Things about computing, the web or just things

Thursday, December 13, 2007

Clean it up, run smother

Most people who use computers today use them for work, games, research or socialization. With more and more people trying to begin home businesses, the computer has become the essential tool for their business startup and operation. People want to optimize their computers so that they will be as efficient as possible; however, there are many factors associated with the performance output of a personal computer.
In order for a computer to reach and maintain maximum performance, many factors must be considered. On the hardware side of the equation, one must consider their processor speed and system memory. With regards to the software side of your computer, you must be aware of your computer's privacy protection, system security, and anti-virus software.
Additionally, you should do your best to take care of your Windows operating system -such as Windows XP or Windows Vista including its registry and the files cleanup process.
To keep a PC running smoothly and error-free, there are some basic steps that anyone can follow. Fortunately, none of these steps are really at all difficult. Anyone can do these tasks, with a little bit of basic education. Keep this article around for future reference, just in case you need it again.

Shut-Down Processes

First off, it is important to understand that programs need to be given the proper signals to shut down. It is strongly recommended that you never simply unplug your machine to turn it off. Please go through the normal shut down procedures, no matter how long those processes might take.
If you lose power, it really is an unavoidable event. Microsoft has done a good job at helping Windows know when it was shut down improperly, so the next time you start up your computer, your operating system might repair itself. Typically, when you restart your computer after an improper shut down, it might take a few minutes longer to boot up than usual. Let Windows do its long boot up after it has unexpectedly shut down. The longer boot up process is Windows attempt to repair any corruptions caused by the unexpected shut down of your computer's operating system.
If you need to shut down your system more quickly than usual, we strongly recommend that you utilize the Control-Alt-Delete key combination, and then select Shut Down from your Windows Task Manager window. By utilizing this shut down method, Windows will make appropriate notes to itself that it will need to do some cleanup on its next boot up sequence.
If Windows is not allowed to clean up after itself, you run the risk of corrupting the operating system or different programs you have loaded on your computer. Corruption of programs may force you to reinstall those programs. Corruption of your data files is the worst-case scenario � you could lose hours or years of work in a single moment, as a result of your impatience. Don't be impatient; let your computer do what it needs to do to repair and protect your system files.

Unnecessary Applications Running In The Background

The "background" is not the image on your desktop. "Running in the Background" is a reference to programs that are running on your system in invisible mode. In some cases, they are completely invisible, and in other cases, the only indication that they are operating is their icon in your System Tray, next to your clock.
Certain programs think that they need to be operating in your System Tray at all times. QuickTime, Yahoo Messenger, MSN Messenger are three of these types of programs. Microsoft Office even thinks it should be loaded and running in your background. If you use these applications frequently and need access to them almost instantaneously on a frequent basis, then yes, you probably should let them run in the background. But, most of us only use those applications on an infrequent basis.
The theory of having those applications running in the background is that it prevents you needing to wait thirty seconds while the software loads, when you need access to those applications. But, there is a significant amount of trade-off for thirty seconds of reduced wait time. That trade-off is a less-responsive computer. In worst-case scenarios, the thirty seconds saved at program start-up could trim minutes of productivity from your full workday.
While your system is operating, you can right-click on any icon next to your clock and most programs will allow you the option to select Close Application. By closing unnecessary applications, you can literally speed up the Windows operating system.
With most versions of Windows, you can also go to start, run and then type in "msconfig" and click OK. Once the Windows System Configuration Utility opens, click the tab that reads Startup. You can review the list and deselect items that you will not want to open when your computer boots up. It is important to note here that you should only close applications that you recognize and know that you can live without. Don't turn off an item in the Startup window, unless and until you know what that file really does. A quick search for that file name on the Internet will generally turn up lots of pages explaining what those files do in your Windows operating system environment.

Mean Kids on The Internet

Mean kids, who are also computer nerds, frequently grow up to be computer programmers who create Viruses and Spyware applications. The mean teenagers of the programming world get their kicks from turning our lives upside-down, with viruses that create a multitude of problems on whatever machines they can get their software installed. Virus writers with a criminal history frequently grow up to be people who write Trojans and Spyware applications that seek to steal our private information.
A Trojan is a malicious program that pretends to be a screensaver or some other non­threatening and fun kind of thing. When you execute it on your computer, it installs malicious software and then it does its dastardly deeds. Trojans and Spyware typically try to harvest private information from your computer for the financial benefit of its creator. Most of these kinds of computer programs only want to shove their advertising in your face (Adware) or track your Internet usage habits, so they can sell that information to other businesses; but the really ugly versions try to steal your credit card data and other financial data from your computer.
For some people, Trojans and Spyware computer programs are responsible for as much as a 60% deterioration of a computer's performance capability.

Forgotten Programs On Your Computer
Do you remember some of those 30-day free trial software applications that you tried once or twice, but never used again? Some of these applications may be running in the background of your computer. All of these programs are also still taking up space on your hard drive. Never go into your Windows Explorer and simply delete folders that contain the software programs you will never use again. Instead, every two or three months, you should utilize your Add / Remove Programs procedure, which can be accessed by going to Start - Settings - Control Panel - Add or Remove Programs, and remove old computer programs that you no longer use. This can frequently free up a lot of extra space on your hard drive. It can also free up some extra memory in your computer, if the program had been running in the background of your operating system at startup.



Final Closing Thoughts

If you still encounter problems after following the above suggestions, you may wish to try out "Advanced Windows Care v2 Personal". It has been designed to help you perform all of these essential protection and maintenance processes for your computer, enabling you to get on with more important tasks like making more money. This software can remove Adware and Spyware programs from your computer system, protect your privacy, prevent security threats, fix registry errors, and much more.
This program is an all-in-one systems utility that only requires a single click each day for proper computer maintenance, optimization and protection. It is free, so try it out. Remember, if you don't like the software, we have already taught you how to remove it, if you ever wanted to do so.

Wednesday, November 21, 2007

Part 2 of I Spy

What can spyware programs do?

Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.

Spyware can:
1. Monitor your keystrokes for reporting purposes.
2. Scan files located on your hard drive.
3. Snoop through applications on our desktop.
4. Install other spyware programs into your computer.
5. Read your cookies.
6. Steal credit card numbers, passwords, and other personal information.
7. Change the default settings on your home page web browser.
8. Mutate into a second generation of spyware thus making it more difficult to eradicate.
9. Cause your computer to run slower.
10. Deliver annoying pop up advertisements.
11. Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliate’s settings.
12. Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.

Spyware Examples
Here are a few examples of commonly seen spyware programs. Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use.

CoolWebSearch, a group of programs, that install through “holes” found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.
Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.
180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they’ve altered.
HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. It’s a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

How can I prevent spyware?
There are a couple things you can do to prevent spyware from infecting your computer system. First, invest in a reliable commercial anti-spyware program. There are several currently on the market including stand alone software packages such as Lavasoft’s Ad-Aware or Windows Antispyware. Other options provide the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software. As with most programs, update your anti virus software frequently.

As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality. Spyware enjoys penetrating the IE’s weaknesses. Because of this, many users have switched to non-IE browsers. However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources. This will help reduce your chances of a spyware infiltration.
.
And, when all else fails?
Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system. I have had to do this for a number of customers.

Well, until next week have a very happy Thanksgiving, don't eat too much and be safe.

Wednesday, November 14, 2007

I Spy

Part One of Two on Spyware

Why Do I Feel Like Somebody’s Watching Me?

Spyware is one of the fastest-growing internet threats. According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user’s knowledge. Once embedded in a computer, it can wreak havoc on the system’s performance while gathering your personal information. Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.

Where does it come from?
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user’s knowledge. The user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data for the spyware author’s personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads that posses spyware programs.

The user of a downloadable program should pay extra attention to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program. Unfortunately, we do not always take the time to read the fine print. Some agreements may provide special “opt-out” boxes that the user can click to stop the spyware from being included in the download. Be sure to review the document before signing off on the download.

Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why the user has to initiate a download by clicking on a link. These links can prove deceptive. For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen. The message may ask you if you would like to optimize your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.

Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.

Part Two next week so beware they may be watching.

Tuesday, August 21, 2007

Gone Phishing?

Ok, so what is this phishing stuff. Well to put it as short and complete as possible here is my article on that very subject.

Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.

Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.
A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.

I guess in other words BE CAREFUL. (Sorry for yelling). If you have any doubts do not click and give.

Happy computing

Larry
Add to Technorati Favorites

Wednesday, August 8, 2007

What you need to know about computer repair and you!

Hello, Introductions are in order for this first foray into blogging. I am a 20 year plus computer guy. I started this when the computer had two 5.25 inch drives, an 8 mhz(WOW) cpu (8086) and if you had a hard drive it would make a very heavy boat anchor. A 4000 name mailing list would take me most of the day and half the night to edit, sort and print. My first computer was a Zenith Z100 all in one,(green or amber screen),8Mhz (now 3.0Ghz +) 640K RAM and no hard drive.

Well enough nostalgia for now. The changes have been fast and plentiful and very interesting to keep up with. Computer repairing now is a matter of identifying the problem and replacing the bad part or installing new drivers or software. The one thing that is not so easy to replace or get new is the user. We are all different and have our likes and dislikes and ways of doing things. As a computer technician I need the user on my side. Sometime this is not easy but necessary. Hopefully this blog will help user and the technician agree on the task at hand, fix this @@@#%@@ thing.

Add to Technorati Favorites