Bleeping Computer® is a self-education tool for the novice user to learn basic concepts about Computer Technology. Our focus is to allow the novice computer user to be able to have a place that they can come and discuss computer/technology problems with their peers and at the same time have a rich resource in which to learn the "basics" about computers and technology.
We have found, with our extensive experience in helping users, whether they be family, friends, coworkers, or clients, that most problems lie not with the computer, but with the fact that the user does not know the "basic concepts" that underlie all issues of computing. These concepts include hardware, files and folders, operating systems, Internet, and applications. Once a user learns the basic concepts of these categories they will be able to express what problems they are having in a more understandable manner, making it easier to be helped by a more experienced user.
The basic concepts of computer technology do not only apply themselves towards fixing problems, but also to every day life. In today's age, computers are here to stay and are only going to be incorporated into our daily life more and more as time goes on. Understanding the basic concepts will allow you to communicate more intelligently about your computer and technology needs and allow you to use your equipment more efficiently.
This site is not geared towards any specific type of user. You will find that the knowledge of the basic concepts will allow you to communicate much more clearly whether or not you are an employer looking to describe the problems you are having to your computer consultant, to discussing with peers the latest and greatest things you are doing with your computer, or to going into a computer store and buying a new add-on or computer.
There is no reason why anyone cannot be knowledgeable about the technology that they use every day and to not feel intimidated by it. With the understanding of what you use and buy, you will find that you save money, have less headaches, and do not feel intimidated when speaking to people who may be more knowledgeable than you.
Our goal, is to turn your #$@!* computer that never does what you want it to do, to one that you praise as a well tamed tool.
Contact Information | |
---|---|
Web Site: | https://www.bleepingcomputer.com/ |
Support Site: | https://www.bleepingcomputer.com/forums/ |
Support E-Mail: | https://www.bleepingcomputer.com/contact-us/ |
Twitter Page: | https://twitter.com/#!/BleepinComputer |
Facebook Page: | https://www.facebook.com/BleepingComputer |
Google Plus Page: | https://plus.google.com/b/112790257026281352252/ |
ListCWall, or ListCryptoWall, is a small utility that can be used to export and backup the list of files encrypted by the CryptoWall ransomware infection. When CryptoWall infects your computer it will encrypt your data and store a list of these encrypted files in your Windows Registry. ListCWall will export a sorted list of infected files into a text file so that you can easily find affected files.
Show Hidden is a small utility that will display all hidden folders, and files if you wish, on your computer. This program will scan all of your fixed and removable drives for folders and files that have the Hidden attribute. When Show Hidden is finished it will create a log that contains a list of all the hidden files and folders that were found.
Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software. When Shortcut Cleaner finds bad shortcuts, it will automatically clean them so that they do not open unwanted programs.
Getservices.zip contains a batch file and the swsc program from Bobbi Flekman that is used to create a list of services installed on your machine for trouble-shooting purposes. You can then use the information in the report to determine if your services are running properly or if there are services that could potentially be malware related.
Hosts-perm.bat is a batch file that will reset the permissions for the Windows HOSTS file. In the event that you attempt to delete or modify the HOSTS file and receive a message stating that you do not have permission, you can use the Hosts-perm.bat to reset the permissions so that you can properly access it.
The Mac Rogue Remover Tool was created to remove the Mac Defender, Mac Security, Mac Protector, and Mac Guard rogue anti-spyware programs from a Mac. Once run, the Mac Rogue Remover Tool will scan the computer for known files and remove them.
FixExec is a program that is designed to fix executable file associations for the .bat, .exe, and .com file extensions. If the program detects any of these associations are missing, changed, or hijacked, the settings will be set back to the original Windows defaults. When file associations for batch, executable, or COM files are changed it could cause your executables to no longer start. If you are looking for FixNCR.reg, this file replaces FixNCR with greater functionality.
RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running.
Unhide is a program that reverts back the changes made to your files and Windows Registry by the rogue.FakeHDD family of rogue anti-spyware program. This family of malware pretends to be a hard disk repair and system optimization program for Windows. In reality, though, these programs are computer infections that deliberately hide your files and change certain settings in the Windows Registry to make it appear that you have lost data on your hard drive. It will then prompt you to purchase the program to restore the data.