Vous êtes sur la page 1sur 16

-: Chat with Friends through MS DOS Command Prompt :1) All you need is your friend's IP Address and

your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) Now, type the IP Address of the computer you want to contact and press enter. 7) Now all you need to do is type your message and press Enter. Start Chatting.......! 8) You would then see something like this:

send this code to your friends in Chatbox and see the magic...Copy all code and past to your Friends.. . . . .. . . [[200274983395201]] [[200274996728533]] [[200275010061865]] [[200275020061864]] [[200275030061863]] [[200275046728528]] [[200275063395193]] [[200275076728525]] [[200275093395190]] [[200275100061856]] [[200275113395188]] [[200275126728520]] [[200275136728519]] [[200275153395184]] [[200275166728516]] [[200275180061848]] [[200275193395180]] [[200275206728512]] [[200275220061844]] [[200275230061843]] [[200275240061842]] [[200275256728507]] [[200275266728506]] [[200275280061838]] [[200274976728535]]

# Yahoo Messenger Trick With this trick you can Open Yahoo! Messenger 100000+ Times & if you have more then one Yahoo ID's and you want to open both ID's so just do this simple step. open "RUN" (Window+R) and type "Regedit" go to "Curnnt_user" & "Softwares" & "Yahoo" & "Pager" & "test" don't open "Test" and Go to "Draft" on right side. and then "right click" select "Dword Value" rename it to "Plural" open it and write in "Value Data" "1" and now Restart ur computer and u have done Now u can Open 100000 Yahoo! id's in one time.

What is RAT (Remote Access Trojan) ? RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basicly anything with your computer. Using RAT hacker can install keyloggers and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers. # What is RAT ? As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect. So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you over the mail or in chat room. # What You can do with RAT ? Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below: * * * * * * Infecting Files Installing Keyloggers Controlling Computer Remotely start webcam, sounds, movies etc Using your PC to attack Website (DDOS) View Screen

# Harmless RAT or Good RAT? As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer

with his permission for file transfer, sharing your screen and more. # Some Commonly Used RAT * ProRAT * CyberGate RAT * DarkComet RAT

What is keylogger ? 1. What is keylogger ? You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

2. How it can harm you ? It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details etc. Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured. 3. Types of keyloggers There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind. 4. How to Protect yourself from keyloggers ? Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password. You can even use above method to protect your facebook profile, yahoo or gmail id. When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image

Facebook Status update trick This is an amazing facebook trick which you would love to use. So the trick is to update your status with name of any app like Nasa, Iphone 5, HTC etc. Still confused just follow below instruction and clear your mind.

1. First Login to your Facebook account. 2. Copy below link into address bar as shown in the below picture. http://www.facebook.com/connect/prompt_feed.php?preview=true&display=touch& api_key=XXXXXXXXX&target_id=YYYYYYYYYY 3. In place on XXXX put api key given in below list and in place of YYYY put profile id of person where you want to publish your message. 4. Now you will be redirected to new screen as above enter your message and done.

API KEY LIST Skynet (249284985083592) iPhone (6628568379) Blackberry (2254487659) Palm (7081486362) Sidekick (21810043296) Sony Ericsson (38125372145) Xbox LIVE (5747726667) iPad (112930718741625) Foursquare (86734274142) Telegram (140881489259157) Carrier Pigeon (130263630347328) Morse Code (134929696530963) Message in a Bottle (123903037653697) Commodore 64 (138114659547999) Your moms computer (132386310127809) TRS-80 (134998549862981) K.I.T.T. (129904140378622) Mind Computer Interface (121111184600360) eyePhone (110455835670222) toaster (203192803063920) microwave (0a5266c8844a1b09211e7eb38242ac2f) Super Nintendo Entertainment System (235703126457431) Gameboy Color (180700501993189) GoD (256591344357588) Glade Air Freshner (4aeb4db2e8df1cdb7f952b2269afb560) Strawberry (a4c9fb1708a848c2241674531176209b) The moon (221826277855257) Dr. Pepper (eea90d40e1d12565695dbbbdbd5e965b) Nintendo wii (243870508973644) Alcohol (250335888312118) Cheese (218791271497130) iPod Nano (142039005875499) Nintendo 64 (236264753062118) Microsoft Excel (242740155751069) Linux Ubuntu (220593361311050) iPhone 5g (211333348912523) My Bedroom (174811032586879)

Your Mums Bedroom (5f64bbc9ac2f12b983200925da461322) Lamp (230755826955133) Your moms anus (b625297b655f0b46c86b68f754b82121) Refrigerator (250828364944350) A potato (127926427295267) Nasa Satellite (31d608d30292175bf7703149699ccb39) Vibrator (eb4c6d1a60e19a7795da501e1f468035) Sperm Whale (170318539700306) Pogo Stick (185103391549701) Banana Phone (1477a4cd29ec724a3de19be5d26e0389) Google+ (4d8243dbb7064f88351fe6c809582320) The Future (108372819220732) Smoke Signal (134138923334682) tin cans connected by string (242191299125647) Pokedex (de3da265cf6976745bb1d60a8c198151) Telepathy (ea01a57edb26cf1de143f09d45cfa913) Typewriter (d3d554bf60297cb2c384e3d7cf5a066d) Harry Potter (b8ebeb983f45eaa0bd5f4f66cad97654) TARDIS (200439256674396) Pip Boy (142806259133078) Mind Control (1dc633368924b3b0b4d08e3f83230760) Jedi Mind Control (240597869302110) Telekinesis (224139600960217) Post-It Note (115227201900831) GLaDOS (246126362083515) Ansible (185474028180003) W.O.P.R (228373497202865) Airwolf (123944137696757) HMCS Belafonte (222345601140304) HAPPY BIRTHDAY (60280877509)

-: Chat with Friends through MS DOS Command Prompt :1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A

Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) Now, type the IP Address of the computer you want to contact and press enter. 7) Now all you need to do is type your message and press Enter. Start Chatting.......! 8) You would then see something like this:

How to Delete any Facebook Account without accessing Victim's Profile?? What you will be needing ? 1.Victim's Profile Link - ex.http://www.facebook.com/profile.php?id=112741086148511 2.Victim's Email - Which is being used to log into his Facebook Account. 3.Victim's Birthday - Can be found out easily if you know the victim personally or you can use social engineering to get the password ! 4. Make an Email ID on Gmail or Yahoo with the same First name and Last name same as on victim's Facebook profile. So you have to make sure you do the above steps in order to proceed. How to do it ? 1.Go to this link : http://www.facebook.com/help/contact.php?show_form=hack_nologin_access

2.Enter the appropriate details in the above page.In the TextBox "Email address where you can be contacted" enter the fake E-mail which you created. 3. You will get a mail on that ID in which Facebook Staff will ask your problem. Reply to them that you are "Someone"(Victim's name) and your unable to access your Facebook account. Also you have lost access to your Email Address associated with the account. You don't know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ' I am a girl and it poses threat to my social life ' and write anything you want that could make them take action to delete the account or something like that !(No need though in 100 % cases they delete the account). 4. After 2-3 days you will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don't have access to it. And repeat what all you wrote in first mail. 5.After that,the Facebook staff will automatically delete your Account in order to keep your privacy ! Thats it ! Your done with this simple trick ! Hope you like this article.Feel free to comment ,share and subscribe if you liked this !

Do you want to hack gmail account??

Gmail is one of the most widely used email services across the world and its no wonder why many people want to hack gmail. So if you are curious to know how to hack a gamil account then this article is for you. Here in this article, I will show you some of the real and working ways to hack gmail and will also make you aware of the common scams and myths associated with hacking gmail.

Before I discuss how to hack gmail, I want to make our readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go

I. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then its no more than a scam.

II. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. many of the services have been tested by our team and found that most of them are scams. So we make aware you that don't be fooled by such services if any one offers.

At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail. With my experience in the field of hacking and security I can tell you that there are three ways to hack gmail account. 1. Keylogging 2. Phishing Any other method to hack gmail other than these two are simply scam or don't work. Easiest Way to Hack Gmail The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry. there are some keylogger you can install remotely also.

For more details on how keylogger is used read book HACKING MADE EASY Other ways to Hack Gmail The other most commonly used trick to hack Gmail is using a Fake Login Page (which is called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.

However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since its the easiest way.

If you like this article write your comments to us

Having Problem with Your Browser to Load page and it takes 1 to 2min to load your page?? so here is the solution to your problem.. Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source. Here's what you do: In the URL bar, type about:config and press enter. This will bring up the configuration menu where you can change the parameters of Firefox. Note that these are what Ive found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests were going to open up with pipelining lol youd better have a big connection. Double Click on the following settins and put in the numbers below - for the true / false booleans - theyll change when you double click. Code: browser.tabs.showSingleWindowModePrefs true network.http.max-connections 48 network.http.max-connections-per-server 16 network.http.max-persistent-connections-per-proxy 8 network.http.max-persistent-connections-per-server 4 network.http.pipelining true network.http.pipelining.maxrequests 100 network.http.proxy.pipelining true network.http.request.timeout 300 One more thing Right-click somewhere on that screen and add a NEW -> Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it receives. Since youre broadband - it shouldnt have to wait. Now you should notice youre loading pages MUCH faster now!

How to hack Computer Administrator password without the User knows...just do this simple steps step 1:- Open "RUN" (Win+R) and type "CMD" Step 2:- The black screen will pop up, then type in "Net User" and press Enter, it will show you you're account names for eg: Admin or User, something like that whatever the name of your computer. Step 3:- So lets Suppose that your PC name is Admin* so type in "NET USER ADMIN" and then press Enter, It will show You the list where it shows that when you Last Log In your PC and when You changed Your PC Password last time and many other details... Step 4:- Now Type in "NET USER ADMIN * " and then Press Enter.. it will tell you to type a Password For User..... Step 5:- Type a password its will Show you like this (*****) and then Press Enter and then Retype your Password and here You Go...You have changed Your PC Password without any Software or some other technique... WARNING:- *FOR EDUCATION PURPOSE ONLY*

Any Help Regarding this "MESSAGE" me Through Page MESSAGE option is available NOW

Lets see what Beep sound really means?? After repeated requests for beep codes i have decided to post them here maybe they could be pinned Standard Original IBM POST Error Codes Code Description 1 short beep System is OK 2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem 1 long, 1 short beep System board problem 1 long, 2 short beeps Display adapter problem (MDA, CGA) 1 long, 3 short beeps Display adapter problem (EGA) 3 long beeps 3270 keyboard card IBM POST Diagnostic Code Descriptions Code Description 100 - 199 System Board 200 - 299 Memory 300 - 399 Keyboard 400 - 499 Monochrome Display 500 - 599 Colour/Graphics Display 600 - 699 Floppy-disk drive and/or Adapter 700 - 799 Math Coprocessor 900 - 999 Parallel Printer Port 1000 - 1099 Alternate Printer Adapter 1100 - 1299 Asynchronous Communication Device, Adapter, or Port 1300 - 1399 Game Port 1400 - 1499 Colour/Graphics Printer 1500 - 1599 Synchronous Communication Device, Adapter, or Port 1700 - 1799 Hard Drive and/or Adapter 1800 - 1899 Expansion Unit (XT) 2000 - 2199 Bisynchronous Communication Adapter 2400 - 2599 EGA system-board Video (MCA) 3000 - 3199 LAN Adapter 4800 - 4999 Internal Modem 7000 - 7099 Phoenix BIOS Chips 7300 - 7399 3.5" Disk Drive 8900 - 8999 MIDI Adapter 11200 - 11299 SCSI Adapter 21000 - 21099 SCSI Fixed Disk and Controller 21500 - 21599 SCSI CD-ROM System AMI BIOS Beep Codes Code Description

1 Short Beep System OK 2 Short Beeps Parity error in the first 64 KB of memory 3 Short Beeps Memory failure in the first 64 KB 4 Short Beeps Memory failure in the first 64 KB Operational of memory or Timer 1 on the motherboard is not functioning 5 Short Beeps The CPU on the motherboard generated an error 6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode 7 Short Beeps The CPU generated an exception interrupt 8 Short Beeps The system video adapter is either missing, or its memory is faulty 9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS 10 Short Beeps The shutdown register for CMOS RAM failed 11 Short Beeps The external cache is faulty 1 Long, 3 Short Beeps Memory Problems 1 Long, 8 Short Beeps Video Card Problems Phoenix BIOS Beep Codes Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause. Code Description 1-1-3 CMOS read/write failure 1-1-4 ROM BIOS checksum error 1-2-1 Programmable interval timer failure 1-2-2 DMA initialisation failure 1-2-3 DMA page register read/write failure 1-3-1 RAM refresh verification failure 1-3-3 First 64k RAM chip or data line failure 1-3-4 First 64k RAM odd/even logic failure 1-4-1 Address line failure first 64k RAM 1-4-2 Parity failure first 64k RAM 2-_-_ Faulty Memory 3-1-_ Faulty Motherboard 3-2-4 Keyboard controller Test failure 3-3-4 Screen initialisation failure 3-4-1 Screen retrace test failure 3-4-2 Search for video ROM in progress 4-2-1 Timer tick interrupt in progress or failure 4-2-2 Shutdown test in progress or failure 4-2-3 Gate A20 failure 4-2-4 Unexpected interrupt in protected mode 4-3-1 RAM test in progress or failure>ffffh 4-3-2 Faulty Motherboard 4-3-3 Interval timer channel 2 test or failure 4-3-4 Time of Day clock test failure 4-4-1 Serial port test or failure 4-4-2 Parallel port test or failure 4-4-3 Math coprocessor test or failure Low 1-1-2 System Board select failure Low 1-1-3 Extended CMOS RAM failure

10 reasons why PCs crash U must Know Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-AltDelete to restart your computer. If you do this you will lose any unsaved information in all open applications." You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening? 1 Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself. If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route: * Start-Settings-Control Panel-System-Device Manager. Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it. Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it. Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource iswww.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty). When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity. To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs. 2 Bad Ram Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing. But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked. One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the

motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged. Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble. EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes. 3 BIOS settings Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up. Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to. A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display. Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.). 4 Hard disk drives After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to * Start-Programs-Accessories-System Tools-Disk Defragmenter This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler. The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop). Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to * Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk. Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space. Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to * Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use. 5 Fatal OE exceptions and VXD errors Fatal OE exception errors and VXD errors are often caused by video card problems. These can often be resolved easily by reducing the resolution of the video display. Go to * Start-Settings-Control Panel-Display-Settings Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate. If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to * Start-Settings-Control Panel-System-Device Manager Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts. If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse. The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message. Another useful way to resolve video problems is to go to * Start-Settings-Control Panel-System-Performance-Graphics Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device). Look up your video card's manufacturer on the internet and search for the most recent drivers for it. 6 Viruses Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to * Start-Settings-Control Panel-Add/Remove Programs Here, look for the Start Up Disk tab. Virus protection requires constant vigilance. A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer. An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton

AntiVirus 2000, made by Symantec ( www.symantec.com). 7 Printers The action of sending a document to print creates a bigger file, often called a postscript file. Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance. If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on. 8 Software A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy. The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000. Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode. Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly. Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work. Remember to restore all the BIOS settings back to their former settings following installation. 9 Overheating Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to. One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available fromwww.computernerd.com or www.coolit.com CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut. If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut. It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

How to Download from a paypal site without paying a penny! Just a little basic html tip for those who are trying to download an application from sites which has an paypal order page & link to start you off. Use a proxy when you try this to hide your ip as some sites will record your ip when you connect for security. 1) 2) 3) 4) Rightclick your mouse (ctrl+click) viewsource and open the source of the site in an a texteditor Search for the word "return" Next to it you can find the url for the thank you page Copy the url and paste it in your browser and you will see the download link

This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you. You can try it here to start with: Code: http://www.ramphelp.com/halfpipe.html

About half way down the page you will find something like this: <input type="hidden" name="return" value="http://www.ramphelp.com/65984523/thanks/68912hp654/26865thankyouhp08363215423.html"> Copy the link into your browser and download.

Halfpipe Plans$14.95 | www.Ramphelp.com | How to build a skate Ramp www.ramphelp.com www.Ramphelp.com Halfpipe PlansBuilding a halfpipe is a big job, and anyone from a beginner to a master craftsman could use some help. Our halfpipe plans give you all the help you need. Our detailed halfpipe plans show you how to build a mini ramp, vert ramp, spine, quarter pipe, halfpipe, extension...

Vous aimerez peut-être aussi