Set up your Computer for Safety

Size: px
Start display at page:

Download "Set up your Computer for Safety"

Transcription

1 Conventions used in this document: Objects to be clicked on with the mouse will be shown as Icon or. Keyboard keys that must be pressed will be shown as Enter or Ctrl. Cross Reference Links will be shown as Appendix A. Tips will be shown in this format. Indicates additional detailed information for the subject is available via a link. The table of contents is interactive. Click on any topic to go directly to that section of the document. You can return to the table of contents at any time by holding down the Ctrl key while you press and release the Home key (Ctrl + Home). Table of Contents INTRODUCTION... 3 HOW A COMPUTER CAN BE ATTACKED... 3 EQUIPMENT FAILURE... 3 HACKING... 3 MALWARE... 3 Viruses... 3 Spyware... 4 Ransomware... 4 Drive by Downloads... 4 BYPASSING PASSWORDS... 4 OPEN WI-FI PHISHING, IDENTITY THEFT, AND ONLINE SCAMS AND FRAUD... 4 PROTECT YOUR COMPUTER FROM ATTACK... 4 BACKUP YOUR COMPUTER... 4 Backup Options... 4 System Backup... 4 Disk or Partition Backup... 5 File Backup... 5 Full Backup... 5 Incremental or Differential Backup... 5 Continuous Backup... 5 Scheduling... 5 Storage Locations... 5 Emergency Disk... 5 Other Features... 5 Backup Programs... 5 Acronis True Image... 5 EaseUS Todo... 5 Save the Media and Information for your Computer... 6 PROTECT YOUR WIRELESS NETWORK... 6 Router Admin Password... 6 Enable Wireless Security... 7 ANTIVIRUS PROGRAM... 7 Windows Antivirus... 7 Microsoft Security Essentials (Windows 7 Only)... 8 Windows Defender (Windows 10 and 8.1 Only)... 8 Alternative Antivirus Programs... 9 Online Purchase Security... 9 Secured Webpage... 9 Unsecured Webpage Subscription Antivirus Programs Free Antivirus Programs Verify Antivirus Status SYSTEM RESTORE TURN ON A FIREWALL TURN ON WINDOWS UPDATES DOWNLOAD MALWAREBYTES METHODS USED TO RECOVER FROM A PROBLEM RESTORE A BACKUP Restore a System Backup Page 1 Revised 9/16/17

2 Restore a Data Backup RUN AN ANTIVIRUS SCAN MALWAREBYTES SYSTEM RESTORE WINDOWS RECOVERY OPTIONS Reset This PC Keep my Files Remove Everything Reinstall Programs and Devices Go Back to an Earlier Build or Windows Version Advanced Startup Startup Repair Startup Settings Safe Mode Clean Installation of Windows Page 2 Revised 9/16/17

3 Introduction Computers have never been so powerful and fun to use as they are today. The variety of things you can do is enormous. The internet is vast and you can find almost anything you want. We are connected to the world in so many ways. The bad news is that it has never been riskier to use a computer. The news is filled with stories of data breaches, scams, malware, and hackers. These are real time threats. The good news is that you have an excellent chance of avoiding all of these problems. My goal is to show the ways that you can protect yourself and still do want you want on the computer. You will have to establish some protection on your computer as well as adapt to some new ways of thinking as you use a computer. The methods I discuss are supported by experts and they are the same methods I use when I am on a computer. None of these methods are beyond the capability of the average computer user. I will include step by step instructions where needed. In my opinion none of these steps are optional. Most of the problems I have encountered while fixing another person s computer stemmed from their failure to implement one of these steps. As Ben Franklin said An ounce of prevention is worth a pound of cure. Who knew Ben was so computer savvy. To be realistic, we must realize that no protection is perfect. Even though we do everything right, there is still the possibility that something may slip through. Because of that possibility we will also discuss how to recover from an event that adversely affects your computer. You can restore a computer to full operation even if you are affected by a major event. My examples will be shown with screenshots from Windows 10. The procedures are very similar, and in some cases identical, in both Windows 7 and 8.1. The only real difference is the look of the dialog boxes used. Windows XP and Windows Vista will not be discussed. The Microsoft Corporation had previously discontinued support for Windows XP and will has discontinued support for Windows Vista as of April 11 th, Windows XP and Vista will not receive any security updates. They will be at high risk when connected to the internet. In almost all cases, I would recommend the purchase of a new computer if you are currently using either Windows XP or Windows Vista. This document covers steps you should take immediately. If you think you have already taken some of the steps, you should verify they are in fact set and working correctly. These steps will protect your computer on a continual basis and require very little maintenance on your part. You should never turn off any of these methods. Even though they may occasionally interrupt you with a warning you should be glad they are doing their job. Respond to any warnings or notifications and then continue with what you were doing. How a Computer can be Attacked The bad guys out there can employ a number of methods to attack you and/or your computer. Some methods will directly attack the computer and attempt to gain access and take it over. Other methods will attempt to intercept information transmitted from your computer. And many methods will try to trick us into performing an action that will instigate an attack. The reasons behind why a bad guy would want to attack your computer vary widely. Some want to steal from you and others simply want to cause harm and disrupt your use of the computer. The bottom line is that no matter the reason every attack can cause you harm and you need to protect yourself. Protecting yourself means setting up defenses that block attacks as well as being smart while using the computer. Equipment Failure While technically not an attack, computer equipment can fail. Many failures can be easily fixed by replacing the component that failed. The one type of component that cannot be easily handled with a replacement is a storage drive attached to your computer. This is because if a storage drive fails all of the information stored on the drive can be irretrievably lost. If your Primary hard drive fails, you will lose not only any data stored on it but your entire Windows operating system. The computer will become inoperable with the loss of the Windows OS. Hacking A hacker is a person who tries to gain direct access to a computer. They employ a number of methods and tricks. A hacker can exploit a weakness in a home network to gain access to all computers using the network. They can exploit an unsecured Public network to gain access to your computer. They can also trick the user into letting them gain access. For example, they can contact a computer user by phone or and convince the user that their computer has a problem that they can fix. They then ask the user if they can access the computer to fix the problem. Once they have your permission, they can do almost anything they want from fixing a non-existent problem and charging you for their services to installing malware programs or stealing information. Malware Malware is a program that is installed on your computer. Once installed it can perform a great variety of nasty operations on your computer. Malware is almost always activated by clicking on a link in an , opening an attachment to an that contains the malware, or visiting a website that has the malware loaded on the site. Viruses A computer virus is similar to the Flu virus. It can infect a computer and then replicate itself and spread to other computers. Most viruses are spread through attachments. Once it has infected a computer it will wait until a specific set of conditions activates it. Once activated it will run a program that has been hidden on the computer. The program then will perform whatever task it was designed for. Page 3 Revised 9/16/17

4 Spyware Spyware is a program that can be installed on your computer without your knowledge. Once installed and activated it will spy on your activities as you use the computer. It may track what websites you visit. It might try to record your passwords as you log into the websites. It could search your computer for sensitive files and send them to an outside party. Ransomware Ransomware will lock all of the files on your computer by encrypting them with a password. It will leave enough of the system files workable so that you can be contacted to extort you for a ransom payment to unlock your computer. Even if you pay the ransom they may not unlock your files. The encryption is unbreakable. Drive by Downloads A drive by download is delivered to you when you visit a website that has the malware ready to self-install on your computer when you visit the site. They will try to trick you into visiting the website so the download can be accomplished. Methods used to trick you include links in s, pop-ups, etc. Bypassing Passwords The bad guys will try to gain access to your computer by bypassing your passwords. They can try to guess your password hoping it is a weak password that is easily broken. They can check to see if you have not changed and continue to use any default passwords. They can intercept a password such as for your and try it on any other accounts you have. Open Wi-Fi Open wi-fi is any unprotected wireless network. A Public network, such as the one at the Senior Center, is an open wi-fi. Even if a Public network is password protected it is still open because anyone can get and use the password. Your home wireless network is also open unless you activate wireless security and change the default username and password for the network. Phishing, Identity Theft, and Online Scams and Fraud These are legion and are all attempts to trick you into giving out personal information or to get your money. These attacks can come in a number of ways including phone calls and s. The attacker will pretend to be someone you would trust such as: An institution where you might have an account such as your Bank, Brokerage, Retail store, etc. A trusted organization such as the IRS, Police, County Clerk and Recorder. A friend or relative. A Catfish, who is a person who pretends to be someone else and creates a false identity on the internet. They then will try a number of scams or cons. Just watch Dr. Phil to see the results of some of these scams. And way too many more to list. Protect Your Computer from Attack All of the different methods the bad guys use can be mitigated. I recommend you implement every one of the procedures outlined in this section. Some of the procedures will require some work to get implemented. However, I can assure you that whatever time you invest up front will pay you back in spades if you ever experience an attack. Recovering a computer from an attack can cost you in both time and money. Prevention is better than recovery. Backup Your Computer A backup is creating a copy of the files on your computer so that they can later be restored. A backup of your computer is the most efficient protection you can set up for your computer and can help you recover from both a Storage Drive failure and a Major Attack. With a backup, you can restore your computer to full working order without loss of data and can recover your computer from almost any problem. However, a backup is useless if you do not create it before you have a problem. The backup should also be updated periodically to keep it current with any changes to your computer. A backup is not simply using the Copy and Paste commands to save duplicates of some personal files. You will use a backup program designed specifically to manage your backups. A backup program can create an exact image of every file and setting on your computer. This includes every file and setting for the Windows Operating System and every computer program installed on your computer. Backup Options A backup program has operations that will help you create and manage your personal backups. These operations are complex but all you have to do is set up an operation and the backup program will handle the rest. The operations are pretty standard throughout the industry but different programs can offer variations and additional features. System Backup A system backup will create an image file of the drive partition that contains the operating system for the computer. Only the partition will be backed up and any other partitions on the Storage Drive will be ignored. A better alternative is a Disk Backup as described in the next section. Page 4 Revised 9/16/17

5 Disk or Partition Backup A storage drive can contain many partitions. Partitions can be visible or hidden. If you are backing up your Primary Hard Drive, the one with Windows installed, you will want to be sure that you back up all of the partitions on the Drive. A disk backup will let you select all or some of the partitions to be backed up. If you have a separate hard drive or partition dedicated to storing data files, you can use the Disk or Partition Backup method to create a File Backup. File Backup A file backup (data backup) will let you select precisely which files and folders you want to include in the backup. This option is used to back up your data and personal files. Full Backup The amount of time required to complete a backup will depend on the amount of data in the backup. A full backup will include everything selected for the backup. Each time you recreate the backup it will include everything again. Incremental or Differential Backup An incremental and a differential backup will begin with a full backup. Then each update to the backup will only include the data that has changed since the last update. This will substantially reduce the time required to complete an update. Continuous Backup Primarily used for backing up data files and folders. Once set up the selected files and folders will be updated continuously, usually at five minute intervals. Only the changes are updated. The five-minute updates are later consolidated into larger time intervals. You can go back in time to locate any file or folder. Scheduling With the exception of a continuous backup, you can schedule when your backups run an update. You specify the frequency and the time updates are to occur. At the specified time the backup will begin automatically and work in the background. You can continue to use the computer while the update is in progress. If the computer is turned off during the scheduled time for an update, the update will begin the next time the computer is turned on. Storage Locations A backup cannot be stored on the same Storage Drive the information is stored on. Depending on the program you use you can select any of these locations to store a backup on: Emergency Disk A second internal hard drive installed in your computer Good choice but may not be available. An external hard drive connected to the computer Good choice. Network Attached Storage (NAS) is a large Storage Device attached to your home network Good choice. Cloud Storage Service is usually a paid service and your backup is stored on an external server owned by the service Good choice. DVDs can be used but are cumbersome and costly Poor choice. Flash Drives can also be used but tend to be expensive compared to an external hard drive and can be lost Poor choice. An emergency disk can be created using a blank disc and your DVD burner. The back-up program will create the disc for you. The disc will contain the files needed to start up your computer and load a copy of the backup program. With the program, you can restore a backup even if your computer will not boot up by itself. I recommend you create your emergency disc right after you install your backup program. You label the emergency disc and store it until needed, which is hopefully never. Other Features A variety of other features or tools may be included with your program. Backup Programs A true backup is a complex operation and there are programs designed specifically to help you easily back up a computer. Backup programs can differ in the features they offer. I recommend you use either one of the 2 backup programs we will discuss here. There are other programs available but I have personally used these programs. They are also relatively inexpensive, safe, and can be managed by an average user. Each program offers extensive help files and has technical support available. Acronis True Image True Image is a backup program produced and marketed by Acronis. It is a full featured program that offers all of the latest technology. EaseUS Todo Todo is available as a free or a paid backup program that has all of the main features needed to protect your computer. It does not have as many features as True Image. Page 5 Revised 9/16/17

6 Right click the link and select the Open link in a new window option to view instructions on how to Use EaseUS Todo. Save the Media and Information for your Computer You should save and keep together all of the information that comes with your computer or any device or program you install: User manuals and installation guides. CDs, DVDs, or Videos. s that include Product Codes and download links or instructions. The username and password for any account you set up with any company you purchase you purchase a computer device or software from. Companies use these accounts to keep track of all your transactions with them. Accessing your account online will let you view that information and how to reinstall the program or device on your computer. There are many circumstances that may cause you to have to reinstall a program or device. If you have the original information and media available either at home or with a company s account, it will make the process go much faster and easier. Protect Your Wireless Network Your router is the electronic device that connects you to the internet. It is located in your house between your computers cable and your internet cable or phone line. If you do not have a wired computer, then it is connected at the end of your internet cable or phone line. Many routers are configured for both your wired and wireless computers. You may have a wireless router even if you are not using a computer with wireless capabilities. There are many styles of routers but they all have connections on the back to plug in your internet line and your computer and other devices. Router Admin Password Routers are protected by a password called the admin password. The admin password is supposed to protect you from anyone else from getting access to the router. If another party gains access to your router they can revise the settings and take control of your router and any computers connected to it. The admin password protects the router only and does not protect your wireless network. Routers from the manufacturer are shipped with a default password. Some companies use the same default admin password for every router and some will use a limited number of different passwords as the default. The problem is that everyone knows the default passwords and can access your router and your home network unless it is changed. Many routers use the username admin and the password password as the default. Obviously, this is not very secure. I highly recommend that you immediately verify if you are using the default admin and password and change your router s admin name and password to a secure login with a strong password. As with all passwords, create a strong password and write it down and keep it in a safe place. It may be a long time until you need it again. A strong password can be created by following these guidelines: The password should be at least eight characters long. It should not contain your user name, real name, or company name. It should not contain a complete word or a compound word. It should be significantly different from any other previous password you have created. Never use the same password for multiple accounts. And it should contain a mixture of uppercase letters, lowercase letters, numbers, and symbols. Right click the proper link and select the Open link in a new window option to view instructions on how to change your admin name and password for: Xfinity Internet. CenturyLink Internet. AT&T Internet. Instructions to change the username and password should also be available in the User s Manual included with any router you purchase. You also have the option to contact technical support for the manufacturer of your specific router. Page 6 Revised 9/16/17

7 Enable Wireless Security Routers that have a wireless capability have a built-in security protocol for your wireless network. Wireless security is separate from router security that is secured by your admin password. The wireless security protocol encrypts your home wireless network and protects it from intrusion. Almost all newer routers and routers leased from your ISP (Internet Service Provider) are wireless capable. This security protocol is usually enabled in any router leased from your ISP. However, wireless security is not always enabled, by default, in routers you purchase yourself. Wireless security is protected by a passphrase (similar to a password) that has to be entered for any computer that wants to access your network wirelessly. Routers are shipped with a default wireless passphrase that is the same for every router of the same make. The default passwords are public knowledge and can be used by anyone to access your wireless network. If your router has wireless (Wi-Fi) capabilities, you will want to verify that the best wireless security protocol is enabled and secure your wireless network with a strong passphrase. Do this even if you are not utilizing the wireless capabilities yourself. If you do not have a strong passphrase or are still using the default passphrase, anyone can use your wireless network including your neighbors. Follow the same guidelines for creating a strong password to create a strong passphrase. Only give the passphrase to people you trust and that will be accessing your network while they are in your home. Each computer used by your family will need the passphrase to use the wireless network. Once the passphrase is entered into a computer it will be remembered and entered automatically and the computer will be logged into the network in the future. You can change the passphrase if you feel that it has been compromised. Computers will simply ask for the new passphrase the next time it tries to log in. The passphrase is not required for any computer that connects to your router with a cable. Again, I highly recommend that you immediately enable your wireless security and create a strong passphrase. As with all passwords, create a strong passphrase and write it down and keep it in a safe place. You will need to enter the passphrase for any new computer accessing your network or if the passphrase gets removed from your computer. Right click the proper link and select the Open link in a new window option to view instructions on how to enable wireless security and change the current passphrase: Wireless Security for Xfinity Internet. Wireless Security for CenturyLink Internet. Wireless Security for AT&T Internet. Instructions to enable wireless security and change the passphrase should also be available in the User s Manual included with any router you purchase. You also have the option to contact technical support for the manufacturer of your specific router. Antivirus Program Antivirus programs help protect your computer from viruses and any other malware. Antivirus programs scan your incoming communications and block any that they think pose a threat. Manufacturers of antivirus programs routinely research the threats that may attack your computer. They develop methods to identify the threat. Once identified, the antivirus program will block the threat before it can get to your computer. Only one antivirus program may be installed and active on your computer at a time. The identification method for the potential threat must be available on your computer. To accomplish this, a file called a definition file will be periodically downloaded to your computer. The definition file contains all of the new threats and how to identify them. Your antivirus program will then use the definition file to help identify any threats. There are a small number of antivirus programs that identify the threats before they are sent to your computer. These programs do not download a definition file to the computer. They use a definition file on the internet and block the threats before they are transmitted to you. In either case your antivirus program must be active and current in order to be effective. If you are using a paid subscription antivirus program you must keep your subscription active. Be sure to renew your subscription when notified by your provider. Whether you are using a subscription or free antivirus program you must allow the definition files to be downloaded when they are sent to you. This is best accomplished by allowing the automatic update option in your antivirus program. Unfortunately, some people get upset because an antivirus update may take a while to download and install. As a result, they turn off automatic updates or uninstall their antivirus program. Do not take these actions. The few minutes it takes to complete an antivirus update is a drop in the bucket to the hours and cost it may take you to clear out a virus or malware that has infected your computer. Antivirus programs run in the background and start up when you start Windows. If they are running in the background they can be viewed in the notification area at the right-hand side of the Windows taskbar. Windows Antivirus Windows 7, 8.1, and 10 have a free antivirus program available from Microsoft. The Windows antivirus programs are effective but are very basic and offer no additional features. Windows XP and Windows Vista are no longer being supported by Microsoft and the free Windows antivirus is not being updated. You can install another antivirus program to use in place of the Windows antivirus programs. You do not have to uninstall either Windows antivirus to install an alternative antivirus program. Windows 8.1 and 10 will automatically deactivate Windows Defender when an alternative antivirus program is installed and activated. In Windows 7 you must manually deactivate Security Essentials in the settings of Security Essentials for your alternative antivirus to work properly. Page 7 Revised 9/16/17

8 Microsoft Security Essentials (Windows 7 Only) Security Essentials is updated via the automatic Windows Updates. Security Essentials has to be downloaded and installed if it is not installed already. Security Essentials is available for download at Microsoft Security Essentials for Windows 7. There are both 32 and 64 bit versions available. You must download a version compatible with your computer. Right click the link and select the Open link in a new window option to view instructions on how to view your computer s System Information. Once Security Essentials is installed, it will start up automatically when you turn on your computer and will run in the background. You can access the program by activating the icon located in the Hidden Icons area on the taskbar. Windows Defender (Windows 10 and 8.1 Only) Windows Defender is installed with your installation of Windows 10 or 8.1. It will activate itself anytime it detects that another antivirus is not running on your computer so you will not lose protection. If you install another antivirus program and activate it, Windows Defender will automatically deactivate so that it will not be in conflict with your chosen alternative antivirus. Windows Defender is also automatically updated via Windows Update. Windows Defender will start up automatically when you turn on your computer and will run in the background. You can access the program by activating the icon located in the Hidden Icons area on the taskbar. If the Defender icon is not displayed, you can open Defender by typing Windows Defender into the Cortana search box on the search bar. Then activate the icon that appears in the results. Page 8 Revised 9/16/17

9 Alternative Antivirus Programs If you do not have an antivirus program installed and active on your computer, you can download one from the internet or purchase one at a retail store. There are both free and paid versions available. Free versions have the same full protection from viruses and malware as the paid versions. Paid versions will offer additional features such as a personal firewall. Installation is relatively easy but varies depending on the installation media. If you purchased your antivirus program from a retailer you should have a DVD in the package. Insert the DVD in your DVD player and follow the instructions on the screen. If you download the antivirus program from the manufacturer s website, you will receive one file that will be stored in your designated download folder. Locate the file and double click it to activate it. Then follow the instructions on the screen. Either method will activate an installation wizard. A wizard is a series of screens that will walk you step by step through the installation process. Installation is automatic and you will only see screens that require your input. Fill in any information requested and confirm your options by clicking the positive labeled button at the bottom right of the window to proceed. Online Purchase Security Legitimate online retailers will have encrypted security available on any webpage that will require any sensitive or personal information. The security will protect any sensitive data you enter on a secured webpage. You can verify the security by looking at the address box of the secure page. Do not enter any personal information or purchase online from any online retailer who does not offer security on any page requiring you to enter sensitive information. SECURED WEBPAGE You are safe to enter personal information and credit card numbers on secure webpages. A secure webpage s address will change in the address box when you are on a secure webpage. The prefix of the address will change from http: to https: The s added to the prefix indicates secure. You will not see security until you visit a page requiring sensitive information. Secure webpages usually are available as you are entering information for paying and shipping in the Checkout area. Information pages provided by the retailer are typically not secure as there is no need. You can verify the level of security by activating the button at the left of the address box. This will display additional information about the security including its verification. This information cannot be faked and is guaranteed by the verifier. Page 9 Revised 9/16/17

10 UNSECURED WEBPAGE It is not safe to enter personal information and credit card numbers on unsecured webpages. An unsecure webpage s address will not have a prefix to the address with https: It is normal for the information only webpages to be unsecure. When you verify the level of security by activating the the webpage is not secure. button at the left of the address box, you will be clearly informed that Subscription Antivirus Programs Subscription antivirus programs require an annual fee. The fee is really quite reasonable and can be even less if you purchase a multi-year package or a multi-pc package. If you purchase a subscription antivirus online, you will have to pay online. You can renew and pay online and can even activate automatic renewal. I personally use a subscription antivirus because of the extra features and support they offer. The antivirus installed on my computer is Panda Antivirus Pro. It includes a personal firewall that is more powerful that the default Windows firewall. Panda and Trend Micro antivirus are antivirus programs that verify information prior to it being sent to your computer and do not need to download definition files. They scan all files online before they are transferred to a computer. This process does not slow down a computer in any way. Here are links to some of the largest antivirus companies. Panda Antivirus Norton Antivirus McAfee Antivirus Webroot Antivirus Kaspersky Antivirus Trend Micro Antivirus Free Antivirus Programs Free antivirus programs will give you the same protection against viruses and malware as a paid subscription. The difference is in the features. For many of the different programs you can compare the difference between the free and paid version right on their website. Some companies will offer a free trial version. Trial versions will only run for a limited time. At the end of the trial period you will be expected to purchase the full version. Truly free versions will not have a time limit. They will continue to run and update indefinitely. The links listed here are for only free versions and not trial versions. Microsoft Security Essentials AVG Antivirus Free Avira Antivirus Panda Antivirus Free Page 10 Revised 9/16/17

11 Verify Antivirus Status You can verify the status of your antivirus program by locating its icon in the hidden icons area on the Windows taskbar. The antivirus icon may indicate the status as a tooltip or you may have to right click the icon to find the status on the alternative menu. You can also open the antivirus program from the alternative menu. If your antivirus does not display an icon in the hidden icons area, the program may be disabled or not functioning. If this occurs, try to open the program from the All Apps menu on the Start menu. Once open you can enable your antivirus again. If the program does not open or will not let itself be enabled, you will need to contact the manufacture s Tech Support. You may have to renew your subscription or reinstall the program to resolve the problem. System Restore System restore is a Windows feature that is installed with your installation of Windows. It is available in all supported versions of Windows. System Restore periodically will take of snapshot (image) of the settings of your computer. Each snapshot is called a restore point. If you experience difficulties with your computer after installing a program or changing setting, you can roll back the settings to one of the restore points dated prior to your experiencing the problem. Your files and personal information will not be changed. However, any programs you had installed or settings you may have changed since the restore point was created will be removed. All programs or settings that were in place at the time the restore point was created will not be affected. System Restore is not enabled in Windows 10 by default. Microsoft says that they did not enable it because other features they offer to restore your computer are just as effective and require less space. You can turn on System Restore or verify its status. Right click the link and select the Open link in a new window option to view instructions on how to Turn on System Restore. Turn on a Firewall A firewall is a program that will block many unwanted intrusions into your computer from the internet. Firewalls run in the background and start automatically when you start Windows. Windows includes a firewall that is activated by default. You can also activate a personal firewall. Personal firewalls are usually provided by your antivirus program. If you activate a personal firewall the Windows firewall will automatically deactivate so that you only have one firewall running at a time. To turn on a personal firewall you must open activate the firewall in your antivirus program. Free antivirus programs typically do not have a firewall available. Subscription (paid) antivirus programs will offer a personal firewall in addition to other features they offer that are not included in their free version. If you have any problem activating your personal firewall contact your antivirus providers Tech Support. They will walk you through the steps required. Turn on Windows Updates Windows update is an automated process that will install Windows security updates and other Windows updates. Windows update is enabled by default and should remain enabled to automatically install updates. Windows updates are mandatory in Windows 10 and cannot be stopped. Page 11 Revised 9/16/17

12 Download Malwarebytes A common practice of malware is that it will change settings of the computer. One of the first settings it will change will be to block access to any websites that may help you remove the malware. This would keep you from using your computer to download and install a malware removal program. The solution is to download and install a malware removal program before you have a problem. I recommend the Malwarebytes program available at Malwarebytes Download. Malwarebytes is a program that can attempt to remove malware that has been installed on your computer. Malwarebytes offers a free and a paid premium version. The free version will remove malware but lacks some extra features such as the ability to block malicious websites and Chameleon which prevents malware from interfering with Malwarebytes operation. As of this writing the premium version that has all features was $39.95 for a one year subscription. Reduced prices are available for multi-year or multi-pc purchases. Page 12 Revised 9/16/17

13 Methods used to Recover from a Problem The recovery method you choose will depend on the problem you experienced. Some of the recovery methods discussed will only be available if you have set up the computer as described in the previous sections. Restore a Backup Your ability to restore a backup will be dependent on which type of backups you have created. You must attach to the computer, the external hard drive containing the backup. If you have experienced a hard drive failure you will need to boot up the computer from the emergency disc you created with your backup program. A backup restoration can recover your computer from virtually any problem you have experienced. Restore a System Backup Your system backup may have been created from the System Backup procedure or the Disc and Partition procedure. The restoration of a system backup is the same no matter which procedure was used to create the system backup. The system backup will completely replace all of the information on the hard disc being restored with the contents of the system image file. Because it totally replaces the contents it can recover from: A total hard drive failure. A hard drive failure is indicated when the computer can turn on but is unable to load the Windows operating system. You will only display a black screen. Upgrading to a larger hard drive. A virus that is so persistent you cannot remove it. This includes ransomware that has locked all of your files. Any situation that has corrupted files or settings on the computer that cause it to operate erratically. Note that there are alternative solutions to this problem discussed later. If you are restoring an entire disc you must restore the system backup first. Then you can restore any data backups you have created. Last you can reinstall any programs that are not working properly. Refer to the User s Manual of the program used to create your backup for precise instructions on how to restore your system backup. Right click the link and select the Open link in a new window option to view instructions on how to Restore using EaseUS Todo. Restore a Data Backup You can restore a full data backup or any portion of a data backup at any time. Normally you would only have to restore a full data backup in case of a hard drive failure. The restoration would be done after the system backup is completed. You can restore all or any portion of a data backup to recover select files or folders you may have lost or have gotten corrupted. Refer to your User s Manual of the program used to create your data backup for precise instructions on how to restore your data backup. Most backup programs will let you browse the image file containing your data files and use copy and paste to restore select files or folders rather than restoring all files and folders. To browse the image file: 1. Attach the external hard drive containing the image file to your computer. 2. Using This PC or File Explorer, navigate to the image file. 3. Double click on the image file to open it. Page 13 Revised 9/16/17

14 4. Continue opening folders until you locate the files or folders you want to recover. 5. Select the files or folders you want to recover. 6. Right click on the files or folders you selected and execute the copy command. 7. Navigate to the location you want to copy to and execute the paste command. Run an Antivirus Scan If any malware slips through your antivirus, you can run a manual scan of the computer from your antivirus program. The scan will try to locate and remove or quarantine any malware it finds. You can also schedule a scan to be run periodically. There are typically 3 types of scans available from an antivirus program: Full Scan a full scan will scan the Windows registry and every file and folder on the computer. This can take hours and it is recommended you run this when the computer will not be used. I will run a full scan just before I quit for the day. I select the Shut Down the Computer option so that the computer will turn itself off when the scan is completed. Critical Scan This is a smaller scan that will only scan the critical areas of your computer. Being smaller this scan can take much less time than a full scan. You can also work in the background while the scan is running. Custom Scan Not recommended for the average user. A custom scan will only scan the folders you designate. When the scan is complete the program will report the results of the scan. You can also view the Full Report for details. Malwarebytes If you have previously installed the Malwarebytes program, you can scan the computer similar to the scan done with your antivirus program. Malwarebytes is a more aggressive scan and can search for malware your antivirus may not detect. It will also try to remove or quarantine any malware it finds. Page 14 Revised 9/16/17

15 It is very possible that the malware that has infected your computer may disable Malwarebytes or not allow you to update it to the latest definition files. If this happens then you may have to restore your system from your system backup. System Restore If you change settings or install new software the computer, the software may not operate as expected after the change. This is usually the result of a conflict between the software and the Windows operating system. The solution may be resolved by checking for updates to the software. If an update does not resolve the problem or is not available you may need to restore the computer to the state it was in prior to the new change. System Restore will usually create a restore point before a new software installation is allowed to proceed. A manual restore point can also be created prior to any changes you plan to do to the computer. Returning the computer to a prior restore point will leave all personal files and any programs or settings intact just prior to the restore point. It will remove the software installed after the restore point and any other changes to the computer. You can restore the computer again to any existing restore point including the original restore point if needed. Right click the link and select the Open link in a new window option to view instructions on how to Return to a Restore Point. Windows Recovery Options Windows has a number of recovery options available that can restore your computer. These procedures can be used if you have tried everything you can and still cannot fix a major problem. The average user can do this by themselves. There is no need to take your computer to anyone else and pay to have your computer reset. Microsoft recommends that you use one of these methods in place of using any method from the manufacturer that resets your computer to Factory standards. I recommend that you try to use the system backup you created to restore your computer before resorting to any of these methods. I also recommend you complete a new data backup, if possible, before using any system restore method. Access to the Windows recovery options are available via Start, Settings, Update and Security, Recovery. Reset This PC Reset this PC is an extreme option but should remove any problem you have and will fix any Windows problems. It has two options available that will let select how the reset will be conducted. Keep my Files This option will: Reinstall Windows 10 and keeps your personal files intact. I recommend that you have a current back up your personal files available just in case. Removes any apps you installed beyond the basic Windows apps. Removes any programs you installed. Removes changes you made to settings. Removes any apps your PC manufacturer installed. (If your PC came with Windows 10, apps from your PC manufacturer will be reinstalled.) Remove Everything This option will: Reinstall Windows 10 and removes all your personal files. I recommend that you have a current back up your personal files available just in case. Removes any apps you installed beyond the basic Windows apps. Page 15 Revised 9/16/17

16 Removes any programs you installed. Removes changes you made to settings. Removes any apps your PC manufacturer installed. (If your PC came with Windows 10, apps from your PC manufacturer will be reinstalled.) If your computer restarts and prompts you to confirm that you want to clear the TPM, press a key to follow the prompt. If you're planning to donate, recycle, or sell your PC, use this option and choose to fully clean the drive. This might take an hour or two, but it makes it harder for other people to recover files you've removed. To reset your PC: 1. Open the Recovery page with Start, Settings, Update and Security, Recovery. 2. Activate the Get Started button under Reset this PC. 3. Choose an option from the next window. 4. You will be notified what programs and apps will be uninstalled. Active Next. 5. A summary of actions that will be taken 6. Activate Reset to start the reset. Everything will be done for you by the computer. Reinstall Programs and Devices A reset uninstalls a number of programs and apps. A full listing of those programs and apps will be included in a folder on your desktop. Open the document in the folder and you can view the list. The list will also have links available to the manufacturers websites to help you locate files needed for installation. You will have to reinstall any missing programs or drivers manually. Use your CDs and DVDs to install programs and drivers for your devices that do not work. Go to the manufacturers website for those manufacturers you established an account with and log into your account for program and driver downloads and product codes. Go to the Windows store and reinstall any apps you had previously installed. This is a good time to make sure your computer remains as clean as possible. If there are programs or apps in the listing that you have not used recently you do not have to reinstall them immediately. Definitely do not reinstall those suspect programs that offered to fix your computer or keep it up to date. You know how to do that yourself now. Page 16 Revised 9/16/17

17 Go Back to an Earlier Build or Windows Version A major update to the Windows Operating System is now called a Build instead of a Service Pack. A build will update via Windows Updates. You can also upgrade to Windows 10 from a previous version of Windows. An update or a build may cause problems with your computer or you may just not like how it works. If a problem occurs, you can revert to the previous build or version of Windows. There is a strict time limit in which you can take this action. Currently the limit is ten days. If you cannot go back you will be notified when you activate Go Back. To activate Go back to a previous build : 1. Open the Recovery page with Start, Settings, Update and Security, Recovery. 2. Activate the Get Started button under Go back to a previous build. 3. Select one of the reasons you are going back and confirm the action. 4. Read the information and confirm the action. 5. Read the information and confirm the action. 6. Confirm the action and the rollback will begin Page 17 Revised 9/16/17

18 Advanced Startup Advanced Startup will restart your computer and offer additional recovery options. It also is another way to get to System Restore and Reset this PC. We will only discuss the additional options. To access the Advanced Startup options: 1. Open the Recovery page with Start, Settings, Update and Security, Recovery. 2. Active the Restart now button. 3. The computer will restart and will boot into the Advanced Options rather than going into Windows. 4. Activate the Troubleshoot button 5. The troubleshoot window will open. 6. Activate the Advanced options button 7. The Advanced options window will open Page 18 Revised 9/16/17

19 Startup Repair Activate the Startup Repair button to begin a diagnosis of any problems with your startup routine. If any startup problems are found, Windows will try to repair them automatically. Startup Settings 1. Activate the Startup Settings button to display the Startup Settings window. 2. The available options are listed. 3. Activate the Restart button 4. The computer will restart and display the startup options. Safe Mode 5. Press the key indicated next to the option you want to activate. Options 4, 5, and 6 will boot the computer into safe mode. Safe mode starts Windows in a basic state, using a limited set of files and drivers. It can help you troubleshoot problems on your PC. For example, if the problem doesn't happen in safe mode, you'll know default settings and basic device drivers aren't causing the issue. Option 5 will open Windows 10 in Safe Mode with network capabilities. I recommend this mode because you can access help on the internet and download files. Clean Installation of Windows Windows also can be reset with a Clean Install of the Windows 10 Operation System. A clean install will completely clear the hard drive and install a completely new set of Windows files. This is the ultimate solution to recovering from a problem. The procedure will require you to download a tool that is used for the installation. Page 19 Revised 9/16/17

20 1. Open the Recovery page with Start, Settings, Update and Security, Recovery. 2. Activate the link to the information webpage. 3. Read carefully the instructions on the page. I would recommend you print out the instructions to guide you during installation. 4. Activate the Download tool now button. 5. Save the RefreshWindowsTool.exe file. 6. Locate the RefreshWindowsTool.exe file on your computer and activate it. 7. Follow the directions on the screen. 8. Once the Clean Install starts it will operate without additional assistance. 9. Leave the computer on until the install is complete. Page 20 Revised 9/16/17

we do Windows For more information about Windows, see Windows Basics under Help and Support in the Start menu.

we do Windows For more information about Windows, see Windows Basics under Help and Support in the Start menu. STARTERGUIDE Thank you! Thank you for your purchase! We want to make your experience a satisfying one, so we ve put together tips to help you get started with your Gateway computer. Contents Getting started

More information

How To Remove Personal Antivirus Security Pro Virus Windows 8

How To Remove Personal Antivirus Security Pro Virus Windows 8 How To Remove Personal Antivirus Security Pro Virus Windows 8 When hackers break into government servers to steal your personal data, there's As for just relying on the antivirus built into Windows 8.x,

More information

we do Windows For more information about Windows, see Windows Basics under Help and Support in the Start menu.

we do Windows For more information about Windows, see Windows Basics under Help and Support in the Start menu. STARTERGUIDE Thank you! Thank you for your purchase! We want to make your experience a satisfying one, so we ve put together tips to help you get started with your Gateway computer. Contents Getting started

More information

How To Remove Personal Antivirus Security Pro Virus Manually

How To Remove Personal Antivirus Security Pro Virus Manually How To Remove Personal Antivirus Security Pro Virus Manually Uninstall Antivirus Pro 2017 Virus (Manual Removal Guide) This type of virus uses false scan results and fake security alerts to scare computer

More information

College of Pharmacy Windows 10

College of Pharmacy Windows 10 College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Important Things to Know... 4 Carbonite Features... 5 Setting Up and Installing... 6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription... 8 Subscription Pricing...

More information

How To Removing Personal Antivirus Security Pro From Windows 8

How To Removing Personal Antivirus Security Pro From Windows 8 How To Removing Personal Antivirus Security Pro From Windows 8 Antivirus Action, Antivirus Monitor, Antivirus 7 or Antivirus5, Antivirus 8, Antivirus 8 Fast Windows Antivirus 2011, Fix Clean Repair, Flu

More information

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Topics: Antivirus / DSSO/ Email Computer Backups Security On The Go Mobile Safety Your first line of defense

More information

Full System Restore Manually Windows 7 No Disk

Full System Restore Manually Windows 7 No Disk Full System Restore Manually Windows 7 No Disk Time to Complete: 20-30 Minutes. Video (English Only) - How to use System Restore within Windows 7 with a small amount of hard disk space reserved for reinstalling

More information

Free antivirus software download

Free antivirus software download Cari untuk: Cari Cari Free antivirus software download 3-11-2015 Avast has one of the most popular antivirus apps around, due in part to offering a free version, and it's one that performs respectably.

More information

The following documents are included with your Sony VAIO computer.

The following documents are included with your Sony VAIO computer. Documentation The following documents are included with your Sony VAIO computer. Printed Documentation Quick Start Guide Describes the process from unpacking to starting up your VAIO. Troubleshooting and

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days Meanwhile McAfee Antivirus Plus insisted that my AV subscription expired, and I am getting tech help to remove it and put Microsoft essentials

More information

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How to find out if malware--a Trojan, virus, or worm got past your anti-virus and firewall, how to remove the malicious code manually.

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Comodo Internet Security Software Version 11.0

Comodo Internet Security Software Version 11.0 Comodo Internet Security Software Version 11.0 Installation Guide Guide Version 11.0.080918 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States 1. CIS Installation Please read

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

How To Remove Personal Antivirus Security Pro Virus

How To Remove Personal Antivirus Security Pro Virus How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus

More information

Basics Lesson Twelve Backing Up Your Data and the Computer

Basics Lesson Twelve Backing Up Your Data and the Computer Why should we back up our data and/or computer? o Malware has become so prevalent, it is no longer IF you get infected, but WHEN you get infected. o The best protection against malware damage is a frequent

More information

Perform Manual System Restore Xp Safe Mode Not Working

Perform Manual System Restore Xp Safe Mode Not Working Perform Manual System Restore Xp Safe Mode Not Working If you computer has system problem, you first priority should be to make sure you Windows Advanced Options Menu Please select an option: Safe Mode

More information

Manual Removal Norton Internet Security Won't Open Or

Manual Removal Norton Internet Security Won't Open Or Manual Removal Norton Internet Security Won't Open Or Dec 3, 2014. Finally during the reinstall - I had to delete a key to get a new key other wise I would I have it shown on the prgrams and features -

More information

Perform Manual System Restore Xp Safe Mode Command Prompt

Perform Manual System Restore Xp Safe Mode Command Prompt Perform Manual System Restore Xp Safe Mode Command Prompt Dell support article tagged with: System restore, windows, XP, WinXP, Safe Mode, Command Prompt. This is This article provides information on the

More information

NET 311 D INFORMATION SECURITY

NET 311 D INFORMATION SECURITY 1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing

More information

Activation Screen Virus

Activation Screen Virus How To Get Rid Of Spyware Windows Xp Activation Screen Virus Spyware Clear it's technically not a virus, but it does exhibit plenty of malicious To uninstall the Spyware Clear program from Windows XP,

More information

Manually Windows Update Vista Not Work In

Manually Windows Update Vista Not Work In Manually Windows Update Vista Not Work In Safe Mode Doesn To boot Windows Vista in Safe Mode, follow these steps: If Windows Updates aren't installed automatically in your Windows Vista system, you need

More information

Manually Remove Of Xp Internet Security Protect Virus Manually

Manually Remove Of Xp Internet Security Protect Virus Manually Manually Remove Of Xp Internet Security Protect Virus Manually We show you how to remove malware from a PC or laptop. You may also wish to read: Windows users: how to protect your PC from Check now: do

More information

Real Fast PC. Real Fast PC Win 7.

Real Fast PC. Real Fast PC Win 7. Real Fast PC Win 7 www.realfastpc.com 1 Real Fast PC Win 7 Disclaimer: Please note that while every effort is made to ensure that the information provided in this ebook is up to date, effective, and useful,

More information

Contents Overview... 1 References... 1 Packing Up... 3 Reset the PC... 5 Restoring the PC... 6 Restoring the Data Files and Applications...

Contents Overview... 1 References... 1 Packing Up... 3 Reset the PC... 5 Restoring the PC... 6 Restoring the Data Files and Applications... Page 1 of 10 Contents Overview... 1 References... 1 Packing Up... 3 Reset the PC... 5 Restoring the PC... 6 Restoring the Data Files and Applications... 7 Overview This document contains detailed information

More information

Norton 360 Manual Scanning Not Working Windows 8

Norton 360 Manual Scanning Not Working Windows 8 Norton 360 Manual Scanning Not Working Windows 8 My Norton product isn't starting or working on my computer Go through the next sections in this page and follow the instructions for the scenario that best.

More information

How To Reset Your Computer To Factory Settings Windows Vista Without Cd

How To Reset Your Computer To Factory Settings Windows Vista Without Cd How To Reset Your Computer To Factory Settings Windows Vista Without Cd This method is the easiest way to restore your computer to factory condition. Video (English Only) - How to reinstall Windows without

More information

INTRODUCTION... 2 GETTING STARTED...

INTRODUCTION... 2 GETTING STARTED... Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Controls to be activated with the mouse will be shown as Start button > Settings > System > About.

More information

Manually Remove Of Xp Internet Security Pro Virus Windows 7

Manually Remove Of Xp Internet Security Pro Virus Windows 7 Manually Remove Of Xp Internet Security Pro Virus Windows 7 How to remove Defender PRO 2015 virus (Removal Guide) kits that use vulnerabilities on your computer to install this rogue antivirus without

More information

WHEN YOUR COMPUTER SLOWS TO A CRAWL

WHEN YOUR COMPUTER SLOWS TO A CRAWL WHEN YOUR COMPUTER SLOWS TO A CRAWL A Hands-On Class Featuring More Than a Dozen Individual Step-By-Step Ideas that You Can Use on Your Own Presented by Bill Wilkinson 1. Beware of Computer Repair Offers

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription...9 Subscription

More information

COMMON WINDOWS 10 QUESTIONS & ANSWERS

COMMON WINDOWS 10 QUESTIONS & ANSWERS COMMON WINDOWS 10 QUESTIONS & ANSWERS Windows 10 is a blend of the best features of Windows 7 and 8.1 but many people are frustrated when they can t find a feature or fix they were used to in one of the

More information

Comodo Internet Security Software Version 10.1

Comodo Internet Security Software Version 10.1 Comodo Internet Security Software Version 10.1 Installation Guide Guide Version 10.1.012218 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States 1. CIS Installation Please read

More information

Finding information on your computer

Finding information on your computer Important Be sure to create recovery discs immediately after your computer is ready for use because there are no recovery discs provided with the computer. For instructions on how to create the recovery

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Advanced/Add-On Features... 5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time...

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Comodo Internet Security Software Version 10.0

Comodo Internet Security Software Version 10.0 Comodo Internet Security Software Version 10.0 Installation Guide Guide Version 10.0.010918 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States 1. CIS Installation Before you install

More information

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley Keeping Your PC Safe Tips on Safe Computing from Doug Copley Don t be an Administrator Administrator is an account that can do ANYTHING on the PC Most computers start with 1 account with administrator

More information

How To Delete Avira Antivirus From My >>>CLICK HERE<<<

How To Delete Avira Antivirus From My >>>CLICK HERE<<< How To Delete Avira Antivirus From My Computer Windows 7 Dec 31, 2014. It would not update properly, so I decided to uninstall it. I used Revo Windows 7 Home Premium 64 bit. 44 posts I re-installed the

More information

Comodo GeekBuddy Software Version 4.25

Comodo GeekBuddy Software Version 4.25 Comodo GeekBuddy Software Version 4.25 User Guide Guide Version 4.25.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo GeekBuddy...3 1.1.

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

Common Preventive Maintenance Techniques for Operating Systems

Common Preventive Maintenance Techniques for Operating Systems Common Preventive Maintenance Techniques for Operating Systems OS Preventive Maintenance Plan To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A preventive

More information

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise, Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

The computer goes blank before the Word document was saved. The browser window freezes for no reason. You can't hear anything from your speakers.

The computer goes blank before the Word document was saved. The browser window freezes for no reason. You can't hear anything from your speakers. Computer Basics Basic Troubleshooting Techniques Basic Troubleshooting Techniques Page 1 The computer goes blank before the Word document was saved. The browser window freezes for no reason. You can't

More information

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Remove Virus From Computer Without Using Antivirus In Windows Xp How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to

More information

Computer Security Discussion September 29, 2016

Computer Security Discussion September 29, 2016 Computer Security Everyone will tell you a good Malware or Internet Security program is essential. While this is true, because of the current nature of threats o As essential as a good antimalware software,

More information

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight Sandboxie.lwp revised

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight  Sandboxie.lwp revised Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight www.jimopi.net Sandboxie.lwp revised 11-8-2017 WINDOWS 10 USERS: The Fall Creators Update build 1709 requires Sandboxie

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Securing the SMB Cloud Generation

Securing the SMB Cloud Generation Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

ESET SMART SECURITY 10

ESET SMART SECURITY 10 ESET SMART SECURITY 10 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security software.

More information

Remove Manually Norton Internet Security 2012 Will Not Start

Remove Manually Norton Internet Security 2012 Will Not Start Remove Manually Norton Internet Security 2012 Will Not Start Restart your computer to check if you can start your Norton product. I cannot connect to the Internet My Norton product does not work or displays

More information

Windows Mail Files Backup And Restore Windows 7 Not Working After Installing Acronis

Windows Mail Files Backup And Restore Windows 7 Not Working After Installing Acronis Windows Mail Files Backup And Restore Windows 7 Not Working After Installing Acronis With Acronis True Image backup, you can restore your computer in the event of a complete system failure. Top Windows

More information

How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode

How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode The System Restore function on Windows 7 allows you to roll backhome,» Categories,» Computers and Electronics,» Operating Systems Select

More information

Advanced Computer Skills and Hardware Instructor: Jonathan Barkand ( )

Advanced Computer Skills and Hardware Instructor: Jonathan Barkand ( ) Advanced Computer Skills and Hardware Instructor: Jonathan Barkand (412-655-8447) There are 2 types of systems: Intel and AMD All desktop computers are not created equal. They have significantly different

More information

ANNOYING COMPUTER PROBLEMS

ANNOYING COMPUTER PROBLEMS ANNOYING COMPUTER PROBLEMS And their solution Before you do this to your computer read this information. Feel free to print it out. This will make it easier to reference. Table of Contents 1. Computer

More information

I Want To Wipe My Computer Clean And Start Over Windows 7

I Want To Wipe My Computer Clean And Start Over Windows 7 I Want To Wipe My Computer Clean And Start Over Windows 7 How to delete everything on your laptop and start all over again You saved my life. How to wipe a laptop: Make sure your data is deleted before

More information

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. The Learning Objectives summarize the knowledge that learners should have gained by the time they

More information

DOWNLOAD PDF CREATOR FOR WINDOWS 8 64 BIT

DOWNLOAD PDF CREATOR FOR WINDOWS 8 64 BIT Chapter 1 : Media Creation Tool x64 - Windows 8 Downloads If you need to install or reinstall Windows, you can use the tools on this page to create your own installation media using either a USB flash

More information

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps 2018 By: RemoveVirus.net Remove A Virus From Your PC In 5 Simple Steps PCs, like Macs and Mobile Devices are susceptible to different types of malware. Avoid panicking when you realize that your PC has

More information

Manually Remove Of Xp Internet Security Protect

Manually Remove Of Xp Internet Security Protect Manually Remove Of Xp Internet Security Protect McAfee Family Protection McAfee Internet Security NOTE: To determine which McAfee Security software version you have installed, You must uninstall your McAfee

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

How To Install Windows Update Vista Without Cd Dell Inspiron 1525

How To Install Windows Update Vista Without Cd Dell Inspiron 1525 How To Install Windows Update Vista Without Cd Dell Inspiron 1525 One can easily downgrade the resident OS on Dell Inspiron from Vista to XP in a couple of easy steps. Following this step one needs to

More information

Configuring Windows Security Features

Configuring Windows Security Features 04_0789737213_ch03.qxd 10/26/07 3:31 PM Page 77 3 CHAPTER THREE Configuring Windows Security Features This chapter covers the following objectives: Configure and troubleshoot User Account Control. Configure

More information

Perform Manual System Restore Xp Safe Mode Command Prompt Windows 7

Perform Manual System Restore Xp Safe Mode Command Prompt Windows 7 Perform Manual System Restore Xp Safe Mode Command Prompt Windows 7 Additional information and help with how to get into Windows Safe mode in Windows XP and 2000 users Click the See advanced repair options

More information

Manually Windows Update Vista Not Work In

Manually Windows Update Vista Not Work In Manually Windows Update Vista Not Work In Safe Mode Doesn't To boot Windows Vista in Safe Mode, follow these steps: If Windows Updates aren't installed automatically in your Windows Vista system, you need

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

COMMON WINDOWS 10 QUESTIONS & ANSWERS

COMMON WINDOWS 10 QUESTIONS & ANSWERS COMMON WINDOWS 10 QUESTIONS & ANSWERS Windows 10 is a blend of the best features of Windows 7 and 8.1 but many people are frustrated when they can t find a feature or fix they were used to in one of the

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Get Max Internet Security where to buy software for students ]

Get Max Internet Security where to buy software for students ] Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection

More information

Comodo Cloud Drive Software Version 1.0

Comodo Cloud Drive Software Version 1.0 2 Comodo Cloud Drive Software Version 1.0 User Guide Guide Version 1.0.112017 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Cloud Drive...

More information

Chapter 14: Advanced Troubleshooting

Chapter 14: Advanced Troubleshooting Chapter 14: Advanced Troubleshooting IT Essentials v6.0 ITE v6.0 1 Chapter 14 - Sections & Objectives 14.0 Introduction Review Troubleshooting Steps 14.1 Computer Components and Peripherals Troubleshoot

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro Security Defender is a fake antivirus program, it should not be trusted, since it is a The program usually installs on PCs without

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45 User Guide i Contents Introduction 5 McAfee SecurityCenter 7 Features... 8 Using SecurityCenter... 9 Header... 9 Left column... 9 Main pane... 10 Understanding SecurityCenter icons... 11 Understanding

More information

crush malware that hasn't even been seen before. Alright, so not really like traditional antivirus. Cleans an already infected Mac, 14- day Premium

crush malware that hasn't even been seen before. Alright, so not really like traditional antivirus. Cleans an already infected Mac, 14- day Premium Malwarebytes 1043 I own a computer company. From many years of experience, this is absolutely the best anti-virus software on the market. Malwarebytes catches the malware that our antivirus misses. Cleanup

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

User Experience Review

User Experience Review User Experience Review Review Format For each of the tested products, we have looked at the following points (where applicable). Which versions of Windows does it work with? We list the versions of Windows

More information

Ryan KS office thesee

Ryan KS office thesee SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka

More information

2017 Rate Sheet Upfront prices and quality work backed by our 15-day Guarantee

2017 Rate Sheet Upfront prices and quality work backed by our 15-day Guarantee 2017 Rate Sheet Upfront prices and quality work backed by our 15-day Guarantee Hourly Rates, Mileage Fees and Deposits: (SOME RATES ARE NEGOTIABLE) 79.00 First Hour, $19.75 each 15-minute increment over

More information

Safety and Security. April 2015

Safety and Security. April 2015 Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.

More information

Full System Restore Manually Windows 7 No Disk

Full System Restore Manually Windows 7 No Disk Full System Restore Manually Windows 7 No Disk Found Time to Complete: 20-30 Minutes. Video (English Only) - How to use System Restore within Windows 7 with a small amount of hard disk space reserved for

More information

Auslogics BOOSTSPEED USER MANUAL. auslogics.

Auslogics BOOSTSPEED USER MANUAL. auslogics. Auslogics BOOSTSPEED 10 USER MANUAL www..com TABLE OF CONTENTS: Welcome Installation Guide Registering Auslogics BoostSpeed 10 Backing up with the Rescue Center Your First Scan Navigation Panel Navigation

More information

Avira Ultimate Protection Suite. Short guide

Avira Ultimate Protection Suite. Short guide Avira Ultimate Protection Suite Short guide 01 Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

Windows 7 Will Not Load On My Computer Says I'm

Windows 7 Will Not Load On My Computer Says I'm Windows 7 Will Not Load On My Computer Says I'm There are various programs which will allow you to make a copy of your entire apply to my computer even though it does say it works for this issue in Windows

More information

Introduction to Information Security Dr. Rick Jerz

Introduction to Information Security Dr. Rick Jerz Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions

More information

This document is a visual step-by-step guide to download and activate DET Licensed Software on Student BYOD PCs.

This document is a visual step-by-step guide to download and activate DET Licensed Software on Student BYOD PCs. This document is a visual step-by-step guide to download and activate DET Licensed Software on Student BYOD PCs. The example device we used has Windows 10 Home edition installed, and the procedure will

More information

Manual Format Window Xp Computer Without Cd

Manual Format Window Xp Computer Without Cd Manual Format Window Xp Computer Without Cd Instructions to format Windows Vista: Click here for instructions to format Windows I just need to format my computer, i have xp home edition. i have disk. I

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information