Note that this website is being updated and coverted into a WordPress site. If you want to read any of the pages that have been updated so far here they are:
Hard Disk and SSD Drives -
PC Security - http://www.pcbuyerbeware.co.uk/TestSite/pc-security/
Software Information - http://www.pcbuyerbeware.co.uk/TestSite/software-info/
Backup Methods: How to Make Restorable Backups and System Images -
The standard BIOS and UEFI/EFI BIOS -
Microsoft Product Activation -
Windows Device Manager -
PC Warranties - http://www.pcbuyerbeware.co.uk/TestSite/pc-warranties/
PC Buyer Beware! is a comprehensive PC guide covering desktop and laptop/notebook PCs that provides the knowledge required to make sensible buying, building, upgrading, networking, broadband, recovering, repairing and computer-security decisions, helping users to solve hardware and software problems - PC Problems & Solutions - via articles and questions and answers (Q&As) grouped in categories. The quickest way to find the solutions to a particular computer problem is to enter a short and accurate description of it, such as pc freezes or program freezes, both of them very common problems, in the Search pcbuyerbeware.co.uk feature provided at the top of each page. A list of pages containing those or your own keywords will be presented.
You can access the main sections of this website by making use of the navigation bar provided on the left side of each page, or specific information by entering a suitable search query in the site-search box.
All of the major internal PC components, such as hard disk drives, graphics cards, processors, motherboards, etc., and the external peripheral components, such as monitors, networking equipment, mice, keyboard and printers, have their own section devoted to them. There are separate sections devoted to computer security, software and all of the versions of Windows currently in use XP, Vista and Windows 7 and Windows 8.
Visit our Facebook page - http://www.facebook.com/pcbuyerbeware.co.uk - to read informative items going back in time that no longer appear on this page.
Most software designed for Windows requires a version of Microsoft's .NET framework software to run.
.NET Framework - http://en.wikipedia.org/wiki/.NET_Framework
"Programmers produce software by combining their own source code with .NET Framework and other libraries."
Windows 8.1 supports only .NET version 3.5 and higher versions, therefore any software that requires a lower version won't be able to run. The soon-to-be-released Windows 10 (there is no version 9) also won't support versions lower than 3.5. Software that requires a version of the .NET framework usually installs the one that it requires during its installation.
Note that some software, Quicken and QuickBooks, for example won't install unless they recognise the version of Windows being used. Quicken 2000, for example, will only install on a Windows 2000 or Windows XP system. In that case you won't ever be able to get such software to install and run in a later version of Windows (Vista/Windows 7/Windows 8.1).
Windows 8.1 has an application-compatibility tool that could allow installed software to run that doesn't have to recognise the version of Windows. To use the tool, right-click on the application's icon or its executable .exe file, click Properties in the menu that presents itself. Open the Compatibility tab in the window that appears. There is a box beside which "Run this program in compatibility mode for:" appears. The drop-down menu provides versions of Windows that the software can be made compatible with by choosing its option from Windows 7 to XP or even as far back as Windows 95. The "Run this program as an administrator" option should also be enabled. If the software works properly, the problem is solved, but if it requires an earlier version of the .NET framework than the lowest version that Windows 8.1 supports, it won't run.
The Professional and Ultimate versions of Windows 7 provide a Windows XP mode that software designed for Windows XP can be installed in and run as if it were running in XP itself. Unfortunately, Windows 8.1 does not provide a mode that runs earlier versions of Windows. However, it is possible to run a virtual machine in Windows 8.1 within which an earlier version of Windows can be installed and run. Microsoft's free Hyper V virtual-machine technology can be used.
Run virtual machines on Windows 8.1 with Client Hyper-V -
Alternatively, a third party virtual machine, such as VirtualBox can be used, which Oracle provides free of charge.
VirtualBox.org - https://www.virtualbox.org/
Note that OEM versions of Windows cannot be run from within a virtual machine because they can only be installed on a single system. A version with a full retail licence is required, an Upgrade retail version can't be used because its use requires the detection of an earlier qualifying version of Windows.
An OEM version of Windows is installed in a computer by a system builder, which could be a brand-name company or an individual who has purchased an OEM version, usually for a self-built PC. An OEM version can only be installed on the computer it came installed on or was installed on by the system builder. A retail version can be installed on unlimited PCs as long as only one of them is in use at any particular time. The letters OEM appear in the Product Key that is used to activate the copy.
As a last resort, you could just keep a computer with the earlier version of Windows installed on it just to run particular old software that won't run on later versions of Windows. If you want to build such a computer, suitable motherboards, processors and RAM memory, often as bundles with that come with their driver discs are available on eBay inexpensively.
January 20, 2015. - A vulnerability in a WordPress plugin called Slider Revolution or RevSlider that is bundled with many themes has led to 100,000+ websites being compromised. Therefore, if you have one or more WordPress sites make sure that they are updated.
RevShare develops the plugin and has fixed the problem with an update, but the WordPress community is mostly not aware of its existence.
The vulnerability makes the wp-config.php file accessible, which gives access to the compromised site's full database.
A list of themes that have been affected is available at the following site:
Google can detect if a site has the vulnerability and, in order to limit the damage that can be caused, has blocked them by providing visitors with an alert that says that an affected site is infected with malware.
Click the link provided below if you want to use the "Free Website Malware and Security Scanner" provided by the security site, Sucuri.
Version 4.2.0 of the RevSlide plugin is required to be safe. ShowBiz Pro is another affected plugin. It requires version 1.5.3 or later.
It is always advisable to be using the latest version of WordPress itself and update any plugins as soon as possible in order not to fall foul of vulnerabilities that have been identified. There is nothing that can be done about vulnerabilities that have been identified by hackers but which have not been identified by the developers of plugins that are called zero-day exploits, because they cannot be fixed unless the developers are aware of them.
Make sure that your plugins are 100% compatible with the latest version of WordPress before you update them and create a restorable backup of a WordPress site before you update it to the latest version of WordPress in case the update screws up the site.
January 9, 2015. - Self-Monitoring, Analysis and Reporting Technology (SMART) is built into almost all hard drives in use today. It is able to predict if a hard drive or SSD drive is about to fail. If the PC's BIOS monitoring the hard disk or SSD drive is able to read what SMART is reporting, it will produce a warning message during the Power-On-Self-Tests (POST tests) at startup, such as "Hard Disk: SMART Status BAD. Backup and Replace."
That means that the PC's hard drive is close to having an irrecoverable failure and should be backed up and replaced as soon as possible. The warnings produced by SMART, which can also come via free and paid-for software designed to monitor it, should be taken very seriously because hard and SSD drives are very sophisticated devices that can correct errors due to wear effectively. SMART monitors what error-correction is taking place and when it becomes serious produces a warning such as the example provided. When SMART produces a warning, the PC's owner should backup and replace the affected drive as soon as possible.
S.M.A.R.T. - http://en.wikipedia.org/wiki/S.M.A.R.T.
Free or paid-for tool are available to make sure that there is software monitoring the hard disk or SSD drive of a particular desktop or laptop PC that can bring SMART messages to a computer-user's notice.
Comparison of S.M.A.R.T. tools -
For example, here is what a paid-for utility says about itself on its website: "HD Tune Pro is a hard disk / SSD utility with many functions. It can be used to measure the drive's performance, scan for errors, check the health status (S.M.A.R.T.), securely erase all data and much more."
SMART monitors the physical health of hard disk and SSD drives. The built-in tool provided by every version of Windows since Windows XP called chkdsk (Check Disk) runs checks on the logical health of the files on the drive and can mark bad unusable areas of he drive as bad so that Windows does not use them.
To run the basic version of chkdsk, open Windows Explorer (to find an option to do that in Windows 7 right-click on the Start button), right-click the drive you want checked and select the Properties option in the menu that comes up. Opening the Tools tab provides the Error-checking option. Just click on the "Check now" button to run its routine maintenance tests.
There is a much more powerful version called chkdsk.exe that is run from the Command Prompt.
The command-prompt switches (commands) that chkdsk provides vary significantly from one version of Windows to another due to the fact that it is continually being improved, but the chkdsk c: /f switch performs error correction of the C: drive that Windows is installed on by default for all versions of Windows since Windows XP. To run the checks on any other partition or drive just change c: to the drive letter of that drive partition or separate hard drive. Laptop PCs normally only have one hard disk or SSD drive but a desktop PC can have as many installed as there are sockets for them on the PC's motherboard itself or from special adapter cards installed in its card slots.
To find out what all of the switches that chkdsk provides your copy of Windows, for example, in Windows 7, enter cmd in the Start => Search box, right-click the cmd.exe link that is provided by that search and click "Run as administrator". Type chkdsk /? at the prompt and press Enter. You'll see a complete list of all of available chkdsk switches, such as chkdsk /f that fixes errors and chkdsk /r that checks for errors and locates bad sectors of the drive or partition and recovers readable information.
In Windows 8.1, just typing Command Prompt while on the Start or Desktop screen brings up the Search box with that search already entered in it.
1. DirectX Diagnostic Tool the free tool that is part of DirectX, which is itself installed with Windows, being used as a software driver for PC games, multimedia applications, playing video, etc.
It is part of Windows and is updated by Windows Update along with security updates and hotfixes, but here is the information provided by Microsoft on how to download and install it:
How to download and install DirectX http://support.microsoft.com/kb/179113
DXDiag reports any problems it detects. If "Check for WHQL digital signatures" is enabled on the first tab called System, the tool verifies that all of the device drivers being used by Windows have passed testing by the Windows Hardware Quality Labs (WHQL). Some untested third-party drivers might be in use and causing one or more problems, so this is a valuable test to perform.
In Windows XP, DXDiag provides video and sound tests, but the tests have been removed in the versions used in Vista, Win7 and Win8. To access it in XP enter dxdiag in the Start => Run box. Use the Search box in Vista and Windows 7. In Windows 8.1, press the Windows key (the one with a flag on it) plus the R key to bring up the Run box and enter that command.
2. The very useful HWMonitor PRO, PerfMonitor and CPU-Z monitoring tools are available from http://www.cpuid.com/.
GPU-Z Graphics card information http://www.techpowerup.com/gpuz/
3. Whats My PC Doing Informs you of what the hard disk drive and processor are doing
4. Speedfan If you need a tool that can change your computers fan speeds, read the temperatures of your motherboard and your hard disk, read voltages and fan speeds and check the status of your hard disk using S.M.A.R.T. or SCSI attributes, then you came to the right place.
5. - The Windows Diagnostics Tool performs tests on the RAM memory of the computer it is used on. Faulty memory causes all kinds of peculiar problems that are difficult to diagnose, such as files that become corrupted.
Windows Memory Diagnostics Tool (Windows 7) -
Start Memory Diagnostic Tool in Windows 8 -
Windows XP, Vista, Windows 7 & 8.0/8.1 Administrative Tools
All of the versions of Windows from Windows XP to Windows 7 and 8.0/8.1 come with several very useful Administrative Tools that can be accessed under their section in Windows by that name.
December 19, 2014. - Tor Browser is free software - donations are welcome to help with development - that protects users from network surveillance, traffic analysis and from having your location revealed by routing the user's usage of the web around a distributed network of relays that are run by volunteers living around the world. In this way, any monitoring of your web connection is prevented from discovering which websites are being visited and prevented from finding out what your location is. Due to the process involved that is time-consuming, the Tor Browser is slower than the major browsers - Internet Explorer, Firefox, Chrome, Opera, etc.
Alternatively, you can make use of a Virtual Private Network (VPN), which can be free or paid-for. Here are two well-reviewed VPNs of both types:
HideMyAss.com VPN - https://www.hidemyass.com/ ($4.99 a month for 12 months)
Hotspotshield - free VPN with ads - http://www.hotspotshield.com/free-proxy
December 13, 2014. - Windows PCs started using the UEFI BIOS, which is the replacement for the decades-old standard BIOS, with the release of Windows Vista in 2005, so most desktop and laptop PCs bought new since then use a UEFI BIOS.
The standard BIOS, stored in a flash-RAM chip, boots before Windows to run the Power On Self Test (POST) that checks that the hardware components are functioning and configures those components for Windows so that it can load their software device drivers. The standard BIOS of a PC can provide many configuration settings, depending on how many the desktop or laptop PC manufacturer is prepared to allow. The manufacturers of laptop and desktop PCs used for office work usually prefer to have the BIOS or UEFI as limited (or difficult to access, as in the case of the UEFI BIOS) as possible in order to prevent users from getting into the kind of trouble that requires costly customer support. However, PCs or motherboards or laptops bought by power users usually have a BIOS or UEFI that provides the customisation settings that such users are likely to want or need, such as those that allow the processor and RAM memory to be run at higher frequencies than their stock frequencies (to be overclocked), either by enabling settings manually or enabling automatic settings.
The early versions of the UEFI BIOS used in PCs running Windows Vista were more or less the same as the standard BIOS but with mouse operation instead of keyboard-only operation of a standard BIOS. All devices require a device driver to operate, so the keyboard and mouse drivers have to be loaded by the BIOS/UEFI itself in order to be used. The flash-RAM chips of the standard BIOS were of small capacity due to the cost of flash-RAM, so only keyboard navigation was used.
Windows 7 PCs came with a more developed UEFI BIOS that allowed access to the settings while running Windows.
Windows 8.0/8.1 makes as much use of its UEFI as the manufacture is prepared to provide, such as providing startup protection from rootkit infections. Rootkit infections operate under Windows, so require special software to detect and remove them that can be updated like anti-malware scanners.
Unfortunately, UEFI protection is intrinsically bound to the installation of Windows 8.0/8.1, thereby making it problematic to boot the system with another operating system's boot disc (for example, Ubuntu Linux can be run from its boot disc or be installed on the system) or to run system-boot recovery/repair discs created by third-party developers. The UEFI protection itself prevents that from happening unless special measures are adopted.
The following link goes to an excellent article that explains and illustrates how to overcome those UEFI boot problems.
How to solve UEFI boot and startup problems -
December 6, 2014. - If, say, while staying at a hotel, you are provided with a password to access the Internet over its wireless network and the staff tell you can use both a wireless and a wired connection that are both secure, any laptop or tablet that you use to make use of the wireless connection will tell you if the connection is secured or not. That is, if the connection is encrypted with WEP (cracked), WPA (cracked) or WPA2 (not cracked, so this is the one you should be using).
A wired connection which does not broadcast a signal is secure if there is no virus on the computer monitoring the connection, but for a wireless connection, you have to check that it is encrypted. To check the security in Windows 7 follow the following clickpath: Start => Control Panel => Network and Sharing Center => Manage wireless networks => The SSID of wireless network being used => Security: WPA2-Personal or WPA2-secured (this is the level of encryption being used for the connection).
Wi-Fi Protected Access -
If there is none of the above-mentioned wireless security, use the wired connection because even though only the hotel's guests have been given the encryption login key, they could all access your computer if, say, file-sharing is enabled in Windows.
Note that WPA2 encryption ends at the router in the room. After what your computer sends on the web gets past the router on to the hotel's network, it is no longer encrypted and can therefore be read.
When using any public or semi-public network there are numerous security weaknesses that can be exploited by people with the know-how. Therefore, it's essential to use your own security methods.
The first measure to take is to make Windows assign the type of network location being used Home, Work, or Public. To do that in Windows 7, follow this click path: Start => Control Panel => Network and Sharing Center. The one you must select is Public, which adjusts your Windows computer's firewall rules and the Windows file-and-printer-sharing settings. The computer and its contents are also prevented from being visible to other computers on the hotel's shared wireless network.
Choosing a network location -
The next step to take is to use https instead of http (see the link above, which uses http) in the URL addresses of the websites you visit. The s added to http makes the site use a Hypertext Transfer Protocol Secure connection that makes use of bidirectional encryption between the web browser being used and the website being visiting. Most banking sites and sites that require the user to enter login information use https by default.
HTTP Secure - http://en.wikipedia.org/wiki/HTTP_Secure
For example, click http://www.paypal.com/ and watch it change to https://www.paypal.com/ in your browser's address bar. The https provides 2048-bit end-to-end encrypted connections. Also note the green closed-padlock icon in the address bar, which indicates that it's a site that is using https encryption.
HTTPS Everywhere from https://www.eff.org/HTTPS-EVERYWHERE "is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure".
Using a virtual private network (VPN) connection is the best way to maintain security on a public wireless network. A VPN adds an additional layer of encryption between the connecting computer and the VPN provider's server, which connects to the servers of the websites you access. Combined with HTTPS, a VPN provides a very secure wireless connection if the computer itself is free from viruses and has file and printer sharing disabled. A VPN doesn't take more than a few minutes to set up; thereafter connections only take seconds. VPN services are either free and supported by ads or paid-for costing a few US dollars.
Virtual private network -
If a wired Ethernet connection is available it's best to use it instead of a wireless connection because doing so creates a direct connection from the user's computer to the network, which is secure if your computer doesn't have any virus infections and has file and printer sharing disabled. There is plenty of information on how to disable it for all versions of Windows on the web, such as on microsoft.com. Shops don't usually provide Ethernet connections but many hotels do, so it's always a good idea to pack an Ethernet cable in your luggage when travelling.
The hardware and software problems dealt with on this website are in the order of their popularity. When applicable, the order will change to match the popularity recorded by this website's web logs in the previous month.
Click a relevant link below to visit the information it describes
Visit the Build Your Own PC pages of this website for information on how to build a desktop PC and solve self-build problems and visit the other sections, such as the Processors pages - which provides information on the brand-leading Intel Core family of processors - and the Video/Graphics, Sound, Motherboards and Monitors pages for more problem-solving information, all of which can be accessed via the menu items and jump menu on the orange navigation bar, or via the site search engine at the top of each of the main pages. When you know how to build a PC, you'll also know how to go about diagnosing problems and fixing one.
Click here! to go to the page on this site that deals with Windows 7, Microsoft's replacement for Windows Vista.
Click here! to go to the page on this site that deals with Windows Vista, Microsoft's replacement for Windows XP.
For PC security information visit the main Security section of this website, or make use of the site search engine at the top of each of the main pages to search for references to specific information on topics such as how best to keep secure on the web, security software, hardware and software firewalls, identity theft, privacy issues, how to hide form Google, phishing scams, viruses, malware, spyware, how to implement spyware removal and the different types of backups, etc.
While every effort has been taken to ensure the accuracy of the information contained on this website, the author assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.