Friday, December 31, 2010

How To Fix An Overheating Laptop


The greatest threat for your laptop, except for your your coffee mug, is overheating. It can cause hardware failure and permanent damage. In this article I will introduce ways that you can prevent or fix an overheating laptop and thus improve the performance and the extend the lifespan of your laptop.

How Do You Know Your Laptop Is Overheating?

A sure sign that your notebook gets too hot is when your fan always runs at maximum speed. You may also experience reduced performance because the CPU cuts back its clock speed to escape heat pressure. Moreover, the fail safe software may trigger a sudden shutdown to prevent hardware damage.

What Causes Overheating?

In two words: insufficient cooling.
The reasons include dust blocking intake grills or exhaust ports, a clocked up fan, or a degenerated thermal grease (aka thermal compound) between the heat sink and the CPU.

How Can You Prevent or Fix an Overheating Laptop?

There are several hardware fixes that can cure overheating.

1. Fix Internal Cooling

The first and most important thing you need to do when your laptop is overheating, is to clean the fan/s that provide/s cooling to the CPU and graphics card. Over time they build up layers of dust and dirt that slow them down and block flow of air. Consult your laptop’s manual or manufacturer to find out how you can open the laptop to access and clean these parts.
Before you attempt to do any cleaning, however, follow these steps:
  • shut down the computer.
  • remove the battery.
  • unplug the power strip.
  • ground yourself
Carefully clean the fan/s with a cotton swab dipped in a drop of alcohol. Make sure the alcohol has completely evaporated before you reconnect the laptop to the power. You can also use a vacuum cleaner to remove the dust and dirt that clocks up the fan/s. To prevent damage to the fan, do not let it revolve in the wrong direction. If you want to use canned air to clean the fan, arrest the fan by holding it down.

Next, you can clean the exhaust port by sucking out air with a vacuum cleaner. The exhaust port usually sits on the side of the laptop. It’s the opening that blows out hot air.
The intake grills are small openings that allow air to be sucked into the laptop by the revolving fans. They can sit on the sides or at the bot
tom of your notebook. To clear the intake grills, spray them with canned air.
Finally, you can apply fresh thermal grease to the interface between the CPU and its heat sink. Again, please consult the laptop’s manual or ma
nufacturer to obtain instructions on how to disassemble these components.

2. Keep The Laptop On A Hard & Flat Surface

Most laptops suck in cooling air through their bottoms. If the laptop sits on an uneven surface like a blanket, pillow, or your lap, the flow of air into the laptop is disturbed. Subsequently, the cooling is not optimal, heat builds up, the surface becomes hot, the temperature of sucked in cooling air increases, and eventually the laptop overheats.
This scenario is easily avoided by keeping the laptop on a hard and flat surface. You can use something as simple as a tray or get a special laptop holder or lap stand.

3. Invest In A Laptop Cooler

Laptop coolers are meant to provide additional c
ooling. However, getting the wrong cooler can actually make the problem worse. Before you purchase a cooler, you need to understand the flow of air into and out of your laptop.

As mentioned above, most laptops suck in air for cooling from the bottom. This makes sense because warm air rises upwards. However, a cooler that sits underneath the laptop and sucks air away from it, does not contribute to laptop cooling and rather causes a more rapid overheating.
If your laptop has intake grills at its bottom, purchase a cooler that blows cool air upwards, i.e. into the laptop. You can also get a passive cooler that does not consume power and merely absorbs heat.

What Are Potential Software Fixes?

If none of the hardware fixes result in lasting improvements, you can also revert to software fixes that address the performance and power usage of your laptop. However, addressing excessive heat with a software fix means you give up performance in favor of preserving the hardware.
You can either reduce the brightness of your screen or reduce the CPU clock speed. In Windows, underclocking or undervolting is done in the BIOS, but can also be controlled through software tools. Consult the Undervolting Guide on the Notebook Review forum for more information about this procedure.

Key Basic Keyboard for Windows


CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than 1 item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
CTRL+SHIFT+ESC (Open Task Manager)
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)

Free software to restore files that are hidden by the virus

Because the virus eventually must learn to restore the data files or folders that have been lost or hidden. From the results of search on google, lucky I found the software to restore files that have been hidden.
If you have the same problem, following the software and use the procedure you can download it here.
Download here
Stay extract the file, then learn how the use of ordinances. Hopefully useful!

how to upgrade computer memory

Is your computer performance has begun too low? Many things can cause the performance of a computer can be reduced significantly. Some causes include hard disk capacity is full, too many temporary files from the Internet, many computer viruses that attack your computer system, or computer memory may also exist in the system is not adequate when compared with the applications used on existing computers.
To overcome this, many ways that you can do to make your computer performance can return to normal. Some things you can try to restore performance your computer such as adding hard disk capacity perform regular antivirus scans, do the disk cleaning system, as well as upgrading computer memory that you currently use.

The easiest way to overcome this is to upgrade your computer memory. This is for several reasons, among them is much easier for you to do, quickly, and also can provide maximum results and also with a fairly low cost. But a few things you should consider before doing an upgrade of computer memory, such as:

  • Note the type of memory on your computer right now, whether the type DDR1, DDR2, or DDR3. This must be what you really pay attention because if something goes wrong in choosing the type of memory, usually often happens "Hang" on your computer.
  • The speed of memory you use should be the same, between the current memories with a memory that you will use to add the capacity of existing ones, such as cache memory with PC4300, PC 7200, and so on. If you combine two different types of speed cache memory that is, for example, put together with PC7200 and PC4300 then it can be ascertained it will not work, and your computer will go "hangs".
It’s important to remember that a wireless signal is broadcast and accessible to anyone who has the technology to receive it. By default all traffic is encrypted that travels between the 2WIRE 2700HG-B and
any connected computer or wireless device. Encrypting the wireless traffic makes it more difficult for an unauthorized individual to extract information if your wireless signal is intercepted. The default type of encryption (WEP-Open) used by some wireless access points can be easily broken and decoded.

Data transmission through wireless channels are vulnerable to piracy. Anyone who is in the coverage area can access a wirelss network. In order not meudah hijacked another person, is required enkrispi to randomize the data sent on the wireless network. Wi-fi equipment are now providing sekurity technology options that can be used as needed.
What you have to do now is activate the security feature. following ways to activate it:
• Open your browser, then log into the IP access point.
• In the basic settings, go to wireless – wireless settings.
• Give a checklist on the options enabled wireless security
• On the security tyepe select the type of security that you want to use.
• At the security option, select the security model, if you do not want to elaborate just select Automatic.
• In the WEP Key format, specify the type of key that will be used, whether ASCII or Hexadecimal. Keuy in the form of letters to select ASCII.
• In the WEP Key field, enter the access point.
• Specify the encryption on the Key Type.
• Click Save to save it.
IT security needs to use a layered approach. While no single layer of security is enough to withstand every attack, each additional layer serves to further harden your system and discourage would-be attackers
and free-loaders. Here are six settings on your router which, if properly configured, will better protect your network, your computers, and your data.
1. Change the default password for the administrator account on your wireless router or access point. This is absolutely essential and should have been the very first thing you did after you unboxed it.
Don’t use a word in the dictionary or anything easily guessed.
2. Limit access to your wireless LAN by using MAC address filtering. A MAC address (also called the physical address) is an identifier unique to each network adapter. MAC address filtering involves looking up the MAC address of each device that will connect to the WLAN and adding them to a list in the router’s control panel. MAC addresses can be spoofed, so filtering shouldn’t be the only security method used.
3. Change your SSID (network name). A router’s default SSID (Service Set Identifier) can be used to identify your hardware, which could help a hacker determine the default administrator password (see step
1). A default SSID also suggests that the network was poorly configured, making it appear to be an easier target. Change it to something you and your family would recognize (your pet’s name, for example), but that’s not publicly identifiable (don’t use your name, your address, etc.).
4. Don’t disable SSID broadcasting Disabling SSID broadcasting will prevent casual browsers from finding your network, but it also means you will have to manually enter the name of your network on each device and your laptop will periodically ping your SSID. Not broadcasting your SSID does nothing to secure your network, it just makes it less obvious to your neighbors.
5. Use the strongest encryption form supported by your router and all of your other devices. The best choice is WPA2 with the “TKIP+AES” algorithm, which is the newest type of wireless encryption and
provides the highest level of encryption available. WPA2 has been available on most devices manufactured in the past few years. WPA-PSK, also called WPA-Personal, encryption is the next best, and 128-bit WEP is the weakest level of encryption and not very good, but better than nothing. Use a strong password, ideally a string of at 20+ random alpha-numeric characters.
6. Disable remote administration. The ability to remotely administer your WLAN router via the Internet should be turned off unless you absolutely need this. It is usually turned off by default, but it’s a good idea to check. The only downside to this is that you will have to physically connect a computer to the router in order to configure it, which isn’t necessarily a downside at all.
Hiding In the Network Access Point Wi-Fi
On the Wi-Fi access point SSID broadcast will make a regular basis, this feature is enabled for hot spots. Access points can be hidden to prevent people who do not want to know there is a wireless network in
your area.
To hide access points within the Wi-Fi in conducted in the following steps :
• Open the browser, then log into your ip access point
• In the basic settings, go to wireless – wireless settings.
• Checked uncheck the option Enable SSID Broadcast.
• Then click the save button.

Wednesday, December 29, 2010

How To Reset Admin Password Of Windows 7?

windows7_logo2

Did you forget Microsoft Windows administrator password ? You may have forgotten the password and therefore Windows does not allow you to enter , Click on the “?”
Did you forget Microsoft Windows administrator password ? You may have forgotten the password and therefore Windows does not allow you to enter , Click on the “?” To see the password hint that can help you remember the password. But if you have no clue, is a serious problem. However, I do not think that the format of your hard drive in Windows, because it removes all data from your hard drive. There is a quick and easy way to reset windows password, use Windows password recovery software.

You may forget a few things on your computer life, such as creating regular backups, defragmenting the hard drive, and even the Windows administrator password. There are several methods you can try resetting the password of Windows, such as:

Reset Disk for password recovery – Reset disk you need to create to set a password for your Microsoft Windows. It helps to restore the administrative password without formatting the hard disk and reinstall Windows from Microsoft.

Use System Restore -If you do not have a password reset disk in place, you can try to restore the Microsoft Windows operating system in the previous working state. However, if your Windows hard drive containing the stored sensitive data after the restore point creation, should not go for the restoration. The process erases all data that is stored after the restore point was created.

Use Windows boot disk – The boot disk allows you to repair the operating system Microsoft Windows. Repair the operating system sets the password as blank and lets you set a password again after the next boot.

If none of the above methods work and you think that have to reinstall the Windows operating system to retrieve your Windows password, then you are wrong. Use Windows Password Recovery Software, It is an easy, fast, automated method to reset windows password.

Password recovery application are able to change the Windows password for most Windows OS versions. They are totally easy to use and comes equipped with simple user interface and rich graphics.

Traffic Monitor with Mikrotik Tools

In the Monitoring the flow of data packets that pass through mikrotik router interface, you can use the facilities Torch. Further information, can be read on Mikrotik Manual, namely Torch Tools
We can monitor the flow of packets based on protocol type, source address, destination address and port type. With this facility that has been provided in Packet System, when we install RouterOS, then help us in the administration of routers, from this facility, we can guess whether the flow of data in the machine we're normal or not. Monitoring of Flooding, Malware monitors activity and so forth.
Using it is fairly easy, usually more convenient for the Monitoring, please enabled Winbox, to enter into the router. More details can be seen pictured below.
Torch facility can be used through Winbox on the Tools menu - Torch. Please Click the Torch, the window will be displayed at Torch.

menu

Or could also be via IP - ARP. In ARP List window, please select the IP Address, MAC address that will be in the Monitor. Right-click to go to the Torch.
arp

Note that the items contained in this Torch window, the Manual above has been given a clear description of the items. Click the Start button to activate the service this Torch. Now we can monitoring to the flow of packets on router machine. If there is traffic for suspicious please take further action.
torch

In the list above, I monitor the flow of traffic from an IP address (Src Address) 192.168.0.13 through LAN interfaces. If you paid attention, in part Src ports have port 514 (syslog) protocol type UDP (17) leading to the IP address (Dst Address) 192.168.0.14, and indeed I'm running the Syslog Daemon on Windows XP Remote PC to save the log router router OS, on a PC that has IP address 192.168.0.13, with remotenya router that has IP address 192.168.0.14, is active on port 514 (UDP). We can choose the source address (Src Address) on the client that we will monitor, choose the port, destination address, and Protocols.

Track the original location of an email via IP address

Here’s a quick how-to guide on how you can track email to it’s originating location by figuring out the email’s IP address and looking it up. I have found this to be quite useful on many occasions for verification purposes since I receive lots of emails daily due to my blog. Tracking the IP address of an email sender does require looking at some technical details, so be ready to dig your heels in!

There are basically two steps involved in the process of tracking an email: find the IP address in the email header section and then look up the location of the IP address.
Finding the IP address of an email sender in GMail, Yahoo Mail, and Outlook

Let’s go ahead and take a look at how you would do this for Google, Yahoo and Outlook since those are the most popular email clients.
img02

Google’s Gmail
1. Log into your account and open the email in question.
2. Click on the down arrow that’s to the right of the Reply link. Choose Show Original from the list.
track-emails-thumb

Now here’s the technical part that I was telling you about earlier! You need to look for the lines of text that start with “Received: from“. It might be easier to simply press Cntrl + F and perform a search for that phase. You’ll notice that there are several Received From’s in the message header. This is because the message header contains the IP addresses of all of servers involved in routing that email to you.
message-header-thumb

To find the first computer
that originally sent the email, you’ll have to find the Received From that’s farthest DOWN. As you can see from the above image, the first one is from a computer called “aseem” with the IP address 72.204.154.191. Then it was routed to my ISP’s server at eastrmmtao104.cox.net and so on and so forth till it got to your email server.

The computer aseem is my personal home computer and that’s my public IP address for my house! I’ll go through Yahoo and Outlook before talking about tracking the location of that IP address.

Yahoo Mail Beta
1. Log into your account and open the email (if you’re using Yahoo Mail Beta with the new preview interface, make sure you double-click on the email so that it opens in a new tab)
2. At the top right, you’ll see there is a drop-down option where Standard Header is selected by default.
3. Click on it and choose Full Header.
yahoo-header-thumb

Again, you’ll see the same information as before, just in a different window:
message-headers-thumb

Microsoft Outlook
1. Open the email in Outlook by double-clicking on it
2. Go to View at the top menu (the menu options for the email, not the main Outlook window) and choose Options.
outlook-message-headers-thumb

You’ll get a dialog box where you can set the message options and at the bottom you’ll see the Internet Headers  box. For some silly reason, the box is very small and you have to scroll a lot, so it’s best to simply copy and paste the text into Notepad to view it more easily.
internet-headers-thumb

Tracking the location of an IP address

Now that we have our originating IP address of 72.204.154.191, let’s find out where that is! You can do this by perform a location lookup on the IP address. My favorites are IP2Location and GeoBytes IP Locator.
GeoBytes gave me a big map of New Orleans, LA along with a bunch of other information about the location itself.
find-ip-address-location-thumb

IP2Location also gave me the same information pretty much, including the ISP (Cox Communications). Of course, this is correct since I live in New Orleans!
If you want more information, you can do a WHOIS database search also. My favorite one is the ARIN WHOIS Database Search. This will give you information on who hosts that IP address and their registration information. You can always contact them to try and find more information on that particular IP address.
Have fun tracking down those emails! Questions, comments, or suggestions? Post a comment!
Video Tutorial

Monday, December 27, 2010

BitDefender AntiVirus Pro 2011 Build 14.0.22.326 Final


BitDefender Antivirus Pro 2011 - Professional anti-virus program with features designed for your computer more secure. The program provides advanced proactive protection against viruses, spyware, phishing attacks and identity theft, without slowing down your computer.

The new version of antivirus BitDefender Antivirus Pro 2011 extended features fast scanning, access to training videos, the output of intelligent tooltips, creating shortcuts on the toolbar, warning about the potential dangers of pages displayed in search results.
bitdefender_antivirus_pro

The main components of BitDefender Antivirus Pro 2011:
• Antivirus and antispyware
• Protection against phishing
• Chat Encryption
• Fast scanning
• Family Network Protection
• Checking Smart Scan
• Planner Smart Schedule
• Help System Smart Help
• Smart Sense
• Personal Toolbar

Key features BitDefender Antivirus Pro 2011:
• Proactive protection from common and new viruses and malicious programs.
• Filter visited web-pages to protect against phishing.
• Detect and remove hidden threats such as rootkits.
• Update the antivirus database every hour.
• Reducing the risk of identity theft and diversion of other confidential information via e-mail, IM, Facebook, other sites that monitor online activity.
• Information for users with knowledge bases, help files, video content libraries.
• Automatic activation module Game, Laptop or Silent in order to prevent disengagement from the Internet, extending battery life and reduce the load on the system.
• Use the definition of an interface configuration choices basic, medium or expert settings.
• Provide proposals for protecting the system while being a user to a dangerous Internet environment.

New BitDefender Antivirus Pro 2011:
• Fast system scan. Module Quick Scan uses cloud data processing technology, which facilitates rapid identification and repel attacks, new and unknown viruses.
• Check the search results. With BitDefender Antivirus Pro 2011 to learn about the potential dangers of certain sites can be when viewing search results. The system indicates which resources are infected with spyware or other malicious software.
• visual images. The user is available for immediate assistance through the training video that explains step by step how to configure BitDefender Antivirus Pro 2011.
• Creating shortcuts. The program allows you to create your own toolbar of labels frequently used functions.
• Conclusion of intelligent prompts. In response to recent action, the system provides personalized suggestions and warnings.

bitdefender_antivirus_pro-01

Operating system: XP, Vista, 7
Language: English
Activation: Yes
Download HotFile
http://hotfile.com/dl/68992949/6651411/BitDefender.AntiVirus.Pro.2011.part1.rar.html
http://hotfile.com/dl/68992963/24b5cb8/BitDefender.AntiVirus.Pro.2011.part2.rar.html
 
http://hotfile.com/dl/68992964/d4084ce/BitDefender.AntiVirus.Pro.2011.part3.rar.html
 
http://hotfile.com/dl/68992950/c71f1b0/BitDefender.AntiVirus.Pro.2011.part4.rar.html
 
http://hotfile.com/dl/68992965/482e276/BitDefender.AntiVirus.Pro.2011.part5.rar.html
 
http://hotfile.com/dl/68992953/c160890/BitDefender.AntiVirus.Pro.2011.part6.rar.html
 

Download FileServe
http://www.fileserve.com/file/qq492zt/BitDefender.AntiVirus.Pro.2011.part1.rar
http://www.fileserve.com/file/m9jZkZe/BitDefender.AntiVirus.Pro.2011.part2.rar
 
http://www.fileserve.com/file/5D9QyAP/BitDefender.AntiVirus.Pro.2011.part3.rar
 
http://www.fileserve.com/file/3P7y67S/BitDefender.AntiVirus.Pro.2011.part4.rar
 
http://www.fileserve.com/file/eHFu2mN/BitDefender.AntiVirus.Pro.2011.part5.rar
 
http://www.fileserve.com/file/F6an4Vk/BitDefender.AntiVirus.Pro.2011.part6.rar

Sunday, December 26, 2010

How to fix a dead motherboard

Check the power supply. In the state of the power cord from the power supply off, disconnect the cable socket mounted on Mainboard Atx1. Once separated, attach the power cord back in, connect / shortkan green wire with black cable, check whether the power supply fan spinning? If the rotating means good power supply. Remove the cable connections and reattach the cables were Atx1 to the motherboard. Check the Clear CMOS Jumper, whether in Clear or Free position, usually when a new motherboard, the position of the CMOS jumper on the Clear position. Check the IC chipset in a state connected and in the Switch On, whether or not excessive heat, over-heat means the chipset is already damaged. For CMOS IC part so far not been sold freely.

Check also whether the switch on its functioning. Unloading the Motherboard carefully, you try to wear clean thinners, if you can use thinner bottles do that on the tin. After you dry clean. Replace the IC regulator which is located around the ATX power socket on the motherboard. Replace Elko that seated 1000 s / d 3300 uf / 10 Volt ATX power connector is located near the motherboard. Be careful to make sure the components apart pairs power cable not connected to the mains.

Motherboard Hang And Often restarting

Check the Power Supply, try using another power supply if still restarts itself or hangs. If after replacement power supply turns normal / good, power supply means there is a problem. Change can bebe improved if only because I myself was not sure whether still can function properly ,because the power supply is a vital component . Especially for the current price very cheap power supply, I suggest you replace it. Check to see if there is virus, anti-virus program should always be installed and enable the auto protect her. I used to use Anti-virus eset smart security. You should frequently update your antivirus because if there is a new variant virus, your anti-virus will detect at once eliminate the virus.

At the moment there hangs and blue screen messages like "vxd error at address ...", there is usually a problem in memory. Clean the memory is like a step above. Try to reinstall Windows. If it still hangs / restarts itself let you check on the motherboard, you notice the physical changes in particular components Elko / capacitor, a black round shape no writing its capacity between 1000 uf/10Volt s / d 3300 uf/10 volts, usually seen, if the damage visible bloating / swelling and remove fluid or rust.

Saturday, December 25, 2010

How To Regain Access To Your Computer When You Forgot Windows 7 Password?

Just as the old saying goes, every coin has two sides. Windows password can help PC users protect the valuable data on computer.Of cource, it can be annoying once forgot Windows password. Although there are many available tips for lost Windows password, many of them are not effective when you would like to recover forgotten Windows password. So what should you to regain access to computer when forgot Windows 7 password?

Option 1: Reset Forgotten Windows 7 Password with Password Reset Disk

In view of the fact that Windows password can be easily forgotten or lost, so it is necessary to create a Windows password reset disk. Try to use Windows 7 password reset disk when you unfortunately lost it. You will easily reset Windows 7 password and get right in to your PC in a few seconds with the viable method.

Now, follow these steps and tips to create a new Windows password reset disk.

Step 1. Start your computer and log Windows 7.
Step 2. Insert an USB flash drive into your computer.
Step 3. Click Start > Control Panel > User Accounts and Family Safety > User Accounts > Create a password reset disk.
Step 4. When appears Forgotten Password Wizard, click Next.
Step 5. Select your USB flash drive. Click Next.
Step 6. Input the logon password or leave the box blank if no password was created.

When finished, you have successfully created a Windows password reset disk.
Although it is helpful to create a password reset disk when one forgot Windows password, there are still many PC users forgot to do like this. So make sure to create a password reset disk when creating a Windows 7 password for your PC.

Option 2: Reset Forgotten Windows 7 Password with Free Password Recovery Software

If you forget windows 7 password and don't have a password reset disk, how to deal with this Windows password lost problem? Take easy and choose one of an efficient freeware from website. And the recommended one is Ophcrack as it is said to be the best free of charge Windows password recovery tool.

Ophcrack is an open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. It is claimed that these tables can crack 99.9% of alphanumeric passwords of up to 14 characters in usually a few minutes.

Option 3: Remove Forgotten Windows 7 Password with a Well-Recognized Shareware

In addition to crack your forgotten Windows 7 password, you can also remove the forgotten password with a highly appreciated Windows password reset software, which allows you to reset Windows 7 password by burning a bootable CD/DVD or USB flash drive. As is known, Windows Password Unlocker is worthwhile when password lost.

Windows Password Unlocker is a professional Windows password recovery tool to reset lost Windows domain password, administrator or user password with ease. It provides a fast and secure solution to remove forgotten password of Windows 7/ XP/ Vista/2000/2003/2008.

Option 4: Bypass Windows 7 Password by Reinstalling Your Computer

If you cannot log on your computer with the above options, you can reinstall your computer. It is the last choice for most PC users as it will overwrite much of the information on your computer. Insert the Windows 7 boot disk into your computer's CD-ROM drive and restart it. Once the computer is running, follow the onscreen instructions to boot from disk and to reinstall Windows 7.

The above options are effective when you forgot windows 7 password. And they can be also useful when you forgot Windows password for Windows Vista / XP or other pc OS. You can try one of them when you find your Windows password lost or forgotten.

Things you might need

a bootable cd/dvd or usb flash drive

How To Unlock Password Protected Word Documents

The article details the steps for removing Microsoft Word document passwords using our recommended for Word Password Recovery 5.0 Forgot or lost Word Password? Have been locked out of your word document? This article details the steps for removing Microsoft Word document passwords using our recommended for Word Password Recovery 5.0,These instructions are valid for all versions of Microsoft Word including word 2007.
Note: if you are looking for Excel password recovery ,Access password recovery or Powerpoint password recovery , just click here ,this article also adapt to Office password recovery 5.0

Step 1: Install the Word Password Recovery 5.0 Download

To recover your Word document password, you'll need to first download the product from Password Recovery Official site. The direct download is available here. (25.1 MB)
http://recoverlostpassword.com/products/wordpasswordrecovery.html
Run the setup file, using the recommended default install options.

Step 2: Start the Password Recovery Wizard
  1. Click "File>Open" in the Menu or the "Open" button to browse in the Word document.Select your file in the Open File window, and click "Open".
  2. Select "Brute-force Attack (Trying All Possible Combinations)".
  3. Click "Start" button in the Menu to initiate the program.
  4. The program is searching the password. Some time later, a message box pops up to you, displaying the expected password. Click "Remove All Passwords from the File" to remove all passwords (Password to Open and Password to Edit) from the file. Click "OK".
Hope you enjoyed these tips, please share your Favorite Network by giving your comment below.