Showing posts with label Removal. Show all posts
Showing posts with label Removal. Show all posts

Tuesday, March 20, 2012

ERROR KODE CANON MP145/MP160 :

0 comment
ERROR KODE CANON MP145/MP160 :
E2-2 = tidak ada kertas (ASF)
E3-3 = Paper jam
E4 = tidak ada tinta/cartridge
E5-5 = ink cartridges tidak terpasang atau cartirdge yang terpasang salah (tidak compatibel)
E8 = absorber full, atau platen waste ink absorber full mita direset
E9 = hubungan ke digital camera / video camera tidak support
E14 = Ink cartridges whose destination are wrong
E15 = Ink cartridge tidak terpasang E16 - Ink remaining is unknown
E16 -E19 = masalah pada scan head alignment sheet
E22 = Carriage error
E23 = Paper feed error
E24 = Purge unit error (bagian cleaning head)
E25 = ASF(cam) sensor error
E26 = Internal temperature rise error
E27 = ink absorber full or platen waste ink absorber full > reset dengan toolsnya
E28 = Ink cartridge temperature rise error -
E29 = EEPROM error
E33 = Paper feed position error
E35 15 = USB Host VBUD overcurrent error - USB
E37 17 = motor driver tidak normal
E40 20 = hardware lain error
E42 22 = Scanner error

CARA MERESET WASTE INK COUNTER CANON MP160/MP145
Sebelum mereset lihat dulu pesan error yang terdapat pada lcd printer anda :
cara dibawah ini digunakan untuk memperbaiki printer yang mempunyai pesan ERROR E27 dan ERROR E8



1. Matikan printer(kabel power masih terpasang), tekan dan tahan tombol STOP/RESET kemudian tekan dan tahan tombol ON/OFF dan lepas STOP/RESET,
kemudian tekan tombol STOP/RESET 2x
2. Lepaskan kedua tombol, sekarang printer dalam posisi SERVICE MODE (pada LCD printer muncul angka"0")
3. Setelah lampu on/off berwarna hijau, silahkan tekan tombol STOP/RESET sesuai dengan petunjuk berikut:
di tekan 1x = lampu Orange nyala >untuk Service pattern print
di tekan 2x = lampu Hijau nyala >untuk EEPROM print
di tekan 3x = lampu Orange nyala >untuk EEPROM reset
di tekan 4x = Lampu Hijau Nyala >untuk Waste ink counter reset
4. Matikan printer dan cabut kabel POWER.
5. Hidupkan kembali printer anda

Read More..

Saturday, September 10, 2011

Ramnit Virus and How to Cope

0 comment

The characteristics of a virus ramnit the most visible are:

1. Watermark.exe file located at: C: \ Program Files \ Microsoft. And this virus will spread into namaacak.exe

2. This virus attacks the flash, create a shortcut show 4, 1 recycler and autorun.inf files

3. Each drive if exposed to this virus will be made autorun.inf


Jump:

Tools and materials:

1. Unlocker or can also use fileassasin please download here, which serves to delete force.
4. SmadAV and Anti-virus updates (Kaspersky / norman / Dr.Web).

How to find it

Set folder options> view>
show hidden for known file types (check this section)
Hidden extension for hidden files & folders (uncheck if you have any questions click yes / ok)
Hide protected hidden files (uncheck if you have any questions click yes / ok)

Turn off autorun via start> run or could with Windows + R and typing gpedit.msc at Computer Configuration> Administrative Templates> System 2x click on the "Turn off autoplay" enable and click below click on the All drives and do the same on the user configuration (the Windows 7 on computer configuration and user configuration: Administrative Templates> Windows components> AutoPlay Policies> 2x click on the "Turn off autoplay" click enable)

Turn off access to the System Volume Information and Recycle every Hard drive. Right-click on System Volume Information on drive C. Click the Sharing And Security on the security tab click advanced and remove centangan the option below. Click ok. If there is a warning just click ok. ok and finished. Do it to recycle and on the other drive

Temuakn parent virus with a combination of windows + f (search) specify the drive to search its files watermark, on the advance check hidden files & folders. Enter search words its "watermark" (without the quotes), search and file watermark is found. (On windows seven straight just type "watermark" without the quotes)

In Windows XP, look at C: \ program files \ microsoft \ right click the file and select Unlocker watermark.

Besides in those folders still have 6 more places, but which must first delete is in C: \ program files \ microsoft \ Watermark.exe because the virus went from there. File watermark among others also available on:
C: \ Program Files \ Common Files \ Microsoft \ Watermark.exe
C: \ Documents and Settings \% UsernamePC% \ Microsoft \ Watermark.exe
C: \ Documents and Settings \% UsernamePC% \ Application Data \ Microsoft \ Watermark.exe
C: \ WINDOWS \ system32 \ Microsoft \ Watermark.exe
C: \ WINDOWS \ Microsoft \ Watermark.exe
C: \ windows \ temp \ microsoft \ Watermark.exe

All files are watermark.exe please delete with Unlocker or fileassasin force.

After the delete, please create a file called Microsoft (without extension format) in to 7 sections. So that the virus can not menduplikatkan his watermark on some of those goals. Also, delete the file and make a well dmlconf.dat dmlconf.dat files (text document) in C: \ WINDOWS \ system32. all files in read-only settings.

Then open regedit in the Run.

Find HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon

userinit right click then select Modify and change c: \ program files \ microsoft \ watermark.exe with C: \ Windows \ system32 \ userinit.exe, (use a comma, *. exe,.)

Finishing, install and scan your computer with anivirus updates, as well as scan and repair registry using smadav all.

A little extra:
1. Ramnit not infect the file size above 1 MB.

2. Before the virus completely cleaned, Reinstall windows are not the solution, because the virus will come back again.
3. Use Kaspersky or Norman Antivirus, recommended by Kaspersky that features Disinfection.

4. Sacan flash disk with smadav, to get the autorun.inf folder, in which there is a folder con, aux, and nul.

5. Always backup important data to CD / DVD, because we can not predict what the virus is more to come.

6. Quick way to clean, scan the computer with Kaspersky Update. Once completed, some programs may not run and it's time to reinstall. : D

Rumble-Seat ramnit:

Transmission of the stick:

* Copy of Shortcut to (1). Lnk
* Copy of Shortcut to (2). Lnk
* Copy of Shortcut to (3). Lnk
* Copy of Shortcut to (4). Lnk

The file is called:

* \ RECYCLER \ * \ .* CPL
* \ RECYCLER \ * \ .* EXE

Random Call in:

What we can sample in RECYCLER Folder

* \ RECYCLER \ * \ AHjwMBNo.cpl
* \ RECYCLER \ * \ AkNMFCRL.cpl
* \ RECYCLER \ * \ aNDaUKNA.exe
* \ RECYCLER \ * \ cLPVJkpK.cpl
* \ RECYCLER \ * \ CwDUrJdB.cpl
* \ RECYCLER \ * \ dagwlQkE.cpl
* \ RECYCLER \ * \ drAVBwMZ.cpl
* \ RECYCLER \ * \ eaMmSQoX.cpl
* \ RECYCLER \ * \ fZpjyPPy.cpl
* \ RECYCLER \ * \ geWjkwZi.cpl
* \ RECYCLER \ * \ IEtRdrbh.cpl
* \ RECYCLER \ * \ IHaGrBHY.cpl
* \ RECYCLER \ * \ LKcPsJXH.cpl
* \ RECYCLER \ * \ LndIcoXP.cpl
* \ RECYCLER \ * \ lrpwohKp.cpl
* \ RECYCLER \ * \ lupXyAAw.cpl
* \ RECYCLER \ * \ LyVlnZdA.cpl
* \ RECYCLER \ * \ lZevWmcg.cpl
* \ RECYCLER \ * \ mafCbUPO.cpl
* \ RECYCLER \ * \ mGbrWbij.cpl
* \ RECYCLER \ * \ mQSMHcww.cpl
* \ RECYCLER \ * \ MvcNinTi.cpl
* \ RECYCLER \ * \ ndTjaxyh.cpl
* \ RECYCLER \ * \ nmBWLrXh.cpl
* \ RECYCLER \ * \ NuhOEyMD.cpl
* \ RECYCLER \ * \ nWALofnr.cpl
* \ RECYCLER \ * \ OaGOvJeG.cpl
* \ RECYCLER \ * \ OMEGJQcl.cpl
* \ RECYCLER \ * \ OVjsftsa.cpl
* \ RECYCLER \ * \ pCUOOaHt.cpl
* \ RECYCLER \ * \ PpXJOkIr.cpl
* \ RECYCLER \ * \ pQPlgwMY.cpl
* \ RECYCLER \ * \ pROfvClT.cpl
* \ RECYCLER \ * \ QcnlZQeZ.cpl
* \ RECYCLER \ * \ qxfhTIFG.exe
* \ RECYCLER \ * \ RsrsKfla.cpl
* \ RECYCLER \ * \ ryrrcqOx.cpl
* \ RECYCLER \ * \ Tjlcctlt.cpl
* \ RECYCLER \ * \ UvsgiOyE.cpl
* \ RECYCLER \ * \ vNKreBrS.cpl
* \ RECYCLER \ * \ vxscVUns.cpl
* \ RECYCLER \ * \ WYtPelOt.exe
* \ RECYCLER \ * \ XdmGZjNi.cpl
* \ RECYCLER \ * \ xTdEispB.cpl
* \ RECYCLER \ * \ ZcgiwHoK.cpl
* \ RECYCLER \ * \ ZeXsqRJZ.cpl
* \ RECYCLER \ * \ pvceZJVj.exe
* \ RECYCLER \ * \ SHZsXAXH.exe
* \ RECYCLER \ * \ tGDbxZoP.exe
* \ RECYCLER \ * \ tLwKdSvE.exe
* \ RECYCLER \ * \ CBToNhJS.exe
* \ RECYCLER \ * \ hrCXBaSu.cpl
* \ RECYCLER \ * \ iLGrGpyu.cpl
* \ RECYCLER \ * \ klJUCocY.exe
* \ RECYCLER \ * \ phQYFQck.exe
* \ RECYCLER \ * \ PWwgkNPH.exe
* \ RECYCLER \ * \ qiFGArit.cpl
* \ RECYCLER \ * \ rRdTUqAp.cpl
* \ RECYCLER \ * \ UdmvVDOB.cpl
* \ RECYCLER \ * \ unEglHbj.exe

Here is the alias of viruses / malware:

* Win-Trojan/Starter.3584.F (AhnLab)
* Trojan.Win32.Starter.yy (Kaspersky)
* W32/Runner.NZ (Norman)
* Trojan.Ramnit! IQNQL6zS3w0 (VirusBuster)
* TR / Starter.Y (Avira)
* Win32/Ramnit.H (CA)
* Trojan.Starter.1591 (Dr.Web)
* Win32/Ramnit.F (ESET)
* Trojan.Win32.Ramnit (Ikarus)
* W32/Ramnit.a (McAfee)
* Trj / Starter.G (Panda)
* TROJ_STARTER.SM (Trend Micro)

For users of Windows 7, the virus does not make Watermark.exe

Read More..

Tuesday, July 26, 2011

Antispyware Soft Removal

0 comment
If you are looking for information on Antispyware Soft removal, then you have landed on the right page. Read through this article to know all about removal of scareware programs like Antispyware Soft.
image
As our dependence on the Internet increases, so does our vulnerability to malicious software programs like viruses, trojans adware and malware programs. The only way out is to put up as many safeguards as possible to protect your PC. A regularly updated antivirus program and a computer operating system with firewall turned on, will work best for you. Still some malicious programs like Antispyware Soft can make their way through via whatever loopholes are left in installed software programs on your computer. Programs like Antispyware Soft are a new breed developed by crackers who are bent upon taking advantage of software vulnerabilities.

Crackers keep coming up with cleverly designed malicious programs like viruses, trojans, worms and malware to take advantage of chinks in your computer's security armor. Though computer operating systems are easy to use, they are by no way easy to fix when they are invaded by malicious programs and manipulated by them. In this article, first you will find a characterization of Antispyware Soft and then some guidelines on removal of this program from your computer.

About Antispyware Soft

As I mentioned before, Antispyware Soft and malicious programs similar to it like Antivirus Soft and Antivirus are called scareware or ransomware programs. Programs like these gain access to your computer through some websites or with collusion of a trojan virus and set themselves up on your PC. Once inside, it starts blocking most of the system programs and displays fake security alerts about viruses infection. It takes control of Internet Explorer and redirects you to certain .... websites. It basically disguises itself as an antispyware software, which it is definitely not! Then after that, it holds your PC at ransom. It basically demands that you purchase the full version of Antispyware Soft to clear out all the viruses that have infected your PC. Basically, it tries to fool a user into believing that his computer is infected and the program is a savior! So how do you achieve Antispyware Soft removal from your computer? That is exactly what we talk about in the next section. Also check out the method used for removing AV Security Suite, which is a similar scareware program.

Antispyware Soft Removal Procedure

If your computer has been infected by Antispyware Soft, then you need not panic. Antispyware Soft Removal can be accomplished and your PC can be restored to its original condition. There are two ways of going about this. You could either use a free Antispyware Soft removal tool or go for a manual removal. First option is simpler but risky, while the second option is a bit difficult but certainly more safe.

If you plan to go for an Antispyware Soft removal tool offered by some websites, then you need to first restart your Windows based PC and boot it in safe mode with networking. Once you are in, within a few seconds, go to the Windows command prompt and enter 'msconfig'. This will open up a tabbed window. Go to the 'startup' tab and uncheck the program with 'tssd' within its name. Save settings and then restart your computer again. This will disable the program from becoming active at startup. Next, reboot the PC and then go to the Internet Explorer settings. Follow the path of 'Tools --> Internet Options --> Connection' and from the options below, uncheck 'Use Proxy Server' option. Save settings and close the Window. Next you can download and install anyone of Antispyware Soft removal tools or run your antivirus program to remove all the remaining traces of the malicious program.

Another way to achieve Antispyware Soft removal is to manually delete the registry entries and .exe files created by the program and erase it from your laptop or desktop computer. For that, you will have to refer to an Antivirus website that can provide you details about the exact files and Windows registry entries that need to be deleted. To remove Antispyware Soft by this method, will require some expertise of handling Windows OS 'under the hood' problems.

Hope this article has given you a clear idea of how to go about Antispyware Soft removal and clean your PC. Make sure that your antivirus software has a component for Internet protection to prevent entry of scareware like Antispyware Soft into your system. As they say, prevention is always better than cure, which is even more true when it comes to computer security.
source
Read More..

 
Copyright 2011 @ MORE ADVANCED!