Games
Problems
Go Pro!

Writing > Users > Mathax > 2007

Writing Resources from Fifteen Minutes of Fiction

My Computer Problems

by Mathax


The following is a piece of writing submitted by Mathax on November 4, 2007

Computer problems

Today when I tried to login to the problem site I got a shock.

This page cannot be displayed

IE said.

So I thought weird, and hit the refresh button.

And wait, and wait, and wait, and wait, and wait, and wait, and wait, and wait.

Then it says

This page cannot be displayed.

So I go to Google and type the problem site.

The first thing that pops up is the site I want so I click it and Wait^9.

This page cannot be displayed.

Sigh

So I go to Jeorgethedodo.com and wait^9

This page cannot be displayed.

So I go to fifteenminutesoffiction.com and wait^9.

This page cannot be displayed.

So at last I go to the Quote-puzzler.com and Wait^9.

And it works!

Then when I get home I find my brother has been on the problem site ALL afternoon.

So after 1 hour of fighting with it I still have know Idea what was wrong.

The following is a piece of writing submitted by Mathax on November 13, 2007
"This is what computer's Anti-Viruses do when you have two on your computer."

Anti-Viruses vs. Children

Fighting.

Always fighting.

That is what

Anti-viruses do when you,

Install two or three or more.

On one computer. Taking up memory.

Trying to remove each other.

Children fighting.

That is what children do.

when their brothers (or sisters!)

Have something that they want.

But unlike the Anti-Virus their mom tells them to stop.

To stop the Anti-Viruses

You have to bring your computer to your local computer tech.

The following is a piece of writing submitted by Mathax on November 24, 2007

My Internet Connection

My Internet is like a Child.
It has attitude problems.
It will drop me.
It will take a looooooooong time
To do what I want.

That is why I say that my internet Connection is like a child.

The following is a piece of writing submitted by Mathax on January 22, 2008
"Winter is the worst season"

I Have a Conclusion!

I Have a Conclusion!
WINTER is the worst time for a computer.
This winter I have had THREE of My own computers go down and at work at least 10. I have gotten one of mine back working (it needed a new motherboard) and another one needs a new motherboard (it's a dell!) I have not been able to figure out what is wrong with the 3rd one. I was able to put togather a computer from a lot of old computers that I have down here. I am TRYING to install windows 98 on it but it keeps locking up in random places.

The following is a piece of writing submitted by Mathax on April 29, 2009
"Yes this really took 45 minutes. Plus editing time."

Malware

I recently spent several hours becoming a certified Malware expert and I am a computer technician. I work about 10 -20 hours a week, so I have some experience. I thought I would share some of my knowledge.

To begin, I will start by describing malware. Malware is malicious software: viruses, spyware, and other garbage. Malware is very destructive. Malware exists because someone who takes time to write a malicious computer code. A malware program that looks like a legitimate anti-malware program and just 1 person in 10000 is fooled by it they could make a large amount of money.

If you do online banking or shopping, spyware will try to steal your credit card numbers and your back account numbers. Spyware is difficult to classify and sometimes appears to be legitimate software, like "anti virus 2008" or "Vista anti spyware". Programs like these will download themselves onto your computer without you asking them to. They will then "scan" your computer for malware and tell you that "you have x number of infected files. Please buy this software to clean it out." 99% of the time the program brought in the stuff it picks up, or it identifies legitimate windows files. If you buy the software it will then infect your computer more. You will also be supplying the person who designed the malware with your credit card information and they may clean out your account.

Viruses on the other hand are usually designed to cause damage to the computer and to destroy information. Viruses can spread from computer to computer across a network and can bring the whole network down. Viruses can come into the network from downloads of .exe files and other extractable files. They also come in from SPAM (junk email).

Some valid security software titles include: McAfee, Symantic's Norton Security, AVG, Trend-Micro, and CA Internet Security. There are others. I suggest that you do a Google search before you install security software from the internet just to make sure that it is legitimate.

Some free security software programs are AVG Free, and Avast. Some free Anti-Spyware programs are: Windows Defender, Malwarebytes Anti-Malware (MBAM), Super Anti-Spyware (SAS), Spybot Search and Destroy, and Adaware.

Online places that are packed full of Malware are sharing websites like LimeWire or BitTorrent. Because these websites have free sharing, people who write malware can release it online for free disguised has something else. Occasionally they build their own websites and put in lots of key words that search engines pick up and direct you to. Once there, they download their software onto your computer.

The best way to make sure your computer doesn't get infected is to make sure you have up-to-date security software. Not opening Emails that you don't know who they are from will also help.

The following is a piece of writing submitted by Mathax on November 30, 2009
"This is a Informative story I have been writing.
This has taken me about 3 months to write.
This paper is not intended to replace an experienced computer technician. I am NOT responible for the deletion of your data."

Problems with Personal Computers

Personal computers, or PCs, can be affected by a number of problems. One of the most common ones is malware (www.CA.com). Malware is a name that covers a wide range of software. It includes viruses and spyware. Viruses try to get into the computer and delete system files. Spyware tends to try to steal the personal information from the computer.


Viruses are easy to classify when they are trying to get into your computer. Like the viruses that affect humans, computer viruses replicate themselves by attacking valid programs, usually .exe files. They will sometimes use your e-mail to send themselves to everyone in your address book. Once a virus is on your computer the computer will slow down and eventually crash.


Spyware, however, has many different ways to hide. There are several different types: ad-ware, key-loggers, and rogue anti-malware software. Ad-ware is the type, pop-up where web pages show up trying to sell you something, and while being annoying, are not particularly dangerous. Key-loggers do exactly what their name sounds like they log the keys you type. This can be dangerous if you do a lot of online shopping and enter your credit card numbers. Rogue anti-malware programs look like anti-virus/anti-spyware programs. They will install themselves and then will tell you that you are infected with viruses and tell you to buy the product to clean out your computer. If you buy the product they may drain your credit card and could eventually slow the computer down so that it becomes unusable.


Trojans can be classified as either viruses or spyware. Trojans (sometimes called Trojan Horses) are programs that look like they are useful. After you install them they will then proceed to do their programming. This might be opening a backdoor in your computer for hackers to get in. It can also be as simple as changing your wallpaper. The amount of damage a Trojan can do is only inhibited by the programming skills of the programmer.


When these programs are on your computer, the machine runs slow. With some of the programs you may well have your credit cards drained. It is also an easy way for programmers to do something like trying to hack into classified files. They use your computer to do it and you get the blame. This paper is not intended as a substitute for a qualified technician and the author is not liable for any harm done to your computer if you follow these steps.


The following process for removing malware is developed by Josiah Twitchell, a computer technician for C-Prompt Computers. To begin, make sure that your computer is booting to windows. If it isn't, then you need to put the hard drive from the computer in to a caddy in another computer. Then you scan with a program called Malwarebytes Anti-Malware (MBAM) (malwarebytes.org). Click on the “full scan” and click the check box next to the drive with an E:\ (or whatever letter the hard drive is named). Another free program that you could use to scan the drive is called Super Anti-Spyware (Http://www.superantispyware.com/superantispyware.html) (SAS). After you install this program a small background protection that looks like a ladybug appears in the lower right hand corner of the screen. You need to double click it and that will open up the control panel for Super Anti-Spyware. When you are there you now need to click on the “Scan your Computer...” button and click the check box next to the drive with an E:\ (or whatever letter the hard drive is named). Let the scans run clean off the files that they find, restart the computer that has the hard drive in it and remove the hard drive. Now you can put the hard drive back into the computer and it should be booting up now.


If the computer still isn't booting then the next step (if the computer has a Windows XP Operating System) is to do a repair install of Windows. In order to do that, you need the original Windows CD that came with the computer. When you have that, put it into the CD drive. When it says “press any key to boot to the CD,” press Enter. When the computer finishes loading the files for the Windows installation, it will show a screen for either choosing “R” to enter into the Recovery Console or choose “Enter” to setup Windows. Hit Enter and then hit F8 to agree with the terms of the license. Then it will pop up with a screen that says “Windows has detected a previous installation of Windows.” If you would like to repair, press “R,” if not press Esc. DISCLAIMER: Serious loss of data will incur if these steps are not used correctly. Press “R.” It will then go through and replace all of the Windows files with the ones from the CD. If the computer still isn't booting then you need to make sure that there isn't a hardware problem.


If, however, it is booting, then you need to login and use a program called ATF Cleaner to remove the temporary files. Temporary files are where saved web pages are stored. Viruses and Spyware like to hide in the temporary files, and getting rid of them doesn't hurt the computer any. The next thing to do is to install Malwarebytes Anti-Malware and scan with it. After the scan is done you need to clean the items and restart the computer. Following the scan with MBAM you need to scan with Super Anti-Spyware. You now need to restart the computer again. The computer should be clean of malware now. If it is not, then you can run another program called Spy-Bot Search & Destroy. This program is free, but unlike MBAM and SAS, Spy-Bot has a set list of files and programs that it goes through looking for instead of types of programs to look for. Spy-Bot also doesn’t have a option to buy it for real time protection, it also doesn’t have the ability to scan a hard drive that is in another computer.


Now if there is a hardware problem, then you need to identify which part is causing it. (This is an advanced step.) The first thing to try is to boot to the Windows CD. When you put it into the CD drive and start the computer, there should be a screen that says “press any key to boot to CD.” If there isn't, then you need to go into the Bios by pressing “delete” at the first screen. Now that you are in the Bios you need to move the tab at the top over to the “boot” tab and go down to the boot sequence. You need to move your CD drive up to the top slot. Now it should show “press any key to boot to CD.” When it gets into the “Windows XP Setup,” hit the “R” to enter the recovery console. When it asks what copy of Windows to repair, hit 1 and then type in your administrative password and press “Enter”. Then type in “chkdsk /r” this will run a scan on the hard drive to test for errors.


The other test you can run is on the memory. In order to run that, you need to download the Microsoft Windows Memory Diagnostic Tool (www.softpedia.com/get/Tweak/Memory-Tweak/Microsoft-Windows-Memory-Diagnostic.shtml). Burn the file to a CD with your CD burning software. Or you can use Windows Vista or Seven (but not XP). Put the CD into the sick computer. The computer should automatically boot to the CD. If it shows errors then you need to replace your memory.


However, if your computer isn't booting at all, the first thing to see is if it beeps any before it turns on. If it does, then you need to check and see that the memory is seated in properly and that the graphics card is seated properly. BEFORE you go inside the computer to make sure everything is seated, make sure you disconnect the power cord so that you don't get electrocuted. One of the other reasons that a computer would beep and not turn on is because the Central Processing Unit (CPU) is overheating. In order to see if the CPU is overheating, you need to remove the cover from the computer and vacuum out the inside of the case. Next you need to remove the heat sink from the CPU and vacuum that out. After that you need to wipe off the bottom of the heat sink and put new heat sink compound on the CPU and put the heat sink back on. Also you need to put the side of the case back on. If the computer still isn't booting up or giving any video then you should check the power supply. The cheapest way to check that is to just replace the power supply. There are Power Supply Testers out there, but for just one use buying a new power supply is cheaper.


If that doesn't work then the motherboard is probably dead. Unless, of course, the power is out. If the motherboard is dead, then you need to find the brand and model of the motherboard. Find one online and buy it. Be careful where you buy it. Some of the sites out there aren’t legitimate. Some sites that are legitimate are Amazon.com, Newegg.com, and Ebay.com. There are other sites but these are the most well known. Then when it arrives, you need to remove the old motherboard from the computer and put the new one in. In order to remove the old motherboard, first you need to open the case. Then you need to remove all of the cables from the motherboard. You also need to remove the modem, network, sound, and graphics cards. You need to remove the memory, CPU, and heat sink from the old motherboard and attach them onto the new one. Then you need to remove all of those little screws that attach the motherboard to the case. Now you can take the old motherboard out of the case and put the new motherboard in. You need to attach the new motherboard to the case with those little screws you just removed from the old one. Now you need to attach all the cables in the proper places (see motherboard guide for details). Now you need to attach the cards and the computer is done. If it still doesn't work then you need to look into buying a new computer.



References

Twitchell, J. A. (October 2009) Personnel Interview.

(2008). Retrieved October 18, 2009, from http://salestraining.ca.com/Exams.aspx

(2009, September 10). Retrieved September 28, 2009, from http://malwarebytes.org/

What is a Trojan Horse Virus?. (2009). Retrieved October 18, 2009, from http://www.tech-faq.com/trojan-horse-virus.shtml

Landesman, M. (2006, May 31). What is a Trojan Horse Virus?. Retrieved October 18, 2009, from http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm

(n.d.). Retrieved October 18, 2009, from http://www.softpedia.com/get/Tweak/Memory-Tweak/Microsoft-Windows-Memory-Diagnostic.shtml

More writing by this author


Blogs on This Site

Reviews and book lists - books we love!
The site administrator fields questions from visitors.
Like us on Facebook to get updates about new resources
Home
Pro Membership
About
Privacy