Toshiba Satellite A505 Hard drive recovery

Starts on Page 60
Make sure the computer is turned off.
Press and hold the (zero) key on your keyboard while
powering on the computer.
If your system offers a choice of Windows®  7 32-bit or 64-bit
operating system, select one at this time. If not, skip to step 4.
A warning screen appears, stating that when the recovery is
executed all data

Google Drive logging and error report

on Mac:

  1. Open the Google Drive menu on your computer.
  2. Select “Quit.”
  3. Open the Terminal application.
  4. Copy and paste the following command into Terminal: /Applications/Google\\ Drive –v
  5. Press Enter.
  6. Google Drive for your Mac will automatically open in Diagnostic Mode.
  7. Click Send report to Google.
  8. When the report is sent, you’ll receive a Report ID. Write the Report ID down and share it with your support representative.
If steps 6 and 7 fail, you’ll see an error message saying the the sync log couldn’t be sent to Google. To manually send the report to Google:
  1. Click the OK button.
  2. The folder on your computer that contains the sync log file will open.
  3. Attach the report to your email reply to the Google Drive support representative.


What is ransomware?

Ransomware is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. Ransomware generates a pop-up window, webpage, or email warning from what looks like an official authority. It explains that your computer has been locked because of possible illegal activities on it and demands payment before you can access your files and programs again.

How do criminals install ransomware?

Ransomware is usually installed when you open a malicious email attachment or when you click a malicious link in an email message or instant message or on a social networking site or other website. Ransomware can even be installed when you visit a malicious website.

How do I avoid ransomware?

There are several free ways to help protect your computer against ransomware and other malware:

What should I do if I have ransomware on my computer?

To detect and remove ransomware and other malicious software that might be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products can detect and remove this threat:
For more information, see Help protect your PC with Microsoft Security Essentials.

How Secure is Dropbox?

It’s secure!  I use it myself.  Dropbox stores users data at Amazon’s S3 cloud.
Dropbox takes the security and the safety of your data very seriously. They use the best tools and engineering practices available to build and maintain Dropbox, and have a dedicated security team making sure that Dropbox remains secure. Our files are stored securely and backed-up. Your account login is protected by many layers of security including password and two-step verification.
Other Dropbox users can’t see your files in Dropbox unless you deliberately share links to files or share folders.
Just use this referral link to get an extra 500MB of space on your free 2GB dropbox account:
Read more here:

Changing the Owner of SQL Reporting Services Subscription

Your organization has a SQL Reporting Server that generates custom reports based on some of your data.  These reports need to be generated each day at noon and then emailed to someone important.  So Tom, your current DBA, creates subscriptions for the reports so that they are automatically sent to Mr/Mrs Important. All is well in the world.

Now fast forward six months:
Tom, your DBA, has decided to leave your organization.  Like all organizations should do, Toms account is deleted from Active Directory.  A few days later, you start getting calls from Mr/Mrs Important wondering why they have not received the emailed reports for the last two days.
It turns out that Tom created the subscriptions using his account, so he is the Owner of the subscriptions.  When you look at the history for the subscriptions, you get an error that the subscription owner “DomainATom” does not exist.  Now you need to find a way to fix this before Mr/Mrs Important sends you looking for a new job.
The Problem
I needed to change to Owner of the subscription to an existing account.
My first thought was that surely the Report Manager or Management Studio would provide a way to accomplish this.  Wrong assumption on my part…there is absolutely no way to do this using the designer tools that interface with SQL Reporting Services.  That left me with two options:  recreate the subscriptions using a new account (not really efficient), or find a way to change the Owner.
The Solution
It turns out that you can modify the Owner in the Subscriptions table in the ReportServer database in SQL.  This table contains a column called OwnerID that is a foreign key reference to the UserID column in the Users table of the same database.  To fix the problem, just replace the old OwnerID with the new one from the Users table that matches the new user that you want to use.
Here is a simple SQL statement that will do the replacement (where OldUser and NewUser are the users that you are trying to swap):
   1: DECLARE @OldUserID uniqueidentifier
   2: DECLARE @NewUserID uniqueidentifier
   3: SELECT @OldUserID = UserID FROM dbo.Users WHERE UserName = 'DOMAINAOldUser'
   4: SELECT @NewUserID = UserID FROM dbo.Users WHERE UserName = 'DOMAINANewUser'
   5: UPDATE dbo.Subscriptions SET OwnerID = @NewUserID WHERE OwnerID = @OldUserID
There could be one final catch: the new user might not exist in the Users table.  If that is the case, then you need to add/modify/delete something in the Reporting Server using that account and then it will appear in that table.  All I did in this case was a file in the Report Manager and then delete it.

Avoid tech support scams

Cybercriminals don’t just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following:
Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software.
Take control of your computer remotely and adjust settings to leave your computer vulnerable.
Request credit card information so they can bill you for phony services.
Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there.
Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.
Telephone tech support scams: What you need to know
Cybercriminals often use publicly available phone directories so they might know your name and other personal information when they call you. They might even guess what operating system you’re using.
Once they’ve gained your trust, they might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.
Do not trust unsolicited calls. Do not provide any personal information.
Here are some of the organizations that cybercriminals claim to be from:
Windows Helpdesk
Windows Service Center
Microsoft Tech Support
Microsoft Support
Windows Technical Department Support Group
Microsoft Research and Development Team (Microsoft R & D Team)
Report phone scams
Learn about how to report phone fraud in the United States. Outside of the US, contact your local authorities.
How to protect yourself from telephone tech support scams
If someone claiming to be from Microsoft tech support calls you:
Do not purchase any software or services.
Ask if there is a fee or subscription associated with the “service.” If there is, hang up.
Never give control of your computer to a third party unless you can confirm that it is a legitimate representative of a computer support team with whom you are already a customer.
Take the caller’s information down and immediately report it to your local authorities.
Never provide your credit card or financial information to someone claiming to be from Microsoft tech support.
What to do if you already gave information to a tech support person
If you think that you might have downloaded malware from a phone tech support scam website or allowed a cybercriminal to access your computer, take these steps:
Change your computer’s password, change the password on your main email account, and change the password for any financial accounts, especially your bank and credit card.
Scan your computer with the Microsoft Safety Scanner to find out if you have malware installed on your computer.
Install Microsoft Security Essentials. (Microsoft Security Essentials is a free program. If someone calls you to install this product and then charge you for it, this is also a scam.)
Will Microsoft ever call me?
There are some cases where Microsoft will work with your Internet service provider and call you to fix a malware-infected computer—such as during the recent cleanup effort begun in our botnet takedown actions. These calls will be made by someone with whom you can verify you already are a customer. You will never receive a legitimate call from Microsoft or our partners to charge you for computer fixes.
More information
For more information about how to recognize a phishing scam, see Avoid scams that use the Microsoft name fraudulently.
If you need help with a virus or other security problem, visit the Microsoft Virus and Security Solution Center.
To help protect against viruses and other malicious software, download Microsoft Security Essentials.