Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university assignment but her PC is not working properly. For example: She would like to open a single Internet Explorer window but a whole series of windows are opening up. Simone is not alone when it comes to this sort of problem. As a matter of fact, most of us will come across these kinds of problems in our life. When you fall sick you go to a doctor and he/she asks you a couple of questions as well as taking a look at your case history before giving any medication to you. In a similar way you have to find out what's wrong with your PC before treating it, if it's working in an aberrant manner. This article will help you in finding out what's troubling your PC.

The first symptom that shows us your PC has got some problem is an error message. For example you get a pop-up box on your screen, a Window message, asking you to send an error report and says the application will be subsequently closed. Error messages just tell you that something is wrong so that you can then work at getting to the cause of the problem. When you get an error message try to analyze the situation in respect to what you were doing when you received it. Write down the error code. At times error messages can be very bewildering. For example: you want to open some file but it's saying some other application is using that specific file. If you do get error messages like this then it is time to question some of your recent activities such as:

* Did you install any software or hardware recently?

* Did you install anything from the Internet?

If you have installed some software and after this your PC has become unstable, by using System Restore you can remove any system changes that were made after the last time your PC was working properly. It automatically creates restore points (or system checkpoints) when you make a change to the system. If your PC has become unstable after you made some changes, open system restore, choose a restore point, and return your computer to its previous stable state. To use the System Restore utility:

1. Click Start
2. Point your cursor to Programs.
3. Point to Accessories
4. Point to System Tools
5. Click System Restore and follow the instruction on the wizard.

If the error messages or the recent history of your PC doesn't provide much information to you, you have to explore your PC in some of the following ways:

1. Scan you system for viruses, Trojan horses, spywares or other malwares.

2. Use a Process Explorer (freeware program) tool. Windows Task Manager shows which processes and files are currently being used and how much memory they are using, but some process names aren't clear. Process Explorer not only gives all this information to you but also tells you which application started a process and which resources that particular application is currently using. It also has a potent search capability that quickly shows which processes have particular handles opened or DLLs loaded so that you can close any unwanted application. Process Explorer works on Windows 9x/Me, Windows NT 4.0, Windows 2000, Windows XP, Server 2003, and 64-bit versions of Windows for x64 processors.

3. Go through the error log file created by Dr Watson. Dr. Watson is a program that is used to help detect, debug, and log errors that are encountered while Windows or Windows programs are running. It automatically creates a text file when an error is detected. When running Windows 2000 the error is logged under the file "drwtsn32.log" or "user.dmp", and when running Microsoft Windows 95, 98 or ME the file is logged with a .WLG file extension and stored under the WindowsDrwatson or Documents and SettingsAll UsersDocumentsDrWatson folder.

4. If you are having a networking-related problem you can use a Network Diagnostics system utility tool. You can run various tests using this so that it can collect different types of information. It scans your system to see whether you have network connectivity, and whether or not your network-related programs and services are running.

By going through these basic procedures hopefully you will find out what's troubling your PC, and once that is known you can commence treatment.

Source of reference: www.microsoft.com

Priyanka Agarwal
http://www.m6.net
Hosting webhelpers

experienced cleaning professionals Northbrook ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

How to Save an Image in a SQL Server Database?

Most of the web applications have a lot of images... Read More

Digital Cameras: Hot Gear with the Coolest Features!

Cameras: still known for taking pictures but assumed as digital... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

What Exactly are Screensavers? - part II

Here are some tips on how to use screensavers:First of... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

What Exactly are Screensavers? - part I

After reading this good article you will know some important... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

Computer Viruses are Bad Luck

OK, so you caught a computer virus and your system... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Emulation Manual - A Complete Guide on How to Change Your Windows XP to Mac OS X

IntroductionMac OS X is the most technologically advanced operating system... Read More

What Has A Portable MP3 Player Have To Do With Your Business

Plenty! When we made the decision to be our own... Read More

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough?

I am going to assume that you are running windows... Read More

10 Time Saving Keyboard Shortcuts

Time is money. And when you constantly have to divide... Read More

Connect Your IPAQ to Linux

Choose Not To ConformPalm pilots and pdas are constantly growing... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

Cisco Certification: What To Expect On Exam Day

Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More

best value cleaning service Northbrook ..