Alert: Petya Ransomware May Be the Worst YetinShareRansomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.Once the file has been downloaded, Petya causes a Windows error and forces the system to endure the typical “blue screen of death,” causing a reboot. The computer will then display a red skull and crossbones, and a fraudulent “system check” infects and encrypts the master file table (MFT) with military-grade encryption protocol. This causes the computer to basically forget which files it has, and where they are stored.
Rather than closing access to particular files, Petya completely locks the user out of the system by overwriting the computer’s master boot record. The computer is essentially rendered useless by the user, who can’t even log in. Petya will display a list of demands, as well as how to meet them. As is the case with most ransomware, the ransom must be paid in Bitcoin. Once this has been done, the criminal supplies a decryption key that’s used to regain access to the files.
The initial cost for the decryption key is .99 Bitcoins, which is an estimated $430. However, paying for the decryption key isn’t that simple. Once the user accesses the payment page, they’re given a limited amount of time to access the key before the price is doubled. While there are some websites that claim there are commands that can allow users to skip the lock screen, the MFT will still be encrypted, rendering the files useless. Even if the user pays the ransom, there’s still no guarantee that the decryption key provided by the hackers will work. This is why we always suggest that you don’t pay the ransom, and instead contact a professional technician who can consult you on the situation.
In particular, business owners and human resources representatives who are responsible for the hiring procedure are the preferred targets. Petya is distributed through emails that are disguised as potential job seekers. The message will often contain a hyperlink that redirects to a Dropbox containing a resume, which is really just a Trojan horse containing Petya that’s capable of weaseling its way past your antivirus solution. Petya had been causing significant trouble for German businesses, but a programmer has found a solution. Admittedly, it’s a tricky solution to implement, but it’s still preferable to paying a ransom.
As is the case with most ransomware, your best chance of escaping unscathed is by dodging the attacks altogether. Ransomware is notoriously difficult to crack, even for seasoned IT veterans, but keeping a watchful eye on anything you find on the Internet can help you avoid infections. With PC Medics’ security solutions, you can proactively detect and eliminate threats to your IT infrastructure. To learn more, give us a call at 818-357-2338.
How to enable Developer Options on your Android phone or tablet
More like this
Unlock your Android device’s potential with the Android Debug Bridge (ADB)
Don’t want to wait for Android L? Try Android Runtime (ART) now
11 simple tips and tricks to get more from your LG G3
Credit: Blake Stimac
By Blake Stimac Follow
Greenbot | Jul 25, 2014 6:00 AM
So you’ve finally decided to root your phone and install a custom ROM, or maybe you want to sideload an app from your computer. Before you can jump into ADB commands and perform some software surgery on your phone, you have to enable the Developer options.
Cleverly hidden away from the average user, enabling Developer options is incredibly easy to do if you know where to look.
Find the Android Build number in Settings
Build number menu for the Samsung Galaxy S5, LG G3, and HTC One (M8)
While enabling Developer Options is done in the same way for every Android phone or tablet, OEMs don’t always put the option in the same place. Navigate your phone to the “Build number” portion of the settings, which can be tucked away and buried in submenus.
Here’s how to get there on a few popular devices:
Stock Android: Settings > About phone > Build number
Samsung Galaxy S5: Settings > About device > Build number
LG G3: Settings > About phone > Software information > Build number
HTC One (M8): Settings > About > Software information > More > Build number
Once you’ve found the Build number section of the settings, tap on the section 7 times. After two taps, a small pop up notification should appear saying “you are now X steps away from being a developer” with a number that counts down with every additional tap.
When the Developer options are unlocked, you should see something like this.
After the 7th tap, the Developer options will be unlocked and available. They can usually be found in the main settings menu. You dive into that menu to do things like enable USB debugging (a frequent prerequisite to lots of hacks).
Developer options for the Samsung Galaxy S5, LG G3, and HTC One (M8).
Removing Developer options is possible, but only for certain phones
So you want to get rid of the developer options in the settings menu of your phone? Well, the sad truth is that the only sure-fire way to do this is to perform a factory reset. Luckily, a few phones can kill off the extra settings menu without wiping the phone completely.
Clearing the Settings data will remove Developer options for some phones and tablets.
If you have a phone with stock Android or the HTC One (M8), Developer options can be removed completely from your phone without wiping it. Sorry, Galaxy S5 and LG G3 users, you’re gonna need to either live with the extra menu or wipe your phone.
Go to Settings>Apps>Settings and tap on Clear Data. A popup will ask you to confirm, press OK, and you’re done. This method may work with more phones and tablets, so be sure to let us know in the comments below if it worked for you.
Blake Stimac — Staff Writer
Blake has been an Android fan since the G1 days, tinkering with any device he can get his hands on. When he’s not geeking out on Android devices, you’ll likely find him playing video games or watching a laundry list of horror movies.
LEGALphones , smartphonesPhone unlocking bill clears US House, next step is president’s signatureMartyn [email protected]_williams Jul 25, 2014 1:22 PMe-mailprintA bill that allows consumers to unlock their cellphones for use on other carriers passed its last hurdle in Congress on Friday, opening the way for it to become law once it is signed by President Obama.Senate Bill 517 overturns a January 2013 decision by the Congressional Librarian that ruled the unlocking of phones by consumers fell afoul of the Digital Millennium Copyright Act DMCA. It had previously been permitted under an exception to the anti-circumvention provisions of the DMCA, which are generally aimed at cracking of digital rights management technology.Cellphones and smartphones are typically supplied to consumers with a software lock that restricts their use to a single wireless carrier. Removing that lock—the process of “unlocking” the phone—means it can be used on the networks of competing carriers. In the U.S., this is most often done with handsets that work on the AT&T or T-Mobile networks, which share a common technology, but is also popular with consumers who want to take their phones overseas and use foreign networks rather than roaming services.The Unlocking Consumer Choice and Wireless Competition Act has made fast progress through Congress. It was passed by the Senate on July 16, just a week after it was passed by the Senate Judiciary Committee, and on Friday by unanimous vote in the House of Representatives. It now waits to be signed into law.In addition to making the unlocking process legal under copyright law, the bill also directs the librarian of Congress to determine whether other portable devices with wireless capability, such as tablets, should be eligible for unlocking. “It took 19 months of activism and advocacy, but we’re finally very close to consumers regaining the right to unlock the phones they’ve legally bought,” said Sina Khanifar, who organized an online petition that kicked off the push to have the Library of Congress decision overturned. The petition attracted more than 114,000 signatures on the White House’s “We The People” site. In its response to the petition, the Obama administration called for the legalization of cell phone unlocking.“I’m looking forward to seeing this bill finally become law—it’s been a long road against powerful, entrenched interests—but it’s great to see citizen advocacy work,” Khanifar said in a statement. 0inShare0For comprehensive coverage of the Android ecosystem, visit Greenbot.com.
Lately I’ve noticed that whenever I play a YouTube video on my PC, it’s jerky. Choppy. Call it what you will—it’s really frustrating.
Semi-expert troubleshooter that I am, I did what I always do when experiencing a problem inside my browser: I tried a different browser. Specifically, I switched out of Chrome and into Internet Explorer.
And what do you know? Silky-smooth YouTube video. Google Chrome, j’accuse!
After a little research into the issue, I discovered a fix—one that worked for me. Your mileage may vary, of course, because each system and situation is different, but it’s definitely worth a try if you’re plagued by the same choppy playback in Chrome. Do this:
1. Open a new tab in Chrome.
2. In the address bar, type about:plugins, then press Enter.
3. In the upper-right corner of the window, locate and click the plus sign next to Details.
4. Look for Adobe Flash Player, which on my system was the top entry. Immediately below that, you should see two Shockwave Flash entries. Look at the Location lines for both; you want the one that references PepperFlash. (Again, on my system, this was the first of the two. It looked like this:
As Joe mentioned here, today we’re announcing two important updates to the Windows platform: Windows Phone 8.1 andWindows 8.1 Update. With these updates, we continue to refine and improve Windows based on feedback from customers to deliver ongoing value to all their Windows devices. Joe’s post goes into detail on all the awesomeness that’s in Windows Phone 8.1(Cortana is rad – trust me!) but also gives some great context around our new engineering culture in the Operating Systems Group now that we’re in this mobile-first, cloud-first world. It also underscores how we are moving more quickly to improve the Windows experience for customers. In this post, I wanted to share a little bit more about the update for Windows 8.1 and Windows RT 8.1.
With the current generation of Windows, we made a pretty big bet on touch and mobility. Along with building on top of the strong foundation in Windows 7, we also introduced a brand new approach to the Windows user experience that brought touch to the forefront. Since the original introduction of Window 8 in 2012, we have been continuously refining the experience, and we are making steady progress. More than 40 percent of Windows PCs at big box retailers, like Windows Stores Only at Best Buy, this past holiday season were touch-enabled – up from only 4 percent a year ago. As Joe recently said at Mobile World Congress, customer satisfaction for a device running Windows 8 with touch is actually higher than it was for a PC running Windows 7 without touch. We believe deeply in the notion that delivering a compelling personal and modern experience across all the devices that matter in your life should not mean sacrificing familiarity. Windows 8 and 8.1 were first steps, and we continue to make refinements based on customer and partner feedback.
Last fall, less than a year after we shipped Windows 8, we released Windows 8.1– bringing a large set of customer-driven improvements including the return of the Start button, tutorials, more personalization options, the ability to boot to desktop, improvements to multi-tasking, and more. Today marks the next step as we release a new update for your Windows experience.
The Windows 8.1 Update deliversa collection of refinements designed to give people a more familiar and convenient experience across touch, keyboard and mouse inputs. It also brings improvements for business customers, really accelerates opportunity for developers, and enables device makers to offer lower cost devices.
Easier access to your favorite apps and key controls:
On the Start screen, on select devices you will now find Power and Search buttons at the upper-right corner next to your account picture. You can now more quickly shut down your PC if you need to and do a search right from the Start screen.
If you like using the desktop, you will be happy to know that select devices will now boot to desktop as the default setting. And on your taskbar, you can now pin both desktop apps and apps from the Windows Store as well as your favorite websites. You can now pin any app you want to the taskbar so you can open or switch between apps right from the desktop. I’ve got some of my favorite apps like Xbox Music, Skype, Facebook, Flipboard, and Mint pinned to my taskbar. You can also access the taskbar from anywhere when you’re using a mouse; you can see the taskbar on any screen by moving your mouse to the bottom edge of your screen. Just click on any of the apps pinned to your taskbar to open or switch to them.
More familiar mouse and keyboard options:
We’ve made it so your mouse works more consistently anywhere in Windows. If you move your mouse to the top of the screen when using a Windows Store app, you will see the familiar Close and Minimize buttons. And as I mentioned above, when you move your mouse to the bottom of the screen in a Windows Store app, the taskbar comes up.
On the Start screen, if you right-click on an app tile, you will get a context menu next to the app tile that shows you what you can do with the tile, like unpin from Start, pin to the taskbar, change the tile size or even uninstall the app. Right-clicking on an app tile on the Start screen works just like right-clicking on something on the desktop.
Simpler way to find new apps:
After installing the update, you’ll find the Windows Store is now pinned to the taskbar by default so you can easily discover new apps (yes, you can unpin it if you don’t want it there).
And after installing new apps, you’ll notice a message at the lower-left corner of the Start screen that points you to the Apps view so you can see what you recently just installed.
Seamless browsing on all devices:
With today’s update, Internet Explorer 11 adapts your browsing experience by detecting your Windows device and input type – whether an 8-inch touch tablet in portrait mode or a 24-inch desktop with mouse and keyboard. The web is still front-and-center but new design enhancements make your browsing experience feel like it was made just for your device – like the number of tabs on-screen, the size of the fonts and menus. You can also now control when the browser remains on-screen or hides away for full-screen browsing. Check out 22tracksto see these updates in action.
Improvements for business customers: We are introducing several key improvements for businesses such as Enterprise Mode Internet Explorer (EMIE) and extended Mobile Device Management (MDM). EMIE enables Internet Explorer 8 compatibility on Internet Explorer 11 so companies can run existing web-based apps seamlessly on Windows 8.1 devices. And with extended MDM, we are introducing additional policy settings that can be managed with whatever MDM solution an enterprise chooses including whitelisting or blacklisting Windows Store apps and websites. Look for a blog post later today on the Windows for your Business Blog that discusses these in greater detail and a post on the Springboard Series Blogon deployment guidance for the Windows 8.1 Update.
New low cost devices:With the Windows 8.1 Update, we have enabled our hardware partners to build lower cost devices for Windows such as devices with only 1GB RAM and 16GB of storage that provide customers with the experience they expect from a Windows device without sacrificing performance.
We have made the Windows 8.1 Update available today for MSDN subscribers, and will begin to roll it out for free to Windows 8.1 and Windows RT 8.1 customers via Windows Update next Tuesday April 8th. For the majority of folks, they will receive the update automatically. If you are still on Windows 8, you can get the Windows 8.1 Update via the Windows Store on April 8th as well.
NOTE: The Windows 8.1 Update will be KB2919355 for those of you interested.
We’re really excited to get this update out to everyone! Moving forward, we’ll continue to deliver improvements through regular updates like this one to Windows, allowing us to respond more quickly to customer feedback as your needs change.
Update 12/20/2013: A new version of Cryptolocker—dubbed Cryptolocker 2.0—has been discovered by ESET, although researchers believe it to be a copycat of the original Cryptolocker after noting large differences in the program’s code and operation. You can read the full blog comparing the two here.
Just last month, antivirus companies discovered a new ransomware known as Cryptolocker.
This ransomware is particularly nasty because infected users are in danger of losing their personal files forever.
Spread through email attachments, this ransomware has been seen targeting companies through phishing attacks.
Cryptolocker will encrypt users’ files using asymmetric encryption, which requires both a public and private key.
The public key is used to encrypt and verify data, while private key is used for decryption, each the inverse of the other.
Below is an image from Microsoft depicting the process of asymmetric encryption.
The bad news is decryption is impossible unless a user has the private key stored on the cybercriminals’ server.
Currently, infected users are instructed to pay $300 USD to receive this private key.
Infected users also have a time limit to send the payment. If this time elapses, the private key is destroyed, and your files may be lost forever.
Files targeted are those commonly found on most PCs today; a list of file extensions for targeted files include:
3fr, accdb, ai, arw, bay, cdr, cer, cr2, crt, crw, dbf, dcr, der, dng, doc, docm, docx, dwg, dxf, dxg, eps, erf, indd, jpe, jpg, kdc, mdb, mdf, mef, mrw, nef, nrw, odb, odm, odp, ods, odt, orf, p12, p7b, p7c, pdd, pef, pem, pfx, ppt, pptm, pptx, psd, pst, ptx, r3d, raf, raw, rtf, rw2, rwl, srf, srw, wb2, wpd, wps, xlk, xls, xlsb, xlsm, xlsx
In some cases, it may be possible to recover previous versions of the encrypted files using System Restore or other recovery software used to obtain “shadow copies” of files. The folks at BleepingComputer have some additional insight on this found here.
Malwarebytes detects Cryptolocker infections as Trojan.Ransom, but it cannot recover your encrypted files due to the nature of asymmetric encryption, which requires a private key to decrypt files encrypted with the public key.
In order to make removal even easier, a video was also created to guide users through the process (courtesy of Pieter Arntz).
While Malwarebytes cannot recover your encrypted files post-infection, we do have options to prevent infections before they start.
Users of Malwarebytes Anti-Malware Pro are protected by malware execution prevention and blocking of malware sites and servers.
To learn more on how Malwarebytes stops malware at its source, check out thisblog.
Free users will still be able to detect the malware if present on a PC, but will need to upgrade to Pro in order to access these additional protection options.
Also, the existence of malware such as Cryptolocker reinforces the need to back up your personal files.
However, a local backup may not be enough in some instances, as Cryptolocker may even go after backups located on a network drive connected to an infected PC.
Cloud-based backup solutions are advisable for business professionals and consumers alike. Malwarebytes offers Malwarebytes Secure Backup, which offers an added layer of protection by scanning every file before it is stored within the cloud in an encrypted format (don’t worry, you can decrypt these).
The YAC virus (also found as YAC Search virus, YACmx virus, YAC Cleaner, Yet Another Cleaner virus, Elex do Brasil Participações Ltda, YAC computer virus, Woodtale virus, and more) is dangerous malware categorized as scareware (rogue software) that is promoted as an unregistered (free) and registered (full) Microsoft Windows cleaner and optimizer tool; however, YAC Cleaner is essentially considered a non-beneficial rogue Windows Optimizerand Antivirusprogram that participates in unethical marketing practices and performs fraudulent, non-beneficial computer scans with highly misleading results in order to create customers and collect user information using scare tactics.
YAC promotes a free trial is a that displays misleading information, misleading scan results, including a quick clean scan, deep clean scan, system boost, and more.
Once installed, the non-beneficial YAC cleaning software will begin to perform a scan without authorization. The scan will then claim that there are a numerical amount of problems detected, and will also claim that a certain amount of them are not safe. Most of the time the malicious results shown do not exist on the computer system and is fabricated by the software.
YAC malware also opens internet browser windows and cause unwanted pop-ups to appear, as well as change your homepage, default search engine, and start page causing your internet browsers to constantly start up on and redirect to search.yac.mx and other websites when users search the web, open a browser window, open a new browser tab, and perform similar tasks. In Google Chrome, YAC hijacks the startpage settings, home page settings (as well as causes the home button to appear), and default engine.
YAC will also collect and distribute user information manually submitted online while the program is installed or information submitted to the initial party and involved third-parties, as well as what they describe as anonymous usage information (anonymous information can still be used to identify a person or make communications).
YAC will collect complete computing and browser activity. The information collected is often submitted to marketing and mailing lists. Victims have reported excessive email spam from YAC Software and third-parties, as well as junk mail and telephone calls from telemarketers at home.
YAC malware often bundles with third-party adware,spyware, and browser hijackers used to display pop-up ads, banner ads, coupon drop-down ads, and cause browser redirections and start-ups.
YAC.mx and the items they develop and promote are very malicious and have connections to Hong Kong, Brazil, Mexico and other countries. In most cases the items seem to be repackaged and renamed.
YAC Cleaner is confusing and difficult to install for many users.
YAC has also been documented spam commenting and forum spamming many websites, including ours in efforts to promote the product and defame legitimate software used to remove it such as Malwarebytes.
YAC.mx also misleads their web visitors by displaying defamatory and false information about legitimate sources including our website, Botcrawl.com in efforts to create customers via unethical marketing tactics. You can view images of this in the gallery below. Please note, we are not a“malicious thing” that does any harm to anyone, all information displayed on the website is false. There is no need for us to file suit against them at the moment as this patently potrays how unethical their product and website is.
Yac.mx published this post after learning about our research of their product.
How does YAC malware get onto a computer?
YAC Software can be manually and voluntarily downloaded from a variety of locations including download.com, and others; however, most users claim that YAC scareware installed without consent.
YAC also bundles with third-party freeware and shareware.
In some instances YAC scareware may be contracted via advertisements, email spam, and compromised social media content.
How to remove YAC Malware
Automatically remove YAC – Scan for and automatically remove YAC malware
Manually remove YAC – Remove/Uninstall YAC and third-party malware if allowed
1. Automatic YAC removal
Use the instructions below to automatically remove YAC scareware and third-party malware.
2. Once Malwarebytes is installed, run the program. If you are using the free version of Malwarebytes you will be prompted to update the database, make sure to do so.
3. On the first tab labeled “Scanner” select the Perform full scan option and click the Scan button to perform a full system scan. Malwarebytes will automatically detect malware infecting the computer system.
4. Once the malware scan is complete, Malwarebytes may prompt a notice stating malicious objects were detected. Select the malicious objects and click the Remove Selected button to completely remove the malicious files from your computer (the image below shows a file that is NOT selected) or click the Delete button to remove quarantined files.
CCleaner can be used to automatically repair internet browser settings startup up settings, and uninstall stubborn and possibly rogue YAC software.
2. Once installed, open the program and navigate to Cleaner > Windows/Applications and click the Analyze button. Afterwards, click the Run Cleaner button on the bottom right of the program interface.
3. Next, navigate to Tools > Startup and search through each tab starting from windows, internet explorer, etc., all the way to Content Menu, for additional suspicious entries and click Disable and Delete once anything is found. Something to look for might include the title “YAC.”
4. To automatically uninstall YAC and unwanted programs, navigate to the Uninstall tab and located software in the list of installed programs. Uninstall the programs as selected. Keep in mind that the publisher of the program often changes from Elex do Brasil Participações Ltdalocated in Sao Paulo, Brazil to WoodtaleMedia.com and iSafe Virus Removal.
2. Manual YAC removal
Use the instructions below to manually uninstall rogue YAC software using generic removal procedures (if allowed), as well as third-party malware that may have installed alongside rogue Windows optimization software.
How to uninstall YAC (Yet Another Cleaner)
1. Access Windows Start Menu and navigate to the Control Panel.
2. Click Uninstall a program or Add and remove a program.
3. In the list of installed programs, search for YAC (Elex do Brasil Participações Ltda) and other potentially unwanted software. Once located, double click the unwanted programs or highlight them in the list and click the Uninstall button.
It is important to stay alert when uninstalling YAC as the process may be difficult. If a prompt appears, click Uninstall YAC, then click the Uninstall button, then choose a reason for uninstalling the malware, and click the new Uninstall button.
Some versions of YAC software do now show buttons when uninstalling the software. If this is the case, viewers have suggested to use the video below as a guideline in order to click the screen in the appropriate locations to perform the appropiate tasks to remove this pesky software.
Related Articles & Troubleshooting
In some cases YAC malware will reinstall itself. If this is the case there are several options to remove Yet Another Cleaner listed below, as well as instructions to remove similar rogue software.
‘Operation Hangover’ hackers exploit latest Windows zero-day
Indian gang ups its game with targeted attacks that rely on malicious Word docs
By Gregg Keizer
November 7, 2013 10:47 AM ET
Computerworld – The unpatched vulnerability in Windows that Microsoft acknowledged on Tuesday has been used by a known Indian hacker group responsible for earlier "Operation Hangover" attacks, security company Symantec said yesterday.
The gang behind Operation Hangover is believed to be based in India, and the bulk of the first round of cyber-espionage attacks, which were discovered in May, were aimed at its neighbor and long-time adversary Pakistan.
"After analyzing the payloads being used in this attack, we have identified that the targeted emails are part of an attack campaign known as Operation Hangover," Symantec said in a blog, referring to the newest campaign that relies on the Microsoft zero-day vulnerability to hijack and infect Windows PCs.
Microsoft issued a security alert Tuesday, saying that a vulnerability in the TIFF image-format parsing component of Windows was being exploited in attacks aimed at targets in the Middle East and South Asia, the latter region representing countries like India and Pakistan.
The attacks Symantec captured used malicious Word documents attached to emails with subject headings such as "Illegal Authorization for Funds Transfer" and "Problem with Credit September 26th 2013."
It was the first time that the Hangover group has used a zero-day vulnerability in its attacks, Symantec said.
Researcher Haifei Li of security company McAfee was the first to find and report the unpatched bug to Microsoft. The Redmond, Wash., company’s security team was alerted of the vulnerability Oct. 31.
According to Li, the exploit uses multiple XML objects to "spray the heap memory," a technique more than a decade old, to uncover sections of memory suitable for use by the actual attack code.
"It is worth [noting] that this heap-spraying in Office via ActiveX objects is a new exploitation trick which we [haven’t] seen before," Li wrote earlier this week.
Microsoft’s own researchers confirmed the ActiveX-based head-spray tactic in a detailed description published on its Security Research & Defense blog Tuesday.
This article, ‘Operation Hangover’ hackers exploit latest Windows zero-day, was originally published at Computerworld.com.
How to Diagnose a Computer Problem
Edited by Cameron, Brandywine, R1zen187, Username152 and 11 others
Many people are faced with everyday computer problems that are easy to fix, but are unable to diagnose the actual problem. While there are many problems a computer will be faced with, this article will tell you where to look for common problems.
1Check the POST. POST stands for Power On Self Test. This is generally the first or second thing that appears on a computer after turning on the power. This appears before the operating system begins to load. The POST will display any problems found with hardware that makes the computer unable to boot, POST may also display problems with hardware that allow the computer to boot, but not operate at its full capacity during operation.
2Notice the load time of the OS (operating system). A longer than usual load time may indicate seek errors (or other errors) in the hard drive.
3Notice any graphics problems once the OS has loaded. Reduced graphics may indicate driver failures or hardware failures with graphic cards.
4Perform an auditory test. An auditory test is an unorthodox, but still effective way of judging how hard a computer is working. With the computer on and running, play any decent length audio file (usually above 30 secs). If the audio is choppy or slow, it usually means that the processor is working at an elevated level, or there is not enough RAM to run all programs loading. Changing the startup sound is a great way to apply this test. Another issue associated with choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the hard drive reads and writes data from a drive. Switching to DMA allows for faster reads and writes, and can sometimes repair choppy audio.
5Check any newly installed hardware. Many operating systems, especially Windows, can conflict with new drivers. The driver may be badly written, or it may conflict with another process. Windows will usually notify you about devices that are causing a problem, or have a problem. To check this use the Device Manager, this can be accessed by entering the Control Panel, clicking the System icon, clicking the Hardware tab, and clicking on Device Manager. Use this to check and arrange the properties of hardware.
6Check any newly installed software. Software may require more resources than the system can provide. Chances are that if a problem begins after software starts, the software is causing it. If the problem appears directly upon startup, it may be caused by software that starts automatically on boot.
7Check RAM and CPU consumption. A common problem is a choppy or sluggish system. If a system is choppy it is good practice to see if a program is consuming more resources than the computer can provide. An easy way to check this is to use the Task Manager, right click on the taskbar select Task Manager, and click the Processes tab. The CPU column contains a number that indicates the percentage of CPU the process is consuming. The Mem Usage column indicates how much memory a process is consuming.
8Listen to the computer, if the hard drive is scratching or making loud noises, shut off the computer and have a professional diagnose the hard drive. Listen to the CPU fan, this comes on a high speed when the CPU is working hard, and can tell you when the computer is working beyond its capacity.
9Run a virus and malware scan. Performance problems can be caused by malware on the computer. Running a virus scan can unearth any problems. Use a commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus) and a commonly updated malware scanner (such as Spybot Search & Destroy).
10Check for the problem in safe mode. As a last ditch effort, check the problem in safe mode. To enter safe mode, tap F8 repeatedly during POST (this works on most systems). If the problem persists in safe mode, it is a fair bet that the operating system itself is to blame.
This article was taken from the following site: http://www.wikihow.com/Diagnose-a-Computer-Problem
MUST READ: Ubuntu 13.10 Review: A great Linux desktop gets betterTopic: Ubuntu Compare Follow via: RSSEmail Alert98Comments17 Votes19inSharemore +Ubuntu 13.10 Review: A great Linux desktop gets betterSummary: Ubuntu 13.10 may not be the most exciting desktop Linux, but it is very solid and contains many useful new features.By Steven J. Vaughan-Nichols for Linux and Open Source | October 10, 2013 — 17:47 GMT 10:47 PDTMany hardcore desktop fans still havent forgiven Ubuntu for switching to its Unity interface. Others dislike how Canonical, Ubuntus parent company, has gone its own way with such technical issues as working on the Mir display stack instead of the more mainstream Wayland. And, some people dislike how Ubuntu is combining "local" searches with Web searches. So what!Ubuntu 13.10 launches next week. Heres an early review.Heres all that really matters. Back in April 2011, Ubuntus founder, Mark Shuttleworth said that the purpose of Ubuntus new path was "to bring the joys and freedoms and innovation and performance and security that have always been part of the Linux platform, to a consumer audience." Hes done it.Sure, Ubuntu 13.10 Saucy Salamander, which has just gone into its final release candidate stage, isnt a desktop Linux that a Linux techie who still compiles his or her kernels from source code can love. But, its not meant to be that kind of desktop.See SlideshowUbuntu 13.10: A desktop tourRead moreIts meant to be a Linux desktop that anyone, say my now 81-year old mother-in-law can use. From that standpoint Ubuntu has been a success and this one week from final release version is even more of a win for people who just want to use a computer without tears.To see how it was doing this time, Ive been running the Ubuntu beta and the release candidate on two test systems. The first test box was my 2007 Dell Inspiron 530S, which is powered by a 2.2-GHz Intel Pentium E2200 dual-core processor. This PC has 4GBs of RAM, a 500GB SATA Serial ATA drive, and an Integrated Intel 3100 GMA Graphics Media Accelerator chip set. The second was a 2008-vintage Gateway DX4710. This PC is powered by a 2.5-GHz Intel Core 2 Quad processor, 6GBs of RAM, a 1TB SATA drive, and an Intel GMA 3100 for graphics.Installation was a cinch on all these systems. While I didnt try to install Ubuntu on a system locked down with Windows 8 Secure Boot, there are good instructions on how to put Ubuntu on Windows 8 PCs and other systems that use Unified Extensible Firmware Interface UEFI.One nice new feature about the installation is that during it, youre asked to either login or open a free Ubuntu One cloud service account. Ubuntu One is a Dropbox-like storage service which comes with 5GBs of no-cost storage. The commercial version, at $39.95, gives you 20GBs of storage and music streaming. While this service works hand-in-glove with Ubuntu you can also its storage from Windows, Mac OS, Android and iOS.The first thing I noticed once I had it installed was that on both of these older systems, Ubuntu 13.10 ran like a top. If you have an older PC of your own and youre concerned about its fast approaching XP expiration date, keep in mind that Ubuntu, and other easy-to-use Linux distributions such as Mint run just fine on hardware that Windows 7 and above might find too slow.Looking under the hood, heres what I found. First, the Saucy Salamander is running the Linux 3.11 kernel.