Antivirus Software

Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. At the same time the number of Internet surfers increased. This is a good thing because people are realizing the advantages offered by the world of technology. As soon as they discover this, they start using computers and the Internet more and more, but at the same time not considering the threats that are coming in from all sides. They should know that if you don’t protect yourself, nobody will. These threats are now coming from everywhere and they are growing in number and complexity. First threats of this kind were the viruses. At first, viruses were not that harmful. They were designed to perform a simple task, like flashing a single message onto the user's computer screen. Also the spread rate was slow, because not many people were connected to the Internet. But now the majority of viruses are programs intentionally written to obstruct with, or harm other programs or computer systems. And they are spreading very fast.

Many companies and people have had a lot of troubles because of these viruses. And so the need for antivirus software was born. At first one very simple antivirus appeared and this was enough. Now, as the threat is growing antivirus software are becoming a lot more complex. Some of them have also included a firewall so to better protect the users. In order to increase the competition, other antivirus software producers have also come up with a wonderful idea: to offer free scan online. This was a big help for people that are frequently using a computer mostly for their personal use, meaning it is not attached to a network and uses the Internet only from time to time. Now, they don’t have to spend a lot of money to buy antivirus software that will be used very rarely.

Most of these antivirus programs have to be bought in order for you to use them at their full capacity. Also you have the option to test a so called “free trial version”. These trial versions include all or most of the software’s features, and are available to be checked out by the user for a short period of time, usually 30 days. After these 30 days, the program can no longer be used. Other antivirus software producers use another method; they offer a free trial version that you can keep forever. But it is not fully operational, meaning some of the options of the program cannot be used as they are not activated. After you have tried a program and you consider it is fit for your need, then you’ll have to buy it to protect your computer at its full capacity.

Lately, viruses are mostly spread through e-mails because this is the most common use of the Internet. Also, e-mail viruses are easier to develop. E-mail viruses make use of the ability of having macros or scripts implanted in word documents, spreadsheets, HTML pages, and are programmed to run when the document is opened. But how does an e-mail virus works? When an e-mail with an infected document or program is received, the user unknowingly opens a document/program, which in turn executes a code to open the e-mail directory and to send a copy of itself as an e-mail attachment to a certain number of addresses. Some of the recipients of the e-mail open its attachment and the process repeats itself.

This is where the antivirus program comes in. This program is set to check all incoming and outgoing messages and their attachments. If an e-mail is detected to have a document or program infected with a virus the program offers several possibilities to deal with the threat: delete the e-mail, put it in quarantine or try to disinfect it. Most of the times, these choices are left to the user’s decision. It is up to the user to set the program in such manner to best fit his needs. But not all viruses are coming by e-mail. A few of them use security errors in the operating system or your Internet browser to be launched automatically. But if you keep your antivirus and all the other programs updated, there will be a small chance of being infected via this route.

Nowadays, most viruses are spread in the form of e-mail attachments. This is because some of the worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonly the attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoid the filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously, the password is included in the message as an image for the convenience of the naive user. As a simple but reliable rule, you should never open an attachment that you didn’t expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.

Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories over the network. But if you don’t have a choice and you have to share your files, you are still able to reduce the risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software from the Internet, instant messaging or even web pages.

If the file you are downloading or the computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected with the virus. As for the instant messaging, the major risk comes from accepting files from other users on the network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically execute the files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected with the same virus, but this is a very rare method of infection.

There are many different threats that are targeting the computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type of the so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to give the attacker free access to that system, without the user’s knowledge. Most Trojan horses cannot replicate automatically.

With the increased number of Internet users, the existing threats are also raising as now there are many more computers to attack and more people that don’t know to stay away from these threats. But the antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.


About the Author

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca
He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca

Get Free Content at ContentMart.com

Antivirus Software - A Must-Have Protection for Computers

By Susan Chen


With the advent of computer viruses of all kinds, antivirus software installation in PCs has become a necessity. The antivirus software comprise of computer programs which strive to identify viruses and 'malware' (other malicious software), thwart their endeavors and eliminate them altogether.


About Antivirus Software

The antivirus software program may come installed on your computer or may be purchased and installed by you. There are quite a few 'invaders' against which the computer needs to be protected against. There are the viruses, worms, Trojan horses and so on. The best antivirus software available is geared to offer protection against the whole range of such known viruses and malware. The potential damage that viruses can inflict such as deletion of files, unauthorized access to personal data, and usage of the computer as a platform to carry out attack on other computers, can all be thwarted by installing at least one of the top ten antivirus software products.

Techniques Used By Antivirus Software

The antivirus software usually uses two alternative techniques. It scans files for viruses that match the definitions given in virus dictionaries, or it identifies infection indicated by suspicious behavior from some computer program.

Some of the best antivirus software come for free. Usuaslly the best free antivirus software adopts both the techniques. However, the best antivirus software packages put special emphasis on the virus dictionary matching approach.

Features To Look For In The Best Antivirus Software Packages

Look for the following features when purchasing an antivirus software product of choice:

Simplicity and ease of use of the software so that even a person with little knowledge of computers or viruses can use and install it.

Effectiveness in identifying viruses, worms and the like is a desirable feature of the best antivirus software products.

Efficacy in cleaning out or isolating of files already infected so as to prevent further infection is another important feature that should be included in any good antivirus software.

Each of the best antivirus software products assure high level of security for Windows based PCs. Depending on the uniqueness of the system in use you can choose from among the top 10 antivirus software products available from online sources.

For a more comprehensive look at Antivirus Software, visit antivirus-help.info.



Article Source: http://EzineArticles.com/?expert=Susan_Chen
http://EzineArticles.com/?Antivirus-Software---A-Must-Have-Protection-for-Computers&id=402825

Virus Protection not enough to keep your system safe

By: Colleen Durkin


The Internet is a dangerous place for people as well as computer systems. Every day there is a new threat that seeks to do harm to your computer and the information contained within your hard drive.

Many people believe that they are protected because they have anti-virus protection. Sadly, this is not the case. There are many threats that your anti-virus software will not protect you against. If you are surfing the Internet with just anti-virus protection then you may already have malicious programs running in your computer 'background', unknown to you and doing irreparable harm.

These programs are more commonly referred to as spyware. Spyware is similar in nature to a computer virus in that they both infiltrate and affect system resources and often times both are hard to detect. The main reason that anti-virus does not protect against such threats is because spyware does not appear to be malicious. Often times spyware is disguised as something as harmless as a computer cookie. Once it is logged into your system a whole host of problems can occur.

By its very name, spyware is used to spy on your computer system. This gives whoever created the code a chance to access all of the confidential data that is stored on your hard drive, like passwords, financial data, and personal identification items. Hackers can also use spyware to hijack your computer system and use your accounts for illegal activities such as sending spam mails from your email account, or worse-stealing credit card information. Of course this is all happening right under your nose because your anti-virus protection software was never meant to catch this new kind of code.

People often ask how they can avoid getting spyware. The simple answer is there is no way to keep from getting spyware, absent setting your browser security options to a very high level, but there is a way to remove it from your system before it does any damage.

You will need to purchase and use spyware removal software. This is the only effective method to protect yourself and your computer from the malicious content that is found on the web. A spyware removal program acts as a sweeper, and ultimately a protector by destroying the spyware code found on your drives. It is as simple as that.

The best course of action that one should take is to run the spyware removal software after each session on the web, or weekly if that is to much of a burden. There is no way to avoid all of the potential threats that are on the net these days. Even if you visit only reputable sites that you have visited before you still run a high risk of getting spyware. Most often, a webmaster has no idea that his site is being used to distribute spyware. Producers of the spyware code are getting smarter everyday, and they're learning to cover their tracks well.

The only way to protect yourself is with this knowledge and a great spyware removal program.

If you need the very best in spyware removal then visit spyware-removal.thrcomputer.com

Here you will be provided with the best spyware removal program that is currently available on the market, hands down.


Author Bio

Spyware Removal


Article Source: http://www.articlegeek.com

Fix Your Computer Registry

By: Tim Lee


The Windows Registry System


Basically, for all windows users, one of the most important things in a computer that needs backup is the windows registry.

In windows, the registry system stores all of your information in your computer. These are placed in a database system where certain data about the user profile, configuration settings, and installed programs are recorded.

However, there are times when the computer gets system-overload and can no longer accept data or misplaces the pieces of data stored in the computer. If this is the case, then it is high time that you fix registry on computer.


Backup Copies With Backup


The steps to fix registry on computer is not as easy as 1-2-3. But it is not as complicated as fixing cars either. To fix registry on computer is to simply change the registry information back to its default setting or to repair any errors incurred therein.

Whether it is complicated or relatively easy to fix registry on computer, the fact remains the same: you have to do backups.

Backups are extremely important so that you can still retrieve your date in case you have failed to fix registry on computer. Also, it enables you to always restore the default settings of the registry of your computer in case you were not able to fix it.

One way to fix registry on computer is to have a backup for your Registry Checker. This is where editing the registry comes in.

In reality, the registry of windows has an integrated Registry Editor. You can locate it at the Start menu, then Run, and then just type regedit.exe, and then hit OK.

Basically, RegEdit is one of the best registry fixes that is focused to fix registry on computer. You can change, edit, or modify your registry through this device.

But if all else fails, you still have to find ways how to be prepared when things like this happens.

Luckily, there are many things like these that are available in the market today. These items are specifically designed and exclusively operated to fix registry on computer.

There may be a lot of registry repair tools available in the market today but none of them guarantees a 100% solution and an error-free procedure.

The bottom line is that in order to prevent errors in your computer system, shun away from activities that may trigger your system to behave badly. As they say, an ounce of prevention is better than a pound of cure to fix registry on computers.


Author Bio

My blog offers links to download softwares that expertly scan and fix windows registry


Article Source: http://www.articlegeek.com

10 Solid Reasons To Make Your Next PC A Notebook

Notebook computers are becoming very popular. They seem to be popping up everywhere: on tv shows, on airplanes, in movies, or in your friend's lap. These sleek little machines are invading our daily lives like never before... and the invasion has just started. Find out why they have
become so popular with their users and why your next PC should probably be a notebook computer.

It is estimated that over 42 million computer notebooks will be produced this year. And that number is said to be growing by 20% each year. So what's driving the demand for these devices, what's making them so popular?

It's more than just the next techno fad, notebook computers offer some very practical solutions to our computing requirements and needs. There are some real solid reasons why they have become so popular among their users. These are the same reasons why you should consider making your next PC purchase a notebook or laptop computer.

So if you need convincing, here are those 10 solid reasons why you should consider buying a notebook computer:

1. Size. This is one situation where size really does matter. It's the main reason you should consider buying a notebook or laptop in the first place. You want a PC that will fit neatly
in your hand to take to your next office meeting, you want a convenient laptop to take to class or you want a notebook for your next cross country business trip.

Notebooks come in a variety of sizes to match your needs or purpose. They are categorized or grouped accordingly:

Tablet PC (smallest) Size of a paper tablet or notepad, less than 3 pounds.

Ultra Portable (small), around 11" x 10", less than 1.3 inches thick, less than 4 pounds.

Thin and Light (mid-size), around 11-14" x 11", 1 to 1.4 inches thick, from 5 to 7 pounds.

Desktop Replacements (largest), more than 13" x 11", more than 1.5 inches, more than 7 pounds and up.

As you can see there is a great range of sizes so you should have no trouble finding a notebook computer to satisfy your needs. Just match the notebook size to the main purpose or use of your notebook and you can't go wrong.

2. Portability. Probably the second, if not the most important reason you're considering buying a notebook or laptop. You want a PC that's portable and lightweight. One that you can take anywhere; to class, to meetings, on business trips or from room to room in your home.

This freedom of movement -- taking your office or vital data along on your business or personal travels is the main selling point of the notebook computer. The portability factor is one you should seriously consider -- do you need a portable computer for your home, work or just
for pure enjoyment.

3. Performance. Not too long ago, notebooks or laptops were viewed by many as second class computers when compared to the performance and speed of the mighty desktop PC. Distance cousins discreetly allocated to the sidelines.

But things have changed! Although still not on par with the desktop, thanks to the next generation notebook chipset, Intel's New Sonoma Platform, many notebooks come very close to providing the performance level of a desktop PC. Many notebooks, especially the desktop replacements, already have impressive technical specs that would shame most ordinary
desktops. Some of these desktop replacements even use desktop processors or CPUs.

With hard drives up to 100GB or more at (7,200rpm), with RAM up to 2MB in some cases, and supported with Intel Pentium 4's, at 3.4GHz or more --- most notebooks are very capable of handling almost all computing applications and functions with ease. They can do the job.

4. Connections. We live in a wireless world. The notebook will do for computers, what the cell phone did for the telephone industry -- make our communications wireless. Being constantly connected to your friends, your business or your family does have a certain appeal that can't be denied. The notebook computer will give you this wireless connection.

Most notebooks now come with WI-FI (Wireless Fidelity), also known as 802.11 a/b/g, with the ability to stay connected no matter where you are. As more and more businesses such as hotels, restaurants and airports offer these 'hot spots' or WI-FI service to their patrons, easy
connections will become commonplace.

Plus, BIG PLUS - Verizon Wireless 3G EV-DO network is spreading fast, this will bring wireless connections to a whole new level. It will make the Internet truly wireless!

5. Function. There are certain functions that are unique to the notebook computer. The tablet PC provides a convenient device for note taking and data gathering that's not practical in a desktop computer. For business professionals such as doctors, lawyers, real estate agents... these tablet notebooks do very practical 'in-the-field' chores or tasks. Other notebooks are very useful for powerpoint presentations at meetings and other gatherings.

6. Backup. The notebook or laptop can be used as a convenient backup of your vital files and programs. Often overlooked, but the notebook can provide a rather cheap and safe way to protect your sensitive data. Anyone who has had a major or total loss of their hard drives can appreciate the importance of having a safe backup system.

For those constantly surfing the net, exposing your sensitive data to all the hazards (viruses, worms, spyware,etc.) can lead to problems. Having a separate system stored on a laptop or notebook can be a good way of working around this problem.

7. Variety. Notebooks and laptops offer much more variety than the ordinary desktop PC. From a small pocket size tablet PC all the way up to a Multi-Media desktop replacement that offers TV, Stereo, CD/DVD Player, as well as a computer of course.

There is a greater range of systems to choose from; all the way from sleek custom designed notebooks to huge monster gaming laptops, there's something to satisfy most tastes. You can also buy a notebook to match your style; from IBM black to Ferrari Red. It's out there.

8. Price and Availability. Notebooks are everywhere and they're getting cheaper by the minute. Notebooks prices are coming down, as more and more notebooks are sold -- the price will drop even more. They're still slightly more expensive than a desktop PC but the gap
is closing fast.

Finding a seller or dealer is very easy, shopping online directly from the manufacturer or company is also becoming very popular. In addition, there are also some very good reputable online dealers that's spreading the notebook gospel. Your dream notebook is only a click away.

9.Sex Appeal. It has to be mentioned, notebook computers are sexy! There's no denying it; these sleek, svelte machine are some of the sexiest accessories this side of a Batwatch Extra. The notebook's great looks will probably be the first drawing card for many people who's
considering buying a notebook. A fully functional accessory that will not only turn heads but can also do the books.

10. Last but not least, the main reason you should consider buying a notebook computer -- because you want one. Just for the convenience, portability, or the downright pleasure of owning a notebook computer. Besides, it's a proven medical fact that denying your wants or needs can be detrimental to your health.

Go treat yourself!

About the Author

For More Information on Buying Computer Notebooks and Laptops Click Here:
Computer Notebook Buyer's Guide.
Copyright ฉ 2005 Titus Hoskins of www.bizwaremagic.com
This article may be freely distributed if this resource
box stays attached.

Get Free Content at ContentMart.com

10 Tips to =SPEED= up your PC

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.

7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!


Rohit Tokhi is the owner of www.osCommerceShoppingCart.com which specializes in creating online shopping carts in PHP. He is also the co-owner of www.ElementsWebServices.com and has written several articles on Computer, Internet and related subjects.

Get Free Content at ContentMart.com

10 Steps To Secure And Manage Your Passwords

Passwords protect your most sensitive personal, financial and business information. They are the key to accessing membership, financial, and other web sites that you are a member of. All sorts of havoc can occur in your life if some unauthorized person discovers your password. Here are some tips for making that event less likely:

1. Don't use easily guess passwords like a date of birth, spouse, child's or pet's name. In fact, don't use any word or phrase that even remotely relates to you or your world. You need to use a password which is difficult for anyone to guess but is not so difficult for you to remember.

2. Use a combination of upper and lower case letters, symbols and numbers to make the password harder to guess. Some web sites do not allow symbols so you may not be able to always use them. Almost all web sites treat passwords as CaSe SeNsItIvE so mixing case is a good idea.

3. Make your password at least eight characters long. Longer is even better. The more characters there are the harder it will be to guess.

4. Use a different password for each account or web site. That way if one gets compromised you'll still be protected elsewhere.

5. Change your passwords frequently. Pick a period, like the 15th of each month, and change all of your passwords on that date.

6. Do not write your passwords down anywhere. You never know who is checking your drawers or file cabinet when you're not around. Also, do not store your passwords in an electronic filing device like a PDA. That's just as insecure as a piece of paper if you lose the device and someone who is less than honest finds it.

If you have too many passwords to keep track of then consider using a password manager program. There are a lot of them on the market but be careful: some of them contain "adware" which will pop up ads every time you are online. Most of the free password managers contain some degree of adware. Here's one that doesn't: http://www.roboform.com/

7. Never share your password with anyone else. If you have to, then change it immediately afterwards.

8. Avoid using "dictionary" words. There are password-cracking programs that will check every word in the dictionary. If you want to use words then break them up with non-word characters. For example: BuIlT*99$APPlE is difficult for anything other than the most sophisticated password-cracking program to guess because it is combined with non-alphabet characters and it is in mixed case.

9. Don't use "password" or "none" as your password! Don't even use "PaSsWoRd"!

10. If someone calls or sends you e-mail claiming that they are from your bank, or credit card company, or anywhere else that you have a password with, NEVER give them your password or PIN no matter what story they tell you. It's a scam. No one will ever ask for your password. Legitimate administrators of your password-protected accounts do not need your password to access your files during the normal course of their business dealings with you.


Copyright © 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get tutorials, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-software.com/52ways.html.

Get Free Content at ContentMart.com

8 Key Actions for Protecting Your Privacy Online

8 Key Actions for Protecting Your Privacy Online
ฉ Doug Partridge - All Rights Reserved

Are you at risk of losing your privacy? Answer the following three simple questions:

Do you shop or bank online?
Do you use an "always on" high-speed Internet connection?
Do you connect to the Internet from your home computer?

If you answered "yes" to any of these questions and you have a Windows computer – then you are at risk. Your computer needs to have the appropriate protections and you must take extra steps to secure your computer and protect your privacy.

Why is this so critical?

A recent study on Internet security sponsored by America Online and the National Security Alliance found that while most people thought their computers were secure upwards of 80% contained monitoring software known as "Spyware."

Spyware allows companies to download information from your computer without you even knowing it. Spyware represents a direct threat to online privacy and security.

But you can put a stop to it.

Here are 8 key actions for protecting online privacy:

1. Use a Personal Firewall. In addition to using an Anti-Virus program, a personal firewall is mandatory as it will block unwanted connection attempts. Sygate's Personal Firewall is a top-quality firewall and it's free for personal use. http://smb.sygate.com/products/spf_standard.htm

2. Use a Spyware removal program. You can't rely on your Anti-Virus program to find and remove all instances of Spyware. Ad-Aware from Lavasoft is free for personal use. Recommendation: run a full scan at least once a week. http://www.lavasoft.de/

3. Change to a More Secure Internet Browser. Due to the numerous security exploits targeted specifically at Internet Explorer, consider using another web browser. An excellent free alternative is "Firefox" from Mozilla. Not only is it more secure, you get a built-in pop-up blocker and Google search tool. http://www.mozilla.org/products/firefox/

4. Never provide personal or financial information to a non-secure website. A "secure" website is indicated by "HTTPS" in the address bar, and a small padlock icon in the lower right-hand corner of your browser window. http://www.verisign.com/advisor/check.html is a free place to check your browser's security capabilities.

5. Never provide confidential or financial information in response to an email request. Legitimate companies will never ask for personal or financial information over an insecure medium like email. Attempts to trick people into revealing personal and financial information through impersonated email messages is known as "Phishing." Some of these messages look very official and may come what appears to be a bona fide bank or company. Beware! When unsure if an email message is genuine it's best to telephone the company in question. Phishing email messages may be reported to http://www.antiphishing.org/.

6. Read the fine print before typing in private personal information. Always read the privacy policy of a website to understand how they will use your information. Will they share or sell it? Be suspicious if no privacy policy is visible.

7. Never download or accept any file or program from an un-trusted source. Adware and Spyware are frequently bundled with "free" programs. You may download one program and find that your computer becomes infected with a Spyware programs.

8. Be wary and virus check all email attachments. Never open an unexpected email attachment, even from known friends or business senders. Their computers may be infected. Self-spreading worms can infect a computer and then send an infected email-attachment to everyone in the owner's address book.

Malicious Internet threats are clearly a formidable enemy; however, the good news is that tools and information are readily available so that you can enjoy the Internet without putting your computer and confidential information at risk.

About the Author

Doug Partridge is co-author of a new eBook, "How to Secure Your Computer Using Free Tools and Smart Strategies." Get all the tools and information you need to thoroughly secure your Windows computer and private information from malicious threats on the Internet.
Get Secure Now => http://www.SecureYourComputer.Net

Get Free Content at ContentMart.com

10 Easy Steps to Speed Up Your Computer - Without Upgrading

10 Easy Steps to Speed Up Your Computer - Without Upgrading

By Jim Shutes
Lapeer Tech Group

It seems that the longer you own your computer, the slower it gets! A lot of people will keep their computer until it gets so slow that they feel they need a newer, faster model. Some feel like the reason it is getting slower is because it is getting older, when that is just not the case. Your computer should run just as fast as the day you brought it home – if you follow these 10 Easy Steps to Speed Up Your Computer.

1. Empty the Temp directory regularly. After a short while, the temp directory fills up with hundreds of temp files that always get scanned over when Windows starts up and when programs launch. This slows everything down immensely.

Rule of thumb for Temp Files: If you don’t have any programs open (and nothing minimized in the bar below), then you shouldn’t have ANY temp files in your temp directory. If you do, delete them.

To delete Temp files, make sure NO programs are open, and…

a. In Windows 95, 98 or Me, go to C:WindowsTemp and delete everything inside the Temp folder.

b. In Windows 2000 or XP, it is a little trickier. First, make sure that you can see hidden folders. Double-click My Computer. Click on the Tools pull-down menu, and then on Folder Options. Click on the View tab. Scroll down and click on Show Hidden Files and Folders. Click Ok. Now you can go to the C:Documents and SettingsAdministratorLocal SettingsTemp folder. Delete everything here.

2. Empty the Temporary Internet Files regularly. To empty Temporary Internet Files, go to your Control Panel and double-click the Internet Options icon. Choose to Delete Cookies, and to Delete Files. This will clear all of your Temporary Internet Files.

3. Check your hard disks for problems.

a. For Windows 95, 98, or Me, double-click My Computer. Right-click the C-drive and click on Properties. Click on the Tools tab and choose to check the computer for problems. If you choose to do a Thorough Scan, this will do the hardware check for physical disk damage or sector damage. Choose to fix any errors it finds.

b. For Windows 2000 and XP, double-click My Computer. Right-click the C-drive and click Properties. Click on the Tools tab and choose to check the computer for problems. Click on Check Now. You will then have two check boxes. The top option is for the file check, and the second option is for the hardware (physical disk) check. Check either one, or both. At least check the top one. Hit ok, and reboot. This may take some time, but let it run.

4. An even more thorough disk check, would be to use a 3rd party utility. One of my favorites is TuneUp Utilities 2004. It does cost $39.99, but they do offer a FREE download trial of 15 days. This program does a really good job of fixing software and physical hard drive problems. It also tunes up your system for increased speed, and streamlines your operating system for peak performance. Download it HERE... http://www.lapeertechgroup.com/downloads.asp

5. Or, you can do a few of the performance tweaks yourself, if you have Windows XP. By default, EVERYTHING is turned on in Windows XP. It isn’t very streamlined for performance, but rather for appearance. You can turn off a few of the unnecessary features, and Windows will still work just fine, and maybe a little faster.

To do this, right-click on My Computer and click on Properties. Click on the Advanced tab. Under the Performance section, click on the Settings button. On the Visual Effects tab, you will see a list of check boxes. By default, these are all on. You really don’t need any of them for Windows to run. Go through the check boxes one by one, and determine which ones you can and can’t live without.

6. Turn off Active Desktop. Active Desktop turns your desktop into a web page, and allows you to have things like a real-time calendar, and up-to-the-minute weather or stocks. These are nice, but really slow down your computer. And even if you don’t use Active Desktop for anything, just having it active can cause a performance decrease. Turn it off.

a. In Windows 95, 98 and Me, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Active Desktop. If there is no check next to it, then it isn’t on. Don’t choose it. Instead, just click the desktop again to get out of the menu.

b. In Windows 2000, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Show Web Content. Again, if there is no check next to it, then it is not on. Do not check it.

c. In Windows XP, right-click on the desktop and in the pop-up menu, choose Properties. On the Desktop tab, choose Customize Desktop. Now, on the Web tab, make sure that there are no websites chosen here. If there aren’t any, then Active Desktop is not on. Cancel and go back to the desktop.

7. Install and run a good AntiVirus program to keep out viruses that can take over your system. One of my favorites is AVG. It is not only a really good AntiVirus program, but it is also FREE! If you don’t have any AntiVirus software on your computer, get AVG AntiVirus NOW by downloading HERE... http://www.lapeertechgroup.com/downloads.asp

8. Get rid of Spyware. A lot of computer users have Spyware and don’t even know they have it, much less how to get rid of it. If your computer has been taking you to websites that you don’t want to go to, or if you get pop-ups when you aren’t even on the Internet, or if your computer has been running extremely slowly lately, for no reason, you probably have Spyware.

On all of the computers that I setup, I install two different AntiSpyware programs: AdAware SE and SpyBot. These two programs are highly recommended by TechTV (G4) and other computer authorities (including my own research on Spyware) and work very well together. They compliment each other and catch Spyware that the other misses, but together, do a very good job.

Get SpyBot HERE... http://www.lapeertechgroup.com/downloads.asp. Download all updates and run the Immunize option a couple of times.

AdAware SE does a good job when you keep up on the updates and manually scan your system with AdAware. Get it HERE... http://www.lapeertechgroup.com/downloads.asp

In some cases, when the Spyware has become too entwined into your system, even a computer repair technician can’t get rid of the Spyware. At this point, it is better to just backup only what you need and have the operating system reinstalled. Believe me, when your computer gets to this point, you don’t want to just put a “band-aid” on it. Just start from scratch with a clean system. It’s the best way to go.

9. Streamline MSCONFIG. One thing that really causes a HUGE performance decrease is to have unnecessary programs running in the background. Some of these programs can be seen in your System Tray (located next to the clock). These are tiny programs that are robbing you of memory and processing power. Some of them you need, while most you don’t. Some of the programs you DON’T need are printer icons, CD burning icons, shortcuts to programs (such as video settings), AOL, any Instant Messaging Programs, etc. Just because these programs aren’t always running, doesn’t mean that you still can’t print, burn CDs or Instant Message. They can all be run from a shortcut.

You can use a utility, called MSCONFIG, to turn OFF unnecessary Start Up items.

a. In Windows 98, Me, and XP, click on StartRun and type msconfig. Click on the Startup tab. This is a list of everything that is running in the background, some of which show up in the System Tray. Now, be careful, some of these you do need. Some items to keep are Ctfmon.exe (XP), Scan Registry (Win98, Me), Task Monitor (Win98, Me), System Tray (Win98, Me), LoadPowerProfile (Win98, Me), Rundll.32, any AntiVirus programs (such as McAfee, Norton, or AVG). Others, you can uncheck, such as NeroCheck, ypager, qttask, AOL, and any other Instant Messaging programs, or printing programs. Remember, if something doesn’t work, because you turned it off, it can always be turned back on. You just have to reboot every time you make a change here. But, as you uncheck the unnecessary programs that run in the background, you will see that Windows loads much faster, that there are less icons in the System Tray, and that your system is much more “snappy” and quick to respond.

b. In Windows 2000, MSCONFIG wasn’t supplied. You actually have to download and run an MSCONFIG utility. Download the MSCONFIG utility HERE... http://www.perfectdrivers.com/howto/msconfig.html.

After you reboot, you will have a window that says that the configuration utility was edited. Just check not to show that in the future, a check box at the bottom. This just means that there was a change made to the MSCONFIG.

10. Defragment your hard drives. NOTE: to efficiently defragment a hard drive, it likes to have 25% free space. It can still do the defragmentation with only 15% free space, but it takes quite a bit longer. If you can, delete any unnecessary files before deframenting your drives.

a. To defragment your hard drives (in any Windows operating system), double-click on My Computer. Right-click on the c-drive and click on Properties. Click on the Tools tab and choose the bottom button, to Defragment Now…

Good luck. I hope this article has helped you. If you live in the Lapeer County, MI area, and would like a Professional professionally TuneUp your computer(s) in your home or business, please contact Lapeer Tech Group at (810) 793-1093, or visit our website at www.LapeerTechGroup.com

About the Author

I have worked in the IT field since 1989 and hold several Microsoft certifications. I am a network administrator and owner and operator of Lapeer Tech Group, located in Columbiaville, Michigan (just outside of Lapeer). During these years, I have supported both Macs and PCs, am an accomplished graphic and web designer, and have had the opportunity to support 2nd and 3rd level enterprise networks for GM, EDS, Delphi and Delco.

Get Free Content at ContentMart.com