Tuesday, October 5, 2010

Best Ways to Protect Your Computer from Viruses and Spyware

Is your computer malfunctioning due to viruses? Most of the computer users experience the save quite often. To protect your PC from a virus attack, you should understand exactly what a virus is. Computer virus is a software program which is designed with malicious intentions. It is not very difficult to keep your computer running like a brand new-one with the regular maintenance and updation of your anti virus software from time to time. It is basically spread via internet. In this article we have discussed about some of the best ways to protect your computer from viruses and spyware.
  • For better computer protection, you should use an Internet firewall. Operating systems like Windows 7, Windows Vista, and Windows XP with SP2 comprise built-in firewall and this is turned on by default. Check whether it is on or not. If not, turn it on.

  • You should also update the operating system regularly as Microsoft releases updates to protect the users from virus attack. Have you installed the most recent version of Microsoft Office? Your Microsoft Office programs will also be updated by Microsoft Update.

  • It is a must to install an antivirus software program and update it regularly. AVG, Avast, Norton, Macafee, etc. are some of the most renowned names in this regard. You can start with the trial version and if you find it satisfactory, then go for the paid version.

  • It is also suggested not to open an e-mail attachment from an unknown source. In most of the cases, these attachments contain viruses and spyware. You should also use strong passwords to protect your computer from unwanted access.

Source:- www.mytechsupportstore.com

Friday, September 17, 2010

Computer repair Scottsdale now assuring end to end technical support

The fact is, maintenance of the IT set up is indeed daunting and is often challenging for the non techs! It is exactly when you need the expert hand and the IT service provider ensures you of a holistic IT maintenance to protect, control and maintains your IT needs. With a pool of IT professionals and qualified engineers armed with their latest IT certification, the computer services thus provide a managed IT services to guarantee a protected environment for your IT infrastructure from the growing security threats and network failures.

With the mounting amount of interdependence on computers the major need today remains in interlinking these to make sure that the computers work efficiently and that is exactly what the term networking support does. In this typical scenario if you do not deploy the right IT consulting expert, at the day’s end you are putting your core business in jeopardy. Computer repair Scottsdale with an array of expert services like computer support services, computer repair services, computer networking, computer maintenance, and even computer hardware repair services offers a holistic approach in maintaining your IT setup.

As they say that “a stitch in time saves nine”, so to minimize your downtime it’s advisable to bank on the computer services Arizona for best computer services. Arizona computer support and repair services is now more like a life support system when trying for emergency troubleshooting. No matter, if you are trying to find out the solutions for your laptop, computer, or any other peripheral troubleshooting because now the experts are there for real time troubleshooting and routine maintenance of your IT.

Source: businessweek.com

Tuesday, August 10, 2010

How to Stay Secure on Web - Hackers Guide

You already know the basics of internet security, right?

You know to keep your antivirus program and patches up to date, to be careful where you go on the Internet, and to exercise online street-smarts to resist being tricked into visiting a phishing site or downloading a Trojan horse.

But when you've got the basics covered, but you still don't feel secure, what can you do? Here are a few advanced security tips to help you thwart some of today's most common attacks.

Remember, however, that security is all about trade-offs. With most of these tips, what you gain in security, you lose in convenience. But hey, it's your computer. Be as paranoid as you want to be.

Avoid Scripting

This may be the one piece of advice that will do most to keep you the safe on the Web: Steer clear of JavaScript, especially on sites you don't trust.

JavaScript is very popular, and for good reason. It works in almost all browsers, and it makes the Web a lot more dynamic. But it also enables bad guys to trick your browser more easily into doing something that it shouldn't. The deception could be something as simple as telling the browser to load an element from another Web page. Or it could involve something more complicated, like a cross-site scripting attack, which gives the attacker a way to impersonate the victim on a legitimate Web page.

JavaScipt attacks are everywhere. If you use Facebook, you may have seen one of the latest. Lately, scammers have set up illegitimate Facebook pages offering things like a free $500 gift card if you cut and paste some code into your browser's address bar. Code is JavaScript--and you should never add it to your browser. "Scammers use this technique to open up unwanted surveys, fill your social networking profiles with spam or even to send you to phishing pages," says Chris Boyd, a security researcher with Sunbelt Software.

But miscreants can add JavaScript to hacked or malicious Web pages, too. To avoid attacks there, you can use a free Firefox plugin called NoScript that lets you control which Websites can and cannot run JavaScript in the browser. NoScript goes a long way toward preventing rogue antivirus programs or online attacks from popping up when you visit a new Website.

Source: itbusiness.ca

Tuesday, June 15, 2010

AVG Brings LinkScanner Malware Detector to the Mac

A company that provides antivirus offerings for PC users is bringing a free link checker to the Mac.

AVG Technologies plans to unveil a Mac version of AVG LinkScanner, a free download that scans Website links for potential threats. AVG says its LinkScanner application checks Web pages in real-time, posting a warning to users if the software finds a Website that could pose potential problems.

"Every single time you click on a link, any time you're accessing information on the Internet, we scan it, looking for malware and phishing attempts," J.R. Smith, CEO of AVG, told Macworld.

AVG's software doesn't rely on blacklisted sites that have been flagged for potential harmful content. Rather, the application uses real-time checking to alert users to potentially problematic sites. The company relies heavily on a large user base--tens of millions of users, according to AVG--to ensure users are surfing to secure Web pages.

Mac users have lived largely free of malware and viruses, as malware creators have focused on attacking more widely used platforms. That figures to change as the Mac becomes a more widely used system, thanks to the growth of both OS X and Apple's mobile iOS. But the real threat is posed by the growth of social networking sites that increase the risk Web surfers could fall prey to phishing and other malicious attacks.

"We're not here screaming that Macs are vulnerable," said Smith, adding that like any platform the Mac OS has its vulnerabilities. Rather, Smith continues, the threats posed by attacks via social networks threaten users regardless of platform. "We're protecting people in some cases from themselves."

Look at the increasing prominence of shortened URLs, Smith said. Savvy Web surfers used to be able to look at a URL and spot a potential phishing attempt; condensed URLs make that harder to do. "You can't see [the full URL]," Smith added. "You can't be your own policeman."

The free download of AVG LinkScanner is designed for Mac OS X 10.5 and 10.6; it runs on Mozilla Firefox 3.x and later as well as Safari 3.x and later, including the newly released version 5 of Apple's Web browser.

source: pcworld.com

Tuesday, May 25, 2010

Seagate claims world's fastest laptop drive

Seagate has officially announced its Momentus XT, a hybrid hard/solid state drive (SSD) that it claims is the world's fastest 2.5in drive for laptops.

The device is designed to offer performance comparable to a costly Flash SSD, but with the greater storage capacity and lower price associated with standard hard drive technology, according to Seagate.

The Momentus XT achieves this by combining a 7,200rpm drive with 4GB of SSD storage, and using built-in algorithms to put the SSD's speed to best effect. This is independent of the operating system or any applications used, the firm said.

Seagate's Adaptive Memory technology intelligently monitors application and file requests, and puts the most commonly accessed data in the SSD, where it can be accessed much faster than from the magnetic disk.

The Momentus XT is 80 per cent faster than a conventional 7,200rpm drive, according to Seagate, and a laptop will boot twice as fast as one with a typical 5,400rpm laptop drive.

The drive is shipping into the channel and to system vendors now, and Asus has announced that it will offer it as an option for its new Republic of Gamers G73Jh laptop.

The Momentus XT is available in 500GB, 320GB and 250GB capacities, with suggested retail prices of $156 (£108), $122 (£84) and $113 (£78) respectively.

Source: v3.co.uk

Thursday, May 13, 2010

Symantec Launches Hosted Endpoint Protection

Symantec Corp. announced the launch of Symantec Hosted Endpoint Protection, a new cloud-based offering for small and medium sized organizations who wish to deploy comprehensive security for their computer systems without the need for additional hardware or management software. Customers will now be able to protect their Windows-based laptops, desktops, and file servers from the proliferation and growing sophistication of threats with the simplicity and convenience of a cloud-based service.

Harnessing more than eighteen years of experience developing award-winning technologies for anti-virus and endpoint protection, Symantec Hosted Endpoint Protection is designed to safeguard endpoint systems with a single solution managed from a Web-based console offering advanced protection from the endpoint to the gateway.

"As the hosted model for messaging security has become increasingly popular for its ease of management and deployment, organizations are similarly motivated by the reduced complexity that cloud-based services can offer while effectively protecting their endpoint systems," said Rowan Trollope, Senior Vice President, Symantec Hosted Services. "Symantec Hosted Endpoint Protection leverages our SaaS expertise to deliver advanced technologies that help protect customer systems without requiring additional hardware, management software, or dedicated IT staffing."

As threats become more complex and the global workforce increasingly more mobile, analysts have predicted that businesses will demand highly effective security solutions that are easy to set up and require minimal maintenance– features especially important to small and medium sized businesses that have limited resources to stay current with evolving security requirements while managing a myriad of additional IT responsibilities.

"Customers often experience pain when increased IT resources are required to stay abreast of evolving endpoint threats," said Christian Christiansen, VP of Security Products and Services, IDC. "To reduce these difficulties, customers want turn-key, endpoint solutions that provide the latest protection levels with easy set up, zero maintenance, and automatic upgrades. Security SaaS implementations can fully provide these solutions."

Symantec Hosted Endpoint Protection leverages the Symantec Global Intelligence Network, one of the largest security research networks in the world, and benefits from the network's rapid threat identification and response. With Symantec Hosted Endpoint Protection, automatic security updates occur transparently over an Internet connection keeping employee systems current whether workers are in the office or on the road.

Source: techarena.in/news

Tuesday, April 27, 2010

Fake anti-virus software a growing online threat

Google said Tuesday that fake software security programs rigged to infect computers are a growing online threat with hackers tricking people into installing nefarious code on machines.

An analysis of 240 million Web pages by the Internet search giant during the past 13 months revealed that fake anti-virus programs accounted for 15 percent of malicious software it detected.

"The Fake AV threat is rising in prevalence, both absolutely and relative to other forms of Web-based malware," Google said in its findings.

"Clearly, there is a definitive upward trend in the number of new Fake AV domains that we encounter each week."

Fake anti-virus (AV) peddlers rig websites to frighten visitors with pop-up messages warning that supposed scans have found dangerous malicious software on machines.

The scam goes on by selling victims programs that hackers claim will fix the purported problems but which in fact usually plant nefarious computer code on machines.

Such transactions can also leave credit card information in the hands of cyber crooks.

"Surprisingly, many users fall victim to these attacks and pay to register the Fake AV," Google said.

"To add insult to injury, Fake AVs often are bundled with other malware, which remains on a victim’s computer regardless of whether a payment is made."

Google has refined tools to filter out booby-trapped Websites and hackers have evidently responded by flitting from one domain name to another.

Source: ca.news.yahoo.com

Thursday, April 8, 2010

Local Computer Repair

iYogi fixes all your computer related problems via remote desktop connections; hence no need to take your desktop or laptop to any service center.

At iYogi, we fix problems with software, hardware, virus & spyware, Internet, printers, scanners or any hardware devices that are attached to a computer. In short, we will help you troubleshoot anything in or attached to your PC, no matter which brand it is.
Support Coverage:
• Windows operating system support
• Hardware/software issues
• Networking/sharing support
• Virus & spyware removal
• Internet connectivity issues
• Printer, Faxes and Scanners
We offer live 24*7*365 and remote technical support for all software, hardware and computer manufactures including:
• Compaq
• Hewlett-Packard
• Sony
• Acer
• Gateway
• Microsoft
• Samsung
• Toshiba
Key Features:
• iYogi monitors your computer for hardware and software problems
• Describes the problem and fix it step by step
• 24/7/365-smart tech support offered via phone, chat and e-mail
• A fast and tuned up PC in few minutes
• Ensure a fast running and healthier PC

iYogi has combined the best technical support technologies into a new comprehensive process that assure to fix all computer problems through remote over the web. We can connect directly to your computer with our secure, remote control software. Our certified technicians are highly trained with computer repairs, both hardware and software. You can put your feet up and study everything that we are doing by watching your screen while we are troubleshooting your problem. Using the computer information gained from your PC's diagnostic testing, our engineers can perform diagnosis and repairs that are perfect to your computer's software and hardware configuration.

Tuesday, March 16, 2010

Importance of AVG Antivirus Protection

virus removal
When your PC behaves strangely like, applications taking longer to launch, computer is running very slow, hard disk becomes inaccessible, etc. it indicates that your system is infected from malicious programs. In such a situation, it becomes necessary to install updated antivirus on your system. You can install any antivirus on your system, provided that you have purchased genuine copy of that antivirus.
AVG antivirus offers many benefits to you like protection against malicious programs, etc. Now, you can do banking, shopping, surfing, searching, chatting, e-mailing, downloading files, etc. without any terror of infection by malicious programs. This antivirus offers you protection against online scammers, hackers, etc. It protects you from phishing attack by securing your confidential information from intruders.
AVG antivirus 8.5 is integrated with many new facilities, which were absent in its earlier version. You can easily download and install AVG antivirus 8.5 on your system with the following steps:
STEP 1: Download the installation file of AVG antivirus 8.5 on your system from its official website.
STEP 2: When you will be prompted, do not open the file, but click on the “Save” button and select location where it should be stored.
STEP 3: Reboot your computer when installation file gets saved.
STEP 4: Locate the AVG installation file, and double click on it to start its installation.
STEP 5: Follow the instructions in the installation wizard.
STEP 6: Enter your license number when prompted.
STEP 7: Restart your computer when prompted by the installation wizard.
After completing the installation process of AVG antivirus 8.5 on your system, you can protect your system from malicious programs.
You can face blue screen error while installation of AVG antivirus. It can freeze your system and would not be able to work with some of the applications installed on your system.

Sunday, March 14, 2010

Know How to Install Windows 7

acer support
Windows 7 is the latest Windows operating system, and is successor of Windows Vista. It is available in many editions namely, Starter, Home Basic, Home Premium, Professional, and Ultimate.
Windows 7 consists of Action Center, which consolidates all the messages from Windows Defender, User Account Control, etc. In case, Windows 7 requires your attention, the Action Center icon will appear in the taskbar.
This operating system has the feature of backing up individual folders, libraries, and drives. Its calculator is integrated with new Programmer and Statistics modes. In this operating system, you can easily move and resize gadgets.
Windows 7 offers you the facility to perform all your tasks with your fingers, like browsing online newspapers, flicking through photo albums, shuffling files and folders, etc. You can perform an upgrade installation of Windows 7 on your Windows Vista based PC, with the following steps:
STEP 1: Turn on your computer and when Vista gets started, do one of the following:
a) Insert the Windows 7 installation disc into your computer. Setup would start automatically, if it does not click on “Start” and then on “Computer”. Open the Windows 7 installation disc on your DVD drive, and then double-click on setup.exe.
b) If you have downloaded Windows 7, then browse the installation file, and double click on it.
STEP 2: Click on Install now on the “Install Windows page”.
STEP 3: On the “Get important updates for installation page”, it is recommended to receive the latest updates in order to protect your computer.
STEP 4: On the Please read the license terms page, click on “I accept the license terms”, and then click on “Next”.
STEP 5: Click on Upgrade, on the “Which type of installation do you want?” page.
STEP 6: Follow the instructions to complete installation of Windows 7.
After completing Windows 7 installation, you can enjoy with its features like Aero, etc.
While performing Windows 7 installation, you can face a technical error. You may face issues while sharing files between Windows 7 and Windows XP systems.

Thursday, March 11, 2010

How to Install Windows Vista on Windows XP PC?

microsoft outlook 2007
Windows Vista is amongst the Windows operating system, and is successor of Windows XP. It consists of many new and exciting features, which will increase your daily performance.
Windows Vista consists of Ease of Access Center, which offers a suitable, centralized place to find out accessibility settings and programs, so that, you can use your computer easily. It offers you instant access to common tools, ability to explore all accessibility settings in seven categories, etc. This operating system consists of BitLocker Drive Encryption, which prevents an unauthorized person who runs a software hacking tool from breaking Windows Vista file and system protections.
Windows Vista is integrated with accessibility settings and programs, which make it easier for you to view, hear, and use your computer. These programs are particularly helpful for those people, who have visual difficulties, hearing loss, pain in their hands or arms, or reasoning and cognitive issues. You can easily perform upgrade to Windows Vista on a Windows XP-based computer with the following steps:
STEP 1: Insert the Windows Vista DVD into the DVD drive.
STEP 2: Click on “Install now” on the Install Windows page.
STEP 3: On the Get important updates, click on ““Go online to get the latest updates for installation”, in order to protect your computer against security threats.
STEP 4: On the “Type your product key for activation page”, type your 25-character product key.
STEP 5: On the “Please read the license terms” page, click on “I accept the license terms” check box.
STEP 6: Click on Upgrade on the “Which type of installation do you want?” page.
STEP 7: Follow the instructions to complete installation of Windows Vista.
It is suggested that you should restart your computer after Windows Vista installation gets completed.
While installation of Windows Vista, you can have some issues like installation could not get completed, etc. You may face any problem while working with Windows Mail. Sometimes Windows Media Player will stop responding.

Wednesday, March 10, 2010

Improve your PC’s Performance with Online Computer Services

computer services
Computer services comprise all the services required to resolve technical issues related either tor software or hardware. You can access computer services from any technical service provider, when you face any technical issue with your system, like blue screen error, computer running slow, applications taking much time in launching, etc.
Computer service providers offer 24/7 assistance via remote connection in order to facilitate their customers. Remote computer service provider offers many services, and some of them are enlisted as:
• Installation, un-installation, and re-installation of software
• Troubleshooting software errors
• Diagnostic and repair of hardware issues
• Optimizing your PC’s speed and performance
• Resolving driver conflicts
• Configuring Antivirus and Antispyware
• Online data backup services
• Scanning of computer to detect and block spyware, adware, pop-ups, and phishing attacks.
Along with the above mentioned services, many services are offered via remote connection. In remote support services, you just have to pay a fixed amount and you can access unlimited services for a predetermined time.
Remote computer support is considered to be the best method of delivering computer services due to many reasons. In remote support, you just have to sit at your home or in office and tech experts will resolve your technical issues remotely.
After accessing your system, tech expert will take control over your system. Then tech expert will diagnose it carefully in order to find out the root cause of the technical issues. Accordingly, they will carry out the necessary steps to resolve all the technical issues you are facing.
If you carry your system to any service centre, then it would take two or more days to resolve your technical issues. In case, you call any technician at your premises, it would seem a headache for you. So, it is better to receive computer services via online.
See More -
Antivirus Support
Asus Support

Install Windows XP - The Most Popular Operating System

Windows XP is the most amicable series of operating system, which has been developed by Microsoft and was introduced on October 25, 2001. It was the first version, where Microsoft put the restriction of product activation, to combat illegal copying.
Read this blog to know the authentic method of installing Windows XP.
First you should check the compatibility of Windows XP with hardware configuration of your computer.
“As per recommendation you must have a computer equipped with a processor of minimum 233 MHz to 300 MHz or higher, minimum memory around 64 MB RAM2 to 128 MB RAM or higher, video adapter and monitor -Super VGA (800 x 600) or higher resolution and Hard drive disk free space -1.5 GB or higher”
Note: Additional 1.8 GB in Service Pack 2 and additional 900 MB in Service Pack 3
You can follow the given steps to install Windows XP on your computer.
Step 1. Load your DVD tray with Windows XP installation CD/DVD.
Step 2. Restart your computer and press any key when prompted to do so.
Step 3. As the content of the DVD is getting copied, you receive a message like "Disc one - (#)Megabytes". Press D button of your keyboard.
Step 4. To create new partition press “C.” You are flexible to decide number of partition and size of each. Press Enter once you have decided the size. You can decide the partition, where you want to locate operating system XP’s file. Choose the file system as “NTFS” as permitted for Windows XP and complete the installation procedure with the help of on-screen prompts.
Next step in Windows XP installation is to equip it with compatible device drivers for network adapter, wireless adapters, CD-ROMS, Hard Drives, Video Cards, and Printers so that you can accomplish your task perfectly.

Friday, March 5, 2010

Crush Down Runtime Error

Run time error pops- up, when you execute certain program or utility, but your computer fails to run it. There are four basic reasons behind this error, which include confliction with a utility program (TSR), software issue, computer virus and memory issue.
First you should close all the application windows and try to know, where is the fault, actually? Once you come to know it, you can easily fix the error. Suppose, the Run time error remains after closing all the running applications windows, then it is confirmed, that there is some fault related to your operating system. To fix the problem, you need to update your Windows operating system, with the latest patches or updates. You can go online to Microsoft’s website or can avail any CD/DVDs from an authorized source. But, if you still fail to fix the issue, then uninstall and reinstall your operating system. Don’t forget to take back-up of your computer before uninstalling your OS.
Similarly, you can fix the error related with any other application software.
But, if you don’t get any advantage with the above activities, then your computer could be infected with some computer viruses. It’s highly recommended to immediately implement a virus scanning tool, which is effective enough to detect and remove them in a fast-track way. Next, update your existing antivirus protection and enable Firewall to ensure that your computer is secure against forthcoming viruses and other malicious products.
If you are addicted to the Internet, then you might have gone through run time error that states, "A Runtime Error has occurred. Do you wish to debug?"In this situation, you can fix this error temporarily. Follow as: Tool>Options>Advanced. You need to check the box against "Disable script debugging" which appears in the "Browsing" subcategory. Also uncheck the box against "Display a notification about every script error." This will block the error from appearing again on your web browser.
In case, your computer is a regular victim of this error, then your computer’s memory (RAM) could be a possible reason behind it. Programs of your computer will not be getting sufficient memory to run, to fix the run time error you need to upgrade your RAM (Random Access Memory). If possible do it yourself with the guidance of the manual book, otherwise contact your vendor.

Monday, February 1, 2010

PC Optimization

computer optimizationPC optimization is a way to improve the performance of a computer system. You can optimize your PC using several tips and techniques. You can also use any of the good PC optimization software available in the market. Let us discuss some of the useful tips to optimize a Computer Setup.

Wipe off your computer desktop: Do not clutter your PC desktop with several shortcuts and programs. The shortcuts occupy considerable fraction of system memory. So, if there are several shortcut icons placed on the desktop then they will consume huge system memory. As a result, you should keep only the recycle bin and some of the frequently used applications on the desktop.

Minimize the size of recycle bin: By default recycle bin occupies more computer memory. You can alter the memory size of the recycle bin to a lower value to make your system fast.

Turn off screensaver and wallpapers: Screensavers and wallpapers occupy a large volume of system’s memory. So, to improve the performance of your PC you can turn off the screensaver and keep images of small file size as wallpapers.

Regularly delete temporary files from your PC: Temporary files are voracious eaters of computer memory. You can improve its performance by removing the temporary files at regular intervals. Windows XP provides “Disk Cleanup” utility that can automatically clean up disk space for all the unwanted temporary files stored on your PC.

Defragment your PC’s hard disk: Defragmenting a hard disk can help in improving the performance of your PC. The process of defragmentation frees up space on the hard disk and can automatically arrange the data stored on it thereby improving its performance. You can use the “Disk Defragmenter” utility provided in the Windows XP operating system and improve the performance of your PC.

Refreshing your desktops at regular intervals will help a lot in improving the speed of your PC. The process of refreshing a desktop removes all the unused files from your computer RAM, hence improving the computer speed.

Thursday, January 28, 2010

Firewall Configuration


A firewall is a device or a set of devices, which can be implemented in any of the hardware, software or both. All the messages passing through the firewall are verified to meet some level of security criteria.

It acts as a computer security barrier, which analyzes all the incoming and outgoing traffic to and from your computer or network based on the firewall settings. There are some common types of firewalls like: Application level gateway, Packet filtering firewall, Circuit gateways and Hybrid firewall.

Application level gateway firewall works on the application layer of the protocol stack. It works more intelligently than the packet filtering firewall. Packet filtering firewall examines the information contained in the header of the message packets.

There are some factors based on which the filters can be added or removed from the firewall:

1. IP address

2. Ports

3. Protocols

IP address: Every computer connected to Internet has a unique IP address. The firewall configuration can be customized to block any IP address so that your computer will not allow any kind of communication to take in between.

Ports: The firewall can be configured to allow or block messages from any port number.

Protocols: There are some commonly used protocols like IP, HTTP, TCP, FTP, and SMTP etc., which can be included in the firewall filter.

Some operating systems, such as Microsoft Windows offer built-in firewalls that are turned on by default to block all the incoming threats from Internet. There are several other third party firewalls available. You can choose any one the firewall to replace the default firewall in Windows.

Monday, January 25, 2010

Install Printer


Know how to install printer on Windows XP computer

Before installing a printer on Windows XP operating system is to have suitable printer driver for the printer you are installing. There is no need to worry if you don’t have a driver disc. You can use the printer driver provided with by the printer manufacturer in the form of disc or you can also download the latest printer drivers from the manufacturer’s website. Follow the below mentioned steps to install printer on Windows XP system (assuming that you are installing the printer on a Windows XP computer and the printer is to be directly connected to the system).

1. Click on Start

2. Go to Control Panel

3. Click on “Printers and other Hardware”

4. Select “Add Printer” tasks from the task section to continue the printer installation.

5. You will see a “Welcome to the Add Pinter Wizard” screen, click on “Next”.

6. Select “Local printer attached to this computer” for printer connected directly to your PC.

7. Now click on “Automatically detect and install Plug and Play printer” option (in case you don’t have any information about the make and model of your printer).

8. Click on Next.

9. Select a Printer Port from drop-down menu present where the printer is connected or you can choose to create a new port.

10. Click on Next.

11. Select manufacturer of your printer from the list of manufacturers available and then choose the model of you printer.

12. Click on Next.

13. If you have the latest driver on CD/DVD disc then you should click on Have a Disk button to select the specified printer driver.

14. If the correct are selected then Windows will automatically install the files on your computer.

15. You will see a Printer icon in the Printer and Faxes section in Control Panel after the successful installation of the printer on your computer.

You can further make changes to the printer setting and feature by selecting the properties of the printer and selecting the desired settings.