Euask
A community for mutual assistance and knowledge sharing

Questions recently asked by selcinor

This computer suddenly freezed√ answeredREWARD $1
272 days ago, last commented by nickon
5
How to send big attachment on email√ answeredREWARD $1
278 days ago, last commented by Bine485
8
How to copy information√ answeredREWARD $1
288 days ago, last commented by ha14
6
Backup my computer√ answeredREWARD $1
289 days ago, last commented by JohnJm398964
4
Computer DVD rom not copy√ answeredREWARD $1
282 days ago, last commented by brendaniel
5
I want to change the AMD 2500 processor on motherboard,√ answeredREWARD $1
293 days ago, last commented by selcinor
5
Unable to play 3D computer on my laptop?√ answered5
305 days ago, last commented by dinakarrrao
5
How do I view the source code√ answeredREWARD $1
290 days ago, last commented by Aravi
9
Why euask limit to computer and internet√ answeredREWARD $1
299 days ago, last commented by selcinor
4
Please euask, bring back all the impacting program.√ answeredREWARD $1
284 days ago, last commented by brendaniel
5
Before launching my intranet.√ answeredREWARD $1
298 days ago, last commented by selcinor
5
This computer is too slow√ answeredREWARD $2
307 days ago, last commented by ChessKing
11
Can the euask introduce bitcoin as means of payment√ answeredREWARD $2
320 days ago, last commented by beardedman
7
Euask limit the view point to only computer & internet√ answered5
325 days ago, last commented by MrOwnage
7
What is subnet mask√ answeredREWARD $1
305 days ago, last commented by Flyshield
6
How can I avoid the rechaptcher on Internet√ answeredREWARD $1
316 days ago, last commented by ha14
2
Is it Internet cryptocurrency a new world money order?√ answered5
320 days ago, last commented by chakramed
1
I need a internet traffic√ answeredREWARD $1
326 days ago, last commented by torusinfotech
6
What browser can I install that will work without SSE2.√ answeredREWARD $2
332 days ago, last commented by Flyshield
5
Are you being kind with me√ answeredREWARD $1
327 days ago, last commented by AAA1992
1
>> More questions asked by selcinor

Answers recently replied by selcinor

replied the topic Tell me about Microsoft DOS lock and unlock command created by mazeal


Microsoft DOS lock and
unlock command

About lock and unlock
Availability
Lock and unlock syntax
Lock and unlock examples
About lock and unlock
Lock allows a user to lock a drive, enabling
direct disk access for an application.
Unlock allows a users to unlock a drive,
disabling direct disk access for an application
Availability
The lock command is an internal command
that is available in the below Microsoft
operating systems.
Windows 95
Windows 98
Lock and unlock syntax
LOCK [drive:]
drive: Specifies the
drive that needs
to be locked.
UNLOCK [drive:]
drive: Specifies the
drive that needs
to be unlocked.
Lock and unlock examples
lock c:
Lock the C: drive'
When typing the above command you will
receive the below prompt.
WARNING: The LOCK command enables direct
access by programs that can CORRUPT file
names and DESTROY disk data, resulting in
the loss of files on your disk.
Are you sure (Y/N)?
unlock c:
Unlock the C: drive
Note: If an errors is indicating that a
process cannot continue because the hard
drive is locked the unlock command cannot
resolve these error messages.

272 days ago
replied the topic I have a dead compter and I want to extract file from the dead hard drive created by Flyshield

Retrieving data from a hard drive that is installed in a non-working or dead computer can be accomplished a couple of ways. You can either attempt to retrieve the data yourself or take the computer to a computer shop for help.
Fix the dead computer
If you have not yet troubleshot the computer or do not know what is causing its problems we recommend first diagnosing the computer. In many cases, it may be possible to fix the dead computer which would allow you to recover its data easier.
Note: If you have troubleshot the computer and know it cannot be recovered or is too expensive to fix this section can be skipped.
Below is a list of pages that can help
troubleshoot a dead computer. If the computer is giving you an error message, you can also search our site for the error message to find recommendations and solutions to many error messages.
No power or computer does not turn on.
Computer powers on and then immediately turns off.
POST troubleshooting steps.
How to fix the Windows blue screen errors.
Listing of basic computer troubleshooting related pages.
Connect hard drive to another computer
You can attempt to retrieve the data yourself by connecting the hard drive from the dead computer to another functional computer. Assuming the hard drive is still functional, you can then access that hard drive through
My Computer or File Explorer to view and copy files from the hard drive. The following steps guide you through this process.
Note: If this is a laptop computer unless the hard drive is accessible through an access panel on the bottom of the laptop we suggest taking the computer to a repair shop.
1. Open the computer case of the dead computer and disconnect the hard drive from inside the computer.
2. Turn off the functional computer.
3. Open the case of the functional computer and connect the hard drive to the computer. You need to connect the IDE or SATA cable, depending on the type of hard drive, and the power cable.
Tip: You can also use an external hard drive enclosure kit to connect the hard drive to the computer externally, through a USB port.
3. Turn on the functional computer.
4. Once loaded into Windows, open My Computer or File Explorer and find the drive letter (e.g. D: or E:). Click or double-click on that drive to view the contents of the hard drive.
Once the hard drive has been successfully connected to another computer, and you can view the files, you can copy the files to the functional computer's hard drive, burn the files to a CD or DVD disc, or copy them to a
USB thumb drive .
If after connecting the hard drive to the functional computer, you are unable to view the contents of that hard drive, the drive may be bad or inaccessible. It may be necessary to take the hard drive to a computer shop for help in retrieving files from it.
Take the hard drive to a computer shop
If the hard drive is bad and unreadable by another computer, it is recommended you take the hard drive to a computer shop for help with retrieving the files. A computer shop may be able to extract data from the hard drive by means not available to you.
However, if they are unable to extract data from the hard drive, it may be necessary to send the hard drive to a company that specializes in retrieving data from failed hard drives. See our page on how to recover missing, lost, or deleted files
for a list of some companies that specialize in data retrieval.

274 days ago
replied the topic Did you know an event created by mazeal


March 15 - The 74th day of 2017.
There are 291 days left in the year.
March 15, 1953
64 years ago
Craig Reynolds is born.
March 15, 1985
32 years ago
The first Internet
www.domain symbolics.com
is registered by
Symbolics, a
Massachusetts
computer company.

276 days ago
replied the topic Did you know an event created by mazeal


March 15 - The 74th day of 2017.
There are 291 days left in the year.
March 15, 1953
64 years ago
Craig Reynolds is born.
March 15, 1985
32 years ago
The first Internet
www.domain symbolics.com
is registered by
Symbolics, a
Massachusetts
computer company.

276 days ago
replied the topic Des malwares pré-installés sur Android created by Flyshield

@flyshield
Le risque d'avoir un malware sur son smartphone commence désormais avant même de le déballer...
(CCM) — Jusqu'à aujourd'hui, on savait qu'un malware arrivait le plus souvent sur un smartphone lorsqu'on installait une application infectée. Mais la firme de cybersécurité Check Point a révélé (lien en anglais) à la suite d'une enquête qu'une trentaine de modèles de smartphones avaient été distribués avec des malwares pré-installés . Parmi les modèles, on retrouve plusieurs smartphones de Samsung , mais aussi de Lenovo ou LG.
Alertée par "une grande entreprise de télécommunications et une société de technologie multinationale" qui ont trouvé des malwares sur 36 smartphones leur appartenant, Check Point a constaté que les appareils avaient été livrés avec deux malwares installés avant la distribution. Si les constructeurs semblent hors de cause, l'ajout des malwares aurait été effectué à un moment du processus de fabrication.
Le premier malware identifié s'appelle Loki , il affiche des publicités et peut acquérir des privilèges administrateurs sur les appareils où il est installé. Le second, Slocker , est un ransomware qui utilise ToR pour masquer l'identité des pirates. Les deux malwares récupèrent et transmettre des informations personnelles. Dans six cas, les malwares étaient installés directement la ROM, ce qui nécessitait une réinstallation complète du système pour s'en débarrasser.
Interrogé par Ars Technica (lien en anglais), l'un des chercheurs de Check Point déclare ne pas savoir si ces deux compagnies avaient été spécifiquement ciblées, ou s'il s'agit d'une campagne d'infection plus large. Dans cette hypothèse, d'autres cas pourraient apparaître.
Voici la liste des appareils identifiés :
Galaxy Note 2
LG G4
Galaxy S7
Galaxy S4
Galaxy Note 4
Galaxy Note 5
Galaxy Note 8
Xiaomi Mi 4i
Galaxy A5
ZTE x500
Galaxy Note 3
Galaxy Note Edge
Galaxy Tab 'y
Galaxy Tab 2
Oppo N3
vivo X6 plus
Asus Zenfone 2
Lenovo S90
Oppo R7 plus
Xiaomi Redmi
Lenovo A850
(Note : Check Point avait initialement intégrés les Nexus 5 et 5X avant de les retirer.)
S'il n'y a sans doute pas d’inquiétudes réelles pour les particuliers, l'utilisation régulière d'une application comme
MalwareBytes est recommandée. Comme le souligne
CheckPoint , "cette découverte prouve que même si un utilisateur est très prudent, ne clique sur aucun lien malveillant ou ne télécharge aucune application douteuse, il peut tout de même être infecté par des logiciels malveillants sans même le savoir".

277 days ago
replied the topic CD Rewriter does not recognise media created by Cherishscope

Being unable to read recordable discs can be a difficult issue to resolve because of all the different possible causes of this problem. Below is a listing of several steps and recommendations that can be taken to help identify the cause of the issue or resolve this issue.
Drivers
Verify you have the latest drivers installed for the CD-R or recordable drive. There are numerous driver-related issues that may cause a CD-R drive or other recordable drive to stop reading a CD-R disc. If you are running Microsoft Windows, verify your drive is detected and listed in Device Manager with no conflicts or errors.
If Device Manager detects an error on the drive or if it has any other drives listed with errors, remove them and reboot the computer to let Windows re-initialize the drive.
If Windows shows no errors, the above steps did not resolve the issue, or you are running an operating system other than Windows, check with the drive manufacturer for updated drivers.

www.computerhope.com/issues/ch000666.htm

277 days ago
replied the topic How to copy information created by selcinor

What if flash drive corrupt @AAA19922

278 days ago
replied the topic Configurez lesordinateurs,répondez auxquestionsoucorrigezles problèmeset accédant created by Flyshield

You can construct a VPN in a myriad of ways, but constructing your VPN is just your first step. After you construct the VPN, you have to troubleshoot it.
A minimal VPN implementation has a RAS PPTP server connected to the Internet, a client connected to the Internet, and a PPTP connection between the server and the client. As long as ISP service or Internet connectivity is available, clients can connect to your server or LAN from anywhere in the world. However, most VPNs aren't as simple as a connected server and client. More often, the VPN server is on a routed LAN segment, often behind a firewall, and the client connection uses an ISP network, which also employs routers and firewalls.
You can build a PPTP server as a standalone server or as a domain controller in a couple of steps: You install RAS and the PPTP protocol and configure PPTP ports the same way you configure dial-up connections. Windows NT client setup is equally straightforward: You load PPTP and configure the PPTP connection to locate the PPTP server over the Internet. With such a simple setup, you might assume that the VPN connection will function properly the first time. However, administrators spend a fair amount of time troubleshooting before they successfully deploy a new VPN.
Troubleshooting a VPN, like troubleshooting any WAN connectivity problem, is complex because the data travels through many links before it arrives at its destination. For example, data typically flows from the client to an ISP's router, through a firewall, across the ISP's network, maybe across additional ISPs' networks, to the company's router, to a firewall or proxy server, and finally to the destination PPTP server.

m.windowsitpro.com/systems-management/15-tips-troubleshooting-vpn-connections

279 days ago
replied the topic Credit card fraud is everywhere created by mazeal

When sending confidential information over
the Internet, such as usernames, passwords,
or credit card numbers, only send it
securely. To verify this, look for a small lock
( ) in the bottom right corner of your
browser window or next to the address bar
(as shown below). If visible, this lock should
also be in the locked position and not
unlocked.
Internet Explorer secure address bar
We also suggest making sure the URL begins
with https, as shown above.
While the lock is in the locked position, data
is encrypted , which helps anyone from
understanding the data if it's intercepted.
When no lock is visible or in the unlocked
position, all information is plaintext and
could be read if intercepted. If a web page is
not secure, such as an online forum, use a
password you wouldn't use with protected
sites, such as your online banking website.
Use a safe password
Websites that store confidential data, such as
an online bank site, need to use strong
passwords . Also, it is highly recommended
that you use a different password for each
website that requires a login. If you need
help remembering your passwords, consider
using a password manager .
When available always enable two-
factor authentication
Two-factor authentication adds additional
protection by requiring an additional step in
verifying a login. Typically with two-factor
authentication, after verifying your
password, if the service does not recognize
your computer, it sends your phone a text
message with a verification code. If someone
had your password but did not have your
phone, even with a valid password, they
cannot access your account.
Tip: Two-factor authentication should at the
very least be enabled on your e-mail
account. Most account passwords can be
reset using the forgot password feature,
which sends a new password or link to reset
the password to the e-mail address on file. If
anyone has access to your e-mail account,
they could get the new password for your
account.

279 days ago
replied the topic I want to change the AMD 2500 processor on motherboard, created by selcinor

Thank euask and wisecleaner company

280 days ago
replied the topic Why DDos on some website created by Flyshield

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
$




www.digitalattackmap.com/understanding-ddos/

280 days ago
replied the topic Privacy issues in red how can I get rid of them? created by Bizzle

HTTPS, or Hypertext Transport Protocol Secure, is a variation on the basic protocol used to serve Web pages over the Internet. HTTPS verifies the security certification of the page you're visiting to prevent malicious redirection and encrypts the communication between you and the server. You may not be able to establish an HTTPS connection under certain circumstances. When you see "https" crossed out in your browser's address bar, you're not on a secure connection and should consider whether you need one for the website you're using.

HTTPS and Security Certificates
A security certificate is an encryption key and is used to encrypt and decrypt data transmissions between a Web server and a Web browser, using the secure sockets layer of the TCP/IP protocol. It's used to encrypt password transmissions and any transmitted data coming back. When website administrators set up certain types of websites, such as e-commerce sites, they have to purchase and register a security certificate; these certificates are signed and dated and need to be renewed periodically. Although most browsers now handle the handshaking for security certificates automatically, you may sometimes be asked to authenticate a security certificate, or be warned by your browser that the security certificate is out of date or can't be verified.
Root Cause
When HTTPS has a red slash through it in your browser's toolbar, this means that one of two things has happened. The first is that your browser and the Web server don't have matching security certificate authentications. The second, and more common, is that a website designer has created a page that calls for both secure and non-secure elements to display on the same page, at which point HTTPS is listed as disabled.
Fixing the Problem As a Website Developer
The easiest way to ensure that HTTPS is used for all elements of your website is to make sure that all assets (such as images and CSS stylesheets) are locally hosted and use network path URLs to call them. This is very similar to using a relative URL, except it starts with two slashes. The network path URL causes any assets called by it to use the HTTP type called on by the browser.
As a Web Surfer
When you see the HTTPS part of a URL crossed out with a red line, the likeliest cause of the problem is with the website, not your browser. On the off chance that it is something cached in your browser, use your browser's settings to clear the cookies and cached information and reload the site. You have another option available as well -- install the HTTPS Everywhere plugin for your browser. It's currently available from the Electronic Frontier Foundation and works in Chrome and Firefox, and forces HTTPS connections for every website you visit and every element called by that website – even pulling images or plugins hosted from other domains.

281 days ago
replied the topic Random Windows and Software Issues created by Flyshield

Thank you, so much

281 days ago
replied the topic Random Windows and Software Issues created by Flyshield

Many computer manufacturers will install a trial version of Microsoft Officeon their computers that let you use it without restrictions for a set period of time,usually 60 days. After that if you don't buy it and put in a valid product key it will either stop working or only work with limited capabilities. If you don't want to buy the software then you will need to find another way to work with your Word and PowerPoint files etc. Microsoft offersfree viewersfor their software that will let you view Word or PowerPoint files etc. but not make changes to them.There are other free office software products that will let you open your Microsoft Office files such asOpenOfficeandAbiWord.Your other issue sounds like it's with Windows Update which is used to keep your computer up to date with patches for Windows. You can configureWindows Updateso it downloads and installs updates automatically or manually as well as pick the time when it does this.Windows Vista should not be restarting your computer automatically but should rather be reminding you that it needs to berebooted over and over until you do it. You can try thisgroup policy fixto see if it prevents Windows from automatically rebooting your computer after updates.As for speeding up your computer there are a few maintenance methods you can try outlinedhere.

281 days ago
replied the topic Why euask limit to computer and internet created by selcinor

that my way of idea, expect same thing from you

282 days ago
replied the topic PC so slow, I'll be desesperate created by Carla

What are your system specifications? Make and model number of the computer?
Please understand that Windows 10 is in the testing phase and it is NOT a full operating system. There are bound to be bugs, performance issues, crashes, etc. These builds are for programmers and testers.
I recommend these:
Windows 10, Office 2016, Adobe CC, MS Edge
ESET, Dell

283 days ago
replied the topic Mo fe mo boya enikan wa to gbo ede mi ninu euask yi created by mazeal

Mo gbo ede re ki fe ki nse niranlowo, what did you want tell me, if I can help you.

283 days ago
replied the topic 'computer science' qui est un domaine. created by Flyshield

La traduction de computer science par
informatique est usuelle mais inexacte.
Il faudrait la traduire par science des
ordinateurs , c'est-à-dire la maîtrise
des techniques et le développement
des matériels utilisés pour
l'enregistrement, le calcul, le transfert
et la conservation des données.
Certes, la notion d' informatique
française englobe la science de ses
outils, mais elle renvoie à l'utilisation
de ces derniers et aux données qu'ils
manipulent :
transcodage des signaux,
calculs mathématiques et
scientifques,
analyses et traitements
sémantiques,
bases de données,
interfaces et écrans
automates et assistance
technique
langages machines et humains
messages et interconnexions
sont les grands domaines qui concerne
l' informatique, avec bien sûr Internet
et ses domaines tel le web, le cloud...

283 days ago
replied the topic Can baidu hotspot work in desktop pc ? created by sk24624

1. If your USB 3.0 system is hitting a device resource limit, some systems will allow disabling the USB 3.0 (XHCI) controller and fall back to the USB 2.0 (ECHI) controller on the system. This workaround is known to work when the system BIOS offers it .
2. Otherwise, try using a USB 2.0 hub for connecting additional devices that don’t require USB 3.0 speeds, to potentially halve the number of endpoints consumed, at least for the hub portion.
3. If your scenario calls for very large numbers of USB devices (like USB thin clients or USB camera arrays), then if at all possible restrict yourself to a USB 2.0-only host, even if that has to be an older PC.
4. Reach out to Microsoft and Intel about your experiences through the links above or directly. Also feel free to comment below, the more people we have talking about these issues the greater chance we’ll have to understand it.
And to provide some idea of how many endpoints are consumed by various devices, we ran through our own set of Plugable USB devices to return the number of endpoints each device exposes (and consumes),

288 days ago
replied the topic Before launching my intranet. created by selcinor

I favour you guys but you are not, that bad

290 days ago
>> More answers replied by selcinor
Get free dollars by installing euask App.