• WSSpywareDr

    WSSpywareDr

    @wsspywaredr

    Viewing 15 replies - 451 through 465 (of 476 total)
    Author
    Replies
    • in reply to: Hard drive thrashing makes computer slow #1393406
        [*]Make sure it has at least 2 GB of RAM.

        [*]Run the appropriate hard drive manufacturer’s hard drive diagnostics to see if the drive is failing:

        [*]ExcelStore
        [*]Fujitsu
        [*]Hitachi/IBM
        [*]Samsung
        [*]Seagate, Maxtor, Quantum[/url]
        [*]Toshiba
        [*]Western Digital[/url]

      Note: If you don’t know which make hard drive is in it, Seagate’s diags work with most.[/list]

    • in reply to: Domain stolen while hosted at GoDaddy: Help! #1393136

      Wikipedia: Domain hijacking > Description

      Domain hijacking can be done in several ways, generally by exploiting a vulnerability in the domain name registration system or through social engineering.

      The most common tactic used by a domain hijacker is to use acquired personal information about the actual domain owner to impersonate them and persuade the domain registrar to modify the registration information and/or transfer the domain to another registrar, a form of identity theft. Once this has been done, the hijacker has full control of the domain and can use it or sell it to a third party.

      Responses to discovered hijackings vary; sometimes the registration information can be returned to its original state by the current registrar, but this may be more difficult if the domain name was transferred to another registrar, particularly if that registrar resides in another country. In some cases the original domain owner is not able to regain control over the domain.

      The legal status of domain hijacking remains unclear. It is analogous with theft, in that the original owner is deprived of the benefits of the domain, but theft traditionally regards concrete goods such as jewelry and electronics, whereas domain name ownership is stored only in the digital state of the domain name registry, a network of computers. There are no specific laws regarding domain hijacking, nor any law that specifically holds the domain name registrar responsible for allowing the registrant information to be modified without the permission of the original registrant. In some cases there may be recourse under trademark law, but not all domain names are (or can be) registered as trademarks.

    • in reply to: Internet Explorer 10 printing webpages #1392707

      AvantBrowser.com[/url]

    • in reply to: HP Pavilion num lock #1392616

      You’re Welcome, and Thanks. 🙂

    • in reply to: Remote Help for Computers #1392491

      Probably one of the easiest ways is join.me (part of logmein.com).

        [*]Have your friend go to http://join.me and click on “start meeting”. In a minute or two they’ll see a 9-digit number at the top center of their screen that they’ll need to read to you.

        [*]You’re already at http://join.me waiting for them to read you that number. As they do, simply type it into the little “join meeting” box and click the green arrowhead (“go”) button.

      That’s all there is to it. You should now be viewing your friend’s computer screen in your browser.

    • in reply to: HP Pavilion num lock #1392487

      TrayStatus[/url]

      Keyboard LEDs[/url]

      kLED

    • in reply to: outlook express #1392127

      No problem. 🙂

    • in reply to: Lost main password #1391933

      Correct. You will need the user’s original password in order to access the user’s EFS encrypted files.

    • in reply to: Lost main password #1391916

      Note that if you reset the password for users with EFS encrypted files, those files will remain unreadable and cannot be recovered.

    • in reply to: Help! System Recovery fail? #1391896

      … but the two buttons — “Next” (highlighted) and “Cancel” — are not responsive to any key, and no mouse cursor with which to click on either button is present

      What happens if you disconnect and reconnect the keyboard and mouse at that point?

      Do you have a different set (different brand) you can try?

    • in reply to: outlook express #1391895

      smtp,live.com

      Try changing the comma in “smtp,live.com” to a period “smtp.live.com”.

    • in reply to: PCWorld.com subscription box removal? #1391892

      Try holding down the [Ctrl] key while tapping the [-] (Minus) key a few times. Hopefully that will decrease the size enough for you to be able to see and click the “close button” on the popup.

      Use [Ctrl][+] (plus) to increase the size, or [Ctrl][0] (zero) to reset.

    • in reply to: Software to improve PC performance #1391752

      @SpywareDr, the link you posted seems to not work. I attempted a fix. Please check to see if this is what you wanted.

      Thanks Medico. 🙂

    • in reply to: Software to improve PC performance #1391691

      How to speed up your PC boot time with Soluto

    • in reply to: WiFi says connected, but can’t access Internet #1391690

      Automatic Private IP Addressing (APIPA) is a DHCP failover mechanism for local networks. With APIPA, DHCP clients can still obtain IP addresses when DHCP servers are non-functional. APIPA exists in all modern versions of Windows except Windows NT.

      When a DHCP server fails, APIPA allocates IP addresses in the private range 169.254.0.1 to 169.254.255.254. As soon as the DHCP server becomes available to service requests, clients update their IP addresses automatically.

    Viewing 15 replies - 451 through 465 (of 476 total)