Saturday, July 31, 2010

Monitor cleaning and maintenance

0 komentar
In previous posts I have discussed how knowing the damage indicator on the monitor, and the opportunity this time, I will discuss how to perform maintenance and cleaning of the monitor so that the possibility of damage could be mitigated and controlled. Here are some steps you can do:

a. Screen and casing should be frequently cleaned from the dust that often occupy and stack that caused the screen looks dirty and unclear. Use a soft cloth. If necessary, use a special fluid to the tube or LCD screen.

b. To prevent premature failure of power supply on the monitor, use power-management features in the display properties sheet or power management to monitor the condition of low-power standby mode after a period (between 10-15 minutes) and metikan after 60 minutes. Use of this feature is much better than using a switch ON / OFF if the computer will be left for a moment.

c. Ensure adequate ventilation the monitor to get on the side, rear, and up, because the monitor uses only passive cooling. Lack of air flow will affect the life of the monitor.

d. Keep monitoring the position of objects that contain magnets, such as speakers.

e. Keep out of reach of children and avoid the monitor not to get wet.
»»  read more

Thursday, July 29, 2010

Indications Problems on monitors

0 komentar
Damage to the monitor mostly occur because the components inside the monitor that is experiencing aging or worn. Typically, repairs can only be done by replacement of components damaged by people who are skilled repair the monitor. Here is a signal or causes damage caused by multiple symptoms that often occur:

1. There is not any image on the screen caused by the connector from the monitor is not connected to the VGA card or connectors are not installed properly. Make sure the connectors of monitors have been installed properly and correctly in the appropriate slot on the VGA card that is located behind the casing.

2. Damage to the power supply monitors the following symptoms:
a. Indicators monitor power off and the screen dark.
b. Screen images appear wavy.
c. Images on the screen to vibrate.                                                                                                            Ilustration: Monitor Touch Screen
d. Monitors often die suddenly during use to work.
e. monitors often live and die a sudden for some time.

3. Damage to the horizontal part of the monitor cause the following symptoms:

a. Life indicators monitor power, but a dark screen.
b. Images on the screen too far to the left or right.
c. Figure wide to the right and left.
d. Images on the screen visible lines.
e. Images on screen look too contrast.
f. Images on the screen is not the focus.
g. Images on the screen seemed dim.
h. Picture looks curved at the edge of the left and right on the screen.

4. Damage to the vertical part of the monitor cause the following symptoms:

a. Preview screen looks down-up did not stop.
b. Preview screen was shortened to the middle.
c. Preview screen appears too to the top or bottom.
d. Preview screen was widened or elongated upwards or downwards.

5. Damage to RGB monitor cause the following symptoms:

a. There is no color on the screen.
b. Pictures seem clear on the screen.
c. Color images are not clear and the resulting dominance of a reddish color, green, or blue only.

6. Damage to the coil yoke curve or CRT monitors cause the following symptoms:

a. Raster occurred one horizontal or vertical lines.
b. Picture looks trapezoid on the screen.
c. Circular images appear on the screen.
d. Images appear skewed to the right or left on the screen.
e. Indication of power monitors to live, but the screen looks dark.

7. Damage to the tube CRT monitors (to monitor non-LCD) cause the following symptoms:
a. Indication of power monitors to live, but the screen looks dark.
b. Filament is not lit.
c. Images on the screen seemed dim and unclear.
d. At the time of the monitor off, there is light at the center of the screen like a match.
e. There blanking red / green / blue.
f. There are flecks of color on the screen.
»»  read more

Wednesday, July 28, 2010

The development and evolution of software

0 komentar
The development and evolution of the software are:
1. Pioneer era (1950-1960)
Form of software initially in the form of a connection between the inner cables into the computer. The use of computers is done directly and the results of completed computer printout. The process is done in the form of computer instructions in a sequence row in the process, among others:
a. Batch process
b. Limited distribution
c. Special manufacture

2. Stable era (1960-1980)
Computers are widely used and only affordable by the industry and the companies that had impact on software development. Multitasking and multi-user capabilities are also known as database system. Process conducted by the software on this era, among others:
a. Multitasking & Multi
b. Real time (work quickly)
c. Database program

3. Micro Era (1980-1990)
The software in this era has been developed to meet individual needs. The price of software is also readily accessible by individuals. The software can be divided into system software responsible for handling internal and application software that is used directly by users for specific purposes. Existing automation in software leads to a kind of artificial intelligence. Therefore, in this era of software development processes have the following:
a. The system began to spread to some societies.
b. Experienced intelligence software that makes users.
c. The price of each software start affordable by individuals.

4. Modern Era (2000-present)
The rise of the modern era is the era of software with a more familiar interface with the users and has spread to all the equipment that is often used in society, not only are there on a computer. Mobile alone has been equipped with software that can synchronize with PC. Even equipment such as telephones, TVs, up to washing machines, air conditioners, and microwave, has been implanted to regulate the operation of software that equipment. More sophisticated again, any such equipment has been able to connect using the software. Making software is no longer the work of a few, but many people into jobs, with multiple-stage process involving the various disciplines in its design. Level of intelligence shown by its software devices is increasing. In addition to technical problems, the software is now beginning to recognize the voice, image and video. Intelligence software in this era to make the process of their development has expanded into:
a. Media intermediary for PC networks.
b. Media liaisons between different electronic devices.
c. Graphical User Interface (GUI) that increasingly make user in use.
d. Media assistant in completing work tasks users.
»»  read more

Tuesday, July 27, 2010

Power supply & cassing Care

0 komentar
Care to extend power supply, among others:

1. Use a good stabilizer or UPS.
The use of the stabilizer, aims to keep the voltage received by the power supply remains stable. Many electronic devices damage caused by unstable voltage. Recommended for use or stabilizer which uses servo motors, and if there are no funds, we recommend using UPS.

2. Do not put the casing around the air vents.
Air circulation in the room who came in through the air vents usually carry moist air. This can cause the temperature around the casing to be moist. When moist will cause the legs of electronic components (especially IC) became rusted and finally a brief relationship occurred between the components that cause the fire.

3. Cleaning the dust (dirt) is in the power supply and chassis.
Dirt on the power supply and chassis fan sometimes causing jams or does not rotate. This can cause the power supply and hardware components inside the casing to heat faster and will cause the computer to die a sudden and do not work until the temperature inside the casing back to normal.

4. Add the fan inside the casing.
Additional fan in the casing will accelerate the air circulation inside the casing so that the computer is not fast heat and hardware components in it can work well.

To see the symptoms of damage to the power supply, please click here.
»»  read more

Saturday, July 24, 2010

Common Error Your System Is Low On Virtual Memory Fix

0 komentar
Nowadays in this modern day technology, software calls for enormous amounts of system resources and Random access memory. Microsoft Windows really does its best in order to use what you currently have installed, nevertheless, in many cases that is not really enough. Windows uses something which is named Virtual Memory. Virtual memory fundamentally is merely some assigned space which the computer will use whenever you lack ample memory (RAM). In case you are multi-tasking you might actually end up coming across an error which will declare "Your system is low on virtual memory". This article will explain a little concerning that, and offer you some relevant computer tips in order to fix this.

Your computer could possibly be running sluggish if the system is low on virtual memory, and you may need to increase it. To achieve this, you first need to know various information about your computer and operating system. Windows normally allocates a specific amount of virtual memory by calculating just how much actual RAM you have. It should then produce the page file to make use of with this particular calculation, it must furthermore take into account how much memory the operating system will need.

Another straightforward solution is to clean the hard drive up a bit as Windows will automatically try to use bits of it to set-up virtual RAM. Windows software cannot in fact differentiate between what is the actual RAM based memory and what is the Windows created "virtual memory". If you have plenty of space on your main drive, then this might easily fix the error.

Before you change the settings via your control panel, you ought to run disk defragmentation. Whenever the virtual memory is going to be placed on your hard-drive, it should work better if the bits are contiguous instead of fragmented all over.

Steps concerning how to change your virtual memory settings are listed below:

1.On the desktop right mouse click on "My Computer" the go to "properties."

2.Click on the "advanced" tab, and click the "settings" button in the performance section.

3.At "Performance Options" click on "advanced" tab

4.Click the "change" button in the virtual memory section.

5.Select the option "system managed size"

6.Click on Apply or Ok till back to desktop.

If these easy remedies do not work, another solution which is quite effective and will get rid of the error message "your system is low on virtual memory" could be to add more RAM to the system. This is not always applicable however if you are already making use of the max amount of ram authorized on your motherboard.

If this all fails and you still are getting the message "your system is low on virtual memory" you might like to take note of what you're doing when this error is happening. It could be that a program you are operating is producing a conflict within the system could be buggy or corrupted.

»»  read more

Wednesday, July 21, 2010

Models of power supply

0 komentar
Models of power supply

1. AT Models
Power supply has a power cable that is connected to the motherboard separate into two power connectors (P8 and P9) so that the voltage cabling to the motherboard must be done with more careful. Black wires of P8 and P9 connectors must meet in the middle if united. AT power supply models, the button ON / OFF button is connected directly to the casing. To turn on and off the computer, we need to press the power button on the front of the existing casing. AT power supply is used only limited to the era of Pentium II computers. In the era of Pentium III upwards or until now, there is no computer that uses power supply type AT.

2. ATX model
Power supply has a power cable connector is connected to the motherboard has become one part with the number of 20 pins and no installation errors due to form a power connector is adapted to the existing connector on the motherboard. So, if the inverted install connectors, power connectors will not be able to enter the existing connector on the motherboard. ATX power supply is equipped with a power switch, or commonly called autoshudown. So, computers can be directly switched off via software commands by pressing the Windows shut down, without pressing the off button on the casing. All computers  begin on the Pentium III  until now  using the casing and power supply type ATX.

If there are problems at power supply please go to this link to find out the problems that occurred and the solution to handle it.
»»  read more

Tuesday, July 20, 2010

Troubleshooting of Power supply

3 komentar

Troubleshooting of Power supply

Usually we think and are often considered as a problem caused by hardware components such as memory, VGA card or motherboard without a thought occurs at power suplly mistakes that we use. Here are examples of problems that occur:
  • Computer restarts alone when the system was working.
  • Computer dead after some time operated.
  • Internittent parity check or other memory-type errors.
  • Hard disks and fans are not rotating simultaneously.
  • Electric shocks felt in the casing or connector.
  • Power-on or startup failure or lockups.
  • Sometimes booting itself without spontaneous lockups during normal operation.
  • System completely dead.

Cause:
  1. This problem often occurs because the amount of voltage at power supply is not sufficient to be distributed to the hardware component.
  2. Installation / function On / Off button inappropriate or is damaged.
  3. Power cable to the motherboard broken off.
  4. Fan does not turn on the power supply, causing excessive heat on the power supply.

Solution:
  1. Make sure the power supply voltage is sufficient to replace hardware components with the power supply has a higher voltage.
  2. Replace the switch ON / OFF power supply is connected to the casing.
  3. Make sure no power cord is broken into the motherboard or other hardware component.
  4. Replace the existing fan to the power supply if it does not rotate.
  5. Replace the power supply voltage in accordance with the existing hardware components inside the casing, at least for the PIV to the ATS computer, use a power supply with a voltage of 350 watts.

Hopefully this information useful.
»»  read more

Monday, July 19, 2010

Network Configuration Management Overview

0 komentar

This guide gives a brief overview of Network Configuration Management, otherwise known as Network Change and Configuration Management, or NCCM.Why does it matter?
In a large corporate network it is not uncommon to have hundreds or thousands of network devices. If you add up all your switches, routers, firewalls and other network appliances, and then you consider how many lines of configuration settings apply to each one, you can see there is a significant investment in your networks' configuration which needs to be protected.
Contemporary network devices will not only switch and route data, but will vlan, prioritize and shape multi-media traffic in converged networks. The settings and parameters that determine how traffic is handled all forms part of the configuration of the device, and of course, it is vital that all interoperating devices are configured consistently in order to deliver a healthy and reliable network infrastructure.
Of course, the security of your network is dependent on the way your devices are configured. Corporate Governance policies all include Data Security considerations, such as Sarbanes Oxley (SOX), GLBA, NERC, PCI DSS, HIPAA, MiFID, SAS 70, ISO 27000, CoCo/GCSx Code of Connection and Basel II. These security standards have all been introduced to ensure certain minimum levels of security and integrity are maintained for company financial information and any stored personal details of customers. Your network is inherently vulnerable while default settings are used and it is vital that all known vulnerabilities are eliminated through
Therefore configuration settings for your network need to be backed up, verified for compliance with any corporate governance policy or security standard, and consistency of configs maintained across the estate.
Unapproved changes are the biggest threat to IT Service Delivery and the single most likely cause of failures in IT infrastructures. Any changes that occur outside of established tracking and approval processes are classed as Unapproved Changes and, by definition, are undocumented. No audit trail of a change being made means there is no foothold to start from when troubleshooting a problem. In fact EMA primary research has indicated that greater than 60% of all environment failures would be eliminated if unapproved changes were identified before affecting IT performance.
Unapproved changes are introduced from a variety of sources including security violations, inappropriate user activity, and administrator errors. Even a seemingly benign alteration can have far-reaching unintended consequences to IT security, performance and reliability. Over time, system configurations deviate further and further away from established standards. This is referred to as "configuration drift", and the greater the drift, the greater the risk posed to the reliability of an IT support stack.
The Network Change and Configuration Management Solution
A practical solution to address these requirements is to automate config backups and change tracking, which has given rise to the Network Change and Configuration Management, or NCCM, market.
Change and Configuration Management (CCM) is the process for minimizing configuration drift by ensuring all environment settings are approved and consistent with established standards. CCM is composed of three distinct practices: configuration management which is the creation, documentation and updating of standard settings for all supported IT components; change management which is the process for identifying and approving new configuration settings and updates; and change detection which is an ongoing process of monitoring for inappropriate changes. Achieving compliance objectives for ensuring IT infrastructure reliability requires automated solutions that address all three CCM disciplines.
How does it work?
To date, the development of network device hardware has taken place at a much faster rate than the equivalent development of network management or network configuration management software. In some respects it is understandable - Network Devices didn't need managing or configuring originally as they were black boxes that either passed data or not. It was only with the advent of shared network infrastructures such as Ethernet that the configuration of addresses and protocols became necessary and some consideration made of the network topology to cater for traffic flows and volumes.
Simple Network Management Protocol (SNMP) came to the fore as a technology to address the need for performance, security and accounting statistics from the network, and at the same time, provide a means of changing the configuration of a network too.
As a standard however, anyone who has used SNMP will know that it is anything but consistent in all but the most basic statistics. It is common to find that the manufacturers' 'Management Information Database' or MIB will purport to support certain performance metrics, only to find that different devices from the same manufacturer do not consistently report information via the MIB.
It is a similar story when using SNMP to gather or update configuration data - your version of Cisco Works may work well at backing up your 2950 switch configs but when you next upgrade to 3750 switches, you may quickly find out that Cisco Works suddenly needs an upgrade (at your expense, of course - 'What do you mean, you pay annual maintenance? That is only to maintain your software, not to actually make it keep pace with product range developments!')
Fortunately there are other, more 'open' ways to gather configuration settings from network devices - using TFTP in conjunction with scripted Telnet or SSH Telnet interactions is a consistent and more easily maintained approach that can be applied to all manufacturers and all devices.
All the above change and configuration management tasks can be automated using network change and configuration management (NCCM) software solutions, the best of which will cover desktop PCs together with change and configuration management of your servers and all network devices such as firewalls, switches and routers.
All NewNetTechnologies software solutions are built using the latest technology, which means they can be fully adapted to suit all business environments. For more information on Network Configuration Management view our software solutions on http://www.newnettechnologies.com which provide 100% of the features you need but at a fraction of the cost of traditional solutions.
By Mark Kedgley
 
»»  read more

Saturday, July 17, 2010

Troubleshooting on the CD-ROM or DVD-Rom

0 komentar
Troubleshooting on the CD-ROM or DVD-Rom

On post this time I will provide information about how to solve problems on the CD-Rom or DVD-Rom. The following are some common problems:
1. CD-Rom or DVD-Rom can not be read by a computer, whereas the CD-Rom or DVD-Rom is on.
Cause:
Possibility 1: The cable data is not properly installed or tenuous, and could also be because there is a broken data cable.
Solution: Connect the data cable correctly and tightly in the connector. If not successful, replace the cable data with others or with a new cable.
2. Difficult to open and close the door of a CD-Rom and DVD-Rom
Cause:
Possibility 1: Rubber tape drive motor where the CD has been loosened or expanded.
Solution: Replace the tape with a new rubber.
Possibility 2: Motor drive where the CD or DVD for the entrance and exit is weak or not does not spin anymore.
Solution: Try cleaning the teeth of the motor and driving with alcohol. If not successful, replace it with a new engine.


Hopefully useful.
»»  read more

Thursday, July 15, 2010

Ten of Audit and Event Log Monitoring

0 komentar
Event Log, Audit Log and Syslog messages have always been a good source of troubleshooting and diagnostic information, but the need to back up audit trail files to a centralized log server is now a mandatory component of many governance standards. Contemporary, SIEM solutions need to be
• flexible enough to cater for all devices, operating systems, platforms, databases and application
• sufficiently scalable to cope with thousands of devices generating millions of events
• intelligent, correlating events and identifying true security incidents only so resources can focus on genuine threats and attacks.

»»  read more

PC hardware and Their compenents

0 komentar
The opportunity this time I will discuss about the hardware. Hardware is a collection components inside the computer that physically can be seen, touched, and felt. Collection of this device can be a computer if it has a linkage structure in each category of performance components.

Computer structure is defined as the way each computer hardware components are connected, start the process of entering data, processing data that has been entered, to generate data information as desired.

The following hardware components and functions:

A. Input devices
Computer hardware that serves as a tool to enter data or commands into a computer, such as keyboard, mouse, scanner, FDD, and optical disk drives (CD-R and RW and DVR-R, Comba, and RW).

B. Output Equipment
Computer hardware that functions as a result of display output data processing. Output can like hard-copy, soft-copy, or sound. Examples include: monitors, printers, and speakers.

»»  read more

Wednesday, July 14, 2010

Computers in General Classification

0 komentar

Computer based on the latest literature classifies four things, namely that the data is processed, use, shapes and sizes, and generation.




1. Data Processed
a. Analog Computer
Used to process qualitative data, to work continuously and in parallel. usually do not require an intermediary language. for example, computers used to measure temperature, speed of sound, and electrical voltage.
b. Digital Computer
Used for quantitative data processing (letters, numbers, combinations of letters and numbers, and special characters). typically, require an intermediary language, one example is a PC computer.
c. Hybrid Computer
combination of analog and digital computer, for example fax.

»»  read more

Definition of Computer

0 komentar
Human life in contemporary times can not be separated from technology. This technology, especially computers. in fact, many computer-based equipment that is now commonly used in society, such as personal data assistant (PDA), global positioning system (GPS), mobile computers (deksnote, laptops), mobile phones, Translantor, etc.
some experts and researchers interpret koputer as follows:
by Hamacher, "computer is an electronic calculating machine, fast and able to receive digital input information, then process it in accordance with programs stored in memory, and generate output information.

according Blissmer, "Computers are electronic devices that can perform several tasks, namely to receive input, process the input according to the instructions given, save the command and results pengelohannya, and provides an output in the form of information.

»»  read more

Archive

 

Popular Posts

Followers

PC and Laptop Service. Copyright 2011 All Rights Reserved Mohammed Yandri theme by Mohammed Yandri Converted into Blogger Template by Network Sciences

Powered by  MyPagerank.Net Free Automatic Backlink PC, troubleshooting, Tips and Tricks, computer, hardware, software. Counter Powered by  RedCounter
Free scripts

Search Engine Optimization and SEO Tools