Custom Search
Click to find updates on our Facebook page

PC Information and Repair Guide: How Best to Fix PC/Computer Problems, Buy, Upgrade, Build, Recover, Restore, Repair and Protect Desktop and Laptop PCs

PC Buyer Beware! is being updated and converted into a WordPress site

Note that this website is being updated and coverted into a WordPress site. If you want to read any of the pages that have been updated so far here they are:

Hard Disk and SSD Drives -

PC Security -

Software Information -

Backup Methods: How to Make Restorable Backups and System Images -

The standard BIOS and UEFI/EFI BIOS -

Microsoft Product Activation -

Windows Device Manager -

PC Warranties -

PC Buyer Beware! is a comprehensive PC guide covering desktop and laptop/notebook PCs that provides the knowledge required to make sensible buying, building, upgrading, networking, broadband, recovering, repairing and computer-security decisions, helping users to solve hardware and software problems - PC Problems & Solutions - via articles and questions and answers (Q&As) grouped in categories. The quickest way to find the solutions to a particular computer problem is to enter a short and accurate description of it, such as pc freezes or program freezes, both of them very common problems, in the Search feature provided at the top of each page. A list of pages containing those or your own keywords will be presented.

You can access the main sections of this website by making use of the navigation bar provided on the left side of each page, or specific information by entering a suitable search query in the site-search box.

All of the major internal PC components, such as hard disk drives, graphics cards, processors, motherboards, etc., and the external peripheral components, such as monitors, networking equipment, mice, keyboard and printers, have their own section devoted to them. There are separate sections devoted to computer security, software and all of the versions of Windows currently in use – XP, Vista and Windows 7 and Windows 8.


PC Buyer Beware! Facebook page

Visit our Facebook page - - to read informative items going back in time that no longer appear on this page.

A serious WordPress vulnerability has led 100,000+ sites being compromised

January 20, 2015. - A vulnerability in a WordPress plugin called Slider Revolution or RevSlider that is bundled with many themes has led to 100,000+ websites being compromised. Therefore, if you have one or more WordPress sites make sure that they are updated.

RevShare develops the plugin and has fixed the problem with an update, but the WordPress community is mostly not aware of its existence.

The vulnerability makes the wp-config.php file accessible, which gives access to the compromised site's full database.

A list of themes that have been affected is available at the following site:

Google can detect if a site has the vulnerability and, in order to limit the damage that can be caused, has blocked them by providing visitors with an alert that says that an affected site is infected with malware.

Click the link provided below if you want to use the "Free Website Malware and Security Scanner" provided by the security site, Sucuri.

Version 4.2.0 of the RevSlide plugin is required to be safe. ShowBiz Pro is another affected plugin. It requires version 1.5.3 or later.

It is always advisable to be using the latest version of WordPress itself and update any plugins as soon as possible in order not to fall foul of vulnerabilities that have been identified. There is nothing that can be done about vulnerabilities that have been identified by hackers but which have not been identified by the developers of plugins that are called zero-day exploits, because they cannot be fixed unless the developers are aware of them.

Make sure that your plugins are 100% compatible with the latest version of WordPress before you update them and create a restorable backup of a WordPress site before you update it to the latest version of WordPress in case the update screws up the site.

The best way to check and protect a PC's hard disk or SSD drive from a sudden and fatal failure

January 9, 2015. - Self-Monitoring, Analysis and Reporting Technology (SMART) is built into almost all hard drives in use today. It is able to predict if a hard drive or SSD drive is about to fail. If the PC's BIOS monitoring the hard disk or SSD drive is able to read what SMART is reporting, it will produce a warning message during the Power-On-Self-Tests (POST tests) at startup, such as "Hard Disk: SMART Status BAD. Backup and Replace."

That means that the PC's hard drive is close to having an irrecoverable failure and should be backed up and replaced as soon as possible. The warnings produced by SMART, which can also come via free and paid-for software designed to monitor it, should be taken very seriously because hard and SSD drives are very sophisticated devices that can correct errors due to wear effectively. SMART monitors what error-correction is taking place and when it becomes serious produces a warning such as the example provided. When SMART produces a warning, the PC's owner should backup and replace the affected drive as soon as possible.

S.M.A.R.T. -

Free or paid-for tool are available to make sure that there is software monitoring the hard disk or SSD drive of a particular desktop or laptop PC that can bring SMART messages to a computer-user's notice.

Comparison of S.M.A.R.T. tools -

For example, here is what a paid-for utility says about itself on its website: "HD Tune Pro is a hard disk / SSD utility with many functions. It can be used to measure the drive's performance, scan for errors, check the health status (S.M.A.R.T.), securely erase all data and much more."

SMART monitors the physical health of hard disk and SSD drives. The built-in tool provided by every version of Windows since Windows XP called chkdsk (Check Disk) runs checks on the logical health of the files on the drive and can mark bad unusable areas of he drive as bad so that Windows does not use them.

To run the basic version of chkdsk, open Windows Explorer (to find an option to do that in Windows 7 right-click on the Start button), right-click the drive you want checked and select the Properties option in the menu that comes up. Opening the Tools tab provides the Error-checking option. Just click on the "Check now" button to run its routine maintenance tests.

There is a much more powerful version called chkdsk.exe that is run from the Command Prompt.

The command-prompt switches (commands) that chkdsk provides vary significantly from one version of Windows to another due to the fact that it is continually being improved, but the chkdsk c: /f switch performs error correction of the C: drive that Windows is installed on by default for all versions of Windows since Windows XP. To run the checks on any other partition or drive just change c: to the drive letter of that drive partition or separate hard drive. Laptop PCs normally only have one hard disk or SSD drive but a desktop PC can have as many installed as there are sockets for them on the PC's motherboard itself or from special adapter cards installed in its card slots.

To find out what all of the switches that chkdsk provides your copy of Windows, for example, in Windows 7, enter cmd in the Start => Search box, right-click the cmd.exe link that is provided by that search and click "Run as administrator". Type chkdsk /? at the prompt and press Enter. You'll see a complete list of all of available chkdsk switches, such as chkdsk /f that fixes errors and chkdsk /r that checks for errors and locates bad sectors of the drive or partition and recovers readable information.

In Windows 8.1, just typing Command Prompt while on the Start or Desktop screen brings up the Search box with that search already entered in it.

Useful free diagnostic tools that can help find out what is wrong with a computer or supply information about it

1. – DirectX Diagnostic Tool – the free tool that is part of DirectX, which is itself installed with Windows, being used as a software driver for PC games, multimedia applications, playing video, etc. –

It is part of Windows and is updated by Windows Update along with security updates and hotfixes, but here is the information provided by Microsoft on how to download and install it:

How to download and install DirectX –

DXDiag reports any problems it detects. If "Check for WHQL digital signatures" is enabled on the first tab called System, the tool verifies that all of the device drivers being used by Windows have passed testing by the Windows Hardware Quality Labs (WHQL). Some untested third-party drivers might be in use and causing one or more problems, so this is a valuable test to perform.

In Windows XP, DXDiag provides video and sound tests, but the tests have been removed in the versions used in Vista, Win7 and Win8. To access it in XP enter dxdiag in the Start => Run box. Use the Search box in Vista and Windows 7. In Windows 8.1, press the Windows key (the one with a flag on it) plus the R key to bring up the Run box and enter that command.

2. – The very useful HWMonitor PRO, PerfMonitor and CPU-Z monitoring tools are available from

GPU-Z – Graphics card information –

3. – What’s My PC Doing – Informs you of what the hard disk drive and processor are doing –

4. – Speedfan – “If you need a tool that can change your computer’s fan speeds, read the temperatures of your motherboard and your hard disk, read voltages and fan speeds and check the status of your hard disk using S.M.A.R.T. or SCSI attributes, then you came to the right place.” –

5. - The Windows Diagnostics Tool performs tests on the RAM memory of the computer it is used on. Faulty memory causes all kinds of peculiar problems that are difficult to diagnose, such as files that become corrupted.

Windows Memory Diagnostics Tool (Windows 7) -

Start Memory Diagnostic Tool in Windows 8 -

Windows XP, Vista, Windows 7 & 8.0/8.1 Administrative Tools

All of the versions of Windows from Windows XP to Windows 7 and 8.0/8.1 come with several very useful Administrative Tools that can be accessed under their section in Windows by that name.

How best to protect yourself online from tracking, traffic analysis, giving away your location, etc.

December 19, 2014. - Tor Browser is free software - donations are welcome to help with development - that protects users from network surveillance, traffic analysis and from having your location revealed by routing the user's usage of the web around a distributed network of relays that are run by volunteers living around the world. In this way, any monitoring of your web connection is prevented from discovering which websites are being visited and prevented from finding out what your location is. Due to the process involved that is time-consuming, the Tor Browser is slower than the major browsers - Internet Explorer, Firefox, Chrome, Opera, etc.

Alternatively, you can make use of a Virtual Private Network (VPN), which can be free or paid-for. Here are two well-reviewed VPNs of both types: VPN - ($4.99 a month for 12 months)

Hotspotshield - free VPN with ads -

How to recover a Windows PC from boot problems introduced by the replacement for the standard BIOS called the UEFI BIOS

December 13, 2014. - Windows PCs started using the UEFI BIOS, which is the replacement for the decades-old standard BIOS, with the release of Windows Vista in 2005, so most desktop and laptop PCs bought new since then use a UEFI BIOS.

The standard BIOS, stored in a flash-RAM chip, boots before Windows to run the Power On Self Test (POST) that checks that the hardware components are functioning and configures those components for Windows so that it can load their software device drivers. The standard BIOS of a PC can provide many configuration settings, depending on how many the desktop or laptop PC manufacturer is prepared to allow. The manufacturers of laptop and desktop PCs used for office work usually prefer to have the BIOS or UEFI as limited (or difficult to access, as in the case of the UEFI BIOS) as possible in order to prevent users from getting into the kind of trouble that requires costly customer support. However, PCs or motherboards or laptops bought by power users usually have a BIOS or UEFI that provides the customisation settings that such users are likely to want or need, such as those that allow the processor and RAM memory to be run at higher frequencies than their stock frequencies (to be overclocked), either by enabling settings manually or enabling automatic settings.

The early versions of the UEFI BIOS used in PCs running Windows Vista were more or less the same as the standard BIOS but with mouse operation instead of keyboard-only operation of a standard BIOS. All devices require a device driver to operate, so the keyboard and mouse drivers have to be loaded by the BIOS/UEFI itself in order to be used. The flash-RAM chips of the standard BIOS were of small capacity due to the cost of flash-RAM, so only keyboard navigation was used.

Windows 7 PCs came with a more developed UEFI BIOS that allowed access to the settings while running Windows.

Windows 8.0/8.1 makes as much use of its UEFI as the manufacture is prepared to provide, such as providing startup protection from rootkit infections. Rootkit infections operate under Windows, so require special software to detect and remove them that can be updated like anti-malware scanners.

Unfortunately, UEFI protection is intrinsically bound to the installation of Windows 8.0/8.1, thereby making it problematic to boot the system with another operating system's boot disc (for example, Ubuntu Linux can be run from its boot disc or be installed on the system) or to run system-boot recovery/repair discs created by third-party developers. The UEFI protection itself prevents that from happening unless special measures are adopted.

The following link goes to an excellent article that explains and illustrates how to overcome those UEFI boot problems.

How to solve UEFI boot and startup problems -

Protect yourself when using unsecured wireless networks in shops, restaurants, hotels, libraries, etc.

December 6, 2014. - If, say, while staying at a hotel, you are provided with a password to access the Internet over its wireless network and the staff tell you can use both a wireless and a wired connection that are both secure, any laptop or tablet that you use to make use of the wireless connection will tell you if the connection is secured or not. That is, if the connection is encrypted with WEP (cracked), WPA (cracked) or WPA2 (not cracked, so this is the one you should be using).

A wired connection which does not broadcast a signal is secure if there is no virus on the computer monitoring the connection, but for a wireless connection, you have to check that it is encrypted. To check the security in Windows 7 follow the following clickpath: Start => Control Panel => Network and Sharing Center => Manage wireless networks => The SSID of wireless network being used => Security: WPA2-Personal or WPA2-secured (this is the level of encryption being used for the connection).

Wi-Fi Protected Access -

If there is none of the above-mentioned wireless security, use the wired connection because even though only the hotel's guests have been given the encryption login key, they could all access your computer if, say, file-sharing is enabled in Windows.

Note that WPA2 encryption ends at the router in the room. After what your computer sends on the web gets past the router on to the hotel's network, it is no longer encrypted and can therefore be read.

When using any public or semi-public network there are numerous security weaknesses that can be exploited by people with the know-how. Therefore, it's essential to use your own security methods.

The first measure to take is to make Windows assign the type of network location being used — Home, Work, or Public. To do that in Windows 7, follow this click path: Start => Control Panel => Network and Sharing Center. The one you must select is Public, which adjusts your Windows computer's firewall rules and the Windows file-and-printer-sharing settings. The computer and its contents are also prevented from being visible to other computers on the hotel's shared wireless network.

Choosing a network location -

The next step to take is to use https instead of http (see the link above, which uses http) in the URL addresses of the websites you visit. The s added to http makes the site use a Hypertext Transfer Protocol Secure connection that makes use of bidirectional encryption between the web browser being used and the website being visiting. Most banking sites and sites that require the user to enter login information use https by default.

HTTP Secure -

For example, click and watch it change to in your browser's address bar. The https provides 2048-bit end-to-end encrypted connections. Also note the green closed-padlock icon in the address bar, which indicates that it's a site that is using https encryption.

HTTPS Everywhere from "is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure".

Using a virtual private network (VPN) connection is the best way to maintain security on a public wireless network. A VPN adds an additional layer of encryption between the connecting computer and the VPN provider's server, which connects to the servers of the websites you access. Combined with HTTPS, a VPN provides a very secure wireless connection if the computer itself is free from viruses and has file and printer sharing disabled. A VPN doesn't take more than a few minutes to set up; thereafter connections only take seconds. VPN services are either free and supported by ads or paid-for costing a few US dollars.

Virtual private network -

If a wired Ethernet connection is available it's best to use it instead of a wireless connection because doing so creates a direct connection from the user's computer to the network, which is secure if your computer doesn't have any virus infections and has file and printer sharing disabled. There is plenty of information on how to disable it for all versions of Windows on the web, such as on Shops don't usually provide Ethernet connections but many hotels do, so it's always a good idea to pack an Ethernet cable in your luggage when travelling.

Which is the best way to extend the range of a wired and wireless home network?

November 27, 2014. - There are two main ways to extend the range of a home network, which work well for most users but for a few reasons don't for a minority of users.

A range extender or repeater is a device that extends the range of a wireless network. It should be plugged into the mains about half way from the router to the area that needs the signal. It uses the IP address and login information of the router and broadcasts the router's signal into areas of the home or outside it not receiving a good enough signal. The latest range extenders are adapters that have a built-in mains plug and a mains pass-through socket so that other non-related devices can be plugged into the adapter and use the socket.

Powerline network adapters can now be used to extend both a wired and a wireless home network by using the mains cabling (circuitry) of the house. The adapters come in pairs. One of the adapters is connected by an Ethernet cable to the router and the other adapter, which can either only be connected to by using a wired Ethernet cable or also wirelessly, depending on the type of homeline setup you purchased. The adapters have to support a wireless connection to have one.

Some people have immediate success using both types - range extender and powerline adapters. Others don't have success using one or the other or sometimes even both. Powerline networks can be finicky. For instance, they can only be used on a single mains circuit. If the house has more than one electrical circuit, powerline can only be used on one of them because a wired network requires continuous cabling and a powerline-based network is using the mains cabling of a house.

Powerline adapters broadcast a strong signal to where it's needed, creating a cloned Wi-Fi hotspot, not just repeating the signal as range extenders do.

Here is how I installed the TP-LINK WiFi Powerline TL-WPA4220KIT adapters, which provide both wired Ethernet and wireless connections. The installation was simple. I plugged the smaller unit into a nearby mains socket and connected it to my router with one of the two Ethernet cables that came with the adapters. Next, I plugged the Wi-Fi adapter where I want to extend the router's wireless signal. The connection was made instantaneously. Next, I pushed the Wi-Fi clone button on the adapter followed by WPS button on my router. After a minute or so, the wireless connection was up and running. There is now a strong signal all around the house and garden and even in my shed.

Powerline adapters can be finicky. It is stipulated that they are to be kept on the same mains circuit and recommended that they are not used in extension sockets, especially ones that are surge-protected. That said, I have not encountered any problems using them in surge-protected extension sockets.

If you need a password because your router doesn't have a WPS button that connects new wireless devices to your home network automatically, the password that you get asked for is written on the actual powerline adapter. You then have to change the default user name and password to those used by your wireless network, which you may or may not have changed from the default ones. Pressing the WPS button, if available, just makes the equipment use the wireless network's login information automatically. Default login information should *not* be used because they are public information that hackers can use to access your router or wireless home network. The default SSID and encryption key that your wireless network uses is usually provided on the bottom of your router.

To change login information requires accessing the router's web-based configuration page by entering the router's IP address that opens it. To find out what that IP address is in Windows 7, enter cmd in the Start => Search box. A link called cmd.exe is supplied. Right-click on the link and choose "Run as administrator". Doing that brings up the black-windowed Command Prompt. Enter ipconfig at the prompt. The item called Default Gateway is the router's IP address, which is for my router. To bring up the router's configuration page just enter that number, as is, into a web browser. You then have to enter your router's login user name and password in order to be able to access the settings and change them.

[Installation Guide] TP-LINK WiFi Powerline TL-WPA4220KIT and TL-WPA281KIT V3 -

TP-LINK AV500 Powerline Edition (TL-WPA4220KIT) : UNBOXING -

How To Set Up A Powerline Network With (TP LINK 500Mb) -

Wi-Fi extenders (forum thread that deals with using both range extenders and powerline adapters) -

Wireless Range Extender or PowerLine Adapter? -

Why Google may be more 'evil' than the US National Security Agency (NSA)

November 19, 2014. - "For four decades, we have proudly championed citizen interests before Congress, the executive branch agencies and the courts." is what the Public Citizen website says about itself.

It has produced a report on the growing influence of Google in politics worldwide, made possible by the ad revenue it receives from web advertising that is powered by Google's knowing as much about us as possible - information gained from our use of its products and services - so that it can target customised ads at us across the web.

Google is now the top political lobbyist in the US, giving donations to all and sundry. In the following YouTube video, the RT TV channel's Abby Martin interviews a director of Public Citizen, Taylor Lincoln, about this state of affairs. The second link goes to the report mentioned in the video. Both are well worth watching/reading.

Why Google May Be More ‘Evil’ than the NSA | Think Tank -

Some facts Google doesn't pop up on your screen -

National Security Agency (US) -

Computer diagnostics: Solutions to desktop and laptop PC hardware and software problems

The hardware and software problems dealt with on this website are in the order of their popularity. When applicable, the order will change to match the popularity recorded by this website's web logs in the previous month.

Click a relevant link below to visit the information it describes

1. - Motherboard and power supply problems: How to fix common problems with faulty motherboards (mainboards) and power supplies (PSUs)

2. - Software problems: How to fix problems with Windows, programs, and utilities

3. - Hard disk drive problems: How to fix computer hard disk drive (HDD) problems

4. - RAM memory problems: How to fix problems with the Random Access Memory

5. - Video/graphics card problems: How fix common computer video and graphics problems

6. - Network problems: How to fix common wired and wireless networking and internet problems

7. - Windows 8 problems: How to diagnose and fix problems with Windows 8

8. - Windows 7 problems: How to diagnose and fix problems with Windows 7

9. - Recover, restore and repair Windows 7 (Win7) when a computer crashes or fails to boot

10. - Windows Vista problems: How to fix common problems with Windows Vista

11. - Recovering and repairing Windows Vista when a computer crashes or fails to boot

12. - Windows XP: How to troubleshoot and fix shutdown, restart (reboot), and startup problems

13. - Recovering and repairing Windows XP when a computer crashes or fails to boot

14. - Laptop/notebook problems: How to address or fix the most common laptop/netbook problems

15. - Processor problems: How fix common processor (CPU) problems

16. - CD/DVD drive problems: How to fix problems with CD and DVD drives and discs

17. - USB and FireWire problems: - How to fix common USB and FireWire problems

18. - Typical DLL (Dynamic Link Library) device driver problems

Build and Repair Your Own PC

Visit the Build Your Own PC pages of this website for information on how to build a desktop PC and solve self-build problems and visit the other sections, such as the Processors pages - which provides information on the brand-leading Intel Core family of processors - and the Video/Graphics, Sound, Motherboards and Monitors pages for more problem-solving information, all of which can be accessed via the menu items and jump menu on the orange navigation bar, or via the site search engine at the top of each of the main pages. When you know how to build a PC, you'll also know how to go about diagnosing problems and fixing one.

Solving problems with and how to use Windows 7 and Windows Vista

Click here! to go to the page on this site that deals with Windows 7, Microsoft's replacement for Windows Vista.

Click here! to go to the page on this site that deals with Windows Vista, Microsoft's replacement for Windows XP.


For PC security information visit the main Security section of this website, or make use of the site search engine at the top of each of the main pages to search for references to specific information on topics such as how best to keep secure on the web, security software, hardware and software firewalls, identity theft, privacy issues, how to hide form Google, phishing scams, viruses, malware, spyware, how to implement spyware removal and the different types of backups, etc.


While every effort has been taken to ensure the accuracy of the information contained on this website, the author assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

Click to go to the top of the page