Search
Search Keyword: Total 19 results found.
Tag: troubleshooting Ordering
Bug 174897 - powerdevil causes X server to hog cpu
https://bugs.kde.org/show_bug.cgi?id=174897   checkbox "Let powerdevil manage screen powersaving" in the general tab. By unchecking it, Powerdevil will bypass dynamic DPMS changes, and you will not experience this kind of problem. Unfortunately there is no other solution, since the problem lies at a very lower level. After working with someone on this issue a user found out that he had two APPs doing system monitoring on his box. Simply shutting one of these down resloved his issue. He shut down the powerdevil CPU monitor widget since it was mentioned in the bug report.  He kept System Monitor. System Monitor is a widget that does the same monitoring as powerdevil.

1. Invalid Page Fault.This occurs when the operating system (Windows) fails to actuallyaccess information (data) that was requested by one of yourprograms. solve? Close the offending application that caused the error.2. Fatal Exception Error.This happens when a program or the system itself tries to workwith sickly data, such as a corrupt file. Files get corrupted ifall the ducks aren't lined up just so. Everything has to beabsolutely precise, or wham! Fatal Exception. Nobody was hurt,were they? I hope not!Remedy: Close the offending application. Sometimes it's Windows.3. General Protection Fault (GPF).Your computer has to have enough resources to support everythinggoing on inside. If it runs low, or resources leak into space,you may see a GPF. This may also happen if two applications tryto use the same memory location, like two cars attempting thesame parking place.Remedy: Again close the offending application.4. Runtime Error.These occur while applications are running. The only way to curethem is to restart the application.

I always get the same question when it comes to security.  "How do I secure my computer to keep it from getting infected all the time?" Your security may not be failing.  It could be the person handling the keyboard and mouse.  Some see the warnings, and just ignore them.  Others see the warnings, don't understand them, and install/view anyway.  Plus some others see the warnings, and could care less about them, because it is not their computer.  Many people are also overwhelmed because they have several computers in the home scattered from one end of the home to the other.  So it makes it hard for them to keep track of how the computer is doing if they can't keep track of the location.  Mainly this would be laptops/notebooks.  In other homes it is the number of people using just one laptop/notebook or desktop, and keeping track of them to make sure they are not defeating the security settings/software.  Oh and we must not forget the computers that are never updated through windows update, never scanned, and the security software is never updated. I guess they like the pretty icons sitting in their task bar or something?  Or maybe the lack of the icons sitting in the task bar?  Because a few have even disabled their security software. Years ago a lady contacted me by email saying that her neighbors boy came over about once a week, and always when he left her computer was infected.  She asked me "what is a person to do?"  I said, "Plain and simple, he doesn't use your computer anymore."  She emailed me back stating... "I don't want to be rude."  I emailed her back and asked,  "And he is not being rude to you?"  I got a thank you back from her a month later.  She said it was the first month she had gone through without her computer being infected in the last eight months.  In the eight months this lady was not rude.  She did more cleaning of her computer, than she did actually using it.  She was more worried about being rude, than trying to protect her investment.   She had a great security setup, but the neighbors boy ignored her security even after she explained to him her rules. What was she thinking? Another email I got was from a guy.  He said his son was the problem every security he put in place this kid broke.  He even caught the boy on the computer at like 2:30am in the morning.  He wanted to stop him.  When I found out it was a laptop.  I could not help but to laugh to myself.  I emailed him back and told him to put the computer in his bedroom, under the bed, or in the closet so his son would not have access to it.  Then ground the boy from using the computer for a while.  Clean the computer if it needs cleaned, update everything make sure the security software is always running, and if he brakes the rules about the security settings again then take the computer from him, and tell him he is not using it if he can't follow the rules.  The older the child, the longer the no access to computer. A few days later I got a email back thanking me.  He said it just didn't dawn on him to parent the child.  The boy was sixteen, and he just did not think to do this. Another household both parents emailed me to inform me that they had a problem just keeping track, and keeping the computers clean.  I can't imagine what this household was like.  All I can tell you is their house was a revolving door.  Teens from everywhere.  Mainly because their four children were in sports.  So they had all of their desktops in a central location.  But anyone could use them.  All of the computers had XP and Vista.  They asked for suggestions.   My suggestions were for all of the computers to have passwords on the teen accounts, and parents accounts.  The guest account would be locked down.  They could not download anything etc.  They would have the most limits on this account on each of the computers.  No one (their teens or themselves) could give out the passwords to their own accounts to anyone.  The only password that was given out was to the limited account.  Just in case someone was able to guess or find out their account passwords, it would be a good idea to change the passwords every 60 days on the teen accounts and every 30 days on the parents accounts.  Someone from the home would be at or around the desktops when in use by someone outside the home.  All accounts used a different desktop background too.  You just about have to have this rule when there are so many using the computer.  if need be, change the passwords more often.   It puts a strain on the household. But it is necessary.   This is just in case one of the visitors knows how to go around your security.  So if that account's security does end up being breached, you can check the time and date of the breech, and have a general idea of who did it. It's not fool proof.  But most don't know how to change all of, or how to breech the settings on the computer.  So naturally you can find out.   As for the different desktop backgrounds for each account... This is done so you will know which account they are logged into.  You need only to glance at the screen to know.  This family took this one step further though.  They put a picture on the guest account that was only available to the guest account, and not to the others.  They were able to give privacy to the guest, and be assured they were logged into the right account.  This same account used a certain theme as well.  They could see from across the room, or at the door which account they were logged into.   They had emailed me later on and said they only had trouble with one guest because of this set up.  They did not tell me what the problem was.  They just said they had to stop this one guest from using their computers.  Other than that.  It has worked for them having this setup.  Their computers are more secure than they ever have been.  But it also put a strain on the family.  Because they only used their account, and no one else's...  They had to become more aware of what they themselves were doing on their account.  There was restrictions as to what they could download, because of size of the download, and where the download was located on line.  They followed my rules for downloading WOT and siteadvisor as well.  This made them more aware of the potential danger on line.  A lot of it they did not realize was on the websites they visited.  But they were thankful for the setup because it has saved them several times.  They were already avid users of security software like firewalls, and anti-virus programs. But they changed out their anti-virus software because it was not doing a good job.  They were now happy. Which brings me to another example of another user that emailed me stating that her anti-virus software was just not catching the bad stuff.  Her computer was infected at least once every month or two months.  It is not important to tell you the name of the anti-virus software she was using, but just to inform you that you are not stuck with a anti-virus software if it is not working, then change to something else.  Many things can cause this.  It could be the what you have installed on your computer.  What browser you use.  What firewall you use.  Or the lack of steady updates from the anti-virus software vendor.  What ever the case you are not stuck to always use that anti-virus software.  Change to something else.  You can choose free, or pay.  But be sure that you give the software a free run before you buy first.  That includes firewalls.  If your computer slows down, crashes, or is not able to catch the bad stuff then move on to another security software.  Keep in mind also that certain security software does not play nice with other security software on certain Operating Systems all the time.  Sometimes security software will have glitches, that will just about ruin a computers performance, or ruin the security on your computer.   So if you have a new security software keep a eye out for glitches, rather if they are small or large.  There very well could be something going on in the back ground that you are not aware of.   Your computer should run better, or the same, not worse after installing security software.  Run a test to see how the software is performing too. Firewall test:  https://www.grc.com/x/ne.dll?bh0bkyd2 and anti-virus test: http://www.virusportal.com/com/downloads/down_run.shtml  This lady thought she had to use the software that was installed on her computer when she bought it.  This simply is not true.  The choice is yours, not the security vendor, nor the vendor you purchased your computer from.  The choice is always yours to change to a different vendor for ALL of your software that you need, or want.

Solving their problems was easy, some of them had a hard time accepting the truth.  Others, well let's just say they had a duh moment.   

Ad-aware (Aims at Adware/Spyware.) http://www.lavasoftusa.com/ SpybotSD Aims for the dialers, trojans, hijackers and security/privacy issues. http://www.safer-networking.org/ Spyware Blaster http://www.wilderssecurity.net/spywareblaster.html A-spy For trojans hiding in startup entries. http://vipmeister.com/dl/aspy/aspy.html StartupList, HijackThis and CoolWebShredder http://www.merijn.org/files/hijackthis.zip http://www.merijn.org/files/cwshredder.zip http://www.merijn.org/cwschronicles.html http://www.merijn.org/htlogtutorial.html Info on above and more. http://www.generation.net/~hleboeuf/spyware.htm Parasites: Cookies, Dialers, Keyloggers, Trackers http://www.generation.net/~hleboeuf/bhoindex.htm ~ Spyware Information ~ http://www.mvps.org/inetexplorer/Darnit.htm http://www.cexx.org/adware.htm http://www.mvps.org/winhelp2002/unwanted.htm Online Antivirus scanners: ================ http://housecall.trendmicro.com/housecall/start_corp.asp http://www.kaspersky.com/remoteviruschk.html http://www3.ca.com/virusinfo/virusscan.aspx http://security.symantec.com/sscv6/default.asp http://www.pandasoftware.com/activescan/activescan.asp http://us.mcafee.com/root/mfs/default.asp http://commandondemand.com/eval/index.cfm http://www.ravantivirus.com/scan/ http://www.bitdefender.com/scan/licence.php http://www.drweb-online.com/en/online_check.asp http://www.pcpitstop.com/antivirus/default.asp http://scan.sygatetech.com/prestealthscan.html Anti-virus programs: (not in any type of order) -------------------- KAV (Kaspersky) http://www.kaspersky.com/ eZ Antivirus (Computer Associates) http://www.my-etrust.com/products/Antivirus.cfm Vet (Computer Associates) http://www.vet.com.au/html/products/index.html Sophos http://www.sophos.com/products/software/antivirus/ nod32 http://www.nod32.com/ Norton http://www.symantec.com/nav/

Comodo http://www.comodo.com/home/internet-security/free-internet-security.php

ADVANCED does not mean that newbies should not read these pages outlined below. Read them because I say to read them regardless if you know what they are discussing or not. One day you will pick up on this, and you will already have a some what general idea of what the content is, and you will pick up on it very quickly. Far better to read these pages than to keep yourself in the dark. So don't ignore them. Some of these page are geared towards a regular user. Others are geared towards a ADVANCED user, and the Professional. The pages are just some I came across, that I thought others may like to read. Post a comment if you have questions, or a new link to add. Some ideas on a few pages may ruffle a few feathers. I don't expect you to agree with everything they say. But before you get hot under the collar, do some research on it first. Then post your research , along with your reason for disagreeing. Installing the first three anti-spyware software is a personal preferance. I say to do this because just like some anti-virus software can miss some viruses, so can anti-spyware vendors miss a few. Center for Internet Security - Standards http://www.cisecurity.org/ http://www.cert.org/ http://isc.incidents.org/ ANS Top 20 Vulnerabilities - The Experts Consensus http://www.windowsecurity.com/ http://www.sans.org/top20/ http://www.security-forums.com/index.php http://www.securityfocus.com/ http://samspade.org/ http://www.itsecurity.com/ http://www.governmentsecurity.org/ http://www.bbb.org Federal Trade Commission - Consumer Information Security http://www.ftc.gov/bcp/conline/edcams/infosecurity/ Home PC Firewall Guide http://www.firewallguide.com/ Excellent page for everyone Internet Security Tips http://www.mbna.com/netaccess/mbnaspotlight.html LINKS http://www.isr.net/2005/NP01/cert_cybercrime.html http://www.onlyreviews.com/index.html honest opinions on internet oportunities keep in mind that just because they get a review here check with the BBB and get their two cents worth also. Regardless of how good/bad the review looked it still could be biased. http://www.secinf.net/ Network Security Library http://www.bbb.org/wise/index.asp The Wise Consumer: Online Newsletter

Have you ever gone to a forum, or a help board, and among the many post you see a topic or subject that screams help in Caps?  Then when you get to the post, and begin to read you just want to slap em?  Why you ask?  Well, because their post reads as follows....

           HELP! My puter is not working right.  My (insert software here) is not working.  I don't know what is wrong with it.   

 

Ok so you look at the post, and you ask yourself um.... What version?  What Operating System?  What software were you running when this happened?  What was you trying to do with the software?  Um... What exactly happened?  I mean sheesh, we can't help you much if you don't give us some stats here.  We don't need to know where you was born, but we sure need to know a little bit about how you have your computer configured.  We can't guess.  We are happy, and human just like you are.  (you are human right?)

 

So next time you run into a problem on your computer, type out a brief explanation of what happened (not a novel).  What Operating System you use.  What version of the software you was using.  (Can be found on the tool menu at top under "help" > "about". )

 

If you have no clue what you have running on your computer.  Then visit the link we have on our pages to your left look under Resources, and look for Belarc Advisor. It's free!

While many of us are blessed with sight.  There are many others that are not so blessed.  As a child gets use to a sightless world.  They also will be getting use to the Internet as well. It is very important for you to start a child out slow, but steady getting around the internet.  There is software that does this.  These software are either geared towards Windows, or they are geared towards Mac, or Linux, or all three.  Don't let anyone tell you that you have no options.  A added note is if the individual regardless of age is now having to get use to a sightless world, please spend time with them also at the keyboard.  Some individuals tend to feel overwhelmed, and having a good support system helps them to become independent faster.  

There will come a time that you will install a Windows Update, and the update wont play nice with your computer.  If it starts to act up on day one of the install, then this is the time to remove it.  Some updates just get worse as you restart, or boot your system.  So act as soon as you spot trouble. 
You open a file, and you know you should be able to see it, the file is sitting on the taskbar, but when you click on it you can't see the file's window.  What do you do?  Well... You don't need to reinstall the Windows Operating System.  Do the following: Click the file in the taskbar.Press ALT + spacebar to summon the window's shortcut menu.Press M to choose the move command.Use the keyboards arrow keys to move the window.When you have it moved to the desired spot press the "enter" key on your keyboard.
  You have a computer and the hard drive is filling up fast.  But what is taking up the most space?  

 

Children love the computer. They will log on and stay on the computer all the time, or take up another users time unless you limit their use of the computer this can cause many headaches for family's. As I have said in the past, place the computer in a high traffic area of your home. Never allow a child, or even a teenager to have a computer in their bedrooms. Or permit them to have access to a computer that is placed in a private area of your home. This is really asking for trouble. Preditors are all over the internet, waiting for the opportunity to exploit your child(ren). Preditors are pros, and know what buttons to push.

 

 Years ago your password did not amount to much.  You could use your pet's name, child's, wife, or husband, and get away with it.  But today there are just too many password crackers out there waiting for you to be none creative.  They want you to be lazy so they can use a password cracker software to crack your password in less than two minutes.  With today's computers having 4gb of Ram, and more than one processor, you just are making their life more easier to get to your personal account.  You could be even opening a door up, so they have access to your wireless service.  You can't be lazy anymore.  You have to be creative, and make strong passwords. Thus I created this page to help you protect your personal accounts, files, wireless connections, etc.  Take this seriously, because you never know if someone is after your lifestyle, your livelihood, you could even wake up tomorrow, and find that your identity is gone.

To protect users' private information, unprivileged scripts cannot invoke the Cut, Copy, and Paste commands in the Mozilla rich text editor, so the corresponding buttons on the submit article page will not work. To enable these functions for purposes of submitting a tutorial on this website, you must modify your browser preferences.

So your computer got infected and you are not too sure how it happened? This can happen to the best of us.  But here are the main reasons as to why.

My son-in-law bought a laptop, This is his first one. He wanted the flexibility to be able to work from any location in his home instead of being tied to a desk. So,  he had to learn about setting up a wireless network so he could use the laptop in the living room, out in the yard, or anywhere that he wanted.If you don't take security precautions others can tap into your home network quite easily. Here are the top eight tips for keeping your home network safe.

In the 1970's or somewhere in there the Creeper Virus was launched.  On a US military computer network which was the forerunner to our modern Internet. The virus was written for the Tenex operating system. The infected computers displayed a scroll across the screen that said:  I'M THE CREEPER : CATCH ME IF YOU CAN

If you are not sure where the noise is coming from... turn your computer off, take the back off, and then turn your computer back on.  Sorry I use to leave it on, and then just take the back off, but I found out that sometimes if you just turn it off, take the back off and then turn it on , the culprit causing the problem will sometimes shake, at startup. (mainly fans) making it easier to find the reason for the noise.  The shake can be subtle. The other reason is because some fans if warped will really shake bad at startup.  The other thing is the direction of the noise.  I do know some who are willing to stick their hand in and stop a fan long enough to see if the noise stops, then moving on to the next fan.  I don't recommend this if you don't know what you are doing.  Plus you take seconds to do this stunt instead of minutes, or else you burn something up. Another thing you should know  is the fact that you have the back off checking out the computer.  Do what you have to do, and then close the tower, or turn it off.  Don't admire for too long your computer has those fans placed in there in such a way for a reason.  When you run the computer without the back on, then you diminish what the fans were put there for too accomplish.  

Change ownership and control permissions for folders / files that wont delete in Windows VistaWindows Vista is set up to protect files that are important.  In order to delete them you need to follow this article.

 

Using Safe Mode is not complicated, but it can be scary the first time you have to use it.  So check it out before you have to use safe mode, and then you will know what to expect if the time should ever arise for you to have to use it.