You are on page 1of 66

Basic PC Maintenance

Presented on August 12, 2009


What is PC Maintenance?

PC Troubleshooting can be broken into


3 Primary Categories:
• Maintenance – keeping your system
running its best (our topic for today)
• Repair – fixing what is broken
• Security – keeping bad things from
happening; keeping bad people out.
Prerequisites For This Course
• Basic PC Knowledge
 know how to navigate a Windows OS
 know how to navigate directories
 know how to navigate the Internet

The Library offers introductory level courses:


• Computer Basics
• Internet 101 & 201
• Film Management
• Office Suites (Word Processing, Spreadsheet, Presentations)
• 1-on-1 Computer Training
Sign-up at our Reference Desk
Covered Topics
• Part 1 – Basic Preparation
• Part 2 – Basic Software Maintenance
(Backup, Temp Files, Fragmentation, Registry, Updates)

• Part 3 – Basic PC Security


(the 3-pronged approach; Security vs. Usability)

• Part 4 – Basic Performance Enhancement


(OS customization, hardware components, memory)

• Part 5 – Basic Hardware Updates


(Finding what you need; where to get what you need)

• Conclusion: Pointers to More Info / Questions


1. Basic Preparation
Part 1 – Things You Need Before Beginning

Tools:
• Hardware
• Software
1.1 Troubleshooting Methodology
A good PC technician will follow some sort of
formalized troubleshooting methodology

Example 1: Basic 3-Step Plan


• Step 1: Assemble the proper tools

• Step 2: Backup everything before making changes

• Step 3: Analyze, test, and document


1.1 (Cont’) Example 2: Basic 5-Step Plan
Step 1: Information Gathering

• Identify what you want to accomplish (Maintenance, Upgrade, Repair)


• Identify the component to work on.
• For repairs: Identify any symptoms, determine if anything has changed, and establish probable cause

Step 2: Create an action plan

• For maintenance and upgrades: tool gathering, backup, parts identification, and action
• For repairs: there is an step at the begging: “try a quick fix”

Step 3: Implement and Test the Solution

• Again, if you are performing a repair, try a quick fix and then try the most likely solutions first.

Step 4: Identify the results and effects of the solution

• Did the upgrade work? Did the maintenance work as expected? Did the repair fix the problem?

Step 5: Document the solution and process

Point of a Plan: 1) Don’t forget anything, 2) Can recover if you do, and 3) Can repeat the process
1.2 Backup, Backup, Backup
• The most important PC component is…

DATA!
So backup before BEFORE you begin.
Keep the data safe.
1.3 Tools – Hardware/Software
• Tool Kits:
A computer tool kit; possible non-standard “security” bit set

• USB devices:
USB-to-HD adapter; USB flash or hard drives; USB Floppy Drive

• Bootable repair CDs:


Operating Systems; Emergency Recovery Disks (ERDs); Universal Boot CDs

• Software Programs:
Burned to CD, Executable from a Flash Drive: ex. PortableApps.com)

• FRUs (Field Replaceable Units):


KB, Mouse, Spare HD, Spare Memory

• ESD (Electro-Static Discharge) protection


2. Basic Software Maintenance
Part 2 – Contents:

2.1 Backup
2.2 Temp Files and System “Cruft”
2.3 Fragmentation
2.4 Windows Registry
2.5 System Updates
2.1 Backup – What to Backup

• Personal Files (My Documents, …)

• Registry

• System State

• Any special drivers or software


2.1 Backup – Where to Backup
Backup anywhere EXCEPT for the
Primary Hard Drive:
• Second Hard Drive
• External Drive
(USB Drive, Flash Drive, NAS Device)

• DVD or CD Media
(Gold Archival for important files)

• Tape Drive
• Online Storage Service
2.1 Backup – Types of Backup
• Manual: external or On-line storage
(E-mail, Google Docs, Picasa, flickr, Box.net)

• Manual: Disk Imaging


(Symantec Ghost, Acronis True Image, Clonezilla)

• Automated Off-line
(Windows Integrated, CD Burning Software, Acronis TrueImage,
Symantec (Norton 360))

• Automated On-line
(Carbonite, IDrive, MozyHome,
SOS Online Backup, Norton OnLine Backup)
2.1 Backup - DEMOS
Manual Backups
Default Personal Folder Locations:
Windows XP:
C:\Documents and Settings\<USERNAME>\My Documents

Windows Vista:
C:\Users\<USERNAME>\Documents

Windows Backup Utilties (XP/Vista)


Programs  Accessories  System Tools  Backup
2.2 Temp Files and “Cruft”
Common Temp File Locations
Windows XP:
C:\Documents and Settings\<USER NAME>\Local Settings\Temp
C:\Documents and Settings\<USER NAME>\Local Settings\Temporary Internet Files (Hidden, Protected)
C:\Documents and Settings\<USER NAME>\Local Settings\History (Hidden, Protected)
C:\Documents and Settings\<USER NAME>\Cookies

Windows Vista:
C:\Users\<USER NAME>\AppData\Local\Temp
C:\Users\<USER NAME>\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low (Hidden, Protected)
C:\Users\<USER NAME>\AppData\Local\Microsoft\Windows\History\Low (Hidden, Protected)
C:\Users\<USER NAME>\AppData\Roaming\Microsoft\Windows\Cookies\Low (Hidden, Protected)

Older Temp Locations


• C:\TEMP
• C:\Windows\TEMP

Uninstaller References:
• C:\Windows\$NtUninstall<PatchName> (Hidden)
2.2 Temp Files and “Cruft”
Cleaning Temp Files

• Manually

• With Software
– Free Utilities: CCleaner, Glary Utilities, etc.
– Commercial: Norton (Utilities, 360, SystemWorks),
Avanquest Software (Fix-It Utilties, SystemSuite),
Webroot Windows Washer, etc.
2.2 Temp Files - DEMOS
Cleaning Temp Files

• Part 1 – Internet Browser Cleaning


(From your favorite browser: Tools  Options)

• Part 2 – Disk Cleanup


(Programs  Accessories  System Tools)

• Part 3 – CCleaner
2.3 Fragmentation
What is D i s k F r a g m e n t a t i o n?

DEMO: White-board Session

Hard drives store files in pieces, sometimes called blocks or allocation units.

Fragmentation occurs when the operating system cannot or will not allocate
enough contiguous space to store a complete file as a unit, but instead puts
parts of it in gaps between other files (usually those gaps exist because they
formerly held a file that the operating system has subsequently deleted or
because the operating system allocated excess space for the file in the first
place). Larger files and greater numbers of files also contribute to
fragmentation and consequent performance loss. (Source: Wikipedia)
2.3 (Cont’) Defrag
Defragmentation (and disk optimization) attempts to:

• Rearrange files so that all their parts, or blocks, are


contiguous (sequential)
• Rearrange programs, so that the most commonly
used programs are at the front of the drive and
launch quicker

Tools to Defrag:
• Windows Built-in (“Disk Defragmenter”)
• 3rd Party (Defraggler, Norton SpeedDisk, JkDefrag)
2.3 Fragmentation - Demos

DEMO
Windows Defrag program

Tip: Run a CHKDSK or SCANDISK before performing a Defrag

Accessing Disk Tools:


• Right Click on the Drive (from Explorer or “My Computer”),
select Properties, click on the Tools Tab.
• Defrag: Start  Programs  Accessories  System Tools 
Disk Defragmenter
2.4 Windows Registry
What is the Windows Registry?

A centralized database that stores all the settings for


Windows, including:
– Hardware Information and Settings
– Software Information and Settings
– User account settings,
– Security settings

The registry replaces the old flat or text files of yesteryear:


*.INI, AUTOEXEC.BAT, CONFIG.SYS
2.4 Windows Registry - Hives
Registry settings are split into sections called “Hives”

Common Hives:

• HKEY_CLASSES_ROOT – stores information about registered


applications, such as file associations

• HKEY_CURRENT_USER – setting of the currently logged in user

• HKEY_LOCAL_MACHINE – local computer settings

• HKEY_USERS – subkeys of HKEY_CURRENT_USER

• HKEY_CURRENT_CONFIG – information gathered at runtime


(when you boot)
2.4 Registry - Pros and Cons
Advantages:
• Centralized. If there is a setting in windows, chances are it is
referenced in the registry.
• Keeps configuration details largely transparent from users
• Standardized method for how program storm data in the registry.
• Easy to backup
• Read in faster than a text file*

Disadvantages:
• Hard to backup individual application settings
• If it gets too big, it will slow down boot times and increase a system’s
memory needs
• Complex to navigate.
• Hard to keep clean, easy to corrupt, hard to repair.
2.4 Registry – Corruption Causes
The most common reason for registry corruption:

Invalid references/entries in the registry.

Including, but not limited to:


• Added/removed programs (Uninstaller References)
• Temporary file references
• Deleted files
• Invalid file formats
2.4 Registry – Repair Methods
Manual:
• regedit.exe,
• *.REG files (also called a “REG bomb”),
• Command Line

Automatic:
• Registry Cleaners (CCleaner, Glary, Symantec/Norton 360, Fix-It, etc.)

Disadvantages of Registry Cleaners:


• They can remove things they are not supposed to
• There are a LOT of fake registry cleaners out there that simply deliver
viruses, malware, spyware, “scareware” to your system.
2.4 Windows Registry - Demos
DEMOS
RegEdit CCleaner
2.5 System Software Updates
Software Update Best Practices and Tips
• Windows Update / Microsoft Update – Just Use It.
• Keep Microsoft Automatic Updates turned on.
• Check Monthly for “Optional” Microsoft Updates
• Do not install drivers from Microsoft (unless you are
having issues with a specific piece of hardware)
• Let your security software check daily for updates
• For non-Microsoft products, check at least monthly
(or based on your system power)
2.5 System Updates - Demos
• Automatic Updates
• “Optional” Window Updates
3. Basic PC Security
Part 3 – The “3-Pronged” Approach

1. A Firewall (Hardware or Software) – Section 3.1


2. Anti-Virus Software – Section 3.2
3. Anti-Spyware Software – Section 3.2

Additional Considerations:
• Internet Browser Security – Section 3.3
• Security vs. Usability – Section 3.4
3.1 Firewalls
What does a firewall do?

Blocks unauthorized access to a system, while permitting authorized


communications. Two typical actions on data:

 Permit
 Deny

• Hardware firewall = (typically) mean better performance than software


• Software firewall = may be more configurable than hardware firewall.
A Software firewall is essential for a mobile computer.

• Free Products: Windows Firewall (at the very least), ZoneAlarm Free
• Commercial Products: Anything bundled with an A/V suite
(Norton 360, McAfee I.S., ZoneAlarm I.S., etc.)
3.2 Anti-Virus and Anti-Spyware
What is the difference?
• Viruses can (typically) reproduce.
• Viruses are designed to cause problems,
and spread.
• Spyware/Adware (typically) cannot reproduce.
• Spyware/Adware programs are more for tracking.

Tips:
• Choose a reputable vendor.
• Don’t believe Internet ads and Pop-up (“Scareware”)
3.2 Anti-Virus and Anti-Spyware
List of Reputable Vendors (FREE FOR HOME USE):
Anti-Virus: Anti-Spyware:
•Avast! Home Edition •Comodo Anti-Malware
•AVG Anti-Virus Free* •Lavasoft Adware
•Avira AntiVir Free Edition* •MalwareBTYES
•BitDefender Free Edition (on-demand)* •Microsoft Windows Defender
•ClamWin (on-demand scanner; portable) •SpyBot Search & Destroy
•Comodo AntiVirus
•Microsoft Security Essentials (BETA)
•(Panda) Cloud Antivirus
•PC Tools AntiVirus Free Edition

Commercial Options: CA AntiVirus, F-Prot, F-Secure, Kaspersky Anti-Virus,


McAfee VirusScan, NOD32 (by ESET), Panda Antivirus, Sophos Anti-Virus,
Symantec/Norton (Endpoint/AntiVirus/360), Trend Micro AntiVirus +
AntiSpyware, SunBelt VIPRE, Webroot AntiVirus with AntiSpyware
(Spy Sweeper), ZoneAlarm AntiVirus
3.2 Anti-Virus and Anti-Spyware
Examples of Fake or “Rogue” Anti-Virus/Spyware Software:

* AntiVirus 360 * Spydawn


* Antivirus 2008 * Spylocked
* Antivirus 2009 * Spysheriff
* AntiVirus Gold * SpyShredder
* ContraVirus * Spyware Quake
* Errorsafe (AKA system doctor) * SpywareStrike
* MacSweeper * UltimateCleaner
* PAL Spyware Remover * WinAntiVirus Pro 2006
* Pest Trap * WinFixer
* PSGuard * WorldAntiSpy
* Spy Wiper

Source (and larger list):


http://en.wikipedia.org/wiki/Rogue_security_software
3.2 Anti-Virus and Anti-Spyware
Example of a Browser Hi-Jack
3.2 Anti-Virus and Anti-Spyware
TANGENT: 3rd-party Toolbars for Internet Browsers.

Does your browser look like this?


3.2 Anti-Virus and Anti-Spyware
Examples of Fake Pop-up Messages

Pop-up run from JavaScript

Fake System Message (implying possible infection):


3.3 Internet Browser Security
Adding on to information from Section 2.2 (Browser Temp Files)

Firefox 3.x: Tools  Options


(Relevant Tabs: Content, Privacy, Security)
Internet Explorer 8: Tools  Internet Options
(Relevant Tabs: General, Privacy, Advanced)

Tips:
• Use the Private Browsing Features (IE8, FF 3.5)
• Never let the Browser save Cookies, Passwords, History, etc.
• Use Bookmarks/Favorites instead
3.4 Security versus Usability
Finding the Right Balance…

SECURITY USABILITY
Section 3 - DEMOS
Basic PC Security Software Demos

• Windows Firewall
• ZoneAlarm
• Lavasoft Ad-aware
• Browser Settings (Part II)
4. Basic Peformance Enhancement
Part 4 – Additional Performance Topics

These already coved topics can affect performance:


• Temporary Files (Section 2.2)
• Hard drive Fragmentation (Section 2.3)
• Registry Settings (Section 2.4)
• Firewalls (Section 3.1)
• Viruses or Spyware (Section 3.2)
• Security over Usability (Section 3.4)

There are also a few other places you can look for “basic” performance
boosts:
• 4.1 Display Settings
• 4.2 System Update Frequency
• 4.3 Virtual Memory
• 4.4 Physical Memory
Note: there are many, many, more advanced performance hacks for Windows.
This section shows a tiny subset of system tweaks, just some “Basics”.
4.1 Display Settings
Pretty Graphics
= More System Resources
You can make your Windows interface more responsive by turning
off all the animated interface features (ex. Vista’s Aero)

This called Windows Classic mode. You can make any XP or


Vista PC’s interface similar to the classic menu and theme that
started with Windows 95 and WindowsNT 4.0.

Right Click “Computer” or “My Computer” select “Properties”


Tabs: Advanced  Performance (Settings)  Visual Effects

You also adjust many of these settings in the


Start Menu and under Display Settings
(Note: Demo after section 4.3)
4.2 System Update Frequency
Automatic Updates:
• XP: Automatic Updates is under System Properties
• Vista: Control Panel  Security  Windows Update

Other Software to Check:


• Security software*
• Any 3rd Application under “Programs”
• Internet Browser Plug-ins:
Big Offenders: Sun, Adobe, Apple, Real

(Note: Demo after section 4.3)


4.3 Virtual Memory
Virtual Memory (sometimes called “Swap Space”) is a
method to give programs additional memory (or
sequential memory) after physical memory resources
have been exhausted.

Recommendations:
• Let the system manage the virtual memory, or
• Use minimum setting of double your physical RAM

Accessing Virtual Memory:


Right Click “Computer” or “My Computer” select “Properties”
Advanced  Performance (Settings)  Advanced  Virtual Memory (Settings)
4.x Basic Peformance Demos

DEMOS

• Display Settings
• System Update Frequency
• Virtual Memory
4.4 Physical Memory
DEMO: Whiteboard Session
“Basic PC Components”

Best Bang for Your Hardware Bucks


=
Physical Memory (RAM)

Suggested Minimum RAM for Windows Operating Systems:

• Windows XP SP3: 1 GB
• Windows Vista SP2: 2 GB (and a dual-core processor)
• Windows 7 2 GB
5. Basic Hardware Updates
Part 5 – Drivers and Hardware

5.1 System Information

5.2 Device Manager

5.3 Manufacturer Websites


5.1 System Information
MSINFO32.EXE (Accessories  System Tools)

System Information gives you a categorical overview of your


computer system, including drivers used and status of each.

http://support.microsoft.com/kb/308549
5.2 Device Manager
Device Manager provides an interface for viewing the configuration of
hardware devices. You can update the device drivers for hardware installed,
modify hardware settings, and troubleshoot problems.
5.3 HW Manufacturers Websites
The BEST place to find information about
a system, a component within that
system, or a driver is typically the
manufacturer.

Examples:
http://support.dell.com
http://www.intel.com/p/en_US/support
http://www.nvidia.com/Download/index.aspx
http://www.crucial.com
5.x Hardware Updates - Demos

DEMO TIME!!!
• System Information
• Device Manager
• Manufacturer Websites
Conclusion and Wrap Up
Knowledge Can End Maintenance Frustration

1. Preparation, 2. Software, 3. Security, 4. Performance, and 5. Hardware

Need to Know More?

• Maintenance Scheduling

• Additional Reading

• Certification

• Web Resources
Maintenance Schedule
Make Time for Maintenance

It is a good practice to physically clean your system once in a while,


and develop a schedule for routine cleaning. With software, you
can automate a lot of maintenance tasks. Physical maintenance
requires scheduled time.

To Physically Clean:
• Clean the outside components with dry or lightly damp cloth
(do not use chemicals, unless specifically specified for
computers)
• If you have components you no longer use, consider removing
them (for example, an old printer)
• For Desktops, open up and vacuum out the case and/or blow
out all dust. For Laptops, vacuum out all exhaust fans.
Maintenance Schedule (cont’)
Sample Schedule
Recommended Recommended
Preventive Maintenance Activity Auto? Preventive Maintenance Activity Auto?
Frequency Frequency

Scan hard disk file systems for errors Daily Yes Update emergency boot floppies Quarterly No
Scan for viruses Daily Yes Quarterly
Back up data Daily No Clean floppy disk drive internals
(depending on No
and read/write heads
Clean CRT screen Weekly No use)
Defragment hard disks Weekly Yes
Check processor temperature, Annually (or
Scan for hard disk read errors Weekly Yes inspect heat sink and fan to whenever case is No
ensure they are working opened)
Clean mouse Monthly No

Check for full hard disk volumes and Annually (or


Monthly No Check hard disk for temperature
remove unnecessary files whenever case is No
and vibration
opened)

Update virus definition files Monthly Sometimes


Clean exterior of case Annually No

Check power protection devices to Clean exterior of monitor Annually No


ensure they are still protecting the Quarterly No
system Check and clean interior,
motherboard and expansion Annually No
Check power supply fan for cards if necessary
ventilation and dirt buildup and clean Quarterly No
if necessary Check internal connections and
Annually No
cables
Back up CMOS information Quarterly No
Clean keyboard Annually No
Additional Reading

• Troubleshooting Your PC for Dummies, 3rd Ed., Dan Goodkin


• Upgrading and Repairing PCs, 18th Ed., Scott Mueller
• Fix Your Own PC, 8th Ed., Corey Sandler
• Computer Repair w/Diagnostic Flowcharts, Morris Rosenthal

O’Reilly Books: “Hacks” , “Nutshell”, “Cookbook, “Pocket Reference”


“Annoyances” Series; also “Backup and Recovery”
Certification
If you are interesting in a career in
Systems Troubleshooting, the industry
standard cerfication is CompTIA’s A+
CompTIA: http://www.comptia.org/
2 Exams: 90-100 questions / 90 minutes
220-601 A+ Essentials (Required)
3 Career Tracks
220-602 for IT Technician
220-603 for Remote Support Technician
220-604 for Depot Technician
Web Resources
1. Preparation
1.1 Troubleshooting Methods
• Cicso: http://www.cisco.com/iam/unified/ipcc1/System_Troubleshooting_Methodology.htm
• Cicso: http://articles.techrepublic.com.com/5100-10878_11-1030582.html
• Microsoft: http://technet.microsoft.com/en-us/library/cc786052%28WS.10%29.aspx
• Network+: http://en.wikibooks.org/wiki/Network_Plus_Certification/Management/Troubleshooting_Methodology
• PCGuide – Troubleshooting Guide (also see System Care)

1.2 Backup
• Automated System Recovery: http://support.microsoft.com/kb/818903
• O’Reilly: http://oreilly.com/catalog/9780596102463/
• System State Date: http://technet.microsoft.com/en-us/library/cc785306%28WS.10%29.aspx
• Types of Backups: http://en.wikipedia.org/wiki/Incremental_backup
• Windows Server: http://technet.microsoft.com/en-us/library/cc770266%28WS.10%29.aspx

1.3 Tools:
• Anytime Tools (Specialty Security Bits): http://www.anytimesale.com/
• BartPE: http://www.nu2.nu/pebuilder/
• ERD Commander 2005: (discontinued/replaced, see Sysinternals)
• Hiren’s Boot CD: http://www.hirensbootcd.net/
Web Resources – continued
• KNOPPIX: http://www.knopper.net/knoppix/index-en.html
• PortableApps.com: http://portableapps.com/
• (R)ecovery (I)s (P)ossible Linux: http://rip.7bf.de/current/
• SLAX: http://www.slax.org/
• System Rescue CD: http://www.sysresccd.org/
• Trinity Rescure Kit: http://trinityhome.org/
• Ubuntu / Kubuntu / Xubuntu: http://www.ubuntu.com/ , http://www.kubuntu.com/
• Utilmate Boot CD: http://www.ultimatebootcd.com/ (UBCD4Win: http://www.ubcd4win.com)
• VistaPE: http://www.vistape.net/
• Windows Sysinternals: http://technet.microsoft.com/en-us/sysinternals/default.aspx
• ZenLive (“Zenwalk Live”, based on SLAX): www.zenwalk.org

2 Software Maintenance
2.1 Backup Software (Cloning / Standard):
Cloning: http://en.wikipedia.org/wiki/Disk_cloning,
http://en.wikipedia.org/wiki/List_of_disk_cloning_software,
http://en.wikipedia.org/wiki/Comparison_of_disk_cloning_software
• Acronis True Image: http://www.acronis.com/homecomputing/products/trueimage/
• Clonezilla (open source): http://clonezilla.org/
• R-Drive Image: http://www.drive-image.com/
Web Resources – continued
Symantec (Norton): http://www.ghost.com/, http://www.symantec.com/norton/360

2.1 Backup Software (On-Line Backup):


Remote Backup List: http://en.wikipedia.org/wiki/List_of_online_backup_services
• Box.net: http://www.box.net/
• Carbonite: http://www.carbonite.com/
• IDrive: http://www.idrive.com/
• Mozy Home: http://mozy.com/home
• Norton OnLine Backup: http://www.symantec.com/norton/online-backup
• SOS Online Backup: http://www.sosonlinebackup.com/

2.2 Temporary Files:


Definition: http://en.wikipedia.org/wiki/Temporary_file
• Avanquest (Fix-It, SystemSuite): http://www.avanquest.com/USA/pc-utilities/
• Ccleaner (free): http://www.ccleaner.com/
• Glary Utilities (free): http://www.glaryutilities.com/
• Symantac (Norton SystemWorks, 360): http://www.symantec.com/norton/index.jsp
• Weboot: http://www.webroot.com/En_US/consumer-products-windowwasher.html
Web Resources – continued
2.3 Fragmentation:
Definition: http://en.wikipedia.org/wiki/Fragmentation_(computer)
Defragmenting: http://en.wikipedia.org/wiki/Defragmentation
Defrag Software List: http://en.wikipedia.org/wiki/List_of_defragmentation_software
• Contig (free): http://technet.microsoft.com/en-us/sysinternals/bb897428.aspx
• Defraggler (free): http://www.defraggler.com/
• JkDefrag MyDefrag (open source): http://www.mydefrag.com/
• Norton SpeedDisk: http://www.symantec.com/norton/norton-utilities

2.4 Registry:
Overview: http://en.wikipedia.org/wiki/Windows_Registry
Registry Cleaner Overview: http://en.wikipedia.org/wiki/Registry_cleaner
Information for Advanced Users: http://support.microsoft.com/kb/256986
• Avanquest (Fix-It, SystemSuite): http://www.avanquest.com/USA/pc-utilities/
• Ccleaner (free): http://www.ccleaner.com/
• Glary Utilities (free): http://www.glaryutilities.com/
• Norton (Utilties, SystemWorks, 360): http://www.symantec.com/norton/norton-utilities
Web Resources – continued
2.5 System Updates:
Overviews: http://en.wikipedia.org/wiki/Windows_Update /
http://www.microsoft.com/security/updates/mu.aspx
Windows Update Explained: http://download.microsoft.com/download/a/9/4/a94af289-a798-
4143-a3f8-77004f7c2fd3/Windows%20Update%20Explained.docx
• Windows Update: http://windowsupdate.microsoft.com
• Microsoft Update: http://update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us

2.6 BONUS TOPIC – File Recovery / Secure File Deletion


Overviews (Erasing): http://en.wikipedia.org/wiki/Data_erasure, /File_deletion, /Sanitization
Overviews (Recovery): http://en.wikipedia.org/wiki/Data_recovery, /Undeletion
• Eraser (open source): http://eraser.heidi.ie/
• PhotoRec and TestDisk (open source): http://www.cgsecurity.org/
• Recuva (free): http://www.recuva.com/
• Restoration (free): http://www3.telus.net/mikebike/RESTORATION.html
• SpinRite: http://www.grc.com/sr/spinrite.htm
Web Resources – continued
3 PC Security
3.1 Firewalls
Overview: http://en.wikipedia.org/wiki/Firewall

Windows Firewall:
Overview: http://en.wikipedia.org/wiki/Windows_Firewall
• Understanding: http://www.microsoft.com/windowsxp/using/security/internet/sp2_wfintro.mspx
• Using: http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx
• Customizing: http://www.windowsecurity.com/articles/Customizing-Windows-Firewall.html
• TechNet Articles: http://technet.microsoft.com/en-us/network/bb545423.aspx

3rd Party “Personal” Firewalls:


Overview: http://en.wikipedia.org/wiki/Personal_firewall
List of Firewalls: http://en.wikipedia.org/wiki/Comparison_of_firewalls#Personal_firewalls
• Comodo Firewall: http://www.comodo.com/home/internet-security/firewall.php
• Outpost Firewall Free: http://free.agnitum.com/
• PC Tools Firewall Plus (Free): http://www.pctools.com/firewall/
• ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Web Resources – continued
3.2 Anti-Virus and Anti-Spyware
Overviews: http://en.wikipedia.org/wiki/Antivirus_software , /Spyware, /Adware
Notable Antivirus Software: http://en.wikipedia.org/wiki/List_of_antivirus_software
Rogue (or Fake) Software and Hoaxes: http://en.wikipedia.org/wiki/Rogue_software, /Virus Hoax
Virus Databases: Symantec Threat Explorer, ThreatExpert, McAfee DB, Trend Micro DB

Notable Free Anti-Virus and Anti-Spyware (too many to list all):


• Avast! Home Edition: http://www.avast.com/eng/avast_4_home.html
• Clamwin (on-demand only): http://www.clamwin.com/
• Comodo AntiVirus: http://www.comodo.com/home/internet-security/antivirus.php
• Lavasoft Ad-aware Free: http://www.lavasoft.com/products/ad_aware_free.php
• Malwarebtyes’ Anti-Malware: http://www.malwarebytes.org/mbam.php
• Microsoft Security Essentials (BETA): http://www.microsoft.com/security_essentials/
• (Panda) Cloud Antivirus: http://www.cloudantivirus.com/
• PC Tools Anti-Virus: http://www.pctools.com/free-antivirus/
• Spybot Search & Destroy: http://www.safer-networking.org/en/index.html
• Win. Defender: http://www.microsoft.com/windows/products/winfamily/defender/default.mspx

A Couple Notable Commercial Options (again, too many to list all):


• Norton (bundled): http://www.symantec.com/norton/products/charts/comparison.jsp?pcid=is
• Webroot Spy Sweeper (bundled): http://www.webroot.com/En_US/consumer-compare.html
Web Resources – continued
3.3 Internet Browser Security
Internet Explorer 8 Security Guide:
http://www.microsoft.com/DOWNLOADS/details.aspx?FamilyID=44405777-51b4-4376-9cef-
f0341b13fcde&displaylang=en
Increasing Your Organization’s Security and Privacy with Internet Explorer 8:
http://www.microsoft.com/DOWNLOADS/details.aspx?familyid=198D40A4-6896-49B3-B8F2-
C151E9797634&displaylang=en

Firefox Overviews:
• http://www.mozilla.com/en-US/firefox/features/#private-browsing
• http://www.mozilla.com/en-US/firefox/features/#anti-phishing
• http://www.mozilla.com/en-US/firefox/security/
Firefox Tweak Guide: http://www.tweakguides.com/Firefox_1.html

3.4 Security versus Usability


• When Security Gets In the Way: http://jnd.org/dn.mss/when_security_gets_in_the_way.html
• Security and Usability: Designing Systems that People Can Use:
http://oreilly.com/catalog/9780596008277/
• The Myths of Security: What the Computer Security Industry Doesn't Want You to Know:
http://oreilly.com/catalog/9780596523022/
Web Resources – continued
4 Performance Enhancement
4.1 Display Settings and Other Tweaks:
Windows XP and Vista Tweaks (Advanced):
• Tweak XP: http://www.tweakxp.com/performance_tweaks.aspx
• Black Viper’s XP Super Tweaks: http://www.blackviper.com/WinXP/supertweaks.htm
• Tweak Vista: http://www.tweakvista.com/VistaPerformanceTweaks.aspx
• Black Viper’s Vista Super Tweaks: http://www.blackviper.com/WinVista/supertweaks.htm
• PCGuide System Enhancement: http://www.pcguide.com/opt/index.htm
Recommended Books: O’Reilly’s Windows (XP/Vista) Hacks, Windows (XP/Vista) Annoyances

4.3 Virtual Memory


Overviews: http://en.wikipedia.org/wiki/Virtual_memory, http://support.microsoft.com/kb/555223

4.4 Physical Memory (and PC Components)


PCGuide – Introduction to the PC: http://www.pcguide.com/intro/index.htm
PGGuide – Systems and Component Reference: http://www.pcguide.com/ref/index.htm
Web Resources – continued
4.5 BONUS TOPIC – Boot/Startup Optimization

Microsoft System Configuration Utility (MSCONFIG.EXE)


• Overview: http://en.wikipedia.org/wiki/MSConfig
• How Troubleshoot Using: http://support.microsoft.com/kb/310560
• “Purge the Startup Files”: http://www.extremetech.com/article2/0,2845,1840082,00.asp

Software to Optimize Startup:


• CCleaner: http://www.ccleaner.com
• Glary Utilities: http://glaryutilities.com/gu.html
• Startup Cop Pro: http://www.pcmag.com/article2/0,2817,2346165,00.asp

BONUS TOPIC Physical Maintenance


• Keeping Your PC Healthy: http://www.extremetech.com/article2/0,2845,1840074,00.asp
• PCGuide System Care: http://www.pcguide.com/care/index.htm
• PGGuide Maintenance Schedule: http://www.pcguide.com/care/pm.htm
Thank You for Attending!

Feedback:
If you liked what you saw today, please drop us
a note at:
administration AT westlandlibrary.org

Tell us what you liked, disliked, and if you would


like to see additional computer classes like this
at the Public Library of Westland.
(If you would like to see more, then please kindly let us
know the topics you would like to see in the future)

You might also like