Build Your Own Computer

I'm eighty-one years old and I bought my first computer six years ago. When I bought it I hardly knew how to turn it on. I consider myself still a Newbie as I've barely scratched the surface of computer technology. I have successfully built about a dozen computers for family, friends and myself. I have even sold a couple of them.

This study is confined to Desk Top Computers Laptops and Notebooks do not lend themselves to to " Do it yourself " projects.

Building a computer doesn't require a high degree of technical skill, however it does require a little mechanical aptitude. Building may not be the proper term, assemble would be more appropriate. That's actually what you do, you assemble the right components then install an operating system which is the only phase of the project that requires any technical ability.

Building your own has several advantages, for one you can save some money. But don't get the idea that you can sell them at a profit. There's too much competition at the low end. All the major manufacturers have budget models, most of which you can buy with substantial rebates and good warrantees

You have a number of options, you can build from scratch or you can build from a barebones kit. I recommend the latter for your first attempt. You also have the choice of using all new components or using some recycled parts.

If you have a reasonably up to date PC that died the are probably a number of parts that you can re-use, and you can buy a lot of good used components from bay and other online sources. Refurbished parts are a good option.

The first thing you have to do is determine your requirements. If you're going to just surf the Internet, do e-mail and a bit of printing, go for the cheapest you can buy. You will still have plenty of capacity for simple tasks.

Next you have to decide whether to go with a barebones kit or do a complete build. Kits are recommended because generally that's the most economical way to go, and it's definitely easier. Installing a mother- board can get dicey for the uninitiated. There are a lot of little wires to connect that can give you grief if they aren't in the right place.

Barebones kits come in many iterations. The most basic consists of a case, motherboard and power unit. Some have on board video and audio cards, others include modems and cable connections and some even sport keyboards, mice and speakers. Read the specs carefully because some of the components are expensive to buy separately.

Make a list of all the components that you require. Check off the ones that are included in the kit. This establishes what other parts you need. If you have see parts that you can use, check them off. Now you know what you have to buy. For in-depth detailed instructions on how to do this visit the computer page on: http://caveatemptorus.com/

Often times it's less expensive to buy all the component you require from the vendor of the kits because of shipping charges, which are part of your over-all cost. But sometime parts you can buy at auction can be so inexpensive that it's worthwhile to pay the shipping charges.

All barebones kits come with an instruction manual and a phone number where you can get technical support. Neither is very good. People who don't understand English very well write the manuals and the technical support is like most free things. Actually, it's not free, they are toll numbers. And are almost always busy. However most manufacturers have very good web sites where you can obtain information and trouble shoot if you have a problem.

Vendors that sell barebones kits usually have a thirty-day return policy. Try to do your building before it expires because if you go beyond that limit then you have to deal with the manufacturer which can be a hassle. It's much easier and may avoid expensive shipping charges if you deal with the seller while still within the term of their return policy.

When you select the components you require be sure that you procure compatible parts. Hard drives have different interfaces. Memory comes in many variations; some memory only works in specific motherboards. If you use the wrong type your machine won't work.

Once you have everything assembled, and your PC boots, you can install your operating system. This can be the most difficult part of the operation. If you are using a new hard drive it's fairly easy. It will come with instructions and software for installing the OS. If you're using a used HD, then you have to format it. The best way to do this is to look at the hard drive and get the manufacturer and model number of the unit. Then you can download the instructions and software to perform this task.

Even if you don't save a fortune, you can end up with the computer that you want and have a sense of accomplishment.

Written by: George W. Cannata the publisher of the web site : http://caveatemptorus.com/ July 8, 2005.

custom home cleaning Winnetka ..
In The News:

Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.
Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat Analysis Group.
The Hypershell X Ultra exoskeleton features 12 terrain modes and carbon fiber construction to enhance hiking, cycling and outdoor adventures.

Digital Cameras + Photo Printers = Quality Instant Photographs

In the 1950's and 1960's Polaroid's instant cameras were all... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

10 Tips to Stay Safe and Secure Online

The Internet can be a dangerous place.While you're enjoying the... Read More

Lives With Games Tradition and Industry

The United States Of America citizen feels that games is... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

Dont Let the Internet Overstimulate Your Mind

The Internet is an awesome tool, but be careful and... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

How to Save an Image in a SQL Server Database?

Most of the web applications have a lot of images... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Cisco Certification: Taking Your First Certification Exam

You???ve studied hard; you???ve practiced your configurations; you???ve used your... Read More

Bluetooth Technology: Tips for Buying Headsets or Headphones

The technological horizon has always got something new to offer,... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

Customize Your Portable Player with an MP3 Player Accessory

Everywhere you look today people are listening to personal audio... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

EDTV vs HDTV

Confused by EDTV vs HDTV? We don't blame you. The... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

How Does a Palm Pilot Work?

Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Portable Technology: Getting to Know the Treo

Up until the recent past, those who wanted to take... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

professional home cleaners Glenview ..