Mac vs Pc

Friday, February 23, 2007

Samsung 713N LCD Repair with SE7889-Lf ic Problem

This Samsung 713N LCD monitor came in with no display symptom and no power. In other words, once you switched ‘on’ you could see the power LED lights up (no display) and then for couples of seconds the power led light goes off. When I removed the signal cable and switched ‘on’, now I could see the check signal cable OSD appeared at the screen. This proved that the inverter board, lamp and power supply is working. Again, I plugged in the signal cable, the display and power LED light went off.

After opened up the cover, I check the on/off signal from the mainboard to the inverter board. With signal cable in, there was no on/off signal to the inverter board but when the signal cable was disconnected, you could see clearly from your meter there is a on/off signal going into the inverter board thus the display appeared with the check signal OSD present at the display. From this test, it is very obvious is the main board problem.

To confirm whether is the main board problem, you have to use a similar Samsung 713N model to confirm it. True enough, after substitution with a known good board, the monitor is okay. So now we can confirm is the mainboard faulty. The real problem now is at where we can find this board or the suspected part number SE7889-LF ic for replacement? Checking the components surrounding the SE7889 ic yield no result.

As mentioned in previous articles, to troubleshoot LCD monitor is easy but to get the part is a little bit difficult. Samsung don’t sell you the mainboard, if you send to them for repair, they will charge a very high price which is not worth to repair.

As I’m writing this article, I still could not locate the suspected ic, but if I found it I will let you all know. Samsung 510bn lcd monitor also have this kind of problem which is the mainboard spoilt.

Although in this article I could not pinpoint to you the exact faulty component, at least you would use my procedure to confirm which board is giving problem. In other words, whether you are troubleshooting the Samsung 713N LCD monitor or other brand, the testing method is the same.

Jestine Yong is a electronic repairer and a writer, if you want more lcd monitor repair information, please visit his electronic repair website now!

Article Source: http://EzineArticles.com/?expert=Jestine_Yong


Malaysia Online : Related Link
samsung 510bn lcd power supply repair

Why Buy Substandard Cheap Computer Hardware When you Can Get Quality Hardware at Wholesale?

Whether it’s for your own computer repair business or just a hobby, using low grade cheap computer hardware is a false economy and never a good idea.
Anyone who’s learnt this lesson the hard way will be able to tell you this – when it comes to the smooth running of either your or your client’s PC don’t take chances, quality is of paramount importance for optimal performance and long term financial sense.

Spending a bit extra for high quality equipment is money very well spent – but what if you could pay wholesale rates – even if you don’t have a business?

Yes there is another way of acquiring cheap computer hardware that is not bottom of the range bargain bucket junk that will only make your machine run like a dog and need replacing a few months down the line.

With the popularity of ebay selling as a means of making extra cash - and for some becoming a full time occupation – the emergence of dropshipping directories has made a whole host of wholesale products available to the end consumer.

Dropshipping however does not come without its own pitfalls and red flags. Just do an internet search on the term “dropship directory” and you’ll see lots of results with the word “scam” involved.

It seems there is a bit of a jungle out there in the dropshipping world so it’s best to do a bit of research before handing over any cold hard cash as they charge either a one time joining fee or a monthly or yearly subscription.

Some charge more than others, some have different ranges or products, some lines of products require you have a registered business some don’t – it’s all a bit of a grey area although something about the concept has got to be doing something right because dropshipping – particularly for use in conjunction with ebay selling – is huge.

An alternative is to register a business and get in touch with your local hardware wholesalers. This isn’t always as easy as you think if you don’t have the connections but can be done.

At least doing it this way you know you’re getting high quality cheap computer hardware at discounted prices. Spending a bit of time finding and establishing a relationship with your local wholesalers can turn out to be a safer bet than taking your chances with the wild west of dropshipping.

Either way there is an alternative to paying top dollar for high grade equipment and you definitely don’t want to go bargain basement.

With a little time, research and a bit of investment can ensure you enjoy the benefits of wholesale priced, high quality cheap computer hardware.

Peter Webber is the owner of a site that covers how to quickly source cheap computer hardware as well as many other topics related to starting a computer business or finding an IT job.

Article Source: http://EzineArticles.com/?expert=Peter_Webber

Fight Your Registry Attacks - Fix Your Computer Heart

Registry is a place where the applications interact with the operating system. In other words, registry is a big cyberspace within a local computer where all the bit and pieces of an application/operating system are lined with the root known as ‘Kernel’ to generate compatibility. Guess if the registry gets infected by malicious software’s or spyware programs, your computer will obey the orders as lined up in the registry which can impact computer performance and user’s privacy.

How do you clean you registry from infected entries? Do you think a user can look over the registry and find out those entries from thousands of others and delete them?

Well! A good thought can lead to an invention and we have a very useful tool called Registry Mechanic which checks the registry for unwanted entries and cleans them or repairs the problems is few simple clicks. A tool you will get used to when running it on weekly basis throws up malicious entries to your surprise which were unknowingly installed and found on your computer. Once you have downloaded the software, it can be installed in very simple steps. The application interface is very easy to understand and with options like ‘Scan Your Registry’ you can allow the software to check the system for any shared or missing or bad registry entries.

At this step the software is basically checking the registry for any shared or violated operating system or other application links as it scans through

· various trusted files extensions,
· Software location with missing or incorrect links,
· Registry health and integrity,
· Windows Fonts which can also be an area of target,
· Help and resource files can be missing or corrupt in the registry,
· Shared DLLs,
· Startup programs, entries of those application which were un-installed from Control Panel > Add/Remove Programs,
· Virtual device entries,
· Temp files /shortcuts, files extensions followed by
· Deep registry scan going through every registry entry.

Performing registry cleaning every week would make your computer run faster with the windows operating system and other windows compatible applications. The only purpose of Registry Mechanic is to analyze the registry using a scripted algorithm for broken links and other broken or missing references of any other 3rd party application etc.

Why would there be broken links? There is a user tendency to test software’s and utilities available on the internet and un-install them if they are useless. Not every un-install is completely removed from your system and leaves unwanted traces or marks in the form of broken or missing registry link. Every time your computer is started, it would scan through every registry entry to link with the applications installed on the local computer. Now if the links are broken, the computer, as expected, will wait for some time before moving ahead with other links causing a delay and making your computer slower and slower day-by-day.

Registry Mechanic also gives a cool option of backing up registry before deleting unwanted entries just in case something goes wrong. You can then trigger the restore of the older registry version, getting the things back to normal. Also a ‘Compact Registry’ and ‘Repair’ option allows the Registry Mechanic to create a System Restore point, again for the same reason ‘if something goes wrong’.

Therefore, we now understand why software like Registry Mechanic is important and must stay in every user’s collections of cool system utilities.

Ted Peterson writes for http://www.coredownload.com where you can found a large variety of registry utilities like Registry Mechanic and others. You can download them for free.

Article Source: http://EzineArticles.com/?expert=Ted_Peterson

Malaysia Online : Related Link
specific registry cleaner concerns

Excel Password Types

Have you ever wondered that there can be types of passwords just like types of files? Is it possible? Yes it is. MS Excel is equipped with five types of password locking with which you can protect your worksheets. This means you can secure your MS Excel worksheet with 5 different password security measures and prevent unauthorized access to the worksheet.

This article targets to those users who need to secure excel worksheets for various reasons. Beneficial for people in finance field as MS Excel is widely used tool by accountants, charted accountants, brokers, stenos and every other individual who need to store and display data in a hierarchical order.

The Excel password types are:

1. Password to open the Worksheet
2. Password for Modifications
3. VBA Modules
4. Worksheet Password
5. Workbook Password

1.) Password to open the Worksheet:

You can assign passwords to the excel worksheets and prevent any individual from accessing it. To assign password to your .xls file:

Open the .xls document, which you want to password protect.
• Select the Save As option from the File menu.
• Click the Tools tab on the top of the Save As window and select the General Options… option.
• The Save Options window will be displayed, where you can enter the desired password in the Password to open text box.

If any unauthorized individual tries to open the worksheet, Microsoft Excel will ask to enter the password. If the password is incorrect the sheet will not open.

2.) Password for Modifications:

This option works similarly as the first one. As the password was assigned to open the excel worksheet, password to modify the excel worksheet can also be assigned in the similar way.

Open the .xls document, which you want to password protect.
• Select the Save As option from the File menu.
• Click the Tools tab on the top of the Save As window and select the General Options… option.
• The Save Options window will be displayed, where you can enter the desired password in the Password to modify text box.

Only authorized individuals who know the password can modify the document otherwise he can only view the read-only copy of the password protected worksheet. This kind of protection helps to protect the document getting modified by other people, thus saving the original data which you had saved before leaving your desk.

3.) VBA Modules:

The excel worksheet can contain VBA modules with added macros in the file. This Visual Basic for Application module can also be password protected. To password protect, perform the following:

• Select the VBA module and right-click the mouse button.
• Select the VBA Project Properties… option.
• Click the Protection tab.
• In this window, check the Lock project for viewing option and assign password in the Password to view project properties dialogue box.
• Click OK.

The VBA module is now protected with password and secure from any unauthorized use.

4.) Worksheet Password:

There can be several worksheets in a single .xls file like Sheet 1, Sheet 2 and so on. You can password protect them too. To assign password to any current worksheet perform the following:

• Click the Tools menu
• Select the Protection > Protect Sheet option. The Protect Sheet window will be displayed.
• Select amongst the number of options for your worksheet. (These options depend on the working version of MS Excel; I am working in MS Excel 2003)
• After selecting the options you can assign password to the worksheet.

5.) Workbook Password:

Like Worksheets, excel workbooks can also be protected in the similar way of protecting worksheets.

• Click the Tools menu
• Select the Protection > Protect Workbook option. The Protect Workbook window will be displayed.
• Select both or appropriate option from Structure and Windows and assign the password.

You can also try this:

• Click the Tools menu.
• Select the Protection > Protect and Share Workbook… option. The Protect Shared Workbook window will be displayed. This enables you to share the workbook with track changes.
• Check the Sharing with track changes option. This would activate the Password text box. • Assign password in the Password text box.

This kind of password protection helps at the time of sharing the excel worksheets. This would restrict other user from making changes in the document and retains the track changes in the sheet.

As there are 5 different options to protect the excel worksheet with passwords, there can be times when you tend to forget or lose the assigned password or the excel document can get corrupt due to virus attacks, accidental deletions, power outages etc. There are many excel password recovery tools to recover the lost / forgotten passwords. These software tools can easily restore the forgotten passwords of excel files. But if in case the MS Excel file gets corrupt, you can try the FREE demo version of Kernel Recovery for Excel, a corrupt excel file recovery software which easily recovers and repairs the damaged worksheets and extracts cell data, formulas, charts, images, hyperlinks etc. If the Excel repair software displays your lost data then you can purchase Full version of the excel file repair software.


Article Source: http://EzineArticles.com/?expert=Nehaa_Gupta

The Laptop LCD Module Disassembly Guide

This guide will provide help for those who want to disassemble their laptop LCD.
Be sure that the problem you face is a hardware problem, and also your laptop should not be under warranty, because laptop disassembly void warranty.

Before search on the net for service manuals some are free and other cost around 6$ or less, in the case that you are not finding your model download some free service manual from different brands and read them many steps are the same in laptop disassembly and also some pictures can be useful.

Now prepare a clean working area , and if you want a pen and a paper to note particular step. To disassemble the LCD, you need the tools below:

Wrist ground strap and conductive mat for preventing electrostatic discharge Small Phillips screw driver
Flat head screw driver
Hexagonal driver
Tweezers


Removing the LCD Module from the Main Unit :

This example is with an Acer aspire 5100, you have to remove the middle cover from the edge of the middle cover and carefully detach the middle cover, next disconnect the LCD cable and any other cable that you can see, release any screws holding the LCD module on the bottom side of the main unit, release any other screws securing the LCD hinges on the main unit, then detach the LCD module from the main unit.

Disassembling the LCD Module :

Remove the four screw cushions on the LCD bezel then release the four screws holding the LCD bezel. Carefully detach the LCD bezel from the LCD module. Tear off the tapes holding the LVDS cable and the LCD cable then release the two screws securing the inverter board.

After that Carefully disconnect the LVDS cable. Carefully disconnect the LCD cable then remove the inverter board. Release the two screws securing the LCD panel.

Then detach the LCD panel. Release the eight screws holding the left and right LCD brackets and remove the LCD brackets. Finally tear off the tape holding the LCD cable. Carefully pull and disconnect the LCD cable.

Never forget that reading some service manuals before can be really helpful, you can find some free service manuals at laptop support.

I hope that this will give some help.

Didier Pradel is the webmaster of laptop support where you can find many useful informations, and help for your lovely laptop.

Article Source: http://EzineArticles.com/?expert=Didier_Pradel

Malaysia Online : Related Link
laptop disassembly guide

The Shocking Truth About Wireless Networks

A couple of months ago I purchased my first wireless enabled laptop. As I switched it on and began setting it up I was shocked when I realized that my laptop had found and connected to my neighbours wireless modem and I was able to freely browse the internet and download data using his modem and internet connection. If I were a hacker it would not be difficult for me to hack in to his computer using this connection to his network.

The Shocking Truth
The shocking truth is that many wireless network users out there, and you could be one of them, are not securing their wireless modems at all. This is further confirmed by a television program I saw in which a television presenter drove down a street until he found a signal from an unsecured wireless router being used in a nearby house. He then hacked into this mans computer and recorded his entire Internet activity including websites visited, items purchase, holidays booked, passwords and even credit card details. When the unsuspecting computer user was confronted with the information gathered about him he was understandably upset. He had been sold the modem with security software by a high street store that had told him that this would provide adequate security. They were wrong!

How to Secure Your Wireless Network
Although every wireless router is different and will have its own instructions these can sometimes be hard to follow, the steps below will help to guide you through the process.

Set Up Your Modem Password
Every router can be set-up by using your browser to access it by typing in its IP address. This IP address can be found in your router instructions and will be something like this:

http://192.168.1.1

When you have input this address into your browser and pressed enter you will be taken to a login page where you must input the user name password. By default the router will have a generic password which you will also find in your instructions. Login using the default details and then navigate to the ‘change password’ page where you can change it to your own secret password.

If you do not do this, a hacker could gain access using the generic password. After any changes have been made you must apply the changes and restart your router. Your instructions will tell you how to do this.

2. Configure Your Router for Data Encryption
Login to your router as outlined above and browse to the security page where you can set-up your security type and input a cipher key. Most of the settings in these pages should be left as they are if you don’t know what you are doing. You can usually choose between different types of security, such as WEP, 802.1 or WPA. There are different opinions as to, which is best, I personally use WEP. If there is an ‘enable WEP wireless security’ check box or similar you must check it. You will then need to make up a cipher key using hexadecimal digits, which consist of random numbers from 1-9 and letters from A-F. I recommend a minimum of 128 bit encryption which will need a 26 digit key. If you wish to use 256 bit encryption your key will have to be 58 digits long. Input this key into the form provided and make a note of it for setting up your other computers. As stated above you will now need to apply any changes made and restart your router.

3. Configure Your Wireless Enabled Computers
After setting up the above encryption on your wireless network you will then need to input your new cipher key into each wireless computer that you want to connect to the network. Your other wireless enabled computers will search for any wireless network it can find and then ask if you would like to connect. If you attempt to connect to a newly set-up encrypted network it will ask you for the cipher key. Input the cipher key you made up in the previous section and click ‘connect‘. When doing this for the first time it may take a while for the new configuration to take effect so be patient before trying to use it. The next time you boot up your wireless computer it will connect automatically.

4. Install Internet Security Software
Whether you have a wireless network or not, it is essential nowadays to protect you computer by using good quality internet securities software. Purchasing this from a reputable security company is recommended to ensure that your software is kept up to date with the most recent virus signatures. If you are not up to date, an unrecognised virus will not be stopped by the software. It is not advisable to use a free anti-virus service as these do not provide adequate protection and are a false economy. Security software will also detect and block any attempt to hack into your computer via the internet or local network. Recommended internet security software companies are - Norton, McAfee and others.

Conclusion
In short then, following the above procedures will make it very difficult for the would be hacker to use your wireless network to gain access to your computer. I also strongly advise you to read your wireless router manual thoroughly.

Article Source: http://EzineArticles.com/?expert=Drew_Pilton

Malaysia Online : Related Link
simple guide to wireless networking

KeyBoard - TypeMatrix 2030

Link Exchange - Increase your rankings with easy to use reciprocal links software.