This is a review and recommendation of The Laptop Repair Workbook: An Introduction to Troubleshooting and Repairing Laptop Computers by Morris Rosenthal.
If you are getting started in laptop repair or you are looking for a laptop repair course, this is a fantastic lightweight book for beginners and professional alike.
This book is written in simple, straightforward language aimed at all levels of readers and will keep you interested. Many people read it from cover to cover, even the sections not related to their repair, just because it’s a great read. Read the rest of this entry »
From time to time, a spamd child process for a user can cause very high load on your linux web server. This can result in very high, or 100% CPU usage. This is a well known bug with spamassassin. Here is how to fix it. Read the rest of this entry »
How to recover your email password from Outlook or practically any other email program.
It has happened to all of us for one reason or another. You need your email password but you don’t have it, you have lost it.
The good news is that if you have used your email password when setting up an email client program on your computer, like Microsoft Outlook, Outlook Express, Windows Live Mail or anything like that, you can get it back.
Instead of spending time and money on the phone to your internet provider, recover your email password with MailPassView.
The McAfee Removal Tool 2012 is another handy software repair tool to have in your arsenal, usable by both computer repair professionals and home users alike.
The McAfee suite of security products, including McAfee Anti-Virus, McAfee Internet Security and the rest of the range, often leave various files and registry entries behind on your computer after an uninstall. This could be because of a crash during the uninstall, a conflict with another program, or just that the uninstaller program does not remove everything that it originally installed.
When one of these products is not fully uninstalled, your computer can still think that the McAfee product is installed, even though most of the files and registry entries are deleted. This can cause problems if you try to re-install the McAfee product again or if you try to install another anti-virus program. Read the rest of this entry »
This article deals with some Questions and Answers relating to the Microsoft virus phone scam.
I had promised in an earlier article to post some Questions and Answers about the scam where a caller claims they are from ‘Microsoft’ and you have some kind of virus on your computer. So here it is. Read the rest of this entry »
The ‘Microsoft’ Phone Scam. If you receive a phone call claiming to be from ‘Microsoft’ or someone claiming to work on their behalf, telling you that you have a virus on your computer which they will help you fix over the phone, It Is A Scam.
Hang up the phone now!
Do not let them have remote control access to your computer and do not give them any money! Read the rest of this entry »
This article is a simple guide to show hidden files on your computer.
Hidden files in Windows can be files that you have hidden yourself or more usually Windows system related files. Occasionally a virus or malware will hide files or entire folders of files on your desktop or your My Documents. However there is a simple way to get them back and visible again. Read the rest of this entry »
What is the key press combination you need to enter to do a Ctrl + Alt + Del while working on a Remote Desktop (RDP) Session?
As a Windows Server Administrator, you will know how useful the Ctrl + Alt + Del keypress combination is. It can be used to lock the computer, bring up the Task Manager, change your password, log off the current user, switch the current logged in user, amongst other things. Read the rest of this entry »
Has a virus or malware suddenly appeared on your computer? Do you want to try to remove it yourself. Here’s a Do It Yourself guide to removing a simple computer virus.
It has been a couple of years since I wrote my original article on the phone scam calls from companies claiming to be Microsoft. The response to the article has been phenomenal, to date over 60,000 people have read the page, over 250 have commented on it and over 2,000 people have Liked it on Facebook, not to mention the other social media networks that have picked it up.
It’s now mid-2012 and I had hoped that by now this kind of thing would be dying off, but the truth appears to be the complete opposite. This scam is more prevalent now than ever before. Read the rest of this entry »