Thursday, July 11, 2013

Windows Temporary Files

We have already seen the nature of some temporary files like Temporary Internet Files, Index.dat file, Cookies and Prefetch Files. In this article we shall have a look at a few aspects of the Windows Temporary Files, which your computer creates, during the course of its normal running.

Windows Temporary Files

What are Temporary Files in Windows

Temporary Files in Windows are those files whose use is only temporary and become redundant once the task in hand is completed. Such temporary file are created to hold data temporarily while a file is being created or processed or used.

Why are Temporary Files created

Windows Temporary files are created by the operating system during the normal course of its running when there may not be enough memory allocated for the task.
Software which use large amounts of data like Graphics, Video or Media editing software also create temporary files. Such created temporary files are more often than not, left behind even when the task is over, leading to their wasting disk space.
Temporary Files are also created for backup purposes, by programs. For instance, Microsoft Office saves a Temporary File of the open document every few minutes. If you save the document and exit, the Temporary File gets deleted. If the program crashes unexpectedly, the Temporary File is not deleted. They can thus be useful to help recover lost data if the program or the system crashes.
Ideally, the Temporary Files should get deleted once the program exits. But this is not always the case, leading to wasted disk space.

Temporary Files Location

The Temporary Files in Windows are typically found located in two locations:
  • %systemdrive%\Windows\Temp
  • %userprofile%\AppData\Local\Temp
If you click on C:\Windows\Temp you will receive a message You don’t currently have permission to access this folder. Click on Continue to do so. You will see that most of its contents are .tmp, .temp and .txt files.
The other folder typically located at C:\Users\username\AppData\Local\Temp, is created for each User. It’s a hidden folder and you will have to first ‘un-hide’ System folders from the Folder Options before you can see it.
The Temporary files created by the Windows operating system are usually stored in the %system%\Windows\Temp folder, whereas the one’s created by the User when running any software is stored in his user profile at %userprofiles%\AppData\Local\.
Temporary Files of a particular software may also be located in a sub-folder, inside the parent folder of the particular software.
On rare occasions, a temporary file or a temporary files folder may get created into the root directory of the C (System) drive. You may want to examine the folder in details, and then delete it if you are sure, if it indeed contains temporary files.

Change location of the Temp folder

If you wish, you can change the location of the Temporary Files folder. To do so, open System Properties via the Control Panel > Environment Variables > Edit the System and/or the User variables as you wish.

But do remember that it is never a good idea to combine the temporary directories together for all the user profiles, forsecurity reasons, since there have been cases of security vulnerabilities with temporary files, due to a particular software’s incorrect file permissions or race conditions.

Empty Temporary Files folder

You can use freeware junk files cleaners like CCleaner Quick Clean or the in-built Disk Cleanup utility to easily empty the contents of the Temp folders.
Planning to empty the contents of your Windows Installer Folder or WinSxS directory due to its sheer large size!? Think again! These are needed files for windows to work.

5 Common Mistakes on Facebook



Share on email
How-Tos :: 1 comment
In many ways, Facebook is the water cooler of the Internet age. We all gather around our computers to chat about the news of the day, share pictures of the kids or just talk about what was on television last night. But if you make a social snafu around the water cooler, it's probably only witnessed by a few people—and it's quickly forgotten. But social blunders on Facebook have a much wider audience, which can make them more difficult to recover from.
We've identified the most common sharing missteps, most of which you've probably seen in your own news feed—or even made yourself. Fortunately, your Facebook friends are (hopefully) forgiving, and with a bit of foresight, you can dodge any social snafus in the future.

1. Not keeping private conversations private

This can actually be one of two problems. The first being, if you wouldn't say it loud and proud in front of your extended family at the Thanksgiving table, don't post it for all to see on Facebook. Facebook's messaging system can be used to send a private message. There's also email, texting and a good old-fashioned phone call if you need to keep your communication private. If you are shamelessly opinionated in your every day life, well, your Facebook friends are probably already used to this kind of behavior, but for the rest of us, think carefully about making private details public, even to the closed circle of your Facebook friends.
The second problem is accidentally making a post that you meant to only go to a few friendsbut instead goes out to everyone or posting publicly what you meant to send in a private message. It is an all too easy mistake to make—especially when Facebook's privacy settingsaren't always obvious. Fortunately, you can delete any post you make. Just hover over the upper right corner of the message and you'll see a pencil icon. Click on it, then click the delete option in the drop down menu that appears. Then hope you got rid of it before your friends saw it.

2. Overzealous tagging

Facebook makes it tremendously easy to tag people in photos and updates. And a new "feature" prompts you to tag photos showing up in your newsfeed with a suggestion of who Facebook thinks is in the image! It can be a great way to keep your friends in the loop on what you're up to or what you're doing together, but posting unflattering photos and tagging your friends in it can be a problem, mostly for your friendships.
Not everyone wants photos of themselves posted online and practically no one wants uncomplimentary photos posted, much less being tagged and linked to their Facebook profile. Fortunately, even if you have friends who overzealously tag content, you can remove the tags yourself. However, the pictures are still there unless you ask your friend to remove them. 
To remove a tag of yourself that someone has made on a photo, hover over the upper right hand corner of the update, click on the pencil icon that appears, then choose "Report/Remove Tag" from the drop down menu that appears. You can also manage who can see posts you've been tagged in on our timeline and choose to review tags people add to your own posts before the tags appear on Facebook by going to "Settings" >> "Privacy Settings >> "Timeline and Tagging."

3. Spam and oversharing

No one likes spam in any medium, but to the person doing the posting, it might seem more like sharing something they love instead of spamming. And that makes this problem all too common: everyone on Facebook has at least one friend who's always posting repetitive, uninteresting content. And this goes hand-in-hand with oversharing.
No one wants to know that they're making a sandwich, that they've made a sandwich, that they've taken a bite of the sandwich, and then that they've finished the sandwich. Talk about spam! Even if their sandwich is exciting enough to justify a post, it's very likely that one update will do.
So how do you avoid doing this yourself? Always think before you post and definitely avoid posting the same (or very similar) content over and over again. If you absolutely have to post something that's a bit repetitive or uninteresting, be sure to skip tagging friends in these posts, which flags them for their attention—unless you're positive they'll be fascinated.
If your Facebook friends won't stop spamming your newsfeed with their repetitive messages, you can always change what you see from them rather than unfriending them altogether. Move your mouse over to the upper right corner of any obnoxious update, click on the downward arrow that appears and choose "Hide" from the menu that drops down. The message will be removed and you'll see a new option in its place titled "Change what updates you get from [this friend.]" Mouse over that and you'll see a list of options. For the kinds of updates you want to see from a spammy person, we recommend choosing "Only important." Facebook uses its own judgment to determine what is an important update, but it may be preferable to enduring daily doses of nonsense.

4. Arguing with friends about hot button issues like politics or religion

If you want to keep your friends as friends, you need to tread carefully when you talk about hot button topics. It's frustrating when your friends post political diatribes—and you get shouted down for disagreeing with them. 
Of course, this doesn't mean you can't post about politics, religion or other potentially sensitive subjects that matter to you. Just remember that your friends may not all agree with you—and that's no reason to be rude or obnoxious with them. Doing so is a great way to lose friends, both on Facebook and in real life.
If your friends are doing this, check out how to limit the kinds of updates you see from them at the end of section 3 above.

5. Neglecting spelling and grammar

Sure, everyone uses abbreviated language popular in texting and everyone makes the occasional typo. But no one likes wading through posts that have so many typos and abbreviations that they may as well be written in a foreign language. If you have something important enough to say that you want to share it with all of your Facebook friends, it's worth making the effort to write it out clearly—anything else is just going to cause friends frustration.
If you make a glaring mistake in a Facebook post, there isn't any ability to edit the text. However, you can edit any comment you make on someone else's post as well as anything you've written attached to a photo. For editing a comment, simply mouse over the upper right corner of your comment box to see a pencil icon. Click on it and then on "Edit" on the drop down menu that appears.
For photos, click on the image so the picture fills most of your screen with your post and the comments displayed to the right of it. You'll see an "Edit" button below your update, but above the comments. Click it to change your message, the date taken, who is tagged in the message or location it was taken.
Of course, none of us are perfect and we all make social snafus now and again. But if you want to be top of the class in Facebook etiquette be careful not to make these mistakes yourself!

Thursday, May 2, 2013

Computing Guide To Being Paranoid

They’re watching you. Literally. In a recent article posted at Ars Technia, it was reported that hackers have the ability to remotely take over your computer and install software on your computer that allows them to turn on your webcam. What? They do this using a RAT pack (Remote Administration Tool). In addition to that, we are hearing of new router exploits that give a hacker the ability to remotely access your router and gain access to your Local Area Network. If you think you’re overly paranoid about your computing you should be. This stuff is scary.
So now that you know that the whole world is out to get you, what can you do about it? These steps will help close some of the holes used to exploit computers.
Turn off Remote Administration – Remote administration in routers give users outside of your network the ability to access and control your router. In many cases, this is turned on by default. What? Of course the intention of this option is benign, but it can be used by a hacker to get into your LAN and see all of your internal computers, manipulate your firewall and do basically anything they want with your traffic.
To do this, you can navigate to your router’s admin page using your web browser. Normally, this can be done by typing http://192.168.1.1 or http://192.168.0.1 into your browser’s address bar (not the search bar). Your router location may vary. You will also need to know the username and password of your router. If you do not know it, and the router was supplied by your ISP, you can check the physical device to see if the information is printed there or call your ISP for log in details.
Look for an “Advanced” or “Administrator” tab and make sure remote administration is disabled.
Turn Off Wake On LAN - While not necessarily an exploit, WoL allows your computer to be turned on when powered off from an outside source. Imagine this, ole paranoid one, if a hacker had access to your internal LAN and had the ability to turn on your PC whenever he or she wanted to perform whatever nefarious acts he or she wanted. Unless you have a specific need to have it on, go into your computer BIOS when booting and disable that wicked feature. Depending on your BIOS, it may not even be an option.
Turn Off Allow Network Traffic To Wake Computer – Similar to WoL, your network adapter has the ability to listen to network traffic and can allow your computer to be woken up while asleep.


To shut this down, go into the Control Panel, look for your network adapter, right-click it and select Properties. Under the Power Management tab, uncheck that option if it is checked.
Turn Off UPnP – Turn off Universal Plug and Play in your router. Universal Plug and Play allows programs within your network to automatically punch holes in your router. What? Us paranoids can’t allow this to happen! Imagin a virus on your network having free reign to open ports on your router to allow even more bad guys in. For most of us, having this feature off will not affect anything we do from day to day. For others, you may need to occasionally go into your router and manually open ports for programs or system that require them to be open–like game consoles, for instance. You can turn off UPnP in your router.
Uninstall Java and Adobe Reader – With Windows doing a better job securing the OS, hackers are seeking softer targets like Java and Adobe Reader, both of which seem to have some type of zero-day exploit a couple times a year. Most of us have these programs just sitting on our system, never being used and never being updated to the latest versions. If you simply must have them, be sure to update them frequently.
Scan Your Ports - The Gibson Research Corporation (GRC) has been providing a free online tool to scan your router for open ports for over ten years. This tool is called Shields Up and you can find it here. The UPnP Exposure test will check to see if your router is open to a new router exploit that gives hackers the ability to access and control your router.

If all is well with the GRC test, you will see the above image.
Run Your Browser In Privacy Mode – Private Browsing (which may be called something else depending on which browser you’re running) allows you to surf without the fear of a history being saved, and temp images, videos, files and cookies being stored on your computer.
In Firefox and IE, this is enabled by hitting CTRL+Shift+P.
In Google Chrome hit CTRL+Shift+N for Incognito mode.
Do The Basic Computer Security Measures – Of course, you should also make sure you are running a current antivirus–if your free antivirus from Symantec or Mcafee has expired, uninstall it and get another. If you do not have one, Microsoft Security Essentials is free. In addition, make sure your WiFi is encrypted in your router settings using WPA-2 so the whole neighborhood isn’t using your bandwidth. Make sure you have Windows automatic updates turned on. Make sure your Windows firewall is also enabled. Modern Windows Operating System will have these on by default, and if you’re running Windows 8 you also already have an antivirus called Windows Defender–built in.
If you have more tips for us paranoid folk, please be sure to leave them below so we can all sleep good at night.

I Spilled Liquid On My Laptop! Now What?

This may be your face when it happens to you. Every day, 1 in 20 Americans spill something on their laptop (Also, 48% of statistics are made up). So something liquid finds its way onto your laptop or smart phone whether by accident or angry significant other and now you must act, or weep in the corner.  With the steps outlined below, you will be able to confidently jump into action and try to keep the damage to a minimum.
I’ve been in the repair industry for about 9 years now and have cleaned the following liquids out of laptops which then went on to live normal computery lives: beer(lager and porters), wine, milk, water, coffee, juice, cat pee (grosses one by far), “mystery white substance”( basically looked like a HAZMAT guy on that job), “mystery smells like human urine substance”(from a frat house), and a couple others I know I’m forgetting.  I haven’t been able to revive every single one of these without a hardware change out, but I have been successful in a good portion of them.  Follow these quick thinking steps below and you will stand a fighting chance!
Water Everywhere!
We are going to show you a quick “not-to-do” section here so you know what to avoid to not put yourself in danger of a possible liquid to laptop unwanted interaction.  See the pics below for a jump start on what not to do…..
Now the above is mostly for comedy’s sake but you can gather some good insight on what to stay away from as well.  Don’t go around swimming pools, lakes, beaches, or Atlantis with your laptop or smart phone. They are not designed to keep out liquids. They do a pretty poor job of keeping out solids for that matter too. There are too many holes and vents all over them to make them proficient at keeping most stuff at bay.
Don’t drink or eat around your laptop.  I already hear the whining and moaning about how you don’t have enough time in your day to do homework and eat or play WOW and function in normal society without having a soda or water right next to you.  Try and schedule yourself a couple minutes away from the laptop to munch down food and drink.  If you HAVE to have food or a drink around, look around and find a good place to set them so if they do get knocked over you wont be making up new curse words because your laptop just became water cooled.
It Happened! What do I do?
That dreadful time has come and your dog has just spilled a gallon of water all over the keyboard of your precious new Alienware RAIDed, super max GPU, RAMy goodness and you think you may be on the verge of a breakdown.  Now is not the time for panic!  **Immediately pull the AC adapter from the laptop and flip it over.  Quickly remove the battery and breathe a sigh of relief.  If you got to these steps without your laptop shutting down or making a popping or zapping sound, you stand a fighting chance.  Go grab a towel or paper towels and set your laptop, keyboard side down, on the drying apparatus.  Let it sit for as long as possible.  There isn’t a good rule of thumb for how long you should leave it sit like this because it could be anything from a drop of water to a 5 gallon bucket full that assaulted your lappy.
Personally, I would leave it for a day with a small fan pointed at it to help the evaporation process.  The next day gently lift it up and see if you notice any still wet areas.  If so, repeat the waiting game.  When it is fully dried out, to the best you can tell, is when you should start crossing your fingers.  Look over the laptop and see if you can see any residue pointing you to where the liquid may have came in contact.  Did it stay on the keyboard?  Did it make it to the touchpad?  Was it fully submerged in the Pacific?  If it only got a little on the keyboard, you may be at looking at worst a new keyboard.(About $25-$60)  If it was a lot, time to take it apart.  If you are not comfortable taking your laptop apart, take it to a professional.  If you plan on that, then you can skip the next paragraph.
Taking apart a laptop can be a challenge but if you are up to it, time to dive in and see where all of the liquid made it.  Heavily inspect the keyboard and touchpad circuit boards and their connectors.  If you see any wetness, dry it off with a non-conductive method such spray air.  Look over the motherboard and see if you notice that it made it that far.  If you see anything like the below picture, clean with alcohol or electronics cleaner and a soft toothbrush or Qtip.
This pic above is from one where the liquid either got to the board before it could be fully powered down or was something like milk/soda/juice/water and started to corrode the contacts.  Be careful when cleaning corroded points like this because if they have been this way long, they can eat at the solder joints making them weak.  If so, then you could dislodge a component and be in even bigger trouble.
After making sure the liquid residue is dried up and cleaned off can we finally see if what we had done above is going to pay off.  Plug in the AC adapter without the battery and try to power it on.  Hopefully it will power on and fully POST and boot.  If so, put the battery back in and try to boot again.  If both went smoothly then it is on to testing out all of the keyboard keys and the touchpad.  If they are sticky or stuck, you can try cleaning them with electronics cleaner.  My favorite is from the Blow Off brand.  If you want to make sure each button is being registered, run over to thiskeyboard testing site and try out each of your buttons.  If they both work, try your wifi, camera, and any other devices your laptop has to make sure everything made it out unscathed.  Hopefully by your quick actions you have saved your laptop and don’t have to replace any parts!
Conclusion
What have we learned from all of this?  First and foremost, don’t try and put yourself in the situation to possibly contaminate your laptop with a foreign substance.  Don’t eat or drink by it if possible.  Stay away from the beach or swimming areas and leaky toddlers as well.  If it happens, DON’T PANIC.  You now are equipped to minimize the damage done with these steps and quick thinking and acting.  The steps you take immediately after it happens could determine the fate of your laptop!

Tuesday, April 23, 2013

How to Safeguard Your Windows Computer from a Browser Hijack

browserhijack-iconA browser hijacking is the practice of taking advantage of vulnerabilities in the browser (or the user) to compromise the user’s computer in a manner that would serve the interests of the hijacker. Often, a browser hijack can make your browser start up on a page other than the homepage you have designated. Sometimes it silently watches you while you work and steals passwords or other data. There are a few ways a hijacker can actually compromise your browser, and we will detail each of them as well as discuss how to prevent them from happening.

Note: This article is specifically targeted at Windows computer, but the security issues could happen to any OS as well.

1. Vulnerabilities in Plugins

browserhijack-manipulation
Your browser, even “out of the box,” uses a number of plugins to add extra rendering capabilities on websites you visit. In Firefox, you can view these plugins in the Tools -> Add-ons -> Plugins” section. These plugins are generally fine, but some of them are poorly coded and open holes in your browser’s security that it has not anticipated. The Java plugin is a perfect example of a vulnerable module. Java’s interpreter itself is prone to very nasty vulnerabilities that allow hackers to infiltrate your computer and post updates on social media sites on your behalf.

How to protect yourself:

There are two things you can do: keep all your plugins up to date and delete any plugins you don’t absolutely need. I need not mention how difficult it is to keep 100 plugins up to date. It’s better to look after five or ten of them. This applies to the addons and extensions as well. (Note that in Firefox, plugins and addons are not referring to the same thing)

2. Being conned to download unwanted software

browserhijack-trap
If you have been to some sketchy download site, you would have seen cases where it try to convince you to download (and install) a software before you can download their stuff. They put fake download buttons on their pages leading to other sites that offer a “downloader application” to get your file. They convince you that you need this application in order to gain access. Once you run it, you are met with an unpleasant surprise. Sometimes the application doesn’t work at all but installs a virus in your computer. Other times it works, but installs a service that spies on your personal information.

How to protect yourself:

Look carefully at sites showing you more than one button for the same action. Be mindful of what you see on the Web and exercise scrutiny. If the website doesn’t have a strong positive reputation, don’t trust it. Search the website’s URL surrounded by quotation marks on Google. See what other people say about it.
And if you have downloaded the software, run a anti-virus/anti-malware test before you install it. If you do decide to install it even though you are not very sure about it, do a backup of your system first.

3. Toolbars

browserhijack-toolbar
When you install software, it sometimes sneaks into a dialog where it asks you if you want to install a toolbar (and that’s when it’s playing nice). This is the most common way in which people are duped into installing browser toolbars that mess with their computers. This kind of software relies on a psychological flaw, namely the fact that people have a general tendency to click “Yes” and “Next” and skip over installation steps in their impatience. It happens even to the best of us.
Toolbars are sometimes inoffensive, but many times, they can be just as bad as viruses. Some of them set your homepage and search provider as they see fit while not letting you disable this or uninstall them. Others grab your keyboard input and steal your passwords and other confidential information. Since you use your browser to log in to web-based services and authenticate your card data, it’s very obvious that a toolbar like this can be extremely dangerous to your privacy. Although such malware is not very common nowadays, it still poses a significant threat to users who are easily absent-minded during software installations.

How to protect yourself:

These toolbars tend to be very difficult to get rid of, so the best way is to observe your installations carefully everytime you run an installer.. If you’re installing a program and it asks you to install a toolbar, refuse wherever possible. If it’s not possible to refuse, do not install the application. There are always alternatives out there that are more worth your time. Remember always to keep your anti-virus up to date. Most antivirus software can efficiently detect malware that’s found in toolbars and get rid of it, even if you can’t. Don’t forget to try to stick to sites that are reputable rather than Internet back-alleys to download your stuff.

4. Native Browser Vulnerabilities

browserhijack-vulnerabilities
There are plenty of browsers out there and some of them come with unintended security vulnerabilities. If you (or your company) are still stubbornly using IE 6 and 7, or even 8, as your primary browser, you are basically inviting the hackers to attack you. Even a popular browser like Chrome also has security issues, namelycross-site scripting (XSS), that make it vulnerable to attack.

How to protect yourself: 

There is nothing much you can do except to wait for the browser’s developer to patch up the security loophole. Thus, you should always upgrade your browser to the latest version so new fixes to vulnerabilities will automatically be installed. In addition, make sure you exercise care and vigilance when browsing the web, even with the most secure and most updated software.

Questions?

If you have any questions, do not hesitate to leave a comment below! Also, don’t forget to let other readers know what useful tips you have to keep your browser safe!

Tuesday, April 16, 2013

Computer Troubleshooting Guide

This computer troubleshooting guide can help you troubleshoot and repair dead computers. When we mean “dead” we mean no signs of life at all. Where do you even begin? The average user doesn’t know the internal workings of their computer–and they shouldn’t have to. So when things go wrong, they do not know where to begin to diagnose and either fix the problem or make arrangements to have the problem corrected. The following steps will help give you some general knowledge of what could be wrong with your PC and give you some ideas on how to fix it or provide you with enough knowledge to prevent you getting ripped off at the computer repair shop.
For starters, if the computer is still under warranty, do not open the case, as this will void your warranty. HP, Dell and any other major manufacturer will respond quickly to your problems and arrange for you to send the computer in, or they might opt to send a technician out to work on the computer. If you bought the PC at a shop around the corner, send emails and begin a paper trail on the issue.
With that said, a completely dead computer will usually have either a bad motherboard, bad power supply, or a faulty case. The following steps will help you troubleshoot a computer and find which device is causing the problem. Well start with the easiest and work our way down to the hardest. One of the first things you’ll want to do is unplug the computer and take it to a table where you can lay it flat. Open the case and check the connections to see if you notice anything blatantly wrong, then proceed with the steps below.

Troubleshooting A Computer Power Supply

Power supplies can fail without warning. The worse part is, they can partially fail. This means you might be getting power to the motherboard, the fans and other components, but you do not have the correct voltages to start the motherboard.The power supply is located at the back of the case, and is where the power cable plugs into the PC.
  1. Your first step should be to plug the computer directly into the wall and bypass any power strips. You should also confirm the outlet is working properly.
  2. Make sure the red voltage regulator switch on the back is set to 115 if you reside in the United States, people in some countries will need to set theirs to 230. With the power off and unplugged, try toggling the switch to 230, then back to 115 to make sure it is seated in the right position.
  3. Next, buy a power supply tester. Computer techs will use a multimeter to test for proper voltages. Normal users can just buy a power supply tester. These are cheap and easy to use.
  4. If your power supply is bad, buy one of equal or greater power. If your current power supply is 350WT, be sure to get one that’s 350WT or higher. Shop for apower supplyTroubleshooting A Computer.
  5. If you have an HP computer, read these HP power Supply troubleshooting tips.
Troubleshooting A Computer
A power supply will tend to fail before anything else, as they take the most abuse. They are the front line when a power surge or brown out occurs. The good news is, they are extremely easy to replace should you find this is the problem.

Troubleshooting A Computer Case

While a dead PC will either normally be a bad power supply or bad motherboard, the next easiest thing to troubleshoot is the case. How can a case go bad? A case has minimal smarts, but it does have wires leading from the power button to the motherboard that can go bad, and some even have advanced I/O panels that can fail.
  1. You can try bypassing the case switch. This means you are initiating the power-on sequence without using the button on the front of the case. For this, you will need a good set of eyes and a small, flat-head screw driver. The idea is to find the wire leading from the power button to the motherboard that’s marked something like POWER SW or POWER ON. It will cover two pins on the motherboard. Carefully, with the computer plugged in, touch tip of the flat head screwdriver to both of those pins at the same time, thus “shorting” them. You will not get shocked by doing this, but you need to be careful not to scratch the motherboard. Read more on bypassing the case switch here.
  2. If you have a Dell computer, read how to test a Dell I/O panel here.

Troubleshooting A Computer Motherboard

The motherboard is the hardest thing to diagnose and replace. If your motherboard is proven to be bad, it must be removed from the case and replaced. Unfortunately, there’s a lot of stuff plugged into the motherboard, such as the CPU, RAM, PCI cards, Video Cards, hard drives, CD / DVD drives, power supply and fans. There are also tricky connections that must be made to the case’s power and reset switches. So replacing a bad motherboard is a long process. A bad motherboard will be determined by the following:
  1. If all of the above are not the problem, the motherboard is the problem by default.
  2. A bad motherboard might have visual signs of damage, such as bulging or leaking capacitors. See below.
  3. With the computer unplugged, try holding in on the power button for twenty seconds. This will drain the capacitors of any excess power. The computer might start up and work fine forever. If the computer starts, then fails again after doing this, then the motherboard is bad.
  4. Try removing any non-essential cards and drives in the computer. You do not need modems, sound cards, hard drives, CD / DVD drives, or floppy drives connected to boot. Our goal is to get a clean power-up situation, not boot into windows. If you remove non-essential parts and you still have no power, then the motherboard is bad.
computer troubleshooting tips