Prevent Phishing

How to Prevent Phishing

There are currently hundreds of millions of people that log onto the internet each day. These individuals may access the internet purely for research purpose, or possibly for paying their bills, the reasons why people get online are almost limitless. However, despite this reality, most of these users are completely oblivious to the potential risks once online.

Fix Runtime Error

How to Fix Runtime Error 13

You’re currently in the middle of a very important project that must be completed within a given deadline. You drive ever so closely to completing the Access database or spreadsheet, minutes pass and the project is finally finished, all that’s left for you to do is email it out to your business partner(s) or employer(s). You click on the save icon in hopes of saving your work, when your greeted with the dreaded “runtime error 13”.

Create an ISO File

How to Create an ISO File

An ISO file or ISO image, depending on which term you prefer to use is an archive file typically made from an optical disc, although it can be made from files and folders on your hard drive. ISO files in most cases have the .ISO file extension, which was taken from the old ISO 9660 file system that was used for the original CD-ROM media. Despite being named after that old file system, these files use a variety of file systems to package data.

Your Hard Drive

How to Copy Your Hard Drive

So, you would like to know how to copy your hard drive? Well, there are several methods that you can use to accomplish this task, all of which entails you copying every last segment of your hard drive, which you can then transfer to another hard drive. Copying the contents of your hard drive is an activity that must be carried out at least once, by every computer user out there.

Google Redirect Virus

How to Remove the Google Redirect Virus

In this tutorial I intend to inform my readers on the Google redirect virus and how to effectively rid your system of it using the same method I used. One thing you should keep in mind however is that your ability or inability to successfully eliminate this virus depends greatly on you following through with my instructions in its entirety. The Google redirect virus is a fairly notable virus that is designed to redirect your traffic to other, usually malicious websites.

Email Is Hacked

My Email Is Hacked – What To Do Now!

Email hacking is fairly commonplace; we’ve all, at some point played victim to it, even myself, which is why concern for it is justified. As a reaction to this growing concern, many email service providers are implementing new methods of countering these cyber thugs, but despite this fact, it’s still important that you’re cognizant of the obvious risks.

Wipe Hard Drive

How to Wipe Your Hard Drive

Did you know that, when you erase files through the Recycle Bin, that it hasn’t really been deleted, that it’s possible for these files to be retrieved? Not being familiar with how to wipe your hard drive, shouldn’t deter you from being aware of how the process works. Computer security is ever more important for both individuals and business users, nowadays.

Duplicate Files

How to Delete Duplicate Files

The vast majority of us spend our time online downloading files. We spend a considerable amount of time downloading applications, songs, movies and pictures. It’s only after, maybe, months of downloading that we begin to notice our hard drives filling up, as our drives report, less and less free space – the result of reckless downloading. The drawbacks of having a filled up hard drive are numerous, with fragmentation being an issue in addition to severe degradation to system performance.

1 74 75 76 77 78 83