Online Pc Tech Support Uk

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 30 April 2009

How to apply Conditional Formatting in Microsoft Excel?

Posted on 05:22 by Unknown
A formatting that is applied to a cell or multiple cells and activated only if condition is met is called conditional formatting. For example, if a condition is applied in a selection that when any value in the selection is greater than 50, the value in the respective cell will be italic. In figure below, the conditional formatting is applied to the cells C03 to CIO. When values in these cells are changed, Excel automatically updates the format of the cell's.

To apply the conditional formatting, follow the steps.
• Select the cell's, you want to apply conditional formatting.
• Choose Conditional Formatting command from the Format menu. The Conditional Formatting dialog box will appear as shown below.
• Specify the condition.
• Click Format button to apply formatting. Format Cells dialog box will appear. Specify the format you want.
• Click Add button to specify another condition. You can specify up to three different conditions.
• Click OK.


To delete the conditional formatting, follow these steps.
• Select the cell's, you want to delete the conditional formatting.
• Choose Conditional Formatting command from the Format menu. The Conditional Formatting dialog box will appear.
• Click Delete button to remove a condition. You will be asked to choose which condition (1, 2 or 3) you want to remove.
• Select the condition and click Ok button.

See Also
microsoft windows technical support
malicious spyware removal
computer continually Restarts
Protect your PC
How to increase virtual memory in windows
Read More
Posted in microsoft computer support, microsoft support, microsoft windows support | No comments

Wednesday, 22 April 2009

How to increase virtual memory in windows

Posted on 06:03 by Unknown
Normally this warning message shows when you run many programs same time than the RAM installed on your computer is designed to support. Your can solve this problem by increasing the system paging file size also called as virtual memory. Using this virtual memory windows moving information to and from the paging file for fast processing. This will free up enough RAM for other programs to run properly.

To increase the system page file follow the give path:
Control Panel > System > Advanced > Click on Settings (Under Performance) > Advanced > Change

Here under Drive (Volume label), you have option to select any of your hard disk drive, but the best choice is, select any drive other than C drive for virtual memory.

Set the double Initial & Maximum Size of your Virtual Memory. Here set initial size 700 MB and maximum size up to 1OOOMB; you can change this size according to the free space available on your hard drive.

See Also
home computer support
how to remove cipav spyware
Will Your Device Work with Windows 7
Fix Windows Registry To Speed Up Your Comuter
Read More
Posted in computer help, computer repair uk, computer support, remote computer support | No comments

Monday, 20 April 2009

Hide User Account in Windows Xp and Windows 2000

Posted on 00:17 by Unknown
For my next trick I will make a user account disappear, yet remain a full functioning account. Today's Security Tip is another way to lock down your system, and it does this by hiding specified user accounts. This feature is only available in XP and 2000, so unfortunately the rest of you are out of luck. This process does involve an easy registry edit, but if you're uncomfortable with that you might want to think twice about attempting this.

Normally when you log into XP, you see the startup screen where you see all the icons for the users who can access. What this tip does is allow you to hide a desired account from this screen. If you want to log on as this user you have to press Cntrl+Alt+Del twice at the Welcome screen to make a Windows Security dialog box appear. Here you can type in the user name and password 0f the hidden account and log in. Limited Users shouldn't be able to see any sign of you except for the listing in the Documents and Settings folder. Other administrative users will be able to see your hidden account in Control Panel/User Accounts, so keep this in mind when you're planning this out.

All right, now down to the good stuff. If having a hidden account sounds like your cup of tea, and you have no problem with small Registry augmentation, then let's go:

* First we need to open up the Registry Editor. Go to Start/Run and type "regedit" and click OK

* You should be looking at the Registry editor, and what we need to do now is navigate to H-KEY\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist . You will not see this folder if you do not have "show hidden system files" turned on.

* Once here we need to create another DWORD value. This is easier than it sounds, right click on the User list label file on the left side of the screen and select New>DWORD . You'll see the new entry in the right pane of the window, rename this value the name of the user account you want hidden (exactly how it is listed in the Startup screen, case sensitive) and leave the value at 0.

* Close your Registry Editor and restart the PC. When the Welcome screen comes up you'll notice that there's no icon for the user you just concealed. So how do you log in? This is where you press Cntrl+Alt+Del 2x's and the Windows Security Dialog box will come asking you to authenticate (name/password) after this the system should log you in.

Here's one more thing you might want to keep in mind, Windows logon screen. This is the screen where you see the available users you can choose to log in as. You can turn this option on/off in the User Accounts ( Start/Control Panel/User Accounts then "Change the way Users log in or off" and "Use Windows Welcome Screen" and you need to turn it off if you plan on using a hidden account and there are no other accounts on the system. The reason why is that the Windows doesn't have any user accounts to display in the Welcome screen, so it will continuously reboot. Now if you do run into this 0r any problems simply enter Safe mode at the next boot, this will allow you to go to the User Accounts Window and fix any problems. If you find that you can't log in at all with your hidden account go back and look at the registry value you created. Make sure you're spelling the user name is correct and that it's in the right location in the registry.

See also
microsoft windows vista support
Computer Support – MSCONFIG Command
PC Repair Services and Computer Support
Easy Way To Get Computer Help
Read More
Posted in windows, windows help, windows repair, windows support | No comments

Tuesday, 14 April 2009

Where Is The Conficker Worm Now?

Posted on 04:19 by Unknown
After weeks of warning about the Conficker worm, April 0ne came and went without any major problems. But where did the worm go?

Computer worm is now parading as an anti-virus program called Spyware Protect 2009. The worm takes users to a fake security Web site, asks them to pay $50.00 for a spyware program that actually is the Conficker worm, then keeps your credit card information, to boot. "It infects your computer," she told co-host Harry Smith. "And it keeps that $50.00"

She says it can pop up on your computer and advertise a way to prevent the worm. To be safe, she says not to click on anything you're not familiar with.

Del Conte stressed that now is the time to be extra-careful

Related search
virus removal
Password-Manipulating Virus Spreading
How To Secure Yourself Against Conficker Worm
Read More
Posted in spyware removal, virus | No comments

Tuesday, 7 April 2009

Troubleshoot - Runtime Error R6025

Posted on 07:01 by Unknown
Runtime error r6025 is an error more frequently associated for users who are using Visual Basics or any code compiling software to develop programs. While there are some other reasons for the runtime error, this article will discuss this first, then touch briefly on the other possible errors associated with this as well as some of the ways you can avoid having this runtime error again.

Most of the time, Windows will identify the error and this inform the end user through the runtime error dialogue box. Most coders would suggest that you run a debug program to solve this problem as it will track down the wobbly code within your project and attach the problem there and then. It is relatively a minor problem when detected early. Some cases, this runtime error is a direct result of a program conflict with Norton Antivirus and some other, more popular virus software that is available to customers.

What happens is that older systems that run older versions of their OS are not friendly with newer code that is written within new antivirus programs and thus the conflict occurs and Windows detects it as Runtime Error r 6025. These are some of the major causes of this error and the entire runtime error library has many different and varying causes. While the problem shooting process will take a while as they each have different unique ways to solve (as can be seen with this runtime error), one of the main ways to solve any of these errors is to have a single universal solution.

Sometimes, Windows flashes these errors due to confusion in the registry, or perhaps a virus or a worm (or even spyware) has left behind a code or entrenched key within its matrix that confuses the operating system into operating it as a runtime error. Technicians all agree that one of the first steps to solving a runtime error (or also known as an error when a program execution or command line is broken) is to fix the registry.

The reason for this is because of the fact that everything is logged down into the registry and most of the time, the error can be traced in the registry as a broken command or code. A good registry cleaner can solve most of these problems by cleaning up the registry and highlighting the conflicts. Advanced registry cleaners can even solve these conflicts through a re shuffling of data within the registry, which is a good thing to have when you want a specific program to work. Runtime error r6025 and hundreds more like it can be solved with a single download and a single click of a mouse - most of the time. It is a harmless way to root out one possibility, and most of the time, it works.

Related Search
antivirus software installation setup support
Read More
Posted in windows | No comments

Friday, 3 April 2009

Top 5 Famous Computer Hackers

Posted on 06:00 by Unknown
America's Best-Known Hackers

So here are some of the most popular -- or, perhaps, infamous -- hackers, collected with the help of Symantec, the Justice Department, and several technology consultants. Please feel free to suggest others.

Fred Cohen
In 1982, Fred Cohen, then a Ph.D. student at the University of Southern California, wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was benign. It was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk -- something few computers sold today can accommodate anymore.

Other computer scientists had warned that computer viruses were possible, but Cohen's was the first to be documented. A professor of his suggested the name "virus." Cohen now runs a computer security firm.

Kevin Mitnick
It takes some diligence to get the Justice Department to call you "the most wanted computer criminal in United States history." Kevin Mitnick was diligent.

He was first arrested when he was 17, and spent time in and out of jail. He broke into computer systems at Novell, Motorola, Sun, Fujitsu and other firms, stealing their software and crashing their machines. He was caught, for the last time, in 1996.

He did time -- four years of it -- before he was convicted and sentenced to 46 months in prison with credit for time already served.
When he was released, and finished a period when he was under orders to stay away from computers, he wrote two books -- with hacker-ish titles like "The Art of Intrusion." (If you ever saw a movie called "Takedown," it's about Mitnick.) He now runs a computer security firm.

Robert T. Morris
In 1987, Robert T. Morris, a graduate student at Cornell, unleashed the first widely known computer "worm" -- a virus that spread over the Internet.

Morris said the whole thing was a benign experiment that got out of control, but prosecutors said he had caused hundreds -- if not tens of thousands -- of dollars in lost productivity for each computer affected. He was sentenced to three years' probation, community service, and a fine of $10,001 plus legal costs.

But like many of his ne'er-do-well brethren, he was a bright guy. In 1996 he co-founded a startup company that made software for online stores. In 1999 the firm was bought out, for about $45 million, by another online startup called Yahoo.
Morris is now a professor in the Computer Science and Artificial Intelligence Laboratory at M.I.T.

Kevin Poulsen
Kevin Poulsen had good taste in cars. In 1991 a Los Angeles radio station (102.7 on the FM dial) promised a free Porsche to the 102nd caller of the day. He'd already hacked into their phone lines, and mysteriously became caller number 102.

The government was already after him. Having first been caught in his teens -- and rewarded, after punishment, with a computer-security job at a high-tech lab -- he broke into computers run by the FBI and the Defense Department.

After 18 months on the run, he was arrested in 1992 and held without bail. The sentence he finally served -- 52 months -- was the longest for computer crimes at the time.
He does not run a computer security firm. Instead, he writes about it. His blog at Wired News is called "Threat Level."

Shawn Fanning
Shawn Fanning, by most people's definition, is hardly a hacker, but he did more to change the way computers are used than most hackers, for good or evil, can ever hope.
Does his name ring a bell? Perhaps you'll remember his nickname: Napster. Friends at college called him that because of his short, kinky hair; he went on to use it as the name of a Web site for sharing his favorite music with friends.

Napster soon had a lot of friends -- a lot -- and music has never been the same since. People found that music, saved digitally in the MP3 format, sounded just about as good as the music recorded on Compact Discs -- and even better if the CD cost $15 while the MP3 download was free.

Related Search
antivirus software installation setup support
How To Secure Yourself Against Conficker Worm
Read More
Posted in virus | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • When Should You Call a Computer Maintenance Expert
    Nowadays everyone is using computer. Computer is a part of our daily life and make our daily work easy like booking ticket, transferring mon...
  • iYogi Re-Defines Technical Support – BizTech2.com
    Remote managed services are gaining a lot of attraction these days. Companies are looking to outsource the maintenance and monitoring of the...
  • Windows 7 Transformation to enhance the system look and performance
    After the launch of Windows 7, there are a lot of Windows 7 transformation screenshot available on the internet. The designers are busy prod...
  • How to Remove Spyware
    Spyware is program which gets installed in a computer to gather important information about the user secretly, and expose it to hackers and ...
  • Troubleshoot - Runtime Error R6025
    Runtime error r6025 is an error more frequently associated for users who are using Visual Basics or any code compiling software to develop p...
  • Hide User Account in Windows Xp and Windows 2000
    For my next trick I will make a user account disappear, yet remain a full functioning account. Today's Security Tip is another way to lo...
  • Tape backup software
    Tape backup software is another comprehensive backup software that can provide full or partial back up to your computer’s data. This backup ...
  • Fix computer Black Screen Error
    To resolve this issue, follow these steps. Resolution for Cause 1 To resolve this issue, remove the media in your CD, DVD, or floppy drive a...
  • Windows 7 Reliability Monitor
    One of the cool little features that arose from the ashes of the disaster known as Windows Vista was the Reliability Monitor. A little-known...
  • Best free backup software
    Data stored on your system are of vital importance to you. They keep your valuable photos, giant music collection, important documents and o...

Categories

  • |freeantivirus motherboard
  • Acer Support
  • adware removal
  • adware removal program
  • and file sharing xp
  • anti spyware removal
  • anti spyware software
  • anti virus protection
  • anti virus setup
  • antivirus
  • antivirus configuration
  • Antivirus Installation
  • antivirus installation help
  • antivirus installation support
  • antivirus protection
  • antivirus protection software
  • antivirus setup
  • antivirus solution
  • Antivirus Support
  • backup support
  • Bad Sector
  • best computer protection reviews
  • best spyware removal
  • black screen
  • brother printer support
  • canon printer support
  • chart excel
  • chart excell
  • charts on excel
  • command line shells
  • command shells
  • computer
  • computer auto restart problem
  • computer check up
  • computer fix direct
  • computer fix for free
  • computer fix it
  • Computer Fix Programs
  • computer fixing
  • computer hardware support
  • computer help
  • computer maintenance
  • Computer Optimization
  • computer printer repair
  • computer problem
  • Computer problems
  • computer reboot problem
  • computer repair
  • Computer Repair Services UK
  • computer repair uk
  • computer running slow
  • computer security
  • Computer Speedup
  • computer support
  • computer tech support
  • computer tech support uk
  • computer technical support
  • computer troubleshoot
  • Computer troubleshooting
  • computer virus protection
  • computer virus software
  • computers
  • control panel error
  • control panel errors
  • control panel problem
  • control panel problems
  • control panel troubleshoot
  • data backup
  • Data backup support
  • date chart excel
  • delete office trial
  • dell computer support
  • dell keyboard drivers
  • dell support
  • disable file sharing xp
  • email client help
  • email help
  • email setup help
  • email troubleshoot
  • email worm virus
  • email worms
  • enable file sharing xp
  • excel 2007
  • excel 2007 help
  • excel 2007 support
  • excel 2007 tutorial
  • Externaldevices
  • file sharing on xp
  • file sharing windows xp
  • file sharing xp home
  • firewall setup
  • fix a slow computer
  • Fix Bad Sector
  • fix black screen
  • fix blue screen
  • fix computer errors
  • fix computer errors free
  • fix computer problem online
  • fix computer problems
  • Fix Computer Problems free
  • fix computer virus
  • fix computers
  • Fix Computers problems
  • fix dell computer
  • fix divice drivers
  • fix hp computer
  • fix laptop computer
  • fix media center
  • fix win 7 media center
  • fix windows 98 registry
  • Flashdisk
  • free computer virus protection
  • free Trojan removal
  • free virus removal
  • gmail help
  • green pc
  • hal.dll
  • Hal.dll Error Resolution
  • hal.dll problem
  • hal.dll resolution
  • help on email
  • home computer Support
  • how to fix computer problems
  • how to make charts on excel
  • how to outlook
  • how to remove virus
  • how to remove viruses
  • hp computer help
  • hp computer repair
  • hp computer support
  • hp help
  • HP printer repair
  • hp support
  • hp tech support
  • hp technical support
  • Increase Computer Speed
  • Install Antivirus
  • install antivirus uk
  • install printer
  • install software
  • irewall support
  • is an email worm
  • it technical support
  • iYogi
  • January 13
  • laptop computer support
  • lenovo computer support
  • lenovo help
  • Lenovo Support
  • microsoft
  • microsoft computer support
  • Microsoft help
  • microsoft office
  • Microsoft office help
  • microsoft office support
  • microsoft online support uk
  • microsoft operating system support
  • Microsoft PC software
  • microsoft support
  • microsoft tech support
  • microsoft technical support
  • microsoft telephone support uk
  • microsoft uk support phone
  • Microsoft widows support
  • microsoft window support
  • microsoft windows support
  • microsoft windows system image manager
  • Microsoft windows upgrade
  • microsoft windows windows7 windows 7 microsoft windows 7. windows xp windows vista microsoft vista vista computer support tech support operating system
  • microsoft windows xp support
  • multifunctional printer
  • multifunctional printer repair
  • multifunctional printer support
  • norton antivirus virus
  • norton security
  • norton virus protection software
  • of email worm
  • Online Computer Fix Programs
  • online computer support
  • online computer technical support
  • online hp support
  • online microsoft customer support uk
  • online microsoft help
  • online microsoft uk support
  • online pc clean up
  • Online PC repair
  • online pc support uk
  • Online PC Tech help
  • online pc technical support
  • online tech support
  • online tech support uk
  • online technical support uk
  • online virus removal uk
  • online virus scan
  • online windows help
  • Optimize Computer
  • Optimize Computer Performance
  • outlook 2003
  • outlook 2007
  • outlook email
  • path windows registry
  • pc
  • pc check up
  • PC Checkup
  • pc clean up
  • pc computer repair
  • pc computer repair | computers support
  • PC health check
  • PC health check up
  • pc maintenance
  • Pc Optimization
  • Pc Optimize
  • PC Protection
  • pc repair
  • pc security
  • pc security support
  • PC software
  • PC support services
  • pc Tech Help
  • pc tech support
  • phone tech support
  • printer installation
  • printer problems
  • printer repair
  • Printer Support
  • printer support uk
  • printer troubleshooting
  • protection virus
  • push email help
  • Registry Cleaner
  • reinstall windows media center
  • reliability monitor
  • Remote Computer Repair Makes Sense
  • remote computer support
  • Remote Desktop Connection
  • remote it support
  • remote pc support
  • remote software install
  • remote tech support
  • remove adware
  • remove email worm win32
  • remove spyware online
  • remove trojan virus
  • remove virus
  • remove virus uk
  • removing spyware
  • Reset Windows password
  • RunDLL Errors
  • Runtime error
  • Seek Only Meaningful Tech Help
  • server support
  • setting up microsoft outlook
  • shell command
  • slow computer fix free
  • slow computer performance
  • slow computer problems
  • Slow Computer support
  • slow pc problem
  • small business support
  • software
  • software installation
  • software installation help
  • software installation support
  • sony laptop tech support
  • sony technical support
  • speed up windows xp
  • Spyware
  • Spyware Adware Removal
  • spyware detector
  • spyware killer
  • spyware removal
  • spyware removal program
  • spyware remover
  • spyware uninstall
  • spyware virus protection
  • Super Tips To Speed Up Your Computer
  • support
  • symantic anti virus
  • Tech
  • tech pc support
  • tech support
  • Tech Support For Diverse IT Issues
  • tech support uk
  • technical support
  • technical support in uk
  • technical support uk
  • Tips for Free Help on Fixing Computers
  • toshiba laptop support
  • toshiba support
  • Trojan horse
  • Trojan horse removal
  • Trojan horse virus
  • trojan removal
  • trojan removal help
  • Trojan virus
  • trojan virus removal
  • Trojan virus remover
  • troubleshoot microsoft operating system
  • troubleshoot pc errors
  • troubleshooting printer problems
  • Tune up Windows XP
  • Uninstall Microsoft Office
  • uninstall microsoft office 2007 vista
  • uninstall microsoft office xp
  • upgrade
  • USB
  • USBdevices
  • virus
  • virus detection
  • virus email worm win32
  • virus protection
  • virus protection software
  • virus protection uk
  • Virus Removal
  • virus removal software
  • virus remover uk
  • virus scan and removal
  • virus scan uk
  • vista support
  • web technical support
  • win7 reliability monitor
  • window 7
  • windows
  • windows 7
  • windows 7 beta download
  • Windows 7 Media Center
  • windows 7 media center listing fix
  • windows 7 media centre remote fix
  • windows 7 support
  • windows 7 taskbar
  • windows command shells
  • windows control panel
  • windows email support
  • windows firewall support uk
  • windows help
  • windows help and support
  • Windows password
  • windows registry
  • windows registry name
  • windows registry problems
  • windows remote support
  • windows repair
  • windows restart error
  • windows support
  • windows support help
  • windows system Iimage manager
  • windows system image manager download
  • windows system image manager execution failed
  • windows system image manager windows sim
  • windows tech support
  • windows technical support
  • windows troubleshooting
  • windows updates
  • Windows Upgrade
  • windows vista
  • windows vista help
  • windows vista printer problems
  • windows xp error messages
  • windows xp slow fix
  • winodws 7 tricks
  • worm email
  • worm removal uk
  • xp file sharing

Blog Archive

  • ►  2011 (23)
    • ►  October (1)
    • ►  September (4)
    • ►  August (3)
    • ►  July (4)
    • ►  June (2)
    • ►  May (4)
    • ►  April (1)
    • ►  March (3)
    • ►  January (1)
  • ►  2010 (44)
    • ►  October (4)
    • ►  September (2)
    • ►  August (5)
    • ►  July (2)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (12)
    • ►  February (5)
    • ►  January (6)
  • ▼  2009 (80)
    • ►  December (16)
    • ►  November (3)
    • ►  September (5)
    • ►  August (8)
    • ►  July (9)
    • ►  June (5)
    • ►  May (9)
    • ▼  April (6)
      • How to apply Conditional Formatting in Microsoft E...
      • How to increase virtual memory in windows
      • Hide User Account in Windows Xp and Windows 2000
      • Where Is The Conficker Worm Now?
      • Troubleshoot - Runtime Error R6025
      • Top 5 Famous Computer Hackers
    • ►  March (6)
    • ►  February (6)
    • ►  January (7)
  • ►  2008 (13)
    • ►  December (6)
    • ►  November (7)
Powered by Blogger.

About Me

Unknown
View my complete profile