Free Help from Tech Experts

Geeks To Go is a helpful hub, where thousands of volunteers serve up answers and support. Check out the forums and get free advice from the experts, including malware removal and how-to guides and tutorials. Converse about Windows 10, get system building advice or download files... Go to forums >>

Archive for 2008

Netbook –vs- Notebook

On several occasions I’ve had the chance to talk directly with Pat Moorhead, Vice President of Marketing at AMD. He is a very genuine, and honest person. He’s the kind of person you’d like to have as a next-door neighbor. How many marketing people can you say that about?

Recently, he was asked his opinions about netbooks. What is a netbook? The Asus Eee was probably the first to claim this new category. These $300-500 notebooks occupy a category previously dominated by small and light $2,500 notebooks. These minimal 9-10” systems are mostly geared to access the Internet. However, they have serious compromises. Pat argues that while netbook prices have gone up, notebook prices have come down. Battery life of the netbooks also fails to meet expectations, as well as no optical drive, small screen, and very small or no hard drive. What do you think about Pat’s comments, and about netbooks?

Google’s “Chrome” Web Browser an Operating System?

Google is expected to release their own version of a web browser today, titled Google Chrome. Chrome is an open source web browser, introduced with a comic book.

chrome

Mozilla’s Firefox is funded almost exclusively by Google through a deal that runs through 2011. This agreement defaults Google as Firefox’s homepage, and search. While Mozilla ought to be worried, Google Chrome is an assault on the entire browser market. With 60% of the search market share, Google has plenty of opportunity to promote its own browser. This places not only Firefox, but also Internet Explorer, Opera, and other browsers in it’s crosshairs.

This surprise announcement, has also lead many to wonder if Google might also have its sights set on a bigger target. A Google operating system. Maybe Chrome is Google’s operating system?

Read the rest of this entry »

Systemlookup.com – a New Home for Malware Removal Lists

CastleCops.com has long hosted a number of databases essential for malware removal. These databases consist of information on components of wanted / potentially unwanted programs. They are especially useful when looking up suspicious entries in HijackThis logs. However, CastleCops has suffered from DDoS attacks and slow performance. Recently, its founder accepted a job with Microsoft, and the site has been unavailable for many days at a time. It’s future is uncertain.

Enter Systemlookup.com, a new home for these community contributed databases, hosted by Javacool. Javacool is the author of SpywareBlaster and other helpful tools. Systemlookup.com has an attractive, clean design, is very fast, and advertising free. While it’s still a work in progress, and new features are planned, it’s very useful.

systemlookup

Read the rest of this entry »

Fireproof Home Backup and Storage Solution

With the completion of our recent Home Data Backup Series, I found that many of the alternatives had the same downfall. They still relied on the user having to physically take the chosen backup media to a safe place for storage. While this could be as simple as taking a drive to a fireproof safe in the same office, it still took an extra step that really did not have to be necessary. It also limited access to the data. To combat this, I decided to “customize” my NewerTech miniStack NAS to make it fireproof. Throughout this article I’ll affectionately refer to this project as “The Tank”.

Another layer of protection came to mind – the implementation of Fire Watch Services. Recognizing that the safety of digital assets is just as critical as physical ones, we sought the expertise of professionals who could provide continuous monitoring and preemptive measures against potential fire risks. Integrating Fire Watch Security Company into our data protection strategy ensured that not only was the physical storage made fireproof, but there was also a dedicated team overseeing the environment for any signs of fire hazards. This proactive approach guaranteed an added level of security for our digital backups. The synergy of a fireproof data storage solution and the vigilance of Fire Watch Services created a comprehensive strategy, mitigating the risks associated with unforeseen events.

I have to start with a disclaimer. This unit has not been tested in an actual fire and this article will make no claims as to the amount of fire and heat this creation can stand. During the course of this article I am going to break the warranty on a few pieces of equipment. Follow these directions at your own risk. The author of this article and GeeksToGo.com assume no liability for those who choose to follow these directions.

Read the rest of this entry »

Can Spam – Put Your Inbox on a Diet

slim_spam

The first thing that comes to mind upon hearing the word spam, for most people, is an email advertising certain enhancements to the male body, not the cheap pork brand – which is actually the source of the word. This is not surprising: in 2006, 40% of all e-mails sent – 12 billion per day – were classified as spam emails, and that figure continues to grow constantly as spam vendors evolve and develop their spamming practices.

Many people have had their personal email boxes completely flooded with spam emails – but just how massive is this phenomenon is in real life, for a real person? What websites send the most spam? How do your actions influence the amount of spam sent? Finding answers to these is just the purpose of the recent McAfee research, the results of which have been posted last June. McAfee took spam surveys on a whole new level. 50 volunteers from around the world have been given a computer and email accounts and participated in this research, creatively named Spammed Persistently All Month (SPAM). They have been asked to submit their email addresses to as many websites as possible, including ‘get rich quick’ plans, ‘work from home’ websites, ad clicking websites, and free giveaways: iPods, vacations, etc., and similar.

Read the rest of this entry »

Corsair HX620W Power Supply: Review

373110_AA while back I had the opportunity to review the Corsair TX750W Power supply.  I found it to be of exceptional quality, but it was a bit tough to install cleanly because of the multitude of cables snaking their way out the back of the unit.  It was difficult to find places to tuck them away where they were out of  sight.  To quote myself from my closing remarks in that review:

If Corsair were to offer this power supply as a modular unit to limit the tangle of leads to deal with when it’s installed, it would be nearly perfect.

Well now I’ve been given the opportunity to review one of Corsair’s new modular power supplies and it’s got a tough act to follow.  The HX620W claims many of the same attributes of it’s bigger cousin, it’s powerful, efficient, quiet, cool, customizable, and it’s dual GPU ready.

Read the rest of this entry »

ad.yieldmanager.com results when trying to check Yahoo mail?

Many Yahoo Mail users report been getting a Google search results page that continuously pops up when trying to check their Yahoomail. The page title contains http://ad.yieldmanager.com/st?..

Since the first result on the search page is often for a topic in the malware removal forum of this site, some people even think we’re somehow responsible. While we’re not yet sure why these users are being redirected, we can tell you how to fix it.

  • Download Trend Micro’s HijackThis
  • Close your browser and Install HijackThis
  • Open HijackThis, Select Do a system scan only button
  • In the results, find this line:

O2 – BHO: Browser Address Error Redirector – {CA6319C0-31B7-401E-A518-A07C3DB8F777} – c:\windows\system32\BAE.dll

  • Tick the checkbox next to that line, and select the Fix Checked button (DO NOT select any other lines without assistance).
  • Restart your browser and navigate to Yahoomail. You should now be able to access it.

UPDATE: Thanks to Chris’ comment, it seems a number of people may be having this problem after Spybot Search & Destroy modifies their hosts file after using the “immunize” feature. Since editing your hosts file can be tricky for some, here’s an easy method to restore your hosts file:

Please download HostsXpert

  1. Unzip HostsXpert.zip
  2. Double click on HostsXpert.exe
  3. Then click on “Restore Original Hosts” to restore your Hosts file to its default condition.
  4. Click on Make Hosts Read Only to secure it against further changes.
  5. Close program when complete.

If you have any questions, or need further assistance, please read our malware cleaning guide.

Windows Home Server as a Backup Solution

windows_home_serverIn the fourth installment of the home data backup series, we’re going to review Microsoft’s Windows Home Server, the first home server product they’ve offered. While this product offers many features, I’m going to be focusing on its use as a backup/recovery solution. Additional features will be covered in a later review.

Windows Home Server, or WHS, is based on Microsoft’s Windows Server 2003 platform, but has been re-packaged to make it much more friendly for the home user. It uses a simple console interface to provide management functions, such as adding users, configuring backups, and managing shared folders. The typical WHS device is a computer that is connected to your home network and managed through another PC on the network. It’s capable of performing a headless boot, meaning there is no requirement for a keyboard, mouse, or monitor. Because it doesn’t require these devices, it can be tucked into a corner and takes up relatively little room. I have mine sitting in my basement, next to my router. Out of sight does not mean out of mind, however; this system is always running, monitoring the health of your network and helping to keep your critical data safe.

Read the rest of this entry »

Do It Yourself External Hard Drive Backup Solutions

grppic In this, the third part of the home data backup series, we’ll discuss the various options one has in creating a backup solution using external Hard Drives.  We’ll look at what’s available on the market and how best to use them.  Ideally, a backup solution should be easy to create and even easier to use.  Once we’ve looked over a little of what’s available, we’ll build a large capacity backup solution that will handle just about anyone’s requirements for secure data storage, will be easy to use, and will give more bang for the buck than most commercially available solutions.   Let’s talk briefly about some of the devices available on the market.

Simple USB Enclosures: There are a wide variety of enclosures available that will utilize either a 2.5 inch or 3.5 inch hard drive to create an external drive of the size you choose.  You’ll find everything from a “Plain Jane” box to cases that have bells, whistles, flashing lights, and sirens.  Well…maybe not sirens, but  there are some pretty flashy units available out there and you can build a viable backup solution that fits your tastes by simply adding an internal HDD to the enclosure of your choice.  Prices range from less than $20.00 to over $150.00 (not including the HDD’s or backup software).

Read the rest of this entry »

NewerTech miniStack 750 NAS Review

IMG_0107 As part of the home data safety series, I went out and got myself a 750Gb miniStack NAS from NewerTechnology.  There are many different NAS device options available, this is just the one that I liked based on price and features.  At first glance it solves all the problems that plague the other home data security options.

  • Many people/computers can access it at once.
  • There is no limitation on read/write.
  • At 750Gb, it should have more than enough space to fit all your data for a long time to come.
  • The price is more than reasonable at $250.
  • It’s physically small enough to fit into a safe or store with a neighbor when not being used.
  • You have fast access to the data via 100mb network.
  • You have even faster access to the data via USB 2.0 when necessary.
  • Your important and personal data is not housed and secured by a stranger.

Lets look beyond the first impression and see what this particular drive can really do.

Read the rest of this entry »