Are you sure that the correct default printer is selected in Thunderbird? Sometimes it happens that a pdf printer, windows xps printer is selected...
The only purpose of this tool is to easily get an overview, if a computer isn't missing any important Windows Security updates, or vulnerable...
Hello Mandy123, What you have to do is going to the junk folder, right click on the e-mail, now you will see Eset Smart Security, select not...
McAfee Stinger Eset Rogue Application Remover You may nog forget that Hitman Pro only scans for executable files: .exe, .scr, .sys, .dll,...
Most companies uses webproxy to filter and monitor the websites that you visit, some part you can see as parental control that you will find in...
If you keep using the ac adapter and the battery is still inside. The only thing that will happen, is decreasing the lifetime of a battery....
So even when you are near the wireless router, it still wasn't possible to make an internet connection. You could disable DHCP on the wireless...
You are probably right, there are almost 9 months passed. Sometimes you can reset the battery management in Windows. But the chance is indeed very...
I hope that you did connect a network cable of your ISP modem to the WAN/internet port of your wireless router. This should be done to be able to...
Unplug the power cable of your laptop and remove also the battery. Hold the power button pressed at least 10 seconds. Now insert the battery...
Hello siljaline, What you suggested is good. But you will lose all malicious websites that you manually added or when you use a modified hosts...
Hello siljaline, The OP posted that other security software didn't find anything. I quote : You also suggested to restore the HOSTS file....
Hello fanj, Sorry, that I wasn't very clear but the reason why I mentioned it, is because of the detection of the QHost detection. By...
Hello artinusa, You should open HOSTS with notepad. You should only find site entries with 127.0.0.1 followed by a website address. All other...
If I understand correctly the test methodology :all components of an infection should be deleted before a security product succeed in curing an...
Hello Sacles, No problem. Regards, Niels
I use Google Chrome as my web browser, because of the quick loading of webpages, build in sand-box, synchronization options with other google...
I always pay for Internet Security software. The main reason why I choose for Internet Security software is that all components/modules are...
Yes, for doing online banking. Where I live there is a scam where people receive first a phising mail that looks like it's coming from a bank,...
Hello Marcos, I had also the issue with the large download failed to download. But I didn't cleared my update cache or enabled pre-release...
Hello tomdy2k, You need to train a spam filter, only then it will be effective. Just mark some mails as spam, and add senders to a black list....
Hello Sacles, You can delete the remaining registry keys except/ excluding the first key. Regards, Niels
Hello Sacles, Just to be sure, after you removed that driver, did you also create a new snapshot. If not it's absolutely normal that the driver...
Hello Sacles, Did you also selected that hidden devices are being shown in device manager? The hidden drivers are displayed under the...
Hello NYCaribou, If it had something to do with a firewall, another error message will be displayed. You have witnissed it yourself, that you...
Separate names with a comma.