The “smart technology” of a laptop lithium-ion battery will fool users when they unexpectedly and silently receive malware (malicious software) which will penetrate computer hardware central processing unit (CPU) ‘system instruction codes’ which is buried in CMOS and BIOS date and time function record keeping. The computer command instructions will get into a date trigger activation operation to stop a laptop battery to accept the electricity from a power adapter.
All laptop users see is their computer operating system program react to ‘date and time deactivation’. The computer malfunction will display its pop-up warning sign that users read “battery not charging.” This will falsely mislead both consumers and most technicians to mistakenly replace the laptop battery.
To prevent or correct this from happening the only alternative is to download, install, and run a quick scan on the entire computer. Use only a reliable and highly sophisticated type of anti-malware software. This should prevent the computer hardware problem from stopping the battery and stopping the power adapter from sending electrical power (AC or DC to the lithium-ion battery in the laptop).
If this problem is not solved soon, it will continue to bring on a process for both consumers and businesses to suffer higher cost than what most laptop users, technicians, distributors, and manufactures realize. When the lithium-ion battery charging process is stopped and false indicator displays lead to replacing laptop lithium-ion batteries, think again folks, Laptop Battery Replacement.
When malware occurs after standard 1-year warranty expiration (on relatively new laptop computers) as well as with extended warranty plans wherein lithium-ion batteries are continually being replaced because of resultant lack of malware capability knowledge driving associated costs higher. The following should occur:
1. Warranty product adjustments creating both unnecessary labor and shipping costs (expended by vendor and manufacturer); and…
2. As was written above consumer product replacement retrievals costs (expending consumer transportation costs to vendor or shipping facility); and, businesses and home-office businesses) will be affected.
Studying the aforementioned ‘full picture’ demonstrates how particular types of incredibly sophisticated malware alone increases unnecessary costs associated with lithium-ion battery disruptions when only an expensively stupid replacement option is made.
Actual Malware Event (Brief) –
EmiSoft anti-malware program, known as “a2 Personal” (circa: 14JAN11), detected’ and allowed removal of a highly specific form of malware. This result caused a relatively new Hewlett-Packard Compaq Presario CQ60 laptop computer from working. The system is (equipped with current updates for its Microsoft Windows 7 Premium operating system program as well as its Microsoft Security Essentials anti-malware and anti-virus application program). The effect will render its lithium-ion battery and charging display to indicate the lithium battery was low (12%) -requiring charging. This simultaneously causing the laptop to silently reject alternating current (A-C) electrical power (110-Volt) having always been used to recharge the laptop battery within the laptop computer.
EmiSoft a2 Personal anti-malware and anti-virus application program located the malware as residing within the Hewlett-Packard factory created folder entitled “C:HPBin” where specifically that malware file was identified using the file name “EndProcess.exe” containing malware identified by EmiSoft a2 Personal as “Riskware.Win32.KillApp! A2” whereupon after the malware infected file was removed the Compaq Presario CQ60 laptop lithium battery resumed normal charging from the electrical power source as well as properly displaying the battery mode as “charging” rather than “not charging.” The EmiSoft “a2 Personal” anti-malware and anti-virus report records the aforementioned encountered problem (below).
Actual Malware Event ( Report ) –
COMPUTER: Compaq Presario CQ60
Emsisoft Anti-Malware – Version 5.1
Last update: 14-Jan-11 12:18:13 PM
Scan type: N/A
Objects: Memory, Traces, Cookies, C:, D:
Scan archives: Off
ADS Scan: On
Scan start: 14-Jan-11 12:18:44 PM
C:HPBinEndProcess.exe detected: Riskware.Win32.KillApp!A2
Registry keys: 0
Scan end: 14-Jan-11 4:00:17 PM
Scan time: 3:41:33
C:HPBinEndProcess.exe Quarantined: Riskware.Win32.KillApp!A2
Author: alvahurley819This author has published 3 articles so far. More info about the author is coming soon.