Presentation is loading. Please wait.

Presentation is loading. Please wait.

Important Information This presentation was created by Patrick Crispen.This presentation was created by Patrick Crispen. You are free to reuse this presentation.

Similar presentations


Presentation on theme: "Important Information This presentation was created by Patrick Crispen.This presentation was created by Patrick Crispen. You are free to reuse this presentation."— Presentation transcript:

1 Important Information This presentation was created by Patrick Crispen.This presentation was created by Patrick Crispen. You are free to reuse this presentation provided that youYou are free to reuse this presentation provided that you –Not make any money from this presentation. –Give credit where credit is due.

2 Computer Care 101: Keeping Your Computer Healthy a presentation by Patrick Douglas Crispen

3 The Weekly “Fab Five” The Weekly Fab Five is a list of five things you should do each week to ensure your computer keeps running in tip-top shape.The Weekly Fab Five is a list of five things you should do each week to ensure your computer keeps running in tip-top shape. The Fab Five works for both PCs and Macs.The Fab Five works for both PCs and Macs. Check out out This workshop introduces you to the Fab Five plus a BUNCH of stuff nobody ever tells you.This workshop introduces you to the Fab Five plus a BUNCH of stuff nobody ever tells you.

4 The Weekly Fab Five 1.Update your antivirus definitions. 2.Run Windows Update / Apple Software Update. 3.Run ScanDisk / Disk First Aid. 4.Run disk defragmenter. 5.Backup backup backup!

5 The Weekly Fab Five 1. Update Your Virus Definitions You’d be shocked at how many people have NEVER done this.

6 What is a Virus? It is a computer program thatIt is a computer program that –Alters the way your computer operates without your permission. –Is (usually) harmless until it is executed. –Once executed, changes your computer’s settings so that the virus continues to execute itself. –Replicates itself either locally (on just your computer) or globally (through the Internet). Some viruses damage or delete files on your computer, others don’t.Some viruses damage or delete files on your computer, others don’t.

7 What Viruses CAN’T Do Viruses CAN’T physically damage your computer’s hardware.Viruses CAN’T physically damage your computer’s hardware. If your computer suddenly bursts into flames, it isn’t a virus.If your computer suddenly bursts into flames, it isn’t a virus. Image courtesy

8 QUESTION: what’s the difference between a blathering idiot, your congressman, and an Auburn University alumnus? They are all pretty much the same. “Blathering Idiot” is all- encompassing. “Congressman” and “Auburn alumnus” are subsets of “blathering idiot.”

9 Viruses and Trojans and Worms (Oh My!) The term “Virus” is all-encompassing.The term “Virus” is all-encompassing. A “Trojan Horse” is an imposter – a virus- infected file pretending to be an uninfected file. Trojan Horses cause data loss or theft, but they do not replicate.A “Trojan Horse” is an imposter – a virus- infected file pretending to be an uninfected file. Trojan Horses cause data loss or theft, but they do not replicate. A “Worm” is self-replicating virus that (usually) does not alter files but rather resides in your computer’s memory and duplicates (and probably even distributes) itself over and over.A “Worm” is self-replicating virus that (usually) does not alter files but rather resides in your computer’s memory and duplicates (and probably even distributes) itself over and over.

10 How Viruses Spread In the late 1980’s and early 1990’s, most viruses were spread by “Floppynet.” Someone inserts an infected floppy disk with a boot sector virus into their computer, infecting their computer and every other floppy they insert thereafter.In the late 1980’s and early 1990’s, most viruses were spread by “Floppynet.” Someone inserts an infected floppy disk with a boot sector virus into their computer, infecting their computer and every other floppy they insert thereafter. Most viruses today, however, are spread over the Internet, some as downloads but most as attachments.Most viruses today, however, are spread over the Internet, some as downloads but most as attachments.

11 Virus Diffusion Theories Old theory: there is a critical threshold for virus distribution.Old theory: there is a critical threshold for virus distribution. –Viruses less contagious than this threshold will die out –Viruses more contagious than this threshold will multiply exponentially and eventually reach the entire system New theory: the threshold for a scale-free network like the Internet is ZERO!New theory: the threshold for a scale-free network like the Internet is ZERO!

12 What This Means in English “… [A]ll viruses, even those that are only weakly contagious, will spread and persist in the system.”“… [A]ll viruses, even those that are only weakly contagious, will spread and persist in the system.” Viruses don’t ever disappear from the Internet.Viruses don’t ever disappear from the Internet. You have to protect your computer from EVERY virus ever written … forever.You have to protect your computer from EVERY virus ever written … forever. Image courtesy A Klovdahl/ANU

13 “The Physics of the Web”“The Physics of the Web” Wonderful journal article by physics professor Albert- László Barabási at Notre DameWonderful journal article by physics professor Albert- László Barabási at Notre Dame This is the source of my virus diffusion information.This is the source of my virus diffusion information.

14 How Can You Protect Your Computer from Viruses? Well, a good place to start is to purchase an antivirus program and then update your virus definitions at least once a week.

15 Virus Definitions? There are two parts to your antivirus programThere are two parts to your antivirus program 1.The antivirus program itself 2.The virus definitions Each computer virus has its own, unique “signature” or “thumbprint.”Each computer virus has its own, unique “signature” or “thumbprint.” When your antivirus program’s manufacturer discovers a new virus, they create a virus definition that tells your antivirus program what to watch for.When your antivirus program’s manufacturer discovers a new virus, they create a virus definition that tells your antivirus program what to watch for.

16 Why Update? When you bought your antivirus program, it came with a list of virus definitions for all of the viruses that were known at that time.When you bought your antivirus program, it came with a list of virus definitions for all of the viruses that were known at that time. BUT, antivirus company Symantec estimates that 10 to 15 new viruses are discovered each day.BUT, antivirus company Symantec estimates that 10 to 15 new viruses are discovered each day. If this is correct, between 3,650 and 5,475 brand new viruses were discovered in just the past year alone.If this is correct, between 3,650 and 5,475 brand new viruses were discovered in just the past year alone.

17 If your antivirus program doesn’t have the latest virus definitions, your computer isn’t protected against ANY of these new viruses!

18 5,000+ … EACH YEAR?! Don’t panic.Don’t panic. Most new viruses only exist in the labs of evil virus scientists.Most new viruses only exist in the labs of evil virus scientists. Many of the rest you can “kill” with an antivirus program and the latest virus definitions (coupled with practicing “safe surf.”)Many of the rest you can “kill” with an antivirus program and the latest virus definitions (coupled with practicing “safe surf.”) Image courtesy

19 Updating Your Virus Definitions In Norton Antivirus, click on the Live Update button and Norton automatically downloads and installs the latest virus definitions.In Norton Antivirus, click on the Live Update button and Norton automatically downloads and installs the latest virus definitions. McAfee VirusScan has a similar update function (go to File > Update VirusScan).McAfee VirusScan has a similar update function (go to File > Update VirusScan).

20 Updating Other AV Programs If you are unsure of how to update your virus definitions, visit the Web site of your antivirus software manufacturer and look for their “download,” “update,” or “technical support” section.If you are unsure of how to update your virus definitions, visit the Web site of your antivirus software manufacturer and look for their “download,” “update,” or “technical support” section. If you are on AOL, you can find the latest definitions for most antivirus programs at keyword: virus.If you are on AOL, you can find the latest definitions for most antivirus programs at keyword: virus.

21 What About Macs? While there are certainly more PC viruses than Mac viruses, the possibility of new Mac viruses, while slight, is still greater than zero.While there are certainly more PC viruses than Mac viruses, the possibility of new Mac viruses, while slight, is still greater than zero. The possibility of future, cross-platform viruses (viruses that infect both PCs and Macs) is also quite real.The possibility of future, cross-platform viruses (viruses that infect both PCs and Macs) is also quite real. Image courtesy

22 The Weekly Fab Five 1. Update Your Virus Definitions Even if you have a Mac, and ESPECIALLY if you have a PC

23 The Weekly Fab Five 2. Run Windows Update / Apple Software Update Close the holes in your operating system.

24 “Holey Windows, Batman!” Every operating system has known vulnerabilities or “security holes.” (Computer programs have these vulnerabilities too.)Every operating system has known vulnerabilities or “security holes.” (Computer programs have these vulnerabilities too.) Through these holes, nefarious netizens could break into your computer and:Through these holes, nefarious netizens could break into your computer and: –Read or even delete every file on your computer; –Infect your computer with a virus; –Use your computer to attack another computer; or –Do a whole bunch of other nasty things.

25 Known OS Vulnerabilities – 10 April 2002 Windows 95: 35Windows 95: 35 Windows 98: 43Windows 98: 43 Windows 98SE: 19Windows 98SE: 19 Windows ME: 11Windows ME: 11 Windows XP: 10Windows XP: 10 Mac OS X: 17Mac OS X: 17 Image courtesy Associated Press

26 /cgi-bin/vulns.pl For more information, visit the Bugtraq vulnerabilities database.For more information, visit the Bugtraq vulnerabilities database. Sort vulnerabilities list bySort vulnerabilities list by –Vendor –Title –Version

27 Closing the Holes With relatively few exceptions, when software manufacturers find a security hole in one of their products, they release a patch that closes that hole.With relatively few exceptions, when software manufacturers find a security hole in one of their products, they release a patch that closes that hole. If your computer doesn’t have ALL these patches, it isn’t protected … and your computer is completely vulnerable to all the nasty stuff we talked about three slides ago.If your computer doesn’t have ALL these patches, it isn’t protected … and your computer is completely vulnerable to all the nasty stuff we talked about three slides ago.

28 Windows Update Built into every PC since Windows 98 and into every version of Microsoft's Internet Explorer since version 4.0 is something called “Windows Update.”Built into every PC since Windows 98 and into every version of Microsoft's Internet Explorer since version 4.0 is something called “Windows Update.” Windows Update is an easy-to-use tool that helps you ensure that your PC is running the absolute latest Microsoft software patches and drivers.Windows Update is an easy-to-use tool that helps you ensure that your PC is running the absolute latest Microsoft software patches and drivers.

29 Windows Update If you have Windows 98 or later, launch Windows Update by going to Start > Settings > Windows Update.If you have Windows 98 or later, launch Windows Update by going to Start > Settings > Windows Update. You can also launch Windows Update by going to Tools > Windows Update in Internet Explorer 4, 5, or 6.You can also launch Windows Update by going to Tools > Windows Update in Internet Explorer 4, 5, or 6.

30 Windows Update Either way connects you to Microsoft's Windows Update page.Either way connects you to Microsoft's Windows Update page. On the top left side of the Windows Update page, click on the “Product Updates” link.On the top left side of the Windows Update page, click on the “Product Updates” link.

31 Windows Update A pop-up window appears, telling you to wait while your computer DOESN’T send any information to Microsoft (well, that's what it says!)A pop-up window appears, telling you to wait while your computer DOESN’T send any information to Microsoft (well, that's what it says!)

32 Windows Update Eventually, you’ll see a page that says “Select Software.”Eventually, you’ll see a page that says “Select Software.” When Microsoft releases an essential update or patch to close a security hole in Windows, they put it in this page's “Critical Updates” section along with a bunch of other stuff that you really don’t need.When Microsoft releases an essential update or patch to close a security hole in Windows, they put it in this page's “Critical Updates” section along with a bunch of other stuff that you really don’t need. For now, just pay attention to this page’s Critical Updates section.For now, just pay attention to this page’s Critical Updates section.

33 Windows Update Select (or click on) EVERYTHING in the Critical Updates section – you need ALL of the critical updates – and then click on the big, gray “Download” arrow in the top right hand corner of the page.Select (or click on) EVERYTHING in the Critical Updates section – you need ALL of the critical updates – and then click on the big, gray “Download” arrow in the top right hand corner of the page. Follow the on-screen prompts.Follow the on-screen prompts. That’s it!That’s it!

34 Apple Software Update If you “compute with fruit,” the Mac OS has its own version of Windows Update called “Software Update.”If you “compute with fruit,” the Mac OS has its own version of Windows Update called “Software Update.” You can find it at Apple Menu > Control Panels > Software Update.You can find it at Apple Menu > Control Panels > Software Update. Click on “Update Now” and follow the on-screen prompts.Click on “Update Now” and follow the on-screen prompts.

35 The Weekly Fab Five 2. Run Windows Update / Apple Software Update Download the critical updates.

36 The Weekly Fab Five 3. Run ScanDisk / Disk First Aid Now that you have the latest patches, take a minute to check the integrity of your disk drives.

37 How Your Hard Drive Works The data on your hard drive is stored in “clusters” – blocks that are typically either 2,048 bytes, 4,096 bytes, or 8,192 bytes in size. (And no, you aren’t supposed to know this.)The data on your hard drive is stored in “clusters” – blocks that are typically either 2,048 bytes, 4,096 bytes, or 8,192 bytes in size. (And no, you aren’t supposed to know this.) What happens when a file (like Microsoft Word) is so large that it won’t fit in just one cluster?What happens when a file (like Microsoft Word) is so large that it won’t fit in just one cluster? –It is stored in multiple clusters. (Duh!)

38 “Honey, Does This Table Make Me Look Fat?” To keep track of all the clusters and to which programs or files they belong, your computer uses a “Directory” and a “File Allocation Table”To keep track of all the clusters and to which programs or files they belong, your computer uses a “Directory” and a “File Allocation Table” The directory stores the file name, its size, and its beginning cluster.The directory stores the file name, its size, and its beginning cluster. The File Allocation table – the “FAT” in “FAT 32” – remembers where all subsequent clusters belonging to that file are located.The File Allocation table – the “FAT” in “FAT 32” – remembers where all subsequent clusters belonging to that file are located.

39 Directory and FAT at Work Image courtesy

40 Corrupted FAT BAD! When your directory or FAT is corrupted, some programs (understandably) stop working and some files simply can’t be opened.When your directory or FAT is corrupted, some programs (understandably) stop working and some files simply can’t be opened. “Lost Clusters,” “Lost Fragments,” and “Cross Linked Files”“Lost Clusters,” “Lost Fragments,” and “Cross Linked Files” Solution? Run ScanDisk.Solution? Run ScanDisk.

41 ScanDisk to the Rescue! ScanDisk is a free Microsoft utility thatScanDisk is a free Microsoft utility that –Fixes FAT problems (like lost clusters). –Checks your hard drive for invalid file names and date stamps. –Checks the surface of your hard drive for physical damage (this takes forever and is optional).

42 Launching ScanDisk The easiest way to launch ScanDisk is to go to Start > Programs > Accessories > ScanDisk.The easiest way to launch ScanDisk is to go to Start > Programs > Accessories > ScanDisk. In “Type of test” choose “Standard”In “Type of test” choose “Standard” –Checks files and folders for errors Check “Automatically fix errors”Check “Automatically fix errors”

43 Troubleshooting ScanDisk If ScanDisk keeps restarting, boot into “Safe Mode” and run ScanDisk there.If ScanDisk keeps restarting, boot into “Safe Mode” and run ScanDisk there. To boot into Safe Mode, restart your computer and then repeatedly press the F8 key.To boot into Safe Mode, restart your computer and then repeatedly press the F8 key. When the startup menu appears, choose Safe Mode.When the startup menu appears, choose Safe Mode.

44 ScanDisk for Win 2K or XP In Windows 2000 or XP, ScanDisk is replaced by “CheckDisk.”In Windows 2000 or XP, ScanDisk is replaced by “CheckDisk.” Go to Start > Run, enter the word chkdsk, and then press the enter key.Go to Start > Run, enter the word chkdsk, and then press the enter key.

45 ScanDisk for the Mac Apple’s ScanDisk is called “Disk First Aid.”Apple’s ScanDisk is called “Disk First Aid.” To run Disk First Aid on your Mac, double-click on the Disk First Aid icon in your utilities folder.To run Disk First Aid on your Mac, double-click on the Disk First Aid icon in your utilities folder.

46 Norton Disk Doctor If you have Norton Disk Doctor, use it instead of ScanDisk or Disk First Aid.If you have Norton Disk Doctor, use it instead of ScanDisk or Disk First Aid. Disk Doctor is a MUCH more thorough ScanDisk utility.Disk Doctor is a MUCH more thorough ScanDisk utility. Disk Doctor is included with Norton Utilities or SystemWorks (but NOT Norton Antivirus)Disk Doctor is included with Norton Utilities or SystemWorks (but NOT Norton Antivirus)

47 The Weekly Fab Five 3. Run ScanDisk / Disk First Aid This makes sure your computer remembers where all your programs and files are located.

48 The Weekly Fab Five 4. Run Disk Defragmenter Now that your computer knows where all your programs and files are located, lets move those clusters a little closer together.

49 What is “Fragmentation” Remember how large files fill multiple clusters?Remember how large files fill multiple clusters? In the course of using your computer – creating, deleting, and modifying files – these clusters become more and more non-sequential.In the course of using your computer – creating, deleting, and modifying files – these clusters become more and more non-sequential. Instead of being in clusters 5, 6, and 7, a file could be placed in clusters 5, 62, and 1573.Instead of being in clusters 5, 6, and 7, a file could be placed in clusters 5, 62, and This is called “fragmentation.”This is called “fragmentation.”

50 Remember This? Image courtesy

51 An Example of Fragmentation The first file is not fragmented because it is stored in clusters 6, then 7, then 8, then 9, then 10.The first file is not fragmented because it is stored in clusters 6, then 7, then 8, then 9, then 10. The second file is fragmented because it is stored in clusters 5, then 11, then 13, then 12.The second file is fragmented because it is stored in clusters 5, then 11, then 13, then 12. Image courtesy

52 What This Means in English When your computer reads this first (non- fragmented) file, your hard drive reads cluster 5, then cluster 6, then cluster 7 … and so on.When your computer reads this first (non- fragmented) file, your hard drive reads cluster 5, then cluster 6, then cluster 7 … and so on. It’s just like playing a vinyl record album (track 1, then track 2, then track 3 …).It’s just like playing a vinyl record album (track 1, then track 2, then track 3 …).

53 Why Fragmentation Isn’t Good With the fragmented file, your hard drive reads cluster 5, stops, moves its read head to cluster 11, reads cluster 11, stops, moves the read head to cluster 13, reads cluster 13 … and so on.With the fragmented file, your hard drive reads cluster 5, stops, moves its read head to cluster 11, reads cluster 11, stops, moves the read head to cluster 13, reads cluster 13 … and so on. It’s like shuffle play on a record player.It’s like shuffle play on a record player.

54 What is Defragmentation? Degframenting – or “defragging” – your hard drive simply means making all of the clusters on your hard drive sequential again.Degframenting – or “defragging” – your hard drive simply means making all of the clusters on your hard drive sequential again. It puts file1’s clusters in a row, followed by file2’s, and so on.It puts file1’s clusters in a row, followed by file2’s, and so on.

55 Fragmentation and ULs There is an old urban legend that fragmentation slows, and defragging speeds up, your hard drive.There is an old urban legend that fragmentation slows, and defragging speeds up, your hard drive. Research shows that this is no longer the case, especially with modern hard drives.Research shows that this is no longer the case, especially with modern hard drives. “The PC World Test Center’s tests reveal that defragmenters don’t actually improve performance.” – PC World, May 2002 (p. 77)“The PC World Test Center’s tests reveal that defragmenters don’t actually improve performance.” – PC World, May 2002 (p. 77)

56 Why Defrag? So why should you defrag?So why should you defrag? “The more fragmented the files on your hard drive are, the more likely a disk error is to destroy them.” – PC World, May 2002 (p. 77)“The more fragmented the files on your hard drive are, the more likely a disk error is to destroy them.” – PC World, May 2002 (p. 77) Defragging cuts down on hard drive wear and tear.Defragging cuts down on hard drive wear and tear. Besides, when you defrag you get to see all those pretty, colored boxes.Besides, when you defrag you get to see all those pretty, colored boxes.

57 Defragging a PC Built in to Windows is a free disk defragmenter called, oddly enough, “Disk Defragmenter”Built in to Windows is a free disk defragmenter called, oddly enough, “Disk Defragmenter” Start > Programs > Accessories > System Tools > Disk DefragmenterStart > Programs > Accessories > System Tools > Disk Defragmenter Macs, unfortunately, don’t come with a disk defragmenter.Macs, unfortunately, don’t come with a disk defragmenter.

58 Running Disk Defragmenter Choose the disk you want to defragment – usually your c:\ drive – and then click OK.Choose the disk you want to defragment – usually your c:\ drive – and then click OK. Disk Defragmenter tells you what percentage of your hard drive is fragmented.Disk Defragmenter tells you what percentage of your hard drive is fragmented. Click on Start to begin the defragmentation process.Click on Start to begin the defragmentation process. Grab a big, thick book and relax … this is going to take a while.Grab a big, thick book and relax … this is going to take a while.

59 Norton Speed Disk If you have Norton Speed Disk, use it instead of Microsoft’s Disk Defragmenter.If you have Norton Speed Disk, use it instead of Microsoft’s Disk Defragmenter. Speed Disk is a MUCH more thorough defragger.Speed Disk is a MUCH more thorough defragger. Speed Disk is included with Norton Utilities or SystemWorks (but NOT Norton Antivirus).Speed Disk is included with Norton Utilities or SystemWorks (but NOT Norton Antivirus).

60 The Weekly Fab Five 4. Run Disk Defragmenter It moves the clusters closer together, making your hard drive happier.

61 The Weekly Fab Five 5. Backup Backup Backup Do you have a computer disaster recovery plan? You should!

62 Here’s a Frightening Thought Imagine what would happen if your computer just up and stopped working.Imagine what would happen if your computer just up and stopped working. All of your programs, all of your s, all of the pictures and files you have downloaded from the Net... GONE.All of your programs, all of your s, all of the pictures and files you have downloaded from the Net... GONE. How would you react?How would you react? Heck, how would you SURVIVE?Heck, how would you SURVIVE?

63 Disaster Recovery In the world of computing, you either have a disaster recovery plan … or your are completely and totally hosed.In the world of computing, you either have a disaster recovery plan … or your are completely and totally hosed. Most businesses – and (unfortunately) only a few home computer users – prepare for a computer disaster ahead of time by backing up their critical data onto removable disks, tapes, or other hard drives.Most businesses – and (unfortunately) only a few home computer users – prepare for a computer disaster ahead of time by backing up their critical data onto removable disks, tapes, or other hard drives.

64 backups.htm This sounds complicated, but it really isn’t.This sounds complicated, but it really isn’t. Fred Langa has a WONDERFUL, free article that tells you everything you need to know about backing up Win98 / ME / NT / 2K / XP.Fred Langa has a WONDERFUL, free article that tells you everything you need to know about backing up Win98 / ME / NT / 2K / XP.

65 My Disaster Recovery Plan? I partitioned my hard drive (partitioning involves fooling your computer into thinking that one drive is actually two).I partitioned my hard drive (partitioning involves fooling your computer into thinking that one drive is actually two). I “imaged” my c:\ drive using Power Quest Drive Image 5 and then saved the image to my d:\ drive.I “imaged” my c:\ drive using Power Quest Drive Image 5 and then saved the image to my d:\ drive. I then burned that image to multiple CDs.I then burned that image to multiple CDs.

66 The Weekly Fab Five 1.Update your antivirus definitions. 2.Run Windows Update / Apple Software Update. 3.Run ScanDisk / Disk First Aid. 4.Run disk defragmenter. 5.Backup backup backup!

67 Want Some More Tips? TOUGH! You’re getting some anyway!

68 More Ways to Protect Your Computer From Viruses Unfortunately, running an up- to-date antivirus program with the latest virus definitions is only part of the solution.

69 Display File Extensions (PC) A file extension is the (usually three letter) portion of a filename to the right of the period: readme.txtA file extension is the (usually three letter) portion of a filename to the right of the period: readme.txt To make your life even more complicated, Windows is automatically configured to hide file extensions. (Thanks, Bill!)To make your life even more complicated, Windows is automatically configured to hide file extensions. (Thanks, Bill!) This is decidedly bad.This is decidedly bad.

70 Hidden File Extension Dangers If you can’t see the file extension, you can be tricked into double-clicking on a virus- infected file that appears to be something that it is not.If you can’t see the file extension, you can be tricked into double-clicking on a virus- infected file that appears to be something that it is not. Classic “hidden extension” viruses:Classic “hidden extension” viruses: –LOVE-LETTER-FOR-YOU.TXT.vbs –MySis.avi.exe and QuickFlick.mpg.exe –COOL_NOTEPAD_DEMO.TXT.vbs Victims are fooled into thinking these are harmless text files or movies.Victims are fooled into thinking these are harmless text files or movies.

71 Solution? Fix Windows So You Can See ALL File Extensions. It’s easy. Here’s how.

72 Show Hidden File Extensions (Windows 9X, NT) Double-click on My Computer.Double-click on My Computer. Click View then Folder Options.Click View then Folder Options. Click on the View tab.Click on the View tab. Uncheck “Hide file extensions for known file types.”Uncheck “Hide file extensions for known file types.” Click Apply then OK.Click Apply then OK.

73 Show Hidden File Extensions (Windows ME, 2000, XP) Double-click on My Computer.Double-click on My Computer. Click Tools then Folder Options.Click Tools then Folder Options. Click on the View tab.Click on the View tab. Uncheck “Hide file extensions for known file types.”Uncheck “Hide file extensions for known file types.” Click Apply then OK.Click Apply then OK.

74 “Safe” and “Unsafe” Extensions A lot of newbies either watch out for particular viruses or for files with particular file extensions.A lot of newbies either watch out for particular viruses or for files with particular file extensions. The former is silly because 15 to 20 new viruses are discovered daily.The former is silly because 15 to 20 new viruses are discovered daily. The latter is silly because so many different file extensions could contain viruses that you’re all but guaranteed to miss something.The latter is silly because so many different file extensions could contain viruses that you’re all but guaranteed to miss something.

75 “Safe Surf” A much easier way to protect your computer from infection is to practice “safe surf”:A much easier way to protect your computer from infection is to practice “safe surf”: –Purchase an antivirus program and update the definitions weekly. –Show all hidden file extensions (PC). –Don’t open attachments. –Don’t double-click on any file, especially an attachment, without first virus-scanning it. (Right- click and choose “Scan for Viruses” … or something similar). –Ignore virus warnings sent via .

76 Last Tip: Keep Your Software Updated As Well As Your OS There are a bunch of security holes in your software as well.

77 “Windows Update” for Microsoft Office“Windows Update” for Microsoft Office Click on Product Updates on the left side of the page.Click on Product Updates on the left side of the page.

78 downloads/release.asp? releaseid=37761 If you have Windows XP or NT, download and install Microsoft’s baseline security analyzer (“MBSA”).If you have Windows XP or NT, download and install Microsoft’s baseline security analyzer (“MBSA”). The MBSA Scans your computer and IE for patches that Windows Update misses.The MBSA Scans your computer and IE for patches that Windows Update misses. Unfortunately, this only works with XP or NT.Unfortunately, this only works with XP or NT.

79 /cgi-bin/vulns.pl The Bugtraq vulnerabilities database is the best place on the Internet to find ALL of the security patches for EVERY piece of software on your computer.The Bugtraq vulnerabilities database is the best place on the Internet to find ALL of the security patches for EVERY piece of software on your computer.

80 In Addition to Doing the Weekly Fab Five, Turn on Your PC’s Hidden File Extensions, Practice “Safe Surf,” and Make Sure to Download and Install ALL the Software Patches Available for Your Computer.

81 Fair Use Disclaimer This presentation was created following the Fair Use Guidelines for Educational Multimedia. Certain materials are included under the Fair Use exemption of the U.S. Copyright Law. Further use of these materials and this presentation is restricted.

82 Computer Care 101: Keeping Your Computer Healthy a presentation by Patrick Douglas Crispen


Download ppt "Important Information This presentation was created by Patrick Crispen.This presentation was created by Patrick Crispen. You are free to reuse this presentation."

Similar presentations


Ads by Google