> Best blogg: computer
Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

Tuesday, August 4, 2015

How to Install Windows 10 on Your computer

Want to install Windows 10 on your computer? We’ve got you covered with the instructions, although it’s just like installing any other version of Windows.

UPDATE! If you want to clean install Windows 10 instead of just upgrading, you can follow our new and updated guide to clean installing Windows 10. We definitely recommend going that route.
Before you decide to upgrade your computer, you might want to decide whether or not you actually want to install Windows 10. It’s not necessarily right for everybody — there are still bugs and issues, and we really recommend that people hold off for a few weeks.
You should not install Windows 10 on your primary PC. Use a test computer or a virtual machine. If you absolutely must install Windows 10 on your regular computer, we highly recommend creating a system image of your entire computer in case you want to easily revert back.

Before You Install

Here's a couple of obvious points to consider before you head down the path of mucking about with your PC.

Windows 10 Technical Preview
First, make sure you have all your data backed up. Even if you’re careful with how and where you install the update, it’s still a good idea to have everything duplicated just in case anything goes wrong.
The update won’t be reversible, even with a recovery partition so make sure you have everything you need to re-install your original version of Windows – serial numbers, installation discs, etc.

Where to download the Windows 10 Technical Preview

Once you’re sure you have a PC that’s backed up and ready to have Windows 10 unleashed on it the next port of call is to download the upgrade.

How to Install Windows 10 on Your PCHere you’ll be signing up for the Windows Insider Program, which allows you to download and test out the software. You’ll need a Microsoft account – Hotmail, Outlook, etc – to login and you’ll need to agree to some terms and conditions along the way.
Now the next step is where you have to be a bit careful. Microsoft – for some bizarre reason – has sought to guide the user to download the upgrade version of the software, which will upgrade the very PC you’re using.
Don’t do this!

Even if you are planning to upgrade the PC you're using - i.e. it's already a spare - it still makes far more sense to download the installation separately in case something goes wrong and you have to start again. It really is a very silly way for Microsoft to have setup the preview website.
How to Install Windows 10 on Your PCInstead, head to the bottom of the upgrade page where it says “Looking for ISO files?”. Click on "Get the ISO files" and download the version that’s right for your machine. There are options for US and UK English, Chinese, and Portuguese as well as 32-bit or 64-bit versions. They're around 3-4GB so be prepared for a little bit of a wait.

How to Install the ISO

To get the Windows 10 Technical Preview onto your test PC you’ll need to either burn the ISO onto a disc or copy the files onto a USB drive.
Windows has built in burning capabilities these days so you can just use that - just insert a disc, right click on the ISO and select "Burn Disc Image". Or you can use your choice of burning software if you have something else installed - Nero or ImgBurn for instance.
For USB installs, if you have software that can read ISO files you can just copy the contents onto a USB drive or you can download and run the Windows 7 USB DVD Download Tool which will format the drive and copy the ISO to it for you.

What if I Don't Have a Spare PC or Hard Drive?

If you don't have any spare hardware on which to install Windows 10 Technical Preview but you don't want to upgrade your current Windows Install, you have a couple of options: install to a separate partition on your existing hard drive or install to a virtual machine.
To create a separate partition you'll need to resize your current partition. You can do this from the Disk Management tool - right click on My Computer and select "Manage". Just right click the disk partition you'd like to resize and select "Shrink Volume". Assuming you've got enough hard drive space you'll be able to shrink this partition and leave enough room for another Windows installation on the left over space - anything over about 10GB should be enough for a basic Windows 10 installation.
Once the original partition is shrunk click on the empty space left and select to create a new partition. Then, when you run the Windows installation make sure to select this new partition to install to.
Removing this new partition and getting back to your old installation can be a bit of a bind but that's for another article...
As for installing to a virtual machine, you can find a comprehensive guide here.

Installing the software

Once you’ve either burned your disc or copied the files to a USB drive, insert either into the PC you’d like to upgrade.
If you do have an old version of Windows - and haven’t elected to just upgrade direct from the website – you can start the installation from the desktop by just clicking setup.exe and following the instructions.
image: http://static.trustedreviews.com/94/00002e707/e825_orh616w616/10.jpg
How to Install Windows 10 on Your PCIf you don’t have a copy of Windows already on the machine you’ll need to boot from the disc or USB drive by changing the boot options in your motherboard’s BIOS.
Once booted, just follow the setup instructions. Behold a new world of "Live Tiles in the Start Menu? What's that all about?" awaits...

Get the latest build of Windows 10 Technical Preview now!

For those of you already rocking Windows 10, all you need to do is wait for the automatic update schedule to arrive and the update to the latest build with all the new fun features will happen of its own accord.
If you want to force the upgrade to happen straight away you need to go to PC Settings > Update & Recovery > Preview Builds > Check Now. You're looking for Build 9926.
The new update is essentially a fresh install so make sure any data you need is backed up. It will keep your personal files and attempt to reinstall comptible programs but it's not foolproof.

tags: computer, Windows, Windows 10,

Saturday, November 29, 2014

How to Learn Computer Programming

How to Learn Computer Programming
Computer programming is one the most exciting fields to work in. Millions of lines of code are written each day, all over the world, bringing in new applications and software. If you are eager to become a programmer and tap the potential which your computer puts at your fingertips, it's time you began thinking about learning programming on your own. If you enjoy thinking analytically and solving puzzles, as well as problems of all sorts, programming is bound to give you a high. The key to learning programming is to master programming languages and learn to apply them to solve complex problems.

The standard way of learning to program is to get admission into a college and get a degree in computer science. However, there are many who can never make it to college, despite having the skills and the talent for analytical thinking. I have written this article for those of you who never went to college but have discovered the beauty of programming and would like to master it on your own. This is possible today as Internet and the open source movement has created a programming culture online, which can guide you in the process. With self discipline and persistence, you can teach yourself programming and enjoy writing your own software. Not only is it a great way to exercise your mind, who knows, you might even make money, by selling your own software one day or find employment with software firms, if you get really good at it.

How to Learn Computer Programming Without a College Degree?

Computer science is a tough field to master, but it can give you the most enjoyable and creative experiences ever. Here are a few guidelines on how to become a computer programmer.

Learn Programming Languages
Firstly, get hold of a desktop or laptop computer, which enables you to read and execute your programs. Programing is all about learning to communicate with your computer hardware to accomplish various computing tasks. Computer only understands machine language, written in 1s and 0s. For us humans, to communicate with computers, programing languages were created, whose code can be converted into machine readable form by compilers. There are a range of programing languages which vary in their applications and power. You will have to learn at least a dozen essential programming languages, which includes C, C++, Java, Perl, Lisp and Python.

To get your computer programing basics right, start learning C or Python at the start. Use online resources and the hundreds of good books on programming to get the basics. Install the compilers that the language requires for writing code and execute it on your computer. Work through examples and problems provided in books and online tutorials, to write your own code. One of the best books to start learning C is 'Programming in C' by Dennis Ritchie and Brian Kernighan. Another good book is Programing in C by Kochan.

Get a hang of C and then graduate over to object oriented programming that is made possible by C++. Then get a hang of Java, Perl and Javascript, which is extensively used in client side programing for web development. Learn HTML and server side scripting if you plan to get into web development. As you can see, there is a lot to learn and it will take at least 5 to 6 years to get well grounded in most languages. Take help from online tutorials and courses offered by institutes like MIT through their OpenCourseWare.

Start Writing Code
The best way to learn is to practice what you have learned. Write your own code, make mistakes, learn how to debug code. Participate in coding competitions and test your programming skills. Get hold of open source software, read the code and understand how good programs are written. Learn how master programmers achieve economy of code and the logical clarity that makes great programs. Get to know your computer and the hardware basics. Learn how the computer works at the basic levels with memory and processors.

Learn to Run Linux or Unix
You cannot call yourself a programmer until you have mastered using Linux and Unix operating systems. Install a Linux distribution like Ubuntu on your computer and tinker around with it. It will provide you with all the programing tools you need, along with compilers.

Apprentice Expert Programmers
Let expert programmers take you under their wing. Find a good mentor who is ahead on the path of becoming a master computer programmer. Take advice and learn from them.

Read Code, Write Code and Keep Improving
Keep writing your own piece of computer code and keep thinking on how you could improve it. Join the open source movement and analyze the anatomy of good programs. Pick up your domain of expertise and go deep. Remember that there is always room for improvement!

Let there be no illusions that programming is an easy task. It will take ten to fifteen years at least for you to attain a level where you can start calling yourself a complete programmer. Your success in programming is directly proportional to the dedication and persistence you put into your learning. As suggested before, master at least a dozen programming languages including C, C++, Java, Lisp, Python, Perl and Javascript, read and understand new code, keep attacking newer computing challenges and grow as a programmer. The aim of this Buzzle article on how to learn computer programing was to give you a nudge in the right direction. I hope that this objective has been attained in some measure. Free your mind and enter the matrix of programming world with gusto!

Sunday, November 23, 2014

List of the Best Computer Games for Kids

Best Computer Games for Kids
Best Computer Games for Kids

Backyard Football
This is one of the best sports games for kids. Children who love to play football can choose child versions of their favorite NFL players for enjoyment. Game customizations include field, team, players, and weather selection. It is available at just around $12.

I Spy: Spooky Mansion Deluxe
This is one of the most popular educational computer games for kids. The game has a toy skeleton guiding the player through a mansion, wherein you will come across picture riddles and hidden objects. The player's main aim is to get out of the mansion. This kids' game is currently sold at around $15.

World of Goo
This game is reported to be one of the most recommended award-winning games suitable to be played by kids. The player has to drag-drop the people of World of Goo in order to enable them to explore their area, and you also have to deal with the danger that they encounter. The approximate price of this PC game is believed to be about $20.

If you are searching for best free computer games for kids, this is the most suitable choice. This is an adventure game for kids wherein players have to prevent the world's destruction using the 'Supercow'. The Supercow has certain tools which can be used for fighting against the attempts for destruction.

Plants Vs. Zombies
This is also an award-winning adventure game for kids. The player here has to destroy zombies using plants. You can choose from a wide range of funny-looking plants as well as a variety of zombies. The price of this computer game is only around $12.

Zhu Zhu Pets
This is also considered one of the best kids' computer games. The player has to choose his favorite hamster and race all the way through the city. Remember that the race has to be completed in a set time. There are 30 interesting levels to enjoy in Zhu Zhu Pets. You may have to pay just about less than $10 for buying this game.

Bob the Builder - Can Do Zoo
This game challenges creative and logical thinking abilities in children along with entertainment. The player has to team up with the character 'Bob the Builder' and build a zoo for animals roaming free in the city. This PC game is available for an inexpensive price of just around $10.

There are many other recommended games such as Shrek Superslam, Disney Princess Castle Party, Kim Possible: Legend of the Monkeys Eye, Hidden Expedition Titanic Game, Mermaid Matching Game, and MathCar Racing, just to name a few. Free online games for kids are also great choices for those who want to try out some interesting games

Friday, November 7, 2014

How to partition your drive before installing Windows 10

How to partition your drive before installing Windows 10

So you're interested in trying out Windows 10? Well, you're in luck. Microsoft released a Technical Preview of the upcoming Windows operating system that is free for anyone to download and install. There are a few different options for getting Windows 10 on your device. You can simply install it on a secondary PC over your existing Windows operating system, you can use a virtual PC emulator to test it out or you can partition your hard drive and install it on your primary PC. This guide will show you how to do the last of the three.
While using a virtual PC to install Windows 10 may be easier, performance may take a hit because you are splitting your memory between two operating systems. Creating a hard-drive partition, which will split the hard drive into different storage volumes, will let you experience Windows 10 as it was meant to be. The best part about this method is that once it's all said and done, you can simply delete the partition and return your PC to normal.
How to partition your drive before installing Windows 10
Open the Control Panel, click on System and Security and select Administrative Tools. Double-click on Computer Management and under the Storage submenu, click Disk Management.
Right-click your primary drive (in most cases this will be theC volume) and select the Shrink Volume option from the list. If you are installing the 32-bit version of Windows 10 you will need at least 16GB, while the 64-bit version will require 20GB of free space. On my 700GB hard drive, I allocated 100GB to Windows 10, which should give me more than enough space to play around with the operating system. Remember that 1,000 megabytes is roughly equivalent to 1 gigabyte (technically it is 1,024MB to 1GB).
How to partition your drive before installing Windows 10
You should now see an "unallocated" amount of storage appear next to your C volume. Right-click it, select "New Simple Volume" from the list and click on the Next button. You can assign the drive any letter you please; I simply selected D. After clicking Next a third time, you will come to the Format Partition section. Make sure NTFS is selected for the file system and choose a name for the partition. I went with the name "Windows 10." Click Next one last time and then on Finished. You should now have a blank drive to install Windows 10 on.
Windows, windows 10, pc, computer, Computers, Microsoft, Windows 10
To get things back to normal, right-click the partition and select "Delete Volume" from the list. Then, right-click the C drive and select Extend Volume.

You can find a step-by-step guide for installing the Windows 10 Technical Preview on your PC by clicking this link. Just be sure that you are installing the preview on the newly partitioned drive; in my case that is the D drive. You don't want to install it on your primary C drive.

Thursday, July 10, 2014

Free app Memory Clean

today, I wrote about Memory Diag, a Mac app that helps you optimize system memory to help you through periods of sluggish behavior. Memory Clean is another such free app that takes a slightly different approach to monitoring memory resources. If you could combine the two, you might have the perfect memory optimizer for OS X. But because the technology does not exist to combine these two apps, let's take a look at how Memory Clean goes about its business and how it differs from Memory Diag.
Memory Clean
Memory Clean
Like Memory Diag, Memory Clean installs an icon in the menu bar. By default, the icon features a small dial graphic showing the amount of free memory your Mac currently has at its disposal. In preferences, you can hide the dial graphic while keeping the dynamic free memory figure. You can also change the number to display as a percentage, and you can add Memory Clean to the Dock and have it start when you log in.
Advanced preferences let you set a threshold level for when your free memory goes into the red. That is, at what point you'd like Memory Clean's number in the menu bar to turn red to alert you that you are running low on memory resources. There is also a box to check to have the app autoclean your Mac's memory when it falls below that threshold.
Memory Clean
Memory Clean
I don't have any scientific or anecdotal evidence to support the following advice, but I would counsel you against enabling Auto Clean. Like Memory Diag, Memory Clean is most effective after you close an intensive app because it cleans up the caches that the application left littered across your Mac that can fragment your memory and slow down performance. I would get in the habit of running Memory Clean in such instances rather than having it automatically kick in when memory resources are running low and your system is feeling sluggish. When Memory Clean cleans your memory, your already slow system will proceed to get even slower. Better to quit any demanding apps to bring your system back up to something resembling full speed before running Memory Clean to optimize performance further.
To run Memory Clean, click its icon in the menu bar. A window will appear to show dynamic figures of your Mac's current active, wired, inactive, and free memory. Click the Clean Memory button to initiate a scan to free up more memory. The scan takes between 15 and 30 seconds to run, in my experience. Alternatively, you can right-click the menu bar icon to access via a small pull-down menu the same stats and clean-memory command, along with the app's preferences.
Memory Clean
Memory Clean
While both Memory Clean and Memory Diag perform the same service, each boasts a useful feature the other lacks. Memory Clean keeps me better informed. It shows me the exact number of MBs of memory I have free at any given time, turning red to give me a clear warning when memory resources are scarce. Whereas Memory Diag does a superior job of diagnosing which apps are memory hogs. It lists the offending app(s) so I can easily eradicate any problems.

Sunday, July 6, 2014

How to save to hidden directories in OS X

 How to save to hidden directories in OS X

Accessing a hidden folder from within an application may be tricky, but can be overcome using a simple Finder trick.

How to save to hidden directories in OS X
How to save to hidden directories in OS X

While in standard uses there may be little reason to save files to a hidden directory in OS X, there are sometimes cases when you might want to do this. The operating system contains numerous hidden directories, such as the Library folder in your user account, a number of system folders that contain configuration files and programs, as well as the ability to manually hide specific folders on your system which, for fun or otherwise, can be used to keep items relatively hidden.
If you would like to access a hidden folder on your system, you might find that accessing them can be a bit of a burden. One approach is to regularly unhide the folders, either by changing their finder flags or by setting the Finder itself to show hidden directories.
Another approach is to open a program under the root account, since this account has full access to the entire file system, and should therefore be able to access any directory. This can be done by opening Terminal and targeting the desired application's executable using the "sudo" command, such as the following for TextEdit:

sudo /Applications/TextEdit.app/Contents/MacOS/TextEdit

While this might seem logical, unfortunately it will be met with the same restrictions and you will still not be able to see a hidden folder in the Finder. This approach is good for editing files that can only be accessed by root, but will not overcome the inability to see a hidden folder.

If you would instead like to keep files hidden in the Finder but still access them in a program you are using (be it run under your account or under root), then you can use a technique in the Finder to access it.

Simply choose Go To Folder from the Finder's Go menu, and then enter the path to the hidden directory in the field (note that this field supports tab-completion of file and folder names). Then press Enter to open the folder, which will show in the Finder slightly grayed out. You can drag this folder to the Open or Save dialogue box in any application, which will point that application to the contents of this folder.

From here you can open or save files, and the program will treat the folder as any other you can save files to.
Note that some applications, such as BareBones' TextWrangler, which are built for viewing and editing hidden directory contents, may have options in their Open and Save dialogue boxes that allow you to reveal hidden items. In this cases, these options will be far easier to use.

How to save to hidden directories in OS X

tags: How to save to hidden directories in OS X, ios x, computers, mac, ios

How to create a dynamically resizable disk image in OS X

Disk images in OS X are one mode of packaging files for distribution or storage on external media, and, since they mimic the behaviors of optical discs like DVDs, they are commonly used by developers to distribute downloadable installers for their applications.

While convenient for file distribution, you can also use disk images as containers to store various files on your system, or on a local network server, especially if you use their encryption routines to secure them with a password. By doing this, the image contents will only be accessible by you.

Disk Images can be created in Disk Utility, by clicking the "New Image" button in the Disk Utility toolbar. When this is done, you can set the image size and optional encryption options.

When done, the image will create and mount, allowing you to copy files to it; however, you might notice that by default the image size is the same as it was when you created it, so if you created an image that was 1GB in size, then the image file would be 1GB.
How to create a dynamically resizable disk image in OS X, computer, Computers, Operating Systems, Encryption
After setting the size (arrow), set the image type to "sparse" or "sparsebundle" with "no partition map," or set the image type to "compressed."
While this might seem logical, it may not be desired. You may have wanted the image to contain up to 1GB of data, but not always be 1GB on disk and instead start smaller and only grow with the size of items you place in it.Luckily this can be done, using one of two methods:
  1. Sparse or sparsebundle image with no partition scheme
    Apple's "sparse" and "sparsebundle" image types are dynamically resizable images, and if you create one without a partition scheme then they will start at the size of the files you place in them, and grow as you add more files, up to the maximum size you set when creating the image. Simply select either "sparse" or "sparsebundle" from the "Image Format" menu when creating the image, and then choose "No Partition Map" from the "Partitions" menu.
  2. Use compressed disk images
    Instead of choosing "sparse" or "sparsebundle" for the image type, choose one of the compressed options. This will not only make the image size grow with its contents, but could also potentially make it smaller than the contents you store on it, as they will be compressed. Keep in mind that compression is dependent on the type of file being compressed, so if you have a bunch of zip files or mpeg4 movies that are already highly compressed, then you might not see much benefit; however, if you have only text files, then you may see these become highly compressed.

Tags: How to create a dynamically resizable disk image in OS X, computer, Computers, Operating Systems, Encryption 

Saturday, July 5, 2014

Share a hard drive with everyone on your Wi-Fi network

Take advantage of your router's USB port with a little trick that lets you share a hard drive with anyone on your Wi-Fi network.

windwos, network, hard drive, Cloud storage, computer, Cloud Computing, networking, Share a hard drive with everyone on your Wi-Fi network, wifi,

Cloud storage is expensive, but it's not the only way to share a bunch of files across many devices. Instead, you can use an external hard drive and your router to create networked storage accessible to anyone on your Wi-Fi network.

When it's set up, any files stored on that drive can be accessed by all devices on your network -- even phones and tablets. Here's how to set it up on Windows.

Step 1: Choose your drive

The drive you share can be as small as thumb drive, or as large as a 3TB external hard drive. Check your router's manual to find out if there are any storage limitations, since some routers have a storage cap.

Once you've chosen your drive, plug it in.

Step 2: Enable USB drive sharing

On any computer connected to your Wi-Fi network, launch a browser, and navigate to your router's IP address. You can find this on the back of the router, in the device manual, or by searching for it online. In most cases, it looks like 192.168.X.X.

When the page loads, you'll be asked to log in with your username and password. If you changed it, you should know it. If you didn't, it's probably still admin (username), and admin (password).
Those who fall into the latter category, please change your password as soon as you can, and before proceeding to the next step.

Every router's interface is different, but if yours has a USB port, you'll find a link entitled something like File Sharing under the Administrator settings. In this window, enable the file sharing server (also called SAMBA). Apply the settings, and exit.
Share a hard drive with everyone on your Wi-Fi network

Step 3: Access the drive

You're now ready to read and write to your attached hard drive. Open a file explorer window, and navigate to the Network folder in the left sidebar. Then, clear out the path at the top of the explorer window, and enter \\[your IP address]. So, for example, it might look like: \\
Share a hard drive with everyone on your Wi-Fi network
With that, your drive will appear. Open it to access its contents, just like any other folder. If you're asked to log in, simply use your router's login credentials (the same one used to log into the Web interface.)
If you plan on leaving your hard drive attached, so that you can easily access it from any Explorer window. To do that, right-click the drive and select "Map network drive..." Give it a name, and the folder will appear in the sidebar.
Share a hard drive with everyone on your Wi-Fi network
To access the drive on other computers on the network, repeat step 3.

 Tags: windwos, network, hard drive, Cloud storage, computer, Cloud Computing, networking

Sunday, June 29, 2014

How to Clean Your Keyboard

How to Clean Your Keyboard

Late-night snacks and caffeine-powered drinks are often our closest companions while we're typing away at our computers: They fuel the ideas and thoughts that we input one keystroke at a time.
But if you don’t stop to examine your keyboard every once in a while, you might miss the fact that it has become covered with crumbs, grease, and sticky soda stains (not to mention a coating of dust). And that’s not all: A recent study showed that some sample keyboards had more bacteria and filth than a toilet seat!
When it’s time to sanitize your keyboard and evict that nasty grime and bacteria, don't fret--you can remove all of it effectively in just a few steps.

Remove Loose Debris

  1. Shut down your computer. If you’re using a wired desktop keyboard, unplug it.
  2. Tilt the keyboard upside down and shake it to remove any loose debris. If you have a can of compressed air, you can spray it in between the keys as well.

Clean the Keys

  1. Dip a cotton swab into some gentle isopropyl alcohol (rubbing alcohol) and brush it in the area surrounding each key. You may need to use multiple swabs, depending on the amount of dirt. If you’re unsure of the alcohol's strength, try it on a small, inconspicuous area first to make sure that it doesn’t cause discoloration or remove the lettering on the keys.
  2. Dip a cloth or towelette into the isopropyl alcohol, and brush it along the tops of all the keys and surfaces, taking care to scrub heavily used areas (such as the Enter key and spacebar) to remove buildup. For particularly dirty spots, you can use a toothpick.
  3. Use a dry, lint-free cloth to remove dust and polish the keyboard.
  4. If you’re using a wired desktop keyboard, plug it back in.
With such periodic cleaning, your keyboard will stay relatively germ-free and appear brand-new. But if your keyboard looks more like a hazardous-waste zone, you can do a more thorough industrial-strength cleaning.

Remove and Clean the Keys

  1. Most desktop keyboard letter keys are designed to allow you to remove them with a blunt tool such as a butter knife or flathead screwdriver. Simply place the tool under a corner of a key, and pry it off. If you’re unsure of your particular model, or if you are using a laptop, consult your device's manufacturer to learn whether key removal is supported, so that you avoid damaging your keyboard.
  2. Once you've removed the letter keys, you can wash them individually with water and soap, or alcohol, to remove dirt.
  3. After washing, dry the keys, and then place them on a towel to continue drying.

Clean the Keyboard Trenches

  1. With most of the keys removed, you should have better access to the area underneath. Thoroughly blow out this area with compressed air, or even a gentle vacuum.
  2. Dip a cloth or towelette into isopropyl alcohol, and wipe it along the inner surfaces.

Rebuild the Keyboard

  1. As soon as the keys are totally dry, pop them back into place. Each key should snap back on with a small amount of pressure. If you forget where each key goes, consult a keyboard map.
  2. Give everything one last wipe with a dry, lint-free cloth.
  3. If you’re using a wired desktop keyboard, plug it back in.
Afterward, be sure to turn on your computer and test your pristine keys--but preferably without a snack in hand (at least for a little while).

Sorce:   /www.pcworld.com

Monday, June 16, 2014

5 Ways To Clear Memory & Increase RAM On Your Windows Computer

5 Ways To Clear Memory & Increase RAM On Your Windows Computer

5 Ways To Clear Memory & Increase RAM On Your Windows Computer

RAM (random access memory), the final frontier. You’ve been with us since the PC’s invention and you always seem to run out on us. Sometimes, you even cause problems that go unnoticed until you make everything come crashing down.
Internal memory has come a long way, though. We’ll show you how you can free up memory and extend your RAM, both virtually and physically.

Run ReadyBoost

Microsoft’s ReadyBoost feature takes advantage of the fact that flash storage is about as quick as RAM. Introduced with Windows Vista, ReadyBoost requires a USB drive that offers at least
  • 256 megabytes of storage,
  • access times of 1 millisecond or less,
  • a read speed of 2.5 megabytes per second for 4KB random reads, along with
  • a write speed of 1.75 megabytes per second for 512KB random rights.
While the requirements were a bit intimidating at release, modern USB drives can meet these specifications with ease.
You can enable ReadyBoost by right-clicking your USB drive in My Computer, opening Properties, and then navigating to the ReadyBoost tab. You’ll see several radio buttons that let you enable or disable the feature as well as a slider that lets you dictate how much of the drive’s capacity is devoted to the feature. The ceiling is four gigabytes, if you use FAT32 formatting on the drive, but formatting with NTFS ups the ceiling to 32GB.

readyboost   5 Ways To Clear Memory & Increase RAM On Your Windows Computer

Enabling ReadyBoost isn’t as beneficial as installing more RAM, but it does provide some performance improvement. In some cases it can decrease load times by up to 75%. You’re most likely to see a noticeable improvement if you have very little RAM (say, two gigabytes or less) and a relatively slow mechanical hard drive. Windows disables this feature if you have an internal solid state drive because it offers superior storage performance.

Use Windows Task Manager & Resource Monitor

The easiest way to free up RAM in use is to open Windows Task Manager. Navigate to the Processes tab and then sort the list of open programs by memory. This will reveal any process that’s consuming an unusually large volume of RAM.
You can see even more information by going to the Performance tab, opening Resource Monitor, and then navigating to its Memory tab. In this view, you’ll see the information found in Windows Task Manager and a graph that breaks down how your system is currently allocating RAM.

resourcemonitor   5 Ways To Clear Memory & Increase RAM On Your Windows Computer

Don’t be alarmed if you see some significant RAM allocation. You should, if you’re running Windows Vista or later. Memory management in Vista and later versions of Windows is more aggressive, which means the OS eagerly retains data in memory that may be useful in the future. You should only be concerned if Resource Monitor consistently shows more than three-quarters of your RAM as “In Use,” as that’s a good indication there’s no enough to go around.

Disable Or Remove Unnecessary Software

As you navigate Windows Task Manager and Resource Monitor, you may notice some programs that are consistently a problem, yet restart themselves whenever your system boots. Dropbox, for example, consumes about 85MB of memory on my PC, but I only use it once in a blue moon. Running it 24/7 doesn’t make a lot of sense.

msconfig   5 Ways To Clear Memory & Increase RAM On Your Windows Computer

You can uninstall an offending program, of course, but it’s more likely you’ll want to prevent it from running when your system boots. We’ve already published several articles, so instead of repeating that information, I’ll direct you to Saikat’s article on how to troubleshoot system issues with MSconfig and Aaron’s list of 10 non-essential startup programs you can disable.

Install A RAM Cleaner

If tracking down offending programs feels like chasing your tail, or you’re just not familiar with Windows Task Manager, you can try installing a program that “cleans” your RAM. These programs basically go on a hunt for programs that are consuming memory and shut off their access, freeing that memory up for other uses. Some of the better examples we’ve tested over the years include Cleanmen, Minimem and Super Memory Cleaner (for Mac).

cleanmem 566x500   5 Ways To Clear Memory & Increase RAM On Your Windows Computer

Be warned, though, that these tools are controversial. While some users have reported success, others have failed to see an improvement with a so-called cleaning. I personally am among the latter number; though, to be fair, I haven’t had shortage of memory in some time.

You should also be careful to vet the reviews of any RAM cleaner you consider grabbing, because malware apps sometimes masquerade as RAM cleaning or optimization tools. Double-check that you’re downloading a legitimate app from its official website.

Add More RAM

While the techniques already listed can help solve your memory woes, there will inevitably come a time where the normal solutions don’t work. RAM is a limited resource and there’s only so much you can do to stretch the gigabytes you have available.

isntallram   5 Ways To Clear Memory & Increase RAM On Your Windows Computer

You first need to identify what kind of RAM your computer uses. This can be made easy by downloading a system specification tool like CPU-Z that informs you what’s installed in your desktop or laptop. However, you may also need to open your system and examine what free slots you have available, if any. If you have free slots you can simply buy more to add to what you already have, but if all slots are filled, you’ll need to replacements that offer more capacity per DIMM.

Once you’ve grabbed the new memory, you can learn to install it by checking out the very helpful installation videos made available by Crucial, a company that sells RAM and solid state storage. Laptop users can also refer to our upgrade guide, which will take you through the process step-by-step.


See, RAM? You’re not such a trouble-maker after all. Sure, you cause problems every now and again, but it’s easy enough to resolve them – and often the biggest problem of all is having too little of you! I’m glad we were able to work this out, RAM. I think things are going to be okay.

Wednesday, May 28, 2014

How to Access Failed SD Cards

Although SD cards -- often used in cameras, computers and video game systems -- are convenient for storing large amounts of data, the failure or corruption of these "Secure Digital" devices can result in a frustrating loss of data for your small business. However, there are a few methods that help recover damaged files or allow you to format the card for further use.

 Step 1
 How to Access Failed SD CardsEnsure that the SD card is not write-protected. Sometimes the memory card becomes locked accidentally and this makes the disk seem unusable. Check the switch on the side of the card, typically labeled "Lock." Move the switch to the opposite side so that it is unlocked. Insert the card again and check for files.
Step 2Attempt to repair the card. Click Start, then click "My Computer." Select the drive for the card, then right-click. Select "Properties" on the pop-up menu, then click the "Tools" tab. Click "Check now" to scan the disk for errors.
Step 3Download a file recovery program. Programs such as EaseUS, Zero Assumption Recovery and SanDisk's Rescue Pro can help locate and restore corrupted files thought to be lost. Although some programs charge a fee, many offer free trials. Recovering precious photos of loved ones or an important, time-sensitive document can be worth the cost.

Step 4Format the card. Sometimes scanning the card for errors will not repair the issue and recovery programs do not find your files. Although the data is lost, formatting the card often fixes the problem and you can use it to store new information. To format the card, locate the drive using "My Computer" and right-click to bring up the options menu. Select "Format," then click "Start."

Source  smallbusiness.chron.com/access-failed-sd-cards-46959.html

Thursday, May 22, 2014

Microsoft Enlarges Surface’s Screen So It Can Be Used for Work, Too

Many people have both laptop computers and tablets and use them for different tasks. Microsoft on Tuesday redoubled its vision that the two devices should be one and the same, introducing a new version of its Surface tablet with a larger screen.

The company’s new product, the Surface Pro 3, has a 12-inch screen, larger than many small laptop screens. The more spacious screen reflects a sharpening of Microsoft’s belief that it can still distinguish itself in the tablet market, where it is currently an also-ran, with a device that meets professional and personal needs.

Microsoft argues that current tablets, most notably the iPad, are great for watching movies and other forms of entertainment or reading, but are far weaker when it comes to getting work done. The company’s proposition is that the Surface can do both well. A bigger display, Microsoft argues, will let people look at more than one application on their screens at the same time — like email and a word processor — as they can on their laptops.


We want products and technology that enable people to dream and get stuff done,” Satya Nadella, the chief executive of Microsoft, said at an event in New York.

This has been Microsoft’s approach since it introduced the original Surface in 2012, however. Earlier Surface versions had a 10.6-inch screen, larger than those on most other tablets.

Microsoft has won praise from many quarters for the design of the Surface, including a cover that also doubles as a laptoplike keyboard and track pad. Critics of Surface say a hybrid device forces too many design compromises. Timothy D. Cook, the chief executive of Apple, once said in reference to the Surface that “you can converge a toaster and refrigerator, but these things are probably not going to be pleasing to the user.

Sales of the Surface have been disappointing, and the company is losing money on the devices. During the first quarter of the year, Microsoft’s share of worldwide shipments in the market for tablets and two-in-one computers — tablets with detachable keyboards like the Surface — was 1.3 percent, putting it in seventh place in the market, according to IDC, the technology research firm. Apple was No. 1 with 32.7 percent.

The new Surface will start at $799, $100 less than the previous comparable version. The Surface Pro 3, which can be preordered starting on Wednesday, will be available in the United States and Canada on June 20.
Before the event on Tuesday, many people expected Microsoft to introduce a smaller Surface, to compete with the iPad Mini, the most popular product in Apple’s tablet family. Microsoft is working on such a device, according to a person briefed on the discussions who spoke only on the condition of anonymity. But the company decided against announcing the product on Tuesday, the person said, after Mr. Nadella asked the managers of the Surface team if they believed strongly that the device was ready to be shipped.

The Surface team felt the smaller device was not ready, in large part because of software issues, this person said. Microsoft has not completed a version of its Office applications for touch-screen devices running the company’s Windows operating system. Microsoft was concerned that the current Office applications would be difficult to operate on a Surface with a small screen, the person said. A version made for Apple devices has already been released.

“This continues to be a massive uphill battle for Microsoft and Nadella,” said Daniel Ives, an analyst at FBR Capital Markets. “It feels like a small step in the right direction from a product perspective and strategy perspective.”

The innards of the Surface Pro 3 include a microprocessor made by Intel, the chip giant that makes the microprocessor inside most conventional PCs. That means Microsoft’s device can run applications written for PCs, unlike the iPad and other tablets.

The new Surface will inevitably be compared with the iPad, and not favorably in many respects. At 1.76 pounds, the Surface Pro 3 is heavier and more expensive than the 1-pound iPad Air, Apple’s largest tablet, which starts at $499. Yet Microsoft believes a more apt comparison is Apple’s MacBook Air, an ultraslim laptop that is a hit among professionals and starts at $899 and weighs 2.38 pounds.

“This device actually makes a much better argument for consolidating into one device,” said J.P. Gownder, an analyst at Forrester Research.

Panos Panay, a corporate vice president at Microsoft and a creator of the Surface product line, emphasized repeatedly that Microsoft’s new product elegantly balanced the capabilities of both devices.
“I am sure that this is the tablet that can replace the laptop,” Mr. Panay said

Wednesday, April 16, 2014

Best Computer Processor

 processor definition
 A central processing unit, also referred to as a central processor unit, is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system
While buying a new personal computer, which is the one thing that matters above anything else? It's the computer's central processing unit (CPU) or processor. Silicon based chips are the brains of a computer that control every single one of its functions. The choice of processor decides the speed of computing and its multitasking ability. If you are planning to buy a new desktop or laptop computer, you would want to know which is the best processor to buy in the market.

Every computer chip today is a piece of silicon etched at nanometer (10-9 m) scales to form billions of transistors that together constitute the central processing unit of a computer. Today chip manufacturers have reached a limit in terms of the number of transistors that can be etched on a silicon chip and have instead opted for multicore chips. There are two, four or six chips that form a computer processor today, by working in coordination. This multicore design has helped chip makers like Intel to surpass the clocking frequency barrier and create faster chips.

Best Processors On the Market

The things that you look for in a computer processor are high speed of computing (represented by a high clocking frequency), multitasking, ability to handle intensive 3D graphics, larger cache size (which grants more working memory) and of course reasonable cost. The best processor chip for the money is expected to possess more than one of these features.

There are more than one way of choosing the best computer chip depending on what you are really looking for. There is the topmost processor that is above all others and beats them in all departments of computing and then there is the budget choice, which offers the best at moderate cost. We will consider both types here.

Unarguably the Best Processor to Buy - Intel Core i7 990X
If you are looking for simply the best and cutting edge for your laptop or desktop computer, the Intel core i7 990X is 'The One'. It is simply the best processor on the planet. The most power packed processor launched by Intel till date, this is a beast of a CPU, with 6 cores, 12 threads, 12 MB smart cache and a maximum clocking frequency of 3.46 GHz that can touch 3.73 GHZ on demand, thanks to Intel's Turbo Boost technology. Its 32nm architecture means that it is a leaner, yet more powerful beast than its 45nm build predecessors. Get over quad and dual cores, six core processors are here!

This is unarguably the best computer chip for gaming. Its power as a processor is boosted by Intel's Hyper threading, virtualization, 6.4 GT/s Intel QPI and speed step technologies. It is a processor born to rule and conquer gaming aficionados and power users. With all these features, the price tag on the chip is $999. The price is truly justified by the phenomenal performance and brute force powered by its 6 cores and 12 threads. It is truly one of a kind in the computing market today. In the same Intel core i7 extreme series, there are a few more processors to watch out for, which include (The processors with 'M' in their name are laptop processors):

Intel Core i7 980X (12 MB cache, 3.33 GHz)
Intel Core i7 975X (8 MB cache, 3.33 Ghz)
Intel Core i7 965 (8M Cache, 3.20 GHz)
Intel Core i7 940XM (8M Cache, 2.13 Ghz)
Intel Core i7 920XM (8M Cache, 2.00 Ghz)
Intel Core i7-2960XM (8M Cache, 2.70 Ghz)
Intel Core i7-2920XM (8M Cache, 2.50 GHz)

Best Budget Buys
The only problem with Intel core i7 990X and other processors from that series is the price which sets it beyond the reach of most mortals. However, there is a lot of choice in the lower ranks to choose from. As an AMD versus Intel chips comparison would reveal, top processors belonging to the other chip giant - AMD aren't in the same class as Intel's core i7. They are therefore competing with Intel by offering quad core chips at much lower prices. As the war between AMD and Intel processors rages on, we consumers are the one to benefit from the competition.

Here are some of the best CPUs to look out for, that fall in the medium and low-budget category, for you to choose from.

AMD Phenom II X6 1100T - $265
AMD Phenom II X6 1090T- $169
AMD Phenom II X4 980 - $185
AMD Phenom II X4 975 - $175
AMD Phenom II X4 965 Black Edition 3.4 GHz - $195
Intel Core i5 750 2.66 GHz - $196
Intel Pentium Processor G6950 2.80 - $87(!)
AMD Phenom II X2 550 3.1 GHz - $102

If you are looking for the best computer chip, any one from the above list will meet your requirements. This list of best processors only includes those which offer great computing power at medium to low prices. Though they may not reach the dizzying heights of computing power reached by Intel core i7 990X, they are good enough for most gaming applications, as well as office or home use. Choose one that suits your budget. Going for the best is always the right choice.

For search: Best Computer Processor, computer, Best Processor, Processor,

Tuesday, April 15, 2014

How to Manually Remove a Virus

computer viruses.virus, computer, security, How to Manually Remove a Virus
Our computers have a threat from different types of computer viruses. In this write-up, we will know how to make our computers free of viruses.
Computers have become an integral part of our life. Along with computers, Internet has also become an indispensable part. However, there is a negative side to the Internet technology, which is the rampant spread of computer viruses. Therefore, computer security becomes a matter of major concern for every one. Although it is recommended that we should have an antivirus software installed on our machines, there are times that we may not have it installed and that is exactly when the computer may be infested by a software. This brings up the question, what are the steps to manually remove a virus so that the machine is not infested with the threatening virus.

Steps to Remove a Virus

You will need some computer programming skills to get rid of the computer virus. You will just need the knowledge of basic syntax. The first step you should take before you start with the computer viruses removal process is to take system back up. It is essential so that in case you delete a wrong file in the process, you will not lose important data. In some cases, the file may be necessary to run the computer system. The data should ideally be backed up in an external device. Once the data has been backed up, you can format the system to get rid of the virus totally. However, it is not recommended that you use the system restore option to get rid of the virus, as this often leads to virus multiplication as opposed to removal.

The other process is a lengthy one which will need technical expertise. In this process, the first step is to identify the virus as there are many different types of computer viruses. To identify the virus you can seek help from various antivirus websites. From these websites you will be able to see the way the particular virus makes files. Now you will have to look for the behavioral pattern of the virus. Once that has been identified, the next step is to go to task manager. From the task manager stop the virus processes so that there is no chance that the virus replicates itself. The next step is to go to the file registry and delete the virus files, taking help from the information you have found from the different websites pertaining to the virus.

Steps to Manually Remove a Trojan Virus

If you do not want to use the options available online for the removal of the Trojan, you will have to undertake the process of removing the virus manually. To remove Trojan virus, you will have to first identify the system files which are infected by the virus. The next step is to erase the files so that normal functioning of the system is possible. You can seek help from online forums or antivirus software websites.

I would recommend that although there are steps one can take to remove the virus manually, it is best to invest in a reputed antivirus to avoid attacks to your system where your data is at risk.

Types of Computer Security Threats

With the wide scale use of internet, there are different types of computer threats, that the computer networks are susceptible to. Each of these threats can cause potential damage and cause a lot of harm, if the data is lost. It is important to know the different types of threats, so that the data can be safeguarded.
Computer network as well as stand alone systems are susceptible to a number of computer threats. The damage caused by the threats can cause very high loss to the company. The danger increases, when the computer network is connected to the internet. Although there are different types of threats to computer systems, they have a common bond. They are designed to trick the user and gain access to the network or the stand alone systems or destroy the data. Some of the threats are known to replicate itself, while others destroy the files on the system or some infect the files itself.

Types of Computer Security Threats

The classification of the types of information security threats is made on the way the information in the system is compromised upon. There are the passive threats and the active threats. The passive threats are very difficult to detect and equally difficult to prevent as well. Then there are the active threats. Since these threats continue to make changes to the system, they are easy to find out and fix as well.

Virus: The most common of the types of cyber threats are the viruses. They infect different files on the computer network or on the stand alone systems. Most people fall prey to the viruses, as they trick the person into taking some action, like clicking on a malicious link, downloading a malicious file, etc. It is from these links and files, that the virus is transmitted to the computer. There are also cases of the viruses been a part of an email attachment, which may be downloaded from the internet. In some cases, the viruses can also spread through infected portable data storage as well. Hence, it is important to have an antivirus on the system, which can not only detect the virus, but be able to get rid of them as well.

Worms: The other common types of internet security threats are the worms. They are actually malicious programs, which take advantage of the weaknesses in the operating system. Like the worms in real life crawl to move from one place to another, similarly the worms in the cyber world also spread from one computer to another and from one network to another. The most prominent feature of the worms is that they are able to spread at very high rates, which can lead the system being at risk of crashing. There is a type of worm, called net worm. These worms replicates itself by sending complete and independent copes of itself over a network, thereby infecting almost all the systems on the said network.

Trojan: This is a different type of computer virus, which is disguised under the garbs of a friend. The Trojans derive their name from the legend. They make their way into the software, which may not be noticed. It is often seen, that the Trojans are a part of the different attachments in emails or download links. In some cases making a visit to certain web pages also puts the computer system at risk.

Spyware: Spyware as the name suggests spy on the network and the computer system. They may be downloaded unintentionally from different websites, email messages or instant messages. In some cases, they may also make their way through different direct file sharing connection. In some cases, clicking on 'Accept User License Agreement', can also put the computer at risk.

Rootkits: The job of the rootkits is to give cover to the hackers. The best or the worst part about rootkits is that they are able to hide themselves from the antivirus software as well, due to which the user is not aware that a rootkit is present on the system. This helps the hacker and he is able to spread malware on the system. Therefore, it is important that one opts for antivirus, which also has a rootkit scanner, which will be able to detect the invasion.

Riskware: They are dangerous applications, who often become a part of software applications. They are often seen as a part of development environment for malicious programs and spread to the software applications. In some cases, these applications can also be used by hackers as additional components to gain access in the network.

Adware: The recent addition to the list of computer threats are the adware. They are actually advertising supported software. It is not uncommon to see different advertisements or pop ups coming up on the computer, when certain applications are being used. They may not pose a lot of threat, but often lower the speed of the computers. There are chances that the computer system may become unstable because of these adware.

Cookies: When we visit a website, there are files due to which the website is able to remember the details of the computer. They are more of a threat to confidentiality as opposed to the data on the computer. In most cases, cookies may be stored on the computer without the consent of the user and data may be stored on them, which is passed back to the website server the next time, one visits the website. The data gathered may be sold to third parties and depending on the interests, which may lead to different advertisements flashing on the screen.

Phishing: Often people appear to get emails from trustworthy organizations, like banks. In some cases, the emails may come from bogus sites, which may resemble the original site or it may superimposes a bogus pop up, due to which confidential data is gathered. They are often a part of different scamming activities and often poses to the financial threats.

These were the main types of computer threats. It is important to be on the look always to ensure that the network and/or standalone systems are protected from the threats. As soon as any of the threats are detected, measures will have to be taken to get rid of them at the earliest, so that the data is protected.

Friday, April 11, 2014

Computer Diagnostics

The diagnostics that are associated with computers can help to identify any problem or failure that computers show when they are having problems.  Diagnostics are used to test out the computer system, which includes both the BIOS and memory, software, and even the hardware that is attached to the computer.

The most common types of problems will occur when your computer is down to very low resources, which can either be a low amount of RAM, or a low disk space.  These conditions are very common, and generally result in your computer running very slow.  This can easily be fixed, all you have to do is defrag your hard drive, and get rid of some programs and files that you no longer use or need.

Almost all types of computer diagnostic software can find and fix just about any problem that you are having.  It normally starts off with a BIOS examination, and goes on from there.  PC diagnostics
software can determine a lot from the BIOS, from the common settings to those that have a major impact on both boot up and performance.

No matter what you do, you should never modify or tamper with the BIOS settings, as it can lead to serious problems.  If you do plan to modify or mess with your BIOS, you should always create a backup first, just in case something goes wrong.  The BIOS settings can be very tricky, although they are responsible for a lot to do with your computer.  If you have never been in the BIOS before, you really shouldn’t be modifying anything inside of it.

Depending on the diagnostics program that you are using, there will be several different features available.  Right now, two of the most popular are Norton Systemworks and PC Doctor.  Both of these programs offer full diagnostics software, good for fixing just about any software related computer program you can imagine.  

Once you run the program, you’ll be able to select the diagnostic test that you are planning to run.  Some offer you a full system scan, which will scan your entire computer and then display any problems that you having.  After displaying any problems, the software will normally give you an option to go ahead and fix it.  As long as the problem is nothing serious, the diagnostic software can generally fix it.

The more complicated problems, such as hardware failures or hard drive crashes, are a totally different story.  They will require a technician who is very experienced, that can rebuild the hardware.  Diagnostic software can report hardware problems to you, although most of the time it is unable to fix it.

There are other computer diagnostic software that you run after starting the computer or rebooting, that will check everything from BIOS.  These types are great, although the types such as Norton and PC Doctor are by far superior.  They offer far more features, including defragment, cache cleaner, and the option to delete your temporary Internet files.  These features are great to have, especially if you aren’t the technical type.

For more reasons than one, computer diagnostic software is the ideal way to find and prevent problems with your computer.  Norton Systemworks offers you Ghost as well, which is the perfect way to back up your data.  You can back up certain files, or just go ahead and back up your entire hard drive.  Systemworks and Ghost are very easy to use, even if you are completely new to computers.  For everything they offer you - computer diagnostic programs are the ideal way to prevent problems before they happen.

Friday, February 21, 2014

How to Clean An Infected Computer

How to Clean An Infected Computer
The truth is that it's a lot easier to keep a computer malware free than it is to clean one that is already infected. However, with the advice given in this article you should be able to remove any type of malware from your computer and get it back to working order. The main problem with most malware removal guides is that you have no way of knowing if all of the infections were removed. However, with my approach you can easily tell if even just running a single scanner was able to entirely clean the infection. Thus, this can save you the hassle of having to run many different scanners and the uncertainty of whether your computer is really malware free.

Make sure you follow this article in order so as to clean the infections with as little work as possible. The idea is that most people won't have to go any further than the first approach in order to clean their computers of active malware. Thus, effectively this article is actually much shorter than it appears to be.

However, before attempting to remove any infected files you should first back up all important files. These may include documents, pictures, videos, etc... This way if anything goes wrong with the cleaning process, which is a very real possibility, your important documents will still be intact. However, do not include any program files as it is possible that these may be infected. Please note that if your computer cannot boot you should follow the advice on this page in order to back up all important files. Also, while cleaning the computer it's important to remember that all scanners can sometimes be guilty of false positive detections. Therefore, before removing any files which you believe could possibly be safe, you should check them using the methods I discuss in How to Tell if a File is Malicious.


1. Make Sure Computer Is Actually Infected
2. How To Clean Your Computer And Make Sure It's Actually Clean
    ​A) Clean Computer With CCE and TDSSKiller
    BIf Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
    C) If Needed Try These More Time Consuming Methods
    D) If Necessary Make A Bootable Disk
3. What To Do If The Above Methods Are Unable To Clean Your Computer
4. What To Do After All Malware Is Confirmed To Be Removed

1. Make Sure Computer Is Actually Infected

Before attempting to clean any infections from your computer it's important to make sure that the computer is actually infected. To do this please follow the advice I give in How to Know If Your Computer Is Infected. If the results of this do in fact show that your computer is infected then continue to follow the steps in the next section. Make sure that you follow them in order.

2. How To Clean Your Computer And Make Sure It's Actually Clean

Please note that advanced users may just want to skip to the last part about how to Make A Bootable Disk and clean the computer that way. This approach is the one which is most powerful, but it is also one of the more time consuming approaches. That said, if you wish you can jump directly to that section and then come back to the beginning again if the infection is not entirely removed.

A) Clean Computer With CCE and TDSSKiller
Download Comodo Cleaning Essentials (CCE). Make sure to select the correct version for your operating system. If you're not sure if your computer is running a 32 or 64 bit operating system then please see this FAQ. Also, download Kaspersky TDSSKiller . Note that if neither will not download correctly, or your internet connection is not working, you should download them on another computer and transfer them to the infected one via a flash drive. Make sure there were no other files on the flash drive. Be careful with the flash drive as the malware may actually infect it when you plug it into the computer. Thus, don't plug it into any other computers after transferring these programs. Also, I would like to point out that both programs are portable. This means that once you're done using them no uninstall is required. Just delete their folders and they will be gone.

After downloading CCE unzip the file, open the folder for CCE, and double click on the file called CCE. This will open the main program for Comodo Cleaning Essentials. If it refuses to open then hold down the shift key and, while still holding it down, double click on the file called CCE. After CCE has successfully opened you can let go of the shift key. However, do not let go of it until the program has fully loaded. If you let go of it even during the UAC popup it may not be able to forcefully open correctly. Holding down shift should allow it to open, even on heavily infected computers. It does this by killing most of the unnecessary processes that could be interfering with its launch. If it still will not launch then download and run a program called RKill. This program will terminate known malicious processes. Thus, after running it CCE should be able to open fine.

Once it's opened perform a "Smart Scan" with CCE and quarantine anything it finds. This program also scans for system changes which may have been caused by malware. These will be shown with the results. I would advise letting it fix these as well. Restart your computer when prompted. After the computer restarts run Kaspersky TDSSKiller, perform a "Smart Scan", and quarantine anything it finds. If anything was quarantined restart your computer once more.

Also, if your internet connection was previously not working please check again to see if it is now working. If not then you should go to this section of my guide about How to Fix a Malware Infected Computer and follow the advice given to fix your internet connection. A working internet connection is required for the remaining steps of this section.

Once you have verified that your internet connection is working, again open CCE. Hopefully it will open up normally this time, but if not then open it while holding down shift. Then open up KillSwitch from the tools menu in CCE. In KillSwitch, select the option to "Hide Safe Processes" from the "View" menu. Then right click on all processes which are flagged as suspicious or dangerous and select the option to delete them. You should also right click on any unknown processes that remain and select the option to "Kill Process". Do not delete processes flagged as FLS.Unknown. Next, open up Comodo Autoruns from the tools menu in CCE, and select the option to "Hide Safe Entries" from the "View" menu. Then disable any entries belonging to files which are flagged as suspicious or dangerous. You can do this by making sure the check box next to the entries is unchecked. You should also disable any entries flagged as FLS.Unknown, but which you believe likely belong to malware. Do not delete any entries. 

Now restart your computer. After it reboots, again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. Also, note that even if your computer is found to be clean of active infections there could still be pieces of malware on your computer. These are not dangerous, but don't be surprised if running another scanning program still detects malware on your computer. These are the inactive remnants of what you have just removed. If you are not comfortable having these remnants on your computer then you can remove the vast majority of them by scanning with the programs in the next section.

However, if your computer is not yet clean of active infections, but at least one of the programs was able to run, then go through the steps outlined in this section once more and see if that is able to remove the infections. However, if neither program was able to run please continue to the next section. In addition, if even following the advice in this section a second time is not enough to clean your computer you should continue to the next section.

B) If Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
If the above steps failed to fully remove the infections then you should download HitmanPro  Install the program and run a "Default Scan". Note that if it will not install please continue to the next paragraph and install Malwarebytes. During the installation of HitmanPro, when asked I would recommend you choose the option to only perform a one-time check of the computer. This should be suitable for most users. Also, if malware prevents it from loading correctly then open the program while holding down the CTRL key until the program is loaded. Quarantine any infections it finds. Please note that this program will only be able to remove infections for 30 days after it is installed. During removal you will be asked to activate the trial license.

Once all detected infections are removed by HitmanPro, or if Hitman Pro refused to install, you should download the free version of Malwarebytes  Note that it has chameleon technology which should allow it to even install on computers which are heavily infected. During installation I would advise that you uncheck the box to "Enable free trial of Malwarebytes Anti-malware Pro". Make sure that it is fully updated and then run a quick scan. Quarantine any infections that it finds. If asked by either program to restart your computer, make sure that you restart it.

Next download Emsisoft Emergency Kit . Once it's finished downloading, extract the contents from the zip file. Then double click on the file called "start" and open the "Emergency Kit Scanner". When prompted allow it to update the database. Once it's updated select the option to go "Back To Security Status". Then go to "Scan now" and select the option to perform a "Smart Scan". Once the scan is complete quarantine all detected items. Restart whenever required.

After scanning your computer with these programs you should restart your computer. Then once again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. However, if your computer is not yet clean then go through the steps outlined in this section once more and see if that is able to remove the infections. If the programs in part A of this section were previously not able to run correctly you should go back and try and run them again. If none of the above programs were able to run correctly please boot into Safe Mode with Networking and try scanning from there. However, if they were able to run correctly, and threats still remain even after following the advice in this section a second time, then you should continue to the next section.

C) If Needed Try These More Time Consuming Methods
If the above steps were not able to completely remove the infection then you likely have some very inhospitable malware inhabiting your machine. Thus the methods discussed in this section are much more powerful, but will take much longer to complete. The first thing I would advise doing is to scan your computer with another anti-rootkit scanner called GMER. It can be downloaded from Remove anything shaded in red. Make sure you do click on the Scan button once the program has finished its quick analysis of the system. Also, if you're running a 32 bit operating system you should download a program to scan for and remove the ZeroAccess rootkit. Information about this rootkit, and a link to a program to remove it from 32 bit systems. The AntiZeroAccess tool can be downloaded from the link in the second paragraph.

After scanning with the above programs you should next open CCE, go to the options, and select the option to "Scan for suspicious MBR modification". Then select OK. Now perform a full scan with CCE. Restart where requested and quarantine anything it finds. Note that this option can be relatively dangerous as it could possibly identify problems where there are none. Use it carefully and make sure everything important is already backed up. Note that in rare cases scanning with these options may render your system unbootable. This rarely happens, but even if it does it should be fixable. If running this scan renders your computer unbootable please see this section of an article I wrote about How to Fix a Malware Infected Computer. It should be able to help make your computer bootable again.

Once CCE has completely finished, again open up CCE while holding down the SHIFT key. This will kill most unnecessary processes which may be interfering with your scans. Then open KillSwitch, go to "Tools", and choose the option to "Hide Safe Processes". Now, once again delete all dangerous processes. Then, you should also right click on any unknown processes that remain and select the option to "Kill Process". Do not delete them. You should follow the advice in this paragraph each time you restart your computer in order to make sure that the following scans are as effective as possible.

After killing all processes not verified to be safe you should open HitmanPro while holding down the CTRL key. Then perform a "Default Scan" and quarantine anything it finds. Then perform full scans with Malwarebytes and Emsisoft Emergency Kit. Quarantine anything they find. Then download the free version of SUPERAntiSpyware from this page. During installation be very careful as other programs come bundled with the installer. On the first page make sure to uncheck both options about adding Google Chrome. Then click on the option for "Custom Install". During the custom install you will once again have to uncheck two boxes about adding Google Chrome.

Other than that the program will install fine. When asked I would recommend that you decline the option to start a free trial. Once the program is fully loaded select the option to do a Complete Scan and click on the button to "Scan your Computer...". Then click on the button to "Start Complete Scan>". Remove all detected files and restart wherever required.

After following these steps you should restart your computer. Then once again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. However, if your computer is still not clean then go through the steps outlined in this section once more and see if that is able to remove the infections. If it is not then you should continue to the next section.

D) If Necessary Make A Bootable Disk
If the above methods were not able to completely remove the infection, or you cannot even boot your computer, then you may need to use a bootable CD/Flash-Drive, also called a bootable disk, to clean your computer. I know this may sound complicated, but it's really not that bad. Just remember to create this disk on a computer that is not infected. Otherwise the files may be corrupted or even possibly infected.

Because this is a bootable disk no malware can hide from it, disable it, or interfere with it in any way. Thus scanning in this way, with multiple programs, should allow you to clean almost any machine, no matter how infected it may be. One exception to this is if the system files on the machine have themselves been infected. If this is the case then removing the infection may cripple the machine. It's largely for that reason that you backed up all important documents before starting the cleaning process. That said, sometimes it's possible to get around that by following the advice I give below.

To do this you should download the Shardana Antivirus Rescue Disk Utility (SARDU). This is an excellent program which will allow you to create a single rescue disk with multiple antivirus programs on it. It also has many other useful functions, which I will not be discussing in this article. A few very useful tutorials for SARDU can be found on this page. Be very careful about the added offers now included with the installer. Sadly, this program now tries to trick people into installing extra programs, which are largely unnecessary.

After downloading it extract the contents and open the SARDU folder. Then open the correct executable for your operating system, either sardu or sardu_x64. Under the Antivirus tab click on whichever antivirus applications you would like to add to your disk. You can add as many or as few as you wish. I would recommend that you scan your computer with at least Dr. Web, Avira AntiVir Rescue System, and Kaspersky Rescue System. One of the nice things about Dr. Web is that it sometimes has the option to replace an infected file with a clean version of it instead of just deleting it. This may allow you to clean some infected systems without crippling the computer. Thus I'd strongly recommend including Dr. Web in your bootable disk.

Clicking on the names of the various antivirus applications will often direct you to a page where you can download the ISO for that particular antivirus. Sometimes it will instead give you the option to download it directly through SARDU, which can be found under the Downloader tab. If given the choice always select the option to download the ISO. Also, after downloading the ISO you may need to move it to the ISO folder inside the main SARDU folder. Once you have moved all of the ISO's, for the antivirus products you would like to include, to the ISO folder, you are ready to create the rescue disk. To do this go to the Antivirus tab and make sure that all desired antiviruses have a check next to them. Then either click the button to make a USB or make an ISO. Either will work fine. It just depends on whether you want to run this off of a USB drive or a disk.

After creating your rescue disk you will likely need to change the bootup sequence in your BIOS settings to ensure that when you insert the bootable CD, or flash-drive, the computer will boot from it instead of from the normal operating system. Here is a useful article on How To Change the Boot Order in BIOS. For our purposes you should change the order so that the "CD/DVD Rom drive" is first if you want to boot from a CD or DVD, or that "Removable Devices" is first if you want to boot from a flash-drive. Once that's done just follow the advice given in this other article about How To Boot From a CD, DVD, or BD Disc in order to boot from the rescue disk.

After booting from the disk you can select whichever antivirus you want to first scan your computer with. As I previously mentioned, I would recommend starting with Dr. Web. Once it's finished, and you have repaired or deleted everything it finds, you should shut down the computer. Then make sure to again boot from the disk and then scan with another antivirus. Continue this process until you have scanned your computer with all of the antivirus programs you have put on the rescue disk.

After cleaning your computer with whichever programs you've put on the disk you should now try booting your system into Windows again. If it is able to boot into Windows then check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk.

If your computer is not yet clean, but you are able to boot into Windows, then I would recommend trying to clean your computer from inside windows, starting from this section of this article and following the suggested methods. However, if your computer is still not able to boot into Windows then again try fixing it by following the advice in this section of an article I wrote about How to Fix a Malware Infected Computer. It should be able to help make your computer bootable again. If even that can't make your computer bootable then try adding even more antiviruses to the boot disk and then rescanning your computer. If doing that still does not work then please read the next section.

3. What To Do If The Above Methods Are Unable To Clean Your Computer

If you followed all of the above advice and were still not able to clean your computer, but you're convinced that the problems are due to malware, then there's not much more I can do to help. I'm actually hoping that nobody ever reaches this section. This article is meant to allow you to completely clean an infected computer. Thus I'd really appreciate it if you could leave a comment below that explains what you tried to do in order to clean the computer, and what symptoms remain that make you think that your computer is not yet clean. This is very important in order for me to improve the article.

You can also seek advice from a specialized malware removal forum. A forum which I have found to be very helpful is MalwareTips. However, if even after seeking help on a malware removal forum your computer is still not free of malware, it may be necessary to format your computer and start over. This means that you will lose anything on the computer which you did not back up. Make sure that if you do this you do a complete format of your computer before reinstalling Windows. This will be able to destroy almost any type of malware. Once Windows is freshly installed please follow the steps in the next section.

4. What To Do After All Malware Is Confirmed To Be Removed

After confirming that your computer is now clean you can now try to repair any damage that may have been caused. For this I have written an article about How to Fix a Malware Infected Computer. Please follow the advice in this article in order to fix any damage that was caused by the infection. If after doing this your computer is running fine, then you can also open Comodo Autoruns and select the option to delete those registry items you had previously only disabled. This way they will no longer be on your computer at all.

Once you have successfully cleaned all infections from your computer, and repaired any leftover damage, you should take steps to ensure that it does not happen again. For this reason I have written a guide about How to Stay Safe While Online. Please read through it and implement whichever methods you feel best fit your needs.

After securing your computer you can now restore any of the previously backed up files that were lost during the cleanup process. Hopefully this step is also not necessary. Also, before restoring them make sure that your computer is very well protected. If you don't lock the computer down strongly enough then you may inadvertently infect it and again have to clean the infections from the computer. In addition, if you used a USB drive to transfer any files to the infected computer you can now plug that back into the computer and make sure there is no malware on it. I would recommend doing this by deleting all files left on it.


If you have any problems, or are confused by my directions, please leave a comment below and I will try to help you. Trust me, if you are having a problem then so are many others. I need to know this so that I can improve the advice in this article. Also, I do realize that there are a plethora of programs that can be used to clean an infected computer. I have selected these particular programs, and arranged them in such a way as to emphasize their positive qualities while at the same time compensating for their weaknesses, in an attempt to simplify the malware removal process. Please let me know if you see any problems with the approach I have outlined.
In addition, please help by rating this article. If you believe this article deserves anything less than 5 stars, please leave a comment below explaining how you think it can be improved or where you find fault. This article is written by me but fueled by the community. Thus your opinions and advice are not only much appreciated, but actually necessary in order for this article to grow and improve.

Popular Posts


Copyright @ 2013 Best blogg.

Designed by Templateify & Sponsored By Twigplay