Wednesday, July 28, 2010

How to Cold Reset an HP Laserjet Printer

"Older" printers with a display panel. (e.g. 4000, 4100, 5si, 8000, etc.)

Cold resetting the printer is simply a matter of turning the power off, holding down the GO or Online button while turning the printer on.
Resetting NVRAM settings must be done manually through service mode. See entering service mode.

"Newer" printers with a display panel. (e.g. 2300, 2400, 4200, 4250/4350, 4300, etc.)

Turn the printer off and then on. When the printer begins its memory count, press and hold down the Checkmark button until all the main LED signal lights illuminate and stay illuminated. Then release the Checkmark button, and use the Up/Down arrow keys to find the Cold Reset option, then press the Checkmark button again to choose that option.

Printers with no display panel.

HP 1100, 1200 - While the printer is on, press and hold the Go button for 5 seconds. This will reset the printer.
To reset the NVRAM. Turn the printer off. Press and hold the Go button for 20 seconds while powering on the printer.

HP 2100 - To perform a cold reset, turn the printer power off, then press and hold the JOB CANCEL button. Turn the printer power back on and after all the LEDs come on release the JOB CANCEL button. A cold reset changes most system parameters in NVRAM to the factory defaults. The JOB CANCEL button must be released within 20 seconds after all of the LEDs come on; otherwise, an NVRAM initialization is performed instead of a cold reset.

HP 2200 -
Cold reset:
1. Turn the printer power off.
2. Press and hold GO.
3. Turn the printer power back on and continue to hold GO until the Attention light turns on.
4. Release GO.
5. The device lights will begin cycling from front to rear. The cold-reset process will run until completion and the device will go to the ready state.

NVRAM Reset:
1. Turn the printer power off.
2. Press and hold GO.
3. Turn the printer power back on and continue to hold GO until the Attention, Ready, and Go lights turn on.
4. Release GO.
5. The device lights will begin cycling from font to rear. The NVRAM initialization will run until completion and the device will go to the ready state.

HP 5P & 6P
Cold reset:
Turn the power off and hold the reset button (button closest to the back of the printer) for LESS than 20 seconds while turning the printer on.

Reset the NVRAM:
Turn the power off and hold the reset button for MORE than 20 seconds while turning the printer on..

http://www.printertechs.com/tech/coldreset.php

Sunday, July 25, 2010

Phenom 2 940 upgrade on M2N32-SLI Premium and Deluxe by ASUS

A fast and cheap upgrade for the ASUS AM2 motherboard.
Contrary to other posts, the ASUS M2N32-SLI Premium and Deluxe motherboards WILL support this CPU... you need to do the following...

1. Upgrade to latest BIOS 1304 (for premium) or 1802 (for deluxe).
2. Install CPU.
3. Clear CMOS.
4. Disable HPET in BIOS power settings (to fix clock issue).
5. Disable C1E setting in BIOS CPU config (to fix clock issue).
6. Set RAM timing to 667 (otherwise it will not POST properly).
7. Enjoy your new CPU.

My friend and I both upgraded at the same time, and we love the processor. No issues encountered.

http://forums.guru3d.com/showthread.php?t=286970

Thursday, July 15, 2010

Iphone or other cheap/free electronics SPAM

If your contacts list starts getting emails from you with giveaways and such, your MSN Messenger or Live Messenger password may have been compromised. Change the password to a strong password and the problem should go away. Also update and scan with Malwarebytes and your virus scanning software.

XP Antivirus Pro 2010, XP Antivirus Pro malware removal

XP Antivirus Pro 2010 (also can be met as XP Antivirus Pro or other variants) is a rogue anti-spyware application. It uses false scan results and fake security warnings in order to scare you into purchasing this bogus software. It states that your computer is infected with Trojans, adware or malware and that you should purchase XP Antivirus Pro 2010 to remove the infections that of course don't even exist.

1. Click Start->Run (or WinKey+R). Input: "command". Press Enter or click OK.
2. Type "notepad" as shown in the image below and press Enter. Notepad will open.
3. Copy and past the following text into Notepad:

Windows Registry Editor Version 5.00
[-HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command]
[-HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command]
[-HKEY_CLASSES_ROOT\.exe\shell\open\command]

[HKEY_CLASSES_ROOT\.exe]
@="exefile"
"Content Type"="application/x-msdownload"

[-HKEY_CLASSES_ROOT\secfile]

4. Save file as "exefix.reg" (without quotation-marks) to your Desktop.
NOTE: choose Save as type: All files
5. Double-click to open exefix.reg. Click "Yes" for Registry Editor prompt window.

6. Download Malwarebytes. Update Malwarebytes and run a full system scan.

If you can't complete the above steps then please use another PC to download an automatic removal tool and exefix.reg (Right Click (Save Target As)) to download file. Copy these files to USB flash drive or any other external media and transfer them to infected computer. Launch exefix.reg file first and then install Malwarebytes.

MANUAL REMOVAL:
Kill processes:
av.exe

Delete files:
%UserProfile%\\Local Settings\\Application Data\\av.exe %UserProfile%\\Local Settings\\Application Data\\WRblt8464P (or equivalent data file, with no file extension, and a similar creation date as “av.exe”).

Delete registry values:
HKEY_CURRENT_USER\Software\Classes\.exe
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon
HKEY_CURRENT_USER\Software\Classes\.exe\shell
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command
HKEY_CURRENT_USER\Software\Classes\.exe\shell\start
HKEY_CURRENT_USER\Software\Classes\.exe\shell\start\command
HKEY_CURRENT_USER\Software\Classes\secfile
HKEY_CURRENT_USER\Software\Classes\secfile\DefaultIcon
HKEY_CURRENT_USER\Software\Classes\secfile\shell
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command
HKEY_CURRENT_USER\Software\Classes\secfile\shell\runas
HKEY_CURRENT_USER\Software\Classes\secfile\shell\runas\command
HKEY_CURRENT_USER\Software\Classes\secfile\shell\start
HKEY_CURRENT_USER\Software\Classes\secfile\shell\start\command
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command | @ = “”%AppData%\av.exe” /START “%1″ %*”
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command | IsolatedCommand = “”%1″ %*”
HKEY_CURRENT_USER\Software\Classes\.exe | @ = “secfile”
HKEY_CURRENT_USER\Software\Classes\.exe | Content Type = “application/x-msdownload”
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command | @ = “”%AppData%\av.exe” /START “%1″ %*”
HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command | IsolatedCommand = “”%1″ %*”

Security Tool Fake AntiVirus - how to remove

Security Tool Virus is a rogue anti-spyware program that’s distributed through websites that simulate virus scans. The user is than prompted to download the software to clean the infected PC. The tool provides false alerts of legitimate files that are needed by your Windows PC. Do not remove these files!

1.Stop Security Tool Processes: [random numbers].exe
2.Remove Security Tool Files
3.C:\Documents and Settings\All Users\Application Data\[random numbers]\
4.C:\Documents and Settings\All Users\Application Data\[random numbers]\[random numbers].exe
5.Remove Security Tool Registry Keys
*HKEY_CURRENT_USER\Software\Security Tool
*HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Tool
6.Remove Security Tool Startup Entry: [random numbers].exe
You can also download MalwareBytes Anti-Malware to remove Security Tool Virus.