Monday, August 10, 2009

Reset CMoS Password 2 (Laptop & Desktop)


Reset CMoS Password 2 (Laptop & Desktop)


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=10982a591924deef0277617728aa70f1a6ee9460&f=Reset%20CMoS%20Password%202%20%28Laptop%20%26%20Desktop%29%20%7BHANURU%7D%5BH33T%5D.torrent


PC CMOS Cleaner 2

There are times that we need to reset the computer’s BIOS security password.The most common way that most of us know on how to reset or clear the BIOS password is to physically remove the power from the computer by disconnecting the power plug and then removing a battery for 30 minutes from the motherboard. Another way is to reset the clear CMOS jumper on the motherboard itself. Both of the 2 methods mentioned works because most motherboards use a battery to sustain the BIOS/CMOS settings for the motherboards PROM chip. So by cutting off the battery power, the BIOS/CMOS settings will be erased.

If for some reason you’re unable to reset the computer’s BIOS or CMOS security password by removing the battery or clearing the CMOS jumper (using a laptop), here are few tools which you can try to use it to clear the BIOS password.

How to reset the password using PC CMOS Cleaner.
1.Start up

Insert PC CMOS Cleaner CD, Set BIOS to boot from CD/DVD-ROM.
The first page presents to user is : PC CMOS Cleaner is ready to run.

PC CMOS Cleaner will try to decrypt the encrypted password store in CMOS and list the possible results in the list box:
BIOS type : the type of the BIOS.
Possible passwords:
possible passwords store in current computer. The passwords are listed between '<' and '>' .
3. Reset the BIOS to default state

If the possible passwords do not work. PC CMOS Cleaner will try to reset the BIOS to the default state.
This action will blank the BIOS password. You may also lose all your previous settings.
There are two choice for you:
Choice 1: Reset password (try to keep date and time)
This choice will try to reset the BIOS, but keep the date and time.
Choice 2: Reset bios (all setting will be set to default, password will be erased)
This choice will reset all data in BIOS to default state.
Please try the Choice1 before Choice2.

PC CMOS Cleaner is an easy-to-use tool to recover, delete, decode and display the superior passwords stored in BIOS whatever the brand is. Most types of BIOS such as AWARD, AMI, Compaq, Phoenix, Samsung,DELL, IBM, Compaq, DTK, Thinkpad, Sony, Toshiba are supported. It’s an bootable CD that runs on x86 and x86_64 computers. It can display the superior passwords of the BIOS, remove BIOS password(will set the BIOS to default status, need reset date).

Monday, July 20, 2009

Games Patches & Keygens & Serials AIO - 2009


Games Patches & Keygens & Serials AIO - 2009


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=87724295e57439c8e6be54a8c87a004560715250&f=Games%20Patches%20%26%20Keygens%20%26%20Serials%20AIO%20-%202009%20%5BHANURU%5D%7BH33T%7D.torrent


Composition:
- Game CD Key List 3.40
- Huge Collection Of Mini-Games Serials
- Alawar UniCrack
- BigFish Games Loader
- EA Games Generic Keygen
- GameHouse Universal-Patch
- iWin Games-Patch
- Lolo.ru & Mail.ru All Games-Patch
- Oberon Games Crc & Serials
- PopCap Games Crc
- Real Arcade Patch
- Reflexive Games Patch & Crc
- Zylom Universal-Patch
- Added New Gamehouse Generic Crc
- Added New PopCap Games Universal Crc
- Added More Patching Instructors & Info
- Updated "Ea Games keygen to v179
- Removed "Popcap Games Unlock Patch"
- Removed "ShockWave Games Serials"
- Minor Improvement & Changes

Windows Activator ALL-OS Ultimate Edition

Windows Activator ALL-OS Ultimate Edition



To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=2be321293ed80b4c9babf3212393ddd11dd2b6c5&f=Windows%20Activator%20ALL-OS%20Ultimate%20Edition%20Series%20June%202009%20%28Build%205168%29%20%28MarishKA%29%20%28H33T%29.torrent






:: Details ::

:: What's New? ::
- No booting text from Vista Bios emulator
- 100% faster to activate
- Automated script
- Advanced Install Script (Detects almost all problems)
- New High Quality menu
- CleanTool (Cleans all previous activation cracks)
- Lightweight and silent activation

:: Supported OS ::
- Windows Vista Ultimate
- Windows Vista Business
- Windows Vista Enterprise
- Windows Vista Home Premium
- Windows Vista Home Basic
- Windows Vista Starter
- Windows Server 2008 Standard
- Windows Server 2008 Enterprise
- Windows Server 2008 Datacenter
- Windows Server 2003 (All)
- Windows Home Server
- Windows 7 Build 7100 or later
- Windows XP Home
- Windows XP Professional
- Windows XP Media Center Edition 2002
- Windows XP Media Center Edition 2005

All Service Packs or Power Packs are supported
All OS in x32(x86)Bit and x64(x64)Bit are supported

[There is a X64 problem found in this program, so doesn't work]

Experimental for: Windows Server 2008 R2

:: Tested OS ::
- Windows Vista Ultimate SP1
- Windows Vista Enterprise SP2 x86
- Windows XP Pro SP3
- Windows Home Server PP1
- Windows 7 Build 7100 RC
- Windows Server 2008 Enteprise SP1

:: What uses this activator? ::
- Vista Loader V4.9.7
- Server 2008 OEM activator
- Windows XP ntuser crack
- Windows 7 RC activator

Friday, July 10, 2009

mIRC v6.35 Inc Crack



To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=5922acc437498df0ee1c039319392c6eb4034bb7&f=mIRC%20v6.35%20Inc%20Crack%20LnDL%20%5Bh33t%5D%5BDave3737%5D.torrent


Description


mIRC is a popular Internet Relay Chat client used by millions of people, and thousands of organizations, to communicate,
share, play and work with each other on IRC networks around the world. Serving the Internet community for over a decade,
mIRC has evolved into a powerful, reliable and fun piece of technology. You can download mIRC here.

mIRC is a full featured Internet Relay Chat client for Windows that can be used to communicate, share, play or work with
others on IRC networks around the world, either in multi-user group conferences or in one-to-one private discussions.
It has a clean, practical interface that is highly configurable and supports features such as buddy lists, file transfers,
multi-server connections, SSL encryption, proxy support, UTF-8 display, customizable sounds, spoken messages, tray
notifications, message logging, and more.mIRC also has a powerful scripting language that can be used both to automate mIRC
and to create applications that perform a wide range of functions from network communications to playing games. mIRC has
been in development for over a decade and is constantly being improved and updated with new technologies. The most recent
changes can be found on the latest news page.

Install

Unpack with any archiver
Run setup exe to install program
copy files from crack folder to program DIR
usually c:\programs\program name and replace files
Then enter any info in the registration field
enjoy

Microsoft Windows Server 2008 12in1 MSDN DVD-CRBS


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=78645c92b95452bf0fe7764820519fdc08161a5a&f=Microsoft%20Windows%20Server%202008%2012in1%20MSDN%20DVD-CRBS%20%5Bh33t%5D%20%5BOriginal%5D.torrent


INFO:

This DVD is NOT homemade, it’s the MSDN media subscribers version (not available in msdn downloads),
part #X14-82292. Bootable and working. Enjoy.

Unpack, install. Googlecrack patches wga too, read txt from /Crack before patching.

Windows Server 2008 Standard (x86 and x64)
Windows Server 2008 Enterprise (x86 and x64)
Windows Server 2008 Datacenter (x86 and x64)
Windows Server 2008 Standard (Server Core) (x86 and x64)
Windows Server 2008 Enterprise (Server Core) (x86 and x64)
Windows Server 2008 Datacenter (Server Core) (x86 and x64)

Fast seed links:


Code
http://rapidshare.com/files/197690230/cape.GoLeech.org.Ser.part01.rar
http://rapidshare.com/files/197693777/cape.GoLeech.org.Ser.part02.rar
http://rapidshare.com/files/197690121/cape.GoLeech.org.Ser.part03.rar
http://rapidshare.com/files/197693598/cape.GoLeech.org.Ser.part04.rar
http://rapidshare.com/files/197693700/cape.GoLeech.org.Ser.part05.rar
http://rapidshare.com/files/197693387/cape.GoLeech.org.Ser.part06.rar
http://rapidshare.com/files/197689797/cape.GoLeech.org.Ser.part07.rar
http://rapidshare.com/files/197693278/cape.GoLeech.org.Ser.part08.rar
http://rapidshare.com/files/197693969/cape.GoLeech.org.Ser.part09.rar
http://rapidshare.com/files/197693868/cape.GoLeech.org.Ser.part10.rar
http://rapidshare.com/files/197690063/cape.GoLeech.org.Ser.part11.rar
http://rapidshare.com/files/197693892/cape.GoLeech.org.Ser.part12.rar
http://rapidshare.com/files/197689696/cape.GoLeech.org.Ser.part13.rar
http://rapidshare.com/files/197690134/cape.GoLeech.org.Ser.part14.rar

Instructions:

UnRAR all files and burn .ISO main file to DVD!

Use one of the two methods to activate Windows.
One does enable all server services but does not pass WGA the other does NOT enable server services but does pass WGA (works as if a workstation)!

You can help us to warm this torrent up faster. If you really want to share this all you have to do is to download from fast seed links one or more of these files and as much as you get each file you copy to the folder where your torrent client (Azureus, utorrent etc) is saving the other files. You need to stop the downloading, remove torrent from list, replace files already gotten from RS and reload this torrent. uTorrent or any torrent client will recheck all files and see those you have gotten as 100 %. This will help to seed other people and finish downloading all files faster. If each one gets one we need only 10 people to do this each one with one file. The more files the faster. We should hurry up because these links will not last forever but this torrent may... I do not know. I will seed all files of course but if everybody helps it will be really great.

The instructions to seed seem difficult but they are not. You can download all files or some from rapidshare to an folder and start torrent downloading to the same folder after that. What your torrent client (uTorrent, Azureus or any) will do is check the files if they are equal to those you are about to download and if yes will seed them. Those you did not download from rapidshare will be downloaded but torrent client. You can start torrent and download files from rapidshare at the same time but each one you get from fast seed links you have to stop torrent, remove it from list and copy that file you have gotten from fast seed links to the folder where torrent client is saving all files replacing that file with fast seed links recently gotten. Then restart torrent that will check all files again and start seeding as well.



Please seed as much as you can!
Thank you!

Friday, July 3, 2009

Troubleshooting Tips and Techniques

Troubleshooting PC hardware problems can seem daunting to the uninitiated, but in reality it is much simpler than it seems. Most problems can be diagnosed and corrected using few, if any, special tools and can be accomplished by anybody who can apply simple deductive reasoning and logical thinking. PCs have become more complicated and yet simpler all at the same time. More and more complex internal circuits mean that there are potentially more things that can go wrongmore ways the system can fail. On the other hand, today's complex circuits are embedded into fewer boards, with fewer chips on each board and more serial interconnections using fewer pins (fewer wires). The internal consolidation means that isolating which replaceable component has failed is in many ways simpler than ever before. An understanding of the basics of how PCs work, combined with some very simple tools, some basic troubleshooting tips, and logical thinking and common sense, will enable you to effectively diagnose and repair your own systems, saving a tremendous amount of money over taking it to a shop. In some cases, you can save enough money to practically pay for an entire new system. The bottom line with troubleshooting PC problems is that a solution exists for every problem, and through simple practices combined with deductive reasoning, that solution can easily be found.

Modern PCsMore Complicated and More Reliable

Consider this: The modern PC is an incredible collection of hardware and software. Focusing specifically on the hardware, between 50 and more than 400 million transistors exist in modern processors. In addition, nearly 8.6 billion transistors are in 1GB of RAM; hundreds of millions of transistors exist in the motherboard chipset, video processor, and video RAM; and millions more are in the other adapter cards or logic boards in the system. Each of these billions of interconnected transistors must not only function properly, but also operate in an orderly fashion within strictly enforced timing windows, some of which are measured in picoseconds (trillionths of a second). When you realize that your PC will lock up or crash if any one of these transistors fails to operate properly and on timeand/or any one of the billions of circuit paths and interconnections between the transistors or devices containing them fails in any wayit is a wonder that PCs work at all!

Every time I turn on one of my systems and watch it boot up, I think about the billions upon billions of components and trillions upon trillions of machine/program steps and sequences that have to function properly to get there. As you can now see, many opportunities exist for problems to arise.

Although modern PCs are exponentially more complicated than their predecessors, from another point of view they have become simpler and more reliable. When you consider the complexity of the modern PC, it is not surprising that problems occasionally do arise. However, modern design and manufacturing techniques have made PCs more reliable and easier to service despite their ever-increasing internal complexity. Today's systems have fewer and fewer replaceable components and individual parts, which is a bit of a paradox. The truth is that, as PCs have become more complex, they have also become simpler and easier to service in many ways.

Industry-Standard Replaceable Components

The use of industry-standard components is one of the key features of a PC. This means that virtually all the parts that make up a system are interchangeable with other systems in some manner. This also means that the parts are plentiful, inexpensive, and generally very easy to install. A typical PC contains the following replaceable components, most of which are made to industry standards for design and form factor:

  • Motherboard

  • Processor

  • CPU heatsink/fan

  • RAM

  • CMOS battery

  • Chassis with optional fan

  • Power supply

  • Video card[*]

    [*] May be integrated into the motherboard in some systems.

  • Monitor

  • Sound card[*]

  • Speakers

  • Network card[*]

  • Hard drive

  • CD-ROM/RW drive

  • DVD-ROM/+RW drive

  • Floppy drive

  • Drive cables

  • Keyboard

  • Mouse

Although some of the more well-optioned systems might have even more components than listed here, you can see that most PCs have fewer than 20 replaceable "parts." Some can have as few as 1015, depending on how many options are present and how they are integrated. From a hardware troubleshooting or repair perspective, one of these components is either improperly installed (configured) or defective. If it's improperly installed or configured, the component can be repaired by merely reinstalling it or configuring it properly. If it's truly defective, the component must simply be replaced. When a PC is broken down to the basic replacable parts, you can see that it really isn't that complicated, which is why I've spent my career helping people to easily perform their own repairs or upgrades and even build entire systems from scratch.

Reinstall or Replace?

When dealing with hardware problems, the first simple truth to understand is that you do not usally repair anythingyou reinstall or replace it instead. You reinstall because the majority of PC hardware problems are caused by a particular component being improperly installed or configured. I remember hearing from IBM many years ago that it had found that 60% or more of the problems handled by its service technicians were due to improper installation or configuration, meaning the hardware was not actually defective. This was, in fact, the major impetus behind the plug-and-play revolution, which has eliminated the need to manually configure jumpers and switches on most hardware devices. This has thus minimized the expertise necessary to install hardware properly and has also minimized installation, configuration, and resource conflict problems. Still, plug and play has sometimes been called plug and pray because it does not always work perfectly, sometimes requiring manual intervention to make it work properly.

You replace because of the economics of the situation with computer hardware. The bottom line is that it financially is much cheaper to replace a failed circuit board with a new one than to repair it. For example, you can purchase a new, state-of-the-art motherboard for around $100, but repairing an existing board normally costs much more than that. Modern boards use surface-mounted chips that have pin spacings measured in hundredths of an inch, requiring sophisticated and expensive equipment to attach and solder the chip. Even if you could figure out which chip had failed and had the equipment to replace it, the chips themselves are usually sold in quantities of thousands and obsolete chips are usually not available. The net effect of all of this is that the replacable components in your PC have become disposable technology. Even a component as large and comprehensive as the motherboard is replaced rather than repaired.

Troubleshooting by Replacing Parts

You can troubleshoot a PC in several ways, but in the end it often comes down to simply reinstalling or replacing parts. That is why I normally use a simple "known-good spare" technique that requires very little in the way of special tools or sophisticated diagnostics. In its simplest form, say you have two identical PCs sitting side by side. One of them has a hardware problem; in this example let's say the memory module (DIMM) is defective. Depending on how and where the defect lies, this could manifest itself in symptoms ranging from a completely dead system to one that boots up normally but crashes when running Windows or software applications. You observe that the system on the left has the problem but the system on the right works perfectlythey are otherwise identical. The simplest technique for finding the problem would be to swap parts from one system to another, one at a time, retesting after each swap. At the point when the DIMMs were swapped, upon powering up and testing (in this case testing is nothing more than allowing the system to boot up and run some of the installed applications), the problem has now moved from one system to the other. Knowing that the last item swapped over was the DIMM, you have just identified the source of the problem! This did not require an expensive ($2,000 or more) DIMM test machine or any diagnostics software. Because components such as DIMMs are not economical to repair, replacing the defective DIMM would be the final solution.

Although this is very simplistic, it is often the quickest and easiest way to identify a problem component as opposed to specifically testing each item with diagnostics. Instead of having an identical system standing by to borrow parts from, most technicians have an inventory of what they call "known-good spare" parts. These are parts that have been previously used, are known to be functional, and can be used to replace a suspicious part in a problem machine. However, this is different from new replacement parts because, when you open a box containing a new component, you really can't be 100% sure that it works. I've been in situations in which I've had a defective component and replaced it with another (unknown to me) defective new component and the problem remained. Not knowing that the new part I just installed was also defective, I wasted a lot of time checking other parts that were not the problem. This technique is also effective because so few parts are needed to make up a PC and the known-good parts don't always have to be the same (for example, a lower-end video card can be substituted in a system to verify that the original card had failed).

Troubleshooting by the Bootstrap Approach

Another variation on this theme is the "bootstrap approach," which is especially good for what seems to be a dead system. In this approach, you take the system apart to strip it down to the bare minimum necessary, functional components and test it to see whether it works. For example, you might strip down a system to the chassis/power supply, bare motherboard, CPU (with heatsink), one bank of RAM, and a video card with display and then power it up to see whether it works. In that stripped configuration, you should see the POST or splash (logo) screen on the display, verifying that the motherboard, CPU, RAM, video card, and display are functional. If a keyboard is connected, you should see the three LEDs (capslock, scrlock, and numlock) flash within a few seconds after powering on. This indicates that the CPU and motherboard are functioning because the POST routines are testing the keyboard. After you get the system to a minimum of components that are functional, you should reinstall or add one part at a time, testing the system each time you make a change to verify it still works and that the part you added or changed is not the cause of a problem. Essentially, you are rebuilding the system from scratch using the existing parts, but doing it one step at a time.

Many times problems are caused by corrosion on contacts or connectors, so the mere act of disassembling and reassembling a PC will "magically" repair it. Over the years, I've disassembled, tested, and reassembled many systems only to find no problems after the reassembly. How can merely taking it apart and reassembling repair a problem? Although it might seem that nothing was changed and everything is installed exactly like it was before, in reality simply unplugging and replugging renews all the slot and cable connections between devices, which is often all the system needs. Some useful troubleshooting tips include

  • Eliminate unnecessary variables or components that are not pertinent to the problem.

  • Reinstall, reconfigure, or replace only one component at a time.

  • Test after each change you make.

  • Keep a detailed record (write it down) of each step you take.

  • Don't give up! Every problem has a solution.

  • If you hit a roadblock, take a break or work on another problem. A fresh approach the next day often reveals things you overlooked.

  • Don't overlook the simple or obvious. Double- and triple-check the installation and configuration of each component.

  • Keep in mind that the power supply is one of the most failure-prone parts in a PC, as well as one of the most overlooked components. A high-output "known-good" spare power supply is highly recommended to use for testing suspect systems.

  • Cables and connections are also a major cause of problems, so keep replacements of all types on hand.

Before starting any system troubleshooting, a few basic steps should be performed to ensure a consistent starting point and to enable isolating the failed component:

  1. Turn off the system and any peripheral devices. Disconnect all external peripherals from the system, except for the keyboard and video display.

  2. Make sure the system is plugged in to a properly grounded power outlet.

  3. Make sure the keyboard and video displays are connected to the system. Turn on the video display, and turn up the brightness and contrast controls to at least two-thirds of the maximum. Some displays have onscreen controls that might not be intuitive. Consult the display documentation for more information on how to adjust these settings. If you can't get any video display but the system seems to be working, try moving the card to a different slot (not possible with AGP or PCI Express video adapters) or try a different video card or monitor.

  4. To enable the system to boot from a hard disk, make sure no floppy disk is in the floppy drive. Or put a known-good bootable floppy with DOS or diagnostics on it in the floppy drive for testing.

  5. Turn on the system. Observe the power supply, chassis fans (if any), and lights on either the system front panel or power supply. If the fans don't spin and the lights don't light, the power supply or motherboard might be defective.

  6. Observe the power on self test (POST). If no errors are detected, the system beeps once and boots up. Errors that display onscreen (nonfatal errors) and that do not lock up the system display a text message that varies according to BIOS type and version. Record any errors that occur and refer to the disc accompanying this book for a list of BIOS error codes for more information on any specific codes you see. Errors that lock up the system (fatal errors) are indicated by a series of audible beeps. Refer to the disc for a list of beep error codes.

  7. Confirm that the operating system loads successfully.

Problems During the POST

Problems that occur during the POST are usually caused by incorrect hardware configuration or installation. Actual hardware failure is a far less-frequent cause. If you have a POST error, check the following:

  1. Are all cables correctly connected and secured?

  2. Are the configuration settings correct in Setup for the devices you have installed? In particular, ensure the processor, memory, and hard drive settings are correct.

  3. Are all drivers properly installed?

  4. Are switches and jumpers on the baseboard correct, if changed from the default settings?

  5. Are all resource settings on add-in boards and peripheral devices set so that no conflicts existfor example, two add-in boards sharing the same interrupt?

  6. Is the power supply set to the proper input voltage (110V120V or 220V240V)?

  7. Are adapter boards and disk drives installed correctly?

  8. Is a keyboard attached?

  9. Is a bootable hard disk (properly partitioned and formatted) installed?

  10. Does the BIOS support the drive you have installed, and if so, are the parameters entered correctly?

  11. Is a bootable floppy disk installed in drive A:?

  12. Are all memory SIMMs or DIMMs installed correctly? Try reseating them.

  13. Is the operating system properly installed?

Hardware Problems After Booting

If problems occur after the system has been running, and without having made any hardware or software changes, a hardware fault possibly has occurred. Here is a list of items to check in that case:

  1. Try reinstalling the software that has crashed or refuses to run.

  2. Try clearing CMOS RAM and running Setup.

  3. Check for loose cables, a marginal power supply, or other random component failures.

  4. A transient voltage spike, power outage, or brownout might have occurred. Symptoms of voltage spikes include a flickering video display, unexpected system reboots, and the system not responding to user commands. Reload the software and try again.

  5. Try reseating the memory modules (SIMMs, DIMMs, or RIMMs).

Problems Running Software

Problems running application software (especially new software) are usually caused by or related to the software itself, or are due to the fact that the software is incompatible with the system. Here is a list of items to check in that case:

  1. Does the system meet the minimum hardware requirements for the software? Check the software documentation to be sure.

  2. Check to see that the software is correctly installed. Reinstall if necessary.

  3. Check to see that the latest drivers are installed.

  4. Scan the system for viruses using the latest antivirus software.

Problems with Adapter Cards

Problems related to add-in boards are usually related to improper board installation or resource (interrupt, DMA, or I/O address) conflicts. Chapter 4, "Motherboards and Buses," has a detailed discussion of these system resources, what they are, how to configure them, and how to troubleshoot them. Also be sure to check drivers for the latest versions and ensure that the card is compatible with your system and the operating system version you are using.

Sometimes adapter cards can be picky about which slot they are running in. Despite the fact that, technically, a PCI or ISA adapter should be able to run in any of the slots, minor timing or signal variations sometimes occur from slot to slot. I have found on numerous occasions that simply moving a card from one slot to another can make a failing card begin to work properly. Sometimes moving a card works just by the inadvertent cleaning (wiping) of the contacts that takes place when removing and reinstalling the card, but in other cases I can duplicate the problem by inserting the card back into its original slot. When all else fails, try moving the cards around! Because some motherboards share a single IRQ between two PCI slots or between a PCI and an AGP slot, changing one of the PCI cards to another slot can resolve conflicts.

Caution

Note that PCI cards become slot specific after their drivers are installed. By this I mean that if you move the card to another slot, the plug-and-play resource manager sees it as if you have removed one card and installed a new one. You therefore must install the drivers all over again for that card. Don't move a PCI card to a different slot unless you are prepared with all the drivers at hand to perform the driver installation. ISA cards don't share this quirk because the system is not aware of which slot an ISA card is in.


Xara Xtreme Pro v5.1.0.9131


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=9777a13dd2b588d6ee7807da03bfe9106a0e69b4&f=Xara%20Xtreme%20Pro%20v5.1.0.9131%5Bh33t%5D%5BDave3737%5D.torrent

Xara Xtreme Pro v5.1.0.9131

Description

Xara Xtreme Pro 5 is a powerful and easy to use document creation and graphics tool, able to produce everything from top quality websites to highly complex illustrations and multi-page Desk Top Publishing and PDF documents. If you're working with photos, then Xtreme Pro can handle everything from a simple one-click auto-enhance of your photo to awesome digital photo compositions. If you're creating a website, then Xtreme Pro can help you produce everything you need, from Flash animations to complete web page layouts and even complete websites. If you're looking for drawing and design software, then Xtreme Pro is a perfect solution for everything from simple logos, greetings cards and invitations to astonishingly detailed illustrations.

Whatever graphics you need and whatever your skill level, the intuitive user interface and fast processing of Xara Xtreme Pro 5 will make it an absolute pleasure to be creative. And even if you have little or no design ability the wide selection of professionally designed templates provided with the product on CD means you can still produce stunning documents and websites!

Main features:
» Most sophisticated, highest performance vector rendering engine
» Create effects such as transparency, shadows etc in an interactive, fast and intuitive way
» Drag and Drop support
» Unlimited undo and redo levels
» Zoom tool allows magnification up to 25,000%, perfect for detailed work
» Vector anti-aliasing to bring maximum screen quality
» Fastest, slickest, and highest quality vector 3D extrude tool
» A set of built-in really easy vector line and shape editing tools
» The blend tool to tweens or blends from one shape to another
» Live Effects are plug-in effects that can be applied to any object, including vector drawings
» Several powerful tools that allow you to add realistic effects with a single click
» Unique non-destructive editing of photos
» Integrated, ultra-fast, non-destructive photo editing tool
» Create panorama photos
» Support Adobe Photoshop® plug-ins
» Built-in 'website creation' feature that enables you to design multi-page websites with ease
» Create really efficient Flash animations
» Xara Xtreme sites are W3C compliant, cross browser compatible and XHTML, CSS standards based
» Support for a huge range of file formats (e.g. GIF, JPEG, BMP, PNG, TIFF, PSD, RAW, EPS, AI, PDF, WMF etc.)
» Full support for importing and exporting PSD files
» Ability to produce CMYK color separations
» Support XPS export (and has a beta XPS import filter)

Install

Unpack with any archiver
Run setup exe to install program
Copy patch to program directory and run patch to register

Ashampoo Burning Studio 9.05 Silent Installer

To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=5689bb965d49688f9aacb02fe91d814e8ac52784&f=Ashampoo%20Burning%20Studio%209.05%20Silent%20Installer%5Bh33t%5D%5BDave3737%5D.torrent
Ashampoo Burning Studio 9.05 Silent Install

Description

he easiest way to burn your data, music and movie files to CD, DVD or Blu-ray Disc! You just choose your format, select your files and burn your disc. It really is that easy, but easy doesn’t mean you get less functionality: Advanced burning functions are also available for experienced users who want to choose specific file systems or use special boot images.
This Ashampoo CD/DVD/Blu-ray burning application makes it really easy to create & copy your own data, video, audio and multisession CDs, DVDs and Blu-ray discs.. Many current CD/DVD burning programs are universal “everything including the kitchen sink” applications that are overloaded with countless confusing functions. With Ashampoo Burning Studio you can save your music and data files to CDs, DVDs and Blu-ray discs with just a couple of mouse clicks! Ashampoo Burning Studio supports all current DVD and CD writers. The program supports following disc types: CD-R, RD-RW, DVD-R/RW, DVD+R/RW, DVD-RAM, DVD+R Double Layer and Blu-ray.

Just do what you want to do!
• Burn Files and Folders!
• Backup or Restore Files and Folders!
• Burn or Rip Music!
• Burn Movies!
• Copy a CD/DVD/Blu-ray Disc
• Create and Burn images!
• Experts Functions
• Erase a CD-RW, DVD-RW, Blu-ray Disc!
• Print and Design Covers

Anyone who has ever struggled with complicated disc burning software is always amazed when they try Ashampoo Burning Studio. This is how software should be: Instead of studying complicated manuals you just choose what you want to do and then follow the instructions displayed on the screen. For example, to make a DVD you select Create a Video DVD and the program guides you through the steps of adding clips, building menus and burning the disc.
This doesn’t mean the program has been “dumbed down”: Burning Studio is a complete and powerful disc burning suite that also satisfies advanced users with all the tweaking features you expect from less accessible programs.

The features of Ashampoo Burning Studio:
• Burn files and folders to CD/DVD/Blu-ray and add files and folders to existing discs
• Multi-disc file backup and restore on CD/DVD/Blu-ray with compression and password protection
• Create VideoCDs and Super VideoCDs
• Rip music from audio CDs to MP3, WMA and WAV files
• Create audio CDs from WAV, MP3, FLAC, WMA and Ogg Vorbis files
• Create MP3 or WMA CDs, DVDs and Blu-ray discs or just copy music to CD, DVD or Blu-ray
• Copy CDs, DVDs and Blu-ray discs
• Create and burn disc images for CD, DVD and Blu-ray
• Quickly erase any rewritable media
• Store disc images larger than 2GB on FAT32 file systems
• Interactive troubleshooting assistant for solving hardware and media problems
• Save project files so that you can burn the same discs again later
• Integrated support for over 1,700 CD, DVD and Blu-ray burners
• Video: Burn Video DVDs directly from almost any video files
• Modified and Bootable Copies: Add additional files while copying discs, make modified copies of bootable discs
• MP3 Ripping: Rip audio CDs directly to MP3 as well as WMA or WAV
• Backup and Restore: Choose archive size, restore individual files
• Expert Functions: Create bootable discs from boot images, choose file system settings
... and much more!

Ashampoo Burning Studio 9 is a major update that improves almost every aspect of the program, adding many new features and capabilities in every part of the program. It also introduces a new Movie Editor for editing and combining your videos before burning them to DVD. The Movie Editor has functions for cutting, transitions, fades, subtitles, titles and more, plus a point-and-click DVD menu editor with animated themes for creating great-looking interfaces for your DVD movies. The new version also packed with improvements, new features and fine tuning that make all Burning Studio’s functions more powerful and even easier to use.

Now with video editing and many new features:
• For all your CD, DVD and Blu-ray burning tasks
• Fast and easy – choose a task and follow instructions
• New full-featured movie editor – cut and combine videos
• Cover and label designer for discs and cases
• Advanced animated slide show editor and burner
• Burn all kinds of data, music, video and photo discs
• Copy discs, backup and restore your data
• Rip music to a variety of formats
• Update existing discs, add new data and content

Ashampoo Burning Studio 9 comes with a great package of new features:
? New Movie Editor and Movie Player
? Play all videos, slideshows and movies in the new Movie Player
? New project type: Video Edit DVD with Movie Editor
? Create MP3 or WMA CDs from lists of tracks with multiple formats
? Preview images are now automatically exported to Cover Editor
? New options dialogs for video, audio, decoder, encoder and drive settings
? Selectable program skins for user interface
? Many user settings are saved and reloaded automatically
? Many new burners added to the database
? DVD projects are now saved with all slideshows and movies
? Automatic check for conflicts with other programs with user warning

The new Movie Editor and Movie Player
The biggest new feature of Ashampoo Burning Studio 9 is the Movie Editor, which adds powerful video editing and DVD interface building capabilities to the program. This is not just a little clip trimmer – you probably won’t need any other video editing software. Movie Editor has all the features you need to turn your clip collection and home videos into impressive finished movies.
You also get a brand new Movie Player with a significantly improved video rendering engine and a modern graphical interface.

Movie Editor highlights:
? Edit videos with timeline and preview
? Super-easy drag-and-drop editing for videos, subtitles etc.
? Graphical timeline for clips, transitions, titles, subtitles and images
? Burn finished movies to DVD with animated menus
? Ready-to-use themes for DVD menus
? Cut clips into separate blocks, trim and extract sections
? Assemble multiple clips in a few easy steps
? Add titles, subtitles, shaped text etc.
? Add images, logos and graphical shapes with fill, borders etc.
? Cross-fades and graphical transitions between clips
? Fade-in and fade-out for all objects (images, texts etc.)
? Live preview your movies in the editor with transitions
? Add background music to movies
? Rotate images directly in the Movie Editor
? Set start and end times for clips (play only part of clip)
? Automatic search for scene boundaries

Movie Player highlights
? Modern graphical interface, very intuitive with popup control tips
? Volume control, display current play position and total time
? Clip display with jump to position controls
? Full screen mode with quick switch control

Slideshow Editor
The Slideshow Editor makes it a snap to turn your photos into impressive DVD slideshows with animated graphical menus. You can also include video clips in your slideshows. Just select your photos, videos and background music tracks and burn. Here too, you can produce shows instantly by choosing ready-to-use themes or get creative and design your own. Burning Studio comes with a set of attractive themes and you can download more from the Ashampoo website.

New Slideshow Editor features:
? Timeline editing with drag & drop and preview
? Cross-fades and graphical transitions between images
? Thumbnail preview for fades and transitions
? Add background music for the entire show with multiple tracks
? Add titles, subtitles, shaped text
? Add images, logos and graphical shapes with fill, borders etc.
? Fade-in and fade-out for all objects (images, texts etc.)
? Rotate images directly in the editor
? Ready-to-use themes

Cover Editor
The Cover Editor has everything you need for labeling your discs and producing cool covers for jewel cases, slim cases, DVD cases and Blu-ray cases. You can design your own or just enter a title and select one of the pre-designed themes for instant point-and-click results – it also imports track data from your discs automatically. The Cover Editor prints both on a wide range of predefined label formats and directly onto discs on printers that support this function.

New Cover Editor features
? Save your own designs as themes and reuse or share them
? Export projects as XML files
? Scan covers directly from original CD covers
? Load covers and graphics from files, the Web or the Windows Clipboard
? Attractive new themes with new graphics and layouts
? Editor improvements, faster operation
? Draw and insert geometrical shapes with borders, fill and transparency
? Group elements in the editor to move them together
? Free rotation for objects and groups of objects, or snap rotate in 15°, 45° or 90° increments
? Print up to 4 CDs on a single page
? Printer calibration utility for maximum precision printing, calibration settings are saved for every printer used – you only need to calibrate once
? Updated label and printer database with many new formats and printers
? Undo function in the Table Editor

Install

Double click installer that's it enjoy
Program will appear in start menu all programs

Wednesday, July 1, 2009

5 new Vista Activators...1 click Activation (All versions)


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=67425c96b9408574cf44c8892d8b141928bfe378&f=5%20new%20Vista%20Activators...1%20click%20Activation%20%28All%20versions%29%20%5Bh33t%5D%5Basad%5D.torrent

Here are 5 new Vista Activators..100% Working..allows you to make your copy of Windows Vista Genuine and activated and allows you to download the updates by turning the automatic updates on!
This is better than Timestop. You can download the updates which are only available for activated windows Vista.
FEATURES:
*1 click activation
*Makes Vista Genuine
*Compatible with all versions
*Makes the product fully activated till death
*Allows you to access all the features of genuine Microsoft Vista

use readme in the folders for instructions

MajorShare Rapidshare Downloader 4.11 [FULL Edition]



To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=e7699451eb9903f4ddb9e2579875c74e13e1bc4c&f=MajorShare%20Rapidshare%20Downloader%204.11%20%5BFULL%20Edition%5D%5Bh33t%5D%5BziiiLi%5D.torrent

Rapidshare Downloader is a free download manager that download files from Rapidshare.com automatically. Rapidshare Downloader, downloads files one by one and wait Rapidshare.coms Wait-Time period for the next file. Majorshare-Rapidshare Downloader, developed for downloading files from Rapidshare easily. The best thing for Free Users. You can create your download list easily, just copy and paste the link into the downloader. You don't need to check downloading files to start next file. Just create your download list and then play your games, movies, do your jobs.

You do not have a Rapidshare Premium account and download the movie or program takes too much time? Here is a Rapidshare Downloader, it is very easy to use. A good find for users who do not have the premium on the Rapid. Remarkable swings as small and chopped into pieces the files.

How to use:
1) Copy and paste the link from Rapidshare in the program
2) Specify the folder to save the file
3) So in general, and everything else will make the program

Version 4.11 Information
- Input past end of file(62) bug fixed.(v4.11)
- Info Box font type and size changed.(v4.10)
- Info box background is darker now.(v4.10)
- Transparency added to Info Box.(v4.10)
- Opening Info Box by single clicking to system tray icon added.(v4.10)
- File Downloaded Pop-Up window added (Can be disabled at Settings Section.).(v4.10)
- File Downloaded voice added (Can be disabled at Settings Section.).(v4.10)
- Transparency added to main window.(v4.10)
- Selecting RS.com server bug fixed.(v4.10)

Tuesday, June 30, 2009

PC Tools Spyware Doctor v6.0.1.451 (Personal Editor) NEW ! [FULL + CRACK]


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=110bd8cb2c6c71e9e71744ed2c3b1ee366495c4e&f=PC%20Tools%20Spyware%20Doctor%20v6.0.1.451%20%28Personal%20Editor%29%20NEW%20%21%20%5BFULL%20%2B%20CRACK%5D%5Bh33t%5D%5BziiiLi%5D.torrent



Editor's Choice Anti-Spyware
Don't compromise your security with second best!


* Recommended by experts and editors around the world as the best Anti-Spyware.
* FREE customer support for all users.
* Frequent advanced updates ensure that you are always protected.
* Detects, removes and blocks all types of Spyware and Adware threats.
* Easiest to use with intelligent automatic protection.
* 100% Money Back Guarantee.

Best Spyware Protection. Used by Millions World Wide.

Spyware Doctor has been downloaded over 125 million times with millions more downloads every week. People worldwide use and trust Spyware Doctor to protect their PCs from spyware, adware and other online threats.

Spyware Doctor has consistently been awarded Editors' Choice, by leading PC magazines and testing laboratories around the world, including United States, United Kingdom, Sweden, Germany and Australia. In addition, after leading the market in 2005, Spyware Doctor was awarded the prestigious Best of the Year at the end of 2005 and again in 2006.

Spyware Doctor continues to be awarded the highest honors by many of the world's leading PC publications such as PC World, PC Magazine, PC Pro, PC Plus, PC Authority, PC Utilities, PC Advisor, PC Choice, Microdatorn, Computer Bild and PC Answers Magazine.

Note: If you are choosing Anti-Spyware make sure you choose one that is proven and has genuine awards from one or more world leading research labs such a PC Magazine, PC World, CNET, PC Pro Magazine, PC Authority, PC Answers and other trusted labs. More importantly do not use ratings from unknown review websites, as often these are designed to mislead you into purchase of affiliated, inferior or rogue product.

Detects, removes and blocks all types of Spyware.

Did you know that numerous programs tested against Spyware Doctor detected only small fraction of Spyware and completely removed an even smaller amount? Also most of them were unable to effectively block Spyware in real time from being installed on users PC in the first place.

Spyware Doctor has the most advanced update feature that continually improves its Spyware fighting capabilities on daily basis. As Spyware gets more complex to avoid detection by AntiSpyware programs Spyware Doctor responds with new technology to stay one step ahead.
Easiest to Use

Spyware Doctor is advanced technology designed especially for people, not just experts. That is one reason why it won the People's Choice Award in 2005, 2006 and 2007. It is automatically configured out of the box to give you optimal protection with limited interaction so all you need to do is install it for immediate and ongoing protection.

Spyware Doctor's advanced IntelliGuard technology only alerts users on a true Spyware detection. This is significant because you should not be interrupted by cryptic questions every time you install software, add a site to your favorites or change your PC settings. Such messages can be confusing and lead to undesirable outcomes such as inoperable programs, lost favorites or even Spyware being allowed to install on the system. We've done the research so you don't have to.
Spyware Doctor Full Version Information
Current Version: 6.0.1.441
File Size: 23,424 KB
Operating System: Designed for Windows® Vista™ 64-bit SP1, Vista™ 32-bit, XP (Home and Professional Editions) and 2000. Windows® 98 users click here.
Release Date: June 24, 2009
Protection Against: Spyware, Adware, Spyware Trojans, Keyloggers, Identity Theft, Hijackers, Tracking Threats, Rogue Anti-Spyware, Unwanted Software, Phishing, Popups and Bad Websites.
Add-ons: Optional plug-ins are available for Spyware Doctor including Site Guard, Email Guard and Behavior Guard
Trial Limitations:The trial offers time unlimited real-time protection (free spyware blocking), but does not remove threats detected during on-demand scans, updates may also differ to those supplied to registered users.
Starter Edition:The Starter Edition offers full scan and removal of threats, and basic real-time protection, is available for free as part of the Google Pack.



Installation Instructions:


Step 1: install the software
Step 2: use the crack for the full version

AMS Frame Maker Pro v3.45 + serial



To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=33e3ff5bd27c4e96c70f5816191fd9bfa66d3fcd&f=AMS%20Frame%20Maker%20Pro%20v3.45%20serial%20%5BTUC2020%5D%5BH33T%5D.torrent

Frame Maker Pro is an imaging and desktop enhancement program that adds impressive frames to digital photos in order to enhance your personal albums, projects, websites or desktop wallpapers with remarkable ease. Through its innovative graphical user interface, you can choose from a variety of frames and add them to your images; full screen preview the result; save your framed images in popular formats for use on your projects; print your framed images. You can create hundreds of original and creative frames and save these frames as presets. New version allows batch framing.

Features

User - friendly interface.
Supports APS, BMP, JPEG, GIF, PNG, WMF, EMF.
The ability to add simple borders, artistic frames and photo edges.
Allows to adjust color balance, contrast and brightness.
Allows to apply special effects (sepia, mosaic, wave, etc.)
Batch photo framing.
The ability to print images.


Install
See product.txt for information on registration.

Kaspersky INTERNET SECURITY 2010 (Version 9.0.0.459) [FULL + Activation KEY

To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=9093f54b983f291bca8447fd3578bb8dc3521444&f=Kaspersky%20INTERNET%20SECURITY%202010%20%28Version%209.0.0.459%29%20%5BFULL%20%2B%20Activation%20KEY%5D%5Bh33t%5D%5BziiiLi%5D.torrent

Kaspersky Internet Security 2010 automatically protects you and your family at all times - whether you work, bank, shop or play online.
Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.

Features:

Fully Automated Real-Time Protection
Kaspersky Internet Security stops your PC being slowed down by cybercriminals and delivers unsurpassed on-line safety whilst protecting your files, music and photos from hackers:
* Keeps your money and identity safe
* Protects against bank account fraud
* Safeguards against online shopping threats
* Cybercriminals won't hi-jack your PC
* Family protection from on-line predators
* Your files won't be ruined by hackers
* Keeps your PC running smoothly
* Safer Wi-Fi connections
* Two way personal firewall

New And Improved Features
Kaspersky Internet Security 2010 offers a number of new and improved features together with unique protection technologies to address the latest online threats, keep your PC running smoothly and customize protection according to your activities:
* Unique Safe Run Mode for questionable applications and websites
* Security Application Monitor to give you full picture on programs installed on your PC
* Identity Information Controller to give valuable data an extra layer of protection
* Kaspersky Toolbar for Internet browsers to warn you about infected or unsafe websites
* Advanced identity theft protection, including improved secure Virtual Keyboard
* Urgent Detection System to stop fast emerging threats
* Next generation proactive protection from zero-day attacks and unknown threats
* Special Game Mode to suspend alerts, updates and scans while you play

Advanced Features For Better Protection
Kaspersky Internet Security 2010 has a range of unique tools for heightened security. Protecting your family and keeping your PC healthy:
* Run questionable applications and websites in Safe Run Mode
* Enter logins and passwords using secure Virtual Keyboard
* Enable Parental Control for added child safety online
* Turn on Game Mode to suspend alerts, updates and scans
* Add folders and files with valuable data to the protected area
* Scan system and installed applications for vulnerabilities
* View applications working on your PC and customize their rules
* Tune up your OS and Internet browser settings for better security
* Restore correct system settings after malware removal
* Burn a Rescue CD to restore your system in case of infection
* Remove activity traces in your Internet browser (history, cookies, etc.)

Get Protection From a Range of Threats
Award-winning technologies in Kaspersky Internet Security 2010 protect you from cybercrime and a wide range of IT threats:
* Viruses, Trojans, worms and other malware, spyware and adware
* Rootkits, bootkits and other complex threats
* Identity theft by keyloggers, screen capture malware or phishing scams
* Botnets and various illegal methods of taking control of your PC
* Zero-day attacks, new fast emerging and unknown threats
* Drive-by download infections, network attacks and intrusions
* Unwanted, offensive web content and spam



Installation Instructions:


Step 1: install the software
Step 2: use the actiation key to register it

PDF2Office Professional 5.0 [FULL + PATCHED]


To Download you will need to install: uTorrent,Bitcomet,Vuse and etc.
download link: http://h33t.com/download.php?id=4c44fb2015cc6d22aa5ecbbad90d6fd410c9332e&f=PDF2Office%20Professional%205.0%20%5BFULL%20%2B%20PATCHED%5D%5Bh33t%5D%5BziiiLi%5D.torrent


PDF2Office is a comprehensive PDF document to Office formats conversion tool. PDF2Office converts PDF file into fully editable Microsoft Excel, Microsoft Word, Microsoft PowerPoint, RTF, AppleWorks, HTML and other files recreating the intended construction and layout of the document. PDF2Office forms paragraphs; applies styles; regroups independent graphics elements; extracts images; creates tables; processes headers/footers; endnotes/footnotes and columns/sections, all automatically - without any intervention. PDF2Office integrates seamlessly with Microsoft Office, allowing you to directly open PDF documents within Microsoft Office applications. PDF2Office allows you to recover and reuse the contents stored in PDF documents making it available for use by the most popular software titles; enhancing workflow automation and productivity.

Features Summary

* Convert PDF documents to Microsoft® Word, RTF, AppleWorks and other common files
Convert PDF documents into fully editable Microsoft® Word, Microsoft® PowerPoint®, RTF, AppleWorks, Unicode, Text and HTML files. PDF2Office intelligently builds paragraphs, sections, columns, creates tables and regroups independent graphics to fully recreate the layout of the original file.

* Convert PDF files to Spreadsheet formats
Convert PDF files to Microsoft Excel 97-2003 and 2007/2008 formats.

* Open PDF documents directly within Microsoft® Office Products
PDF2Office integrates seamlessly with Microsoft® Office product family allowing you to directly open PDF documents within Microsoft® Word, PowerPoint®, Excel, SharePoint Designer and FrontPage

* Click Open
Right/Control click on a PDF document on the desktop and have it open in Microsoft® Word.

* Convert PDF documents to graphics files
Convert each PDF page as a JPEG, PICT, TIFF or other image file, and specify compression and resolution settings.

* Simple
Simply drag and drop to convert files using PDF2Office's easy-to-use all-in-one interface.

* Quick
PDF2Office will convert the PDF file within seconds.

* Extract
Extract text, images and/or other data from specific pages.

* Quick Preview
Quickly view the text/native pages of a PDF document.

* Multilanguage/Asian Language Support
Supports English, Japanese, Chinese, Korean and Western European-language data contained in PDF documents.

* Batch Convert
Convert multiple files with one click.

* Password Protected PDF files
Convert or Open password-protected PDF documents.

* Log Your Work
Automatically create a log of all files converted.

What's new with PDF2Office Professional v5.0

# Convert to Spreadsheet format
PDF2Office Professional converts PDF files to the Microsoft Excel document format.

# Convert directly to Office 2007 formats
PDF2Office now directly converts PDF files to native Microsoft Excel 2007, PowerPoint 2007 and Word 2007 formats (also known as the Office 2007 formats).

# Open PDF documents in Microsoft Excel
An interface has been provided to open and convert PDF documents directly within Microsoft Excel.

# Typeface Library
PDF2Office Professional remembers and stores all font substitutions into a Typeface Library. This eliminates having to repeatedly specify font substitutions. The mappings in the Typeface Library can be replaced and overridden as required.

# Spreadsheet Options
New Spreadsheet options panels have been introduced into the Control Center to fine-tune conversions to spreadsheet formats.

# Enhanced Office plug-ins
Every Office plug-in has been enhanced to include the PDF Inspector (formerly known as the Document Inspector) and direct access to the Typeface Library interface has been provided.

# JPEG2000 image support
JPEG2000 images stored in PDF files are now properly recognized and converted.

# PDF Reconstruction v4.5
PDF2Office Professional now includes the latest PDF Reconstruction v4.5 engine offering dramatic enhancements when converting PDF documents, including enhanced graphics processing, and complex layout and PDF data recognition. General improvements have also been made in identifying footnotes and headers/footers.

# Russian and Greek character support
Russian (Cyrillic) and Greek text in PDF files are now recognized and converted.



Installation Instructions:


Step 1: install the software
Step 2: use the patch for the full version

Monday, June 29, 2009

Preventive Maintenance

Preventive maintenance is the key to obtaining years of trouble-free service from your computer. Laptop systems are especially prone to problems because they are portable and therefore exposed to potentially harsh environments, rougher handling, and more problems than desktop systems that remain in a single location. All it takes is an accident such as dropping the laptop onto a hard surface to turn thousands of dollars' worth of computer into so much junk. A little care combined with some simple preventive maintenance procedures can reduce problem behavior, data loss, and component failure as well as ensure a longer, trouble-free life for your system. In some cases, I have "repaired" ailing systems with nothing more than a preventive maintenance session. Preventive maintenance also can increase your system's resale value because it will look and run better.

Developing a preventive maintenance program is important to everyone who uses or manages laptops. The two main types of preventive maintenance procedures are passive and active.

Passive preventive maintenance includes precautionary steps you can take to protect a system from the environment, such as using power-protection devices; ensuring a clean, temperature-controlled environment; and preventing excessive vibration. In other words, passive preventive maintenance means treating your system well and with care.

An active preventive maintenance program includes performing procedures that promote a longer, trouble-free life for your laptop. This type of preventive maintenance primarily involves the periodic cleaning of the system and its components, as well as performing backups, antivirus and antispyware scans, and other software-related procedures. The following sections describe both passive and active preventive maintenance procedures.

Passive Preventive Maintenance Procedures
Passive preventive maintenance involves taking care of the system by providing the best possible environmentboth physical and electricalfor the system. Physical concerns include conditions such as ambient temperature, thermal stress from power cycling, dust and smoke contamination, and disturbances such as shock and vibration. Electrical concerns include items such as static electricity, power-line noise (when the system is plugged into a wall outlet or other external power source), and radio-frequency interference. Each of these environmental concerns is discussed in the following subsections.

General System Care and Handling
Laptop computers are expensive machines built with significantly tighter tolerances than their desktop counterparts. Although most laptops are designed to function reliably in normal environments, it helps to use some common sense when transporting, operating, or otherwise handling a laptop system. If you treat the system as if it were a very expensive piece of precision electronic machinery (which it truly is!), you will greatly minimize the chances of problems occurring.

Instead of telling you what you should do to take care of your system, it is perhaps easier to tell you what you shouldn't do. I often observe people doing things to their laptop computers that make me cringe. While some of these are painfully obvious, here is a list of bad things you should not do to your laptop computer:

Bump, jar, shake or physically punish the system, especially while it is running.

Drop the system. Even if it is in a carrying case, many cases are not padded well enough for excessively rough treatment.

Pack a laptop in luggage that will be checked at the airport, thus subjecting it to very rough handling.

Place heavy cases or other objects on top of a laptop (such as in the overhead compartment on a plane), even if it is in a carrying case.

Store the system where the temperature is below 41°F (5°C) or above 95°F (35° C).

Operate the computer on a blanket or other soft surface where material might bunch up and cover the cooling vents on the sides or back, which will cause the system to overheat.

Operate the computer while it is still half-inside a carrying case, which will block the cooling vents and cause overheating.

Place the system closer than about 5 inches (13cm) from any electrical device that generates a strong magnetic field, such as electric motors, TVs, refrigerators, and large audio speakers.

Operate two-way radio transmitters in close proximity to the system, which can induce currents and voltages causing lockups or failures.

Spill liquids on the system, which may contaminate the internal components and/or cause a short circuit.

Place heavy objects on the system with the lid closed or pack the system in a tightly compressed suitcase or bag, which may put excessive pressure on the LCD panel.

Place an object between the display lid and keyboard, which may cause damage when the lid is closed.

Pick up or hold the system by the LCD panel, which may damage the display and/or the hinges.

Scratch, twist, or push on the surface of the LCD panel.

Move the system or pull on the AC adapter cord while the adapter is plugged in, which may cause the plug to break off and/or damage the socket.

Plug a modem cable into an Ethernet port (and vice versa), which may damage the connectors.

Hard-mount the system in a vehicle or anywhere that it is subject to strong vibration.

Crush, drop, or press on the cover of a disk drive while it is removed from the system.

Insert a floppy disk into a floppy drive at an angle or upside down, which may cause it to jam in the drive.

Place more than one label on a floppy disk, which might cause it to jam in the drive.

Touch the lens on the CD-ROM tray when it is open, which may contaminate the lens and/or throw it out of alignment.

Connect the internal modem in the system to a private branch exchange (PBX) or other digital telephone line that may subject the modem to improper voltages, thus causing permanent damage.

Forget your passwords. If you forget a supervisor or hard disk password, there is no easy way to reset it, and you may have to replace the motherboard or hard disk.

Speaking from experience, I can tell you that the systems you use will last a lot longer if you avoid any of the aforementioned behavior.

The Operating Environment
Oddly enough, one of the most overlooked aspects of preventive maintenance is protecting the hardwareand the sizable financial investment it representsfrom environmental abuse. Computers are relatively forgiving, and they are generally safe in an environment that is comfortable for people. Portable computers, however, are often tossed around and treated with no more respect than a cheap calculator. The result of this type of abuse can be a variety of system crashes and failures.

Temperature, Humidity, and Altitude
All computers are designed to operate within specific ranges of temperature, humidity, and altitude. Exceeding the allowable ranges places stress on the system and can cause it to fail prematurely. Therefore, keeping an eye on the conditions where you both use and store your computer is important for the successful operation of the system.

Temperature, humidity, and altitude variations can lead to serious problems. If extreme temperature variations occur over a short period, expansion and contraction can cause signal traces on circuit boards to crack and separate, and solder joints can break. Extreme humidity can cause contacts in the system to undergo accelerated corrosion or condensation to form in the system and disk drives. Extremely dry conditions can cause problems with static electricity. Operating at high altitudes causes problems with cooling (lower density air renders the cooling system less effective) as well as the internal "air bearing" on which the heads float in the hard drive while operating.

To ensure that your system will be operated in the temperature, humidity, and altitude ranges for which it was designed, I recommend you consult your system specifications for the environmental range limits. Most manufacturers provide data about the correct operating temperature range for their systems in the owner's manual. Two sets of specifications are normally listed: one that applies to an operating system and the other for a system powered off. As an example, IBM indicates the following allowable environmental limits for most of its ThinkPad portable systems:

Maximum altitude without pressurization
10,000 ft. (3,048m)

Temperature range (not operating)
41°110°F (5°43°C)

Maximum temperature while operating

Above 8,000 ft. (2,438m)
88°F (31°C)

Below 8,000 ft. (2,438m)
95°F (35°C)

Minimum temperature while operating

Not using the floppy drive
41°F (5°C)

Using the floppy drive
50°F (10°C)

Minimum battery temperature when charging
50°F (10°C)

Relative humidity while operating

Not using the floppy drive
8%95%

Using the floppy drive
8%80%


Note that the maximum allowable ambient temperature drops to only 88°F (31°C) at altitudes over 8,000 ft. (2,438m). This is due to the lower air density at high altitudes, which reduces the efficiency of the computer's cooling system. Also note the minimum operating and nonoperating temperature of 41°F (5°C). This means that for many areas of the country, it may not be wise to leave a laptop system in a car for more than a short period, or to ship a system using a mail or package carrier during the winter. As you can see from the preceding data, most environmental conditions that are comfortable for people are also good for laptop computer use.

Temperature Acclimation
In addition to the temperature limits just discussed, it is a good idea to avoid rapid changes in temperature as well. If a rapid rise in temperature occursfor example, when a system is shipped during the winter and then brought indoorsyou should allow the system (and the hard drive inside) to acclimate to normal room temperature before turning it on. In extreme cases, condensation can form on the internal electronics as well as on the platters inside the drive's head disk assembly (HDA), which is disastrous for the drive if you turn it on before the condensation has a chance to evaporate.

Most hard drives have a filtered port that bleeds air into and out of the head disk assembly (HDA) so that moisture can enter the drive; therefore, after some period of time, it must be assumed that the humidity inside any hard disk is similar to the humidity outside the drive. Humidity can become a serious problem if it is allowed to condenseand especially if you power up the drive while this condensation is present. Most hard disk manufacturers have specified procedures for acclimating a hard drive to a new environment with different temperature and humidity ranges, especially for bringing a drive into a warmer environment in which condensation can form. This situation should be of special concern to users of laptop and portable systems. If you leave a portable system in an automobile trunk during the winter, for example, it could be catastrophic to bring the machine inside and power it up without allowing it time to acclimate to the temperature indoors.

The following text, along with Table 3.1, are taken from the factory packaging that Control Data Corporation (later Imprimis, and eventually Seagate) used to ship with its hard drives:

If you have just received or removed this unit from a climate with temperatures at or below 50°F (10°C), do not open this container until the following conditions are met; otherwise, condensation could occur and damage to the device and/or media may result. Place this package in the operating environment for the time duration according to the temperature chart.

Table 3.1. Hard Disk Drive Environmental Acclimation Table Previous Climate Temperature
Acclimation Time
Previous Climate Temperature
Acclimation Time

+40°F (+4°C)
13 hours
0°F (18°C)
18 hours

+30°F (1°C)
15 hours
10°F (23°C)
20 hours

+20°F (7°C)
16 hours
20°F (29°C)
22 hours

+10°F (12°C)
17 hours
30°F (34°C) or less
27 hours

As you can see from Table 3.1, you must place a portable system with a hard drive that has been stored in a colder-than-normal environment into its normal operating environment for a specified amount of time to allow it to acclimate before you power it on. Manufacturers normally advise that you leave the system in its packing or carrying case until it is acclimated. Removing the system from a shipping carton when extremely cold increases the likelihood of condensation forming. Of course, condensation can also affect other parts of the computer, especially circuit boards and connectors, causing short circuits or corrosion that can negatively affect operation or even cause damage.

Static Electricity
Static electricity or electrostatic discharge (ESD) can cause numerous problems within a system. The problems usually appear during the winter months when humidity is low or in extremely dry climates where the humidity is low year-round. In these cases, you might need to take special precautions to ensure that your computer is not damaged. See the section "ESD Protection Tools," later in this chapter, for more information on ESD.

Static discharges outside a system-unit chassis are rarely a source of permanent problems within the system. Usually, the worst possible effect of a static discharge to the case, keyboard, or even a location near the computer is a system lockup, which can result in lost data. If you know you are carrying a charge, before touching the keyboard or system, you might try discharging yourself by touching some other metal object or device to bleed off some of the charge. Whenever you open a system unit or handle devices removed from the system, you must be more careful with static.

Radio-Frequency Interference
Radio-frequency interference (RFI) is easily overlooked as a problem factor. The interference is caused by any source of radio transmissions near a computer system. Living next door to a 50,000-watt commercial radio station is one sure way to get RFI problems, but less-powerful portable transmitters can cause problems, too. I know of many instances in which cordless telephones have caused sporadic random keystrokes to appear, as though an invisible entity were typing on the keyboard. I also have seen strong RFI from portable two-way radios cause a system to lock up. Solutions to RFI problems are more difficult to state because every case must be handled differently. Sometimes, simply moving the system eliminates the problem because radio signals can be directional in nature. If you have external devices attached to your laptop (such as an external keyboard, mouse, or display), sometimes you must invest in specially shielded cables for these devices. If the keyboard or mouse is wireless, then RFI can be especially problematic, and the only solution may be to try a different brand or model that operates on a different frequency.

One type of solution to an RFI noise problem with cables is to pass the cable through a toroidal iron core, a doughnut-shaped piece of iron placed around a cable to suppress both the reception and transmission of electromagnetic interference (EMI). You'll notice these cores on many of the laptop external data (USB, FireWire, and so on) and power cords. If you can isolate an RFI noise problem in a particular cable, you often can solve the problem by passing the cable through a toroidal core. Because the cable must pass through the center hole of the core, it often is difficult to add a toroid to a cable that already has end connectors installed.

RadioShack and other electronics supply stores sell special snap-together toroids designed specifically to be added to cables already in use. They look like a small cylinder that has been sliced in half. You simply lay the cable in the center of one of the halves and snap the two halves together over the cable. This type of construction makes adding the noise-suppression features of a toroid to virtually any existing cable easy.

Dust and Pollutants
It should be obvious that dirt, smoke, dust, and other pollutants are bad for your system. The cooling fan found in most modern laptop systems carries airborne particles through the system, where they can collect inside. I'm not saying that it is unsafe to use a laptop system outside or in an environment that isn't absolutely pristine, but I am saying that you should consider the working environment. If you take care of your system, it will serve you longer and with fewer problems.

If your system is going to be regularly used in an extreme working environment, you might want to investigate some of the specialized systems on the market specifically designed for use in harsh environments. Panasonic, for example, manufactures a complete line of systems called Toughbooks, which are specially designed to survive under harsh conditions. Durability features available in the Toughbook line include the following:

Magnesium alloy case with handle

Moisture- and dust-resistant LCD, keyboard, and touchpad

Sealed port and connector covers

Shock-mounted removable HDD in a stainless-steel case

Vibration- and drop-shock-resistant design

Rugged hinges


Tips for Transporting Your System
When you are transporting a laptop computer, I recommend you consider the following guidelines in order to protect the system:

Remove all floppy disk and/or CD/DVD disc media from the drives.

Remove all PC Card/CardBus or ExpressCard adapters from their slots and place them in their protective covers. I often use small ziplock bags if they did not come with small cases or covers.

Make sure the main battery is fully seated or possibly eject the battery for shipping if you suspect the handling will be rough. The battery is a relatively heavy component and your laptop could be seriously damaged if the battery isn't seated properly and the laptop (or bag containing your laptop) receives a sharp blow.

Make sure the system is fully powered off (or optionally in Hibernate mode) and not in a Suspend or Standby mode.

If the power switch is accessible with the lid closed, make sure the switch is locked or covered so that the system cannot be accidentally powered on while being transported.

Make sure all access doors and covers are in position and closed.

Use a carrying case that provides adequate shock protection (cushioning).

If your travel involves flying, you should be aware that FAA regulations now call for more rigorous screening of electronic devices, including laptop computers. The inspections normally require that you remove the system from its travel case and place the unprotected system on the conveyor belt that takes it through the X-ray machine. Make sure you don't put the system upside-down on the conveyor, because that can put pressure on the LCD, potentially causing damage.

In some cases you may be required to power-on the system after the trip through the X-ray machine in order to demonstrate computer functionality. In that situation, be sure you remember to power the system back off (or optionally place it in Hibernate mode) before returning it to its travel case. Note that X-rays do not harm either the computer or removable storage media. See "Airport X-Ray Machines and Metal Detectors" in Chapter 10, "Removable Storage," for more information.

If you ever need to ship the system via the mail or through a package carrier such as UPS or FedEx, it is extremely important that you properly pack the system to prevent damage. In general, it is hard to find a better shipping box and packing material than what the system was originally packed in when new. For that reason, I highly recommend you retain the original box and packing materials after purchasing a system. This will prove to be extremely useful in any case where you need to ship the system to a remote destination.

Following these guidelines for transporting or shipping the system will help to ensure the machine arrives in working order at the destination.



Active Preventive Maintenance Procedures
How often you should perform active preventive maintenance procedures depends on the environment in which you operate your system as well as the quality of the system's components. If your system is in a dirty environment, such as a machine shop floor or a gas station service area, you might need to clean your system every three months or less. For normal office environments, cleaning a system every few months to a year is usually fine. If you frequently use your system outdoors, it may require more frequent cleanings, depending on the amount of dirt and dust in the environment.

Other preventive maintenance procedures include making periodic backups of your data. Also, depending on what operating system and file system you use, you should defragment your hard disks at least once a month to maintain disk efficiency and speed, as well as to increase your ability to recover data should there be a more serious problem. See the section titled "Defragmenting Files" later in this chapter.

The following is a sample weekly disk-maintenance checklist:

Back up any data or important files.

Run a full system antivirus and antispyware scan. Before starting the scans, be sure to check for and install antivirus and antispyware software updates. Note that most of these programs have integrated update routines that automatically check for updates on a weekly or monthly basis, or at some other interval you may choose.

Run the Windows Disk Cleanup tool, which searches the system for files you can safely delete, such as

Files in the Recycle Bin.

Temporary Internet files.

Windows temporary files.

Install programs for previously downloaded and installed programs.

System restore points except the most recent restore point.

Optional Windows components that you are not using.

Installed programs that you no longer use.

Finally, run a disk-defragmenting program.

About System Restore

System Restore is an automatic service in Windows Me, XP, and later versions that periodically creates Restore Points, which are snapshots of the Registry and certain other dynamic system files. These Restore Points do not include any user or application data and should therefore not be confused with or used in place of normal file or data backup procedures. The System Restore application (found in the Program menu under Accessories, System Tools) can be used to manually return a system to a previously created Restore Point, as well as to manually create a new Restore Point. Normally, you don't ever need to create Restore Points manually because they are automatically created

Every time you install an application

Every time an update is installed with Automatic Updates

Every time an update is installed with Windows Update

Every time you install an unsigned driver

Every 24 hours if the system is turned on, or if it has been more than 24 hours since the last Restore Point was created

While it is generally not necessary to create Restore Points manually, I do recommend creating a manual Restore Point before editing the Windows Registry directly because that will essentially create a backup of the Registry you can restore if your edit causes problems.



The following are some monthly maintenance procedures you should perform:

Create an operating system startup disk or ensure you have access to a bootable OS installation CD for recovery purposes.

Check for and install any BIOS updates.

Check for and install any updated drivers for the video, sound, modem, and other devices.

Check for and install any operating system updates.

Clean the system, including the LCD screen, keyboard, and especially the cooling vents.

Check that the cooling fans are operating properly. Most laptops have only a single fan, but some have more than one.

Many people use a laptop as an accessory to a desktop system. In that case, you may have files that you work with while traveling that need to be synchronized with files on your desktop or on a server. You can use the Windows Briefcase or Synchronization Manager utility to accomplish this, but an easier-to-use and more effective solution is a simple file or directory synchronization tool like Good Sync (www.goodsync.com). Normally, you want to synchronize files every time you disconnect and reconnect to your desktop system or network.

System Backups
One of the most important preventive maintenance procedures is the performance of regular system backups. A sad reality in the computer-repair-and-servicing world is that hardware can always be repaired or replaced, but data cannot. Many hard disk troubleshooting and service procedures, for example, require that you repartition or reformat the disk, which overwrites all existing data.

The hard disk drive capacity in a typical laptop system has grown far beyond the point at which floppy disks are a viable backup solution. Backup solutions that employ floppy disk drives are insufficient and too costly due to the amount of media required. Table 3.2 shows the number of units of different types of media required to back up the 80GB drive in my current laptop system.

Table 3.2. Amounts and Costs of Different Media Required to Back Up a Full 80GB Drive Media Type
Number Required
Unit Cost
Net Cost

1.44MB floppy disks
54,883
$0.15
$8,232

48x80-minute/700MB CD-R discs
109
$0.25
$27

4x4.7GB DVD+-R discs
18
$1.50
$27

DAT DDS-4 tapes (native)
4
$15.00
$60

DAT DDS-4 tapes (compressed)
2
$15.00
$30





Assuming the drive is full, it would take 54,883 1.44MB floppy disks, for example, to back up the 80GB hard disk in my current laptop system! That would cost more than $8,232 worth of floppy disks, not to mention the time involved. My laptop includes a CD-RW drive, as do many of the systems today, but as you can see, even using CD-R would be miserable, requiring 109 discs to back up the entire drive. DVD+-R, on the other hand, would require only 18 discs, which still wouldn't be much fun but is much more doable in a pinch. Tape really shines here, because only two DAT DDS-4 tapes are required to back up the entire drive, meaning I would have to switch tapes only once during the backup. Although the media cost is a little higher with the tape as compared to CD/DVD, the time-savings are enormous. Imagine trying to back up a full 300GB drive in a desktop system, which would require 64 DVD+-R discs, but only eight DAT DDS-4 tapes.

Of course, these examples are extreme; most people don't have a full 80GB worth of data to back up on their laptop. Of course, some may have more. Also, if you organize your system properly, keeping data files separated from program files, you can get away with backing up only the data, and not the programs. This works because in most cases, if there is a drive failure, you will have to reinstall your operating system and all your applications from their original discs. Once the OS and applications are installed, you would restore the data files from your backups.

The best form of backup has traditionally been magnetic tape. The two main standards are Travan and digital audio tape (DAT). Travan drives are generally slower and hold less than the newest DAT drives, but both are available in relatively competitive versions. The latest Travan tape drives store 20GB/40GB (raw/compressed) on a single tape, whereas fifth-generation DAT DDS drives store 36GB/72GB per tape. These tapes typically cost $15 or less. If you use larger drives, new versions of DAT and other technologies can be used to back up your drive.

Another alternative for backup is to use a second, external hard drive of equal (or larger) capacity and simply copy from one drive to the other. With the low cost of drives these days, and the ease of connecting an external drive via USB or IEEE-1394 (FireWire/i.LINK), this turns out to be a fast, efficient, and reasonably economical method. However, if a disaster occurs, such as theft or fire, you could still lose everything. Also, with only one backup, if your backup goes bad when you depend on it, you'll be without any other alternatives.

You can perform hard diskbased backups for more than one system with an external hard drive. External hard disks are available in capacities up to 500GB or more, and if the destination drive is as large as or larger than the source, the entire backup can be done in a single operation. Some external hard drive models even offer one-button automated backups. Hard drives have come down in price significantly over the years, as have the external USB and/or FireWire enclosures to contain them, making disk-to-disk backup a cheaper, easier, and significantly faster alternative to tape. Most laptops use 2.5-inch drives internally, which are more expensive than the 3.5-inch drives used in desktop systems or in most external enclosures. Because of this, you can purchase an external hard drive equal to or larger than the full capacity of the internal laptop drive for under $100 in most cases. As a minimum, I generally recommend purchasing one or two external drives equal to or larger than the internal drive in the laptop. By using two or more external drives, you can perform rotating backups of the entire laptop drive, moving one of the backups offsite for even greater protection from disaster.

Cleaning a System
One of the most important operations in a good preventive maintenance program is regular and thorough cleaning of the system inside and out. Unlike desktop systems, laptop systems don't have air flowing through all their parts, so they are more immune to dust internally and normally don't have to be disassembled for cleaning. Laptops do, however, usually have fans that draw air through cooling ducts with heatsinks mounted inside them. Dust buildup in these cooling passages can be a problem because the dust acts as a thermal insulator, which prevents proper cooling. Excessive heat shortens the life of components and adds to the thermal stresses caused by greater temperature changes between the system's full power and sleep/power-off states. Additionally, the dust can contain conductive elements that can cause partial short circuits in a system. Other elements in dust and dirt can accelerate corrosion of electrical contacts, resulting in improper connections. Regularly blowing out any dust and debris from the cooling passages (through the vents) will benefit that system in the long run.

Note that because laptop systems are much more difficult to disassemble, I normally don't recommend opening up or disassembling them just for cleaning. Of course, if you have the system open for some other reason, you should definitely take advantage of the opportunity and clean the interior components thoroughly. For most general preventive maintenance, cleaning the system externally or through any openings is sufficient. This means using either compressed air or a vacuum cleaner to clean dirt out of the keyboard, cooling vents, drive openings, data ports, or any other openings in the system.

Cleaning Tools
Properly cleaning the system requires certain supplies and tools. Here are some items used for cleaning:

LCD/keyboard/case cleaning solution

Canned air

Contact cleaner/enhancer

A small brush

Lint-free foam cleaning swabs

Antistatic wrist-grounding strap

Computer vacuum cleaner

These simple cleaning tools and chemical solutions enable you to perform most common preventive maintenance tasks.

Chemicals
Chemicals can be used to help clean, troubleshoot, and even repair a system. You can use several types of cleaning solutions with computers and electronic assemblies. Most fall into the following categories:

Standard cleaning solutions

Contact cleaner/lubricants

Dusters

Tip

The makeup of many of the chemicals used for cleaning electronic components has been changing because many of the chemicals originally used are now considered environmentally unsafe. They have been attributed to damaging the earth's ozone layer. Chlorine atoms from chlorofluorocarbons (CFCs) and chlorinated solvents attach themselves to ozone molecules and destroy them. Many of these chemicals are now strictly regulated by federal and international agencies in an effort to preserve the ozone layer. Most of the companies that produce chemicals used for system cleaning and maintenance have had to introduce environmentally safe replacements. The only drawback is that many of these safer chemicals cost more and usually do not work as well as those they've replaced.



Standard Cleaners
For the most basic functioncleaning exterior LCD screens, keyboards, and casesvarious chemicals are available. I normally recommend one of the following:

50-50 mixture of isopropyl alcohol and water

Nonammoniated glass cleaner

Pure water (hot water works best)

Other solutions such as antistatic LCD cleaning cloths and Kimwipes are also acceptable alternatives.

Caution

Isopropyl alcohol is a flammable liquid. Do not use alcohol cleaner near an exposed flame or when the system is on.



The solutions should generally be in liquid form, not a spray. Sprays can be wasteful, and you should never spray the solution directly on the system anyway. Instead, lightly moisten a soft lint-free cloth, which is then used to wipe down the parts to be cleaned.

Contact Cleaner/Lubricants
Contact cleaners/lubricants are chemicals similar to the standard cleaners but are more pure and include a lubricating component. Although their cleaning applications are more limited when dealing with a laptop system, these chemicals do come in handy for cleaning connectors and internal or external cables. The lubricant eases the force required when plugging and unplugging cables and connectors, reducing strain on the devices. The lubricant coating also acts as a conductive protectant that insulates the contacts from corrosion. These chemicals can greatly prolong the life of a system by preventing intermittent contacts in the future.

A unique type of contact cleaner/enhancer and lubricant called Stabilant 22 is available. This chemical, which you apply to electrical contacts, enhances the connection and lubricates the contact point; it is much more effective than conventional contact cleaners or lubricants. Stabilant 22 is a liquid-polymer semiconductor; it behaves like liquid metal and conducts electricity in the presence of an electric current. The substance also fills the air gaps between the mating surfaces of two items that are in contact, making the surface area of the contact larger and also keeping out oxygen and other contaminants that can corrode the contact point.

This chemical is available in several forms. Stabilant 22 is the concentrated version, whereas Stabilant 22a is a version diluted with isopropyl alcohol in a 4:1 ratio. An even more diluted 8:1-ratio version is sold in many high-end stereo and audio shops under the name Tweek. Just 15ml of Stabilant 22a sells for about $40; a liter of the concentrate costs about $4,000!

As you can see, pure Stabilant 22 is fairly expensive, but only a little is required in any common application, and nothing else has been found to be quite as effective in preserving electrical contacts. NASA even uses this chemical on spacecraft electronics. An application of Stabilant can provide protection for up to 16 years, according to its manufacturer, D.W. Electrochemicals. In addition to enhancing the contact and preventing corrosion, an application of Stabilant lubricates the contact, making insertion and removal of the connector easier. See www.stabilant.com or check the Vendor List on this book's DVD for more information.

Compressed-Air Dusters
Compressed air (actually a gas such as carbon dioxide) is often used as an aid in system cleaning. You use the compressed-air can as a blower to remove dust and debris from a system or component. Originally, these dusters used chlorofluorocarbons (CFCs) such as Freon, whereas modern dusters use either hydrofluorocarbons (HFCs such as difluoroethane) or carbon dioxide, neither of which is known to damage the ozone layer. Be careful when you use these devices, because some of them can generate a static charge when the compressed gas leaves the nozzle of the can. Be sure you are using the type approved for cleaning or dusting off computer equipment and consider wearing a static grounding strap as a precaution. The type of compressed-air can used for cleaning camera equipment sometimes differs from the type used for cleaning static-sensitive computer components.

When using these compressed-air products, be sure you hold the can upright so that only gas is ejected from the nozzle. If you tip the can, the raw propellant will come out as a cold liquid, which not only is wasteful but can damage or discolor plastics. You should use compressed gas only on equipment that is powered off, to minimize any chance of damage through short circuits.

What I recommend with laptops is to turn them sideways or upside down (with the power off) and use the compressed air to blast any junk out of the keyboard as well as any openings on the front, sides, or rear, especially any cooling vents. If you have the system open for any reason, you should take advantage of the opportunity to use the compressed air to blow any dust or dirt out of the interior as well.

Vacuum Cleaners
Some people prefer to use a vacuum cleaner instead of canned gas dusters for cleaning a system. Canned air is usually better for cleaning in small areas as is usually the situation with a portable system. A vacuum cleaner is more useful when you are cleaning a larger desktop system loaded with dust and dirt. You can use the vacuum cleaner to suck out the dust and debris instead of simply blowing it around on the other components, which sometimes happens with canned air. Still, vacuum cleaners are especially useful for sucking dirt out of keyboards, whether on a laptop or desktop system. I also recommend vacuuming the cooling vents on laptops, which is an easy way to remove dust without having to open the unit.

For onsite servicing (when you are going to the location of the equipment instead of the equipment coming to you), canned air is easier to carry in a toolkit than a small vacuum cleaner. Tiny vacuum cleaners also are available for system cleaning. These small units are easy to carry and can serve as an alternative to compressed-air cans. Some special vacuum cleaners are specifically designed for use on and around electronic components; they are designed to minimize electrostatic discharge (ESD) while in use. If you are using a regular vacuum cleaner and not one specifically designed with ESD protection, you should take precautions, such as wearing a grounding wrist strap. Also, if the cleaner has a metal nozzle, be careful not to touch it to the circuit boards or components you are cleaning.

Brushes and Swabs
You can use a small makeup brush, photographic brush, or paintbrush to carefully loosen the accumulated dirt and dust inside a laptop PC before spraying it with canned air or using the vacuum cleaner. Be careful about generating static electricity, however. In most cases, you should not use a brush directly on any circuit boards, but only on the case interior and other parts, such as fan blades, air vents, and keyboards. Wear a grounded wrist strap if you are brushing on or near any circuit boards, and brush slowly and lightly to prevent static discharges from occurring.

Use cleaning swabs to wipe off electrical contacts and connectors, floppy or tape drive heads, and other sensitive areas. The swabs should be made of foam or synthetic chamois material that does not leave lint or dust residue. Unfortunately, proper foam or chamois cleaning swabs are more expensive than typical cotton swabs. Do not use cotton swabs because they leave cotton fibers on everything they touch. Cotton fibers are conductive in some situations and can remain on drive heads, which can scratch the disks. Foam or chamois swabs can be purchased at most electronics supply stores.

Caution

One item to avoid is an eraser for cleaning contacts. Many people (including me) have recommended using a soft pencil-type eraser for cleaning circuit-board or flex-cable contacts. Testing has proven this to be bad advice for several reasons. One reason is that any such abrasive wiping on electrical contacts generates friction and electrostatic discharge (ESD). This ESD can be damaging to boards and components, especially the newer low-voltage devices. These devices are especially static sensitive, and cleaning the contacts without a proper liquid solution is not recommended. Also, the eraser will wear off the gold coating on many contacts, exposing the tin contact underneath, which rapidly corrodes when exposed to air.



Some companies sell premoistened contact cleaning pads soaked in a proper contact cleaner and lubricant. These pads are safe to wipe on conductors and contacts with no likelihood of ESD damage or abrasion of the gold plating.

Lightweight Lubricants
You can use a lightweight lubricant such as WD-40 or silicone to lubricate the door mechanisms on disk drives and any other part of the system that might require clean, lightweight lubrication. Other items you can lubricate are the access doors for ports and PC Card/CardBus sockets, to provide smoother operation.

Using WD-40 or silicone instead of conventional oils is important because silicone does not gum up and collect dust and other debris. Always use the lubricant sparingly. Do not spray it anywhere near the equipment because it tends to migrate and will end up where it doesn't belong (such as on drive heads). Instead, apply a small amount to a toothpick or foam swab and dab the silicone lubricant on the components where needed.
Cleaning the Keyboard
Keyboards are notorious for picking up dirt and garbage. If you ever look closely inside a used keyboard, you will be amazed at the junk you find in there! To keep the keyboard clean, I recommend periodically blowing out the dirt with a can of compressed air or sucking it out with a vacuum cleaner.

The best way to use the compressed air is to turn the system upside down and shoot the keyboard with a can of compressed air tilted back on an angle. This will blow out the dirt and debris that has accumulated inside the keyboard, allowing it to fall to the ground rather than into your system. If done regularly, this can prevent future problems with sticking keys or dirty keyswitches. If you are using a vacuum cleaner, you can leave the system in a normal orientation because the vacuum will suck the debris up and out without allowing it to fall deeper inside the system.

Once the dust and dirt are blown out of the keyboard, you can then clean any cosmetic dirt or stains from the keycaps. The best way to accomplish this is to wipe the keycaps with a soft cloth moistened in isopropyl alcohol cleaning solution and then follow with a dry cloth.

If a particular key is stuck or making intermittent contact, you'll want to soak or spray the faulty keyswitch with contact cleaner. This cannot be done with the keyboard mounted in the system because some of the cleaner may drip inside. To prevent that, before you attempt to clean the keyswitch, I recommend you remove the keyboard from the system. Consult your owner's manual (or maintenance manual if you have one) for the keyboard-removal procedure. Most laptops have keyboards that can be removed fairly easily. If you don't have a procedure for your system, use the sample procedure listed later in this chapter.

After the keyboard is removed, you can remove the keycap from the problem keyswitch and spray the cleaner into the switch. I usually do this over a sink so that the excess liquid doesn't drip onto the floor. Then replace the keycap, reinstall the keyboard, and test it to see whether the key works properly. If it doesn't, you may need to replace the keyboard with a new one. Normally, you cannot replace individual keyswitches. After that, periodic vacuuming or blowing out the keyboard with compressed air will go a long way toward preventing more serious problems with sticking keys and keyswitches.

Cleaning the TrackPoint or Touchpad
The TrackPoint or touchpad pointing devices used in laptops normally require very little or no maintenance. These devices are totally sealed and relatively immune to dirt or dust. Merely blow off the area around the TrackPoint with compressed air or wipe down the surface of the touchpad with a mild cleaning solution to remove oils and other deposits that have accumulated from handling them. If you have a TrackPoint and the cap is excessively stained or greasy, you can remove it and soak it in some cleaning solution. If the stain won't come out and/or the cap is excessively worn, it would be a good idea to simply replace the cap with a new one. Replacement TrackPoint caps are available in three different designs from a number of sources including Compu-Lock at www.compu-lock.com. Toshiba Accupoint caps can be obtained from any Toshiba Authorized Service Provider (ASP). To find the closest ASP, check with Toshiba at http://pcsupport.toshiba.com. Dell track stick caps can be ordered from Dell directly via its Customer Service department.

Hard Disk Maintenance
Certain preventive maintenance procedures protect your data and ensure that your hard disk works efficiently. Some of these procedures actually minimize wear and tear on your drive, which prolongs its life. Additionally, a higher level of data protection can be implemented by performing some simple commands periodically. These commands provide methods for backing up (and possibly later restoring) critical areas of the hard disk that, if damaged, would disable access to all your files.

Defragmenting Files
Over time, as you delete and save files to your hard disk, the files become fragmented. This means they are split into many noncontiguous areas on the disk. One of the best ways to protect both your hard disk and the data on it is to periodically defragment the files on the disk. This serves two purposes: One is that by ensuring that all the files are stored in contiguous sectors on the disk, head movement and drive "wear and tear" are minimized. This has the added benefit of improving the speed at which the drive retrieves files by reducing the head thrashing that occurs every time it accesses a fragmented file.

The second major benefit, and in my estimation the more important of the two, is that in the case of a disaster in which the file system is severely damaged, the data on the drive can usually be recovered much more easily if the files are contiguous. On the other hand, if the files are split up in many pieces across the drive, figuring out which pieces belong to which files is virtually impossible. For the purposes of data integrity and protection, I recommend defragmenting your hard disk drives on a monthly basis.

The three main functions in most defragmentation programs are as follows:

File defragmentation

File packing (free space consolidation)

File sorting

Defragmentation is the basic function, but most other programs also add file packing. Packing the files is optional on some programs because it usually takes additional time to perform. This function packs the files at the beginning of the disk so that all free space is consolidated at the end of the disk. This feature minimizes future file fragmentation by eliminating any empty holes on the disk. Because all free space is consolidated into one large area, any new files written to the disk are capable of being written in a contiguous manner with no fragmentation.

The last function, file sorting (sometimes called disk optimizing), is not usually necessary and is performed as an option by many defragmenting programs. This function adds a tremendous amount of time to the operation and has little or no effect on the speed at which information is accessed later. It can be somewhat beneficial for disaster-recovery purposes because you will have an idea of which files came before or after other files if a disaster occurs. Not all defragmenting programs offer file sorting, and the extra time it takes is probably not worth any benefits you will receive. Other programs can sort the order in which files are listed in directories, which is a quick-and-easy operation compared to sorting the file listing (directory entries) on the disk.

Windows 9x/Me/2000/XP include a disk-defragmentation program with the operating system that you can use on any file system the OS supports. For older operating systems such as DOS, Windows 3.x, and some versions of NT, you must purchase a third-party defragmentation program.

The disk-defragmentation programs included with Windows are extremely slow and don't offer many options or features, so it is a good idea to purchase something better. Norton Utilities includes a disk defragmenter, as do many other utility packages. An excellent defrag program that works on all operating systems is VOPT by Golden Bow (www.vopt.com). It is one of the fastest and most efficient defragmenting programs on the market, and it is very inexpensive. See the Vendor List on the DVD for more information on these companies and their programs.

Windows Maintenance Wizard

Windows 98 and above include a Task Scheduler program that enables you to schedule programs for automatic execution at specified times. The Maintenance Wizard walks you through the steps of scheduling regular disk defragmentations, disk error scans, and deletions of unnecessary files. You can schedule these processes to execute during nonworking hours, so regular system activities are not disturbed.



Virus and Spyware Checking
Viruses and Sypware are a danger to any system, and making scans with antivirus and antispyware utilities a regular part of your preventive maintenance program is a good idea. Many aftermarket utility packages are available that scan for and remove viruses and sypware. No matter which of these programs you use, you should perform a scan periodically, especially before making hard-disk backups. This helps ensure that you catch any potential problem before it becomes a major catastrophe. In addition, selecting a product from a vendor that provides regular updates to the program's signatures is important. The signatures determine which viruses and sypware the software can detect and cure, and because new viruses and spyware are constantly being introduced, these updates are essential.


You can obtain most of the cleaning chemicals and tools discussed in this chapter from an electronics supply house or even your local RadioShack. A company called Chemtronics specializes in chemicals for the computer and electronics industry. These and other companies that supply tools, chemicals, and other computer- and electronic-cleaning supplies are listed in the Vendor List on the DVD. With all these items on hand, you should be equipped for most preventive maintenance operations.

Cleaning Procedures
Before you clean your system, I recommend a partial disassembly. By partial, I mean taking out any items that can be easily removed without using tools. This would normally include the battery, any drives in removable bays, and any PC Cards. This may also include the hard drive in some systems as well. Finally, open the access doors on the sides, back, or base of the system as well. Because of the difficulty of opening the case on most laptops, I do not recommend a complete disassembly just for the purpose of cleaning. Once any easily accessible devices are removed and the access doors opened, use the canned air to blow out any dust from these areas.

Cleaning Connectors and Contacts
Cleaning the connectors and contacts in a system promotes reliable connections between devices. On a laptop system, the main connector you'll want to clean is that of the batteryboth the contacts on the battery and the mating contacts in the system. If there is dirt or dust on the memory modules or sockets, you might want to remove the memory modules, clean the contacts, and then reinstall them. Also, if you disassemble the system and disconnect any flex-cables, it is recommended that you clean and treat the flex-cable contacts before reinserting them into their mating connectors.

To do this, first moisten the lint-free cleaning swabs in the cleaning solution. If you are using a spray, hold the swab away from the system and spray a small amount on the foam end until the solution starts to drip. Then use the swab to wipe the connectors and sockets. You might consider using Stabilant 22a contact enhancer on these terminals to prevent corrosion and ensure a good contact. Try to avoid touching any of the gold or tin contacts with your fingers, which will coat them with oils and debris that can cause problems later. Make sure the contacts are free of all finger oils and residue.

Cleaning the LCD and Case
To clean the exterior of your laptop system, use the following procedure:

Lightly moisten a soft lint-free cloth with either a 50-50 mixture of isopropyl alcohol and water, nonammoniated glass cleaner, or pure water (hot water works best). Never spray liquid cleaner directly on the system, especially the display or keyboard.

Gently wipe the LCD panel with the moistened cloth and then follow with a dry cloth. Be sure the cloth is not wet enough to drip and that the LCD is completely dry when you're finished. Antistatic LCD-cleaning cloths and Kimwipes are also acceptable alternatives. Do not use standard paper towels, which can scratch the LCD, or window cleaners with ammonia, which can damage or stain the LCD.

Cleaning the Keyboard
Keyboards are notorious for picking up dirt and garbage. If you ever look closely inside a used keyboard, you will be amazed at the junk you find in there! To keep the keyboard clean, I recommend periodically blowing out the dirt with a can of compressed air or sucking it out with a vacuum cleaner.

The best way to use the compressed air is to turn the system upside down and shoot the keyboard with a can of compressed air tilted back on an angle. This will blow out the dirt and debris that has accumulated inside the keyboard, allowing it to fall to the ground rather than into your system. If done regularly, this can prevent future problems with sticking keys or dirty keyswitches. If you are using a vacuum cleaner, you can leave the system in a normal orientation because the vacuum will suck the debris up and out without allowing it to fall deeper inside the system.

Once the dust and dirt are blown out of the keyboard, you can then clean any cosmetic dirt or stains from the keycaps. The best way to accomplish this is to wipe the keycaps with a soft cloth moistened in isopropyl alcohol cleaning solution and then follow with a dry cloth.

If a particular key is stuck or making intermittent contact, you'll want to soak or spray the faulty keyswitch with contact cleaner. This cannot be done with the keyboard mounted in the system because some of the cleaner may drip inside. To prevent that, before you attempt to clean the keyswitch, I recommend you remove the keyboard from the system. Consult your owner's manual (or maintenance manual if you have one) for the keyboard-removal procedure. Most laptops have keyboards that can be removed fairly easily. If you don't have a procedure for your system, use the sample procedure listed later in this chapter.

After the keyboard is removed, you can remove the keycap from the problem keyswitch and spray the cleaner into the switch. I usually do this over a sink so that the excess liquid doesn't drip onto the floor. Then replace the keycap, reinstall the keyboard, and test it to see whether the key works properly. If it doesn't, you may need to replace the keyboard with a new one. Normally, you cannot replace individual keyswitches. After that, periodic vacuuming or blowing out the keyboard with compressed air will go a long way toward preventing more serious problems with sticking keys and keyswitches.

Cleaning the TrackPoint or Touchpad
The TrackPoint or touchpad pointing devices used in laptops normally require very little or no maintenance. These devices are totally sealed and relatively immune to dirt or dust. Merely blow off the area around the TrackPoint with compressed air or wipe down the surface of the touchpad with a mild cleaning solution to remove oils and other deposits that have accumulated from handling them. If you have a TrackPoint and the cap is excessively stained or greasy, you can remove it and soak it in some cleaning solution. If the stain won't come out and/or the cap is excessively worn, it would be a good idea to simply replace the cap with a new one. Replacement TrackPoint caps are available in three different designs from a number of sources including Compu-Lock at www.compu-lock.com. Toshiba Accupoint caps can be obtained from any Toshiba Authorized Service Provider (ASP). To find the closest ASP, check with Toshiba at http://pcsupport.toshiba.com. Dell track stick caps can be ordered from Dell directly via its Customer Service department.

Hard Disk Maintenance
Certain preventive maintenance procedures protect your data and ensure that your hard disk works efficiently. Some of these procedures actually minimize wear and tear on your drive, which prolongs its life. Additionally, a higher level of data protection can be implemented by performing some simple commands periodically. These commands provide methods for backing up (and possibly later restoring) critical areas of the hard disk that, if damaged, would disable access to all your files.

Defragmenting Files
Over time, as you delete and save files to your hard disk, the files become fragmented. This means they are split into many noncontiguous areas on the disk. One of the best ways to protect both your hard disk and the data on it is to periodically defragment the files on the disk. This serves two purposes: One is that by ensuring that all the files are stored in contiguous sectors on the disk, head movement and drive "wear and tear" are minimized. This has the added benefit of improving the speed at which the drive retrieves files by reducing the head thrashing that occurs every time it accesses a fragmented file.

The second major benefit, and in my estimation the more important of the two, is that in the case of a disaster in which the file system is severely damaged, the data on the drive can usually be recovered much more easily if the files are contiguous. On the other hand, if the files are split up in many pieces across the drive, figuring out which pieces belong to which files is virtually impossible. For the purposes of data integrity and protection, I recommend defragmenting your hard disk drives on a monthly basis.

The three main functions in most defragmentation programs are as follows:

File defragmentation

File packing (free space consolidation)

File sorting

Defragmentation is the basic function, but most other programs also add file packing. Packing the files is optional on some programs because it usually takes additional time to perform. This function packs the files at the beginning of the disk so that all free space is consolidated at the end of the disk. This feature minimizes future file fragmentation by eliminating any empty holes on the disk. Because all free space is consolidated into one large area, any new files written to the disk are capable of being written in a contiguous manner with no fragmentation.

The last function, file sorting (sometimes called disk optimizing), is not usually necessary and is performed as an option by many defragmenting programs. This function adds a tremendous amount of time to the operation and has little or no effect on the speed at which information is accessed later. It can be somewhat beneficial for disaster-recovery purposes because you will have an idea of which files came before or after other files if a disaster occurs. Not all defragmenting programs offer file sorting, and the extra time it takes is probably not worth any benefits you will receive. Other programs can sort the order in which files are listed in directories, which is a quick-and-easy operation compared to sorting the file listing (directory entries) on the disk.

Windows 9x/Me/2000/XP include a disk-defragmentation program with the operating system that you can use on any file system the OS supports. For older operating systems such as DOS, Windows 3.x, and some versions of NT, you must purchase a third-party defragmentation program.

The disk-defragmentation programs included with Windows are extremely slow and don't offer many options or features, so it is a good idea to purchase something better. Norton Utilities includes a disk defragmenter, as do many other utility packages. An excellent defrag program that works on all operating systems is VOPT by Golden Bow (www.vopt.com). It is one of the fastest and most efficient defragmenting programs on the market, and it is very inexpensive. See the Vendor List on the DVD for more information on these companies and their programs.

Windows Maintenance Wizard

Windows 98 and above include a Task Scheduler program that enables you to schedule programs for automatic execution at specified times. The Maintenance Wizard walks you through the steps of scheduling regular disk defragmentations, disk error scans, and deletions of unnecessary files. You can schedule these processes to execute during nonworking hours, so regular system activities are not disturbed.



Virus and Spyware Checking
Viruses and Sypware are a danger to any system, and making scans with antivirus and antispyware utilities a regular part of your preventive maintenance program is a good idea. Many aftermarket utility packages are available that scan for and remove viruses and sypware. No matter which of these programs you use, you should perform a scan periodically, especially before making hard-disk backups. This helps ensure that you catch any potential problem before it becomes a major catastrophe. In addition, selecting a product from a vendor that provides regular updates to the program's signatures is important. The signatures determine which viruses and sypware the software can detect and cure, and because new viruses and spyware are constantly being introduced, these updates are essential.