CHAPTER 12 • Doh! 223 THREE-FINGER SALUTE

Total Page:16

File Type:pdf, Size:1020Kb

CHAPTER 12 • Doh! 223 THREE-FINGER SALUTE Okay, I’m sure Windows has never crashed on you or caused you any problems; but when (I mean if) you ever do have a Doh! troubleshooting . smash forehead on keyboard to continue problem, it’s your fault. Please step away from the computer. You clearly have no idea what you’re doing. Just kidding! You can sit back down. There’s just nothing good about troubleshooting. We don’t want to do it and feel that we shouldn’t have to anyway. My computer’s supposed to work perfectly—all the time! It’s not as if I did anything to cause this. (Keyboards are supposed to be waterproof, right?) Well, I have only two pieces of advice when it comes to troubleshooting. First, be patient; whatever the problem, you can fix it. Secondly, don’t actually smash your forehead on the keyboard. It doesn’t work. I’ve tried it. I just got a nasty bump and it didn’t fi x a thing. CHAPTER 12 • Doh! 223 THREE-FINGER SALUTE Folks, if you remember only one keyboard shortcut in XP, this is the one, because even- tually you’re gonna need it. This tip is truly for those of you who are new to Windows. Everyone else who’s been using Windows for at least six months has already learned the Windows Ctrl-Alt-Delete three-finger salute. This is not what I’d consider a killer tip; how- ever I just wouldn’t feel that I was doing my job if I didn’t include it. It’s been too much a part of my life to leave out. So, here we go. Believe it or not, eventually a program might freeze on you or Windows will just inexplicably stop responding. When this happens, press Ctrl-Alt-Delete on your keyboard. This opens the Windows Task Manager. Now, click the Applications tab in the dialog box and select the program that’s not responding, then click End Task. If this still doesn’t do the trick, you can shut down by clicking Shut Down>Restart on the Task Manager’s Menu Bar. WHERE’S MY SCANDISK? I I was probably using Windows XP for about two weeks before I I went looking for the comfort of my trusted ScanDisk. I thought I was going to be sick—I couldn’t find it. ScanDisk wasn’t there. Well, I’m here to save you from going through this trauma. ScanDisk isn’t included in Windows XP; instead you get the improved Check Disk tool. You can use the Error- Checking tool to check for system file errors and bad sectors on your hard drives. To use Check Disk, click Start>My Computer, then right-click the hard drive you want to check, and click Properties on the Shortcut menu. Next, click the Tools tab in the dialog box and click Check Now (under Error Checking). 224 CHAPTER 12 • Doh! KNOWLEDGE CAN MAKE YOU SMARTER Without a doubt, the best feature in the Help and Support Center is its online access to Microsoft’s Knowledge Base. The Knowledge Base is Help on steroids—its über-Help. Just about any kind of problem you’re having with Windows has probably been addressed here. Which is great, but what’s really useful is its hidden power. You can use the Knowledge Base to find help for practically any software title that Microsoft develops. Here’s how: Click Start>Help and Support and click the Set Search Options link directly under the Search text box. Next, click to expand the menu for Microsoft Knowledge Base and select the program that you need help with. Now, uncheck Suggested Topics and Full-Text Search Matches to search only the Knowledge Base, then type a search term, and click the Start Searching arrow button. There ya go, instant help for all of your favorite software. Just keep in mind that you must be online to search Microsoft’s Knowledge Base. CHAPTER 12 • Doh! 225 AM I CONNECTED? There’s a really quick way to tell whether your connection to the Internet or network is active: View its status in the Taskbar’s Notification area. Click Start>My Network Places and click View Network Connections under Network Tasks. Next, right-click the Local Area Connection or any network icon and click Properties on the Shortcut menu. Check Show Icon in Notification Area When Connected, and then click OK. Now, you can view your network connections on the Taskbar. You’ll never be left hanging again. If your Web page isn’t loading or if you’re not able to access files on the server, you’ll know whether it’s your computer melting down, or it’s simply a bad connection. And you’ll know it instantly, as both monitors on the Connections icon light up when the connection is active. You won’t have to stare at a blank Web page or watch your hourglass spin for five minutes before figuring out that you may not be connected. GIVE IT A BOOST Remember when Mom would remind you to clean your room? You hated it, didn’t you? Well, I’m here to bring back the good ol’ days because I’m definitely gonna get after you to clean your computer. Over time, your computer can get cluttered with all kinds of junk, much like toys under the bed and dirty clothes in the closet— you can’t necessarily see the mess, but it’s there. Disk Cleanup can free up a ton of space by searching your hard drive for files, such as unnecessary program files, temporary files, and cached Internet files, and deleting them. To run Disk Cleanup, click Start>All Programs> Accessories>System Tools>Disk Cleanup For, then select the drive you want to clean, and click OK. The search will return a list of files that can be deleted safely. Click OK to delete the files. 226 CHAPTER 12 • Doh! FEELING SLUGGISH? If Windows begins to get sluggish, you probably need to defrag your hard drive. As you install and remove programs, add files and delete files, your hard drive can become a little fragmented—this means that parts of your files and Apps become a little scattered on your drive. This makes your hard drive take longer to locate files and respond more slowly. You can get Windows back up to speed by running Disk Defragmenter and getting your files back together. Here’s how: Click Start>All Programs>Accessories>SystemTools>Disk Defragmenter. Now, select the drive you want to defrag and click Defragment. Oh, by the way, it’s a good idea to plan your vacation around this—it might actually be finished when you get back. In other words, it takes a long time. WE’RE COMPATIBLE You love XP, but you’re simply devastated that you can no longer run your favorite game—Invasion of the Mutant Space Bats of Doom, an actual game made for Windows 95. Well, bring back the Bats! They can invade once again. You’ve just got to make your old game compatible. You can get older games and programs to run on XP by using the Program Com- patibility Wizard. The Wizard lets you test your older programs in different Windows environments; in other words, if you have a program designed to run in Windows 95, then you can set its compatibility mode to Windows 95 so that it runs in XP. To set a program’s compatibility, click Start>All Programs>Accessories>Program Com- patibility Wizard. When the Wizard opens, simply follow the instructions to select your program and set its compatibility. CHAPTER 12 • Doh! 227 IT COULD BE HUNG UP Have you ever tried to launch a program and nothing happened. Tried it again—nothin’! Again—nothin’! Well, don’t start reinstalling the program just yet. It might simply be hung up. The next time this happens, press Ctrl-Alt-Delete to open Task Manager. Click the Processes tab in the dialog box, select the App that you were trying to launch, and click End Process. Now, try to launch the program again. SAVE SEARCHES You go through a lot of trouble to search for something on your computer. You may have to perform several different searches using various keywords to find what you’re looking for. Of course, just as soon as you close the search window, you wish you hadn’t, because you can’t remember where the file was, and you can’t remember how you found it to begin with. Well, that bites! Fortunately, this will never happen to you again, because you’re going to save your search results. Here’s how: Click Start>Search and perform a search (for whatever). Once you’ve found the desired results, click File>Save Search on the Menu Bar. Now, pick a location on your hard drive to save your search results and click Save. 228 CHAPTER 12 • Doh! HELP AND SUPPORT FAVORITES You already know how frustrating and time- consuming locating files using Search can be, but have you ever searched for info using XP’s Help and Support Center? Oh yeah, this is user friendly! You could be digging for hours before you find what you’re looking for. Apparently the developers at Microsoft knew this, because they were kind enough to give Help and Support its own Favorite—I bet you never noticed it. Try this: Once you’ve finally finished a search, don’t close the window; you’ll never find it again.
Recommended publications
  • Microsoft Update Blue Screen Error Fixing BSOD
    kyoceradocumentsolutions.us Microsoft Update Blue Screen Error Fixing BSOD March 2021 Microsoft Update Blue Screen Error What is causing the Blue Screen error when I print using the KX Driver? Kyocera as well as many other companies began getting reports of Blue Screen of Death (BSOD) incidents when printing. Microsoft released 2 updates this week, KB5000802 and KB5000808. The updates caused the crash. What has Microsoft done since this was reported? Microsoft has removed both updates from the automatic pushed update list. If your PC has not yet downloaded the update it will not install them. If you manually update your system from within Windows Update the 2 problem updates are still there and can be manually selected and installed. Do not do that until a complete fix is released if your PC is used for printing. Microsoft has left them up for manual install for users that have systems not used for printing. How do we fix a PC that has already been updated? The best solution is to uninstall the 2 Updates. Follow the directions below and remember to reboot when done. 1. Open a Command Prompt with Administrator rights. Click on the Start button and type cmd. The following will be displayed. 2 Microsoft Update Blue Screen Error 2. Click Run as Administrator on the right to open the Command Prompt Window. Accept the prompt to open with elevated rights and make changes to the computer. 3. In the Command Prompt enter the following command and press enter. – wusa /uninstall /kb:5000802 4. The Stand alone install will launch and remove the Update.
    [Show full text]
  • Hang Analysis: Fighting Responsiveness Bugs
    Hang Analysis: Fighting Responsiveness Bugs Xi Wang† Zhenyu Guo‡ Xuezheng Liu‡ Zhilei Xu† Haoxiang Lin‡ Xiaoge Wang† Zheng Zhang‡ †Tsinghua University ‡Microsoft Research Asia Abstract return to life. However, during the long wait, the user can neither Soft hang is an action that was expected to respond instantly but in- cancel the operation nor close the application. The user may have stead drives an application into a coma. While the application usu- to kill the application or even reboot the computer. ally responds eventually, users cannot issue other requests while The problem of “not responding” is widespread. In our expe- waiting. Such hang problems are widespread in productivity tools rience, hang has occurred in everyday productivity tools, such as such as desktop applications; similar issues arise in server programs office suites, web browsers and source control clients. The actions as well. Hang problems arise because the software contains block- that trigger the hang issues are often the ones that users expect to re- ing or time-consuming operations in graphical user interface (GUI) turn instantly, such as opening a file or connecting to a printer. As and other time-critical call paths that should not. shown in Figure 1(a), TortoiseSVN repository browser becomes unresponsive when a user clicks to expand a directory node of a This paper proposes HANGWIZ to find hang bugs in source code, which are difficult to eliminate before release by testing, remote source repository. The causes of “not responding” bugs may be complicated. An as they often depend on a user’s environment. HANGWIZ finds hang bugs by finding hang points: an invocation that is expected erroneous program that becomes unresponsive may contain dead- to complete quickly, such as a GUI action, but calls a blocking locks (Engler and Ashcraft 2003; Williams et al.
    [Show full text]
  • How to Fix a Frozen Windows PC
    How to Fix a Frozen Windows PC Mashka/Shutterstock.com Windows PCs freeze for a variety of reasons. One instance might be a fluke, but repeated freezes suggest a problem you’ll want to fix. Here’s how to unfreeze and recover a stuck PC—and stop it from freezing again. How to Speed Up a Slow PC Volume 0% How to Unfreeze a Frozen Windows PC There are several ways you can recover your frozen PC, depending on what caused the problem. Sometimes, all you have to do is wait a few seconds—the PC might get hung up while doing some work and unfreeze itself a few seconds later. If a full-screen application, like a game, freezes and prevents you from leaving it, press Alt+F4. This closes the application if the game is just experiencing graphical problems, but it won’t work if the application has frozen completely. To see if the computer is still responding, press Ctrl+Alt+Delete. From this screen, you can open the Task Manager (and close any running applications), or log out of or restart your PC. If this screen doesn’t appear, you might not be able to recover your PC without rebooting it. If you can open the Task Manager, you might be able to recover from the freeze. (You can also press Ctrl+Shift+Esc to open the Task Manager.) Select the “Processes” tab—if you don’t see it, click “More Details.” Locate any processes using a lot of CPU—you can click the “CPU” column header to sort by CPU usage and see the most demanding processes at the top of the list.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • What Is an Operating System III 2.1 Compnents II an Operating System
    Page 1 of 6 What is an Operating System III 2.1 Compnents II An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Memory management Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. This ensures that a program does not interfere with memory already in use by another program. Since programs time share, each program must have independent access to memory. Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system. Memory protection enables the kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including memory segmentation and paging. All methods require some level of hardware support (such as the 80286 MMU), which doesn't exist in all computers.
    [Show full text]
  • Acronis True Image for Western Digital
    Acronis True Image for Western Digital USER GUIDE Table of contents 1 Introduction ....................................................................................................................5 1.1 What is Acronis True Image for Western Digital? ..................................................................... 5 1.2 Backups created in Acronis True Image ..................................................................................... 5 1.3 System requirements and supported media ............................................................................. 6 1.3.1 Minimum system requirements .................................................................................................................... 6 1.3.2 Supported operating systems ........................................................................................................................ 7 1.3.3 Backing up all data on your PC ....................................................................................................................... 7 1.3.4 Supported file systems .................................................................................................................................... 8 1.3.5 Supported storage media ............................................................................................................................... 8 1.4 Installing Acronis True Image for Western Digital ..................................................................... 9 1.5 Activating Acronis True Image for Western Digital .................................................................10
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Pure User Mode Deterministic Replay on Windows
    Pure User Mode Deterministic Replay on Windows Atle Nærum Eriksen Thesis submitted for the degree of Master in Informatics: programming and networks 60 credits Department of Informatics Faculty of mathematics and natural sciences UNIVERSITY OF OSLO Autumn 2017 Pure User Mode Deterministic Replay on Windows Atle Nærum Eriksen August 1, 2017 Abstract The ability to record and replay program executions has many interesting applications such as debugging in the backwards direction, discovering and fixing the source of non-deterministic bugs and data races and retracing the steps of a system intrusion. Unfortunately, the power of deterministic replay tools is underutilized by the general public as the tools are either too difficult to deploy or unable to fulfill the performance and log size requirements of the user. As it happens, the majority of the research has been aimed at implementing such tools for Linux, and other platforms, including Windows, have mostly been neglected. In this thesis we look at whether it is possible to implement a determin- istic replay tool for the Windows platform that is easily deployable (user mode only without operating system support { this entails no OS modifi- cations or drivers), can record all system calls and their side-effects (even if unknown), works on large programs (1 GB+ RAM), and has a high recording performance (≈2x slowdown). We found that the challenges deterministic replay tools are facing in user mode are exacerbated on Windows due to a lack of documentation and a more restrictive API. Despite this we came up with a design proposal that solves all the problems necessary to implement a deterministic replay tool that satisfies all our requirements for the Windows platform.
    [Show full text]
  • Errors and Error Checking in Windows
    Errors and error checking in Windows Higham and Rushden U3A Let’s first of all look at probably the most serious but least common: Total Windows failure Earlier versions of Windows used to crash much more frequently than they do today, usually accompanied by the very unfriendly Blue Screen of Death (BSOD) shown on the left below, and/or one of the other error messages shown. Windows 10 has moved on from there. Apart from anything else the screen is a much friendlier blue and it has a nice emoticon as well! Joking aside, the blue screen in Windows 10 is normally followed by the PC restarting and quite regularly the machine will boot up normally as Windows has adjusted some settings in the background. It probably doesn’t do any harm to make a note of the error details at the bottom of the screen in case the restart fails to solve the problem, but any solutions you find online are likely to be complicated and technical, and may well contradict other suggested fixes. Be warned! Also be aware that the restart process may take a while. Other errors and warnings are often generated by User Account Control, which is Windows’ way of trying to keep you safe, so turn it off at your peril. When a background program tries to do something, Windows will often ask you if you want it to do that. This program was downloaded, so unless you are absolutely certain that you downloaded it deliberately, and have just clicked on it to start it or make changes, it is probably safer to say “no”.
    [Show full text]
  • Critical Vulnerabilities Bulletin
    January 18th, 2021 Critical Vulnerabilities Bulletin Confidential | Cyberint Copyright © All Rights Reserved 2020 CRITICAL VULNERABILITIES BULLETIN | INDUSTRY SECURITY BULLETIN JANUARY 14, 2021 EXECUTIVE SUMMARY Due to an unusual increase in Critical vulnerabilities found on Windows operating systems, Cyberint's Research Team has decided to release this bulletin to alert our customers of the potential impact. This bulletin will be expanded at the end of the month, as part of the Monthly Vulnerability bulletin we plan on releasing. The reason for this bulletin lies at 2 newly discovered vulnerabilities: 1. <No CVE assigned yet> - Corrupt NTFS OS partition without user interaction. 2. <No CVE assigned yet> - Trigger a BSOD by trying to access a system path. 3. CVE-2020-1398 - Potential bypass of Bitlocker protected systems, including Lock Screen bypass. We suspect that threat actors and updated malware may attempt to exploit these vulnerabilities to further impact potential victims. Confidential | Cyberint Copyright © All Rights Reserved 2020 2 CRITICAL VULNERABILITIES BULLETIN | INDUSTRY SECURITY BULLETIN JANUARY 14, 2021 NTFS CORRUPTION VULNERABILITY Published by a known vulnerability researcher, jonasLyk, it is possible to cause disk partition corruption by executing a cd command as a low privilege user, to a unique path, which causes the Windows Operating System to alert the user to a corrupted partition and force a restart. Whilst technical details are scarce, and the exact reason for the issue being unknown at this time, affected Windows builds using the NTFS file system include those from 1803 all the way to 20H2. According to SANS, the $bitmap is an attribute reserved for files marked as deleted, while $i30 is marked as an NTFS index attribute.
    [Show full text]
  • MTA Windows Operating System Fundamentals Course
    MTA Windows Operating System Fundamentals Course Session 1 Section A: Introduction Windows Operating System Microsoft Certification Paths Knowledge Domains Exam Prerequisites Taking the Exam Exam Preparation Tips Section B: Windows OS DOS, the Precursor DOS Screens Windows 3.1 Windows 95 Windows NT Windows 7 Windows Evolution Basic OS Architecture Rings in Windows Section C: Windows Interfaces Identifying Windows Interfaces Desktop/Taskbar GUI Overview Command Prompt PowerShell Section D: Planning Installations Exploring OS Editions Edition Upgrades OS Requirements Determining Requirements PC Upgrade Advisor Upgrade Paths Section E: Advanced Installation Topics Application Compatibility Topics Planning for Upgrades Installation Types Product Identification Keys Virtualization Virtualization Types Section F: Desktop Features Configuring Start Menu Customizing Start Menu Adding Administrative Tools Configuring Taskbar Notification Area Section G: Configuring the Interface User Profiles Gadgets Changing Display Settings Aero Session 2 Section A: Using Native Applications Notepad WordPad Calculator Internet Explorer Gallery Snipping Media Center and Player Section B: Configuration Settings Msconfig General Settings Boot Config Services Tab Blue Screen of Death Tools Tab System Information App Section C: The Control Panel Applets Control Panel Categories Control Panel Views Super Control Panel Section D: Control Panel Applets Control Applets Ease of Access Center Default Programs
    [Show full text]
  • Recovering from Operating System Crashes
    Recovering from Operating System Crashes Francis David Daniel Chen Department of Computer Science Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign University of Illinois at Urbana-Champaign Urbana, USA Urbana, USA Email: [email protected] Email: [email protected] Abstract— When an operating system crashes and hangs, it timers and processor support techniques [12] are required to leaves the machine in an unusable state. All currently running detect such crashes. program state and data is lost. The usual solution is to reboot the It is accepted behavior that when an operating system machine and restart user programs. However, it is possible that after a crash, user program state and most operating system state crashes, all currently running user programs and data in is still in memory and hopefully, not corrupted. In this project, volatile memory is lost and unrecoverable because the proces- we use a watchdog timer to reset the processor on an operating sor halts and the system needs to be rebooted. This is inspite system crash. We have modified the Linux kernel and added of the fact that all of this information is available in volatile a recovery routine that is called instead of the normal boot up memory as long as there is no power failure. This paper function when the processor is reset by a watchdog. This resumes execution of user processes after killing the process that was explores the possibility of recovering the operating system executing when the watchdog fired. We have implemented this using the contents of memory in order to resume execution on the ARM architecture and we use a periodic watchdog kick of user programs without any data loss.
    [Show full text]