tips for hacking, Google tips,computer terms, spyware ,administrator hack,types of viruses,dvd movie backup,MICROSOFT, articles .

*******************************************WELCOME*************************************************

Welcome to all the people to COMPUTER MANIA , those who want to grow interest in computer world and become a perfect computer operator with having good knowledge of hacking,viruses ,worms,computer functinality,softwares,solution of many pc problems and many more.....

spott

Spottt
Spottt

Google search

1/27/09

How to use Windows Update Properly

If you want to save your files to your hard drive, so after a format you dont have to download them all again, here's How:

- Logon to Windows Update

- Choose Windows Update Catalogue (left hand pane)

- Choose Find updates for Microsoft Windows operating systems (right hand pane)

- Choose your version and language then Search

- Choose one the following:

- Critical Updates and Service Packs
- Service Packs and Recommended Downloads
- Multi-Language Features (0)


- Once chosen simply click on what you want to download and then back at the top click Review Download Basket

- You are taken to the next page where at the top you can specify where the downloads are to be saved.

- Click Download now. Each patch will make a directory under the root of the folder you saved them to.
Once finished you need to go to where you saved the file (s) to and then simply install all your patches.

""How to change the Admin password using the user account?""

Hi friends it is now easy to change the admin password using the user acount for this just open ur command prompt

type " net user "
it will give the all the users
then type " net user administrator * "
(Administrator is default admin for all the computer systems having the very strong password)

then it will give you
"type a new password for this user"
type in the password and press enter
(Note :- the password which youll be typing will be invisible plz type correctly as it not visible and then reenter and press enter)

yupee 

then log off and loging using the admin username as
Administrator
and the given password
and youll be loging in with admin rights.


(Please do not use this on your office PC it can creat a mess with Admin users)

The easiest and best way to block Ads, Pop-ups and Fake virus warnings

Block Adservers


If you wanna remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I belive it will help you a lot


The hosts file

Probably the most common way people block ads like this is with something called the "hosts file". The hosts file is a simple list of hostnames and their corresponding IP addresses, which your computer looks at every time you try and contact a previously unknown hostname. If it finds an entry for the computer you're trying to reach, it sets the IP address for that computer to be whatever's in the hosts file.

127.0.0.1 is a special IP address which, to a computer, always means that computer. Any time a machine sends a network request to 127.0.0.1, it is talking to itself. This is very useful when it comes to blocking ads, because all we have to do is specify the IP address of any ad server to be 127.0.0.1. And to do that, all we have to do is edit the hosts file. What will happen then is something like this:

1. you visit a web page
2. the web page contains a banner ad stored on the server "ads.example.com"
3. your computer says "ads.example.com? never heard of it. wait a second, let's see if I've got the number on me..."
4. your computer finds its hosts file and checks to see if ads.example.com is listed
5. it finds the hostname, which points to 127.0.0.1
6. "great", says the computer, and sends off a request to 127.0.0.1 for the banner ad that's supposed to be on the page
7. "oh", says the computer, and fails to show anything because it just sent a request to itself for a banner ad

Where's my hosts file?

* Windows 95 / 98 / ME: C:\Windows (I think)
* Windows NT: C:\WinNT\hosts
* Windows 2000: C:\WinNT\system32\drivers\etc\
* Windows XP: C:\Windows\System32\drivers\etc
* FreeBSD / Linux / Mac OS X / Unixish operating systems: /etc/hosts
* Mac OS: i hate macs


The format of the hosts file is very simple - IP address, whitespace, then a list of hostnames. However, you don't need to know anything about the format if you don't want to as you can just view the list hosts file.

Of course, that's not the only way to use the list, but it's probably the most simple for most people.

Here's the link to download the host file with instructions
http://rapidshare.com/files/134940819/hosts_August_2008.rar.html

Boot Winxp Fast

Follow the following steps :

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

1/19/09

How to convert AVI to 3GP, MPEG to 3GP with the 3GP Converter?

  •  What is 3GP? 
3GP is the MPEG4 based video format used mostly in mobile terminals, such as mobile phones. This file format is designed for 3rd generation mobile devices. 

3GPP is defined by the 3rd Generation Partnership Project and 3GPP is defined by 3rd Generation Partnership Project 2. They are the worldwide standards for the creation, delivery and playback of multimedia over 3rd generation. These standards seek to provide uniform delivery of rich multimedia over newly evolved, broadband mobile networks (3rd generation networks) to the latest multimedia-enabled wireless devices, such as cell phones. 


The 3GP Converter can convert AVI to 3GP, convert MPEG to 3GP, and convert WMV to 3GP. It supports convert 3GP video file to other popular video formats like 3GP to AVI, 3GP to DivX, 3GP to MPEG. Also, the 3GP Converter can convert audio-only 3GP files to MP3, WAV and vice versa.
Now let’s focus on how to convert video files to 3GP with the 3GP Converter.

Step 1 :
 

The first step you need to do is load the video file. Press “ADD” button in the main interface or in the File menu to add the video file you want to convert. Note: press Ctrl to select multiple files.


3gp converter - avi to 3gp, mpeg to 3gp

Step 2 :

By highlighting the loaded file, the file info including the audio and video codec will be showed the middle area of the window.


convert avi mpeg to 3gp converter

Step 3 :
 

Now it is to start selecting output format. In “Profile” drop down list box, all supported output formats are listed, you can select any of them. Tip: different files are allowed to select different output formats.


avi to 3gp, mpeg to 3gp

Step 4  :


If only need to convert a clip or set special parameter, double-click corresponding setup in right column to set. Tip: different files are allowed to set different output parameter.

Step 5  :


Finally, select the path where the file will be saved, click “Encode” button to convert.

  • System Requirements
Operating system: Windows 98/Me/NT4/2000/XP 
Hardware Requirements:
* Intel Pentium II 350MHz or above, or any Athlon
* 64 MB RAM or above

Registry Cleaner: Protection for Your PC

Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.

Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!

Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.

When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.

A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.

Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.

Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!

Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.

When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.

A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.

Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.

Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!

Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.

When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.

A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.

Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!

Hacks to Beat Rapidshare Download Limits and Waiting Time

Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.R

apidshare traces the users ip address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.

 

Here are some methods for doing this:

 

1. Short-Out the JavaScript:

    1. Goto the page you want to download
    2. Select 
    FREE button
    3. In the address bar
     put the following: javascript:alert(c=0)
    4. Click 
    OK
    5. Click 
    OK to the pop-up box
    6. Enter the captcha
    7. Download Your File

2. Request a new IP address from your ISP server.

    Here’s how to do it in windows:
    1. Click 
    Start
    2. Click 
    run
    3. In the run box type 
    cmd.exe and click OK
    4. When the command prompt
     opens type the following.ENTER after each new line.
    ipconfig /flushdns
    ipconfig /release
    ipconfig /renew
    exit

    5. Erase your cookies in whatever browser you are using.
    6. Try the rapidshare download again.


Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

3. Use a proxy with SwitchProxy and Firefox:

4. Use an anonymous service:

    Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.

5. You can use a bookmarklet to stop your wait times:

    1. Open IE
    2. 
    Right Click On This Link
    3. Select 
    Add to Favorites
    4. Select 
    Yes to the warning that the bookmark may be unsafe.
    5. Name it “RapidShare No Wait”
    6. Click on the 
    Links folder (if you want to display it in your IE toolbar)
    7. Click 
    OK
    8. You may need to close and reopen IE to see it
    9. Goto rapidshare and click the bookmarklet when you are forced to wait

1/11/09

Steps to Transfer Files Using Bluesoleil and Bluetooth

Bluesoleil is the most popular Bluetooth device driver used by many of us today to sync our computer with our mobile phones using the Bluetooth technology. It can create a small network between our cell phone and our PC that enables us to transfer any file between our PC and the mobile phone.

But there are many of us who are facing difficulties in using this program, as was with one of our readers. So here goes the list of steps that will make the things easier to use this application.

Steps:

From computer to phone:
1.    It is assumed that you have installed some version of Bluesoleil in your computer (if not then get that from
here). Start the Bluesoleil application.

2.    Start the Bluetooth service on your computer (use a Bluetooth Dongle if there is no Bluetooth by default).

3.    Also start the Bluetooth services on your phone.

4.    Now double click on the Orange ball in the center of the main Bluesoleil page, your phone should get listed here.

5.    Also add this computer on your Bluetooth device list on your phone (use a password for reliable transfer).

6.    Now double click the phone on the Bluesoleil page, when you notice the icons on the top you will see that the ones that will work for your phone will highlight.

7.    Double click the file transfer icon that will open a new window, drag and drop any item (compatible with your phone) to this window which will ultimately show up in your phone.

From phone to computer:

After you follow the first 6 steps, perform these
7.
    To send the file you want to transfer via Bluetooth, click on “send via” (or something like that).

8.     The files would automatically show up in the Bluetooth folder in the My Documents on the PC.

Alternatively, you could use Windows default Bluetooth service which is also easy to use (run “fsquirt” command in the run box and just follow the instructions).

What is WiFi?

The internet revolution has brought a lot of things to the table when we think about the types of technology that many people use today. From broadband connections to WiFi services all the way to WiFi-enabled cell phones, there is certainly a plethora of information and hardware devices that are on the market today that weren't here just five or ten years ago! Needless to say, WiFi is here to stay and there's nothing anyone can do about it! It has definitely improved a lot of lives throughout the years that it's been introduced.


But what exactly is WiFi and why are people using it more than before? To answer the question of what WiFi really is one must understand how it works. The simplest way to explain how WiFi works is to ask someone to imagine a pair of walkie-talkies that are communicating with each other. The WiFi capable devices, like laptops, communicated with authenticated WiFi main stations by a series of walkie-talkie communications: one sends the other a signal while the signal is transferred back to the main station.

There are many uses for WiFi technology in our world. First and foremost, WiFi connections are a good way for everyone to have an internet connection whenever they want. Millions of consumers in the United States have already added WiFi capable devices and WiFi connections in their homes because it is not only less expensive to have and to manufacture, but it also gives them a faster and better internet connection than dial-up did only several years ago.

Secondly, WiFi is a technology that is meant for people on the go. The WiFi services that we are so accustomed to allow individuals to connect their wireless devices, such as laptops and pocket pc handhelds, to any other WiFi or wireless network that they come in contact with. However, the networks that are securely protected with a password, such as those of colleges and universities, are not able to be connected to by just anyone. But if there is no password that's attached to a WiFi network then anyone is free to connect, disconnect, and re-connect to the WiFi internet network any time of the day that they want.

The reason that WiFi technology is great for anyone who travels frequently and even daily is because WiFi allows business men and women to literally take their work with them when they go on business trips. With WiFi connections instead of dial-up connections there are employees who are still able to keep in touch with their companies while on business travel purposes without having to deal with a corded phone or a pager.

College students and just anyone looking for a faster connection also find WiFi devices real convenient. College and university students are able to connect their laptops to wireless networks any time of the day so that they are able to stay in contact with professors and to upload their course work. Furthermore, universities and colleges across America and the world have jumped on the WiFi bandwagon in order to make life easier for their faculty, staff, and students!

Anyone searching for a WiFi network to connect to does not have far to travel. There are many places that receive WiFi connections today, but tomorrow and years down the road there will definitely be a lot more!

Tricks for removing infection from PC

What to Do If Your Computer Is Infected

Sometimes even an experienced user will not realise that a computer is infected with a virus. This is because viruses can hide among regular files, or camoflage themselves as standard files. This section contains a detailed discussion of the symptoms of virus infection, how to recover data after a virus attack and how to prevent data from being corrupted by malware.

Symptoms of infection

There are a number of symptoms which indicate that your computer has been infected. If you notice "strange things" happening to your computer, namely:

  • unexpected messages or images are suddenly displayed
  • unusual sounds or music played at random
  • your CD-ROM drive mysteriously opens and closes
  • programs suddenly start on your computer
  • you receive notification from your firewall that some applications have attempted to connect to the Internet, although you did not initiate this, then it is very likely that your computer has been infected by a virus

Additionally, there are some typical symptoms which indicate that your computer has been infected via email:

  • your friends mention that they have received messages from your address which you know you did not send
  • your mailbox contains a lot of messages without a sender's e-mail address or message header

These problems, however, may not be caused by viruses. For example, infected messages that are supposedly coming from your address can actually be sent from a different computer.

There is a range of secondary symptoms which indicate that your computer may be infected:

  • your computer freezes frequently or encounters errors
  • your computer slows down when programs are started
  • the operating system is unable to load
  • files and folders have been deleted or their content has changed
  • your hard drive is accessed too often (the light on your main unit flashes rapidly)
  • Microsoft Internet Explorer freezes or functions erratically e.g. you cannot close the application window

90% of the time the symptoms listed above indicate a hardware or software problem. Although such symptoms are unlikely to be caused by a virus, you should use your antivirus software to scan your computer fully.

What you should do if you notice symptoms of infection

If you notice that your computer is functioning erratically

  1. Don't panic! This golden rule may prevent the loss of important data stored in your computer and help you avoid unnecessary stress.
  2. Disconnect your computer from the Internet.
  3. If your computer is connected to a Local Area Network, disconnect it.
  4. If the computer cannot boot from the hard drive (error at startup), try to start the system in Safe Mode or from the Windows boot disk
  5. Before taking any action, back up all critical data to an external drive (a floppy disk, CD, flash memory, etc.).
  6. Install antivirus software if you do not have it installed.
  7. Download the latest updates for your antivirus database. If possible, do not use the infected computer to download updates, but use a friend's computer, or a computer at your office, an Internet cafe, etc. This is important because if you are connected to the Internet, a virus can send important information to third parties or may try to send itself to all email addresses in your address book. You may also be able to obtain updates for your antivirus software on CD-ROM from the software vendors or authorized dealers.
  8. Perform a full system scan.

If no viruses are found during a scan

If no viruses are found during the scan and the symptoms that alarmed you are classifed, you probably have no reason to worry. Check all hardware and software installed in your computer. Download Windows patches using Windows Update. Deinstall all unlicensed software from your computer and clean your hard drives of any junk files.

If viruses are found during a scan

A good antivirus solution will notify you if viruses are found during a scan, and offer several options for dealing with infected objects.

In the vast majority of cases, personal computers are infected by worms, Trojan programs, or viruses. In most cases, lost data can be successfully recovered.

  1. A good antivirus solution will provide the option to disinfect for infected objects, quarantine possibly infected objects and delete worms and Trojans. A report will provide the names of the malicious software discovered on your computer.
  2. In some cases, you may need a special utility to recover data that have been corrupted. Visit your antivirus software vendor's site, and search for information about the virus, Trojan or worm which has infected your computer. Download any special utilities if these are available.
  3. If your computer has been infected by viruses that exploit Microsoft Outlook Express vulnerabilities, you can fully clean your computer by disinfecting all infected objects, and then scanning and disinfecting the mail client's databases. This ensures that the malicious programs cannot be reactivated when messages which were infected prior to scanning are re-opened. You should also download and install security patches for Microsoft Outlook Express.
  4. Unfortunately, some viruses cannot be removed from infected objects. Some of these viruses may corrupt information on your computer when infecting, and it may not be possible to restore this information. If a virus cannot be removed from a file, the file should be deleted.

If your computer has suffered a severe virus attack

Some viruses and Trojans can cause severe damage to your computer:

  1. If you cannot boot from your hard drive (error at startup), try to boot from the Windows rescue disk. If the system can not recognize your hard drive, the virus has damaged the disk partition table. In this case, try to recover the partition table using scandisk, a standard Windows program. If this does not help, contact a computer data recovery service. Your computer vendor should be able to provide contact details for such services.

If you have a disk management utility installed, some of your logical drives may be unavailable when you boot from the rescue disk. In this case, you should disinfect all accessible drives, reboot from the system hard drive and disinfect the remaining logical drives.

  1. Recover corrupted files and applications using backup copies after you have scanned the drive containing this data.

Diagnosing the problem using standard Windows tools

Although this is not recommended unless you are an experience user, you may wish to:

  • check the integrity of the file system on your hard drive (using CHKDSK program) and repair file system errors. If there are a large number of errors, you must backup the most important files to removable storage media before fixing the errors
  • scan your computer after booting from the Windows rescue disk
  • use other standard Windows tools, for example, the scandisk utility



1/3/09

Solution to fix the USB Drive not recognized problem


USBs have surely made our lives simpler and convenient. We like plugging our pen drives, flash drives and other external devices in USB ports but there is a strange problem that happens sometimes that when we insert our USB drive into the USB port we get an error message saying “USB Drive Not Recognized”.


The error message reads “One of the USB devices attached to this computer has malfunctioned, and Windows does not recognize it. For assistance in solving this problem, click this message”. If we open the My Computer we will notice that even our drive has not been detected.

The first thing that will come to our mind is that we should try uninstall and then reinstall the USB drivers but here is the simpler solution and yes no need to edit the registry or try something in the Device Manager.

Solution for the problem:

1.    The solution is just to “Turn off the computer and unplug it from the power supply” (Unplugging is necessary as today even after turning the system off, the motherboard continues to get power).

2.    Let the system remain off for about a minute.

3.    Restart the system and wait for it to boot completely before inserting the drive again again.

That’s it the problem will not appear again.