XBOX 360 Hard Drive Upgrade for 4GB , SLIM – The Bottomline (High Level)

2 09 2015

Here’s the nitty-gritty- we are not getting super technical here, haha, no ‘pun’ intended.

Now, the BOTTOMLINE is that you cannot upgrade the hard drive for a 4GB box 360 (what is also referred to sometimes as the Elite model, just the 4GB) using just ANY Hard Drive.

I repeat, you CANNOT with just ANY HDD, such as a laptop hard drive (2.5).

WHAT DOES THIS MEAN, EXACTLY!!! JUST SPEAK PLAIN INTERNET ENGLISH< PLEASE >!!

FIRST- You can only do this with Western Digitals.

After multiple searches on google and getting back JUNK garbage information from the “cool kids”, nobody seems to just fucking have it all in one spot- there’s many exceptions to this shit.

SECOND– You can obviously go to the local Gamestop (or online such as Amazon.com http://www.amazon.com/250GB-Internal-Drive-Xbox360-Games/dp/B008TP1OKI/ref=sr_1_1?ie=UTF8&qid=1441234198&sr=8-1&keywords=xbox+360+4gb+hard+drive)- if you’re looking for the “Official XBOX 360 HD;…

If you want to see how to install the hard drive from XBOX you see below, here’s a video:

https://www.youtube.com/watch?v=8lk0PNhBp4k

So sorry, I really was too lazy for this and was NOT going to go through the hassle of making my own video, and this is the shortest one I could hijack.  Believe it or not.  EVERYONE seems to think they are doing some GRAND MAGICAL PHENOMENON when it’s just 3 moves.  We’re not David Blaine, guys!  Come on! Open the shit! Insert the shit! Close the shit!

THIS IS THE OFFICIAL HARD DRIVE

THIS IS WHAT THE ONE YOU ARE GOING TO NEED LOOK LIKE –

With Western Digital 2.5 (“laptop hard drives) you can do it using certain models (list below), and I’m not going to pretend like I knew that naturally and go into here, so I’ll post a little link here to where you can find the models out yourself:

http://www.overclock.net/t/1236237/which-hdds-will-work-in-a-xbox-360-slim
Fuck it, hjere’s the list, but go to that link to UNDERSTAND all the complex steps….
– WD Scorpio Series BEVS/BEAS
– WD Scorpio Blue Series BEVS/BEVT
– WD Scorpio Black Series BEKT/BJKT
– WD VelociRaptor Series

THIRD, and LASTLY

There is only a certain way you can make a 2.5 hard drive you bought at Best Buy into an Xbox friendly storage device Flash the hard drive and the file system must be FAT32.

Those same directions are on that link up there with the models, and you will see that you will need a combination of a program (software) and a way to connect to it (such as a SATA to USB adapter with power supply).

Here are other instructions from a different forum pasted here.  Hope this helps you find what took me going to 5 different places, and could still be expanding- because I really would have liked for this to be done on any hard drive, not just units from the WD brand.  Feel free to share how you can do this if there is away up there, the floor is open. I will not update this post, I was just pissed I had to go to different places to find the answers.

This link has great visual helpers and the step by step instructions on different ways to flash a 2.5 hard drive and use it in your Xbox 360 http://digiex.net/guides-reviews/console-guides/xbox-360-guides/3152-hack-250gb-320gb-500gb-sata-harddrive-work-xbox-360-xbox-360-slim.html

PAY REALLY CLOSE attention to the part about Security Sector, because depending on the size of hard drive you want to upgrade to will determine which files you need to use in order to flash the HDD.

—————DISCLAIMERS FOR HIS POST

You’re Welcome, for the vendor up there that is most likely getting the business up in that Amazon link we posted🙂





Neat Gifs

13 09 2014

conner dana maschmeyer MmgQ3 mWRiz





How to get rid of Browser Hijackers and Browser Malware Toolbars

7 05 2014

Malware! Adware! Viruses!

You risk getting these when things are installed on your browser!

If your browser looks like this, you probably have malware.

If your browser looks like this, you probably have malware.

In my line of work, I have come across an issue that I see time and time again.  It’s called BO Malware- no not Body Odor, but kinda, when you think about.

Browser Helper Objects (BHO’s) is the actual term for these pesky little critters, and they can wreak havoc on your browser if you are not careful, and lead to virus leaks, identity theft, and even a major computer malfunction!  Not all BHO’s are bad, such as Adobe and Java, to name a couple.  Usually, they look like toolbars that belong on the browser.

Ever noticed as time goes by that your browser starts adding toolbars to itself that were never there before?

That’s because they weren’t and you have not been very careful about what you are clicking on.  DO NOT WORRY- most of the time, you add them inadvertently and have no idea that you are installing them.

They can slow down your online experience, not to mention your operating system if they have installed themselves in your hard drive through malware.  Your PC will be infected, your searches will all be controlled and redirected, your home page will be changed, and basically your computer will slowly be taken over.

So how do you prevent and get rid of them??

Your best bet is preventative methods.  When you install a legitimate tool, application, or any software, make sure to read everything carefully.  You would be surprised at what you are agreeing to if you ACTUALLY read some of those Terms & Conditions we all are so guilty of  just clicking and accepting.

Some of these advertisers and promoters are very sneaky and create an extra very small check box, and hide their products very well, within a legitimate product’s terms, such as a trial, complimentary feature, or “helper” object.  That’s why you have to look around very carefully and make sure nothing is already checked off by default whenever you are installing something or updating an already-installed program or utility.

Also, look out for new buttons, icons, or objects on your browser’s main bar.  If you suddenly have something on your browser like “Coupons.com” or “YouTube Downloader” where there was none before, something probably got installed inadvertently. Look at the examples above to familiarize yourself with what these little critters look like.

GETTING RID OF THEM

Often times there are heavy virus removal procedures that are involved, and you should seek professional service in order to not damage your system.  However, if you’d like to try it yourself, here is a basic procedure you can try.

First, your best bet is to restart the PC in Safe Mode.  You do this by tapping F8 when you first turn it on from a complete shutdown.  As soon as you hit the power-on button, you should already be tapping F8- fast and repeatedly until you get to a black screen with white letters that says Advanced Boot Options.  Here, you would select SAFE MODE using your up and down arrow keys on the keyboard, and press Enter.

winxp-safemode2

You will notice files loading and when this has finished, your desktop will look all messed up and the icons will all be very large- this is Normal for SAFE MODE.  ( At the end of all this, to get out of Safe Mode, just restart your PC but don’t do the “F8” thing.)

In Safe Mode, your core Windows components are loaded, and the system is running with minimal services, which is great because that means that if there is Malware (or viruses), they most likely are not loaded and running, since it’s only running the essential operating system components.  This is Safe Mode, ladies and gentlemen.

Now, the first thing you want to do [and hopefully you already have something installed] is run your anti-virus program.  You should keep in mind to update your AV program before you sign into Safe Mode, to ensure you have the latest updated virus definitions.  Once your virus scan is completed, delete or quarantine whatever it finds (if any) and then run it again, and again, until there are ZERO objects detected.

This will have removed any malware and possible viruses.  Once this is complete, you are ready to uninstall the BHO’s from your PC.  Now, in Safe Mode there are ways of uninstalling programs, but it requires some advanced knowledge and editing the registry, which is NOT recommended for a person who is not skilled at editing the registry.

For the sake of keeping this article at a ‘basic level’, we will skip the Advanced method, and REBOOT THE MACHINE back to Normal Mode.

Once the PC is back in Normal Mode and you are on your desktop, go to the Start menu, and open the Control Panel window.  Find the feature to Add/Remove programs or “Uninstall” a program, and begin to start looking for things that you do not recognize and have certain keywords like Search, Conduit, Coupons, Cleaner, and names of System Cleaners that you do not recall purchasing.  A good rule of thumb is, before you delete something you do not recognize, do not assume it is “bad” and look at the Publisher column in this Uninstall window, and make sure it is not a company you recognize, like Microsoft, Adobe, Quicken, and Sun Systems, to name a few.

IMPORTANT:  Do some research- look up the names of the ones you are suspicious about.  Chances are the first couple of search results on a web search will provide a wealth of answers as to what this product is.   If it’s bad, remove it from your system.

Speaking of “search”, your browser is still going to be hijacked, so a good thing to do in combination, or before you start searching for products you are suspicious about, is resetting your browser.  Each browser has a different way of doing this.

NOTE: resetting your browser can sometimes mean losing your favorites.  There is a way of exporting your favorites to a file and importing them back after a reset,but that will not be covered in this article.  A Google search will find those instructions easily.

Internet Explorer

  1. Close all Internet Explorer and Explorer windows that are currently open.
  2. Start Internet Explorer.  Note If you are running Windows 8.1 or Windows 8, start Internet Explorer from the desktop. Changing your settings will affect both Internet Explorer and Internet Explorer that you start from the desktop.
  3. On the Tools menu, tap or click Internet options. If you don’t see the Tools menu, press Alt.
  4. In the Internet Options window, tap or click the Advanced tab.
  5. Tap or click Reset. If you’re using Windows Internet Explorer 6, click Restore Default.

Google Chrome

  1. Click the Chrome menu Chrome menu on the browser toolbar.
  2. Select Settings.
  3. Click Show advanced settings and find the “Reset browser settings” section.
  4. Click Reset browser settings.
  5. In the dialog that appears, click Reset. Note: When the “Help make Google Chrome better by reporting the current settings” checkbox is selected you are anonymously sending Google your Chrome settings. Reporting these settings allows us to analyze trends and work to prevent future unwanted settings changes.

Mozilla Firefox

  1. Click the menu button New Fx Menu and then click help Help-29 .
  2. From the Help menu choose Troubleshooting Information.
    If you’re unable to access the Help menu, type about:support in your address bar to bring up the Troubleshooting information page.
  3. Click the Reset Firefox… button in the upper-right corner of the Troubleshooting Information page.
    Reset 29 Win
  4. To continue, click Reset Firefox in the confirmation window that opens.
  5. Firefox will close and be reset. When it’s done, a window will list the information that was imported. Click Finish and Firefox will open.

SAFARI

To reset Safari:

  1. Choose Safari > Reset Safari.
  2. Deselect any items you don’t want to reset:
  3. Clear history: Clears the list of webpages you’ve viewed.
  4. Reset Top Sites: Clears any changes you’ve made to Top Sites, such as adding or pinning sites. If you also clear your history, your Top Sites page reverts to showing the webpage previews displayed when you first installed Safari 5.
  5. Remove all webpage preview images: Clears any thumbnail images Safari has saved of webpages you’ve viewed.
  6. Empty the cache: Clears the webpages you’ve viewed from the temporary location on your computer where Safari stores them. The cache helps webpages load more quickly, so you may notice it takes some websites longer to open the first time you visit them after emptying the cache.
  7. Clear the Downloads window: Clears the list of files you’ve downloaded from websites. Only the names are removed; the files themselves are still on your disk until you remove them.
  8. Remove all cookies: Removes cookies that websites have stored on your computer.
  9. Remove all website icons: Removes website icons, which are small graphics that help identify sites on the Internet. You see them in the Safari address field and bookmarks list, and other places. These icons are stored on your computer.
  10. Remove saved names and passwords: Removes user names and passwords that Safari automatically fills in at websites that require them (if the AutoFill feature is turned on).
  11. Remove other AutoFill form text: Removes some personal information, such as telephone numbers, that Safari uses to automatically fill in forms on webpages (if the AutoFill feature is turned on). Removing AutoFill information does not remove information from your address book.
  12. Close all Safari windows: If you don’t close all Safari windows, someone could use the Back and Forward buttons to view the webpages you’ve visited.
  13. Reset all location warnings: Clears any information websites have saved about your location.
  14. Click Reset.

Finally, after resetting your browser, your home page (or the default home page) should return, and not the redirecting search bar that you most likely have been using thinking this is the “normal”  search bar or home page.  You can set the home page at this point to what ever you like, usually Google.com is the preferred industry standard.

Check your browser for objects- if there are still some left, jot down the name(s) and perform a web search and look for similarities in programs and names in the Control Panel.  Uninstall the left overs bad ones.  Usually, you will not catch them all in your first sweeps, and will need to do a little research before the system is safe once again.

TO RECAP.

Start your PC in Safe Mode

Run a Virus Scan until clean

Restart your PC in Normal Mode again

Uninstall unwanted programs via the Control Panel

Reset your browser to its default settings

Lather, and repeat if necessary, like shampoo until your system is clean.

 

Good luck- and for help or service, you can always contact us, and we can provide REMOTE support and do all this for you, for a nominal fee.
Thanks for reading this article!

We hope it helps, and remember, this article is intended for beginners or people who are not very tech-savvy, so Techs…..spare us any technical objections- we know its a little more complicated, but we have faith in our readers that they can DO THIS!!

 





Cannot Connect to a Certain Webpage or Website, but Have Internet Connection

3 10 2012

For the sake of explanation, we will format this article in as “elementary” as possible.  Although we know “techies” will think it’s very primitively written, those that will actually need the information contained within, will thank us for its prose.

There are times when you cannot connect to a certain website, yet your Internet connection is fine.  The problem could be numerous things.  When all else fails and you’ve gone through the usual troubleshooting, and you still can’t figure it out, the result may be surprising.

First, let’s check and assure that you have taken the following steps, to rule out the common culprits.

Domains and Home:

– Check with your ISP that you indeed have service and the lines test out OK.

– If you are using a server, make sure IP and DNS server addresses are OK.

– Router and switch users, make sure you don’t have unusual traffic or blinking lights on these devices.  If so, look into that.

– Make sure you can at least access other websites.

– Make sure that the block is on all computers in the same network, and not just one computer.  If you are using multiple browsers, this fix only applies if you are not able to access the one website from any of the browsers on any of the computers in the network.  If this is not the case for you, then try using other browsers, and if using IE, try adding the site to your Trusted Sites in Internet Options.

– Do a ping test to google.com, yahoo.com, and also ping your Gateway and make sure it is communicating with these points.  A ping test can tell you whether packets are reaching the destination within your network and beyond.  Then PING the website you are trying to reach, and if there is no communication or you are receiving Request Timeouts, then you are ready to check the following things.

– Run a TRACERT CMD from the command prompt to the website in question.  See where the packets are dropping.  Usually it will send fine, and then suddenly start timing out.  At the last point it times out, is where you can begin your investigation.  An example would be:

tracert thewebsite.com AND THEN PRESS ENTER –  You should see something like this:

With this command, you will be able to see at what “HOP” does the problem begin.  By doing so, you can see if it’s within your network, in your ISP’s network, or beyond.  Usually after the first 3-6 hops, it’s usually already passed your ISP’s CO network.

Now, the following only applies to businesses, small home offices, and basically anybody who has their own IP address.  All users, home and business, have an assigned IP address either from an ISP or a domain hosting service like GoDaddy.  The only difference is that this FIX may not apply to HOME users, as they have an IP that has passed verification by their Internet Service Provider.  In other words, your ISP would not compromise your IP address, unless you have been engaging in suspicious activities as a home user.  Also, sometimes your passwords or accounts get hacked, and others can be doing malicious things using your profile, emails, home computer, you name it.

So, moving forward with the assumption you have checked all of the above, we can now get to the root of the problem.  For this discussion only, we will be examining the phenomenon of a blacklist.

Blacklisting it when your IP address is being blocked of access and service to a certain site, server,or service.  Sometimes, a compromised email is all it takes for major internet companies to put you on their blacklists.

If you are a company, or use business accounts and emails, and cannot access a website with any of the units in the network, chances are that you are being Blacklisted.  The only way to get access back, is to be removed and authorized to enter again.

There are many helpful tools that can determine if you are on a blacklist, such as Barracuda, SpamCop, McAfee, etc.  We would need to write an article just about Blacklist Check services, so we’ll leave that part up to you and Google.

Once you have confirmed you have made it on a blacklist somewhere, your next step will be to “whitelist” yourself.  This basically means, GET OFF THE LIST!

You do that numerous ways depending on the reason you were blacklisted.  For example, in some cases, IP addresses are blacklisted because an email account is being used to spam.  Big name hosts like AOL and Yahoo will block your IP completely to any and all their users, not just one email account, if you make it on their list.  If you do a search and find that you are not on any of the major blacklists, you still may be on private “internal” blacklists.

One solution is to sign up with an email forwarder, if you are planning on sending many emails from your company’s accounts, to random emails for marketing purposes.  One such service is NO-IP.com.  They can provide a service where they offer their server to forward your emails, thereby making your SMTP a different one than the one associated to your  IP and ports.

Another solution, if you are not able to reach the host or hosts that are blocking you, is changing your ip address.  This is only a good option is you indeed are not engaging in any malicious activities and are genuinely the victim of a mistake, and cannot find the assistance you need.

Finally, the best way to get off a blacklist, is to use the method mentioned above with the TRACERT command.  You can narrow it down to the host that first blocks you.  Then, you can usually look them up by WHOIS domain lookups, and contact them.  Sometimes, the website you are unable to reach does not house their own servers, and their website may actually be hosted by some other company completely unrelated to their business.  A domain parked on another company’s server may be harder to contact, but not impossible.  Many ISPs can help if you ask the right questions.

Contact the administrators of the host that is blocking you, explain to them the situation, and they will remove you from their internal blacklist.

Remember, many situations can land you on those lists out there.  The most common are emails or accounts being compromised, hacker attacks on your network, mass emailing,  and unusual activities on your DNS or Exchange server.





Graphic Design Deals – Free Layout for New & Returning Customers (Coupon Code)

11 09 2012

Tech Superforce is having a limited time offer from September 10th – November 10th.  Celebrating out 5th Anniversary, we are feeling pretty generous!

If you are a NEW CLIENT and have never hired our services, your first design job is ON THE HOUSE with a half-off purchase of another layout!!  *(Returning customers use coupon code SUPS312 for a FREE DESIGN!)

That’s 2 layouts for the price of HALF of ONE!  If you do not need a second layout then, your first purchase is 50% OFF.

This includes layouts for: business cards, 4X6 & 5X7 postcards, CD inserts, flyers, letterheads, Book Cover (one side), and Custom Picture frame (a picture with a graphics border embedded).

We believe customer service is the #1 priority, but we also know people love FREE STUFF!  Sign up now and BUNDLE this deal with another layout!  A 75 -300 dollar offer that you cannot afford to miss!

*EXTRA OFFER!

Referral Bonus: Refer another design job, and your next design is FREE!!!

Click Here to sign up!

Or call 786-529-5070 NOW!





8 Things To Keep In Mind When Creating a Network

7 09 2012

Planning a network requires 8 things to consider.  Otherwise, the alternative is to jump right in to it, and, before you know it, ip addresses are conflicting, people can’t login, and techs are playing Detective and working together burning hours to ‘figure out’ how to fix things.

Network Diagram

We at Techsuperforce always implement and follow these 8 principles when we first attack a new network design job.  Do the same  and you will breathe easier, suffer fewer headaches, and save money and time.

POLICY

policy is a document that describes the overall goals and requirements for a network. A policy identifies what should be done, but may not necessarily define how the goal is to be reached. Depending on your network, you might define policies for different areas of implementation such as policies for:

  • Administrative delegation
  • Network documentation
  • Security

REGULATION

regulation is a requirement published by a government or other licensing body that must be followed. While you are not responsible for writing regulations, you are responsible for knowing which regulations apply to your organization, and making sure that those regulations are understood and adhered to. Policies are often written in response to regulations.  For smaller networks, such as a Home Server, you may still want to make sure you adhere to regulation politics to not cause conflict for yourself.

PROCEDURE

procedure is a step-by-step process outlining how to implement a specific action. The design of a procedure is guided by goals defined in a policy, but go beyond the policy by identifying specific steps that are to be implemented. The use of consistent procedures ensures that the goals defined in a policy are met, and provides consistency of action by multiple administrators.  Examples are procedures for hardware demotion, user promotion, password retrieving procedures, etc. (the list goes on).

NETWORK DIAGRAM (Good Choice)

A robust diagram is always highly recommended.  This one is NOT one of the ones you should leave out, in fact, this key is one of the most important ones and should be in your top 3 priorities.

network diagram shows the logical and/or physical layout of your network. The network diagram could be a collection of diagrams showing the following information:

  • The location and IP addresses of hubs, switches, routers, and firewalls.
  • The relationship of remote locations and the WAN links that connect remote locations.
  • Subnets within your network, including the subnet addresses and routers connecting each subnet.

Really, this is important when down the road you no longer remember by heart your layout, and someone else needs to take a look at your network without running into pesky trouble situations that waste time hunting for cables, patch panel paths, which brings us to our next point….

WIRING SCHEMATICS

One of the top three most important principles, a wiring schematic is a type of network diagram that focuses on the physical connections between devices. The wiring diagram typically shows:

  • The location of drop cables and ports within offices or cubicles.
  • The path that wires take between wiring closets and offices.
  • A labeling scheme that matches endpoints in offices and cubicles with specific switch ports or punchdown block locations.

CONFIGURATION (This is CRITICAL to troubleshoot, maintain, and expand your network.)

Configuration documentation identifies specific configuration information for a device. For example, a configuration document for a firewall might include information about the IP addresses assigned to each interface and opened firewall ports. Configuration documentation has two goals:

  • Document the configuration so that the device can be restored to the original configuration.
  • Document the configuration so that the current configuration can be compared to the desired configuration to identify any changes.

CHANGE or HISTORY DOCUMENTATION

Change or history documentation keeps track of changes to the configuration of a device or the network. Change documentation is often included as a part of the configuration documentation. For example, you might record a change in a network interface card in a device, or a repair to a WAN link. Change documentation is useful for troubleshooting to identify what has been done to the device, and keeps track of changes in the configuration as well as the rationale behind those changes.

BASELINE

baseline is a snapshot of the performance statistics of the network or devices. The baseline is used as a logical basis for future comparison. Baselines enable you to effectively monitor the performance of your system to determine when changes negatively impact performance or when systems need upgrading or replacing. It is important to measure network performance at subsequent intervals to see how your server is performing compared to the baseline.

There are many monitoring programs that can show you live statistics and help you document the performance of your systems, helping you create profiles that will help you determine the health and state of those systems.  We like using Nagios, but there are a few programs out there.  Even the Windows Performance monitor can be a useful utility that you can pull information from and chart the system’s progress.

Microsoft Visio is a great program to use to design networks.  As simple to use as Word, it can help you build, implement, and document all of these principles mentioned above, and keep a good record for technicians and engineers that may need a map to your network.

Snapshot of Microsoft Visio diagram

We hope you have enjoyed this article.  Don’t forget, for more information. please visit our main website, www.techsuperforce.com.  We are honored to provide services and information for those that welcome this art.

Thank you!





CAT5 Wiring Technique for Ethernet Cable

26 08 2012

Tech Superforce

Image

Connectors and Information

The cable exists in both stranded and solid conductor forms. The stranded form is more flexible and withstands more bending without breaking and is suited for reliable connections with insulation piercing connectors, but makes unreliable connections in insulation-displacement connectors. The solid form is less expensive and makes reliable connections into insulation displacement connectors, but makes unreliable connections in insulation piercing connectors. Taking these things into account, building wiring (for example, the wiring inside the wall that connects a wall socket to a central patch panel) is solid core, while patch cables (for example, the movable cable that plugs into the wall socket on one end and a computer on the other) are stranded. Outer insulation is typically PVC or LSOH.

Image

STANDARD SEQUENCE

White Orange, Orange, White Green, Blue, White Blue, Green, White Brown, Brown.  This is Standard 568B Cat5 wiring.

CHARACTERISTICS of Category 5 Wire
Bending radius
Most Cat 5 cables can be bent at a radius approximately 4 times the diameter of the cable.

Maximum Cable Segment Length
According to the ANSI/TIA/EIA standard for category 5e cable, (TIA/EIA 568-5-A[5]) the maximum length for a cable segment is 100 meters (328 feet). If longer runs are required, the use of active hardware such as a repeater, or a switch, is necessary.[6] [7] The specifications for 10baseT networking specify a 100 metre length between active devices. This allows for 90 metres of fixed cabling, two connectors and two patch leads of 5 metres, one at each end. In practice longer lengths are possible. (See Ethernet over twisted pair which states that 150 m is often considered to be the maximum working length.) Experiments show that a full 305 metre drum of cable is well above the practical limit, but that reliable transmission with 200 m is often possible.

For information on technical support, if you need specific answer, please feel free to visit our main website at:  www.techsuperforce.com