There are thousand of problem in the personal computer could have, from an endless list of possible error to various hardware failure. Most of those problem might have several possible causes are:
Check
files system for errors
A file system is a method of
storing and organizing computer files and their data. Essentially, it organizes
these files into a database for the storage, organization, manipulation, and
retrieval by the computer's operating system. File systems are used on data
storage devices such as hard disks or CD-ROMs to maintain the physical location
of the files. Beyond this, they might provide access to data on a file server
by acting as clients for a network protocol, or they may be virtual and exist
only as an access method for virtual data. It is distinguished from a directory
service and registry. Most file systems make use of an underlying data storage
device that offers access to an array of fixed-size physical sectors, generally
a power of 2 in size.
The file system is responsible for organizing these
sectors into files and directories, and keeping track of which sectors belong
to which file and which are not being used. Most file systems address data in
fixed-sized units called "clusters" or "blocks" which
contain a certain number of disk sectors (usually 1-64). This is the smallest
amount of disk space that can be allocated to hold a file. However, file
systems need not make use of a storage device at all. A file system can be used
to organize and represent access to any data, whether it is stored or
dynamically generated.
However, the file system has to show how to use
model checking to find serious error in file systems. Model checking is a
formal verification technique tuned for finding corner-case errors by
comprehensively exploring the states spaces defined by a system.
File system
have two dynamics that make them attractive for such an approach:
- First, their errors are some of the most serious, since they can destroy persistent data and lead to unrecoverable corruption.
- Second, traditional testing needs an impractical, exponential number of test cases to check that the system will recover if it crashes at any point during execution. Model checking employs a variety of state reducing techniques that allow it to explore such vast spaces efficiently.
To
resolve this error, User could download Mini-Tool Partition Wizard at Mini-Took Partition Wizard Download Center which is totally free for home and personal user. The following is a demonstration on how Mini-Tool Partition Wizard checks
partition error.
This is the initialization
interface of Mini-Tool Partition Wizard.
Two
options are available in this window: "Check
only. (Do not fix detected errors.)" is to check errors of
file system clearly; "Check & fix detected
errors" is to check as well as repair errors of file
system.
Or in other way to resolve the file system by:
You can help solve some computer
problems and improve the performance of your computer by making sure that your
hard disk has no errors.
- Open Computer by clicking the Start button , and then clicking Compute
- Right-click the hard disk drive that you want to check, and then click Properties.
- Click the Tools tab, and then, under Error-checking, click Check Now. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
- To automatically repair problems with files and folders that the scan detects, select Automatically fix file system errors. Otherwise, the disk check will simply report problems but not fix them.
- To perform a thorough disk check, select Scan for and attempt recovery of bad sectors. This scan attempts to find and repair physical errors on the hard disk itself, and it can take much longer to complete.
- To check for both file errors and physical errors, select both Automatically fix file system errors and Scan for and attempt recovery of bad sectors.
4. Click Start.
Check
Disks for read error
This sort of message (disk read error) indicates a
hardware problem. It means it's trying to save a file to some
removable media (USB memory stick, flash card, portable hard drive or MP3
player, etc) and there's a communication problem perhaps because the cord is
unplugged. It may be indicating an intermittent failure of user hard disk
controller (integrated into your computer's motherboard), which is replaceable.
At worst, it's indicating a partial failure of user hard disk. If the user only
seeing the problem, it may be failing to read on a particular area
of the disk.
Without going into too much detail, a "CRC" or cyclic redundancy check is a computer algorithm for detecting that the stream of data being read or received is corrupted in some way.
There are 3 step to repair disk read error if the user got disk read error then there is a 94% chance that their computer has registry problems. To repair disk read error they need to follow the steps below:
* Step 1 - Download a disk read error repair tool,install this error repair tool.
* Step 2 - Click the Repair All Button.It will scan you PC for Free.
* Step 3 - Then click the Repair All Button again and your done! It is very easy to repair disk read error.
One of the most common errors any PC user will encounter is the dreaded disk read error. Disk read error can usually be easily fixed with popular repair tools, There are disk read error repair tools is Registry Easy, Regcure and Perfect optimizer.
Without going into too much detail, a "CRC" or cyclic redundancy check is a computer algorithm for detecting that the stream of data being read or received is corrupted in some way.
there are many types of errors:
- Runtime Error - An error that occurs during the execution of a program.
- ActiveX Error - An error caused by certain browser settings and misconfigured system files.
- DLL Error - Missing or corrupt .dll files often occur when removing or installing a program.
- .exe Error - Often occur during system or program start up due to unneeded files in the Windows registry.
- General Protection Fault - Occurs when a program that is running violates the hardware rules in some way.
- Blue Screen of Death - Occurs when Windows cannot recover from a system error. Usually requires a reboot.
- Windows Explorer Error - A dirty registry may cause Windows Explorer to get stuck in a loop.
- iExplore or iExplorer Error - An error related to your Internet Explorer browser often causing it to shut down.
- Access Violation - An error that occurs when an application tries to access storage not designated for it.
- System32 Error - An error often caused by missing or corrupt system files.
- Windows Installer Error - Caused by 3rd party "shell extensions" resulting in a white screen and/or crash.
There are 3 step to repair disk read error if the user got disk read error then there is a 94% chance that their computer has registry problems. To repair disk read error they need to follow the steps below:
* Step 1 - Download a disk read error repair tool,install this error repair tool.
* Step 2 - Click the Repair All Button.It will scan you PC for Free.
* Step 3 - Then click the Repair All Button again and your done! It is very easy to repair disk read error.
One of the most common errors any PC user will encounter is the dreaded disk read error. Disk read error can usually be easily fixed with popular repair tools, There are disk read error repair tools is Registry Easy, Regcure and Perfect optimizer.
Registry Easy |
An Excellent disk read error
repair tool, out performed all other products in our tests
detecting and repair almost all of computer
errors,removing all forms of Trojans and other forms of Spyware,
Adware and Malware. Easy to use, safe,
powerful and amazingly effective.
powerful and amazingly effective.
RegCure |
A really good disk read error
repair tool and is gaining in popularity. Fixed almost all of the computer
problems.
Perfect optimizer |
Very
easy to use, but didn't fix as many errors as Registry
Easy or regcure. Still a very good option for complete
beginners.
Scan
Disk and files for virus
When the user want to check a disk or folder for possible infection from viruses and malware, They can launch an On-Demand Scan using the Run a Scan
option. This executes an instant virus scan on the selected item. The user
can also check a wide range of removable storage devices such as CD's,
DVD's, external hard-drives, USB connected drives, digital cameras.
There is two options available when choose to run an On-Demand Scan:
- Scan a preselected ares; or
- Define a custom scan of the areas user choose, by creating a Scan Profile.
- Apart from running an On-Demand scan from Run a Scan interface, the user can also scan specific objects using Contact Sensitive Scan.
Comodo Antivirus has two pre-defined scan profiles to run On-Demand Scan on preselected areas on your system. They are:
- My Computer - When this Profile is selected, Comodo Antivirus scans every local drive, folder and file on your system.
- Critical Areas - When this profile is selected, Comodo Antivirus scans the Program Files Folder and WINDOWS Folder of the Operating System of your computer.
- Spyware Scan - Among the many types of malware, spyware is a unique malware, which when it gets installed in users computer without user knowledge while browsing the Internet or installed secretly, gathers small bits of data from their system without affecting its performance in any way. It is mainly used to collect vital information from user computer such as passwords by detecting keystrokes and various other personal information with a potential to seriously compromise important data.
Spyware Scan feature in Comodo Antivirus scans Windows registry and system files to check whether the computer is infected with such malware and alerts. This scanning feature improves the detection and successful cleaning rate of already infected systems.
Custom Scan
You can run the virus scan on selected disks or folders by setting
the scan profiles beforehand. For more details on Scan profiles, refer
to Antivirus Task > Scan Profile. It also can Create a Scan Profile from the Run a Scan option.
Comodo Antivirus also scans the archive files such as .ZIP, .RAR, and so on, on running an on-demand scanning.
To start an On-Demand scanning
- Click 'Run a Scan' in the main Antivirus Task Manager Screen.
The 'Run a Scan' panel appears.
From the 'Run a Scan panel, it can:
- Run a scan one of the item listed in the panel
- Add a new item to scan by creating a new scan profile
- Save the scan results as text file
- Move any threats identify by the scan into quarantine
- Disinfect the selected file/ application if an exclusive disinfection routine is available
- Delete any infected files, folders or applications
- Exclude an application consider as safe from the threat list
- Click 'Run a Scan' in the Antivirus screen.
- Select a Scan Profile name and click 'Scan'.
Then Comodo Antivirus starts to scan the items, based on the scan profile you have selected.
On completion of scanning, the 'scanning completed' window is displayed.
-
Click 'Results' to view the Scan Results window. If malicious
executables are discovered on your system, the scan results window
displays the number of objects scanned and the number of threats
(Viruses, Malware and so on).
To save the Scan Results as a Text File
-
Click 'Save' and enter the location in the 'Save As' dialog box.
- To move selected executables detected with threats to Quarantined Items Select the application from the results, click the drop-down button beside 'Clean' and select 'Quarantine'.
-
Click 'Yes' in the confirmation dialog box.
The selected application is moved to the Quarantined items. For more details on quarantined application, refer to Antivirus Task > Quarantined items..
To disinfect the file / application detected with a threat
- Select the application from the results, click the drop-down button beside the 'Clean' button and select 'Disinfect'.
The antivirus disinfects the file if there exists a disinfection routine defined for the file and the file is recovered to its pre-viral state. If no any disinfection routine is available, the file is deleted permanently from your system.
-
Click 'Save' and enter the location in the 'Save As' dialog box.
- Select the application from the results, click the 'Clean' button.
To ignore an application / file you consider as safe from the threat list
-
Click the 'Ignore' button
Selecting Ignore provides you with four options.
- Once - If you click 'Once', the virus is ignored only at that time only. If the same application invokes again, an Antivirus alert is displayed.
- Add to Trusted Files - If you click 'Add to Trusted Files', the virus is moved to Trusted Files area. The alert is not generated if the same application invokes again.
- Report this to COMODO as a False Alert - If you are sure that the file is safe, select 'Report this to COMODO as a False Alert'. The Antivirus sends the file to Comodo for analysis. If the file is trustworthy, it is added to the Comodo safelist.
- Add to Exclusions - If you click 'Add to Exclusions', the virus is moved to Exclusions list. The alert is not generated if the same application invokes again.
Scan Profiles are the user-defined profiles containing specific areas on your system that you wish to scan and can be re-used for all future scans.
To create a new scan profile
-
Click 'Create New Scan' in the 'Run a Scan' interface.
A 'Scan Profile' configuration appears.
- Type a name for the scan profile to be created in the 'Name' box.
- Click 'Add'.
- Select the locations from the left column, drag and drop to the right column or select the locations and click right arrow to move selected folders to right column.
- Click 'Apply'.
- Repeat the process to create more Scan Profiles.
Right click any item i.e. a drive, folder or a file in Windows Explorer and select 'Scan with COMODO Antivirus' from the context sensitive menu to perform a virus scan selectively on the item. This is useful when you suspect a particular item might contain virus due to newly downloaded or copied folder/file.
De-frag
Hard Disk Volume
Disk Defragment consolidates fragmented files and folders on your
computer's hard disk, so that each occupies a single, contiguous space on the
volume As a result, your system can gain access to your files and folders and
save new ones more efficiently. By consolidating your files and folders, Disk
Defragment also consolidates the volume's free space, making it less likely
that new files will be fragmented.
- To open Disk Defragmenter, click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
- For information about using Disk Defragmenter, on the Action menu in Disk Defragmenter, click Help.
In other way, can use:
Disk
Defragmenter MMC is based on the full retail version of Executive Software
Diskeeper. The version that is included with Windows XP and later provides
limited functionality in maintaining disk performance by defragmenting volumes
that use the FAT, FAT32, or NTFS file system.
To
start Disk Defragmenter MMC, use one of the methods that is described in this
article:
1 Part: Use the Properties of Your Local Disk
- Open My Computer.
- Right-click the local disk volume that you want to defragment, and then click Properties.
- On the Tools tab, click Defragment Now.
- Click Defragment.
2 Part: Use Computer Management MMC
- Start Computer Management MMC (Compmgmt.msc).
- Click Disk Defragmenter.
- Click the volume that you want to defragment, and then click Defragment.
3 Part: Use Disk Defragmenter MMC.
- Start Disk Defragmenter MMC (Dfrg.msc).
- Click the volume that you want to defragment, and then click Defragment.
The version
of Disk Defragmenter MMC that is included with Windows XP has the following
limitations:
- It can defragment only local volumes.
- It can defragment only one volume at a time.
- It cannot defragment one volume while it is scanning another.
- It cannot be scheduled. If it need to schedule disk defragmentation, use the Defrag.exe command line tool. For additional information about using the command line Defrag.exe tool, click the following article number to view the article in the Microsoft Knowledge Base:
283080 Description of the New Command Line Defrag.exe Included with Windows XP
- It can run only one MMC snap-in at a time.
The third-party products that are
discussed in this article are manufactured by companies that are independent of
Microsoft. Microsoft makes no warranty, implied or otherwise, regarding the
performance or reliability of these products.
These are important step-by-step procedures to operate protective maintenance for computers. Computer users are able to follow them easily to help ensure their computers run smoothly and virus-free. Disk checking should be done regularly because hard disks are very vital in storing all your acquired datas. Get adisk read error repair tool, to be prepared in case there's any error in your hard disk so you can do a 'first-aid' disk rescue. preventive maintenance software
BalasPadam