Repairing ASUS K53E DC input power Jack

The ASUS K53E is a second generation I3 Laptop. It was brought into the shop for repairs. The problem was that when the power supply was plugged in the Charge light did not come on and the battery was not charging. The power supply was ruled out as the source of the problem.

IMG_2960
Break in the primary connector

The problem was one of two things, either the DC input power jack unit was bad or it was a connection issue. What was required was to disable the ASUS and visually look at the power input jack.

After tearing apart the laptop and separating the motherboard from the chassis it was found that it was a connection problem and would require resoldering to remedy the problem.

The primary connector was resoldered and the laptop reassembled and the power supply was plugged in. The charge light was on and in about an hour and a half, the battery was fully charged.

Before reassembling the computer, while it was all apart the cooling system was cleaned and the CPU and heatsink were thermo pasted.

Plugged-up-vents
Fouled heat vents

The biggest cause for poor performance and unexpected shutdown is due to overheating. The primary cause of overheating is fouled cooling fins restricting the air flow from the laptops fan and old thermo paste.

Prior to the cleaning and replacing the thermo paste this laptop temperature was hovering around 70 c, after the cleaning and pasting, at idle the temperature was 30c and under load went up to 50 c.

CleanVent
Clean heat fins, no obstruction to restrict air flow

Laptops and Desktops should be cleaned and depending on the environment that they are exposed to they may need to be cleaned every year and thermo pasted once every three years.


 

Advertisement

Fake Tech Support Scams

Today I received a call from a friend informing me that they had malware loaded on their computer and that every time they were using their browser regardless of which browser they were using they were getting this nag screen claiming that Microsoft was informing them that their computer was infected by malware and to contact Microsoft to have the problem resolved.

The quick solution is to use a malware detector and remover, there are a few free ones available online.

If that doesn’t clean your computer then you may have to take your computer to a technician to remove the malware from your computer depending on the complexity of the malware that it may be an expensive venture with no guarantees that all has been removed.

Manually removing viruses, rootkits, malware and trojans can be very time consuming, I have known people to run bills over three hundred dollars.

So the cheaper solution is reinstalling the operating system, and reinstalling all your software (pain in the ass).

It is always good practice to backup you datafiles for two reasons, the first in the event that you have to reinstall your operating system the second hard drive failure.

Below is a link that will show you what this Microsoft popup window looks like.

(A dead giveaway is that if you are using a Linux os or mac os and you get a Microsoft message ) then you are being scammed … lol

The other version of this fake tech support scam is the telephone call, with this scam you are called on the telephone telling you that your computer is infected and that they can fix your problem. (Yeah Right!),

For the Microsoft Tech Support scam here are two images that you might recognise if you have encountered the experience.

Microsoft fake tech support 01

Then you may choose to click okay and immediately the next pop-up comes up.

Microsoft Tech Support Scam popup number two

If you want to know more about these Tech supports scam check out the following video.



Your First Web Site: The Basics Introduction to CSS Part III

In Part II the focus was on how HTML described content. A very simple primitive web page was created with no styling applied to the web page. The output to the browser window looks more like something that you would see in a word processor, something very generic like a letter or essay.

Part III builds upon part II. In this part cascading style sheets will be introduced at the most basic level

Three different ways of using style sheets will be discussed and they are:

  1. External Style Sheets
  2. Internal Style Sheets
  3. Inline Style Sheets.

Each Style sheet has its own use, if you’re setting up multiple pages then the external style sheet is the better choice, on the other hand, if you are creating a single page then the internal style sheet is the best choice. If you are just intending of change the style inside a previously declared id or a single occurrence of a style the inline style sheet may be worth consider. All three are discussed in the video.

Selectors have three main components to them and they are

  1. declaration
  2. Property
  3. value

There are three types of selectors;

  1. The Element Selector
  2. The Class Selector
  3. The Id Selector.

Selectors are talked about in greater details in the video and the notes.

To conclude style sheets determine the appearance, feel and layout of your webpage or websites.


files for this tutorial can be downloaded here click here to download

Your First Web Site: The Basics Part II

Part II is a continuation from part one before the basics.  The video demonstrates how to build a very basic primitive web page. The div, span, hr, and br tags are introduced.  Once the tutorial is completed you should be able to replicate the page.

When you display the page on your browser all you will see is the content, it will not look pretty because all that has been accomplished is that the Markup language (HTML) has only described the content to be displayed.

In Part III CSS2 & 3 will be introduced to demonstrate how you can change the appearance of your page, like all the videos you learn by doing.
Each video has the accompanying working files and notes for those who wish to have some theory to what they are doing.

The corresponding files and notes to the video can be found here. You will need an unzipping program like winzip, or 7-zip. You can download 7-zip for free at http://www.7-zip.org/

In the demonstration, I use the opensource text editor brackets here is the link where you can download this editor: http://brackets.io/


 

Your First Web Site: Before The Basics Part I

This series of HTML tutorials are for those who have absolutely no experience with HTML (HyperText Markup Language) or with CSS (Cascading Style Sheets). Each Tutorial includes a Video, Notes and Skeleton files. The Video focuses on learning by example and learns by doing, while it is not necessary to read the notes the notes may be helpful for those who likes written instruction.
This first tutorial “Your First Web Site: Before The Basics” discusses and demonstrates;

The four essential HTML tags to technically produce a web page.

  1. Tags without content will produce a blank web page.
  2. The Structure and Format of the four essential tags.
  3. The why its is good practice to include the DOCTYPE declaration on line 1
  4. The use of meta tags to let the browsers know what Character set that will be used and to tell the browsers that your page is scalable to the view port of any devices which may view your web page.
  5. A demonstration of the  <h1, h2, h3> Tags and the <p> tags.

Link to notes and files used in video click here

Part II Eliminate the Fear of Browser Cookies install TOR

By André  Faust

One of the biggest concern for those who do not know how browsing and the internet work.

There is a lot of bad information in regards to cookies, and the browser’s cache. Unfortunately, misinformation of this kind leads to some anxiety about cookies and other digital items downloaded into your computer’s cache.

With the early browsers, not with cookies but with JavaScript underhanded activities were common.  Today’s modern browsers are programmed to recognize malicious JavaScript and won’t allow the script to run or to be downloaded.   So what is loaded in the cache is really the least of a users worry.

Anything that is loaded in the cache whether its Cookies or other software is loaded to increase the efficiency of the browser.  Disabling the cache will affect the performance of your browser.

Malware, viruses and other undesirable unwanted software are usually bundled with other software which you consent to install.

It is common that any software, addons, etc that are offered for free has other bundled software included.  Even a reputable corporation like Adobe, when you install their flash plugin, and if you don’t check off any to install Norton security.  The installation will install Norton security.

TOR is a browser that has been designed to help you browse anonymously if you use TOR and follow TOR’s instructions.

In   Part I Anonymous Browsing The Experiment discusses in depth what information your computers gives out and what information it gives out.  In addition, Part one discusses the strength and weakness of TOR and VPN’s Virtual Personal Networks.

The installation is pretty straight forward for what every the platform that you are using, Windows, Linux and Macs.   It is just a matter of going to their site and follows the installation instructions.



 

Part I Anonymous Browsing: The experiment

By André Faust

There are many stories about the information that you give when you are online, some of the stories are accurate and others are exaggerations.

To separate fact from fiction, I created a web page located on my site to collect any information from anyone landing on the page. The page does not keep any of the information that it displays. Once the user closes their browser the information is lost forever.

Using the page three tests were performed, the first test was with Firefox, the second with the browser TOR and the final test was with a VPN (Virtual Personal Network).

The first two test were strictly browser tests. The VPN tests was a hybrid test, it tested both the browser, information that is sent from the user computer online when they are not using a browser.

Two computers located on the same network were used to conduct this experiment/test. Computer A has geolocation software installed while computer B hasn’t.

Most computers don’t have geolocation software or hardware installed so for those, accurate geolocation is highly unlikely. The test will show the difference in accuracy between the both computers.

However, the tests did show that it is possible to get a person’s location under the right conditions.

What the experiment revealed is that when you are using a standard browser that has geolocation API (Application Program Interface )the browser will ask the user for permission.

Not to create any confusion, there is a difference between geolocation software and hardware and a browser geolocation API. The difference is that the software and hardware can give your exact location if your computer is communicating to the internet through a browser or not whereas the browser geolocation API detects if a request is made from the website for your geolocation.

Not all browsers have geolocation API built into them, Chrome is an example of a browser that doesn’t have the API included. When a browser does not support a geolocation API, the user’s location is not given.

The Result of the experiment/test is that you can browse with anonymity with TOR, with Firefox, Your IP address is given, The IP address that is given is the IP address that your internet service provider assigns to your router. While the IP address will identify the Internet Service Provider and the Internet Service Providers Address the IP Address will not give your location. The only way that that could be found is if someone has the legal authority to request to request that information.

Outside of geolocation, the results did show that when you visit a site, you give your IP address, you’re the browser that you are using, some of the plugins your using, your screen resolution and your operating system.

If the site requests your Geolocation, the user’s browser will ask permission to proceed, if the user declines then no information is broadcasted.

The VPN tests were successful at spoofing the IP but failed at providing any of the other information, like browser brand, plugins, screen resolution and operating system. The VPN to spoof the IP address is independent of the browser.

Outside for someone to do statistical analysis, one can browser without giving out information that can Identify the user.

Most of the personal information that a user gives is when the user fills out online forms. That is where the majority of the personal information is given, so you really have to trust the site that they will not sell or give that information out.

The focus is on information that is broadcasted while online. Cookies and browser cache was not looked at as part of the experiment/test. That is another topic. A quick word on cookies, most of the cookies are downloaded to your browser’s cache are helpful to the user and when cookies are disabled the user will lose some of the advantages of cookies.

The page that was used for this video can be found at http://jafaust.com/whoami/ It is a good tool to use because it does all three finds the users IP address, the location of the Internet Provider as well as a whois to identify the Internet Service Provider and location of the Internet Service provider


Windows 10 System Commands

By André Faust

System commands are commands that can be run from the command prompt or in linux terminology Terminal. the Commands to be similar to DOS. DOS before the days of Windows was standalone operating which was initialized with command.com.

The early programs under DOS the visual interface was dependent on A.S.C.I.I. ( American Standard Code for Information Interchange) characters for the visual appearance. in figure 1 show is a screen shot of word Perfect 5.1. As can be seen the graphics are low quality compared to what we have today.

Wordperfect
Fig 1 WordPerect

In 1993 Microsoft deployed Windows 3.1 Fig 2. it was one of the GUI (Graphic User Interface),e however it was almost Identical to the Mac Classic. Apple launched a lawsuit against Microsoft which dragged on for years..

Windows3im
Fig 2. Microsoft Windows 3.1

DOS (Disk Operating System) was still then OS (Operating System) with Windows 3.1 running on top of it. 1995 was the release date for Windows 95, in 98 Windows 98 introduced into the market, in 99 Windows 98 SE deployed to the consumer market.

All three versions of Windows 9x sere still running on top of DOS the change came with windows millennium in 2000 where Microsoft change the architecture of the Operating system to incorporate DOS in the architecture. the result is that DOS and the windows operating system are the same.

While on the surface the commands may look like DOS, it isn’t. No longer the operating system separate form the windows kernel

Fig 3 is Windows 10 with the command prompt, will it may look like dos commands it isn’t

Windows-10-site
Fig 3. Windows 10 with the terminal window open

Below are all the command prompt commands, some of the commands will work with earlier Window versions, but not all.


System Commands Description
ASSOC
Displays or modifies file extension associations.
ATTRIB
Displays or changes file attributes.
BREAK
Sets or clears extended CTRL+C checking.
BCDEDIT Sets
properties in boot database to control boot loading.
CACLS
Displays or modifies access control lists (ACLs) of
files.
CALL
Calls one batch program from another.
CD
Displays the name of or changes the current directory.
CHCP
Displays or sets the active code page number.
CHDIR
Displays the name of or changes the current directory.
CHKDSK
Checks a disk and displays a status report.
CHKNTFS Displays
or modifies the checking of disk at boot time.
CLS
Clears the screen.
CMD
Starts a new instance of the Windows command interpreter.
COLOR
Sets the default console foreground and background
colors.
COMP
Compares the contents of two files or sets of files.
COMPACT Displays
or alters the compression of files on NTFS partitions.
CONVERT Converts
FAT volumes to NTFS. You
cannot convert the current
drive.
COPY
Copies one or more files to another location.
DATE
Displays or sets the date.
DEL
Deletes one or more files.
DIR
Displays a list of files and subdirectories in a
directory.
DISKPART Displays or
configures Disk Partition properties.
DOSKEY
Edits command lines, recalls Windows commands, and
creates macros.
DRIVERQUERY Displays current
device driver status and properties.
ECHO
Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of
environment changes in a batch file.
ERASE
Deletes one or more files.
EXIT
Quits the CMD.EXE program (command interpreter).
FC
Compares two files or sets of files, and displays the differences
between them.
FIND
Searches for a text string in a file or files.
FINDSTR Searches
for strings in files.
FOR
Runs a specified command for each file in a set of files.
FORMAT
Formats a disk for use with Windows.
FSUTIL
Displays or configures the file system properties.
FTYPE
Displays or modifies file types used in file extension associations.
GOTO
Directs the Windows command interpreter to a labeled line
in a batch program.
GPRESULT Displays Group Policy
information for machine or user.
GRAFTABL Enables Windows to
display an extended character set in graphics mode.
HELP
Provides Help information for Windows commands.
ICACLS
Display, modify, backup, or restore ACLs for files and
directories.
IF
Performs conditional processing in batch programs.
LABEL
Creates, changes, or deletes the volume label of a disk.
MD
Creates a directory.
MKDIR
Creates a directory.
MKLINK
Creates Symbolic Links and Hard Links
MODE
Configures a system device.
MORE
Displays output one screen at a time.
MOVE
Moves one or more files from one directory to another directory.
OPENFILES Displays files opened
by remote users for a file share.
PATH
Displays or sets a search path for executable files.
PAUSE
Suspends processing of a batch file and displays a
message.
POPD
Restores the previous value of the current directory
saved by PUSHD.
PRINT
Prints a text file.
PROMPT
Changes the Windows command prompt.
PUSHD
Saves the current directory then changes it.
RD
Removes a directory.
RECOVER Recovers
readable information from a bad or defective disk.
REM
Records comments (remarks) in batch files or CONFIG.SYS.
REN
Renames a file or files.
RENAME
Renames a file or files.
REPLACE Replaces
files.
RMDIR
Removes a directory.
ROBOCOPY Advanced utility to
copy files and directory trees
SET
Displays, sets, or removes Windows environment variables.
SETLOCAL Begins localization
of environment changes in a batch file.
SC
Displays or configures services (background processes).
SCHTASKS Schedules commands
and programs to run on a computer.
SHIFT
Shifts the position of replaceable parameters in batch
files.
SHUTDOWN Allows proper local
or remote shutdown of machine.
SORT
Sorts input.
START
Starts a separate window to run a specified program or
command.
SUBST
Associates a path with a drive letter.
SYSTEMINFO Displays machine
specific properties and configuration.
TASKLIST Displays all
currently running tasks including services.
TASKKILL Kill or stop a
running process or application.
TIME
Displays or sets the system time.
TITLE
Sets the window title for a CMD.EXE session.
TREE
Graphically displays the directory structure of a drive
or path
TYPE
Displays the contents of a text file.
VER
Displays the Windows version.
VERIFY
Tells Windows whether to verify that your files are
written correctly to
a disk.
VOL
Displays a disk volume label and serial number.
XCOPY
Copies files and directory trees.
WMIC Schedules commands
and programs to run on a computer.

Windows Run Commands

Reference  Guide to Windows 7 & 10

By André Faust

These commands have not been tested on Windows 8 or 8.1. Some of the commands may not be supported by Windows 8.x.

If you want to impress, use these commands at the command prompt, the run or search. The list does not include all the possible commands that are available.

Normally all most every program/application that is loaded on a windows machine can be executed from the Command Prompt (Terminal), the run or the search).

Besides impressing anyone, these commands are a real time saver.

Another benefit to knowing these command is that you can create batch files to automate tasks.

A batch file is: A batch file is a kind of script file in DOS, OS/2 and Windows. It consists of a series of commands to be executed by the command line interpreter, stored in a plain text file. A batch file may contain any command the interpreter accepts interactively and use constructs that enable conditional branching and looping within the batch file, such as “if”, “for”, “goto” and labels. The term “batch” is from batch processing, meaning “non-interactive execution”, though a batch file may not process a batch of multiple data. — Wikipedia

In the  coming weeks I’ll be preparing a series of short tutorial on some of the common windows commands and how to use them in a batch file.


Works on Win7,
Win10, command prompt and run prompt

Runs only from the Command window (terminal) Win7, Win10

Runs from the run prompt Win7 and Win10

Only Win10 command and Run

Only Win7 command and Run

Win7 run only

Win10 command (terminal) only

Wind10 command(terminal) search


Run Command Task
appwiz.cpl Access the Programs and Features window
azman Authorization
Manager
calc Calculator
certmgr Certificates
charmap Character Map
cleanmgr Disk Cleanup
cliconfg SQL Server Client Network Utility
cmd Command Prompt
colorcpl Color Management
comexp Component Services
compmgmt Computer Management
compmgmtlauncher Computer Management
computerdefaults Set Program Access and Computer Defaults
control Control Panel
credwiz Credential Backup and Restore Wizard
rundll32.exe keymgr.dll,
KRShowKeyMgr
Stored User Names and
Passwords
cttune ClearType Tuner
dccw Display Color Calibration
dcomcnfg Component Services
desk.cpl Access Screen Resolution page
devicepairingwizard Add a Device
devmgmt Device Manager
dfrgui Disk Defragmenter
dialer Phone Dialer
diskmgmt Disk Management
displayswitch Display Switch
dpapimig DPAPI Key
Migration Wizard
dpiscaling Display
dvdmaker* Windows DVD Maker
dxdiag DirectX Diagnostic Tool
eudcedit Private Character Editor
eventvwr Event Viewer
explorer Windows Explorer
firewall.cpl Access the Windows firewall
fsmgmt Shared Folders
fsquirt Bluetooth File Transfer
fxscover Fax Cover Page Editor
gettingstarted Getting Started
gpedit Local Group Policy Editor
hdwwiz Add Hardware Wizard
iexpress IExpress
Wizard
iscsicpl iSCSI Initiator Configuration TooliSCSI
Initiator Properties
inetmgr Internet
Information Services
(feature
has to be installed)
isoburn Windows Disc Image Burning Tool
lpksetup Language Pack Installer
lusrmgr Local Users and Groups
magnify Magnifier
main.cpl Access Mouse properties
mblctr Windows Mobility Center
mdsched Windows Memory Diagnostic Scheduler
Migwiz* Windows Easy Transfer
mip* Math Input Panel
mmc Microsoft Management Console
mobsync Sync Center
mrt Malicious Software Removal Tool
msconfig System Configuration
msdt Diagnostics
Troubleshooting Wizard
Microsoft
Support Diagnostic Tool
msinfo32 System
Information
mspaint Paint
msra Windows
Remote
Assistance
mstsc Remote
Desktop
Connection
napclcfg NAP
Client Configuration
narrator Narrator
ncpa.cpl Access
Network
Adapters
netplwiz Advanced
User
Accounts
notepad Notepad
odbcad32 ODBC
Data Source Administrator
odbcconf ODBC
Driver Configuration
optionalfeatures Windows
Features
osk On-Screen
Keyboard
perfmon Performance
Monitor
powercfg.cpl Access
Power
Option
powershell Windows
PowerShell
powershell_ise Windows
PowerShell
ISE
presentationsettings Presentation
Settings
printbrmui Printer
Migration
printmanagement Print
Management
printui Change
Printer
Settings,
Printer User Interface
psr Problem
Steps
Recorder
rasphone Remote
Access
Phonebook
recdisc Create
a System Repair Disc,
Windows Repair Disc
regedit Registry
Editor
rekeywiz Encrypting
File
System Wizard,
Manage Your File Encryption Certificates
resmon Resource
Monitor
rsop Resultant
Set
of Policy
rstrui System
Restore
sdclt Backup
and Restore
secpol Local
Security
Policy
services Services
shrpubw Create
A Shared Folder Wizard,
Share
Creation Wizard
sigverif File
Signature
Verification
slui Windows
Activation
Client
sndvol Volume
Mixer
snippingtool Snipping
Tool
soundrecorder Sound
Recorder
stikynot Sticky
Notes
sysdm.cpl Access
the System Properties
sysedit (This command doesn’t work in the 64-bit
version of Windows.)
System
Configuration
Editor
syskey Securing
the
Windows Account Database
systempropertiesadvanced System
Properties
(Advanced Tab)
systempropertiescomputername System
Properties
(Computer Name Tab)
systempropertiesdataexecutionprevention Change
Data Execution Prevention Settings,
Data
Execution Prevention
systempropertieshardware System
Properties
(Hardware Tab)
systempropertiesperformance Change
Computer
Performance Settings,
Performance Options
systempropertiesprotection System
Properties
(System Protection Tab)
systempropertiesremote System
Properties
(Remote Tab)
tabcal Digitizer
Calibration
Tool
tabtip* Tablet
PC Input Panel
taskmgr Task
Manager
taskschd Task
Scheduler
tpm Trusted
Platform
Module (TPM) Management
useraccountcontrolsettings User
Account
Control Settings
utilman Ease
of Access Center,
Utility Manager
verifier Driver
Verifier
Manager
wab* Windows
Contacts
wabmig* Import
to Windows Contacts
wbemtest WMI
Tester
wf Windows
Firewall
with Advanced Security
wfs Windows
Fax and Scan
wiaacmgr New
Scan Wizard,
Windows
Picture Acquisition Wizard
windowsanytimeupgraderesults Windows
Anytime
Upgrade Results
winhlp32 Windows
Help
and Support
winver About
Windows,
Version Reporter
Applet
wmimgmt WMI
Management
wmplayer Windows
Media
Player
write WordPad
wscript Windows
Script
Host
wscui.cpl Access
Windows
Action Center
wuapp Windows
Update
wusa Windows
Update
Standalone Installer
xpsrchvw XPS
Viewer
*these command are executed via run

Migrating from Windows to Ubuntu 14.04

By André Faust

The advantage of using an opens source operating like Ubuntu, Fedora and any other distributions is that it is free, unlike Windows which is costly depending on the version that you want. The other downside of Windows or Mac OS is and you haven’t created a recovery disk you may have to re-purchase your Windows or Mac.

At one time Computer vendors use to supply installation disks with the computer, so that in the event of a reinstallation you had all the necessary disk to get your computer up and running again, but that practice is now, for the most part, a thing of the past. Unfortunately, what some computer repair shops will do is install a pirated version to keep the cost of servicing the computer down.

If you don’t need to use some very specialised software and most of your computer activity is browsing the web, sending and receiving emails, using social media, or uploading pictures of your favourite cat, then a Linux distro such as Ubuntu or Fedora may be the way to go.

This tutorial migrating from Windows to Ubuntu is intended to those who wishes to make the switch to Ubuntu. The tutorial is divided into 10 sessions, each session talks about on aspect of the operating system.