Computer technician blog

Categories:

General - General posts, notices and other information.
Viruses - News and articles related to viruses, will be posted in this section.
Windows - How-To guides for Windows users.
Mac - How-To guides for Mac users.

You can subscribe to RSS feed RSS Feed

How to activate a PIN lock on Windows 8?

PIN locks are common features on mobile phones, and a useful security feature available on the majority of modern devices. In this tutorial I explain how to use a PIN lock feature to log in to Windows 8. Although the lock contains only 4 digits, and thus is not highly secure, it remains a popular method. Note also that the PIN cannot contain symbols (digits only), and therefore, it is not recommended for use as a user password. Nevertheless, PIN lock is a useful option, especially to protect computers from casual users who may otherwise use your system for a quick e-mail checks or as a means to access private information. If you forget your PIN code, do not worry, as there is a simple way to restore the original User Password prompt, and we will come to this later.

 
How to take a screenshot in Windows 8?

A screenshot is essentially an image (or snapshot) of your computer screen, generated by pressing a single key. You can generate this image simply by pressing the Prt Screen key on your keyboard.  In order to save the image, you normally require image editing software such as Photoshop or Paint. This guide, however, describes a simpler method to take a screenshot using Windows 8. Most users have faced a situation whereby capturing a screenshot immediately is important. This tutorial describes a method requiring just a single key press; using this method, the screenshot is instantly saved without the need for image editing software.

 
Most useful Windows 8 keyboard shortcuts

15 Essential Windows 8 Keyboard Shortcuts

Shortcuts are such a great way to reach items instantly, that it is little wonder that they are so popular with PC users. Recently, Windows 8 has introduced several changes to the operating system, including some to shortcuts. Even though these changes are relatively minor, I would like to introduce you to some of the main Windows 8 keyboard shortcuts. Here are 15 of the most useful and user-friendly key combinations, which will ease your daily computer work.

 
How to remove a managed Google Chrome extension?

"This extension is managed and cannot be removed or disabled" (Google Chrome) - how to remove?

This article describes how to remove a 'managed' Google Chrome extension. Note that recently, there a rise in adware infections, and in many cases, these potentially unwanted programs (PUP) install on users' Internet browsers disguised as legitimate extensions. Commonly, adware is bundled with free software downloaded from the Internet, the installation of which, is often a consequence of not paying close attention to the installation steps. To avoid inadvertent adware or PUP installation, Internet users should always install freeware choosing the 'Custom Installation' option rather than 'Typical Installation' - and be sure to opt-out of any changes to your Internet browser settings. Also, disallow installation of any additional software. In this removal guide I will demonstrate how to remove the SelectionLinks managed Google Chrome extension. I chose this extension simply as an example, however, this removal guide is generic and will help you to remove any managed Chrome extension.

 
How to create a new user account using command prompt?

How to create a new user account using Command Prompt?

This tutorial describes how to create a new user account in the Windows operating system using Command Prompt. The guide is helpful when dealing with ransomware or fake antivirus programs that block Safe Mode and Safe Mode with Networking. Cyber criminals responsible for developing malicious programs develop new methods to protect their bogus software from elimination - this includes blocking users' access to Safe Mode.

 
How to boot your computer using a rescue disk?

How to burn and use a rescue CD? A method to remove ransomware from your PC.

rescue diskThe recent outrage of ransomware (screen lockers) has impelled me to write this guide to describe how computer users can boot from a rescue disk. Whilst rescue disks are no longer the most common method to remove spyware and viruses, the recent rise in screen locker infections makes them an effective alternative to unlock your PC. Commonly, rescue disks are used to remove viruses from computers when it is impossible to use Safe Mode. In this guide, I use ImgBurn software to burn the .iso file to a CD.

 
Fake Antivirus Software Competition - Is There a Winner?

Today, while testing new malware and fake antivirus samples, a great idea occurred to me. Remember that trick when you hit CTRL+A and ENTER on your friend's computer? All programs, files, shortcuts, and everything else on the desktop are executed simultaneously. When this occurs, the only way to return the system to normal is to restart the computer.

The Idea - What if we do the same with many fake antivirus programs?

This was blowing my mind all day, so I finally decided to take the challenge and do the test. I prepared my old Intel P4 computer with 512 MB of RAM, restored it with a fresh install, and checked if it was in perfect working order.

Meet the participants - Fake antivirus programs

After spending some time searching for various fake antivirus samples, I selected 14 participants. These were fake antivirus programs that scare users into buying full versions by displaying bogus warnings and errors. Some were old versions, some more recent.

Before starting the test, I scanned all samples with AVG Antivirus Free Edition. One fake antivirus was not detected by AVG, despite ensuring AVG was running with the latest updates.

 
How to create a System Repair Disc in Windows 7

windows system repair cd iconHow to create a System Repair Disc in Windows 7

System Repair Disc is a useful option found in Windows 7, and is valuable in many situations. I believe every PC user should have this disk, since you never know when you might need it. The disk provides several solutions if you are unable to boot your operating system. For example, if your computer is infected with malware, your operating system files could be damaged, and you will just see a black screen when you try to boot your computer. If your operating system does not boot to a state whereby you can see a log-in screen, then it is likely to be a difficult problem to fix. If you have a Repair Disk, however, you can perform a Start-up Repair, and this often fixes the operating system so that you can access your desktop. You could also try performing a System Restore to roll back the configuration of your operating system to a previous state (this option is useful if you have recently installed/updated your hardware drivers and you cannot boot your computer). With the above issues in mind, a System Repair Disk is a very useful asset to have.

 

Page 88 of 88

<< Start < Prev 81 82 83 84 85 86 87 88 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.