Basic PC Maintenance. Instructors. Action Center
|
|
- William Gardner
- 8 years ago
- Views:
Transcription
1 Basic PC Maintenance The St. Edward's University workshop "Basic PC Maintenance" addresses best practices for maintaining your (Windows 7) PC at home. This document includes notes and recommendations for the key issues addressed in the workshop, and should be used as a reference when working through your regular maintenence routine. Please see the accompanying handout for the Help Desk's recommended schedule for routine maintenance. Instructors Chris Nichols, Help Desk Analyst Megan Ura, Computer Training Coordinator chriscn@stedwards.edu megang@stedwards.edu Action Center The Windows 7 Action Center (formerly known as Windows Security Center in Windows Vista and Windows XP starting in Service Pack 2), displays security and computer maintenance information that requires your attention. The Action Center displays notifications about your firewall, Windows Updates, and virus and spyware protection. When the Action Center needs your attention, you will see an icon with a flag marked with an "x" in the System Notification Area of your taskbar. Clicking on that icon will display a notification tooltip that shows important messages. Clicking on one of the messages will trigger an action for that specific message to help you resolve the issue. If there are no concerns, the white flag will still appear (without the "x") to give you quick access to the Action Center. For more information, visit Basic PC Maintenance - 1
2 Backing Up Files Why back up files? Backing up your files is a necessity to guarantee the safety and security of your data. Should something happen to your computer, you know you will have extra copies of your files and can easily restore them to a new computer. Our Recommendation: To ensure the safety of your data always have a local copy on your hard drive, an external copy saved on another device or online service, and an offsite copy. We use the Rule, meaning that you should have 3 backup copies of anything you want to keep: 2 different storage media and 1 offsite storage site. Backup systems to consider: We recommend you choose at least one method of each type. "Cloud" storage simply refers to accessing and/or backing up your data via the Internet from a particular online service. 1. "Extra Storage" backup locations - these allow you to drag and drop or upload copies of individual folders and files manually from your hard drive to another remote location for future access. Consider using online cloud systems like your EdShare account or Dropbox.com, or external devices like external hard drives, flash drives or data CDs. With these tools, you can use them anytime when you need a file, or only when you need to restore lost files. 2. Restoration/"single file" backup methods - these systems regularly back up your entire computer. These systems can be used to easily restore all of your files to a computer, because they write all backup data to a single restore file. However, this file cannot be opened and viewed like a normal file and must be "restored" to a computer to access ANY file after restoration. Recommended examples include Carbonite (a "cloud"-based system that backs up your system over the Internet) or Seagate (an external hard drive brand). Both Apple and Windows offer their own built-in restore methods as part of the operating system ("Time Machine" and "Windows Backup," respectively); both require an external hard drive to save the restore file on. If there's still room on your external drive, you can store individual folders and files for quick access, as well. No matter what you use, it's critical that 1) you use them, and 2) you have at least one method that you can access outside your home. Whether you store and backup files in the cloud via Dropbox and/or Carbonite, you might also consider saving copies of critical files to an external drive that you leave with a relative, or at work. This way, if something happens to your home, or you can't access your house, there's another location you can go to get those files. Basic PC Maintenance - 2
3 File Organization and Search Before you start backing up your files, take the time to make sure that your files are organized and stored in the correct locations on your computer. In Windows 7, most of your personal files should be stored in your Libraries. There are four libraries, one for each major type of media: Documents, Music, Pictures and Videos. Please save all of your files in one of these Libraries. By staying organized, it will be easier to maintain a backup regimen. Read the following help article and its "learn how" section to get started: Searching your files: When you are working in any of your Library folders, you will see a search box in the top right of the window. This search tool will allow you to find files across your computer, or any external storage device you have plugged in. This search feature works very simlar to Google, meaning that if your search has multiple words or special characters, you need to place quotation marks around the query. So if I want to find every file that ends in.doc, I need to type in ".doc" with the quotes into the search bar. If I want to find every.doc file that has the word annual in the file name, I would type in ".doc" + annual For tips on searching and accessing files like a pro, visit: Windows Update Windows Update is a service provided by Microsoft to deliver software updates for the Windows operating system and its installed components, including Internet Explorer. Basic PC Maintenance - 3
4 A more secure OS: Updates are the best way to prevent or repair known problems, and they can enhance the security of your computer. For Windows, the easiest way to install updates is to turn on automatic updating. Windows will install new updates as they become available, usually on the second Tuesday of the month. A "patch" is a software fix for a known security issue that is deliverered via Windows Updates. Our Recommendation: Turn on automatic updates to run at a convenient time for you. On your personal computer, you should set up your computer to download and install updates automatically. 3:00am is the default scheduled time for your system to check for updates to download and install. However, this only works if your system is set to update automatically, and your computer is turned on and connected to the internet at that time. These settings can be changed through the Control Panel (see the section "System and Security"). For campus and faculty/staff computers, updates are downloaded and installed for you by St. Edward's system administrators. For more FAQs, visit: Control Panel The Control Panel offers access to several areas where you can manage and peronalize your Windows 7. The next two sections of this document discuss the "System and Security" and the "Programs" areas. If you prefer, click the View by drop-down menu to see the Control Panel organized by individual icons rather than grouped categories. Basic PC Maintenance - 4
5 System and Security Windows Firewall: A firewall is a software program that monitors incoming and outgoing traffic on your computer. The firewall determines if the traffic is allowed depending on predefined rules. Exceptions can be made that tell the firewall some software is allowed to go onto the Internet, such as CARS or PC Anywhere. We recommend that you should turn your Windows Firewall on for your personal computer. If you are on an SEU-owned computer, you may see different firewall settings because of an enterprise firewall system IT uses. System: learning more about what is installed on your computer "View amout of RAM and processor speed": In this area, you can see at a glance what version of Windows your machine is running, including any service packs. You will also see information about you processor, RAM, and system type. If someone asks which service pack is installed, or how much RAM you have, this is where you can check your "specs" ("specifications"). "Check the Windows Experience Index": The "Windows Experience Index" is a way to rate how well all components of your computer work together, including your CPU, HDD, and RAM etc. One or more less-than-optimal components can cause the score to drop, but should not be a concern for average users. Windows Update: The Control Panel is another way to access your updates. "Turn automatic updating on or off": Click here and choose "Install updates automatically (recommended)" from the drop-down menu under "Important Updates." Where it says "Install New Updates," choose a time that your computer is often on, but you are not actively using it, such as Basic PC Maintenance - 5
6 during a coffee break or lunch, then click the OK button. You can use your computer while updates download and install, but depending on the nature of the updates, they may take longer if you are slowing down your system by running other demanding programs or games. "Check for Updates": Click here if you want to check for updates manually. Windows 7 will check for any missing updates and prompt you to download and install them if any are missing. Administrative Tools: "Free up disc space" a.k.a. Disk Cleanup: scans and removes files from hard drive Feel free to use this tool, but don't rely on it to free up large amounts of space. Your hard drive should only be filled to 80% max, so if you are running out of space, you need to clear off more files. Consider uninstalling unnecessary software or storing unused, archived files to an external/cloud storage location (see the section on "Backing Up Files"). "Defragment your hard drive": Defragging is a process that takes all fragmented files and creates a contagious space at the beginning of a hard drive and leaving empty space at the end. This is done to improve computing speed, but with the speed and ability of computers today this process is not needed and is not recommended. The nominal amount of computing speed this process once provided is no longer relevant. Please note: defragging a solid state drive i.e. a USB flash drive could destroy the file system. Programs > Uninstall a program About Software Programs: Learning what a program is and where it is helps to understand your computer better. An icon that opens your favorite program and an.exe file are very different. An icon can be deleted or moved, but the.exe is a crucial part of the success in running software. On a Windows computer, programs are located in C:/Program Files; you can see all of your installed software programs by going to your Computer icon, selecting "Local Disk (C:)" from the left column, then opening the "Program Files" folder. Be careful - moving or deleting any of these files will likely cause that program to behave incorrectly or stop working entirely. Uninstalling a Program: Go to the Control Panel and click "Uninstall a Program," under the Programs heading. Click once the program, then click the "Uninstall" button above the list of programs. This method is more preferable than removing the program out of the Program Files folder; it is best to let the software Basic PC Maintenance - 6
7 correctly uninstall itself than to delete files on your own. What's a "driver"? A driver acts like a translator between a device and the program that uses it. For example, multi-function printers often require drivers for all of the printer features to work properly. Drivers allow the scanning software to talk to the scanner, control paper feeders, and the software that stops and pauses the print jobs. Nowadays, most devices/perhipherals that plug into your computer install their own drivers. If your system alerts you that drivers are missing, consult the manual for the device or check the manufacturer's website - you can often install drivers from their site easily. Error-checking - the new "Scan Disk"/"Check Disk" Error-checking, formerly known as Check Disk/Scan Disk, is the utility that scans the hard drive for errors and attempts to correct them if found. These errors and performance issues are related to the file system and do not look at things the user would see on a day-to-day basis. Visit the Windows help site for instructions: Our Recommendation: Use Error-checking in the case of an emergency, such as when your computer starts crashing on you frequently. This is not a tool for regular maintenance use. You may also find that Third-party programs may produce better results; we like CCleaner, from Basic PC Maintenance - 7
8 Antivirus Viruses are malicious programs that replicates itself and sends itself to other computers. They embed themselves into programs and even the operating system itself, destroying files. Worms self-replicate and spread to other computers via networks (not file to file like viruses), infecting and taking over whole systems of computers. Trojan horse is a malicious software that piggy backs on to your computer through a legitimate program, but then steals information or harms your system once it gets in. Most viruses,trojans, and worms are now referred to today as "malware," which can be a wide variety of different software instances but the common factor is they all have malicious intent. Quarantine is used to isolate a file that a virus scanner sees as malicious. This gives you a chance to view the file and decide if the file is harmful or legitimate. Visit our Symantec Antivirus support page for instructions on how to download, install and update your Symantec antivirus: We also recommend reading through the rest of our site s Computer and Information Security section at Windows Resources Windows Tutorials: (official Microsoft site) These websites have a large collection of video tutorials and articles that discuss PC care and related topics. Check out their Windows 7, Microsoft Office and Malware/Security categories. For the aspiring power user: Basic PC Maintenance - 8
9 Web Shows for Windows Users: Windows Weekly is a web show about all things Microsoft and PC, usually focusing on news and current events in the industry. If you really get into it, we also recommend checking out the rest of shows across the TWiT network, including the flagship show, This Week in Tech. Chris Pirillo makes videos covering a variety of personal computing topics. Each video is only a few minutes in length. He also blogs at Veronica Belmont s YouTube channel dedicated to Windows 7 and the best tips I've come across for this great OS. Maintain your Security Online, too. Use this website when you need help choosing a secure password. Remember, a secure password will have at least six characters, a special character, and an uppercase letter. If you re a Firefox user, this site will show you at a glance the status of your browser plug-ins, including any of those out of date. The best part is that you can update those plug-ins directly from this site! A "plugin" is a program that you can install onto your browser to add a feature or function. Add-ons in IE 9: Manage your Extensions in Chrome: chrome://extensions Learn more about Phishing - Phishing is a malicious attempt at gathering information about you, such as your passwords or back account information. is a large target in which a person tries to get you to click on a link that will send you to a infected website or impersonate a real business to trick you into giving them your personal information. Mobile devices access the Internet so can be vulnerable to attack as well. Methods of attack are third arty apps, malicious QRcodes, and scam text messages. When conducting sensitive business online, such as accessing your bank account or making a purchase, be sure to check for "https" at the front of the URL. The "s" stands for secure. This is SSL (secure socket layer), which provides encrypted communication between you and the service you are accessing. Basic PC Maintenance - 9
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
More informationHousekeeping Your PC
for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services
More informationQuick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
More information10 Simple Computer Maintenance Tips For The Laptop
Greenspring Computer Club April 2015 No matter how savvy you are, there are certain things every one of us has to deal with when using a computer and we don t always deal with them in the most efficient
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationWhat is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.
USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6
More informationContents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More informationUnderstand Backup and Recovery Methods
Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows
More informationBASIC PC MAINTENANCE AND BACKUP Lesson 1
BASIC PC MAINTENANCE AND BACKUP Lesson 1 Table of Contents Lesson 1: Computer Maintenance, Printing, and Finding Help Disk Clean-up, Error-Checking, Defragmentation...2, 3 Learn the Details of Your Computer...4
More informationINTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
More informationComputer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
More informationF-Secure Anti-Virus for Mac. User's Guide
F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to
More informationOhio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide
Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.
More informationComputer Maintenance Guide
Computer Maintenance Guide Do you get days where you feel like tearing your hair out, because your Pc will not operate in the manner which it did when you first bought it. Believe me you are not alone,
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More informationAccessing your Staff (N and O drive) files from off campus
Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document
More informationDacorum U3A Computer Support Group. Friday 27th March 2015
Dacorum U3A Computer Support Group Archiving and Backup for Windows PC's. This will include local backup to HD, USB Memory, NAS and Cloud storage. Friday 27th March 2015 Agenda Discussion about format
More informationCyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
More informationSimple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
More informationBasic Computer Maintenance
Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library
More informationOnline Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
More informationSeagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
More informationF-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationComputer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.
Basic Computer Security Practices Make backups of important files. Apply patches to the operating system. Use anti-virus software, update definitions very frequently, and run a full virus scan at least
More informationSystemTech AntiSpyware Manual
Summitsoft Corporation SystemTech AntiSpyware Manual This guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under
More informationThe Care and Feeding of Your Computer Troubleshooting and Maintenance
Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use
More informationKaspersky Small Office Security User Guide
Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
More informationPreparing Your Personal Computer to Connect to the VPN
Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer
More informationFAQ. F-Secure Online Backup 2.1
FAQ F-Secure Online Backup 2.1 Before installation... 4 Does the F-Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs
More informationNorton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.
Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationCyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
More informationC&G FLUX MARKET Internet Safety
Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs
More informationSyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
More informationEssentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library
Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the
More informationBefore You Begin, Your Computer Must Meet the System Requirements
Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM
More informationGETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationComputer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014
Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology
More informationAdditionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on
More informationFrequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationKaspersky Internet Security
Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
More informationMaintaining, Updating, and Protecting Windows 7
Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center
More informationBitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
More informationavast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide
avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus
More informationAHS Computing. IE 7 Seminar
AHS Computing IE 7 Seminar What is IE 7? IE 7 is the new web-browser distributed by Microsoft New features with IE 7 make surfing the web easier and safer Tabbed Browsing New Favorites Center Built in
More informationCBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
More informationUsing MioNet. 2006 Senvid Inc. User Manual Version 1.07
Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication
More informationFAQ. F-Secure Online Backup
F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better
More informationHow To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
More informationSophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
More informationInstallation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
More informationSecure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
More informationhttp://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationGet Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
More informationBULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationWelcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013
Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF
More informationVerizon Internet Security Suite Powered by McAfee User Guide
Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationInstalling FileMaker Pro 11 in Windows
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
More informationManagement Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete
Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.
More informationBasic Virus Removal Steps
Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove
More informationGetting started with OneDrive
Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents
More informationViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
More informationClickfree C6 Easy Imaging October 24, 2011
HOW LONG WILL THE FIRST BACKUP TAKE? Clickfree Total Computer Backup can take a few hours to complete when first plugged in. Since Clickfree will copy absolutely everything from your computer (including
More informationUsing XP Service Pack 2 with Cameleon
1.1 What do I need to know about installing XP Service Pack 2 (XPSP2)? The Microsoft website has information about the service pack. Go to http://www.microsoft.com/windowsxp/sp2/default.mspx for more information
More informationBefore You Begin Your Computer Must Meet the System Requirements to Access Cloud9
Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9 If you are not working from a Windows 7 or 8 computer, you will need to update: Windows XP to Service Pack 3 Windows Vista
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationUSER MANUAL SlimComputer
USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14
More informationavast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
More informationCTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationTHE. solution. STORe it. SHARE it.
THE small business solution THE HP Storageworks X510 Data Vault STORe it. SECURE it. SHARE it. T H E H P S t o r a g e w o r k s X 51 0 D a t a V a u l t data protection just got less puzzling If, like
More informationSymantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial
Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Created by: Melanie Cofield Based on information found at: https://www.utexas.edu/its/bevoware/virus/macxvirus.html
More informationCanvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.
What is a Canvio Home device? Canvio Home is a Network-Attached Storage device that is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.
More informationClickfree frequently asked questions
Clickfree frequently asked questions Q: What is Cloud Storage? A: Cloud Storage is a term used for storing data remotely via the Internet. Cloud companies such as Elephant Drive provide this service. Q:
More informationHoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
More informationCox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
More informationServer Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s
Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationMalware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
More informationSophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
More informationSophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
More informationWhat's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
More informationSystem Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationComodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
More informationFree and Legal Software You Can Download By Tom Krauser
Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions
More informationIntroduction to Windows 7
Introduction to Windows 7 Table of Contents 1 - The Desktop... 2 Desktop Icons... 2 Interior Decorating Windows 7: Changing Desktop Properties... 3 Taskbar & Toolbars... 4 Quick View (Peek)... 5 Start
More informationAd-Aware Antivirus Overview
Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day
More informationUtilizing Dropbox to Share Files
Utilizing Dropbox to Share Files At times it is necessary to share large files with instructors or other students. Dropbox.com provides a very user friendly solution to fill this need. Dropbox is designed
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationIT Helpdesk Services. IT Environment Operation Support Service Menu
IT Helpdesk Services IT Environment Operation Support Service Menu Do you ever need a little help with your personal computer? IT Helpdesk Services Person unfamiliar with PC Person unfamiliar with PC Help
More informationKaspersky Total Security User Guide
Kaspersky Total Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this
More informationBitdefender Total Security 2015 User's Guide
USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
More informationCitrix XenApp 6.5 User Guide. For Windows and OS X
Citrix XenApp 6.5 User Guide For Windows and OS X Table of Contents Target Audience... 3 Prerequisites... 3 Windows:... 3 OS X:... 3 Installing Client... 4 Downloading the Client:... 4 Launching the Installer...
More information