This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 3851. |
Solve : XP and 7? |
|
Answer» Hi GUYS! I'm thinking of getting Windows 7 but XP has worked so well that I'm just not sure. I have heard of people setting up more than one OS. Is this done by partitioning a piece of my HDD? Hi guys! I'm thinking of getting Windows 7 but XP has worked so well that I'm just not sure. I have heard of people setting up more than one OS. Is this done by partitioning a piece of my HDD?If you're happy with XP, don't tempt fate by upgrading I recently expressed my skepticism that Windows 7 was as great as purported, to the ire of many of the other members. It seems that everything I have read says it's pretty good. So, I plan to give it a try pretty soon, and hope it's as good as they say.It's as good as advertised... Probably the best product out of Redmond since Win2K...which i still run BTW...Quote from: patio on March 26, 2010, 07:27:51 PM It's as good as advertised... awww.... don't remind me of the embarassing launch party. We all painted our chests to spell Win2K and then the 2 had this weird disorder where he ended up making a 2 that looked like a y and then he was on the wrong side of the k,... oh it was so embarassing. Anyway, re: win7, I find the new UI management features as well as the taskbar stuff (grouped windows show little stacks, and two of the same window will be "joined", and the Aero thumbnails that Vista had are quite well expanded. the added 1 to the minor version is well deserved. IMO windows 7 is to Vista what XP was to 2000; largely a new skin on top of the same old wolf inside the same old sheeps CLOTHING. It's still a wolf inside, but the wool is fluffier, or something. BC i usually agree with you... However that being said i find Win7 to be not only more functional than Vista but far superior... If you want to label it as Vista Wolf in a new sheeps clothing i won't argue...but i won't agree either. There Should Be Something In W7 That It Is Made After XP (It Should Be Better Points In W7) Quote from: the_mad_joker on March 27, 2010, 11:50:34 PM There Should Be Something In W7 That It Is Made After XP (It Should Be Better Points In W7) Um... what? Quote from: patio on March 26, 2010, 08:09:35 PM BC i usually agree with you... Actually, I had a thought- I've had it on my laptop for quite some time, but I hardly use my laptop. Now that windows 7 is on my desktop I'm sure I'll eventually see more then just the great improvements over the features that Vista had; so far one of my favourites is the way the Search bar actually clears the right column of the start menu so there is more room horizontally, etc. the API landscape hasn't changed a whole lot from Vista, 7 does add a lot of features but I would have to write a type library to use them and I don't really think it's worth the effort yet. My metaphor was badly chosen to mean what I intended; From a developer's standpoint, the changes are quite comparable to similar API changes from Windows 2000 to windows XP; Basically, so far, all I've seen is icing. Now, everybody loves icing... In fact, a good cake icing. But a cake also needs... well, cake. Windows 7 delivers that as well to end users (new wizards and control PANEL features, the Action Center, and many other such features, as well as to developers, Since, as Noted, they add a of new APIs, for things like DIRECT3D and DirectWrite and DPI awareness and several others. |
|
| 3852. |
Solve : Microsoft Word 2002 gray corner indicators? |
|
Answer» Ever since I reinstalled Microsoft Word 2002 there are gray corner indicators in all four CORNERS of the page. Is there any way to turn them off. They were never there before I reinstalled. Please SEE picture here: |
|
| 3853. |
Solve : Intel DP55KG? |
|
Answer» I took my computer to a repair shop and they lost the driver disk. Where could I GET the original disk from the company? Pretty hard to DETERMINE that with the amount of info provided...Most likely, you can't get the original disk. HOWEVER, you can download the drivers you need from Intel's website. |
|
| 3854. |
Solve : photo editing online? |
|
Answer» is there a on line photo editing SOFTWARE PROGRAM out there just to play with a photo. |
|
| 3855. |
Solve : booting a program from a thumb drive? |
|
Answer» Is it possible to install PHOTOSHOP on a THUMB DRIVE and boot it from there, so it can be easily moved from machine to machine without having to UNINSTALL and reinstall?NoHowever, this MIGHT be a good alternative, one that can be run from a flash drive; http://portableapps.com/apps/graphics_pictures/gimp_portableFaststone has a portable version, too. |
|
| 3856. |
Solve : CHANGING FILE FORMAT? |
|
Answer» I have been trying hard to change an MPG4 music file to an MP3 or WMA format. What I want to do is be able to burn the file onto a CD to be able to play it in standard CD players. I haven't been able to figure out which conversion software to use and which format to convert to. All attempts have been unsuccessful so far. Any suggestions? |
|
| 3857. |
Solve : Encryption Lock Out? |
|
Answer» Have been successfully using StorageCrypt encryption software to protect data on a portable WD 1 terabyte HARD DISK for more than a year. Recently, a power failure caused a line spike that shut down the system that it was attached to. After that the password to the WD disk failed to work. Tried all the obvious methods to make it respond with no SUCCESS. StorageCrypt support has been useless, maybe because he has no way of knowing whether I'm a HACKER or a legitimate user. There is valuable data on that disk that I would prefer not to lose, but if it is necessary, I would ACCEPT re-formatting so I could, at least, recover the use of the hardware. All attempts to recover or format have been unsuccessful because the encryption prevents the system from recognizing the drive. Does anyone have a fix for this? |
|
| 3858. |
Solve : Remove Vista and install XP on laptop? |
|
Answer» My wife has an Acer Extensa 4420 with Vista on it, and I wanted to remove that and install XP 64. I have all of the drivers from Acers website, and the XP disk is an OEM I bought a while back. OEM...that may be the hangup. What exactly does it say on the CD ? ?I appreciate the reply and the advise. Could I go with Win 7 if I bought that with no ISSUES? I hate Vista and my wife isn't a fan either. If it must stay, no biggie. After the re-install, it's actually much better. Thanks.Have you given up on installing XP then?Quote from: patio on March 22, 2010, 08:05:28 PM OEM...that may be the hangup. Not sure what it says exactly. The wife is in bed and it's dark, so I'll find it tomorrow and post what it says on it. I thought it was just a standard XP disk. I'll let you know. Thanks.Quote from: JJ 3000 on March 22, 2010, 08:13:53 PM Have you given up on installing XP then? No, not if I can find a way for it to install, lol. Thanks.Just to UPDATE, the disk says Microsoft Windows XP PROFESSIONAL x64 Edition. I bought it a while back for a PC I no longer own. Any reason why this wouldn't install on the Acer Extensa 4420? Thanks for the help.Some Acer machines will only let you install with an Acer CD... Contact them...they will probably send out a new one for the cost of shipping. Best of Luck.Ok. I'll contact them and see what they can do. Thanks a lot! |
|
| 3859. |
Solve : Can I configure Outlook to send, but not receive, email?? |
|
Answer» I work as a part time administrative assistant for a professor at a University. In the past, he has sent and received his University email through Outlook, and his administrative assistants have sent, but have not been able to receive/read his email, through a Eudora account on a SEPARATE computer. Our university made major changes to the network this past WEEK, and Eudora no longer works in this capacity, and the campus IT people state that we can no longer use Eudora, and that it's not possible to use Outlook in this capacity. By Michael Palamountain, Enex TestLab on February 25th, 2009 The university may wish to consider IBM Lotus Notes. http://en.wikipedia.org/wiki/IBM_Lotus_Notes Quote Notes/Domino is a cross-platform, secure, distributed document-oriented database and messaging framework and rapid application development environment that includes pre-built applications like email, calendar, etc. This SETS it apart from its major commercial competitors, such as Microsoft Exchange or Novell GroupWise, which are generally purpose-built applications for mail and calendaring that offer APIs for extensibility. Quote from: Geek-9pm on March 23, 2010, 10:57:30 PM If members of the institution take matters into their own hands, the result will be e-mail anarchy.Are you saying the professor is trying to "take matters into his own hands"? I don't see anything odd about a faculty member expecting to have some privacy in their email. Indeed, I believe that's the normal situation. Or, are you saying kaley is take matters into her own hands? I don't see that either. She's just questioning the validity of what the IT dept. has said. I think I'd also be questioning it; it doesn't smell quite right. Quote from: Geek-9pm on March 23, 2010, 10:57:30 PM The university may wish to consider IBM Lotus Notes..I don't think that's necessary. They already have Outlook, which means all staff members also probably use Microsoft Office. I don't believe Lotus Notes offers any substantial advantage over Outlook used along with an Exchange server. kaley, perhaps you could discuss this with administrative assistants in other departments and see whether they do things the same way as in your department and whether they also take issue with the new system implemented by the IT dept.soybean, My suggestions were meant to encourage them to work together to find a common solution. The IT department needs to be transparent to the users. This is not a business with a strong central authority, it is an university with much diversity in concepts, methods and practices. It may be necessary to get a new IT manager if he does not understand the issue here. It is not about fining a solution that he likes, it is about finding a solution to SATISFY the needs of the greater number. On the other side, there are some IT people not happy with the limitations and quirks of the Microsoft e-mail client and server. Maybe they are right. EDIT: As to the original question, Yes, Eudora can be the POP client and the SMTP can be done with Outlook . Or that is what this article seems to say: Eudora Changes Default MailTo Handler It offers a Registry change so that EUDORA is no longer does the SMTP. I do not know if this works. There also may be other possible solutions listed in a Google search for "EUDORA OUTLOOK". It seems many users have similar problems using the two together. Quote This is not a business with a strong central authority, it is an university with much diversity in concepts, methods and practices. What is this supposed to mean ? ? Do you work for that University ? ? |
|
| 3860. |
Solve : utility and program? |
|
Answer» HELLO what id the DIFFERENT between PROGRAM, utility and portable thanksThe spelling. |
|
| 3861. |
Solve : Office Excel Formulae? |
|
Answer» Does anyone know how to get Excel to reference text as a value e.g. So that I can type 'Value_1' in cell A1 and have cell B1 return the number assigned to that text. Nearly what I'm after (sorry it was late and I was tired last night whilst trying to post the question). I need letters (text) to represent numerical data, but I want to keep the text entry displayed. So I want 'V1' to represent 2 but still display 'V1' in the cell. formula: =VALUE(RIGHT(A1,LEN(A1)-1)) this will get the "number" from A1, ignoring the first letter, so V1 becomes 1, V2 becomes 2, etc. No no, the V1 was just my example tag name. The values will be initials in the spread sheet that I'm working on, so no numbers. Just a thought here, is it possible to CREATE a SUM at the end of the row that recognises the initials as numbers (I don't know how it would work but) e.g. =SUM(A1:D1) IF AB= 2 IF AC=3, etc. Basically what I'm asking is can Excel do algebra? (If not then the Values for the initials are stored in a little table to one side of the main) |
|
| 3862. |
Solve : How do I know size of email before I try to download it?? |
|
Answer» I use a dial up connection and consequently it pays to receive as short email messages as possible. I have been GETTING an email lately that must contain a video or something to take a long, long time to download. I use Outlook Express 6 and my question is this. How can I know beforehand how big a message is so I can REFUSE the huge ones and not commit to downloading them. |
|
| 3863. |
Solve : One website will not load when all others will? |
|
Answer» haha, they all SAY my site is worth 0.00 dollars, hahaha, probably because they have no data on it. |
|
| 3864. |
Solve : VBScript not working? |
|
Answer» I'm using a real basic sendkeys script to create a new file within a program I use on a regular basis. When I first created this script it worked perfectly the first 2 or so times I tried clicking on the icon. Then I tried playing around with creating a shortcut with a combination hotkey that just wouldn't work for me. I deleted the shortcut but now the orginal scripts will not work. I tried creating a new one with the same code but still won't work. http://msdn.microsoft.com/en-us/library/8c6yea83%28VS.85%29.aspx Okay after reading the link you posted that makes sense..... but it's still not working when I double click on the .vbs file, however, when I create a batch file to run this vbs file it works and that's all I really care about because I will be running 3 scripts total from the batch file. THANKS for the link. Looks like I'll be doing some reading on that today. BC - sometimes the file works and sometimes it doesn't. Without actually being here to see what is going on do you have any ideas on why it doesn't enter that string of keys correctly? This happens whether I'm clicking on the actual .vbs file or if I use the .bat file I created. Code: [Select]set wshshell = wscript.CreateObject("wscript.shell") wshshell.AppActivate "Point" WshShell.SendKeys "%fnlp" There was a sample script on the link you posted that had "Sleep 100" in the code. I'm assuming this some kind of pause maybe in mili-seconds. Do I NEED to have some sort of pause inbetween each keystroke?Quote from: Medaitor on March 20, 2010, 10:30:46 AM There was a sample script on the link you posted that had "Sleep 100" in the code. I'm assuming this some kind of pause maybe in mili-seconds. Do I need to have some sort of pause inbetween each keystroke? you MIGHT want to pause between activating the application and sending the keys, to MAKE sure they all go to the application.Okay that seems to be working now each time I use the script. Thank you! |
|
| 3865. |
Solve : problems with ripping DVD to PC .. HELP!? |
|
Answer» im gonna die any minute if i DONT get this fixed.. |
|
| 3866. |
Solve : Excel 2007? |
|
Answer» I use Excel but I am a total novice when it comes to this program. I've asked this question, worded in many different ways, of the Excel ?HELP program and haven't had answer. So, after exhausting other avenues, here I am! I have an Excel Document of 108 lines (rows) and I would like to double space between the rows. How do I accomplish this without having to insert a row one by one throughout the whole document? Why do you want to double space? So that I can have space to make written notes under each item on my paperwork when my computer is not handy.The easiest thing to do would be increase the height of the rows, but leave the font the same. Highlight the entire range then format, row height, and change it to what ever you want or need to make notes.Thank you. I will try that. If you will have to do this over and over again with other excel documents of the same nature versus this one time then I BELIEVE you COULD create a macro. Once you record the macro while the manual steps the first time it will do all of the work for you the next time you need it by simply running the macro in the next document. Thank you for your followup. I am not familiar with working with MACROs as in previous years I had read WARNINGS about working with MACROs and had therefor steered away from them. But, I will look into your suggestion as I can see further need for this type of format down the road. |
|
| 3867. |
Solve : WVC1 codec? |
|
Answer» WVC1 codec |
|
| 3868. |
Solve : Outlook 2003 Title/Header? |
|
Answer» Recently I received an e-mail and when I printed same the 'subject' reference appeared as a Title/Header ALSO at top of page . Can ANYONE help in how you set-up this as thought it a good idea. |
|
| 3869. |
Solve : subtitle program? |
|
Answer» hi,my names hossien hi,my names hossienIn other words, you want software that can automatically translate to English, from a film PRODUCED in a different language, and add the subtitle (which means English text translation of what's being said in the FOREIGN language). Is that correct? |
|
| 3870. |
Solve : media player help? |
|
Answer» I have media player clasic home and in options under Formats you can pick all the formats you want it to play. |
|
| 3871. |
Solve : The Definitive Best Anti-Virus Thread? |
|
Answer» I had no idea that Neil Pert wrote the lyrics for Rush. I just always thought that he was an awesome drummer. For some reason I had always assumed that Geddy wrote most of the songs. Quote from: Allan on February 09, 2010, 08:31:31 AM I'm sure there are a few good free AV's, but I personally cannot recommend any. I simply feel that anti virus protection is the single most important app you can have on your system and I'm a firm believer that you get what you pay for. I would never consider skimping on AV software. If you can afford $50 for the latest computer game you can certainly afford $30/year to protect your system.Complete opposite for me. I can't recommend licensed programs when there are free alternatives available that are just as good, sometimes better. Money doesn't make a program any better; all you are paying for is the support or a couple of extra features. You're not paying for a more inclusive database. Also, there is no such thing as the "BEST" anti-virus. They all do something different and every anti-virus has infections it misses that another would be able to find. I don't have a big handful of different programs just for the novelty of it; I have them because a backup is necessary, regardless of which scanner you use. Therefore, the "best" is a matter of which program has certain features you like or which one has an interface that fits your style. That's why when somebody wants to know which program they should use, I prefer to direct them to a list and tell them to pick one.I'd just use one that has a decent detection rate, updates every day and you're comfortable with. There is no 100% failproof AV out there.Quote Money doesn't make a program any better; all you are paying for is the support or a couple of extra features. You're not paying for a more inclusive database. Additionally, if somebody needed that whole "you get what you pay for" feeling, most Free AVs also have paid versions. Of course, the only difference between the paid and free versions is the support and a couple extra features, for the most part. The very reason I don't use an AV solution myself is simply because of the very "reverse pigeonhole principle" that you've described; they all do something different, and there is always something that will get through- for those "holes" the best defense is simply a knowledgeable user. The only way to be truly protected would be to have multiple Anti-Virus products installed, whereby one AV's "Pigeonhole" is covered by another, and vice versa. This of course doesn't work, since the AV products simply stomp on each other for everything else. I might also point out that the very PREMISE of AV comparing is somewhat flawed- all it tests is the AV vendors ability to update their virus database as well as the flexibility of that database to describe new viruses; the fact is, once a virus is detected by most major AV products, it's no longer a "threat". The reason any virus becomes prevalent is simply because the AV products don't detect it. an AV program works rather simply- wether it is "on-demand" (in the now prevalent sense of the word meaning the user is starting it, rather then the traditional sense where it is run when there is a demand for scanning (ie. opening a file), but I digress) or in the background, an AV scans a file in a rather simple manner. First, of course, it opens the file. Now, this is where a problem can already arise. What if another process has it open? What about security restrictions? I'm sure we've all been encountered with the "the file is in use" dialogs when deleting or MOVING a file. Even with the most basic of settings, such as simply reading the file, a virus can easily mess about with the ACL of a file it creates to prevent anybody from reading the file at all, but still allowing the file to be executing, thereby nullifying the whole goal of the AV product. Of course, now most AV's have a kernel mode driver that forces a "dismount" of sorts on the file- that is, closing every open handle to the file. The problem here is of course two-fold, first, it doesn't actually change the ACL of the file- if the ACL was set to Read and no execute, then the AV still will not be able to read it, and second, it can cause difficult to diagnose errors in other applications when their files handles are suddenly invalid. Now, in order to combat the first issue, AV products often place their detection logic in kernel mode, where it has complete access to anything, including the ability to change file permissions (I think it can be done in user-mode, too, but I'm not sure), either way, a lot of AVs have their detection logic in kernel mode. Now, this appears to solve the problem, but really, it introduces a far larger, and more malevolent one. Recall of course that a AV program scans files by essentially reading the file and comparing it using various heuristics to the signatures in it's database. This is sensible. However, when running in kernel mode- any crash will give the user a blue-screen- and since the AV is dealing with potentially malevolent code in the form of data, a virus writer could use all sorts of tricks to force the AV to crash for any number of reasons. On the other hand, what crashes one AV will probably not crash another- therefore the whole "reverse pigeonhole" concept rears it's head once again. In fact, it is this very principle that makes AVs as effective as they are; a malware writer is not going to, for example, write pages of extra code just to circumvent detection on some rather unpopular virus program- it's not worth the effort. The main problem with the very concept of software based malware detection is just that- it's software based. Software is of course designed to make well-defined tasks easier, but defining what is and is not malware is a very difficult thing to do. Consider for a moment what would happen if our standard court judges were replaced by software of some form, and you have an idea what I mean. Basically, it's a problem set that is only partially incalcable. No AV product can filter out the "criminal" code from the not-guilty, for the same reasons a software based implementation of a judge or jury wouldn't work- it's a defined ruleset. a Jury/Judge obviously runs through the same sort of logic when faced with deciding wether an alleged criminal is guilty, or innocent of a crime. however, it's important to note that when dealing with the "big time" offenses, the decision is not made by a single person, but by a group of people- in a sense, a group of "criminal detectors" whose various life experiences and intelligence combine to, ideally, properly determine the guilt or non-guilt of an offender. PERHAPS an "ideal AV" would follow the same set of rules- rather then using a single set of rules and hueristics, run the possibly malicious code through a number of tests by various companies. Of course, this implementation has a number of huge problems which are why it hasn't been implemented in the first place. The first issue is of course Company co-operation- why put in for a slice of pizza when you can go for the whole box? Another, and perhaps even more derisive issue with this method is simply the time it would take to do so- jurors, for example, are often coming to a verdict for days, and in some cases will even get hung, at which point it might become a ranking system for an AV system of the same form- which brings us right back to AV rankings and where we started to begin with. Additionally, with on-demand scanning, even with the additional speed of a computer a "judgement" will not be made in a reasonable amount of time. Which brings us to the real reason AV programs are not as effective as could be- it's simple- Performance. It has been noted on several occasions that the later versions of an Anti-Virus are often more "bloated" and "slower" then previous versions. UI changes aside, this is often the case for good reason. As the par for the course of Computer hardware moves up, the speed with which a AV has to work with does as well. most AV vendors take advantage of this extra speed- often unwittingly, as their application may simply not be tested on older hardware at all). The fact is, a "perfect AV" is not something that can ever exist. And even the term "definitive best" is rather uncongenial; I mean, the very fact is a metric cannot be suitably established to determine with any amount of granularity when one AV is better then another- if one AV has a bigger database, for example, it's rather meaningless for several reasons- for example, many AV databases include signatures for all sorts of ancient and long annihalated Viruses like "Stoned" and "Michelangelo" this analogous to innoculating children, not for diseases they can get, but rather things like Smallpox or Polio or the Black Death or Cholera; which, while not completely eradicated, can generally be easily treated if contracted (or in some cases, the antibodies are given to them by their mothers anyway). So, while the one AV A has a larger database then AV B, AV B having a "innoculation" for the latest "supervirus" is going to do a whole lot more for them then having "innoculations" for otherwise eliminated viruses. Adding to the confusion is of course the concept of hueristic detection- since all AVs use a different algorithm, they can of course come up with widely varying "diagnoses" on any number of infected (or even benign or nonexistent) viruses. Add to this the fact that analyzing code paths and branches and trying to use this determine wether a file is "good" or "bad" on a boolean scale is rather optimistic; any number of applications, for example, access Software\Microsoft\Windows\CurrentVersion\Run and related keys, and yet there was a time where all applications accessing this key were labelled as keyloggers- the rule was apparently that any file containing that string was malware, and additionally a very specific form of malware that amounts to nothing more then a shot in the dark. (this was Mcaffee some number of years ago, btw). To make things worse the fix was simple- I simply reversed the string. if I can reverse a string and turn a evil keylogger into a harmless program according to an otherwise popular AV program then the malware writers who create the very thing the detection is supposed to find can do so as well, creating an essentially useless database entry that only serves to add to their little spikey bubble on the their product box/advertisements <>. returning back to the main issue of AV detection- speed. Now, from what I can tell- the rules of AV detection are pretty much this- you can either have speed or you can have accuracy. I'm sure with 24 hours to think about it an AV heuristic algorithm could determine with nearly 100% certainty wether a given file is a virus, even for those sneaky viruses that haven't been discovered. but people want to use their computer, not watch the hourglass for hours after every file access, so AV vendors have to compromise. In all honestly, I think many of them have done a bloody fine job of compromise; there is of course a performance hit on every file access, simply because there is extra code running, but the AV vendors have largely made it something that is short enough that it isn't even noticable, which is rather amazing. Now, if course, it is because of this need for speed that any AV program has holes. It's not because they detect every possible piece of code, it's because they can't do it in a reasonable time frame and with 100% certainty that makes using them almost like playing a game of pinata without a pinata. Eventually you realize there isn't one and get pissed off at your friends. What I mean is, it's only a matter of time before a virus slips by- and at that point who do you blame? The very reason I don't use an AV is simply because it gives you a false sense of total security; you think, well, there's only this little tiny hole in my shield... but meh, nobody has a sword small enough to fit through. The problem is of course that you are eventually going to fit somebody using a foil and then you're screwed. This "eventually" factor is also important. a user who uses their PC maybe an hour a day is far less likely to meet the virus with a foil then the user who doesn't, in the same way a person who downloads a good number of files is far more likely to install a trojan by accident then somebody who only looks at recipes online. Lastly- it doesn't matter HOW effective an AV is if the user doesn't care. a user, regardless of their AV, needs to be informed of some basic "rules of the internet" you cannot just slap on some so-called "definitive best AV" and assume they wil lbe fine- they need to have some basic education. So- any "definitive best" AV will have as part of it the user- and since the user is part of the formula, the variable that results when you solve the "equation" may bring out a different AV as the "best" for different people. Myself- when I want to judge a User interface blindly- I just imagine my mother using it. Now, some of you may be under the impression that my mother is probably some sort of Cobol goddess or something. The truth is, in fact, that she can't even use a mouse... (actually, wait, that would fit the Cobol Goddess theme.. .*censored*). Anyway- she fits the profile of a total newbie to computers and the internet in general. For example, Firefox is not firefox, but rather her "facepage" and of course she cannot and will not connect her camera to any computer, because the moment you connect it to a PC every single picture is put onto a web page (regardless of what I, somebody who knows what they are talking about for the most part, says). Since the User is such a critical component of the equation, it's important to factor in the User interface of the Anti-Virus solution that they are coupled with. In my experience, AV programs often make "alerts" regarding viruses scary and full of technical jargon, often with cute little pictures of viruses. They do this when the program updates as well. when my Mother was using my brothers computer, the AV updated; and displayed it's little "update" dialog. the dialog included the VERY SAME "scary" virus image (this was ages ago, with AVG) that is shown when a virus was detected. She was terrified that she somehow got a virus onto his computer or something. Not to mention the very hopelessness the image sent- she was even saying "I hope I didn't infect it, we can't afford to buy him another one" and other such talk. While one can simply say this is simply user newness to the entire computer scene, it's important to realize that AV programs are not simply marketed to the technical elite, they are also marketed towards people who have never used computers before and therefore really have no idea what an Anti-virus program does or how it works- all they know is that they "need" one because everybody says they do. This isn't to say that they don't, of course. Really, I'm pointing out that simply saying for them to use "X program" as their AV solution is more software evangelism then it is a proper recommendation, simply on the grounds that the AV and the user are both part of the package; they need to work together. if the user is scared of the user interface presented, they may simply click the "X" button (which, in the case of that version of AVG, was for some reason mapped to "ignore") so even THOUGH AVG was detecting the viruses, nothing was being done to them simply because of the user. To summarize- the user is part of the AV, in a sense that without a well-informed user, a AV simply may not be able to do it's job of eliminating and preventing virus infections. It is pertinent to educate users about viruses, and malware in general as well as how an AV works in order for it to be fully effective. And yes, there are a number of users who could care less about how a PC works, or whatever, and consider it a tool. Well I think they're full of it. First off, not all tools are intuitive. you don't grab a belt sander and instantly know how to use it and the various types of sandpaper and their ideal uses- you learn those things. Even a simple hammer has a learning curve where you gradually reduce the frequency of a smashed thumb. The people who think that a "tool" shouldn't require any sort of education are the same people who think they can dry off their cat's in the microwave.Hello, BC; That was a good one. You've covered all the main areas and all the main flaws of the whole anti-virus concept. So then, if we were to define perfect as being 100% effective, or even downgraded to being 99% effective, we must conclude there is no perfect AV. And if there is, they have not let the world know about it yet. So then, the question remains - 'W what is the ideal solution to this wide spread problem?' The obvious answer is to use a communication system that is not subject to virus attacks. That would mean having a communication system that does not allow the message to modify any device that receives the message. Is that possible? Maybe it's not possible with a software based system. Perhaps it would have to be a strict hardware only system that never is modified during its lifetime. However, that would not be the end of our problems. Oftentimes the purpose of these Mal-ware attacks is to persuade us to spend money on something we do not need. Or in some other way create a fraud by means of a software attack. Well, fraud, deception and dishonest gain were here long before the Internet and long before software came to exist. So then, even a 'perfect' solution would not really work at all. As you well put it, the best protection is the knowledge, skill and understanding of the user. We have to use our wits at all times to protect ourselves and our loved ones from those hard, cruel and vicious creatures that are sometimes called humans, but are, in effect, sons of Satan.Quote So then, the question remains - 'W what is the ideal solution to this wide spread problem?' The obvious answer is to use a communication system that is not subject to virus attacks. That would mean having a communication system that does not allow the message to modify any device that receives the message. Is that possible? Maybe it's not possible with a software based system. I think changing the communication system would be just as difficult; the main way people get infected is through otherwise legitimately requested downloads that contain trojans. In the same fashion, we cannot blame the post office if somebody sends us hate mail or a letterbomb or something- they were just doing their job- the same job that will be performed by any communication protocol chosen for internet communication- to deliver the message. It is not necessarily the underlying architecture that needs to be changed, it is the social and economic conditions that make using such architecture to perform illegal activities so appealing and/or profitable that needs to be changed- and the reality is that isn't going to happen soon. In effect, a "AV" is really analogous to a device that one can use to scan their snail mail for "malicious" stuff, like bombs. Of course anybody can recognize a dynamite shaped envelope that makes a distinct ticking noise, but not everybody is a bomb expert, in the same fashion that not everybody can detect the signs of a malware infection or an attempt at such infection. Quote Perhaps it would have to be a strict hardware only system that never is modified during its lifetime. This is reasonable at first glance, but has implications that it would essentially set us back quite a number of years; additionally, the costs of converting what we use into hardware components has additional costs that would simply make it uneconomical; if, for example, Windows was distributed via a "plugin" chip; how would security updates be performed? It opens up quite another can of worms; sure, the chip can be flashed, but then again, anything could flash it- an otherwise harmless bit of data could trick the OS (via the flaw) into running it as a program and then flash itself into the ROM, making itself a otherwise permanent resident of the hardware device. Of course such issues can be partly averted with a "actual" ROM chip solution, but in such a case updates will be relegated to the area of expertise involved with swapping out actual components. No, the very power that is given to us by the Computer comes from it's programmability via software; remove that, and your left with a lump of silicon, gallium, and traces gold. Quote However, that would not be the end of our problems. Oftentimes the purpose of these Mal-ware attacks is to persuade us to spend money on something we do not need. Or in some other way create a fraud by means of a software attack. Well, fraud, deception and dishonest gain were here long before the Internet and long before software came to exist. So then, even a 'perfect' solution would not really work at all.Yes, exactly- and that is partly what I was driving at with my numerous real-world analogies (my favourite being the shield and foil one). Snake Oil salesmen and various other ill-meaning people will use whatever medium they can to deliver their message; it is simply the nature of e-mails fast delivery and cheapness that makes it such an economical option for them. Whatever the case- the cure is as simple as it was when they were pitching their wares on soapboxes; ignore them. Once you respond to them- in the case of the real-world salesman, you are opening yourself up to an exchange of dialogue that may convince others that the product is genuine, or even yourself. I nteh case of spam, you are simply exposing your address as "live". The sad part is that while Common sense could, in most cases, decry the traditional Snake Oil Salesman, the fact is that nowadays Common sense is one of the most uncommon forms of sense; and the fact that they can deliver their message to thousands, even millions of recipients in the time it would take them to give a single salesman spiel on a soapbox is one of the reasons it has become so lucrative. In many ways, AV products (I should say, Anti-spam products )are a sort of "anti-snake-oil snakeoil" that just, by chance, happens to work some of the time. Quote As you well put it, the best protection is the knowledge, skill and understanding of the user. We have to use our wits at all times to protect ourselves and our loved ones from those hard, cruel and vicious creatures that are sometimes called humans, but are, in effect, sons of Satan. For some reason, this reminds me of one of my earliest "infections". I was trying to write a sorta virus; just to see how it's done (no intention of release). I only really worked on it for a few days, compiled it, and forgot about it, having quickly passed through my "I'm a leet haxor" phase. a year later, I was investigating task manager... when, lo and behold, I saw that my little program which did absolutely nothing was running. I checked my thumb drives. it had "infected" all of them. It had infected the computers in my schools library that I had used, as well- and had spread to other computers from that point on as well, as students used their thumb drives and were subsequently "infected" and took their drives home.... I really don't want to imagine how far this went. It was a completely harmless program that sat in the background and did absolutely nothing, except copy itself to any drive that it detected being plugged in. My biggest curiousity is how the heck it "escaped"... I didn't actually run the program after my initial playing about with it. It was rather enlightening to see just how simple the creation of self-replicating software is. I'm also quite glad that the compiled version I had there had the "WORM" define set to false... otherwise it would have copied itself throughout all the network drives and so forth. The Computers at the school were reghosted every year, so it was gone rather quickly. However sometimes I wonder how far it got...-Quote We have to use our wits at all times to protect ourselves and our loved ones from those hard, cruel and vicious creatures that are sometimes called humans, but are, in effect, sons of Satan. Wow! You make it sound like we're in Nazi Germany or something. I feel like hiding my computer in an attic and making it keep a diary. Quote from: JJ 3000 on March 18, 2010, 12:01:48 AM -THAT can be arranged PowerBook: The logfile of a notebook computer. telling the tale of an Apple computer being hidden away from the hands of Microsoft as it annexes country after country. 05/23/2067: updated SimpleText to latest version. Declined offer to tell the fourth Reich where I am. 05/24/2067: crap. Simpletext won't start now, because I have to update OSX now. Where the heck am I going to buy a copy? the black market? 05/25/2067: went to the black market in my Microsoft suit disguise. Nobody was any the wiser. Went to the black market, bought a copy of OSX 15.6.2, "Silly Hippo". Also got some Bill Cosby DVDs. 05/30/2067: After watching All the Bill Cosby DVDs, I almost welcome death by rubberstamp at the hands of a execution machine running Microsoft QuickDeath (c). Encountered issues upgrading to Silly Hippo. I need to have at least Hungry Hippo(14.0.0) installed but the nearest I got last time was Incontinent Panda (13.6.9) and Photosensitive snake (13.5.. Mother accidentally powered up our old Windows machine, thankfully Peter was able to beat it to death with a 2 by 4. I hope it didn't send our usage data back to Microsoft.I'm way too tired to comment on all of that or even read all of it... Quote from: Geek-9pm on March 17, 2010, 11:02:40 PM So then, if we were to define perfect as being 100% effective, or even downgraded to being 99% effective, we must conclude there is no perfect AV. And if there is, they have not let the world know about it yet.Very true. Of course, I also say that there is no such thing as perfection. Even 100%-effective anti-virus wouldn't necessarily be perfect. The term "perfect" is entirely subjective.i believe bit defender antivirus 2010 is the best one in recent time............. it wont slow down ur pc and work extremely well...... |
|
| 3872. |
Solve : Windows Live Calender? |
|
Answer» I can't get windows live calender to send me email reminders to my primary email address, ALTHOUGH I put in in the required slot and set it to send me a reminder a Day in advance, I have yet received one. Any ideas on what I am doing wrong. I REALLY need a GOOD email reminder for my doctor appointments and work appointments.I have not used Windows Live Calender, so can't help you with it. Just thought I'm MENTION an ALTERNATIVE; Google's Calendar can be setup to send email reminders. For info, go *here*. |
|
| 3873. |
Solve : Reducing my PC's carbon footprint, how?? |
|
Answer» I was wondering if you could help me understand what I am seeing on some computer service sites. They offer a service to reduce your carbon footprint, also mentioned as reducing carbon emissions. Is this something that can be done with just settings on your computer ...?Well, you can enable such features as Standby and/or Hibernation and/or putting monitor to sleep after a certain amount of no activity. Some systems don't RESPOND well to Standby and Hibernation. So, if you're not sure how you computer responds to those settings, just do some testing to find out. Oh, another energy-saving setting is to let the HARD drive stop running after a certain amount of no activity. All these features are part of Windows; no third-party software is necessary.They talk here like all they have to do is connect to your computer remotely http://www.supportspace.com/support/services/green_pc Same here (labeled Green PC TUNE up) http://www.staples.com/sbd/cre/marketing/tech_09/repair.html What soybean said is right. Here is my comment. The impact your PC has on the environment snot as big an issue as your automobile or your home furnace. By a very large factor. Going Green is a great idea, but spending money on something that is of LITTLE impact is counter productive.The money would be better spent in other areas. Ok, thanks I was just curious to see if I am thinking along the lines you already said or if I was just over thinking this.So it's 25 Bucks to have some yo-yo tell you to turn off your machine when your not using it ? ? PT Barnum was right all along...Quote from: patio on March 19, 2010, 05:41:08 AM PT Barnum was right all along... Ha ha, so true! |
|
| 3874. |
Solve : Best remote control program? |
|
Answer» What is the best program for remote control of a COMPUTER? My mom lives over an hour away. When EVER I have to help her on SOMETHING over the PHONE, it takes twice as long as it should. I want to be able to log into her computer remotely and perform the NEEDED actions. |
|
| 3875. |
Solve : Exporting data from outlook? |
|
Answer» I want to transfer data from an specific map in an excel sheet. I know I can EXPORT it simply by hitting file>Import & export. |
|
| 3876. |
Solve : Photoshop pencil tool - display preview of which pixel gets marked? |
|
Answer» Hello, I hope I posted this in the correct forum. |
|
| 3877. |
Solve : Outlook timestamps? |
|
Answer» Since DLS Sunday my Outlook 2003 is receiving emails saying they were received 1 hour later than they were. |
|
| 3878. |
Solve : Issue cropping up with an "Offline Access" to Google Docs.!? |
|
Answer» Hello There! |
|
| 3879. |
Solve : Computer doesn't request password when returning to it? |
|
Answer» Hi, please help! |
|
| 3880. |
Solve : Excel Sheet Problem? |
|
Answer» Hi all, |
|
| 3881. |
Solve : visual studios 2008--Windows service? |
|
Answer» Hi,i WANT to create a windows service programme that is able to detect installed software on windows operating system and is able to send an automated email to the administraor.but i don't quite understand it even after i have done my research on windows service. |
|
| 3882. |
Solve : Windows Live Messenger won't reinstall? |
|
Answer» Alright, so, I installed windows live messenger 2009 (version fourteen point blah). I did NOT LIKE that version, so I uninstalled it to try to rollback to 8.5, when I attempt to install 8.5 it just tells me there was a "Catastrophic Error". So, I attempted to reinstall version 14.whatever but it says its already installed. I've been over the add/remove program list a thousand times, looked over the add/remove windows components menu, even the windows UPDATES that are installed, its not there, there is nothing to do with windows live on this computer. Not in the registry, not in program files, not anywhere but the installer THINKS it is. Not in the registryHow did you determine this?Ran Regedit, looked through hkey_local_machine, and a few other places in the registry Microsoft likes to bury stuff related to there products. I can't find a trace of windows live messenger on here but it INSISTS that it is installed and there are none of the usual options like "repair" and "remove". This winter has been a bad one for me... I keep breaking stuff... And the snow... Too much snow... I think my recent habit of breaking stuff has been related to not being able to leave the house much. I don't like to get out much but every other day we get more snow... Anyway, I can't seem to sort this out, I've installed Pidgin for the meantime but I'd like to have the MSN functionality back. I tried aMSN, but I didn't like that. It feels like a amped up Windows Messenger. Why'd you want to know how I determined there where no registry keys? Regedit is child's play as long as you know what your looking for and don't go deleting anything you don't know for a fact won't make your OS or software useless. Just 'cause I can't figure this out don't mean I haven't learned the wonders of registry modification I try to ask for help when I can't figure something out or I wind up making things worse... I dunno how or why but I always do..This is a situation where I would use CCleaner's registry cleaner. Other members may post a reply here and adamantly say never use a registry cleaner. But, in my opinion, registry cleaners, ones with a good reputation, can be useful is resolving problems like this. Even though you BELIEVE you've manually removed all traces of Windows Live Messenger, I'd still run CCleaner. It will do no harm; CCleaner is very safe. I suggest installing it, if you don't already have it, and running its registry cleaner. Backup the registry when CCleaner prompts you to do so. After doing this, try installing Windows Live Messenger again. Let us know how it goes. Tried it, it found about 66 errors, which is surprising, I use registry mechanic. Windows Live Messenger still refuses to reinstall though.Did you try downloading a different installer file? Will a different version work when you try and install it?There are two kinds of Windows Live Messenger installers, Live (Installs over the internet), and Local (Installs locally through an overgrown 130MB file). I have tried both, neither worked. I should have clarified this to begin with, the s now is getting to me... I have to go out and shovel sometime soon... Again... I HATE SNOW! Anyway, back on topic, both installers seem to think that Windows Live Messenger is already installed even though it is not.As a work-around, you might try Yahoo Messenger. HTTP://messenger.yahoo.com/features/ says: "IM with Friends on Other Networks: IM with friends who use Windows Live™ Messenger, Reuters Messaging, and Lotus Sametime — right from Yahoo! Messenger."I've tried Yahoo before, its rather... Annoying... I don't like the interface, thanks for the thought though. |
|
| 3883. |
Solve : Config.sys Problem? |
|
Answer» I am using Dos 6.22 and what my config file looks like is below and I get a message when trying to run programs in dos or under WINDOWS 3.1 that says EMM386 error #12 has halted your computer at C000:3BBD, the lines with REM are what I have found searching but have not yet tried yet. Can any one see any THING wrong? I do not currently use smartdrive. |
|
| 3884. |
Solve : Changing E-mail default???? |
|
Answer» Hello everyone. I was wondering if there is a way to change what e-mail system a computer uses automatically? For instance, if I am on a web page and I want to CONTACT someone's e-mail address listed on the page. When I CLICK on this it automatically takes me to Outlook. I don't USE Outlook for work or anything so this doesn't help me and I end up cutting and pasting the address into what I use for e-mail. (MSN.com) Is there a way to change this so it uses that automatically or not? Thanks for any help and have a good one! I'm not LOOKING at Windows XP now so I'm speaking from MEMORY. Go to Control Panel (I'm referring to Classic view) and open Internet Options. Select the Programs tab. What are your options there for email program? If MSN is one of them, select it. Click Apply and OK. |
|
| 3885. |
Solve : Looking for Security Check Software? |
|
Answer» I was wondering if there is software out there that will check your computer for SECURITY? Thanks for that info.ok thanks again for your input.Sure thing.To add some information....I use avast! and it's been working GREAT since I installed it. I can't really comment on memory hogging though because I've got too much RAM. Quote from: kpac on March 14, 2010, 04:28:48 PM I can't really comment on memory hogging though because I've got too much RAM. I don't think you can have too much RAM. Also, some ISPs offer free commercial av programs to cut down on the number of calls to tech support.Quote from: rthompson80819 on March 14, 2010, 04:38:09 PM I don't think you can have too much RAM. You can have too much RAM to comment on memory hogging though. |
|
| 3886. |
Solve : upload torrent ??? |
|
Answer» hello please how to UPLOAD TORRENT file for BIT torrent or Utorrent program ?? http://www.google.com/search?q=how+to+upload+torrents&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-GB:official&client=firefox-athanks |
|
| 3887. |
Solve : computer cannot access old files? |
|
Answer» Is anyone aware of some type of conversion program I could use to access 16-bit or 32-bit files |
|
| 3888. |
Solve : winpatrol? |
|
Answer» Hello guys. Can i just remove this item from winpatrol start menu (werkernelReporting) SureQuote from: Allan on February 09, 2010, 07:20:46 AM Sure Thanks allan. Was this just the POPUP window, telling me about the error*WerKernelReportingWerFault.exe"Part of Windows Error Reporting technology (WER) for Vista. WER captures software crash and hang data from end-users who agree to report it - (http://startup.networktechs.com/srch-*WerKernelReporting.html)Quote from: Allan on February 09, 2010, 07:25:18 AM *WerKernelReportingWerFault.exe"Part of Windows Error Reporting technology (WER) for Vista. WER captures software crash and hang data from end-users who agree to report it - (http://startup.networktechs.com/srch-*WerKernelReporting.html) Sorry allan, that link did not work for me somehow, even from the address bar. But when it states "HKLM run once" from what i have read so far, is that it runs after you LOGIN, so do you need it running all the time.No, it does not need to run - I don't use it. It's just a MODULE that gathers crash & hang data from users with Vista or Windows 7 who agree to report it. Sorry about the bad link - I was just trying to cite the url from which I copied the info.Quote from: Allan on February 09, 2010, 08:36:07 AM No, it does not need to run - I don't use it. It's just a module that gathers crash & hang data from users with Vista or Windows 7 who agree to report it. Great allan removed it from winpatrol, and disabled it with autoruns.. thanks again.... Any time Carl. BTW, check the options in WinPatrol and make sure Allow Plus Info Data Collection is not checked.Quote from: Allan on February 09, 2010, 08:36:07 AM No, it does not need to run - I don't use it. It's just a module that gathers crash & hang data from users with Vista or Windows 7 who agree to report it. Just out of interest allan, why was it still running after so MANY days, i thought this only ran once, then deleted the "Runonce " reg key after it notified you about the error, or is it possible it was still running because i did not report it..... |
|
| 3889. |
Solve : usb bluetooth headset? |
|
Answer» I bought a usb bluetooth headset for my ps3 but I ALSO wanted to pair it UPTO my pc to use on SKYPE. I have so far managed to pair my bluetooth adapter to my pc and I have paired the headset to the pc aswell, The problem I have is my pc keeps asking me for the software disk for the headset which I DONT have and I can't find the drivers on the COMPANYS website, Is there anything else I can do ? btw the headset is a madcatz MOE8860 ... Cheers again |
|
| 3890. |
Solve : Want Free Movie Maker Software.? |
|
Answer» I have Windows Movie Maker on two XP Pro machines. Some AVI files can not be imported into the Movie Maker.Tried it on two machines. My workaround is to convert the files to ANOTHER format and then edit. I don't like this. http://en.wikipedia.org/wiki/List_of_video_editing_software"List of video editing software" must be the best reference on wikipedia. Thank you for that find. Very informative. |
|
| 3891. |
Solve : Keyboard acting weird? |
|
Answer» Hi, |
|
| 3892. |
Solve : Excel printing? |
|
Answer» Hi, can anyone help with excel printing? Yes my screen looks like that.OK, so, if you open Print Preview, does it display the sheet in landscape mode?no it does not even when changed to landscapeIs this a large file you're working with? Has it ever printed in landscape view? I have attached a simple test file. It is set for landscape view. Open it on your computer and immediately display Print Preview. Does it display in landscape view? I'll be away from my computer much of this afternoon and evening. If anyone else has any suggestions, please chime in. [Saving space, attachment deleted by admin]File size is 27kb and has NEVER printed in Landscape. I opened yr file but its not in landscape through Print Preview. Thanks for your help. |
|
| 3893. |
Solve : Remove transparent text from video in VirtualDub? |
|
Answer» I found a YouTube VIDEO at http://www.youtube.com/watch?v=hufdXeTS9Zc and it has the text "totonica101" which is transparent in the middle of it. I also used the MSU logo removal for VirtualDub *BLOCKED Russian URL*/*Blocked Russian URL*/video/logo_removal/index_en.html[/url]) and it didn't work. How would I do it?You can't remove existing watermarks in a file without some SERIOUS equipment... |
|
| 3894. |
Solve : open as, save as, dialog boxes won't open? |
|
Answer» I'm currently RUNNING Vista SP2 on my laptop and have encountered problems opening and saving in most programs. when I try attaching files in emails and click browse, a window QUICKLY appears and CLOSES before I can do anything. I've tried switching browsers (IE, Firefox, Safari) all with the same RESULT. I've reinstalled them with no difference. In other programs, like word, Photoshop etc, I'lll go to file > open as/save as and nothing happens. The dialog box only seems to work in notepad. |
|
| 3895. |
Solve : PROGRAMS - Microsoft WORKS vs WORD? |
|
Answer» I am using OS Vista (Home Version) on a 2008 Sony VAIO laptop. I am cataloging an extensive[/u collection of Snoopy (Peanuts) memorabilia utilizing the Microsoft "WORKS" database program. As I progress, I would like to periodically copy my data to my client's computer. Unfortunately, my client does not have the WORKS program. MS Word is a word processing program. MS Office is a suite of programs. Depending on the Office version, MS Access (a full featured database) may be included in that suite. BTW, I don't know why you are underlining all text, but it makes it harder to read.Apparently, you have Word and Excel, so you must have some version of Microsoft Office. What version do you have? Do you know whether you have Microsoft Access in your version of Office? Surely you know the answer to this, since you say you're more familiar with database than spreadsheet. And, if that's true, what database software are you familiar with? Do you have it installed on your computer? Also, you need to consider whether your client has database software that would be compatible with whatever you use. |
|
| 3896. |
Solve : Host ftp between 2 PC's trough ethernet cable?? |
|
Answer» Hi there, I hosted filezilla serverThey have both a Wiki and a forum. http://filezilla-project.org/ Have you looked into the resources they offer? Are you using a router? Will your firewall allow ftp ports? Forgot to ask. Are you familiar with FTP clients as WELL as other types of files transfer? Is there a REASON to prefer filezilla over other file transfer tools? Are both machines in the same workgroup ? ? |
|
| 3897. |
Solve : Excel 2003 Option Buttons? |
|
Answer» Can ANYONE help me with the following. |
|
| 3898. |
Solve : no touchpadf? |
|
Answer» My friend has a laptop (not SURE of the make, but if it's really important i can find out) and the touchpad stopped working. So he rolled back the driver for it and re-booted and it worked. That was 2 MONTHS ago and it's stopped working again. He went to do the same thing (rollback driver) but the rollback tabs is grayed out. He has uninstall and update. CAn anyone tell me what be the best to do and why this has happened??? ThanksQuote He has uninstall and update.What do you mean? My laptop, a Compaq Presario F572US, has a small button on the top edge of the touchpad which, if pressed, turns off the touchpad. Is it possible he inadvertently did that?He only has 'update driver' and 'uninstall driver' the 'rollback driver' is greyed out. Sorry, should have been more clear.Quote from: soybean on March 12, 2010, 07:22:38 AM My laptop, a Compaq Presario F572US, has a small button on the top edge of the touchpad which, if pressed, turns off the touchpad. Is it possible he inadvertently did that? I've sent a mail asking him this, and what make and MODEL the laptop is. Will get back to you a.s.a.p Thanks soybean. Hi, I GOT a similar issue (on Dell Inspiron 1525) after i installed Outpost firewall, it stops my touch pad by default , i should create a rule for it or reinstall it i don't REMEMBER well what i have done then , but any way one of this two action i took , may be changing security software could be a reason for this behavior. Regards, |
|
| 3899. |
Solve : Activating software after computer crash? |
|
Answer» I purchased MS Office and installed it on my Desktop and Laptop. I understood I was licensed to use it on 3 computers. My motherboard on my desktop melted and purchased a new desktop and installed MS Office on it. That was my 3rd installation. Then my hard drive crashed on my laptop. I wanted to activate my MS Office on my new laptop but Microsoft would not allow it. If successful in activating MS Office on my laptop I would only be using Office on 2 computers, the first 2 are toast. Do I have to purchase Office again just to have it on my desktop and laptop? I have tried to get to a person at Microsoft but have been unsuccessful. I am a student and need Word 07 on my desktop and laptop desperately but do not want to spend 100 plus $$ to get it when I just upgraded from Office 03 to Office 07 last November. Any help would be greatly appreciated. Try calling M$ and explain the situation. They may or may not give you grace, depending on what side of the bed that person got up on that morning. Or alternatively could you not network the 2 latest computers that you are using and use the one you have "office" on to create your work then transfer the result to the other computer--What would be the point of that? He would not be able to open those files on the "other computer", since it would not have Office installed on it. I'll mention OpenOffice as an option for one computer if MS Office can not be registered on it. OpenOffice will recognize Word and Excel files. However, I think you may be able to resolve this by calling MS, as ale52 suggested. This may be a very little help, but perhaps an idea worth considering. Would it be possible for you to find an exact replacement for the motherboard that got burnt? If so, you should be able to restore your complete system, including the Microsoft office programs, from your backup. Also, in a home office environment where software TOOLS are very powerful and important parts of your productivity, a total backup plan is needed. Because of the policy Microsoft has about how many computers you can use for installations, you need to consider having "CLONE" computers. That is to say, every computer must be a duplicate of the other even down to small hardware details such as the type of video cards used. Why? Because in that case you could reduce the number of new installations by simply making a clone of your hard drive. Save one or two of your installations for a new system, if and when that is needed. Although the above may seem to violate the letter of the law, it is not really a violation of law. You are entitled to have a backup system. The policy Microsoft has adopted is rather oppressive and some other terrible word I can't remember right now. Along the line of Geek -9pm's suggestion i was wondering at the time i wrote my above post as to another alternative (i suspect too LATE in this case). But what if at the time of installation of the software for "office" it had been installed on an external HDD? Could that have made it portable to any other computer that that HDD was attached to? Or has Microsoft prevented it being installed on anything but "C" drive? truenorth P.S. As soybean has stated there are alternatives out there (that are free) and apparently do as good a job as "office" if that becomes the only alternative. There's more to this tale of woe than illustrated... A MBoard swap would not trigger the activation issue in and of itself... A HDD swap...well see above again. Fill in the rest of the blanks... All that being said Alan's advice above would be the place to start...While this obviously won't resolve your issue with the License, there is an alternative. If you cannot get your Microsoft Word re-licensed, I'd suggest using OpenOffice.org. It's basically a productivity suite like Microsoft Office, but COMPLETELY free. It has many of the same functions and will both read AND save Microsoft Office files, so you can send them to your professors as .doc files. You can download it here: OpenOffice.org This is just one more option, in the case you are unable to solve the licensing problem. Edit: Just noticed someone else already mentioned this, I apologize.Google Docs would be another usable option, you can save to .doc format, so it'll be compatible with MS Word. |
|
| 3900. |
Solve : PC Pitstop Optimize 3.0 vs PC Matic? |
|
Answer» OK I need help choosing some programs. Last year I purchased PC Pitstop Optimize 3.0 and it's time to re-new it, I am looking at PC Pitstop: PC Matic which has Optimize 3.0 PLUS Antivirus/Antispyware/Antimalware, Driver locater and downloader, hard disk defragmenter, ect...however I was thinkin of running these programs along side of Avast, Malwarebytes', Superantispyware and Windows disk defragmenter. So bottom line, Should I.... (A) Buy PC Matic and run it along side my other programs? (B) Buy Optimize 3.0 ONLY? (C) Buy a better Optimize? (Please list software)Just an opinion but i wouldn't run either of them...waste of good money. The others you listed are fine though...So is it really not important to have Optimize? They say it's suppose to keep you from having Registry IssuesBasically there is no such thing as Registry issues... It's a text file...a roadmap with pointers on it...if the map leads to a dead end the machine moves on... But alot of Co's make boatloads of cabbage telling PEOPLE they need an optimiser for it...I suppose registry cleaners remove those "dead ends"? But I WONDER, when people have BSOD's (or whatever they call it now I don't know) and go thru a registry clean and suddenly their PC is back to life ... Quote from: 2x3i5x on February 11, 2010, 11:09:05 PM I suppose registry cleaners remove those "dead ends"? From my experience blue screen of death comes in 2 forms. 1. Driver issue ( most common) 2. hardware issue I have yet to see registry give me the BSOD, it might be possible I guess though as MENTION I thought if it is pointing to null or nothing it would just move on? maybe it is software that is effecting a driver somehow? To many pointer issues can lead to slower computers, but then again computers are fast enough today that you should not notice anything unless years of junk accumulated. I rarely USE registry cleaner, just clean out your temp folders, defrag, and scan your HD for errors and corrupt entries and it should work out fine. |
|