your operating system as usual, you may not have a problem. Apple computers beep once as a result of normal operation during a firmware update when you press and hold the power button. If you don't want to hear the startup beep from your motherboard, you may be able to turn it off in the BIOS settings.
  18. Microsoft’s Windows operating system includes integrated firewall software that can stop hackers and malicious software from accessing your computer when you go online. Sometimes the firewall prevents legitimate applications from connecting to the Internet. If some programs experience firewall connection problems, troubleshoot the issue by tweaking the firewall’s settings. About the Windows Firewall · The firewall feature in Microsoft Windows acts as barrier between your computer and the Internet, allowing only trusted programs on your computer to go online and communicate with the Internet. The firewall also blocks unrecognized, external online services from connecting to the data on your computer, thwarting attempts by hackers to hijack your computer or access your personal data. Firewall Permissions · The firewall automatically authorizes many of the standard applications on your computer to access the Internet. For other programs and third-party applications that you download and install, the firewall prompts you to authorize the application when you first try to use it. The firewall connection problem occurs when a legitimate program or application that you haven’t authorized tries to access the Internet from your computer. Because the program isn’t approved, the firewall automatically blocks the connection. Troubleshooting: Access Firewall Settings · Windows lets you configure the firewall to approve access for applications experiencing connection problems. To let a program through the firewall, select the “Control Panel” feature from the computer’s Start menu. Type “firewall” into the system search field at the bottom of the Start menu. Click “Windows Firewall” in the Control Panel section of the search results. Troubleshooting: Configure Firewall Settings · Accessing the Windows Firewall opens the firewall settings dialog in a new window. In the left-hand pane, click the “Allow a Program or Feature Through Windows Firewall” option. Click the “Change Settings” button with security shield logo. Before making changes, you may need to enter your Windows login password into the applicable input box. Windows Firewall displays a list of applications and programs in the main pane where you can select the program or application that you want to allow through the firewall. Save the changes and when you launch the program again, it should be able to go online normally.
  19. The good thing about computer lockups is that they probably don't happen every day unless you have a serious software or hardware problem. However, even periodic freezes may not only be frustrating but costly if you don't save a document before your computer stops responding. There's no need to panic when your computer locks up, but it does help to understand why your machine may freeze as you work. Application Lockups · When your browser or another application stops responding, it may be the only thing on your computer that’s not working. If you cannot interact with a program, try to switch to another program or open your Start screen. If you can get to the Start screen, the problem probably lies with the application that’s frozen. You can terminate that application by right clicking its name in the Task Manager and selecting “End Task.” Before you terminate the app, review its CPU and memory usage values. Those appear in the Task Manager table. If those values are high, the program may be consuming more resources than it should. Memory and Hard Drive Space · A computer may freeze or use extra resources for multiple reasons. If the same application keeps locking up, ensure that you install the most recent updates for that program. You can also check the program’s support site and look for lockup issues that the site may explain. Applications can also freeze when your computer’s memory or hard drive space runs extremely low. That could happen if you don’t have much memory while running multiple applications at once. The Windows Disk Cleanup unnecessary files and free up hard drive space. If you need to run many programs at the same time, consider purchasing additional memory. Viruses· It may seem like “run an anti-virus scan” is the main solution that people suggest for resolving a host of problems, but many times it is a possible remedy. Because a malware program has the ability to access all your files and system components, it may be causing your computer to freeze. Lockups can be random or occur when you perform certain tasks. In addition to running a full virus scan, tell your security program to run a boot time scan if it has that capability. A boot time scan can identify threats that regular scans miss because it runs before Windows starts. Memory Problems · One of your computer’s memory sticks may have a problem even though the computer still works. Faulty memory can cause programs to malfunction and your system to shut down. If your computer keeps locking up and you can’t discover why, check your memory by running the Windows Memory Diagnostic Tool. If it discovers a problem, visit your computer manufacturer’s website and seek guidance there. You could also remove your memory sticks and take them to a computer store for testing. Take the whole computer if you don’t feel comfortable removing those sticks. Hard Drive Issues · The hard drive, another critical system component, can also bring your computing to a halt. Sometimes, you can detect potential hard drive problems by listening for changes in the way your hard drive sounds as it spends. Windows has ability to diagnose many hard drive problems and repair them automatically. Trigger this process in Windows by searching for “Computer,” clicking the “Computer” icon and right clicking the hard drive you’d like to check. You can then click “Properties,” select “Tools and then click “Check.” A wizard will guide you through the repair process.
  20. Fatal exceptions occur when software programs encounter errors that prevent them from continuing. A fatal exception error message indicates that one of the applications you are using has attempted an operation that cannot be carried out. Exceptions do not necessarily stop programs from executing since programmers are able to build the ability to handle exceptions into the application code. However, a fatal exception is one that the program can't cope with. Exceptions · In programming, lots of operations can go wrong, particularly where input and output processing is involved. One example is reading from or writing to memory. When developers work on software applications, they can build coding structures to deal with such unforeseen problems. An exception is a coding object that is said to be "thrown" when such a problem occurs. Programmers can create code structures to "catch" such an exception, handling the problem and letting the application continue to execute. This is known as exception handling. Control · If the execution of a program causes an exception that is not handled by the application, a fatal error may occur. This means that the program is unable to continue, so processing control is handed back to the computer's operating system, such as Windows, for example. This process means that you can continue to use your computer when a fatal exception occurs, although the user interface may freeze for a few seconds or even several minutes before this happens. In some cases, an error may stop your computer from responding to any input until it is restarted. Causes · Fatal exceptions can be caused by many different types of programming instruction. Examples include when the programming code attempts to carry out an illegal process or an operation that the application does not have permission for or where the code attempts to read from or write to an invalid location in memory. Whenever a program uses data sourced external to it, there is a possibility of these types of errors since the programmers cannot know about the state of the user's computer outside of the application itself at the time of developing it. Solutions · If you encounter a fatal error as a user of a program, there is a limit to what you can do other than waiting for your operating system to take control back and end the application. If the problem relates to a program you use often, you could try checking if there are updates available for it in case the problem has been addressed by a new version. The only people who can really fix a fatal error are the application developers. However, sometimes these errors are isolated incidents, so when you run the program again, you may find that the error does not recur.
  21. A boot failure is a serious problem, because the boot process is an essential part of your computer's startup routine; your PC must first boot in order for it to be usable. A "boot failure" message typically comes from a hard drive problem, although certain settings in the computer's Basic Input Output System can also trigger the error. Boot Process The term "boot" is a shortened form of "bootstrap," so-called because the computer is "pulling itself up by its own bootstraps." At the moment you turn the PC on, its random-access memory is empty; it lacks even the simplest programming instructions. To facilitate startup, a small program in flash memory loads a bigger program from the hard drive, which in turn loads Windows or another operating system. Booting is the act of loading the program from the hard drive. If the computer cannot do this, the flash-based program displays the "boot failure" error message. BIOS Setting Your computer may encounter a boot failure if the BIOS is not set correctly. The BIOS stores basic information such as the current time and date, amount of installed RAM and hard drive information. To see the BIOS set-up screen, restart your computer and press the "F8" or other function key according to the on-screen instructions. Using the arrow and "Page Up/Page Down" keys, open the BIOS setup screen that has information on the hard drive. Check the drive information and make any necessary changes. This task is especially important if your computer has more than one hard drive. Note that BIOS settings seldom go bad by themselves; however, mistakes made configuring the BIOS can result in a boot failure message when you subsequently restart the computer. Hard Drive Hard drive problems are a likely cause of boot failure messages. For example, the cable connecting the hard drive to the computer's motherboard may have worked loose; in this instance, the computer can no longer communicate with the drive. Simply disconnecting and reconnecting the cable may solve the problem. Jumpers -- the tiny plugs that change the hard drive's configuration -- may also cause boot problems if misconnected. If your computer has two drives in a "master/slave" configuration, a jumper problem may result in a PC that won't boot. A hard drive failure will also cause a boot error; in this case, the only option may be to replace the drive. Other Causes Hard drives have standard "formats" -- frameworks of data set up so the computer can locate information. If the format is bad, such as from virus infection, the hard drive won't boot, even though it's properly connected and running. Other kinds of incompatibilities between the computer and the drive will also lead to boot problems. For example, when installing the 64-bit version of Windows 7 from a DVD to a computer that has the Unified Extensible Firmware Interface mode enabled, and which has a drive with more than four partitions, the computer attempts to start from the DVD but the boot process will fail. Microsoft has a "hotfix"-type software patch that solves this problem.
  22. Ensuring that a computer is secure requires more than simply dealing with viruses and outside traffic that may compromise your data. You must provide the proper permissions to people who use the computer on a daily basis. Administrative tools can alter the way a computer runs and the way users interact with computer software and hardware. You may wish to restrict unqualified users from accessing these tools. About · Windows provides administrative tools that allow the computer or network administrator to troubleshoot, configure and change how the computer’s software and operating system works. Examples of administrative tools are the Windows services, printer management, the system configuration and Windows firewall and security settings. Making changes to the computer using these tools can result in fixing issues or increasing security, but can also cause issues if altered incorrectly. Reason · Administrative tools control important computer settings and functions, and you will have instances when you do not want all users to have access to them. In a business network environment, or in a situation where children or several public users utilize a computer, only a qualified administrator should be able to install software or make changes to the operating system. This increases the computer’s security, prevents malware and unwanted programs from being introduced to a network and prevents changes that may cause the computer to respond poorly or crash completely. Standard User Account · To disable administrative tools for normal users, create a second user profile on the computer that does not have administrator access. This prevents users from installing new programs and accessing areas of the computer that might have harmful results. Log in to the computer with the administrator account, launch the Start menu and type “User Accounts” in the text box. Click the “Manage Another Account” link and “Create a New Account.” When creating this user profile, ensure the profile is set as a Standard User, which disables the user’s access to administrative tools. Accessing Tools · When you want to change something on the computer using the administrative tools, you must first log in to the computer using the administrator account instead of the standard user account. Once you have logged in, launch the Start menu and type “Administrative Tools” into the search box. Click the “Administrative Tools” link from the search results to launch the new window with a list of tools you can choose from. You can also navigate to the Control Panel and click "Administrative Tools" within the Control Panel window.
  23. The Windows garbage bin or "Recycle Bin" holds all deleted files you remove from your system. When you delete any file including a Windows system file, it is moved to the Recycle Bin. When you install a second operating system on the computer and delete the old folder on your system, it is placed in the Recycle Bin. Purpose · In the old MS-DOS operating system, a deleted file was removed from the system immediately. The Windows Recycle Bin is a method that protects you from accidentally deleting the wrong file. The file is actually left on the system, so you can restore it if you decide you want to keep the file in the future. The file is stored in its entirety until you decide to permanently delete it. Content · The content of the Recycle Bin is all the files you deleted on the system. If you install a new operating system on the system, your original Windows installation is stored in its folder. When you boot to the new operating system, the Windows folder is seen on the system. If you no longer need the folder, you can delete it. The files and folders for the Windows installation are transferred to the Recycle Bin. Recovery · First open the "Appearance and Personalization" utility in the Control Panel. Check the box to display the Recycle Bin and click "OK." After you set up the configurations, you can see the Recycle Bin on your desktop. Double-click it to view the content. Right-click a file and select "Restore." You can also click "Restore All" to recover all files in the Recycle Bin. Considerations The Recycle Bin can take up several gigabytes of data on your hard drive. If you need to free up hard drive space, you can empty the Recycle Bin. Right-click the Recycle Bin icon on your desktop and select "Empty Recycle Bin." The files are permanently removed from your system to clear up hard drive space.
  24. Kaspersky is a security program that is available in both a stand-alone program and Mozilla Firefox add-on. The Kaspersky Firefox add-on scans files that are downloaded in Firefox to ensure that they are safe for the computer. The Kaspersky add-on requires a special security certificate to run. Although many Kaspersky users don't experience problems with running the Firefox add-on, you may find that there are certificate errors with Kaspersky in Firefox. There are four primary causes for certificate errors, and by troubleshooting through each cause, you can fix the certificate errors issue. Firefox Problems · Although Mozilla Firefox generally handles Kaspersky security certificates well, sometimes it does have problems with them. This typically occurs when using a version of the Firefox browser that is either too new or too old for the Kaspersky plugin. The problem may also occur because the Firefox browser has become corrupt. In both cases, the fix is to reinstall or update Firefox on your computer. Follow Mozilla's instructions for doing so. Kaspersky Problems · Just as with Mozilla Firefox, occasionally Kaspersky may be the cause of the security certificate problems in Firefox. This usually happens when you are using a very old version of the Kaspersky add-on that doesn't work properly with the Firefox browser. Like Firefox, this may also happen because Kaspersky has become damaged, usually due to a virus or piece of malware. You can typically resolve this issue by installing the newest version of the Kaspersky add-on to Firefox. Certificate Issues · Even if your copy of Mozilla Firefox and the Kaspersky plug-in are fine, certificate errors may persist due to issues with the certificate itself. When Firefox reads the certificate, it checks to make sure that the certificate is valid. If the certificate is not valid, either due to being incorrectly configured or damaged, Firefox will display an error message. You may be able to fix the issue by re-loading the certificate. Other Causes · Certificate errors with Kaspersky in Firefox may be caused by problems with Firefox's security settings. If Firefox is not properly configured to work with certificates, it will show an error message any time a certificate is loaded. Consult Firefox's support page for help on configuring the security settings. The certificate errors may also occur because your computer's firewall is blocking Internet access for the certificate. You can fix this by temporarily disabling the firewall or adding an exception for Firefox.
  25. Intel Extreme Graphics, housed on a chip built into the motherboard, enables a computer to render graphics without a video card. However, desktop computers with onboard graphics nonetheless include an available accelerated graphics port, peripheral component interconnect, or PCI express slot to which a video card can be installed. You can upgrade the computer to a dedicated card to improve graphics performance, but the operating system won't recognize the new hardware unless you've first disabled Extreme Graphics in the BIOS -- the software that controls and manages hardware inside the computer. Instructions AMI BIOS 1. Turn on or reboot the computer. Follow the instructions on the boot screen to go to the BIOS. 2. Select the "Advanced" tab using the directional keys. Scroll down to "Chipset" and then press "Enter" to view the Advanced Chipset Settings screen. 3. Highlight "Graphics Adapter Priority" and then press "Enter." Select "AGP/Int-VGA" if a graphics card is installed to the AGP slot; select "PCI/Int-VGA" if a graphics card is installed to the PCI slot. 4. Press "Enter" to disable Intel Extreme Graphics. Select "Exit" from the tabs and then select "Exit & Save Changes." 5. Press "Enter" twice to apply your changes and restart the PC. Award BIOS 6. Turn on or reboot the computer. Follow the instructions on the boot screen to go to the BIOS. 7. Select "Advanced BIOS Features" from the main menu using the directional keys, and then press "Enter." 8. Select "Init Display First" and press "Enter." Change the setting to "PCI" or "PCIEx" and then press "Enter" again. Intel BIOS 9. Press "F2" when the Intel logo appears on-screen. Select the "Configuration" tab using the directional pad. 10. Select "Video" and then press "Enter." Highlight "Primary Video Adapter" and then press "Enter" again. 11. Choose "Ext PCIe Graphics (PEG)" if the card is installed to the PCIe slot, or "Ext PCI Graphics" if the card is installed to the PCI slot. Press "Enter." 12. Press "F10" and follow the on-screen prompts to save and quit. Tips & Warnings · If you've installed an AGP card to the computer, leave "Init Display First" set to "Onboard/AGP," unless the BIOS provides a separate "AGP" option. · The BIOS menu and its options vary depending on the make and model of the motherboard.Consult your product's manual, for further assistance, if necessary.
×
×
  • Create New...