There are many laptop battery in the electronic market, a large number of substandard products into the market, including many original batteries counterfeit, take many potential to consumers. For non-professional consumers, we suggest the customer select the notebook battery following to the next tips:
1. Check packaging
Battery packaging should be sealed anti-static bags, anti-static foam lining, which is to protect the basic configuration of the Compaq presario cq60 battery.
Battery packaging should have a bar code serial code. Bar code is provided by the factory management of commodity standards to identify the authority logo.
2.check the appearance
Batteries should not be scratched or the appearance of the old sense, or readily available second-hand goods renovation as OEM Compaq presario cq70 battery.
Battery case should be clear parameters, performance, application of model identification.
Joints up and down the Dell inspiron 1440 battery cover should have no marks have been opened.
3. Check the official commitment to the protection of that and after-sale
Formal professional laptop battery grade qualified products cylindrical Dell inspiron 1545 battery , since the date of the factory, there are bonds for one year warranty. If you can not have this commitment, then the use of batteries and other materials may not be the quality of very qualified sub-grade batteries but batteries. At present the market with large number of obsolete Japan, South Korea and the poor Dell vostro 1510 battery conversion, this product may seem cheap products are actually huge profits, as well as the normal use of notebook computers much damage, the explosion will be serious personal injury caused to consumers.
Showing posts with label how to. Show all posts
Showing posts with label how to. Show all posts
20101011
20100928
Obtaining Your IP Address
Working in the IT field, technicians will always try to fix a problem remotely first. The one question that is asked 9 times out of 10 is usually "What is your IP address?". Internet Protocol Address, or IP for short, can tell the technician alot of things. An IP address is comprised of 4 numbers ranging from 0-255 and seperated by a period. EX: "192.168.1.254" This number can tell technicians how or if you are connected to the internet, in work situations it may allow the technician to connect to your machine. After about 15 minutes with some users you might be able to get an IP address from them. It's not because the users are illiterate or stupid its more about the gap that exsists between the technician who asks that question 30 times a day and the end-user who actually looks up their IP only when the PC is down. In this Techreally! we'll show you the simplest most easy way to obtain your ip address and some other key information.
Obtaining IP address in Windows XP:
Step 1: click Start
Step 2: click Run
Step 3: In the Run dialog box type "CMD" with no quotation marks and click "OK". This will open a black window.
Step 4: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Obtaining IP address in Windows 7/Vista:
Step 1: click Start/Windows Logo
Step 2: in the search box type "CMD" and press "Enter". This will open the black command prompt window.
Step 3: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Another thing you can do is type "IPCONFIG /all" for all of the information about your adapter and internet connections.
This has been a TechReally technology post.
Obtaining IP address in Windows XP:
Step 1: click Start
Step 2: click Run
Step 3: In the Run dialog box type "CMD" with no quotation marks and click "OK". This will open a black window.
Step 4: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Obtaining IP address in Windows 7/Vista:
Step 1: click Start/Windows Logo
Step 2: in the search box type "CMD" and press "Enter". This will open the black command prompt window.
Step 3: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Another thing you can do is type "IPCONFIG /all" for all of the information about your adapter and internet connections.
This has been a TechReally technology post.
Labels:
how to,
procedure,
technology,
tutorial,
windows 7,
Windows XP
20100915
How To Program Your Direct TV Remote
Contemporary remote controls have become quite complex. In the old days, it used to be that a remote control was a simple electronic device- one power button, a volume up and down button, channel selections and perhaps a mute control. Remote controls today have become more universal, programming the user̢۪s television, satellite receiver, VCR, DVD player, stereo and any other part of the user's home entertainment system.
The problem arises when the viewer is not able to understand the options on the remote control and it becomes useless. DirecTv's remote control can be simply understood if these directions are followed. DirecTV incorporates specific features and special options. A four-position slide switch for easy component selection , code library for popular video and stereo components, code search to help program control of older or discontinued components and memory protection to ensure that the user will not have to reprogram the remote when the batteries are replaced.1. The user chooses the Device
The first thing the user is required to do is choose which device is desired for programming. Most remotes have separate buttons that correspond to the various devices:
SAT - controls the satellite receiver
TV - controls the television set
VCR - controls the VCR
AUX - controls one of several additional units, such as a home stereo
The user presses the button of the device to program until the corresponding light on the remote control begins to flash.
2. The user finds the Code
Once the device desired for programming is chosen, the appropriate code for the particular unit is needed.
Codes for most manufacturers and brands can be found in the back of the remote control user manual. Satellite subscribers can also typically go online
to their provider's website and if all else fails, contact the manufacturer of your remote to get the necessary codes.
3. Program the Device
Using the keypad on the remote control, enter the number that's listed first for the device. When this is finished, enter the appropriate key to indicate completion of input. For some remotes, this might be the asterisk (*) while other remotes might use the pound key (#). The mode light on the remote control will flash again and, if the code was correct, the device can now be controlled with the remote control. The user should test the results by turning the power on and off. Does it work? If so, the device is now programmed.
There is no cause for alarm if the code doesn̢۪t work the first time.
Remotes come with several codes for the various device brands. If the first code doesn't work, start over using the next code and the next and the next until the right one is discovered and the device is programmed.
What if the device isn't listed at all? Look through the list for "general" codes. If those codes are not found, then try scanning for the device. The user manual should have specific advice for devices without a listed code.
The problem arises when the viewer is not able to understand the options on the remote control and it becomes useless. DirecTv's remote control can be simply understood if these directions are followed. DirecTV incorporates specific features and special options. A four-position slide switch for easy component selection , code library for popular video and stereo components, code search to help program control of older or discontinued components and memory protection to ensure that the user will not have to reprogram the remote when the batteries are replaced.1. The user chooses the Device
The first thing the user is required to do is choose which device is desired for programming. Most remotes have separate buttons that correspond to the various devices:
SAT - controls the satellite receiver
TV - controls the television set
VCR - controls the VCR
AUX - controls one of several additional units, such as a home stereo
The user presses the button of the device to program until the corresponding light on the remote control begins to flash.
2. The user finds the Code
Once the device desired for programming is chosen, the appropriate code for the particular unit is needed.
Codes for most manufacturers and brands can be found in the back of the remote control user manual. Satellite subscribers can also typically go online
to their provider's website and if all else fails, contact the manufacturer of your remote to get the necessary codes.
3. Program the Device
Using the keypad on the remote control, enter the number that's listed first for the device. When this is finished, enter the appropriate key to indicate completion of input. For some remotes, this might be the asterisk (*) while other remotes might use the pound key (#). The mode light on the remote control will flash again and, if the code was correct, the device can now be controlled with the remote control. The user should test the results by turning the power on and off. Does it work? If so, the device is now programmed.
There is no cause for alarm if the code doesn̢۪t work the first time.
Remotes come with several codes for the various device brands. If the first code doesn't work, start over using the next code and the next and the next until the right one is discovered and the device is programmed.
What if the device isn't listed at all? Look through the list for "general" codes. If those codes are not found, then try scanning for the device. The user manual should have specific advice for devices without a listed code.
Labels:
how to,
procedure,
product,
Program,
Remote Control,
tutorial,
TV. Direct TV
20100914
Stuxnet
Stuxnet is a new piece of malware that is spreading widely through the use of USB flash drives. It is starting to be quite a danger, especially in industrial plants, and many in the security business are getting very nervous. What follows is an FAQ about the Stuxnet malware.
How does Stuxnet spread?
Stuxnet spreads through USB devices. A recently discovered Microsoft Windows vulnerability has been found to allow a program to run just by browsing to a folder that contains a shortcut to it, or a ".lnk" file. Once the worm runs it scans to see if the computer is running software created by a company known as Siemens, which is very popular in certain industries. If this is the case, the worm is able to install itself on the victim computer. It will infect all future removable media that is connected to the computer and installs a rootkit, a very sophisticated type of software that deletes all record of the worm existing on the computer. After that the computer continues to steal as much data as possible from the computer and transmit it back to a remote location.
What does Stuxnet do?
Stuxnet is considered by many people to be the first-ever "control system" malware. What this means is that it has the capability of infecting control systems for large companies and factories that use software created by Siemens. Unfortunately, this software is very widely used, especially in large industrial manufacturing organizations, small and large utilities, and even defense systems. In one case it was found that this software could infect nuclear-powered aircraft carriers.
How widespread is Stuxnet and where is it most common?
At the moment Stuxnet is not that widespread. It is most common in India, Indonesia, Iran, Pakistan, Afghanistan, the United States, and Malaysia, in that order. However, it has the potential to spread very rapidly. It only affects computers running Siemens software, but computers without that software can still act as "carriers," infecting other removable media that is inserted into them. Other countries have seen infections, but mostly they have been localized and have not caused any damage so far.
This is always the big question with a large virus outbreak. Right now Stuxnet is not that dangerous. Unfortunately, it is targeted at "Control Systems." Siemens is most known for making software for sophisticated systems used in such areas as the military, large industrial plants, and utility plants. If any of these were to be infected the damage could be irreparable. The infection is clearly tailored to steal confidential information and possibly shut down "smart grids." Therefore, while it is not a danger to consumers, any large corporation or plant must be very careful to avoid this infection.
How does Stuxnet spread?
Stuxnet spreads through USB devices. A recently discovered Microsoft Windows vulnerability has been found to allow a program to run just by browsing to a folder that contains a shortcut to it, or a ".lnk" file. Once the worm runs it scans to see if the computer is running software created by a company known as Siemens, which is very popular in certain industries. If this is the case, the worm is able to install itself on the victim computer. It will infect all future removable media that is connected to the computer and installs a rootkit, a very sophisticated type of software that deletes all record of the worm existing on the computer. After that the computer continues to steal as much data as possible from the computer and transmit it back to a remote location.
What does Stuxnet do?
Stuxnet is considered by many people to be the first-ever "control system" malware. What this means is that it has the capability of infecting control systems for large companies and factories that use software created by Siemens. Unfortunately, this software is very widely used, especially in large industrial manufacturing organizations, small and large utilities, and even defense systems. In one case it was found that this software could infect nuclear-powered aircraft carriers.
How widespread is Stuxnet and where is it most common?
At the moment Stuxnet is not that widespread. It is most common in India, Indonesia, Iran, Pakistan, Afghanistan, the United States, and Malaysia, in that order. However, it has the potential to spread very rapidly. It only affects computers running Siemens software, but computers without that software can still act as "carriers," infecting other removable media that is inserted into them. Other countries have seen infections, but mostly they have been localized and have not caused any damage so far.
How dangerous is Stuxnet?
This is always the big question with a large virus outbreak. Right now Stuxnet is not that dangerous. Unfortunately, it is targeted at "Control Systems." Siemens is most known for making software for sophisticated systems used in such areas as the military, large industrial plants, and utility plants. If any of these were to be infected the damage could be irreparable. The infection is clearly tailored to steal confidential information and possibly shut down "smart grids." Therefore, while it is not a danger to consumers, any large corporation or plant must be very careful to avoid this infection.
Labels:
computer virus,
how to,
information,
IT Security,
microsoft,
review,
stuxnet,
virus
20100301
Scams, Spam and Facebook?
In this blog, I want to warn you of the dangers of spam and scams.
"Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately."
Spam fills your inbox with offers of cheap meds, cheap sex, cheap travel and all kinds of other stuff. I have to be honest. If I responded to every one of the spam emails I got, I'd be broke. I would have my identity stolen. I would probably have a stock pile of sugar pills and vacation after vacation in the ghettos of Mexico and other places.
What I really want to make you aware of is the scam aspect of spam. Emails with subject titles like "I've got a message for you" or "Is this you?" are just ways to get you to open the mail and read the ad that is inside. This is where the scam aspect of spamming comes in. They hook you with bleeding heart messages like "help Haiti" or "Help Chile." Once you have clicked on the link, your computer is infected with viruses and trojans. They use the information you use to "Donate" and keep your money. The best guideline for spam - dont open email if you don't know who it is from. The "from" part of your mailbox is like the peephole on your front door, if you don't know the person knocking...you simply do not let them in.
Here is where I get to talk a little about the new Facebook scams going on. The newest spam/scam is made to look like it comes from your friends. You get a nice little invite in your message folder from what looks like your friends. The message says "Click here to RSVP." Well, clicking this link takes you to another website that infects your computer. Again the best way to prevent this is to not click on "it." Nine times out of ten, a person will tell you about an event before it hits Facebook. If you don't know about it...don't click on it.
Below are a few guidelines to follow from http://www.usaaedfoundation.org/pdf/572.pdf
How can you have fun online while protecting yourself?
-Do not post information that will identify you, including:
● Your full name.
● Your home address or phone number.
● Your Social Security number.
● Passwords.
● Credit card or bank account numbers.
● Names of family members or friends.
● Your workplace or favorite hangout.
● Names of clubs or organizations to which you belong.
● Historical information that could identify your past residences.
● Do not use a nickname that can be used to identify you (for example, “CharlestonLawyer,” “CindyFromTulsa” or “KyWildcatMom”).
● Never share your account password.
-Protect Your Computer System
● Consider using encryption to protect your personal information.
● Shut down your computer when it is not in use — especially in public places, such as Internet cafes, coffeehouses or airports.
● Keep your antivirus and antispyware programs, other software and operating systems updated to protect against new attacks.
● Consider using a firewall on your system to protect against hackers accessing your system remotely.
● Think about how your e-mail message will be read by others. Do not say anything online that is cruel or may damage someone’s reputation. Doing so puts you at risk of being accused of slander or defamation, or may cause a dangerous escalation of hostilities.
● Do not give out personal information about someone else.
● Do not forward another individual’s e-mail without their permission.
● Never allow anyone to photograph you in an embarrassing or compromising situation.
● Never post anything that would cause you embarrassment or shame. The Internet is the most public of forums — once you have posted a comment, a photo or a video, it cannot be erased or taken back. You cannot control its duplication and it may be used against you.
● Do not send photos of yourself or family members to Internet acquaintances. Photos can be altered and sent to others, and elements in photos — a landmark or a street name, for example — can be used to identify your location.
● Remember that, once posted, the information can be seen by anyone with a computer and an Internet connection: family and friends, employers or potential employers, admissions officers at schools you might like to attend — even police and other law-enforcement authorities.
Following these guidelines and taking to heart the information I have written about are just small steps that will have a huge effect on keeping you, your computer and your family safe from Scams, Spam, and Facebook.
"Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately."
Spam fills your inbox with offers of cheap meds, cheap sex, cheap travel and all kinds of other stuff. I have to be honest. If I responded to every one of the spam emails I got, I'd be broke. I would have my identity stolen. I would probably have a stock pile of sugar pills and vacation after vacation in the ghettos of Mexico and other places.
What I really want to make you aware of is the scam aspect of spam. Emails with subject titles like "I've got a message for you" or "Is this you?" are just ways to get you to open the mail and read the ad that is inside. This is where the scam aspect of spamming comes in. They hook you with bleeding heart messages like "help Haiti" or "Help Chile." Once you have clicked on the link, your computer is infected with viruses and trojans. They use the information you use to "Donate" and keep your money. The best guideline for spam - dont open email if you don't know who it is from. The "from" part of your mailbox is like the peephole on your front door, if you don't know the person knocking...you simply do not let them in.
Here is where I get to talk a little about the new Facebook scams going on. The newest spam/scam is made to look like it comes from your friends. You get a nice little invite in your message folder from what looks like your friends. The message says "Click here to RSVP." Well, clicking this link takes you to another website that infects your computer. Again the best way to prevent this is to not click on "it." Nine times out of ten, a person will tell you about an event before it hits Facebook. If you don't know about it...don't click on it.
Below are a few guidelines to follow from http://www.usaaedfoundation.org/pdf/572.pdf
How can you have fun online while protecting yourself?
-Do not post information that will identify you, including:
● Your full name.
● Your home address or phone number.
● Your Social Security number.
● Passwords.
● Credit card or bank account numbers.
● Names of family members or friends.
● Your workplace or favorite hangout.
● Names of clubs or organizations to which you belong.
● Historical information that could identify your past residences.
● Do not use a nickname that can be used to identify you (for example, “CharlestonLawyer,” “CindyFromTulsa” or “KyWildcatMom”).
● Never share your account password.
-Protect Your Computer System
● Consider using encryption to protect your personal information.
● Shut down your computer when it is not in use — especially in public places, such as Internet cafes, coffeehouses or airports.
● Keep your antivirus and antispyware programs, other software and operating systems updated to protect against new attacks.
● Consider using a firewall on your system to protect against hackers accessing your system remotely.
● Think about how your e-mail message will be read by others. Do not say anything online that is cruel or may damage someone’s reputation. Doing so puts you at risk of being accused of slander or defamation, or may cause a dangerous escalation of hostilities.
● Do not give out personal information about someone else.
● Do not forward another individual’s e-mail without their permission.
● Never allow anyone to photograph you in an embarrassing or compromising situation.
● Never post anything that would cause you embarrassment or shame. The Internet is the most public of forums — once you have posted a comment, a photo or a video, it cannot be erased or taken back. You cannot control its duplication and it may be used against you.
● Do not send photos of yourself or family members to Internet acquaintances. Photos can be altered and sent to others, and elements in photos — a landmark or a street name, for example — can be used to identify your location.
● Remember that, once posted, the information can be seen by anyone with a computer and an Internet connection: family and friends, employers or potential employers, admissions officers at schools you might like to attend — even police and other law-enforcement authorities.
Following these guidelines and taking to heart the information I have written about are just small steps that will have a huge effect on keeping you, your computer and your family safe from Scams, Spam, and Facebook.
Labels:
computers,
facebook,
how to,
information,
information technology,
IT Security,
phishing,
spam,
viruses
20100212
You Tube Download
I created a tutorial using the new windows Problem Solving Recorder. This video shows you how to use the YouTubeVideo Downloader program to download video from youtube.com to your computer. Check it out, Download the zip from here http://www.mediafire.com/?j1mtzgw2nym
20100208
Malware! What is it? How can I Fix it?
Malware, you may have heard the term but not know exactly what it is. Malware is exactly what its name suggests, malicious software. Malware creeps into your computer usually without your consent or disguised as something completely harmless. Malware tries to hinder the use of your computer by stopping the use of legitimate programs like antivirus and firewalls. Malware can enter your computer through many means, one of the most popular ways is through file sharing P2P programs that connect to the guentilla network (ie: Limewire, BearShare, Etc). When you download your favorite song, (like no one really does, right?), a small bit of code can be attached to that sound file and ultimately install itself onto your computer. The type of malware that slows your computer down and hinders your use is only one kind of malware. Another type is Scare-ware, this is my favorite type. Scare-ware does just that, it scares you into buying a false program with false warnings. Scare-ware tells you that you have infections on almost every file you try to run. It scares you into thinking you’re at risk. Anti-Virus Pro and Antivirus 2008/2009/2010 are prime examples of scare-ware. As a computer tech, I can tell you that it’s costly to get rid of and downright annoying.
One of my favorite programs to use is Malware Bytes Anti-Malware. This program works wonders and the free version is amazing if you know you’re already infected. Malware Bytes offers quick and full scan capabilities. “Quick scanning” scans all of the processes and files called currently into memory and determines if they are infected. “Full scanning” scans all of your files and registry keys to seek out the bad malware. When an infection is found, Malware Bytes gives you the option of deleting or leaving the file (as a tech tip…just delete the file). Personally, I’ve even seen Malware Bytes take out the nasty polymorphic virus VIRUT. I suggest trying the free version and, after falling in love with it, go ahead and buy the full version. Buying the full version unlocks real-time protection, scheduled scanning and scheduled updating.
Another new tool that is out is Microsoft’s Security Essentials. I have played around with it, and I’ve seen it catch a few nasty worms and viruses that other software is not finding.
I once used Adaware, as I know most of you have heard of and use. I find Malware Bytes to be faster and more reliable.
Please leave comments if you have any questions, comments or concerns.
Malware Bytes Anti-Malware can be downloaded at http://www.malwarebytes.org
Microsoft Security Essentials can be downloaded from http://www.microsoft.com/Security_Essentials
One of my favorite programs to use is Malware Bytes Anti-Malware. This program works wonders and the free version is amazing if you know you’re already infected. Malware Bytes offers quick and full scan capabilities. “Quick scanning” scans all of the processes and files called currently into memory and determines if they are infected. “Full scanning” scans all of your files and registry keys to seek out the bad malware. When an infection is found, Malware Bytes gives you the option of deleting or leaving the file (as a tech tip…just delete the file). Personally, I’ve even seen Malware Bytes take out the nasty polymorphic virus VIRUT. I suggest trying the free version and, after falling in love with it, go ahead and buy the full version. Buying the full version unlocks real-time protection, scheduled scanning and scheduled updating.
Another new tool that is out is Microsoft’s Security Essentials. I have played around with it, and I’ve seen it catch a few nasty worms and viruses that other software is not finding.
I once used Adaware, as I know most of you have heard of and use. I find Malware Bytes to be faster and more reliable.
Please leave comments if you have any questions, comments or concerns.
Malware Bytes Anti-Malware can be downloaded at http://www.malwarebytes.org
Microsoft Security Essentials can be downloaded from http://www.microsoft.com/Security_Essentials
Labels:
computer,
computer virus,
how to,
infections,
information technology,
legal,
malware,
review,
tutorials
Subscribe to:
Posts (Atom)