How To Remove Windows 8 From Dual-boot (or Multiboot) Machines
Easily Remove Windows 8 Beta from Your PC
The time has come for me to uninstall Windows 8 Developer Preview (I just could not adapt to Metro). Here’s how I did it.
To test out the new Windows operating system, I had created a 3rd partition on the machine’s hard drive and installed the Win8 DP there. The other 2 partitions held a Vista and a Win 7 operating system. My concerns about removing Win 8 centered on the fact that Windows 8 had installed its own bootloader — would simply deleting the (Win8) partition prevent the other OSes from booting? To eliminate that possibility, I started the operation by editing the machine’s BCD file ¹.
** Backup Your Important Files To Another Location Before Doing Things Like This! **
1) Download BootICE (or EasyBCD) and extract it. ¹ It is a “portable” app, so you can run it from a thumb drive, or your Desktop. Double-click to Run (aka Open) the bootice.exe file.
2) Click on the BCD Edit tab, then click the “View / Edit” button.
3) In the left column, click on the “Windows 8” entry and turn it blue (aka “select” it)…
.. and then click the “Del” (delete) button.
4) Reboot the machine. You should now see the old style multi-boot menu. Choose one of your older OSes (in my case, I chose Windows 7).
5) Now you can go into Disk Management and delete the partition where you had installed Windows 8, and reclaim the space it took up.
5a) Press the Windows Key + “R” key to launch a Run dialogue box, and type “diskmgmt.msc” (no quotes) into the run box.
5b) Right-click on the appropriate drive in the list, and click on the Delete Volume option in the context menu. You will be prompted and warned that all data will be lost, select “Yes” to continue. (You did make a copy of anything important, right?)
5c) You should now see “empty” space.. and the top bar has turned black. Right-click on the the partition the partition with the blue header, directly before it, and select Extend Volume from the context menu.
A “wizard” will open – simply click “next”, “next”, OK.
That’s it. You’re done. Windows 8 is gone, and your machine is back to how it was before you installed the beta.
¹ Note: This is for machines where at least one of the other operating systems is Vista/Win 7 (which uses a bcd boot loader). If the only other OS in your multiboot setup is XP, you might try the msconfig method instead of Steps 1 – 3. A tutorial for that is here.
Today’s quote: “A man who carries a cat by the tail learns something he can learn in no other way.” ~ Mark Twain
Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
A Gift For You
Folks,
To help celebrate this special weekend, I have a nice surprise.
PearlMountain Image Converter is a photo converter as well as batch image converter, which helps you convert images to other formats, resize, rotate, crop, add watermark, apply effects and add border to thousands of images at a time.
• Convert thousands of files at once in batch mode.
• Supports the most popular image formats: BMP, JPEG, TIFF, RAW, PNG, GIF, TGA, and PSD, and almost all image formats.
• Save operations that you usually use as profiles and bring convenience to you in the future.
• Convert between many different image file formats.
• Resize image for any different use, such as for web, e-mail, photo printing, Facebook, MySpace, mobile phone, ipod/ipad/iphone, etc., with optimum quality.
• Add image and text watermark for Image Copyright Protection
• Adjust image brightness, contrast and saturation in batch to make your images look more special.
• Apply borders to your images.
• Crop photos, removing unwanted areas.
Product info page: http://www.batchimageconverter.com/image-converter/
Due to time constraints, I only had time to play with test this utility a little bit. So I can only tell you it worked, and that I enjoyed the animated GIFF feature (aka “no product review here.”) And for me, there was zero “learning curve”, as I have used this type of graphics program before. But even if you have not, learning how to make optimum use of this photo/image tool should not take long.. maybe, mere minutes. (The link above has a illustrated How To. Take a peek, and see for yourself.)
PearlMountain has generously donated ten licenses to me, and I have had the pleasure to give them away – to the first ten people to leave who left a comment with a valid (not Facebook) email (so I can send you the license keycode). This software retails for $29.90.
Happy Mother’s Day! (And thank you, PearlMountain!)
*** Update: Sorry Folks, but that’s all the licenses I have to give away — for now. ***
You can download a full-featured “trial” version, here, if you’d like. It will put a watermark on any output files, but otherwise performs just like the paid version.
Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Overnight Mail | Poll | Friday Fun
Today’s Friday Fun video took over two years to make.. And fit ever so nicely with me, as our nice weather has me thinking about vacation plans… It is spectacular time-lapse photography — enjoy!
Also: this week I posted a poll. I am curious what you think. Specifically, what number of hours spent sitting at a computer surfing the web would be too many hours (aka “a problem”) .. if there is a number. Results so far are interesting..
I guess I am normal in that one of the first things I do in the morning is check my email. Overnight my ISP delivered…
I read yesterday that phishing “attack” emails was actually getting worse in the U.S. – three times worse: Report: Phishing is getting worse in North America
“North America experienced a 300% increase in phishing activity last year, according to a Websense report. “This was an amazing jump across the board,” said Patrik Runald of Websense Labs. “And it’s the most dangerous category because you don’t have to click on anything to get infected. This is also a moving target, as are bot networks, while phishing is more static in the way it works.” Read more..
Oh. Well. Nothing can be done about it.
So why worry.
Hey. Cheer up! It’s Friday!
Today’s quote: “Few companies that installed computers to reduce the employment of clerks have realized their expectations… They now need more, and more expensive clerks even though they call them ‘operators’ or ‘programmers.‘” ~ Peter Drucker
Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
This is interesting…
This is for those of you who still think hackers are gifted, and bored, teenagers..
(Please, put on your thinking caps.)
* Cybercriminals offer bogus fraud insurance services
“Security researchers from Trusteer have spotted a clever new technique used by cybercriminals interested in optimizing their malicious campaigns in an attempt to earn more revenue.” Read more..
I am not surprised by this. And I have to give the blackhats their ‘props’ for creative thinking. (It’s a bit like a gang of thieves forming their own rent-a-cop company..)
But, really, what I want to say here is, if you do not want to become a victim you really do need to do your research, think before you click, and exercise a healthy “paranoid common sense” when online.
Because they are out to get you.
Think of it this way: back in the olden days, before 1995, you pretty much only had to worry about the bad guys who lived in your city/town. And you had your local cops there protecting you.
Now, the Internet has invited the whole world’s criminals into your home — and there aren’t any cops AT ALL. ¹
Just you.
(Those in the know liken the web to the “Wild, wild, West”.)
Update: Yes, that computer in Berlin is still merrily spewing out hundreds of spam comments a day (just to this blog.. think of how many others it is annoying.. and then think of the electricity used to send those 1’s and 0’s) as the owner is still unaware they are hacked (aka “pwned”).
Today’s free download: Think it might be possible that you have been ‘botted’ (aka “pwned”) like that person in Berlin? One tool to help you find out is the free RUBotted from Trend Micro.. recently improved.
RUBotted monitors your computer for potential infection and suspicious activities associated with bots. Bots are malicious files that enable cybercriminals to secretly take control of your computer. Upon discovering a potential infection, RUBotted will identify and clean them with HouseCall.
Related: Infographic: How cyber-secure are public companies?
“The infographic below, courtesy of Veracode, presents a pretty sobering look at how well public companies are doing with cybersecurity.” Read more..
(How well??? I think that should have been written “How poorly”. You are counting on them to keep your info safe.. Right? Take a look at the reality..)
Attention: Did you cast your vote? If you haven’t already, please participate in my most recent “real life survey” — won’t take but 22 seconds of your time! Too Much Time Online?
Today’s quote: “Being in control of your life and having realistic expectations about your day-to-day challenges are the keys to stress management, which is perhaps the most important ingredient to living a happy, healthy and rewarding life.” ~ Marilu Henner
(¹ Though – thankfully!!! – there are some “whitehats” out there, and people, including our government, are finally taking cybercrime (and cyberwar) seriously.. what I mean is there really has been no law enforcement, and what laws have been passed have been toothless. IMHO. )
Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Wednesday’s Food For Thought
I only have time today to share a few item I hope you will find of interest.
I have a list, and I go through it each afternoon. I find that the more I can check off a “Yes”, the better I feel:
- did I make someone smile?
- did I answer all my mail?
- did I ride a bike, or take a walk?
- did I learn something new?
- did I do a “random act of kindness”?
- did I tackle an unpleasant chore?
- did I tidy up a mess?
- did I receive any money?
- did I “stop and smell the roses” and/or appreciate nature’s beauty?
- did I do anything nice for ME?
(I am curious.. Do you have a list like that? Does it work for you?)
Some “Tech News” items..
* The slow and steady evolution of cross-platform malware
“Malware isn’t just for Windows anymore. As the number of Macs rise, the economic incentive for criminals to build cross-platform attacks rises. And so do the stakes.” Read more..
* Over 1.5 million Visa, MasterCard credit card numbers stolen?
“U.S.-based credit card processor company Global Payments is about to announce more details about the security breach that recently saw millions of credit card numbers stolen. It doesn’t look good.” Read more..
* HTC One X is the best HTC device I have ever used (review & gallery)
“HTC is focusing on quality instead of quantity this year with the HTC One series their premier launch device line. The HTC One X is fantastic and I have never used a better HTC device.” Read more..
* California thanks Facebook for 800% boost in organ donors
* * *
Blowing my own horn department: Loyal readers might like to know that I have added to my already busy schedule, and now am writing for Find The Best.com, as their “resident expert” in Desktop and Laptop/Notebook PC’s.
Find The Best is a relatively new concept: a “comparison engine” (on virtually any subject or item).
FindTheBest.com | Unbiased, Data-Driven Comparisons.
“FindTheBest is an objective comparison engine that allows you to find a topic, compare your options and select the best choice for you.”
* * *
Today’s quotable quote: “The kindest word in all the world is the unkind word, unsaid.” ~ Unknown
Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.