How to fix Printers that stop scanning without ink

1. Canon PIXMA Printer Override

Canon often provides the simplest override through a physical button press on the printer itself:

  • Locate the Stop/Reset Button: Look for the button marked with a red circle containing a triangle symbol, or sometimes labelled Resume/Cancel.
  • Perform the Override: Press and hold this Stop/Reset button for 5 to 10 seconds and then release it.
  • Result: This action should disable the ink-level detection for the empty cartridge(s) and allow the scanning function to work. If you receive a warning that ink detection is disabled, confirm it.

2. HP All-in-One Printer Workarounds

HP models are less consistent, but the solution often lies in the software or control panel settings:

  • Adjust Cartridge Settings: Access the printer’s on-screen menu or the HP utility software on your computer. Look for settings related to ‘Ink Alert,’ ‘Low on Ink,’ or ‘Cartridge Protection.’ If an option exists to ‘Continue,’ ‘Ignore,’ or ‘Disable Protection,’ select it.
  • Use the HP Smart App: Initiate the scanning process directly from the HP Smart App on your computer or mobile device. This can sometimes bypass the local printer’s control panel lockout.
  • Check for Hidden Menus: For certain older models with a touch screen, there might be a specific sequence of pressing the screen (like a Back, X, Back, Back, Back sequence) to access a service or support menu where status checks can be toggled. (Use this advanced method with caution.)

3. General Troubleshooting Steps (All Brands)

If the brand-specific methods fail, try these common steps:

A. Power Cycle / Hard Reset

  1. Turn the printer OFF using the power button.
  2. Unplug the power cord completely from both the printer and the wall outlet.
  3. Wait for a full 60 seconds.
  4. Plug the power cord back in and power the printer on. This clears the temporary error status.

B. Use Native Computer Scanning Software

Bypass the printer’s restrictive drivers by using the operating system’s built-in tools, which communicate more directly with the scanner hardware:

  • Windows: Use the Windows Fax and Scan utility or the Windows Scan app.
  • macOS: Use Image Capture (found in the Applications folder).

C. Clean Cartridge Contacts

A recognition error can sometimes be mistaken for an empty cartridge:

  1. Turn the printer off and unplug it.
  2. Remove the empty cartridge(s).
  3. Gently wipe the copper or gold contacts on the cartridge (and inside the carriage) with a lint-free cloth.
  4. Re-insert the cartridges firmly.

D. Update/Reinstall Drivers

  • Visit the manufacturer’s website and install the latest full driver software package for your model.
  • Alternatively, uninstalling all existing printer software and reinstalling only the basic native driver can remove restrictive software components.
[mai mult...]

How to stop iPhone battery throttling

The iPhone (typically models 6, 6s, SE, 7, and 7 Plus) becomes noticeably slow, apps take a long time to load, and frame rates drop significantly. This is caused by Apple’s “Performance Management” software, which is automatically enabled after the device experiences an unexpected shutdown, due to the aged battery being unable to supply the necessary power during peak demand.

[mai mult...]

When Innovation becomes isolation: Apple’s Tight Grip on Repair

Few companies embody design excellence and technological prestige like Apple. Sleek, seamless, and undeniably influential, Apple’s products have defined a generation of consumer electronics. Yet behind the elegant aluminum and glass lies a controversial truth — Apple has become one of the most restrictive forces against the Right to Repair.

When Apple first introduced its iPhone lineup, customers marveled at the innovation. Over time, though, many realized that fixing even minor issues—like a cracked screen or a worn-out battery—was nearly impossible without going through Apple’s tightly controlled repair ecosystem. The company’s devices are deliberately sealed, using proprietary screws, software pairing, and component serialization that block third-party repairs or even self-repairs.

Independent technicians and repair shops have long struggled with Apple’s repair authorization program, which demands high fees, strict inspections, and limits on what parts can be used. A genuine part installed by a skilled technician can still trigger warnings such as “Unable to verify this iPhone has a genuine display”. These software locks effectively punish users who choose independent repair — even if the part came directly from another identical iPhone.

Apple’s argument has always revolved around safety, quality, and user security. The company insists that unauthorized repairs could pose risks, from damaged batteries to compromised biometric sensors like Touch ID or Face ID. However, critics counter that Apple’s restrictions are less about safety and more about control—control over pricing, supply chains, and the entire lifecycle of its devices.

YouTube channels like Louis Rossmann and Hugh Jeffreys have exposed how arbitrary some of Apple’s barriers really are. In one example, two identical iPhones—both functional—had their screens swapped. Immediately, both phones displayed “non-genuine part” errors, even though each screen was 100 % Apple-made. This illustrates the extent to which Apple ties components to serial numbers in its database, enforcing dependence on its service centers.

The consequences of this ecosystem reach beyond inconvenience. They touch on environmental and ethical dimensions. Apple’s marketing emphasizes sustainability and recycled materials, yet restricting repairs drives consumers toward premature device replacement. This creates electronic waste — a direct contradiction of the company’s green image.

Pressure from the Right to Repair movement has started to make dents in Apple’s walls. The company recently launched its Self Service Repair program, allowing users to rent official tools and buy genuine parts online. But many critics describe it as a half-measure: the program is cumbersome, expensive, and heavily dependent on Apple’s approval process. Some argue it was designed more to silence regulators than to empower users.

The broader debate around Apple’s repair policies isn’t just about fixing phones — it’s about digital ownership. When a customer pays €1 200 for a device, they should have the freedom to open, repair, or modify it. Yet Apple’s ecosystem treats ownership more like a long-term lease, where users are custodians, not true owners.

In the end, Apple stands as both a technological pioneer and a symbol of a growing problem: innovation that isolates. As more countries adopt Right to Repair laws, the pressure will mount for Apple to align its actions with its public image. True innovation should empower, not restrict — and repairability is a fundamental part of that promise.

[mai mult...]

Trapped in the Field: how John Deere Locks out Farmers from their own machines

In the age of digital farming, tractors and harvesters are no longer just heavy metal machines — they’re rolling computers. And for many American and European farmers, John Deere’s digital dominance has become a symbol of frustration rather than progress.

For decades, a farmer could repair almost any machine with a wrench, a manual, and some experience. But as John Deere’s equipment evolved, so did its software restrictions. Today, even a simple malfunction often requires a dealer-exclusive diagnostic tool or proprietary software locked behind company control.

Farmers across the U.S. and beyond have voiced outrage over what they see as a violation of ownership rights. Buying a tractor worth hundreds of thousands of dollars doesn’t grant full control — instead, farmers are bound by digital locks (DRM systems) that prevent them from accessing or modifying software. The company argues that these restrictions are meant to protect the “integrity and safety” of the machine, but critics say that’s a cover for monopolizing repair services and keeping profit within John Deere’s own network.

In one viral YouTube video, a Nebraska farmer described being “stuck for days” during harvest season, waiting for a certified technician to arrive and perform a software reset — something the farmer could have done in minutes if allowed. This delay cost him time, crops, and money. Dozens of similar stories appear across forums, investigative articles, and even congressional hearings.

The Right to Repair movement argues that ownership should include the right to fix. When consumers can’t access manuals, diagnostic tools, or spare parts, the concept of ownership becomes hollow. Many have turned to hacked Ukrainian software, shared in underground online communities, to bypass Deere’s restrictions — a desperate and legally gray workaround that highlights the level of frustration among farmers.Yet critics call this a public relations gesture — not a real solution. The agreement lacks enforcement, and many farmers report that practical access remains limited or costly.

At its core, this issue isn’t just about tractors — it’s about control. Whether it’s a farmer in Iowa or Romania, the message is the same: if a machine you bought can’t be fixed without the manufacturer’s permission, do you really own it?

Until real legislative pressure or open repair laws take effect, farmers will continue to face an uphill battle — not against weather or soil, but against corporate code.

[mai mult...]

Windows Update nu pornește sau arata eroarea 0x80070002

“Windows Update nu pornește sau afișează eroarea 0x80070002″- o problemă des întâlnită care împiedică instalarea actualizărilor de sistem. Această eroare apare de obicei din cauza unor fișiere lipsă sau corupte, setări incorecte de timp și dată ori probleme la nivelul serviciilor Windows Update. Situația poate duce la blocarea procesului de actualizare și la imposibilitatea menținerii sistemului la zi cu cele mai recente patch-uri de securitate și funcționalități.”

[mai mult...]

Cardurile virtuale pentru plati on-line. Cum le folosim si de ce sunt recomandate?

Ce este un card virtual?
Un card virtual este un card bancar care nu are o formă fizică, nu are acel plastic asociat. Acesta funcționează identic cu un card de plastic, singurele lucruri specifice vin din forma sa dematerializată. Neexistând plasticul efectiv, se modifică modul în care poate fi folosit. Diferența este că un card virtual poate fi șters oricând, chiar și după o singură plată. Cardul virtual, fie că este de debit sau de credit, este legat la cardul și contul tău bancar, de unde sunt debitate sumele cheltuite.

[mai mult...]

La ce trebuie sa fim atenti cand regasim postari despre castiguri, carduri cadou, stiri de ultima ora sau fotografii celebritati pe retelele de socializare si site-uri?

Oferirea gratuită a ceva valoros este întotdeauna atractivă în marketing, iar infractorii profită de acest lucru. Site-urile care le oferă utilizatorilor opțiunea de a genera gratuit carduri cadou pentru companii cunoscute – ca iTunes, Google Play, Amazon sau Steam nu sunt ceva nou.

De exemplu, aplicații legitime ca Tokenfire și Swagbucks cumpără coduri de card de la producători, iar apoi le oferă clienților drept recompensă pentru anumite activități. Infractorii au identificat, se pare, popularitatea unor astfel de site-uri și au decis să înșele utilizatorii, folosind un algoritm simplu.

Cum se identifică e-mailurile și mesajele frauduloase

Escrocii încearcă să copieze e-mailuri și mesaje text de la companii legitime pentru a te păcăli să le dai informații personale și parole. Semnele de mai jos te pot ajuta să identifici e-mailuri de phishing:

  • Adresa de e-mail  sau numărul de telefon al expeditorului nu se potrivește cu numele companiei de la care se pretinde a proveni.
  • Adresa de e-mail sau numărul de telefon pe care l-au folosit pentru a te contacta este diferit de cel pe care l-ai dat companiei respective.
  • Un link dintr-un mesaj arată corect, însă URL-ul nu se potrivește cu site-ul web al companiei.
  • Mesajul arată în mod semnificativ diferit de alte mesaje pe care le-ai primit de la companie.
  • Mesajul solicită informații cu caracter personal, cum ar fi un număr de card de credit sau parola contului.
  • Mesajul este nesolicitat și conține un fișier atașat.

Dacă ți se solicită să descarci software

Descarcă conținut de pe internet cu multă precauție. Unele conținuturi descărcabile găsite pe internet pot să nu conțină software-ul pe care îl pretind sau să conțină software la care nu te aștepți sau pe care nu îl dorești. Aici pot fi incluse aplicații care solicită instalarea de profiluri de configurare care îți pot controla dispozitivul. Dacă sunt instalate, software-urile necunoscute sau nedorite pot deveni intruzive și agasante și chiar pot deteriora computerul tău și îți pot fura datele.

Exemple de posibile tentative de fraudă/înșelăciune cu care vă puteți confrunta:

  • Vi se solicită informații confidențiale (precum CNP, serie și număr de buletin, conturi bancare, parole) pentru că ați câștigat un premiu, pentru anumite verificări în baza de date sau pentru ați fi răsplătită fidelitatea;
  • Sunteți rugați să efectuați o plată bancară pentru a putea intra în posesia premiului;
  • Vi se solicită să vă prezentați la ghișeul unei bănci pentru a intra în posesia premiului;
  • Vi se solicită să reîncărcați cartele preplătite pentru a intră în posesia premiului.
[mai mult...]