Wednesday, 5 October 2016

HOW TO ASSEMBLE COMPUTER HARDWARE PARTS TO GET A COMPLETE DESKTOP SYSTEM

My experience in ICT for 19 years till date has given me an opportunity to share my knowledge on computer Assemblage, but before I begin to explain the steps on assembling computer system Unit to work together as complete system. I will not forget to highlight the following:
1.     Computer definition
2.     Components of system units

DEFINITION: A computer is an electro-mechanical device or machine that has the ability to accept, Process, retrieve and output data. This is to tell you that computer is made up of the following:
1.     Input Devices
2.     Processing Devices
3.     Output Devices
4.     Storage Devices

THE INPUT DEVICE: The input devices are those components that we use to issue command as well as input data in to the computer to process, examples of these devices are mouse, Keyboard, Magnetic Pen, Mic Joystick etc.

THE PROCESSING DEVICES: The processing devices are those devices that acts as thinking element of computer which sometimes determines the speed limit, take for instance a man acts fast depending on the capacity of his brain: if he has lower standard of brain capacity due to malnutrition or hereditary factor; it will affect his/her productivity or action. As it tends to slow down the way of does things, now the speed of a system unit is depended on the capacity of the processing unit which is known as the micro processor. Some people call it the Arithmetic and Logical Unit or control Unit. It has direct access to the memory of the computer system known as RAM which determines its speed limit.

THE OUTPUT UNITS: The output units are those units that give the visible result or end product of the inputted data in a visual forms like hard copy and they are Printer, Digital Video Projector, Touch Screen,  Visual Display Unit or Monitor etc.

(I)        THE STORAGE DEVICES: the storage Devices are the memories of the computer system which is divided in two Storage sections:
1.     The Internal Memories
2.     The External Storage devices

THE INTERNAL MEMORIES: They are the main memories of a computer system unit like:
·        Read only memory (ROM)
·        Random Access Memory (RAM)

These two memories are classified as the primary memories of a computer system Unit. Both memories has direct connection to the Micro Processor, which is a small chip attached to a mother Board component of a system unit.

(I)                ROM:  Read Only Memory as specified comprises the BIOS information and setting used to boot the computer system. The first information you see as soon as you cool boot a system units from the power button until it boots to windows are stored  in the Read Only Memory chip, you cannot manipulate the information stored here because they enable computer to function well. Users uses the programs on the ROM to solve their own problem, they cannot change it because it is statically coded.

(II)             RAM: The Ram which is still the internal Memory of a computer system unit known as Random Access Memory is where we store the information you we input in to the computer. This is where all your works or documents prepared are stored. Any information you did not save in this memory while you are working on computer is lost when power goes off because it is volatile from the manufacturing. This is where you can save and retrieve data whenever you want. Also the higher the Ram Size become, the higher the computer system speed increases. We have two type of RAM sitting in the Mother Board and they are:

(A)SIMM: which means Single In-line Memory Module: up to 32MB

(B) DIMM: Which mean Double In-line Memory Module: more than 32MB till 588MB

The difference between the two sitting is that SIMM is up to 32 megabyte while  is more than 32MB till 588MB

                                  A RAM MEMORY

EXTERNAL STORAGE DEVICES: These are external storage devices known as secondary devices attached to the mother board through the interface cards port or an interface cable which is the IDE Cables or Ribbon used to connect the Hard disk to the Mother Board, example of the external devices are:
(1)             Hard Disk
(2)             Floopy Disk
(3)             CD ROM/ DVD DRIVE
(4)             FLASH DRIVE

(1)             HARD DISK:  A hard disk is a secondary device of a system unit which has a magnetic platter and it is fragile in according to make. This is why a system engineer should handle it with care, because if it falls on a hard surface, there is tendency that it can crash immediately. It can also fail due to continue power failure or improper shutdown of the computer system or heavy file load. The hard disk comes in various sizes starting from 2.5 Gigabyte to Terabyte, so this also help to determine the rating of a computer system unit as regarding the Pentium



                          A TYPICAL HARD DISK DRIVE
           
(2)             FLOOPY DISK: I might not discuss this device because it is outdated, due to its low memory capacity and it is easily damaged or corrupts when in use.
(3)             CD OR DVD ROM DRIVE: The CD or DVD ROM drive is also a secondary storage device that helps in computer hardware maintenance, this is an avenue for installation after assembling a system unit. This is where we insert CD or DVD disc for installation or for leisure.


                          A TYPICAL DVD/CD ROM DRIVE


(4)             USB FLASH DRIVE: The USB flash Drive is used to replace the floppy disk because of its large capacity of storage memories like 2GB, 4GB, 6GB, 8GB up to 32GB memory of storage.

A TYPICAL USB FLASH DRIVE USED AS BROADBAND MODEM

(5)             MOTHER BOARD: The mother board, as it is called is a circuit Board that harbours every connection on the system unit. This is where the whole gadget is integrated to work as one.

On the mother are the electronic components like the resistor, transistor, transformer, Diodes etc. which helps to distribute current to the buses in the system unit. There are wires on the mother board called buses and these wires on the mother board are linked to micro processor chip .We has two types of Mother Board and they are:
·        AT
·        ATX

The AT Mother Board has a separate one point socket for Power Supply Unity (PSU) while The ATX Mother Board has two socket ports for Power Supply Unit Pins which are pin 8 and Pin 9. Now let us highlights components of a mother Board:

                          A TYPICAL MOTHER BOARD

MICRO PROCESSOR: Just as I said earlier, this component is attached to the mother board, it acts as the intelligent Quotient (IQ) of a computer system by assimilating information stored in the RAM. The Micro Processor sitting or port on the mother board is of two types:
(i)                The Socket Type sitting or Port
(ii)             The slot Type Sitting or Port

This is to mean that the socket of Micro Processor is the male type while the sloth is the female. So the micro Processor act as the brain of the computer, and without it, the computer cannot work. Attached to the back of this device is a cooling fan. The capacities of processor chip are often expressed in word or sizes. When I talk of word I mean the number of bits, it has 16, 32 or 64 that the Central Processing Unit (CPU) can access at one time, The More Bits in Word, the more powerful and the faster the computer becomes.

(II)       EXPANSIONS SLOTS: The expansion slot is a sitting on the mother board where we sloth expansion or interface cards like VGA (visual Graphics Adapter) cards, Serial Cards, USB Cards, Parallel Cards etc. these expansion cards are called expansion because it has ports attached to it. So without USB expansion Cards slot to your mother board, you cannot have a port to plug in your USB devices like USB flash and USB Phones. In fact without USB card on your system, you cannot have USB plug-in connected to your system.

Now these expansion slots on the system unit are divided into three:
(i)                PCI SLOTS (White slots)
(ii)             ISA SLOTS (Black Slots)
(iii)           AGP SLOT (Brown Slots)

(i)                PCI SLOTS: The Peripheral Component Interconnect slot (PCI) is an expansion slots on the mother board which provides connections for expansion cards to the system board. The PCI is white color, you can easily identify it when you are assembling system, the cards are slots according to their fittings on the sitting sloth. It has a high speed of 32bit or 64 bit bus that is over 20 times faster than ISA buses.

(ii)             ISA SLOTS: The Industrial Standard Architecture (ISA) is an expansion slot as the name implies is expanded to 16 bits. Although too slow for many of today application. The color of the slot on the mother board is black. It is still widely used.

(iii)           AGP SLOT: The Accelerated Graphic Port Slots or Port is over twice as fast as PCI bus, while the PCI is used for a variety of purposes, the AGP is dedicated to the acceleration of graphics performance widely used for graphics and 3-D animation, The AGP IS brown in color on the mother board.

The white sloth is sometimes shorter in length and that is where we slot our network cards or expansion card or modem. Almost all the computer we see today, they have the entire required card called multifunctional board.

Now having gotten to this stage, we have heard about Pentium. The Pentium is determined by the rating of the following:
(1)             The Hard Disk
(2)             The RAM
(3)             The Micro Processor

As a Computer Engineer, the above three component is what a system engineer will check as  the rating before purchasing the computer may be for his company or other ICT purposes. We also have some recent board in the market which is called GIGAPROS Board. It has the micro Processor attached with the board, this is to mean that you cannot separate the micro processor from the system board, if the micro processor is damaged; you have to discard the board.

The above description is for DESKTOP COMPUTER, the difference between the desktop device and that of laptop are:
(1)             The laptop components are of smaller in sizes
(2)             The laptop input and output units are integrated together and made portable for easy mobility.

Now the rating of computer system based on the sizes or features of micro processor are:
·        Pentium one           -           70 -235 MHz
·        Pentium two           -           233 -400 MHz
·        Pentium Three       -           450 - 1130 MHz
·        Pentium Four         -           1200 -3000 MHz
·        Pentium Five          -           1800 MHz

From above rating, Pentium one cannot support or carry as from 20 Gigabyte of Hard Disk Drive while Pentium four can carry or support as from 4GB to 180GB

(III)            The interface cable also known as Ribbon is of two types:
·        IDE CABLE TYPE
·        SATA CABLE TYPE


IDE CABLE TYPE
The IDE cable type for mother board has its head to male or female. The male type has pins while the female type has holes. The commonly used one today is the female type which has 34 lines of wires is used to connect floppy disk while that of 40 lines is used to connect Hard disk drive. At the End of the Cable you will see a red line Mark used to observe PIN1 RULE during connection to the mother board. On the IDE Port in the mother board where this IDE Cable is plug, you will see the indication arrow of Pin 1. You will also see it written on the end of floppy and Hard disk socket port in the mother board. You position the red end of the cable to the indication point during connection to the mother board. Now concerning their power, they have direct access to power. They cannot function without that connection to power supply Unit.


SATA/ATA CABLE TYPE
On the other hand, the SATA/ATA Cable are the same but of different port with the same  function, we have SATA 0,SATA 1,SATA3, and EXTERNAL SATA, they have the same function which is to allow the user to enable or disable an ATA or SATA device such as Hard Drive, CD Drive or DVD.

                                       A TYPICAL SATA/ATA CABLE TYPE

THE POWER SUPPLY UNIT
The power supply unit or power pack supplies electric current to different part of computer directly or indirectly. Now what the power Supply Unit does is to convert the AC (Alternative Current) to DC (Direct Current) and it does the work of a transformer, it steps down the voltage to the required units to the different parts of the system unit it is being connected. We can interchange the wire to different part of computer like the mother board, Hard disk drive and CD /DVD Drive,, these are the main important places we connect the Power Supply to supply current at a very low voltage of 5 volts and 12 volts before we proceeds to other parts like the power button which gets its own power direct or indirect depending on the system make.

TWO TYPE OF POWER PACK:
The two type of power pack are decided together with the type of power supply Unit to use. We have the two as follows:

·        AT: Example PIN 8 AND PIN 9
·        ATX:

NOTE: The power Supply Unit goes together with the mother board, the type of power pack to use is depended on the type of mother board. The AT MOTHER BOARD goes with AT POWER SUPPLY UNIT while ATX MOTHER BOARD goes with ATX POWER SUPPLY UNIT

AT POWER SUPPLY UNIT
The AT power supply unit is used for mother board which has two power socket that receives power from two pins of power pack which are PIN 8 and Pin 9. So the pin 8 and Pin 9 of this power supply units, supply direct Current to the mother board at a very low voltage.


ATX POWER SUPPLY UNIT
The ATX Power Supply unit has only one connector to the mother board. So the ATX Mother board also has a single port for power supply unit connector.

Both ATX and AT have other two connectors known as the Molex and Berge that connects to the DVD-ROM and Hard Disk. When connecting the power supply to the mother board, you have to be care full or your computer will blow.

Now we are going to know steps to assemble all these parts for them to function as a system Unit:

(1)             Absorb A skeleton of  a system unit
(2)             Never connect the cable upside down
(3)             Never force your mother board or drop it
(4)             Always make sure you observe the pin 1 rule when connecting ribbons or IDE cable because incorrectly connected missing a row of pins or a pair of pins.
(5)             Now, after screwing the mother board to the absorbed skeleton using pad to shield the rear side. Now we have to know how to connect the interface cable using IDE Cable or RIBBON as a case study. The Ribbon has three connector:
(i)                The Head or Primary master
(ii)              The Middle or primary/secondary slave
(iii)            The Tail or Secondary Slave

Using the following diagram for illustration of connection of the interface cable or IDE CABLE, it will enable you to understand how to fix IDE in the system unit to function appropriately:



The primary connector master goes to the primary port while the secondary connector master goes to the secondary port. Then the primary slave connector goes to alternative like Hard Disk or floppy disk altogether like the primary connector master, the same is applicable to secondary slave.

We can connect up to four hard disk in a computer system, the two IDE CABLE, one connecting to Primary Master Port and the other taking the place of CD/DVD ROM Secondary Master Port.

(6)             After this we should ensure that the RAMS are properly slotted to the Ram sitting in the mother Board, because if the RAM is not properly seated, the system cannot power on rather it will be making some poor sound.
(7)             Also we should slot the micro processor properly with the cooling fan working when powered on.
(8)             The next is the interface cards like the VGA  Cards for VGA port which goes to the monitor, USB Cards, Parallel Cards for the printer and Scanner, Serial Cards, all these are embedded on the expansion sloth


Now our system is ready as soon as we finish connecting the Power pins and buttons. Now we can connect the power supply cable already installed with the power cord to the extension wire supported with uninterrupted Power Supply (UPS) while we connect to the monitor through the VGA (Visual or Video Graphic Adapter) port and cable from monitor. Now plug in the mouse depending on the type of ports we have. We can decide to use the USB Mouse and Keyboard which is more solid to others.

The next is installation of Windows, Window’s Drive and Windows software. After that the system is ready for any task.

You can send you comment on this tutorial, you comments are welcomed:


WRITTEN/EDITED BY:
ONYIA EMEKA HARFORD
+2348186388641b


Sunday, 2 October 2016

HOW I RESTORED MY SYSTEM OPTIPLEX GX 620 WITH ADVANCE OPERATING SYSTEM REPAIR TECHNIQUES

It was on the 23rd of September, after booting my system to window 7 Desktop. I decided to dis engage hackers through the task manger, having noticed that there are four established intrusion in my system through “NETSTAT –ANO” Command.

But I noticed that these intruded hackers has manipulated the task manager, that I cannot disengaged them. I have to right click on the task manager and get to click on the properties of the task manager to see security setting . I noticed that they have reset the user from permitting access to “single user”  to “Administrators”  so I have to reset it myself again. When I am done with this. I tried to reboot my system, I noticed that the operating system could not boot to windows menu which was initial problem I solved which was corrupted operating system . the problem continued.

I have to fix it, this time in advanced form, but each time I am concluding the repair, the nearby hackers who are living just close to my house on the other building and under my yard are disabling it. This the people living next to me in another yard are using a magnetic  reaver plug in device mounted to their system to magnet my wi-fi as well as disabled my repairs through MS-DOS.

The advanced repair are similar to the previous one but this time the command goes like this:

(1)       I have to repair the master Boot Record (MBR)

This I achieved through MS-DOS having launched for windows repairs and after it was completed, I click advanced repair and click next. I then entered Admin password which the system requested after clicking next and it displayed options to include windows startup repair and MS DOS. The MS-DOS I selected and type:

            C:\>Bootrec.exe /Fixmbr

The above command permit the repair of the corrupted damaged Master Boot Record (MBR). It is the first sector of your drive and its purpose is to instruct the BIOS the position  to locate the operating system on your computer

(2)       The Second step is to write a New Boot Sector

            C:\>Bootrec.exe /Fixboot

The above command /Fixboot will write a new boot in the system partition. The command will select a boot sector that is compatible with your windows version. This is not limited to window 7, but include other windows. We can use this command when the boot sector is installed with windows that is not original copy. This means low standard operating system or copyright. And we also use it when the boot sector is damaged. When the original windows is installed and use another version to replace it.

(1)           The 3rd command I used was to rebuild the Boot confuguration Data (BCD)

C:\>Bootrec.exe /RebuildBCD

This command is used to fix some error in the BCD. The BCD is where a complete list of what is being load when your state your booting. Also some booting errors are as a result of damaged or missing files in BCD which we use /Rebuildbcd to fix.

(2)           The Final Command I issued before the Hackers Disabled my repair was:

            C:\>Bootrec.exe /Scanos

This command is issued when we have multiple operating system installed in our systems but not all of them are available. This command will select the current Operating System compatible for the system which are not included in the BCD (Boot Configuration Data).

Having completed this process, the Hacker disabled it. But due to my DVD ROM was already failing still being the handwork of this particular hacker with the help of Reaver magnetic device was able to manipulate my DVD ROM by deleting things in the registry Editor. Which almost rendered the             DVD ROM ineffective. The first DVD ROM I changed it because they damaged it through the same process. The new one I replaced, yet they are struggling with it, especially when I am running installation. Is that not wickedness? Somebody that says that he or she is your neighbour?

The most painful thing I experienced from this Hackers was deleting files on my new installation disc I bought through the same mean, whenever I am running installation they will cease the MS DOS Command through the magnetic gadget to my WI-FI causing havock on my system. Sometime I will want to capture the gadget to cancel it but because they are very fast in connecting, I miss the cancellation. And whenever they connect, they must disable one thing or the other. So I bought new Avira Rescue System software; one of the powerful antivirus for wiping off virus from operating system. I insert the disc into DVD Drive to run installation through MS DOS,  when i switch from x:\> Drive which is one of my hard disk because the system has dual core but one hard disk is unfunctional  to E:\> Drive which is DVD ROM and I was successful. I then type X:\>DIR/P/W to display the directories of the Avira virus on the DVD DISK, it showed complete. When I tried to run installation I noticed that the DVD ROM was failing, I tried to know what was wrong by stopping the whole process. But it was strange because that was a new DVD.

I tried to open the disc the second time through MSDOS, behold the Avira Virus CD was empty, the files I saw initially had been wiped out by the hackers, I noticed that the hackers who I knew their locations had deleted my the file on my DVD ROM through MS DOS by connect to my wi-fi, I was mad, I have to pick up my phone and alerted the police of the incident, I told them to investigate in the matter. Because things are getting out of hand. I would have go to state CID the following day to make the official report but it was a Sanitation day which was Saturday. I suspended it. So with evidence I know I can catch up with their wickedness.

I also noticed someone organise teenage boys of 14, 15, 16 and  17 years to use the same monitoring gadget like phone and laptop, under my yard, all they do is to copy my blogging message through wi-fi whenever I am ready to send it. I wonder how people that are martured enough who knows that they cannot read and write, instead of embarking on a seroius trade that will yield them profit at the long run will cease criminality to achieve success. That does not work these days. Those things they are copying are waste, because when the original person relocate to another destination their blogs will fold up. They better start from scratch to learn how to write and type as well as the techniques to blog. This is the main thing that makes a successful blogger. And google can never approve a copyright, may be you thing they don’t know the original owner of those write up. They know. And that is their duty.

Next thing I did was to get the evidence to stop the Hackers on my system with IP addresses I copied down and their port number, I have to do this with my friend in another sytem because mine is no more working. But I first tried it in my system before proceeding to another one.

Now in achieving this I have to take the following steps:

(1)             After restarting the system and pressing F1
(2)             I choose launch for repair
(3)             After the attempted repair and it showed information that it cannot repair the system
(4)             I close the report
(5)             Click on Advance option when it showed up
(6)             I have to click Next
(7)             It requested for my Administrator password which I inserted
(8)             It now displayed five options to include:
A.  Startup Repair
B.  System Restore
C.  System Image Recovery
D.  Windows Memory Diagnostic
E.   Command Prompt

(9)              I have to choose the last option which is the command prompt, it took me to MS-DOS environment.
(10)        I have to type NETSTAT –ANO again to know the active established connections. I copied their Ip addresses from the Foreign address column and their Host ID or name from the PID column. And use the same MS DOS command to trace route location and information about them.

X:\> tracert *type ip address/Hostname*
           
The above command gives you details of the hackers and his ISP Company, what the command does is to give you the information of the source of the attacker from his system which he uses to attack both time and date. But you should know that the address listed before the final one always belongs to the Hacker’s ISP Company.

(11)        Simply Print the information from MS DOS

(12)        And use it as an evidence, report it to your local police department for further tracing route. Now the duty of the police is to contact the ISP Company of the Hacker and trace them from there.


Another thing I did was to eliminate some virus they cease to operate using MS DOS Command:
TYPE:
X:\> DIR/P/W 

and hit the enter key

X:\> Attrib –r –s –H ** /S /D
Or
X:\> Attrib –r

Once  the directories displays, delete or remove  the ones that ends with extensions like: .inf, .exe, .dll and .log

Example:
X:\> Del SETUP.EXE

But if anyone refuses to delete rename it, example rename emeka.exe with emeka.bak

I also noticed that fixmbr command can damage a system partition table if a virus is present or if a hardware problem exist. And once damaged partitions might  be inaccessible, so that data cannot be used. So I have to go and get mini tool partition wizard Bootable CD to rebuild MBR to avoid bringing dmage to data and partition. But I notice mine partition is damaged already. But I cannot penetrate the DVD ROM due to the Hacker keep on deleting the file on the disc. Though the file will be there, but access denied is showing that the files have been deleted.

So I have to remove it from that environment to repair it some other place, because I don’t have the facilities to format and reinstall programs. So I went to a road side computer engineer who aid me with his tools and we formatted the system and reinstall anti virus first before installing new windows unltimate 7 as well as copying back the files. At least the system has come back to it initial state, but the hackers are still trying on to penetrate by all means.  So it is a continuos monitoring affairs.


WRITTEN BY ONYIA EMEKA HARFORD
+2348186388641b




Friday, 16 September 2016

MY EXPERIENCE ON HOW I RESTORED MY DESKTOP COMPUTER DELL MODEL: OPTIPLEX GX620 BRAND FROM THREAT OF DANGEROUS HACKERS

Hacker hacked my system for a long time to the extent that they are consuming my Broadband airtime that are meant to last for a month under few days or weeks depending on the capacity and this made me to be subscribing a maximum of 4.5 Airtel ISP gigabyte monthly to meet up with their demands, yet these unscrupulous and wicked personalities that are even living close to my area relentlessly did not give up in attacking my system. So as an ICT personnel I have to apply my skills to figure out solutions to these problem which even at this moment I have not finally concluded their mission of doing such act but what I know is at the moment at least I can stop so many from gaining entrance to my system except some stubborn ones that has manipulated my BROADBAND MODEM through my IMEI number and other information that came with the modem which they got through entering my Wi-Fi that does not have control point yet.

Now these are the radical steps I took which did not prove successful initially, but now is yielding result, though I have tried so many ways to completely eliminate their operation through my Wi-Fi to my Dell Desktop Optiplex GX 620 which I said earlier did not have a control point or a button to turn it off or on and as a result these nearby scammers cease the Wi-fi to have access to my system including my files. I have to set up Bitlock Key encryption password to lock up my document, I wanted to lock up the entire Hard Disk but already they have tampered with the (Trusted Platform Module)TPM through BIOS and other roots as well as disabled it completely, so the security Bitlock Key was not possible to the Hard Disk because the TPM security was not enable. So I have to go through Program Bitlock Key in Application software like Microsoft word to secure some important document from scammers; these I achieve by taking the following steps under ms-word 2007:
(i)                Clicking on the office button before the menu “Home” on the menu bar to display the drop down list
(ii)              Select “Prepare” on the dropdown list to view options
(iii)            From the options, then select Bitlock and lock up your document with Username and password
I think with this your main documents are secured a bit.

Now, the second step I took was to diagnose my system for intruders or hackers through MS-DOS or command prompt by issuing command at the MS-DOS environment like:
C :\> NETSTAT A-         to display Options

Then I will select: “-A” from the options to display and know if potential hackers have intruded into my system and I type the command as follows:
C :\> NETSTAT –A

The above command will display the active connections and the intending active connection which has not succeeded in gaining entrance to your system. The active connection will display “Established” under the STATE of the active PC while others waiting or trying to gain entrance but has not succeeded yet will show listening. So I tried the process  to disengage these established intruders .

Now, this is how I go about trying to disengage them, this achieved by pressing down at once the keyboard CTRL +SHIFT+ESCAPE keys at once to pop up the task manager where all the programs running in your computer both internal and external will be visible. Now trying to locate their Process Identification (PID) to right click it and end their process which will finally terminate their operation on your system, it happened that the Hackers has also manipulated the PID also in disguise. So merging the PID in established Hackers from MS-DOS with the one on the Task Manager do not rhyme. So there are other alternatives to locate. But I skipped the alternative initially to try some other thing to see if I can eliminate them completely through those means.

So I have no option than to go and purchase NORTON ANTI VIRUS SOFTWARE and run it in my system. I could not successfully installed it initially due to their continual use of magnetic device to hook my system through Wi-Fi to manipulate what I was doing, but finally installed it, but they later used that means and disable the anti-virus twice so that they can be gaining entrance. Though the antivirus sanitize my system when it was successfully installed, but it did not solve the problem of the four identified established connection. I have to try Norton power Eraser as I was connected to the internet. It did not still solve the problem of the threats on my system which I discovered through “NETSTAT –A” command at the MS-DOS Prompt. These became a battle for a long time, as these hackers penetrate my computer system and change my Broadband settings as they want.

Also I came to discover that antivirus software is there to detect new threat, terminate them and constantly protect your system while reimages windows repairs professional software is there to heal damages these viruses have already caused. So I decided to download and also run reimages windows repairs professional software from the internet as well to see if I can fix this problem myself. Reimage could not fix the problem as well.

Now, I have to go back to the task manager and select system column from view menu. Now click on the “commit size” to see the size of the memory of all active system connection. I have to end their process as you merge it with the image name column which they have manipulated as well, they can still manipulate even the sizes, but you need to use your psychic to detect their movement and action, sometimes you may click the wrong program and end it thinking they are part of the hackers but sometime computer will warn you when you want to do that. Now one thing here is that as you are ending them you need to be observant with the MS-DOS COMMAND which is NETSTAT -A and NETSTAT –S, to make sure that your assignment is completed. If they still exist, continue to end the suspected process until you wipe them off. And while working with your computer keep on checking them through this means because sometime some will disguise and hide, when you are off, the will surface to operate again on your system and this is how I restored my system to control hacker from exhausting my Airtime.

WRITTEN BY ONYIA EMEKA HARFORD
+2348186388641b