Saturday, February 4, 2012

WebXpert

missmarysubijano@consultant.com

 
 
 
 
 
 
 
 
What Is Cloud Computing?
Cloud computingconsists of hardware and software resources made available on the Internet as managed third-party services. These services typically provide access to advanced software applications and high-end networks of server computers.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
 

 

 Characteristics

Cloud computing exhibits the following key characteristics:
  • Agility improves with users’ ability to re-provision technological infrastructure resources.
  • Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. Cloud computing systems typically use REST-based APIs.
  • Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure.[16] This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house).[17]
  • Device and location independence[18] enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.[17]
  • Multi-tenancyenables sharing of resources and costs across a large pool of users thus allowing for:
    • Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
    • Peak-load capacity increases (users need not engineer for highest possible load-levels)
    • Utilization and efficiency improvements for systems that are often only 10–20% utilized.[19]
  • Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.[20]
  • Scalability and Elasticity via dynamic (“on-demand”) provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads.[21]
  • Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.[17]
  • Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels.[22] Security is often as good as or better than under traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford.[23] However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users’ desire to retain control over the infrastructure and avoid losing control of information security.
  • Maintenance of cloud computing applications is easier, because they do not need to be installed on each user’s computer.


Types of Cloud Computing

Service providers create cloud computing systems to serve common business or research needs. Examples of cloud computing services include:
  • virtual IT – configure and utilize remote, third-party servers as extensions to a company’s local IT network
  • software – utilize commercial software applications, or develop and remotely host custom built applications
  • network storage – back up or archive data across the Internet to a provider without needing to know the physical location of storage
Cloud computing systems all generally are designed for scalabilityto support large numbers of customers and surges in demand.


 

 

Examples of Cloud Computing Services

These examples illustrate the different types of cloud computing services available today:
Some providers offer cloud computing services for free while others require a paid subscription.

Cloud Computing Pros and Cons

Service providers are responsible for installing and maintaining core technology within the cloud. Some customers prefer this model because it limits their own manageability burden. However, customers cannot directly control system stabilityin this model and are highly dependent on the provider instead.
Cloud computing systems are normally designed to closely track all system resources, which enables providers to charge customers according to the resources each consumes. Some customers will prefer this so-called metered billing approach to save money, while others will prefer a flat-rate subscription to ensure predictable monthly or yearly costs.
Using a cloud computing environment generally requires you to send data over the Internet and store it on a third-party system. The privacy and security risks associated with this model must be weighed against alternatives.



5 Examples of Cloud Computing

Email on the go

googlemailEmail communication now plays a central role in most of our busy lives. That’s fine if you don’t go out much but if you travel a lot, this may cause problems. Unless you carry a mobile WiFi-enabled laptop with you everywhere you go or use push email on your cellphone, having an email client sitting on your computer at home means that while out and about you risk spending time outside of the communication loop. This is one area where the cloud finds its most frequent and useful application.
Online email has been offered by all the big names (such as Microsoft, Yahoo and of course Google) for a number of years and I have tried a lot of different services. Wherever in the world I have found myself, my emails have (almost) always been made available to me. The easiest and most convenient for me is GoogleMail, although each has its pros and cons.
Of course, using webmail makes you a slave to an internet connection. The first thing you do when you find yourself in a new or unfamiliar location is to try and locate an internet café or public library to launch your secure portable browser and check your emails. Privacy concerns are never far from the surface either, especially when stories of passwords to private accounts being leaked online hit the headlines. How much of your life have you given away during email exchanges?
And then there’s the issue of possible data loss, which nicely leads onto the next incarnation of cloud computing.

No need for local data storage

humyo


Data stored on your home or business computer suffers from many of the same restrictions as email and, as with email, the cloud offers a solution. Storing your MP3′s, video, photos and documents online instead of at home gives you the freedom to access them wherever you can find the means to get online.
True, you will undoubtedly be putting your life ‘out there’ and with that comes all the security and privacy baggage that also plague webmail. Most, if not all, online storage facilities have safeguards in place to ensure that you, and only you, can get to your files – but even so. We all risk losing important files, memories and such like if we suffer from hard drive failure and storing such things away from a temperamental computer system no doubt seems like an ideal solution but where do we turn if the unthinkable happens and our chosen cloud filing cabinet suffers data loss or suddenly closes down?
Examples of online storage services include Humyo, ZumoDrive, Microsoft’s SkyDrive, S3 from Amazon, amongst others. Many offer both free and paid for storage and backup solutions.

Are you a collaborator?

spicebird

On occasion you may find yourself in need of the opinion of your peers. Downloading files onto flash memory, emailing documents to friends or family or colleagues or sending submissions by snail mail is so last century. Last year Google launched a service that allowed groups of people to work on the same document, idea or proposal in real time or whenever convenient to each participant. Using Google Wave you can create a document and then invite others to comment, amend, offer opinion, or otherwise join in with the creation of the final draft.

Similar to instant messaging but offering much more scope it can take a project that might have taken weeks or even months to complete using other methods and potentially see it through to completion in mere minutes or hours. Google is not alone in producing online collaboration tools but it is the only one I have used myself. Other examples include Spicebird, Mikogo, Stixy and Vyew to name but a few.

Working in a virtual office

thinkfreeYet again Google’s online suite of office applications is probably the best known but by no means the only solution on offer. Rather than having a system and space hogging suite of applications like a word processor, a spreadsheet creator and a presentation or publishing platform sitting on your computer, you could opt to work online instead. Accessibility, potential for collaboration and perhaps even online storage are just some of the benefits of satisfying your office suite needs by working online.
Examples of online suite’s on offer include Ajax13, ThinkFree and Microsoft’s Office Live.

Need extra processing power?

nebula-badgeFor the dedicated cloud enthusiast, something like Amazon’s EC2 virtual computing environment might be the answer to all your needs. Rather than purchasing servers, software, network equipment and so on, users would buy into a fully outsourced set of online services instead.
Most cloud environments on offer can customize the kind of service provided to exactly suit the needs of the user. If you need more processing power from time to time, a cloud-based infrastructure, being scalable, negates the need for up-front investment in client-owned resources.
Other service providers include the open source AbiCloud, Elastichosts and NASA’s Nebula platform.
So there you have it, five examples of computing in the cloud. When presenting these examples I have tried to balance the many advantages of working exclusively online with some of the disadvantages. Those interested in further reading are encouraged to head over to a piece listing the main advantages in XML Journal, the pros and cons on IT Governance and a detailed article on ZDNet by Cath Everett.
=========================================================================






  • Let us protect your business – Hackers, viruses, and employee sabotage: we’ll protect you from those and other external threats.
  • Enjoy clear communication – We promise to talk straight with no “geek speak” and get you the answers you need.
TechXpert offers the Computer Support that gives your business the advantages of modern technology, with the cost-effective support plan you need to maintain it. With IT Consulting and expert Network Services, we provide everything you need to keep your technology running at its optimal level.

Statistics are showing that small and medium-sized businesses are being targeted by hackers on an escalating scale. The reason for this is smaller businesses tend to have lax and weak security, making them much easier and quicker to steal from.
In physics, there’s a concept called ‘the path of least resistance’. The meaning is plain enough – objects that move in a system take the path where they will encounter the least challenges and hurdles in order to quickly move to wherever they are going.
Apparently, the same principle applies to hackers nowadays. Instead of targeting larger firms for that big ‘score’, hackers are now considering it more feasible and much easier to victimize smaller firms and companies, even for a much smaller amount of money.
Why is that? First, smaller companies generally have much more vulnerable IT systems. Security is minimal or average at best, and the hackers don’t get as much heat or attention when compared to trying to breach the much more complicated, state-of-the-art security systems of bigger firms and businesses. Take a small newsstand business in Chicago: cyberthieves were able to install a Trojan in the cash registers which sent swiped credit card numbers to Russia. When the jig was discovered, Mastercard subsequently demanded an investigation – at the expense of the business owner – and the proprietor had to shell out a hefty $22,000.(i)
A survey in the United States reveals that more than half of small or medium-sized businesses believed that they ran no risk of being victimized by hackers, and less than half of the respondents had security systems in place.(ii) That looks like a path of least resistance, as far as hackers are concerned.
The loss of a few thousand bucks may not be much for a big business, but it can make a significant dent on the profits and sustainability of smaller organizations. And in the case of implanted viruses that steal credit card information, your reputation can also take a big hit. So if you want your business to stay truly safe before it’s too late, please contact us so we can discuss options and blueprints to make your business secure.









OPENING
Thank you for calling technical support. This is Mary
First & Last Name : so i can address you properly
Phone #: Just in case we get disconnected
Email address
How May I help you today?

I do apologize for the inconvenience that you have….
BUT DON’T WORRY, I ASSURE YOU THAT WE HAVE MANY CUSTOMERS EXPERIENCING THE SAME PROBLEM & I’M VERY CONFIDENT THAT YOUR ASSIGNED TECHNICIAN CAN FIX THIS FOR YOU.

Let me get the brand name, serial number and model type of your computer.
So we can determine if it backs up a software warranty…

INTIAL DIAGNOSIS OF COMPUTER TO DETERMINE THE POINTS OF FAILURE
ON YOUR HARDWARE & SOFTWARE

Here’s what I will do. I will escalate this call to our level 2 technician because they are the expert for this type of technical issue.
Thank you for waiting. I do apologize for the long hold. I have forwarded the information to our technical department and it’s been confirmed based on their analysis…..



==================
POINTS OF FAILURE
==================

1. STARTUP PROGRAMS
These are unnecessary subapplications running on your computer upon startup.
In effect it slows down the speed and performance of your computer

2. REGISTRY PROBLEM on your operating system.
These are files of hardware & software registered on your computer. It’s the core of your operating system. Any glitch on that may corrupt your files. Worse case scenario, you’ll lose your files like your important documents for work, your photos on your folders & your hardware may not function properly like soundcard, printer…

3. UNWANTED PROGRAMS (reformat)
These could be spyware or malwares on your computer that doesnt easily detected by an ordinary antivirus. Without cleanup, this will result to data loss or worse hard disk failure
is programming that is put in someone’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program for “malicious software”) is any program or file that is harmful to a computer user. Thus, malware includes computer virus es, worm s, Trojan horse s, and also spyware , programming that gathers information …” any software application in which advertising banners are displayed while the program is running a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.


***********************************************************************************************************
Just to set up your expectations, with your permission, your Level 2 technician will remotely access your computer thru teamviewer. It’s like sharing your computer screen. Just give us the green light to remotely access your computer through the Internet and our Certified technicians will ensure complete repair and maintenance of your PC. Or if you want, he can just walk you through the whole process. Then he will address in detail the points of failure on your software, hardware or email account…. all in one… making
sure everything’s resolved immediately





The scope of services that will be provided by your own personal technician are:
EMAIL PASSWORD
***********************
- Backtrack the old settings of your account to retrieve your email password
EMAIL CLIENT SETUP
***********************
This will what will do for you. On top of that, this is  not only for today
but for the next 12 months
- we will set up your outlook express compatible with your email account
- we will make sure all your contact will be transfered to your email client
NO POP=  with free yahoo but only with email plus
GMAIL= can be done with outlook
SPAM MAIL / SPYWARE
**********************
1. first they will detect and remove the spyware to your account
2. optimize your firewall and schedule automatic spyware and adware scan to your computer
3. Provide you an email security & privacy
Keep in mind that you may have a spyware & adware on the computer, the mere fact that
it has gotten into your computer without your knowledge, is quite alarming.
The longer the it stays on the computer the more damages it could make.
it can hack your files and other stuff that you have on the computer and
worse, even bank accounts and personal security like social information may also
be at risk. so if we do not fix it right now, worse comes to worse, computer and personal information may be compromised.Given that you experiencing this problem today, who knows what it can do to your computer and email account
So right now we will be able to resolve this problem on your email. I will now transfer you to the best technician that we have.
COMPUTER SLOW
*****************
* Hard disk drive has low memory.
* Several unused software programs and files.
* Virus, spyware or malware
* Missing Windows updates and outdated drivers
* Hardware conflicts or overheating CPU
* Corrupt Windows
Our tech experts will resolve conflicts and compatibility issues with applications or software running on your computer. We will diagnose and troubleshoot computer software and hardware errors, and customize the application as per your needs. We will also ensure that your software and drivers are updated.
COMPATIBILITY ISSUE
**********************
-They will also update the necessary configuration that is needed in your computer to be compatible with your OS & any other application or program
- Make sure that your software is up-to-date and compatible with you computer so it will run fast as brand new for the next 12 months.
cleaning up your registry, defragmenting your hard drive, updating your software and operating system, clearing out junk files that slow down your computer…. so it will run fast as brand new for the next 12 months.


PRINTER
*********
- Find the right driver and firmware compatible with your operating system
- Download the particular patch and make registry settings for your printer
- Provide you a backup file to be stored in your computer
We will diagnose and troubleshoot all printer issues instantly and immediately. Our tech experts will help you install and configure your printer with your computer. We will analyze and resolve all issues and errors that occur during printer configuration. Our certified technicians will install the latest drivers and software programs that are compatible with the version of operating system running on your PC. Furthermore, we will perform a ‘test print’ to make sure that your printer is in perfect working condition.


=============
Transition Spill
=============

On top of that we will provide you a year of unlimited technical support which will cover for all your software issues on the computer i.e Internet connection, virus issues, any kind of error messages and slow performance on the computer. Evrything about software would be covered under that one year technical support. Aside from that, we will also cover devices like printers scanners and other add-ons that you wish to install on the computer. That one year unlimited technical support is transferable up to 4 computers, so if you have more than 1 computer the rest would be covered. We have 24hour unlimited technical support so please feel free to raise up multiple technical issues and we will be happy to resolve each of them for you anytime and anywhere you are.

SOFTWARE CONTRACT IS POINT OF NEED PURCHASE.

MEANING IT’S BY DEMAND OR UPON REQUEST

Bear in mind that as an industry standard, may it be dell, hp, gateway, toshiba, sony or lenovo, computer manufacturers does not provide software warranties. Because anything that happens on the computer is beyond their control. They cannot control which website you browse…. which program you install and which activities you do on the computer. The only thing that they can account themselves with is the hardware parts of the computer since they manufacture those parts for your computer. So, should any of those fails, they would be covered for free.

As per warranty, your computer does not include one.I fully recommend that you register your computer under software warranty service.Let me inform you that the job they will do today comes with one year warranty not only for this issue. So even when your computer crash down it will be fixed with no extra cost anytime, anywhere for one year.

$ 169.99 – 1 year unlimitted service
$ 239.99 – 2 year unlimitted service
$ 339.99 – 3 year unlimitted service

- if you only want this issue to be resolved, $69.99 for one time fix
<strong>So let’s go ahead and process this so i can transfer
you to your personal technician.</strong>
I will now transfer you to our billing department to process your secure payment.
Would it be visa, mastercard or american express?
<span style=”font-weight:bold;”>WHAT’S THERE TO WAIT. LET ME GO AHEAD AND SET YOU UP WITH YOUR PERSONAL TECHNICIAN IF YOU DONT, WHAT WILL HAPPEN IS……</span>
<span style=”font-weight:bold;”>
do you have a pen and paper, so you can get the your ticket number….
Should there be a problem in the future, feel free to  contact me directly
=========================================================================
My name is mary and this is my extention 7159
=========================================================================
Annual Unlimited Subscription Plan</span>
* Diagnostic & repair of your hardware issues.
* Troubleshooting software errors.
* Updating drivers and security to protect against online threats.
* Connecting to the Internet, devices and peripherals.
* Optimizing your PC’s speed and performance.
# Tech support to set-up and configure your antivirus software.
# Remove all kinds of security threats from your PC.
# Ensure privacy and security over all your personal information and data.
# Monitor and shield your PC from hackers and malicious viruses.
# Removing conflicts with multiple software applications in your PC
=======================================================================
WHAT’S THERE TO WAIT. LET ME GO AHEAD AND SET YOU UP WITH YOUR PERSONAL TECHNICIAN
IF YOU DONT…. WHAT WILL HAPPEN IS……

WRAP-UP

For your protection and my protection too I am not allowed to get any more information regarding your credit card detail so I will be transferring you to our billing department. For your security we have 3rd-party verifier. After the verification, you will be transferred to your personal technician who will remotely access your computer to fix your technical problem

BEFORE I INIATTE THE TRANSFER, IS THERE ANY OTHER TECHNICAL QUESTION YOU MAY HAVE?
As you know, billing department is only for your secure payment.

PROBING QUESTIONS
Please describe to me exactly the problem
that you are having….

CANNOT BROWSE / NO INTERNET ISSUE
http://www.mail.com/intl/setashomepage.aspx
Are you getting any type of error message?
Last time you were able to access the internet?
Did you install any other software or hardware before the problem begin?

SOFTWARE/ DRIVER INSTALLATION ERROR
Can you connect to internet now?
Name of software having a problem? (compatability issue)
Type of error message?
Last time you were able to use it?
Did you install this before?
any other software installed before this problem occured?
Do you have installation disk?
Product license key?
Troubleshooting
Restart Computer
replicate issue by software access
Device Manager = my computer + manage
NO (?) means no problem

VIRUS ISSUE:  popups, slow connection, something missing or unusual on the screen
Can you connect to the internet? if no, when was the last time you were able to access internet?
Are you getting any pop ups?
Did you install any other software before the problem begin?
Are you getting any error message?
Transfer to L2

ERROR WHILE EMAIL SETUP
Expert assistance to troubleshoot all e-mail issues including e-mail clients. Our tech experts will set-up, install and configure your email client on your PC. We will customize your e-mail settings and enable multiple e-mail account configurations. We will also ensure total protection from various types of spam, virus and other malicious malware.
We need to backtrack the old settings of your email so we can retrieve the password
Can you connect to the internet?
What is you email address you’re having a problem?
web based: yahoo, gmail, hotmail, live
email client software: outlook xprz (xp), windows mail (vista), thunderbird, live mail, entourage/ imail (mac)
Type of error code or message?
were you able to setup or install this before?
Troubleshooting
Restart computer
replicate the issue by accessing the software
ACCESS ISSUE
Can you connect to the internet?
What is you website or email address you’re having a problem?
Type of error message you’re getting
Did you setup any alternate email address?
Do you still remember the security questions?
Last time you were able to access this account?
Did you try this somewhere else aside from you pc?
Transfer to L2

SPAM / EMAIL HACKED
I do apologize for the inconvenience that you have
================================
* we will optimize your computer speed and performance.
Optimize your PC’s performance. We’ll help you clean-up unwanted files, install critical patches and upgrades, back-up data and configure your browser settings for netter performance.
* we will monitor and shield your PC from hackers and malicious viruses by updating your drivers and security to protect against online threats
We will remove viruses from your pc and protect yourself against malware, spyware and other aggressive and malicious online attacks. We will also audit security settings, configure your anti-virus and anti-spyware applications, scan your pc and quarantine viruses.
* we will Removing conflicts with multiple software applications in your PC </span>
We will set-up and customize the installation of different applications and personalize your user settings on your pc, operating system, software, internet, email and your peripherals.
We will help you protect your data as we will show you how to back-up of your documents, photos, videos, etc.
* we will diagnose & troubleshoot your hardware & software issues</span>.
We provide complete diagnosis of any tech problem with a comprehensive solution, including repair, updates and optimization for your pc, software and/or peripherals.
1. first they will detect and remove the spyware to your account
2. optimize your firewall and schedule automatic spyware and adware scan to your computer
3. our technician will remotely access through the internet to go to the heart of your email account and retrieve the password by backtracking to the old settings of your email.
So right now we will be able to resolve this problem on your email. I will now transfer you to the best technician that we have.
Are you able to visit our website?
Are you aware of the one year warranty for our unlimited technical support.
I will now transfer you to our billing department to process your payment.
Would it be visa or mastercard?

WHAT’S THERE TO WAIT. LET ME GO AHEAD AND SET YOU UP WITH YOUR PERSONAL TECHNICIAN IF YOU DONT, WHAT WILL HAPPEN IS……

O P E N IN G
First & Last Name : so i can address you properly
Phone #: Just in case we get disconnected
Email address
HARDWARE:
Product Code / Service Tag
CHECK WARRANTY FIRST
https://mediawiki.middlebury.edu/wiki/LIS/Checking_Warranty
<span style=”font-weight:bold;”>SOFTWARE:</span>
Product key: 25 alpha numeric
Operating System? XP Service Pack 2/3? Windows 7? Vista?
Any anti-virus installed? what kind?
Are you connected online?
Internet Connection? (ISDN, DSL, WIFI, BROADBAND)
When did this problem occurred? frequency? error message?
Any downloaded programs recently?
Is this your first time to call a Technical Support Provider?
TICKET NUMBER:

COMPUTER SLOW
* Hard disk drive has low memory.
* Several unused software programs and files.
* Virus, spyware or malware
* Missing Windows updates and outdated drivers
* Hardware conflicts or overheating CPU
* Corrupt Windows
Our tech experts will resolve conflicts and compatibility issues with applications or software running on your computer. We will diagnose and troubleshoot computer software and hardware errors, and customize the application as per your needs. We will also ensure that your software and drivers are updated.
Just give us the green light to remotely access your computer through the Internet and our Certified technicians will ensure complete repair and maintenance of your PC.
On top of that we will provide you a year of unlimited technical support which will cover for all your software issues on the computer i.e Internet connection, virus issues, any kind of error messages and slow performance on the computer. Everything about software would be covered under that one year technical support. Aside from that, we will also cover devices like printers scanners and other add-ons that you wish to install on the computer. That one year unlimited technical support is transferable up to 4 computers, so if you have more than 1 computer the rest would be covered. We have 24hour unlimited technical support so please feel free to raise up multiple technical issues and we will be happy to resolve each of them for you anytime and anywhere you are.


=============================
WINDOWS 7 / vista
Search field : WINVER
WINDOWS XP
Run: Winver
Service Pack: 2 /3
Right click: Properties
Click: Start
=========================

Press F8 for safemode with networking
highlight that / press up & down keys
modem light?
green= stable
blinking / amber = no signal
Try other browser (flock, opera, safari, netscape, chrome)
Reset browser (tools, internet options, advanced, reset)
Control- shift – esc
applicant’s tab : status
performance tab: cpu usage? process?
START= Program + Accessories
RUN = msconfig
System Configuration
it can back up and restore startup files.
internet protocol configuration
ip address?
default gateway?


==================================================
SUPPORT BOUNDARY GUIDELINES
1. OS/ Software
verify if they have the cd, recovery cd or restore cd
verify if they have the product key or license number
verify if the number is licensed and not trial for 30-60 days
we do not offer trial
we can only walk through to download if available on website
we do not offer cd/ products keys
they need to provide the Windows cd, restore cd or recovery cd
no cd no go
if they have the serial number for office and other application except windows we can download the program over the inter
2. Email
Webmails (yahoo, msn, gmail, hotmail, facebook, friendster, etc)
we do not offer or do password recovery
we can only walkthrough the process of password reset request
we can only recover by luck if it is password saved on their pc
we do not recover deleted mails
password request is 24hrs to 48hrs
Outlook
we can only configure if they have settings
we can only setup if the information is provided by cx and other info is provided on the isp’s website (port settings, modified smtp, pop settings)
we do not recover deleted mails if it was from trash or recycle
3. Hardware
we do not do hardware or physical configurations on the desktop or laptop
we only do router settings if cx can connect to the router using a cable connection





Windows Installation

http://www.temulator.com/
Win XP setup:
http://www.labtestproject.com/screenshot/windows_xp/index.html
Win Vista setup:
http://www.windowsvistauserguide.com/install_windows_vista.htm
Win 7 Home Basic setup:
http://news.softpedia.com/news/Windows-7-RTM-Home-Basic-110-Screenshot-Gallery-119850.shtml
Win 7 Ultimate setup:
http://www.kodyaz.com/articles/32-bit-windows-7-ultimate-x86-rtm-installation-screenshots.aspx

Misc

SUPER ADMINISTRATOR:
Super Admins in Windows XP:
http://www.mydigitallife.info/2006/05/07/unhide-the-administrator-account-in-windows-xp/
Super Admins in Windows Vista:
http://www.mydigitallife.info/2007/08/10/activate-enable-and-show-administrator-account-in-vista-welcome-screen/
PRODUCT KEY SETUP:

Win XP Product Key:

http://pcsupport.about.com/od/productkeysactivation/ht/changexpkey.htm
Win Vista Product Key:
http://www.mydigitallife.info/2007/01/28/how-to-change-windows-vista-product-key/
Win 7 Product Key:
http://www.mydigitallife.info/2009/07/13/how-to-change-or-re-enter-product-key-in-windows-7-and-vista/
WINHELPSUPPORT:
http://www.winhelponline.com/blog/sitemap/
ITKNOWLEDGE24:
http://www.itknowledge24.com/
Gadgets:
http://www.stardock.com/downloads/
MSO2010 download:
http://www.x64bitdownload.com/download/t-64-bit-microsoft-office-2010-x64-download-hsqivnnv.html
Windows Live Mail password reset:
https://windowslivehelp.com/PasswordReset.aspx
DEVICE MANAGER ERROR CODES:
http://support.microsoft.com/servicedesks/webcasts/wc091802/devicemgrerrcodes.htm?gssnb=1
IE 8 SHELLFIX:
http://www.windowsnetworking.com/articles_tutorials/Internet-Explorer-corrupted-fix.html
KEYBOARD LAYOUT:
http://www.conversationexchange.com/resources/keyboard-language.php#xp
Yahoo Mail Login:
http://us.m.yahoo.com/p/mail
http://login.yahoo.com/config/login
eMachines drivers:
http://www.emachines.com/support/product_support.html

Factory Resets

SONY:
F10
HP:
ESC – F11
LENOVO:
F11
ACER:
ALT + F10
DELL:
CTRL + F11 *** for older models with XP OS ***
F8 – Repair my computer *** for newer systems with vista or 7 *** F8 – Repair my computer
FUJITSU:
ALT + F11
GATEWAY:
F9 – Repair Your Computer
TOSHIBA:
Hold down “0″ then press the power button.
LAZYGUY
http://www.computerhope.com
http://www.scribd.com
http://www.networktutorials.info
http://windowsxp.mvps.org
http://windowsxp.mvps.org/tips2.htm

No comments:

Post a Comment