249 tutorials sorted by popularity. Show
Windows 7 allows you to have multiple users sharing the same computer under their own individual accounts. This allows each individual user to have their own location on the computer where they can store their personal documents, pictures, videos, saved games, and other personal data. This also allows the owner of the computer to assign certain accounts the ability to perform administrative tasks like installing software, while limiting other user's abilities.
Category: Security | Read 269,861 times | Last Modified on February 27, 2012
There is a new CoolWebSearch browser hijacker infection that has become very common lately. Symptoms of this infection include your computer becoming slower, popups, and when you start Internet Explorer your web page gets redirected to a site that has a title of Home Search.
Let's face it, the Internet is not a very safe place. There are hackers trying to access your computer, worms trying to infect you, malicious Trojans disguised as helpful programs, and spyware that reports your activities back to their makers. In many cases those who become infected unknowingly become a breeding ground for unwanted programs and criminal activity. It does not have to be this way. With proper education and smart computing the Internet can be a safe, useful, and fun place to visit without having to worry about what is lurking around the corner.
Category: Security | Read 264,074 times | Last Modified on February 27, 2012
Many Spyware, Hijackers, and Dialers are installed in Internet Explorer through a Microsoft program called ActiveX. These activex programs are downloaded when you go to certain web sites and then they are run on your computer. These programs can do a variety of things such as provide legitimate services likes games or file viewers, but they can also be used to install Hijackers and Spyware on to your computer without your permission.
The Internet is a scary place. Criminals on the Internet have the ability to hide behind their computers, or even other peoples computers, while they attempt to break into your computer to steal personal information or to use it for their own purposes. To make matters worse, there always seems to be a security hole in your software or operating system that is not fixed fast enough that could potentially allow someone to hack into your computer. Where does this leave you? Are you supposed to cancel your Internet access, or is there something you can do to protect yourself?
Category: Windows 7, Photo & Image Editing, Windows 8, Windows Vista, Windows XP | Read 261,594 times | Last Modified on December 13, 2012
Windows gives you the ability to take a snapshot of what is shown on your computer screen and save it as a file. You can then view this image at a later date to see what your screen looked like or share this image with other people to view. You may be asking why this is important and why you would want to share screen shots of your computer.
Category: Security | Read 259,167 times | Last Modified on February 22, 2013
One of the top questions I see on forums is "How do I know if I have been hacked?". When something strange occurs on a computer such as programs shutting down on their own, your mouse moving by itself, or your CD constantly opening and closing on its own, the first thing that people think is that they have been hacked. In the vast majority of cases there is a non-malicious explanation for these problems such as faulty hardware or problematic software, but it is better to be safe than sorry for not investigating deeper. Unfortunately, the vast majority of computer users have no idea how to go about determining if their computer is hacked. It is for these people, that I am writing this tutorial.
Category: Windows 7, Windows 8, Windows Vista, Windows XP | Read 252,736 times | Last Modified on December 13, 2012
Ever since Windows 95, the Windows operating system has been using a centralized hierarchical database to store system settings, hardware configurations, and user preferences. This database is called the Windows Registry or more commonly known as the Registry. When new hardware is installed in the computer, a user changes a settings such as their desktop background, or a new software is installed, this information is stored in the registry. The operating system then continually references this information during its operation. Though understanding the Registry will provide good knowledge into the inner workings of your computer, it is important to take extreme care when working with the Registry as modifying it incorrectly can cause problems with the use of your operating system.
Category: Windows 7 | Read 251,633 times | Last Modified on December 13, 2012
The Windows 7 System Recovery Command Prompt is a text-based console that allow you to perform maintenance and recovery tasks on your computer by typing the commands that you would like to execute. These commands allow you to perform a wide variety of tasks such as replace infected files, delete infections, repair boot up configurations for your hard drive, resize hard drive partitions, as well as many other tasks. Like the Windows Vista Recovery Command Prompt, the Windows 7 version also allows you to run graphical programs such as Notepad, Regedit, and possibly some anti-malware programs. This is a huge advantage as you now have a much larger variety of tools at your disposal to repair your computer.
Category: Windows XP, E-Mail, Web Browsers | Read 250,109 times | Last Modified on December 13, 2012
There are times when Internet Explorer 6 or Outlook Express will start crashing or producing errors for no apparent reason. You have cleaned out all Spyware and have had it verified at a Spyware Removal section, yet the problems still persist. Below we have outlined some methods of repair or reinstallation of Internet Explore 6 and Outlook Express. In some situations these methods will fix the problems you are having with these applications and other times it will not.
|Tech Support Forums | The Computer Glossary | RSS Feeds | Startups | The File Database | Virus Removal Guides | Downloads|