<<

1 TABLE OF CONTENTS

Table of Contents 2 Preface 3 Video: 4 Video: Computer 4 Video: Workstations 4 Workstation illustrations 5 Video: How The Works 8 Video: Computer Binary 8 Data Organization and Display 9 Desktop Files Email Programs 12 Internet 13 Useful Software 16 Useful Hardware 19 General Use Hints 21 Security 28 Maintenance 38 Hardware Recommendations 40 Computer Installations 41 References 43

2

PREFACE

According to an on line article five years ago: “Today, your cell phone has more power than all of NASA had back in 1969 when it placed two astronauts on the moon.” That would be my five year old 100 dollar smartphone compared to several IBM 360 Model 75 systems that cost millions of dollars that required large air conditioned computer rooms to operate in. https://www.phonearena.com/news/A-modern-smartphone-or-a-vintage-supercomputer-which-is-more- powerful_id57149 (Control + click to execute any link)

Up until fairly recently, little more was required of a consumer to operate a device than to plug it in and press a button or two. Now we have computers and equipment with computer technology embedded in it. This includes our cars, telephones, smart phones, and a lot more. We have not been presented with so many challenges since the introduction of the automobile when ‘get out and get under’ was the new normal. When automobiles were introduced, a Rolls Royce actually came with a driver! The driver was also the mechanic. For the less affluent, then and now, for an effective and safe device, the consumer is the mechanic or someone is paid to be the mechanic. This can get very expensive and is also impractical unless that mechanic is available on a full time basis.

This manual addresses this problem but is merely an overview. What has been compile here is what needs to be understood to have even some small degree of competence and understanding of today’s security nightmare.

Before starting to examine you computer you might find the function useful. In the search window at the lower left type ‘’. Then, check off view by small or large icons > ease of access center > start magnifier. The small magnifier window can be dragged around the screen for convenience.

Another help for aging eyes is to adjust as follows: Right click in a blank spot on the desktop > display . You can then change the size of text, apps and other items and also the overall resolution.

At websites, Control and the + key will increase font size. Control and the – key will decrease font size.

Better yet, you can increase the size of everything. Search window at bottom left > settings icon (looks like a sprocket) > Ease of Access > Display. Choose ‘make text bigger’ or ‘make everything bigger’.

Also, the links in this text can be followed by hovering your mouse over them and pressing shift + enter simultaneously.

3 VIDEOS

1 hardware (13:23) https://www.youtube.com/watch?v=8UyJMiYqvs4

(presenter note: stop at 5:47 to identify motherboard ports)

2 software ( 8:26) https://www.youtube.com/watch?v=gaN1SKti3ts

3 workstation (3:13) https://www.youtube.com/watch?v=8M9HtW_SAQM

4 WORKSTATION ILLUSTRATIONS

AMATEUR RADIO STATION K2GBH 1955

5

CO MP UT ER DES K – HE RB SW EET 2020

6

COMPUTER DESK – BARBARA SWEET 2020

7 4 How The Internet Works (5:32) https://emailwww.youtube.com/watch?v=oj7A2YDgIWE

5 Binary Code (6:59) https://www.youtube.com/watch?v=Xpk67YzOn5w&list=RD82m2du- zgmY&index=2

8

DATA ORGANIZATION AND DISPLAY

DESKTOP

Data is stored in a hierarchy – Hard Drive / Folder / File with some system files not assigned to folders. Folders within folders within folders etc. are also seen.

A special type of folder is called the ‘desktop’ which is graphically presented on the monitor. Its main area is filled with icons which are programs, shortcuts to programs (icon has small arrow in lower left corner), data files, and folders. The idea is to display what is ‘on the desktop’-- not in the desk and that would be what is most frequently used.

At the bottom of the desktop is a strip with three areas. This is the Task Bar. On the left is the Windows symbol. A left click brings up a shortcut list to the programs. A right click brings up a list of computer management options. Both left and right clicks also bring up access to shutdown, sleep, and restart. ‘Sleep’ is a partial shutdown from which restarting is much faster than booting up from shut down. ‘Restart’ is required now and then, especially when programs are updated, and is much faster than shutting down and turning on again.

In the center of the Task Bar are icons frequently used. When in use, there is a blue bar at the bottom of the program being used.

The right area of the Task Bar is called the ‘System Notification Area’. It shows smaller icons for programs in use, and status indicators. An up arrow (looks like a tent) indicates hidden icons which can be dragged to the System Notification Area. (To drag, highlight the item to be moved, and, while holding down the left mouse button, ‘drag’ the icon to the new location.)

Hovering the mouse over any of the icons anywhere on the desktop will bring up a small window providing its name and some information.

A right click on the Task Bar will bring up another menu which includes a useful function called ‘’. Click ‘more details’. The Process tab will list programs (apps) that are running. You may need to sort by name. Click on the column heading. If unable to shut down a program, going here and right clicking will be a way to do this. This may be necessary if a virus locks up the browser. The Performance tab will show how much of the CPU and Memory are being used. Minimizing the Task Manager will place an icon in the system tray where performance usage can easily be monitored. If the CPU is too close to full utilization, giving it another program to run will just slow everything down. The same is true for memory usage. The Start Up tab will list the programs that will start when the computer is booted up. Typically, new computers boot up all of the applications. This is not a good idea. It will take longer to boot up and heavy resource utilization will slow the computer down. Examine each app and determine if it must be run. Check Google for information. As a bare minimum, only your anti must be on at all times. Other programs can be turned on, as needed.

9

FILE EXPLORER

The File Explorer is the method of graphically presenting the contents of the computer on the monitor. To access File Explorer, click the manila folder icon on the Task Bar. BTW, an instruction to ‘click’ will always refer to the left mouse button unless right clicking is stated.

At the top, select the View tab. Within the View tab, select ‘Details’ for the most concise display.

At the top of the large area on the left you will find various shortcuts to your documents, pictures etc.

Below this, locate ‘This PC’. If the symbol ‘>’ is present, clicking it will show more detail. First will be listed the shortcuts and below that all of the drives – hard drives, hard drive partitions, the optical drive (CD), and flash drives.

Hard drives can be software partitioned so that there appears to be more than one hard drive. Sometimes the main hard drive will have a recovery partition. The main hard drive is always labeled as the ‘C’ drive. If it has a recovery partition, that would be the ‘D’ drive. If not, the ‘D’ drive would be the optical drive where DVDs and CDs are inserted. If there are other internal or external hard drives or flash drives, higher drive letters will be assigned. The large panel to the right will show folders and files that within the highlighted item in the left panel. ‘A’ and ‘B’ drive letters were originally assigned to the ‘floppy’ drives and are now obsolete.

All of the program shortcut icons on the desktop will produce the same result as going directly to the program which is most commonly stored in C:\ Program Files or C:\Program Files (x86). These will be indicated as ‘program name.exe’. Within the folder for an application, sorting by file type (click the column heading ‘type’) to get all of the ‘applications’ together will show all of the execs. One of these will be the exec that starts the program. It is typically the one with the least utilitarian icon. If there is no desktop icon, once can be created. Right Click the icon > Send To > desktop. A desktop shortcut icon can also be created by going to the All Programs list (click Windows icon at bottom left of screen) and dragging it to the desktop area. To ‘drag’, click on the icon, hold the mouse button down, slide the icon to the desktop area, and then release the mouse button.

The paths to the actual data locations are even longer and you will need to know them if it becomes necessary to recover a file from your backup. Files can become corrupted and backup becomes important then. There are two path structures for user data. The older one is: C:\Users \ user name: desktop, documents. pictures. downloads, videos. The newer one is the same as the older one to locate downloads and videos. But for the other user folders, the path is C:\ users \ user name \ one drive.

Within File Explorer, you can move files and folders using the cut and paste or copy and paste functions. Go to the source location, right click, select copy or cut. Go to the target location, right click > paste.

You can also create a new folder by right clicking in a blank area. Once created, it can be renamed. Right click > rename.

10

Also, within File Explorer, to help finding a file or folder, you can sort on any column. Click on a column heading title will sort on that column. Clicking it again will reverse the sequence.

Many files and other information are hidden from users to prevent their destruction. Locate ‘hidden files’ and ‘file extensions’ as follows: Search Window (lower left) enter ‘control panel’ > select ‘view by small or large icons’ > File Explorer Options > View tab.

FILES

As mentioned earlier, files names are in the convention of ‘filename.file type’. For example, file type ‘.exe’ indicates a program and clicking on it will execute or run that program. File types .doc and .docx are word processing file types. They were originally introduced by Microsoft and edited or read with the Microsoft Word program (also called application or ‘app’) but now can be edited or read with other programs such as Apache Open Office Writer and Libre Office Writer.

Other common file types are: .pdf This is very frequently used and contains text and graphics. Full editors are expensive and readers with minor editing capabilities are most commonly used. Adobe Reader is the most popular reader. will also read pdf files. Nitro PDF reader has the ability to add text and your signature which is useful when filling in forms. You can get it at cnet.com.

.jpg This is a picture file type. Elements is a common editor. This is useful for a lot especially, improving contrast, cropping, adding text, reducing file size for email attachment, and custom printing. will also read .jpg files.

.txt This is a bundled basic text editor.

.mp3 This is an audio file type. Microsoft’s bundled audio player is Groove .

.mpg This is a video file type. Microsoft’s bundled video player is Movie & TV.

.zip Zip files are files that have been compressed for faster transmissions. This also allows large files to be attached to eMail messages. Almost all eMail programs limit the size of a file that can be attached. (25 Mb is common) Some zip files are self extracting. They will expand to readable files (unzip) when clicked on. Others require a special program to do this. Winzip is a popular unzip program. It can also be used to compress files.

If a file type is unknown to you, you can easily Google it to learn more. For example, for file type .rtf, enter into Google ‘.rtf file’.

Each file has a default editor / viewer program associated with it. This can be found at Windows icon (bottom left of screen): click > settings > apps > default apps > choose default app by file type. Scroll down to the desired file type. The associated app will be shown. Clicking the assigned icon will generate a recommended list of alternate programs. If the app that you want is not listed, go to File

11 Explorer and locate your file. Right Click > open with > choose another app > more apps > look for another app on this PC > Program Files or Program Files (x86) > program name folder > .exe file. You can then associate this editor / viewer by checking ‘always use this app to open .xxx files’. EMAIL PROGRAMS

Your Internet Service Provider (ISP) will almost always provide an email program. Other common email programs are America on Line (AOL.com), Gmail (provided by Google), Yahoo (yahoo.com), and Outlook (provided by Microsoft) These are all on-line programs; your email data will be ‘in the cloud’. A common PC based program is Thunderbird (thunderbird.net). PC based email programs are faster and provide more refined filing.

In addition to the text in an email message, larger amounts of data, pictures, and programs can be sent in a file attached to the email. These files usually are less than 25 Mb. Files larger than that can be sent using intermediary sites such as Google Drive. (google.com/drive)

If there is an attachment to an email, it is commonly indicated by a paperclip icon.

Before downloading, understand the risks. A file type of ‘exe’ is a program that may self execute when it is downloaded to your computer. A ‘zip’ file type is a compressed file or group of files which may include .exe files. You should be expecting these files and understand where they came from. Unknowns are always either malware or spam.

The default location for downloaded files is the download folder. (File Explorer > Downloads) After receiving a file here, it should be moved to either your Documents Folder (File Explorer > Documents) or to your desktop (File explorer > Desktop).

An analogy would be to picture a receptionist at an office building. Each person is directed to some location within the building. If, instead, the receptionist only said ‘take a seat’, things wouldn’t work out well. For the computer, you are the receptionist!

The process is the same for downloading from a website.

12

INTERNET

To access websites on the Internet, you will need a program called a ‘browser’. Microsoft’s default browser is ‘Edge’. Other popular browsers are: Firefox ( https://www.mozilla.org/en-US/firefox/new/ ) and Chrome ( https://www.google.com/chrome/ ). (Microsoft’s is obsolete.) Description of functions illustrated here will be for Firefox. Other browsers have similar capabilities but use their own jargon and screen layouts (also called ‘user interface’).

Firefox has Tabs so that multiple websites can quickly be selected, Bookmarks for recalling stored website addresses, private browsing, and extensions for security and privacy.

To access these features, in Firefox, go to the menu. You can establish a top menu bar by right clicking at top of the browser page in a blank area and check Menu Bar. Alternately, go to top right and click on the parallel horizontal bars icon – the standard menu icon.

You can use additional functions such as ad blocking and security (Tools > Add-ons > extensions), and Private Browsing (File > New Private Window) to hide your personal data when browsing.

Examples of browser add-ons are Newsguard ( https://www.newsguardtech.com/ ) and Web of Trust ( https://download.cnet.com/WOT-Web-of-Trust-for-Firefox/3000-11745_4-10588554.html )

Another nice feature in Firefox is Reader View. This feature eliminates ads, allows for increase in font size, and even has a voice readout – speed adjustable! The icon for Reader View is a small rectangle with ‘text’ at the right end of the website search window. After clicking it, you will see the controls on the left side of the screen.

COOKIES - A cookie is a small data item sent from a website and stored on the user's computer for the user's web browser while the user is browsing. Cookies were designed to be a reliable mechanism for websites to remember useful information or to record the user's browsing activity. They can also be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers. Wikipedia

You can control this in some browsers. For Firefox, menu (3 parallel line icon at top right) > options > privacy and security > cookies and site data > manage permissions. Enter the website address and set to ‘allow’ or ‘block’ as needed.

13

PRIVATE BROWSING – Private browsing isolates multiple individuals using the same computer. With private browsing, you can remain incognito on a work device, for instance, because your information won’t be stored on your computer. But your privacy ends there. Your employer, internet service provider, the websites you visited, and government agencies may still be privy to information including your browsing history, passwords and cookies.

https://us.norton.com/internetsecurity-privacy-your-private-browser-is-not-so-private-after- all.html https://www.washingtonpost.com/technology/2019/06/21/google-chrome-has-become- surveillance-software-its-time- switch/?noredirect=on&utm_campaign=pockethits&utm_medium=email&utm_source=pocket &utm_term=.1ada408a8ef5

WEBSITE NAMING CONVENTION - It is important to understand website naming convention so as to avoid connecting to sham websites. 'https://www' or 'http://www' is the introductary part (hypertext transfer protocol secure or hypertext transfer protocol // world wide web) Just remember that the 's' is for secure. (See Security Item # 7) The 'www.' is often left out.

Following this is the 'dot' displayed as ' . ' . This separates the next item which is called the Domain Name. Following that is the Top Level Domain (TLD). Preceeding the domain name may be a subdomain of which there can be more than one.

For 'weather.com' , weather would be the domain name and 'com' would be the top level domain.

For 'mail.chase.com' , mail would be the sub domain, chase would be the domain name, and com woudl be the top level domail.

The common TLDs are: .com, .org, .net, .edu, .gov, .mil, and, .biz. In addition there is a standard list of country codes used as TLDs such as .US for United States and .RU for Russia.

Following the TLD there may be a '/'. The information following the slash will take you to a specific page within the website.

https://www.lifewire.com/what-is-a-domain-name-2483189

http://countryareacode.net/

It is also useful to know that the preface part of the website name (also known as 'Uniform Resource Locator' or 'URL') need not be entered into the browser search window when instructing the browser to go to a particular website. So, for example, I would not have to enter 'https://www.facebook.com'. All that would be needed is 'facebook.com'.

14

Understanding TLDs can also help you avoid Spam (Spam: junk email message typically advertising some dubious product) and scams. For example, examine an eMail from '[email protected]'. While 'hsweet' is recognizable as coming from me, the rest should make you think twice. I am not living in Russia! This is a called name spoofing. The intention is to trick the receipient of the email into believing that the email came from someone he knew and innocently click on a link placed in the text portion of the eMail. Clicking on that link, at best, would take you to a Spam promoting website or even execute a program to place malware on your computer!

'

15

USEFUL SOFTWARE

Be aware of on unfamiliar websites offering free anti-virus checks and free screen savers. These frequently are wolves in sheep clothing.

Use trusted sites such as Cnet.com, ZDnet.com and MajorGeeks.com or sites run by various PC magazines or your ISP (Internet Service Provider). (i.e. Optonline / McAfee anti-malware) Take care to press the right download button. Free software sites commonly show a lot of large green download buttons that will download unwanted software! Check reviews and ratings. (i.e. cnet.com, Amazon.com, Newegg.com) You can also Google ‘program name review’.

BTW, the terms app, application, program, and software are synonymous. Also, software can broadly be classified into two categories – utilities and applications. A utility is software that keeps your computer working properly and safely. Examples would be a registry cleaner (The registry is the computer’s command center.), a defrag program (reorganizes data for efficient access), and an antivirus program (also called anti malware program). An application is a program that does something that benefits the user. Examples would be word processing programs, Internet browsers, photo or video editing programs, and financial management programs.

Agent Ransack (Free) is a PC search tool for locating files and folders when only minimal information is known. A partial file name or some particular contents is all that is needed. Down load it from Mythicsoft.com.

ScreenHunter 7.0 – (Free) is a tool similar to PrintScreen but allows the user to select any rectangular area on the screen and produce a .jpg file. It is available from wisdom-soft.com.

Google Earth - (Free) Presents aerial view of any address. Also includes a tool to measure distances (tools >ruler) and much more. Select version 7.3.2 either 32 bit or 64 bit depending on your computer. [search window at lower left of screen: enter ‘Control Panel’ > System] https://support.google.com/earth/answer/168344

Google Maps – (Free) Presents street maps and locations of services. Also provides directions which you may modify. The Menu (3 horizontal bars at top left) includes the choice of a satellite view. maps.google.com

Quicken – is a bookkeeping program. Different accounts such as checking, savings, and credit cards can be set up. Reports such as ‘How much did I spend on?’ or ‘How much did I pay to xxx?’ can be established. Quicken, like many other programs, is sold with a one year license. The 2012 version has no time limit and is still available on eBay and Amazon.

Thunderbird – (Free) email program (Mozilla.com) Email access is far quicker when the email is stored on the PC instead of the remote . Thunderbird also provides a better opportunity for separate folders for saving email.

16 Revo Uninstall – (Free) (cnet.com) When all traces of a program are desired to be eliminated, Revo is the vehicle. Use this as opposed to Programs & Features in the Control Panel when you truly want to see every last fragment of the program gone.

EASEUS Todo Backup – (Free) (cnet.com or easeus.com). This is a great program with a free version that allows capture of backed up files should the main files becomes corrupted. Also, should the C drive become inaccessible due to a crash or virus, using a recovery CD, the backup drive can be accessed and used to recreate the lost C drive with just a few keystrokes.

For full feature capability, including incremental and differential backups, the paid version, 12.0, is needed. This is currently being licensed for $30 /year. The free version at the prior level, 10.6, does the same and is available at https://www.filehorse.com/download-easeus-todo- backup/32033/

If you set up the backup program for automatic backup, the external drive is normally connected to the tower. This will make it vulnerable to ransomware. You can keep it disconnected and then connect it to complete the backup.

cCleaner registry cleaner & maintenance (Free version) (cnet.com) After time, computer instructions, which reside in the Registry, deteriorate. This result in a slow running computer. An occasional cleaning is worthwhile. Many registry cleaners do more damage than good. Not this one. CCleaner also easily gets rid of temp files, browser cache, and other junk. CCleaner also has a function to remove all traces of deleted files – a useful function when it is time to sell or dispose of the computer or hard drive.

File Hippo (Free) (filehippo.com) - Finds and installs software updates which may be program improvements, fixes for program defects, and fixes for security exposures. File Hippo is a free program that will make this easy. https://download.cnet.com/FileHippo-App-Manager/3000- 18513_4-77516503.html (note- this program sometimes doesn't work!)

Nitro PDF reader – (Free) PDF reader + converter (cnet.com)

LibreOffice - (Free) similar to Microsoft Office (cnet.com)

Winzip (Winzip.com) ( $$) Use for zipped (compacted) files downloaded or received attached to email. Be sure to know the source of the zipped file as it could contain malware! Better yet, run your anti-malware program against the downloaded zip file.

Adobe Photoshop Elements - photo editor ($$) Novices typically send unedited photos attached to emails taking far too much file space. Cut them down to size with a photo editor. Other editing functions such as cropping and touch-up are provided.

Quicken ($$) - is the premiere program for tracking your finances. Licensed annually.

Secret Data Manager - encryption (http://download.cnet.com/Secret-Data-Manager/3000- 2092_4-11665951.html)

17 (Free) (cnet.com) Recovers deleted files. Files that have been deleted, unless excessive in size, first are sent to the Recycle Can. They can be retrieved from there. Even after the Recycle Can has been emptied, all is not lost. A deleted file is not really deleted; it simply has the pointer to it deleted. This program will recover them. As deleted files can be overwritten with new data, the sooner a deleted file is sought, the better the chances of success.

Fences - desktop organizer (cnet.com)

Speccy - (Free) displays computer’s technical specifications such as for the CPU, the RAM, and the drives etc. (cnet.com)

Webroot Secure Anywhere – cloud based and very fast malware protection. Cost about $20 annually for basic model. No manual intervention is required. (newegg.com)

SuperAntiSpyware – This is a great program for removing malware. It is available at superantispyware.com. All that you will need is the free version. But, like other free versions, it needs to be run manually.

18

USEFUL HARDWARE

Printer – There are two types of contemporary home computer printers – inkjet and laser. The inkjet is cheaper but the ink will eventually clog to the point where the printer becomes useless. Repairs are excessively expensive so the printer must be recycled. Staples accepts most used computer components.

Laser printers produce more consistent and generally higher quality results although a serious photograph such as a portrait or a landscape that is printed on an inkjet printer using photo paper will be much better. Laser printers are also more expensive.

For either, look for the following features: automatic duplex printing, wireless connection via network, built in scanner. Also, the cheapest inkjet printers have one ink tank for black and one for all of the colors. When one of the colors gets depleted, the entire ink tank has to be replaced. This gets expensive. Separate tanks for the separate colors is more economical in the long run. The printer manufacturers will insist that the user must install their tanks and laser toner cartridges but they are overpriced. Inkjet cartridges from Swiftink.com or Printpal.com are of excellent quality and are about a third of the cost of the manufacturer’s tanks. Laser printer toner cartridges can also be purchased from these suppliers and on eBay at a fraction of the cost of the manufacturer’s price and they work fine.

SCANNER - Use a scanner as a copier or to create digital files from a paper source. For casual work, the scanners that come bundled with printers are OK. I prefer a dedicated flat bed scanner and have used Epson Scanners for many years. About $200 will get you one that will serve all but commercial needs. I have one still in service that I purchased 18 years ago! I’ve never had a problem with my Epson scanners.

ROUTER – The router is the device that will be needed for a network which has multiple computers or wireless printers. Wired (Ethernet) connections are faster and are not susceptible to interference from neighboring networks or other devices using the same frequency. Wireless is good for the occasional connection by a visitor who would like to use his own cell phone or laptop. Setting up a router is complex. User manual is mandatory. https://www.youtube.com/watch?v=Mad4kQ5835Y

MODEM – (modulator / demodulator) This is the device supplied by your ISP (internet service provider) that connects you to the Internet.

UPS (UNINTERRUPTIBLE POWER SUPPLY) – Your computer needs to be properly shut down and a power outage or even a power glitch can cause serious damage to the computer. A UPS will deliver power to the computer in case of an outage or glitch for, at least, a few minutes giving you enough time to properly shut down the computer. Some UPS units will have software that will sense when the UPS battery is too low and automatically shut down the computer. What should be connected to the UPS is the tower, monitor, and external backup hard drives. Laptops operate from internal batteries, even when connected to the AC. They have, in effect, their own UPS. A UPS battery will generally last for about five years before it

19 needs to be replaced. After that, it will still work but, if called on to provide emergency power, it may only work for a few seconds.

EXTERNAL HARD DRIVE - primarily used for backup and far more cost effective than backing up to a smaller flash drive. They range in size from 1 Tb to 10 Tb. (terabyte – as in trillions) There are two types - powered by a ‘brick’ and powered from the computer’s USB port. A ‘brick’ is an external AC power supply commonly shaped like a brick or even a cube. Those external hard drives powered by the computer’s USB port are called ‘portable’ and are more expensive than the book sized, brick powered external hard drives.

FLASH DRIVE - These are also called ‘thumb drives’. They are about the size of your finger and are plugged into a USB port. Common sizes, now-a-days, range from 16 Gb to 256 Gb. (gigabyte – as in billions) The more expensive ones are more likely to transfer data faster and this is important for large files like video files. Also, flash drives, currently, are either at the USB2 or USB 3 standard. The USB 3 drives are generally much faster than the older USB 2 drives. USB 2 drives will have a white insert in the plug. USB 3 drives will have a blue insert in the plug. Check the specs. Faster drives are coming and the standards are unsettled to say the least.

SPEAKERS - Laptops contain their own speakers and some desktop monitors have a speaker bar along the bottom edge. For desktop systems, I recommend a two speaker system powered by a brick and not by USB with 5 watts power capacity minimum. These are called ‘2.0’. Some have a woofer (low frequency speaker) and are called ‘2.1’. The woofer isn’t needed for general use.

USB Hub (universal serial bus) – provide additional ports to add accessories. Powered USB hubs will handle more devices. USB port cards that fit into the motherboard and have ports accessible at the rear of the tower are better yet. Level 3 USB hubs are far faster than level 2 USB hubs. (recommended: Rosewill RC-508 from newegg.com)

20 GENERAL USE HINTS

PRINT SIZE - There are several methods of increasing the size of the print. In Word and PDF programs, there is usually a sliding scale. In the Firefox browser, there is an option to change print size. (See Firefox below) A general way of increasing the print size is to hold down the control key and press the + key. To reverse press the control key and the – key.

HELP FROM MICROSOFT - If you need help with Windows, you can get it free from Microsoft. They have a program called Virtual Agent. After a few canned responses, you can contact a live agent. Be sure to use the Microsoft Edge browser. https://support.microsoft.com/en-us/contactus/

BROWSER – enlarge web page content. To enlarge the contents while at a website, press and hold the control key and then press the ‘+’ key. Each pressing of the ‘+’ key will enlarge more. To reduce, follow the same procedure with the ‘- ’ key.

FIREFOX BROWSER – Reader View - displays only article being read, adjusts text size, provides variable speed audio readout. Look for rectangular icon to right of website info in search window. If present, reader view is available. Text size and audio controls are on the left of the screen.

FIREFOX BROWSER - Screen Shot – selected portion of web page can be saved as a file. Right click in a blank area > take a screen shot. Drag or click on a section of the page to select region. (left click mouse and hold and move mouse to create desired rectangle. Then release mouse button. Press ‘Download’. Go to Downloads Folder. Or select ‘save full page’ Press ‘Download’. Go to Downloads Folder.

FIREFOX BROWSER - Tab Recovery – When Firefox is shut down, whether by intention or not, when restarting, you can set it so the tabs that were open before shutdown resume automatically. Menu (three horizontal bar icon) > General > Startup. Check ‘restore previous session’

FIREFOX BROWSER – Larger Print – The default print size can also be increased in the Firefox Options. Menu (three horizontal bar icon) > General > Startup > Language & Appearance

DESKTOP ‘WALLPAPER’ - To select different desktop backdrops, right click on a blank spot on the desktop > personalize.

CORRECT COMPUTER SHUTDOWN - Computers have an internal shutdown sequence. Shutting down with the on-off button bypasses this and, eventually, corrupts the computer. Shut down as follows: Windows Symbol (lower left of screen) > power symbol.

21 POWER SETTINGS - The hard drive and monitor can be shut down when not in use other than by shutting off the computer. To do this, put the computer into ‘Sleep’ mode. This will save on the electric bill. Also, putting the computer into Sleep mode provides for a faster reboot.

search window > control panel > power options

SAFELY REMOVE HARDWARE - When disconnecting an external hard drive or flash drive, simply unplugging the USB connector or shutting off the power to the hard drive can cause damage. To properly disconnect, look for a small icon in the system notification area (lower right of screen) that looks like a flash drive. Hovering the mouse pointer over this icon will show the words ‘safely remove hardware’. Click once and a menu will be revealed. This may take a minute or two. Then click on the device to be removed. Remove when given the OK. This may take two attempts. If in use, File Explorer for example, shut down the application. If the process is unsuccessful then the computer must be shut down or put to sleep to remove the device.

INSTALLING SOFTWARE - Software not delivered via disk or flash drive is downloaded. If downloaded, the installation exec will download to the Downloads folder. To install software, shut down other programs as indicated by the Icons in the system notification area at bottom right of screen (not all icons are programs) and underlined programs shown in Task Bar (bottom center of screen).

Set a point: In search window, enter ‘control panel’ > check off view by small or large icons > system > system protection. Check C drive protection is ‘on’. If not, go to configure. Be sure to set aside adequate storage space for the restored data. I set mine to 20%. Go to ‘create’.

Run anti-virus program on downloaded exe or zip file. Locate the file in the Download folder. Right click and locate anti-virus program in drop down menu.

Run backup program.

Execute downloaded installation exec (double click)

IMPORTANT: Purchased software will have a license number (product key). It will be included with the CD or on the confirming email for downloaded software. It will be needed for the installation and for reinstallations or installations on other computers. Note the number of computers that the license is good for.

If the installation fails, you can recover with System Restore. control panel > check off view by small or large icons > system > system protection > system restore

Should System Restore fail, try an older restore point. If that also fails, reinstall from your backup drive using a full recovery backup program such as Acronis or EASEUS Todo backup.

22

For programs provided on a CD or DVD, if the CD or DVD fails to start the process, access it via File Explorer and locate startup.exe or similar.

HARD DRIVE - Keep hard drives loaded to less than 85%. File Explorer > C drive (right click) > properties. Use the same process for other drives.

REMOTE ASSISTANCE - Windows 10 contains a feature for connecting to other computers that may be located anywhere. This is useful for getting or giving assistance. This is ‘’ and is available by entering ‘Quick Assist’ in the search window.

CREATING DESKTOP SHORTCUT – Clicking the Windows symbol ‘Start Button’ icon (extreme lower left of screen) will bring you to the list of programs. You can drag a program to the desktop. To drag, locate the item to be moved, press and hold the left mouse button, move to desired location on desktop, release mouse button. If the first item in the program list is a manila folder icon, press the down arrow to get to the actual program.

TRANSFERRING LARGE FILES – Most ISPs ( Internet Service Providers) place a limit on the size of a file that can be attached to an email. 25 Mb is common. There are a number of workarounds; Google Drive is one and it is free (up to 15 Gb). You establish an account and upload your larger files there. The recipient can then download them. https://www.google.com/drive go to google drive log in with gmail my drive upload files select file, open right click on file uploaded share get shareable link copy and paste link into regular email

MOUSE SPEED - You can adjust the speed at which your mouse or touch pad moves. Go to search window (bottom left of screen) and enter ‘control panel. At the control panel, select mouse. There are other options there such as mouse pointer icon and mouse tail.

ON LINE EQUIPMENT AND SOFTWARE REVIEWS - Prior to purchasing any hardware or software, you can become very well informed by taking advantage of on line equipment and software reviews. If you are not familiar with the subject, start off at Wikipedia or About.com. For example, if you would like to purchase a wireless router system, you would be well advised to know the difference between A, B, G and N routers and high band vs low band.

23 Following your education, now knowing better what equipment or software features are important to you, proceed to the on line reviews. There are editor and expert reviews and user reviews.

With the editor reviews, care needs to be taken to be sure that the reviewing site is not a front for the manufacturer or that the website is providing slanted reviews. I would recommend cnet.com and pcmag.com. You can also Google ‘xxx review’.

User reviews, especially those labeled as expert or advanced or similar, are very useful. Care must be taken in interpreting these reviews from the general public. A top rating may mean no more than the user turned on the equipment and found its basic function working but had never checked out other capabilities. A bottom rating could well indicate that the user was incapable of operating the equipment. Wording and grammar are a dead give away.

You may also check out your future equipment purchase by downloading the manual from the manufacturer’s website.

Having selected the equipment model or software model, locate the retailer with a reasonable price and reliable service. Newegg.com is a popular retailer and prices are generally good.

INTERNET SERVICE PROVIDER CONNECTION SPEED - A higher connection speed to your ISP will provide for a faster browsing experience and for faster upload and download speeds. The fastest ISPs use fiber optic lines. Speed measured in Hyde Park are up to 400 Mbps (million bits per second) download speed. 100 Mbps down and 25 Mbps up are generally reasonable speeds. Much slower is DSL. Telephone dial-up service for rural areas is typically in the neighborhood of 30 Kbps – practically unusable!

What Internet speed do I need?: https://www.allconnect.com/blog/faqs-internet-speeds-what-speed- do- you-need/

Internet speed classifications: https://www.allconnect.com/blog/internet-speed-classifications- what-is-fast-internet/

Check your connection speed at speednet.net.

Check availability of services at: https://decisiondata.org/tv-internet-by-zip/12538-internet/ Dial-up modem history: https://whirlpool.net.au/wiki/d_u_m_h FILE TYPE CONVERSIONS – There are numerous websites where one file type can be converted to another. I used https://www.ilovepdf.com/word_to_pdf to convert my working .doc file to the .pdf file type that I have distributed. You can do a lot more there. This is a pay for service website but if you're only going to use this service occasionally, there is a work around. This website lets you try their converter for free but then sets a cookie ending free

24 service. To defeat this, go to your browser and disallow the website to set a cookie. For Firefox, go to menu bar at the right (three horizontal lines) > options > privacy & security > cookies & site data > manage permissions. Enter the website address. In this case it is ilovepdf.com. Press 'block', and then 'save changes'. Not all browsers have this feature.

Another PDF to DOCX converter can be found at Google Drive. It is free and excellent quality. google.com/drive personal - go to google drive upload file by right click in blank area open the document open with google docs (icon at top of page) file > download > microsoft word (.docx) go to downloads folder and open file edit > select all set font to times new roman / 12 (make fonts uniform if needed)

GOOGLE - personal calendar that syncs across multiple devices. Access:

from desktop – google.com/calendar : log in with Google ID

from cellphone – press blue calendar icon

Add event: scroll to date and time slot modify time to the minute (if desired) select repetition frequency (if desired) select color (if desired) save

Add task: (tasks will only appear on source device. To add on all, set up as an event at midnight of the day desired.) 1. click in open space next to day 2. select task 3. add title 4. add description (if desired) If adding a description, put an indicator such as an asterisk at the end of the title as a clue to look further into the detail screen.

25 Save https://www.google.com/calendar/about/

BURNING DATA TO CD OR DVD – You can put data files on a CD or DVD. Their capacity is far less than a flash drive but this method can be useful when passing information along. A CD can hold about 700 Mb and a standard DVD about 4.7 Gb. The R/W type of disks can be reused. The modern flash drives commonly hold from 16 Gb to 128 Gb.

Put CD or DVD disk into optical drive Locate file in File Explorer Right click Send to > CD / DVD drive (usually D) Adjust disk title Select ‘like a USB flash drive’ drive will format file will copy to the disk

BURNING MUSIC, GENERAL AUDIO, OR VIDEO FILES TO CD OR DVD – You can put music files on to a CD or DVD disk for playing on a CD or DVD player.

Insert a blank CD or DVD into the optical drive. (If it is an R/W type and had previously been used, locate the disk in File Explorer, right click > erase this disk, open and close the optical drive.)

The window ‘How do you want to use this disk’ will pop up. If it doesn’t, go to File Explorer and click on the optical drive. Set title and choose ‘with a CD / DVD Player’.

Locate (All programs > Windows Accessories > Windows Media Player). For frequent use, you can drag the icon to the desktop.

Open Windows Media Player

Select Burn tab

Open File Explorer and locate desired music file(s)

Drag the file(s) to the burn list at the right in WMP.

Start Burn (You can not add more files later so the burn list must be complete.)

The disk drive will open when the burning has completed

Reinsert

Play music

26

WINDOWS UPDATES – Windows 10 will automatically update your computer to the latest level. This, of course, will not happen if your computer is off. But, if it is in Sleep mode, and the settings are at the default level, it will wake up and make the updates.

It is a good idea to check that Windows is up to date now and then. Windows ‘start button’ > settings (sprocket icon) > update and security. Check for Updates.

To verify that the default is set: At Search Window (lower left) type in ‘control panel’ > power options > choose the selected plan. Change plan settings > change advanced power settings > sleep > allow wake settings. Set to ‘Enable’.

https://www.howtogeek.com/444807/will-windows-10-update-if-my-computer-is-in-sleep- mode/

27 SECURITY

1. Install anti-malware software. (The term ‘anti-malware’ addresses virus programs as well as all of the other new software that is harmful.)  Use one of the major paid anti-malware programs.  Virus sources: email attachments, dangerous websites, flash drives, CDs, floppy disks  Update anti-malware program and definitions regularly if the anti-malware requires manual updating. I prefer Webroot Secure Anywhere which is cloud based so this is not a requirement. Scan regularly if the anti-malware program does not do this automatically.  Caution - ‘false positives’. A false positive is a claim by an anti-malware program that a particular program or file is infected when it is not. Deleting or quarantining it could cause a program to fail. If suspicious, check out the validity of the file or program with a Google search.  Do not install more than one anti-malware program. Malwarebytes Anti Malware is an exception and can be installed with other anti-malware programs. If installing the paid, real-time version, set for delayed startup so as not to conflict with any other anti-malware program. Settings > protection > start up options > delay real time protection when MB starts. Turn on and set to 180 second delay.  reference: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

2. Ransomware – This is the most dangerous type of malware. When it contaminates your computer, it will lock you out of your files and demand a payment within a couple of days by Bitcoin for the criminals to unlock your computer. They may or may not followup and you may be contaminated again at some time in the future.

If you have a full and current backup, you can use it to recover. Ransomeware is common and not having a backup leaves you in a vulernable position. Note that an attached backup drive could also become contaminated.

3. Email Attachments – dangerous file types i.e. .exe, .zip File type ‘.exe’ is a program and, if from an unknown or untrusted source, it could contain malware. A ‘.zip’ file is a compressed file that could contain a ‘exe’ file.

reference: http://www.file-extensions.org/filetype/extension/name/dangerous-malicious- files

4. On-Line Software Sources Be aware of free software on unfamiliar websites offering free anti-malware checks and free screen savers. These frequently are wolves in sheep clothing.

Use trusted sites such as cnet.com, ZDnet.com and MajorGeeks.com or sites run by various PC magazines or your ISP (Internet Service Provider). (i.e. Optonline provides McAfee anti-

28 malware free to its users.) Check reviews and ratings. (i.e. cnet.com, Amazon.com, Newegg.com)

5. Phishing – Email with link requiring passwords and personal information. The link may connect to an impersonated website. Hover your mouse over the link to verify its true name or go directly to the valid website. References: http://www.mozilla.com/en-US/firefox/phishing-protection/

https://askleo.com/phishing_how_to_know_it_when_you_see_it/?fbclid=IwAR30fh- hC3g9pYTP0eaLaQwafcemRYPV8JFxqwQvwTmx77NV5m65X0g5AP8

6. Dangerous Websites – Browser and anti-malware software should provide alerts. Check out questionable website with Google. Also, safeweb.norton.com will give you a reading. Keep browser up to date. (i.e. Firefox: Help > About Firefox)

7. Website security – HTTPS or lock icon When the website address starts with HTTPS instead of HTTP, the connection is secured. This prevents eavesdroppers from seeing the transaction detail and prevents you from connecting to impostor websites. https://www.howtogeek.com/181767/htg- explains-what-is-https-and-why-should-i-care/ See INTERNET - WEBSITE NAMING CONVENTION

8. – Keeping Windows up to date provides the best security and the best operation of your computer. Windows 10 updates automatically (if the computer is on) but it is a good idea to check up on it from time to time especially after the second Tuesday of the month when Microsoft does its monthly update.

To check, from Start > settings icon (looks like sprocket) > Update & Security. Go to ‘check for updates’. Then click ‘check for updates’ --EVEN IF IT SAYS YOU ARE UP TO DATE.

9. Browser Security – keep up to date. Microsoft Edge is maintained along with the Microsoft operating system. For other browsers, set updates to be automatic if they are not already set to auto update by default. Firefox updates automatically but can also be manually updated. Go to ‘Help’ > About Firefox.

10. Software Maintenance – for security and functionality

Major update – i.e. level 9 to level 10. Purchased software companies frequently charges for a major update. Minor update – i.e. level 9.04.002 to 9.04.125

Detection:  Software such as File Hippo https://download.cnet.com/FileHippo-App- Manager/3000-18513_4-77516503.html  Help or tools > check for updates

29  Manufacturer’s website

Installation:  Download installation exec to download folder.

 Shut down other programs. Icons in system notification area at bottom right of screen (not all icons are programs) and programs shown in Task Bar (bottom center of screen) that are underlined.

 Set system restore point: (See System restore)

 Run backup program (See Security)

 Execute downloaded installation exec (double click)

If the installation fails, you can recover with System Restore.

(See System restore)

11. Wireless Network Security – An unsecured network is vulnerable. Use ‘WPA’ security. ‘WEP’ can easily be hacked. Replace older networks with the new ‘N’ standard for speed, distance and reliability. Newer networks are more easily installed with setup instructions included.

12. Hotspot (WI-FI) Security -- Internet cafes, hotel lobbies, ISP hotspots etc. are security concerns. Check your ISP. Optonline, for example, uses encryption. Others may not. Be certain that any website connected to shows ‘https’. This means that your connection will be encrypted. This includes email but not email attachments.

Another option is to set up a Virtual Private Network (VPN). These are available by subscription but the free ones have slower connections. Anchorfree provides a free VPN they call ‘hotspot shield’. (hotspotshield.com) https://www.cnet.com/how-to/tips-to-stay-safe-on-public-wi-fi/

https://www.zdnet.com/article/fbi-warns-against-using-free-wifi-networks-while- traveling/?ftag=TREc64629f&bhid=22938112948646841781378974680397

13. They know where you live -- You may have noticed, when browsing, that your location is highlighted in advertisements. They know where you are based on your IP (Internet Protocol) Address which is assigned to you by your ISP (Internet Service Provider). You can avoid this by using an Ad Blocker such as AdBlock Plus (https://adblockplus.org/) and by using the private browsing feature of your browser. (Firefox: tools > Start Private Browsing.)

30

You can also evade this intrusion by connecting to a website through a third part website called a proxy server. There are free programs to do this but they are very slow. A good, fast, inexpensive, paid service is Easy Hide IP. Download from cnet.com.

14. Hostile takeover -- Many websites offers and pop-ups offering free virus scans, diagnoses and opportunities to speed up your computer are wolves in sheep’s clothing. After a few innocent keystrokes you could find that your computer is under their control, your anti-virus program disabled and you are being asked for money to ‘fix’ your computer.

By connecting to the web through a proxy server (see #13), this problem will be reduced as your computer will not be directly connected to the hostile website. Of course, should you download and execute a program, you are on your own. Know who you are doing business with!

When doing business with your bank or other reputable business, you should be using your assigned IP address.

15. Computer Sign On Security – password protect your ID and set up separate accounts for guests control panel > check off view by small or large icons > user accounts

16. Password security  Do not use personal information such as names or words. Password cracking programs will break these passwords easily. Even old army serial numbers are in on-line databases!  The best passwords have combination of letters, different cases, numbers and punctuation marks. Check out a planned password scheme (not the real password!) at http://www.passwordmeter.com/ . Punctuation marks seem to improve security more than more letters.

17. Password use and storage Passwords and User IDs can be stored in the browser and local mail program. The Thunderbird mail program and the Firefox browser provide a user ID and password storage tool so you only need to remember a single 'master' password to access them. Enter the master password and email and other websites will be accessed automatically.

For Thunderbird, to access stored User IDs and passwords: tools > options > security > saved passwords. For Firefox, to access stored User IDs and passwords: tools > options > privacy & security > logins & passwords > saved logins.

You can then enter a website in the password search box to locate your user ID and password for a website.

Some programs can be password protected. (i.e. Quicken)

31 Create a password table file and store it on a flash drive normally disconnected from the computer. Include website, user ID, password, security questions, general notes.

For websites requiring ‘mother’s maiden name’, don’t use the real one. Genealogy site are public! Make up a mother’s maiden name.

18. Encryption

Sensitive files such as financial files can be encrypted. ‘Secret Data Manager’ is available, free, from cnet.com. https://download.cnet.com/Secret-Data-Manager/3000-2092_4- 10965718.html

19. Backup – security and protection against hard drive failure and ransomware (also see item 31)

Use external hard drive  AC Powered  USB Powered  USB Powered Mini size (great for safe deposit box)

Choose an external hard drive size at least double the size of the data stored on your C drive. Check C drive data stored as follows: (File Explorer > This PC Right click on C drive > properties)

Recommended size: 4 Terabyte. available for about $100.

Run backup regularly (i.e. daily or weekly)

If you want to be extra cautious, you could do a quick anti virus scan of the internal hard drive before connecting the external hard drive.

In addition, there are cloud storage services that can be used for file backup. Google Drive, Microsoft One Drive etc. But, keep in mind, that, should a full recovery be needed, if only the data is backed up, the operating system and all of the apps and settings would have to manually be reloaded.

20. Two Factor Authentication (2FA) - Banks and other financial institutions are offering login protection that includes an additional step involving . A voice or text message is sent with a short string of numbers and then you enter them.

21. Backup Software  Automatic Continuous Backup – protects data in case of hard drive failure  Manual backup -- backs up everything  Full backup -- followed by incremental backups on automatically scheduled runs

32 Recommend: ‘EASEUS todo Backup 10.6 free’ (cnet.com or easeus.com). The free version of this program will recover files, folders or entire hard drive even when a virus has incapacitated the computer.

22. Cookies - useful in restarting at a website from where you left off. This is a privacy concern more than a security concern. Delete from browser or use another maintenance programs such as cCleaner (see Maintenance) which can do selective cookie retention. To delete cookies from Firefox: tools >options > privacy & security > cookies & site data > clear data. Check cached web contents.

23. Spam - Unsolicited email that is a nuisance that may be accompanied by malware. Automatic spam filters may delete bonafide email. For PC based email programs such as Thunderbird, you can first check your mail on line before downloading desired email. Also useful are spam filters controlled at the ISP level. (ex. Optonline on line email program : ? > 5.6.1 Creating new rules) http://en.wikipedia.org/wiki/Spam_%28electronic%29

24. Disposal of computer – Before disposing of a computer, personal data should be removed for privacy and security reasons. In addition, licensed programs you intend to keep using on your new computer should also be removed. ( control panel > view by small icons > programs and features. Select program and uninstall.)

Deleting files does not completely eliminate them. They are only eliminated when written over with new data. A simple and easy approach to securing your disposed of computer is to first copy your data to your new computer. Then delete the data from the old computer. Then uninstall the purchased programs that you want to use in the new computer. Following this, use cCleaner (see Maintenance) to wipe the free space which is the unassigned space which is where the deleted files and deleted programs now reside.

You can also clean your hard drive with a drive scrubber such as killdisk. (https://download.cnet.com/Active-KillDisk/3000-2248_4-10073508.html) If the computer is for reuse, reload the operating system (Windows) and drivers.

If the computer has Windows 10, there is life in it yet and there are who would be happy to have it. Check out a local service where you can give away stuff that you don’t want and the recipients will come to your door to pick it up. Yahoo.com > more Yahoo sites > groups > Hudson Valley Ecycle.

If you are not giving away the computer, it is hazardous waste and may not be commingled with regular trash. One way to dispose of hazardous waste is through Dutchess County Resource Recovery Agency. Check their website for procedure. http://www.dcrra.org/hhwcal.html You can also drop it off at Staples. https://www.staples.com/sbd/cre/marketing/sustainability- center/recycling-services/?icid=SustProducts:topnav:3:RECYCLE:

25. Fake virus alerts -- A common scam is now appearing on various websites either offering a free virus scan or advising that you have all sorts of virus and spy programs on your computer. Do not click to close any associated windows with your mouse and do not give out any credit

33 card info. This may trigger a download and install of a takeover program! Instead, close the browser from the keyboard with Alt + F4. If this does not work, press Control + Alternate + Delete simultaneously > Task Manager > Processes > browser being used (i.e. Firefox). Right click > end task

26. JAVA - is used as a browser enhancement. From Java.com: “Java allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few.”

It is also a huge security problem and must be kept up to date. Updates are available from Java.com. Unless needed, you will be best protected by disabling or uninstalling Java. Look for it in your control panel or as a browser add on. Uninstall it as follows: control panel > programs and features. Locate and uninstall all versions.

https://www.makeuseof.com/tag/java-security-risk/

27. Turn off sharing - unless you have a network where you do some sharing control panel > check off view by small or large icons > network and sharing center > change advanced sharing settings. Shut off file and printer sharing.

28. Domain Name Servers (DNS) - are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses. For example, the domain name ‘google.com’ has an IP address of ‘172.217.0.142’.

Using the automatic DNS is a security risk as the default DNS can be hijacked.

To set up a secure (and faster) DNS: Windows Logo (right click) > network connections > change adapter options Click the icon that does not have a large red X properties highlight ‘Internet Protocol Version 4 (TCP/IPv4)’ properties Select ‘use the following DNS server addresses’: preferred DNS server: 208.67.222.222 alternate DNS server: 208.67.220.220

https://www.howtogeek.com/122845/htg-explains-what-is-dns/

29. SUPERANTISPYWARE - This is a nice program that will scan your program for malware. The free version is fine but you have to update and run it manually. https://www.superantispyware.com/?tag=SUPERANTISPYWARE

30. cCLEANER - scans for malware in addition to maintenance functions. See MAINTENANCE.

34 31. BACKING UP – There are a variety of methods of backing up and a variety of opinions as to which is the best method. Most backup programs only backup user data –data files, picture data etc. Should a hard drive crash, and it will sooner or later, or should you become infected with ransomware, you will have to recover from your backup. If all you have backed up is your data, you will have to separately reinstall Windows, then update it, then reinstall all of your programs and settings and finally reload your data. This is time consuming!

I use a program that does a full backup and retains a history as well as it may be necessary to go back in time to recover a file that had become corrupted and you never know when that happened.

The program that I use is the free version of Easeus Todo backup. (level 10.6) Instead of doing continuous space consuming full backups, you can do a full backup followed by up to 10 incremental backups.

Should your C drive ever become contaminated with ransomware or crash, the Easeus Todo program provides for a boot disk that will reestablish the entire C drive from backup with a few keystrokes.

Of course, you could also take the reload Windows etc route.

https://www.easeus.com/backup-software/tb-free.html (current free level – limited functions)

https://www.filehorse.com/download-easeus-todo-backup/32033/ (level 10.6 free – full function)

32. Spoofed Emails - messages shown as from one source but are actually from another source. This done by scammers usually adding a link that you are encouraged to click. The link may be to spam and it may be to malware that will automatically download and install on our computer. If the message is from Herb Sweet but a closer check shows that the email address is not [email protected] but, instead, from crooksrus@ru, it is a spoofed email. RU, BTW, is the domain name for Russia. You can find a country's domain name easily with a Google search.

35 33. FAKE NEWS - There are many websites offering news that is highly slanted if not downright deceitful. Newsguard is a nice browser add on that will provide an evaluation of each news source that you may want to use. https://www.newsguardtech.com/

34. Compromised Personal Data – Very frequently there are major breakins of commercial databases where your personal information has been stored. You can find out if you have been affected at 'haveibeenpwned.com' .

35. PUPs (Potentially Unwanted Programs) - By connecting to a malicious website you may end up downloading unwanted or even harmful programs to you computers. Your browser may alert you to this. Frequent scans with SuperAntispyware, Malwarebytes Anti Malware, and cCleaner should eliminate any PUPs that get downloaded.

36. Bundled Software – Like PUPs, when downloading software, especially , as you go through the installation process, take notice of any additional programs that have been prechecked for piggyback installing. You most likely won't want them. Also, use a prime or well known website as a software site. Other sites are knwn to bundle in malware.

37. BOTs (Robots) – A Bot is malware that gets downloaded to a computer that enables the 'master' to remotely control the computer who then enlists that computer in a massive log on to the target website which may be some financial or governmental organization. The server for the target organization, not being capiable of handling a huge number of simultaneous log on attempts, then crashes. This is called a Denial of Service Attack. The users who have not maintained good security hygene are generally not even aware that their computers have been illicitely used.

38. ADMINISTRATOR VS USER ID - It is a more secure practice to set up an admin id for updating programs and maintenance and a user id for web browsing etc. The user id is not allowed to install or update programs unless the admin ID password is entered. This prevents potential malware from installing. This can be set up as follows: control panel > user accounts.

39. FACEBOOK - This is a subject all of its own but I'll include a few suggestions here. One deals with other people hacking your account and sending messages in your name. You can get a notification should this happen. This link will show you how to do that and also how to set up Two Factor authentication for Facebook. https://www.facebook.com/help/909243165853369?helpref=about_content It is a good idea not to use Facebook to log into other websites. To view and remove what has been setup: go to down arrow at top right > settings > apps and websites > go to item. At bottom, locate ‘remove’.

Also, do a privacy checkup. You can get there from the Facebook toolbar ‘?’.

https://www.howtogeek.com/449710/beware-these-7-facebook-scams/

36

40. SEARCH ENGINE PRIVACY - Google has been criticized for tracking your searches and limiting them based on your past history of searching as well as selling information about you based on them. DuckDuckGo is a search engine that does neither. Set up your default search engine in your browser. For Firefox: Menu icon (3 horizontal bars) > options > search > default search engine

41. TECH SUPPORT SCAMS - Unsolicited phone calls or browser pops up offering to fix your computer. https://askleo.com/avoiding-tech-support- scams/?awt_l=M8WhS&awt_m=JiYlxAEN2pdfbL&utm_source=newsletter&utm_campaign=2 0191001&utm_medium=email&utm_content=featured

https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams

42. POP UP MESSAGES – It is critical to know who is sending pop up messages that appear on your screen. The is extremely important when using a browser. If you are being told to call a phone number to address some computer problem, it is a scam. If you are being asked to press a button, for any reason, hover your mouse over it to see what website you will be taken to. If you don't recognize it, Google it. Try entering, for example, 'xyz.com safe'.

Pop up messages that appear on your screen when not using a browser are mostly from Microsoft in regards to Windows updates and from your software companies for the same reason. These are legitimate but, if you are unsure about them, do the same test as above. Search for 'xyz.com safe'.

37 MAINTENANCE

1. KEEPING SOFTWARE UP TO DATE – Software updates include fixes for program defects and program improvements as well as for security bugs. File Hippo is a free program that will make this easy. https://download.cnet.com/FileHippo-App-Manager/3000-18513_4- 77516503.html

2. REGISTRY CLEANERS / MAINTENANCE PROGRAMS - There are many programs for maintaining your computer and cleaning your registry. The registry is the command center for the computer and can accumulate a lot of baggage. I have had problems with these programs sometimes creating unintended consequences. cCleaner is the exception and the free version works very well.

In addition to registry cleaning, cCleaner will also remove malware, browser cache, temporary files, cookies, and more. You may want to exempt some cookies for websites that you use frequently. An example would be your bank.

To do this: cCleaner > Options > Cookies. Search for cookies in list on left of screen. Example: hvfcu.org and www.hvfcu.org. Highlight, press ‘>’ to move the cookie to the right side of the screen ‘Cookies To Keep’.

When using cCleaner to delete junk, it is better to do a Custom Clean. I recommend checking off the following: Windows Tab: Microsoft Edge: Internet Cache, Cookies Internet Explorer: Temp Internet Files, Cookies, Index.dat.files Windows Explorer: (now called File Explorer): Thumbnail Cache, Jump Lists System: first six items Advanced: none Applications Tab: Firefox, Thunderbird & Chrome: Internet Cache, Cookies remaining items: use defaults

Ccleaner will be useful in preparing a computer for disposal. The drive wipe function (within Tools) will do this.

3. INSTALLING SOFTWARE – See Installing Software under General Use Hints for new programs and updating old ones.

38 4. MAINTAINING WINDOWS – See Operating System under SECURITY.

5. DEFRAG – From use, data on the hard drive becomes fragmented and searching for it by various operations takes longer. A fragmented computer is a slow computer. Windows 10 should have Defrag set to run automatically every week. This will happen only if the computer is on or in sleep mode.

To check status: File Explorer > C Drive. Right Click > Properties > Tools > optimize and defragment drive > optimize. This process can be followed for other drives as well but solid state drives should only be optimized – not defragmented.

6. Disc Clean This is a Windows function for deleting unneeded files and thereby freeing up hard drive space. File Explorer > C Drive. Right Click > Properties > disk clean Check temporary files, temporary internet files and recycle bin.

7. Inkjet Printer Exercise – In modern inkjet printers, tiny ink channels get clogged from lack of use. Print nozzle test or test pattern weekly. (see printer manual)

8. Physical Cleaning - Interior of tower – spray with canned air twice per year Keyboard – turn over and tap to remove grit. Then spray with canned air. Mouse pad – scrub with detergent and brush Monitor screen – clean with ‘Monster’ cleaning fluid and micro fiber cloth.

9. - If the Device Manager shows any bold yellow notations that hardware item is not functioning. Call tech support. (Windows Symbol: Right Click > Device Manager)

39 Hardware Recommendations

New Computer Advice

 CPU - For general use, do not buy the cheapest model as the CPU () chip will be inadequate and the computer will run slowly. Check CPU chips (see manufacturer’s specs) at cpubenchmark.net. I recommend a dual core or multi core CPU with a speed of 2 Gig or higher for a desktop computer. The Intel i5 is a good compromise. The naming convention is that the highest number after i5 (or i7 etc) is the most recent production model. Those models with a K suffix are for tweaking (overclocking) by gaming enthusiasts and are not needed for general use.

 RAM – (Random Access Memory) A computer with inadequate RAM will run very slowly. A new computer should have 8 Gb or more installed. The new standard really is 16 Gb.

To check your PC for CPU chip and RAM: Control Panel > select ‘view by small or large icons’ > System

Upgrading Existing Computers

RAM – (Random Access Memory) A computer with inadequate RAM will run very slowly. A new computer should have 8 Gb or more installed. The new standard really is 16 Gb. The specs of new RAM added will be held to the level of the installed RAM.

To check your PC for CPU chip and RAM: Control Panel > select ‘view by small or large icons’ > System

You may be able to replace your hard drive with a higher capacity one or with an SSD (Solid State Drive) which is much faster than a mechanical drive.

If you have backed up to an external drive with a backup system such as Acronis or EASEUS Todo, you will be able to reestablish the new C drive in a single operation using a boot disk that you can create. However, starting with a freshly loaded hard drive will provide you with a faster running computer and fewer operating problems depending on the age and abuse to the computer.

There are special programs for migrating from mechanical drives to solid state drives.

For desktop computers, a simpler alternate to replacing the main C drive is to add a second hard drive for storage -- either internal or external. For laptops, there is no room to add a second internal hard drive. Only an additional external drive can be added.

40 Computer Installations

A laptop should only be purchased if mobility or space are concerns. Desktop computers are more adaptable for hardware expansion and have better human factors – namely monitor size, keyboard and mouse. A laptop can be quickly adapted for fixed use by using a docking station. A docking station is a fast way to connect a laptop to an external monitor, keyboard and mouse. For laptops, a simple piece of wood can be used to set the keyboard on an angle making typing much easier.

You will fairly frequently need to access the rear panel of the tower. Enclosure type computer furniture makes this difficult. A desk or table with a homemade shelf works very well. Plan for computer replacement and accessory changes. Be sure to allow for adequate ventilation.

Provide for good lighting, adequate desktop space and a direct view of the monitor. You should not have to look either up or down at it and certainly not sideways! The keyboard height should be set so your arms are bent at about a 90 degree angle at the elbows.

Install a UPS (Uninterruptible Power Supply) and use it to power only the tower and monitor. Computers don’t like power glitches or improper shutdown and will be damaged by them. The laptop’s internal battery will act as a UPS.

Label the ends of cables with device name as trouble shooting and later rearrangements will be much simplified.

Grouping cables from the rear of the tower and binding with a Velcro tie will keep the cabling stable preventing individual cables from coming loose. Velcro tie sources:  Velcro ties for tomato plant (90594) $4.59 at Amazon or at Sears or Home Depot (in season)  Velcro designed for cables is more expensive and, IMHO, more difficult to use than the Velcro designed for lettuce and tomato.

Wireless networks are limited by distance and objects between the router and the receiver (adapter) at the computer end. A range extender (also called a repeater) will help. Best is using a wired network using Ethernet cables. The speed will be maximized (use a Gb speed Router) and not subject to interference from neighbors.

Most computer systems no longer include "Recovery Media" (Disks or CDs used to restore your computer system to its factory shipped state). Many do not even include Operating System disks.

However, many manufacturers include software on the hard drive that creates recovery media for you. This allows burning your own set of recovery CDs or DVDs - all you need is the blank media.

Inclusion of such a recovery utility varies by manufacturer and model; not all manufactures and models include such a utility. For those that include such a utility you should create your own set of recovery media immediately after you start using your PC!

41 If you fail to do this and encounter a difficulty in the future you may not be able to properly restore your computer to its factory shipped condition.

Some manufacturers may have physical recovery media available separately for purchase; consult your owner’s manual support information section for additional information

You can also recover by downloading Windows 10 on another computer and reloading the failed one.

42 General References

1. About.com -- general info

2. Google – general info

3. Cnet.com -- software & hardware info and downloads; editor and user reviews

4. ZDnet.com -- software & hardware info and downloads

5. Majorgeeks.com – software & hardware info and downloads

6. Newegg.com -- user reviews

7. Amazon.com -- user reviews

8. Manufacturers websites (support section) – manuals, drivers

9. Wikipedia.com – general information

10. Tomshardware.com

11. pcmag.com

12. howtogeek.com

Herbert Sweet [email protected]

845 229 8798

December 19, 2019

43