This is a very common problem with routers. Your internet gets slow, so you unplug your router, plug it back in, and all of a sudden it’s magically working again. But why does this happen, really? It could be a number of things: maybe it’s overheating, maybe it’s getting bogged down from too much trRead more
This is a very common problem with routers.
Your internet gets slow, so you unplug your router, plug it back in, and all of a sudden it’s magically working again. But why does this happen, really?
It could be a number of things:
maybe it’s overheating,
maybe it’s getting bogged down from too much traffic (like BitTorrent), or
maybe it’s just a crappy router.
One common way to ease these constant network fluctuations is to make sure you reset it once in a while and wait for 10 seconds minimum when you unplug it before you put it on again. My colleague made me realise it helps the router to reconnect to the server as a fresh connection.
You’ve no doubt heard about all the sites that have gotten compromised in the last year, but what happens when they do? Usually, those hackers are after your username and password, but whether they can get it depends on how a site stores your password, as well as your password’s strength (weak passwRead more
You’ve no doubt heard about all the sites that have gotten compromised in the last year, but what happens when they do?
Usually, those hackers are after your username and password, but whether they can get it depends on how a site stores your password, as well as your password’s strength (weak passwords are much easier to crack than you think).
After you’ve read up on those things, get started on protecting yourself with a good password manager, a different strong password for every site you use, and backup plans in case someone gets into your account anyway.
Some spam is so obvious and painful to endure! I know a friend who lost #500,000 in less than 30 mins, but other messages are more subtle. A lot of spam relies upon oh “phishing,” in which a spammer will try to make their email look like it’s coming from a legitimate source in order to get your infoRead more
Some spam is so obvious and painful to endure!
I know a friend who lost #500,000 in less than 30 mins, but other messages are more subtle. A lot of spam relies upon oh “phishing,” in which a spammer will try to make their email look like it’s coming from a legitimate source in order to get your information
[noun: phishing]
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
They may tell you to click a link that looks like it’s going to a legit website or bank webpage, but if you take a little time to hover over the link, you’ll see that it’s really going somewhere else—likely a different disguised similar looking site where you least suspect fraud and willingly type in your information. Luckily, you can usually avoid those tricks by checking the URL and typing it in yourself instead.
Be careful, too—sometimes those links will cause you to unknowingly spam one of your friends, which only spreads the scam.
The earlier you apply caution, the safer you will be.
Yes, you don't want to have to manually adjust all of these settings every single time you go back and forth between the coffee shop and your secure home network. There are a few ways to automate the process so you automatically get extra protection when connected to a public Wi-Fi network. On WindoRead more
Yes, you don’t want to have to manually adjust all of these settings every single time you go back and forth between the coffee shop and your secure home network.
There are a few ways to automate the process so you automatically get extra protection when connected to a public Wi-Fi network.
On Windows
When you first connect to any given network on Windows, you’ll be asked whether you’re connecting to a network at your home, work, or if it’s public. Each of these choices will flip the switch on a preset list of settings. The public setting, naturally, will give you the most security. You can customize what each of the presets entails by
opening your Control Panel and
navigating to Network and Sharing Center >
Advanced Sharing Settings.
From there, you can turn network discovery, file sharing, public folder sharing, media streaming, and other options on or off for the different profiles. That’s a good start, but if you want a bit more control.
On OS X
OS X doesn’t have these options built-in like Windows, but an app like ControlPlane can do a fair amount of customization. With it, you can turn on your firewall, turn off sharing, connect to a VPN, and a whole lot more, all depending on the network you’ve connected to. Also, Firefox extension automatically chooses the secure HTTPS option for a bunch of popular web sites, including the New York Times, Twitter, Facebook, Google Search, and others, ensuring secure HTTPS connections to any supported web site, every time you visit. You can even add your own to their XML config file.
Note that as a Firefox extension, this works on Windows, Mac, and Linux.
Consider a “Safety First” Approach
If you’re a real road warrior, you may find yourself adding so many profiles that automating your safe settings at every step along the way may seem like a lot of work. A better approach may be to make your more secure settings the default for your system and create just one profile for your home network. Thus, by default, file sharing would be turned off, your firewall would be at its most secure state, and so on—then, when you return home to your protected network, you can have Airport Location or NetSetMan turn your less secure settings on.
This isn’t all-encompassing by any means but should give you a good quick checklist of things you should do every time you connect to a public network.
Of course, some of us already have your own public browsing routines, so be sure to share your safe networking tips in the comments.
This step works for me, you can share what works for you as well
Public Wi-Fi networks—like those in coffee shopping malls or hotels—are not nearly as safe as you think. Even if they have a password, you're sharing a network with tons of other people, which means your data is at risk. The argument that most wireless routers have firewalls to protect you from theRead more
Public Wi-Fi networks—like those in coffee shopping malls or hotels—are not nearly as safe as you think. Even if they have a password, you’re sharing a network with tons of other people, which means your data is at risk.
The argument that most wireless routers have firewalls to protect you from the internet doesn’t mean you’re protected from others connected to the same network. It’s remarkably easy to steal someone’s username and password or even see what they’re doing just by being on the same network.
Don’t take that chance!. Here’s how to stay safe when you’re out and about to get your settings to the appropriate level of security every time you connect to a public network. [Ref: LifeHacker]
The Settings
First, let’s start by talking about what settings and apps can keep you safe. Make sure these are enabled anytime you’re on public Wi-Fi, whether it’s password protected or not. If other people you don’t know are on the same network, you want to protect yourself.
1. Turn Off Sharing
When you’re at home, you may share files, printers, or even allow remote login from other computers on your network. When you’re on a public network, you’ll want to turn these things off, as anyone can access them—they don’t even need to be a hacker, and depending on your setup, some of that stuff probably isn’t even password protected. Here’s how to turn off sharing:
In Windows: Open your Control Panel, then browse to Network and Internet > Network and Sharing Center, then click Choose Change Advanced Sharing Settings. Once here, you should definitely turn off file and printer sharing, and you may as well turn off network discovery and Public folder sharing. Some of this is done automatically by Windows if you specify the network as public (more on this later).
In OS X: Go to System Preferences > Sharing and make sure all the boxes are unchecked. You’ll also want to turn off network discovery, which will be in the same place. This will prevent others from even seeing your machine on the network, meaning you’re less likely to be targeted. On Windows (as I mentioned), it’s just another checkbox under advanced sharing settings. On OS X, it will be called “stealth mode” and be under your firewall’s advanced settings (see below).
2. Enable Your Firewall
Most OSes come with at least a basic firewall nowadays, and it’s a simple step to keeping unwanted local users from poking at your computer. You may already be using a firewall, but just in case, go into your security settings (in Windows under Control Panel > System and Security > Windows Firewall; and on a Mac under System Preferences > Security & Privacy > Firewall) and make sure your firewall is turned on. You can also edit which applications are allowed access by clicking on “Allow a program or feature” in Windows and “advanced” in OS X. Your firewall is not an end-all, be-all protector, but it’s always a good idea to make sure it’s turned on.
3. Use HTTPS and SSL Whenever Possible
Regular web site connections over HTTP exchange lots of plain text over the wireless network you’re connected to and someone with the right skills and bad intent can sniff out that traffic very easily. It’s not that big of a deal when the text is some search terms you entered at Lifehacker, but it is a big deal when it’s the password to your email account. Using HTTPS (for visiting web sites) or enabling SSL (when using applications that access the internet, such as an email client) encrypts the data passed back and forth between your computer and that web server and keep it away from prying eyes.
Many sites—including Facebook, Gmail, and others—will do it automatically, but keep an eye on the address bar and make sure the “s” in “https” is always there when you’re exchanging sensitive information. If it disappears, you should log out immediately. Other sites will default to HTTP connections, but support HTTPS if you manually type it in.
Note that if the sensitive browsing can wait—especially if it’s something very sensitive like banking or credit card info—you should just wait to do that sensitive browsing at home. There’s no reason to risk more than you have to.
If you access your email from a desktop client such as Outlook or Apple Mail, You’ll want to make sure that your accounts are SSL encrypted in their settings. If not, people could not only theoretically read your emails, but also get your usernames, passwords, or anything else they wanted. You’ll need to make sure your domain supports it, and sometimes the setup might require different settings or ports—it’s not just a matter of checking the “use SSL” box—so check your email account’s help page for more details. If it doesn’t support SSL, make sure you quit the application when you’re on a public network.
4. Consider Using a Virtual Private Network
Unfortunately, not all sites offer SSL encryption. Other search engines and email providers may still be vulnerable to people watching your activity, so if you use one of these sites frequently (or really just want the extra protection), you may want to try using a VPN, or virtual private network. These services let you route all your activity through a separate secure, private network, thus giving you the security of a private network even though you’re on a public one.
You have a lot of choices, make your choice from some of the best VPNs here—but if you don’t feel like doing the research, I strongly recommend CyberGhost as a dead simple, free option. Install it on your computer, turn it on whenever you’re on a public network, and you’ll be much safer than without it.
5. Turn Wi-Fi Off When You Aren’t Using It
f you want to guarantee your security and you’re not actively using the internet, simply turn off your Wi-Fi. This is extremely easy in both Windows and OS X. In Windows, you can just right-click on the wireless icon in the taskbar to turn it off. On a Mac, just click the Wi-Fi icon in the menu bar and select the turn off AirPort option. Again, this isn’t all that useful if you need the internet, but when you’re not actively using it, it’s not a bad idea to just turn it off for the time being. The longer you stay connected, the longer people have to notice you’re there and start snooping around.
There is little you can do because each computer application has a certain percentage of power that is expected to run on for efficiency. You’ve probably heard some people say you should drain your battery completely before charging it, or that you should keep it between 40% and 80% all the time toRead more
There is little you can do because each computer application has a certain percentage of power that is expected to run on for efficiency.
You’ve probably heard some people say you should drain your battery completely before charging it, or that you should keep it between 40% and 80% all the time to make it last longer. Most of these rules are outdated, applying to older nickel-based batteries. Luckily, most or all of your gadgets these days run on Lithium-Ion batteries, which are easy to take care of.
I recommend reading the manufacturers full guide on how they work, but the gist is: they last longer when you perform shallow discharges, keep them cool, and don’t leave them plugged in while they’re running at 100%. Honestly, though, batteries have a finite life no matter what, and your efforts will only go so far—so don’t stress about it.
Focus your efforts on getting better battery life out of your iPhone, Android phone, or laptop on a given charge instead—and knowing how to replace the battery when it starts dying.
Yeah, the painful part of it that when your computer freezes, you may have no other option than to reboot and there is a high tendency that you will lose any unsaved work. Freezes can be a sign of the insufficiency of the ram windows registry conflicts corrupt or missing files, or even spyware. PresRead more
Yeah, the painful part of it that when your computer freezes, you may have no other option than to reboot and there is a high tendency that you will lose any unsaved work.
Freezes can be a
sign of the insufficiency of the ram
windows registry conflicts
corrupt or missing files,
or even spyware.
Press and hold the power button until the computer turns off, then restart it and get to work cleaning up the system so that it doesn’t freeze again.
Until you decipher the problem you may not have a handy solution to losing your unsaved files.
If your system is 64bit, here is the best answer for you since you have the installation package. If you're not installing from DVD start from Step 3 OS: Windows 10 - 64-Bit CPU: Intel i3 6300T or equivalent RAM: 8 GB DISC DRIVE: DVD ROM drive required for installation only HARD DRIVE: At leaRead more
If your system is 64bit, here is the best answer for you since you have the installation package. If you’re not installing from DVD start from Step 3
OS: Windows 10 – 64-Bit
CPU: Intel i3 6300T or equivalent
RAM: 8 GB
DISC DRIVE: DVD ROM drive required for installation only
HARD DRIVE: At least 50 GB of free space
VIDEO: NVIDIA GeForce GTX 670 or AMD Radeon R9 270X
DirectX: DirectX 12 compatible
INPUT: Keyboard and mouse, dual analogue controller
Step 1
Close all running applications. In order to install a game from a CD, it’s best to close any running programs, browsers, and apps.
Step 2
Insert the game disc into your computer. Do so by placing the CD or DVD into your computer’s disc drive with the label face-up.
Step 3
Click on your software after unzipping the file. Sometimes, Windows will ask you to confirm an application’s legitimacy before opening it. If this happens, click Yes to proceed with opening the installer window.
If the installer window doesn’t open, open Start, click the File Explorer icon, click This PC, and double-click the disc’s name below the “Devices and drives” heading.
Step 4
Follow the on-screen instructions. Each game’s setup will vary slightly from other games, but you’ll typically have to do the following (not necessarily in order):
Select a setup language and click Next.
Select the I agree option for the terms of use, then click Next.
Select an installation location, then click Next.
Select shortcut options, then click Next.
Enter the game’s key, which is usually found on the back of the CD’s case or in the manual.
Step 5
Click Install when prompted. This will begin the installation process. When it completes, you’ll see an icon appear on your desktop if you chose to create one.
Step 6
Click Finish. Doing so will close the setup window; for some games, this will also launch the game.
Then you are readu tp play your game….
I hope this was helpful and simple enough?
“Don’t let people’s compliments go to your head, and don’t let their criticisms go to your heart. The degree to which you do either of these things is the degree to which you’ll be ruled by what other people think of you.” — Lysa TerKeurst. A piece of advice you have to keep to the heart is: build aRead more
“Don’t let people’s compliments go to your head, and don’t let their criticisms go to your heart. The degree to which you do either of these things is the degree to which you’ll be ruled by what other people think of you.”
— Lysa TerKeurst.
A piece of advice you have to keep to the heart is: build a strong firewall against all forms of Destructive Criticism because most of them are born out of envy, hatred and jealousy.
It is paramount to take out time to decipher the true intentions of every critic to decide the best possible action to take concerning their contrasting opinion. Also bear in mind that anyone who despises your progress would consciously make efforts to discredit any good that comes from you.
Why Do I Need to Keep Resetting My Router?
This is a very common problem with routers. Your internet gets slow, so you unplug your router, plug it back in, and all of a sudden it’s magically working again. But why does this happen, really? It could be a number of things: maybe it’s overheating, maybe it’s getting bogged down from too much trRead more
This is a very common problem with routers.
Your internet gets slow, so you unplug your router, plug it back in, and all of a sudden it’s magically working again. But why does this happen, really?
It could be a number of things:
One common way to ease these constant network fluctuations is to make sure you reset it once in a while and wait for 10 seconds minimum when you unplug it before you put it on again. My colleague made me realise it helps the router to reconnect to the server as a fresh connection.
See lessWhat Happens When a Site I Use Gets “Hacked?”
You’ve no doubt heard about all the sites that have gotten compromised in the last year, but what happens when they do? Usually, those hackers are after your username and password, but whether they can get it depends on how a site stores your password, as well as your password’s strength (weak passwRead more
You’ve no doubt heard about all the sites that have gotten compromised in the last year, but what happens when they do?
Usually, those hackers are after your username and password, but whether they can get it depends on how a site stores your password, as well as your password’s strength (weak passwords are much easier to crack than you think).
After you’ve read up on those things, get started on protecting yourself with a good password manager, a different strong password for every site you use, and backup plans in case someone gets into your account anyway.
Hope this clarifies things
See lessHow Can I Tell if an Email Is Spam?
Some spam is so obvious and painful to endure! I know a friend who lost #500,000 in less than 30 mins, but other messages are more subtle. A lot of spam relies upon oh “phishing,” in which a spammer will try to make their email look like it’s coming from a legitimate source in order to get your infoRead more
Some spam is so obvious and painful to endure!
I know a friend who lost #500,000 in less than 30 mins, but other messages are more subtle. A lot of spam relies upon oh “phishing,” in which a spammer will try to make their email look like it’s coming from a legitimate source in order to get your information
[noun: phishing]
They may tell you to click a link that looks like it’s going to a legit website or bank webpage, but if you take a little time to hover over the link, you’ll see that it’s really going somewhere else—likely a different disguised similar looking site where you least suspect fraud and willingly type in your information. Luckily, you can usually avoid those tricks by checking the URL and typing it in yourself instead.
Be careful, too—sometimes those links will cause you to unknowingly spam one of your friends, which only spreads the scam.
The earlier you apply caution, the safer you will be.
See lessIs there any possibility of Automating Public Wi-Fi Security Setting?
Yes, you don't want to have to manually adjust all of these settings every single time you go back and forth between the coffee shop and your secure home network. There are a few ways to automate the process so you automatically get extra protection when connected to a public Wi-Fi network. On WindoRead more
Yes, you don’t want to have to manually adjust all of these settings every single time you go back and forth between the coffee shop and your secure home network.
There are a few ways to automate the process so you automatically get extra protection when connected to a public Wi-Fi network.
On Windows
When you first connect to any given network on Windows, you’ll be asked whether you’re connecting to a network at your home, work, or if it’s public. Each of these choices will flip the switch on a preset list of settings. The public setting, naturally, will give you the most security. You can customize what each of the presets entails by
From there, you can turn network discovery, file sharing, public folder sharing, media streaming, and other options on or off for the different profiles. That’s a good start, but if you want a bit more control.
On OS X
OS X doesn’t have these options built-in like Windows, but an app like ControlPlane can do a fair amount of customization. With it, you can turn on your firewall, turn off sharing, connect to a VPN, and a whole lot more, all depending on the network you’ve connected to. Also, Firefox extension automatically chooses the secure HTTPS option for a bunch of popular web sites, including the New York Times, Twitter, Facebook, Google Search, and others, ensuring secure HTTPS connections to any supported web site, every time you visit. You can even add your own to their XML config file.
Consider a “Safety First” Approach
If you’re a real road warrior, you may find yourself adding so many profiles that automating your safe settings at every step along the way may seem like a lot of work. A better approach may be to make your more secure settings the default for your system and create just one profile for your home network. Thus, by default, file sharing would be turned off, your firewall would be at its most secure state, and so on—then, when you return home to your protected network, you can have Airport Location or NetSetMan turn your less secure settings on.
This isn’t all-encompassing by any means but should give you a good quick checklist of things you should do every time you connect to a public network.
Of course, some of us already have your own public browsing routines, so be sure to share your safe networking tips in the comments.
This step works for me, you can share what works for you as well
See lessHow can I possibly stay safe while using Public Wi-Fi?
Public Wi-Fi networks—like those in coffee shopping malls or hotels—are not nearly as safe as you think. Even if they have a password, you're sharing a network with tons of other people, which means your data is at risk. The argument that most wireless routers have firewalls to protect you from theRead more
Public Wi-Fi networks—like those in coffee shopping malls or hotels—are not nearly as safe as you think. Even if they have a password, you’re sharing a network with tons of other people, which means your data is at risk.
The argument that most wireless routers have firewalls to protect you from the internet doesn’t mean you’re protected from others connected to the same network. It’s remarkably easy to steal someone’s username and password or even see what they’re doing just by being on the same network.
Don’t take that chance!. Here’s how to stay safe when you’re out and about to get your settings to the appropriate level of security every time you connect to a public network. [Ref: LifeHacker]
The Settings
First, let’s start by talking about what settings and apps can keep you safe. Make sure these are enabled anytime you’re on public Wi-Fi, whether it’s password protected or not. If other people you don’t know are on the same network, you want to protect yourself.
1. Turn Off Sharing
When you’re at home, you may share files, printers, or even allow remote login from other computers on your network. When you’re on a public network, you’ll want to turn these things off, as anyone can access them—they don’t even need to be a hacker, and depending on your setup, some of that stuff probably isn’t even password protected. Here’s how to turn off sharing:
2. Enable Your Firewall
Most OSes come with at least a basic firewall nowadays, and it’s a simple step to keeping unwanted local users from poking at your computer. You may already be using a firewall, but just in case, go into your security settings (in Windows under Control Panel > System and Security > Windows Firewall; and on a Mac under System Preferences > Security & Privacy > Firewall) and make sure your firewall is turned on. You can also edit which applications are allowed access by clicking on “Allow a program or feature” in Windows and “advanced” in OS X. Your firewall is not an end-all, be-all protector, but it’s always a good idea to make sure it’s turned on.
3. Use HTTPS and SSL Whenever Possible
Regular web site connections over HTTP exchange lots of plain text over the wireless network you’re connected to and someone with the right skills and bad intent can sniff out that traffic very easily. It’s not that big of a deal when the text is some search terms you entered at Lifehacker, but it is a big deal when it’s the password to your email account. Using HTTPS (for visiting web sites) or enabling SSL (when using applications that access the internet, such as an email client) encrypts the data passed back and forth between your computer and that web server and keep it away from prying eyes.
Many sites—including Facebook, Gmail, and others—will do it automatically, but keep an eye on the address bar and make sure the “s” in “https” is always there when you’re exchanging sensitive information. If it disappears, you should log out immediately. Other sites will default to HTTP connections, but support HTTPS if you manually type it in.
Note that if the sensitive browsing can wait—especially if it’s something very sensitive like banking or credit card info—you should just wait to do that sensitive browsing at home. There’s no reason to risk more than you have to.
If you access your email from a desktop client such as Outlook or Apple Mail, You’ll want to make sure that your accounts are SSL encrypted in their settings. If not, people could not only theoretically read your emails, but also get your usernames, passwords, or anything else they wanted. You’ll need to make sure your domain supports it, and sometimes the setup might require different settings or ports—it’s not just a matter of checking the “use SSL” box—so check your email account’s help page for more details. If it doesn’t support SSL, make sure you quit the application when you’re on a public network.
4. Consider Using a Virtual Private Network
Unfortunately, not all sites offer SSL encryption. Other search engines and email providers may still be vulnerable to people watching your activity, so if you use one of these sites frequently (or really just want the extra protection), you may want to try using a VPN, or virtual private network. These services let you route all your activity through a separate secure, private network, thus giving you the security of a private network even though you’re on a public one.
You have a lot of choices, make your choice from some of the best VPNs here—but if you don’t feel like doing the research, I strongly recommend CyberGhost as a dead simple, free option. Install it on your computer, turn it on whenever you’re on a public network, and you’ll be much safer than without it.
5. Turn Wi-Fi Off When You Aren’t Using It
f you want to guarantee your security and you’re not actively using the internet, simply turn off your Wi-Fi. This is extremely easy in both Windows and OS X. In Windows, you can just right-click on the wireless icon in the taskbar to turn it off. On a Mac, just click the Wi-Fi icon in the menu bar and select the turn off AirPort option. Again, this isn’t all that useful if you need the internet, but when you’re not actively using it, it’s not a bad idea to just turn it off for the time being. The longer you stay connected, the longer people have to notice you’re there and start snooping around.
See lessHow Do I Keep My Laptop’s Battery In Good Health?
There is little you can do because each computer application has a certain percentage of power that is expected to run on for efficiency. You’ve probably heard some people say you should drain your battery completely before charging it, or that you should keep it between 40% and 80% all the time toRead more
There is little you can do because each computer application has a certain percentage of power that is expected to run on for efficiency.
You’ve probably heard some people say you should drain your battery completely before charging it, or that you should keep it between 40% and 80% all the time to make it last longer. Most of these rules are outdated, applying to older nickel-based batteries. Luckily, most or all of your gadgets these days run on Lithium-Ion batteries, which are easy to take care of.
I recommend reading the manufacturers full guide on how they work, but the gist is: they last longer when you perform shallow discharges, keep them cool, and don’t leave them plugged in while they’re running at 100%. Honestly, though, batteries have a finite life no matter what, and your efforts will only go so far—so don’t stress about it.
Focus your efforts on getting better battery life out of your iPhone, Android phone, or laptop on a given charge instead—and knowing how to replace the battery when it starts dying.
See lessWhat causes Computer Screen Freeze?
Yeah, the painful part of it that when your computer freezes, you may have no other option than to reboot and there is a high tendency that you will lose any unsaved work. Freezes can be a sign of the insufficiency of the ram windows registry conflicts corrupt or missing files, or even spyware. PresRead more
Yeah, the painful part of it that when your computer freezes, you may have no other option than to reboot and there is a high tendency that you will lose any unsaved work.
Freezes can be a
Press and hold the power button until the computer turns off, then restart it and get to work cleaning up the system so that it doesn’t freeze again.
Until you decipher the problem you may not have a handy solution to losing your unsaved files.
I need help installing FIFA 19 on my PC. Any Ideas?
If your system is 64bit, here is the best answer for you since you have the installation package. If you're not installing from DVD start from Step 3 OS: Windows 10 - 64-Bit CPU: Intel i3 6300T or equivalent RAM: 8 GB DISC DRIVE: DVD ROM drive required for installation only HARD DRIVE: At leaRead more
If your system is 64bit, here is the best answer for you since you have the installation package. If you’re not installing from DVD start from Step 3
Step 1
Close all running applications. In order to install a game from a CD, it’s best to close any running programs, browsers, and apps.
Step 2
Insert the game disc into your computer. Do so by placing the CD or DVD into your computer’s disc drive with the label face-up.
Step 3
Click on your software after unzipping the file. Sometimes, Windows will ask you to confirm an application’s legitimacy before opening it. If this happens, click Yes to proceed with opening the installer window.
Step 4
Follow the on-screen instructions. Each game’s setup will vary slightly from other games, but you’ll typically have to do the following (not necessarily in order):
Step 5
Click Install when prompted. This will begin the installation process. When it completes, you’ll see an icon appear on your desktop if you chose to create one.
Step 6
Click Finish. Doing so will close the setup window; for some games, this will also launch the game.
Then you are readu tp play your game….
See lessI hope this was helpful and simple enough?
How do you handle critcism?
“Don’t let people’s compliments go to your head, and don’t let their criticisms go to your heart. The degree to which you do either of these things is the degree to which you’ll be ruled by what other people think of you.” — Lysa TerKeurst. A piece of advice you have to keep to the heart is: build aRead more
“Don’t let people’s compliments go to your head, and don’t let their criticisms go to your heart. The degree to which you do either of these things is the degree to which you’ll be ruled by what other people think of you.”
— Lysa TerKeurst.
A piece of advice you have to keep to the heart is: build a strong firewall against all forms of Destructive Criticism because most of them are born out of envy, hatred and jealousy.
It is paramount to take out time to decipher the true intentions of every critic to decide the best possible action to take concerning their contrasting opinion. Also bear in mind that anyone who despises your progress would consciously make efforts to discredit any good that comes from you.
See less