Windows gives you the ability to take a snapshot of what is shown on your computer screen and save it as a file. You can then view this image at a later date to see what your screen looked like or share this image with other people to view. You may be asking why this is important and why you would want to share screen shots of your computer.
A basic, but important, concept to understand when using a computer is cut, copy and paste. These actions will allow you to easily copy or move data between one application and another or copy and move files and directories from one location to another. Though the procedures in this tutorial are considered to be basic concepts, you would be surprised as to how many people do not understand these essential features. Even more importantly, once you understand these fundamentals you will be able to use this knowledge on almost any computer operating system as long as you know the corresponding keys that are used for these features. For the purpose of this tutorial I will cover how to cut, copy and paste with the Windows operating system. Other operating systems, such as Linux, Unix, and Apple support these concepts as well but will not be discussed in this tutorial.
A common misconception when working on removing malware from a computer is that the only place an infection will start from is in one of the entries enumerated by HijackThis. For the most part these entries are the most common, but it is not always the case. Lately there are more infections installing a part of themselves as a service. Some examples are Ssearch.biz and Home Search Assistant.
Let's admit it, we have all at one time or another mistakenly deleted a directory or uninstalled a program incorrectly and are now left with entries in the Add/Remove Programs list for programs that no longer exist on our hard drives. When you click on these entries to remove them, Windows complains with an error or nothing happens. For some of the neat freaks out there, this can cause a problem as we now have useless entries cluttering up our Add/Remove Programs list and no way to remove them!
Before Windows was created, the most common operating system that ran on IBM PC compatibles was DOS. DOS stands for Disk Operating System and was what you would use if you had started your computer much like you do today with Windows. The difference was that DOS was not a graphical operating system but rather purely textual. That meant in order to run programs or manipulate the operating system you had to manually type in commands. When Windows was first created it was actually a graphical user interface that was created in order to make using the DOS operating system easier for a novice user. As time went on and newer versions of Windows were developed DOS was finally phased out with Windows ME. Though the newer operating systems do not run on DOS, they do have something called the command prompt, which has a similar appearance to DOS. In this tutorial we will cover the basic commands and usage of the command prompt so that you feel comfortable in using this resource.
Ever since Windows 95, the Windows operating system has been using a centralized hierarchical database to store system settings, hardware configurations, and user preferences. This database is called the Windows Registry or more commonly known as the Registry. When new hardware is installed in the computer, a user changes a settings such as their desktop background, or a new software is installed, this information is stored in the registry. The operating system then continually references this information during its operation. Though understanding the Registry will provide good knowledge into the inner workings of your computer, it is important to take extreme care when working with the Registry as modifying it incorrectly can cause problems with the use of your operating system.
There are times when Internet Explorer 6 or Outlook Express will start crashing or producing errors for no apparent reason. You have cleaned out all Spyware and have had it verified at a Spyware Removal section, yet the problems still persist. Below we have outlined some methods of repair or reinstallation of Internet Explore 6 and Outlook Express. In some situations these methods will fix the problems you are having with these applications and other times it will not.
Everyone knows what a floppy disk is, but a common question, is how do I clean out a floppy so that it can be used again? I have spoken to many people who have said that after they store information on a floppy they throw them out as they do not know how to erase the files on them so that it is an empty and clean disk. This tutorial will cover how to reformat a floppy disk so that you can reuse it as you wish. In this way you will not have to throw out your used floppies, but can instead keep using them over and over.
By default Windows hides certain files from being seen with Windows Explorer or My Computer. This is done to protect these files, which are usually system files, from accidentally being modified or deleted by the user. Unfortunately viruses, spyware, and hijackers often hide there files in this way making it hard to find them and then delete them.
Windows Safe Mode is a way of booting up your Windows operating system in order to run administrative and diagnostic tasks on your installation. When you boot into Safe Mode the operating system only loads the bare minimum of software that is required for the operating system to work. This mode of operating is designed to let you troubleshoot and run diagnostics on your computer. Windows Safe Mode loads a basic video drivers so your programs may look different than normal.