Search This Blog

Wednesday, July 14, 2021

How to insert a PDF into a PowerPoint slideshow in 2 ways and enhance your presentations




 This well written article by Helen Colman explains how to enhance your power point presentations; by inserting a pdf.

https://www.ispringsolutions.com/blog/five-ways-to-insert-a-youtube-video-into-a-powerpoint-presentation.

Click here for more details

Wednesday, July 07, 2021

 Install immediately: Microsoft delivers emergency patch for Print-Nightmare security bug



Install immediately: Microsoft delivers emergency patch for Print-Nightmare security bug by  Liam Tung  from ZdNet

Print Bug Update Path by Microsoft. For More Information ==> Click Here


Hover offers Domains



Hover.com offers reliable domains and real customer support on the phone.

Click here for more details.

 




Wednesday, February 03, 2016


How To Load Up Your Kindle With Non-Amazon Ebooks


So you’ve got a Kindle, and you have books on it, and you want to keep those books—no matter what Amazon or a publisher decides you deserve in the future. Your legal options are limited, but you do have some. Click here for details 

Tuesday, August 04, 2015

What it was like to upgrade from Windows 7 to Windows 10

Windows 10 is spying on almost everything you do – here’s how to opt out

Windows 10 is spying on almost everything you do – here’s how to opt out 


But there’s something you should know: As you read this article from your newly upgraded PC, Windows 10 is also spying on nearly everything you do.



Windows 10 defaults to keylogging, harvesting browser history, purchases, and covert listening

Windows 10 defaults to keylogging, harvesting browser history, purchases, and covert listening

By default, Microsoft gets to see your location, keystrokes and browser history -- and listen to your microphone, and some of that stuff is shared with "trusted [by Microsoft, not by you] partners."
You can turn this all off, of course, by digging through screen after screen of "privacy" dashboards, navigating the welter of tickboxes that serve the same purposes as all those clean, ration-seeming lines on the craps table: to complexify the proposition so you can't figure out if the odds are in your favor.

How to upgrade to Windows 10 without waiting in line

How to upgrade to Windows 10 without waiting in line



For more Details Click here

Thursday, June 12, 2014

How to fix system scan error on Windows 8?

How to fix system scan error on Windows 8?


Open a command prompt with admin rights and run this DISM command to detect and repair corrupted files on the HDD:

DISM /Online /Cleanup-Image /RestoreHealth

This is the advanced version of sfc /scannow. Windows now downlaods the corrupted files from the Internet instead of telling you that the files can't be repaired. 


http://blogs.technet.com/b/joscon/archive/2012/09/26/fixing-component-store-corruption-in-windows-8-and-windows-server-2012.aspx

This is a windows of command.com:


"Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.

C:\Windows\system32>sfc /scannow

Beginning system scan.  This process will take some time.

Beginning verification phase of system scan.
Verification 100% complete.

Windows Resource Protection found corrupt files but was unable to fix some
of them. Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For
example C:\Windows\Logs\CBS\CBS.log. Note that logging is currently not
supported in offline servicing scenarios.

C:\Windows\system32>DISM /Online /Cleanup-Image /RestoreHealth

Deployment Image Servicing and Management tool
Version: 6.3.9600.17031

Image Version: 6.3.9600.17031

[==========================100.0%==========================]
The restore operation completed successfully. The component store corruption was
 repaired.
The operation completed successfully.

C:\Windows\system32>"

Tuesday, April 29, 2014

DO YOU USE INTERNET EXPLORER?


DO YOU USE INTERNET EXPLORER?
The Department of Homeland Security wants people to stop using it immediately because of a major security gap.
** SHARE WITH FRIENDS **
FOR FULL STORY- http://bit.ly/1rCFEb5


Source:

http://cbs12.com/news/top-stories/stories/homeland-security-stop-using-internet-explorer-15413.shtml

AOL hack causes zombie spam


AOL hack causes zombie spam

 

 


"NEW YORK (CNNMoney) -- Whether or not you use AOL, a recently exposed mass hack of the company's network promises trouble for everybody.
AOL users: Hackers stole "a significant number" of email addresses, passwords, contact lists, postal addresses and answers to security questions, the company said in a blog post Monday. Anyone of the company's 120 million account holders might be affected. Judging by AOL's description of the incident, that total number could well be in the tens of millions. But AOL isn't giving any details about the incident for now.
Non-AOL users: Watch out for spam that looks like it came from you or your friends' AOL accounts."


Sources:

WPTV 5 
 http://www.wptv.com/news/science-tech/aol-email-spoofing-hack-causes-causes-zombie-spam
           
CNN
 http://money.cnn.com/2014/04/29/technology/security/aol-hack-spam/index.html?hpt=hp_t3



Thursday, March 27, 2014

What is a Hashtag? And What Do You Do With Hashtags?

 What is a Hashtag? And What Do You Do With Hashtags?

  


What is a Hashtag?

A hashtag is a label for content. It helps others who are interested in a certain topic, quickly find content on that same topic.
A hashtag looks something like this:  #MarathonBombings or #SmallBizQuote.
Hashtags are used mostly on social media sites.  They rocketed to fame on Twitter.  But now you can use hashtags on other social platforms, such as Instagram, Facebook, Pinterest and Google+.
Anyone sharing content on a relevant topic can add the hashtag label to their message.  Others searching for that topic, can search for that label to find other messages on that same social media platform.



http://smallbiztrends.com/2013/08/what-is-a-hashtag.html

Tuesday, November 12, 2013

2014 BEST Antispyware Software Review

2014 BEST Antispyware Software Review
Product Comparisons:


http://anti-spyware-review.toptenreviews.com/


Remove FBI virus Removal instructions


"FBI virus is a sneaky malware, which mostly gets inside its target computer undetected with a help of Trojan.LockScreen. As soon as it gets inside, this scam presents about itself for the victim as 'The FBI Federal Bureau Investigation' and shows an aggressively-designed alert that claims that computer is blocked because of the Copyright and Related Rights Law violation or other reason. However, if you find yourself blocked by a program, which tells that you have been illegally using or distributing copyrighted content, viewing or distributing pornographic content and spreading malware to other computers, you must ignore such alert first of all and remove FBI virus immediately! This program is distributed by scammers to swindle the money. Be aware that security experts expect this group of ransomware to grow and improve.. "

Remove FBI virus
Removal instructions

http://www.2-spyware.com/remove-fbi-virus.html

Wednesday, June 05, 2013

If you Computer slow down or Freezes

 If you Computer slow down or Freezes at times...What to do?

 

 Use CCleaner to clean your computer, then run RKILL, Please see review about  Rkill  to detect any unwanted malware service running on the background. 
Scan your machine for Malware with MalwareBytes then run Avast Anti Virus.  These applications are free of charge. 
If after cleaning the machine nothing happens then download and run  TDDSKiller from Kaspersky Labs. to look for a hidden rootkit.

Please run also a defragger such as Auslogics Disk Defrag

P.S A rootkit is a program or a program kit that hides the presence of Malware in the system

Source(s):