1. Ten Tips To Strengthen System Security  by enrique1985
    1. Look over the local shared resources When running CMD and typing “net share”, if you see something shared unusual, you should turn it off. But sometimes you power it on the next time they appear there again after you turn the shared o
  2. Five points to start using brand new laptop  by enrique1985
    1. Rebuild hard disk partitions Most new laptops have entire disk as one partition, even there are more, the original disk partition is quite irrational. For the sake of manage data conveniently, after buying back the laptop, the first thing many us
  3. Solution and security notices when computer turns slow  by enrique1985
    1. Clean unnecessary boot items Method: Start—Run, enter msconfig command, open Boot item, and preserve antivirus software and necessary system items, like ctfmon. But QQ, Strom media and all kinds of download tool, you could disable all. When
  4. IRC backdoor virus technology analysis and manual cleaning way  by enrique1985
    1. Technical report IRC virus integrates the functions of hacker, worm and backdoor, spreading through LAN shared directories and system bugs. The virus takes simple command dictionary, if user doesn’t set password or the password set is too s
  5. Recognize viruses by the name  by enrique1985
    Most times we already scan and find the computer is infected by some viruses with antivirus software, such as Backdoor.RmtBomb.12, Trojan.Win32.SendIP.15 and so on, these virus names with a string of letters and numbers, sometimes would make people
  1. How to prevent others PING your computer  by enrique1985
    When a hacker is finding objects in the hacking, most will use Ping command to test the host, if Ping is unreasonable, poor standard of "hackers" will quit mostly. In fact, we can create a false impression, even if we are on line, the other can&rsqu
  2. 10 stupid events making your system insecure  by enrique1985
    Users will always use endless method to make them in trouble. They will use the shareware to expose themselves in front of the intruder, or forget to use the voltage protection device. Sharing this list of stupid with your users can prevent them fro
  3. Get to know the relationship between Cookie and browser  by enrique1985
    We can always see Cookie word in browser, but actually it means desserts, how could it be related with browser? When you browse the websites you’ve visited before, probably this would appear in webpage: hello XX, you might feel sweet, just lik
  4. Comparison table of common application ports and Trojan ports  by enrique1985
    15=NETSTAT PORT 21=Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, ebEx, WinCrash 22=SSH PORT 23=Tiny Telnet Server 25=Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30, Antigen, Email Password Sender, Haebu Coceda,
  5. Seven coups of Windows defending invalid user invasion  by enrique1985
    Coup 1: screensaver In Windows, after enabling screensaver, as long as the time we leave computer (or not operate the computer) alone reaches the preset time, system would auto start screensaver application, while when user moves mouse or tap keyboa
  6. Little tip: vicious behavior analysis  by enrique1985
    1. Disable using computer Danger extent: ★★★★ Infection rate: ** Symptom description: although Internet gangsters not use this much, once you get infected, the result is really unimaginable! The result if you b
  7. Password attack analysis  by enrique1985
    Attack principle: When attacker attacks the target, usually they would start from the cracking user password. As long as attacker could guess or confirm user password, he could get the access authority of the machine or the network, and he could a
  8. Block sytem auto-run, then block viruses and Trojans  by enrique1985
    No matter what virus you come to, it always wants to occupy your system, damage your files. Most would add in itself to run automatically every time system restarts, if we have way to let it fail, then you will be away from most viruses and Trojans.
  9. Some assistant operations needed to clean viruses completely  by enrique1985
    When viruses locate under Temporary Internet Files or Cookies directory, please clear IE cache or Cookies. Here’s the method (For all Windows operation systems) Control panel—Internet options Display/hide files, and here’s the way
  10. Refuse Trojan infection  by enrique1985
    User account and password are just like the key for your home door, which is the key to access network resources. No matter Instant Messenger, like MSN or QQ, or mail, forum and so on, which all need user name and password. As the economic value inc
  1. Free Download Dell Inspiron 1300/B130 HD Audio sound card  by 
    We do not host the drivers on laptoprepair.ca we only point to the last known download location. Some download links may not be working while others may redirect you to the publisher's website to initiate the download there. This is because some dr
  2. How to Remove and replace laptop  by 
    The direction below will help teach you how to remove laptop keyboard and replace it. This article doesn’t cover all models, but you may get a rough meaning, the disassembling steps are proper for most laptops. Warning: -If your laptop is stil
  3. Disassembling your Toshiba SATELLITE A100 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by Toshiba prior to sending the produ
  4. Disassembling your Toshiba SATELLITE 3000 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by Toshiba prior to sending the produ
  5. Basic Repairing for Overheating  by Alex
    The basic repairing is an effective way in dealing with slightly overheating. This method does not require opening the laptop case. This method does not require opening the laptop case.
  1. Disassembling your Compaq PAVILION ZX5295 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by HP-Compaq prior to sending the prod
  2. Disassembling your Compaq PAVILION ZX5270 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by HP-Compaq prior to sending the prod
  3. Disassembling your Compaq PAVILION ZX5265 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by HP-Compaq prior to sending the prod
  4. Disassembling your Compaq PAVILION ZX5260 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by HP-Compaq prior to sending the prod
  5. Disassembling your Compaq PAVILION ZX5245 laptop Service manuals  by bloke
    Additions and edits by bloke. This Limited Warranty does not cover...damage due to... Be sure to remove all third party hardware, software, features, parts, options, alterations, and attachments not warranted by HP-Compaq prior to sending the prod
[ Previous 25 | Display By Earliest | Next 25 | Display By Newest ]