Fix Yourself: How-To Repair a Slooooow Computer

Total Page:16

File Type:pdf, Size:1020Kb

Fix Yourself: How-To Repair a Slooooow Computer Nathan, it supervisor, walks you through the process (and it does not involve a stick of dynamite!!!) May 8, 4pm Online 6:30 pm Live Preventative Maintenance Although it may not seem like it sometimes modern personal computers really are relatively low maintenance and trouble free in their day to day operation. Some sporadic maintenance really is required to keep them cool, extend their life span and make them work better. Defragmenting (defrag), this is an important tool which can speed up your computer and extend hard drive (long term memory storage) life. 1. Protect your computer A computer should always have the most recent updates installed for spam filters, anti-virus and anti-spyware software and a secure firewall. http://cdn.greenprophet.com/wp-content/uploads/2012/04/frying-pan-kolbotek-neoflam- 560 475 j •Avoid Scams •Secure Your Computer •Be Smart Online •Be smart on your blogs, Video, & Media Check out Computer Evils Identity Theft – take your financial data Virus, worms & Trojans – damage your computer Spyware – watch your every click Hackers – access your data Phishing & Online fraud – fool you into giving way your valuable information Spam – Massive amounts of useless/harmful emails Inappropriate Websites – con you into going where you know you don’t need to go. Understanding Malware Malware can be Viruses or Spyware that you have given your antivirus permission to install. Fake Security warnings, free games, screen savers are all root causes of Spyware How do I know if you’ve been infected? Your Friends tell you that you’ve passed something on to them. You can no longer log into your online accounts Computer is running slower than normal Pop-ups (on or off the internet) New toolbars Home page changes Search results look different Error messages when accessing the web Some of the key features of NiNite No Clicking Next, Next, Next. Ninite fully automates installers off screen. No Toolbars. Ninite automatically says "No" to toolbars and other junk. Always Up-to-date. A Ninite installer always gets an app's latest version no matter when you made it. It Updates Too. Just run your Ninite installer again and it will update the apps to their latest versions. No Signup. Ninite just works. No account, signup, or client needed. 32 and 64-bit. Ninite installs the best version of an app for your PC. This slide information is courtesy of the Salina Public Library Some of our favorites taken from the NiNite menu. This slide information is courtesy of the Salina Public Library This slide information is courtesy of the Salina Public Library This slide information is courtesy of the Salina Public Library This slide information is courtesy of the Salina Public Library Some Favored Websites CNet http://download.cnet.com/windows/ Shareware / Freeware SourceForge http://sourceforge.net/ Open source (may need compiling). NoNags http://www.nonags.com/ Freeware with no nagging. NiNite http://ninite.com/ and File Hippo http://www.filehippo.com/ freeware automated installers / updaters. Identity theft takes many forms. Some of the most common include: http://lifehacker.com/five-steps-to-take-immediately-if-youre-the-victim-of-1507265334 •Credit card fraud •False applications for new credit •Fraudulent withdrawals from a bank account •Fraudulent use of telephone calling cards •Fraudulent use of an IP address in order to engage in illegal acts online •Fraudulent use of medical care •Social security fraud (for tax and employment fraud) If you know or suspect that you are the victim of identity theft, there are steps you should take immediately to stop the theft and minimize the damage. http://lifehacker.com/five-steps-to-take-immediately-if-youre-the-victim-of-1507265334 1. Put a Fraud Alert on Your Credit Report 2. Contact Any Institution Directly Affected 3. Contact the Federal Trade Commission (FTC) 4. File a Police Report 5. Protect Your Social Security Number Basic Rules Keep everything patched and updated Never trust anything Use good passwords Be Prudent not Paranoid Did you initiate the action? Ask, why is this free? Is the source trustworthy? When in doubt Google it Basic Rules: Part 2 Be conscious of what you are clicking on/downloading. Download only from reputable sites like download.com or Filehippo.com Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X. Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time. Check with siteadvisor.com Safety with your Email: Never open email attachments unless you know for sure what that file contains. Never click a link unless you know for sure where it leads is safe. (google it first) Check your mail filters and forwards for things you didn’t add. Use good passwords (8 digit, letters, numbers & case sensitive) Sign out when you're done Use two factor authentication when possible (e.g. Google Authenticator for Gmail) Be sure to use https when on public Wi-Fi Consider using 2 separate email accounts to keep important things separate from everyday stuff. Watch out for short links, it's hard to know where they'll lead you. Use an encryption program (PGP or RobotCA) for more secure email transmissions How to Tell If an Email Is a Phishing Scam With all of these convincing elements designed to spoof legitimate emails and confuse recipients, how can email users be sure messages like this one are fake? Here are five tips. 1. Hover. Whatever you do, don't click on any of the links in the email, says Peck. You can and should, however, point your mouse at them and hover over them. Ex: When we hover over the "Secure Online Chat" and "www.americanexpress.com/case" links, we see that those links don't direct to the americanexpress.com domain. One directs to a website in Italy, as marked by the .it domain. The other points to a .us domain. Links that don't go to the legitimate domain of the business are telltale signs of phishing emails. How to Tell If an Email Is a Phishing Scam With all of these convincing elements designed to spoof legitimate emails and confuse recipients, how can email users be sure messages like this one are fake? Here are five tips. 2. Copy and paste. If you can't see the URL where the links direct when you hover over them, copying and pasting the link into a Microsoft Word document. Right click on the pasted link and select "Edit Hyperlink" from the menu that appears. Selecting "Edit Hyperlink" will open a pop-up window in Word that shows in the "Address" field the web address to which the link directs. How to Tell If an Email Is a Phishing Scam With all of these convincing elements designed to spoof legitimate emails and confuse recipients, how can email users be sure messages like this one are fake? Here are five tips. 3. Investigate the email's properties. Outlook users who have opened the suspicious email can go to the "File" tab and select "Properties." In the "Properties" pop-up window that appears, look at the box at the bottom of the window labeled "Internet headers." This box shows the path the email took to reach the end-user, he says. Look at the originating systems. If they're not from American Express, Constant Contact or other trusted email blast systems, those are tipoffs that it's a phishing email. How to Tell If an Email Is a Phishing Scam With all of these convincing elements designed to spoof legitimate emails and confuse recipients, how can email users be sure messages like this one are fake? Here are five tips. 4. Act on information that you know for sure is trustworthy. If your bank or credit card company is sending you an email regarding a fraud alert, you ought to see that same fraud alert on your bank or credit card company's legitimate website. If you're even a little uncertain, call the telephone number on the back of the credit card. How to Tell If an Email Is a Phishing Scam With all of these convincing elements designed to spoof legitimate emails and confuse recipients, how can email users be sure messages like this one are fake? Here are five tips. 5. When in doubt, throw it out. The best defense against phishing scams, is to assume the email is untrustworthy and to pursue direct channels to businesses that you trust, such as your bank's 1-800 number. For more tips on how to avoid phishing scams, check out the Anti-Phishing Working Group's website. Defragmenting Defragmenting is the process of compacting files and bringing them closer together on a drive. You will find the defragmenting tools under Start -> Accessories -> System Tools -> Disk Defragmenter. Defragmenting is a slow and resource intensive process so plan on doing something else while it runs. Defrag Screen Shot. To Defragment or not to Defragment The analysis tool will provide an illustration of how much compacting/ordering can be done. If you haven’t defragmented lately and the tool says there is no need to, go head and defragment . Defragment at least twice a year, more if you find yourself moving/deleting/adding massive amounts of data on a regular basis. Some people in special circumstances defragment once a week and replace their physical hard drives yearly due to wear and tear. Disk Cleanup Go to: Start -> Programs -> Accessories-> Disk Cleanup.
Recommended publications
  • Windows Batch Downloader App Windows Batch Downloader App
    windows batch downloader app Windows batch downloader app. A free bulk image downloader application that also serves as a multi-purpose bulk downloader for your PC. Cross-Platform. It doesn't matter whether you use a Windows, Mac or Linux Operating System. We've got you covered. DOWNLOAD MEDIA FILES. WFDownloader App is able to batch download entire image galleries, wallpapers, animes, mangas, videos, audio files, documents and so on from suported sites. Organized Downloading. Your downloads are grouped by batches making it easy to access related downloaded contents on your computer. More Features! Bulk download urls with patterns, download forum images and other media, grab images directly from search engines, use app's built-in crawler for advanced link search, save download progress and resume at any time, and other stuffs. WFDownloader App is a smart batch downloading app and it's absolutely FREE! Features. Grab original images directly from search engines like Google, Bing, and Yandex. Download entire image galleries, wallpapers, documents, videos, audio files, etc., from supported sites like Instagram, Twitter, Pinterest, ArtStation, etc. Use app's customizable crawler for advanced link search. Has special support for bulk downloading any kind of media from forum threads. How can I download a file with batch file without using any external tools? First to clarify this question is aimed to HTTP(s) download .For FTP may be I'll ask (and answer) another question. Here are some similar questions - but I want to be more precise . Besides excluding external tools I want the solution(s) to be applicable for the widest possible types of windows machines (including XP,Win2003,Vista which still have big enough share).
    [Show full text]
  • Give Windows a Tuneup
    Tune-up Your Windows PC Jere Minich Jminich (at) apcug.org APCUG Advisor, Region 5 - FL, GA, SC, AL Program Director - Lake Sumter Computer Society ProgramLSCS (at) gmail.com 1 This Presentation covers Windows 7 & 8.1,10 2 Overview of Windows Tune Up Slide Index • Computer Wear & Tear - 4 • Clean Up ‘Startup’ Folder - 33 • Start a System Backup - 5 • Delete Programs - 40 • Check Hard Drive - 9 • Set a Restore Point – 45 • Update & Downloads -13 • PC Security- 51 • Check Defenses - 18 • Logging on to the PC – 55 • Free up Drive Space – 22 • Recommendations - 70 • Disk Cleanup - 25 3 Aspects of Computer Wear and Tear • Windows Update - added dozens of patches to the operating system • Installed some new third-party software • Uninstalled other programs • Upgraded or patched apps and utilities • Altered, tuned, and tweaked various aspects of the system's user interface and software settings • Created and deleted myriad new: • emails, documents, photos, MP3s, videos, spreadsheets, etc. 4 System Backup System Image System Backup • Done for personal data – the data created and downloaded. Documents, movies, music, Photoshop files, work data, etc. • For personal data, do more regular backups, because documents and other personal data get changes and new additions frequently. System Image • An exact copy of the entire hard drive, including every single piece of data: operating system, hardware drivers, apps installed, settings, preferences, etc. Both will copy corrupted files and viruses 5 To back up programs, system settings, and files Go To:
    [Show full text]
  • Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome
    Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software comes with more or less unwanted add-ons or browser toolbars. These are quite annoying because they may: Change your homepage and your search engine without your permission or awareness Track your browsing activities and searches Display annoying ads and manipulate search results Take up a lot of (vertical) space inside the browser Slow down your browser and degrade your browsing experience Fight against each other and make normal add-on handling difficult or impossible Become difficult or even impossible for the average user to fully uninstall Toolbars are not technically not a virus, but they do exhibit plenty of malicious traits, such as rootkit capabilities to hook deep into the operating system, browser hijacking, and in general just interfering with the user experience. The industry generally refers to it as a “PUP,” or potentially unwanted program. Generally speaking, toolbars are ad-supported (users may see additional banner, search, pop-up, pop-under, interstitial and in-text link advertisements) cross web browser plugin for Internet Explorer, Firefox and Chrome, and distributed through various monetization platforms during installation. Very often users have no idea where did it come from, so it’s not surprising at all that most of them assume that the installed toolbar is a virus. For example, when you install iLivid Media Player, you will also agree to change your browser homepage to search.conduit.com, set your default search engine to Conduit Search, and install the AVG Search-Results Toolbar.
    [Show full text]
  • Skype Download 64 Bit
    1 / 4 Skype Download 64 Bit Download Voice Changer App apk 1. ... Antares Autotune 7 64 Bit Mac Crack. ... Clownfish Voice Changer can be synced with Steam, Skype, Hangouts, Viber, .... youtube, youtube to mp3, download youtube, mymp3song, hindi music lyrics ,download punjabi music, free punjabi music, hindi songs mp3 ,punjabi wap .... Download Skype (Classic) for Windows to expand boundaries and reach out to limitless opportunities for instant worldwide communication.. The following is an explanation on how to get Skype for Business, download and ... Office applications and system requirements, selecting either 32 bit or 64 bit.. German 64-bit · German 32-bit. the full KB article and rest of clients download links can be found here. Spread the news .... Download Skype for Business latest version (2021) free for Windows 10 PC/Laptop. 64 bit and 32 bit safe Download and Install from official .... Please note: the latest versions of Skype work only on 64 bit architectures. It is possible to install Skype on Fedora using these package methods. Using the RPM .... Here we will describe downloading and installing a Skype package ... There are different versions of Skype available for 32-bit and 64-bit flavors of Ubuntu.. If you need a rollback of Skype, check out the app's version history on Uptodown. It includes all the file versions available to download off Uptodown for that app. Get Skype, free messaging and video chat app. Conference calls for up to 25 people. Download Skype for Windows, Mac or Linux today.. How to Download &Install Skype for Business software of Office 365 in ..
    [Show full text]
  • Revo Uninstaller
    Revo Uninstaller Revo Uninstaller 1 / 3 2 / 3 Download Revo Uninstaller - A fast and reliable uninstaller that helps you delete registry entries, use different uninstall methods, disable or .... The program update to Revo Uninstaller Free 2.1.0 added an option to uninstall Windows Apps on Windows 8 and 10 systems to the software .... Revo Uninstaller adds some serious power to uninstalling programs, but not a lot of speed. It certainly runs circles around the default option in .... Revo Uninstaller Pro, made by VS Revo Group, uninstalls everything that is on your computer, even the most annoying of files. It also provides .... Revo Uninstaller allows you to uninstall stubborn programs that are not uninstalling properly through the Windows control panel.. Revo Uninstaller lets you uninstall programs using a simplified interface. If you have lots of software installed, you can reorder them, list them by icon or detail .... Revo Uninstaller 4 is the tool to declutter your Windows! Thanks for checking softwarestars.org to find a solution for your issues with uninstalling applications on .... Clean removal of any program from your PC. Uninstall and remove programs and other unwanted software in Windows with Revo Uninstaller Pro easily!. Revo Uninstaller helps you to uninstall software and remove unwanted programs installed on your computer even if you have problems uninstalling and cannot .... Uninstalling individual Windows 10 apps piecemeal can be tedious and time-consuming. But our favorite uninstaller utility, Revo Uninstaller, .... Revo Uninstaller helps you to remove any unwanted application installed on your computer.. Revo Uninstaller Free 2.1.1. More powerful replacement for Windows' built in program removal tool.
    [Show full text]
  • Comodo System Cleaner Software Version 3.0
    Comodo System Cleaner Software Version 3.0 User Guide Guide Version 3.0.011811 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System- Cleaner - Introduction ................................................................................................................................. 3 1.1.System Requirements......................................................................................................................................................... 5 1.2.Installing Comodo System-Cleaner..................................................................................................................................... 5 1.3.Starting Comodo System-Cleaner....................................................................................................................................... 9 1.4.The Main Interface............................................................................................................................................................ 10 1.5.The Summary Area........................................................................................................................................................... 11 1.6.Understanding Profiles...................................................................................................................................................... 12 2.Registry Cleaner......................................................................................................................................................................
    [Show full text]
  • Good Downloads for Pc the Best Free Software for Your PC
    good downloads for pc The best free software for your PC. The best free PC software programs aren’t about the cost (or lack thereof), they’re about a fresh opportunity—collections of code that put the dumb hardware in your computer to smart use, tools that can accomplish anything from balancing your household budget to helping cure cancer. Stocking your PC is an intensely personal task. But some programs are so helpful that we heartily recommend them to everybody. These free PC programs—a mix of must-haves and delightful auxiliary apps—deserve a place on almost any computer. There are times when a paid alternative makes sense, however. We’ve pointed out the circumstances where an upgrade over the free offering is warranted, along with our recommendation for the category. Editor’s note: This article is updated periodically with the latest information and newer software picks when applicable. A better browser. Before you roll up your sleeves and start slinging software around, make sure to snag your web browser of choice. Using Windows 10’s default Internet Explorer or Edge browser when you’re accustomed to something else feels like wearing somebody else’s shoes. (Blech.) That said, our money’s actually on Edge, which earned top honors in PCWorld’s extensive best browser showdown, barely nudging out Google's just-as-superb Chrome browser. But hey, they’re all free! Try before you “buy.” And if the big names aren’t your thing, there’s a legion of highly specialized alternative browsers begging for your attention. Is it worth it to upgrade to a paid version? Maybe.
    [Show full text]
  • Installer Crack Pkg
    Installer crack pkg click here to download but i want to install the game: i am alive. but its an pkg file and i cant . The retail PKG files will install but the Cracked PKG files fail to install. Restarting in Target Disk Mode If you want to install NewMac's bundled and type: $ /Volumes/Mac OS X Install Disc 1/System/Installation/Packages/ Note that . 5 days ago DownloadDirectX End-User Runtime Web Installer · Close windowDirectX End- User Runtime Web Installer. Skype for Business on Mac. Details. Download the installer files based on the download methods available for your product. Click www.doorway.ru and follow the prompts to continue. Image of the. All packages available in the latest release of Anaconda are listed on the pages linked below. These packages may be installed with the command conda install. The individual Unity installers are provided www.doorway.ru files, which can be installed the option is presented as Torrent download (Win+Mac) in the Downloads. Ubuntu packages. Ubuntu comes with darktable packages. You can install them with. sudo apt-get install darktable. If you need a newer version than what is. Learn www.doorway.ru files and view a list of programs that open them. A PKG file is a package of compressed installer files used to install a software program. Get Involved. If you want to help out with developing and testing, grab a daily build. Our GitHub project is here and the issue tracker for the server here. , Windows Installer (EXE) · Mac Package Installer (PKG) · AS Package, n/a, n/a Please refer to our documentation for install/uninstall instructions.
    [Show full text]
  • [email protected] Tel.: 089 93099168
    http://education.arrowecs.de/seminare [email protected] Tel.: 089 93099168 1 _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ 2 _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ 3 _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________
    [Show full text]
  • Complete Installation Guide
    Complete Installation Guide Complete Installation Guide Power Analytics Corporation 10805 Rancho Bernardo Road, Suite 270 San Diego, California 92127 USA ©Copyright 2014 All Rights Reserved 1 Complete Installation Guide Table of Contents System Requirements .................................................................................................................................. 3 Uninstalling EDSA Technical/ DesignBase Software from a Workstation..................................................... 4 Single Machine Installation ........................................................................................................................... 8 Workstation License File Request ........................................................................................................... 15 Server/Network Installation ......................................................................................................................... 17 Server/Network License File Request..................................................................................................... 24 Configuring the DesignBase license on a workstation connected to a network ..................................... 27 License Borrowing....................................................................................................................................... 29 DesignBase 5.0 Workstation Unattended Installation................................................................................ 32 DesignBase Permissions............................................................................................................................
    [Show full text]
  • "Revo Uninstaller Portable"
    "REVO UNINSTALLER PORTABLE" Web location for this presentation: http://aztcs.org Click on “Meeting Notes” 2 SUMMARY "Revo Uninstaller Portable" is a free software program that helps you clean up your hard drive and the Windows "Registry" after it runs the uninstall wizard that is part of all "desktop app" programs that run in "Windows..". It also helps you do a clean removal of "Universal Windows Platform" apps. 3 TOPICS • When You Use "Programs and Features" To Remove a Program.. • "Revo Uninstaller Portable" Cleans Up the Hard Drive and the Registry • "Revo Uninstaller Portable" Is a "Portable Application" • Programs That "Revo Uninstaller Portable" Can Remove 4 TOPICS (continued) • Requirements for "Revo Uninstaller Portable" • Getting "Revo Uninstaller Portable" • Using "Revo Uninstaller Portable" • Appendix 1: Failed Test of "Geek Uninstaller" 5 WHEN YOU USE "PROGRAMS AND FEATURES" TO REMOVE A PROGRAM.. o When you use "Programs and Features" in the Windows "Control Panel" to remove a "Desktop App" program, it only runs the "uninstallation wizard" that is bundled with the "Desktop App" program 6 WHEN YOU USE "PROGRAMS AND FEATURES" TO REMOVE A PROGRAM.. (continued) o The "uninstallation wizard" of most "Desktop app" programs leaves all sorts of unneeded junk on your C: hard drive and in the Windows.. "Registry". 7 "REVO UNINSTALLER PORTABLE" CLEANS UP THE HARD DRIVE AND THE REGISTRY o When you use "Revo Uninstaller Portable" to remove a "desktop app" program, it does the following: Step 1: "Revo Uninstaller Portable" starts up the "uninstall wizard" that is bundled with the "desktop8 app" "REVO UNINSTALLER PORTABLE" CLEANS UP THE HARD DRIVE AND THE REGISTRY (continued) o Step 2: "Revo Uninstaller Portable" lets you initiate a scan for unneeded, leftover hard drive files/folders and unneeded, registry entries 9 "REVO UNINSTALLER PORTABLE" CLEANS UP THE HARD DRIVE AND THE REGISTRY (continued) o Step 3: "Revo Uninstaller Portable" lets you select which leftover hard drive files/folders you want to remove.
    [Show full text]
  • AUTHOF Smith, Roh=.Rt M., .77D
    DOCUMENT RESUME ED 131 197 95 CE 007 701 AUTHOF Smith, Roh=.rt M., .77d. TITLE Adult Learni.ng: Issues and innovations. Information Series No. 8. INSTITUTION Illinois State Office of Education, Springfield. Adult and COntinuing Education Section.; Northern. Illinois Univ., DeKalb. Dept. of Secondary and Adult Education.; Northern Illinois-Univ., De Ka16. ERIC ClearinghOuse in Career Education. SPONS AGENCY National Inst. of Education (DHEW), Washington, D.C. .PUB DATE Jul 76 NOTE 132p. AVAILABLE FROM NIT. Information Program, 204 Gabel Hall, Northern llincis University, DeKalb, Illinois 60115-(No charge) EpRs pRrcE MF-SC.83_HC-$7.35 Plus Postage. DESCRIPTORS *Adult Education; *Adult Learning; Educlonal Innovation; EducatiOnal Research; InstructiOnal TeChnology; older Adults; *PrOfesSional Contintiing Education; *self Actualization; Speeches ABSTRACT ' Seminar...presentations of,six leaders in the field of adult education are contained in this monograph: (1) "Adult Learning the 1970"s" by J.R. Kidd,(2) "Innovation in Organizing Learning for Adults--The New Technology" by Burton W. Kreitlow, (3) "Iihe Nature of Continuing Professional Education" by Cyril O. Houle,(4) "Self-Planned Learning and Major Personal Change" by Allen Tough, (5) "Helping Adults to Learn." by Alan B.Knot, and (6) "What Research Says about Adult Learning Potential and'about Teaching Older Adults" .by HOward McClusky. A reference list is includedfor each paper. .(WL) ********************************************************************* Documents acquired by ERIC includemany informal.unpublished * * ,materials not available from other sOu ces. ERIC makes every effort * * to obtain the'best copy available. NevertheleSs, items of marginal * *IreprOducibilityare often encountered and this affects the quality * *iof the microfiche and hardcopy reproduCtions ERIC makes vailable *Ivia the ERIC-Document Reproduction Service (EDRS)..
    [Show full text]