Computer Problems, Troubleshooting, Advanced Level, Eljun Blog, Towncenter Online, Jagna Blog, Blogging World

Wednesday, October 29, 2008

Sending Unlimited SMS

Ok i've found a best site to send unlimited SMS to all smart network, no registration required, no hassle, and easy to use, I recently updated this page and create a link redirection to make the site easy to locate. This site is from txtmate.com the original one.

How to send SMS?

-Type the Recipients Number
-Type your Message
-Click Send

NOTE: You will be redirected to txtmate.com and to send another SMS you need to click the BACK button at the toolbar or hit BACKSPACE on the keyboard.


You can visit it here, enjoy!!!

Labels: ,

Saturday, October 25, 2008

Removing Virus from USB or MASS Storage

Nowadays USB Drives is very popular in Cyber World because of its handy look and design to be more flexible and accurate comparing to those old Floppy drives we used before. Many people used it for transferring their files wherever they go. But do you know that USB drive is also one of the Carrier of Computer viruses and Worms?

According to some statement:

"It all boils down to a simple text file called: autorun.inf with a simple script like “[autorun] open=virus.exe icon=virus.ico”. “Open” is the command to execute the file upon having the drive detected by Windows while “icon” is optional and is merely to give an “icon” to the drive letter the USB drive resides on. It is quite easy for virus to infect an executable file especially the viruses which reside in the flash drives while being executed.

The situation is even worse when sometimes you are attacked by a new worm that can take advantage of this security flaw and copies itself to the root directory of the USB flash drive, thence automatically creates an autorun.inf file to further spread itself. Of course this threat does not only affect the USB flash drive but also other devices with a flash storage and a USB cable, e.g. mobile phone, PDA, etc."

Deleting virus from the USB drive is quit easy, however because of the different types of virus that resides on it, it will be hard to modify. You can simply follow some important tips on deleting the virus inside your USB.


Ok this procedures will guide you removing any Auto run virus on your computer:

Step 1:

Click on "MY COMPUTER" icon / Click on the Address BAR / Locate your USB assigned Drive e.g. D: / E: / F: & Etc.

NOTE: Don't click or double click the USB Drive because it will trigger the virus.

You will see different folders but you can't see the virus because it is "HIDDEN". In order to reveal it, you need to click on "TOOLS / FOLDER OPTION/ VIEW & Checked the SHOW HIDDEN FILES" click APPLY hidden files should be visible now.

Step 2:

Delete some files that ends with ".EXE" & ".BAT" & ".INF" file extension

ex: FunnyUST Scandal.exe, SilentSoftTech.exe, Command.Exe. Test.bat and so much more.

NOTE: If you can't delete the above files it means that its currently running on your system to end its process you need to hit CTRL+ALT+DELETE it should bring up the TASK MANAGER locate the file and click the END PROCESS.

NOTE2: Some virus & worms usually disable this options if its already scattered throughout your computer disabling the ff:

msconfig, taskmanager, regedit, and also cmd.exe

So you will need a secondary tools that usually works desame as above.

The software we called "Process Explorer" is the best bet to this kind of problem, you can download it from here or mirror1. Start the program and End the virus process.


Step 3:



Clearing the virus from running on startup, why?

Autorun virus will also start the process when your computer is ON, lets assumed it, ok clearing the virus from running on startup comes two different ways.

a. Click START/RUN/ type MSCONFIG hit enter & select STARTUP.
You can unchecked everything, if you are familiar with the running application during
startup just leave it check. NOTE: Removing some items will also boast your computer on
startup.

b. Click START/RUN/type REGEDIT ==== WARNING this is much complitaced part make
sure you don't changed anything except from the file that I'm going to mentioned.

Locate this "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

The Default for "Shell & Userinit" is:

Name Type Data

shell REG_SZ Explorer.exe
userinit REG_SZ C:\WINDOWS\system32\userinit.exe or Userinit.exe


Prob :Explorer.exe, Aikelyu.html

Sol : Remove the Aikelyu.html

Prob : Userinit.exe, Command.bat, FunnyUST Scandal.exe

Sol : Remove the other EXCLUDING the "userinit.exe"


Make sure to change to default function as written above.


If you are still having problem following the procedures written above you post your commends for further explanation.



Labels: , , ,

Friday, October 24, 2008

How to Connect Smartbro on Ubuntu?

This morning I received a call from a customer asking me if I could help him connect his Internet Connection to his computer, I ask him what type of Operating System you are using? and He answer me "actually i'm not sure about it but its something different from Windows XP". It comes on my mind a puzzle "If his not using WinXP, what OS could it be?" I put a scheduled on him at 4:00pm in the afternoon.

Lastly when I arrived I found out that he is using Ubuntu OS from Linux, actually I don't have any idea what to do about this kind of Operating System, and now I'm searching over the internet how to resolved this issue. Because according to his statement, after the Lightning Shock happened last week his internet break's down and he can't connect anymore. He asked helped from the Customer Support in Smartbro but until now there is no positive response from them.

Since he is expecting me to do the job, now I'm trying to find some answer. Looks like I need to study more about Ubuntu this time so that it will not give me too much headache. Further solution maybe posted when I found it.

More info found at: http://ubuntuforums.org/archive/index.php/t-650755.html


"eljun"


Labels: , , ,

Thursday, October 23, 2008

Types of Computer Viruses

Network Viruses

Network viruses rapidly spreads through a Local Network Area (LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself. The most dangerous network viruses are Nimda and SQLSlammer.


Logic Bombs

The logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.

Companion Viruses

Companion viruses takes advantage of MS-DOS. This virus creates a new file with typically the .COM extensions, but sometimes the .EXD extension as well. When a user manually types in a program they desire without adding .EXE or any other specific extention, DOS will make the assumption that the user want the file with the extension that comes first in alphabetical order, and thus running the virus. The companion virus is rare among Windows XP computers as this particular operating system does not use the MS-DOS.

Boot Sector Viruses

Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard drive. Unlike most viruses, this virus does not harm the files in the hard disk, but harm the hard disk itself. Boot sector viruses are uncommon at this day and age because these viruses are spread rapidly by floppy disks and not on CD-ROMs.

Multipartite Viruses

Multipartite viruses are spreaded through infected media and usually hides in the memory. Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive and later across the computer system.


Labels: , , , ,

AntiVirus Software Review 2008

AntiVirus Software Review
Don’t think your computer is safe…


Today’s computer viruses are more sophisticated and aggressive than ever. Thankfully, with antivirus software, you can confidently keep your data safe and your computer free of infection. If you are aware of your computer being infected with a virus then you must purchase the products that are capable of giving your own security.
Many destructive viruses are come from internet and in any removable disk such as: Flash Drive, Thumb Drive or USB, Memory Cards, Old Floppy, & from other network computer. Your computer may take the risk if you don’t careful.
Top 3 Rank

#1 BitDefender Antivirus
#2 Kaspersky Anti-Virus
#3 ESET Nod32

See all products at: http://anti-virus-software-review.toptenreviews.com/

Labels: ,

Anti-Virus 2008 Reviews

AntiVirus Software Review
Don’t think your computer is safe…


Today’s computer viruses are more sophisticated and aggressive than ever. Thankfully, with antivirus software, you can confidently keep your data safe and your computer free of infection. If you are aware of your computer being infected with a virus then you must purchase the products that are capable of giving your own security.
Many destructive viruses are come from internet and in any removable disk such as: Flash Drive, Thumb Drive or USB, Memory Cards, Old Floppy, & from other network computer. Your computer may take the risk if you don’t careful.
Top 3 Rank

#1 BitDefender Antivirus
#2 Kaspersky Anti-Virus
#3 ESET Nod32

See all products at: http://anti-virus-software-review.toptenreviews.com/

Labels: , ,

Wednesday, October 22, 2008

20 things you didn't know about Windows XP

You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.


1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, is due out late dis month The next big release is codenamed Blackcomb and will be out in 2010/2011

Labels: , ,

Virtual desktop designs survey
SearchEnterpriseDesktop.com, Editors

Getting reading to launch a client-side virtualization project, or already have one underway? We are conducting a survey to find out what types of desktop virtualization technologies are being deployed in IT shops and for what purposes. This information will be gathered and shared with SearchEnterpriseDesktop readers in the form of articles to help them get started on their own projects. If your response is selected you will receive a $25 gas card.
TAKE OUR SURVEY FOR A CHANCE TO WIN A FREE GAS CARD


Improved Terminal Services resource management in Windows Server 2008
Learn the five ways in which accessing local hardware has improved in Windows Server 2008's Terminal Services.
READ THE FULL TIP

Labels: ,

Tuesday, October 21, 2008

Welcome to my Blog

I've heard from some people that blogging is now very popular and if I knew how to deal with it I will become rich, or its another source of income by just using internet. Well, making addition income interest me much & eagerly I wanted to know about it. I'm working at internet cafe in past 3 years up to the current. My self experience in computer is now at advanced level and I believe in myself that I can do everything. I can solve some popular computer problems that needs troubleshooting by the help of "GOOGLE" my no.1 search engine references.

I write this blog so that I can express myself that I'm ready to face the advanced computer world. Not only in computer troubleshooting but also in gaming, applications software and hardware manipulations. I wanted to help people who had lack of knowledge in computer. Helping them in the way of searching about the problem they face on their computer. I'm hoping that this blog will become popular to everyone and by that I can help anyone by posting some Computer related problems and their solutions.

Also important notice that some content of this site is edited by me from different sources, and some other is my own composition. I'm going to use this site as my personal references during the time that i'ved conducted the following procedures done in the past.

Labels: ,