Sabtu, 13 Desember 2008

6 things to consider when buying a new computer

Is your computer very old?
Is it too slow or the memory is filled up, that you are thinking of buying a new computer?
Before you go to the computer shop, let me show you 6 things to consider when buying a new computer.

1. Computer brand: when buying a new computer the first thing that should come into your mind should be what brand of computer do I want to buy. Brand of a computer is determined by some fact like brand popularity, brand durability and availability of parts in the market.

2. Purpose of the computer: secondly the purpose of the computer should be considered. You have to ask yourself what am I buying this computer for, is it for my personal use, are you using it for DJ, is it for your office, you also have to consider the kind of program that will run on the computer.

3. Facilities available: you also have to consider the facilities that you want the computer to have, facilities like wireless enabled, Bluetooth, camera, card reader etc.

4. Memory Size: you also have to consider the memory of the computer. Computer memory here is the ram and the ram is what runs the applications on the computer so the size of the ram matters a lot, for a brand new computer the ram size is also dependent on the operating system that the computer comes with. If you want to buy a windows vista computer the ram should be like 3GBto 4GB because windows vista needs more memory to run than windows xp, For windows xp 2GBto 3GBwill be ok.

5. Hard disk: the next fact to consider is the size of the hard disk drive. Using large amount of hard disk is the best since some part of the hard disk is assigned to the ram to enable it perform effectively. If you use small size of hard disk and some part is assigned to the ram you will be left with a very small size that makes your computer run slowly. So large hard disk size is the best.


6. Processor speed: another fact to consider is the speed of the processor: you will notice that within the last two years there has been tremendous competition between processor manufacturers. So there are various kinds and types of processor. There are two major processor manufacturers which are Intel and AMD so you have to make your choice based on your research. You have to get a processor with high speed. These are the 6 things to consider when buying a new computer

After considering these facts you are sure to get a good computer when you enter the computer shop.

This article is open for comment and questions
For more on computer repairs visit online-computer-repairs

Jumat, 12 Desember 2008

Types of Computer Virus

Types of Computer Virus

A computer virus is a self-replicating computer program written to alter the way a computer operates without the permission or knowledge of the user. Computer viruses are similar to biological viruses in the way they multiply in number and in the way; they need a host to survive. However, in both cases there must be a cause, such as weak immune system or an expired anti-virus program, in order for the virus to penetrate and spread. The way a computer virus infiltrates your PC depends on the type of virus it is. Because all computers viruses have their own features and factors that make them unique and dangerous to the health of your computer. In this article, I will be sharing with you types of computer viruses so that you can better protect your computer.
Some times when you are infected, you rely know which of the virus is affecting your computer. Below is the list of the most common viruses affecting most computers:

1. Trojan Horses
2. Worms
3. Email Viruses

A Trojan horse appears to be nothing more than an interesting computer program or file, The Trojan virus once on your computer, does not reproduce, but instead makes your computer vulnerable to malicious attacks by allowing them to access and read your files. This makes the virus extremely dangerous to your computer. This virus can be minimized when you avoid downloading unnecessary files and software’s, and only download software’s and files that you are sure of.

A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. The worm may do damage and compromise the security of the computer. It may arrive via poor system security or by e-mail. Once Copied, the copied worms scan the network for further vulnerabilities and flaws in the network. The best way to protect you from worms is by updating your security software’s. You should avoid opening email attachments from unknown senders.

Email viruses use email messages to spread. An email virus can automatically forward itself to thousands of people, depending on whose email address it attacks. To avoid receiving virus-laden emails, always check that your antivirus software is up-to-date and stay clear of opening attachments. Also, block unwanted email viruses by installing a spam filter and popup blockers.

Other type of viruses exist and one should be careful to prevent himself from getting infected examples are

Boot sector Virus:
A virus that attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. To prevent this virus use an antivirus that scan boot files and make sure that the antivirus is updated Examples of boot viruses include: Polyboot.B, AntiEXE.


Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. They usually have the infected file name with .exe extension e.g. m-sword .exe instead of doc. They always run from your driver folder. In system 32 folder. Example of such virus is raila odinga virus. For how to remove raila odinga virus read it here

Memory Resident Viruses:
Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after its initiating program closes.

Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted. Examples are i.exe, autorun.inf.

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belongs to this category, and can be classified depending on the actions that they carry out.

FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

This article is open for comments and questions.
For more on virus tips visit online-computer-repairs

Selasa, 09 Desember 2008

Virus tips

Virus Tips

A computer virus is a self-replicating computer program written to alter the way a computer operates without the permission or knowledge of the user. Some viruses infect existing files on your computer, transforming regular files (like Word documents or system files) into infected files. Other viruses delete certain types of files on your computer. Virus sometimes interferes with your mouse cursor making it hard for you to control. A virus can spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.

Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without the need to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to a computer system’s hosted data, functional performance, or networking throughput, when executed.

Symptoms of a virus infected computer
The following are some major symptoms that show that a computer may be infected:

• The computer runs slower than usual.
• The computer stops responding, or it locks up frequently.
• The computer crashes, and then it restarts every few minutes.
• The computer restarts on its own. Additionally, the computer does not run as usual.
• Applications on the computer do not work correctly.
• Disks or disk drives are inaccessible.
• You cannot print items correctly.
• You see unusual error messages.
• You see distorted menus and dialog boxes.
• There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. Extension.
• An antivirus program is disabled for no reason, or the antivirus program cannot be restarted.
• An antivirus program cannot be installed on the computer, or the antivirus program will not run.
• New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
• Strange sounds or music plays from the speakers unexpectedly.
• A program disappears from the computer even though you did not intentionally remove the program.
• You see folders created inside folders, with the name of the containing folder and then “EXE” extension i.e. new folder.exe
Note: These are common signs of infection. However, some signs may be caused by hardware or software problems that have nothing to do with a computer virus. Unless you have a good and an updated anti virus Software, you may not be certain whether a computer is infected with a computer virus or not.

How to protect your computer

If you suspect that your computer is infected with a computer virus, follow the steps below to remove the virus

1. Install powerful antivirus software: if you suspect a virus on your computer, install a good antivirus software and make sure its updated at all times
2. Scan your computer to get rid of the virus.
3. Attend to Antivirus notification, sometimes your antivirus may dictate a virus and needs you take action and gives you notification. It’s very important that you always pay attention to your antivirus status.
Click here for more on how to protect your computer.

4. Finally install registry and malware removal tool, to dictate harmful registry entries entered by the virus and use the malware to dictate the location of the virus and remove them.

This article is open for comments and questions.
For more on virus tips visit online-computer-security.blogspot.com

Windows Themes

Windows Themes

Are you tired of seeing the same windows interface on your computer?
Do you sometimes feel like being creative and just want to pimp your computer to give you the look you want and not that same old windows theme. In this article I will be sharing with you where you can download windows themes and how to change the windows theme.
Windows themes are part of windows operating system that actually changes the look of your computer interface. These themes can be created separately with some software’s like theme studio, style xp, Microsoft expression blend. There are also thousands of free themes on the internet already created that you can download and use. Sites where you can find windows themes are so much like www.themexp.com, www.wincustomize.com, etc. if you fill the ones on the internet is not good enough you can also create your own windows themes using the software’s above or searching for more of them on the internet to use

The screen short you are seeing is what theme look like.
How to change windows theme in windows xp
To change windows xp theme. Right click an empty space on your desktop, click on properties, the display property box will appear, click the theme drop down list box to display the themes installed in your computer. Select the theme you like to use and see how it look on the preview box below, then click apply and ok your new windows themes should be active now. If its not an installation theme simply click on browse and locate the theme where you kept it then click apply and ok

Note: for themes that do not need installation you must keep the theme within your computer and in a place that it will not be deleted else when you reboot, and windows cannot locate the file it will change to windows default classic theme.
This article is open for comments and questions
For more on windows themes and tweaks visit online-computer-repairs.blogspot.com

Sabtu, 06 Desember 2008

How to password user accounts in windows xp

How to password user accounts in windows xp

Creating a password is very important for any computer users especially windows xp users. If you want to restrict access to your computer or you want to limit your staff access in your office computer.
Are you sharing one computer with another person, you can now make your document private and personal you can create a password only known to your this will prevent unauthorized access to your computer or your user account.

How to password user account in windows xp steps
Click start, click on control panel on the control panel window click on user accounts, click on the account you want to password.
When it opens click on create password, the password creation module will appear, type the password you wish to use in the new password field and enter that same password again in the field below.
If you want to use a text or sentence to remember your password type it in the password hint field, Let us say your password is prince and prince is the name of your son, on the password hint field you can type son as a hint. After filling this information, click create password and the password will be save. Now log of your computer and enter the password to logon again. In addition, remember that you must not let anyone know your password except those that you want to have access to your computer.
This article is open to comments and questions.
For more articles on computer repairs, computer security and other free stuffs
visit online -computer-repairs.blogspot.com

Jumat, 05 Desember 2008

The best way to keep your computer safe

The best way to keep computer safe
Computer security is a very vital and a very important aspect of the computer, especially when your computer has a lot of vital information and documents that you cannot afford to loose.
A lot of computer users suffer from data lose as a result of poor computer security. If your computer is vulnerable to virus attacks, you are likely to experience computer crashes and heavy data lose.
Keeping your computer safe and secured is just like owning a car, fueling it, washing it and changing oil, makes your car gives you maximum performance.
In this article I will be sharing with your some step to take in other to keep your computer safe and secured.

1. Limit your account user right

If you have an administrative right on the computer that means you can install any thing and also perform any system configuration on the computer, so also viruses using your administrative right can install themselves on the computer and also enter registry values. But when you limit your user right to a power user, no auto run file will be able to run on your computer without your permission and also no system configuration will be done on your machine without your permission, but when you want to install a program you right click on the program and click run as then enter the admin user name and password. Or you log of the current user and log in as administrator to install or configure your computer.
How to Change your user account right can be found here. This is the first step in keeping your computer safe.

2. Use Internet security software

Using a good internet security will not only keep you safe from viruses it will also monitor spyware and malwares also it will monitor your internet connections and sites that are harmful to your computer will be blocked
A good internet security should be updatable offline, easy to use and configured, and must be able to dictate harmful programs and sites and prompt for user action to run or block.
Remember that you have to make sure that your antivirus solution is consistently updated.

3. Perform system cleanup regularly

Performing system clean up erases all the junk files that accumulate memory in your computer. If you clean up your computer regularly, your system will run faster. How to clean up your junk files read the article here.

4. Scan external drives:

Because you never can tell if an external drive has a virus by merely looking at it, you need to scan any external drive attached to your computer before using it.
Lastly scan your computer frequently so that if any infectious file has entered your computer, your internet security will remove it.
If these steps have been taking, you are on your way to keeping your computer safe and secured.

You can send your comment and question on this article and other computer related problems.
For more on computer repairs,computer security tipe and tricks visit online-computer-repairs.

Senin, 01 Desember 2008

How to change users account rights

How to change user account rights

Computer security is very important when, especially when you have very sensitive data that you cannot afford to lose. Neglecting computer security or having poor computer security will cause computer crash, lose of data amongst others. Keeping your computer safe is very easy thing and should be a way of life for every computer user.

What is a user account? A user account is a profile that allows a person to access the windows computer which contains the logon information of that person and also his rights on that computer. A user right is simply the limits a user has on the computer.

Changing account user rights on the computer is just a way of saying to Mr. A (which is a also a user on that computer) u cannot install or uninstall on this computer and Mr. B u cannot change the computer configuration, for any configuration installation on this computer I have to be notified and only you will be able to install or configure programs on this computer.

Managing the rights of computer users in your office or home is a better way to monitor what your staffs install on the company computer and also what your children install and configures on the computer at home. changing user right on the computer make your computer 50% safe from viruses and other malicious programs that auto runs, especially when you insert your flash after using it in virus infected computer.

These steps will show you how to change rights of a user account
Windows xp has a default user (Administrator) that Built-in account for administering the computer/domain, when you create a user, that administrator account is not active only when you boot in safe mode.
To change your user right, right click on my computer,
click manage, on computer management module click on local users and group, click users, right click on the user you want to change the right, click on properties.
The property window will appear, click on member of tab, on the member of tab you will see the user rights the user have, if you will see administrator, that means the user can change, install and configure any thing on the machine,

you have to remove the administrative right from the user and place the user in power user group,. Power user group will not allow him to install and do any system configuration on the machine. This way no virus will be able to autorun on that machine also nobody will install or do system configuration in your absent. To change the user right click add, on user property module click advance
Click find, below you will see all the rights that are applicable to a user.
Select power users and click ok,
You will see the user entered in the select group module, click ok, and click apply and ok in the property module.

You have successfully changed the user right of that account. Now log of, log in again with that same account, and try to install a program you should see a message like this that means you have you have changed the user right of that account. So any time you want to install or configure your computer you either log on using the default admin account or you create another account that has administrative right on that computer.
Note: the default administrator account should have a password, before taking this step because windows will ask you to enter admin password when you want to install a program. If you don’t know how top create a password read it here,

for more on computer maintenance and other free stuffs visit onlin-computer-repairs