Over 1 million tech questions and answers.

I need a KISS method for protection...

Q: I need a KISS method for protection...

There's too much info, and I clink on one link to another to another...
I have Windows XP installed on my computer and use Chrome as my browser.
Right now, I am using:
ZoneAlarm (free version) for my firewall, Windows firewall disabled
Ad-Aware Antivirus (free version) actively
SpyBot (free version) actively (and not clear whether this is AV or anti-malware or both, and causing any issues...)
then I also have Malware Anti-Malware that I can run on demand.
Apparently the Ad-Aware and SpyBot are very outdated choices, so I will uninstall and replace them.
If I use ZoneAlarm and Avast actively, then run MalwareBytes periodically (weekly?), will this be enough?
TIA for any guidance.
Keep it simple ; )

Preferred Solution: I need a KISS method for protection...

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: I need a KISS method for protection...

Might want to add WinPatrol.

Read other 13 answers

I have had a lot of problems with viruses and I would like to learn how to better protect myself.  The problem is, I think Bleeping Computer is a good site as I have received help from here before but when I downloaded show-hidden.exe, trend micro said it was a suspicious program.  I do realise that I download programs from any site at my own risk but what I am wondering is...how do I know when it IS safe?
If you know of a method to make sure something is safe prior to downloading, please let me know.

A:Best method of protection?

The best method is to browse the web on a virtual PC such as MS virtual PC or virtual box.  If it got infected, it's only the virtual OS not your physical system.

Read other 5 answers

Hi guys. I wanna ask to you'll think having Norton 360 alone installed on your pc is effective in blocking threats. what are the pros and cons of using norton 360. I also do some work on pc's for people every now and then, and would like to become more knowledgeable bout the subject.


A:Protection Method Question

Norton products are often notorious recource hogs (like McAfee and Trend Micro) and is quiet irritating to remove. So I guess thats a con.

A pro is that you have a very easy to use security suite

Read other 5 answers

Hi all~

Working on a group lab project for a hangman game; initial testing phase. Flow of the game- user enters a word (no try catches set yet) of 13 letters or less- if the second player enters an incorrect guess(using a button- which tested works), will draw a part of the hangman. Three classes for the program; one handles the logic, one handles the gui setup (including the main) and the other handles the paintComponent. As shown below (in testing phase), if a user enters an incorrect guess a call is made to the class that develops the hangman graphics (drawLeg()). When running the program a null pointer exception is generated. I've thrown this code around a billion different ways with no relief- any pointers will be greatly appreciated!

Code for the main class:
import java.awt.*;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener;

import javax.swing.*;
import javax.swing.border.*;

public class HangmanHome
public JPanel panelB;

public static void main(String[] args)

//Program opens with a dialog box; control then goes to the interface.
//This variable will be the vehicle for collecting the initial word-
//really it will be an array of char most likely.
String word;

word = JOptionPane.showInputDialog("Hello, lets play Hangman!\n" +
"Please enter a word up to 13 letters in length");

//Instantiate the interface.
JFrame fra... Read more

A:Solved: Java code; trying to access a method in a paintComponent method


your g is null. You have not yet initialised it.

public static void drawLeg()//Graphics g
g.drawLine(180, 150, 210, 205);
//System.out.println("access to the class");

Read other 2 answers

Is there any way, or software, to get around paying these " dating " sites their expensive monthly fees? I am disabled & on an extremely tight budget.

A:www.kiss.com, i.e.

Read other 7 answers


I appear to be having a Hot_Kiss.exe problem. It also gets called Dialler.OneonOne or something like that. It is beginning to become a complete pain as it disconnects me from the internet and then changes my homepage. I've followed my Norton instructions but it still seems to be there.

Does anyone know how to get rid of it?

Please help as I need the net to help with my studies. Many thanks in advance.

A:Hot Kiss Hell!

It appears you have a dialer.
Please go to this site and download HiJackThis:

***NOTE***Do not FIX anything without a log analyzer's guidance. MOST of what's listed is necessary for your computer to operate normally.


Under "Official Downloads" HiJackThis. It's the 2nd one down.

Download and unzip to a permanent folder of your own creation.

Open HiJackThis. Click "Scan". Then,in the lower left corner, click "Save Log".

Save it to your permanent HiJackThis folder (or floppy disk if necessary).

The log will open in Notepad. Click "Edit" then "Select All".

Copy and paste the log back to this thread.

Read other 3 answers

Ok...I ran the HJT, and here is the log.....Logfile of HijackThis v1.99.0Scan saved at 5:37:15 PM, on 2/16/2005Platform: Windows XP (WinNT 5.01.2600)MSIE: Internet Explorer v6.00 (6.00.2600.0000)Running processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\Explorer.EXEC:\WINDOWS\system32\spoolsv.exeC:\WINDOWS\system32\pctspk.exeC:\windows\system32\sjjlth.exeC:\Program Files\mail.com\mcalert.exeC:\Documents and Settings\VAN\Application Data\MyTraveler\MyTraveler.exeC:\windows\system32\packager.exeC:\Program Files\Trillian\trillian.exeC:\Program Files\Mozilla Firefox\firefox.exeC:\Documents and Settings\VAN\Desktop\HijackThis.exeR0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)O2 - BHO: BTGrabObj Class - {00000000-F09C-02B4-6EC2-AD0300000000} - C:\WINDOWS\BTGrab.dllO2 - BHO: BHObj Class - {00000010-6F7D-442C-93E3-4A4827C2E4C8} - C:\WINDOWS\nem220.dllO3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WIN... Read more

A:HJT - arrina kiss

I'll check your log, arrinaand get back with a list to dowhich will be posted here asap.

Read other 5 answers

{}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D {} {}v{} {}D {}D

Read other answers

OMG!! Now I know what a Guantuanmo water board event must feel like.

I?m a newbie to this site who just spent an hour or so looking to garner some info on how to better protect my computer.. For all my efforts reading thru the tons of posts, I only came away with one generic post that relates to what one should or should not do to keep from getting an infected machine. Very helpful as a preventative measure, but not what I was looking for.

I would like some advise on narrowing down the mega choices for what specific AV, Spy & Mal ware , and firewall programs I might want to install on my computers. One an Xp and one a Vista with DSL connection.

1- I would prefer 5 star software and don?t mind paying a reasonable price for the protection, but I am open to a free version being a better choice.
2-I do not wish to load my machine up with multiple competing programs since I already know how to minimize my vulnerability. In my state that's called...One riot, one Ranger.
3- I am not interested in labor intensive programs. It either must run in the background or allow me to do a ?simple? manual or scheduled scan. Once a bad guy is found then I want a simple solution. 357 magnum bullet to the brain. No thinking, no work, just pull the trigger.

Can someone help me?

A:Can anyone help me with the KISS principle?

I have used ZoneAlarm Antivirus and Firewall for many years and love it. It includes an operating system firewall which provides added security to the system. I do not use the ZoneAlarm Pro or full security suite. It really requires very little attention from me after the initial setup of programs which was very easy to do. I can keep everything from accessing the internet other than what I want to access it and I really like that it lets me keep Windows and other programs from calling home. This is not a free program but I feel it is very reasonably priced

I like Malwarebytes and SuperAntiSpyware for on demand scanners, they scan and remove whatever they find. I use Spybot and SpywareBlaster to immunize the system. All of those are very easy to use and they require very little from me as well, just a few clicks. All of these programs are free.

None of the above bogs my system down as the only one of them that runs in the background is Zonealarm

Read other 5 answers

hi , my pc is running on windows xp using aol to connect to the internet recently i'm having big problems with 2 porn site dial ups. i'll be happily surfing
away when I'm disconnected off the internet by a remote host and either hot kiss porn dial up or 1on1 dial up appears.i don't know where this has come from but its becoming a real pain in the *** . I've tried adaware removal and uninstalling these programs but nothing seems to work the pc shows no sign of these programs on a search but they keep reappearing ! any suggestions would be much appreciated

many thanks D.Williamson

A:How to remove hot kiss and 1on1

Read other 8 answers

my right click shows " kiss my ass" in place of open with ..can anyone help solve this problemEdit: Moved topic from Windows XP to the more appropriate forum. ~ Animal

A:plz help for "kiss my ass" virus removal

Give it try with Malwarebytes Anti-malware:

Read other 1 answers

I accidentally opened something I shouldn't have. Now they have email and my passwords. They are sending emails using my account and god know what else. I have scanned with Norton but Norton is not picking up. I scanned with house and they didn't pick it up. AOL said it is a virus but how do I find it........
If I can find it and remove it I can change my passwords at the same time........]

puter hater

A:AOL Insta-Kiss virus...

Read other 10 answers

i have the actulice trojan and need help! i have a hijackthis! log if anyone wants to give it a look and tell me what i do and don't need. i've already set the hidden file settings appropriatley, i just don't want to get rid of the processes i need.

thank you!

A:actulice trojan can kiss my bum

Hello gunsick and Welcome to TSG!

Download SpywareBlaster from here:

Install and run SpywareBlaster. Click on "Updates" and then choose "Check for updates". Next choose "Protection" and at the top you will see different tabs which are Internet Explorer, Restricted sites and Mozilla/Firefox. Choose one of them at a time and at the bottom click "Protect Against Checked Items" (make sure that all of the items are checked). Tick the boxes above the items. Make sure you do this for all of the top tabs. Mozilla/Firefox you only need to do if you have the user profiles on your computer. You may now exit out of SpywareBlaster.

Download Ad-Aware SE from here:

Install and run Ad-Aware SE. On the bottom right corner of Ad-Aware you will see an option called "Check for updates now", click on that and choose "connect". Download the updates. Next click on "Scan now" on the left side of Ad-Aware. Make sure that "Search for negligible risk entries" is crossed out and not ticked. Choose "Perform full system scan" and click "Next". After Ad-Aware scans your computer, Ad-Aware may find some bad files on your computer so make sure you tick them all and choose "Next". It will ask if you want t... Read more

Read other 1 answers

I have no clue where to ask and i found this forum on google, and hope the community will be generous enough to help me.

I need some major help.
For a school project I have to record something on my (VIDEO CAMERA) and put it on my computer and edit it and stuff.

All I know is that the **YELLOW** and **BLACK** cable from the camera must go somewhere into the computer or something, so that i can watch the video.

Im now shopping for a video card, and need help on what to buy.
Do i need Video In? Video Out? Both? DVI? I have no clue please explain to me, what i SHOULD buy so that i can get the video from the camera ONTO the computer!

A:Need some major help please!!! I will kiss your feet if you do :)

What you need is some software for your application, and some basic (er..maybe not so basic, this can get complicated depending on how deep into this you get.) Anyway here's a link to your subject on a site called simply "How Stuff Works". These people usually have good detailed information that even the novice can grasp. Included on the site is a link to download a free trial of the Adobe software you can use. I hope this is helpful. And please come back again if you need further advice. http://computer.howstuffworks.com/video-editing.htm

Read other 4 answers

hey guys, been browsing these forums for a while and never really needed to post anything for help... i look at myself as the type of guy who has all the experience of A+ certification, but never went to take the tests ;-) so i for the most part know what i'm doing and fix most of my own problems.However, this situation i ran into here is kinda killin me. I am on a work computer at my job, more specifically our shop foreman's computer. I just did a clean slate to a different one in the shop due to people gunking it up so bad with malware and trojan horse crap.This one is pretty bad too. I can isolate everything but the one thats killin me is VUNDO.PQ-- antivirus will delete at least 3 different instance of vundo upon the morning scan, i've used stand alone vundo killers from symantec, the vundofix.exe, and the virtumonde be gone tool. This is really gettin me burned out having to try a different brand solution every morning. It all just comes right back, pop ups and everything, and this computer isn't even in Use right now- our shop foreman is out with an injured back.Reformatting isn't an option at this moment- mainly because the licensed software our shop uses requires a tech to come out to install it (they don't give us the cd's, so basically they charge us 100-200 dollars an hour just for him to install this software). There are about 3-5 different applications on this computer that are like that-- so you can imagine the expense of having to reformat the computer.so first... Read more

A:Vundo And Virtumonde Can Kiss My....

alright. Ran vundofix and combofix... here is the log from combofixComboFix 08-03-04.2 - jim spradlin 2008-03-04 10:48:26.1 - NTFSx86Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.561 [GMT -6:00]Running from: C:\Documents and Settings\jim spradlin\Desktop\ComboFix.exe * Created a new restore pointWARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!.((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))).C:\WINDOWS\BM67486907.xmlC:\WINDOWS\cookies.iniC:\WINDOWS\pskt.iniC:\WINDOWS\system32\bhqjjwrq.iniC:\WINDOWS\system32\cdeeg.iniC:\WINDOWS\system32\cdeeg.ini2C:\WINDOWS\system32\fpdqulun.iniC:\WINDOWS\system32\fweogcdf.iniC:\WINDOWS\system32\gftblila.iniC:\WINDOWS\system32\ntfcigxd.iniC:\WINDOWS\system32\oopfyxib.iniC:\WINDOWS\system32\qkoshbdt.iniC:\WINDOWS\system32\tohcebju.iniC:\WINDOWS\system32\uthssmiu.ini.((((((((((((((((((((((((( Files Created from 2008-02-04 to 2008-03-04 ))))))))))))))))))))))))))))))).2008-03-04 10:14 . 2008-03-04 10:40 <DIR> d-------- C:\VundoFix Backups2008-03-04 10:07 . 2008-03-04 10:07 <DIR> d-------- C:\Program Files\Trend Micro2008-03-04 07:03 . 2008-03-04 07:03 1,301,472 ---hs---- C:\WINDOWS\system32�... Read more

Read other 3 answers

I have Windows XP and my new local LAN connection operates under a firewall. MSN messanger works fine, but AIM does not. No matter what I've tried, I can't get it to connect. Someone suggested creating a new connection with VMP. How do I do that exactly? Please help!!!

A:I'll give you an internet kiss if you fix my problem...

un-install aim and reinstall it

Read other 13 answers

I have a new HP Envy Win10 laptop, a Compaq Presario CQ71 Win10 which has been screwed-up by free Upgrade from Win7 (Critical Error - Failed Start Icon, and my Old Favourite an XP desktop. When my IE8 on the XP was given the boot by many sites and, at that time I had no interest in Chrome etc I gradually stopped using it.

I continued to give it TLC though.

I needed to get it up and running again as there were many Print Shop de Luxe documents saved on it and pdsl is not accepted in WIndows10.

I've got it running and was immediately surprised when a Microsoft Update was installed - I thought that MS had finally dumped XP. I then scanned with Norton - no nasties - so my next step was to run sfc/ scannow.

I got a Windows File Protection window: "Please wait while Windows verifies that all protected Windows files are intact and in their original version." [ I now know that Windows File Protection prevents programs from replacing critical Windows system files.]
Then this WFP window appeared: "Files that are required for Windows to run properly must be copied to the DLL cache. Insert your Windows XP Professional Service Pack 3 CD now." I clicked on 'More Information" and it told me that I'd either inserted the wrong CD or else my CD Drive wasn't functioning.

My "System Properties" tells me that I have Windows XP Home Edition (not Professional), version 2002 Service Pack 2.

I was one of many users whose PC early in 2008 (I think... Read more

Read other answers

This was a post that amazingly no one even replied to:

Hi again. This weird sound is happening on my new computer now as well and I've become very concerned. Please let me know what you think. Thank you in advance.

On Sunday, September 16, 2007 at 10:03 pm, Watashi wrote:
>Hi everyone, I love the site I've come here to fix a decent number of problems in
>the past.
>So, I have this random sound from my old HP well, it's a few years old, maybe 4-5?
>But it sounds like one of those artificial IM "muah" sounds, and then a second, one
>second after.
>It happens very randomly, but usually not that often, although it seems to know when
>I'm trying to find out what's going on because it becomes more frequent when I investigate
>my computer, like task manager, but only when I'm looking for it. It's almost like
>someone is in my head. Not just watching what I'm doing.
>I've confirmed that it's coming from a mysterious source on the computer but have
>no clue where. I've probably missed doing something simple so please, rule out nothing
>because I really don't remember what I've done to check, it was a while ago, but
>I'm using it all the time for Skype and things and it's becoming concerning.
>I probably do have a lot of spyware and whatnot but my latest scan showed absolutely
>nothing. I used several different virus and spyware/adware scanners (all installed
>seperately, and then ... Read more

A:Weird shuffle/kiss/shutter noise Windows XP Home/Pro

OMG I've been chasing this problem *forever* and I just found out what it is. See discussion here:


As it says in the discussion "It's the f'n search dog." Somewhere on your desktop is an open window with "Search Results" and a cute l'il dog down in the LL corner. Every once in awhile the dog scratches himself and it makes that infuriating (less so, now that I know what it is) noise. He also does it if you poke him with the mouse (i.e. click on the dog).

Whew. Sorry if I sound excited. I've been chasing this problem for years. Hope this post helps someone else that's been having the same problem.


Read other 1 answers

Hello, I have a sony vaio. It was running millennium. I used an xp upgrade disk for the upgrade. two days ago the pc locked. On reboot chkdsk started. One of the first errors messages said that under application\windows there was unrecoverable error and the entry has been removed. The problem now is that when i try to re-install with the xp upgrade disk it ask to verify with a full version disk. I don't have a full version disk, just the sony oem recovery disks with ME on them. When i went to recovery console and enter 'dir' the system responds with "an error occurred during directory enumeration" when i try 'chkdsk /r" the system responds with "the volume appears to contain one or more unrecoverable problems". Its a 40GB drive in 2 partitions. I can 'cd' to d: and see what looks like all the data directories that were stored on the partition. My questions are; how can i restore the operating system, XP, with the upgrade disk or how can i recover the data off of the 'd:'?
Thanks in advance.

A:[SOLVED] Is this the kiss of death? &quot;directory enumeration&quot;

Take a look at that!

What is quite effective is you can find out what your hard drive is and then find a diagnostic utility for it. The most common ones are below:

Seagate Seatools

IBM / Hitachi Drive Fitness Test

Maxtor Maxblast 3

Maxtor PowerMax

Western Digital Software & Drivers

Fujitsu Utilities

Run the diagnostics and post any error messages

Read other 2 answers

hi, I'm using t420. I've replaced the HDD with a Crucial M4 SSD. I have some questions. The HDD will stop when a shock detected by TheThinkvantageActiveProtectionSystem. But now i'm using a SSD, I don't know that the Disk can be caused by stopping when a shock detected. Should I worry about it?

A:The Thinkvantage Active Protection System-Lenovo airbag protection

An SSD has no moving parts so there's no need to run APS. If you don't have any HDDs inside your T420, e.g. in the Ultrabay or mSATA, you can just uninstall APS altogether.

Read other 8 answers

A new variant of the ACCDFISA Protection Center ransomware has been released called Malware Protection. The malware developers target Windows servers and appear to hack them in order to install the software. Once the Malware Protection ransomware is installed, it will lock you out of computer and create password-protected RAR archives out of your data that you can no longer access unless you pay a $300 ransom.

When installed, the Malware Protection ransomware will scan your computer for all files using certain file extensions and will use the command line RAR program to turn them into a password protected RAR archive. These files will be renamed with the .aes extension and are supposed encrypted with the AES encryption. You will then be prompted to pay a ransom in order to get the decryption key to restore your files. The decryption key starts with aes987156 and then the password for the RAR files is appended to it. The decrypt.exe program will read through the list of encrypted files and extract them to the proper location using the RAR password. In the past version of this malware, there have been some cases reported that the decrypt process actually deleted the files, so once you have the RAR password it is suggested that you use a manual method restore the files. A manual method using a batch file can be found in the How to remove and decrypt the ACCDFISA Protection Program guide.

The files that this infection installs can be found in the following locations:

... Read more

A:New ACCDFISA Protection Center ransomware called Malware Protection


Thanks for all the tips. We have had a number of clients affected with both variants. All these clients had kaspersky installed! Does anyone know the source of these infections? Is it via email/web/RDP or manual?


Read other answers

i have windows vista and i have norton and i wont have it for long, i cant afford to buy virus protection but i need it. whats the best thats free and has NO trials

A:Solved: whats the best free virus protection and spywhere protection?

Read other 16 answers

  I am a bit unsure of difference between malware protection and anti-virus protection. I have Norton nis which is great for stopping Trojans. I have a company that works on my computer if I have a problem. They wanted me to put in a anti malware program. I have been having problems with computer lately, so I let them do this, could this cause a problem, because I know that you are not supposed to run 2 anti-virus programs?

A:Difference between malware protection and virus protection

Anti-virus and anti-malware programs each perform different tasks as it relates to computer security and threat detection. Essentially, they look for and remove different types of malicious threats. In simplistic terms, an anti-virus program will focus on viruses, worms, Trojans, rootkis and bots while anti-malware programs generally tend to focus more on spyware, adware and PUPS (potentially unwanted programs)?. However, there can be some overlap in functionality and detection features depending on the program's scanning engine, how the vendor defines a specific threat and what Naming Standards are used. Some vendors also add a modifier or additional information after the name that further describes what type of malware it is.The Difference Between Antivirus and Anti-MalwareAntivirus and Antispyware Software: What's The Difference?What Is the Difference Between Antivirus & Antispyware?Use Anti-Virus and Anti-Spyware SoftwareTo fully understand the difference between Anti-virus and Anti-spyware (anti-malware) programs, you need to understand the difference between the various types of malware. Please read the Glossary of Malware Related Terms.

Read other 6 answers

On home stretch. Got the 14257 ESD from my laptop so I can try to fix my desktop installation of 14257 (to get DISM to work again) Which method on the ESD to ISO tool should I use?

A:Which ESD to ISO method should I use?

I use option1 to create the ISO with install.wim so that I can use DISM if I need to.
See the tutorial from Kari.

ESD to ISO - Create Bootable ISO from Windows 10 ESD File

Read other 0 answers

I?ve just purchased the windows 7 Key only for a PC that I have thats still running XP and I was hoping if you could tell me the best method of going about the installation given that only the product key is supplied. I take it that it can just be downloaded. I do have a couple of Windows 7 installation disks that came with my other PC?s but they are for ?Home Premium? and ?Ultimate? so presumable would not be suitable, or is it just the key for these that is different?

A:Best Method to Install

You should be able to make a universal installation disc with this tutorial:

Windows 7 Universal Installation Disc - Create

What version is the key for?

Do you have any reason to believe that the key you just purchased is authentic?

Read other 2 answers

That?s it guys!!
Finally a Method to change then theme of Facebook.. It Works!! To change the theme of Facebook!! Do this:

1. Download Firefox at Mozilla Firefox Web Browser
2. Download this Stylus at https://addons.mozilla.org/en-US/firefox/addon/stylish/
3. Download your desired theme after both the installations at Facebook themes and skins - userstyles.org .

Done!!! That?s It!! Awesome and Simple Right??

A:An Awesome Method!!!

Did the Mozilla foundation pay you to come here and post that? Holy cow...

Honestly, when the first step is downloading a browser just to specifically look at a single web page with an alternate layout, that's a bit much IMHO. I'd call it somewhat complex and convoluted myself...

Read other 5 answers

I keep getting this error in VB 2017,;

BC 30454 Error is not a Method

the line of code is:

line(X1, X2, Y1, Y2, Label)

How can I get rid of this error. I have the word Line "Dim Line as integer"



Read other answers

New HP desktop came with Vista Home premium, i don't want it's eye candy and slowness so I have a XP home (full) coming from new egg.

Excluding the format and fresh install, what's the best way to downgrade my HD to get XP installed ??

A:Best method to downgrade to XP ?

First and foremost . . be double dog sure you can find all the XP drivers for that pc.

Once you have those safely tucked away on cd or other removable media, just boot from the XP CD, delete partitions, format and install.

I've done this a few times, and rather than format and loose the Vista installation for good, I took the original drive out and put in a new one for XP. That way, If you ever need/want to go back to Vista, all you have to do is swap drives

Read other 14 answers

Ok , I've previous posted asking a Question on burning and converting in the hopes to burn multiple recordings of Speed Ball
onto as little discs as possible.

I had a lot of great help and learned how to convert AVI to DVD pretty easily
So Thanks to everyone who helped me, it's greatly appreciated

Now , we've come to the conclusion , it's not going to happen how I'm hoping it will , I have 23 separate Videos each averaging 30-60 Min. My Goal was to fit it onto 2 separate DVD's.

So - Seeing as it can't be done for myself

My Questions towards method?

I recently bought a Season of Dexter on DVD
It has all 13 Episodes on 1 Disc , Including all Special Features and Even Commentary!

Is this because it's Dual Layer Maybe? Can the standard DVD player Read Dual Layer?
Does Dual Layer even make sense here?!
My Question is how is this possible for Media companies but not for the Average folk?

What is it that they have (use) that we don't have (can't use) access too?

A:A Question(s) Of Method

Read other 6 answers

The other day I wanted to turn off the User Account Control. Today, when I went to turn it back on, it will not do it! I tried the control panel, rebooted. When I opened the page in the control panel to check, it had the Turn On UAC still unchecked! I tried doing it via msconfig. I tried doing it via the CMD prompt. NOTHING!

I need to be able to get this back because I am unable to open several utilities without opening AS ADMINISTRATOR. Spybot will not immunize if I open the program not as administrator. TrendMicro's HijackThis also requires opening as administrator.

Please, what is going on. Do you think it might be malware. I have run several malware programs, plus a trojan detector, and have found nothing!

A:Cannot Turn On UAC with Any Method!

Then login with an account that has administrative privileges.

Or get the runas functionality back into Vista.

I will look into why UAC won't re-enable itself.

Read other 2 answers

I save files to an external hard drive for backup. Is there a program/way that will only backup new files from my computer that are not already on the backup drive? As in update newly added or changed files only instead of having to backup the entire my docs folders? thanks.

A:backup method that can do this ->

Yes, look at Robocopy which is a command line tool, or Karen's File Replicator which has a GUI and accomplishes exactly what you want.

Read other 4 answers

Okay, hello again and sorry for the trouble...
I'm looking for 'something' which can be a method, software or whatever that I can put applications like MSN, IDM and some other softwares and make them run in one go when I just double click or 'activate' them once only rather than going through all of them in one go...

Does anyone has any idea in mind?
Sorry and thanks!

A:ISO: A method / softwares, etc...

Hi, 1337. Have a look here.

Here's a really simple .bat I whipped for no reason (obviously) that opens Calculator, Explorer and Firefox (Minefield in my case).

echo off

start /d "c:\windows\system32" calc.exe

start /d "c:\windows" explorer.exe

start /d "c:\Program Files\Minefield" firefox.exe
Read through the link I presented initially and you'll be an expert in no time.

Read other 5 answers

The HD on my laptop is getting full. What is the best method, upgrading to a larger internal HD or external HD. If I upgrade the internal HD, how would I transfer the OS and data to the new drive.
This is for a WinBook laptop.

A:Question: Best method

Depends what you have on the drive, I suppose. If it's installed programs, then cloning to a larger drive is the only reasonable solution.

If you have lots of data, an external should be fine.

The cloning itself would probably have to be performed by attaching the drives to another machine, or my making an image of the original on DVD or otherwise and restoring that image to the new drive.

Read other 3 answers

hey all..

i was wondering if it's possible to have form elements using xhtml but without having a cgi-bin...?


A:Method Elements

sorry, not all that clear here. Form elements are html code. Now do you mean to somehow process the form without a cgi-bin?

Read other 2 answers

Right, so from time to time, I use a cheap (LG) plasma monitor with some interesting features, one of which is called ISM-method.

Since I lost the manual, I asked my retailer exactly what ISM-method was, but he didn't have a clue... as always.
A tech-savvy pal of mine had a guess that ISM-methods might be "methods of removing image burn-ins". (I know what a burn-in is by the way)

However, could someone describe to me exactly what is (an) "ISM-method"?
Not a single search-engine yielded me a response...

A:No description for ISM-method

Quote "this specific model appears to be equipped with a feature called Image Sticking Minimalization (ISM). According to information provided by the manufacturer, you should be able to access this feature by pressing the "Menu" button on your remote control and selecting the "Option" menu. Under "ISM Method" there should be four different options: Normal, White Wash, Orbiter, and Inversion. Each of these methods slightly alters how images are displayed to prevent - and possibly remove - any kind of image burn.

From what i can find it seems to be a feature that displays an image for a long period of time on your screen to " wash" it, and possibly remove any burn ins.

Google for the win.

Read other 2 answers

I have been using the mailto method routinely (when building websites in html) but am finding that now that I have installed windows XP it does not work. All I get is a blank message sent to the address specified.

Is it in fact NOT XP compatible or could it be something esle?


A:mailto method

Read other 10 answers

Me and my four friends done with MCITP. We have come from UK. Our mission is to join any institution as an instructor for MCSE, CCNA or compTIA courses in NY. Can anybody guide me how can i figure out the data of these kind of training centers all over New York.

A:Best method to search

I am kinda surprised that in your training how to use a web search engine wasn't included.

If I were given the same task I would put New York Computer Training centers into Google and see what comes up.

Read other 3 answers

i am geting a new pc for my self and i was wondering what the best cooling method is

A:What is the best cooling method?

Watercooling but brings more headaches and is more "difficult". That said a very powerful air cooler can do a job well if you really want it "cold" if you are going to consider overclocking.

That said Air cooling tends to add more "noise" although its easier to do then Watercooling (as in easier to install).

But it depends if you are going to OC or not and if "noise" will be a problem or not.

Read other 2 answers

Cannot LP for build 7229 be used for different build?
If it is possible to do, Please teach me.

A:The method of using another build LP?

EDIT - Oops I think I misunderstood your Q, sorry

do you mean vhd to iso, using 7229? If so yes, and there are tutorials on this in the forums.

Convert a VHD File to a ISO File

Read other 1 answers

Any method to seal my IP?
I don't want to disclose my IP when I go to Internet, especially playing online game.
I have tried some free anonymous proxy, but I cannot help if I am not using IE.
Any suggestion?

A:Any method to seal my IP ?

You can try some tunneling software to hide you IP.
However, Most of them are not free of charge.
I have tried this before
But it is slow, I think it is not suitable for playing online game.

Read other 2 answers

This is regarding the signature of the mian method. I had learnt that the signature is as follows:
public static void main(String args[])

But in some books & in the net, it says : public static void main(String[] args)
Sometimes it is also like this : public static void main(String argv[])

Im totally confused & not sure which is the right signature.I also wanted to know if the public & static keywords have to be only in this order.And exactly does the keywords Static, string & args/argv mean?

A:Main Method

ok, firstly, it does matter which way the 'public' and 'static' words are listed.

The 'Public' means that the class/method can be accessed by any call from anywhere.

Imagine that each method is a room with a door, when you use 'private' you are saying that the door is closed and anyone outside the room cannot see anything inside the room, when you say 'public' you are saying that the door is open and that anyone outside the room can make a call to variables and methods inside the room.

I cant remember the exact, technical meaning of the 'static' part, so i will not comment on it, but i suggest to avvoid the error "cannot referance Static variable from non-static referance" you put only the following code as the public static void main(String[] args) method:

public static void main(String[] args)
<class name> A = new <class name>();

then create a new method outside the main method called
Private void SecondMain()
<code goes here>

I cant answer you first Question sorry as it has been almost 2 years since it was last explained to me, but i have only ever used 'public static void main(String[] args)' and i've never had any problems.

Read other 1 answers

I am working in vb.net. I have created a class called trucks in this class I need to create a method called CalculateCharges. The charges are based on the number of minutes the truck is at the terminal and the type of truck.This is the rate schedule:
Truck Type Charge per minute

Flat bed .25
Reefer .44
Tanker 1.84

I'm a newbie at vb.net and can use all the help I can get.


Read other answers

Built my last home workstation 4 years ago; 3.06 GHz P4 533 MHz FSB, used stock/boxed Intel fan, don't remember if I used Artic Silver or not. I'm about to put together my new build to replace it; the new processor is a 2.4 GHz Q6600 Core 2 Quad (retail box) and since it's been so long since I put together my last build, I'm wondering if there are new installation methods, requirements or recommendations for installing CPUs nowadays especially with this kind of CPU (i.e., thermal paste is a must, don't use stock CPU fan, etc.)


P.S. - I'm not doing any overclocking

A:New CPU, new installing method?

Read other 16 answers

We have to send a short video (1.18mins), to a customer. The size, unfortunately, is 98mb. I used Winzip to try and reduce it, and set at Best, it still only goes down to 97mb. Is there anything else I can do to reduce the size. I did start sending the file, but the transfer time, was looking to be 45mins. I don't know if this can be reduced. Any advice would be gratefully accepted.

A:Best Software or method

The video can be split into smaller chunks with a program like GSplit.

Or, there are free online services like:

File Dropper

File Savr






And many more...

Read other 3 answers

Hi, I am sending back my hard drive to Western Digital and I want to use DBAN to completely wipe the hard drive clean of my personal information. My question is what is the best method of DBAN? DoD 5220-22.M , RCMP TSSIT OPS- II, Gutman, PRNG Stream or Quick Erase method? How about autonuke as well? Thanks.

A:Best Method for DBAN

Read other 9 answers

Hey everyone.

I am wanting to create a single ISO image of my current Windows 7. I have all the programs i need and everything tweaked the way that it needs to be.

When i restore from this image, i want to be able to put a new HDD (in case the one i have breaks, or i end up getting an SSD) and it working flawlessly. With all of my programs and settings and what not just how they were when i performed the backup.

I'm talking about a true "Clone" or "Image" or whatever the technical term is for it. Will restore MBR, etc., etc... From what it looks like there are paid programs that will do this or i can use Clonezilla, if i'm not mistaken.

Can anyone help me out?

A:Which backup method is best for me?

Cloning and imaging are different procedures. Either could work if you move to a new hard drive.

"Flawlessly". Hmmmm.................that's a tall order. If you mean without possibility of failure, I'd say you are out of luck. Any given attempt at cloning or imaging may work perfectly and be flawless. Some other attempt may not. You can live with that or not, whichever you choose.

Standard choices are Acronis, Macrium, Aomei, EaseUS, and Paragon. Macrium seems to be used most here. Windows also has an imaging capability built-in, but most find it a bit difficult and not particularly flexible.

Read other 6 answers