Category Archives: DIY Computer Repair

logo-powershell1

Powershell email notification on errors in a logfile

Ran into a case that would be nice to receive an email alert based upon a a phrase or error in a log/txt file. Well after I set it up and tested it I decided to do something different but this did work quite well so I thought I’d share.

Remember to execute this with powershell, I used the variable $env:computerName to pull the hostname of the pc. You can just put an email address if you want.

Code starts below the ##

##search error in log
if (Select-String -Path “\\server\d$\Program Files\BackupSoftware\log\server.log” -pattern “Could not open disk”)
{
function sendMail{

Write-Host “Sending Email”

#SMTP server name
$smtpServer = “mail.yourdomain.com”

#Creating a Mail object
$msg = new-object Net.Mail.MailMessage

#Creating SMTP server object
$smtp = new-object Net.Mail.SmtpClient($smtpServer)

#Email structure
$msg.From = “$env:computerName@yourdomain.com”
$msg.ReplyTo = “$env:computerName@yourdomain.com”
$msg.To.Add(“you@yourdomain.com”)
$msg.subject = “Backup Errors”
$msg.body = “Backup failed on $env:ComputerName. Please check the error logs on”

#Sending email
$smtp.Send($msg)

}

original script was from technet but I don’t have the link.




Tags: , ,
download

Restore Windows 8.1 Default Start Screen

download

Ran into this issue where a user wanted the default start screen back…..  Hope it helps.

Open a command prompt as Administrator

copy and paste

del %LocalAppData%\Microsoft\Windows\appsFolder.itemdata-ms
del %LocalAppData%\Microsoft\Windows\appsFolder.itemdata-ms.bak
taskkill /f /im explorer.exe
explorer.exe
exit

Now hit your windows key or swipe to the windows key and you will have a nice clean start screen.

 

No tags for this post.
20140110_205329

AMD Systemboard Repair

ecs_ka3_mvp

Well my 45.00 thrift store computer worked for a little while then I started having boot issues with it.  I figured I’d crack the case open and just check some things out and glad I did…. I found the dreaded puffy caps. (Board is a KA3MVP)

20140107_184526

 

Now upon seeing this I was thinking of the days where I use to see the Dell Optiplex GX270 blowing capacitors. Sometimes people don’t know that the caps are swollen and even if they are puffy the computer may work (well for a little while).

So I hopped on ebay and bought some new rubycon capacitors but it has been ages since I soldiered anything on a board.  So I cracked open my old kit and removed the old caps.. Key is to not leave the iron on the cap for a long period of time and use a soldier wick to clean it up some.

20140110_205329

 

Now for the final product, my new caps and the system is working flawlessly now.  No start up issues anymore and it starts up within a few seconds instead of 20+ seconds to post.

20140110_205252

 

Tags: , , ,

Windows 8/8.1 Networked Printers show as red x’s

CapturePrinterJust thought i would write a quick blog post that if you have recently deployed a Windows 8 / 8.1 device and discover that the networked connected printers are showing as red’s then you may need to check with your vendor to see if they have a updated chipset drivers.  I know it sounds crazy but the device I was working on had this happen to it and the same day I discovered it the vendor released a update so I installed that and the printers now show the names instead.

My Device was the Dell Latitude 10

No tags for this post.

Recover Lost & Deleted files (The Free Way)

Have you ever accidently deleted a file off your computer and emptied the recycle bin just to go dohhh.  I am going to show you some great free tools that you can use to recover you files, I would call this your first line of recovery.  Don't carry it to some computer service for this, try it yourself!   I have listed the software in order of which I would try, so see what you think maybe it will save you some $$ on data recovery!

1st Program
               Recuva,  – pronounced "recover" is a freeware utility to restore files that have been accidentally deleted from your computer. This includes files emptied from the Windows Recycle bin as well as images and other files that have been deleted by user error from digital camera memory cards or MP3 players. It will even bring back files that have been deleted by bugs, crashes and viruses! Like all other Piriform products including CCleaner, Recuva is free for both commercial and personal use. More info here

2nd Program 
            UNDELETE 360 is one of the best programs to use for restoring accidentally or unintentionally deleted files from your computer, regardless of storage medium.  Built on a very fast and efficient algorithm, the program will browse, search, and recover files that have been deleted as a result of an accident, a virus, or software and computer failures.  Undelete 360 can recover files deleted from computer hard drives, USB/thumb drives and memory sticks, the memory cards used in cameras, smart phones, and other devices, pen drives, and more. The program supports both file recovery and folder recovery. Best of all, Undelete 360 is 100% freeware: No ads, no beg screens, no time or feature limits. It is completely free for you to use and enjoy.

3rd Program:
            TestDisk & PhotoRec 6.13 is a free data recovery utility. It was primarily designed to help recover lost data storage partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally erasing a partition table). TestDisk can be used to collect detailed information about a corrupted drive which can then be sent to a tech for further analysis.

TestDisk has features for both novices and experts. For those who know little or nothing about data recovery techniques, TestDisk can be used to collect detailed information about a non-booting drive which can then be sent to a tech for further analysis. Those more familiar with such procedures should find TestDisk a handy tool in performing onsite recovery.

PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its 'Photo Recovery' name) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it will still work even if your media's file system has been severely damaged or re-formatted.

Tags: , , , , , , ,

Active Desktop Recovery Fix

 

If your recieve the following error:

active_desktop_recovery

You can fix it by doing the following:

  1. Login to the computer as yourself
  2. Double Click on My Computer then Open C:\
  3. Go to the Windows Folder, then Go to the Web Folder – The path should read C:\Windows\Web (or see picture below)
  4. Delete Safemode.htt (See Picture Below)
  5. Log off and back on as the affected student/user and they will recieve the normal desktop.

safemodehtt

Tags: , ,

Windows Vista/7 Boot Winload.exe Error

Most likey if you move drives around or reimage computers from time to time the image hick ups and you have to fix the boot of the computer.  Here is the fix.

To run the Bootrec.exe tool, you must start Windows RE. To do this, follow these steps:

  1. Put the Windows Vista or Windows 7 installation disc in the disc drive, and then start the computer.
  2. Press a key when you are prompted.
  3. Select a language, a time, a currency, a keyboard or an input method, and then click Next.
  4. Click Repair your computer.
  5. Click the operating system that you want to repair, and then click Next.
  6. In the System Recovery Options dialog box, click Command Prompt.
  7. Type Bootrec.exe, and then press ENTER.

Note To start the computer from the Windows Vista or Windows 7 DVD, the computer must be configured to start from the DVD drive. For more information about how to configure the computer to start from the DVD drive, see the documentation that is included with the computer or contact the computer manufacturer.

This is what I had to do to fix them since the autofix above didn’t work.

Note If rebuilding the BCD does not resolve the startup issue, you can export and delete the BCD, and then run this option again. By doing this, you make sure that the BCD is completely rebuilt. To do this, type the following commands at the Windows RE command prompt:

  • bcdedit /export C:BCD_Backup
  • c:
  • cd boot
  • attrib bcd -s -h -r
  • ren c:bootbcd bcd.old
  • bootrec /RebuildBcd

source

Tags: , , ,

Internet Explorer 8 not getting group policy

Ran into this issue due to using the windows ieak toolkit for Internet Explorer 7/8 to compile a custom exe.  Well everything initially tested okay and after deployment we noticed that IE7 and IE8 was not operational anymore.  They would get a internal webpage but nothing else like the settings are being blocked from group policy, well sort of……

I found that when creating the custom exe from the ieak toolkit it left in some options that actually were the cause.  look in C:Program FilesInternet ExplorerCUSTOM

There was a file in there called install.ins and when you open the file you will see the last line was the whole problem….  What we did was compile a runas program that will just delete this file off of all workstations instead of worrying about the contents of the file.  Once the file has been removed group policy for internet explorer works just fine.  If you want to keep the install.ins file then remove everything below proxy including the line that says proxy.

[Branding]
Type=2
Wizard_Version=6.0.5730.13
Custom_Key=
Language Locale=EN
Language ID=1033
NoBrowserDefault=0
AutoUpdate=0
NoBackup=0
Silent Install=0
StealthInstall=1
RestartOption=1
NoSearchGuide=1
FavoritesOnTop=0
NoFavorites=1
NoLinks=1
NoRSSFeeds=1
CMProfilePath=
CMProfileName=
CMUseCustom=0
Platform=1
[Media]
Build_CD=0
Build_LAN=1
Build_BrandingOnly=0
[IEAKLite]
Sign-up Settings=1
Certificate Customization=1
[CDCustomFiles]
InstallIEVersion=7,0,5730,13
[SearchProviders]
URL1=http://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:{language}:{referrer:source}&ie={inputEncoding?}&oe={outputEncoding?}
SortIndex1=1
Default1=1
DisplayName1=Google
[URL]
Home_Page=http://www.msn.com
MergePreviousHomePages=0
NoWelcome=1
AutoDetect=1
AutoConfig=0
[Proxy]
HTTP_Proxy_Server=
FTP_Proxy_Server=
Gopher_Proxy_Server=
Secure_Proxy_Server=
Socks_Proxy_Server=
Use_Same_Proxy=1
Proxy_Enable=0
Proxy_Override=<local>

No tags for this post.

Removing Internet Security 2010

Internet Security 2010 is a rogue anti-spyware program that is installed through the use of malware. Once installed, Internet Security will be configured to start automatically when you login to Windows. It will then scan your pc and display numerous infections, but will not remove anything until you purchase the program. These infections, though, are all fake and are only being shown to trick you into thinking you are infected so that you then purchase the program. It goes without saying that you should definitely not purchase this program.
antimalware

  1. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.
  2. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing and is at the last screen, make sure you uncheck both of the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware check boxes. Then click on the Finish button. If Malwarebytes’ prompts you to reboot, please do not do so.If you receive a code 2 error while installing Malwarebytes’s, please press the OK button to close these errors as we will resolve them in future steps. The code 2 error will look similar to the image below.
    Malwarebytes Anti-Malware Screen
  3. As this infection deletes a core executable of Malwarebytes’ we will need to download a new copy of it and put it in the C:program filesMalwarebytes’ Anti-Malware folder. To download the file please click on the following link:

    Malwarebytes’ EXE Download

    When your browser prompts you where to save it to, please save it to the C:program filesMalwarebytes’ Anti-Malware folder. When downloading the file, it will have a random filename. Please leave the filename the way it is as it is important that it is not changed. You may want to write down the name of the file as you will need to know the name in the next step.

  4. Once the file has been downloaded, open the C:program filesMalwarebytes’ Anti-Malware folder and double-click on the file you downloaded in step 8. MBAM will now start and you will be at the main program screen as shown below.
    Malwarebytes Anti-Malware Screen
  5. Before you can perform a scan, you must first update the program. To do this click on the Update tab, and that at the new screen click on the Check for Updates button. Malwarebytes’ will now check for new updates and download and install them as necessary. When the update is completed, you will be prompted with a message stating either that you already have the latest updates or that they have been updated. Either way, you should now click on the OK button to continue.
  6. Now click on the Scanner tab and make sure the the Perform full scan option is selected. Then click on the Scan button to start scanning your computer for Internet Security 2010 related files.
  7. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.
    Malwarebytes Anti-Malware Scanning Screen
  8. When the scan is finished a message box will appear as shown in the image below.
    Malwarebytes Anti-Malware Scan Finished Screen

    You should click on the OK button to close the message box and continue with the Internet Security 2010 removal process.

  9. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.
  10. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.
    Malwarebytes Scan Results

    You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  11. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.
  12. You can now exit the MBAM program.
  13. Due to the fact that this infection deletes certain MalwareBytes’ files, and we had to work around this, if you wish to continue using MalwareBytes’ Anti-Malware, which we suggest you do, then you should uninstall and then install it again so that the files are created properly.

Information Source: BleepingComputer.com

No tags for this post.

Get the IE emergency patch now!

This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This security update is rated Critical for all supported releases of Internet Explorer: Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and Internet Explorer 8 (except Internet Explorer 6 for supported editions of Windows Server 2003). For Internet Explorer 6 for supported editions of Windows Server 2003 as listed, this update is rated Moderate. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, validates input parameters, and filters HTML attributes. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.

http://www.microsoft.com/technet/security/bulletin/MS10-002.mspx

Client Operating Systems:

Cumulative Security Update for Internet Explorer 8 in Windows 7 (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows 7 x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows Vista (KB978207)

Cumulative Security Update for Internet Explorer 7 in Windows Vista (KB978207)

Cumulative Security Update for Internet Explorer 7 in Windows Vista x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows Vista x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 for Windows XP (KB978207)

Cumulative Security Update for Internet Explorer 7 for Windows XP (KB978207)

Cumulative Security Update for Internet Explorer 6 for Windows XP (KB978207)

Cumulative Security Update for Internet Explorer 8 for Windows XP x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 6 for Windows XP x64 Edition (KB978207)

Update for Internet Explorer 6 SP1 (KB978207) Windows 2000

Cumulative Security Update for Internet Explorer 5.01 Service Pack 4 (KB978207) Windows 2000

Server Operating Systems:

Update for Internet Explorer 6 SP1 (KB978207) Windows 2000

Cumulative Security Update for Internet Explorer 5.01 Service Pack 4 (KB978207) Windows 2000

Cumulative Security Update for Internet Explorer 7 for Windows Server 2003 (KB978207)

Cumulative Security Update for Internet Explorer 7 in Windows Server 2008 for Itanium-based Systems (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows Server 2008 R2 x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows Server 2008 x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 7 for Windows Server 2003 64-bit Itanium Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 for Windows Server 2003 (KB978207)

Cumulative Security Update for Internet Explorer 7 for Windows XP x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 7 in Windows Server 2008 x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 for Windows Server 2003 x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 7 in Windows Server 2008 (KB978207)

Cumulative Security Update for Internet Explorer 7 for Windows Server 2003 x64 Edition (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows Server 2008 R2 for Itanium-based Systems (KB978207)

Cumulative Security Update for Internet Explorer 8 in Windows Server 2008 (KB978207)

Cumulative Security Update for Internet Explorer for Windows Server 2003 (KB978207)

Cumulative Security Update for Internet Explorer for Windows Server 2003 64-bit Itanium Edition (KB978207)

Cumulative Security Update for Internet Explorer for Windows Server 2003 x64 Edition (KB978207)

No tags for this post.