The Care and Feeding of Your Computer Troubleshooting and Maintenance



Similar documents
Michelle Vonderhaar June 23, 2010

Easy Do-It-Yourself Computer Maintenance Tips

Airtel PC Secure Trouble Shooting Guide

Housekeeping Your PC

Basic Computer Maintenance

DISK DRIVE MAINTENANCE. 1. Disk Cleanup

2. Empty the Recycle Bin. Some users need to be reminded to periodically empty the Recycle Bin.

PC Security and Maintenance

Cleaning your Windows 7, Windows XP and Macintosh OSX Computers

SystemTech AntiSpyware Manual

Computer Security Maintenance Information and Self-Check Activities

Troubleshooting PCs What to do when you don't know what to do!

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Computer Maintenance Guide

Revo Uninstaller - User's Guide

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA (206) Computer and Phone Support Handbook

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Some simple computer maintenance to keep your computer running well.

Tablet PC Tutorial for Windows 7

Free and Legal Software You Can Download By Tom Krauser

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

F-Secure Anti-Virus for Mac 2015

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Introduction to Computer Security Table of Contents

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Cox Business Premium Security Service FAQs

Part 3: Accessing Local drives and printers from the Terminal Server

Part I 45 min Setting Up your Computer and Keeping it Clean

Introduction to Computers

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

How to easily clean an infected computer (Malware Removal Guide)

Auslogics BoostSpeed 5 Manual

How To Understand What A Virus Is And How To Protect Yourself From A Virus

DR System Maintenance

Digital Persona Fingerprint Reader Installation

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

PC Security & Housekeeping March 2015

October Is National Cyber Security Awareness Month!

F-Secure Anti-Virus for Mac. User's Guide

1 Introduction. Agenda Item: Work Item:

Installing Remote Desktop Connection

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Technical Support Bulletin 1

Lab: Data Backup and Recovery in Windows XP

HOW IS YOUR PC RUNNING LATELY? - DOES IT NEED A TUNE-UP? PLEASE CONTACT US IF YOUR ADDRESS HAS CHANGED!

Microsoft Security Essentials Installation and Configuration Guide

Please Note: Dell 2350dn printer might be replaced with 2360dn newer model.

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

HOSTED DESKTOP MANUAL

Understanding offline files

Housekeeping Your PC. for XP

Frequently Asked Questions: Xplornet Internet Security Suite

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as

HP Scanjet G4000 series. User Guide

How Spyware and Anti-Spyware Work

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Lab - Data Backup and Recovery in Windows XP

Countermeasures against Spyware

Windows 95/98: File Management

Windows 10.1 Tablet (UB-15MS10 and UB-15MS10SA) FAQ December 2014

PC Diet and fitness plan

Machine type: Lenovo. IdeaCentre A3 Series. User Guide. Version

Computer Basics. Hardware. Turning the Computer on Turn the computer on by pressing the power button.

LPA RETAIL SYSTEMS. The Top 20 Issues. Jeremy Amacher 9/18/2012

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

What's the difference between spyware and a virus? What is Scareware?

How to Install Windows 7 software

After going through this lesson you would be able to:

Contents. McAfee Internet Security 3

BUSINESS SOFTWARE SOLUTIONS. Business Software Solutions Error Troubleshooting

User Guide for the Identity Shield

McAfee.com Personal Firewall

Network Security. Demo: Web browser

Internet Explorer Browser Clean-up

Basic PC Maintenance. Instructors. Action Center

Using MioNet Senvid Inc. User Manual Version 1.07

Quick Start Guide to Logging in to Online Banking

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Computer Viruses: How to Avoid Infection

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Transcription:

Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use products that contain isopropyl alcohol, ammonia, or abrasives. Check the cables for abrasions and check that they are properly connected. Be sure to remove all dust from the fan case located on the back. It is important that your computer has good ventilation to prevent overheating. Use a vacuum to remove the largest of the dust bunnies. The Monitor: Use a soft cloth and cleaner made for electronics to clean the monitor screen. Spray the cleaner on the cloth and not directly on the monitor. The Keyboard: Turn off the computer and unplug the keyboard. Turn the keyboard upside down and shake out any loose dirt. Use a vacuum to suck out any crumbs and dirt. You can use canned air to blow out the dirt, but it is a good idea to vacuum first so that you don t get dirt trapped under a key. The Mouse: Turn off the computer and unplug the mouse first. Remove the ring on the bottom of the mouse. Wash the ball in soap and water and dry it well. With dampened cotton swabs, wipe off the rollers. If the rollers are really dirty, use the edge of a plastic knife to scrape them clean. An pencil eraser will also help to clean them. Before You Call Technical Support Check the cable connections and power supply first. Were there any power surges or power failures at the time you began having difficulties?

If you are using a power strip, check that it is plugged into the wall and turned on. It is easy for a power strip on the floor to accidentally be turned off with a touch of a foot. Plug something else into the outlet to see if it works. Gently push in the cables on the back of the computer. Sometimes it helps to actually unplug the cables and plug them back in. Are there any lights on the keyboard? Monitor? Computer? Printer? RESTART!!!! Directions for doing this are listed in order from the most preferred method to the least. Control Alt Delete (commonly called the three finger salute) and then select End Task. If this does not work, Control Alt Delete and then select Restart. Hold the power button for at least 10 seconds until the computer restarts. Document what you did and what happened. If you get an error message, copy it completely. If you have recently installed software or downloaded something from the internet, have details of what you installed and when you installed it. Are you the only one that is having this problem or are there other people in your building with the same problem? If you have more than one computer in your room, are you having the same problem with them all? Be sure to log in with the same user name. Are the people in the classrooms adjacent to yours having the same problem? What about in other parts of the building? It helps to ask the building secretary if other people have reported problems. Regularly Back-Up Your Files and Clean-Up Unused Files At least once a month, copy any files that you have created that you would not want to lose. You can save a copy of your files on the server, but if they are important it is always a good idea to back them up to a floppy or CD that you maintain as well. Keep your back-up copies in a safe location. You want to keep them in a case where they will not be damaged. Clean up the files you no longer use to save memory. Selecting Delete for a file moves it to the Recycle Bin where it can be restored if you realize you still want it. Empty the Recycle Bin regularly to permanently delete files. It is important to clean up the temporary files created from the internet. In Internet Explorer, select the Tools Menu, select Internet Options. On the General tab, select the Delete Cookies and also the Delete Files. In Netscape, from the Edit Menu select Preferences and Clear the History. Remove Programs you are no longer using or want.

Go to the Control Panel and select Add/Remove Programs. From the list, select the ones you want to remove. In some instances, you will need to uninstall/remove a Program before downloading the newer version. If you get a message in the Installation Wizard that tells you to uninstall the earlier version you should follow the step above. Using System Tools to Improve Your Computers Performance It is recommended that you run Disk Cleanup once a month or anytime that your computer appears to be running slower than normal. Go to Start, All Programs, Accessories, System Tools, Disk Cleanup. Disk Cleanup will check your hard drive for errors and will also locate files that you can delete to save space on your hard drive. You will definitely want to delete the Temporary Internet Files. You can view the contents of any of the checked boxes to decide if you want to save these files or delete them. You will also have the opportunity to remove programs you are no longer using. Disk Defragmenter should be run after Disk Cleanup. It will rearrange files and unused space on your hard drive that may be slowing down your computer and causing it to be less efficient. Go to Start, All Programs, Accessories, System Tools, Disk Defragmenter. You can select the drive you want to defragment. You will select Drive C.

Select Analyze and the program will scan your computer and advise you whether or not you need to defragment your computer. Do not stop a defragmentation when it is in progress. Automatic Updates Your computer should be configured to automatically update. It is important that the updates be installed. These updates frequently are to correct security problems with Windows. Verify that your computer is set to download and install the updates, right click on the My Computer icon. Select the Automatic Updates and set it as shown. Select a time of day when you know your computer is turned on, but one that will not interfere with your work. Most updates can occur while you continue to use the computer, but they frequently require the computer to restart. Check periodically for updates for programs you use. Go to http://www.adobe.com to get the updates and newest version of Adobe Reader. This is important so that you can read and print files in Progress Book. Go to http://www.microsoft.com to get updates for Office. Adware/Spyware/Malware/Viruses/Trojan horses (information from http://www.webopedia.com) Adware is considered a legitimate alternative offered to consumers who do not wish to pay for software. Programs, games or utilities can be designed and distributed as freeware. Spyware is any software that covertly gathers user information through the user s internet connection without his or her knowledge, usually for advertising purposes.

Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e- mail addresses and even passwords and credit card numbers. Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat rooms or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will use it for advertising/marketing purposes or sell the information to another party. Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. Malware is short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. A Trojan horse is a destructive program that masquerades as a benign application. One of the most insidious types of a Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. How to Protect Yourself Remember that there are no free lunches. Anytime you download a program from the internet you open yourself up to the possibility of spyware, viruses, and Trojan horses. The cute smiley faces that you can download will not make you smile if your computer becomes infected. Before installing free virus protection or spyware or pop-up blockers, do some research or check with Jeff or me. A number of these free programs can create more problems than you were trying to correct. Some will require your hard drive to be completely wiped clean and reloaded with Windows software causing you to lose all of your files (unless you have them backed up!) Do not let anyone install software or files on your computer that have not been checked by a virus protection program. Students should NEVER use your computer without you logging off and them logging on as a student. Students do not have the permissions that will allow them to download and install files from the internet. If the computer is logged in with a teacher account, they have access to areas in the network that we do not want them viewing or changing. Ultimately, you will be held responsible. Do not open attachments in e-mails from people you do not know. Be cautious even with e-mail you receive from friends and relatives. Some Trojan horses will

capture addresses and begin sending messages as though they are coming from someone you know. Do not open e-mails that have been forwarded. Advise your family and friends that you will not be reading anything that has been forwarded repeatedly. You have no way of knowing what you may catch when a message passes through multiple people, especially ones that you may not know. If you have virus protection, be sure to get the updates installed on a regular basis. Keep it enabled and working to protect you. If you suspect you have a virus, disconnect the cable that connects your computer to the internet immediately. Contact your building sysop, Jeff, or me right away. Virus Protection and Spyware Blockers http://www.symantec.com Norton Ant-virus software http://www.mcafee.com McAfee Anti-virus software http://free.grisoft.com/freeweb.php/doc/2 free version of AVG virus protection for home use only http://vil.nai.com/vil/stinger - free virus cleaning program by McAfee http://www.safer-networking.org/en/index.html - Spybot Search and Destroy free Spyware Blocker http://www.microsoft.com/download - Microsoft has a new FREE Beta Anti-Spyware program Additional References Windows XP Tips and Tricks: http://freepctech.com/pc/xp/xpindex.shtml About PC s: http://pcsupport.about.com/ Helping Teachers Use the Internet More Effectively: http://www.internet4classrooms.com/ This site has some excellent resources for lesson plans that incorporate technology. The On-Line Practice Modules will assist you in using Word, PowerPoint, and Excel more effectively. Managing Students With Computers: http://www.thirteen.org/edonline/ntti/resources/workshops/managing_students/practi ce.html Computer term dictionary and resources: http://www.webopedia.com