What’s the Difference Between “Image” and “Clone”? – 

The difference between image and clone is both simple and confusing, because the terms are used interchangeably to mean different things.

Image and clone are two very confusing backup terms.
One reason is a deep, dark, dirty little secret of the industry: we don’t all agree on what these two terms mean. Quite literally, one person’s clone is another person’s image, and vice versa.
It gets confusing, and if you’re hearing different things from different people, that’s why.
I’ll provide what I believe are the most accurate and common definitions. Hopefully, that means you’re more likely to hear people agree than disagree with what I’m saying.


Source: What’s the Difference Between “Image” and “Clone”? – Ask Leo!

Use Windows 7 Event Viewer to track down issues that cause slower boot times

Greg Shultz shows you how to use some of the new features in Windows 7’s Event Viewer to investigate a slow boot time.


Windows 7’s Event Viewer includes a new category of event logs called Applications and Services Logs, which includes a whole host of subcategories that track key elements of the operating system. The majority of these subcategories contain an event log type called Operational that is designed to track events that can be used for analyzing and diagnosing problems. (Other event log types that can be found in these subcategories are Admin, Analytic, and Debug; however, describing them is beyond the scope of this article.)

Now, within the operating system section is a subcategory titled Diagnostic-Performance with an Operational log that contains a set of a Task Category called Boot Performance Monitoring. The Event IDs in this category are 100 through 110. By investigating all the Event ID 100 events, you will be able to find out exactly how long it took to boot up your system every time since the day you installed Windows 7. By investigating all the Event ID 101 thru 110 events, you will be able to identify all instances where boot time slowed down.

Getting started

You can find and launch Event Viewer by opening the Control Panel, accessing the System and Security category, selecting the Administrative Tools item, and double-clicking the Event Viewer icon. However, you can also simply click the Start button, type Event in the Start Search box, and press Enter once Event Viewer appears and the top of the results display.

Check out the full article.

via Use Windows 7 Event Viewer to track down issues that cause slower boot times – TechRepublic.

Missing Drivers for a dc7800p and Windows 7 | DIYTechTools.com

For reasons none of us will ever understand, though HP offers drivers for the dc7800 and Windows 7, there are a few drivers missing from the HP download page. Specifically, the HECI and LMS_SOL devices appear, after installation, with yellow check marks (no drivers installed). If the names of these rascals don’t ring a bell, they are identified in the Device Manager – as I recall – as  ”Unknown Serial Port“, and, “Unkown Device“.   It’s something like that – and a problem for pretty much everyone.
See more at:

Missing Drivers for a dc7800p and Windows 7 | DIYTechTools.com


by The Windows Club

When it comes to the Internet, there is nothing called 100% security. One of the best method to keep Hackers out of your computer, would be to turn off Javascript and Flash as these two are widely used to inject malicious scripts into your system.

But that may be impractical for some, as the Internet relies on Javascript and Flash for quite a few features or functions – from logging in to websites, to browsing, serving search functions and more. Turn off Javascript and you will find that you cannot do much on the Internet. So how do we keep hackers away? Here are some tips to prevent hacking without having to restrict yourself by turning off Javascript and Flash.

Apart from following the basic steps like keeping your Windows operating system and software up-to-date, keeping your Firewall turned on, using a good antivirus software or a Intenet Security Suite, here are a few precautions you should follow.

Turn off JavaScript and Flash
If you can disable JavaScript and / or Flash, good! It will make your system more secure. There is also a Group Policy setting to disable Java.

Use a strong password for user and online accounts
Easy passwords make it easier for anyone to log into your account and take it over. In most cases, the hackers will change the password after taking over your machine so that you cannot log in. What happens afterwards to reclaim the machine is a tedious process. It is always recommended to use strong passwords, that contain alphanumeric characters and also include special characters.

You can force it on the Windows users to harden the login password policy and create a strong password. You can also make it possible that the account is locked down after three attempts. Read our article on restricting login attempts.

For online accounts, I will recommend using a password manager software such as LastPass that generates secure passwords and stores them safely so that you can use them without having to remember each. Further, it is better to have different passwords for different sites so that if one account is compromised, others are still safe. The first among all tips to prevent hacking is to use a strong password.

Remove crapware
You never know what kind of programs are installed on your computer when you buy a new one. Lenovo presented a good example by installing Superfish that made it possible for cybercriminals to initiate Man in the Middle Attacks. A new computer comes with plenty of software that you won’t ever need. The first step after getting a new computer is to remove all crapware and the programs that you won’t need. There are certain third-party crapware removal tools that let you decide what programs to keep and automate the removal of crapware. You can use any such program or you can remove unwanted programs and toolbars manually. The manual method is safer though it takes some perspiration on your part. If you see a program that you can’t understand, it is better to consult someone and then remove it.

Article Continued Here