INSTALL AND REMOVE SOFTWARE
Very often it is necessary to put the computer in some other program or to update a previous one, this procedure is known as an installation, to install a program to do the following: 1 .- Enter
disk (floppy or compact) the program to install in the appropriate drive (A: or D:).
2 .- In case of a compact disk installation program starts automatically, follow the onscreen instructions to accept the terms of the contract and select the installation folder.
3 .- Re-start the computer.
note: in all cases it is necessary to reboot the computer after the installation of a program.
How to uninstall a program:
1 .- Click on Start, Settings, Control Panel, Add or Remove Programs
2 .- Properties of Add / Remove Programs, select the program you want to uninstall and click Add / Remove
3 .- Confirm the uninstall program and click OK.
Note: Sometimes uninstalling a program is not as simple, as references to that program remain in the system even when it is uninstalled using the Add or Remove Programs.
How to uninstall a program manually.
Click Start, Run. Run in Open box, type regedit and make a click.
Be careful when editing the registry because the smallest mistake will bring consequences. Double click on:
HKEY_LOCAL_MACHINE, SOFTWARE, MICROSOFT, WINDOWS, CURRENT VERSION, UNINSTALL. Within UNINSTALL in the left window and delete the reference is the program you want to remove, by means of making a right click and click on the Delete option. If you accidentally delete a program installed, you will have problems when you want to uninstall
Thursday, December 18, 2008
Funny Indian Wedding Quotes
APPLICATION IS A VIRUS AND HOW YOU CAN AVOID ENTERING OUR COMPUTER COMPONENTS
A computer virus is malware that seeks to alter the normal operation of your computer without permission or knowledge of the user. Viruses, usually replace other executable files infected with this code. Viruses can destroy, intentionally, the data stored on a computer, although other more "benign", which is only characterized by being annoying.
Computer viruses are basically spread function, do not replicate themselves because they have no such power as the worm depends on software to spread, are very harmful and some also contain a payload (payload ) with different objectives, from a simple prank to do serious damage to systems or computer-generated block useless traffic.
The operation of a computer virus is conceptually simple. It runs a program that is infected, in most cases, due to ignorance of the user. The virus code is resident (stay) in the RAM of the computer, even when the program containing it has finished running. The virus then takes control of basic operating system, infecting so later, executable files that are called for execution. Finally, add the code of the virus to the infected program and recorded on disc, which replicated the process is complete.
Protection Methods
types and methods to minimize or reduce the risks associated with viruses can be denominated assets or liabilities. Assets
Antivirus: antivirus programs called trying to find traces left by a malicious software, to detect and remove, and in some cases contain or stop pollution. Try to have checked the system while running stopping the known pathways of infection and notifying the user of potential security incidents.
file filters: filters is to create malicious files if the computer is connected to a network. These filters can be used, for example, in the postal system or by using firewall techniques. In general, This system provides security which do not require user intervention, can be very effective, and allow only employ resources more selectively.
Liabilities
-Avoid putting your grain storage equipment removable media that you feel may be infected with a virus.
-Do not install pirated software.
-Avoid downloading software from the Internet.
-Do not open messages from unknown e-mail address.
-general, tend to send "pictures" on the web, who call themselves "mifoto.jpg", have a white square icon with a blue line on the top. In Actually, we are not in the presence of a photo, but a Windows application (*. exe). His real name is "mifoto.jpg.exe" but the final "*. exe" not see why Windows is disabled (default) the display of registered extensions, that is why we only see "mifoto.jpg" and not "mifoto.jpg.exe." When we try opening (double clicking) actually are running the same code that runs under MS-DOS
virus types There are several types of viruses, vary according to function or how it runs on our computer by altering the activity of the same.
A computer virus is malware that seeks to alter the normal operation of your computer without permission or knowledge of the user. Viruses, usually replace other executable files infected with this code. Viruses can destroy, intentionally, the data stored on a computer, although other more "benign", which is only characterized by being annoying.
Computer viruses are basically spread function, do not replicate themselves because they have no such power as the worm depends on software to spread, are very harmful and some also contain a payload (payload ) with different objectives, from a simple prank to do serious damage to systems or computer-generated block useless traffic.
The operation of a computer virus is conceptually simple. It runs a program that is infected, in most cases, due to ignorance of the user. The virus code is resident (stay) in the RAM of the computer, even when the program containing it has finished running. The virus then takes control of basic operating system, infecting so later, executable files that are called for execution. Finally, add the code of the virus to the infected program and recorded on disc, which replicated the process is complete.
Protection Methods
types and methods to minimize or reduce the risks associated with viruses can be denominated assets or liabilities. Assets
Antivirus: antivirus programs called trying to find traces left by a malicious software, to detect and remove, and in some cases contain or stop pollution. Try to have checked the system while running stopping the known pathways of infection and notifying the user of potential security incidents.
file filters: filters is to create malicious files if the computer is connected to a network. These filters can be used, for example, in the postal system or by using firewall techniques. In general, This system provides security which do not require user intervention, can be very effective, and allow only employ resources more selectively.
Liabilities
-Avoid putting your grain storage equipment removable media that you feel may be infected with a virus.
-Do not install pirated software.
-Avoid downloading software from the Internet.
-Do not open messages from unknown e-mail address.
-general, tend to send "pictures" on the web, who call themselves "mifoto.jpg", have a white square icon with a blue line on the top. In Actually, we are not in the presence of a photo, but a Windows application (*. exe). His real name is "mifoto.jpg.exe" but the final "*. exe" not see why Windows is disabled (default) the display of registered extensions, that is why we only see "mifoto.jpg" and not "mifoto.jpg.exe." When we try opening (double clicking) actually are running the same code that runs under MS-DOS
virus types There are several types of viruses, vary according to function or how it runs on our computer by altering the activity of the same.
Replacing A Square Recessed Lighting
external connectors
1. Mouse and keyboard connector (PS / 2)
2. Serial port (may or may not have one)
3. Monitor connector (D-SUB 15 pin)
4.
parallel port 5. USB Ports
6. Ethernet connector (RJ-45)
7. Audio connectors
1.
processor slot 2.
IDE connectors 3.
4 memory slots. Connector for flexible storage units
5. Power supply connector
6. PCI Slots
7. AGP Slot
8. Chipset
9. Graphics processor (may or may not have one)
10. Serial ATA or SATA connector (may or may not any)
11. PCI Express Slot (may or may not have one)
12. CMOS battery
Wednesday, December 17, 2008
Tuesday, December 16, 2008
Long Hair With Full Highlights
THIS PART IS TO HELP YOU TO RECOGNIZE AND COMPONENTS TO KNOW
http://images.google.com/imgres?imgurl=http://www.monografias.com/trabajos11/desallo/Image411.jpg&imgrefurl=http : / / www.monografias.com/trabajos11/desallo/desallo.shtml&usg=__tHW1spLued1YRUNxH5Zr4oD9I-I=&h=302&w=547&sz=45&hl=es&start=11&um=1&tbnid = oHl3ilP4jk8LRM: & TBNH = 73 & tbnw = 133 & prev = / images% 3Fq% 3Dcomo% 2Binstalar% 2Blos% 2Bcomponentes% 2Bde% 2Buna% 2Bcomputadora% 26um% 3D1% 26hl% 3des% 26lr% 3D
http://images.google.com/imgres?imgurl=http://www.monografias.com/trabajos11/desallo/Image411.jpg&imgrefurl=http : / / www.monografias.com/trabajos11/desallo/desallo.shtml&usg=__tHW1spLued1YRUNxH5Zr4oD9I-I=&h=302&w=547&sz=45&hl=es&start=11&um=1&tbnid = oHl3ilP4jk8LRM: & TBNH = 73 & tbnw = 133 & prev = / images% 3Fq% 3Dcomo% 2Binstalar% 2Blos% 2Bcomponentes% 2Bde% 2Buna% 2Bcomputadora% 26um% 3D1% 26hl% 3des% 26lr% 3D
Places To Celebrate A Baptism In Miami Fl
SERVING THIS ENTRY IS FOR HELP WITH MAINTENANCE TIPS
http://www.trucoswindows.net/tutorial-89-TUTORIAL-Mantenimiento-basico-del-PC.html
http://www.trucoswindows.net/tutorial-89-TUTORIAL-Mantenimiento-basico-del-PC.html
Monday, September 1, 2008
Lying On Marriage License Application
Show at the Cultural Center of Cooperation - October 2008 Buenos Aires
We refer here to religion in general, as an ideology that makes the conduct of certain people (or all).
Subscribe to:
Comments (Atom)