Run antivirus/spyware, remove unused programs and data, defrag the harddrive regularly (once a month) and don't download everything from the web, install it, find out it's not for you and delete. (It'll leave oodles of trash on your HD)
Norton systemworks is a good tool too.
2007-02-02 11:08:39
·
answer #1
·
answered by Don't look too close! 4
·
0⤊
0⤋
I have been using my computer for about 3 years now and it runs as new, here are very USEFUL TIPS:
1. Have a good anti-virus and a firewall. I recommend Macfee mainly because it has inbound and outbound security similiar to the new windows vista security if u are using windows xp. The virus scans are very good also but takes a couples of minute depending on the amount of space u have used on the computer.
2. ALWAYS and ALWAYS have spybot S&D and Ad-adware SE on your computer to scan for spyware or adwares.
http://www.download.com/Spybot-Search-Destroy/3000-8022_4-10401314.html?tag=lst-0-1
http://www.download.com/Ad-Aware-SE-Personal-Edition/3000-8022_4-10399602.html?tag=pop.software
3. Also have registry mechanic ( today's leading registry repair and cleaner program ) to manage any errors.
http://www.download.com/Registry-Mechanic/3000-2094_4-10566526.html?tag=pop.software
4. Time after time defrag your computer and clean out temporary internet caches and cookies. i assume u know how to do this.
5. START-UPS <--- biggest errors most people have, they have too many junky start-ups when they start their computer up. The recommended way to disable start-ups is to open up the program that u are less likely to use, for example: msgms.exe ( windows messenge ) finding it on the icon on your lower right by the clock or searching it. The most common way but not rightful way is to click run, then type in msconfig and disabling the programs by going to the ''start up'' tab. DO NOT DISABLE ANY PROGRAM U DO NOT KNOW. afterwards restart our program and im pretty sure the start-ups programs u chose are gone. ^^
6. Most people says that firefox is the recommended internet browser but on my opinion i say the IE 7 is fine because it loads faster and is not as much useless utilities as of firefox. I also have tested firefox and i find that IE loads the page faster then firefox and doesn't ask u questions like encryption crap when u want to view it.
7. Last tip: DO NOT CLICK ON ADVERTISEMENTS OR PORN WEBSITE WHEN BROWSING!
so far this is all i can think of while at night haha hope u treat your computer well.
2007-02-02 15:20:24
·
answer #2
·
answered by Anonymous
·
0⤊
0⤋
use safe mode to run scans (tap f8 key till you get a list than scroll up to safe mode)
when something goes wrong with your computer try systum restore (start,all programs, acceories,systum tools, and recovery)
if you get a running error on like a utility delete the utility.
if you get a rundll error, that means the program isnt on your computer. try going to start,run,type in "msconfig" than go to start up and unclick the rundll program.
if you have any questions on more tips email me.
onecrazykid108@yahoo.com
2007-02-02 11:26:26
·
answer #3
·
answered by me! 1
·
0⤊
0⤋
Choose a good anti-virus program.
A list of anti-virus programs and their reviews is available here. This page also explains what to focus on when selecting an anti-virus solution and how to interpret test results. Also take a look at this page, which explains why you shouldn't blindly follow the recommendations of your favorite PC magazine: Computer Magazines and Virus Testing. http://www.claymania.com/scannertest.html
Keep it up-to-date.
Anti-virus programs can only protect you from what they know about. Since new viruses surface every day, it's very important for you to update your anti-virus program regularly.
Use it!
An unused anti-virus program is obviously useless. Use your anti-virus program to scan new files you just downloaded or to do routine scans. If you are not very knowledgeable about computers and viruses you may benefit from using the memory resident scanner. If, however, you know what you are doing, then you probably can live without it.
Don't rely on it.
Modern anti-virus programs detect malicious code quite reliably but it is very important to remember that NO anti-virus program is perfect. No anti-virus program on Earth can compensate for imprudence or unsafe software. No anti-virus program will ever detect all viruses all the time.
Use it intelligently.
Some anti-virus programs offer some questionable features and gadgets. You shouldn't use a feature just "because it's there". For example, AV scanner certification messages are essentially useless and only serve to advertise AV software.
2. Keep your operating system and programs patched
You are strongly advised to apply all security-related patches for your software as they become available. Here is a list of some of the most "essential" patches. It is only a partial list:
http://www.microsoft.com/technet/security/bulletin/ms99-032.mspx
for Internet Explorer 4.0 and 5.0 as well as Outlook Express
Take a look at the description of the Kak worm.
http://www.microsoft.com/technet/security/bulletin/MS01-020.mspx
for Internet Explorer 5.0, 5.01 and 5.5 as well as Outlook Express
This is a security hole used by a large number of viruses, such as Klez
http://www.microsoft.com/technet/security/bulletin/MS00-072.mspx
for Windows 95, 98, 98 Second Edition and ME
This security hole is exploited by Opaserv
http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx
*Replaced by: http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx
for Windows NT, 2000, XP and 2003 - Cumulative Update for Microsoft RPC/DCOM
This security hole is exploited by Blaster
http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
for Windows NT, 2000, XP and 2003
This security hole is exploited by Sasser
You can use the Windows Update and Office Update sites to keep your system up-to-date. Note that they work with Internet Explorer only. You may have to lower your Internet security settings in order for them to function correctly. Don't forget to set your security preferences to a higher level again when you are done.
3. Consider using alternative web browser and email software
Microsoft's popular Internet Explorer and Outlook Express programs have been known to be somewhat "buggy" and are often targeted by malicious "programmers". You may benefit from using alternative software. Here is a list of alternatives:
Browsers:
Mozilla/Firefox: http://www.mozilla.com
K-Meleon (based on Mozilla): http://kmeleon.sourceforge.net
Opera: http://www.opera.com
Email programs:
Mozilla/Thunderbird and Opera (see above)
The Bat!: http://www.ritlabs.com
Pegasus Mail: http://www.pmail.com
Note that security holes may be discovered in these programs as well (though probably less frequently), so it's a good idea to check for updates regularly.
You'll be able to import your IE Favorites to most of these browser alternatives. Be very careful to set IE security settings for all zones to maximum:
http://www.microsoft.com/security/incident/settings.mspx#XSLTsection125121120120
including the My Computer zone: http://support.microsoft.com/default.aspx?kbid=182569
(And consider using IE only for downloading Windows updates and critical security patches for your particular version of Windows. When finished, make sure your security settings for all zones are back to maximum.)
4. Be cautious when reading email with attachments and downloading files
You should never, ever (and we really mean it!) do the following:
Never open email attachments from someone you don't know
Never open email attachments forwarded to you even if they're from someone you know
Never open unsolicited or unexpected e-mail attachments until you've confirmed the sender actually meant to send them. If you know the sender and you are absolutely sure they intentionally sent the attachment, then scan it with an up-to-date virus scanner before opening it.
Never pay attention to virus warnings or even forward them unless you subscribe to a serious virus newsletter.
Never obtain software from "warez" sites or peer-to-peer programs like Kazaa. Get it from known, trusted sources only.
Note: Some files can best be tested by first invoking their associated application and then using the "Open" function of that application. For example, picture image files such as JPG and GIF can be tested by invoking the picture viewer of your choice. When such files are received as email attachments or downloaded, they should first be saved to some test or download folder (you can create one for this purpose). Then you can use your picture viewer application to safely open the file. If there is something amiss with the tested file your viewer will complain and you can just delete the file.
Similarly, sound files such as MP3 and WAV can also be tested by first invoking your player of choice. Alleged Text (TXT) files should also be opened by first invoking Notepad. Never double click on these files while in Explorer or in your email client until they have been tested in this way. There may be a hidden file extension or CLSID (class ID extension).
While we're at it, let's briefly address the way some newsreaders may view images and other file types. For example, Free Agent (a free newsreader from Forté) has a dangerous item under the File menu called "Launch binary attachment". It will allow the execution of those jpegs and gifs with hidden exe (executable) extensions. (That's a bad thing.) Instead, the user should click on "Decode binary attachment" and the uuencoded file will be decoded into the Agent folder for viewing after invoking your viewer of choice and opening the file.
5. File formats
Stop using DOCs (if at all possible). Instead, use pure Rich Text Format for your documents, because that doesn't support the macro language. There's a caveat to this unfortunately. Some macro viruses intercept File SaveAs RTF and save a file with a .RTF extension which actually contains a DOC format file! So it needs to be real RTF. Tell the people that you deal with that you would rather they sent you RTF or CSV (Comma-Separated Variable) files rather than DOC or XLS.
Warning - Microsoft RTF Security Bulletin - May 22, 2001
6. Configure your operating system properly
Configure Windows so that it displays all file extensions, including those of known file types. The procedure to achieve this is described at www.irchelp.org.
Note that even with this option set, Windows will still hide the extensions of a few select file types, such as .shs and .pif. To circumvent this, you can delete all occurrences of the string "NeverShowExt" (without the quotes) in the registry using regedit.exe.
Be very cautious when you edit the registry! Do it only if you know what you are doing!
Most Windows versions come with the Windows Scripting Host (WSH), which allows for execution of VBS (Visual Basic Script) and JS (JScript) files. These files can contain malicious code.
You can prevent the accidental execution of script based malware by setting the default action for VBS/VBE and JS/JSE to "Edit", so that such files will be opened in Notepad. If case you really want to run such a file, then you will still be able to right-click on it and select "Open".
If you are not on a LAN (local area network), disable file and printer sharing in the Network options of the Control Panel. If you need to have file and printer sharing enabled, make sure that you are sharing only the items that really need to be shared. Never share entire drives or important folders like the Windows folder, and do not allow write access unless you have to. It's also of paramount importance to set strong passwords for the shares. Passwords should be as long as possible and consist of a mix of letters, numbers, punctuation signs, etc.
If you are running Windows 95, 98, 98 Second Edition or ME, install the following patch:
http://www.microsoft.com/technet/security/bulletin/MS00-072.mspx
For detailed information on safe network configuration, take a look at the following sites:
http://grc.com/su-rebinding9x.htm
http://www.pcflank.com
Network configuration is a particularly important point. Many unsuspecting users are not aware of the dangers of open shares, and some viruses use file sharing as a means of spreading (quite successfully). Two such beasts are:
Opaserv: http://vil.nai.com/vil/content/v_99729.htm
Bugbear: http://vil.nai.com/vil/content/v_99728.htm
7. Preserving your privacy
You should never, ever (and again, we really do mean it!) do the following:
Never use the "Unsubscribe" feature of spam emails or reply to spam mails because by doing so, you confirm the validity of your email address and the spammer can keep on sending you unsolicited commercial email, which you probably don't want.
The proper way to deal with spam is to delete it and, if you wish to do so, complain about it to the sender's Internet Service Provider (you need to analyze the message headers to determine the ISP, do not rely on the sender's alleged email address which is probably forged or fake in most cases).
Never select the option on web browsers for storing or retaining user name and password.
Never disclose personal, financial, or credit card information to little-known or suspect web sites.
Never use a computer or a device that cannot be fully trusted.
Never use public or Internet café computers to access online financial services accounts or perform financial transactions.
8. Miscellaneous tips
Pay attention to files with multiple extensions. Generally, the last extension is the relevant one. For example, a file named
hello.mp3.exe
is an executable program (.exe) and not an MP3 file!
Note, however, that if you are using Outlook Express and see a file with three extensions, Outlook Express may consider the second extension to be relevant, so that a file named
hello.mp3.exe.jpg
is an executable program (.exe) and neither an MP3 file nor a JPG file!
(Ed. note: not a typo or mistake -- it's an Outlook Express exploit used by "Sadhound".)
That's why it's important to follow the procedure outlined in section 4 for opening unknown files. You can't go wrong by simply ignoring any file with more than one extension.
Set the boot sequence to C: first in the BIOS. This can be "C only", "C,A" or whatever you want as long as C: comes first.
Regularly back-up your data.
Install a good firewall. Check out "Firewalls/Filters" here.
9. If you still get hit by a virus...
... then the most important rule is: DON'T PANIC
Very often users will do more damage with panicked recovery attempts than a virus or Trojan horse would have.
If your computer does become infected with a virus, the alt.comp.virus newsgroup is a good place to go for help and/or information. You can ask for, or find advice from a number of professionals and other experienced users.
Please note the following tips when using the alt.comp.virus newsgroup:
Do not post binaries or virus samples.
Be specific and include details when asking for help.
Disable your news reader's ability to execute scripts embedded within HTML.
Delete all messages that contain attachments.
Don't be intimidated by all the noise there.
Read some postings first and search for subjects that might indicate a problem similar to yours.
Do not give advice if you aren't certain it's good advice, even if you just want to be helpful.
alt.comp.virus on Google
alt.comp.anti-virus on Google
2007-02-02 11:59:14
·
answer #6
·
answered by Neo 5
·
0⤊
0⤋