TECH SUPPORT 1

Windows 7 Supportwindows7support247.blogspot....
58 followers
Hide Drives from Your Computer in Windows 7 or Vista If you’ve got drives in My Computer that you never access, such as a USB Flash drive that you ar ... read more
4 weeks ago
Quick Way to Monitor Shared Folders in Windows Vista 1) Open command prompt (Start->All Programs->Accessories->Command Prompt), type fsmgm ... read more
4 weeks ago
Advanced Vista File Sharing 1) At first, I would assume you already enabled File and Printer Sharing for Microsoft Networks on your network adapter’s ... read more
4 weeks ago
Add the Vista Style Sidebar Back to Windows 7 Copy Files from Vista Note: In this example we are using 32-bit versions of Vista and Windows 7. Make s ... read more
4 weeks ago
Enabling Remote Desktop in Windows Vista 1) Go to Start, right click Computer and then click on Properties. 2) The computer properties window will ... read more
4 weeks ago
Microsoft's Windows 7 is focused on speed and stability, even on older hardware, and can run on systems with minimal specifications. Device support is ... read more
4 weeks ago
Windows 7 comes with the built-in ability of being able to create a System Repair Disk that can be used to recover from major issues. The same recover ... read more
4 weeks ago
Quick Way to Monitor Shared Folders in Windows Vista 1) Open command prompt (Start->All Programs->Accessories->Command Prompt), type fsmgm ... read more
4 weeks ago
This is going to walk you right through connecting your Xbox 360 to a Windows 7 PC. If you have an xbox and have not linked it up to your pc yet you ... read more
4 weeks ago
If you are a new Windows 7 user, you may have heard about the new auto-tile feature and wondered how it works. Although you can still right-click on ... read more
4 weeks ago
Keeping your laptop cool is essential to lengthening the machine's life. Laptops may overheat for several reasons, the most prevalent being because ... read more
6 months ago
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNorma ... read more
7 months ago
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNorma ... read more
7 months ago
The demands of computer software only rise with time, and if you have an older machine, you may no longer be as happy with its performance as you on ... read more
7 months ago
Microsoft's Windows NT-based operating systems include two utilities for editing the registry, Regedit.exe and Regedt32.exe. While each performs ess ... read more
7 months ago
A barebone computer is a partially assembled platform or an unassembled kit of computer parts allowing more customization and lower costs than a ret ... read more
7 months ago
You will need to wirelessly connect the webcam to your computer. A USB wireless transmission kit can join together the webcam to the computer at dis ... read more
7 months ago
Reset a Dell Axim Password Password reset in Dell Axim can be done by hard resetting the PDA. Doing a hard reset wipes everything in the device, incl ... read more
7 months ago
The 27-inch iMac comes with a high-resolution LED backlit widescreen display with a maximum resolution of 2560 by 1440 pixels. You can change the sc ... read more
7 months ago
Adding support for a second CPU to a Suse Linux Enterprise Edition requires upgrading the Kernel. The kernel is the part of the operating system that ... read more
7 months ago
Cause: If you are having problems installing the scanner or camera, make certain that you are following the manufacturer instructions provided with th ... read more
5 months ago
Cause: This problem typically occurs if incorrect settings are configured for the printer or setup has gone haywire. Solution: Since the solution t ... read more
5 months ago
Cause: If you chose to print a document and now you want it to stop printing, you can use the print queue. The print queue is particularly helpful wh ... read more
5 months ago
Cause: If printing files seems to be very slow, you may be running low of system resources, such as RAM or hard disk space. Solution: Try closing o ... read more
5 months ago
Cause: If a certain file type will not print, but other documents print fine, there is probably some kind of software problem between the application ... read more
5 months ago
Cause: When you have more than one game controller, the computer will typically default to the first one you installed. However, you can change the ... read more
5 months ago
Cause: If your printer prints garbled text, it is almost always a sign of a bad or corrupt driver. Even if you installed the correct driver, it may ... read more
5 months ago
Cause: USB hubs allow a number of different devices to connect to them, but some devices can pull too much power, causing other devices not to work ... read more
5 months ago
Cause: Hardware, such as a printer, has to be compatible with Windows XP. You may be able to get an older model printer to work with Windows XP, but ... read more
5 months ago
With the popularity of computer games comes the onslaught of game controllers. There are all kinds of available game controllers, including joysticks, ... read more
6 months ago
WolfRam Antivirus is a freshly released cyber threat that will give you nothing helpful, just continuous malware reports, tons of alerts and notifica ... read more
5 months ago
Antivirus GT is a rogue antispyware program that is distributed to computers through Win32/FakeXPATrojan virus. Once computer is infected, Antiv ... read more
5 months ago
Trojan backdoor.11.Win32.xnco is nothing else but fake virus, reported in order to trick PC users into believing that it was detected on their PCs b ... read more
5 months ago
User Account Control is one of these programs that should be categorized as rogue anti-spywares designed for making the money. To be more tricky, it ... read more
5 months ago
Defense Center is a rogue anti-spyware, typical clone of many other malwares – Protection Center,Data Protection, Digital Protection, ... read more
5 months ago
Tango toolbar is annoying and unexpected addition to the default look of web-browser. Besides the toolbar there are strange popups users ... read more
5 months ago
AV Antivirus Suite is nothing else but a rogue anti-spyware which will annoy you to death because of its continuous pop up ads asking to buy it ... read more
5 months ago
Windows Optimization Center is a fake security program that is promoted via trojans and other malware. It's a clone of Privacy Corrector. Window ... read more
5 months ago
McAfee Enhanced Protection Mode is a title of misleading alert aimed at cheating users. The trickery abuses not only credit of users as name of ... read more
5 months ago
EzPrivacy is a fake Korean anti-spyware which after imitated PC scanning actions promises for the user to remove all the cyber threats. Howev ... read more
6 months ago


25 ways to safe computing

25 ways to participate in Computer Security Day:

1. Display computer security posters.
2. Display WCSD logo on your blog, fb, twitter, website, etc...etc..
3. Change your password
4. Check for computer viruses.
5. Update your anti-virus/anti-malware
6. Update your Windows (or other OS)
7. Clean your computer and the immediate area.
8. Back-up your data. (after being certain that it is virus-free.)
9. Delete unneeded files and apps (and facebook 'friends' that u don't remember seeing in the last 5 years!)
10. Update all your installed and relevant software such as adobe reader
11. Promote computer security best practice.
12. Publicize existing computer security policy.
13. Issue new and improved computer security policy.
14. Declare an amnesty day for computer security violators who wish to reform.
15. Announce COMPUTER SECURITY DAY in your internal newsletter.
16. Install and inspect power surge protection as appropriate.
17. Post "No Drinking" and "No Smoking" signs in computer areas.
18. Develop a recovery plan for all computer systems that require one.
19. Verify that passwords are not "Posted" and all other keys are secured.
20. Verify that backup power and air conditioning fit your needs.
21. Hold a discussion of ethics.
22.Volunteer to speak about computer security at a local computer club or school(and register to be a CyberSAFE ambassador!).
23. Register and pay for all commercial software that is used on your computer.
24. Consider the privacy aspect of the data on your computer and protect it.
25. Help to propagate computer security awareness!

for more on computer security, visit: www.cybersecurity.my