Remove Spyware, Trojan and Virus Without Using Antivirus.

Remove spyware,trojan & virus without using antivirus. Remove spyware,trojan & virus without using antivirus from your computer iusing some basic tricks. It can be extremely frustrating when your PC has thousands of viruses, rogue anti-viruses, spyware, malware, and other threats that infect the performance of your computer. You try to play games on it, they freeze. You try to run a Microsoft Office Program to type an important document for work, it won't run. Constant annoying pop-up screens come up out of no-where. Blue Screens flash all the time. You just want to end it.

Unfortunately, many people can't afford to fork out money of expensive anti-viruses that usually don't work, this wikiHow teaches you a way to clean your heavily infected PC, without having to be a heavy computer tech/expert, and also without having to waste time and money on stuff that doesn't work. Just open a notepadthen copy the code below.After copied paste the code on the note pad.Then click on File->Save as->

then use the name SR.BAT to save.After saving open the SR.BAT and see the magic.


@echo off
del/f/s/q autorun.inf
del/f/s/q/a:H autorun.inf
del/f/s/q/a:HR autorun.inf
del/f/s/q/a:HS autorun.inf
del/f/s/q/a:HRS autorun.inf
del/f/s/q/a:RS autorun.inf
del/f/s/q/a:s autorun.inf
del/f/s/q/a:R autorun.inf
del/f/s/q RECYCLER\*.*
del/f/s/q/a:H RECYCLER\*.*
del/f/s/q/a:HR RECYCLER\*.*
del/f/s/q/a:HS RECYCLER\*.*
del/f/s/q/a:HRS RECYCLER\*.*
del/f/s/q/a:RS RECYCLER\*.*
del/f/s/q/a:s RECYCLER\*.*
del/f/s/q/a:R RECYCLER\*.*
del/f/s/q RECYCLEd\*.*
del/f/s/q/a:H RECYCLEd\*.*
del/f/s/q/a:HR RECYCLEd\*.*
del/f/s/q/a:HS RECYCLEd\*.*
del/f/s/q/a:HRS RECYCLEd\*.*
del/f/s/q/a:RS RECYCLEd\*.*
del/f/s/q/a:s RECYCLEd\*.*
del/f/s/q/a:R RECYCLEd\*.*
del/f/s/q windows\prefetch\*.*
del/f/s/q/a:H windows\prefetch\*.*
del/f/s/q/a:HR windows\prefetch\*.*
del/f/s/q/a:HS windows\prefetch\*.*
del/f/s/q/a:HRS windows\prefetch\*.*
del/f/s/q/a:RS windows\prefetch\*.*
del/f/s/q/a:s windows\prefetch\*.*
del/f/s/q/a:R windows\prefetch\*.*
del/f/s/q windows\temp\*.*
del/f/s/q/a:H windows\temp\*.*
del/f/s/q/a:HR windows\temp\*.*
del/f/s/q/a:HS windows\temp\*.*
del/f/s/q/a:HRS windows\temp\*.*
del/f/s/q/a:RS windows\temp\*.*
del/f/s/q/a:s windows\temp\*.*
del/f/s/q/a:R windows\temp\*.*
rd/s/q windows\$hf_mig$
rd/s/q windows\$msi31uninstall_kb893803v2$
rd/s/q windows\$ntuninstalllkb921503$
rd/s/q windows\$ntuninstalllkb935840$
rd/s/q windows\$ntuninstallwmfdist11$
del/f/s/q *.sqm
del/f/s/q/a:H *.sqm
del/f/s/q/a:HR *.sqm
del/f/s/q/a:HS *.sqm
del/f/s/q/a:HRS *.sqm
del/f/s/q/a:RS *.sqm
del/f/s/q/a:s *.sqm
del/f/s/q/a:R *.sqm
del/f/s/q tyktjfww.exe
del/f/s/q/a:H tyktjfww.exe
del/f/s/q/a:HR tyktjfww.exe
del/f/s/q/a:HS tyktjfww.exe
del/f/s/q/a:HRS tyktjfww.exe
del/f/s/q/a:RS tyktjfww.exe
del/f/s/q/a:s tyktjfww.exe
del/f/s/q/a:R tyktjfww.exe
del/f/s/q RavMon.exe
del/f/s/q/a:H RavMon.exe
del/f/s/q/a:HR RavMon.exe
del/f/s/q/a:HS RavMon.exe
del/f/s/q/a:HRS RavMon.exe
del/f/s/q/a:RS RavMon.exe
del/f/s/q/a:s RavMon.exe
del/f/s/q/a:R RavMon.exe
del/f/s/q regsvr.exe
del/f/s/q/a:H regsvr.exe
del/f/s/q/a:HR regsvr.exe
del/f/s/q/a:HS regsvr.exe
del/f/s/q/a:HRS regsvr.exe
del/f/s/q/a:RS regsvr.exe
del/f/s/q/a:s regsvr.exe
del/f/s/q/a:R regsvr.exe
del/f/s/q 0wk2.cmd
del/f/s/q/a:H 0wk2.cmd
del/f/s/q/a:HR 0wk2.cmd
del/f/s/q/a:HS 0wk2.cmd
del/f/s/q/a:HRS 0wk2.cmd
del/f/s/q/a:RS 0wk2.cmd
del/f/s/q/a:s 0wk2.cmd
del/f/s/q/a:R 0wk2.cmd
del/f/s/q OX.cmd
del/f/s/q/a:H OX.cmd
del/f/s/q/a:HR OX.cmd
del/f/s/q/a:HS OX.cmd
del/f/s/q/a:HRS OX.cmd
del/f/s/q/a:RS OX.cmd
del/f/s/q/a:s OX.cmd
del/f/s/q/a:R OX.cmd
del/f/s/q e9ehn1m8.cmd
del/f/s/q/a:H e9ehn1m8.cmd
del/f/s/q/a:HR e9ehn1m8.cmd
del/f/s/q/a:HS e9ehn1m8.cmd
del/f/s/q/a:HRS e9ehn1m8.cmd
del/f/s/q/a:RS e9ehn1m8.cmd
del/f/s/q/a:s e9ehn1m8.cmd
del/f/s/q/a:R e9ehn1m8.cmd
del/f/s/q 1u0o8bnq.cmd
del/f/s/q/a:H 1u0o8bnq.cmd
del/f/s/q/a:HR 1u0o8bnq.cmd
del/f/s/q/a:HS 1u0o8bnq.cmd
del/f/s/q/a:HRS 1u0o8bnq.cmd
del/f/s/q/a:RS 1u0o8bnq.cmd
del/f/s/q/a:s 1u0o8bnq.cmd
del/f/s/q/a:R 1u0o8bnq.cmd
del/f/s/q tip.exe
del/f/s/q/a:H tip.exe
del/f/s/q/a:HR tip.exe
del/f/s/q/a:HS tip.exe
del/f/s/q/a:HRS tip.exe
del/f/s/q/a:RS tip.exe
del/f/s/q/a:s tip.exe
del/f/s/q/a:R tip.exe
del/f/s/q limit.exe
del/f/s/q/a:H limit.exe
del/f/s/q/a:HR limit.exe
del/f/s/q/a:HS limit.exe
del/f/s/q/a:HRS limit.exe
del/f/s/q/a:RS limit.exe
del/f/s/q/a:s limit.exe
del/f/s/q/a:R limit.exe
del/f/s/q wini10806.exe
del/f/s/q/a:H wini10806.exe
del/f/s/q/a:HR wini10806.exe
del/f/s/q/a:HS wini10806.exe
del/f/s/q/a:HRS wini10806.exe
del/f/s/q/a:RS wini10806.exe
del/f/s/q/a:s wini10806.exe
del/f/s/q/a:R wini10806.exe
del/f/s/q NewFolder.exe
del/f/s/q/a:H NewFolder.exe
del/f/s/q/a:HR NewFolder.exe
del/f/s/q/a:HS NewFolder.exe
del/f/s/q/a:HRS NewFolder.exe
del/f/s/q/a:RS NewFolder.exe
del/f/s/q/a:s NewFolder.exe
del/f/s/q/a:R NewFolder.exe
del/f/s/q safemass.exe
del/f/s/q/a:H safemass.exe
del/f/s/q/a:HR safemass.exe
del/f/s/q/a:HS safemass.exe
del/f/s/q/a:HRS safemass.exe
del/f/s/q/a:RS safemass.exe
del/f/s/q/a:s safemass.exe
del/f/s/q/a:R safemass.exe
del/f/s/q desktop.exe
del/f/s/q/a:H desktop.exe
del/f/s/q/a:HR desktop.exe
del/f/s/q/a:HS desktop.exe
del/f/s/q/a:HRS desktop.exe
del/f/s/q/a:RS desktop.exe
del/f/s/q/a:s desktop.exe
del/f/s/q/a:R desktop.exe
del/f/s/q ssvichosst.exe
del/f/s/q/a:H ssvichosst.exe
del/f/s/q/a:HR ssvichosst.exe
del/f/s/q/a:HS ssvichosst.exe
del/f/s/q/a:HRS ssvichosst.exe
del/f/s/q/a:RS ssvichosst.exe
del/f/s/q/a:s ssvichosst.exe
del/f/s/q/a:R ssvichosst.exe
del/f/s/q autorun.inf
del/f/s/q/a:H autorun.inf
del/f/s/q/a:HR autorun.inf
del/f/s/q/a:HS autorun.inf
del/f/s/q/a:HRS autorun.inf
del/f/s/q/a:RS autorun.inf
del/f/s/q/a:s autorun.inf
del/f/s/q/a:R autorun.inf
del/f/s/q ffastun.ffo
del/f/s/q/a:H ffastun.ffo
del/f/s/q/a:HR ffastun.ffo
del/f/s/q/a:HS ffastun.ffo
del/f/s/q/a:HRS ffastun.ffo
del/f/s/q/a:RS ffastun.ffo
del/f/s/q/a:s ffastun.ffo
del/f/s/q/a:R ffastun.ffo
del/f/s/q ffastun.ffl
del/f/s/q/a:H ffastun.ffl
del/f/s/q/a:HR ffastun.ffl
del/f/s/q/a:HS ffastun.ffl
del/f/s/q/a:HRS ffastun.ffl
del/f/s/q/a:RS ffastun.ffl
del/f/s/q/a:s ffastun.ffl
del/f/s/q/a:R ffastun.ffl
del/f/s/q ffastun.ffa
del/f/s/q/a:H ffastun.ffa
del/f/s/q/a:HR ffastun.ffa
del/f/s/q/a:HS ffastun.ffa
del/f/s/q/a:HRS ffastun.ffa
del/f/s/q/a:RS ffastun.ffa
del/f/s/q/a:s ffastun.ffa
del/f/s/q/a:R ffastun.ffa
del/f/s/q ffastun0.ffx
del/f/s/q/a:H ffastun0.ffx
del/f/s/q/a:HR ffastun0.ffx
del/f/s/q/a:HS ffastun0.ffx
del/f/s/q/a:HRS ffastun0.ffx
del/f/s/q/a:RS ffastun0.ffx
del/f/s/q/a:s ffastun0.ffx
del/f/s/q/a:R ffastun0.ffx
del/f/s/q boot.com
del/f/s/q/a:H boot.com
del/f/s/q/a:HR boot.com
del/f/s/q/a:HS boot.com
del/f/s/q/a:HRS boot.com
del/f/s/q/a:RS boot.com
del/f/s/q/a:s boot.com
del/f/s/q/a:R boot.com
del/f/s/q 2fiji.com
del/f/s/q/a:H 2fiji.com
del/f/s/q/a:HR 2fiji.com
del/f/s/q/a:HS 2fiji.com
del/f/s/q/a:HRS 2fiji.com
del/f/s/q/a:RS 2fiji.com
del/f/s/q/a:s 2fiji.com
del/f/s/q/a:R 2fiji.com
del/f/s/q 1rfw8hjr.com
del/f/s/q/a:H 1rfw8hjr.com
del/f/s/q/a:HR 1rfw8hjr.com
del/f/s/q/a:HS 1rfw8hjr.com
del/f/s/q/a:HRS 1rfw8hjr.com
del/f/s/q/a:RS 1rfw8hjr.com
del/f/s/q/a:s 1rfw8hjr.com
del/f/s/q/a:R 1rfw8hjr.com
del/f/s/q autoexec.com
del/f/s/q/a:H autoexec.com
del/f/s/q/a:HR autoexec.com
del/f/s/q/a:HS autoexec.com
del/f/s/q/a:HRS autoexec.com
del/f/s/q/a:RS autoexec.com
del/f/s/q/a:s autoexec.com
del/f/s/q/a:R autoexec.com
del/f/s/q cmd.com
del/f/s/q/a:H cmd.com
del/f/s/q/a:HR cmd.com
del/f/s/q/a:HS cmd.com
del/f/s/q/a:HRS cmd.com
del/f/s/q/a:RS cmd.com
del/f/s/q/a:s cmd.com
del/f/s/q/a:R cmd.com
del/f/s/q virusremoval.vbs
del/f/s/q/a:H virusremoval.vbs
del/f/s/q/a:HR virusremoval.vbs
del/f/s/q/a:HS virusremoval.vbs
del/f/s/q/a:HRS virusremoval.vbs
del/f/s/q/a:RS virusremoval.vbs
del/f/s/q/a:s virusremoval.vbs
del/f/s/q/a:R virusremoval.vbs
del/f/s/q bo1dhu.bat
del/f/s/q/a:H bo1dhu.bat
del/f/s/q/a:HR bo1dhu.bat
del/f/s/q/a:HS bo1dhu.bat
del/f/s/q/a:HRS bo1dhu.bat
del/f/s/q/a:RS bo1dhu.bat
del/f/s/q/a:s bo1dhu.bat
del/f/s/q/a:R bo1dhu.bat
del/f/s/q tdss4c92.tmp
del/f/s/q/a:H tdss4c92.tmp
del/f/s/q/a:HR tdss4c92.tmp
del/f/s/q/a:HS tdss4c92.tmp
del/f/s/q/a:HRS tdss4c92.tmp
del/f/s/q/a:RS tdss4c92.tmp
del/f/s/q/a:s tdss4c92.tmp
del/f/s/q/a:R tdss4c92.tmp
msg %username% “Spyware and Trojan Remover-By TechCarePoint.blogspot.com ......




TechCarePoint

How to Remove Shortcut Virus from PC / Laptop / Pendrive permanently

Posted Under:
Most of Computer User are familiar with a sentence that "Computer Virus infection is only removed through antivirus programs". But this time we are talking about Shortcut Virus which is a new modern virus automatically comes in your Computer/USB/SD Card/Pendrive and convert your content into a shortcut. Some time this virus also invisible your all contents.The first thing I really got mad for the Shortcut virus problem is not removable by anti-virus programs.

When you Scan your Shortcut virus infected storage with anti-virus program they give “No threat detected” which was really confusing. Once I came across this shortcut folder virus and then I researched on it and found the solution to Remove shortcut virus from PC/Laptop or from Pen drive. So today I am going to tell you how you can avoid or remove this virus from your system.

Method 1: Remove Shortcut using cmd 



For Unaffected Computer:

  1. From Start Menu click on RUN .
  2. Type wscript.exe and press enter.
  3.  Click on Stop script after specified number of seconds . Put the valus 1 . Then Click on Apply .

Now, No Virus will not be able to enter your computer for pendrive/removable device.

For Affected Computer:

  1. Press Ctrl+Shift+Esc from KeyBoard
  2.  Go To Process Tab
  3. Now, Select wscript.exe file.
  4. Then Click on End Process
  5. Now Go through Your Computer C:/  And search wscript using search Box.
  6. If, you find any file Delete all of them by pressing Shift+Delete key
  7. If, some file are unable delete then skip them
  8. Then From Start Menu click on RUN .
  9. Type wscript.exe and press enter.
  10.  Click on Stop script after specified number of seconds . Put the valus 1 . Then Click on Apply .



Now, No Virus will not be able to enter your computer for pendrive/removable device.

For Affected Computer:

  1. Connect your affected pendirive on your computer
  2. From Start Menu click on RUN .
  3. Type cmd and press enter.
  4. Now, Type Your Pendrive letter(Like: H:) and press enter.
  5. Then type this code correctly
    attrib -s -h -r /s /d *.*
  6. After typing Press enter from your Keyboard
  7. Now, Open your Pendrive from My Computer . You will show all of pendrive files.
  8. Collect and save all of important and necessary files from your pendrive to Hard Disk and format your pendrive.
Now, Your Computer and pendrive is totally shortcut virus free.

Method 2: Remove Shortcut using BAT (.bat) file


  1. Open Notepad from your computer/laptop.
  2. Type or copy the below code as it is on notepad.
  3. @echo off
    attrib -h -s -r -a /s /d Drive:*.*
    attrib -h -s -r -a /s /d Drive:*.*
    attrib -h -s -r -a /s /d Drive:*.*
    @echo complete

  1. Make sure to replace Drive with your drive name. Eg: H:
  2. Now click on Save As… by clicking on File tab in notepad and change the save as type to “All files(*.*)” from “Text documents” and rename it to removeshortcutvirus.bat and save it on your desktop.

  1. Now close notepad and go to desktop and double click on the BAT file that you have just created.
  2. All shortcut viruses from the respective drive will now be removed in couple of seconds and your original files will be back.

Tags:
how to remove shortcut virus, how to remove shortcut virus from pc, how to remove shortcut virus from pendrive, how to remove shortcut virus from pendrive using cmd, how to remove shortcut virus from windows 7, how to remove shortcut virus from pc using cmd, how to remove shortcut virus from pendrive, how to remove shortcut virus from pc without antivirus, how to remove shortcut virus from computer without antivirus, remove shortcut virus from pc software, remove shortcut virus from computer windows 7, remove shortcut virus from pc permanently, remove shortcut virus from pendrive and system permanently, how to remove shortcut virus from pendrive without losing data, how to remove shortcut virus from laptop, how to remove shortcut virus from memory card, how to remove shortcut virus from pen drive memory card and hard disk, How to Remove shortcut virus from PC/Laptop/Pendrive 


What is function keys? Uses Of Function Keys (F1 to F12) In Computer

Posted Under:

What is function keys?

A function key is a key on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions, a form of soft key. On some keyboards/computers, function keys may have default actions, accessible on power-on.

Function Keys (F1 to F12) In Computer

Commonly known as function keys on a computer keyboard, F1 through F12 may have a variety of different uses or no use at all. The operating system installed on the computer and the software program currently open can change how each of these keys operate. A program is capable of not only using each of the function keys, but also combining the function keys with the ALT or CTRL key. For example, Microsoft Windows users can press ALT + F4 to close the program currently active.

Note:
Some keyboards include additional functions on the function keys, which can be activated by pressing the FN key, usually located near the CTRL key, and the appropriate function key. The additional functions available with the use of the FN key will differ depending on the type and brand of keyboard being used. You may check computer's documentation or manufacturer's website for specific details on which features are available on your keyboard function keys with the use of the FN key.

Tip:
Some computers may automatically enable the FN key for accessing the special functions on the F1 through F12 keys. You may be able to turn off the FN key by accessing the keyboard settings in the Control Panel.

If your keyboard does not have a row of function keys, they are probably set up as secondary functions on other keys.Some laptop keyboards are set up this way to save space. They can be activated by pressing another key plus the key with the secondary F key functionality.


Below is a listing of some of the more common functions of the functions keys for Microsoft Windows and Microsoft applications, as well as some for Mac OS.
As mentioned above, not all programs support these function keys and the function keys on your keyboard may perform different tasks then those mentioned below.

Uses Of Function Keys (F1 to F12) In Computer


F1: Function 1
  • Almost always used as the help key, almost every program opens a help screen when this key is pressed.
  • Enter CMOS Setup.
  • Windows Key + F1 would open the Microsoft Windows help and support center.
  • Open the Task Pane.


F2 : Function 2
  • In Windows renames a highlighted icon, file, or folder in all versions of Windows.
  • Alt + Ctrl + F2 opens document window in Microsoft Word.
  • Ctrl + F2 displays the print preview window in Microsoft Word.
  • Quickly rename a selected file or folder.
  • Enter CMOS Setup.


F3 : Function 3
  • Often opens a search feature for many programs including Microsoft Windows when at the Windows Desktop.
  • In MS-DOS or Windows command line F3 will repeat the last command.
  • Shift + F3 will change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word.
  • Windows Key + F3 opens the Advanced find window in Microsoft Outlook.
  • Open Mission Control on an Apple computer running Mac OS X.

F4 : Function 4
  • Open find window in Windows 95 to XP.
  • Open the address bar in Windows Explorer and Internet Explorer.
  • Repeat the last action performed (Word 2000+).
  • Alt + F4 closes the program window currently active in Microsoft Windows.
  • Ctrl + F4 closes the open window within the current active window in Microsoft Windows.

F5 : Function 5
  • In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.
  • Refresh the list of contents in a folder.
  • Open the find, replace, and go to window in Microsoft Word.
  • Starts a slideshow in PowerPoint.

F6 : Function 6
  • Move the cursor to the address bar in Internet Explorer, Mozilla Firefox, and most other Internet browsers.
  • Ctrl + Shift + F6 opens to another open Microsoft Word document.
  • Reduce laptop speaker volume (on some laptops).

F7 : Function 7
  • Commonly used to spell check and grammar check a document in Microsoft programs such as Microsoft Word, Outlook, etc.
  • Shift + F7 runs a Thesaurus check on the word highlighted.
  • Turns on Caret browsing in Mozilla Firefox.
  • Increase laptop speaker volume (on some laptops).

F8 : Function 8
  • Function key used to enter the Windows startup menu, commonly used to access Windows Safe Mode.
  • Used by some computers to access the Windows recovery system, but may require a Windows installation CD.
  • Displays a thumbnail image for all workspace in Mac OS.

F9 : Function 9
  • Refresh document in Microsoft Word.
  • Send and receive e-mail in Microsoft Outlook.
  • Opens the Measurements toolbar in Quark 5.0.
  • Reduce laptop screen brightness (on some laptops).
  • With Mac OS 10.3 or later, displays a thumbnail for each window in a single workspace .
  • Using the Fn key and F9 at the same time opens Mission Control on an Apple computer running Mac OS X.

F10 : Function 10
  • In Microsoft Windows activates the menu bar of an open application.
  • Shift + F10 is the same as right-clicking on a highlighted icon, file, or Internet link.
  • Access the hidden recovery partition on Compaq, HP, and Sony computers.
  • Enter CMOS Setup on some computers.
  • Increase laptop screen brightness (on some laptops)
  • With Mac OS 10.3 or later, shows all open Windows for the active program.

F11 : Function 11
  • Enter and exit fullscreen mode in all modern Internet browsers.
  • Ctrl + F11 as computer is starting to access the hidden recovery partition on many Dell computers.
  • Access the hidden recovery partition on eMachines, Gateway, and Lenovo computers.
  • With Mac OS 10.4 or later, hides all open windows and shows the Desktop.

F12 : Function 12
  • Open the Save as window in Microsoft Word.
  • Ctrl + F12 opens a document In Word.
  • Shift + F12 saves the Microsoft Word document (like Ctrl + S).
  • Ctrl + Shift + F12 prints a document in Microsoft Word.
  • Preview a page in Microsoft Expression Web.
  • Open Firebug or browser debug tool.
  • With an Apple running Mac OS 10.4 or later, F12 shows or hides the Dashboard.
  • Access the list of bootable devices on a computer at startup, allowing you to select a different device to boot from (hard drive, CD or DVD drive, floppy drive, USB drive, and network).

F13-F15
  • On newer Apple keyboards the F13, F14, and F15 may be shown in place of the Print Screen key, Scroll lock key, and Pause key.

F16-F19
  • On newer Apple keyboards the F16, F17, F18, and F19 keys are above the number pad.

F13-F24
  • Early IBM computers also had keyboards with F13 through F24 keys. However, because these keyboards are no longer used, they are not listed on this page.

Tags:
What is function keys? Uses Of Function Keys (F1 to F12) In Computer, f12 key function, function keys shortcuts, what does the f12 key do,function keys windows 7, how many function keys in keyboard, computer keyboard function keys and their functions, keyboard function keys pdf, function keys windows 10, How to use Function Keys (F1-F12), HP PCs - Using Keyboard Shortcuts and Special Keys, How to Choose Whether Your Function Keys are F1-F12 Keys, Keyboard Function Keys | Computer Keys | Computer Keyboard, The Function Keys F1 to F12 and their Usage, What are the functions of the F1 and F12 keys on a keyboard, Important Uses of Function Keys (F1 to F12), What are the main Function of F1 through F12 keys?, Function Key Shortcuts, Windows Hotkey Shortcuts That Use the Function Keys F1- F12, Windows Hotkey Shortcuts That Use the Function Keys F1- F12


Common Computer Mistakes Beginners Make

Below listed common mistakes we find beginner computer users making and how they can avoid falling into the same mistakes. Here are the following common computers mistakes people do from time to time:

Common Computer Mistakes Beginners Make

Switching PC off from the CPU

Some people either unplug the CPU or press the power button in order to turn the whole PC off. Don’t do that! Properly shut it down through the task bar to save your files and avoid it from being corrupted.

Unplugging USB 

Unplugging your USB without safely removing it may end up with you corrupting your files. Make sure that you safely remove it through the task bar.

Leaving Trash

Your deleted files end up being in the trash (Recycle Bin) folder, where you can either recover these deleted files or have it permanently deleted. Some people forget it and leave it piling up, wasting storage! Check your Trash(Recycle Bin) folder and delete the useless files.

Installing the wrong Software

Depending on the PC you use, the software you will download will depend on its operating system and specification. Most people end up accidentally using Mac software for Windows and the other way around! It’s a waste of time, so make sure to read what you’re installing before doing so.

Overusing the PC

Just like people, PCs need to have time to rest. That way, it will have a longer lifetime and will be able to still have good performance. Make sure that your eyes and your PC are properly shut down and get the adequate amount of rest to avoid it from overheating and breaking.

Installing too much Apps

Sometimes, people can go crazy with widgets and apps that can be installed on the PC. While these apps claim to improve productivity, it may end up being a waste of space, slowing down your PC’s performance. So, Only install what you need.

Not updating PC

Your PC operating system will usually have updates. Choosing to postpone them will slow down your PC’s performance, so make sure you keep it updated for any bug fixes or added features!

Type of PC

A common mistake is choosing the wrong PC. Measure what you want based on the specification and operating system you need, as well as why you need it and your budget.

Spending too much

Another common mistake is that people end up purchasing a very expensive PC with added equipment and gadgets they don’t need! Find out the things you need before wasting your money on equipment you won’t be using instead. You’ll save a lot of time and money.

Not Backing Up System


One of the biggest and most common mistakes that many end users are guilty of making is not backing up their personal data. Today, there are so many different methods to back up necessary files such as backup software, external hard drives, USB sticks, etc.

Not Using Antivirus Software


Another mistake that beginners tend to make is to operate their systems without antivirus software installed and running on them. There are so many internet security programs available on the internet, many of which are free to use such as AVG, Avast, ESET, McCafee. So there is no reason why anyone should risk infecting their machine, by surfing the internet without one.

Opening Email Attachments


One of the most common ways of infecting a system with a virus is through an email attachment. Many computer beginners tend to make the mistake of opening the attachments from unsolicited emails. Before opening an attachment, it’s very important that firstly, you know who the sender is and secondly, you know what the attachment is. Random emails with attachments in them are almost always a virus, irrespective of the sender.
       Nowadays, Browsers are able to idenify infected attachment. Some of these are Mozilla Firefox, Google Chrome.

Not Updating the Operating System


Your computer’s operating system continues to evolve, even after you’ve purchased it through the addition of various updates, so it’s very important that you keep everything up-to-date, for that reason alone. The second reason is because of hackers who are constantly looking for weak spots in these operating systems that they can exploit. The developers are, fortunately aware of this, which is why they are constantly releasing new security updates to plug up these weak spots, this is why it’s so important you conduct regularly update checks.

Using Weak Passwords


Any account that you make is only as secure as the password you use to protect it. Many beginners make the mistake of using the same password for their Gmail, PayPal, eBay, Hotmail and iTunes accounts. Such situations can be further compounded by the end user using a simple-to-guess password like “1234”. Because of their easiness to guess, this makes them highly vulnerable to brute force attacks. It’s always best to use a strong password of at least 8 characters and mix numbers and special characters in there. It’s also best to user different passwords or at least variations of your password for each account.

Drinking near Computers


A mistake that we’re all guilty of doing is placing a glass of water near our electronics. One thing we should bear in mind that water is capable of permanently damaging the physical components in our computer systems. So, Be careful.Take caution, when consuming any sort of beverages near your computer.

Downloading Bad Software


Another very common way of getting a virus on your computer is to mistakenly download a fake program and install it on your computer. The types of viruses that get on your computer through this manner tend to be the most severe, prohibiting normal system functionality. Thus, it’s very important that you only download software from reputable sources.

Not Reading Agreements


Many end users, especially beginners tend to make the mistake of clicking on Next without reading what exactly they are agreeing to. Make sure you take the time to read any prompts that popup on your screen, as you don’t want to mistakenly install a browser toolbar, or some other software that is of little to no use to you.

Clicking on Advertisements on Download Pages


A very common tactic deployed by certain website owners is to fill a download page with ads in hopes that the end user will mistakenly click on one, instead of the correct download link. Probably something we’ve all done at least once, because of how seamless these site owners are able to integrate these ads onto their pages. That said you should always double check or even triple check, before clicking on anything, as you do not want to install a virus on your computer.

Not Saving Work


It’s very important you ensure your work is being saved automatically by the program. If the program does not have such a feature, then it’s up to you to regularly save your work, after at most intervals of 10 – 15 minutes, this way, if your computer crashes or loses power (for some reason), you will never lose more than 15 minutes of your work.

Conclusion
These common computer mistakes will have you know what NOT to do. Technology tips are important to know for everybody who uses Technology. That way, you’ll be able to use your PC correctly and fully utilize it to its maximum ability. You will be more productive, and therefore, make the PC a great investment either for business or pleasure. What are you waiting for? Start checking your PC to see if you’ve made any of these common computer mistakes!


Tags:

Top 10 computer mistakes beginners make, Top 9 Computer Mistakes Beginners Make, 10 Computer Mistakes Beginners Make, Common Computer Mistakes Beginners Make, The 50 Biggest Computer Mistakes Users Make, Top 5 PC Building Mistakes Done By Beginners!, Top 5 Computer Mistakes Beginners Make, How To Avoid The 5 Most Common Mistakes Beginner PC Builders, Top Computer Mistakes Beginners Make Alot, 


Top 10 Unknown Awesome Google Tricks

Posted Under:
Google has always remain unknown package and the list of these tricks which are practically not known to others. Below is a list of our top ten Google tricks many people who use Google don't know.

Top 10 Unknown Google Tricks


1. Find Weather and Movies


It is one of  the simple tricks to try. Just Type "weather" or "movies" followed by a zip code or city and state to display current weather conditions or movie theaters in your area. For example, typing "Weather Dhaka" gives you the current weather conditions for Dhaka City, UT. Typing movies "Movies In Mumbai" gives you a link for show times for movies in that area.




2. Definitions


Pull up the definition of the word by typing define followed by the word you want to define.You just required to type the word you want to defined.
 For example, typing: define blog would display the definition of that word.


3. Local Area Search


Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.


4. Phone Number Lookup


Enter a full phone number with area code to display the name and address associated with that phone number.

5. Track airline flight and packages


Enter the airline and flight number to display the status of an airline flight and it's arrival time. For example, type: delta 1234 to display this flight information if available.
Google can also give a direct link to package tracking information if you enter a UPS, FedEx or USPS tracking number.



6. Translate


Translate text, a full web page, or search by using the Google Language Tools.


7. Pages linked to you


See what other web pages are linking to your website or blog by typing link: followed by your URL. For example, typing link: http://techcarepoint.blogspot.com displays all pages linking to Computer Hope.


8. Find PDF results only


Add fileType: to your search to display results that only match a certain file type. For example, if you wanted to display PDF results only type: computer fileType:pdf -- this is a great way to find online manuals.


9. Calculator


Use the Google Search engine as a calculator by typing a math problem in the search. For example, typing: 100 + 200 would display results as 300. You may also get calculator by searching Calculator.







10. Stocks


Quickly get to a stock quote price, chart, and related links by typing the stock symbol in Google. For example, typing stocks: msft displays the stock information for Microsoft.




Tags:


Top 10 unknown Google tricks, List of top 10 hidden Google tricks, Top 10 Unknown Google Tricks, Interesting Google, Searches related to Top 10 unknown Google tricks, top ten google tricks, 10 cool google tricks, 10 google tricks you didn't know about, do a barrel roll like tricks, top 10 google searches, 10 google secrets, top 10 google easter eggs, weenie google Tricks That You Might Not Know, Cool Google Tricks You Never Knew Existed, Top 10 Cool Hidden Google Tricks And Secrets You Never Know