Showing posts with label mcafee antivirus tech support phone number. Show all posts
Showing posts with label mcafee antivirus tech support phone number. Show all posts

Thursday, 19 May 2016

How can you create your pen drive bootable using command prompt

Now, bootable pen drive is preferred by the so many people to install the new windows operating system.Because with the bootable pen drive, formatting will be done fast and easy as well as no software is needed in this method.
You just need to follow some simple step to make your pen drive bootable:-

For Windows7 Users:-


Start your computer system, click on start button wand write cmd on the search box and click Enter,then cmd icon will appear on top of the panel.

Click right on the cmd icon and then click on run as administrator.


 Click on run as administrator opened the command prompt.

Now, For Windows8 Users:-

 For the command prompt icon, press windows key and then press c and now, same as before right click on command icon and then click on run as administrator.

It opens the command prompt as like in windows7. Now further steps are same for both windows7 and windows8 operating systems.
Write DISKPART on the command prompt and click enter

To prevent the other external hard disk, flash or pen drive from accidental format ,its better to disconnect these devices. Only connect the certain pen drive (4 GB,at least). Now type the list disk and press enter.


This, shows all the connect disk of the computer system like Disk o, Disk 1 ans so on with the description.Now you have to recognize your pen drive with the specific size. Disk 0 is the computer system disk where windows operating system is installed. Here, suppose Disk 1 is that pen drive that is going to  be a bootable pen drive.
Type Select Disk 1 and press enter, it selects the Disk 1 that is pen drive for all the next steps


Write Clean and press enter that will erase all data of pen drive.



Type Create Partition Primary and press enter that creates a primary partition in pen drive.

Type Select Partition 1,press enter that selects the created partition in the last step.






Type Format Fs=Ntfs Quick and hit enter that quickly format the pen drive with NTFS file type.




Type Active, press enter, that makes the partition as Active for the booting restarting the computer system. In case, this step is missed, the computer will not boot from the pen drive.





Now, Type the Exit and press enter to close the Diskpart and command prompt.



After the last step pen drive has become bootable.Further, copy all the files from the root of windows operating system setup DVD or ISO inside the pen drive root. For that open the windows setup file from the DVD or ISO and copy all the file by selecting with Ctrl+A and paste in the pen drive's root as like shown in figure
 




Finally, pen drive bootable process is complete for windows 7 or 8 operating system. Now you are able to format your computer system with the bootable pen drive-restart your computer , press F12 when BIOS screen appears that shows the option to boot from CD/DVD Drive, Hard Disk and Pen Drive. So select pen drive and hit enter. Now your system starts booting and ready to install windows OS.

Here , I would like to mention to avoid the formatting system again and again, protect your computer system from the malicious software like virus, worms, trojan ans others because these malicious software is the big reason of windows operating system corruption.If you want any kind of antivirus related information, or to fix your computer system issues regarding to antivirus you may call me on norton antivirus customer service phone number usa@1-844-798-3801  
























Saturday, 14 May 2016

Know the different kind of viruses and how they can effects your files or programs



 Here we are going to talk about the various kind of virus.Before that that we have know actually virus is what, so-

VIRUS:- Virus is malicious code that can be developed by the some hackers or crackers to harm your computer system. These computer virus propagates in your computer system to the purpose of dig your confidential data or take the access of your computer in order to gain some benefits

Read More about computer virus

  Types Of Computer Virus:-




Appending Virus:-Appending Virus is that virus which can appends a copy of its malicious code at the end of the host program file. Its aim is not to destruct the host program, but slightly modify it, so that virus code can add with host program when continuing to operate.
An appending virus copies the first bytes of its code to the secure location, then after spreads the replica of its coda at the beginning of the program, it runs just before the host program takes control. This virus can‘t harms permanently to any part of program, that’s why  detection of infection  becomes more difficult.


Self-garbling Virus:- It is the another type of computer virus that will try to hide from an anti-virus software programs by garbling  its own code. When this kind of virus propagates, then it will also alter encoding of its own code in order to escape from the anti-virus software and to stay hidden in user computer system. 

Proof of concept virus:- Generally proof of concept virus software program is used to check the vulnerability of some other existing software program. While proof-of concept virus can’t be a harmful, it is developed and deployed only to know how a malicious software code of virus can exploit the vulnerability. 

Memory-resident Virus:- As the name, this virus software installed in the memory and infects the program files. This kind of malicious code of virus  finds the way to enter the enter the user’ computer system  RAM(random access memory) and after that try to infect the executable file when it opened by the user. This virus also known as Terminate and Stay Resident(TSR)


Bimodal Virus:-This variant of virus also known as a Boot Sector Infector, because bimodal virus are capable to infect boot records and files both on the computer system.

Stealth Virus:- This type of computer virus  actively try to escape itself from the eyes of antivirus program by masking the size of files that it wants to hide or by temporarily removing itself from the infected files and replacing its  copy of malicious code in another place of drive, also replacing the infected file with the other uninfected file.

Macfee antivirus customer service also offers you quick and fast online technical support to fix your. computer virus related issues.

Saturday, 7 May 2016

How can identity theft effects individual's life? Know it.



Identity Theft as the name depicts :-It is the process of stolen someone’s personal information like name, credit card information, social security  number to commit the fraud by posing himself like a authorized person. Identity thief done this identity theft to his own gain or financial advantages on the expense of genuine person when the victim is alive or deceased.

Usually, identity thief can use personal information to:-

  • Obtain credit cards, loans and state benefits.
  • Open bank accounts.
  • Obtain documents like passport and driving licenses in your name.
  • Oder goods on victims behalf.
  • Misuse existing accounts and mobile numbers.
  • Until ,you can’t receive invoice for those things which you have not ordered or receive letters from debt collectors for debts that are not yours, you may not know that you are a identity theft victim.
Some most common types of identity theft are:


Financial Identity Theft:- Financial gain is the most common purpose of stealing personal information. Financial theft can be occurs to get the credit card, loans, good service in the name of authorized person.

Identity Cloning And Concealment:- Here identity thief opt someone else identity to conceal their own real identity. Bad guys may use other person’s images or information through  social networking sites and may create realistic stories to involving the friends of genuine person. They can misuse real person’s social information and able to obtain credentials to pass various authentication tests in daily life.



Synthetic Identity Theft:- It is the most recent identity theft  in which identities are partially or completely fabricated. Identity thief try to combining true Social Security Number with the name and date of birth. Synthetic theft is difficult to trace because it does not shown on person’s credit report directly but appear as entirely new file in the credit bureau or as the subfile on victim’s credit report.

Medical Identity Theft:- Under the identity of authorized person  some other individual seeks the medical care, referred as the medical identity theft. In addition to the risk of financial harm that is common to all variant of identity theft. Here, it is possible that thief’s medical history may be added to the medical record of true person that may effects the future treatment due to the misinformation.


Child Identity Theft:-Some minor’s identity is used by other unauthorized person to the personal benefits. The impostor may be a family member, friend or even a stranger who targets the children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can obtain credit, driving licenses and even buying a house by using child’s identity.

Criminal Identity Theft:- Criminal fraudulently identifies theirself  as a police to the other individual at the point of arrest, that known as criminal identity theft. These thief can done some illegal deed or crime but charges place to the other person whose identity theft by the criminal thief.


Know , how to thief  stolen others identity:- Identity thieves can use many techniques to steal personal information like shoulder surfing, dumpster diving , stealing mails,bribing, pretexting, skimming, phishing.


To secure your personal information and avoid identity theft prefer some reputed antivirus.If you are not feel easy to fix your antivirus problem, then you also use the macfee antivirus technical support phone number @ 1-844-798-3801 to avail virus removal support services just in one call.

Saturday, 30 April 2016

KNOW HOW CAN YOU IDENTIFIED THE SPAM EMAIL?





How do you know about the spam email?

  • Generally ,the emails that do not include receivers email address in the TO: or CC: field are the spams.
  • Email Spam may contains offensive language or link to websites with uneasy content.

Know ,what you can do to avoid spams in your mailbox:
ΓΌ   

  • You can install spam filtering/ blocking software.
  • You  If you have a doubt on email that is it may be spam, don’t respond, just delete it.
  • You   Disabling the email’s preview pane and reading emails in plain text.
  • You   If possible then rejects the Instant Message from that person who are not in your buddy list.
  • You   Avoid to click the URL link within the IM unless you are confident about the source.
  • You   Always Keep your software and security patches up to date.

Are you really fed up with spam or junk email and you are not able to work alone on your internet browser, then to avoid this, you may  install antivirus that filters spam or blocks adds on your screen and also get the tech help by calling on toll free macfee antivirus technical support phone number @1-844-798-3801.