When the printer displays menu states "low toner," it may be time to replace the toner cartridge. However, always tri to get a bit more life out of the cartridge by shaking or rocking it gently from side to side and putting it back into the printer. Check to see if the "low toner" message disappears. If it does not, then replace the cartridge with a new one as follows:
• Open the door on top of the printer and pull the old cartridge towards you to release it.
• Remove the new cartridge from its carton and rock gently back and forth to make sure the toner hasn't settled if stored incorrectly.
• Pull the plastic strip out of the cartridge (see tab on the side of the toner).
• Replace the cartridge in the printer at the same angle at which you pulled the old one out.
• Close the top door of the printer.
• Print a test page from the printer display (See instructions Onsite Test of Printer Equipment.
• Printer display menu says there is a paper jam.
• Note: Sometimes the printer display menu will say "paper jam" but it is actually indicating that the paper tray is empty.
• Opening the front and back "doors" of the printer or removing the paper tray or toner cartridge will usually allow access to the jammed paper so that it can be released.
• Paper should be removed slowly and gently so that it doesn't tear.
• Paper that is too difficult to remove should be left "as is" and reported to the HelpLine, who will dispatch the LBIS printer technician.
• Turn off the printer until it can be serviced and place an Out of Order sign on it.
See Also
printer repair
Shell Command
Quick access to programs in control panel
Fizzer Worm Targets Email, KaZaA Users
How To Enable / Disable File Sharing in Windows XP
Malware can load from a array of different places on your Personnel Computer. In addition to the more common modifications to Windows auto start entry points, malware may leverage the shell open command. This allows it to register itself as the handler for certain file types and thus the virus, worm or Trojan loads when any of these file types are called.
Following are the keys typically targeted:
• HKEY_CLASSES_ROOT\exefile\shell\open\command
• HKEY_CLASSES_ROOT\comfile\shell\open\command
• HKEY_CLASSES_ROOT\batfile\shell\open\command
• HKEY_CLASSES_ROOT\piffile\shell\open\command
• HKEY_CLASSES_ROOT\htafile\shell\open\command
• HKEY_CLASSES_ROOT\htfile\shell\open\command
The default value for each of these should be "%1" %*. If malware has registered itself as the handler, the value would appear similar to the following:
%1
where represents the filename of the malicious program.
When manually attempting removal of a virus, worm, Trojan or other malware that has registered itself as the handler in this manner, you must correct the registry value before you attempt to delete the copy of the malware. Otherwise, when you reboot your system you will not have a valid handler for these file types and the system will not load Windows.
See Also
printer technical support
windows vista sp2 : increases in free disk
Quick access to programs in control panel
Fizzer Worm Targets Email, KaZaA Users
How To Enable / Disable File Sharing in Windows XP
Following are the keys typically targeted:
• HKEY_CLASSES_ROOT\exefile\shell\open\command
• HKEY_CLASSES_ROOT\comfile\shell\open\command
• HKEY_CLASSES_ROOT\batfile\shell\open\command
• HKEY_CLASSES_ROOT\piffile\shell\open\command
• HKEY_CLASSES_ROOT\htafile\shell\open\command
• HKEY_CLASSES_ROOT\htfile\shell\open\command
The default value for each of these should be "%1" %*. If malware has registered itself as the handler, the value would appear similar to the following:
where
When manually attempting removal of a virus, worm, Trojan or other malware that has registered itself as the handler in this manner, you must correct the registry value before you attempt to delete the copy of the malware. Otherwise, when you reboot your system you will not have a valid handler for these file types and the system will not load Windows.
See Also
printer technical support
windows vista sp2 : increases in free disk
Quick access to programs in control panel
Fizzer Worm Targets Email, KaZaA Users
How To Enable / Disable File Sharing in Windows XP
Discovered on May/08/03, Fizzer (a.k.a. W32/Fizzer@MM, W32/Fizzer.A, and Worm/Fizzu.A worm) spreads via email and the KaZaA P2P network. According to antivirus vendor F-Secure, Fizzer contains a built-in IRC backdoor, a DoS (Denial of Service) attack tool, a data stealing trojan, an HTTP server and autoupdating capabilities. The worm also has the ability to disable certain antivirus programs. "This is one of the more complicated worms we've seen", comments Mikko Hypponen, Manager of Anti-Virus Research at F-Secure. "The worm is 200kB of code spaghetti, containing backdoors, code droppers, attack agents, key loggers and even a small web server!"
Fizzer culls addresses from both the Windows and Outlook Address Book and also uses random Yahoo and Hotmail addresses. "Fizzor actually creates random e-mail addresses and targets them", explains Hypponen. "This is done by picking random names and numbers and creating addresses belonging to large services such as Hotmail - these addresses might look like BOB246@MSN.COM or JACK555@YAHOO.COM."
The email message composed by Fizzer is randomly derived from a long list of internal selections and may appear in either English or German. The email attachment will also be randomly named, but will have either a .COM, .EXE, .PIF, or .SCR extension.
Fizzer also targets the KaZaA P2P (peer to peer) network, copying itself to the KaZaA shared folder under a variety of filenames. KaZaA participants who download from the shared folder on an infected machine risk receiving the infected files.
The Fizzer worm kills processes which have NAV, SCAN, AVP, TASKM, VIRUS, F-PROT, VSHW, ANTIV, VSS, or NMAIN in their name. This action disables certain antivirus tasks or programs. Affected products include the popular Norton Antivirus and McAfee VirusScan software.
Fizzer also installs a keylogging Trojan that records keystrokes to a log file which can then be retrieved through a backdoor utility also installed by Fizzer. The backdoor is accessible via IRC channels, HTTP, and Telenet. Fizzer auomatically updates itself, thus additional functionality may be added or changes made which can affect the working of the worm.
See Also
online technical support
windows vista sp2 : increases in free disk
Quick access to programs in control panel
How To Enable / Disable File Sharing in Windows XP
Fizzer culls addresses from both the Windows and Outlook Address Book and also uses random Yahoo and Hotmail addresses. "Fizzor actually creates random e-mail addresses and targets them", explains Hypponen. "This is done by picking random names and numbers and creating addresses belonging to large services such as Hotmail - these addresses might look like BOB246@MSN.COM or JACK555@YAHOO.COM."
The email message composed by Fizzer is randomly derived from a long list of internal selections and may appear in either English or German. The email attachment will also be randomly named, but will have either a .COM, .EXE, .PIF, or .SCR extension.
Fizzer also targets the KaZaA P2P (peer to peer) network, copying itself to the KaZaA shared folder under a variety of filenames. KaZaA participants who download from the shared folder on an infected machine risk receiving the infected files.
The Fizzer worm kills processes which have NAV, SCAN, AVP, TASKM, VIRUS, F-PROT, VSHW, ANTIV, VSS, or NMAIN in their name. This action disables certain antivirus tasks or programs. Affected products include the popular Norton Antivirus and McAfee VirusScan software.
Fizzer also installs a keylogging Trojan that records keystrokes to a log file which can then be retrieved through a backdoor utility also installed by Fizzer. The backdoor is accessible via IRC channels, HTTP, and Telenet. Fizzer auomatically updates itself, thus additional functionality may be added or changes made which can affect the working of the worm.
See Also
online technical support
windows vista sp2 : increases in free disk
Quick access to programs in control panel
How To Enable / Disable File Sharing in Windows XP
Windows Vista Service Pack 2 will be released in this week with new features to improve performance, bolster security, and squash bugs. But some PC World readers are seeing another welcome change to SP2.
several readers reported large increases in free hard disk space after installing Vista SP2. Mind you, I'm not talking about a gigabyte here or there; one reader claimed that installing Vista SP2 freed up a massive 40 GB chunk of disk space. Another reader said, "Wow! I didn't notice that til now. I went from about 88GB free to 122GB free. That's a significant change 'under the hood,' isn't it?" And yet another reader gained back 130 GB of hard disk space.
At least a couple users told me that their free space grew significantly after installing SP2, without them doing anything else. Vista SP2 includes a command-line cleanup tool (compcln.exe) you can run to remove older system files and restore points, thus freeing up hard disk space.
My assumption is that the Vista SP2 installer automatically runs compcln.exe, but we have yet to receive an official explanation from Microsoft. Once we do, though, I'll pass it along. Obviously your millage may vary depending on your system, but I think it's safe to say that most everyone will welcome more free disk space.
this service pack 2 contains some advanced features that improves the performance and the drivers compatibility issues.
See Also
pc technical support
several readers reported large increases in free hard disk space after installing Vista SP2. Mind you, I'm not talking about a gigabyte here or there; one reader claimed that installing Vista SP2 freed up a massive 40 GB chunk of disk space. Another reader said, "Wow! I didn't notice that til now. I went from about 88GB free to 122GB free. That's a significant change 'under the hood,' isn't it?" And yet another reader gained back 130 GB of hard disk space.
At least a couple users told me that their free space grew significantly after installing SP2, without them doing anything else. Vista SP2 includes a command-line cleanup tool (compcln.exe) you can run to remove older system files and restore points, thus freeing up hard disk space.
My assumption is that the Vista SP2 installer automatically runs compcln.exe, but we have yet to receive an official explanation from Microsoft. Once we do, though, I'll pass it along. Obviously your millage may vary depending on your system, but I think it's safe to say that most everyone will welcome more free disk space.
this service pack 2 contains some advanced features that improves the performance and the drivers compatibility issues.
See Also
pc technical support
Microsoft likes to take simple, everyday technologies and deliberately inflate them, making them seem greater than they really are Microsoft launching new software with several new features to improve the performance of the computer . these software's are fast and reliable in comparison to the other old software's. Microsoft can't let the simple utility or innovation in its software speak for itself. The company in the 1990s based its work on simplifying complexity through the interface or through integration of software, and in making computing more affordable to ordinary users and developers.
With its supposed search-engine challenger to Google, Microsoft is once again trying to make us lose touch with reality. Having finally settled on a name - Bing - Microsoft's marketing drones probably believe they've come up with a clever wheeze against Google by adopting that old trick of redefining the market and thereby defining the competition out of that market. Bing is, therefore, not a search engine, it's a "decision engine Bing was officially unveiled Thursday with the usual accompaniment of marketing collateral that Microsoft likes to line up with each new piece of software. We have fact sheets, screenshots, and the usual paid-by-Microsoft research - this time by Ipsos - to support the thesis behind calling Bing a "decision engine". Also, hoping to create demand, Bing is not yet actually available - it'll go worldwide on June 3.
According to Microsoft's paid research monkeys, the mind-numbingly obvious finding of an Ipsos poll of 1,156 people - there's no indication of who was polled, over what time frame, or what the margin of error is - is that 66 per cent of people are increasingly turning to search engines to assist in making decisions."No longer satisfied with the status quo of search, Microsoft designed Bing as a Decision Engine to provide you with intelligent search tools to help you simplify tasks and make more informed choices, from mapping out the fastest route to get home to researching a product purchase or planning a trip," Microsoft said in its Bing fact sheet.
This is not an unusual step for Microsoft. Internet Explorer 8 suffers from confused surfaces, compared to the relatively clean Firefox or Chrome. Office is packed with more features than the average user wants or even knows exist - the Office 2007 ribbon interface was a backtrack to make accessing some of these features simpler.
Behind the scenes, Microsoft's messing around with its online-maps rival to Google Maps. Live Search Maps, the consumer version, has now been re branded Bing Maps. Microsoft Virtual Earth is now Bing Maps for the Enterprise - a re branding that's utterly pointless to anyone outside Microsoft's marketing team or those watching the company.
Internet search is just that. And unfortunately for Microsoft, in the same way the desktop and office productivity markets has been shaped culturally and from a technical perspective by Windows and Office, Google has shaped the culture and technology of internet search.
Google has set the tone so much that "Googlling" someone or something has become a commonly accepted and recognized term, just like hoovering or reaching for a kleenex - even if Google does not like it.
Expect Microsoft's chief executive and other executives and evangelists inside the company to keep dropping the phrase "decision engine" at events for about six months, and then watch it slowly fade as if it never existed. This has happened before, with decision to slap .NET on every single tools and server product and then to backtrack.
IE 8 might be what Microsoft does best when it comes to new launches or attacking the competition, this is a different world.
Google succeeded thanks to the power of its search algorithms and its simple and accessible interface, and because it had time for these to spread slowly and consistently - almost virally.
For Bing to move the needle significantly against Google, and for Microsoft to change the landscape Google has shaped
See Also
microsoft technical support
With its supposed search-engine challenger to Google, Microsoft is once again trying to make us lose touch with reality. Having finally settled on a name - Bing - Microsoft's marketing drones probably believe they've come up with a clever wheeze against Google by adopting that old trick of redefining the market and thereby defining the competition out of that market. Bing is, therefore, not a search engine, it's a "decision engine Bing was officially unveiled Thursday with the usual accompaniment of marketing collateral that Microsoft likes to line up with each new piece of software. We have fact sheets, screenshots, and the usual paid-by-Microsoft research - this time by Ipsos - to support the thesis behind calling Bing a "decision engine". Also, hoping to create demand, Bing is not yet actually available - it'll go worldwide on June 3.
According to Microsoft's paid research monkeys, the mind-numbingly obvious finding of an Ipsos poll of 1,156 people - there's no indication of who was polled, over what time frame, or what the margin of error is - is that 66 per cent of people are increasingly turning to search engines to assist in making decisions."No longer satisfied with the status quo of search, Microsoft designed Bing as a Decision Engine to provide you with intelligent search tools to help you simplify tasks and make more informed choices, from mapping out the fastest route to get home to researching a product purchase or planning a trip," Microsoft said in its Bing fact sheet.
This is not an unusual step for Microsoft. Internet Explorer 8 suffers from confused surfaces, compared to the relatively clean Firefox or Chrome. Office is packed with more features than the average user wants or even knows exist - the Office 2007 ribbon interface was a backtrack to make accessing some of these features simpler.
Behind the scenes, Microsoft's messing around with its online-maps rival to Google Maps. Live Search Maps, the consumer version, has now been re branded Bing Maps. Microsoft Virtual Earth is now Bing Maps for the Enterprise - a re branding that's utterly pointless to anyone outside Microsoft's marketing team or those watching the company.
Internet search is just that. And unfortunately for Microsoft, in the same way the desktop and office productivity markets has been shaped culturally and from a technical perspective by Windows and Office, Google has shaped the culture and technology of internet search.
Google has set the tone so much that "Googlling" someone or something has become a commonly accepted and recognized term, just like hoovering or reaching for a kleenex - even if Google does not like it.
Expect Microsoft's chief executive and other executives and evangelists inside the company to keep dropping the phrase "decision engine" at events for about six months, and then watch it slowly fade as if it never existed. This has happened before, with decision to slap .NET on every single tools and server product and then to backtrack.
IE 8 might be what Microsoft does best when it comes to new launches or attacking the competition, this is a different world.
Google succeeded thanks to the power of its search algorithms and its simple and accessible interface, and because it had time for these to spread slowly and consistently - almost virally.
For Bing to move the needle significantly against Google, and for Microsoft to change the landscape Google has shaped
See Also
microsoft technical support
Subscribe to:
Posts (Atom)