Wednesday, November 30, 2011

Fix Windows Error 193 (iTunes)

Windows error 193 is very similar to other Windows errors such as Error 127. It is also known as iTunes Error 7, and indicates a problem with this installation of iTunes and other Apple software.



If you have Apple software installed on your computer including iTunes, you may see Windows Error 193 appear following an unsuccessful installation or update. This error message is fairly common, and can also be troublesome to resolve due to Apple software relying on shared application files for all of its software. Sometimes you can resolve this issue by uninstalling and reinstalling iTunes, but in many cases the error message will persist even after doing this.

Common Messages Seen Regarding Windows Error 193

If iTunes is malfunctioning you may see one of the following error messages:

"iTunes was not installed correctly, Please reinstall iTunes. Error 7 (Windows Error 193)"
"iTunes Error 7 (Windows Error 193)"
C:\Program Files (x86)\Common Files Apple\Apple Application Support\zlibl.dll not designed to run on Windows or customise errors
You may also see:

"iTunes has stopped working. A problem caused the program to stop working correctly. Error 7 (Windows error 193). Windows will close the program and notify you if a solution is available."
The main reason you may see these messages is because Apple Application Support has an error, and without this application many Apple products on your computer with not work correctly, or will fail to load.

Solutions - How to Fix Windows Error 193

Repairing Windows error 193 isn't as easy as reinstalling software that is showing errors. Apple uses a shared repository of files for all it's software called Apple Application Support, and if this application is damaged or corrupt then it will generate Windows errors when you try to start iTunes and other Apple software. Unfortunately there is no direct way to repair Apple Application Support itself, but you can reinstall all Apple products on your computer, and then reinstall iTunes. This will replace Apple Application Support with good files.

In order to do this, you should find all Apple software on your computer such as iTunes, QuickTime and MobileMe, and install them from the control panel. Uninstall them completely before doing a reboot.

When your computer has restarted, you should manually check to be sure all Apple related software has been removed by checking your Program Files folder. Folders to look out for are called:

Bonjour
Apple
iTunes
iPod
QuickTime
QuickTimeVR
Once you have checked these folders have been removed, it is recommended to check your Windows stability to detect any potential system error.

Following this, you can then reinstall your Apple software and verify correct operation. You may want to start with one application first, such as iTunes, as this will reinstall Apple Application Support. Check that everything works correctly and you are not receiving any further instances of Windows Error 193 before proceeding.

Repair Error_invalid_function

Error_invalid_function Solution

To repair this error message, click on and install all of the software programs tools listed below. These have been especially created to assist restore the Error_invalid_function fault;



Download Windows Software Update – refreshes the device drivers that manage your machine.
Download Error_invalid_function Fix – helps fix Error_invalid_function on your computer.


Typically, Error_invalid_function problems might be attributable to spyware or virus infections, so it’s clever to use a elimination program just like the one beneath, to remove any spyware viruses.

Download Spyware Remover – scans and erases all spyware, malware or bugs in your pc.
To start the installation, once you’ve selected the link above, a brand new window will appear with several options on it. Click Open or Run this program from its current position. Or to makea copy of the program to your pc for setup at a later time, click on Save or Save this program to hard disk.

Once installed, run each application by pressing its scan/replace button. As soon as the scans are carried out, you’ll be able to let the programs fix the Error_invalid_function problem.

Supported Operating Systems: Microsoft Windows 7, Microsoft Windows Vista, Windows XP, Microsoft Windows Me, Windows 2000 & Windows 98.

Tuesday, November 29, 2011

Fix Ieframe.dll Browser Error

The ieframe.dll DLL file is related to Internet Explorer 7. In many cases, the installation of Internet Explorer 7 causes ieframe.dll errors to appear. Other causes include viruses, certain Windows Updates, incorrect firewall settings, outdated security software applications, and more.


Ieframe.dll errors are fairly varied and really depend on the cause of the problem. A few of the more common ieframe.dll related errors are shown here:

Reset lost Vista password without a reset disc

1. When you log in Vista, you need to type in your password, if incorrect, it refuses you to log in, and you have a choice----"Reset your password" with a reset disk, if you don't have one, do as the following step-by-steps.




2. You should create a bootable ISO CD/DVD when you install any software. Download Bootable CD-ROM ISO Image (Windows Password Recovery Tool 2.0) by clicking here, in the webpage you can download it by clicking the icon, then follow the hints step-by-step.

3. Download ImgBurn by clicking on it, after downloading then you should install ImgBurn by the hint and the images below for reference.

4. Open ImgBurn.

5.Click on "browse for a file" icon labeled in the image below.
6.Select your file and add it.


7.Select the location you want to write the file to in "destination", and check the "verify" box.

8.Then Click on the Write button.

9.The small new pop-up windows informs you when verify is finished.

10. After doing these steps,,boot your vista computer from the boot disk you have created. Select your Windows installation from the list.


11. Select the administrator account from the list for which you want to reset the password.


12. The password of the account can be reset by clicking “reset” button.

13. "Success" message is displayed after the user's password has been successfully reset.


14. After resetting the account password, you can click “reboot” button to reboot the computer

15. Now your vista can be logged in, we have Reset lost Vista password without a reset disc.

Monday, November 21, 2011

How to identify your modem Windows 98 and ME, 2000 and XP , NT

If you are using Windows, to determine what modem you are using you can go to the Control Panel and double click the Modem icon. Instructions are below. You can also check the System Properties -> Device Manager to identify the modem you are using. For additional help using the System Properties, please use the built-in Windows help which is available from the Start menu.



Note: You can also query the modem using ATi commands from the Modem Control Panel or using Hyperterminal. 

Windows 98 and ME

  1. Go to Start -> Settings -> Control Panel.
  2. Double click the Modem icon. Your modem will be listed on the General tab. Note: If the modem is listed as a "Standard" modem, you are not using the appropriate driver for your modem.

Windows 2000 and XP

  1. Double click My Computer.
  2. Double click the Control Panel.
  3. Double click Phone and Modem Options.
  4. Click the Modems tab. Your modem will be listed. Note: If the modem is listed as a "Standard" modem, you are not using the appropriate driver for your modem.

Windows NT

  1. Double click My Computer.
  2. Double click the Control Panel.
  3. Double click the Modems icon. Your modem will be listed on the General tab. Note: If the modem is listed as a "Standard" modem, you are not using the appropriate driver for your modem.

Fix Msxml3.dll error


Have you come across msxml3.dll error while working on your system? Well, Msxml3.dll error is a common computer error that most of the PC users experience while Windows installation or at the time of windows startup and shut down. Msxml3.dll error occurs due to the deletion or corruption of the msxml3.dll file. Once msxml3.dll error encountered in the system, it leads to several erroneous situation and therefore it is needed to fix msxml3.dll error as soon as possible for the safety and integrity of the system.

Consequences of Msxml3.dll error

  • Abrupt system start-up and shut down
  • Mess-up task manager and window registry
  • Freeze up system for a long time
  • Slows computer speed and internet connection
  • Generates several critical errors
  • Makes system vulnerable to spyware and malware threats
  • Failure to launch important applications

Msxml3.dll is an executable file in the Windows operating system that is being shared by various software and hardware components. It is a process that belongs to the Microsoft® Msxml 3.0 SP 7 program. This file is responsible for executing several dll files and plays a vital role in maintaining the stability and integrity of the system. Also, when a program having xml script is unable to locate the specified resource file while execution, it throws“msxml3.dll error 800c0005 system error” or “msxml3 dll 0x800c0005”.

Causes of Msxml3.dll error

  • Deleted or damaged msxml3.dll file
  • Deletion of shared dll file while uninstalling certain programs
  • Due to invalid or outdated drivers
  • Missing files, keys or entries in the registry
  • Serious malware infection

How to fix msxml3.dll error

In order to fix msxml3.dll error, you can also use manual methods but it is little bit risky and also require technical knowledge. Therefore, for safe and efficient msxml3.dll error fix, below mentioned methods are more appropriate and easy.
  1. Old or outdated driver leads to msxml3.dll error. May be your system driver become old or it is not compatible with the required programs. So, download latest drivers and make your system up-to-date.
  2. Corrupted registry is the common cause of msxml3.dll error. Any obsolete keys or unwanted entries within the registry contribute to several computer errors including msxml3.dll error. Therefore, download registry repair tool to thoroughly scan the registry to fix registry errors and to secure the PC from Msxml3.dll errors.

By using above mentioned tool, you will surely be able to fix Msxml3.dll error. But even if msxml3.dll error appears, then you must check for spyware infection. Spyware or malware infection is the main cause of computer errors. The spyware corrupt system files, changes core files and also leads to severe data loss situations. To prevent your PC from these devastating effects, Download spyware removal tool.

Launch each program in your system one by one or either save into your system by clicking on save option. Manual steps can also be used to rectify this error but above mentioned tools are more efficient.

Fix Scripting Errors in Windows


What is a Windows Host Script?

Windows Script Host is an administration tool in Windows operating systems, such as Windows 7, Vista, XP, Windows 2003, etc. Computer administrators can use Windows Script Host (WSH) to automate or administer some tasks for client computers or servers. Some software author will embed scripts to automate tasks using their program. You can run a script with two methods using a desktop – by double-clicking a script file or from a command prompt. WSH can be run from either the protected mode Windows-based host (Wscript.exe), or the real mode command shell-based host (Cscript.exe).




Some malware authors are taking advantage of WSH because it can be used to automate their malicious software. Antivirus and antispyware software vendors are aware of the security concerns on these files which is why it’s recommended to configure the antivirus software to scan all file types in Windows, and in real-time. Note that some security researchers or vendors recommend that you disable WSH in Windows as a preventive measure to protect from viruses that uses WSH. However, most antivirus programs have the ability to detect malicious scripts in a webpage or a file on a computer so it is not a requirement to disable or remove WSH.

The latest version of WSH is v5.8 which is included in Windows 7 computers. Other editions of Windows have version 5.7 or 5.6. Since version 5.6, a WSH can be digitally signed with a valid certificate.

A website that uses scripting can automatically load or run what the script is programmed to do, but Microsoft added security enhancements for Internet Explorer 4.0 and higher to treat WSH objects as unsafe ActiveX controls. End-users will see a dialogue box or warning within the browser if they want to continue running the script from the webpage they are visiting or viewing.

If you come across an error that is related to Windows Script Hosting, check out the solutions in the next sections of this article.

Common Errors

Not all types of script host errors are related to malware or virus infection on a computer. There are programs that require running a script but if the permission of the user account in Windows is limited or restricted, an error message will be displayed saying that it could not run the script. In some cases, if the computer has been configured to run a script file that does not exist anymore, a WSH error message will be displayed saying the system cannot locate the resource specified.

Users are encouraged to take note of the location and file name of the script file and verify if it’s a malware or a trusted program has added or using the script.

An example of a script file that was added by malware but couldn’t run anymore because it was removed or quarantined by an antivirus program is in the screenshot below:
The only solution to fix the above example of a Windows Script Host error message is to locate the script file by using Windows Explorer or the command prompt utility in Windows to manually delete the script added by the malware. You can also use the FileAssassin tool or the "Delete File on Reboot" option in Malwarebytes Anti-Malware or WinPatrol programs to remove locked, undeletable or nasty files from Windows.

General WSH Problems

If any legitimate script files or Windows programs that use a WSH couldn't run due to corrupted WSH files, you can always try to fix the Windows script errors using the following steps below:
  • Re-register Windows Script Host components in Windows - you can automatically re-register WSH files by using the Microsoft Fix-It 50181 tool or manually re-register scripting components (see the next section on how to manually register scripting components).
  • Download and then reinstall Windows Script Hosting - if re-registering WSH components on your computer won't help, it is recommended to re-install WSH. You can download it from the Microsoft Download Center website.
  • Check disk for errors - if re-installing WSH failed to fix script host errors, try to run the check disk utility in Windows to locate bad sectors and recover files. To do this, click Start, click Run, type cmd and then click OK. In the command prompt window, type chkdsk /r and then hit the Enter key on the keyboard. Note that if you are using Windows Vista or Windows 7, you will need to run the command prompt as administrator, by right-clicking on cmd.exe and then select "run as administrator".

Register Components in Windows

To re-register WSH on a Windows computer, click Start, click Run, type cmd, and then click OK. Typeregsvr32 %systemroot%\system32\vbscript.dll and then press the Enter key on your keyboard. Do the same by re-registering the following files:
  • jscript.dll
  • dispex.dll
  • scrobj.dll
  • scrrun.dll
  • wshext.dll
  • wshom.ocx
Note that if you are running a 64-bit edition of Windows using a 64-bit scripting file, you will need to type%systemroot%\system32\regsvr32 %systemroot%\system32\{filename here}.dll in the command prompt window. If you are using a 64-bit edition of Windows but running a 32-bit edition of scripting components, you will need to type %systemroot%\syswow64\regsvr32 %systemroot%\syswow64\[filename here}.dll.

Tuesday, November 15, 2011

Not Enough RAM

What In The World Is Ram?
Random Access Memory, often referred to as “Ram” is simply an alternate data storage for your computer. What does it do? It stores data from running programs and files temporarily for fast retrieval.
Think of “RAM” as a temporary storage container where you can go and grab something quickly, then return it just as quickly.
The more “RAM” you have, the more things you can do at one time. If you are experiencing a slow PC, then adding more “RAM” could be a way to speed up that slow PC.

How Do I Add More RAM?

The first step would be to call or visit your local computer center such as Staples and ask them what type of “RAM” your computer takes. Of course adding “RAM” is also dependant on if you have the room. Consult the computer center and they can help you with this.
At this point you have two choices. You can have the computer center install it, or you can do it yourself. Here is a free video that gives you a very basic idea on how installing “RAM” is carried out. It is actually quite simple!
[kml_flashembed movie="http://www.youtube.com/v/OULZH_CjOmg" width="425" height="328" wmode="transparent" /]
As stated in the video, there are a few things you need to know that are very important. here is a small bulleted list:
  1. Shut Your PC Down and Unplug It
  2. Open Case Per Manufacturer Instructions
  3. Locate Your Slots
  4. Unplug Power Cord *Important!
  5. Use A Staic Strap (see video for instructions)
  6. Install The Memory (see video for instructions)

Monday, November 14, 2011

Volume Activation Management Tool


VAMT 2.0 allows administrators to automate and centrally manage a range of activities related to Windows client, Windows Server, and Office 2010 activation.

TO Download Volume Activation Management Tool Click Below


Download Here
Volume Activation Management Tool (VAMT) 2.0 is a managed MMC plug-in. VAMT uses Windows Management Instrumentation (WMI) to configure managed systems. A convenient command line interface (CLI) allows automated, scheduled VAMT tasks without UI interaction.

Using the VAMT console, administrators can perform many activation-related tasks on remote computers:

  • Manage product keys obtained from the Volume Licensing Service Center (VLSC) or other sources including retail and Microsoft subscription programs such as MSDN, TechNet and partner programs -- and product activations using those keys.
  • Activate remote systems using Key Management Service (KMS), Multiple Activation Key (MAK) or retail activation methods.
  • Perform disconnected proxy activation and reactivation of systems without each system having to connect with Microsoft activation services individually.
  • Assist with license compliance by enabling IT administrators to monitor system license state, including whether systems are licensed and running genuine Windows or Office.
Supported Operating Systems: Windows 7, Windows Server 2003 Service Pack 2, Windows Server 2008 R2, Windows Server 2008 Service Pack 2, Windows Vista, Windows XP Service Pack 3

Thursday, November 10, 2011

Backup Your Bookmarks in Chrome, Firefox and IE


Over the years of being online and general surfing you have probably amassed a pretty extensive bookmark collection separated into categories such as, Entertainment, Bored, Forums etc, which if lost can be pretty annoying to say the least. So in this tutorial we will look at how to go about backing up your bookmarks in Chrome, Firefox and Internet Explorer.

First up is Chrome (v 12.0)

At the top right hand corner of the browser window, click on the Spanner icon and select Bookmark Manager which will open the Bookmarks Manager window. In here at the top, click on the drop down arrow next to Organise and select Export Bookmarks as shown below:


This will then open the next window in which you will tell Chrome where to place the .html file. Re-name the file if you wish (keep the .html extension) and browse to where you want to keep the file and click Save. As you can see below I saved it to a folder on my desktop.

That’s it.

Now let’s do the same in Firefox (v 5.1)

At the top of the browser window choose Bookmarks>Show all bookmarks. This will then open the Library window. At the top click on Import and Backup and then select Backup.


Once you select Backup, a new window will open in which you tell Firefox where to place the .json file (your bookmarks). You can re-name the file if you wish, or just keep the default name it gives (the day’s date) and click Save. Again, I chose the folder I had already saved on my desktop as the place to keep them.


That’s it.

Lastly, let’s look at how to do the same in IE (v 8.0)

At the top of the browser window, select Tools>Import and Export which will open the first window:


Choose Export to a file and click Next


Select Favourites and click Next


Double click on Favourites (top) to include the sub-folders and click Next


Give the .htm file a name and tell it the location you wish to save it to and then click Save.




The correct file path should now be specified above, so click Export.
Note the number of steps in IE compared with Chrome or Firefox that you have to go through to complete this task. Just another reason that I don’t use IE.

Tuesday, November 8, 2011

4 tips for safely conducting research on the web


Surprisingly, basic safety is often ignored by people using the web to research information quickly and efficiently. If you use the Internet for research of any kind, you could be exposing yourself and your company to hidden dangers such as the unauthorized transfer of confidential information. And no one wants to be the person responsible for a companywide computer network shutdown.
Whatever your reason for using the web, there is a smart way to conduct research on it: with an alert eye and a vigilant approach. Use these four tips to help protect yourself and your company from prying eyes and malicious programs.

1. Update, update, update!

Microsoft continually provides enhancements and security updates to all its products, including Internet Explorer. No program is completely safe from harm but as threats are discovered, Microsoft makes fixes, upgrades, and service packs for its products available. To maintain the highest level of security on your computer, you or your IT department must make sure to apply all service packs.
Before you venture onto the web, make sure you are using the latest version of Internet Explorer. At the time of this writing, the latest version is Internet Explorer 8.0.7. To see what version you are using, follow these steps:
  1. In Internet Explorer, on the Help menu, click About Internet Explorer. There are three items you should notice in the window that is displayed:
    • Version: Internet Explorer 8.0.7 is the latest version.
    • Cipher Strength: This is the level of encryption that the browser can support. If you are going to be sending any confidential information over the Internet, you must make sure the cipher strength is 128-bit. If it is less than this value, it will be possible for a hacker to crack the encryption code and view confidential information.
    • Update Versions: Keep your version updated to ensure the balance between security and functionality is correct.
    Use latest version of Internet Explorer Use latest version of Internet Explorer
  2. Click OK to close the window.
If your browser needs updating, go to the Microsoft Update website, where you can download the latest version of Internet Explorer.

2. Get into the zone

By setting up Internet zones to meet your personal needs, your computer can help protect you as you surf the web. A zone is a logical region or grouping of websites, based on where they are physically located and how well you trust the source. These default zones are available in Internet Explorer 8.0.7:
  • Local Intranet — Websites located on your local network. These sites do not have to communicate over the Internet to be accessed.
  • Trusted Sites — A list of websites that you trust not to harm your computer, such as sites you have identified as properly encrypted.
  • Restricted Sites — A list of websites that are known or suspected to be harmful to your computer.
  • Internet — All other sites that don't fall under the other three categories.
You can indicate how Internet Explorer should behave when it accesses a website within each of these zones. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Security tab.
Internet zones can help protect you. Internet zones can help protect you
When you select a web content zone, you can change the security levels. For all but the Internet zone, you can add specific sites to a zone based on your personal requirements. And Custom Level allows you to enable or disable a variety of options based on personal preference. For example, you may want to allow automatic logons only to websites that are located in your Intranet zone instead of everywhere on the Internet. The User Authentication section of the Custom Level zone allows you to set that preference. Or, you may want to ensure your Pop-up Blocker is enabled. Custom Level is where you can ensure your security settings allow your blocker to operate.
Follow the prompts in the Internet Options dialog box in the zone you want to customize by either clicking Sites or Custom Level.

3. Limit your intake of cookies

Cookies are small files stored on your computer that contain information needed on certain websites. A cookie can be used to store user ID, password, preferences, personalization, or other information that is helpful to enhance your experience on that site. For example, suppose you visit a website that allows you to select a preferred language. So you don't have to choose the language preference each time you enter the site, a text file on the site stores language preference directly on your computer as a file, or cookie.
Here's the catch: you don't know what the cookie has been programmed to collect. You don't know if the cookie is malicious or not. If it's malicious, you could quickly end up with a spiteful little program stored directly on your hard drive. A malicious cookie can collect and store almost any information that you may not want it to, such as your name, credit card information, address, or more. Cookies make it possible for unwanted information to be stored and accessed repeatedly when you visit a website.
By default in Internet Explorer, cookies are allowed for all zones except the Restricted Sites zone. However, if you want to limit cookies for a particular zone, here's how you do it:
  1. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Privacy tab.
  2. In the Settings section, move the slider up or down to adjust the settings.
    Select settings for Internet Zones Select settings for Internet Zones
    Moving the slider up incrementally increases the Internet security on your computer, so that cookies are not accepted. Moving the slider down incrementally decreases the security, so that cookies are accepted. Check with the IT department for your organization if you are not sure which settings are appropriate to use.
  3. Also in the Settings section, click Sites to explicitly set a cookie policy for individual websites. Here, you can specify which sites you want to allow or not allow to use cookies. Enter the desired website address in the Address of website text box. Click the Block button to block all cookies for the entered site, or the Allow button to allow all cookies for the entered site.
  4. Continue entering settings for each specific website for which you want to set a cookie policy.
  5. Click OK to return to the Internet Options dialog box. Click OK.
If you are concerned that you may already have cookies on your computer that contain personal information, you can delete cookies and other temporary Internet files by following these steps:
  1. In Internet Explorer, on the Tools menu, click Internet Options.
  2. Make sure the General tab is selected. (This is the default.)
  3. In the Temporary Internet files section, click the Delete button. You will be prompted for confirmation before continuing.
  4. The Temporary Internet files that you can delete are listed and selected for deletion by default, including Cookies. Clear the check box beside any temporary Internet file types that you do not want to delete.
  5. Click OK.
Delete Browsing History Delete Browsing History


4. Check for encryption before entering information on a site

While surfing the Internet is less dangerous than finding an abandoned bag in an airport, security should still be taken seriously. Encryption is a method that website owners use to help protect sensitive information, such as user names, passwords, addresses, phone numbers, and credit card numbers. If a website you visit does not use encryption, any sensitive information you place on it is easily accessible to hackers who want that information for unsavory purposes.
There are two ways to ensure you are viewing an encrypted site.
  • Make sure you are using the latest version of Internet Explorer as outlined in Tip 1 ("Update, update, update!") above.
  • Make sure that a website uses encryption when you are entering or viewing sensitive information. There are two ways to see whether a site uses encryption. One is a small yellow "lock" icon on the status bar of Internet Explorer. The other is in the web address itself. If it begins with https:// (note the "s"), then the site is secure. If you ever visit a website without either of these encryption indicators, do not click a Submit, Save, or OK button, because sensitive information will be transmitted without being encrypted.  

Monday, November 7, 2011

How to tell if the computer is infected by Win32.Ramnit-G malware

The symptoms of Win32.Ramnit-G vary wildly, ranging from slow PC performance to loss of important data. If you are experiencing any of the symptoms listed below, chances are you have Win32.Ramnit-G or another risky unwanted programs installed on your computer:

Sudden slow PC performance

Win32.Ramnit-G can use a lot of your system resources to track your computer activities or deliver pop-up ads that may greatly slow down the computer or even make it crash randomly. If you are recently getting a lot of system crashes, the computer is running much slower than usual or you cannot access your hard properly, then your computer must be infected and should be took care of.


E-mail problemse

Win32.Ramnit-G can collect and send your email address book to an email spammer and send unexpected email messages from your computer without your knowledge. If you get a lot of bounced back emails or notice that thousands of emails were sent without your permission, then it is possible that your computer is infected.


Constant unwanted adse

Win32.Ramnit-G will interrupt you with annoying pop-up ads for adult or other objectionable web sites. If it is controlled by hackers, this can make your computer completely useless once you visit the website in which malicious programming or code is planted.


Unexpected desktop icons, Toolbars or homepagese

Win32.Ramnit-G or other threats may record and reset your account settings or change your default homepage to a different one, which sometimes cannot be changed back. Also, it can also add new desktop items or toolbars to Internet Explorer without letting you know.

Warming tips: No matter whether your computer has been infected by Win32.Ramnit-G or not, we strongly recommended that you should download and run a free spyware scan with PC Safe Doctor right now. It helps to not only detect the threats infecting your PC now, but also prevent such or other malicious threats any time!

How to remove Win32.Ramnit-G manually

1. Boot your computer into safe mode to close all running processes.

2. Remember to back up your system before making any changes for future restore job when necessary.

3. Remove these Win32.Ramnit-G files:


%UserProfile%\Local Settings\Temp\kjkkklklj.bat
%Documents and Settings%\[UserName]\Desktop\Protection Center Support.lnk
4. Open Registry Editor to delete the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 'tmp'
HKEY_LOCAL_MACHINE\SOFTWARE\Paladin Antivirus
HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}
HKEY_CURRENT_USER\Software\Paladin Antivirus
HKEY_CURRENT_USER\Software\Paladin Antivirus
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run '[random string]'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations 'LowRiskFileTypes' = '.exe'

5. It is possibly for Win32.Ramnit-G to load by hiding within the system WIN.INI file and the strings "run=" and "load=". So you must check carefully in order to thoroughly remove it from your computer.

6 It is necessary for you t clean the IE temporary files where the original carrier may store.

Friday, November 4, 2011

Fix STOP 0x000000ED UNMOUNTABLE_BOOT_VOLUME error message

When you first restart your computer during the upgrade to Windows XP, or when you start Windows XP, you may receive the following error message:

STOP 0x000000ED (0xaaaaaaaa,0xbbbbbbbb,0xcccccccc,0xdddddddd)
UNMOUNTABLE_BOOT_VOLUME


Advanced troubleshooting
These methods are intended for advanced computer users. If you are not comfortable with advanced troubleshooting, you might want to ask someone for help, use the Microsoft Customer Support Services Web site to find other solutions, or contact Support. See the "Next steps" section for more information about the Microsoft Customer Support Services Web site.

Begin by reading the "Technical information about the error" section to understand why the error might be generated and the purpose of the message. Otherwise, you can skip this information and begin with "Method 1: Check the error message" to help you resolve the issue.
Technical information about the error
This section provides some technical background about the cause of this error message and why it might be generated.

This behavior can occur if either of the following conditions is true:
Your computer uses an Ultra Direct Memory Access (UDMA) hard disk controller, and the following conditions are true:
You use a standard 40-wire connector cable to connect the UDMA drive to the controller instead of the required 80-wire, 40-pin cable.
The basic input/output system (BIOS) settings are configured to force the faster UDMA modes.
The file system is damaged and cannot be mounted.
The purpose of this error message is to prevent the following two things:
Potential data loss caused by using an incorrect IDE cable for the faster UDMA modes. An IDE cable is a kind of cable used to connect storage devices, such as hard disks, inside a computer.
Continued access to a drive on which the file system is damaged

Method 1: Repair the volume
Note the second parameter (0xbbbbbbbb) in the error message. You might have to regenerate the error in order to write it down.

If the second parameter (0xbbbbbbbb) of the Stop error is 0xC0000032, the cause of the error is that the file system is damaged. You can try to repair the volume to see whether this resolves the error. If the second parameter is not 0xC0000032, see "Method 2: Check the IDE cable and load Fail-Safe settings" for help.
Some things that you should know before you try this solution

If the file system is damaged, you can use chkdsk /r command to repair the volume. However, if you use the chkdsk /r command, you may lose some data.

You will need the Windows startup disks or the Windows installation disk. If you do not have them, contact the computer manufacturer for help in obtaining the disks.

You will need the administrator password to complete the steps.

To repair the volume, follow these steps:

Start your computer by inserting the Windows startup disks or the Windows installation disk if your computer can start from the CD drive.

When the Welcome to Setup screen appears, press R to select the repair option.

If you have a dual-boot or multiple-boot computer, select the Windows installation that you want to access from the Recovery Console.

Type the administrator password when you are prompted to do this.

Note If no administrator password exists, press ENTER.

At the command prompt, on the drive where Windows is installed, type chkdsk /r, and then press ENTER.

At the command prompt, type exit, and then press ENTER to restart your computer.

After you repair the volume, check your hardware to isolate the cause of the file system damage.

If this procedure does not work, repeat it, but type fixboot instead of chkdsk /r in step 5.

If you are still unable to resolve the issue, please see the "Next steps" section for help.

Method 2: Check the IDE cable and load Fail-Safe settings

If your computer uses a UDMA hard disk controller, try these steps. If your computer does not use a UDMA hard disk controller, see the "Next steps" section for help.

If your UDMA hard disk is connected to the controller with a 40-wire UDMA cable, replace the cable with an 80-wire cable.

In the BIOS settings for your computer, load the 'Fail-Safe' default settings, and then reactivate the most frequently used options, such as USB Support.

Thursday, November 3, 2011

Fix Error 9036 CA Product Installation failure


This error causes because of internal error in creating a list of trusted applications for CA personal Firewall

The solution to the problem follow the instructions to fix the error "9036 ca product installation failed creating applications for ca firewall" :

Step 1 :Go to ‘Start’ then Click ‘Run’. 
Step 2 :Type “msconfig” and Press ‘Enter’. 
Step 3 :Click on the Startups tab. 
Step 4 :Click 'Disable All button'. 
Step 5 :Click ‘Apply’ and then click ‘OK’. 
Step 6 :Restart your computer. 
Step 7 :Uninstall All the old CA Software.

Wednesday, November 2, 2011

Chkdsk tool automatically starts scanning

Chkdsk tool automatically starts scanning a disk when you start a computer

The reason behind this problem can be that the disk check option has been configured to run automatically as soon as the user starts the computer.
 
The solution to the problemfollow the instructions to resolve the problem of chkdsk running automatic disk scan:
 
Step1:
Click ‘Start’ and then click on ‘Run’ 
 
Step2:
Type ‘CMD’ and click on ‘OK’
 
Step3:
If you want to disable check disk on C: drive, use the following command on command prompt. 
 
Step4:
‘chkntfs /X C:’ If you want to disable check disk on two or more drives, just keep on adding the drives: ‘chkntfs /X C: D: E:’
 
Step5:
If you want to restore what you have done, that is, enable automatic disk checking on all the drives again, just run the following command: 
 
‘chkntfs /D’

Tuesday, November 1, 2011

Enable Hibernate in Windows 7 using the command prompt


Follow the simple steps below:

- Click Start >> Run

- Type cmd in the Run dialog box and click OK (If you don't see Run then click here to learn how to enable it in your Start Menu in Windows 7)

- In the command prompt window, type the following command:

    powercfg /hibernate on

- Once you have enabled Hibernate, you will see the following when you click the, arrow next to Shut Down on your Start Menu (see picture below)


NOTE: If you don't see the option for Hibernate, then follow these steps:

- Click Start and type Power Options in the search box and then select Power Options (see picture below)




- In the Power Options window, click Change when the computer sleeps

- Now click Change advanced power settings

- Expand Sleep and set Allow hybrid sleep, to OFF (see picture below)

- That should solve the issue. You will now see the hibernate option when click the arrow next to shutdown.

Related Posts Plugin for WordPress, Blogger...

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More