249 tutorials sorted by popularity. Show
The iPad is ultimately a device create to allow you consume content in an easy and portable manner. As there is no better location for consumable content than the Internet, being able to connect to a Wi-Fi network so you can access the Internet is a necessity. This guide will walk you through all of the steps required to connect to a Wi-Fi network using your iPad. We have also outlined steps that will allow you to access almost all types of Wi-Fi networks as well as using proxy servers if your particular scenario requires it.
Category: Windows XP, Windows 7, Windows 8, Windows Vista | Read 698,862 times | Last Modified on December 13, 2012
Many programs that you install are automatically run when you start your computer and load Windows. For the majority of cases, this type of behavior is fine. Unfortunately, there are programs that are not legitimate, such as spyware, hijackers, Trojans, worms, viruses, that load in this manner as well. It is therefore important that you check regularly your startup registry keys regularly. Windows does offer a program that will list programs that are automatically started from SOME of these locations. This program, Msconfig.exe, unfortunately, though, only lists programs from a limited amount of startup keys.
Category: Windows XP | Read 679,324 times | Last Modified on December 13, 2012
The Recovery Console is a special boot up method that can be used to help fix problems that are preventing your Windows installation from properly booting up into Windows. This method allows you to access the files, format drives, disable and enable services, and other tasks from a console prompt while the operating system is not loaded. It is suggested that the Recovery Console is to only be used only after Safe mode and the other standard startup options do not work. I feel that the Recovery Console is also useful in other situations such as removing malware files that start in both Safe mode and Standard Mode and thus not allowing you to delete the infection.
In this tutorial we will discuss the concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.
When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to.
Category: Security | Read 530,329 times | Last Modified on February 27, 2012
If you suspect that you have spyware installed on your computer, then an excellent tool called Spybot - Search and Destroy can be used to remove them. Follow the instructions below to learn how to use Spybot - S&D to remove these programs from your computer. Word of warning, though, Spyware can sometimes be integrated tightly into software that you use, and if you remove the spyware, that software may not function correctly. So be careful as to what you remove.
Category: Windows Vista | Read 525,761 times | Last Modified on December 13, 2012
The Windows Recovery Environment Command Prompt is a text-based console that allows that allows you to perform many tasks on your computer by typing in the commands that you would like to execute. These commands allow you to perform a range of tasks from managing the files on your hard drives, formatting and repartitioning hard drives, configuring how Windows boots, deleting and copying files, scanning your computer for malware, as well as many other tasks. In past versions of the Windows, the Command Prompt would typically not allow you to run any of your Windows programs that require a graphical user interface. The Command Prompt in the Windows Recovery Environment, though, does allow you to launch certain Windows programs. This is a huge advantage as you now have a much larger variety of tools at your disposal to repair your computer.
Category: Security | Read 467,575 times | Last Modified on February 27, 2012
An excellent free program to include in your collection of anti-spyware programs is Ad-Aware 2007 Free. This tutorial will provide instructions on how to install, configure, and remove malware from your computer using Ad-Aware 2007. It is important to note, though, that Ad-Aware 2007 is not compatible with Windows 95, Windows 98, or Windows ME. If you are using those operating systems then you must follow the instructions on using the older Ad-Aware 6 SE Personal edition.
Category: Windows 7, Windows 8, Windows Vista | Read 461,027 times | Last Modified on December 13, 2012
There are two ways to uninstall a program in Vista; the wrong way and the right way. Unfortunately, though, too many people uninstall a program using the wrong ways, which can lead to poor performance and problems on the computer. These wrong ways are delete the program's folder or just deleting the icons. When you attempt to remove a program in this way, there will be a large amount of configuration information left in the Windows Registry as well as files that may be installed in locations other than the program's folder. These orphan files and Registry data have the chance of causing conflicts on your computer thus leading to problems.
Category: Windows 7, Hardware, Windows 8, Windows Vista, Windows XP | Read 452,201 times | Last Modified on December 13, 2012
In order to use a hard drive, or a portion of a hard drive, in Windows you need to first partition it and then format it. This process will then assign a drive letter to the partition allowing you to access it in order to use it to store and retrieve data.
|Tech Support Forums | The Computer Glossary | RSS Feeds | Startups | The File Database | Virus Removal Guides | Downloads|