Search Keyword: Total 29 results found.
Tag: tutorial Ordering
Bug 174897 - powerdevil causes X server to hog cpu   checkbox "Let powerdevil manage screen powersaving" in the general tab. By unchecking it, Powerdevil will bypass dynamic DPMS changes, and you will not experience this kind of problem. Unfortunately there is no other solution, since the problem lies at a very lower level. After working with someone on this issue a user found out that he had two APPs doing system monitoring on his box. Simply shutting one of these down resloved his issue. He shut down the powerdevil CPU monitor widget since it was mentioned in the bug report.  He kept System Monitor. System Monitor is a widget that does the same monitoring as powerdevil.

1. Invalid Page Fault.This occurs when the operating system (Windows) fails to actuallyaccess information (data) that was requested by one of yourprograms. solve? Close the offending application that caused the error.2. Fatal Exception Error.This happens when a program or the system itself tries to workwith sickly data, such as a corrupt file. Files get corrupted ifall the ducks aren't lined up just so. Everything has to beabsolutely precise, or wham! Fatal Exception. Nobody was hurt,were they? I hope not!Remedy: Close the offending application. Sometimes it's Windows.3. General Protection Fault (GPF).Your computer has to have enough resources to support everythinggoing on inside. If it runs low, or resources leak into space,you may see a GPF. This may also happen if two applications tryto use the same memory location, like two cars attempting thesame parking place.Remedy: Again close the offending application.4. Runtime Error.These occur while applications are running. The only way to curethem is to restart the application.

Find a gift for him or her that's in your budget range by searching for pages containing price numbers in that given range. Just type two numbers, separated by two periods, with no spaces, into the Google search box along with your other search terms. You can use this to set ranges for everything from prices, dates or any other term involving a number. Try searching:      toy $25..$50. The idea is to put your search term in but include the price range also, so you need not be bothered with over priced items.

For dates do the following...  somebooknamehere daterange:2008-01-13..2010-01-13   look very carefully.  The name of the book, and then a space, the rest has no spaces in it!

The last tip is for omitting certain words in your search.  If you put a search in for girls toys... You certainly don't want the word boys showing up in your search results.  So.  You put  Nameoftoy/toytype then you put a space and then -boys  the search will look like this  nameoftoy/ortoytype -boys  if you don't want any bikes in your search results then you put nameoftoy/ortoytype -boys -bikes


You can also put emphasis on certain words.  You want these or this word included in the search terms.  So you put  in the search box          dolls -boys -bikes +furniture

five YouTube Education channels from colleges and universities. Complete course lectures. (not in any type of order) Worth checking out these are channels with many courses. 

Stanford University


UC Berkeley




This article information will be located here, and as part of our links section.

From website:


It was the final unanswered question about Windows 7. But now, thanks to numerous reader reports, my own hands-on experience, and a briefing with the team at Microsoft responsible for this technology, I think we have some answers. Sadly, Microsoft is still making it difficult to clean install Windows 7 with Upgrade media, as it did with Windows Vista. But fear not, there is some good news. While you can't simply use Upgrade media to do a clean install of Windows 7 on a new or previously formatted PC, the workarounds this time are easier than ever. And that's what this article is all about: Revealing the secrets to clean-installing Windows 7 with Upgrade media.   - Paul


Ad-aware (Aims at Adware/Spyware.) SpybotSD Aims for the dialers, trojans, hijackers and security/privacy issues. Spyware Blaster A-spy For trojans hiding in startup entries. StartupList, HijackThis and CoolWebShredder Info on above and more. Parasites: Cookies, Dialers, Keyloggers, Trackers ~ Spyware Information ~ Online Antivirus scanners: ================ Anti-virus programs: (not in any type of order) -------------------- KAV (Kaspersky) eZ Antivirus (Computer Associates) Vet (Computer Associates) Sophos nod32 Norton


ADVANCED does not mean that newbies should not read these pages outlined below. Read them because I say to read them regardless if you know what they are discussing or not. One day you will pick up on this, and you will already have a some what general idea of what the content is, and you will pick up on it very quickly. Far better to read these pages than to keep yourself in the dark. So don't ignore them. Some of these page are geared towards a regular user. Others are geared towards a ADVANCED user, and the Professional. The pages are just some I came across, that I thought others may like to read. Post a comment if you have questions, or a new link to add. Some ideas on a few pages may ruffle a few feathers. I don't expect you to agree with everything they say. But before you get hot under the collar, do some research on it first. Then post your research , along with your reason for disagreeing. Installing the first three anti-spyware software is a personal preferance. I say to do this because just like some anti-virus software can miss some viruses, so can anti-spyware vendors miss a few. Center for Internet Security - Standards ANS Top 20 Vulnerabilities - The Experts Consensus Federal Trade Commission - Consumer Information Security Home PC Firewall Guide Excellent page for everyone Internet Security Tips LINKS honest opinions on internet oportunities keep in mind that just because they get a review here check with the BBB and get their two cents worth also. Regardless of how good/bad the review looked it still could be biased. Network Security Library The Wise Consumer: Online Newsletter

A good majority of people will do a search, and click on the first couple links of the search results.  Other's may go through two or three pages of search results. Many are unaware that search results are unbiased when it comes to secure content.  They only need to contain the "right" search terms. This doesn't mean that you should avoid search engines.  But you should pretty much have a idea if the URL you are fixing to click is from a reputable website, or from a website out to do you, or your computer harm.   

 This is a extensive list of tips to help you protect your computer against viruses.  No method is 100% secure, but this should really help you cut back on them, or even have large breaks in-between infections.  I follow these rules my self, but most call me a pro, but I consider myself as self taught, and somewhat wise.  I have not had a virus in nine years.  (knock on wood)



While many of us are blessed with sight.  There are many others that are not so blessed.  As a child gets use to a sightless world.  They also will be getting use to the Internet as well. It is very important for you to start a child out slow, but steady getting around the internet.  There is software that does this.  These software are either geared towards Windows, or they are geared towards Mac, or Linux, or all three.  Don't let anyone tell you that you have no options.  A added note is if the individual regardless of age is now having to get use to a sightless world, please spend time with them also at the keyboard.  Some individuals tend to feel overwhelmed, and having a good support system helps them to become independent faster.  

Install and run Software on a External Drive

In order to save space if you have a small internal hard drive you may want to consider installing software on a external hard drive.  This does not always work, you will have to experiment.  The problems you may run into are that the software needs to be administrator in order to run. The software may have dll

problems, or it could lock up, or freeze.  Not all software needs a strict regiment of required rules when it is installed, and they run fine on the external drive.

The following APP was downloaded using Firefox, and installed on a Toshiba

external hard drive that was located on the F: drive.  Your location could be

named different.  Named by the manufacturer for the hard drive and

depending on if you have multiple drives.  Follow along as you learn with

this picture tutorial on how to install a software and run the software on

the External hard drive.  It is not as hard as you may think.


For those not knowing .  Here is a eye view of one in action. Be sure to visit the link also.  They have quite a bit of good information on this topic. 

 Here is the video on youtube  or visit the link below. 

A live Twitter phishing attack from Sophos Labs on Vimeo.

Computer maintenance is done every month at least once a month more often if you use office software, graphics software, and add, edit, update, and remove software and files often. Scandisk can be done once a week if necessary. It helps to cut down on some error messages for some computer owners. keep a eye out on the amount of space left on your hard drive. letting it get below 25% of space left can cause problems. Others have said they are good till they get down to the 10% to 12% mark. Disk cleanup is no different than keeping a clean home. Use this as often as you want too. All of this maintenance will help your computer to have a longer life span. It will keep your computer from having to work overtime. A computer that is well maintained will last longer than one that is neglected.

Children love the computer. They will log on and stay on the computer all the time, or take up another users time unless you limit their use of the computer this can cause many headaches for family's. As I have said in the past, place the computer in a high traffic area of your home. Never allow a child, or even a teenager to have a computer in their bedrooms. Or permit them to have access to a computer that is placed in a private area of your home. This is really asking for trouble. Predators are all over the internet, waiting for the opportunity to exploit your child(ren). Preditors are pros, and know what buttons to push.

 Years ago your password did not amount to much.  You could use your pet's name, child's, wife, or husband, and get away with it.  But today there are just too many password crackers out there waiting for you to be none creative.  They want you to be lazy so they can use a password cracker software to crack your password in less than two minutes.  With today's computers having 4gb of Ram, and more than one processor, you just are making their life more easier to get to your personal account.  You could be even opening a door up, so they have access to your wireless service.  You can't be lazy anymore.  You have to be creative, and make strong passwords. Thus I created this page to help you protect your personal accounts, files, wireless connections, etc.  Take this seriously, because you never know if someone is after your lifestyle, your livelihood, you could even wake up tomorrow, and find that your identity is gone.

Backing up your profile folder in Firefox is easy. Just follow these steps (which assumes you know how to manage files on your computer):

To protect users' private information, unprivileged scripts cannot invoke the Cut, Copy, and Paste commands in the Mozilla rich text editor, so the corresponding buttons on the submit article page will not work. To enable these functions for purposes of submitting a tutorial on this website, you must modify your browser preferences.

So your computer got infected and you are not too sure how it happened? This can happen to the best of us.  But here are the main reasons as to why.

My son-in-law bought a laptop, This is his first one. He wanted the flexibility to be able to work from any location in his home instead of being tied to a desk. So,  he had to learn about setting up a wireless network so he could use the laptop in the living room, out in the yard, or anywhere that he wanted.If you don't take security precautions others can tap into your home network quite easily. Here are the top eight tips for keeping your home network safe.

In the 1970's or somewhere in there the Creeper Virus was launched.  On a US military computer network which was the forerunner to our modern Internet. The virus was written for the Tenex operating system. The infected computers displayed a scroll across the screen that said:  I'M THE CREEPER : CATCH ME IF YOU CAN

<< Start < Prev 1 2 Next > End >>