The Care and Feeding of Your Computer Troubleshooting and Maintenance

Size: px
Start display at page:

Download "The Care and Feeding of Your Computer Troubleshooting and Maintenance"

Transcription

1 Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use products that contain isopropyl alcohol, ammonia, or abrasives. Check the cables for abrasions and check that they are properly connected. Be sure to remove all dust from the fan case located on the back. It is important that your computer has good ventilation to prevent overheating. Use a vacuum to remove the largest of the dust bunnies. The Monitor: Use a soft cloth and cleaner made for electronics to clean the monitor screen. Spray the cleaner on the cloth and not directly on the monitor. The Keyboard: Turn off the computer and unplug the keyboard. Turn the keyboard upside down and shake out any loose dirt. Use a vacuum to suck out any crumbs and dirt. You can use canned air to blow out the dirt, but it is a good idea to vacuum first so that you don t get dirt trapped under a key. The Mouse: Turn off the computer and unplug the mouse first. Remove the ring on the bottom of the mouse. Wash the ball in soap and water and dry it well. With dampened cotton swabs, wipe off the rollers. If the rollers are really dirty, use the edge of a plastic knife to scrape them clean. An pencil eraser will also help to clean them. Before You Call Technical Support Check the cable connections and power supply first. Were there any power surges or power failures at the time you began having difficulties?

2 If you are using a power strip, check that it is plugged into the wall and turned on. It is easy for a power strip on the floor to accidentally be turned off with a touch of a foot. Plug something else into the outlet to see if it works. Gently push in the cables on the back of the computer. Sometimes it helps to actually unplug the cables and plug them back in. Are there any lights on the keyboard? Monitor? Computer? Printer? RESTART!!!! Directions for doing this are listed in order from the most preferred method to the least. Control Alt Delete (commonly called the three finger salute) and then select End Task. If this does not work, Control Alt Delete and then select Restart. Hold the power button for at least 10 seconds until the computer restarts. Document what you did and what happened. If you get an error message, copy it completely. If you have recently installed software or downloaded something from the internet, have details of what you installed and when you installed it. Are you the only one that is having this problem or are there other people in your building with the same problem? If you have more than one computer in your room, are you having the same problem with them all? Be sure to log in with the same user name. Are the people in the classrooms adjacent to yours having the same problem? What about in other parts of the building? It helps to ask the building secretary if other people have reported problems. Regularly Back-Up Your Files and Clean-Up Unused Files At least once a month, copy any files that you have created that you would not want to lose. You can save a copy of your files on the server, but if they are important it is always a good idea to back them up to a floppy or CD that you maintain as well. Keep your back-up copies in a safe location. You want to keep them in a case where they will not be damaged. Clean up the files you no longer use to save memory. Selecting Delete for a file moves it to the Recycle Bin where it can be restored if you realize you still want it. Empty the Recycle Bin regularly to permanently delete files. It is important to clean up the temporary files created from the internet. In Internet Explorer, select the Tools Menu, select Internet Options. On the General tab, select the Delete Cookies and also the Delete Files. In Netscape, from the Edit Menu select Preferences and Clear the History. Remove Programs you are no longer using or want.

3 Go to the Control Panel and select Add/Remove Programs. From the list, select the ones you want to remove. In some instances, you will need to uninstall/remove a Program before downloading the newer version. If you get a message in the Installation Wizard that tells you to uninstall the earlier version you should follow the step above. Using System Tools to Improve Your Computers Performance It is recommended that you run Disk Cleanup once a month or anytime that your computer appears to be running slower than normal. Go to Start, All Programs, Accessories, System Tools, Disk Cleanup. Disk Cleanup will check your hard drive for errors and will also locate files that you can delete to save space on your hard drive. You will definitely want to delete the Temporary Internet Files. You can view the contents of any of the checked boxes to decide if you want to save these files or delete them. You will also have the opportunity to remove programs you are no longer using. Disk Defragmenter should be run after Disk Cleanup. It will rearrange files and unused space on your hard drive that may be slowing down your computer and causing it to be less efficient. Go to Start, All Programs, Accessories, System Tools, Disk Defragmenter. You can select the drive you want to defragment. You will select Drive C.

4 Select Analyze and the program will scan your computer and advise you whether or not you need to defragment your computer. Do not stop a defragmentation when it is in progress. Automatic Updates Your computer should be configured to automatically update. It is important that the updates be installed. These updates frequently are to correct security problems with Windows. Verify that your computer is set to download and install the updates, right click on the My Computer icon. Select the Automatic Updates and set it as shown. Select a time of day when you know your computer is turned on, but one that will not interfere with your work. Most updates can occur while you continue to use the computer, but they frequently require the computer to restart. Check periodically for updates for programs you use. Go to to get the updates and newest version of Adobe Reader. This is important so that you can read and print files in Progress Book. Go to to get updates for Office. Adware/Spyware/Malware/Viruses/Trojan horses (information from Adware is considered a legitimate alternative offered to consumers who do not wish to pay for software. Programs, games or utilities can be designed and distributed as freeware. Spyware is any software that covertly gathers user information through the user s internet connection without his or her knowledge, usually for advertising purposes.

5 Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e- mail addresses and even passwords and credit card numbers. Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat rooms or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will use it for advertising/marketing purposes or sell the information to another party. Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. Malware is short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. A Trojan horse is a destructive program that masquerades as a benign application. One of the most insidious types of a Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. How to Protect Yourself Remember that there are no free lunches. Anytime you download a program from the internet you open yourself up to the possibility of spyware, viruses, and Trojan horses. The cute smiley faces that you can download will not make you smile if your computer becomes infected. Before installing free virus protection or spyware or pop-up blockers, do some research or check with Jeff or me. A number of these free programs can create more problems than you were trying to correct. Some will require your hard drive to be completely wiped clean and reloaded with Windows software causing you to lose all of your files (unless you have them backed up!) Do not let anyone install software or files on your computer that have not been checked by a virus protection program. Students should NEVER use your computer without you logging off and them logging on as a student. Students do not have the permissions that will allow them to download and install files from the internet. If the computer is logged in with a teacher account, they have access to areas in the network that we do not want them viewing or changing. Ultimately, you will be held responsible. Do not open attachments in s from people you do not know. Be cautious even with you receive from friends and relatives. Some Trojan horses will

6 capture addresses and begin sending messages as though they are coming from someone you know. Do not open s that have been forwarded. Advise your family and friends that you will not be reading anything that has been forwarded repeatedly. You have no way of knowing what you may catch when a message passes through multiple people, especially ones that you may not know. If you have virus protection, be sure to get the updates installed on a regular basis. Keep it enabled and working to protect you. If you suspect you have a virus, disconnect the cable that connects your computer to the internet immediately. Contact your building sysop, Jeff, or me right away. Virus Protection and Spyware Blockers Norton Ant-virus software McAfee Anti-virus software free version of AVG virus protection for home use only - free virus cleaning program by McAfee - Spybot Search and Destroy free Spyware Blocker - Microsoft has a new FREE Beta Anti-Spyware program Additional References Windows XP Tips and Tricks: About PC s: Helping Teachers Use the Internet More Effectively: This site has some excellent resources for lesson plans that incorporate technology. The On-Line Practice Modules will assist you in using Word, PowerPoint, and Excel more effectively. Managing Students With Computers: ce.html Computer term dictionary and resources:

Michelle Vonderhaar June 23, 2010

Michelle Vonderhaar June 23, 2010 Michelle Vonderhaar June 23, 2010 PC Maintenance Checklist Back up any data BEFORE you perform any PC maintenance Check Hard Drive for free space (for comparison after clean up) Perform Disk Clean-up (use

More information

Easy Do-It-Yourself Computer Maintenance Tips

Easy Do-It-Yourself Computer Maintenance Tips Easy Do-It-Yourself Computer Maintenance Tips Presented by: Scott A. Hartley, M.A.T. President/CEO, Calibre Computer Solutions, LLC 318 W. Glendale St. Princeton, IN 47670 (812) 386-8919 www.calibre-cs.com

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Housekeeping Your PC

Housekeeping Your PC for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services

More information

Optimize your computer for peak performance

Optimize your computer for peak performance Optimize your computer for peak performance Our personal computers are like fine automobiles they need preventive maintenance to run efficiently and avoid major breakdowns. The following tips can help

More information

Basic Computer Maintenance

Basic Computer Maintenance Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library

More information

Schools of Distance Education. Computer check-up for students using Windows 7 devices

Schools of Distance Education. Computer check-up for students using Windows 7 devices Schools of Distance Education Computer check-up for students using Windows 7 devices The check-up summary Start of each term 1. Check your internet connection 2. Clean your computer 3. Update your system

More information

DISK DRIVE MAINTENANCE. 1. Disk Cleanup

DISK DRIVE MAINTENANCE. 1. Disk Cleanup DISK DRIVE MAINTENANCE To keep a PC running smoothly, regular maintenance is critical. Many users shy away from maintenance tasks, thinking it is a long, drawn out manual affair, but the Disk Cleanup Utility

More information

2. Empty the Recycle Bin. Some users need to be reminded to periodically empty the Recycle Bin.

2. Empty the Recycle Bin. Some users need to be reminded to periodically empty the Recycle Bin. The ultimate preventive maintenance checklist What's the support pro of 1999 and beyond to do for preventive maintenance on user machines? Here's a checklist of 29 things you can do to keep your users

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Cleaning your Windows 7, Windows XP and Macintosh OSX Computers

Cleaning your Windows 7, Windows XP and Macintosh OSX Computers Cleaning your Windows 7, Windows XP and Macintosh OSX Computers A cleaning of your computer can help your computer run faster and make you more efficient. We have listed some tools and how to use these

More information

SystemTech AntiSpyware Manual

SystemTech AntiSpyware Manual Summitsoft Corporation SystemTech AntiSpyware Manual This guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under

More information

Virus Definition and Adware

Virus Definition and Adware DANEnet Round Table: Viruses and Spyware Definition of a computer virus: -A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Troubleshooting PCs What to do when you don't know what to do!

Troubleshooting PCs What to do when you don't know what to do! Troubleshooting PCs What to do when you don't know what to do! Prepared By: Helpdesk AIT-ITServ ITServ Troubleshooting techniques: Check the Cable Connections First. Check the Cable Connections First.

More information

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive. Basic Computer Security Practices Make backups of important files. Apply patches to the operating system. Use anti-virus software, update definitions very frequently, and run a full virus scan at least

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Computer Maintenance Guide

Computer Maintenance Guide Computer Maintenance Guide Do you get days where you feel like tearing your hair out, because your Pc will not operate in the manner which it did when you first bought it. Believe me you are not alone,

More information

Revo Uninstaller - User's Guide

Revo Uninstaller - User's Guide Table of Contents 1. Overview... 2 2. User Interface... 4 3. Uninstaller... 5 4. Hunter Mode... 10 5. Tools... 12 5.1. AutoRun Manager... 13 5.2. Junk Files Cleaner... 15 5.3. Windows Tools... 16 5.4.

More information

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department

More information

Schools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices

Schools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices Schools of Distance Education Computer check-up for students using Mac OS X 10.10 (Yosemite) devices The check-up summary Start of each term 1. Check your internet connection 2. Clean your computer 3.

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Welcome back everyone from the Monmouth University Student Help Desk!

Welcome back everyone from the Monmouth University Student Help Desk! Welcome back everyone from the Monmouth University Student Help Desk! From past experience, we realized that many students do not take the time to keep their computers updated. New viruses and spyware

More information

Some simple computer maintenance to keep your computer running well.

Some simple computer maintenance to keep your computer running well. PC Tune-up for Windows XP Some simple computer maintenance to keep your computer running well. When you use your computer often, preventive maintenance is necessary. This is the same concept as for your

More information

Tablet PC Tutorial for Windows 7

Tablet PC Tutorial for Windows 7 VIRGINIA TECH Tablet PC Tutorial for Windows 7 Getting Started Guide Instructional Technology Team, College of Engineering Last Updated: Fall 2013 Email tabletteam@vt.edu if you need additional assistance

More information

Free and Legal Software You Can Download By Tom Krauser

Free and Legal Software You Can Download By Tom Krauser Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions

More information

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005 Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Part 3: Accessing Local drives and printers from the Terminal Server

Part 3: Accessing Local drives and printers from the Terminal Server In this guide: Part 1: What are Terminal Services / Remote Desktop? Part 2: Connecting to the HUSPSS Terminal Servers Part 3: Accessing Local drives and printers from the Terminal Server Part 4: Accessing

More information

Part I 45 min Setting Up your Computer and Keeping it Clean

Part I 45 min Setting Up your Computer and Keeping it Clean Part I 45 min Setting Up your Computer and Keeping it Clean Identify the different pieces of your computer See handouts from Apple emac Manual Turn it on boot up process Giving Your Computer a Long Life

More information

Introduction to Computers

Introduction to Computers Introduction to Computers Parts of a computer Monitor CPU 3 Keyboard 3 4 4 Mouse 3 4 Monitor The monitor displays the content and operations of the computer. It is the visual display of what the computer

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Auslogics BoostSpeed 5 Manual

Auslogics BoostSpeed 5 Manual Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...

More information

How To Understand What A Virus Is And How To Protect Yourself From A Virus

How To Understand What A Virus Is And How To Protect Yourself From A Virus Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?

More information

www.notapennydown.com

www.notapennydown.com All You Need to Know About Spyware What is spyware? Recent studies from a joint project between Dell Computer and the Internet Education Foundation have found that an estimated 90% or more home computers

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

DR System Maintenance

DR System Maintenance 2015 DR System Maintenance Checklist and Guide This document will provide detailed instructions on how to effectively and properly maintain and backup your system for prolonged lifespan and reduced down

More information

Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial

Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Created by: Melanie Cofield Based on information found at: https://www.utexas.edu/its/bevoware/virus/macxvirus.html

More information

Digital Persona Fingerprint Reader Installation

Digital Persona Fingerprint Reader Installation Digital Persona Fingerprint Reader Installation The link to download the Fingerprint Reader Software for AXIS-ACH is http://corpcu.com/fingerprint-reader-software This will begin the download for the drivers.

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

PC Security & Housekeeping March 2015

PC Security & Housekeeping March 2015 PC Security & Housekeeping March 2015 Anti-malware programs Always keep your firewall, anti-virus, and anti-spyware products up to date! There are many good commercial products available, such as: o Norton

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

F-Secure Anti-Virus for Mac. User's Guide

F-Secure Anti-Virus for Mac. User's Guide F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to

More information

1 Introduction. Agenda Item: 7.23. Work Item:

1 Introduction. Agenda Item: 7.23. Work Item: 3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:

More information

Installing Remote Desktop Connection

Installing Remote Desktop Connection SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images

More information

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and

More information

Technical Support Bulletin 1

Technical Support Bulletin 1 Technical Support Bulletin 1 Windows 2000 and Windows XP Computer Systems SUBJECT: Troubleshooting Computer Systems Scope February 22, 2006 Troubleshooting Computer System problems on Windows 2000 and

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF YOUR EMAIL ADDRESS HAS CHANGED!

HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF YOUR EMAIL ADDRESS HAS CHANGED! Computer Housecalls 3266 Lupine Dr Indianapolis IN 46224 317.388.1989 info@computerhousecall.com www.computerhousecall.com HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Please Note: Dell 2350dn printer might be replaced with 2360dn newer model.

Please Note: Dell 2350dn printer might be replaced with 2360dn newer model. Tricks and Tips Tech Dell Hardware Service Call Available 24/7: 1. Before you contact Dell or UAN please check the following: Confirm electrical outlets, circuit breakers, battery backup are working. Check

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

HOSTED DESKTOP MANUAL

HOSTED DESKTOP MANUAL HOSTED DESKTOP MANUAL TABLE OF CONTENTS REMOTE DESKTOP MANUAL Last revision August 18, 2005 WHAT IS A REMOTE DESKTOP... 1 Security... 1 Terminals...2 SETTING UP YOUR REMOTE DESKTOP... 2 Installing Remote

More information

Understanding offline files

Understanding offline files Understanding offline files Introduction If you've ever needed to access important files stored in a shared folder on your network but couldn't because the network connection was unavailable, then you

More information

Housekeeping Your PC. for XP

Housekeeping Your PC. for XP for XP Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services Summary

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as

Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as directory in some operating systems, all folders or directories

More information

HP Scanjet G4000 series. User Guide

HP Scanjet G4000 series. User Guide HP Scanjet G4000 series User Guide Contents 1 How to use the scanner...2 Where to get additional information...2 Accessibility...2 How to use the HP Photosmart software...3 Front panel and accessories

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription

More information

10.3.1.6 Lab - Data Backup and Recovery in Windows XP

10.3.1.6 Lab - Data Backup and Recovery in Windows XP 5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Windows 95/98: File Management

Windows 95/98: File Management Windows 95/98: File Management Windows Is This Document Right for You? This document is designed for Windows 95/98 users who have developed the skills taught in Windows 95/98: Getting Started (dws07).

More information

Windows 10.1 Tablet (UB-15MS10 and UB-15MS10SA) FAQ December 2014

Windows 10.1 Tablet (UB-15MS10 and UB-15MS10SA) FAQ December 2014 Windows 10.1 Tablet (UB-15MS10 and UB-15MS10SA) FAQ December 2014 Navigation... 2 Question 1: What are charms used for?... 2 Question 2: How do I navigate while using a mouse or trackpad?... 3 Question

More information

PC Diet and fitness plan

PC Diet and fitness plan PC Diet and fitness plan Revised Apr 2013 Speed up your PC Regain lost storage space Clean out Bugs and viruses Improve your web experience Reduce maintenance costs and downtime This PC Diet and fitness

More information

Machine type: 10056. Lenovo. IdeaCentre A3 Series. User Guide. Version 2.0 2010.5

Machine type: 10056. Lenovo. IdeaCentre A3 Series. User Guide. Version 2.0 2010.5 Machine type: 10056 Lenovo IdeaCentre A3 Series User Guide Version 2.0 2010.5 31044343 31044343_A3_UG_FM_EN_V2.0.indd 1 2010.4.30 5:01:04 PM Important Safety Information Before using this manual, it is

More information

Computer Basics. Hardware. Turning the Computer on Turn the computer on by pressing the power button.

Computer Basics. Hardware. Turning the Computer on Turn the computer on by pressing the power button. Computer Basics Hardware Turning the Computer On Turning the Computer Off Keyboard Mouse and Touchpad Cursors Desktop Start Menu Software Opening/ Closing a Program Parts of a Window Ports Troubleshooting

More information

LPA RETAIL SYSTEMS. The Top 20 Issues. Jeremy Amacher 9/18/2012

LPA RETAIL SYSTEMS. The Top 20 Issues. Jeremy Amacher 9/18/2012 LPA RETAIL SYSTEMS The Top 20 Issues Jeremy Amacher 9/18/2012 The Top 20 Issues Contents #1 Receipt Printer Won t Print... 2 #2 Cash Drawer Won t Open... 9 #3 Credit Card Swipe Won t Read Credit Cards...

More information

Using The Internet Effectively A Guide To Safe And Secure Web Surfing

Using The Internet Effectively A Guide To Safe And Secure Web Surfing Using The Internet Effectively A Guide To Safe And Secure Web Surfing OTS PUBLICATION: INT REVISED 0--006 TRAINING@TOWSON.EDU OFFICE OF TECHNOLOGY SERVICES =Shortcut =Advice =Caution This document covers

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

After going through this lesson you would be able to:

After going through this lesson you would be able to: 18 :: Data Entry Operations 2 Operating System 2.1 INTRODUCTION The operating system in these days uses a graphical user interface (GUI). Here you do not have to remember all the commands by heart. The

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

BUSINESS SOFTWARE SOLUTIONS. Business Software Solutions Error Troubleshooting

BUSINESS SOFTWARE SOLUTIONS. Business Software Solutions Error Troubleshooting BUSINESS SOFTWARE SOLUTIONS Business Software Solutions Error Troubleshooting Contents Preventative Maintenance... 3 Backup Your BPA Software... 3 Posting Sales... 4 Anti-Virus/Anti-Spyware... 4 Index

More information

User Guide for the Identity Shield

User Guide for the Identity Shield User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

Internet Explorer Browser Clean-up

Internet Explorer Browser Clean-up Follow the steps below to determine your Internet Explorer version number and access browser clean-up procedures specific to your version. 1. From Internet Explorer, click the Help menu and choose About

More information

Basic PC Maintenance. Instructors. Action Center

Basic PC Maintenance. Instructors. Action Center Basic PC Maintenance The St. Edward's University workshop "Basic PC Maintenance" addresses best practices for maintaining your (Windows 7) PC at home. This document includes notes and recommendations for

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

What is a Virus? What is a Worm? What is a Trojan Horse? How do worms and other viruses spread? Viruses on the Network. Reducing your virus Risk.

What is a Virus? What is a Worm? What is a Trojan Horse? How do worms and other viruses spread? Viruses on the Network. Reducing your virus Risk. C/W MARS INC. What is a Virus? What is a Worm? What is a Trojan Horse? How do worms and other viruses spread? Viruses on the Network. Reducing your virus Risk. Prevent Future Infections. Non-Booting System!

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Internet Security for Windows XP and Vista

Internet Security for Windows XP and Vista Welcome Windows XP and Vista Users Welcome to Alliance Internet. You have joined one of the fastest growing Internet providers in the area. This information will help you understand how your Internet works.

More information

Securing small business. Firewalls Anti-virus Anti-spyware

Securing small business. Firewalls Anti-virus Anti-spyware Securing small business Firewalls Anti-virus Anti-spyware Introduction Due to the phenomenal growth of the Internet in the last decade companies and individuals find it hard to operate without a presence

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information