Total Pageviews

Thursday, 23 April 2009

Reinstall Windows XP On Your Computer


Installing Windows XP is the easy part. The task is pretty much a matter of "set it and forget it." You do need to make sure that your system is set up to boot from the CD drive first, so you can boot from the Windows XP disc. If you are uncomfortable or don't want to be bothered with the BIOS setup, you can simply let the CD auto-play while you're in Windows. You choose whether to repair Windows XP or to do a fresh installation of it.
A fresh installation will wipe out all your data and any applications that were loaded—everything from Microsoft Office to the Sun Java engine. Repairing the OS will keep all your current data but replace anything that might be corrupted or missing. So while a repair can fix problems, it won't provide the same performance benefits you get from a new installation.
Once started, the setup program will run on its own for the most part, requiring your input only a few times—for example, to enter the 25-digit activation code, name the system, and choose which options you want installed. If you are unsure of anything, you will usually be safe choosing the default options. And you can install features and change any of your choices anytime after the Windows XP installation completes.
If your system came with Windows XP preinstalled, you may not have a traditional Windows XP installation CD. You probably have the system vendor's recovery CD, which provides an image of how your hard drive was set up when you took your PC out of the box. Reinstalling from a recovery CD is usually a simple procedure. Be aware: The recovery process is almost always a fresh installation.
Typically, the recovery CD is a bootable disc. Again, your CD drive should be set to boot in the BIOS (but if your computer manufacturer included a bootable CD, you're probably all set). Some recovery CDs can also be executed in Windows. Either way, simple on-screen instructions will guide you through the process.
Some computer makers don't include physical recovery discs. Instead, the recovery information may be stored on the hard drive on a separate, hidden partition. During boot-up, there will be an option—usually a few keystrokes—to enter the PC into recovery mode. This option has the disadvantage of using up hard drive space, and if your problems happen to be related to the hard drive, you might not be able to run the recovery process. The upside is that this type of recovery is often more convenient, and the process is faster.
After reinstalling Windows, remember to run the Windows Update. Microsoft is constantly posting important security patches and enhancements that need to be applied.

How To Prevent Spyware Attacking Your Computer


Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. It ties up bandwidth, slowsdown CPU speed and generally is a nuisance.
In its more malicious forms, it can disrupt the PC so muchthat it is unusable; it can run up modem bills, it can spamor send copies of itself to everyone in your address bookand it can download pornographic material to your PC.
The last is probably the one most likely to make everyonestand up and take notice. Downloading porn at the officecan get you fired, downloading child porn anywhere can getyou arrested.
The only way to keep these and all the other problemsassociated with spyware from infecting your life anddisrupting your activities is prevention. As the oldsaying goes, an ounce of prevention is worth a pound ofcure.
There are numerous programs available (both for free andfor pay) that offer protection from spyware and its relatedcohorts. Most free programs remove spyware that's alreadybeen downloaded and installed to your machine, such as Ad-Aware, one of the first original anti-spyware programs.
The free version requires that you scan to capture andremove spyware. The pay for version includes a real-timescanner that actually prevents spyware from downloading orinstalling itself.
There are numerous other products on the market, but don'tbe taken in by their pronouncements of being anti-spyware.Be wary, a few of the free programs are just spywarethemselves.
Security for your PC at the home includes using up-to-datevirus software, installing an effective firewall, employingreputable anti-spyware tools, making sure all patches andbeing sure to install all updates for the operating system.The best thing to do is to avoid risky online behavior orthe downloading of every free offer that literally "popsup".
Never download anything from an unknown source. A lot ofhome PC users can find their machines besieged by problemsbecause they downloaded something they weren't sure aboutor just assumed was safe. Don't assume, be sure. You caneven check security settings for different websites youvisit. Be sure what you're downloading is from a reputablesource.
You wouldn't invite just anyone who knocked on your doorinto your house; you shouldn't let any file or program intoyour computer. Spyware at its best is a nuisance, and apotentially dangerous and damaging element that can costyou real time, and worse of all, money. ===========================================================Discover all you ever wanted to know about spyware. Latestdiscovery methods, latest incoculation treatments, latestremoval techniques. Click for useful info and dailyupdated blog of spyware news and articles.http://www.spyware-revealed.com/anti-spyware.html

3 Simple Ways To Save Money When Buying A New Computer!


Looking to buy a new computer?
Overwhelmed by all of the options available to you?
Stressed by the high cost of computers today?
For most people, buying a new computer does not have to be as stressful as buying a new car. Nor does it have to be as expensive. If you're like most people, and you have a limited budget for buying a computer, then you need to try to get as much computer for your money as possible.
Here are 3 simple ways anyone can save money when buying a new computer:
1) Shop around for best deal.
Sounds pretty obvious. But many people don't realize they don't need the fastest, most expensive computer with the most "extras". In fact, if you are already using an older computer, even the least expensive new computer will be a big upgrade. If you don't know a lot about computers, you can learn a lot by shopping around. Ask lots of questions, compare prices, compare features, then find the best price. Shop at your local electronics store, and look for the best deals online. You'll be surprised at how much money you can save by shopping around!
2) Install your own "extras"
Many computers you will find in a store have a lot of extra software already installed. While this is convenient, it is not always the best way for you to save money. Also, while many of these extras sound good, you don't always need them. You can often find better deals by shopping around separately for your own software extras (such as a word processor, anti-virus, popup blocker, spyware removal, games, etc). And some of these you can get for free. So before you buy the "fully loaded" computer, ask yourself if you really need all the extras, then shop around to see if you can buy a scaled down computer - and get the extras yourself for much less!
3) Don't buy extended warranty
If you are not a computer "techie", the extended warranties offered by the computer retailers often sound like a good idea. After all, who wants to be bothered paying for service on a computer after you buy it. But keep in mind that most computers come with a warranty, and most computer problems will either happen at the beginning (when you still have the warranty in effect) or much later (when it might be cheaper to buy a new computer). Technology changes very quickly these days. So consider whether or not it's worth the inflated price of the extended warranty. And, if you really feel you need the extended warranty, then ask to purchase it at a lower price. Not all retailers will negotiate on the warranty, but some will. And whether you buy the extended warranty or not, make sure you back up all your files periodically, just in case!
If you have an unlimited budget, consider yourself lucky. And if you do business on the computer, make sure you get what you need, while trying to keep the price down. At any price, buying something that does not fit your needs is not a good deal.
Hope you find these tips helpful, and happy computer shopping!About the Author
Kris Bickell is the owner of Hi-Speed-Internet.com, a helpful site for consumers comparing high speed internet services. For information on high speed DSL, Cable, and Wireless Internet, visit: http://www.hi-speed-internet.com/, and sign up for the free email course "5 Simple Ways To Increase Your Computer Speed". © 2005 Hi-Speed-Internet.com

15 Household Ways To Protect Your Computer From Viruses


Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new ones a day, are the electronic version of terrorists. Their goal is to inflict havoc and destruction on as many people as possible by disabling, stealing, damaging, or destroying computer and information resources. Often, they have no specific target in mind, so no one is safe. If you access the internet, share files or your computer with others, or load anything from diskettes, CDs, or DVDs onto your computer, you are vulnerable to viruses.
Fortunately, there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.
Defining Viruses:
A virus is a small computer program that can copy and spread itself from one computer to another, with or without the help of the user. However, viruses typically do more than just be fruitful and multiply, which is bad enough in itself because it hogs system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they cannot deliver their payload until an unsuspecting user does something to make the virus execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with the .exe (executable) extension.
Catching a Virus:
Most viruses are spread through e-mail attachments because it's the easiest way to do it. Although Macintosh, Unix, and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Because of the popularity of this software, hackers get maximum bang for their buck, and they probably get some satisfaction from continually reminding Microsoft that being big doesn't mean you're perfect.
Solution 1: Anti-virus Software
Your first line of defense is to install anti-virus software. To be extra safe, also install firewall software, which is now included in some anti-virus packages. This software can scan all of your drives for viruses and neutralize them. Here are some features to consider when evaluating anti-virus software.
- Compatibility with your operating system - Make sure the software works with your system, particularly if you are using an older operating system like Windows 98.
- Firewall software - If it's not included, find out if it's available. If you must, buy it from another vendor.
- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.
- Automatic, frequent updates - Because new viruses appear every day, you'll want regular updates. It's even better if they occur automatically when you connect to the internet. If automatic updating isn't included, you'll have to check the vendor's website and download updates yourself. This is vitally important, because you will not be protected from new viruses if your software is out of date.
- Disaster recovery - Software with a recovery utility to help you get your system back to normal after a virus attack is always good to have.
- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.
- Technical support - It's a good idea to select a package that offers free technical support, either online or through a toll-free number. If you're ever felled by a virus, you may need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).
Solution 2: The Virus Scan
If you receive a particularly juicy attachment that you're dying to open, save it on your Windows desktop and run your anti-virus software on it first. To do this, click once gently on the file on your desktop ... don't actually open it ... then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.
If it's infected, your anti-virus software may neutralize it, or at least tell you the attachment is too dangerous to open. On the other hand, don't feel guilty if the very thought of saving a potentially damaging file anywhere on your system is enough to quell your eagerness to open it and make you delete it immediately.
Solution 3: Delete first, ask questions later.
When in doubt about the origin of an e-mail, the best thing to do is delete it without previewing or opening it. However, some viruses, such as Klez, propagate by fishing in people's address books and sending themselves from any contact they find to another random contact. You can spread a virus just by having people in your address book, even if you don't actually e-mail them anything. They'll receive it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the internet, e-mail viruses often tempt victims by using sexual filenames, such as nudes.exe. Don't fall for it.
Solution 4: Beware of virus hoaxes
E-mails warning you about viruses are almost always hoaxes. You may be tempted to believe them because you typically receive them from well-meaning friends, who received them from friends, etc. These e-mails themselves usually aren't viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and forwarded them merrily on their way as a sick joke.
The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward it to everyone in your address book, and they THEY do it, and this goes on long enough, you could bring the internet to its knees. If you ever want to verify a virus warning, your anti-virus vendor may have a list of hoaxes on it website. It's in the business of providing the fixes, so it will know which viruses are real.
Solution 5: Beware of filename extensions
The extension of a filename is the three characters that come after the dot. Windows now defaults to hiding filename extensions, but it isn't a good idea. Just being able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.
To see filename extensions in all your directory listings, on the Windows XP desktop, click Start button Control Panels Folder Options View Tab. Clear the check box for Hide extensions of known file types. Click Apply OK. System files will still be hidden, but you'll be able to see extensions for all the files you need to be concerned with. Viruses often live on files with these extensions - .vbs, .shs, .pif, .Ink - and they are almost never legitimately used for attachments.
Solution 6: Disable the .shs extension
One dangerous extension you can easily disable is .shs. Windows won't recognize it and will alert you before attempting to open an .shs file. The extension is usually just used for "scrap object" files created in Word and Excell when you highlight text and drag it to the desktop for pasting into other documents. If this isn't something you ever do, or you have Word and Excell 2000 or later, which allow you to have 12 items on the Clipboard, click the Start button Control Panel Folder Options File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete Yes Apply OK.
Solution 7: Dealing with double extensions
When you turn on your extensions in Windows, you'll be able to detect viruses that piggy-back themselves onto innocent looking files with a double extension, such as happybirthday.doc.exe. NEVER trust a file with a double extension - it goes against Nature.
Solution 8: Beware of unknown .exe files
A virus is a program that must be executed to do its dirty work, so it may have an .exe extension. Unfortunately, this is the same extension used by legitimate program files. So, don't panic if you find files named Word.exe or Excel.exe on your system - they're your Microsoft software. Just don't EVER open any file with an .exe extension if you don't know what the file's purpose is.
Solution 9: Watch out for icons
Viruses in attachment files have been known to assume the shape of familiar looking icons of text or picture files, like the wolf in the hen house. If you recieve an unexpected attachment, don't open it without first running it through your anti-virus software.
Solution 10: Don't download from public newgroups
What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone's bound to download it and get the virus going. Don't download files and programs from newsgroups or bulletin boards, or open attachments sent from strangers in chatrooms ("Let's exchange pictures!") without first scanning with your anti-virus software.
Solution 11: Avoid bootleg software
This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist it! Likewise, be careful about accepting application software from others. You don't know where it's been, and what may have started out as a perfectly clean package could have become infected during installation on someone else's infected computer.
Solution 12: Protect macros in MS Word, Excel, and Powerpoint
A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief as changing file types from text files or spreadsheets into templates, locking up keyboards, and deleting files. Word, Excel, and PowerPoint come with macro virus protection. To make sure yours is activated, open each application, then click Tools menu Macro Security. On the Security Level tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you may find that the steps of this procedure are unavailable becasue the virus has disabled them. In that event, run a virus scan on your system to see if your anti-virus software can kill the virus.
Solution 13: Use passwords
If you share your computer, it's a good idea to assign everyone a password. Passwords should be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. To assign passwords in Windows XP, click the Start button Control Panel User Accounts. Follow the prompts to assign/change passwords.
Solution 14: Update application software
Microsoft constantly issues patches for the security holes in its operating system and applications software. however, don't be lulled into complacency if you have Windows Update automatically checking things for you. Update checks for patches to repair bugs in the operating system, not for security problems.
To get the latest security hotfixes (as Microsoft calls them), visit
www.microsoft.com and look for hotfixes for all your Microsoft software, particularly Outlook and Outlook Express.
Microsoft also has a free downloadable package called Microsoft Baseline Security Analyzer (MBSA) that scans your system for missing hotfixes. It works with Windows 2000 and XP Home and Professional only. It doesn't support Windows 95, 98, or ME.
To download the MBSA, go to the TechNet section of the Microsoft Website. Be warned that the information is written in techie language, so you may find it daunting.
Last Words:
Now that you know some ways for avoiding and dealing with viruses, let's wrap things up with some solution you've probably heard before but have ignored.
- Back up your files regularly - If a virus crashes your sytem, you'll feel much better if you've got backup copies of all your important files. Make the backup copies on a media that's separate from the computer, such as on diskettes, CDs, or zip disks. Scan them for viruses before you put them away to make sure they aren't infected. If they are, they'll do you no good if you ever have to use them because they will just transmit the virus right back onto your computer.
- Make a boot disk - Create an emergency boot diskette before you have a problem so you can start your computer after a serious security problem To make a boot diskette with Windows XP, put a blank floppy disk in the drive. Open My Computer, then right click the floppy drive. Click Format. Under Format options, click Create an MS-DOS startup disk. Click Start. Keep the disk in a safe place. With luck, you'll never need to use it.
- Turn off you computer - DSL and cable connections that are "always on" may be convenient, but you should always turn off your computer when its not in use. Hackers can't get to a machine that's powered off.
You are free to reprint this article in its entirety as long as the clickable URLs remain in the "About the author" section. About the Author
Marv Ko has many years of experience in business software and security. He is the editor of
http://bestarticles.biz and also oversees http://best4biz.info Email: editor@bestarticles.biz

10 Critical Steps to Protecting Your Computer on the Internet


Spyware, viruses and worms... oh my!
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security- You have no firewall installed and should download one ASAP.
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are http://www.hotmail.com/, http://www.gmail.com/ and http://www.yahoomail.com/.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
About the Author
John Lenaghan offers easy-to-understand advice at the Computer Help Squad website. Find out more about these 5 steps - sign up for our newsletter and receive your free 5-part guide at http://www.computer-help-squad.com/5steps