Wednesday, October 10, 2007

Latest spyware threats XP antivirus

Here is a list of the latest spyware threat.
XP ANTIVIRUS-ROGUE SPYWARE ACTING AS A ANTI SPYWARE AGENT WHEN INDEED this prgram is spyware.

Messenger Blocker
Messenger Blocker is another example of rogue security software violating multiple criteria on the CA AntiSpyware Scorecard. First, it gives inflated, erroneous results to scare the user into buying a worthless product, not help the user. Second, it disables TaskManager so the user cannot stop it from running. Far from security software.

webspyshield
The product claims to be a security product. Installs itself without notice to user. Installs a toolbar without user consent. Also scan result gives large number of false positives even when installed on uninfected machine, which may scare and induce a user to buy the product.

Use the free tools on this site for spyware removal..

Tuesday, October 9, 2007

Your total arsenal in the war against spyware

Okay we have talked about spyware removers,hijakthis logs and other trusted spyware removal tools.But one important element of the war against spyware is a good firewall.If you are surfing the internet right now and you are not using a firewall-I can promise you have spyware malware or spyware trojans lurking on your computer.A good firewall protect your by locking out the unwanted spyware rogue programs out of your system.Just think of the doors and windows in your house.You keep those doors and windows locked most of the time for safety.Your computer has 100's of doors and windows
that a hacker can use to gain access if you dont keep them locked.They scan your computer to find out what doors and windows are open.These doors and windows are called ports.Each port has a uniqe number example TCP port 80 or UDP port 110.Some doors and windows are used so that we may surf the internet,send email,use ftp etc.Other doors and windows are used by hackers to gain access to your system.We will post a list of known ports-or doors used by the hackers later,but for know make sure you have a good firewall running on your system-the most important tool in the war against spyware.

Here is the Firewall we recommend.
ofcourse its free.


peer gurdian firewall

http://phoenixlabs.org/pg2/

Monday, October 8, 2007

Tool for scanning your computer for spyware

HijackThis scans areas of your registry and hard drive and returns a log of items which it detects. As this tool is recommended for advanced users only, we recommend you run a scan and then post your log file on a support forum, where someone will be able to suggest which entries to remove.

Here is a link for a great support forum to post your hijack this log..
SPYBOT forum SD




http://forums.spybot.info/index.php

Spybot SD latest spyware threats found

MailSkinner.rtk
A new false positive spyware discovered by Spybot SD.
Here is the link to download Spybot SD-One of the best anti spyware removers on the internet..

Here is the link.
SPYBOT SD

Thursday, October 4, 2007

The best safe free spyware malware trojan virus removers on the internet

Spyware removers best of the best on the net.
Lets start out talking about my favorite free spyware remover of all time
SPYBOT SD.This one of the best alltime spyware removers known to man,and incredibly its free.
Here is the link.
SPYBOT SD

Enjoy..
Send me a beer later!!
Tuffy
intergrated@cox.net

Tuesday, October 2, 2007

Removal tool for the Netsky W32/Netsky-B, W32/Netsky-C, W32/Netsky-E, W32/Netsky-F, W32/Netsky-G, W32/Netsky-H, W32

Here is a awesome link to instructions on the nasty Netsky trojans and viruses..

Netsky removal tools for all netsky variants

Understanding the W32 Netsky Q Worm

This section helps you to understand how it behaves


W32/Netsky-Q is a mass-mailing worm which spreads by emailing itself to
addresses harvested from files on local drives.

W32/Netsky-Q harvests email addresses from files with the following extensions:

EML, TXT, PHP, ASP, WAB, DOC, SHT, OFT, MSG, VBS,
RTF, UIN, SHTM, CGI, DHTM, ADB, TBB, DBX, PL, HTM,
HTML, JSP, WSH, XML, CFG, MBX, MDX, MHT, NMF, NCH,
ODS, STM, XLS, PPT

W32/Netsky-Q will not harvest addresses containing the following strings:

@microsof
@antivi
@symantex
@spam
@avp
@f-secur
@bitdefender
@norman
@mcaffee
@kaspersky
@f-pro
@norton
@fbi
abuse@
@messagel
@skynet
@pandasof
@freeav
@sophos
ntivir
@viruslis
noreply@
spam@
reports@

W32/Netsky-Q will attempt to mass-mail itself to the harvested addresses on
31st March, 5th April, 12th April, 19th April and 26th April 2004. The worm
tries to send itself in two seperate emails to each of the addresses, one in
plain text and the other in MIME. The subject lines, message texts and
attachment filenames are randomly chosen from the following possibilities:

Subject lines, followed by the harvested name in parantheses:

Delivery Error
Delivery Failure
Delivery
Mail Delivery failure
Mail Delivery System
Mail System
Delivery
Delivery Message
Error
Status
Failure
Failed
Unknown Exception
Delivery Failed
Deliver Mail
Server Error
Delivery Bot

Message text part 1, followed by "------------- failed message ----------"
(this section can be repeated multiple times):

Mail Delivery - This mail couldn't be displayed
Mail Delivery Failure - This mail couldn't be represented
Mail Delivery Error - This mail contains unicode characters
Mail Transaction Failed - This mail couldn't be converted
Mail Delivery System - This mail contains binary characters
Mail Delivery Failure - This mail couldn't be shown
Delivery Failure - Invalid mail specification
Delivery Agent - Translation failed

Message text part 2:

The message has been sent as a binary attachment
Partial message is available and has been sent as a binary attachment
Received message has been attached
Message has been sent as a binary attachment
Translated message has been attached
Received message has been sent as an encoded attachment
Modified message has been sent as a binary attachment
Note: Received message has been sent as a binary file

Attached filename, followed by a random number and either .PIF or .ZIP
(W32/Netsky-Q can send itself zipped or unzipped):

message
msg
mail
data

If sent as a zipped file, the worm will have one of the following filenames
inside the zip, followed by a large number of spaces and then a .SCR extension:

message.eml
msg.eml
mail.eml
data.eml

In the MIME email W32/Netsky-Q can attempt to use an IFRAME exploit in order to
execute the attachment even if the receiver chooses not to execute it.

W32/Netsky-Q drops itself to the following files in the Windows folder with
in a Base64 encoded form, ready to mass-mail itself:

base64.tmp
zippedbase64.tmp
zipo0.txt
zipo1.txt
zipo2.txt
zipo3.txt

W32/Netsky-Q will attempt to launch a Denial Of Service attack on the following
websites between the 8th and 11th April 2004:

www.cracks.st
www.cracks.am
www.emule-project.net
www.kazaa.com
www.edonkey2000.com

All day on the 30th March 2004 W32/Netsky-Q will cause infected machines to
emit intermit beeps of random pitch and duration.

W32/Netsky-Q contains the following encrypted message:

"We are the only SkyNet, we don't have any criminal inspirations. Due to many
reports, we do not have any backdoors included for spam relaying. and we aren't
children. Due to this, many reports are wrong. We don't use any virus creation
toolkits, only the higher language Microsoft Visual C++ 6.0. We want to prevent
hacking, sharing with illegal stuff and similar illegal content. Hey, big firms
only want to make a lot of money. That is what we don't prefer. We want to
solve and avoid it. Note: Users do not need a new av-upgrade, they need a
better education! We will envelope... - Best regeards, the SkyNet Antivirus
Team, Russia 05:11 P.M"

Recovery
Summary Description Recovery Advanced
This section tells you how to remove the threat.
Please read the instructions for removing W32/Netsky-Q.

Advanced
Summary Description Recovery Advanced
This section is for technical experts who want to know more.
W32/Netsky-Q is a mass-mailing worm which spreads by emailing itself to
addresses harvested from files on local drives.

The worm copies itself to the Windows folder as SysMonXP.exe, as well as
dropping a DLL file to the Windows folder as firewalllogger.txt. The worm then
sets the following registry entry so as to run itself on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SysMonXP

The worm tries to delete the following registry entries:

HKR\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32
HKR\Software\Microsoft\Windows\CurrentVersion\Explorer\PINF
HKR\System\CurrentControlSet\Services\WksPatch4

The worm also attempts to delete a number of other registry entries but due to
a bug in the code it will never succeed. Some of the deleted registry entries
relate to the W32/Bagle family of worms.

If run from a file other than SysMonXP in the Windows folder the worm will
attempt open the file TEMP.EML in notepad in addition to its normal execution.

W32/Netsky-Q harvests email addresses from files with the following extensions:

EML, TXT, PHP, ASP, WAB, DOC, SHT, OFT, MSG, VBS,
RTF, UIN, SHTM, CGI, DHTM, ADB, TBB, DBX, PL, HTM,
HTML, JSP, WSH, XML, CFG, MBX, MDX, MHT, NMF, NCH,
ODS, STM, XLS, PPT

W32/Netsky-Q will not harvest addresses containing the following strings:

@microsof
@antivi
@symantex
@spam
@avp
@f-secur
@bitdefender
@norman
@mcaffee
@kaspersky
@f-pro
@norton
@fbi
abuse@
@messagel
@skynet
@pandasof
@freeav
@sophos
ntivir
@viruslis
noreply@
spam@
reports@

W32/Netsky-Q will attempt to mass-mail itself to the harvested addresses on
31st March, 5th April, 12th April, 19th April and 26th April 2004. The worm
tries to send itself in two seperate emails to each of the addresses, one in
plain text and the other in MIME. The subject lines, message texts and
attachment filenames are randomly chosen from the following possibilities:

Subject lines, followed by the harvested name in parantheses:

Delivery Error
Delivery Failure
Delivery
Mail Delivery failure
Mail Delivery System
Mail System
Delivery
Delivery Message
Error
Status
Failure
Failed
Unknown Exception
Delivery Failed
Deliver Mail
Server Error
Delivery Bot

Message text part 1, followed by "------------- failed message ----------"
(this section can be repeated multiple times):

Mail Delivery - This mail couldn't be displayed
Mail Delivery Failure - This mail couldn't be represented
Mail Delivery Error - This mail contains unicode characters
Mail Transaction Failed - This mail couldn't be converted
Mail Delivery System - This mail contains binary characters
Mail Delivery Failure - This mail couldn't be shown
Delivery Failure - Invalid mail specification
Delivery Agent - Translation failed

Message text part 2:

The message has been sent as a binary attachment
Partial message is available and has been sent as a binary attachment
Received message has been attached
Message has been sent as a binary attachment
Translated message has been attached
Received message has been sent as an encoded attachment
Modified message has been sent as a binary attachment
Note: Received message has been sent as a binary file

Attached filename, followed by a random number and either .PIF or .ZIP
(W32/Netsky-Q can send itself zipped or unzipped):

message
msg
mail
data

If sent as a zipped file, the worm will have one of the following filenames
inside the zip, followed by a large number of spaces and then a .SCR extension:

message.eml
msg.eml
mail.eml
data.eml

In the MIME email W32/Netsky-Q can attempt to use an IFRAME exploit in order to
execute the attachment even if the receiver chooses not to execute it.

W32/Netsky-Q drops itself to the following files in the Windows folder with
in a Base64 encoded form, ready to mass-mail itself:

base64.tmp
zippedbase64.tmp
zipo0.txt
zipo1.txt
zipo2.txt
zipo3.txt

W32/Netsky-Q will attempt to launch a Denial Of Service attack on the following
websites between the 8th and 11th April 2004:

www.cracks.st
www.cracks.am
www.emule-project.net
www.kazaa.com
www.edonkey2000.com

All day on the 30th March 2004 W32/Netsky-Q will cause infected machines to
emit intermit beeps of random pitch and duration.

W32/Netsky-Q contains the following encrypted message:

"We are the only SkyNet, we don't have any criminal inspirations. Due to many
reports, we do not have any backdoors included for spam relaying. and we aren't
children. Due to this, many reports are wrong. We don't use any virus creation
toolkits, only the higher language Microsoft Visual C++ 6.0. We want to prevent
hacking, sharing with illegal stuff and similar illegal content. Hey, big firms
only want to make a lot of money. That is what we don't prefer. We want to
solve and avoid it. Note: Users do not need a new av-upgrade, they need a
better education! We will envelope... - Best regeards, the SkyNet Antivirus
Team, Russia 05:11 P.M"



Link to F-SECURE NETSKY REMOVAL

Sunday, September 30, 2007

Free Spyware Malware Trojan Virus Removal Tool Spybot Sd

Here is the link to a awesome SPYWARE TROJAN REMOVAL PRODUCT.This product is free.We have been using it for 4 years now-highly recommended.

Here is the link..
Copy and past to your web browser:

http://www.safer-networking.org/

Spyware malware threat W32.Netsky@mm Removal Tool

W32.Netsky@mm Removal Tool


This spayware maleware threat was ranked the number #1 top threat in august of 2007.
This article is from norton security center.This is for advance users use caution.

Updated: July 19, 2006 12:00:00 AM
Type: Removal Information

Symantec Security Response has developed a removal tool to clean the infections of the following variants of the Netsky worm:

W32.Netsky.B@mm
W32.Netsky.C@mm
W32.Netsky.D@mm
W32.Netsky.E@mm
W32.Netsky.K@mm
W32.Netsky.P@mm
W32.Netsky.Q@mm
W32.Netsky.S@mm
W32.Netsky.T@mm
W32.Netsky.X@mm
W32.Netsky.Y@mm
W32.Netsky.Z@mm
W32.Netsky.AB@mm


What the tool does

The W32.Netsky@mm Removal Tool does the following:
Terminate the W32.Netsky@mm viral processes.
Delete the W32.Netsky@mm files.
Delete the registry values that the worms add.
Available command-line switches for this tool

Switch Description
/HELP, /H, /? Displays the help message.
/NOFIXREG Disables the registry repair (We do not recommend using this switch).
/SILENT, /S Enables the silent mode.
/LOG=[PATH NAME] Creates a log file where [PATH NAME] is the location in which to store the tool's output. By default, this switch creates the log file, FxNetsky.log, in the same folder from which the removal tool was executed.
/MAPPED Scans the mapped network drives (We do not recommend using this switch. See the following Note).
/START Forces the tool to immediately start scanning.
/EXCLUDE=[PATH] Excludes the specified [PATH] from scanning (We do not recommend using this switch. See the following Note).
/NOFILESCAN Prevents the scanning of the file system.


Note: Using the /MAPPED switch does not ensure the complete removal of the virus on the remote computer, because:
The scanning of the mapped drives scans only the mapped folders. This may not include all the folders on the remote computer, which can lead to missed detections.
If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file.

Therefore, you should run the tool on every computer.


The /EXCLUDE switch will only work with one path, not multiple. An alternative is the /NOFILESCAN switch followed by a manual scan with AntiVirus. This will let the tool alter the registry. Then, scan the computer with AntiVirus and with the current virus definitions. You should be able to clean the file system after completing these steps.

The following example command line can be used to exclude a single drive:

>"C:\Documents and Settings\user1\Desktop\FxNetsky.exe" /EXCLUDE=M:\ /LOG=c:\FxNetsky.txt


Alternatively, the command line below will skip the scanning of the file system, but will repair the registry modifications. Run a regular scan of the system with the proper exclusions:

>"C:\Documents and Settings\user1\Desktop\FxNetsky.exe" /NOFILESCAN /LOG=c:\FxNetsky.txt


Notes:
The greater than symbol (>) is not part of the path.
The name of the log file can be whatever you select. The name listed is for the sole purpose of this example.


Obtaining and running the tool

Note: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.

WARNING: For network administrators. If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line with the Exclude switch. For more information, read the Microsoft knowledge base article, XADM: Do Not Back Up or Scan Exchange 2000 Drive M (Article 298924).

Download the FxNetsky.exe file from: http://securityresponse.symantec.com/avcenter/FxNetsky.exe.
Save the file to a convenient location, such as your downloads folder or the Windows desktop, or removable media known to be uninfected.
To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.
Close all the running programs before running the tool.
If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
If you are running Windows Me or XP, then disable System Restore. Refer to the "System Restore option in Windows Me/XP" section later in this writeup for further details.

Caution: If you are running Windows Me/XP, we strongly recommend that you do not skip this step.

Double-click the FxNetsky.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.
Restart the computer.
Run the removal tool again to ensure that the system is clean.
If you are running Windows Me/XP, then re-enable System Restore.
Run LiveUpdate to make sure that you are using the most current virus definitions.

Note: The removal procedure may not be successful if Windows Me/XP System Restore is not disabled as previously directed, because Windows prevents outside programs from modifying System Restore.

When the tool has finished running, you will see a message indicating whether W32.Netsky@mm infected the computer. In the case of a removal of the worm, the program displays the following results:
Total number of scanned files
Number of deleted files
Number of repaired files
Number of terminated viral processes
Number of fixed registry entries

Digital signature
FxNetsky.exe is digitally signed. Symantec recommends that you use only copies of FxNetsky.exe, which have been directly downloaded from the Symantec Security Response Web site. To check the authenticity of the digital signature, follow these steps:
Go to http://www.wmsoftware.com/free.htm.
Download and save the chktrust.exe file to the same folder in which you saved FxNetsky.exe (for example, C:\Downloads).
Depending on your operating system, do one of the following:
Click Start, point to Programs, and then click MS-DOS Prompt.
Click Start, point to Programs, click Accessories, and then click Command Prompt.


Change to the folder in which FxNetsky.exe and Chktrust.exe are stored, and then type: chktrust -i FxNetsky.exe.

For example, if you saved the file to the C:\Downloads folder, you would enter the following commands:

cdcd downloads
chktrust -i FxNetsky.exe

Press Enter after typing each command. If the digital signature is valid, you will see the following:

Do you want to install and run "W32.Netsky Removal Tool" signed on 12/02/2004 8:28 PM and distributed by: Symantec Corporation?

Note
The date and time displayed in this dialog box will be adjusted to your time zone, if your computer is not set to the Pacific time zone.
If you are using Daylight Saving time, the displayed time will be exactly one hour earlier.
If this dialog box does not appear, there are two possible reasons:
The tool is not from Symantec: Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec Web site, you should not run it.
The tool is from Symantec and is legitimate: However, your operating system was previously instructed to always trust content from Symantec. For information on this and on how to view the confirmation dialog again, read the document, How to restore the Publisher Authenticity confirmation dialog box.


Click Yes to close the dialog box.
Type exit, and then press Enter. (This will close the MS-DOS session.)

System Restore option in Windows Me/XP
Users of Windows Me and Windows XP should temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.

Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file onto your computer, even after you have cleaned the infected files from all the other locations.

Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.


For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
How to disable or enable Windows Me System Restore
How to turn off or turn on Windows XP System Restore
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, Antivirus Tools Cannot Clean Infected Files in the _Restore Folder, Article ID: Q263455.

Friday, September 28, 2007

Trojan-PSW:W32/QQPass.QR QQPASS REMOVAL

Here is info from F-SECURE REGARDING QQPASS REMOVAL:

QQPass.QR steals QQ Messenger passwords.
Automatic Disinfection

Usually standalone malware (backdoors, worms, trojans, etc.) is automatically removed by F-Secure Anti-Virus (FSAV) starting from version 5.40. Malware files get automatically renamed by FSAV, so they can not be started any more. In some rare cases, when automatic disinfection is not possible, a user can select disinfection action by him/herself to make FSAV rename or delete an infected file. In some special cases it is recommended to use specific disinfection tools provided by F-Secure. They can be downloaded from our ftp site:

ftp://ftp.f-secure.com/anti-virus/tools/

F-Secure Anti-Virus can be purchased from our webshop or from our authorised distributors. A trial version F-Secure Anti-Virus, limited to 30 days, can be downloaded from our website:

http://www.f-secure.com/download-purchase/

All the latest versions of FSAV can download anti-virus database updates automatically. However, these updates can be also downloaded and installed manually from our web or ftp sites:

http://www.f-secure.com/download-purchase/updates.shtml


Manual Disinfection

To manually disinfect standalone malware (backdoors, worms, trojans, etc.) it's usually enough to delete all infected files from a computer and to restart it. Active malware files are usually locked by operating system so different disinfection approaches are required for different operating systems.
Please note that manual disinfection is a risky process, so it is recommended only for advanced users.

If Windows 95, 98 and ME operating system is used, it is recommended to restart a computer from a bootable system diskette and to delete an infected file from command prompt. For example if a malicious file named ABC.EXE is located in Windows folder, it is usually enough to type the following command at command prompt:

DEL C:\WINDOWS\ABC.EXE

and to press Enter. After that an infected file will be gone. If Windows NT, 2000 or XP is used, a malicious file has to be renamed with a different extension (for example .VIR) and then a system has to be restarted. After restart a renamed malicious file will no longer be active and it can be easily deleted manually.


Malware Disinfection Tools

F-Secure provides disinfection tools for certain malware. These tools can be downloaded from this webpage:

http://www.f-secure.com/download-purchase/tools.shtml

ftp://ftp.f-secure.com/anti-virus/tools/


Windows System Restore Issues

If Windows ME or XP is used, it is recommended to disable System Restore feature of these operating systems to prevent a computer from re-infection by an already removed malware. The fact is that System Restore feature of these operating systems might save an infected file into the special folder and copy it back to a hard drive it every time it's been renamed or deleted by F-Secure Anti-Virus or by a user. Instructions on how to disable System Restore feature are here:

Windows ME:
http://www.f-secure.com/v-descs/sfc_dis.shtml

Windows XP:
http://www.f-secure.com/v-descs/sfc_dis1.shtml

It is recommended to re-enable System Restore after disinfection in order to restore stable system configuration in the future, if any crash or incompatibility issue occurs.


Failed Disinfection

In some cases F-Secure Anti-Virus might not disinfect a system automatically. In this case please visit our Support pages:

http://support.f-secure.com/enu/home/virusproblem/howtoclean/

Thursday, September 27, 2007

Latest Virus Spyware Microsoft Vulnerability 9/27/2007

We are posting daily laptop Computer Vulnerabilities as a total Laptor Repair resource portal...

(MS07-048) Microsoft Vista Feed Headlines Gadget Remote Code Execution Vulnerability (938123)

A vulnerability is present in Microsoft Vista Feed Headlines Gadget that may allow for arbitrary code execution. Exploitation could occur by processing a maliciously crafted RSS feed.

Timeline -
8/14/2007

Vendor has provided a patch.
Description -

Gadgets are applications that provide special functionality such as supplying data or utility functions. A vulnerability exist in Microsoft Vista Feed Headlines Gadget that may allow for arbitrary code execution. The flaw lies in processing of maliciously crafted RSS feeds. Successful exploitation would allow for code execution at the rights level of the victim and would rely on coercing the victim to sign up for the malicious RSS feed.


Recommendations -

Download and install the patch available from Microsoft (938123): http://www.microsoft.com/technet/security/Bulletin/MS07-048.mspx
McAfee Product Mitigation

Friday, August 17, 2007

How to replace your harddrive

Here is a site that offers hundreds of repair guides.Need to replace your harddrive,motherboard,upgrade memory go to this site.all free.

Here is the link

Saturday, February 24, 2007

Laptop Repair Notes

A laptop is a simple and compact computer. Yet, its compactness is the reason for its intricacies and complications. For instance, while most normal PCs have a mother board that has different ports for different other components of the computer to be attached, a laptop on the other hand, has a mother board that has a lot of things that are built into it, instead of sections where other parts can be attached. An example here can be given of a sound card, which often comes as a separate part for older PCs and has to be attached to the motherboard of a computer. However, the sound and video display card is integrated with the mother board in case of the laptop.

It is for these reasons that the motherboard is perhaps the most important part of a laptop after the processor. It is also not easy to repair a laptop motherboard because of its immense intricacies. While repairing a motherboard one has to be extremely careful and cautious.

Whenever a problem is arises with a motherboard, one should not take the risk of repairing it themselves since if it is not done properly it can lead to irreparable damage to the entire laptop. It is usually safe to approach a dealer of a laptop for the repair of its motherboard. They have technicians who have an expertise in dealing with laptop motherboard problems and can make the right diagnosis and carry out repairs.
Laptop Repair manuals provides detailed information on Laptop Repair, Laptop LCD Repair, Laptop Hinge Repair, Laptop Repair Manuals and more.

Friday, February 23, 2007

Laptop repair spyware removal

When you talk about Computer repair laptop repair,notebook repair,one of the topics
that typically comes up is Spyware,adware,and firewalls.There are a lot of computers out there surfing the internet and dont even have a firewall configured.Most laptop
repairs,computer repairs occur because a laptop has been invaded by pesty spyware.
spayware/lack of a good firewall will slow your computer down to a crawl and even damage your computer,corrupting vital files.If you dont have a good firewall you will surely need your laptop repaired soon.Peer guardian is a free open source firewall that is absolutley astonishing.Automaticly shutting down thousands of known TCP UDP ports
known for attacks.This awesome tool is free.I will share the link shortly.
Laptop repairs can be minimized if we just protect our computers.
A well known free spyware remover is spybot-we will provide a link for this aswell.
cheers

Thursday, February 22, 2007

Laptop Repair

Stumble upon a awesome laptop repair site.This site offers several instructions on
Dell Laptop repair,computer repairs,online computer repair.Awesome starting point if you are new at computer repair,laptop repair.
LAPTOP REPAIR LINK
Enjoy!!
2thumbs up!!

Wednesday, February 21, 2007

Laptop Repair Replace hard drive

Okay,
You went to fire up your Laptop.You get a Message Operating system not found.Whats your next move.Okay you try to boot the computer from safe mode,You here a clicking sound coming from your computer.These are symptoms of a faulty harddrive.Hopefully you backed up your files.If you have your files safely backed up and have your re-install disk this might not be as bad as it looks.Now if you are comfortable with repairing your laptop this could be a fairly easy fix with the resources found on this site such as laptop repair manuals,Computer repair manuals.We have links to Dell Laptop repair Manuals,HP Laptop repair manuals,Toshiba Laptop Repair manuals,Acer Laptop repair manuals and new links added daily.Good luck with your laptop computer repair.

Laptop Repair Support

Hi,
I am a Comptia A+ Certified Computer Technician with over 10 years of Computer Repair,Laptop Repair expierence.I wanted to start this Blog to share my expertise in the Computer repair Laptop Repair industry.Okay enough talking lets get down to computer repair,laptop repair.We will share all of our resources,information,lnks,e-books so that you can get that laptop computer repaired now..Feel free to email me for Tech Support at:
tuffyy777@hotmail.com

Here is another Laptop manual link for replacing repair laptop hard drives.

Laptop hard drive removal

Laptop Repair Manuals Links

Okay,
Lets start out with some really good links to repair manuals for the more advance users..Please dont attempt repair unless you are 100% sure you can perform the repair.
I am going to provide my email address for Tech support if you neeed any help
tuffy777@yahoo.com for Laptop repair support.The laptop repair manuals include,
Toshiba laptop repair,sony laptop repair,acer laptop repair,dell laptop repair IBM laptop repair,HP LAPTOP REPAIR..and this list will grow larger..


Here is the Link for Laptop repair manuals..
laptop repair manuals