answersLogoWhite

0

📱

Windows 7

Windows 7 (codenamed Blackcomb/Vienna) is a version of the Microsoft Windows operating system, and was released in July 2009. This category has questions and answers about its features, tips, and more.

2,905 Questions

What is the best registry scanner or monitor for Windows 7?

There are a vast array of highly effective registry scanners which can be used with Windows 7. Examples of good, free scanners include JetClean and Wise Registry Cleaner.

How do you make the Start bar on your computer smaller?

Pretty simple!

If it is Windows 98, pretty simple (and a couple of ways)

right-click on a blank part of the task bar, select 'properties', then look for 'show small icons in Start Menu'

Or.... else 'start' -> 'settings' -> 'taskbar & start menu' - - same thing

Can you install windows 7 on Kindle Fire?

No, they both use different processor architecture, one of the many reasons a copy of windows 7 would be incompatible with the Kindle Fire. Kindle Fires use ARM processors, mobile optimized processors. Windows 7 runs on Intel Core architecture. One way to get Intel Core software to run on ARM Architecture is through emulation, but the Kindle Fire is not nearly powerful enough to emulate this, as the basic rules of emulation say that a product must be at least twice as powerful as what it is trying to emulate to work properly.

How do you get 64 bit java?

You need a 64-bit computer with a working 64-bit operating system.

When you install java it will install the 64-bit, it will recognize you have a 64-bit computer and install it

When I turn my computer on Sticky Keys automatically turns on how do I make it not do that it's really annoying please HELP?

Click... Start > Control Panel > Ease of access centre. Untick the box where it says 'Turn on sticky keys' (Under the heading 'Make it easier to type' - Click 'Apply' - and click OK.

How do you check internet usage in windows 7?

Right-click your internet icon on the task-bar (near the clock) - and select 'open network and sharing center'. On the new screen that opens - click the blue link where it says 'Access type and connections'. This will open a small window with your connection's details on it. The Activity section (at the bottom) will detail the number of bytes sent & received.

Is dell image expert 2000 compatible with vista home premium?

I just loaded Image Expert on my new Vista based computer by opening the disk to view the files then clicking on Setup. Image Expert seems to run fine! Just inserting the disk gave me an error message. Hope this helps someone because Image Expert is a great program!

Can Windows XP and Windows 7 be installed on the same partition?

It is not possible to install any Operating System next to another on the same partition. To dual-boot Windows 7 and Windows XP, first install Windows 7, and while in the partition manager, delete all partitions and create one for Windows 7 and one for Windows XP. Then install Windows 7 to it's partition. Then install XP to it's partition. You should now be able to boot either Operating System.

Note: You must install XP after Windows 7 as the Windows 7 installation wizard would want to upgrade XP.

WARNING: This will erase all of the data on your hard drive. Be sure to back up all of your files before installing anything.

Does Microsoft word work with windows 7 64 bit?

It depends on version of word. 2003, 2007, 2010 should work just fine.

How do you install RPM packages in windows?

While RPM was originally part of the RedHat Linux distribution, RPM viewers / extractors are now available for most platforms including Windows. A search on 'RPM Viewer' or 'RPM Windows' will come up with more than a few options, such as IZArc, 7-Zip and BitZipper.

Well, RPM is the RedHat Package Manager and RedHat is a distribution of Linux. To make use of .rpm packages under Windoze one would need to run some type of virtualization (for example, VMware). RedHat Linux can then be installed as a virtual system and the .rpm package can be installed within it. The .rpm package format is somewhat of a defacto standard and many different flavors of Linux can deal with it.

How do you uninstall Microsoft loopback adapter in vista?

Right-click Computer and go to Properties. Then, click on Device Manager. In Network, you will see Microsoft Loopback Adapter. Right-click and click Uninstall. Give it sometime to do the job. You might not immediately see the change in you Network and Sharing Center. If you still see it, just reboot the system and it should be gone. Hope it helps.

How do you fix error code 0x80092003 for Microsoft fix it?

1.

You might try this. Go to the main Windows Update window and

click on "Installed Updates" (on the left-hand side of the window, at the

bottom), and then remove "Update for Microsoft Windows (KB931099)" (only).

Reboot. Reboot again. Go back to Windows Update, and re-install the same

update, by clicking on the Check for Updates button.

This should essentially re-install Windows Defender on Vista.

2.

1 Go to control Panel and click on Administrative tools.

2 Click on services and a new windows will appear.

3 Look up for windows defender and right click on it, click on

properties and select automatic, it should be on manual, change it to

automatic and click apply then o.k. and will take you back to the

services windows.

4 Windows Defender should be highlighted and on the left hand side of

the services windows, should be 2 links, click restart.

5 Close all windows and open Windows Defender, it should work without a

problem and your popup window at start up will not be display any

longer.

Can bitlocker be used to lock a folder?

Windows Bit Locker only encrypts individual drives or partitions. Encrypting File System (EFS) however does allow for individual files to be encrypted but for the most part there are many other encryption software tools that allows more diverse options.

How do you format a not recognize external hard disk?

If the computer cannot recognize an external hard disk, it would be virtually impossible to format it. There must be a problem with the hard disk. Consider replacing it or taking it ti where you bought it.

How do you take a screen shot on a pc?

if your computer (most of them) has the prt sc press it then go open a text document right click and press paste then right click the picture you just got and one of the options will say save as jpg file click it put where to save the file there you have

How do you open xml files?

XML can be opened with nearly any text editors, XML is an open standard language and anybody can define their own XML document.

Example:
The example below can be anything I will just demonstrate with the theme of a bookstore. Just say you need to store information about books and display them in a web page.


(This is the bookstore tag)
(If you wanted to catergorize your books, I choose a history tag)

(This is an example book)
Pontius Suitonius
12.12.12


(Here is another example book)
Simon Etherington
12.12.12


(The History tag closes)
(The bookstore tag closes)

NB! Comments are not used in XML, the example above uses (asdsadsa) for illustration.

What is bloodhoundexploit.281?

Based on info found from this website:

http://www.symantec.com/security_response/writeup.jsp?docid=2008-082500-0801-99&tabid=3

Discovered: August 24, 2008

Updated: October 13, 2009 7:48:39 AM

Also Known As: Trojan.Giframe [Symantec]

Type: Trojan, Worm

Infection Length: Varies

Systems Affected: Windows XP, Windows Vista, Windows NT, Windows Server 2003, Windows 2000

Bloodhound.Exploit.281 is a heuristic detection for files attempting to exploit the Microsoft GDI+ GIF File Parsing Remote Code Execution Vulnerability (BID 31020).

Files that are detected as Bloodhound.Exploit.281 may be malicious. We suggest that you submit to Symantec Security Response any files that are detected as Bloodhound.Exploit.281. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples.

Recommendations

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.

Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.

Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.

Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.

Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.

Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.

If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.

Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.

Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.

Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.

For further information on the terms used in this document, please refer to the Security Response glossary.

Hope this helps...have a blessed day. Remember God loves you...see:

John 3:16.