Computer/Windows/Office/ Discussion Blog

July 22, 2017

BIOS ROM CHECKSUM ERROR

Filed under: computer knowledge — admin @ 6:58 pm

Q: my motherboard chipset is KT600, CPU Athlon XP 2600+, a computer at startup, often appear “BIOS ROM CHECKSUM ERROR” that can not be started properly, but several times after the restart may also return to normal, why?
Answer: may be the motherboard BIOS chip or motherboard itself abnormal, you can first try the motherboard BIOS refresh upgrade, if the vendor does not provide a new version of BIOS upgrade program, it may be due to the motherboard BIOS circuit problems, you need to get there to repair the motherboard manufacturers.
Of course, first of all, you can change the motherboard battery try, and sometimes the battery power shortage, often inexplicable failure! More hands, more brains, maybe the problem will be solved by accident!

July 21, 2017

How do I uninstall IE?

Filed under: computer knowledge — admin @ 6:23 pm

What’s wrong with IE? In fact, Windows XP does not provide an easy option to uninstall the IE browser after installation, but it can solve the problem after installing the Microsoft patch Windows XP Service Pack1. And Windows 2000 SP3, Windows XP SP1 allows users to uninstall the default installation of Windows things, such as Internet Explorer, Outlook Express, Windows Media Player, Windows Messenger and Windows virtual machine and so on, these things are not installed by the user to decide. You can install the SP1 patch in the original version of the Windows XP package, and then in the control panel and select “add / Remove Programs”, then select the “add / remove Windows components can be removed in a IE browser

July 20, 2017

Window delayed write failure

Filed under: computer knowledge — admin @ 6:34 pm

Q: my computer configuration is Celeron D 2.4GHz, Kingston 256MB, ASRock 865GV DDR400, Samsung 510N, WD HDD, pioneer DVD, Microsoft 500, the Great Wall power optical compact + buffalo chassis, in March this year with the. Recently, when I tried to copy something on my hard disk, the system prompted Window to delay writing failure, data loss, I do not know what happened, reinstall the system is useless, I am a little worried about whether it was JS black?
A: I suggest you use the rule of elimination, by changing the hard disk and the motherboard to check whether your system can be restored to normal. If the main board IDE port controller is out of order or the hard disk head and the magnetic disk are damaged, this fault will happen to you, so you can basically find the cause of the fault by replacing the main board and the hard disk.

July 17, 2017

check windows version and Activation state command

Filed under: computer knowledge — admin @ 5:34 pm

Simple command to check your windows version and activation state:

win+R,input winver will see the windows version.

win+R,input slmgr.vbs -xpr will see Activation state.

Please leave comment of Valuable command,good for everyone.

Computer host alarm how to do?

Filed under: computer knowledge — admin @ 5:25 pm

Q:The main configuration is Pentium4 1.7GHz processor, 512MB memory, 80GB hard disk. The use of such a problem: as long as the operation of large-scale programs or play online games, after a period of time, the host will send an alarm sound, please ask the host computer alarm is how it happened?
A: This is probably caused by a computer cooling system problem. Because when running large software or playing online games, hardware system in the high load condition, then the hardware itself temperature rises quickly, if the cooling effect is not good, the whole system temperature reaches the set temperature or CPU once the motherboard BIOS temperature alarm limit, the host will alarm. It is recommended that you check the temperature in the case, especially the temperature of the CPU. Then check whether the radiator in the cabinet is working properly. In addition, check that the temperature warning limit in BIOS is too low, which should normally be at 70~85 degrees centigrade.

July 16, 2017

Memory mixing at different frequencies

Filed under: computer knowledge — admin @ 6:50 pm
My computer basic configuration is as follows: Intel, 865perl, P4C, 2.6GHz, VDATA, 256MB, DDR 266, Seagate 80GB. Recently, I would like to add a Kingmax 256MB DDR400 memory. Can you tell me if two different frequencies of memory can be mixed? What’s the effect of mixing?
Answer: different frequencies of memory can be mixed, generally mixed will not have much impact. However, the system will take care of the lower frequency memory, that is, the memory frequency of VDATA 256MB DDR266 as a reference. But even so, increasing memory adds to system resources and improves the speed of the computer. However, after mixing different frequencies of memory, we should pay attention to the following problems: first, when mixing different frequency memory, we should pay special attention to compatibility issues. It is recommended that you set memory performance as default in BIOS. Two, it is recommended to insert low frequency memory into the first slot, and DIMM1 (the first memory slot) to plug in VDATA 256MB DDR266 memory.
My computer basic configuration is as follows: Intel, 865perl, P4C, 2.6GHz, VDATA, 256MB, DDR 266, Seagate 80GB. Recently, I would like to add a Kingmax 256MB DDR400 memory. Can you tell me if two different frequencies of memory can be mixed? What’s the effect of mixing?
Answer: different frequencies of memory can be mixed, generally mixed will not have much impact. However, the system will take care of the lower frequency memory, that is, the memory frequency of VDATA 256MB DDR266 as a reference. But even so, increasing memory adds to system resources and improves the speed of the computer. However, after mixing different frequencies of memory, we should pay attention to the following problems: first, when mixing different frequency memory, we should pay special attention to compatibility issues. It is recommended that you set memory performance as default in BIOS. Two, it is recommended to insert low frequency memory into the first slot, and DIMM1 (the first memory slot) to plug in VDATA 256MB DDR266 memory.

July 15, 2017

How to set up sRGB

Filed under: computer knowledge — admin @ 6:28 pm
Q: my LCD monitor supports the sRGB function, but why does it still feel very serious in the PhotoShop output? I have opened the sRGB function in the settings menu of the monitor.
A: you should also modify the default ICC color mapping file description of the Windows before you can apply the software settings. ICC file is the key information to describe the gamut display space, and the general professional image processing software can generate a specific ICC file to replace the default ICC file of the operating system. It is recommended that you use the ICC file that comes with the most common Adobe PhotoShop. First, go to the display property settings in the Windows system, and then select “advanced” to “color management” in turn, and modify the color mapping file. At this point, click the Add button, and then select the Adobe RGB1998 ICC configuration file in the dialog box that then jumps out of it. However, performing this step only opens the specified ICC option and, if practical, must be further set up in the image processing software. After entering the PhotoShop, select the edit “color” settings in the menu, and then set the workspace RGB to “Adobe RGB” (1998). The CMYK value also needs to be reset. When you click the drop-down menu, select “load CMYK” and select “Photoshop5DefaultCMYK” in the pop-up window”. As for the “gray” and “spot color” options, you can leave the default values. Finally, in the color management scheme, RGB, CMYK, and gray are specified as “conversion to processing”, so that sRGB can really work.

Q: my LCD monitor supports the sRGB function, but why does it still feel very serious in the PhotoShop output? I have opened the sRGB function in the settings menu of the monitor.

A: you should also modify the default ICC color mapping file description of the Windows before you can apply the software settings. ICC file is the key information to describe the gamut display space, and the general professional image processing software can generate a specific ICC file to replace the default ICC file of the operating system. It is recommended that you use the ICC file that comes with the most common Adobe PhotoShop. First, go to the display property settings in the Windows system, and then select “advanced” to “color management” in turn, and modify the color mapping file. At this point, click the Add button, and then select the Adobe RGB1998 ICC configuration file in the dialog box that then jumps out of it. However, performing this step only opens the specified ICC option and, if practical, must be further set up in the image processing software. After entering the PhotoShop, select the edit “color” settings in the menu, and then set the workspace RGB to “Adobe RGB” (1998). The CMYK value also needs to be reset. When you click the drop-down menu, select “load CMYK” and select “Photoshop5DefaultCMYK” in the pop-up window”. As for the “gray” and “spot color” options, you can leave the default values. Finally, in the color management scheme, RGB, CMYK, and gray are specified as “conversion to processing”, so that sRGB can really work.

July 14, 2017

Windows blue screen reasons

Filed under: computer knowledge — admin @ 6:27 pm
Using Windows Server 2008 as the server operating system is mail server, web server, data server, domain name server and so on. Once the server blue screen, administrators will probably not know for the first time – because many servers do not have dedicated monitors, and the server will stop serving for a period of time.
If the web server is out of service, all sites on the server can access the mail server; if it is to stop the service, cannot send mail transfer; if it is a data server to stop the service, may cause the system to crash data support, such as net swims, such as online banking system; if the domain name server to stop the service. “Broken network door” possible again.
Safety Encyclopedia
SMB (Server Message Block, also called Common Internet File System) is a network protocol software program developed by Microsoft, the main function is to make a machine on the network sharing computer files, printers, serial port communication and other resources. It also provides authentication of inter process communication functions. It is mainly used on machines equipped with Microsoft Windows. Such machines are called Microsoft Windows Network. SMB V2 is the latest upgrade of the SMB protocol.
In 2007, Microsoft released Windows Server 2003 to replace a new generation of server operating system Windows Server 2008, the system supports multiple processors, with 64-bit technology, virtualization and optimization of power management function, has attracted many business users the server operating system to replace the system.
According to data provided by the market research firm Gartner shows that in 2007 global delivery server, Windows server share has increased to 66.8%, of which Windows Server 2008 accounted for the mainstream. In 2008 ~2009, Windows Server 2008 became one of Microsoft’s flagship products, and its share showed an upward trend. According to the above data, about 1/5 of the servers in the world use the operating system Windows Server 2008.
Rationale: SMB overflow
The cause of the blue screen vulnerability was a drive file called SRV2.SYS that could not correctly handle malformed data structure requests. If a malicious hacker to construct a malicious malformed data message to the installation of Windows Server 2008 server, then it will trigger the cross-border memory reference behavior, malicious code can allow hackers to execute arbitrary (Figure 1).
As a metaphor, it is like a bridge checkpoint, inspection personnel only according to the label on the truck tonnage to estimate the truck can pass through the bridge, and the fact that the hacker can make an overloaded truck on the same label qualified tonnage through checkpoints. Since no real weighing was done, the inspectors identified only by marking the tonnage, which eventually led to overloading of the truck endangering the safety of the bridge and causing the bridge to be destroyed.
Analog: measured blue screen vulnerability
Step 1: test program ready blue holes (the program specially designed by antiy labs but due to too much damage, not available for download), then search and download a port scanner in the network, the test we choose is L-ScanPort port scanner (software download address: http://www.shudoo.com/bzsoft).
Step 2: open the L-ScanPort port scanner (Figure 2) and enter the desired network segment in the IP address column, such as “192.168.1.1” as the starting paragraph, and “192.168.255.255” as the end segment. Then find the port list in the software interface, tick the “445” port, and click the “GO” button to scan.
If there is a 445 port Windows Server 2008, then it means hackers can launch a blue screen attack. In the test, we prepared a server with Windows Server 2008 and opened the SMB sharing protocol. After scanning the server’s IP address, we were ready to launch an attack test.
Step 3: the attacker playing computer, we open the command prompt and the test program on the root directory of C, and then in the C: \> root directory, enter the command: SMBv2.exe attack attack [server IP address] (Figure 3). We ran as fast as we could to the attack test server, and saw the following scene (Figure 4).
Precaution: there is no patch
Due to the vulnerability no patch, so we give a temporary solution, the administrator must manually shut down 139 and 445 ports in the firewall, this method can be shielded from the Internet all unsolicited inbound traffic, but stopped after the agreement, also means that the user will no longer be able to use normal network share files and printers.
Depth analysis
Most researchers do not believe that the vulnerability can only achieve a blue screen effect, as far as we know, the Microsoft official once thought impossible other attacks into high-risk vulnerabilities, can realize remote code execution vulnerability. Security researchers found that through the new means, you can use the vulnerability to execute malicious code hackers, such as back door, Trojan horse, and ultimately achieve the purpose of controlling the entire server.
If a hacker can realize the control file sharing server, which means hackers to steal enterprise data stored in Windows Server 2008 server in the breeze. The magnitude of the event is beyond the imagination of many security organizations, and perhaps hackers around the world are frantically analyzing the vulnerability, which is likely to be the server worm that exploits the vulnerability

Using Windows Server 2008 as the server operating system is mail server, web server, data server, domain name server and so on. Once the server blue screen, administrators will probably not know for the first time – because many servers do not have dedicated monitors, and the server will stop serving for a period of time.

If the web server is out of service, all sites on the server can access the mail server; if it is to stop the service, cannot send mail transfer; if it is a data server to stop the service, may cause the system to crash data support, such as net swims, such as online banking system; if the domain name server to stop the service. “Broken network door” possible again.

Safety Encyclopedia

SMB (Server Message Block, also called Common Internet File System) is a network protocol software program developed by Microsoft, the main function is to make a machine on the network sharing computer files, printers, serial port communication and other resources. It also provides authentication of inter process communication functions. It is mainly used on machines equipped with Microsoft Windows. Such machines are called Microsoft Windows Network. SMB V2 is the latest upgrade of the SMB protocol.

In 2007, Microsoft released Windows Server 2003 to replace a new generation of server operating system Windows Server 2008, the system supports multiple processors, with 64-bit technology, virtualization and optimization of power management function, has attracted many business users the server operating system to replace the system.

According to data provided by the market research firm Gartner shows that in 2007 global delivery server, Windows server share has increased to 66.8%, of which Windows Server 2008 accounted for the mainstream. In 2008 ~2009, Windows Server 2008 became one of Microsoft’s flagship products, and its share showed an upward trend. According to the above data, about 1/5 of the servers in the world use the operating system Windows Server 2008.

Rationale: SMB overflow

The cause of the blue screen vulnerability was a drive file called SRV2.SYS that could not correctly handle malformed data structure requests. If a malicious hacker to construct a malicious malformed data message to the installation of Windows Server 2008 server, then it will trigger the cross-border memory reference behavior, malicious code can allow hackers to execute arbitrary (Figure 1).

As a metaphor, it is like a bridge checkpoint, inspection personnel only according to the label on the truck tonnage to estimate the truck can pass through the bridge, and the fact that the hacker can make an overloaded truck on the same label qualified tonnage through checkpoints. Since no real weighing was done, the inspectors identified only by marking the tonnage, which eventually led to overloading of the truck endangering the safety of the bridge and causing the bridge to be destroyed.

Analog: measured blue screen vulnerability

Step 1: test program ready blue holes (the program specially designed by antiy labs but due to too much damage, not available for download), then search and download a port scanner in the network, the test we choose is L-ScanPort port scanner (software download address: http://www.shudoo.com/bzsoft).

Step 2: open the L-ScanPort port scanner (Figure 2) and enter the desired network segment in the IP address column, such as “192.168.1.1” as the starting paragraph, and “192.168.255.255” as the end segment. Then find the port list in the software interface, tick the “445” port, and click the “GO” button to scan.

If there is a 445 port Windows Server 2008, then it means hackers can launch a blue screen attack. In the test, we prepared a server with Windows Server 2008 and opened the SMB sharing protocol. After scanning the server’s IP address, we were ready to launch an attack test.

Step 3: the attacker playing computer, we open the command prompt and the test program on the root directory of C, and then in the C: \> root directory, enter the command: SMBv2.exe attack attack [server IP address] (Figure 3). We ran as fast as we could to the attack test server, and saw the following scene (Figure 4).

Precaution: there is no patch

Due to the vulnerability no patch, so we give a temporary solution, the administrator must manually shut down 139 and 445 ports in the firewall, this method can be shielded from the Internet all unsolicited inbound traffic, but stopped after the agreement, also means that the user will no longer be able to use normal network share files and printers.

Depth analysis

Most researchers do not believe that the vulnerability can only achieve a blue screen effect, as far as we know, the Microsoft official once thought impossible other attacks into high-risk vulnerabilities, can realize remote code execution vulnerability. Security researchers found that through the new means, you can use the vulnerability to execute malicious code hackers, such as back door, Trojan horse, and ultimately achieve the purpose of controlling the entire server.

If a hacker can realize the control file sharing server, which means hackers to steal enterprise data stored in Windows Server 2008 server in the breeze. The magnitude of the event is beyond the imagination of many security organizations, and perhaps hackers around the world are frantically analyzing the vulnerability, which is likely to be the server worm that exploits the vulnerability

July 13, 2017

CPU too high temperature how to do?

Filed under: computer knowledge — admin @ 6:38 pm
My CPU Celeron D 2.4GHz, boot display has more than 50 degrees Celsius, playing games up to 80 degrees Celsius, even the temperature alarm rang, CPU heat sink is very hot, how to resolve?
Answer: first, check all the accessories, and if all the hardware is working properly, the CPU also rotates, it seems that your machine is only CPU heat problem, and there is no other compatibility problems exist. Because the Celeron D than any previous Celeron series heat should be much larger, so I suggest you change CPU fan a little better, and remember that coated with thermal grease, and the chassis of the heat can not be ignored, if the chassis temperature is too high, can consider installing chassis cooling fan.

My CPU Celeron D 2.4GHz, boot display has more than 50 degrees Celsius, playing games up to 80 degrees Celsius, even the temperature alarm rang, CPU heat sink is very hot, how to resolve?

Answer: first, check all the accessories, and if all the hardware is working properly, the CPU also rotates, it seems that your machine is only CPU heat problem, and there is no other compatibility problems exist. Because the Celeron D than any previous Celeron series heat should be much larger, so I suggest you change CPU fan a little better, and remember that coated with thermal grease, and the chassis of the heat can not be ignored, if the chassis temperature is too high, can consider installing chassis cooling fan.

July 12, 2017

Hardware Monitor found an error

Filed under: computer knowledge — admin @ 6:26 pm
My computer has been used properly, until a time when the post appeared the following tips: “Hardware Monitor found an error, enter POWER MANAGEMENT SETUP for details Press F1, to continue, DEL to enter SETUP”, if you press the F1 button to continue, and all the normal operation, what happened?
Answer: hint means “monitor function, find error”, enter POWER MANAGEMENT SETUP to see details, press F1 button to continue booting program, press Del button to enter CMOS settings”. This is because some motherboards have hardware monitoring function, output voltage temperature monitoring, can set the motherboard and CPU voltage regulator level monitoring and monitoring of each fan speed, when the function of the monitoring at boot time found abnormal situation, then you can enter the BIOS settings, “POWER MANAGEMENT SETUP” respectively in “Fan Monitor, Thermal Monitor and Voltage Monitor (different motherboard BIOS may have different) to repair (or close them), then everything is normal.
My computer has been used properly, until a time when the post appeared the following tips: “Hardware Monitor found an error, enter POWER MANAGEMENT SETUP for details Press F1, to continue, DEL to enter SETUP”, if you press the F1 button to continue, and all the normal operation, what happened?
Answer: hint means “monitor function, find error”, enter POWER MANAGEMENT SETUP to see details, press F1 button to continue booting program, press Del button to enter CMOS settings”. This is because some motherboards have hardware monitoring function, output voltage temperature monitoring, can set the motherboard and CPU voltage regulator level monitoring and monitoring of each fan speed, when the function of the monitoring at boot time found abnormal situation, then you can enter the BIOS settings, “POWER MANAGEMENT SETUP” respectively in “Fan Monitor, Thermal Monitor and Voltage Monitor (different motherboard BIOS may have different) to repair (or close them), then everything is normal.
« Newer PostsOlder Posts »

Powered by WordPress