Proven Ways to Protect Your Mac From Catching a Virus

April 9, 2012 by  
Filed under Computer Tips

When it comes to internet security for Macintosh (Mac) computers, the subject is an increasingly controversial one. Some believe in the necessity for protection and some don’t. Some feel that the Mac OS X operating system is the most secure operating system on the planet. while others feel OS X is ripe with exploits that have not been taken advantage of as of yet. wherever you stand on the matter, the fact is there is a new more prevalent security threat to Mac in the wild with MacDefender.

If you are a Mac user and you have not heard about this security threat, then you may want to pay close attention to this article.

MacDefender has place a hole in the impenetrable reputation of the Apple OS X operating system by popping up on Mac users as an authentic looking security alert. This notice attempts to convince the user that their Mac has a virus infection in need of cleaning for a small fee.

Although this type of fake anti virus alert is nothing new to PC users, I am finding that many Mac users have no knowledge of the imminent threat. in fact, I have even been met with disbelief in speaking with several customers about the issue.

Inevitably, whether you are a believer or not here are some steps you can take to error on the side of caution in the interest of protecting not only your Mac, but your identity as well.

Install McAfee SiteAdviser for Mac

This free tool acts as a critical first point of contact between your internet browser and a potentially unsafe website. Once installed, you receive color coded notifications in your search results as well as on your browser. Green is Safe, Yellow is caution and Red is Hazardous. the process is straight forward, log on to the website click on the Download button install the program and you pay attention to the McAfee specific alerts.

Internet Security for Mac

Whether you have a brand or even color preference (my wife likes the yellow one), in my opinion it is irrelevant. the main idea is for you to get some kind of internet security for your Mac. Without it, you are taking your own chances. We really like a few vendors and often recommend them to our customers. but for this discussion, we recommend that you take protection as a priority for your Mac. Regardless of name, brand and yes color.

If my tone seems a little intense, that is because there is a sense of urgency on the matter. your personal information and identity may be at risk. not to mention your finances and recovering stolen items or trust. be vigilant about protecting yourself using the SiteAdvisor, and a reputable internet security suite.

Information Systems

April 9, 2012 by  
Filed under Computer Tips

Information system consists of physical components like hardware, software, database, procedures and people operating these components which interact to support the operational, managerial, and decision-making information needs of an organization. So, an information system is the means by which data flows from one person of department to another. An information system accept data from the user, process this data to produce information and achieve knowledge.

Data is a collection of facts, figures, statistics which can be processed to produce meaningful information. A process involves collecting, capturing, sifting, rearranging, calculating, comparing, decision-making, storing, retrieving, reproducing and transporting of data. Information is processed data. it refers to facts, figures or statistics that have meaning. it can become data or input for another process. Information which is known and verified is knowledge and this knowledge which is relevant and useful in any given situation which anticipate events helps the business move in the right direction taking the correct decision at the right points in time is known as business intelligence.

Types of Information Systems

The types of Information Systems are Data Processing system (DPS), Management Information system (MIS), Decision Support system (DSS) and Expert system. The data being processed in each of these systems may be done using Batch Processing Systems, On-line Systems, Real-time Systems and Distributed Systems.A data processing system process large amount of data for routine business transactions; they run a series of programs on an automatic basis at regular intervals. E.g. Payroll, Accounts, inventory.

Management Information Systems (MIS) provide reports or generate information for planning, control and decision making. they use a shared database. E.g. Estimation software for civil engineers. Decision Support Systems (DSS) differs from MIS in that it emphasizes more on decision making in all levels. it provided ad hoc (as and when required) decision reports. E.g. Business software integrating all modules payroll, accounts, inventory which helps the top management to take decision based on the business intelligence gained. In Expert system decisions are taken by the computer itself, it captures and uses the knowledge of an expert for solving a particular problem. An expert system selects the best solution available to a problem or a specific class of problems. E.g. Judicial system, medical system.

In batch processing system data are gathered from time to time and collected into groups or batches before they are entered in to the computer for processing. In On-line system data is entered online and each data is processes immediately. Real Time Processing system is same as on-line system but output is generated fast and efficiently enough to influence on going activity. but on-line system need not be real-time system. And, in Distributed system processing is shared by several independent processors at different locations in a network.

An organization may consist of many business systems and information systems is a subsystem of the business.

Can Macs Get Virus?

April 9, 2012 by  
Filed under Computer Tips

As a software developer and Mac user, I’ve been doing a lot of research lately on whether Mac computers (iMac, MacBook, or Mac Pro) can get viruses, and I thought I’d share some more of my research here.

The short answer is that yes, depending on your definition of a virus, one Mac can get a virus, at least a starter virus. as a simple example, imagine that I send you an email with an attachment, and you decide to open that attachment. if that attachment is malicious, it can delete all the files you own on your computer, including your photos, music, and any other files you have personally created. if that’s your definition of a virus, that can certainly happen.

However, most people define a virus as a malicious program that is smart enough to know how to transfer its self from one computer to another to another, wreaking whatever havoc it wants along the way. with this more proper definition of a virus, Mac OS X computers have not had a virus to date.

Apple Has You Covered

On Apple’s website they now show several large banners that say We have you covered when it comes to Macs, viruses, and malware. There are at least two primary technical reasons for their confidence regarding the lack of Mac Mac viruses.

First, the Mac approach of setting up a separate administrator account for doing dangerous things alert users to some malware approaches. For instance, while my script can delete the files you’ve personally created without asking for the administrator password, for me to delete all files on your Mac I would have to prompt you to enter the administrator password.

That’s not something you’re probably going to give me very easily, and in lieu of that, my script would have to find a hole in the Mac operating system that would easily grant me administrator access, and to date that hole hasn’t been there.

Second, as mentioned, by definition a virus is a program that spreads from one computer to another. Viruses jump from one computer to another using open network ports on computers. Network ports are like doors, and as you know, some doors are open, some doors can easily be opened, other doors are like bank vaults, and still other doors are like bank vaults but behind behind a fortress so large you don’t even know they’re there.

This last approach is what happens with Macs. Because all Mac ship with a firewall enabled, and no ports (doors) open, my malicious program can’t easily jump from one computer to another. and once again, even when a port is open, such as when Macs are in corporate locations, nobody has yet been able to exploit a partially-open door.

Buffer Overflow Attacks

Hackers also try other much more technical approaches to attack computers, typically buffer overflow attacks on systems (where a hacker sends more data to a program than the program is expecting), but without open ports on a Mac system, attacks like these have to happen through browsers or possibly network Macs on a local area network (LAN).

If a Mac ever gets a virus, you’ll probably here more about this buffer overflow term, but again, nobody has successfully used this approach to date.

Apple Shares Mac OS X Lion with Security Experts

Interestingly, as I write this article, Apple has just provided an early release of their next operating system, Mac OS X 10.7 (Lion) with security experts. as the world of hackers, malware, and viruses gets more and more complicated, Apple seems to be taking a proactive approach to share their OS X operating system with security experts as part of their normal development life-cycle.

Mac Viruses – Summary

In summary, yes, it’s theoretically possible for an iMac, Mac Pro, or MacBook to get a virus, but to date nobody has created a virus for Mac systems. also, as mentioned, Apple is getting more proactive in their approach by providing an early release of their Lion operating system to security experts, which is also a very healthy approach for them.

Most hackers these days seem to be focusing their efforts on other approaches, things like phishing and spoofing, to try to get at your information through your browser, so for the time being, these seem to be larger concerns than potential Mac viruses and malware.

Tips to Keep Your Computer Cool and Running Good

April 9, 2012 by  
Filed under Computer Tips

Keep that computer running cool and efficient. here are some simple steps.

1. Shut it down. Switch it off. Pull the plugs. take the cover off. And give it a good blow out to get all the dust out of it so it can breathe.

2. If there is somewhere to put a fan, 80mm is most common, put one in. It’ll increase air flow. most come with male/female molex plugs for easy installation with no extra wires required.

3. Replace those flat ribbon cables with round ones. It’ll increase air flow. They make them for CDROMS, hard drives, and floppy drives.

Then if you want to get real serious.

4. put new heatsink compound on your heat sinks. like the processor heatsink. Heat sink compound dries up after a while and becomes less efficient.

5. Replace your computer case with one that offers more fan placements.

6. Purchase a hard drive cooler and put it in to keep your hard drive to keep it cooler so it won’t wear out so fast.

7. Memory card heat sinks will also help keep your memory cooler and help prevent crashes for the memory cards getting overheated.

8. Copper heatsinks have a faster heat transfer than aluminum which will also help keep your high dollar processor cooler.

9. Shutting a unit off after use also lengthens the life of your computer.

10. sometimes the north and south bridge chip sets get too hot and slow your unit. little fans with heat sinks can be purchased for these. And most usually have adhesive heatsink compound already applied. Just peel and apply with firm pressure. With a plug that will plug into your mother board near by.

Following these simple steps can help any computer. And you can do it yourself and not have to pay a shop to do it for you. all you need is a phillips screwdriver.

How To Speed Up, Clean Up And Revive Your Mac

April 8, 2012 by  
Filed under Computer Tips

Like any computer, Macs benefit from an occasional bout of physical and virtual cleaning. Here are some simple, easy–to-follow tips to give your trusted Mac a new spring in its step.

Clean it Out

Let’s start with the outside of your system. Turn it off, unplug everything, and move it out from where you normally have it set up. Give the area around your Mac, whether it’s an iMac on your desk, or a Mac Pro under your desk, a good cleaning — there’s probably dust and grime built up around it. Apple has specific guidelines for cleaning your gear, and while each system is a little different, it’s always a safe bet to take a microfibre cloth to the surface of your device to wipe away the dust and any smudges or oils that may be lingering on your screen or case. Apple suggests a damp, lint-free cloth to do the job, but even a dry microfibre cloth will get the job done — especially on displays and screens where you absolutely don’t want to use harsh chemicals of any kind. Photo by Cheon Fong Liew.

Even though it’s not officially recommended by Apple, a little compressed air will go a long way towards getting the dust out of the cracks, crevices, and exhaust vents. If you have a Mac Pro, you can crack the case open and attack the inside with the same cloth and compressed air, but be careful — if you have an AppleCare Protection plan, opening the case will void your warranty.

If your case or keyboard are seriously gunky, we highly recommend attacking the filth with a magic eraser, but keep in mind that they — and other melamine sponges — are slightly abrasive, so you may be rubbing away grease and dirt, but if you keep scrubbing you can wear away the top layer of the finish as well.

Tame your Cable Clutter

Before you set your Mac back up, go ahead and take some time to tame the cable clutter that may have accumulated under your desk over months of use. Now is a good time to learn how to wrap those cablesso they don’t take up so much space, or order some velcro cable ties, twist ties, or zip ties to help you keep everything coming out of the back of your computer neat and tidy and maybe even label them with bread tags. If it’s really bad, you can always repurpose a rain gutter, use a flower pot, or find another container to keep the cables and their slack out of sight.

Get Up to Date

If you’re setting some time aside to clean up your Mac, the first thing you’ll want to do is make sure you have all of the latest patches, security updates, and application updates available via Software Update. If you’re running a really old version of Mac OS and you’ve been thinking about upgrading, there’s no time like the present to get on board with OS 10.7 “Lion.” OS X 10.8 “Mountain Lion” is coming mid-year, but you’ll probably have to have Lion in order to upgrade, so unless you don’t plan on upgrading past Snow Leopard, it’s worth considering. Even if you stick to Snow Leopard, or newer verisons of Mac OS aren’t supported on your hardware, it’s worth using Software Update to make sure your system is as up-to-date as it can be.

Uninstall Unnecessary Apps

After you’ve made sure your system is all up to date, it’s time to dig into your Applications folder and start uninstalling programs that you know you no longer need. In most cases, uninstalling a Mac app is as simple as dragging the app to the trash, but doing just that can leave orphaned preferences files from those uninstalled apps on your computer. We’d suggest using an actual uninstaller, like our current favourite, AppCleaner, which is completely free. If you’re willing to spend some money ($US13, to be exact), AppZapperhas a prettier UI and a few more options, but in the end they both do the same thing. If you use one of these apps to remove those unwanted programs from your system, you can be sure you’re getting rid of all of their associated files as well. Finally, head into system Preferences, click on Accounts, and clean out the Login Items tab of any applications that you don’t want to run on startup. sometimes even uninstalled apps leave entries behind, and it’s a good idea to tidy up your startup items anyway.

Reclaim Hard Drive Space

If you’ve been following along, you’ve cleaned up your Mac on the outside, your Mac is up to date, and you’ve uninstalled the programs you no longer use or need on your system. Now it’s time to finish cleaning your Mac up on the inside and get back the hard drive space that’s probably being wasted by old VirtualBox images, video game screenshots, or other assorted files you didn’t know were lurking on your system.

The venerable Disk Inventory Xis a great tool that will scan your drives and show you what’s eating up all of your space in an easy to understand view, and it’s completely free. Alternatively, $US10, if you have it to spend, will buy you a copy of Daisy Disk, an app that many of you preferredbecause it allows you to not just see the contents of your drive in multiple views, but go ahead and delete, compress, and organise your drive quickly — and automatically, without you having to lift a finger. just make sure you empty your trash when you’re through with everything to really get the space back.

Do some Maintenance and Optimise your System

Now that you’ve cleaned out the mess from your Mac, it’s time to give OS X a little TLC. Head into Disk Utility and click “Verify Disk”. it shouldn’t take too long, and if you see any errors, wait for it to finish and click “Repair Disk”. It’s always a good idea to verify your disk every few months, just to make sure you’re not missing some creeping issue with your hard drive or your OS X installation. You may also notice that you can verify or repair disk permissions. it doesn’t hurt if you do it, but whether or not it’s actually useful as a troubleshooting step is hotly debated. All-things-Mac writer John Gruber says it’s voodoo,and honestly, he’s right — it’s not very useful for regular troubleshooting. However, Dwight Silverman says it’s saved his bacon, although he had to dig deeper to fix his issue. Apple still reccomends repairing permissions for specific issuesand references it in its knowledge base. your mileage may vary.

Beyond Disk Utility , you may also want to look into a system optimisation utility like Onyx, our favourite system tweaker for Mac. Alternatively, previously mentionedcleaning utility iBoostUpdoes a great job of tidying up your system, as does the newly releasedCCleaner for Mac.

Back Up your Refreshed Mac

These steps are all well and good to keep your Mac running smoothly. that said, they’re all but wasted if you’re not backing up your system. If you need help getting started, here’s how to set up a bulletproof backup systemusing our favourite tool, CrashPlan. I use it personally to keep both my Mac and Windows systems backed up, and once it’s set up, it really is fire and forget — and you get to sleep at night knowing all of your data is safely backed up to another computer, external drives, or — if you have the money to spend — an offsite location.

You may also consider taking a disk image of your freshly tidied Mac in case you need to restore later after a hard drive upgrade or replacement. You can do this in Disk Utility, but our favourite disk cloning tool for Macis Carbon Copy Cloner, which is a bit more robust and reliable.

That’s all there is to it. Macs usually don’t need much in the way of maintenance, but they can definitely use some cleanup from time to time, especially after heavy use. Apple doesn’t ship a lot in the way of tweaking or optimization tools for your Mac, but there are plenty out there for all versions of Mac OS, so don’t be shy when it comes to giving your ailing Mac a tune-up.

Do you have any Mac cleaning tips that we left out? Share your tips — and suggestions — in the comments below.

Keep Your Computer Safe—Without Losing Speed—With VIPRE Internet Security 2012

April 6, 2012 by  
Filed under Computer Tips

You must have security software. Without a firewall and an antivirus program running in the background at all times, your computer could be working for a criminal instead of for you. Trojans, worms, and other malware (malicious software) can ride roughshod over your PC, stealing your logon names, passwords, and bank account numbers, or even hijack it to attack other computers and networks.

But all security programs use resources, such as memory and CPU cycles. If the software isn’t well-designed, it can take a lot of those resources, slowing down your PC by as much as 25 percent.


  • Tweet

GFI’s VIPRE Internet Security 2012, though, is well designed. with a fresh new interface, and completely redesigned installation process, VIPRE feels like a new product, but with the same strong defenses. while other security suites can slow your PC so much you feel like you’re wading through Jell-O, with VIPRE’s nearly seamless integration with Windows, you’ll barely notice it’s there.

Don’t take GFI’s word for it. Simon Williams, writing in the British magazine PC Advisor, set out to test of GFI’s claim that VIPRE “doesn’t slow a PC down.” The magazine’s “file transfer test supported this [claim], taking just 40 secs to copy a 1GB file.” Competitors took up to 25 percent longer. Regular users think so, too. in a survey conducted by SurveyMonkey, 4,087 VIPRE users out of 6,978 (almost 59 percent) rated the suite’s Performance as Outstanding. And 83 percent listed Performance as the feature that initially attracted them to VIPRE.

Full Protection

Of course, even the fastest security suite is useless if it doesn’t do a good job protecting your computer. VIPRE Internet Security keeps your PC safe from viruses, adware, spyware, worms, rootkits and whatever new form of cyber-evil gets cooked up next week. The suite can also check your email for dangerous attachments and poisoned links, and protect your privacy from prying eyes within your own home.

Tests by MRG Effitas, an independent security research organization, give VIPRE high marks. The program scored 100-percent in detecting Trojans, financial malware, password stealers, and worms, while beating all of its competitors in overall malware detection.

VIPRE works on a number of levels. consider, for instance, GFI’s advanced anti-rootkit technology. nothing puts the malicious in malware like a rootkit–an unwanted program that installs itself so deep into your operating system’s innards that it’s almost impossible to detect. yet VIPRE can find and disable these hidden beasts by identifying and neutralizing the modules, services, and data streams that they create.

Hackers and security vendors are constantly engaging in a war of leap frog. So it’s all the more important to have a security program that stays ahead of the bad guys and protects you against a wide variety of threats. VIPRE has improved its email protections, adding outstanding spam filtering in addition to the checks for malware and phishing scams. this feature supports any POP3 email client, although it’s easy to set up if you use Outlook, Outlook Express, or Windows Mail.

Other mail clients are supported as well; simply provide the port settings.

A Solid Firewall

When it comes to protecting you, a good antivirus program is only half the battle. you also need a good firewall, which monitors the traffic coming into your computer from your network and the Internet, looking for suspicious behavior.

But an effective firewall also monitors what goes out. Without that protection, you might never know that malware already on your PC is sending your credit card information to someone who doesn’t have your best interests in mind.

VIPRE Internet Security has a firewall that watches over your safety in both directions. And it goes beyond inbound-outbound capabilities to enhance that protection.

For instance, it offers boot-time configuration. your computer may be vulnerable to attack from the moment you press the Power button until Windows and your security program have a chance to load, a process that can take a few minutes. But VIPRE loads immediately, blocking all network traffic, until all of the necessary startup programs are up and running.

Another firewall feature, Web Filtering, adds additional protection. Web Filtering does just what the name implies: It filters everything headed to your browser, intercepting malicious Web sites, scripts, and ActiveX controls.

This sort of filtering can go too far, but GFI carefully set the firewall’s default settings. You’re unlikely to run into any problems.

But if you do, VIPRE lets you fine tune the Web Filtering settings with extensive configuration options. you can block third-party pop-up ads, manage scripts, and filter persistent cookies. you can configure it to allow particular programs and particular Web sites. you can even create your own custom filters.

Easy, yet Versatile

But don’t let all those settings scare you. You’ll find VIPRE Internet Security easy to install, configure and use. Indeed, according to SurveyMonkey, more than half of the VIPRE users surveyed rated overall Ease of use as Outstanding, and a total of more than 90 percent total rated it above Neutral.

Like most security programs, VIPRE runs in the background at all times; you seldom have to bring it up and work with it. But when you do, you’ll see a simple window with four big green buttons to help bring you to the part of the program you’re looking for. Additional buttons let you easily scan your hard drive or update the database (tasks that happen automatically, anyway).

You’ll find the many options in the six-tabbed Settings dialog box easy to understand. And if you’re not sure what one of them does, clicking the Help button will bring you a clear and concise explanation.

Just one example: You’ll find a great many options for scanning drives. You’ve got three kinds of scans: quick, Deep System, and Custom, and despite the name, they’re all customizable.

For each of these three scan types, you can choose whether to scan cookies, the Windows Registry, running programs, and the files inside archives (such as .zip files). you can set each type of scan to work at a low priority (takes longer, but has even less effect on performance), and to scan or skip removable USB drives.

Speaking of USB drives, VIPRE scans them by default when you plug them in. you can turn this feature off, as well.

Of course you can schedule scans to run automatically. you can even tell VIPRE to wake up your sleeping computer for a scheduled scan, and to automatically shut down when the scan is finished.

All of these setting are easy to find and engage; VIPRE is designed to be user friendly. But now and then all of us need a little help, so GFI offers you plenty of ways to get it.

You can search for your problem in the extensive knowledgebase or on the VIPRE forums. If you don’t find it, you can post it on a forum or submit it as a case to the technical support staff (or both). And if you need that real-time, one-on-one human support, you can turn to either GFI’s expert live chat or call a toll-free number.

You Deserve a little Privacy

Not everyone who might spy on you needs to come at you through the Internet. sometimes, they’re in your own home, and you may not want people with physical access to your computer to see what you’re doing on it. That’s why VIPRE Internet Security 2012 includes a couple of tools to help you stay private.

You probably already know that when you delete a file, it just goes to the Recycle Bin. And even when you empty the Bin, the contents of the file remain on your hard drive until Windows just happens to write another file onto that exact, physical spot on the disk. Until that happens, your file can be retrieved with simple, free software.

That’s good news if you accidentally deleted a file, but bad news if you really want one to go away for good. VIPRE’s Secure File Eraser can take care of this. Once you’ve turned on the option in VIPRE, you can make the file disappear permanently with a right-click in Windows Explorer. Files aren’t the only records of what you’ve been up to. Cookies, browser histories, temporary files, and searches are just a few of the ways that Windows and your browser keep records of what you’ve been doing on your computer— unless you use VIPRE’s History Cleaner from time to time. this feature lets you select what you want removed, and then, with the push of a button, removes it.

VIPRE Internet Security 2012 is fast, powerful, easy to use, and protects you from anyone who might want to spy on you. For one computer, it costs $49.95; for two, $59.95. you can cover the whole family (up to ten computers) for $69.95.

There’s no excuse for going unprotected.

#105;#119;#116; #111;#116;#097;#111;

Q.&A.: Copying iTunes Content From PC to Mac

April 5, 2012 by  
Filed under Computer Tips


I want to move a few albums and videos between the iTunes program on my Windows Vista PC in the bedroom and the copy on the Mac laptop I use in the living room. What’s the easiest way?


If you have both computers connected to the same home network, you can take advantage of the Home Sharing feature built into iTunes to copy files between your two machines. Open iTunes on the PC and click on the Home Sharing house icon on the left side of the window; you can also go to the Advanced menu and choose Turn On Home Sharing.

Type in your Apple ID name and password (the one you use to buy things in the iTunes Store) and click create Home Share. Repeat these steps in iTunes on the Mac laptop.

Once you turn on the Home Sharing feature on both computers, you can see the other machine’s iTunes library listed in the iTunes window of the computer you’re using. Click the library name to see its contents. You can drag files between the two libraries in the iTunes window, or select titles from the other library and click the Import button in the iTunes window to copy them into your current computer. for more information, check out Apple’s guide to Home Sharing.

If you do not have a home network, an alternative method to move them between computers is to copy the songs and videos onto a USB external drive, flash drive or disc for transport between machines. Apple has instructions for locating your iTunes content on the computer as well as additional information on copying iTunes content.

Computer Repair

April 3, 2012 by  
Filed under Computer Tips

Whether it is virtual reality, urban planning, restoration of ancient arts, communication on a global basis, defense strategies, watching programs or carrying on with daily business, the computer has become an indispensable part of our daily life.

However, when our computer suffers from technical problems, whether it is viral or any other hardware or software issues, we face a total breakdown in computer communications.

Repairing computer might be a perennial activity. Upgrading your computer on a regular and systematic basis is a very important factor to maintain the efficiency of the machine and to make your computer provide you with the best of services.

Repairing computers has become a big business. it has become a flourishing career for many technicians who offer services for both the hardware and software devices of the machine. At the same time, it is good for an owner to know the intricacies of their machine and have the knowledge to do some repairs on their own. not only will you save a lot of money should your computer fail and need repair, but knowing just what must be done to get your computer up and running again is a wonderful feeling, and a great advantage over the competition if you are a businessman or a serious user.

One can get all the necessary information from numerous books available in the market as well as online. there are a thousand of websites who render support and information about computer repair. these services are worth the money because one can gather practical application.

Still, if you are not inclined to learn the basics or intricacies of your computer, there are many technicians who offer computer repair for various fees and services.

Free Advice on a PC Cooling Computer Exhaust Fan

September 19, 2011 by  
Filed under Computer Tips

Older computers could function with passive cooling, or their natural convection system, but newer computers are more hardworking and require active cooling. High-powered components generate more heat while normally operating that they cannot rely on their natural ability to cool down. a modern PC needs to be actively cooled by a computer exhaust fan to prevent overheating as well as malfunction, instability and other damage.

A computer uses five or more fans for venting hot air to the outside, pulling cool air to the inside, and spot cooling components by moving air across a heat sink, or a device for absorbing heat explosion. Just like an industrial or commercial exhaust fan in the attic or bath, a computer exhaust fan should have decreased sound levels, a high CFM rating and adjustable RPM’s.

The most visible fan, case mounts cooled the air around the PC casing and against the wall so the hot air can pass through, CPU and PSU fans cool the most heat-susceptible units of a PC while generally eliminating hot air from inside. the motherboard’s chipset, graphics processing unit and graphics cards usually require fans, whereas PCI slots, the hard drive, CD and DVD burners can also benefit from cooling.

The ideal computer exhaust fan has blower wheels and rotating blades that distribute air noiselessly, as with quiet PC cooling fans, while its motors and bearings are rust proof and can operate without producing too much heat. Brands include Zalman, Thermaltake, Panasonic, NorthQ, Noctua, Nidec, Enermax, Delta, cooler Master, Arctic Cooling and Antec.

Computer Troubleshooting – Tips For USB Ports That Aren’t Working

September 18, 2011 by  
Filed under Computer Tips

Are the USB ports on your computer suddenly not working? of all the computer repair problems that we face on a day to day basis, USB problems can be one of the most troublesome since the majority of external devices plugged into the computer are now run with USB connections. The problem of USB ports not working is usually very easy to repair if you know the correct steps to follow in troubleshooting the computers problem. If the USB ports on your computer aren’t working and you are comfortable with attempting your own repair then start by checking the following:

  1. Is the device you are having problems with a printer that you are trying to install? Printers all come with an installation CD. The steps of the printer installation must be done in the correct order or often the USB printer will not be recognized by the computer. The correct order is to insert the CD, start the installation, and then plug in the USB printer only after the software installation has gotten to the point where it asks you to plug the printer in. If you have plugged the USB cable of your printer into the computer prior to installing the software, the printer often will not be recognized- even if you unplug it and plug it back in. you can avoid this problem by unplugging the USB cable on the printer from the computer and plugging it back in to a different USB port on the computer
  2. Has Windows recently been reloaded? If so the USB ports will generally not work until you’ve loaded what’s known in geek speak as the chipset driver. The chipset driver usually contains the software that will enable the USB ports to work. you can get the chipset drivers for your specific computer by going to the hardware manufacturers’ web site (Dell, HP, etc.) and clicking on Drivers. Once you install the driver a reboot of the machine will be necessary and the USB ports will be working again.
  3. Does the device you are hooking up require software that you haven’t installed? you can usually get device drivers from the manufacturer of the device. for example if you are trying to hook up something that’s made by HP you would start by looking for drivers on in the Drivers or Support area. Once you have located the correct driver you can then go into Windows Control Panel, click on the System icon and find the device in the hardware manager. Or- easier still unplug the device from the computer and try plugging it into a different USB port on the computer. The device manager should then pop up and ask you for the location of the hardware driver which you can then direct it to.

These three steps will solve the vast majority of the problems that most people experience when the USB ports on their computer are not working. If these three steps don’t work then you may want to consider bringing the computer into a computer service center.

Next Page »