Call Us Today! 256.414.597314|info@devterch.com

Blog

Uganda Tea Association

By |November 22nd, 2012|Samples|0 Comments

welcome!

Thanks for visiting our blog; we shall debate and chat about lots of issues in our field of expertise and provide you with general updates on our progress.
By |April 1st, 2011|Blog|0 Comments

Free stock icons

We have lately been doing a lot of designs and quite often you need to use some icons. If you are looking for some stock icons to use in their commercial project here are some for free. These icons are restriction-free. Feel free to use and abuse them, redistribute them, resell them, or anything else you can think of. If you like them, then thank me by linking to this blog post 🙂 Officially these icons are dual licensed under the GPL and MIT licenses. The pack includes 74 48×48px PNG icons. Download the free icons here Do not forget to leave your comments and link back to this post.

How to remove z-connect virus?

You can run antivirus and antispyware programs, but the sad fact is if you have found one virus on your computer, you probably have several. Cleaning the computer now requires you to follow these steps, because modern viruses and spyware entrench themselves in files that your computer needs in order to run: 1. Virus-check your data files (not application files– you have installer CDs for those). 2. Back up the data files, getting them off your hard drive. 3. Get your original operating system CDs that came with your computer. 4. Boot your computer from the operating system CD. 5. Select the option that erases your hard drive and then reinstall your system software. 6. Turn on your software firewall that came with your operating system. 7. Reconnect to the internet, and download *all* Windows updates, no matter how long it takes. 8. Reinstall your application software, and update the applications as much as you can. 9. Reinstall your data files. 10. Create a limited user account on your system that does *not* have administrator access, and web surf only from this account. Yes, this is a pain in the butt. No, there is no other way. No, antivirus and antispyware programs cannot fix this problem on its own. So, what do you do in the future? 1. Never click on links you find in an e-mail. 2. Never open an e-mail attachment, ever. 3. Only download files from a reputable website that you know is on the up-and-up. 4. Never use bit-torrent and other file-sharing programs. 5. Never use an unsolicited drive-checking site. 6. Turn off all java and java scripting by default, and only enable java and java scripting for sites that you know you can trust. 7. Never read an unsolicited e-mail, and delete spam immediately. It is possible to […]
By |October 30th, 2009|Virus|0 Comments

How to Uninstall McAfee or Norton antivirus and security Products

One of the most frequently asked questions I get is how to uninstall McAfee or Norton antivirus and security products. Maybe its because trial versions of these products were preinstalled when the customer purchased the computer, or maybe you want to uninstall McAfee and install another antivirus software product. Some computer users try to install an antivirus product and they are told to uninstall McAfee before they can proceed even though it appears McAfee is not running on the system. Follow the instructions below to safely remove McAfee security products including their antivirus and firewall from your computer. Removal through the Add/Remove Programs Control Panel Most of the time, you can simply remove McAfee products through the Add/Remove Control Panel. 1) Click on Start, Click on Control Panel 2) Double-click on Add or Remove Programs 3) Find the Network Associates or McAfee product listed and click on it. 4) Click on Change/Remove 5) You’ll see a screen , Place a checkmark next to each McAfee product you wish to remove and click Remove 6) You’ll see a warning message, comfirm you want to remove 7) .The removal process will start showing each program being removed, then it will ask to restart the computer. Go ahead and reboot after the removal process is finished. 8) After rebooting McAfee should be removed from your system. Some times the normal uninstall may not remove it, try the automatic uninstall instructions below to remove McAfee security products. Removing McAfee Automatically McAfee has an automatic removal program to remove the following software products when the normal removal methods fail. However It does not work with Windows 98 or Windows ME. The removal tool deletes all traces of the following products in Windows 2000 Pro, Windows XP Home and Professional, […]
By |October 30th, 2009|Windows|0 Comments

RETRIEVING YOUR SERIAL AND MODEL NUMBER/NAME

If you are a computer tech then this will me awesome for you, as getting the model and serial number can be the most tedious part of the job; whatever the reason you lost your serial number like laptop stickers rubbed off very quickly and manufacturer’s website has not been helpful then the commands am giving you are the best because within a few seconds you will know your serial and model number again. Desktops and Laptops comes with a serial number (or service tag) and a model name. If you ever loose this information, then you can use MS DOS commands to retrieve the information To retrieve serial number of the computer run the following command wmic bios get serialnumber To retrieve model name of the computer run the following command wmic csproduct get name I hope the commands do for you as we can only find drivers based on the serial number. All you have to do is go to Start > Run and then type cmd and click Open. After doing this then the information they provided worked. wmic bios get serialnumber wmic csproduct get name
By |October 30th, 2009|Windows|0 Comments

23 suggestions to improve your Windows XP performance

Since defragging the disk won’t do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers’ PCs. Best of all; most of them will cost you nothing. 1.) To decrease a system’s boot time and increase system performance uses the money you save by not buying defragmentation software — the built-in Windows defragmenter works just fine — and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer. 2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance. 3.) Ensure that Windows XP is utilizing the NTFS file system. If you’re not sure, here’s how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start; click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS: NTFS and press the Enter key. This process may take a while; it’s important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives. 4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a “searchable keyword index.” As you can imagine, this process can be quite taxing on any system. The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or […]
By |October 30th, 2009|Windows|0 Comments

MAKING AN AUTORUN CD

If for any reason you want to make an autorun CD and you have been wondering how it is done then this article is for you; • Open notepad • Write OPEN=INSTALLSetup_filename.EXE ICON=INSTALLSetup_filename.EXE • Save it but not as a .txt file but as .inf file. • Next replace the “setup_filename.EXE” with the name of the setup file. Note that some times have the “.exe” extension some have “.msi” extension, just replace the setup file. • Its almost done now, burn your CD with the autorun.inf file included • You can go ahead and test your CD now; insert it in the CD drive and wait for the autorun to begin, if nothing happens double-click on the CD drive icon.

TEN REASONS WHY YOUR PCs CRASH a MUST KNOW

Who has seen a pop up like the one below; Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening? 1 Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself. If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route: * Start-Settings-Control Panel-System-Device Manager. Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it. Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device […]
By |October 30th, 2009|Windows|0 Comments

How computer viruses are spread.

computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. The term “computer virus” is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system’s hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other […]
By |September 17th, 2009|Virus|6 Comments