Upload
sandra4211
View
6.021
Download
2
Tags:
Embed Size (px)
Citation preview
Basic PC Maintenance
Presented on August 12, 2009
What is PC Maintenance?
PC Troubleshooting can be broken into
3 Primary Categories:
• Maintenance – keeping your system
running its best (our topic for today)
• Repair – fixing what is broken
• Security – keeping bad things from
happening; keeping bad people out.
Prerequisites For This Course
• Basic PC Knowledge
know how to navigate a Windows OS
know how to navigate directories
know how to navigate the Internet
The Library offers introductory level courses:
• Computer Basics
• Internet 101 & 201
• Film Management
• Office Suites (Word Processing, Spreadsheet, Presentations)
• 1-on-1 Computer Training
Sign-up at our Reference Desk
Covered Topics
• Part 1 – Basic Preparation
• Part 2 – Basic Software Maintenance
(Backup, Temp Files, Fragmentation, Registry, Updates)
• Part 3 – Basic PC Security
(the 3-pronged approach; Security vs. Usability)
• Part 4 – Basic Performance Enhancement
(OS customization, hardware components, memory)
• Part 5 – Basic Hardware Updates
(Finding what you need; where to get what you need)
• Conclusion: Pointers to More Info / Questions
1. Basic Preparation
Part 1 – Things You Need Before Beginning
Tools:
• Hardware
• Software
1.1 Troubleshooting Methodology
A good PC technician will follow some sort of
formalized troubleshooting methodology
Example 1: Basic 3-Step Plan
• Step 1: Assemble the proper tools
• Step 2: Backup everything before making changes
• Step 3: Analyze, test, and document
1.1 (Cont’) Example 2: Basic 5-Step Plan
Step 1: Information Gathering
• Identify what you want to accomplish (Maintenance, Upgrade, Repair)
• Identify the component to work on.
• For repairs: Identify any symptoms, determine if anything has changed, and establish probable cause
Step 2: Create an action plan
• For maintenance and upgrades: tool gathering, backup, parts identification, and action
• For repairs: there is an step at the begging: “try a quick fix”
Step 3: Implement and Test the Solution
• Again, if you are performing a repair, try a quick fix and then try the most likely solutions first.
Step 4: Identify the results and effects of the solution
• Did the upgrade work? Did the maintenance work as expected? Did the repair fix the problem?
Step 5: Document the solution and process
Point of a Plan: 1) Don’t forget anything, 2) Can recover if you do, and 3) Can repeat the process
1.2 Backup, Backup, Backup
• The most important PC component is…
DATA!
So backup before BEFORE you begin.
Keep the data safe.
1.3 Tools – Hardware/Software
• Tool Kits: A computer tool kit; possible non-standard “security” bit set
• USB devices:USB-to-HD adapter; USB flash or hard drives; USB Floppy Drive
• Bootable repair CDs:Operating Systems; Emergency Recovery Disks (ERDs); Universal Boot CDs
• Software Programs:Burned to CD, Executable from a Flash Drive: ex. PortableApps.com)
• FRUs (Field Replaceable Units): KB, Mouse, Spare HD, Spare Memory
• ESD(Electro-Static Discharge) protection
2. Basic Software Maintenance
Part 2 – Contents:
2.1 Backup
2.2 Temp Files and System “Cruft”
2.3 Fragmentation
2.4 Windows Registry
2.5 System Updates
2.1 Backup – What to Backup
• Personal Files (My Documents, …)
• Registry
• System State
• Any special drivers or software
2.1 Backup – Where to Backup
Backup anywhere EXCEPT for the
Primary Hard Drive:
• Second Hard Drive
• External Drive
(USB Drive, Flash Drive, NAS Device)
• DVD or CD Media
(Gold Archival for important files)
• Tape Drive
• Online Storage Service
2.1 Backup – Types of Backup
• Manual: external or On-line storage (E-mail, Google Docs, Picasa, flickr, Box.net)
• Manual: Disk Imaging (Symantec Ghost, Acronis True Image, Clonezilla)
• Automated Off-line (Windows Integrated, CD Burning Software, Acronis TrueImage,
Symantec (Norton 360))
• Automated On-line (Carbonite, IDrive, MozyHome,
SOS Online Backup, Norton OnLine Backup)
2.1 Backup - DEMOS
Manual Backups
Default Personal Folder Locations:
Windows XP: C:\Documents and Settings\<USERNAME>\My Documents
Windows Vista: C:\Users\<USERNAME>\Documents
Windows Backup Utilties (XP/Vista)
Programs Accessories System Tools Backup
2.2 Temp Files and “Cruft”
Common Temp File Locations
Windows XP: C:\Documents and Settings\<USER NAME>\Local Settings\Temp
C:\Documents and Settings\<USER NAME>\Local Settings\Temporary Internet Files (Hidden, Protected)
C:\Documents and Settings\<USER NAME>\Local Settings\History (Hidden, Protected)
C:\Documents and Settings\<USER NAME>\Cookies
Windows Vista:C:\Users\<USER NAME>\AppData\Local\Temp
C:\Users\<USER NAME>\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low (Hidden, Protected)
C:\Users\<USER NAME>\AppData\Local\Microsoft\Windows\History\Low (Hidden, Protected)
C:\Users\<USER NAME>\AppData\Roaming\Microsoft\Windows\Cookies\Low (Hidden, Protected)
Older Temp Locations• C:\TEMP
• C:\Windows\TEMP
•
Uninstaller References:• C:\Windows\$NtUninstall<PatchName> (Hidden)
2.2 Temp Files and “Cruft”
Cleaning Temp Files
• Manually
• With Software– Free Utilities: CCleaner, Glary Utilities, etc.
– Commercial: Norton (Utilities, 360, SystemWorks),
Avanquest Software (Fix-It Utilties, SystemSuite),
Webroot Windows Washer, etc.
2.2 Temp Files - DEMOS
Cleaning Temp Files
• Part 1 – Internet Browser Cleaning
(From your favorite browser: Tools Options)
• Part 2 – Disk Cleanup(Programs Accessories System Tools)
• Part 3 – CCleaner
2.3 Fragmentation
What is D i s k F r a g m e n t a t i o n?
DEMO: White-board Session
Hard drives store files in pieces, sometimes called blocks or allocation units.
Fragmentation occurs when the operating system cannot or will not allocate
enough contiguous space to store a complete file as a unit, but instead puts
parts of it in gaps between other files (usually those gaps exist because they
formerly held a file that the operating system has subsequently deleted or
because the operating system allocated excess space for the file in the first
place). Larger files and greater numbers of files also contribute to
fragmentation and consequent performance loss. (Source: Wikipedia)
2.3 (Cont’) Defrag
Defragmentation (and disk optimization) attempts to:
• Rearrange files so that all their parts, or blocks, are
contiguous (sequential)
• Rearrange programs, so that the most commonly
used programs are at the front of the drive and
launch quicker
Tools to Defrag:
• Windows Built-in (“Disk Defragmenter”)
• 3rd Party (Defraggler, Norton SpeedDisk, JkDefrag)
2.3 Fragmentation - Demos
DEMO
Windows Defrag program
Tip: Run a CHKDSK or SCANDISK before performing a Defrag
Accessing Disk Tools:
• Right Click on the Drive (from Explorer or “My Computer”),
select Properties, click on the Tools Tab.
• Defrag: Start Programs Accessories System Tools
Disk Defragmenter
2.4 Windows Registry
What is the Windows Registry?
A centralized database that stores all the settings for
Windows, including:
– Hardware Information and Settings
– Software Information and Settings
– User account settings,
– Security settings
The registry replaces the old flat or text files of yesteryear:
*.INI, AUTOEXEC.BAT, CONFIG.SYS
2.4 Windows Registry - Hives
Registry settings are split into sections called “Hives”
Common Hives:
• HKEY_CLASSES_ROOT – stores information about registered
applications, such as file associations
• HKEY_CURRENT_USER – setting of the currently logged in user
• HKEY_LOCAL_MACHINE – local computer settings
• HKEY_USERS – subkeys of HKEY_CURRENT_USER
• HKEY_CURRENT_CONFIG – information gathered at runtime
(when you boot)
2.4 Registry - Pros and Cons
Advantages:• Centralized. If there is a setting in windows, chances are it is
referenced in the registry.
• Keeps configuration details largely transparent from users
• Standardized method for how program storm data in the registry.
• Easy to backup
• Read in faster than a text file*
Disadvantages:• Hard to backup individual application settings
• If it gets too big, it will slow down boot times and increase a system’s
memory needs
• Complex to navigate.
• Hard to keep clean, easy to corrupt, hard to repair.
2.4 Registry – Corruption Causes
The most common reason for registry corruption:
Invalid references/entries in the registry.
Including, but not limited to:
• Added/removed programs (Uninstaller References)
• Temporary file references
• Deleted files
• Invalid file formats
2.4 Registry – Repair Methods
Manual: • regedit.exe,
• *.REG files (also called a “REG bomb”),
• Command Line
Automatic:
• Registry Cleaners (CCleaner, Glary, Symantec/Norton 360, Fix-It, etc.)
Disadvantages of Registry Cleaners:
• They can remove things they are not supposed to
• There are a LOT of fake registry cleaners out there that simply deliver
viruses, malware, spyware, “scareware” to your system.
2.4 Windows Registry - Demos
DEMOS
RegEdit CCleaner
2.5 System Software Updates
Software Update Best Practices and Tips
• Windows Update / Microsoft Update – Just Use It.
• Keep Microsoft Automatic Updates turned on.
• Check Monthly for “Optional” Microsoft Updates
• Do not install drivers from Microsoft (unless you are
having issues with a specific piece of hardware)
• Let your security software check daily for updates
• For non-Microsoft products, check at least monthly
(or based on your system power)
2.5 System Updates - Demos
• Automatic Updates
• “Optional” Window Updates
3. Basic PC Security
Part 3 – The “3-Pronged” Approach
1. A Firewall (Hardware or Software) – Section 3.1
2. Anti-Virus Software – Section 3.2
3. Anti-Spyware Software – Section 3.2
Additional Considerations:
• Internet Browser Security – Section 3.3
• Security vs. Usability – Section 3.4
3.1 Firewalls
What does a firewall do?
Blocks unauthorized access to a system, while permitting authorized
communications. Two typical actions on data:
Permit
Deny
• Hardware firewall = (typically) mean better performance than software
• Software firewall = may be more configurable than hardware firewall.
A Software firewall is essential for a mobile computer.
• Free Products: Windows Firewall (at the very least), ZoneAlarm Free
• Commercial Products: Anything bundled with an A/V suite
(Norton 360, McAfee I.S., ZoneAlarm I.S., etc.)
3.2 Anti-Virus and Anti-Spyware
What is the difference?
• Viruses can (typically) reproduce.
• Viruses are designed to cause problems,
and spread.
• Spyware/Adware (typically) cannot reproduce.
• Spyware/Adware programs are more for tracking.
Tips:
• Choose a reputable vendor.
• Don’t believe Internet ads and Pop-up (“Scareware”)
3.2 Anti-Virus and Anti-Spyware
Anti-Virus:•Avast! Home Edition•AVG Anti-Virus Free*•Avira AntiVir Free Edition*•BitDefender Free Edition (on-demand)*•ClamWin (on-demand scanner; portable)•Comodo AntiVirus•Microsoft Security Essentials (BETA)•(Panda) Cloud Antivirus•PC Tools AntiVirus Free Edition
Anti-Spyware:•Comodo Anti-Malware•Lavasoft Adware•MalwareBTYES•Microsoft Windows Defender•SpyBot Search & Destroy
List of Reputable Vendors (FREE FOR HOME USE):
Commercial Options: CA AntiVirus, F-Prot, F-Secure, Kaspersky Anti-Virus,
McAfee VirusScan, NOD32 (by ESET), Panda Antivirus, Sophos Anti-Virus,
Symantec/Norton (Endpoint/AntiVirus/360), Trend Micro AntiVirus +
AntiSpyware, SunBelt VIPRE, Webroot AntiVirus with AntiSpyware
(Spy Sweeper), ZoneAlarm AntiVirus
3.2 Anti-Virus and Anti-Spyware
Examples of Fake or “Rogue” Anti-Virus/Spyware Software:
* AntiVirus 360* Antivirus 2008* Antivirus 2009* AntiVirus Gold* ContraVirus* Errorsafe (AKA system doctor)* MacSweeper* PAL Spyware Remover* Pest Trap* PSGuard* Spy Wiper
* Spydawn* Spylocked* Spysheriff* SpyShredder* Spyware Quake* SpywareStrike* UltimateCleaner* WinAntiVirus Pro 2006* WinFixer* WorldAntiSpy
Source (and larger list):
http://en.wikipedia.org/wiki/Rogue_security_software
3.2 Anti-Virus and Anti-Spyware
Example of a Browser Hi-Jack
3.2 Anti-Virus and Anti-Spyware
TANGENT: 3rd-party Toolbars for Internet Browsers.
Does your browser look like this?
3.2 Anti-Virus and Anti-Spyware
Examples of Fake Pop-up Messages
Pop-up run from JavaScript
Fake System Message (implying possible infection):
3.3 Internet Browser Security
Adding on to information from Section 2.2 (Browser Temp Files)
Firefox 3.x: Tools Options
(Relevant Tabs: Content, Privacy, Security)
Internet Explorer 8: Tools Internet Options
(Relevant Tabs: General, Privacy, Advanced)
Tips:
• Use the Private Browsing Features (IE8, FF 3.5)
• Never let the Browser save Cookies, Passwords, History, etc.
• Use Bookmarks/Favorites instead
3.4 Security versus Usability
Finding the Right Balance…
SECURITY USABILITY
Section 3 - DEMOS
Basic PC Security Software Demos
• Windows Firewall
• ZoneAlarm
• Lavasoft Ad-aware
• Browser Settings (Part II)
4. Basic Peformance Enhancement
Part 4 – Additional Performance Topics
These already coved topics can affect performance: • Temporary Files (Section 2.2)• Hard drive Fragmentation (Section 2.3)• Registry Settings (Section 2.4)• Firewalls (Section 3.1)• Viruses or Spyware (Section 3.2)• Security over Usability (Section 3.4)
There are also a few other places you can look for “basic” performance boosts:
• 4.1 Display Settings• 4.2 System Update Frequency• 4.3 Virtual Memory• 4.4 Physical Memory
Note: there are many, many, more advanced performance hacks for Windows.
This section shows a tiny subset of system tweaks, just some “Basics”.
4.1 Display Settings
Pretty Graphics
= More System Resources
You can make your Windows interface more responsive by turning
off all the animated interface features (ex. Vista’s Aero)
This called Windows Classic mode. You can make any XP or
Vista PC’s interface similar to the classic menu and theme that
started with Windows 95 and WindowsNT 4.0.
Right Click “Computer” or “My Computer” select “Properties”
Tabs: Advanced Performance (Settings) Visual Effects
You also adjust many of these settings in the
Start Menu and under Display Settings
(Note: Demo after section 4.3)
4.2 System Update Frequency
Automatic Updates:• XP: Automatic Updates is under System Properties
• Vista: Control Panel Security Windows Update
Other Software to Check:• Security software*
• Any 3rd Application under “Programs”
• Internet Browser Plug-ins:
Big Offenders: Sun, Adobe, Apple, Real
(Note: Demo after section 4.3)
4.3 Virtual Memory
Virtual Memory (sometimes called “Swap Space”) is a
method to give programs additional memory (or
sequential memory) after physical memory resources
have been exhausted.
Recommendations:
• Let the system manage the virtual memory, or
• Use minimum setting of double your physical RAM
Accessing Virtual Memory:Right Click “Computer” or “My Computer” select “Properties”
Advanced Performance (Settings) Advanced Virtual Memory (Settings)
4.x Basic Peformance Demos
DEMOS
• Display Settings
• System Update Frequency
• Virtual Memory
4.4 Physical Memory
DEMO: Whiteboard Session“Basic PC Components”
Best Bang for Your Hardware Bucks
=
Physical Memory (RAM)
Suggested Minimum RAM for Windows Operating Systems:
• Windows XP SP3: 1 GB
• Windows Vista SP2: 2 GB (and a dual-core processor)
• Windows 7 2 GB
5. Basic Hardware Updates
Part 5 – Drivers and Hardware
5.1 System Information
5.2 Device Manager
5.3 Manufacturer Websites
5.1 System Information
MSINFO32.EXE (Accessories System Tools)
System Information gives you a categorical overview of your
computer system, including drivers used and status of each.
http://support.microsoft.com/kb/308549
5.2 Device Manager
Device Manager provides an interface for viewing the configuration of
hardware devices. You can update the device drivers for hardware installed,
modify hardware settings, and troubleshoot problems.
5.3 HW Manufacturers Websites
The BEST place to find information about
a system, a component within that
system, or a driver is typically the
manufacturer.
Examples:
http://support.dell.com
http://www.intel.com/p/en_US/support
http://www.nvidia.com/Download/index.aspx
http://www.crucial.com
5.x Hardware Updates - Demos
DEMO TIME!!!
• System Information
• Device Manager
• Manufacturer Websites
Conclusion and Wrap Up
Knowledge Can End Maintenance Frustration
1. Preparation, 2. Software, 3. Security, 4. Performance, and 5. Hardware
Need to Know More?
• Maintenance Scheduling
• Additional Reading
• Certification
• Web Resources
Maintenance Schedule
It is a good practice to physically clean your system once in a while,
and develop a schedule for routine cleaning. With software, you
can automate a lot of maintenance tasks. Physical maintenance
requires scheduled time.
To Physically Clean:
• Clean the outside components with dry or lightly damp cloth
(do not use chemicals, unless specifically specified for
computers)
• If you have components you no longer use, consider removing
them (for example, an old printer)
• For Desktops, open up and vacuum out the case and/or blow
out all dust. For Laptops, vacuum out all exhaust fans.
Make Time for Maintenance
Maintenance Schedule (cont’)
Sample Schedule
Preventive Maintenance ActivityRecommended
FrequencyAuto?
Scan hard disk file systems for errors Daily Yes
Scan for viruses Daily Yes
Back up data Daily No
Clean CRT screen Weekly No
Defragment hard disks Weekly Yes
Scan for hard disk read errors Weekly Yes
Clean mouse Monthly No
Check for full hard disk volumes and
remove unnecessary filesMonthly No
Update virus definition files Monthly Sometimes
Check power protection devices to
ensure they are still protecting the
system
Quarterly No
Check power supply fan for
ventilation and dirt buildup and clean
if necessary
Quarterly No
Back up CMOS information Quarterly No
Preventive Maintenance ActivityRecommended
FrequencyAuto?
Update emergency boot floppies Quarterly No
Clean floppy disk drive internals
and read/write heads
Quarterly
(depending on
use)
No
Check processor temperature,
inspect heat sink and fan to
ensure they are working
Annually (or
whenever case is
opened)
No
Check hard disk for temperature
and vibration
Annually (or
whenever case is
opened)
No
Clean exterior of case Annually No
Clean exterior of monitor Annually No
Check and clean interior,
motherboard and expansion
cards if necessary
Annually No
Check internal connections and
cablesAnnually No
Clean keyboard Annually No
Additional Reading
• Troubleshooting Your PC for Dummies, 3rd Ed., Dan Goodkin
• Upgrading and Repairing PCs, 18th Ed., Scott Mueller
• Fix Your Own PC, 8th Ed., Corey Sandler
• Computer Repair w/Diagnostic Flowcharts, Morris Rosenthal
O’Reilly Books: “Hacks” , “Nutshell”, “Cookbook, “Pocket Reference”
“Annoyances” Series; also “Backup and Recovery”
Certification
If you are interesting in a career in
Systems Troubleshooting, the industry
standard cerfication is CompTIA’s A+
CompTIA: http://www.comptia.org/
2 Exams: 90-100 questions / 90 minutes
220-601 A+ Essentials (Required)
3 Career Tracks
220-602 for IT Technician
220-603 for Remote Support Technician
220-604 for Depot Technician
Web Resources
1. Preparation
1.1 Troubleshooting Methods
• Cicso: http://www.cisco.com/iam/unified/ipcc1/System_Troubleshooting_Methodology.htm
• Cicso: http://articles.techrepublic.com.com/5100-10878_11-1030582.html
• Microsoft: http://technet.microsoft.com/en-us/library/cc786052%28WS.10%29.aspx
• Network+: http://en.wikibooks.org/wiki/Network_Plus_Certification/Management/Troubleshooting_Methodology
• PCGuide – Troubleshooting Guide (also see System Care)
1.2 Backup
• Automated System Recovery: http://support.microsoft.com/kb/818903
• O’Reilly: http://oreilly.com/catalog/9780596102463/
• System State Date: http://technet.microsoft.com/en-us/library/cc785306%28WS.10%29.aspx
• Types of Backups: http://en.wikipedia.org/wiki/Incremental_backup
• Windows Server: http://technet.microsoft.com/en-us/library/cc770266%28WS.10%29.aspx
1.3 Tools:
• Anytime Tools (Specialty Security Bits): http://www.anytimesale.com/
• BartPE: http://www.nu2.nu/pebuilder/
• ERD Commander 2005: (discontinued/replaced, see Sysinternals)
• Hiren’s Boot CD: http://www.hirensbootcd.net/
Web Resources – continued
• KNOPPIX: http://www.knopper.net/knoppix/index-en.html
• PortableApps.com: http://portableapps.com/
• (R)ecovery (I)s (P)ossible Linux: http://rip.7bf.de/current/
• SLAX: http://www.slax.org/
• System Rescue CD: http://www.sysresccd.org/
• Trinity Rescure Kit: http://trinityhome.org/
• Ubuntu / Kubuntu / Xubuntu: http://www.ubuntu.com/ , http://www.kubuntu.com/
• Utilmate Boot CD: http://www.ultimatebootcd.com/ (UBCD4Win: http://www.ubcd4win.com)
• VistaPE: http://www.vistape.net/
• Windows Sysinternals: http://technet.microsoft.com/en-us/sysinternals/default.aspx
• ZenLive (“Zenwalk Live”, based on SLAX): www.zenwalk.org
2 Software Maintenance
2.1 Backup Software (Cloning / Standard):
Cloning: http://en.wikipedia.org/wiki/Disk_cloning,
http://en.wikipedia.org/wiki/List_of_disk_cloning_software,
http://en.wikipedia.org/wiki/Comparison_of_disk_cloning_software
• Acronis True Image: http://www.acronis.com/homecomputing/products/trueimage/
• Clonezilla (open source): http://clonezilla.org/
• R-Drive Image: http://www.drive-image.com/
Web Resources – continued
Symantec (Norton): http://www.ghost.com/, http://www.symantec.com/norton/360
2.1 Backup Software (On-Line Backup):
Remote Backup List: http://en.wikipedia.org/wiki/List_of_online_backup_services
• Box.net: http://www.box.net/
• Carbonite: http://www.carbonite.com/
• IDrive: http://www.idrive.com/
• Mozy Home: http://mozy.com/home
• Norton OnLine Backup: http://www.symantec.com/norton/online-backup
• SOS Online Backup: http://www.sosonlinebackup.com/
2.2 Temporary Files:
Definition: http://en.wikipedia.org/wiki/Temporary_file
• Avanquest (Fix-It, SystemSuite): http://www.avanquest.com/USA/pc-utilities/
• Ccleaner (free): http://www.ccleaner.com/
• Glary Utilities (free): http://www.glaryutilities.com/
• Symantac (Norton SystemWorks, 360): http://www.symantec.com/norton/index.jsp
• Weboot: http://www.webroot.com/En_US/consumer-products-windowwasher.html
Web Resources – continued
2.3 Fragmentation:
Definition: http://en.wikipedia.org/wiki/Fragmentation_(computer)
Defragmenting: http://en.wikipedia.org/wiki/Defragmentation
Defrag Software List: http://en.wikipedia.org/wiki/List_of_defragmentation_software
• Contig (free): http://technet.microsoft.com/en-us/sysinternals/bb897428.aspx
• Defraggler (free): http://www.defraggler.com/
• JkDefrag MyDefrag (open source): http://www.mydefrag.com/
• Norton SpeedDisk: http://www.symantec.com/norton/norton-utilities
2.4 Registry:
Overview: http://en.wikipedia.org/wiki/Windows_Registry
Registry Cleaner Overview: http://en.wikipedia.org/wiki/Registry_cleaner
Information for Advanced Users: http://support.microsoft.com/kb/256986
• Avanquest (Fix-It, SystemSuite): http://www.avanquest.com/USA/pc-utilities/
• Ccleaner (free): http://www.ccleaner.com/
• Glary Utilities (free): http://www.glaryutilities.com/
• Norton (Utilties, SystemWorks, 360): http://www.symantec.com/norton/norton-utilities
Web Resources – continued
2.5 System Updates:
Overviews: http://en.wikipedia.org/wiki/Windows_Update /
http://www.microsoft.com/security/updates/mu.aspx
Windows Update Explained: http://download.microsoft.com/download/a/9/4/a94af289-a798-
4143-a3f8-77004f7c2fd3/Windows%20Update%20Explained.docx
• Windows Update: http://windowsupdate.microsoft.com
• Microsoft Update: http://update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us
2.6 BONUS TOPIC – File Recovery / Secure File Deletion
Overviews (Erasing): http://en.wikipedia.org/wiki/Data_erasure, /File_deletion, /Sanitization
Overviews (Recovery): http://en.wikipedia.org/wiki/Data_recovery, /Undeletion
• Eraser (open source): http://eraser.heidi.ie/
• PhotoRec and TestDisk (open source): http://www.cgsecurity.org/
• Recuva (free): http://www.recuva.com/
• Restoration (free): http://www3.telus.net/mikebike/RESTORATION.html
• SpinRite: http://www.grc.com/sr/spinrite.htm
Web Resources – continued
3 PC Security
3.1 Firewalls
Overview: http://en.wikipedia.org/wiki/Firewall
Windows Firewall:
Overview: http://en.wikipedia.org/wiki/Windows_Firewall
• Understanding: http://www.microsoft.com/windowsxp/using/security/internet/sp2_wfintro.mspx
• Using: http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx
• Customizing: http://www.windowsecurity.com/articles/Customizing-Windows-Firewall.html
• TechNet Articles: http://technet.microsoft.com/en-us/network/bb545423.aspx
3rd Party “Personal” Firewalls:
Overview: http://en.wikipedia.org/wiki/Personal_firewall
List of Firewalls: http://en.wikipedia.org/wiki/Comparison_of_firewalls#Personal_firewalls
• Comodo Firewall: http://www.comodo.com/home/internet-security/firewall.php
• Outpost Firewall Free: http://free.agnitum.com/
• PC Tools Firewall Plus (Free): http://www.pctools.com/firewall/
• ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Web Resources – continued
3.2 Anti-Virus and Anti-Spyware
Overviews: http://en.wikipedia.org/wiki/Antivirus_software , /Spyware, /Adware
Notable Antivirus Software: http://en.wikipedia.org/wiki/List_of_antivirus_software
Rogue (or Fake) Software and Hoaxes: http://en.wikipedia.org/wiki/Rogue_software, /Virus Hoax
Virus Databases: Symantec Threat Explorer, ThreatExpert, McAfee DB, Trend Micro DB
Notable Free Anti-Virus and Anti-Spyware (too many to list all):
• Avast! Home Edition: http://www.avast.com/eng/avast_4_home.html
• Clamwin (on-demand only): http://www.clamwin.com/
• Comodo AntiVirus: http://www.comodo.com/home/internet-security/antivirus.php
• Lavasoft Ad-aware Free: http://www.lavasoft.com/products/ad_aware_free.php
• Malwarebtyes’ Anti-Malware: http://www.malwarebytes.org/mbam.php
• Microsoft Security Essentials (BETA): http://www.microsoft.com/security_essentials/
• (Panda) Cloud Antivirus: http://www.cloudantivirus.com/
• PC Tools Anti-Virus: http://www.pctools.com/free-antivirus/
• Spybot Search & Destroy: http://www.safer-networking.org/en/index.html
• Win. Defender: http://www.microsoft.com/windows/products/winfamily/defender/default.mspx
A Couple Notable Commercial Options (again, too many to list all):
• Norton (bundled): http://www.symantec.com/norton/products/charts/comparison.jsp?pcid=is
• Webroot Spy Sweeper (bundled): http://www.webroot.com/En_US/consumer-compare.html
Web Resources – continued
3.3 Internet Browser Security
Internet Explorer 8 Security Guide:
http://www.microsoft.com/DOWNLOADS/details.aspx?FamilyID=44405777-51b4-4376-9cef-
f0341b13fcde&displaylang=en
Increasing Your Organization’s Security and Privacy with Internet Explorer 8:
http://www.microsoft.com/DOWNLOADS/details.aspx?familyid=198D40A4-6896-49B3-B8F2-
C151E9797634&displaylang=en
Firefox Overviews:
• http://www.mozilla.com/en-US/firefox/features/#private-browsing
• http://www.mozilla.com/en-US/firefox/features/#anti-phishing
• http://www.mozilla.com/en-US/firefox/security/
Firefox Tweak Guide: http://www.tweakguides.com/Firefox_1.html
3.4 Security versus Usability
• When Security Gets In the Way: http://jnd.org/dn.mss/when_security_gets_in_the_way.html
• Security and Usability: Designing Systems that People Can Use:
http://oreilly.com/catalog/9780596008277/
• The Myths of Security: What the Computer Security Industry Doesn't Want You to Know:
http://oreilly.com/catalog/9780596523022/
Web Resources – continued
4 Performance Enhancement
4.1 Display Settings and Other Tweaks:
Windows XP and Vista Tweaks (Advanced):
• Tweak XP: http://www.tweakxp.com/performance_tweaks.aspx
• Black Viper’s XP Super Tweaks: http://www.blackviper.com/WinXP/supertweaks.htm
• Tweak Vista: http://www.tweakvista.com/VistaPerformanceTweaks.aspx
• Black Viper’s Vista Super Tweaks: http://www.blackviper.com/WinVista/supertweaks.htm
• PCGuide System Enhancement: http://www.pcguide.com/opt/index.htm
Recommended Books: O’Reilly’s Windows (XP/Vista) Hacks, Windows (XP/Vista) Annoyances
4.3 Virtual Memory
Overviews: http://en.wikipedia.org/wiki/Virtual_memory, http://support.microsoft.com/kb/555223
4.4 Physical Memory (and PC Components)
PCGuide – Introduction to the PC: http://www.pcguide.com/intro/index.htm
PGGuide – Systems and Component Reference: http://www.pcguide.com/ref/index.htm
Web Resources – continued
4.5 BONUS TOPIC – Boot/Startup Optimization
Microsoft System Configuration Utility (MSCONFIG.EXE)
• Overview: http://en.wikipedia.org/wiki/MSConfig
• How Troubleshoot Using: http://support.microsoft.com/kb/310560
• “Purge the Startup Files”: http://www.extremetech.com/article2/0,2845,1840082,00.asp
Software to Optimize Startup:
• CCleaner: http://www.ccleaner.com
• Glary Utilities: http://glaryutilities.com/gu.html
• Startup Cop Pro: http://www.pcmag.com/article2/0,2817,2346165,00.asp
BONUS TOPIC Physical Maintenance
• Keeping Your PC Healthy: http://www.extremetech.com/article2/0,2845,1840074,00.asp
• PCGuide System Care: http://www.pcguide.com/care/index.htm
• PGGuide Maintenance Schedule: http://www.pcguide.com/care/pm.htm
Thank You for Attending!
Feedback:
If you liked what you saw today, please drop us
a note at:
administration AT westlandlibrary.org
Tell us what you liked, disliked, and if you would
like to see additional computer classes like this
at the Public Library of Westland.
(If you would like to see more, then please kindly let us
know the topics you would like to see in the future)