How to Fix a Garbage Disposal

First of all, the main goal would be to refrain from asking yourself how to fix a garbage disposal. You can achieve this by keeping it in top and prime condition through regular maintenance. There are times though when common problems would still occur and it would need a few simple repairs. Here are some of these instances and tips on how you could best address them.

Now, regardless of whatever kind of repair you are about to do, one of the main things to keep in mind is the precautionary measure of turning off your garbage disposal’s power at the breaker and removing the splash guard to make access easier. That said, you may now proceed to making the necessary repairs.

1. If the Disposal Doesn’t Turn On

The most common cause for such incident is an electrical problem like a tipped circuit. Another possible fix is perhaps you just need to reset the device or plug the entire system. If such are the cases, be thankful because all won’t cost you anything.

2. If there’s a Gentle Whir but Nothing is Happening

The main culprit could be a flywheel that’s stuck. A flywheel is one of those little blades responsible for chopping up your food waste. In such a case, the golden rule to abide by is to never reach your hands into the garbage disposal. A broom handle can be employed to remove the flywheel. It might also be necessary to use the wrench that came with your unit or if you don’t have a wrench, go to a repair  shop that sells your disposal’s model. Try having water run through the disposal, while turning the switch on and off because there are chances that the running water could take out the stuck flywheel.

3. If there are Objects Stuck in your Disposal

Your disposal is sure to get jammed if any object falls through the splashguard. To fix this incident, get a flashlight to locate and identify the object that’s causing the blockage. You may use metal tongs to dislodge the culprit. If this doesn’t do it, resort to using a special turning tool that comes with your unit (if available) or a broom handle. Once removed already, turn the power at the breaker on, run cold water and turn the disposal on again.

4. If You Need to Use a Turning Tool or Jam Wrench

Most garbage disposals are equipped with an Allen wrench that’s designed to fit into a the hole found at its bottom. If it doesn’t come with it though, you can go to your local hardware store and buy one. Employ a flashlight to find the hole, insert the Allen wrench on it and then turn the disposal back and forth to loosen what’s jammed. After which, turn the breaker power on, run cold water and turn on the disposal.

5. If the Drain is Clogged

Clogs are usually caused by accumulated food stuck in your drain. How to fix a garbage disposal with this kind of problem? Use an ordinary drain cleaner first but if it’s not enough, be prepared to get on your hands and knees. Start by placing a bucket under the drain. Then, loosen the fittings on the P-trap using a pipe wrench. Take out the P-trap and with that out of the way, find the clog and clean it out. If you can’t find the clog in the P-trap though, it may be necessary to thread an auger or snake down the pipe so you could remove the clog.

6. If the Garbage Disposal is Leaking

You need to turn off the device and then check the bolts. If all are still tight, it’s highly suggested that you purchase what they ca,, a “plumber’s putty” as this can help you stop the leak.

7. If there is an Overload

Often times, the reason for an sudden stop of turning in your garbage disposal is because it senses an overload, at which case, it’s programmed to automatically shut off. Wait for a few minutes to allow the disposal to cool down. Most units have a reset button found at the underside so once the unit is cool enough, press this reset button, run cold water and turn it on again. If this doesn’t cut it, there might be something wrong with the cord or wiring; at which point, you may need the help of an electrician already.

8. If it’s Really Busted

There’s not much you can do to fix a garbage disposal anymore. This means, it’s time to get a new one.


Now, as mentioned in this article’s introduction, the main aim, if you have a best batch feed garbage disposal, is to prevent having to fix it in the first place. That’s why proper and regular maintenance is the key to preventing such from happening.

Basically, garbage disposals are not meant to take in huge chunks of food so make sure you throw in small pieces of your food waste only. Once this has gone down the drain, run cold water, turn on the disposal and let it run for about 15 minutes. If you want to sharpen the blades of your disposal, bear in mind that the only safe thing to use for such a purpose is ice.

That said, we hope that proper use and regular maintenance can save you from having the problem of how to fix a garbage disposal as its misuse could lead to a replacement which can be pretty heavy on your wallet.

New Technology for Cloud Computing & Webhosting

Technology is good, especially if it is one that provides quality to the company. is a company that will provide you with the best web hosting services when you want to incorporate the new technology of cloud computing during your web hosting. You can get discounted prices on quality web hosting by purchasing the Hostgator coupons. Apart from the discounts, you will be able to get a quality reseller hosting, VPS hosting, domain registration together with dedicated servers.  Get the best services for less.

Webhosting on the Cloud

Cloud technology provides the user with capabilities like accessing a large number of applications without the need for having a license, purchasing, installing or downloading any of these applications. It also reduces both running and installation costs of computers and software as there is no need to have any infrastructure. With this technology, users can access information anywhere with just a connection to the internet. Cloud computing offers companies with an increased storage than traditional storage systems. It has automated software and batch updates which reduces the number of hired skilled IT personnel.


Address Resolution Protocol (ARP) Cache Poisoning 

ARP is used in the TCP/IP stack to resolve an IP address to sender side into MAC address at the receiver side. It contains a table that stores all the IP addresses of the networked devices and their corresponding MAC addresses. Malicious attack on the MAC  can cause a wrong IP address being mapped to the ARP cache. To stop this from happening, use of static ARP entries is applied. This technique can be applied for small networks like private clouds. For larger clouds, use of port security is advisable because it features locks for specific port on the switch to a specific IP address. Cloud technology is important to work on this.

Domain Name System (DNS) attacks And Cloud Technology

A Web hosting connects the DNS (domain name system) to the domain name. When you get a hosting account or domain name, you might need to update your domain DNS to connect to the correct server. A web host is basically a company that has specially configured computers that are permanently connected to the internet.  The web hosting service helps you to place your web site in the system (there is a monthly fee charge).  Get a web hosting service that will be devoid of attacks. Go the way, buy the hostgator coupons.

In the internet, web hosts are defined by names that are easy to remember by human beings, while computers deal with numbers. Each computer that is connected to the internet has a unique global internet protocol (IP). The DNS converts the web host names into corresponding IP addresses using a distributed database scheme. With cloud technology, the internet DNS is prone to attacks such as ARP cache poisoning, domain hijacking, and man in the middle attacks. This can be dealt with by use of cloud technology such as EPP, which uses an authorization code issued exclusively to the domain registrant as a security measure to prevent unauthorized name changing.

End User Attacks and Web hosting

There are several end user attacks on the web that hackers try to use to attack websites which are important to note while web hosting.  The first in the list is injection attacks are SQL (structured Query Language Injection) where a database is modified by injecting a code into the database query. Others include DDos (distributed denial of service) which overwhelms a website; Brute force used to crack username and password on a website; Cross site scripting where malicious scripts are injected into a harmless website. Get the hostgator coupon to enable you get free codes and deals from, the leading company in webhosting.

Attacks While Using Cloud Technology on Web site 

End user attacks on cloud technology include phishing, fraud and exploitation of software vulnerabilities still work and can threaten the cloud service infrastructure. Phishing and fraud are attempt to steal the identity of a legitimate user, such as usernames, passwords, and credit card details. How does phishing occur? The user sends an email with a link which appears to be for a legitimate website, his username and password will be sent to the attacker who can use them to attack the cloud. An email can also be sent to the user that pretends to come from the cloud provider and ask the user to supply his username and password for maintenance purposes. To counter this, the use of Spam filters, plug in spam blocker in the internet browser and training user not to respond to any spoofed email is used.


Network Security Alerts on Website using Cloud Technology

Cloud technology depends on existing network infrastructure which are LAN, MAN and WAN. This makes cloud computing to be exposed to the same security attacks. Users outside the cloud can still attack the cloud or a malicious inside user can still attack the cloud using the CSP. This can be done by interrupting the data to/from the cloud. The only way to counter this is to strengthen the security of the cloud computing.

Cloud Technology and exploitation of software vulnerabilities

Exploitation of software vulnerabilities refers to any flaw or weakness that can be found in an operating system or software that leads to security breaches. With this breach, an attack will find a way of implanting a malware for own use. Examples of this cloud technology attacks are: buffer overflow where the OS or software hangs and uncontrolled format string can be used to crash a program or to execute a malicious code. To counter this, software manufacturers normally release regular updates to address these flaws. It is important to frequently update the system with the latest security updates to mitigate these attacks. 

Conclusion of Website Security Attack on the Cloud

Cloud technology is an emerging technology in the IT world. It serves as a very attractive solution when the infrastructure or the IT personnel are not in a position to counter a problem or are too expensive. Though it is good, it has its own drawbacks which are mainly found in the security area and the vulnerability of the cloud computing. Unlike the traditional solutions where threats come from two known sources inside or outside the network, cloud computing security threats might originate from different sources thus, application, network and user level.