Basic PC Maintenance. Instructors. Action Center

Size: px
Start display at page:

Download "Basic PC Maintenance. Instructors. Action Center"

Transcription

1 Basic PC Maintenance The St. Edward's University workshop "Basic PC Maintenance" addresses best practices for maintaining your (Windows 7) PC at home. This document includes notes and recommendations for the key issues addressed in the workshop, and should be used as a reference when working through your regular maintenence routine. Please see the accompanying handout for the Help Desk's recommended schedule for routine maintenance. Instructors Chris Nichols, Help Desk Analyst Megan Ura, Computer Training Coordinator chriscn@stedwards.edu megang@stedwards.edu Action Center The Windows 7 Action Center (formerly known as Windows Security Center in Windows Vista and Windows XP starting in Service Pack 2), displays security and computer maintenance information that requires your attention. The Action Center displays notifications about your firewall, Windows Updates, and virus and spyware protection. When the Action Center needs your attention, you will see an icon with a flag marked with an "x" in the System Notification Area of your taskbar. Clicking on that icon will display a notification tooltip that shows important messages. Clicking on one of the messages will trigger an action for that specific message to help you resolve the issue. If there are no concerns, the white flag will still appear (without the "x") to give you quick access to the Action Center. For more information, visit Basic PC Maintenance - 1

2 Backing Up Files Why back up files? Backing up your files is a necessity to guarantee the safety and security of your data. Should something happen to your computer, you know you will have extra copies of your files and can easily restore them to a new computer. Our Recommendation: To ensure the safety of your data always have a local copy on your hard drive, an external copy saved on another device or online service, and an offsite copy. We use the Rule, meaning that you should have 3 backup copies of anything you want to keep: 2 different storage media and 1 offsite storage site. Backup systems to consider: We recommend you choose at least one method of each type. "Cloud" storage simply refers to accessing and/or backing up your data via the Internet from a particular online service. 1. "Extra Storage" backup locations - these allow you to drag and drop or upload copies of individual folders and files manually from your hard drive to another remote location for future access. Consider using online cloud systems like your EdShare account or Dropbox.com, or external devices like external hard drives, flash drives or data CDs. With these tools, you can use them anytime when you need a file, or only when you need to restore lost files. 2. Restoration/"single file" backup methods - these systems regularly back up your entire computer. These systems can be used to easily restore all of your files to a computer, because they write all backup data to a single restore file. However, this file cannot be opened and viewed like a normal file and must be "restored" to a computer to access ANY file after restoration. Recommended examples include Carbonite (a "cloud"-based system that backs up your system over the Internet) or Seagate (an external hard drive brand). Both Apple and Windows offer their own built-in restore methods as part of the operating system ("Time Machine" and "Windows Backup," respectively); both require an external hard drive to save the restore file on. If there's still room on your external drive, you can store individual folders and files for quick access, as well. No matter what you use, it's critical that 1) you use them, and 2) you have at least one method that you can access outside your home. Whether you store and backup files in the cloud via Dropbox and/or Carbonite, you might also consider saving copies of critical files to an external drive that you leave with a relative, or at work. This way, if something happens to your home, or you can't access your house, there's another location you can go to get those files. Basic PC Maintenance - 2

3 File Organization and Search Before you start backing up your files, take the time to make sure that your files are organized and stored in the correct locations on your computer. In Windows 7, most of your personal files should be stored in your Libraries. There are four libraries, one for each major type of media: Documents, Music, Pictures and Videos. Please save all of your files in one of these Libraries. By staying organized, it will be easier to maintain a backup regimen. Read the following help article and its "learn how" section to get started: Searching your files: When you are working in any of your Library folders, you will see a search box in the top right of the window. This search tool will allow you to find files across your computer, or any external storage device you have plugged in. This search feature works very simlar to Google, meaning that if your search has multiple words or special characters, you need to place quotation marks around the query. So if I want to find every file that ends in.doc, I need to type in ".doc" with the quotes into the search bar. If I want to find every.doc file that has the word annual in the file name, I would type in ".doc" + annual For tips on searching and accessing files like a pro, visit: Windows Update Windows Update is a service provided by Microsoft to deliver software updates for the Windows operating system and its installed components, including Internet Explorer. Basic PC Maintenance - 3

4 A more secure OS: Updates are the best way to prevent or repair known problems, and they can enhance the security of your computer. For Windows, the easiest way to install updates is to turn on automatic updating. Windows will install new updates as they become available, usually on the second Tuesday of the month. A "patch" is a software fix for a known security issue that is deliverered via Windows Updates. Our Recommendation: Turn on automatic updates to run at a convenient time for you. On your personal computer, you should set up your computer to download and install updates automatically. 3:00am is the default scheduled time for your system to check for updates to download and install. However, this only works if your system is set to update automatically, and your computer is turned on and connected to the internet at that time. These settings can be changed through the Control Panel (see the section "System and Security"). For campus and faculty/staff computers, updates are downloaded and installed for you by St. Edward's system administrators. For more FAQs, visit: Control Panel The Control Panel offers access to several areas where you can manage and peronalize your Windows 7. The next two sections of this document discuss the "System and Security" and the "Programs" areas. If you prefer, click the View by drop-down menu to see the Control Panel organized by individual icons rather than grouped categories. Basic PC Maintenance - 4

5 System and Security Windows Firewall: A firewall is a software program that monitors incoming and outgoing traffic on your computer. The firewall determines if the traffic is allowed depending on predefined rules. Exceptions can be made that tell the firewall some software is allowed to go onto the Internet, such as CARS or PC Anywhere. We recommend that you should turn your Windows Firewall on for your personal computer. If you are on an SEU-owned computer, you may see different firewall settings because of an enterprise firewall system IT uses. System: learning more about what is installed on your computer "View amout of RAM and processor speed": In this area, you can see at a glance what version of Windows your machine is running, including any service packs. You will also see information about you processor, RAM, and system type. If someone asks which service pack is installed, or how much RAM you have, this is where you can check your "specs" ("specifications"). "Check the Windows Experience Index": The "Windows Experience Index" is a way to rate how well all components of your computer work together, including your CPU, HDD, and RAM etc. One or more less-than-optimal components can cause the score to drop, but should not be a concern for average users. Windows Update: The Control Panel is another way to access your updates. "Turn automatic updating on or off": Click here and choose "Install updates automatically (recommended)" from the drop-down menu under "Important Updates." Where it says "Install New Updates," choose a time that your computer is often on, but you are not actively using it, such as Basic PC Maintenance - 5

6 during a coffee break or lunch, then click the OK button. You can use your computer while updates download and install, but depending on the nature of the updates, they may take longer if you are slowing down your system by running other demanding programs or games. "Check for Updates": Click here if you want to check for updates manually. Windows 7 will check for any missing updates and prompt you to download and install them if any are missing. Administrative Tools: "Free up disc space" a.k.a. Disk Cleanup: scans and removes files from hard drive Feel free to use this tool, but don't rely on it to free up large amounts of space. Your hard drive should only be filled to 80% max, so if you are running out of space, you need to clear off more files. Consider uninstalling unnecessary software or storing unused, archived files to an external/cloud storage location (see the section on "Backing Up Files"). "Defragment your hard drive": Defragging is a process that takes all fragmented files and creates a contagious space at the beginning of a hard drive and leaving empty space at the end. This is done to improve computing speed, but with the speed and ability of computers today this process is not needed and is not recommended. The nominal amount of computing speed this process once provided is no longer relevant. Please note: defragging a solid state drive i.e. a USB flash drive could destroy the file system. Programs > Uninstall a program About Software Programs: Learning what a program is and where it is helps to understand your computer better. An icon that opens your favorite program and an.exe file are very different. An icon can be deleted or moved, but the.exe is a crucial part of the success in running software. On a Windows computer, programs are located in C:/Program Files; you can see all of your installed software programs by going to your Computer icon, selecting "Local Disk (C:)" from the left column, then opening the "Program Files" folder. Be careful - moving or deleting any of these files will likely cause that program to behave incorrectly or stop working entirely. Uninstalling a Program: Go to the Control Panel and click "Uninstall a Program," under the Programs heading. Click once the program, then click the "Uninstall" button above the list of programs. This method is more preferable than removing the program out of the Program Files folder; it is best to let the software Basic PC Maintenance - 6

7 correctly uninstall itself than to delete files on your own. What's a "driver"? A driver acts like a translator between a device and the program that uses it. For example, multi-function printers often require drivers for all of the printer features to work properly. Drivers allow the scanning software to talk to the scanner, control paper feeders, and the software that stops and pauses the print jobs. Nowadays, most devices/perhipherals that plug into your computer install their own drivers. If your system alerts you that drivers are missing, consult the manual for the device or check the manufacturer's website - you can often install drivers from their site easily. Error-checking - the new "Scan Disk"/"Check Disk" Error-checking, formerly known as Check Disk/Scan Disk, is the utility that scans the hard drive for errors and attempts to correct them if found. These errors and performance issues are related to the file system and do not look at things the user would see on a day-to-day basis. Visit the Windows help site for instructions: Our Recommendation: Use Error-checking in the case of an emergency, such as when your computer starts crashing on you frequently. This is not a tool for regular maintenance use. You may also find that Third-party programs may produce better results; we like CCleaner, from Basic PC Maintenance - 7

8 Antivirus Viruses are malicious programs that replicates itself and sends itself to other computers. They embed themselves into programs and even the operating system itself, destroying files. Worms self-replicate and spread to other computers via networks (not file to file like viruses), infecting and taking over whole systems of computers. Trojan horse is a malicious software that piggy backs on to your computer through a legitimate program, but then steals information or harms your system once it gets in. Most viruses,trojans, and worms are now referred to today as "malware," which can be a wide variety of different software instances but the common factor is they all have malicious intent. Quarantine is used to isolate a file that a virus scanner sees as malicious. This gives you a chance to view the file and decide if the file is harmful or legitimate. Visit our Symantec Antivirus support page for instructions on how to download, install and update your Symantec antivirus: We also recommend reading through the rest of our site s Computer and Information Security section at Windows Resources Windows Tutorials: (official Microsoft site) These websites have a large collection of video tutorials and articles that discuss PC care and related topics. Check out their Windows 7, Microsoft Office and Malware/Security categories. For the aspiring power user: Basic PC Maintenance - 8

9 Web Shows for Windows Users: Windows Weekly is a web show about all things Microsoft and PC, usually focusing on news and current events in the industry. If you really get into it, we also recommend checking out the rest of shows across the TWiT network, including the flagship show, This Week in Tech. Chris Pirillo makes videos covering a variety of personal computing topics. Each video is only a few minutes in length. He also blogs at Veronica Belmont s YouTube channel dedicated to Windows 7 and the best tips I've come across for this great OS. Maintain your Security Online, too. Use this website when you need help choosing a secure password. Remember, a secure password will have at least six characters, a special character, and an uppercase letter. If you re a Firefox user, this site will show you at a glance the status of your browser plug-ins, including any of those out of date. The best part is that you can update those plug-ins directly from this site! A "plugin" is a program that you can install onto your browser to add a feature or function. Add-ons in IE 9: Manage your Extensions in Chrome: chrome://extensions Learn more about Phishing - Phishing is a malicious attempt at gathering information about you, such as your passwords or back account information. is a large target in which a person tries to get you to click on a link that will send you to a infected website or impersonate a real business to trick you into giving them your personal information. Mobile devices access the Internet so can be vulnerable to attack as well. Methods of attack are third arty apps, malicious QRcodes, and scam text messages. When conducting sensitive business online, such as accessing your bank account or making a purchase, be sure to check for "https" at the front of the URL. The "s" stands for secure. This is SSL (secure socket layer), which provides encrypted communication between you and the service you are accessing. Basic PC Maintenance - 9

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Housekeeping Your PC

Housekeeping Your PC for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

10 Simple Computer Maintenance Tips For The Laptop

10 Simple Computer Maintenance Tips For The Laptop Greenspring Computer Club April 2015 No matter how savvy you are, there are certain things every one of us has to deal with when using a computer and we don t always deal with them in the most efficient

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Understand Backup and Recovery Methods

Understand Backup and Recovery Methods Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows

More information

BASIC PC MAINTENANCE AND BACKUP Lesson 1

BASIC PC MAINTENANCE AND BACKUP Lesson 1 BASIC PC MAINTENANCE AND BACKUP Lesson 1 Table of Contents Lesson 1: Computer Maintenance, Printing, and Finding Help Disk Clean-up, Error-Checking, Defragmentation...2, 3 Learn the Details of Your Computer...4

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

F-Secure Anti-Virus for Mac. User's Guide

F-Secure Anti-Virus for Mac. User's Guide F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Computer Maintenance Guide

Computer Maintenance Guide Computer Maintenance Guide Do you get days where you feel like tearing your hair out, because your Pc will not operate in the manner which it did when you first bought it. Believe me you are not alone,

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Accessing your Staff (N and O drive) files from off campus

Accessing your Staff (N and O drive) files from off campus Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document

More information

Dacorum U3A Computer Support Group. Friday 27th March 2015

Dacorum U3A Computer Support Group. Friday 27th March 2015 Dacorum U3A Computer Support Group Archiving and Backup for Windows PC's. This will include local backup to HD, USB Memory, NAS and Cloud storage. Friday 27th March 2015 Agenda Discussion about format

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Simple Computer Backup

Simple Computer Backup Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:

More information

Basic Computer Maintenance

Basic Computer Maintenance Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive. Basic Computer Security Practices Make backups of important files. Apply patches to the operating system. Use anti-virus software, update definitions very frequently, and run a full virus scan at least

More information

SystemTech AntiSpyware Manual

SystemTech AntiSpyware Manual Summitsoft Corporation SystemTech AntiSpyware Manual This guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under

More information

The Care and Feeding of Your Computer Troubleshooting and Maintenance

The Care and Feeding of Your Computer Troubleshooting and Maintenance Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Preparing Your Personal Computer to Connect to the VPN

Preparing Your Personal Computer to Connect to the VPN Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer

More information

FAQ. F-Secure Online Backup 2.1

FAQ. F-Secure Online Backup 2.1 FAQ F-Secure Online Backup 2.1 Before installation... 4 Does the F-Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs

More information

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360. Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

C&G FLUX MARKET Internet Safety

C&G FLUX MARKET Internet Safety Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Before You Begin, Your Computer Must Meet the System Requirements

Before You Begin, Your Computer Must Meet the System Requirements Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM

More information

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology

More information

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec: Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

Kaspersky Internet Security

Kaspersky Internet Security Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Maintaining, Updating, and Protecting Windows 7

Maintaining, Updating, and Protecting Windows 7 Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

AHS Computing. IE 7 Seminar

AHS Computing. IE 7 Seminar AHS Computing IE 7 Seminar What is IE 7? IE 7 is the new web-browser distributed by Microsoft New features with IE 7 make surfing the web easier and safer Tabbed Browsing New Favorites Center Built in

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

FAQ. F-Secure Online Backup

FAQ. F-Secure Online Backup F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

BULLGUARD BAckUp GUIDE

BULLGUARD BAckUp GUIDE BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

Getting started with OneDrive

Getting started with OneDrive Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Clickfree C6 Easy Imaging October 24, 2011

Clickfree C6 Easy Imaging October 24, 2011 HOW LONG WILL THE FIRST BACKUP TAKE? Clickfree Total Computer Backup can take a few hours to complete when first plugged in. Since Clickfree will copy absolutely everything from your computer (including

More information

Using XP Service Pack 2 with Cameleon

Using XP Service Pack 2 with Cameleon 1.1 What do I need to know about installing XP Service Pack 2 (XPSP2)? The Microsoft website has information about the service pack. Go to http://www.microsoft.com/windowsxp/sp2/default.mspx for more information

More information

Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9

Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9 Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9 If you are not working from a Windows 7 or 8 computer, you will need to update: Windows XP to Service Pack 3 Windows Vista

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

USER MANUAL SlimComputer

USER MANUAL SlimComputer USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

THE. solution. STORe it. SHARE it.

THE. solution. STORe it. SHARE it. THE small business solution THE HP Storageworks X510 Data Vault STORe it. SECURE it. SHARE it. T H E H P S t o r a g e w o r k s X 51 0 D a t a V a u l t data protection just got less puzzling If, like

More information

Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial

Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Created by: Melanie Cofield Based on information found at: https://www.utexas.edu/its/bevoware/virus/macxvirus.html

More information

Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.

Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers. What is a Canvio Home device? Canvio Home is a Network-Attached Storage device that is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.

More information

Clickfree frequently asked questions

Clickfree frequently asked questions Clickfree frequently asked questions Q: What is Cloud Storage? A: Cloud Storage is a term used for storing data remotely via the Internet. Cloud companies such as Elephant Drive provide this service. Q:

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Sophos Endpoint Security and Control Help

Sophos Endpoint Security and Control Help Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Free and Legal Software You Can Download By Tom Krauser

Free and Legal Software You Can Download By Tom Krauser Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions

More information

Introduction to Windows 7

Introduction to Windows 7 Introduction to Windows 7 Table of Contents 1 - The Desktop... 2 Desktop Icons... 2 Interior Decorating Windows 7: Changing Desktop Properties... 3 Taskbar & Toolbars... 4 Quick View (Peek)... 5 Start

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

Utilizing Dropbox to Share Files

Utilizing Dropbox to Share Files Utilizing Dropbox to Share Files At times it is necessary to share large files with instructors or other students. Dropbox.com provides a very user friendly solution to fill this need. Dropbox is designed

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

IT Helpdesk Services. IT Environment Operation Support Service Menu

IT Helpdesk Services. IT Environment Operation Support Service Menu IT Helpdesk Services IT Environment Operation Support Service Menu Do you ever need a little help with your personal computer? IT Helpdesk Services Person unfamiliar with PC Person unfamiliar with PC Help

More information

Kaspersky Total Security User Guide

Kaspersky Total Security User Guide Kaspersky Total Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this

More information

Bitdefender Total Security 2015 User's Guide

Bitdefender Total Security 2015 User's Guide USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Citrix XenApp 6.5 User Guide. For Windows and OS X

Citrix XenApp 6.5 User Guide. For Windows and OS X Citrix XenApp 6.5 User Guide For Windows and OS X Table of Contents Target Audience... 3 Prerequisites... 3 Windows:... 3 OS X:... 3 Installing Client... 4 Downloading the Client:... 4 Launching the Installer...

More information