Port Triggering Initiator v.1.0.0

v.1.0.0
Majorgeeks.com (Primary Download)
(More download options at the bottom of the page)
 

This program is FREE

What is Port Triggering Initiator?
When you use port triggering on your router a connection attempt must be made from your computer to an address on the trigger port. When your router detects the connection attempt your router then turns on the ports, thus you have port triggering, a on/off switch for port forwarding.

Well the problem comes if you are using port trigging for a program that doesn't make a connection attempt, such as say a ftp server or hosting a game. If a connection is never detected the router never enables the ports.

Well that's what Port Triggering Initiator is designed for. You enter the triggering port to make a connection on and give it a address outside your network. Any address will do even if the connection fails its the attempt that triggers the ports.

Some quick notes:

The program doesn't need any information about your router.
The 'Local IP To Connect With' is your local IP, if you have more than one IP on your system it will be detected there.
The triggering address can be any site or IP you like as long as it is a real address.
When setting up a triggering port in your router make sure to use a port that isn't being used on your system. The program has to use that triggering port to make the connection and if it is already in use it can't make the connection.
Triggering ports can be anything you like from 1 - 65535, the triggering port is just a 'on' switch.

If you have any problems or questions just drop a line in the forums!

Majorgeeks.com (Primary Download)
OlderGeeks.com - USA
TechSpot.com - USA

Direct Download

Setup File Info: (2.41 MB)  (MD5 Hash - CD0978D12B9BF207C79C7545E6004EFB)

Screenshots - Actiontec - M1000 (Qwest Firmware)

Screenshots - Netgear - WGR614 v7 (Netgear Firmware)

Netgear - WGR614 v7 (Netgear Firmware)


Screenshot Database

Some screenshots have small distortions that were used to blur out personal info such as IP addresses and usernames.
(Click on a picture to view its full size.)


Start Page

Basic Settings

Wireless Settings

Logs

Block Sites

Block Services

Block Services - Add

Schedule

Email

Status

Attached Devices

Backup Settings

Set Password

Router Upgrade

Advanced Wireless

Port Forwarding

Port Forwarding - Add

Port Triggering

Port Triggering - Add

WAN Setup

LAN IP Setup

Dynamic DNS

Static Routes

Static Routes - Add

Remote Management

UPnP
 

Screenshots - Linksys - WRT54G (Linksys Firmware)

Linksys - WRT54G (Linksys Firmware)


Screenshot Database

Some screenshots have small distortions that were used to blur out personal info such as IP addresses and usernames.
(Click on a picture to view its full size.)


Basic Setup

DDNS

Mac Address Clone

Advanced Routing

Basic Wireless Settings

Wireless Security

Wireless Mac Filter

Advanced Wireless Settings

Firewall

VPN

Access Restrictions

Port Forwarding

Port Triggering

DMZ

QoS

Management

Log

Diagnostics

Factory Defaults

Firmware Upgrade

Config Management

Status - Router

Status - Local Network

Status - Wireless

CS Fire Monitor - Help File

CS Fire Monitor - Help File

CS Fire Monitor

For Windows 2000, Windows XP. Windows 2003, Windows Vista & Windows 2008 

Help File V3

Based on CS Fire Monitor V 2.5.0

Index

General

Monitors

Reports

Settings

Overview

Bandwidth

Bandwidth

Bandwidth

Navigation

CPU

Hardware

Colours

Help

Drives

IP

Email

System Tray Menu

Hardware

Logs

Graph

Remote Viewer

IP

Software

Main

Screen Saver

Memory

 

Mini Monitors

Template Keywords

NetStats

 

Misc.

 

Processes

 

Remote

 

Services

 

Reports

 

Software

 

System Tray

 

Tasks

 

Updates

 

Templates

 

 

Overview

CS Fire Monitor is a comprehensive monitoring tool for the Windows 2000, Windows XP, Windows 2003, WIndows Vista & WIndows 2008 platforms. It has an extensive range of live monitoring screens that capture data from many areas within a PC and since the application has its own inbuilt database it is also capable of producing a number of reports which can be saved in a variety of ways. In addition, the Remote Viewer allows the user to access other PCs on the same LAN or over the Internet to extract key information. The application is highly configurable and incorporates several methods of monitoring the same information so that each user can choose the most appropriate method to meet their needs.

Navigation

CS Fire Monitor, once installed, can be opened by any of the following methods:

  • Start Menu->All Programs->CS Fire Monitor->CS Fire Monitor

  • Double click the CS Fire Monitor Icon on the Desktop if one exists

  • Double click the CS Fire Monitor Icon in the System Tray if one exists

  • Right Click the CS Fire Monitor Icon in the System Tray if one exists and select “Show CS Fire Monitor”

Figure 1

Figure 1 above shows the initial CS Fire Monitor welcome screen. There is a Navigation Bar on the left hand side that allows access to all areas of the application with the exception of the Remote Viewer which is accessed via its own Desktop shortcut and will be explained later. Each of the main application groups is highlighted by a boxed heading and clicking on the heading expands to show the items within that group. Clicking on an item within a group highlights the selected item with a box and shows the relevant screen to the right replacing the welcome screen. The [ ] at the top right hand side of the CS Fire Monitor window maximises the application to full screen size whilst the X closes the application back to the System Tray.

Monitors

Bandwidth Monitor

Figure 2

Figure 2 above shows the Bandwidth Monitor screen. The Bandwidth Monitor table in the middle of the screen detects all connections on the PC and monitors the amount of data going to and from each connection. Current Send Speed and Current Received Speed are displayed in the table and also as activity in the graph at the top of the screen. The vertical axis of the graph is scaled according to settings within Settings->Bandwidth. The activity on the graph is stepping from right to left with each horizontal graduation representing about one (1) minute in time. Double clicking the graph expands it vertically to show more detail; double clicking again returns the graph to the original size. Right clicking the graph displays a menu allowing the graph to be cleared or saved as a bit map.

The total volume of Data Sent and Data Received for each connection is also recorded and stored in the CS Fire Monitor database so that reports can be generated for Data Sent and Data Received during the current Day, over the Last 7 Days, during the current Month and the current Year.

Clicking on the line for a particular connection in the Bandwidth Monitor table will provide the information shown in the lower half of the screen for that interface adaptor. The first two tick boxes in the bottom right hand corner of the screen allow the user to select whether to show Received Speed, Send Speed or both in the graph and the last tick box allows the Connection Name to be shown or hidden in the table.

CPU Monitor

Figure 3

Figure 3 above shows the CPU Monitor screen. The CPU Monitor detects the current CPU usage of the PC and produces this as a graph at the top of the screen. Each vertical graduation represents 20% of CPU usage. The graph is stepping from right to left with each horizontal graduation representing about one (1) minute in time. Double clicking the graph expands it vertically to show more detail; double clicking again returns the graph to the original size. Right clicking the graph displays a menu allowing the graph to be cleared or saved as a bit map. The CPU Monitor also detects the Real Time Speed of the CPU utilising a real time clock as part of the monitor. A lot of other useful information is gathered about the installed CPU. Clicking on “View More Processor Info” reveals another screen shown in Figure 4 below. 

Figure 4

The screen in Figure 4 above has additional tabs that can be selected to reveal CPU Features, Cache and Registers. An additional tab for AMD processors shows Power Management and Address Bit information.

Drives Monitor

Figure 5

Figure 5 above shows the Drives Monitor screen. The Drives Monitor shows the amount of used and free space of the hard drive selected in the drop down list. It gives detailed information for each hard drive and shows total capacity of all hard drives combined. The percent available space is also graphed at the top of the screen. Each vertical graduation represents 20% of available drive space. The graph is stepping from right to left with each horizontal graduation representing about one (1) minute in time. Double clicking the graph expands it vertically to show more detail; double clicking again returns the graph to the original size. Right clicking the graph displays a menu allowing the graph to be cleared or saved as a bit map.

Hardware Monitor

Figure 6

Figure 6 above shows the Hardware Monitor screen. The Hardware Monitor shows all hardware ever installed on the PC that Windows has managed to track. The user may see old hardware that is no longer installed but has not been formally uninstalled through Windows. The monitor also tracks any hardware that has been added or removed. It will then store the changes in the CS Fire Monitor database for future reports. The screen can be refreshed by clicking on the refresh button at the very bottom right hand corner. If the user wants to check for and list any hardware changes to be shown on the right hand side of the screen then tick the “Check For Hardware Changes On Refresh” tick box.

IP Monitor

Figure 7

Figure 7 above shows the IP Monitor screen. The IP Monitor displays Internet IP and/or Local IP addresses. If and when any IP address changes it stores this information in the CS Fire Monitor database. Also the user can enable the email feature within Monitors->Tasks->IP to email themselves or a group of email addresses when the IP address changes and to include the new IP address in the email.

The Add and Remove buttons on the right hand side beneath the table allow the user to edit the table contents. Clicking the table headings will change the list sort order based on that particular information. The “Enable IP Monitor” tick box must be ticked to allow CS Fire Monitor to carry out regular checking of all IP addresses. The “Scan IP Address(es) At Program Startup” tick box can be ticked to make sure that an IP scan is carried out at program startup irrespective of when the next regular scan of IP addresses was to be made.

The “Address To Get Internet IP” field at the bottom left hand corner of the screen specifies the location where CS Fire Monitor obtains “My Internet IP” address from as this must be obtained from an external connection.

Memory Monitor

Figure 8

Figure 8 above shows the Memory Monitor screen. The Memory Monitor displays Physical Memory, Virtual Memory, and Page File statistics. Also shown are the physical memory chips installed and the location and size of each of these. The set of three tick boxes under the graph on the right hand side allows the user to select which of Physical, Virtual and/or Page File are shown in the graph. Each vertical graduation represents 20% of available memory. The graph is stepping from right to left with each horizontal graduation representing about one (1) minute in time. Double clicking the graph expands it vertically to show more detail; double clicking again returns the graph to the original size. Right clicking the graph displays a menu allowing the graph to be cleared or saved as a bit map.

NetStats Monitor

Figure 9

Figure 9 above shows the NetStats Monitor screen. This screen only works on Windows XP and 2003 or newer. If there is no information shown in the Monitor initially, just click on the “Refresh” button at the bottom right hand corner of the table. The screen shows all current network connections on the PC and also which programs are making those connections. This facility uses an undocumented API call that is only available from Windows XP and above.

When using the NetStats Monitor it is handy to click on the [ ] symbol at the top right hand corner of the screen to enlarge the window to full size as this generally saves using the scroll bars. Clicking the table headings will change the list sort order based on that particular information. To show or hide table columns, click on the link “Show & Hide Columns” at the bottom left hand corner of the table. If you click on a particular line in the table it will be highlighted in blue and more information about that particular program will be shown at the bottom of the screen under the heading “File Information”. Clicking on the “Open Parent Folder” link will open Windows Explorer in the relevant program folder. Right clicking anywhere within the table will give options for saving the table of information.

Process Monitor

Figure 10

Figure 10 above shows the Process Monitor screen. This screen shows all running processes and, by clicking on a particular process in the left had panel, detailed process information is shown in the right hand panel. When using the Process Monitor it is handy to click on the [ ] symbol at the top right hand corner of the screen to enlarge the window to full size as this generally saves using the scroll bars. Right clicking on any particular process in the left had panel brings up a menu that allows the user to, amongst other things, End or set the Priority of the process.

Services Monitor

Figure 11

Figure 11 above shows the Services Monitor screen. This screen shows all services running on the PC. When using the Services Monitor it is handy to click on the [ ] symbol at the top right hand corner of the screen to enlarge the window to full size as this generally saves using the scroll bars. To refresh the Services Monitor click the “Refresh” button at the bottom right hand corner of the screen. Clicking the table headings will change the list sort order based on that particular information. Double clicking a particular process will open a supplementary screen with more details of that process as illustrated in Figure 12 below.

Figure 12

Right clicking on any particular service in the Services Monitor screen brings up a menu that allows the user to, amongst other things, Start, Stop, Pause or Resume a service or change the Startup mode.

Software Monitor

Figure 13

Figure 13 above shows the Software Monitor screen. This screen monitors all currently installed software. Also the Software Monitor tracks any software that has been added or removed. It will then store the changes in the CS Fire Monitor database for future reports. To refresh the monitor just click on the “Refresh” button at the bottom right hand corner of the screen. If the user wants to check for and list any software changes to be shown on the right hand side of the screen then tick the “Check For Software Changes On Refresh” tick box.

Tasks Monitor

Figure 14

Figure 14 above shows the Tasks Monitor screen. This screen allows the user to set up a number of Tasks that can be carried out when certain events are detected by CS Fire Monitor. There are three (3) tabbed screens; the first called “Bandwidth” (shown in Figure 14) and two more called “IP” and “Process Priority”.

The “Bandwidth” tab allows the user to email themselves or a group of email addresses each time that the total “Data Sent” exceeds a preset increment as defined in the field at the top right hand corner of the screen (10 MB in the example shown). To activate, the tick box must be ticked and the radio button set for the appropriate email to be sent to themselves or a group of email addresses. Similarly, each time the total “Data Received” exceeds a preset increment as defined in the second field at the top right hand corner of the screen (100 MB in the example shown).

In addition, Alert Window Popups (appearing above the System Tray) can be activated when either of the preset Data increments is exceeded. This is achieved by ticking the tick box at the bottom of the screen. After all the above settings have been made, click the “Apply” button at the bottom right hand corner of the screen.

Figure 15

Figure 15 above shows the “IP” tab in the Tasks Monitor screen. The IP tab allows the user to email themselves or a group of email addresses each time that any Internet IP or Local IP address changes. To activate either, the tick box must be ticked and the radio button set for the appropriate email to be sent. Test emails can be sent by clicking on the “Send Email Now!” buttons.

Figure 16

Figure 16 above shows the “Process Priority” tab in the Tasks Monitor screen. The user can add and remove programs for which the priority can be pre-determined by clicking on the “Add” and “Remove” buttons at the bottom right hand corner of the screen. The “Add” button opens a screen as shown below in Figure 17.

Figure 17

The screen in Figure 17 above allows the user to select a program and preset the priority. The “Remove” button on the main screen (Figure 16) allows a highlighted program in the table to be removed. The time interval  in the “Check Every” field can also be adjusted by the user.

Template Monitor

Figure 18

Figure 18 above shows the Template Monitor screen. This screen allows various reports to be listed so that they can be either saved as and when required, by clicking on the “Save List Now” button, or on a regular basis by ticking the “Enable Auto Save” tickbox and setting an appropriate time interval in the “Auto Save Every” field. If the user wants to refresh the information for each report before saving, then the “Auto Refresh Reports” should also be ticked.

Templates work by CS Fire Monitor loading the nominated template and reading the template for keywords. Once a keyword is found the keyword is replaced with the current data equivalent to that keyword. Text in the template and the data information required are then saved to the output file. The user can make up their own templates and place them in the “templates” folder within the CS Fire Monitor program folder. The user can find and open the file “Template1.htm” in the “templates” folder within the CS Fire Monitor program folder and get the idea. Templates do not have to be “htm” files; they can be just plain “txt” files if that is simpler. The keywords for templates are listed in the Appendix at the end of this Help File.

Clicking on the “Add” button brings up the screen shown in Figure 19 below.

Figure 19

Figure 19 above shows the screen for selecting report templates and specifying output file locations. First click on the “Select Template” button which allows selection of an appropriate template from the “templates” folder within the CS Fire Monitor program folder and then click on the “Select Output File” which allows the user to nominate an output file name and the destination for that file. Each time a save or “Auto Save” action occurs the existing output file of the same name is written over with the updated information.

Reports

Bandwidth Report

Figure 20

Figure 20 above shows the Bandwidth Report screen. When using the Bandwidth Report it is handy to click on the [ ] symbol at the top right hand corner of the screen to enlarge the window to full size as this generally saves using the scroll bars. Clicking table headings will change the list sort order based on that particular information. An added feature in this particular report is that the Date sort order is remembered from one access to the next so that it is always displayed the same way. Right clicking anywhere within the table will bring up a menu allowing the information to be saved in a variety of formats.

The option of displaying Sent Data and Received Data on the basis of Daily, Monthly or Yearly is set by the row of radio buttons just under the table. If the selection is changed then it is necessary to refresh the report by clicking on the “Refresh Report” button at the bottom right hand corner of the screen.

This key report has its own set of auto save options accessed via the “Auto Save Options” button at the bottom left of the screen. Clicking on this button opens the screen shown in Figure 21 below.

Figure 21

Figure 21 above shows the Auto Save Options screen for the Bandwidth Report. A new report can be created by using the “Add” button to open the screen shown in Figure 22 below.

Figure 22

Figure 22 above shows the “Add New Save Option” screen for the Bandwidth Report. Clicking on “Save As” allows the user to nominate a file name and specify a location for the Bandwidth Report. The file format can also be specified at that time (using the “Save as type” drop down list) or separately by using the “Format” field at the bottom of the screen shown in Figure 22. Note that the template for the Bandwidth Report is preset in CS Fire Monitor so there is no need for the user to select a template. Once all settings have been made click on the “OK” button and the new File Name, Format and Save To information should be listed in the screen shown in Figure 21 above. Unnecessary or old reports can be removed by highlighting them in the table and clicking on the “Remove” button.

The Bandwidth Report(s) can be saved on demand by clicking the “Save All Now” button on the screen shown in Figure 21 or alternatively the Auto Save function can regularly save the Bandwidth Report by ticking the box in the bottom left hand corner and selecting an appropriate time interval in the “Auto Save Every” field. Note that previous Bandwidth Reports will be overwritten every time a new report with updated information is saved.

Hardware Report

Figure 23

Figure 23 above shows the Hardware Report screen. This Report shows the date and time when any new hardware was installed or when any hardware was removed. The Report can be refreshed by clicking on the “Refresh” button at the bottom right hand corner of the screen. Right clicking anywhere within the table will bring up a menu allowing the information to be saved in a variety of formats.

IP Report

Figure 24

Figure 24 above shows the IP Report screen. This Report shows the date and time when there was a change to either the Internet or Local IP address. The Report can be refreshed by clicking on the “Refresh” button at the bottom right hand corner of the screen. Right clicking anywhere within the table will bring up a menu allowing the information to be saved in a variety of formats.

Logs Report

Figure 25

Figure 25 above shows the Logs Report screen. This Report shows the date and time when there was any change to the CS Fire Monitor program. The Report can be refreshed by clicking on the “Refresh” button at the bottom right hand corner of the screen. Right clicking anywhere within the table will bring up a menu allowing the information to be saved in a variety of formats.

Software Report

Figure 26

Figure 26 above shows the Software Report screen. This Report shows the date and time when any new software was installed or when any software was removed. The Report can be refreshed by clicking on the “Refresh” button at the bottom right hand corner of the screen. Right clicking anywhere within the table will bring up a menu allowing the information to be saved in a variety of formats.

Settings

Bandwidth Settings

Figure 27

Figure 27 above shows the Bandwidth Settings screen. The first option is for the setting of Bandwidth Speed in bytes per second or bits per second. Note that only Bandwidth Speed has this optional setting; all data volumes are in bytes. The fields labelled “Received Max” and “Send Max” relate to the vertical axis scale of the graph showing Bandwidth Speed in the Bandwidth Monitor. Note these entries are in kilobytes per second. The next tickbox allows the user to ignore the “MS TCP Loopback Interface”; the default is that this interface is ignored. The drop down list allows the user to select which interface connection is shown as default in the Bandwidth Speed graph in the Bandwidth Monitor.

The “Add” and “Remove” buttons at the bottom of the screen allow the user to select connection interfaces for which data does not need to be collected in the CS Fire Monitor database and hence not to be shown in any of the reports. This enables blank lines corresponding to unused connection interfaces to be eliminated from reports. Clicking on the “Add” button brings up the screen shown in Figure 28 below.

Figure 28

Figure 28 above shows the Adaptor Not to Store screen. The user can click on the drop down list and select an adaptor to be excluded from the data gathering process. If already collected data from this adaptor needs to be eliminated from the database then place a tick in the tickbox. When “OK” is clicked the adaptor will be listed in the field at the bottom right hand side of Figure 27. Adaptors can be removed from this list by highlighting and clicking the “Remove” button.

Colour Settings

Figure 29

Figure 29 above shows the Colours Setting screen. This screen allows the user to customise the CS Fire Monitor colour scheme and is basically self explanatory. Colours can be changed by clicking in the coloured square and selecting a colour from the Windows palette. The “Smooth Progress Bars” tickbox removes the graduations from the progress bars on various screens.

Email Settings

Figure 30

Figure 30 above shows the Email Settings screen. There are three (3) tabbed screens; the first is called “Email List” (shown in Figure 30), the second is called “Server” and the last is called “Settings”.

The “Email List”” tab allows the user to set up email groups and add and remove email addresses from these groups. This is achieved by using the buttons down the right hand side of the screen. Each of these buttons opens one of the self explanatory subsidiary screens as shown in Figure 31 below.

                        

           

Figure 31

Clicking on the “Server” tab in the Email Settings screen (Figure 30) opens the screen shown in Figure 32 below.

Figure 32

This screen allows the user to nominate an SMTP server for originating emails and also allows the “Mail From” address to be specified. Examples of the format required are shown under each of the top two fields. If the SMTP server nominated requires authentication then the type of authentication must be selected from the drop down list headed “Type” and the username and password must be entered into the corresponding fields shown as “Username” and “Password”. When you have made the appropriate entries click on “Save Settings”.The radio buttons allow the user to select the email format; Plain Text or HTML. The tick boxes at the bottom of the screen allow the user to firstly include the PC name in the email subject line and secondly, the option to send only one email to groups by including all email addresses within the group in the BCC field of the one email.

Clicking on the “Settings” tab in the Email Settings screen (Figure 30) opens the screen shown in Figure 33 below.

Figure 33

This screen allows the user to customise the contents of all email subject lines by entering the desired text into the “Email Subject Line” field. Additional text can be included in the body of the email by entering the desired text into the “Email Body” field. The Email Body text can include keywords that will replaced with the equivalent data when the email is generated. The radio buttons allow the user to select the email format; Plain Text or HTML. The tick boxes at the bottom of the screen allow the user to firstly include the PC name in the email subject line and secondly, the option to send only one email to groups by including all email addresses within the group in the BCC field of the one email.

Graph Settings

Figure 34

Figure 34 above shows the Graph Settings screen. This screen allows the user to customise the CS Fire Monitor graph and is basically self explanatory. Colours can be changed by clicking in the coloured square and selecting a colour from the Windows palette. The graph width can be adjusted between 1815 and 8535. The tickboxes allow the user to turn on or off the background grid or the grid scrolling effect. The graph style can be selected using the “Graph Style” drop down list.

Main Settings

Figure 35

Figure 35 above shows the Main Settings screen. Most of these switches are self explanatory. The radio buttons under the first item allow the user to select whether CS Fire Monitor runs as a service or as a logged in user application. The two tickboxes associated with CPU speed are not recommended for laptops since the power management continuously changes CPU speed to conserve battery power. The language used for text within CS Fire Monitor can be set using the drop down box at the bottom of the screen.

Mini Monitor Settings

Figure 36

Figure 36 above shows the Mini Monitor Settings screen. Mini Monitors can be turned on by right clicking the System Tray icon and clicking “Mini Monitors”. The user is then presented with a number of options as shown below:

  • Show All Mini Monitors

  • Hide All Mini Monitors

  • Enable Ghost Mode

  • Reapply Topmost Attributes

  • Bandwidth Mini Monitor              >Show/Hide

  • CPU Mini Monitor                       >Show/Hide

  • CPU Speed Min Monitor             >Show/Hide

  • Memory Mini Monitor                  >Show/Hide

Selected Mini Monitors can be moved around the screen to any convenient location. In addition, Mini Monitors can be made partially transparent (Transparent Mode) but still movable by dragging or they can be made ghosts (Ghost Mode with Transparent Mode) such that the user can “click through” the Mini Monitor to the underlying application window. When in Ghost Mode the Mini Monitor cannot be dragged around the screen; Ghost Mode must be turned off before the Mini Monitors can be moved.

The first tickbox on the Mini Monitor Settings screen (Figure 36) is a fairly standard option to enable the Mini Monitors to always be on top of other application windows. When using this setting, the topmost attribute is occasionally lost and, without Ghost Mode enabled, the attribute can be retained by simply clicking on it. However, if Ghost Mode is enabled, then clicking on it will not work and hence the “Reapply Topmost Attributes” option in the Mini Monitors menu found by right clicking the icon in the System Tray and selecting “Mini Monitors”.

The second tickbox is to enable the system wide hotkeys that are detailed on a subsidiary screen found by clicking on the question mark button found alongside this option. The third tickbox allows the user to select whether the bandwidth Mini Monitor shows Data Sent and Received data volumes rather than Data Sent and Received speeds. The fourth tickbox enables Transparency Mode for the Mini Monitors and allows the transparency level to be set. The fifth tickbox enables Ghost Mode (with Transparency Mode) for the Mini Monitors and allows the transparency level to be set.

Misc Settings

Figure 37

Figure 37 above shows the Misc. Settings screen. The first group of tickboxes entitled “Fade In & Out Effects” at the top left of this screen enable fade in and out of the main program screen. The fade time can be adjusted. The group below that entitled “Shadow Effects” enables shadow for the main program screen. Transparency, depth and colour of the shadow can also be set. The last item on the left hand side sets the visible time for the Alert Window Popup and allows you to test the effect by clicking on the “Test” button.

The tickboxes in the top right hand corner of the screen are a miscellaneous group of options that are basically self explanatory. Try clicking the “Roll In & Out” effect tickbox and see what happens when you try navigating between items within the Settings group. The “Disable Alert Window Popups tickbox does exactly as it states. This option can also be set by right clicking the CS Fire Monitor System Tray Icon and selecting “Disable Alert Popups”. The “Enable Snap To Grid” tickbox makes alignment of the Mini Monitors easier. The “Enable Program Transparency” tickbox allows the main program screen to be transparent with the level set by the up and down arrows to the right. The “Date Format” drop down list and the “Time Format” radio buttons allow the user to select their favourite date and time formats to be used throughout CS Fire Monitor.

Remote Settings

Figure 38

Figure 38 above shows the Remote Settings screen. This screen can also be accessed by right clicking the CS Fire Monitor icon in the System Tray and then clicking on “Remote View Settings”. The first tickbox in the screen enables the remote feature and allows others to use the CS Fire Monitor Remote Viewer to access this PC to obtain certain statistics. Details of any connection currently accessing this PC would be listed in the table at the bottom left hand corner of the screen. If the user only wants certain IP addresses to access using this function then tick the box labelled “Only Let Allowed IP’s Connect” and then right click in the column headed “Allowed IP’s” and enter the appropriate IP address(es). If the user just wants to ban certain IP addresses from using this function then untick the box labelled “Only Let Allowed IP’s Connect” and then right click in the column headed “Banned IP’s” and enter the appropriate IP address(es).

The CS Fire Monitor Remote Viewer will be described later in more detail under its own heading.

Report Settings

Figure 39

Figure 39 above shows the Report Settings screen. This is a simple configuration screen that allows the user to select which items of information should be written to the Reports. This applies to the Reports within CS Fire Monitor and those saved or auto saved to file using templates. The CS Fire Monitor database stores all these items irrespective of whether they are ticked or not ticked in this configuration screen.

System Tray Icon Settings

Figure 40

Figure 40 above shows the System Tray Icon Settings screen. If the top tickbox on the right hand side labelled “Show CPU Usage Icons” is unticked, the CS Fire Monitor System Tray Icon can be selected using the slider at the bottom right hand corner of the screen. There are 22 possible CS Fire Monitor icons to choose from. Ticking the top tickbox on the right hand side labelled “Show CPU Usage Icons” replaces the selected icon with a green rectangular icon containing the CPU occupancy in percent. The rectangular icon changes colour to orange when CPU occupancy exceeds 90% and changes to red when CPU occupancy exceeds 95%.

If the cursor is placed over the CS Fire Monitor System Tray icon a Tooltip comes up that can show a variety of information. The remaining options in the System Tray Icon Settings can be selected or not depending on what information is required to be shown in this Tooltip.

Help

About

Figure 42

Figure 42 above shows the “About” screen which is basically the same as the initial welcome screen. This screen shows the current version of CS Fire Monitor. 

System Tray Menu

The System Tray Menu is accessed by right clicking the CS Fire Monitor System Tray Icon. The user is then presented with a number of options as shown below:

  • Show CS Fire Monitor                                        Opens CS Fire Monitor main program screen

  • Remote View Settings                                        Already discussed under Remote Settings

  • Quick Tools

o         Clean System Memory (Takes 5 Sec.)          Cleans System Memory

o         Copy “My Internet IP” To Clipboard                Does as it states

o         Copy “My Local IP(s) To Clipboard                Does as it states

o         Send Email – “My Internet IP”                       Does as it states, Uses The Tasks Monitor Settings

o         Send Email – “My Local IP(s)                       Does as it states, Uses The Tasks Monitor Settings

  • Mini Monitors                                                     Already discussed under Mini Monitor Settings

  • Disable Alert Popups                                          Already discussed under Misc. Settings

  • Donate By PayPal                                             Thanks very much!

  • Exit & Close Program                                         Exits and closes CS Fire Monitor

Remote Viewer

CS Fire Monitor Remote Viewer, once installed, can be opened by either of the following methods:

  • Start Menu->All Programs->CS Fire Monitor->CS Fire Monitor Remote Viewer

  • Double click the CS Fire Monitor Remote Viewer Icon on the Desktop if one exists

If the Remote Viewer senses that there is Multiple IPs available it will show the screen in Figure 43 below.

Figure 43

The user can either select one of the IP addresses in the drop down list and click “OK” or just close the window with the X in the top right hand corner and the Remote Viewer will use the Windows default connection. The screen in Figure 44 below should then come up.

Figure 44

The user can then click on the “Quick Connect” icon under the “Main” heading in the navigation bar on the left hand side to get the screen shown in Figure 45 below.

Figure 45

Enter the IP address of the PC to be monitored and click on “Connect”. The next screen that comes up should look something like the one in Figure 46 below.

Figure 46

Most of the information shown on the subsidiary screen labelled “ALISONF – 192.168.0.12” in Figure 46 is self explanatory. Clicking on the “Show Bandwidth Totals From Bandwidth Reports” button (picture of a pie-chart) at the bottom right hand corner of the section titled “Bandwidth” provides the additional superimposed screen of information shown in Figure 47 below.

Figure 47

There are two more buttons in the “Physical Memory” section of the subsidiary screen in Figure 46. The first of these looks like a picture of an Integrated Circuit and is the “Clean System Memory” button; an action that takes approximately 5 seconds. The second button in the “Physical Memory” section, with a picture of binoculars on it, is the “List Top 5 Memory Using Processes” button. Clicking this button gives the additional superimposed screen shown in Figure 48 below.

Figure 48

At the bottom of the screen shown in Figure 46 there is a button labelled “Add To Group View”. Clicking on this button adds the PC the user is currently monitoring to a “Group Remote View” screen as shown in Figure 49 below. This feature allows the user to monitor a number of PCs from the same screen. An individual PC can be selected by highlighting and then the buttons for Bandwidth Information, Clean System Memory and Top 5 Processes can be used from the Group Remote View screen for that particular PC.

Figure 49

Instead of using the using the “Quick Connect” screen as in Figure 45, the user can also connect to a remote PC by clicking on the “Stored Connects” icon under the “Main” heading in the navigation bar of the screen in Figure 44. This opens the screen as shown in Figure 50 below.

Figure 50

To connect to an already stored computer IP address it is only necessary to double click the IP address shown in the “Stored Computer Names & IP’s” table. Additional IP addresses can be added to this table by entering the IP address in the field at the top right hand corner of the “Stored Computer Names & IP’s” screen and then clicking on “Add To List”. Unwanted IP addresses in the list can be removed by highlighting the IP address and then clicking on the “Remove” button at the bottom right hand corner of the screen.

If the user wants to automatically open connections to certain PCs when CS Fire Monitor Remote Viewer is started then it is necessary to go into “Settings” screen from the navigation bar in Figure 44 and tick the item “Auto Start All Checked Items in Stored Connects At Program Startup” (see Figure 51 below). Then in the “Stored Computer Names & IP’s” screen shown in Figure 50 tick the boxes next to the IP address(es) for those PCs that the user wishes to automatically connect to when opening CS Fire Monitor Remote Viewer.

Figure 51

The “Start Program Maximised” option in the “Settings” screen shown in Figure 51 is self explanatory.

The “Help” icon in the navigation bar of the CS Fire Monitor Remote Viewer” screen in Figure 44 contains an “About” icon that opens a screen to show the version number of the CS Fire Monitor Remote Viewer.

Screensaver

The CS Fire Monitor can be used as a Windows screen saver. To set this up the user needs to go into the Windows “Display Properties” in the usual way and then find “Csfiremon” in the Screen Saver drop down list and select it. Note that CS Fire Monitor program must be running for the screen saver to get the necessary data.

CS Fire Monitor V 1.6.1 and later can be started as a service. If CS Fire Monitor is running as a service the user can change the default logon screen saver to the CS Fire Monitor screen saver using this easy method from Microsoft:

http://support.microsoft.com/kb/314493

Appendix

Keywords for templates:

##currentversion##

##autoupdatenabled##

##autoupdatelastchecked##

##autoupdatenextcheck##

##smtpserver##

##templatecreationtime##

##templateinterval##

##templatenextcreationtime##

##bandwidthselectedconnection##

##bandwidthselectedconnectiontype##

##bandwidthselectedcurrentsendspeed##

##bandwidthselectedcurrentreceivedspeed##

##bandwidthselecteddatasent##

##bandwidthselecteddatareceived##

##bandwidthselectedinterfacedescription##

##bandwidthselectedinterfacetype##

##bandwidthselectedinterfacespeed##

##bandwidthselectedphysicaladdress##

##bandwidthselectedadminstatus##

##bandwidthselectedoperationalstatus##

##cpuusage##

##cpuspeed##

##cpurealtimespeed##

##cpuvendorid##

##cpumanufacturer##

##cpuname##

##cputype##

##cpufamily##

##cpumodel##

##cpubrand##

##cpustepping##

##cpulogical##

##cpuapicid##

##cpuserialnumber##

##driveletter##

##drivesize##

##drivetotalfreespace##

##driveavailablefreespace##

##driveusedspace##

##drivepercent##

##drivenumberofdrives##

##drivecombinedsize##

##ipmyinternetiplastip##

##ipmyinternetipcurrentip##

##ipmyinternetipinterval##

##ipmyinternetiplastchecked##

##iplocaliplastip##

##iplocalipcurrentip##

##iplocalipinterval##

##iplocaliplastchecked##

##memorytotal##

##memoryused##

##memoryfree##

##memorypercent##

##memorytotalvirtual##

##memoryusedvirtual##

##memoryfreevirtual##

##memorypercentvirtual##

##memorymaxpagefile##

##memoryusedpagefile##

##memoryfreepagefile##

##memorypercentpagefile##

##bandwidthreport##

##hardwareinstalledreport##

##hardwareremovedreport##

##ipreport##

##logreport##

##softwareinstalledreport##

##softwareremovedreport##

Using The Power Of The Windows Task Scheduler

One of the most powerful, overlooked and unrealized tools in windows is the task scheduler.
I will be going over some points and info of the latest version of the task scheduler starting with Windows Vista & newer.

The task scheduler is more powerful that people realize. I will be using screen shots of the config of my cleanmem tool.

The first section we see here is the general tab. As you can see we can choose what account to run the program under,
if we want to have it only run when logged in or not, run with highest privileges and to run it hidden.
All of these settings are self explanatory. But what is great is if you are running a server such as 2008 and need to have a program run
without logging in during startup, but that program doesn't have a run as a service option this Task scheduler is your answer.

The next 2 screens is the triggers screen. These screens allow us to set all the triggers we need. Which as you can see gives us a lot of options!

Now that we have the triggers set now we can choose what action to take when a trigger is set off.
In this case we are going to start a program, but we have 2 other options, sending an email or displaying a message.
The other 2 options can be a great resource for a admin in a network environment.

The conditions tab gives us even more control, some good options for when running on batteries such as laptops or if the power is out and the computer is running on battery backup, if your opening a cpu intensive program and on battery it will such the juice dry!
Extra options such as when the computer is idle and when a network connection is active.

The settings tab now gives us some more control over the program we are running. what is the nicest part is the last option.
Do not start a new instance of the program if it is already running. This handy little option will allow you to make a scheduled task for a program and try to run it every 1 min or so, if the program is running it skips it, this is a great way for admin's and such who need to make sure a program is always running. Not to shabby!

And finally the history tab, a nice look at how things have been going and keep an eye for any errors. A technicians dream when wanting to make sure everything is running right.

As you can see the Windows task scheduler is surprisingly powerful, and gives you the kind of automated control you need.
You can run anything you like, defrags, system scans, anything you require. And when the programs have command line options like my cleanmem does where -5 means for it to wait 5 sec before it runs gives you even more automated control.

For the standard home user this may seem like a tool you don't need, but that's not true, you can schedule all your system maintenance to run automatically at night while your asleep, and then once its all done to shutdown your system.

And of course for a tech or admin's point of view this little tool can be a life saver when needing to keep things running smooth on anywhere from 1 to 1000's of systems.

If you need any help or have any questions drop a post in the forums.
-Shane

IP/DNS Tricks & Fixes

Fix 1:
Ever been in windows and you tried to browse to a network share or load a web site and it stops working?
This can happen allot with windows as its dns cache can become corrupted. This easy fix will clear it out and get you going without having to reboot.

Open a command prompt window or open the run command. Then simply put in "ipconfig /flushdns" without the " of course. This will tell windows to flush its dns cache. You will notice network shares, web sites, and other things network related will start working again.

Fix 2:
Your computer has retrieved its ip address from a DHCP, say a router or such, but when you change your connection
(in my case I changed the ip of my router) windows can no longer get an ip address unless you reboot. This is because windows is trying to get its ip from the last ip of the dhcp it retrieved it from before. In order to have windows get a new ip from a available DHCP server you have to clear out the one you currently have.

Open a command prompt window or the run command and type "ipconfig /release & ipconfig /renew" on one line in the command window without the " to do both release and renew in one hit. Windows will release and forget the last ip info you had including the DHCP server and the look for a new one. No more having to reboot.

Trick 1:
Ever had a need to change your internet ip address? Say someone is trying to hack you or you got banned by your ip on a game. Well if your ISP doesn't give you a static ip (most don't unless you pay more) then this trick will be easy and fast.

How a router or cable modem gives an ip address based on a mac address (a address for your network card). In windows (if you don't use a router) and most routers have a way to let you specify what the mac address should be.
Example would be say I have a cable modem connected to my router, I login to my router and change my mac address to something else (changing it by one letter works). I then reset my modem (as most isp's only give out one ip address, so you need to power cycle it to have it forget the last mac address it gave it to) and once all comes back up I have a new ip. It may sound difficult but once you do it you will see how easy and fast it can be to change your ip.

Trick 2:
Use a different DNS. Some of you may have noticed your isp (like charter) injecting ads and other thins into web pages. This is because you are using there dns. (DNS is a way for your system to say ok what's the address for google.com so I know where to go) Well there is a free alterative to using you ISP's DNS and that's http://www.opendns.com/

Follow there instructions and your good to go. I don't like the idea of my isp monitoring where I go and do through there dns so they can inject ads, no thx!

If you have any more info to add to this how to please contact me and let me know!

-Shane

Setting Up Proper Backups

Note: This is simply the way I setup backups, not everyone in the world is going to agree with me, and you don't have to do everything I do step by step, learn from it as a foundation, make changes as you see fit for your situation.

One of the most common things I see when I am taking care of new customers and setting up there backups is how
there backups are setup wrong. Some have even had horribly expensive backup systems setup where there last computer tech "told" them they needed, in other words the old tech made some $$$.

That kind of stuff drives me nuts! in this how to, I'm going to explain how I setup my customers on their backups.
This example will show how I setup a business, but you can easily use it for home backups as well.

I will go over Do's and Don't's and explain why I do the things I do.

First let take care of some myths I keep hearing people say about there backups and what local computer stores tell them to do.

Myth 1:
You have to backup your entire drive, no matter how big!
The Truth:
Like hell you do, the only thing you need to backup is what can't be replaced. So all my pictures, and doc's, things I created I need backed up, I don't need to backup files that will be put back on when I reinstall the software. When you backup the things that can easily be put back onto a system (Example: Quickbooks, you only need to backup the company files, not the entire quickbooks program!) you end up making your backup much much larger, which in turn requires more time to backup, and larger backup media (in most cases, a external hard drive). Now some people might say, well if my system crashes I want to be able to restore my whole system. Now thats sounds like a good idea, but for starters I always have mirrior hard drives setup if possible, but besides that if your system is infected with spyware or a virus or even data corruption there is a good chance thats going to get backed up as well, plus when your system gets older and your motherboard or something fails, and the only option you have is a new system, restoring windows isnt really an option. To me i would rather do w reinstall fo windows then resotre my backup, this way I know I have a fresh clean system, and my files ready, but again not everyone will agree with me, this is just how I feel about it after seeing so many pointless LARGE backups over the years.

Myth 2:
You have to take your backups off site.
The truth:
Have you not read the news? all these laptops, and hard drives, tape backups getting stolen. Not to mention on a hot summer day you forgot to take it out of your car and you have a dead backup. The only reason people take backups off site is in case of a fire or flood. Have they never heard of a fire/water proof safe? They are not very expensive, and can be bolted to the floor, now you are protected from theft/fire/flood and your backups are where they should be incase of a data disaster, by the machine the data needs to go on! Not back home on you kitchen counter cause you forgot it. (I've seen it happen!).

Myth 3:
Backup systems cost tons of $$$
The truth:
No they don't! When you go and look around for a backup system on the internet or from a local computer company they always try and sell you these very pricey backup systems. The point is most people only need one kind of backup. They need there files backed up and safe, that's it. I will be going over how I do this and how it doesn't cost very much. A little know how can carry you a long way.

Ok now I will go over how I setup my backup systems. Every thing is setup automatically and runs without user input.
First off the software of my choice for doing backups is Genie Backup Manager - www.genie-soft.com. I have been using this software for a while now and I really like it, one great thing about it is the email feature, after backup is done I have it email the right people so they know the backups are good on a daily basis, if any backup fails my customer calls me and I go find out why.

Now the hardware I use is 5 external Seagate hard drives (They have a nice 5 year warranty), and I use a fire/water proof safe.
You don't need a large safe, the one I picked up at my local Costco was about $230. Now why 5 hard drives? I mark each one for each day of the work week, Monday - Friday. First off you can never have to many backups, but this also gives us the option of going back up to 5 days in case we need to for backups. 4 of the drives remain in the safe at all times, while the one for the current day is hooked up to the system (I will go over this more in a bit) Now here is a trick with the safe, don't place the safe in the middle of a room, keep up to a wall. If the place was to burn down the walls will burn away moving the fire away from the safe faster, if the safe is in the middle of the room your just going to cook it like it was in a oven in the event of a fire.

Ok so now we have the software and the hardware to get the job done. As you can see it didn't cost us a month's pay. In total depending on prices everything we need combined should be well under $1000. And now this is for a business, for home (like mine) i only use 2 external hard drives, on avg. this lowers the cost by around $300 as the drives are normally $100 each.) Now we just need to get everything setup and config. Which isn't very hard, just takes a little time. So lets begin.

Ok in this example i'm going to use a setup of one of my customers I just finished. So in this case we have a server machine and 4 workstations. So we are going to install the backup software (you can use what you like, even the built in windows backup, no matter what software you use try to get one that can email you when the backup is done) on all 4 workstations.
On the server we will have a shared folder, and in the shared folder will be a folder for each workstation where the backups will go. So on all the workstations we config the backup software to backup the whole user profile (XP: C:\Documents and Settings\Username, in Vista: C:\Users\Username) By grabbing the whole profile we keep the backup as small as possible since we don't need everything, also this grabs all favorites, docs, email, normally just about everything the user has made. We then config the backup to store the backup on the server example path: \\server\share\workstation_folder_name. Once that is setup we config the backup to run every night on a set time, in my case I set it for 7 pm, the business closes at 5 pm, change this to fit your needs. So we set this up on all 4 workstations, now at 7 pm every night the 4 workstations will backup to the server. I also have the backup software set to shutdown when done. No point in having a system run all night long when no one is using it.

So at this point the workstations are done, not to hard huh? Now we need to setup the server. This is nearly the same with only a few small changes. We have one of the external drives hooked up, this will give us a drive letter (normally E:, depending on the system) We now config the backup software on the server to backup the workstations backups plus anything else we need backed up off the server to the E: drive (or what ever letter the external drive is) and we set this on a schedule to run say at 1 am. (this gives plenty of time for the workstations to finish there backups.) And of course we have the backup software setup to email the status of the backup every night. That's it, no very hard is it?

So lets recap what we have here. On all 4 workstations when the people leave you have them leave their systems at the desktops, and let the people know anything they want backed up has to be put inside my documents, or on the desktop.
Then on the server is the same way, so all the person in charge of the backups has to do every morning is come in, unhook last nights drive, put it in the safe and plug in today's drive, and then not worry about again till tomorrow.

So now we have a fully automatic, protected backup system in place. Each workstation and server is setup to email who ever you wanted so everyday they will know if there was a problem with the backup, other than that the backups are now a set it and forget it situation, the ideal situation.

For home users with only one computer you can do something similar but more scaled down, but still automatic and protected.

Again this is simply how I do things, I have a lot of customers and I cant be running around checking and doing backups all day. I need them all running automatically and I only need to worry about them when something fails. so take my example and learn from it, change it to your liking and situation, make it your own. But just know you can have a truly automatic, protected backup system in place without spending a ton of money and thinking you need to be doing it everyday.

If you have any questions or comments drop a post in the forum!

-Shane

The Neat Little Trick About Dirty Electricity

Now here is a neat little trick when your system is going haywire for no reason and out of the blue.

(Edit: After a nice debate with fellow techs , as you can read down below, The trick works great, but the reason why it works is what was at debate. The way I was taught on the reason why can not be confirmed or denied. But a good reason which can be confirm is listed below. I am always open to learning new things and even correcting things I think I already know :-) )

By Criz:

Regarding your friend, here is a good quote regarding this very issue from experts-exchange.com. Sorry it's subscription, so I can't post the direct link:
"If I want to do a "true" cold boot on an ATX computer, I always unplug the computer and wait at least 10 seconds. The fact is, even when you hit the off button to your computer (unless its AT based), you are still receiving 5+ volts to the motherboard and PS. True that your disks do spin down, but in a sense the computer is not 100% powered off."
So until you unplug (hitting the off switch on a power strip will do the same thing) your computer powersupply and motherboard will likely still be "on".
Therefore, if your motherboard is in some kind of error state (and anything integrated on it, or plugged into it, such as NICs, soundcard, video etc) the motherboard would not get fully reset with a simple shutdown.
I haven't been able to find anything that demonstrates mutated electrons *don't* cause computer crashes, but here's one of the few places that mentions them, which I don't think would happen anywhere near your computer:
http://www.i-b-r.org/ir00019c.htm

By Evan:

I was trying to back up what you said. I haven't seen your trick in practice and it fixing something (other than routers and modems), but I've read plenty on the concept. Basically what you're saying (and what I tried to convey) is that you're method is the only way to etirely ensure all electricity has been purged. It comes down to draining the capicitors.
Now whether there are mutated electrons or just a confused piece or hardware or instruction (I guess like a stuck pixel in an LCD screen) I can't say with certainty. The point is as long as the computer is plugged in the PSU is receiving power. You could test this by plugging in a computer and using a multi meter and check various components.
The capicitors in a PSU and a CRT monitor hold enough juice (even "long after being turned off") to kill you. That is why they are considered field replaceable units and unless you are specifically trained in how to drain them and work on them you just replace it. That CompTIA A+ stuff for ya. :)
If I looked a little I could find a quote from Scott Mueller from his Upgrading and Repairing PC's (18th) edition, but I couldn't provide a link. Speaking of him you could always look through his forum...at http://forum.scottmueller.com
-Evan

My Response:

I think the both of you are right and it makes perfect sense.
When a piece of hardware is in a error state of some kind, or just not working right for that matter a reset is needed. As long as the system has power a true reset can not happen. Thus removing all power and draining it does the trick as now everything is cleared out. The hardware runs off of electricity and as long as it is getting it its not being reset. Now what causes this to happen is at this point (without some hard proof) unknown. I was told mutated electrons as this seem to happen a lot after power surges and such. But no matter the reason the point still stands. Draining the power is a good trick to know.
I will update the page shortly.
-Shane
 

Original Page info:

Let me give you a true story, a customer of mine had 2 computer systems in there office. One morning they come in and one of the systems wont boot, it would freeze at the bios screen when checking memory (Think memory error? wrong) Then the 2nd system had been on all night and was acting strange, internet going horribly slow, network to a crawl, programs running slow, just crazy. So they reboot the computer and guess what it freezes during boot up also.They give me a call and are all panicked that both there systems went down over night. I told them don't worry I think I know what happened.


Here what's I told them to do. Go to both systems and pull the power cord out of the back of both of them. Now with both unplugged try to turn them on. This will drain the power that is left inside of them. Now plug them back in and turn them on. And both systems booted fine and they have been good to go. Well you might ask WTF? How did that have anything to do with it? The answer: Dirty Electricity. When you get a power surge or other form of power corruption the electrons can mutate. Now since the systems run off the power naturally they will be affected. This is also why so many tech support places for modems, routers and the like always have you unplug the unit for 60 sec or more, they are draining the power from the box. Believe it or not half the time the problems are fixed by simply resetting the power. So as a first step trick to trying to find out why a systems hardware seems to be going crazy on you out of no where, try this trick. So for you people out there that take your computer to a repair shop but once there your system is running fine, well now you have your answer.


Since the power was unplugged and got reset by the time its at the shop everything is working fine. So add this simple yet effective little trick under your tool belt.

-Shane

Should I Turn Off My Computer (Most commonly asked question)

(Grammar Corrections By Evan J.)

One of the most common questions a customer asks me is: “Should I leave my computer on all the night or shut it off?”

The quick answer: Turn it off.

Now here is why. When I first got into computers I was taught the best thing for a system is to leave it on. That's why you hear so many techs tell their customers that. But no one ever asks why. Well I did, and here is the background story of why from where I learned it.

When computers were first hitting the market, a computer would cost anywhere from $3000 to $4000+. They had a life span of about 8+ years. Well every time you turned on a computer that first jolt of electricity would wear down the components inside. Thus, instead of the system lasting 8+ years, it would only last for 3 - 5 years. And at $4000+ leaving it on made a lot of sence!

Well times have changed, hardware has changed, and cost has really changed! It just doesn't make sense to leave a system on if it will be left, unattended, for more than an hour.

When systems are so much cheaper and hardware has been improved upon, all you’re doing is raising your electric bill and wearing out a system that's not even being used.

So, unless you are running a server or have a good reason to leave the system on 24/7, turn it off. You will save money on your power bill, help out the environment, and your system will last a little longer since it’s not being used. The worse I've seen is a customer who loved having the 3d fish screen saver on. She left town for 2 weeks, left her computer on (never went into standby) and the screen saver, using 100% cpu and pushing the video card to the limit for 2 weeks straight, ran the whole time.

Anyways, it is up to you on what to do, but with the cost of everything today, leaving a computer on when you don't need it is just not worth it.


Update:
I was taught about the components wearing out a long time ago, and in the 17 years I have been in computers no one could tell me which components.

I had a user email me and give me more details on exactly what was happening and why it doesn't happen any more, and why leaving your computer on all the time doesn't extend its life. Thanks for the details Guy!

From Guy:
"I read the article “Should I turn off my computer”. I agree with everything you wrote except your reasoning “Well every time you turned on a computer that first jolt of electricity would wear down the components inside.” Back in the early and mid 1980’s most motherboards were constructed differently using numerous integrated circuit chips that were pushed into sockets. These ICs were the kind with little metal legs extending from them. The sockets themselves were soldered to the motherboard. A Google Image search of “ic” and “ic socket” will show what they look like.

When the pc was turned on the circuits would warm up, and when turned off the circuits would cool down. The contraction and expansion caused between the circuit legs and the metal connectors in the sockets would create a situation where the chip could slowly “creep” out of its socket This caused circuit failure and possible damage. The effect was enhanced as the ambient temperature spread increased between day and night. This led to the term “chip creep”.

When the tech people figured out the problem they would usually push on the chips to reseat them any time they had a pc open. Customers wanted a work around against repeated repairs just to push in ICs, so the techs would suggest leaving the computer on all of the time. This reduced chip creep to almost nothing. Over time this became one of those things that everyone “knew” they should do, but didn’t know why. As time went by (the 90’s) the circuit manufacturers miniaturized allowing more and more to be put on the motherboards and doing away with peripheral cards. Since sockets were no longer needed there was no longer any reason to leave the pc on. These days the only component affected by a heavy on/off cycle would be the power supply, but even they hold up much better than way back when due to design improvements."


-Shane

Pages

Subscribe to PcWinTech.com™ RSS