Thursday, May 14, 2009

How To Use System Restore To Fix Your Computer Problems


Often times, installing computer software and/or device drivers can cause an unexpected change to your PC system’s configuration or cause windows to behave abnormally. If you are able to figure out the possible cause of the problem on time, uninstalling the software or driver could fix the computer problem in no time. But if on the other hand, uninstalling does not work or is not possible, you can use System Restore to restore your machine’s system to an earlier date when everything worked correctly.

System Restore is a way to undo system changes to your computer without affecting your personal files such as documents, e-mails, photos, etc. System Restore uses restore points which contain information about registry settings and other system information that windows uses to return your PC’s system files and settings to an earlier point in time without affecting personal files. An interesting feature of system restore is that you can undo it if it does not meet your expectation. Every time you use system restore, a restore point is automatically created before proceeding so you can undo the changes made if they don’t fix your computer windows problem. However, you cannot undo system restore if your computer is in the ‘Safe Mode’ but you can run system restore again and choose a different restore point.

System Restore uses a feature called ‘System Protection’ to regularly create and store restore points on your computer. To be able to create and save restore points on any hard disk, the system protection must be turned on for that particular hard disk. To store restore points, you require the minimum of three hundred mega bytes (300MB) of free space on each hard disk that has system protection turned on. You must also note that system restore cannot run on any hard disk that is smaller than one gigabyte (1GB) storage capacity. Restore points are continuously and automatically created and stored everyday and just before significant system events such as installation of software or device driver. New restore points take the place of older ones as the storage space which system restore reserved fills up.

System Protection is the Windows feature that is responsible for creating restore points. Therefore, I recommend that you keep it turned on for all hard disks that contain important files so that you can use System Restore to fix your computer problems when the need arises.

To turn on System Protection on, follow the procedure below;

1. From the control panel, click to open System

2. In the left pane, click System Protection. If you are prompted for an administrative pass word, provide the pass word and give a confirmation.

3. To turn on system protection for a hard disk, select the check box next to the disk, and then click ok.

You can as well create your restore points manually. The procedure is outlined below;

1. From the control panel, click to open System.

2. In the left pane, click System Protection. If you are prompted for an administrative pass word, provide the pass word and give a confirmation.

3. Click the System Protection Tab and then, click Create.

4. In the system dialogue box, type a description and then click Create.

To use System Restore to fix computer problems and undo changes to windows, you need to take the following steps;

1. From the control panel, click to open Backup and Restore Center.

2. Under tasks in the left pane, click Repair Windows using System Restore.

3. Choose the restore point you want and click Next. Hint: System Restore automatically recommends the most recent restore point created before a significant change in your computer’s configuration such as software installation. You can as well choose from a list of restore points. Try using restore point created before the date and time you started noticing the problem.

4. Confirm your choice of restore point and click Finish.

To undo the changes System Restore makes to your computer system;

1. Click to open System Restore.

2. Click Undo System Restore, and click Next.

3. Review your choices, and then click Finish.

The file types that System Restore affects include windows system files, program files and registry settings. It can as well make changes to scripts, batch files, and other types of executable files on your computer. It has nothing to do with your personal files and hence cannot be relied upon to restore a deleted file. Before you run system restore make sure that your System Protection is turned on and that you have at least, 300MB of free space on your hard disk to be able to create and store restore points in your computer. After running System Restore and your computer problem persists, you can undo System Restore and try with another restore point, therefore, do not hesitate to use it.

Monday, May 11, 2009

How to Use Anti-Malware Software to Protect Your Computer

The most effective way of dealing with malicious software is by deploying anti-malware software against it. Malicious software also known as malware such as viruses, worms and Trojan horses are software deliberately designed to harm your computer. You must therefore, ensure that you run up-to-date antivirus and antispyware software to help protect your computer from attack.


The windows operating system does not come with antivirus software. Therefore, if you do not presently run up-to-date antivirus software on your PC, you should immediately deploy one because any computer that is connected to the internet without one is susceptible to attack. There are many credible antivirus software publishers online that you can check out and subscribe to their product. They will work you through the process of downloading and installing the software. Also, you must regularly visit the publisher’s website to check for and download any available updates of your software to your computer.


On the other hand, if your computer runs the windows operating system, you already have Windows Defender embedded within the system which can help to protect your computer against malicious and unwanted software such as spyware and adware. You can also go online to subscribe to other antispyware software if you choose to.


The first thing you should do with the Windows Defender is to turn the Real-Time Protection on, because it alerts you when spyware or other potentially unwanted software attempts to install itself or run on your computer. It will also alert you if programs attempt to change important windows settings. To turn your Windows Defender Real-time Protection on, follow these procedures;
1. From the control panel, click to open Windows Defender
2. Click Tools, and then click Options
3. Under Real-Time protection Options, select the Use Real-Time Protection (Recommended) check box.
4. Select the options you want. It is highly recommended that you select all real-time protection options to ensure the effective protection of your computer and privacy.
5. Under Choose if Windows Defender should notify you about; select the options you want, and then click Save.


The next step you must take is to run or schedule regular computer scans with windows defender. You can either run or schedule a full computer scan if you want windows defender to check all files and programs on your computer or you schedule a quick scan to enable windows defender to check the areas of your PC that spyware or other potentially unwanted software is most likely to infect.


To enhance your computer security, you can choose to automatically remove spyware that is detected during a scan. Moreover, it is highly recommended to check for new windows defender definitions before scheduled spyware scan on your machine. Windows defender definitions are files that act like an encyclopaedia of known spyware and other potentially unwanted software. Because spyware is constantly being developed, windows defender relies on up-to date definitions to determine if software that is trying to install, run, or change settings on your computer is potentially malicious. To schedule an automatic daily computer scan and check for updated definitions for windows defender, follow the simple steps below;
1. From the control, click to open Windows Defender
2. Click Tools, then click Options
3. Under Automatic scanning, select the Automatically Scan my Computer (Recommended) check box, and then select the frequency, time of the day and type of scan that you want to run.
4. Select the Check for updated Definitions before Scanning check box.
5. To automatically remove spyware or other potentially unwanted software after a scan, select Apply Default Actions to items detected during a Scan check box.
6. Under Default Actions, select the actions that you want to apply to each windows defender alert, and then click save.


For software with a severe alert rating, the selection of default action is not required as windows defender will automatically remove it or alert you to remove it. However, if software has not been classified, for potential risks to your computer or your privacy, you are prompted to review information about the software and then choose an action. You must be aware that if windows defender alerts you about a software and you ignore it by selecting ignore from the list of available actions, you are allowing the program to run on your PC. But, if the software acts suspiciously later, windows defender will alert you about it again or automatically apply actions that you have set for each kind of alert.


When windows defender alerts you about software that you trust, to stop windows defender from automatically removing it or putting it in quarantine, you should add the program to the windows defender allowed list. You can always remove any software from the allowed list anytime you decide you want to monitor it again.


Whatever you do, please do not allow software with severe or high alert ratings to run on your computer because it could put both your computer and your privacy at risk.

Monday, May 4, 2009

Protect Your Computer from Spyware Infection


Spyware is malicious software (malware) that installs itself or runs on your computer without providing you with adequate notice, consent or control. It can monitor your online behaviour or collect your sensitive personal information such as personally identifiable information and passwords. It could as well display annoying pop-up advertisements, change your computer settings or cause your computer to run slowly. Because spyware does not obtain your consent before installing or running on your computer, and may not immediately display any noticeable symptoms after it infects your computer, you might not actually be aware of its presence in your PC.

There are many sources from which spyware and other malware could be introduced into your system. Spyware is most commonly installed through free software downloads, such as file sharing, screen savers and search toolbars. Also, they could be installed by websites, downloaded programs, or software you might install from a CD, DVD, external hard disk, or other removable media. Some spyware can be installed from a website through an embedded script, or program in a webpage while some potentially unwanted software require your help to install through web pop-ups or free software that requires you to accept a downloadable file. In other words, you can get spyware installed in your computer without knowing it.

Let us take a look at the signs you should look out for to know if your computer has been infected by spyware or other malware:

1. If you notice new toolbars, links, favourites or bookmarked web pages, which you did not intentionally add to your web browser, you should know that spyware has sneaked into your computer.

2. When your default homepage, mouse pointer or search program changes without your intervention, it indicates the presence of spyware.

3. If you typed the URL for a specific website (for instance, a search engine), but you are redirected to another web site without notice, is a typical action of potentially unwanted software.

4. If pop-up a

dvertisements are constantly displayed on your screen, even when you are not currently working on the internet, your spyware alarm should be set off.

5. Spyware may also cause your computer to suddenly start to run very slowly.

It is possible to not have any of these symptoms but yet, your computer might still be infected by spyware. You are therefore expected to take proactive steps to keep this form of malware at bay. By diligently taking the actions below, you are ensuring that you protect your computer from spyware infection:

Ø Run Up to Date Anti-Spyware Software – anti spyware software helps prevent malicious software, spyware, and other potentially unwanted software or adware from installing itself or running on your computer. Antispyware program can also perform a computer scan to locate and automatically remove malware that might already be installed on your PC.

Windows Defender is a version of anti-malware software that is shipped together with windows operating system but there are other sources of antispyware software including those which are customizable to handle all forms of malicious software. Before you buy any antispyware software, make sure that the publisher of such software is very reputable indeed because, some so-called anti-spyware software are spyware themselves.

Ø Keep Your Computer Up to Date – always update the security features of your computer. To do this automatically, you need to turn your windows automatic updater on at all times. Similarly, you must visit your anti-spyware software publisher’s website often to check for and download updates of your software, to your computer.

Ø Review License Agreements Before Installing Software – before you download any free software such as file sharing programs or screen savers, please read the license agreement carefully. Do not automatically agree to download any software offered by any website; rather look out for clauses where you might be required to accept advertisements and pop-ups from the company. In some instances, the software publisher may require you to agree that the program will send certain kinds of information back to them. In such cases, if you do not trust the website, refuse to download such software to avoid installing spyware in your computer.

Ø When Pop-Up Won’t Close Except You Take An Action – sometimes a website could repeatedly display pop-ups asking you to install a toolbar, change your home page or take other similar action. The first action to take on such a situation is to try to close the pop-up browser window, if the pop-up still appears, right-click the internet explorer button in the task bar at the bottom of your screen and then click close group. If every effort to close the pop-up window fails, as a last resort, close any other program you have open and restart your computer.

No effort should be spared in getting rid of spyware because of the enormous threat it poses to the health and efficiency of your PC and your online safety. I strongly recommend that you follow these simple steps diligently to achieve the desired results.

Thursday, April 9, 2009

How to protect your PC against Computer Worms by Ms Mindy Matter

It seems that computer worms have been around almost as long as the web itself. Just a few years ago, users were worried about MyDoom. Before that, it was fear over SoBig, the SQL Slammer Worm, and the Blaster Worm. In 1999, it was the Melissa Worm. At the heart of the matter is the computer worms themselves. Unlike viruses, worms are programs that can make copies of themselves across any given network.



There are a number of ways that worms can become problematic. First, they can spoof your email address to make it look as if you are sending out copies of spam or virus-infected email, even though you aren’t. Moreover, they can actually enter your system and directly send email from your computer without your knowledge or permission. Once on your computer, they can erase it or change program settings. Some might even put software on your system to gain access to your personal information. More than anything, though, it can run itself, and it can even spread without the help of a host program, which is one of the many reasons you need to protect your PC against computer worms.



Stay Vigilant



One of the best first steps is to remain aware of the potential worms that could enter your system. Many companies offer email alerts when a new threat is introduced, and hundreds of websites post security bulletins about worm related problems on their website. As long as you stay abreast of current information, you’ll know the signs to look for in case your computer has the latest worm.



Update Your System on a Regular Basis



You need to update your operating system, programs, antivirus software, and antispyware solution on a regular basis. As new threats are introduced, your operating system and programs will introduce patches to counteract the problem. Ensuring that you download and install them as soon as they are available will help keep you and your computer safe.



If you haven’t already installed a three part protection system that includes antivirus software, antispyware software and a firewall, you may want to do that as well. Keep in mind that you’ll need to do a bit of research before you choose the right solution to meet your needs. Look at the available programs on the market, and be sure to review independent evaluations of each product before you make a purchase. You may want to carefully examine the features of each program you look at to decide whether it’s right for you. Most importantly, though, be sure that you’re getting reputable software. There is quite a bit of rogue security software floating around these days, and installing any of it will only lead to further problems with your computer. Look at each of the programs carefully, read security bulletin board postings, then choose the solution that is right for you. Download it, update it at least weekly, and schedule a regular scan of your computer to make certain you don’t have any of the new threats installed on your machine.



Use Caution With Email



In the past, many worms have been spread through email attachments. While that’s not always the case, it is quite helpful if understand what you should and shouldn’t do as you sort through your mail. First, be sure to promptly delete any mail if you’re not familiar with the sender. Even if you see an enticing subject line like “Remember Me?” getting rid of it is your best option. Second, never open an attachment unless you are very familiar with the sender. Even things like documents and PDF files can ensure a worm gets installed on your system, and in most cases, it’s better to be safe than sorry. Finally, set your security settings on your email as high as necessary. Setting your junk mail filter preferences and other settings at an acceptable level will prevent many problem programs from reaching you in the first place.



Be Careful While You’re Online



Many worms have spread with the help of peer to peer file sharing sites and other downloadable files, so when you’re online, be sure that you only download files of any type if you’re sure the source is safe. Moreover, it’s a good idea to only visit sites that you know are safe as well. Some antivirus and antispyware scanners come with a built-in web page check to help keep you safe while you’re online, so if you haven’t already installed that feature yet, you may want to consider it. In some cases, using another browser may help keep you safe as well. Because Internet Explorer is often the target for worms and other malware, choosing a browser like Firefox or Opera can save you quite a bit of difficulty at times.



Worms can be troublesome, but with a bit of extra work on your part, you can protect your computer.


By Mindy Matter for http://www.removeadware.com.au/ - Here you'll learn more about online privacy and computer worms: http://www.removeadware.com.au/ - Please link to this site when using this article.



Article Source: http://www.articledashboard.com/Article/How-to-protect-your-PC-against-Computer-Worms/812768

Tuesday, April 7, 2009

The Heightened Need For Good Computer Security

Good computer safety practices are necessary for anyone who wishes to keep their computer in good working order, but for an at home worker who heavily relies on the computer it is essential. In fact not only their income and personal details are at risk, but those of every customer that they deal with as well.

There are many risks, some of which are more obvious than others, but they fall under two main categories; viruses and spy ware, both of which may be transmitted in various different ways, and serve differing purposes.

Viruses are likely to cause the most damage to the computer itself and many are picked up by the user selecting an action that allows their installation. One of the more common methods is via email, where an email from an unknown sender contains an attachment. Upon opening the attachment, the virus installs itself on your machine.

They may also find their way in through web pages and messenger services. The page you visit may ask for permission to launch a video, or install some kind of program for a function it claims to be necessary. The ActiveX controller is of particular concern here, since it has full access to your machine, and so anything installed via ActiveX has full control of and access to everything on your machine.

Viruses are self propagating and likely to use your machine to reproduce. However the real problem comes when the payload-that is, the thing it was designed to do, activates. It might simply take over some of the functions of your computer, but it might start deleting the files of the operating system. Once this gets bad enough, your machine will cease to function.

Whilst viruses hurt your computer, spy ware may hurt you personally. These programs are installed in similar ways to viruses, but instead of wreaking havoc on your machine they are designed to spy on your online activities, for one of several reasons.

Some may simply note where you are visiting and send that information back to a central server. Based on that information they send you pop up advertisements that they deem from the information they gathered on you to suit you, or the advertisements may be completely random. They may also try and redirect your browser page to something different than the URL you enter.

The most worrying use of spy ware is to steal your personal information. In this instance, it is your passwords, credit card, eWallet and merchant account numbers that they send back, or perhaps your address or the details of the customers you work with. This of course is the greatest of the risks, because it could lead to identity theft, or the theft of large sums of money from you or your customers.

These risks can be avoided by the use of an up to date anti-virus and anti-spy ware program, as well as safe practices. Avoid opening mail and under no circumstances open attachments from people you do not know or install software from sites you do not trust. When combined with regular virus and spy ware scans, these simple things can serve to keep you and your machine safe.

Learn about [http://www.wahcheck.com/]Working From Home and Start Your Own [http://www.wahcheck.com/]Work At Home Business at WAHCheck.

Article Source: http://EzineArticles.com/?expert=Scott_L._Phelps http://EzineArticles.com/?The-Heightened-Need-For-Good-Computer-Security&id=2185638

Sunday, March 29, 2009

PC PERFORMANCE: THE WINDOWS REGISTRY CHALLENGE

All computers that run on windows will definitely be equipped with a windows registry. Windows registry is the database repository of information about a computer's configurations. As the owner of a PC that runs on windows, you need to know that as time goes by and with increase in usage, your windows registry might become a source of concern as per the computer efficiency.

You see, as you continue to make use of your computer's windows software, the registry continues to grow in size and when it becomes too large, the computer's performance becomes delayed and unstable. The common problems you could notice due to windows registry problems include;

  • Your PC begins to run more and more slowly
  • The computer begins to suffer from system's memory strike persistently
  • Pops up mysterious error messages
  • You start to get ActiveX or similar ''unable to load'' dll errors
  • Your computer system might begin to display blank blue screen sometimes or you may experience occasional system crashes and freezing.
The common computer problems enumerated above are some of the PC problems that are attributed to windows registry overload. There are many ways of trying to deal with such registry problems.
  1. You may try to manually edit your registry but that is definitely a daunting and risky task
  2. Some people may try to even install new windows software on their system or get an expert to do a registry fix job for them. This could be quite an expensive option.
  3. The best option however is to run a free registry scan and fix the registry errors using a free to download software.
This software is an excellent windows registry cleaner that scans your PC and safely cleans errors and invalid entries that cause system slowdowns, freezing and system crashing. This free to download software will repair your PC's registry problems to make your computer run like new again.