Thursday, June 25, 2009

This is a step by step guide to maintaining your computer

Your computer’s hard drive (hard disc,) is where all the information is held that operates your computer. Any programmes you add or remove from this drive either decreases or increases the amount of disc space available to you for the storage of data. When a programme is either installed or uninstalled, files are created by the programme to help it perform various actions. Although programmes generally try to remove all these “Temporary files,” some do not manage to remove all these files. Also, when a programme is installed or uninstalled, it leaves a gap “A fragment,” in your hard drive. While this is not detrimental to your computer on a day to day basis, continual installing and uninstalling without maintaining your computer will result in a “Fragmented hard drive.” This state will mean your computer will run slower than it might if your hard drive was not fragmented.

Window-based computers have a feature called the “recycle bin.” This feature means that when you delete a file from your computer, it will be stored in this “bin” until it is removed from the bin. This means that, if the recycle bin is not regularly emptied, it will become full and you will not be able to safely delete files from your computer.

MANUAL FILE DELETE. Before you use any disc maintenance tools, you must delete unwanted files from your hard drive. After you have deleted all unwanted work related files, you will have to go to other directories to seek and delete other files placed on your computer’s hard drive during normal operation. These files are found in the following directories. The “Temp” directory holds files generated by installing or uninstalling programmes, all these files can be removed. The “Temporary internet files” folder contains files that are put onto your computer when you surf the internet. These can be removed. Recycle bin, this is where all deleted files are stored, please make sure you no longer need these files before deleting them. Deleting files from the recycle bin is a permanent action and no files deleted from the recycle bin can be retrieved. Once you have checked the recycle bin and are sure you no longer need these files, delete them also. In the route directory of your drive, usually the C drive, there might be files that Scandisk has previously created from lost file fragments, these will be labelled with the suffix “.chk,” these can be deleted, but be careful not to delete other files from the route directory. The “Temp” and “temporary internet files” directories are found in the “Windows” directory on your hard drive. To access these directories, from the desktop, press the start button, point to programmes, point to windows explorer and then double click the “windows” directory. In that directory are directories named “Temp” and “Temporary internet files.” Select these directories and delete their contents, deleting the contents of these directories will not compromise your system. Then exit windows explorer.

From the desktop, press the start button, point to settings, click control panel, and then click “internet options. Click “delete temporary internet files,” You will be asked if you would like to delete all “off line content.” This is pages that have been automatically saved to your computer’s hard drive while you surf the internet. Check this box to have all off line content deleted along with your temporary internet files, then, press okay. Then go to “clear history.” Click this and press okay. Go to okay. Then exit control panel. Please make sure your recycle bin is empty by returning to windows explorer and verifying it is empty. To empty the recycle bin, from the desktop, click the start button, point to programmes, click windows explorer and then select recycle bin. Click the file menu and select “empty recycle bin.” Press yes and then exit windows explorer.

DISK CLEAN-UP. From the desktop, click on the start button, point to “programmes,” point to “Accessories,” then to “System tools.” Click on disc clean up. Disc clean up will then check all available drives, such as your floppy drive and then present you with a selection of drives to clean. Select the drive and then select okay. The [programme will then present you with a list of files it has found that can be safely deleted from your system. Select okay and then follow the instructions on your screen.

DISK DEFRAGMENTER. To access the disk defragmenter, from the desktop, click on the start button, point to “programmes,” point to “Accessories,” then to “System tools.” Click on disk defragmenter. A list will appear with the drives you can choose to defragment. Select your drive and press okay. Disk defragmenter will notify you when it has finished defragmenting your hard drive. You can then exit the programme, or choose another drive to defragment. Defragmentation of media such as CD roms is not possible.

SCANDISK. To access scandisk, from the desktop, click on the start button, point to “programmes,” point to “Accessories,” then to “System tools.” Click on scandisk. The programme will present you with a list of drives to scan, select the drive you wish to check for errors and press okay. Scandisk will notify you of a completed scan, giving you information about the drive scanned, bad sectors on that drive, errors encountered, and whether scandisk fixed or was unable to fix the errors. You can then choose to exit the programme or to scan another drive. Scandisk can be set to perform two types of scan, a standard scan, which checks files and folders for errors, and a thorough scan, which checks the surface of your hard drive for errors. In both cases, scandisk can be set to prompt you for action when an error is encountered, or fix the errors automatically. It must be noted that the default setting for both the standard and thorough scans are sufficient for disc maintenance, but can be customised for your particular requirements.

MAINTENANCE WIZARD. Maintenance wizard enables you to set a time when maintenance is automatically performed on your computer. This could be during the early hours, when you are not using the computer for other tasks. Maintenance wizard streamlines cleaning up, defragmenting and scanning your disc for errors into one easy step. As maintenance wizard uses the same settings as scandisk, disk defragmenter, and disc clean up, all that is needed to perform an automatic maintenance cycle is to follow these steps. From the desktop, click on the start button, point to “programmes,” point to “Accessories,” then to “System tools.” Click on maintenance wizard. The programme will present you with a selection box, select either “perform maintenance now,” or “customise each maintenance setting myself.” If you would like to customise your own maintenance settings, to select the time for automatic maintenance, alter what each programme does during the maintenance process etc, select “customise each maintenance setting myself,” and follow the instructions on your screen.

What is a Malware?

The main purpose of a malware, virus, worm, trojan, spy-ware and adware is to create discomfort to the user. Discomfort in terms of damaging files, crashing the hard drive, hacking ones privacy, and worst damaging the hardware itself. To fully understand malware software and all of its related software and programs, let us first define them.

A MALWARE is a type of software designed to take over and/ or damage a computer user's operating system, without his or her knowledge or approval. Once installed, it is often very difficult to remove, and depending on the severity of the program installed, its handiwork can range in degree from the slightly annoying (such as unwanted pop up ads while a user is performing regular computing tasks on or offline), do irreparable damage requiring the reformatting of one's hard drive, since much malware is poorly written. Examples of malware include viruses and Trojan horses.

A VIRUS is a program - a piece of executable code - that has the unique ability to replicate. Like biological virus, computer virus can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual.

A WORM is a self-replicating computer program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. They are often designed to exploit the file transmission capabilities found on many computers.

A TROJAN (TROJAN HORSE) is a malicious program that is disguised as legitimate software. Trojan horse programs cannot replicate themselves, in contrast to some other types of malware , like viruses or worms. A Trojan horse can be deliberately attached to otherwise useful software by a cracker, or it can be spread by tricking users into believing that it is a useful program.

A SPYWARE is a piece of software that collects and sends information (such as browsing patterns in the more benign cases or credit card numbers in more malicious cases) about users or, more precisely, the results of their computer activity, typically without explicit notification. They usually work and spread like Trojan horses. The category of SPYWARE is sometimes taken to include adware of the less-forthcoming sort.

An ADWARE or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.

To prevent Malware problems and other harmful programs and software, a very basic pre-caution that the user must exercise. First, never open any files or macros attached to an email from an unknown, suspicious or untrustworthy source or sender. Delete these attachments immediately, then "double delete" them by emptying your Trash. Delete spam, chain, and other junk email without forwarding. Second, never download files from unknown or suspicious sites and sources. Third, always scan a floppy diskette, CDROM/DVD media, USB drive and any other form of external media storage from an unknown source for viruses before using it. Avoid direct disk sharing with read/write access unless there is absolutely requirement to do so. Forth, back-up critical data and system configurations on a regular basis and store the data in a safe place. Fifth, new viruses are discovered almost every day. Periodically check the Anti-Virus Policy or updates. And lastly, never install pirated software on you PC. Pirated software is a good media source of a virus attack.