Ever notice how each PC has a personality of its own? Or maybe even multiple personalities? In the course of a week, your computer may act friendly, moody, and sometimes downright mean.
However, don't take a hammer to your PC just yet. The following is a list of common symptoms and treatments to help even the most troublesome PCs. You don't even have to be a psychologist (at least not yet) to deal with your PC's neuroses.
Windows 7 and Windows Vista usually manage this automatically, but overall you'll find that these tips work for all versions of Windows, from Windows 95 to Windows 7.
1. You keep getting a "your system is running low on virtual memory" message
Perhaps you're more than familiar with this scenario: You're working on your PC and notice performance getting gradually slower and slower. Programs become harder to open and close. You wait forever for Web pages to be displayed. And then, you get some serious-sounding "virtual memory is too low" message, like the one in the following graphic.
Don't worry: This message isn't as scary as it sounds.
Virtual memory low message
Virtual memory is the space your computer uses when it's short of RAM (Random Access Memory), which is the memory used when running programs like Microsoft Office Word or Microsoft Office PowerPoint.
So what can you do to correct this problem and prevent this message from coming up in the future? The following are some solutions to keep your computer from displaying the "virtual memory minimum is too low" message.
Solution 1: Bump up the virtual memory size on your computer
The first solution is to increase your computer's virtual memory settings. To do so, you first need to determine how much RAM you currently have.
Windows 7: On the Start menu, click Control Panel, then click System.
In the left pane, click Advanced system settings. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
On the Advanced tab, under Performance, click Settings.
Click the Advanced tab, and then, under Virtual memory, click Change.
Clear the Automatically manage paging file size for all drives check box.
Clearing the Automatically manage paging file size for all drives check box
Under Drive [Volume Label], click the drive that contains the paging file you want to change.
Click Custom size, type a new size in the Initial size (MB) or Maximum size (MB) box, click Set, and then click OK.
Note Increases in size usually don't require you to restart your computer for the changes to take effect, but if you decrease the size, you'll need to restart your computer. We recommend that you don't disable or delete the paging file.
Solution 2: Add more RAM to your computer
If you keep getting that dreaded "Your system is running low on virtual memory" message—even after you increase your computer's virtual memory—then you may need to buy more memory for your computer. To really work well:
Windows 7 needs at least 1 GB of RAM to run. See more system requirements for Windows 7.
Windows Vista needs at least 512 MB of RAM to run, but for some applications (like gaming) 1 GB or more of RAM is recommended.
Windows XP needs a minimum of 256 MB of RAM.
The more RAM you have, the better.
Find out how much RAM you have in your computer: On the Start menu, click Control Panel, then click System.
Under System, next to Installed memory (RAM), you can see the amount of RAM your computer has.
Note In some cases, Windows reports both the amount of memory that's installed on your computer and the amount of memory that's usable. If you're using a 32-bit version of Windows, the amount of usable memory might be less than the total amount of memory installed.
If you're at work, contact your company's IT administrator before updating the memory on your computer. They may have some memory available and can help you install it.
If you do need to purchase some more memory, stop by your local computer shop. You can probably buy memory from them, and they'll probably install it for you. Or, you can buy memory online.
--------------------------------------------------------------------------------
2. Your windows slide off the desktop—and you can't grab them
We're all familiar with moving program windows around the desktop. You can click-and-hold the window's title bar to move it around. But what do you do when you accidentally move a window's title bar off the desktop so you can't grab it anymore? The window is stuck in that inconvenient position.
Solution: Use your keyboard to help move your window
The trick to moving these stubborn program windows is to use your keyboard.
Use your keyboard to move a window:Select the program window you're trying to move, and then press ALT+SPACEBAR on your keyboard. The program's shortcut menu is displayed.
Accessing shortcut menu
Click Move.
Use your LEFT ARROW, RIGHT ARROW, UP ARROW, or DOWN ARROW keys to move the window so you can see its title bar on your screen.
After you move the window where you want it, press ENTER.
--------------------------------------------------------------------------------
3. Your taskbar has disappeared
The taskbar is that horizontal bar at the bottom or your computer screen that displays open programs on your desktop. The taskbar also contains the Start menu, which allows you to navigate to various programs installed on your computer. In many ways, it's your command central.
Thus, there's nothing more frustrating than going to start a program, only to find the taskbar gone. A computer without a taskbar will bring you to a grinding halt.
The good news is that the taskbar never disappears—it just hides. It may be hiding behind other open windows, or at the top or side of your screen. You can also (unintentionally) make the taskbar so thin that it seems invisible.
The following are possible reasons why your taskbar has vanished, as well as solutions to keep your taskbar from ever running away again.
Solution 1: Find your taskbar behind other windows
If you don't see your taskbar, minimize all windows on your desktop. See if your taskbar is hiding behind your open windows.
Finding your taskbar behind maximized windows
Set your taskbar so it's always on top of all desktop windows:
Right-click the taskbar, and click Properties.
Select the Lock the taskbar check box.
Make sure the Auto-hide the taskbar check box is not selected.
Locking and keeping the taskbar on top
Now your taskbar will always be visible, no matter how many windows you have open. Locking your taskbar also keeps you from accidentally moving it around.
Solution 2: Find your taskbar elsewhere on your screen
If you have tried minimizing all windows on your desktop and you still don't see your taskbar—perhaps it has been moved. Maybe you've moved it yourself by accident. Or, perhaps someone's playing a practical joke on you. Regardless, the following will help you get your taskbar back to its proper size.
As you did in the previous steps, minimize all windows on your desktop. If you don't see your taskbar at the bottom of the screen, perhaps it's hanging out to the side or at the top of your desktop.
Finding a hidden taskbar
Click-and-drag your taskbar back to the bottom of your screen.
Right-click the taskbar, and then click Properties.
Click to select the Lock the taskbar check box.
Solution 3: Thicken your taskbar
You can make your taskbar a thin line—so skinny it's hard to see. To see if you've done this unintentionally, perform the following:
Minimize all windows on your desktop. Look at each side of your screen. If you see a thin strip, that's the taskbar.
Finding a thin taskbar
Point your mouse at the strip. It changes into a double-sided arrow
Click-and-drag the mouse toward the center of the screen to thicken your taskbar.
After you thicken the taskbar, you can drag it back to the bottom of the screen by following the steps in "Solution 2" above.
Monday, August 29, 2011
Thursday, August 25, 2011
5 ways thieves steal your credit
Personal data can be stolen in seconds, but knowing how it most often happens can help you protect yourself or, if you're a victim, minimize the damage.
Almost gone are the days of the good old-fashioned purse snatcher. With less brute force and more skill, thieves need only a minute, sometimes less, to pilfer your credit card data.
The schemes are simpler than you think. Here are the most common ways thieves pilfer your credit card information.
Suspects: The toy store trio
Modus operandi: Sally, Simon and Bud walk into a toy store. Sally and Simon roam the aisles, while Bud waits in line to check out. When Bud is at the register, Simon comes running up to the clerk, screaming that his wife has fainted. As Sally and Simon distract the salesclerk, Bud switches the credit card reader at the register with a modified one of his own, says FICO's fraud chief, Mike Urban. For the next week, the salesclerk unwittingly collects credit card data on the modified reader until the trio returns, takes back the modified reader and restores the original terminal.
Known whereabouts: The trio will hit other retailers and restaurants, but sometimes the threesome will instead be a twosome or a solo criminal.
Suspect: The waitress at the diner
Modus operandi: The waitress whisks away your credit card and swipes it through the restaurant's register. Then she pulls a small device -- about the size of an ice cube -- from her apron and swipes it through that, says Sgt. David Schultz of the Fort Bend County Sheriff's Office in Texas. While you're scraping the last of the chocolate frosting from your plate, your credit card information has been stored in the device, known as a skimmer. The waitress returns your card and performs the same magic trick on dozens of credit cards in a week.
Known whereabouts: The data-stealing waitress has been known to moonlight as a bartender, salesclerk or at any other job that allows her to take your credit card out of sight.
Suspect: The Gas Lass
Modus operandi: The Gas Lass parks her car in front of a gasoline station off the turnpike. It's late. There's no one around except a sleepy attendant at the register inside. The Gas Lass attaches a skimmer over the credit card reader at the pump. It's a special skimmer: It emits a Bluetooth signal to a laptop close by, says Noonan. The Gas Lass pays, heads off to the motel next door and sets up her laptop to receive the data from the compromised pump over the next several days.
Known whereabouts: The Gas Lass installs skimmers over ATMs, parking meters, vending machines and other places with unmanned credit card readers.
Suspects: Harry the Hacker and Phishing Phil
Modus operandi: Harry the Hacker installs malware -- a type of software that damages or infiltrates a computer or network -- onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer, says Urban. Harry also infiltrates the computer system of banks, retailers and other businesses and extracts personal account information, Noonan says.
Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke, including passwords to your financial accounts.
Suspects: The rest of the criminal crew
Modus operandi: So what happens to these pieces of data when they're in no-good hands? They get sold.
The waitress, trio or Gas Lass sells each swipe for $20 to $40, says Urban. Harry the Hacker and Phishing Phil will get $5 to $10 a card and may sell the information online. The person who buys the information verifies it and then sells it to a person who creates fraudulent credit cards with victims' account information attached to them. The card-maker then sells cards to other criminals who buy goods, such as stereos or baby formula, and sell them to regular consumers.
What you can do
1.Set up mobile alerts for your phone if your financial institution provides the feature. That way, you can be aware of unusual activity as quickly as possible.
2.Regularly monitor your accounts online, so you can identify fraudulent transactions faster.
3.Avoid public computers. Don't log on to your email if your bank corresponds with you there. WebAddo suggests setting up an email account just for your finances and checking it from safe locations.
4.Avoid doing business with unfamiliar online vendors. Stick to established merchants and websites.
5.If your information has been compromised, notify your financial institutions and local law enforcement, which will contact the Secret Service if necessary. Also notify any of the three major credit reporting agencies -- Experian, Equifax and TransUnion -- to set up a fraud alert on your credit reports.
6.Get Identity Theft Protection. If your data is compromised, companies such as Pre-Paid Legal can help you restore your good name.
Almost gone are the days of the good old-fashioned purse snatcher. With less brute force and more skill, thieves need only a minute, sometimes less, to pilfer your credit card data.
The schemes are simpler than you think. Here are the most common ways thieves pilfer your credit card information.
Suspects: The toy store trio
Modus operandi: Sally, Simon and Bud walk into a toy store. Sally and Simon roam the aisles, while Bud waits in line to check out. When Bud is at the register, Simon comes running up to the clerk, screaming that his wife has fainted. As Sally and Simon distract the salesclerk, Bud switches the credit card reader at the register with a modified one of his own, says FICO's fraud chief, Mike Urban. For the next week, the salesclerk unwittingly collects credit card data on the modified reader until the trio returns, takes back the modified reader and restores the original terminal.
Known whereabouts: The trio will hit other retailers and restaurants, but sometimes the threesome will instead be a twosome or a solo criminal.
Suspect: The waitress at the diner
Modus operandi: The waitress whisks away your credit card and swipes it through the restaurant's register. Then she pulls a small device -- about the size of an ice cube -- from her apron and swipes it through that, says Sgt. David Schultz of the Fort Bend County Sheriff's Office in Texas. While you're scraping the last of the chocolate frosting from your plate, your credit card information has been stored in the device, known as a skimmer. The waitress returns your card and performs the same magic trick on dozens of credit cards in a week.
Known whereabouts: The data-stealing waitress has been known to moonlight as a bartender, salesclerk or at any other job that allows her to take your credit card out of sight.
Suspect: The Gas Lass
Modus operandi: The Gas Lass parks her car in front of a gasoline station off the turnpike. It's late. There's no one around except a sleepy attendant at the register inside. The Gas Lass attaches a skimmer over the credit card reader at the pump. It's a special skimmer: It emits a Bluetooth signal to a laptop close by, says Noonan. The Gas Lass pays, heads off to the motel next door and sets up her laptop to receive the data from the compromised pump over the next several days.
Known whereabouts: The Gas Lass installs skimmers over ATMs, parking meters, vending machines and other places with unmanned credit card readers.
Suspects: Harry the Hacker and Phishing Phil
Modus operandi: Harry the Hacker installs malware -- a type of software that damages or infiltrates a computer or network -- onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer, says Urban. Harry also infiltrates the computer system of banks, retailers and other businesses and extracts personal account information, Noonan says.
Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke, including passwords to your financial accounts.
Suspects: The rest of the criminal crew
Modus operandi: So what happens to these pieces of data when they're in no-good hands? They get sold.
The waitress, trio or Gas Lass sells each swipe for $20 to $40, says Urban. Harry the Hacker and Phishing Phil will get $5 to $10 a card and may sell the information online. The person who buys the information verifies it and then sells it to a person who creates fraudulent credit cards with victims' account information attached to them. The card-maker then sells cards to other criminals who buy goods, such as stereos or baby formula, and sell them to regular consumers.
What you can do
1.Set up mobile alerts for your phone if your financial institution provides the feature. That way, you can be aware of unusual activity as quickly as possible.
2.Regularly monitor your accounts online, so you can identify fraudulent transactions faster.
3.Avoid public computers. Don't log on to your email if your bank corresponds with you there. WebAddo suggests setting up an email account just for your finances and checking it from safe locations.
4.Avoid doing business with unfamiliar online vendors. Stick to established merchants and websites.
5.If your information has been compromised, notify your financial institutions and local law enforcement, which will contact the Secret Service if necessary. Also notify any of the three major credit reporting agencies -- Experian, Equifax and TransUnion -- to set up a fraud alert on your credit reports.
6.Get Identity Theft Protection. If your data is compromised, companies such as Pre-Paid Legal can help you restore your good name.
Thursday, August 11, 2011
Top free PC programs everyone should have
There are millions of free and open source projects available, many of them better than any commercially available product. Below is a short listing of what we think is the best out there, broken down into three categories.
Anti-virus and malware protection
Most PC users realize that they need protection on their computer or may have an installed anti-virus program from their computer manufacturer. What most don't realize is that there are free programs that are just as good and in some cases better than the commercial products. Below are our recommendations
Anti-virus program: Avast! or AVG
Malware / Spyware protection: Malwarebytes
Backup solutions
There are dozens of free and commercially available backup programs for computers. Unfortunately many of those backups are stored locally, meaning if your house were to catch fire, get robbed, or if you lost your backup discs all your data would be lost. This is why when dealing with important data we suggest users use online backup services.
Online backup solution: Mozy * or Dropbox or IDrive
* Free 2 or 5 GB of online backup for personal use
Browsers
Although Microsoft Internet Explorer comes pre-installed on Windows computers. There are several excellent free alternatives that everyone should try. These free alternatives can often be faster, have more options, and in many cases be more secure than Internet Explorer.
Internet Browser: Mozilla Firefox or Google Chrome
Anti-virus and malware protection
Most PC users realize that they need protection on their computer or may have an installed anti-virus program from their computer manufacturer. What most don't realize is that there are free programs that are just as good and in some cases better than the commercial products. Below are our recommendations
Anti-virus program: Avast! or AVG
Malware / Spyware protection: Malwarebytes
Backup solutions
There are dozens of free and commercially available backup programs for computers. Unfortunately many of those backups are stored locally, meaning if your house were to catch fire, get robbed, or if you lost your backup discs all your data would be lost. This is why when dealing with important data we suggest users use online backup services.
Online backup solution: Mozy * or Dropbox or IDrive
* Free 2 or 5 GB of online backup for personal use
Browsers
Although Microsoft Internet Explorer comes pre-installed on Windows computers. There are several excellent free alternatives that everyone should try. These free alternatives can often be faster, have more options, and in many cases be more secure than Internet Explorer.
Internet Browser: Mozilla Firefox or Google Chrome
Subscribe to:
Posts (Atom)