Edward Henheffer's Blog: Computers R4U2
April 3, 2016
COMPUTERS R4U2: MISSION STATEMENT
#1) HELP PEOPLE WITH COMPUTER USAGE PROBLEMS
#2) Save people expensive computer repair costs
#3) Add a bit of income to my pension
I know for a fact, my two books can help every computer user!
But, I need to get the message out there.
I cannot afford expensive advertising.
You can help immensely by sharing this message with all your
contacts, asking them to do the same, ad infinitum.
Thank you in advance. Happy Computering!
http://www.amazon.com/dp/B01D6GQDMI?r...
https://www.facebook.com/computersr4u2
http://computersr4u2.com/index.html
#2) Save people expensive computer repair costs
#3) Add a bit of income to my pension
I know for a fact, my two books can help every computer user!
But, I need to get the message out there.
I cannot afford expensive advertising.
You can help immensely by sharing this message with all your
contacts, asking them to do the same, ad infinitum.
Thank you in advance. Happy Computering!
http://www.amazon.com/dp/B01D6GQDMI?r...
https://www.facebook.com/computersr4u2
http://computersr4u2.com/index.html
Published on April 03, 2016 08:53
March 19, 2016
Book2: The Intermediate User
PUBLISHING THIS WEEKEND
My Book 2, teaches an eleven step, pictorially assisted, “seriously”
infected computer virus removal procedure successfully used
thousands of times by a renowned Canadian computer repair shop.
The book also walks you through the Windows10 upgrade along
with proper set up and familiarization. I cover browser resetting for
your optimum net surfing experience as well as critical data back-up
procedures to get that data you may have never known you should back up.
My Book 2, teaches an eleven step, pictorially assisted, “seriously”
infected computer virus removal procedure successfully used
thousands of times by a renowned Canadian computer repair shop.
The book also walks you through the Windows10 upgrade along
with proper set up and familiarization. I cover browser resetting for
your optimum net surfing experience as well as critical data back-up
procedures to get that data you may have never known you should back up.
Published on March 19, 2016 10:45
March 6, 2016
Book2: The Intermediate User
Final edit finished today. Publish the end of March. Here is the Table of Contents
- Introduction
- Must Read Notes
- Section 1: Upgrading to Windows 10
Part 1: The Upgrade
Part 2: Some Familiarization
- Section 2: Safe Mode Booting and Power Reset
Part 1: Windows 7
Part 2: Windows 8 and 10
Part 3: Power Reset
- Section 3: Cleaning a seriously infected computer
Steps: 1 through 11
- Section 4: Resetting Browsers
Part 1: Internet Explorer
Part 2: Mozilla FireFox
Part 3: Google Chrome
- Section 5: Backing up critical data not found in your User folder
Part 1: On-board Email Programs
Part 2: On-line Email Programs
Part 3: Accounting and Data Base Programs
-Section 6: Dealing with a corrupt Windows Operating System.
Part 1: System File Repair
Part 2: Check Disk
- Introduction
- Must Read Notes
- Section 1: Upgrading to Windows 10
Part 1: The Upgrade
Part 2: Some Familiarization
- Section 2: Safe Mode Booting and Power Reset
Part 1: Windows 7
Part 2: Windows 8 and 10
Part 3: Power Reset
- Section 3: Cleaning a seriously infected computer
Steps: 1 through 11
- Section 4: Resetting Browsers
Part 1: Internet Explorer
Part 2: Mozilla FireFox
Part 3: Google Chrome
- Section 5: Backing up critical data not found in your User folder
Part 1: On-board Email Programs
Part 2: On-line Email Programs
Part 3: Accounting and Data Base Programs
-Section 6: Dealing with a corrupt Windows Operating System.
Part 1: System File Repair
Part 2: Check Disk
Published on March 06, 2016 19:11
February 19, 2016
Book 2
Section 4: Critical Data Back-ups
Did you know that if you have a hard-drive failure your e-mail contacts are lost forever if you are using an on-board email program such as Microsoft Outlook or Windows Live Mail?
Your e-mails are gone as well, unless you have a back-up or your computer tech is very astute at retrieving data from a failed HDD. He cannot however, recover your contacts!
I am going to guide you through a procedure to back-up this data before you run into a problem. I will walk you through those two most commonly used programs and two versions of Outlook. Then, I will deal with “Online” email because there are some pitfalls here as well.
Following the email, I will cover some random programs, as examples, for backing up data that is only found in locations most users are not familiar with. You will then be able to apply this to your own programs.
Did you know that if you have a hard-drive failure your e-mail contacts are lost forever if you are using an on-board email program such as Microsoft Outlook or Windows Live Mail?
Your e-mails are gone as well, unless you have a back-up or your computer tech is very astute at retrieving data from a failed HDD. He cannot however, recover your contacts!
I am going to guide you through a procedure to back-up this data before you run into a problem. I will walk you through those two most commonly used programs and two versions of Outlook. Then, I will deal with “Online” email because there are some pitfalls here as well.
Following the email, I will cover some random programs, as examples, for backing up data that is only found in locations most users are not familiar with. You will then be able to apply this to your own programs.
Published on February 19, 2016 16:03
February 14, 2016
Book 2
Section 3: Cleaning a Seriously Infected Computer
You know you are infected!? The computer just isn’t working right.
Some Common Symptoms:
- Pop ups you do not recognize
- browser redirects to web pages you didn’t ask for
- running very slowly
- you get a phone call with someone saying you are infected
- your e-mail doesn’t work right
- programs running that you have no idea where they came from
-browsers or programs stop responding
- open pages go grey
- locks up, continuously spinning wheel or egg timer beside your mouse pointer.
- ransom pop-ups
- won’t update
Anyway, you are infected, so let’s get these things cleaned up! In Book 1 we downloaded and installed some clean-up software. We will be starting with these. If you do not have the software you can download it and install it as we go but I will not be giving detailed steps as to how to do that, it is in Book 1 .
It is worth noting here:
1) If your computer is painfully slow, you may be better off to start these procedures in “Safe Mode” with networking.
2) If you cannot connect to the internet and you have access to a working machine, you can download the software install “.exe” files, put them on a stick and then run them from the infected machine. The software won’t update, but it will get you started in the right direction.
3) If you start your clean up in safe mode, you must redo it all again once you are in normal mode.
4) Infections can migrate!!! It is sometimes necessary to run the software more than once if you feel you are still infected with something
You know you are infected!? The computer just isn’t working right.
Some Common Symptoms:
- Pop ups you do not recognize
- browser redirects to web pages you didn’t ask for
- running very slowly
- you get a phone call with someone saying you are infected
- your e-mail doesn’t work right
- programs running that you have no idea where they came from
-browsers or programs stop responding
- open pages go grey
- locks up, continuously spinning wheel or egg timer beside your mouse pointer.
- ransom pop-ups
- won’t update
Anyway, you are infected, so let’s get these things cleaned up! In Book 1 we downloaded and installed some clean-up software. We will be starting with these. If you do not have the software you can download it and install it as we go but I will not be giving detailed steps as to how to do that, it is in Book 1 .
It is worth noting here:
1) If your computer is painfully slow, you may be better off to start these procedures in “Safe Mode” with networking.
2) If you cannot connect to the internet and you have access to a working machine, you can download the software install “.exe” files, put them on a stick and then run them from the infected machine. The software won’t update, but it will get you started in the right direction.
3) If you start your clean up in safe mode, you must redo it all again once you are in normal mode.
4) Infections can migrate!!! It is sometimes necessary to run the software more than once if you feel you are still infected with something
Published on February 14, 2016 18:17
February 6, 2016
Book 2
Book 2: Must read notes before you begin!
1) I will not be dealing with defunct operating systems such as XP and Vista. Do yourself a favor and get a new computer.
2) As Windows 7 is still the most used Operating System, the majority of my pictorial references will be using it except the Windows 10 upgrade section. I will note if otherwise.
3) I use Internet Explorer for a browser. All pictorial references of web pages will be using it. I will note if otherwise.
4) The procedures here all assume your computer boots up and runs, all but unsatisfactorily. If it doesn’t, you need a service tech. This book can’t you! Book 3: The Advanced User will cover trouble shooting procedures for non bootable machines. I will, however, explain a “Power Reset” procedure which often helps to get a machine to boot.
5) Sometimes it may be necessary to boot into “Safe Mode” to get things started. I will cover that for all three operating systems in the beginning of Section 1. It is not difficult to do.
6) I also assume that you, as an intermediate user, understand the most common computer user procedures and jargon. If you do not, buy my Book 1, it will help!
1) I will not be dealing with defunct operating systems such as XP and Vista. Do yourself a favor and get a new computer.
2) As Windows 7 is still the most used Operating System, the majority of my pictorial references will be using it except the Windows 10 upgrade section. I will note if otherwise.
3) I use Internet Explorer for a browser. All pictorial references of web pages will be using it. I will note if otherwise.
4) The procedures here all assume your computer boots up and runs, all but unsatisfactorily. If it doesn’t, you need a service tech. This book can’t you! Book 3: The Advanced User will cover trouble shooting procedures for non bootable machines. I will, however, explain a “Power Reset” procedure which often helps to get a machine to boot.
5) Sometimes it may be necessary to boot into “Safe Mode” to get things started. I will cover that for all three operating systems in the beginning of Section 1. It is not difficult to do.
6) I also assume that you, as an intermediate user, understand the most common computer user procedures and jargon. If you do not, buy my Book 1, it will help!
Published on February 06, 2016 14:39
February 3, 2016
Update for Table of Contents
Had a small problem with procedural flow so I added a new section to make it flow better.
Table of Contents
- Introduction
- Must Read Notes
- Section 1: Safe Mode Booting
- Section 2: Upgrading to Windows 10
- Section 3: Cleaning a badly infected computer
- Section 4: Resetting Browsers
- Section 5: Backing up critical data not found in your User folder
-Section 6: Dealing with a corrupt Windows Operating System.
Table of Contents
- Introduction
- Must Read Notes
- Section 1: Safe Mode Booting
- Section 2: Upgrading to Windows 10
- Section 3: Cleaning a badly infected computer
- Section 4: Resetting Browsers
- Section 5: Backing up critical data not found in your User folder
-Section 6: Dealing with a corrupt Windows Operating System.
Published on February 03, 2016 18:40
February 2, 2016
Book 2 Introduction
ComputersR4U2 Book 2: The Intermediate User
Introduction:(short form)
Book 2 is a very comprehensive user manual that will guide you through proven procedures to rid your computer of viruses, malware, spyware, adware, trojans, worms, keyloggers, rootkits, fake software, PUM’s and PUP’s.
Unlike Book 1, which provided you with a routine maintenance clean-up procedure, Book 2 gets you right down to the heart of things when your computer is “REALLY INFECTED” and just plain does not work properly.
You will be introduced to very powerful software tools (all free for at least a trial period) that get the job done. Let me dispel your doubts! The tools and more importantly the sequence in which they are implemented has been done SUCCESSFULLY with many hundreds of “Sick” computers that have been brought into the shop where I work.
Be aware, the entire procedure can take up to a full twenty four hours to complete, depending on how badly the computer is infected. Even longer if your Operating System has been corrupted.
What I present here will get you up and running properly! There is a very slight chance that it doesn’t, if so you are up for a complete reformat! This will not be covered in this book. It will, however, be covered in Book 3.
Introduction:(short form)
Book 2 is a very comprehensive user manual that will guide you through proven procedures to rid your computer of viruses, malware, spyware, adware, trojans, worms, keyloggers, rootkits, fake software, PUM’s and PUP’s.
Unlike Book 1, which provided you with a routine maintenance clean-up procedure, Book 2 gets you right down to the heart of things when your computer is “REALLY INFECTED” and just plain does not work properly.
You will be introduced to very powerful software tools (all free for at least a trial period) that get the job done. Let me dispel your doubts! The tools and more importantly the sequence in which they are implemented has been done SUCCESSFULLY with many hundreds of “Sick” computers that have been brought into the shop where I work.
Be aware, the entire procedure can take up to a full twenty four hours to complete, depending on how badly the computer is infected. Even longer if your Operating System has been corrupted.
What I present here will get you up and running properly! There is a very slight chance that it doesn’t, if so you are up for a complete reformat! This will not be covered in this book. It will, however, be covered in Book 3.
Published on February 02, 2016 16:16
December 6, 2015
Book 2
Dec.06/2015
I guess today will be the day to get the second draft started. Here is where I get bogged down because I am such a poor typist. My first book I had my sister do it for me, but this time my first draft notes are such a mess I don't dare ask her! I am already bogged down deciding if I type the second draft or just do it long hand then get sis to type it.
I guess today will be the day to get the second draft started. Here is where I get bogged down because I am such a poor typist. My first book I had my sister do it for me, but this time my first draft notes are such a mess I don't dare ask her! I am already bogged down deciding if I type the second draft or just do it long hand then get sis to type it.
Published on December 06, 2015 08:27
December 3, 2015
Book 2
Dec.03/2015
Section 2: I do believe the 1st draft is fully fleshed out! It is a big/long section. There are
now 9 steps in total. This may change a bit in the second draft but probably not much!
It is, after all, the testing protocol that has been used successfully on several hundreds of infected computers. This section when followed up with section 3 will have your computer and browsing running like it was new.
Section 2: I do believe the 1st draft is fully fleshed out! It is a big/long section. There are
now 9 steps in total. This may change a bit in the second draft but probably not much!
It is, after all, the testing protocol that has been used successfully on several hundreds of infected computers. This section when followed up with section 3 will have your computer and browsing running like it was new.
Published on December 03, 2015 18:26
Computers R4U2
Books that will definitely enhance your computer usage experience.
- Edward Henheffer's profile
- 121 followers

