Custom Search
Click to find updates on our Facebook page

PC Information and Repair Guide: How Best to Fix PC/Computer Problems, Buy, Upgrade, Build, Recover, Restore, Repair and Protect Desktop and Laptop PCs


PC Buyer Beware! is a comprehensive PC guide covering desktop and laptop/notebook PCs that provides the knowledge required to make sensible buying, building, upgrading, networking, broadband, recovering, repairing and computer-security decisions, helping users to solve hardware and software problems - PC Problems & Solutions - via articles and questions and answers (Q&As) grouped in categories. The quickest way to find the solutions to a particular computer problem is to enter a short and accurate description of it, such as pc freezes or program freezes, both of them very common problems, in the Search pcbuyerbeware.co.uk feature provided at the top of each page. A list of pages containing those or your own keywords will be presented.

You can access the main sections of this website by making use of the navigation bar provided on the left side of each page, or specific information by entering a suitable search query in the site-search box.

All of the major internal PC components, such as hard disk drives, graphics cards, processors, motherboards, etc., and the external peripheral components, such as monitors, networking equipment, mice, keyboard and printers, have their own section devoted to them. There are separate sections devoted to computer security, software and all of the versions of Windows currently in use XP, Vista and Windows 7 and Windows 8.


LATEST COMPUTER-RELATED TIPS, SOLVED PROBLEMS & NEWS STORIES

PC Buyer Beware! Facebook page

Visit our Facebook page - http://www.facebook.com/pcbuyerbeware.co.uk - to read informative items going back in time that no longer appear on this page.


I have nothing to hide but I resent having Google in my face and on my tail on the web continuously

April 16, 2014. - Someone gave me a Tesco Hudl 7-inch tablet that is run by Google's Android 4.2.2 (Jelly Bean) operating system. I wouldn't have bought a tablet myself because of their limitations. I don't see the point of having one if you have a Windows laptop, unless it provides GPS.

As soon as the tablet was switched on and had located and logged on to my wireless network, I was asked if I wanted geolocation to remain enabled. This means that when the tablet is active - the machine is switched on - it gives away wherever you are, which is required to use the GPS feature that makes it possible to use the tablet as a sat nav, but otherwise it gives Google your location so that locally-based customised ads from Google can be appear on websites that you visit when you are on the web.

Looking through the apps, most of them are Google-related - Chrome web browser, Gmail, YouTube, Search, Maps, G+, Hangouts, Play Store, Drive, etc. All of which send my personal information to Google to be used in the creation of my personal profile so that Google can target ads that I am most likely to be interested in at me. I resent this. I have a tablet that I would like to use from time to time without being under scrutiny and tracked by Google. An Android-based tablet can't be used properly unless the user uses a Google account or signs up for a new one.

Damn it! I want to be able to choose what I use. I don't want to play into the hands of Google. That is why I am encouraged by Microsoft's plan to get Windows 8.1 installed on devices with as little as 16GB of storage. Let's hope that Microsoft gives it away and makes it possible to install it on Android tablets from, say, a USB flash drive - or another computer.

Here is an article that provides more information on Microsoft's plan to get Windows on to tablets:

http://www.computerworld.com/s/article/9247647/...

Heartbleed flaw in the OpenSSL software used by most websites to keep data secure allows the theft of banking and ecommerce website passwords and credit card numbers

April 10, 2014. A critical flaw called Heartbleed has been discovered by Google in the OpenSSL software that is used by most of the major websites to keep login information secure, allowing user names, passwords and credit-card numbers to be obtained by cyber criminals.

Web users are advised to change all of the passwords they use to access banking and ecommerce websites. I have just changed my PayPal password, because only an email address and a password are required to gain access to a PayPal account. Most banking sites require the user to enter a machine-generated number that changes for each access, so are not vulnerable unless the cyber criminals use many hundreds or thousands of computers under their control at different IP addresses on the web to attempt to keep guessing a number that works - not impossible but highly unlikely to succeed.

The vulnerability in the encryption software that hides login information could have been used by cyber criminals for around two years to gain passwords, etc., and this will remain the case until all websites have updated their software to which a fix for the problem has been applied.

Something called the LastPass Heartbleed Checker allows users to check if a website they use is vulnerable. It is provided in the following article that also provides more detailed information.

http://www.dailymail.co.uk/sciencetech/article-2601096/...

Microsoft's free Office Online launched

April 7, 2014. - The components of Microsoft's Office suite - Word, Excel, Outlook, PowerPoint and OneNote - are now available free for use from this website:

https://www.office.com/start/default.aspx

These apps have been available for some time free of charge via OneDrive, Microsoft's cloud-storage business, which used to be called SkyDrive until British Sky Broadcasting successfully objected to use the of the word sky in the name. However, Microsoft has decided that making them available from a website makes them easier to use and compete better with the free Google Docs.

OneDrive is provided with 7GB of free storage space via any Microsoft account, such as hotmail, outlook.com, xbox.com, etc. Additional space has to be paid for but it isn't expensive - only $25 a year for 50GB up to 200GB.

The valuable usefulness of using OneDrive is that it works seamlessly with the free Office Online apps and with the latest versions of Windows that run on desktop and laptop PCs, tablets and smartphones that use Windows Phone, such as Nokia's latest Lumia phones. This is superior integration when compared to what is provided by the free Google Docs.

Free Windows 8.1 update to provide desktop boot and Windows phone and tablet versions to be free to manufactuers of mobile devices under nine inches

 

April 4, 2014. - On Tuesday, April 8, Microsoft will be releasing a free update to Windows 8.1 that allows users to boot into the classic Desktop instead of the tiled 'Metro' Start screen.

The latest Windows phone and tablet operating systems account for only 3% of the smartphone and 2% of the tablet market worldwide, so Microsoft has decided to make them available free of charge to the manufacturers of low-cost mobile devices that are under nine inches in size, which would reduce their cost and make them a bit cheaper.

Microsoft's new CEO, Satya Nadella, had this to say: "Our vision, simply put, is to thrive in this world of mobile first, cloud first."

Microsoft has also announced that it has developed a voice-activation system for mobile devices called Cortana, intended to rival Apple's Siri and Google's Voice Search App. Cortana can search the web from voice commands, make calls and several other actions.

Moreover, new mobile devices that run the free mobile versions of Windows are to be offered a year's free subscription to Microsoft's Office 365 online service that provides Office applications.

Cortana - http://en.wikipedia.org/wiki/Microsoft_Cortana

Microsoft Office is now available for iPad

March 28, 2014. - Microsoft's Word, Excel and PowerPoint applications now have versions for Apple's iPad, first released in 2010, sparking an explosion of tablet PCs from all of the major computer manufacturers, some of which took off exceedingly well and some of which did not.

The Office suite containing those three applications is now available from the Apple App Store, purchased via a subscription to Office 365, which is paid for by an annual charge. This initiative is expected to add $1.2 billion to Microsoft's annual income.

Office for the iPhone is already available, but didn't sell well, probably because the features of a full-blown office suite don't lend themselves very well to functioning on a smartphone.

Microsoft is also making the apps for Office on the iPad available free of charge but with reduced capabilities. The unrestricted apps have to be bought.

Touchscreen editions of Office for Windows 8 and 8.1 and other operating systems are to be made available later this year.

The struggle to increase the use of Windows 8 on mobile devices continues. Microsoft made a major blunder by not getting into that market before or at the same time as did Apple with iOS and Google with its Android mobile operating system.

Disappear from the web and/or browse it anonymously

March 19, 2014. - The website http://www.whoishostingthis.com has compiled a nine-step list that explains how a person can disappear from the web and/or browse it anonymously. Here it is:

1. - Close Facebook, Twitter, Google + and LinkedIn accounts - or any others of the same kind.

2. - Conduct a search of the web for your name and remove everything that you find that you don't want to remain.

3. - Put false information into accounts that can't be closed.

4. - Unsubscribe from mailing lists that are of no use to you.

5. - Delete the history that the search engines keep about your web-browsing activity. Each search engine will have its own way of doing so.

6. - If necessary, contact websites to get them to remove information about you.

7. Clearing houses are companies that collect personal information and sell it to advertisers. Search for them and ask them to remove your personal information. This is the most difficult of the listed tasks to achieve, but it is possible.

8. - Get yourself removed from telephone and other directories. You can elect to have the information about you kept on the electoral roll in the UK kept private. If this is not done, anyone can access that information, which includes online telephone directories.

9. - Delete email accounts set up with companies that make use of your private information. For example, Googlemail allows Google to scan emails for keywords that are used to deliver customised ads on gmail itself and across your path as you surf the web. It's anyone's guess what else is being done with the information provided about you on one of these email accounts. It's far better to make use of the free email accounts that Internet Service Providers provide. You can also buy a cheap .co.uk, .com, etc., domain name that can be hosted for around L20 per year that provides plenty of email addresses.

There are websites such as DeleteMe and JustDelete.me that can help you delete information about yourself. Other websites, such as MyLife, show what information there is about you on the web.

After you have removed as much information as you can, use an anonymous search engine, such as duckduckgo.com. Using anything by Google guarantees that any private information about you gathered from computers or smartphones gets added to your personal profile.

Note well that if your friends, associates, family, workplace, etc., have put information about you on the web, getting it removed will be very difficult, so it's advisable to keep as much of your personal information private in the first place. Once it's in the social media sites, it will be very difficult to remove all of it. It's therefore best to use as much false information as possible in the first place.

The Blue Coat Systems 2014 Mobile Malware Report

March 14, 2015. - Blue Coat Systems is a leading online security company that has produced its annual report called the Blue Coat Systems 2014 Mobile Malware Report. It says that mobile malvertising has now overtaken pornography sites as the leading deliverer of malware to mobile devices - smartphones and tablets.

Malvertising is online advertising that delivers malware - malicious or phishing software - to the device it is being viewed on when malicious ads are clicked on by the user.

The company points out that Apple keeps its operating system for iPhones (iOS) under tight control. Its apps are very well vetted and downloaded in a specially protected environment, keeping malware intrusions out.

Google's Android operating system, now used by the majority of smartphones, is much more vulnerable. Blue Coat System's latest report says: "Increasingly, mobile users are being subjected to more ads even more so than PC users as sites everywhere continue to refine their mobile advertising strategies. This is a particularly worrying trend, as it coincides with a significant increase in malvertising."

According to its report, in February 2014, web ads became the single biggest security threat to mobile web users. A user is currently being directed to mobile malware 1 out of 5 times when clicking on web ads - three times the figure from November 2012.

The best protection, the company's report says, is to avoid clicking ads on your mobile device or, better still, block all web ads with free reputable software, such as AdBlock Plus for Android. You obviously have to make sure that it is a reputable app. AdBlock is. Just make sure that you are downloading the real software, not malware from a fake site. In any case, always scan downloads with an updated malware scanner - even if from a reputable site because that site itself could have been compromised by hackers.

For unknown apps, the best policy is never download or purchase an app other than from the legitimate sources, such as Apple's App Store, Google Play or Amazon.

Android smartphones feature premium Short Message Service (SMS) apps, which are more prone to being malware that can do things such as charge a user's mobile-phone account with a per-use or per-month charge or send cyber criminals money meant to be donated to charities by the sender.

2014 Mobile Malware Report: Malvertising Overtakes Porn as Leading Threat Vector -

http://bluecoat.com/security-blog/2014-03-07/...

AdBlock Plus for Android - https://adblockplus.org/en/android-install

Users of Windows XP are advised not to use Internet Explorer 8.0 after Microsoft ends support for XP on April 8

March 11, 2014. - Microsoft is ending its extended security support for Windows XP, first released in 2001, on April 8, 2014. After that date, XP will no longer be updated with security patches, allowing cyber criminals to exploit newly-discovered vulnerabilities. Currently about a third of all computers are using XP. How that changes after the April 8 deadline remains to be seen.

US-CERT, a department of the US Department of Homeland Security (DHS), has issued the advice that if users want to continue using XP, they should use a modern, up-to-date web browser, such as Firefox, Opera and Safari instead of Internet Explorer 8.0 (IE8), which is an old browser and the highest version that supports XP. Internet Explorer 11.00 is the latest version being used on Windows 7 and 8.1, but it can't be used on XP.

The other major web browsers all currently support XP and will inform users of XP if support is to end.

I have a laptop that uses XP Professional that I intend to keep using. I have the Firefox and Apple's Safari web browsers installed on it, protected by the Windows Firewall, a router's hardware firewall, which every modern router provides, and AVG Antivirus Free Edition 2014 that protects against all malware and protects email if you use an email program such as Outlook Express or Thunderbird. I use the CCleaner cleaning tool and elect not to use its intelligent cookie management setting that it asks me if I want to make use of during the installation of each update. This feature has obviously been added for the benefit of Google, which wants to keep its cookies in place, so I don't allow it to be used. I also use the free Trusteer Rapport to protect sites that I log into.

I personally won't use Google's Chrome web browser because Google mines it for your personal information that it uses to create a personal profile of you that is used to serve you with customised ads as you use the web or Google's services or products.

If you use the free Trusteer Rapport software that protects sites, such as banking sites, from being monitored by malware, etc., it disables Internet Explorer 8.0, making it unusable in Windows XP.

Trusteer - http://www.trusteer.com/

Computer diagnostics: Solutions to desktop and laptop PC hardware and software problems

The hardware and software problems dealt with on this website are in the order of their popularity. When applicable, the order will change to match the popularity recorded by this website's web logs in the previous month.

Click a relevant link below to visit the information it describes

1. - Motherboard and power supply problems: How to fix common problems with faulty motherboards (mainboards) and power supplies (PSUs)

2. - Software problems: How to fix problems with Windows, programs, and utilities

3. - Hard disk drive problems: How to fix computer hard disk drive (HDD) problems

4. - RAM memory problems: How to fix problems with the Random Access Memory

5. - Video/graphics card problems: How fix common computer video and graphics problems

6. - Network problems: How to fix common wired and wireless networking and internet problems

7. - Windows 8 problems: How to diagnose and fix problems with Windows 8

8. - Windows 7 problems: How to diagnose and fix problems with Windows 7

9. - Recover, restore and repair Windows 7 (Win7) when a computer crashes or fails to boot

10. - Windows Vista problems: How to fix common problems with Windows Vista

11. - Recovering and repairing Windows Vista when a computer crashes or fails to boot

12. - Windows XP: How to troubleshoot and fix shutdown, restart (reboot), and startup problems

13. - Recovering and repairing Windows XP when a computer crashes or fails to boot

14. - Laptop/notebook problems: How to address or fix the most common laptop/netbook problems

15. - Processor problems: How fix common processor (CPU) problems

16. - CD/DVD drive problems: How to fix problems with CD and DVD drives and discs

17. - USB and FireWire problems: - How to fix common USB and FireWire problems

18. - Typical DLL (Dynamic Link Library) device driver problems

Build and Repair Your Own PC

Visit the Build Your Own PC pages of this website for information on how to build a desktop PC and solve self-build problems and visit the other sections, such as the Processors pages - which provides information on the brand-leading Intel Core family of processors - and the Video/Graphics, Sound, Motherboards and Monitors pages for more problem-solving information, all of which can be accessed via the menu items and jump menu on the orange navigation bar, or via the site search engine at the top of each of the main pages. When you know how to build a PC, you'll also know how to go about diagnosing problems and fixing one.

Solving problems with and how to use Windows 7 and Windows Vista

Click here! to go to the page on this site that deals with Windows 7, Microsoft's replacement for Windows Vista.

Click here! to go to the page on this site that deals with Windows Vista, Microsoft's replacement for Windows XP.


COMPUTER SECURITY

For PC security information visit the main Security section of this website, or make use of the site search engine at the top of each of the main pages to search for references to specific information on topics such as how best to keep secure on the web, security software, hardware and software firewalls, identity theft, privacy issues, how to hide form Google, phishing scams, viruses, malware, spyware, how to implement spyware removal and the different types of backups, etc.


DISCLAIMER

While every effort has been taken to ensure the accuracy of the information contained on this website, the author assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

Click to go to the top of the page