Saturday, July 10, 2010

Where Is That Darn Windows Key?

All Windows version requires that you enter a 25 character key (alphanumeric product key) as you install it. The Windows Product Key (also known as a CD key, the license key or just the serial number) can be found on your installation disc package or on a sticker on the case of your PC.

What happens if you just can't locate your product key and you just can't read those Windows product key stickers that manufacturer stick on a computer side because they are too small to ready - and why is it that most manufacturers are printing their production information, such as serial number, model number, etc... too small to read unless you have a magnifier glass handy?. There are few third-party tools that can help you locate your Windows product key from within Windows. The one we use and recommend is a freebie one called Keyfinder, from Magical Jelly Bean.

The Magical Jelly Bean Keyfinder is a freeware utility that retrieves your Product Key (cd key) used to install windows from your registry. It also has a community-updated configuration file that retrieves product keys for many other applications. Another feature is the ability to retrieve product keys from unbootable Windows installations.

KEYFINDER SPECS
  • Price: Free
  • Operating System Supported: Windows 95, Windows 98, Windows Millenium, Windows 2000, Windows XP, Windows Server 2003, windows Vista, Windows 7 and Linux.
  • Work for: Windows 95, Windows 98, Windows Millenium, Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, windows Vista, Windows 7, Linux, Office XP, Office 2003, Office 2007, and Office 2010.

INSTALLATION

The installation and use of Magical Jelly Bean Keyfinder is very easy, just:
FEATURES
  1. Open Source – This means that it can be trusted. The Keyfinder does not contain trojans or “phone home” messages. No spam, spyware, viruses, or trojans.
  2. An optional config file – this functionality lets you pull a key stored in the registry for any software. A sample config file is included in the zip and can be seen here: keyfinder.cfg
  3. Command line options – /save /savecsv /close /hive /file
  4. Load Hive option – allows you to load the registry hive of another Windows installation. To use, put the hard drive in a working machine (must also be Windows 2000,XP or Vista) or use Windows PE (not tested, should work) and click Load Hive. Then point it to the dead Windows install. If you’re using Windows Vista, Administrator rights are required for this feature. You may have to right click on the Keyfinder and run as Administrator.
  5. Improved Save & Print! – save & print options will now include all keys. Save is also available in text or CSV.
Note: Magical Jelly Bean Keyfinder Specs, Installation, Screenshot and Features information were extracted from Magical Jelly Bean's download page.

alt













For more Free Computer Articles, Computer Tips and Hack, click on the appropriate link below.

Computer Articles - At Computer Repair of Reading
Computer Tips and Hacks - At Computer Repair of Reading

or
Free Computer Tips - at Amorca.com
Free Computer Articles - also at Amorca.com


By: Amor A.
Computer Repair of Reading | Amorca Computer and Web Solutions

How To Better Setup a Computer

You just bought a brand new desktop or laptop computer and went through all the steps to complete the setup process for the very first time. Then you start using your brand new computer, which now, feels like a machine on steroids. One month later, that speedy computer turns into something slower than a snail and you ask yourself 'why" and start thinking that your computer might be infected with a virus or spyware.

One month is just enough time to bring changes to your brand new pc and turn it into a sluggish one. Programs are installed on a regular basis and every time you install a software, changes are being made to your computer windows registry - controlling the behavior and appearance of virtually everything on your brand new system.

The speed of your computer depends on your computer's processor, memory (RAM), Drivers, left over entries in the registry, hard drive - the type of hard drive installed will also make a big difference, etc... Frequently installing or un-installing programs might be handled incorrectly by the windows registry, leading to conflicts, which in turns, will lead to a slower PC.

At Computer Repair of Reading, when we are asked to recommend a desktop or laptop computer, we always ask the customer about how will the new pc be used? and once we have that information, we can then recommend a computer. The customer wants the best and powerfull computer at the lowest price possible with the best anti virus and anti-spyware software, and anything related to backing up their music, photos, documents, etc... Fortunately, good and high performance desktops and laptops have become very affordable, therefore, we recommend that the customer looks at the manufacturer "after sale customer" support and not at the computer brand.

and now... to the good stuff

This is what we recommend to every customer when they purchase a new computer (or have a custom one build).

RECOMMENDED HARDWARE
  • A computer - of course
  • An SSD Hard Drive - for OS install
  • A secondary SATA Hard Drive -  for Storage
  • An external hard drive -  for Backup

RECOMMENDED SOFTWARE
  • Antivirus - MS Security Essentials, Avast, AVG, Threatfire Antivirus
  • Antispyware - SuperAntispyare and Malwarebytes (they work great together)
  • Commodo Firewall (works very well with most antivirus software)

COMPUTER SETUP
  • Use an SSD Drive for your main drive - Pricey, smaller capacity, faster (reading and write speed)
  • Use a SATA Hard Drive as your secondary drive - Cheaper, large capacity and faster than older EIDE drives
  • Install Windows 7 - Any version and run the Windows Updates
  • Install all your required software - MS Office, etc... and run the updates
  • Install an antivirus software and update its database
  • Install an antispyware software and update its database - We recommend SuperAntiSpyware
  • Setup your Email Client such as Outlook, Firebird, etc...
  • Install an Imaging software or use Windows Imaging feature (Windows 7)
  • Install your External hard Drive
  • Format your Secondary SATA hard drive using the NTFS file format
  • Install and configure Synctoy
  • Configure your Synctoy to sync automatically with your external drive using windows 'Scheduled Tasks'
  • Optimize your pc using a tool like Glary Utilities 'Glarysoft'
  • Create a system image, using either Window's 7 imaging feature or a stand alone imaging software like Acronis True Image and save that image onto your secondary hard drive
  • Create a Recovery CD
  • Run the backup manualy to test SyncToy and make sure that both drives (secondary drive and the external drive) have synced and make sure that you see your image on both drives


NOTES
  • When you create an image, select full backup so that you will have more than one image created
  • Only create an image when making major changes to the computer
  • Do not diffragment your SSO hard drive
  • You can diffrag your secondary SATA hard drive once in a while
  • Store your Recovery CD in a secure place
  • Put your Email Client pst file (depending on the Client itself) on the Secondary Hard Drive

Windows Registry - The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components as well as the applications running on the platform: the kernel, device drivers, services, SAM, user interface and third party applications all make use of the Registry. The registry also provides a means to access counters for profiling system performance. Again, Windows registry is a very complex database of entries, which stores information about everything on a computer – from the hardware configuration of the machine, to the version of the operating system, to application installed on the computer, to user settings.

SSD Hard Drive - The drives use non-volatile NAND flash memory, meaning there are no moving parts. Because there is no actuator arm and read/write head that must seek out data on a platter like on a hard disk drive (HDD), they are faster in reading and, in most cases, writing data.

Memory - The more RAM, the better - on a Windows 7, we recommend no less than 4GB of RAM

Hard Drive Defragmentation - Recommend only on non-SSD Hard Drives


For more Free Computer Articles, Computer Tips and Hack, click on the appropriate link below.

Computer Articles - At Computer Repair of Reading
Computer Tips and Hacks - At Computer Repair of Reading

or
Free Computer Tips - at Amorca.com
Free Computer Articles - also at Amorca.com


By: Amor A.
Computer Repair of Reading | Amorca Computer and Web Solutions

Best Recommended Free Antivirus Software

Free Antivirus Software We Recommend

At Computer Repair of Reading, we are often asked 'What is the BEST Free Antivirus software do you recommend?" and our answer is something like 'the antivirus software you choose depends on your system and your unique needs'.

Antivirus software should first and always prove their ability to not only detect viruses but also remove them. They should not hinder your computer system performance or system impact and should be user friendly, easy to update its database (automatically is, of course, always better). A good antivirus software should also have the option of right-clicking on a file to scan it for viruses.

Detection is the single most important criteria to consider when purchasing or selecting a free antivirus software. With many different certifying agencies and deciding between them is a daunting task but thanks to AV-Test.org, selecting a good anti virus sotware has become easy. AV-Test.org is a project of the University of Magdeburg and GEGA IT-Solutions GbR, Andreas Marx, products are tested on a variety of platforms and against both in-the-wild (ITW) and Zoo viruses.

Keeping your Windows computer virus-free does not have to cost you a lot of money. It does not even have to cost you any money. Computer Repair of Reading PA - Berks County uses the following free Antivirus software on their computer systems:

There are more free anti-virus software available on the Internet. Just Google 'free anti virus software' and you will receive a  plethoria of website pages about free antivirus software.

For more Free Computer Articles, Computer Tips and Hack, click on the appropriate link below.

Computer Articles - At Computer Repair of Reading
Computer Tips and Hacks - At Computer Repair of Reading

or
Free Computer Tips - at Amorca.com
Free Computer Articles - also at Amorca.com


By: Amor A.
Computer Repair of Reading | Amorca Computer and Web Solutions

How to Avoid Computer Viruses

PCs infected with viruses are common these days but can be avoided if one takes a little time to read (or, at least, be a bit cautious) before clicking on a link or open an email attachment. Even an experienced user might not realize that his or her computer is infected with a virus (Trojans or Worm). Viruses, or malware, can hide among regular files and they will even have the same file name as a windows system file, therefore, camouflaging themselves as standard windows required file.

Symptoms of a Computer Virus

How can you tell if you Laptop or Desktop pc is infected with a virus? Read below for symptoms of a computer virus! If you suspect or confirm that your computer is infected with a computer virus but not sure, the following are some primary indicators that a computer may be infected:
  • The computer runs slower than usual.
  • The computer stops responding, or it locks up frequently.
  • The computer crashes, and then it restarts every few minutes.
  • The computer restarts on its own. Additionally, the computer does not run as usual.
  • Applications on the computer do not work correctly.
  • Disks or disk drives are inaccessible.
  • You cannot print items correctly.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.
  • Anti-Spyware stops listing Spywares even though you believe that your pc has been infected.
  • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
  • An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
  • An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
  • Strange sounds or music plays from the speakers unexpectedly.
  • A program disappears from the computer even though you did not intentionally remove the program.
So if your computer is experiencing one of the above symptoms, read on...

Different Types of Computer Viruses

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:
  • Resident Viruses - Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. This module, however, is not called by a finder module. The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer.
  • Direct Action Viruses - Its purpose is to replicate and take action when it is executed
  • Overwrite Viruses - Deletes information contained in the infected file
  • Boot Virus - This type of virus affects the boot sector of a hard disk
  • Macro Virus - A macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
  • Directory Virus -This virus changes the paths that indicates the location of a file.
  • Polymorphic Virus - Polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence.
  • File Infectors Virus - This type of virus infects program or executable files, with an .EXE or .COM extension. When one of these programs are run, the virus is then activated producing the damaging effects it was programmed to carry out.
  • Companion Viruses - Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
  • FAT Virus - This virus attacks the File Allocation Table. This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
  • Worms - A computer worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • Trojans or Trojan Horses - is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.
  • Logic Bombs - They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

How to Avoid Computer Viruses?

  • Use a software firewall if you cannot afford a hardware firewall
  • Use a hardware firewall (router) if you are going through a router which offers a firewall feature
  • Use sofware AND hardware firewall - even better
  • Run Windows Updates and install critical updates
  • Run Office Updates and install critical updates
  • Install an Antivirus Software and keep it current
  • Set your antivirus software to automatically scan the attachment before it iso open
  • Do not open an e-mail attachment without scanning the attachment first. You might be tempted to open an attachement from an email you believe it to be from a relative but think twice before opening that attachment because your friend's pc could be infected and the email you are receiving might be coming from that infected pc without your friend's knowledge.
  • If you are tempted to open that attachment you received from your friend or a family member, pause of a moment and contact the sender and verifiy that he or she indeed sent you that email.
  • Do not click on any pop-up or pop-under window telling you that your pc is infected with a virus and urging you to run a scan to detect and remove a virus. Run your own antivirus and antispyware software that you have installed yourself.
  • Don't jus download software, trialware or freeware from just any website.
  • Scan the downloaded software for viruses and spyware first before even thinking of installing it even if it is from a reputable website that you trust.
  • If your computer is a shared computer (among family members), set every user with a limited account.

See our 'Recommended Free Anti-virus Software'

For more Free Computer Articles, Computer Tips and Hack, click on the appropriate link below.

Computer Articles - At Computer Repair of Reading
Computer Tips and Hacks - At Computer Repair of Reading

or
Free Computer Tips - at Amorca.com
Free Computer Articles - also at Amorca.com


By: Amor A.
Computer Repair of Reading | Amorca Computer and Web Solutions

How To Better Fight Spyware?

Spyware, like viruses, are pest and we should avoid them at all cost.

If you have been accessing the Internet with no protection, then you PC might be infected. Viruses used to be the #1 threat but today, spyware has surpassed viruses and with no protection, your desktop or laptop pc might be held hostage and its identity stolen.... yours, that is.

What Is Spyware?

Spyware is a type of malware, or malicious software designed to infiltrate a computer system without the owner's consent. Once installed, the spyware starts working and performs tasks that it was designed to do such as collecting little bits of information at a time about users without their knowledge.

Again, malware is an expression, or a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

Spyware can interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is also known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.

The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

History Of Spyware

The first recorded use of the term "spyware" occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Since then, "spyware" has taken on its present sense.

What Is The Difference Between Spyware, Adware and Tracking?

ADWARE - or advertising-supported software, is any software which, once installed, will automatically plays, displays, or downloads advertisements to a user's pc after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.

TRACKING - At Computer Repair of Reading, we call them 'trackware'. Trackware (fall under Spyware) are suspicious programs that tracks user's web browsing then the data is used for 'targeted' advertisement impressions. Some observers even go as far as describing Alexa Toolbar, which is in Internet Explorer plug-in, published by Amazon.com, as spyware and some anti-spyware software will report it as such and remove them.

How is a PC Infected with Spyware?

Spyware are not like viruses or worms, therefore, they do not spread in the same way as a virus would. Spyware do not transmit the infection to her PCs but they do get installed through deception of the user, or exploitation of software vulnerabilities. Now, when we say 'through deception of the user', we meant that most spyware are installed without users' knowledge because a user will not install a software that he know is bad or might disrupt work and compromise their privacy and infect their computer.

Spyware can also come bundled with other software. The user downloads a program and installs it, and the installer additionally installs the spyware. Although the desirable software itself may do no harm, the bundled spyware does. In some cases, spyware authors have paid shareware authors to bundle spyware with their software. In other cases, spyware authors have repackaged desirable freeware with installers that slipstream spyware.

Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware. The spyware author would also have some extensive knowledge of commercially-available anti-virus and firewall software. This has become known as a "drive-by download", which leaves the user a hapless bystander to the attack.

Spyware Removal Tools


In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Because spyware threat has worsened, a number of techniques have emerged to counteract it. These programs are designed to block or remove the infection. Spyware remains a costly problem because when a large number of pieces of spyware have infected a computer, the only solution, most of the time, is to actualy backup user's data onto an external media and re-install windows and all other applications because some version of spyware, such as some versions of Vundo, cannot be completely removed by Symantec, Microsoft, PC Tools, and others because it infects rootkit, Internet Explorer, and Windows' lsass.exe (Local Security Authority Subsystem Service) with a randomly-filenamed dll (dynamic link library).
.
Many programmers and commercial firms have released products specially for blocking or removing spyware. Below is a list of Anti-Spyware software thta we have tested and used for years. Just because one anti spyware software is rated the best today, it does not mean that it will still be rated the best next year, so, you have keep watching anti-spyware software reviews available online.

Anti-Spyware Software Recommended by Computer Repair of Reading

Computer still use and recommend the following anti spyware software:
  • SuperAntispyware - Simple but powerfull anti-spyware tool with improved scan time. Very easy to setup and use and it s detection effectiveness is outstanding. Its removal effectiveness was also high and the system performance was very good for it had a very small footprint. Price at the time of this writing is $9.95 for SUPERAntiSpyware Professional and $9.95 for a LIFETIME SUBSCRIPTION - Limited Time Offer
  • Malwarebytes Anti Malware - Another simple yet powerful security software to detect, defend, and effectively remove a variety of spyware (malware). It is easy to use and setup and its detection effectiveness is quite good. Its Removal effectiveness is very high and its System Performance is very good for it does not require a lot of system resources. Price as of this writting is $24.95 for the Malwarebytes' Anti-Malware Consumer License(s) Electronic Download.

Other Anti-Spyware Tools

The list is not in any particular order.
  • Spy Sweeper
  • CounterSpy
  • STOPzilla
  • Malwarebytes Anti Malware
  • Spyware Doctor
  • SuperAntiSpyware Professional
  • Ad-Aware Pro
  • AntiSpy
  • Spyware BeGone
  • Maxion Spy Killer
Spyware, like we previously mentioned, are not like viruses in that you can have 2 Anti-Spyware software installed on one single computer and not worry about any conflict contrary to trying to install 2 anti virus software on one machine. Computer Repair of Reading recommend to at least have 2 anti-spyware software installed for one might catch one type of malware and  the other catch another type.

Spyware -  In Conclusion

If you want to protect your desktop or laptop pc or yourself, we recommend that you install 2 Anti-Spyware Software and one Anti-Virus and always make sure that they are kept up to date.

For more Free Computer Articles, Computer Tips and Hack, click on the appropriate link below.

Computer Articles - At Computer Repair of Reading
Computer Tips and Hacks - At Computer Repair of Reading

or
Free Computer Tips - at Amorca.com
Free Computer Articles - also at Amorca.com


By: Amor A.
Computer Repair of Reading | Amorca Computer and Web Solutions