Professional Documents
Culture Documents
Tools:
• Hardware
• Software
1.1 Troubleshooting Methodology
A good PC technician will follow some sort of
formalized troubleshooting methodology
• For maintenance and upgrades: tool gathering, backup, parts identification, and action
• For repairs: there is an step at the begging: “try a quick fix”
• Again, if you are performing a repair, try a quick fix and then try the most likely solutions first.
• Did the upgrade work? Did the maintenance work as expected? Did the repair fix the problem?
Point of a Plan: 1) Don’t forget anything, 2) Can recover if you do, and 3) Can repeat the process
1.2 Backup, Backup, Backup
• The most important PC component is…
DATA!
So backup before BEFORE you begin.
Keep the data safe.
1.3 Tools – Hardware/Software
• Tool Kits:
A computer tool kit; possible non-standard “security” bit set
• USB devices:
USB-to-HD adapter; USB flash or hard drives; USB Floppy Drive
• Software Programs:
Burned to CD, Executable from a Flash Drive: ex. PortableApps.com)
2.1 Backup
2.2 Temp Files and System “Cruft”
2.3 Fragmentation
2.4 Windows Registry
2.5 System Updates
2.1 Backup – What to Backup
• Registry
• System State
• DVD or CD Media
(Gold Archival for important files)
• Tape Drive
• Online Storage Service
2.1 Backup – Types of Backup
• Manual: external or On-line storage
(E-mail, Google Docs, Picasa, flickr, Box.net)
• Automated Off-line
(Windows Integrated, CD Burning Software, Acronis TrueImage,
Symantec (Norton 360))
• Automated On-line
(Carbonite, IDrive, MozyHome,
SOS Online Backup, Norton OnLine Backup)
2.1 Backup - DEMOS
Manual Backups
Default Personal Folder Locations:
Windows XP:
C:\Documents and Settings\<USERNAME>\My Documents
Windows Vista:
C:\Users\<USERNAME>\Documents
Windows Vista:
C:\Users\<USER NAME>\AppData\Local\Temp
C:\Users\<USER NAME>\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low (Hidden, Protected)
C:\Users\<USER NAME>\AppData\Local\Microsoft\Windows\History\Low (Hidden, Protected)
C:\Users\<USER NAME>\AppData\Roaming\Microsoft\Windows\Cookies\Low (Hidden, Protected)
• Manually
• With Software
– Free Utilities: CCleaner, Glary Utilities, etc.
– Commercial: Norton (Utilities, 360, SystemWorks),
Avanquest Software (Fix-It Utilties, SystemSuite),
Webroot Windows Washer, etc.
2.2 Temp Files - DEMOS
Cleaning Temp Files
• Part 3 – CCleaner
2.3 Fragmentation
What is D i s k F r a g m e n t a t i o n?
Hard drives store files in pieces, sometimes called blocks or allocation units.
Fragmentation occurs when the operating system cannot or will not allocate
enough contiguous space to store a complete file as a unit, but instead puts
parts of it in gaps between other files (usually those gaps exist because they
formerly held a file that the operating system has subsequently deleted or
because the operating system allocated excess space for the file in the first
place). Larger files and greater numbers of files also contribute to
fragmentation and consequent performance loss. (Source: Wikipedia)
2.3 (Cont’) Defrag
Defragmentation (and disk optimization) attempts to:
Tools to Defrag:
• Windows Built-in (“Disk Defragmenter”)
• 3rd Party (Defraggler, Norton SpeedDisk, JkDefrag)
2.3 Fragmentation - Demos
DEMO
Windows Defrag program
Common Hives:
Disadvantages:
• Hard to backup individual application settings
• If it gets too big, it will slow down boot times and increase a system’s
memory needs
• Complex to navigate.
• Hard to keep clean, easy to corrupt, hard to repair.
2.4 Registry – Corruption Causes
The most common reason for registry corruption:
Automatic:
• Registry Cleaners (CCleaner, Glary, Symantec/Norton 360, Fix-It, etc.)
Additional Considerations:
• Internet Browser Security – Section 3.3
• Security vs. Usability – Section 3.4
3.1 Firewalls
What does a firewall do?
Permit
Deny
• Free Products: Windows Firewall (at the very least), ZoneAlarm Free
• Commercial Products: Anything bundled with an A/V suite
(Norton 360, McAfee I.S., ZoneAlarm I.S., etc.)
3.2 Anti-Virus and Anti-Spyware
What is the difference?
• Viruses can (typically) reproduce.
• Viruses are designed to cause problems,
and spread.
• Spyware/Adware (typically) cannot reproduce.
• Spyware/Adware programs are more for tracking.
Tips:
• Choose a reputable vendor.
• Don’t believe Internet ads and Pop-up (“Scareware”)
3.2 Anti-Virus and Anti-Spyware
List of Reputable Vendors (FREE FOR HOME USE):
Anti-Virus: Anti-Spyware:
•Avast! Home Edition •Comodo Anti-Malware
•AVG Anti-Virus Free* •Lavasoft Adware
•Avira AntiVir Free Edition* •MalwareBTYES
•BitDefender Free Edition (on-demand)* •Microsoft Windows Defender
•ClamWin (on-demand scanner; portable) •SpyBot Search & Destroy
•Comodo AntiVirus
•Microsoft Security Essentials (BETA)
•(Panda) Cloud Antivirus
•PC Tools AntiVirus Free Edition
Tips:
• Use the Private Browsing Features (IE8, FF 3.5)
• Never let the Browser save Cookies, Passwords, History, etc.
• Use Bookmarks/Favorites instead
3.4 Security versus Usability
Finding the Right Balance…
SECURITY USABILITY
Section 3 - DEMOS
Basic PC Security Software Demos
• Windows Firewall
• ZoneAlarm
• Lavasoft Ad-aware
• Browser Settings (Part II)
4. Basic Peformance Enhancement
Part 4 – Additional Performance Topics
There are also a few other places you can look for “basic” performance
boosts:
• 4.1 Display Settings
• 4.2 System Update Frequency
• 4.3 Virtual Memory
• 4.4 Physical Memory
Note: there are many, many, more advanced performance hacks for Windows.
This section shows a tiny subset of system tweaks, just some “Basics”.
4.1 Display Settings
Pretty Graphics
= More System Resources
You can make your Windows interface more responsive by turning
off all the animated interface features (ex. Vista’s Aero)
Recommendations:
• Let the system manage the virtual memory, or
• Use minimum setting of double your physical RAM
DEMOS
• Display Settings
• System Update Frequency
• Virtual Memory
4.4 Physical Memory
DEMO: Whiteboard Session
“Basic PC Components”
• Windows XP SP3: 1 GB
• Windows Vista SP2: 2 GB (and a dual-core processor)
• Windows 7 2 GB
5. Basic Hardware Updates
Part 5 – Drivers and Hardware
http://support.microsoft.com/kb/308549
5.2 Device Manager
Device Manager provides an interface for viewing the configuration of
hardware devices. You can update the device drivers for hardware installed,
modify hardware settings, and troubleshoot problems.
5.3 HW Manufacturers Websites
The BEST place to find information about
a system, a component within that
system, or a driver is typically the
manufacturer.
Examples:
http://support.dell.com
http://www.intel.com/p/en_US/support
http://www.nvidia.com/Download/index.aspx
http://www.crucial.com
5.x Hardware Updates - Demos
DEMO TIME!!!
• System Information
• Device Manager
• Manufacturer Websites
Conclusion and Wrap Up
Knowledge Can End Maintenance Frustration
• Maintenance Scheduling
• Additional Reading
• Certification
• Web Resources
Maintenance Schedule
Make Time for Maintenance
To Physically Clean:
• Clean the outside components with dry or lightly damp cloth
(do not use chemicals, unless specifically specified for
computers)
• If you have components you no longer use, consider removing
them (for example, an old printer)
• For Desktops, open up and vacuum out the case and/or blow
out all dust. For Laptops, vacuum out all exhaust fans.
Maintenance Schedule (cont’)
Sample Schedule
Recommended Recommended
Preventive Maintenance Activity Auto? Preventive Maintenance Activity Auto?
Frequency Frequency
Scan hard disk file systems for errors Daily Yes Update emergency boot floppies Quarterly No
Scan for viruses Daily Yes Quarterly
Back up data Daily No Clean floppy disk drive internals
(depending on No
and read/write heads
Clean CRT screen Weekly No use)
Defragment hard disks Weekly Yes
Check processor temperature, Annually (or
Scan for hard disk read errors Weekly Yes inspect heat sink and fan to whenever case is No
ensure they are working opened)
Clean mouse Monthly No
1.2 Backup
• Automated System Recovery: http://support.microsoft.com/kb/818903
• O’Reilly: http://oreilly.com/catalog/9780596102463/
• System State Date: http://technet.microsoft.com/en-us/library/cc785306%28WS.10%29.aspx
• Types of Backups: http://en.wikipedia.org/wiki/Incremental_backup
• Windows Server: http://technet.microsoft.com/en-us/library/cc770266%28WS.10%29.aspx
1.3 Tools:
• Anytime Tools (Specialty Security Bits): http://www.anytimesale.com/
• BartPE: http://www.nu2.nu/pebuilder/
• ERD Commander 2005: (discontinued/replaced, see Sysinternals)
• Hiren’s Boot CD: http://www.hirensbootcd.net/
Web Resources – continued
• KNOPPIX: http://www.knopper.net/knoppix/index-en.html
• PortableApps.com: http://portableapps.com/
• (R)ecovery (I)s (P)ossible Linux: http://rip.7bf.de/current/
• SLAX: http://www.slax.org/
• System Rescue CD: http://www.sysresccd.org/
• Trinity Rescure Kit: http://trinityhome.org/
• Ubuntu / Kubuntu / Xubuntu: http://www.ubuntu.com/ , http://www.kubuntu.com/
• Utilmate Boot CD: http://www.ultimatebootcd.com/ (UBCD4Win: http://www.ubcd4win.com)
• VistaPE: http://www.vistape.net/
• Windows Sysinternals: http://technet.microsoft.com/en-us/sysinternals/default.aspx
• ZenLive (“Zenwalk Live”, based on SLAX): www.zenwalk.org
2 Software Maintenance
2.1 Backup Software (Cloning / Standard):
Cloning: http://en.wikipedia.org/wiki/Disk_cloning,
http://en.wikipedia.org/wiki/List_of_disk_cloning_software,
http://en.wikipedia.org/wiki/Comparison_of_disk_cloning_software
• Acronis True Image: http://www.acronis.com/homecomputing/products/trueimage/
• Clonezilla (open source): http://clonezilla.org/
• R-Drive Image: http://www.drive-image.com/
Web Resources – continued
Symantec (Norton): http://www.ghost.com/, http://www.symantec.com/norton/360
2.4 Registry:
Overview: http://en.wikipedia.org/wiki/Windows_Registry
Registry Cleaner Overview: http://en.wikipedia.org/wiki/Registry_cleaner
Information for Advanced Users: http://support.microsoft.com/kb/256986
• Avanquest (Fix-It, SystemSuite): http://www.avanquest.com/USA/pc-utilities/
• Ccleaner (free): http://www.ccleaner.com/
• Glary Utilities (free): http://www.glaryutilities.com/
• Norton (Utilties, SystemWorks, 360): http://www.symantec.com/norton/norton-utilities
Web Resources – continued
2.5 System Updates:
Overviews: http://en.wikipedia.org/wiki/Windows_Update /
http://www.microsoft.com/security/updates/mu.aspx
Windows Update Explained: http://download.microsoft.com/download/a/9/4/a94af289-a798-
4143-a3f8-77004f7c2fd3/Windows%20Update%20Explained.docx
• Windows Update: http://windowsupdate.microsoft.com
• Microsoft Update: http://update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us
Windows Firewall:
Overview: http://en.wikipedia.org/wiki/Windows_Firewall
• Understanding: http://www.microsoft.com/windowsxp/using/security/internet/sp2_wfintro.mspx
• Using: http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx
• Customizing: http://www.windowsecurity.com/articles/Customizing-Windows-Firewall.html
• TechNet Articles: http://technet.microsoft.com/en-us/network/bb545423.aspx
Firefox Overviews:
• http://www.mozilla.com/en-US/firefox/features/#private-browsing
• http://www.mozilla.com/en-US/firefox/features/#anti-phishing
• http://www.mozilla.com/en-US/firefox/security/
Firefox Tweak Guide: http://www.tweakguides.com/Firefox_1.html
Feedback:
If you liked what you saw today, please drop us
a note at:
administration AT westlandlibrary.org