• Keyboard Shortcuts

    Shortcut keys help provide an easier and quicker method of navigating and executing commands in the computer software.

  • Hardware Tips

    Learn about the latest computer hardware and find out how to diagnose

  • Knowledge Practise questions and answers

    Here you can practise more questions and answers to improve your knowledge on computer

Monday 25 September 2017

Computer Keyboard Help and Support

Computer Keyboard Help and Support


Keyboard basics

What is a keyboard?
Full list of terms relating to computer keyboards.
How to use a computer keyboard.
How many keys are on a computer keyboard?
Description of each of the keys and symbols found on the keyboard.
What are the F1 through F12 keys?
Where do I find keyboard shortcut keys?
Help with cleaning a keyboard and other computer hardware.
Keyboard and other input devices buying tips.
Contact information for keyboard and input device manufacturers.
When was the first keyboard invented?


Top keyboard questions and answers


Where should fingers be placed on the keyboard?
How can I improve my typing?
How can I test how many words a minute I can type?
Not all keys on keyboard work.
No keys on my keyboard work.
Drink or other liquid spilled into keyboard.
How to move the mouse cursor with the keyboard in Windows.


Keyboard connection related help


USB help and support.
PS/2 help and information.
Serial port help and information.
AT / Din5 help and information.

All other keyboard questions and answers


How do I disable and enable the Num Lock key at startup?
Why are there bumps on the F and J keyboard keys?
Keyboard error at boot.
How do I disable or change keys on my keyboard?
How do I disable or change the keyboard Windows key?
What keyboard key can you press to print?
When booting computer I receive several beeps.
How do I remove the keys on a keyboard?
How do I remove and replace a laptop key or keycap?
How do I fix a broken laptop key or put it back on?
Keys on my computer keyboard are repeating.
Where can I find a replacement for a keyboard key?
How do I record keys that are typed into my computer?
How to switch to the Dvorak computer keyboard layout
What is the difference between the del and backspace keys?
Can you clean a computer keyboard in a dishwasher?
Differences between the keyboard right and left Shift key.
How do I test which key on a keyboard is being pressed?
How can I connect a PS/2 mouse and keyboard to my laptop?
A20 error.
I need computer keyboard drivers or layouts.
How do I disable the power, sleep, or wake buttons in Windows?
USB devices not working or being detected in Safe Mode or MS-DOS.

10 Android Photo Editors Worth Having on Your Phone

10 Android Photo Editors Worth Having on Your Phone

Whether you’re a photography amateur or someone who just wants to improve the look of photos, one thing is clear about the Android platform – there are dozens of applications and most of them are disappointing. Don’t worry because we prepared a list of the top 10 free and paid photo-editing apps which you can download at the Google Play Store. Together, they make 10 best photography apps for Android of 2016.

TOP 5 FREE

PICSAY




PicSay is an app that combines basic editing features and a few extra perks to produce interesting photos. The app lets you perform basics adjustments on exposure, contrast, temperature, tint, saturation, brightness, and hue under the “Add Effects” tab. The following features are also under the same tab:

distort for creating a bulge, sphere, stretch, or twirl effect
spotlight
pixelize
dizziness
rainbow
invert.
Most of the aforementioned effects are unique to PicSay but what really sets it apart is the ability to add Word Balloons, Titles, and Stickers. These additions have customizable fonts and colors and you can arrange them anywhere on photos.


LITTLE POTO


One of our favourites, Little Photo is mostly a photo filtering app with a few basic features like adding frames and rotating pictures. You can adjust the intensity of these filters to suit your taste. It is much easier to use than PicSay but has a few advanced features like multi exposure, burn spot, and body glow.

Install Little Photo via Google Play


PIXLR-O-MATIC




if you think Little Photo had great filters, this is even better as it offers dozens of options. Filters are arranged based on three categories – photo filters, light filters, and photo frames. The only drawback is that you are limited to using one filter at a time for each category. If you wish to apply multiple filters, you would have to save an edited photo and load it again. All this trouble is worth the hassle though because Pixlr-o-matic has no ads whatsoever.

Get Pixlr-o-Matic on Google Play

Read our detailed review of Pixlr


AFTERFOCUS



AfterFocus takes mobile photography to the next level because you can create DSLR-ish photos with it. Apply Focus on the object that needs focusing and set Mid and BG focus on the background for depth. Once you get the hang of it, you can create stunning photos that seem as if they were taken with a professional camera!

AfterFocus for Android on Google Play


RETRICA




Retrica is a colorful app to help you add live filters and trendy logos to your photos. With over 100 filters, you’ll never run out of options. You may even preview your photo with filter before you snap. Other options include:

  • classic vignette borders
  • making collages out of consecutive photos
  • blur
  • uploading photos to social networks.
Get Retrica for Android now


Device driver

Device driver

More commonly known as a driver, a device driver or hardware driver is a group of files that enable one or more hardware devices to communicate with the computer's operating system. Without drivers, the computer would not be able to send and receive data correctly to hardware devices, such as a printer.



If the appropriate driver is not installed, the device may not function properly, if at all. For Microsoft Windows users, a driver conflict or an error can be seen in the Device Manager. If problems or conflicts are encountered with a driver, the computer manufacturer or hardware manufacturer will release a driver update to fix the problems.

Option key

Option key

The option key is a keyboard key found on Apple computers. It is used as a to create special characters and as a modifier for other command codes. As can be seen in the picture to the right, the option key is found next to the control and command keys. Since the mid-1990s, this key has included the small text "alt" on it.



Tip: For users who are more familiar with the PC, the option key is very similar to Alt key on their keyboards.

Modifier key

Modifier key

A modifier key is a key on a computer's keyboard that is only used in conjunction with another key. Modifier keys are often used with other keys to perform computer keyboard shortcuts and other commands. For example, in many text editor programs pressing the Ctrl+A will select all text.
Examples of modifier keys

On an IBM compatible computer, modifier keys include Alt, Ctrl, Shift, and the Windows key. On the Apple Macintosh computer, the Control, Option, Command, and Shift keys are modifier keys.



Additionally, most laptop and some desktop keyboards contain an Fn modifier key.
Tip: If you have difficulties pressing and holding a modifier key while pressing other keys you can enable the StickyKeys option in Windows.

Fn

Fn


Short for Function, Fn is a key found on most laptop keyboards and some desktop computer keyboards to perform special functions, such as turning up the screen's brightness and adjusting speaker volume.







As you can see in the image above, this laptop has an Fn key with a green and blue Fn. Keys with symbols of the same color indicate that their secondary function will be activated by pressing that key with the Fn key. In this example, pressing and holding down the Fn key, along with the up or down arrows, would adjust the laptop screen brightness.



Tip: The Fn key should not be confused with the Function keys F1 - F12 found on computer keyboards.

Where is the Fn key found on the keyboard?


Laptop computers

On laptop computers, the Fn key is almost always located on the bottom left-hand side of the keyboard, next to the Ctrl key.

Chromebooks

Not all Chromebooks have an Fn key. For those that do have an Fn key, it is often found near the space bar.

Apple desktop keyboards


On full-sized Apple desktop computer keyboards, the fn key is found to the right of the delete key, as shown in the picture to the right.
Other desktop computers
Most other full-sized desktop computers do not have an Fn key. For those desktop computer keyboards that do have an Fn key, it is often found around the spacebar.

How do I use the Fn key?


With most computer keyboards, the Fn key is used like other modifier keys (e.g. the Shift key). By pressing and holding the Fn key in conjunction with another key that has an Fn function, that function is performed. For example, consider the photo above of the F12 key on an Apple keyboard. This key also has an icon of a speaker, making the F12 key also an audio volume control key. If you press this key, it will adjust the volume of your speakers. But if you hold down the Fn key when you press this key, it will be interpreted as the F12 key. Holding down Fn changes from the default key action to the alternate. You can configure which action is the default, and which action is the alternate, in the keyboard section of your System Settings.


Tip: On desktop computer keyboards with an Fn key that lights up when enabled, you need to make sure the key is enabled (illuminated) before pressing the corresponding function key. Once the key is illuminated it no longer needs to be pressed, and each function is performed until the fn key is disabled.

My Fn key does not have multiple colors

What functions can the Fn key perform?


Not all Fn keys are color coded. For computers with a white or black Fn key, it still performs the same function and can be pressed in combination with other keys that have pictures on them. For example, pressing the Fn key and a key with a sun on it should adjust the brightness. Pressing the Fn key and a key with a crescent moon should put the computer to sleep.

What if my keyboard does not have an Fn key?


The functions available to the Fn key all depend on the computer manufacturer and the type of keyboard. Below is a list of some of the common functions this key can be used to perform.
Turn up and down brightness on the display.
Turn up and down the volume.
Mute the volume.
Control media functions such as play, pause, fast forward, and rewind.
Switch between windows.

Why does the Fn key not work?


If your computer did not include a keyboard with the Fn key, it has no alternate functions on those keys. You may consider upgrading your keyboard to a different model, such as a multimedia keyboard.


For the Fn key and the function key to work it must be supported by the computer and device. For example, if you are pressing the Fn key and the brightness key to increase the brightness it only works on the laptop screen and not an external monitor connected to a laptop. The same goes for special functions such as opening a browser window, printer, and audio controls.


Tip: On desktop computer keyboards with an Fn key that lights up when enabled, you need to make sure the key is enabled (illuminated) before pressing the corresponding function key.


If you are trying to use an Fn key to perform a function that has worked in the past (e.g. adjusting your sound volume) and it is no longer working there may be a problem with either the drivers or the actual hardware in the computer.

Sunday 24 September 2017

Function keys

Function keys

The function keys or f keys are lined along the top of the keyboard and labeled F1 through F12. These keys act as shortcuts, performing certain functions, like saving files or printing data. For example, the F1 key is often used as the default help key in many programs. The function of these keys can differ by operating system and by software program.



Where are the function keys on the keyboard?

Below is an overview of a computer keyboard with the function keys (F1 through F12) highlighted in blue.




In the past, earlier Apple Macintosh computers did not have function keys, but today new keyboards include F1 through F12 or F1 through F19 keys at the top of the keyboard. MacBooks with a Touch Bar also do not have function keys.
Note: Some early IBM computer keyboards had two rows of function keys, with the second row containing F13 - F24. For additional information, visit our page on the F1 through F12 keys and their individual functions.



Tip: The function keys should not be confused with the Fn (function) key found on laptop computer keyboards, Apple keyboards, and other keyboards with special functions.

AT keyboard

AT keyboard

Alternatively referred to as the Model F keyboard, the AT keyboard is a US standard keyboard introduced in 1986 by IBM. The original version had 84-keys but was then replaced by the 101-key enhanced keyboard. Unlike new keyboards, the AT keyboard does not include the additional three Microsoft Windows keys now found on many IBM compatible keyboards.
An AT keyboard may also be used to describe a keyboard that uses the AT (Din5) port as shown in the above illustration. The Din5 Port is rarely used today since most computers use either PS/2 or USB keyboards.

Sunday 17 September 2017

Top 10 unknown Google tricks

Top 10 unknown Google tricks

Below is a list of our top ten Google tricks many people who use Google don't know.


Find weather and movies

Type "weather" or "movies" followed by a zip code or city and state to display current weather conditions or movie theaters in your area. For example, typing weather 84101 gives you the current weather conditions for Salt Lake City, UT. Typing movies 84101 gives you a link for show times for movies in that area.

Definitions


Pull up the definition of the word by typing define followed by the word you want to define. For example, typing: define bravura would display the definition of that word.

Local search


Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.

Phone number lookup


Enter a full phone number with area code to display the name and address associated with that phone number.

Track airline flight and packages


Enter the airline and flight number to display the status of an airline flight and it's arrival time. For example, type: delta 123 to display this flight information if available.
Google can also give a direct link to package tracking information if you enter a UPS, FedEx or USPS tracking number.

Translate


Translate text, a full web page, or search by using the Google Language Tools.
Pages linked to you

See what other web pages are linking to your website or blog by typing link: followed by your URL. For example, typing link:https://http://learne-world.blogspot.in/ displays all pages linking to learne-world.

Find PDF results only


Add fileType: to your search to display results that only match a certain file type. For example, if you wanted to display PDF results only type: "dell xps" fileType:pdf -- this is a great way to find online manuals.

Calculator


Use the Google Search engine as a calculator by typing a math problem in the search. For example, typing: 100 + 200 would display results as 300.


Stocks


Quickly get to a stock quote price, chart, and related links by typing the stock symbol in Google. For example, typing: msft displays the stock information for Microsoft.

Auto sum shortcut key in Microsoft Excel

Auto sum shortcut key in Microsoft Excel

Quickly create a Microsoft Excel formula to get the sum of all cells by highlighting the cells you want to know the value of and pressing Alt and =(equals) together.



Top 10 free PC programs everyone should have

Top 10 free PC programs everyone should have


There are millions of free and open source projects available, many of them better than any commercially available product. Below is a short listing of what we think are the best out there, broken down into ten categories.

Antivirus and malware protection


Most PC users realize that they need protection on their computer or may have an installed antivirus program from their computer manufacturer. What most don't realize is that there are free programs that are just as good and in some cases better than the commercial products. Below are our recommendations.
Antivirus program: Avast!
Malware and Spyware protection: Malwarebytes

Backup solutions


There are dozens of free and commercially available backup programs for computers. Unfortunately, many of those backups are stored locally, meaning if your house were to catch fire, get robbed, or if you lost your backup discs, all your data would be lost. To avoid loss of important data, we suggest users use online backup services.
Online backup solution: Mozy or Dropbox

Browsers


Although Microsoft Internet Explorer comes pre-installed on Windows computers. There are several excellent free alternatives that everyone should try. These free alternatives can often be faster, have more options, and in many cases be more secure than Internet Explorer.
Internet Browser: Mozilla Firefox or Google Chrome


Compression utility


When downloading files on the Internet you'll eventually encounter a .zip, .rar, or other compressed file. Dealing with these files can be easy with our below free file compression utility.
File compression utility: 7-Zip


Disc ripper and creation utility


Creating an audio or data CD/DVD, ripping the data from an audio CD, or creating a CD from a .ISO file can also be done freely using our below free recommendation.
CD burner utility: CDBurnerXP


E-mail


E-mail is yet another service that can be done freely. Most users today use online e-mail solutions like the one listed below. However, for those still using an e-mail client such as Microsoft Outlook we strongly suggest one or both of the below suggestions.
E-mail client: Mozilla Thunderbird
Online e-mail: Gmail


FTP, SFTP, and SSH Utility


Users who maintain their own web page or need to upload or download files to or from a server have to use an FTP utility or an SSH client. There are many commercial programs capable of doing this but our below free recommendations beats them all.
FTP client: Filezilla
SSH client: MobaXterm and Putty


Image editor, paint program, and picture organizer


There are many great free solutions for editing, creating, and organizing your images on your computer. Many of the programs capable of doing these tasks can be several hundred dollars, but all of the below programs are completely free.


Image editor: GIMP
Paint program: Paint.net
Picture organizer: Google Photos


Multimedia


There are dozens of different multimedia programs with different capabilities and limitations. Below are our top free multimedia programs for watching video files and recording audio.
Audio editing and creating tool: Audacity
Video and DVD Player: VLC and MPC-HC


Office Suite


An Office suite such as Microsoft Office is often one of the most expensive programs that a user can install on their computer. Why install these expensive programs when there are free solutions that are just as good.
Office suite: OpenOffice
Notepad and Source code editor: Notepad++

Why do people create viruses and malware?

Why do people create viruses and malware?


There are thousands and thousands of different viruses and malware on the Internet today. So, you may be asking, why do people create viruses and malware?


There are three primary reasons why they create them:

  • To make money.
  • To steal account information.
  • To cause problems and trouble for others.

Making money


Lots of viruses, malware, and spyware found on computers do not harm the computer all that much, other than slow it down. This malware is designed to capture information about the computer user and send it to the person or company responsible for making the malware. The information they collect is then used to target advertisements to your computer that you may be interested in viewing. These ads come in the form of e-mails and pop-ups on your computer.


If enough computers get infected they can earn money from all the ads displayed. The more ads they send out, the more chances they have of getting people to buy something or visit the advertiser. Sometimes, all it takes is one virus or malware program to generate hundreds, or even thousands, of ads on your computer.

Stealing account information


Online games and virtual goods have real life value attached to them and malware is created to steal online account information associated with online games. Using this type of malware, a person could gain access to a victim's account and then steal their virtual goods and currency. They could even sell their ill-gotten virtual goods to other players for real money.


Causing problems and trouble


On the other side of the spectrum, there are those people that create viruses and malware because they can. They enjoy causing trouble, seeing computer users get annoyed and have to fix their computer. Some malware can crash an entire network system and cause system outages for large companies, like banks or production companies.


In the end, it is the thrill of seeing the havoc and chaos they can create that drives them to create more viruses and malware.


What can you do?


Your best defense against malware and spyware is to keep your computer updated. You should make sure you have up-to-date antivirus and anti-spyware/malware software installed on your computer. Additionally, always be cautious of e-mail attachments, even if it is from someone you know.




Related Searches:)
How to update a Microsoft Windows computer.
What are the current available antivirus programs?
How can I protect myself while online?


How do I create a computer virus?
What are the top 10 computer viruses of all time?
Do antivirus companies create computer viruses?

What are the top 10 computer viruses of all time?

What are the top 10 computer viruses of all time?


Viruses come in many forms and are created with different intentions. Some corrupt or delete a computer files while others are designed to replicate until they use all of your RAM; rendering your computer unable to operate. There are even viruses, like Ping-Pong that are created as a joke and do not cause any real damage.


To date, there have been over one million computer viruses created, but only a small percentage of them are in mass circulation. Only a few have created havoc and fiscal cost at the level of those viruses listed on this page.


Ten of the most prolific viruses of all time


1. Storm Worm (also called Peacomm and Nuwar) - On January 19th, 2007, over 200 million e-mails included links to download the Storm Worm, which help play a part in the overall attack. Most believe the worm gets its name from the fact that one of the e-mail messages carrying the virus had "230 dead as storm batters Europe" as its subject.


  • Different than the W32.Storm.Worm released in 2001, this virus was released and identified in late 2007.
  • Allowed hackers to control the computer remotely, using it for malicious activity, like sending mass amounts of e-mail (spam).
  • Propagated through fake links to videos and news stories.

2. Netsky and Sasser - Netsky spread via e-mail and Windows networks, creating large amounts of Internet traffic and causing Denial of Service (DoS) attacks. At the time, Netsky and all its variants were believed to have accounted for as many as 25 percent of all computer viruses on the Internet. Sasser replicated by finding other systems with vulnerabilities and forcing them to download the virus. Once it was on a new machine, it altered the operating system to make it difficult for users to shut down their computer.

  • Released in February and April 2004 respectively.
  • Created by 17-year old Sven Jaschan.
  • One of the few viruses to be tracked back to their creator.
3. MyDoom - This worm was unique in that it had a timer of sorts. The virus created started Denial of Service attacks, then stopped distributing itself 11 days later. These attacks were aimed at various Internet servers, including attacks against search engines, causing several of them to crash and others to return search results much slower than normal.

  • Released on February 1st, 2004.
  • Replicated using e-mail and peer-to-peer networks.
  • Created backdoor that stayed open even after the worm stopped distributing itself.

4. Blaster Worm - This worm was unique in that once it got onto a network, it spread quicker because firewalls typically did not prevent internal machines the port it utilized. It was stopped by filtering by ISPs and public awareness.

  • Released in August of 2003, original creator is unknown.
  • Infected millions of computers worldwide.
  • Launched Denial of Service (DoS) attacks against Microsoft servers.

5. SQL Slammer - A prolific web server virus, the Slammer (also known as Sapphire) infected nearly half of the servers that help run the Internet 15 minutes after its initial attack.


  • Released in January 2003.
  • Affected computer networks and systems, causing shutdowns and a range of damage estimated at over $1 billion.
  • Caused Bank of America ATM service to crash, interruptions in Seattle's 911 service, and more.

6. Nimda - Spreading through e-mail and Web pages, this worm targeted Internet servers, slowing Internet performance nearly to a halt. It also opened a backdoor to the computer's operating system, allowing a hacker access to the computer. However, access was limited by user account permissions.


  • ​​Released in 2001.
  • Name is the word "admin" spelled backward.
  • Fastest spreading computer virus in history.

7. Code Red / Code Red II - These viruses exploited a vulnerability in Microsoft Windows 2000 and NT, causing a buffer overflow. Code Red initiated Denial of Service attacks against White House web servers, while Code Red II opened a backdoor for hackers to access Windows 2000 systems.


  • Released in summer 2001.
  • Later blocked from spreading by Microsoft patch.

8. Klez - This virus was unique in that hackers reproduced in many forms. It was also capable of spoofing; which helped spread the virus as recipients would think it was coming from a friend.


  • Released in late 2001.
  • Distributed through e-mail.
  • Capable of disabling anti-virus programs and making a computer unusable.

9. ILOVEYOU - Traveled through e-mail as a message from a secret admirer. When users downloaded the attachment called WIN-BUGSFIX.EXE, the virus would copy and embed itself in key files; including Registry keys.


  • Suspected to have been created by Onel de Guzman (Philippines) in 2000.
  • Initially spread through e-mail and later through IRC clients.
  • Damage caused by the virus was estimated at around $10 billion.

10. Melissa - Once activated, the virus would replicate and then sends itself out to the first 50 people in the address book of the recipient.


  • Created by David Smith in 1999.
  • Created a mess for government and public sector networks.
  • Caused some e-mail providers to shut down e-mail services until the virus was contained.


Temporary file

Temporary file

Alternatively referred to as a foo file, a temporary file or temp file is a file created to hold information temporarily while a file is being created. After the program has been closed, the temporary file should be deleted. Temporary files are used to help recover lost data if the program or computer is abnormally halted.


Microsoft Windows and Windows programs often create a .TMP file as a temporary file. However, the Windows temporary folder can contain any file, not just .tmp files.

My Windows computer boots up slow

My Windows computer boots up slow

A slow Microsoft Windows boot up can be caused by a number of different issues. The following document contains various suggestions and tips that can help improve the overall speed of your computer's startup. It should be noted that this page only covers a slow computer boot time; not what to do if your computer is running slow overall.


Tip: If you use your computer frequently, consider not turning it off or having your computer enter hibernation mode when pressing the power button, rather than shutting down completely.



Disable startup programs


Programs that are loaded as the computer starts up remain active in memory. Consequently, they are one of the main causes of a slow boot into Windows. Disabling programs you don't often use from automatically loading up each time the computer powers on can decrease boot time.


How to remove TSRs and startup programs.



ScanDisk and Defrag


Using Microsoft ScanDisk and Defrag or similar disk utilities can help verify your hard drive is running free of errors while organizing stored data in the most efficient manner possible. We suggest running both of these utilities at least once every few months.


Insufficient hard drive space


For your computer to run optimally, it needs at least 250 MB of available hard drive space. If you have less that this amount, slowdown in both general performance and the boot time can occur.


Determining available hard drive space.



Update drivers and Windows


Corrupt, incorrect, or out-of-date drivers can cause a number of different issues. Make sure your computer has the latest drivers as well as any available Microsoft Windows updates.


How to update a Microsoft Windows computer.

How do I locate software or drivers for my computer?

Registry cleaner


Although we do not often recommend Registry cleaners, in some rare situations they can help improve the overall performance of Windows including startup. If you have run through all of the previous recommendations without strong results, you may want to clean your system Registry.


Do I need a Windows Registry cleaner?

Format and reinstall


Although you may need to backup some of your files and the process itself may be a bit time-consuming, you may want to erase everything from the computer and reinstall Windows. This process makes your computer run like it did when it was new.

Hardware upgrades


We saved these options for last because they have a cost to the user associated with them. That being said; they are some of the most effective ways to increase performance and decrease boot times.



Adding random access memory

Installing additional memory (RAM) to the computer helps increase the overall speed of the computer and in some cases can decrease the boot up times. If your computer is running less than two Gigabytes of RAM, it may be time to upgrade.

What type of computer memory to use in a memory upgrade?



Adding a solid-state drive


An SSD is the most effective way to raise performance across the board for any computer. On both desktop and laptop computers, moving Windows from a standard hard drive to a solid-state drive will dramatically lower your boot times. Amazon.com has a full array of SSDs.
Comparison of solid-state and hard drives.

Missing operating system

Missing operating system


If you are receiving the Missing operating system or Operating System not found error message, select the version of Windows on your computer from the list below and follow the steps to resolve the issue.


  • Windows 8 and 10
  • Windows Vista and 7
  • Windows XP and earlier

Windows 8 and 10


Caution: Make sure the installation disc is designed for the version of Microsoft Windows on your computer. For example, do not use a Windows 7 installation disc for a Windows 10 computer.


Insert the Windows installation disc into the disc drive and restart the computer to boot from that disc.


Watch for the Press any key text to display on the screen, then press any key on the keyboard.


At the Windows install welcome screen, click the Repair your computer link located at the bottom-left of the welcome screen.


Select the Troubleshoot option, then select the Command Prompt option.


At the command prompt, type bootsect /nt60 sys and press Enter.


Once the bootsect process completes, restart the computer.


Windows Vista and 7


Caution: Make sure the installation disc is designed for the version of Microsoft Windows on your computer. For example, do not use a Windows 8 installation disc for a Windows 7 computer.


Insert the Windows installation disc into the disc drive and restart the computer to boot from that disc.


Watch for the Press any key text to display on the screen, then press any key on the keyboard.


At the Windows install welcome screen, click the Repair your computer link located at the bottom-left of the welcome screen.


Select the Windows operating system version on your computer and click Next.
On the System Recovery Options window, click the Command Prompt option.
At the command prompt, type bootsect /nt60 sys and press Enter.


Once the bootsect process completes, restart the computer.


Windows XP and earlier


Caution: Make sure the installation/bootable disc or diskette is designed for the version of Microsoft Windows on your computer. For example, do not use a Windows 98 bootable diskette for a Windows XP computer.


Make sure there is no CD or floppy diskette in the computer. We also recommend disconnecting all USB drives, including any MP3 players. If a CD or diskette is in the computer, remove it and restart the computer to see if the issue is resolved.


If the problem still exists, using a write protected bootable diskette, boot from the diskette and at the prompt, type sys c: and press Enter. You should then see the message system transferred. Once this has been completed, reboot the computer.


If the preceding step does not resolve your issue, boot from the diskette again and at the prompt, type "fdisk /mbr" and press Enter. This should return you back to the prompt. Once back at the prompt, reboot the computer.


Finally, if steps two and three do not resolve the issue, it is recommended that you boot from the boot diskette again and repair or format and reinstall the operating system.



How to find what operating system is on a computer

How to find what operating system is on a computer


Knowing what operating system is running on your computer can help you troubleshoot a computer and know your computer's compatibilities. Below are the steps on how to determine what operating system is running on your computer.


Tip: If you are not sure what type of computer you have, start with our steps on identifying your computer. You can also use our system information tool to automatically detect your operating system.


IBM compatible (PC) users


Apple users


IBM compatible (PC) users

 

The majority of all IBM compatible (PC) users have Microsoft Windows installed on their computer. A good method of determining if you are running Microsoft Windows 95 or later is to look for the "Start Button" in the bottom left corner of your screen. If you see the Start button, you are running Microsoft Windows.

If you do not see a Start button, it is likely you are running a different operating system. Below are some different visual indications to determine what operating system you are using. If you do not have any graphics or a GUI (only text), skip to the command line section.

GUI operating system visual indicators


  • A Microsoft Windows logo or Microsoft Windows flag but no start button often indicates an earlier version of Microsoft Windows, such as Microsoft Windows 3.11.
  • A red hat in the corner of the screen - Computer is running Red Hat Linux.
  • A green or blue "L" in the corner of the screen - Computer is running Lindows or Linspire.
  • A gray or black foot print in the corner of the screen you have GNOME running on a Linux or Unix variant.
  • A purple background with any visual indication of "Sun" or "Solaris" is an indication of the Sun Solaris operating system being used with X.

Command line operating system


If you only have text on the computer or only a console to work with, often you can determine what operating system you are using by using any of the below commands.
Note: On some systems, the command to view what operating system or its version will be disabled for security reasons and not all operating systems will support all of the below commands.


ver
winver
uname


Note to Linux and Unix users: Often users running a Linux or Unix variant have a Linux variant with any number of Graphic User Interfaces. For example, you could be running Red Hat Linux using GNOME as the GUI. It is often better to use the console to determine what variant of Linux or Unix you are using. The uname command will work with almost all variants of Linux and Unix.


If the uname command works and you need version information, type uname -a.
Additional information about the Linux version can also be found by using the below commands, if the uname command is not available.


tail /etc/redhat-release
cat /etc/issue

Visual identification


Finally, if you are in front of the computer, you can usually determine what operating system is being run on the computer by rebooting the computer. As the computer boots, it will indicate the operating system as it starts.
Tip: If the screen is loading too fast, you can press the Pause key on the keyboard to pause the screen as it is loading.

Apple users


All versions of the Apple Macintosh's operating systems have an Apple menu, a small apple icon in the upper left corner of the screen. If you do not have this apple logo on your screen, verify that you are using an Apple computer.


Click the Apple menu in the top left corner of the screen.


In the Apple menu, click "About this Mac" or "About this Computer"


Note: An Apple computer can also use Microsoft Windows through Boot Camp.

How do I scan or check for computer viruses?

How do I scan or check for computer viruses?


he best method to check and protect a computer for computer viruses is to use an antivirus program. Many anti-virus programs are available to choose from, but the better-rated brands are Kaspersky, Symantec, Trend Micro, and MSE. You can get just the basic antivirus program or a full antivirus suite, which often include other types of protection beyond just virus protection. You can also try using a free online virus scanner to check for viruses on your computer.


How do they work?


Each antivirus program has a different user interface, but they typically make a Scan option/button readily visible. Clicking the button should begin the process. Although you may have other options before the scan begins, including the option for both a quick and full scan. A quick scan searches the most common areas attacked by viruses and takes less time than the full option. However, a full scan is a better choice to run first as it ensures the program checks all possible places on your computer for viruses.


What happens if the program locates a virus?


After completing a scan the antivirus program displays the results of the scan and any detected viruses. If the program has not already done so, it should ask if you want to proceed with removing the viruses or if they should be quarantined.


Other benefits of an antivirus


Most antivirus programs can also schedule virus scans to run at a selected time each day, week, or month or only scan the computer when it is on but not being used. Also, after installing an antivirus program the program stays open in the background and scans files as they are open, downloaded, or executed.

How to prevent viruses


There are also several steps that you and anyone that uses the computer should follow to help prevent any viruses or other malware from infecting your computer. See the below document for information about how viruses infect a computer.


How does a computer get infected with a virus or spyware?

Homepage

Homepage


The homepage or home page is the name of the main page of a website where visitors can find hyperlinks to other pages on the site. By default, the homepage on all web servers is index.html, however, can also be index.htm, index.php, or whatever the developer decides.


How to get back to the homepage


Click on the browser home button that should resemble one of the home buttons on this page.


Most Internet browsers support the Alt+Home keyboard shortcut key to go to your home page.


In Mac Web browsers, try Command + Home or Option + Home.


Should I use "homepage" or "home page" in my writing?


Generally speaking, both versions are correct. However, most people and style guides today use "homepage" (one word) when talking about the main page of a website.

My web browser has been hijacked

My web browser has been hijacked


Unfortunately, many of the software programs used to hijack a computer's browser are intentionally designed to be difficult to remove or detect. Below are recommendations on how these programs can be prevented and removed.


Free programs


When installing free programs such as KaZaA, read the disclaimers and watch for additional programs that are being installed. Many times these programs are supported by automatically installing spyware programs.


If you no longer use these programs on a regular basis, uninstalling them can (but not always) also uninstall any associated software that is included with them.



Add/Remove programs


If you are running Microsoft Windows and you have noticed an unwanted program, try removing it through Add/Remove programs.


Any legitimate company's toolbars should be removable using the Add/Remove programs tool. Some examples of these toolbars include the Alexa Toolbar, ASK, Google Toolbar, Yahoo Toolbar, and Windows Live Toolbar.


If the spyware program cannot be removed or shows back up after removal, boot the computer into Safe Mode, and then try to uninstall again.



Restore browser settings


Some web pages and programs are designed to automatically change your browser's settings. For example, a web page or program may automatically change your default homepage to an alternative one. These issues can be corrected by following the steps below.


Close any extra browser windows so that only one window is open.



Correct the settings changed, such as changing your homepage back to your original homepage. Additional information about changing your browser's settings can be found on our browser help pages.


Once the settings have been changed and applied, close your browser.


The next time the browser is opened it should have the correct settings. 

However, if the site that changed your browser settings is visited again, it is likely that the settings will be changed again. This issue can be prevented with many of the spyware or adware programs that are available today.

Spyware, Adware, and Malware detection and removal programs


Many companies have developed programs that help prevent, detect, and remove infections related to browser hijacking. Below is a listing of a few of the programs you may want to consider.



  1. Malwarebytes
  2. Microsoft's Windows Defender
  3. Ad-aware from Lavasoft
  4. Spybot Search and Destroy
A computer can have any number of spyware programs installed at the same time; we recommend that you have more than one as a failsafe. If any spyware returns after rebooting the computer, boot the computer into Safe Mode and run the spyware removal program(s) again.


System Restore


Users of Microsoft Windows can run the Microsoft System Restore utility to restore the computer to an earlier date.


Make sure to update Windows


Make sure your computer is running all the latest updates and Service Pack's (if available).


How to update a Microsoft Windows computer.



Try alternative browser


Because Microsoft Internet Explorer is so widely used, switching to an alternative browser such as Firefox or Chrome can significantly reduce the amount of spyware you get on your computer.

How does a computer get infected with a virus or spyware?

How does a computer get infected with a virus or spyware?


There are dozens of ways a computer can become infected with spyware, viruses, and other malware. Below is a list of methods of how your computer can become infected. We've made this list in the order we believe to be most to least common.


Accepting without reading


By far one of the most common ways a computer becomes infected is when a user accepts what they see on the screen without reading the prompt before proceeding. For instance:


  1. While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you're getting, you accept the prompt.

  2. When installing or updating a program, you're prompted (often check boxes already checked) if it's okay to install additional programs that you may not want or are designed to monitor your usage of the program.

Tip: When installing a program you are given the options between an automatic and custom install. If you are installing something from the Internet, we suggest doing a custom install to make sure nothing else is added or changed during the install.

Downloading any infected software


When downloading any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you're downloading the software from a reliable source. Be sure to run your downloads through your antivirus and spyware scanners upon completion. As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.


Tip: You can help verify if a website is reliable by using tools such as WOT.


Opening e-mail attachments


As a general rule, do not open e-mail you were not expecting to receive. Computers can become infected when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.


Inserting or connecting an infected disk, disc, or drive


Any disk, disc, or thumb drive connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or trojan horse.


Note: This same rule applies to any networked drive or computer. If another computer has write access to your computer or a drive accessible by your computer, a virus can move between computers on a network.


Can a thumb drive be infected with a virus?


Visiting unknown links


It is possible for anyone to create a website and if a malicious person has designed the website it could give them access to your computer, send malicious files, or obtain sensitive information about your computer. Always be cautious and suspicious of any link sent to you over chat, e-mail, or SMS.
Note: A tactic commonly used with phishing is to make a link look like a legitimate link, but redirect you to a different page or may closely resemble a legitimate URL.


Not running the latest updates

Many of the updates, especially those associated with Microsoft Windows, are security oriented. Always keep your operating system and programs up to date. The plug-ins associated with your browser can also contain security vulnerabilities.


How to update a Microsoft Windows computer.


Pirating software, music, or movies


If you or someone on your computer is participating in a BitTorrent or other service to unlawfully exchange copyrighted music, movies, or software, you may be at risk. Sometimes these files and programs contain viruses, spyware, trojans, or malicious software in addition to what you believe you are downloading.


No antivirus spyware scanner


If you're running a computer with Microsoft Windows, we highly recommended you have some form of antivirus and spyware or malware protection. This software can remove any existing viruses and spyware, and it helps prevent future infections.


What are the currently available antivirus programs?
How do I scan or check for computer viruses?
My web browser has been hijacked.


Related Searches:)

How do I remove a virus from my computer?
How to protect yourself while on the Internet.
Computer virus information and help
See the virus, spyware, and malware definitions for further information and related links.

Virus

Virus


A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.







When the virus is executed, it spreads by copying itself into or over data files, programs, or boot sector of a computer's hard drive, or potentially anything else writable. To help spread an infection the virus writers use detailed knowledge of security vulnerabilities, zero days, or social engineering to gain access to a host's computer.

Which operating systems are susceptible to viruses?


All of the major operating systems can contract a computer virus. Whether you use Microsoft Windows, macOS, or a Linux variant, your computer can be at risk.

How to protect your computer from a virus


You can protect your computer from viruses by installing an antivirus protection program. Once installed on a computer an antivirus monitors, detects, and cleans any computer viruses by looking for virus signatures.


How does a computer get infected with a virus or spyware?

What can a virus do to a computer?


What a virus does to a computer once it has infected the computer depends on the type of virus. Typically most computer viruses will delete data, overwrite information, display messages, and add itself to other files on the computer. Almost all computer viruses only damage the data contained on the computer and do not physically harm the computer or its hardware. More sophisticated viruses like Stuxnet can cause physical damage.

Examples of computer viruses

Below is a list of the different types of computer viruses.

Appending virus                                     Encrypted virus        Overwrite virus
Boot sector virus                                   Executable Virus       Polymorphic virus
Spacefiller virus, a.k.a. the Cavity Virus   MBR Virus                Rabbit
virus
CMOS virus                                            Macro virus              Resident
virus 
Companion virus                                    Multipart virus          Spacefiller virus
                                                         Non-resident virus        Stealth virus 

When was the term "Virus" first coined?


The concept of a computer program capable of reproducing itself was first mentioned by John von Neumann in his 1949 "Theory of self-reproducing automata" essay. Later, Fred Cohen in 1983 coined the term virus in a 1984 research paper as "a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself."

What was the first computer virus ever created?


The first computer virus known as the Elk Cloner was written by Rich Skrenta in 1982 who was a 15-year old high school student at the time. The Elk Cloner virus spread to other computers by monitoring the floppy drive and copying itself to any floppy diskette that was inserted into the computer. Once a floppy was infected it would infect all other computers that used the disk was. A computer that was infected would display a short poem on every 50th boot.


Why do people create viruses and malware?

What is the full form of "virus" or what is it short for?


The term "virus" is not an acronym. When referring to an antivirus or anti-virus (virus protection), the "anti" is a prefix that describes the program helps protect against computer viruses.


Related pages

How do I remove a virus from my computer?
What are the top 10 computer viruses of all time?
How do I create a computer virus?
All other computer virus questions and answers.
Computer virus and information overview.

Good Morning Beautiful

Do you know????

Do you know????
/