Protect Your PC with Microsoft Security Essentials

Size: px
Start display at page:

Download "Protect Your PC with Microsoft Security Essentials"

Transcription

1 Protect Your PC with Microsoft Security Essentials P 920 / 1 Guard Against Viruses, Spyware and Other Threats Completely Free! A computer without security software installed is an accident waiting to happen. Sooner or later, no matter how careful you are, something nasty will sneak its way into your PC. A huge number of companies offer security software, with one notable exception: Microsoft. Until recently, that is. In this article I ll introduce you to the new (and free!) Microsoft Security Essentials, explain how it triumphs over many of its rivals, and show you how to install and use it. By Rob Young What is Microsoft Security Essentials?... How to Download and Install MSE... Finding Your Way Around the MSE Window... What Happens if MSE Detects a Threat to Your PC... This article shows you how to:... Install the free Microsoft Security Essentials... Find your way around the program s window... Respond if MSE discovers a security threat on your PC Windows All P 920 / 3 P 920 / 6 P 920 / 12 P 920 / 16 You can install Microsoft Security Essentials from the Update 3/10 CD-ROM in the Update Software section 49

2 P 920 / 2 Protect Your PC with Microsoft Security Essentials Real-time protection runs constantly to protect your PC On-demand scanners are used when you want to doublecheck your PC What Sort of Security Software Do I Need? Security software for your computer comes in two different types. The first and most important type is known as real-time protection. This is a program that is running constantly on your PC from the moment Windows starts, monitoring which programs are being installed or started, which files are opened, what you re downloading or receiving from the Internet essentially keeping a watchful eye over everything that s happening on your PC. If a virus or some other type of malicious software is about to be installed or run on your computer, this real-time protection program should intervene and prevent it (or, at least, warn you about it). The second type of security software is an ondemand scanner. This type of software doesn t run constantly: you simply install it so that it s ready and waiting if you want to use it, as with other programs you use. If you ever suspect that your PC might be infected with something that your real-time protection software missed, you can start this program and use it to scan your PC for a second opinion. You can install any number of these on-demand scanners on your PC (although one or two should be enough!), and the only rule about these programs is that you shouldn t set two of them scanning your PC at the same time. One of the best on-demand scanners available is the oddly-named Malwarebytes Anti-Malware. This free program is extremely easy to use, and you can learn more about it in article R160 Remove Spyware with Malwarebytes Anti-Malware, included in PC Knowledge for Seniors update 3/09. If you don t have a copy of this update, you can find this article in the Members-only Area of our 50

3 Protect Your PC with Microsoft Security Essentials P 920 / 3 website at Log in using the password shown on the front cover of your latest update, click Archived Articles and then type R180 into the search box and press Enter. The real-time protection programs are different: you must only have one of these installed. Since these programs run all the time, and try to check each program and file as soon as it starts to open, having two or more of these programs will usually cause them to conflict with each other, resulting in frequent error messages, crashes and perhaps the consequence that neither is actually able to protect you at all! While you certainly shouldn t have two real-time protection programs installed, you definitely should have one, and there are many to choose from. Some are free, such as AVG Anti-Virus Free Edition, and others (the majority, in fact) you have to pay for: well-known examples include Norton Internet Security, McAfee AntiVirus and AVG s Professional Edition. Arriving rather late to this party is a new offering from Microsoft named Security Essentials. It s completely free, it works with Windows 7, Vista and XP, and as I ll explain, it has several worthwhile benefits over its rivals (including those you d have to pay for). What is Microsoft Security Essentials? Microsoft Security Essentials (or MSE, as we ll call it for short) isn t Microsoft s first foray into security programs. A few years ago, Microsoft released a program named Windows Live OneCare which like a lot of other security programs had to be paid for once at the outset followed by a renewal fee every year. You must have only one real-time protection program! MSE replaces Windows Live OneCare 51

4 P 920 / 4 Protect Your PC with Microsoft Security Essentials Many modern security programs are slow and bloated The benefits of Microsoft Security Essentials Apart from the cost, Windows Live OneCare wasn t a great success for three reasons: first, it had all sorts of unnecessary features that weren t really related to security, but were shoehorned in to justify the price; second, it had the irritating habit of popping up all sorts of messages to tell you what it was doing when you were trying to get some work done; third, the combination of the first two drawbacks made your PC run noticeably slower. Perhaps those drawbacks of Windows Live OneCare seem familiar to you? Most of the popular real-time protection software seems to suffer from the same problems these days. Even the previously-excellent AVG Anti-Virus has recently had some new features packed into it that don t strike me as particularly worthwhile, but certainly do slow down my PC! With MSE, Microsoft has gone in a different direction. They ve taken the important security features from the old OneCare software (features they also use in some rather-expensive professional products) and dumped all the unnecessary extras. The result has several benefits over its competitors: It s free. However, unlike some other free security programs, it s not just a tempter that tries to entice you to buy its Professional version: the only version of MSE that exists is the free one. It does only one job. MSE simply protects your PC from malware without trying to provide other unnecessary features. As a result, it s far less likely to slow down your PC than most of its rivals, and on the rare occasions you actually need to use its window, you ll find it refreshingly 52

5 Protect Your PC with Microsoft Security Essentials P 920 / 5 simple and uncluttered (as you can see from the screenshots later in this article). It updates itself automatically. Windows already has a system named Automatic Updates which collects and installs updates for your PC, and MSE quietly keeps itself up-todate using the same automatic system. It doesn t disturb you! Unless MSE spots a threat to your PC, you won t hear anything from it at all. Apart from an icon near the clock on the taskbar, you wouldn t even know it was running! Should I install Microsoft Security Essentials? As you can tell, I m very impressed with MSE (and all the reviews I ve read elsewhere are positive), so I d certainly recommend it. However, if you are tempted to install it, there s one vital point to consider first. As I mentioned earlier, you must have only one real-time protection program like MSE installed. Since you almost certainly have another real-time protection program installed at the moment, that means you ll have to uninstall the current program before installing MSE. Uninstall your current real-time security first! You probably know whether or not you have a realtime security program installed, and what it is. However, if you re not sure, have a look through the small icons in the tray section of the taskbar. Security programs place an icon here to let you know they re running and protecting you, and by holding the mouse over each icon in turn you ll see a little tooltip message giving the name of each program: one of these will be your security program, and you ll probably recognise it when you see it. 53

6 P 920 / 6 Protect Your PC with Microsoft Security Essentials With this in mind, you may prefer to stick with your existing security program, and that s fine. Likewise, if you paid a year s subscription for your current software, you may want to keep using it until that subscription expires to get your money s worth, and decide what to do after that. If you do decide to uninstall your current real-time security software and install MSE instead, here s the order in which I suggest doing things: 1. Download MSE by following the first few steps below, so that you have it ready. 2. Uninstall your current security software and restart your PC. 3. Install MSE. By doing things in this order, you minimise the amount of time that your PC is unprotected, and you don t have to visit any websites between uninstalling your old software and installing MSE. How to Download and Install MSE If you would like to install Microsoft Security Essentials on your PC, follow these steps: 1. Insert your Update 3/10 CD-ROM into your PC s DVD/CD drive, click Update Software followed by Security Essentials, and then click the blue words Click here to download Microsoft Security Essentials. 2. Your web browser will open and whisk you to the Microsoft web page pictured in the following screenshot. 3. Click the large, blue Download Now button in the centre of the picture at the top of the page. 54

7 Protect Your PC with Microsoft Security Essentials P 920 / 7 Click Download Now 4. If you re using a browser other than Internet Explorer, you may see a white box asking you to choose your version of Windows. Click the blue link in this box that corresponds to your Windows version. 5. Now you ll see the dialog pictured in the next screenshot. Click the Save button. Click Save 6. Another dialog will appear asking where you want to save the file. I recommend saving it to your desktop, as this will make it easy to find 55

8 P 920 / 8 Protect Your PC with Microsoft Security Essentials when you need it, so click Desktop in the panel at the left of the dialog and then click the Save button. 7. The file will now be downloaded and, as it s a surprisingly small program, this should only take a few seconds. Another dialog will keep you posted on its progress, and when the download is complete and that dialog disappears, you can close your web browser. 8. If you currently have another real-time security program on your PC that you need to uninstall, now is the time to uninstall it, making sure you restart your computer afterwards. Assuming you used Internet Explorer to visit the Microsoft website, when you clicked that big blue button in step 3, the website cleverly determined which version of MSE was the correct one for your version of Windows. If you want to install MSE on another computer as well, it s best not to copy the file you ve just downloaded and use that it may not be the correct version for that PC. Instead, follow these steps again on your other PC to ensure that you re given the right version of MSE for that particular computer. 9. Now you re ready to start installing Microsoft Security Essentials, so double-click the file you downloaded. 10. If you see a pop-up message headed User Account Control, click Yes or Continue. 11. Now you ll see the window pictured in the next screenshot. Click the Next button to start installing MSE. 56

9 Protect Your PC with Microsoft Security Essentials P 920 / 9 Click Next 12. In the next step, read the licence agreement (if you have the time and inclination!) and then click I accept. 13. In the next step, Microsoft wants to make sure that your version of Windows is a genuine (noncounterfeit) copy, so click the Validate button. The setup program will then quickly check your Windows installation, which should take only a few seconds. You may briefly see a message saying that your copy of Windows was validated successfully before you re whisked to the next step. The setup program checks your copy of Windows is genuine 14. In this step, click the Install button, and the setup program will install MSE.This is a fairly quick job, and after a minute or so you ll arrive at the final step, pictured in the next screenshot. 15. Leave a tick in the box beside the option labelled Scan my computer... and click the Finish button. 57

10 P 920 / 10 Protect Your PC with Microsoft Security Essentials Leave the tick in this box Click Finish Details of all the latest security threats are downloaded 16. The setup window you were just using will disappear and, after a few seconds, you ll get your first glimpse of the Microsoft Security Essentials program itself, pictured in the next screenshot. At this stage the program is downloading the latest definitions from Microsoft website. These are the all-important details of viruses and spyware that tell MSE what to keep watch for on your PC. As it s doing this for the first time, it may take a few minutes, but subsequent updates (if you actually see them happening) will usually be much quicker. You don t have to sit and watch while this is happening: as the program itself mentions below the progress bar, you can close or minimise this window and carry on using your PC for something else this updating process will continue silently until it s finished, even if you close the window. Incidentally, don t be perturbed by the words Computer status At risk at the top of the window on a red background. MSE regards your PC as being at risk if its collection of virus definitions is out-of-date, but of course, it s busily downloading them now. Once that s been done, the 58

11 Protect Your PC with Microsoft Security Essentials P 920 / 11 words At risk will change to Protected and the red background will change to a reassuring green. 17. When the definitions have been downloaded, MSE will start scanning your PC for viruses and other malicious items. It will do this even if you got tired of watching in step 16 and decided to close or minimise its window, and in the same way you can close or minimise the window now if you want to that won t upset it at all. As this is the first time MSE has scanned your PC, the job will take at least a few minutes, but future scans will usually be quicker. MSE scans your PC for potential security problems 18. Finally (assuming you still haven t closed it!), the window will look like the next screenshot. Near the top, as I mentioned earlier, you ll see the words Computer status Protected on a reassuring green background, and lower down you ll see confirmation that real-time protection is On and that the virus definitions are Up to date. 19. Again assuming you haven t done so already, you can now close the window and carry on using your PC just as you always do. MSE really 59

12 P 920 / 12 Protect Your PC with Microsoft Security Essentials does take care of itself, and for the most part you ll only have to deal with it if it identifies a threat from malicious software. You ll see the word Protected here and confirmation of real-time protection and updated definitions You can remove the unnecessary icons from your desktop There s one final thing that s worth doing. The file you downloaded, which is still sitting on your desktop, is no longer needed, so it s sensible to delete that file and avoid unnecessary clutter.you ll also notice that a new Microsoft Security Essentials icon has appeared on your desktop (a picture of a castle with a blue flag flying) and this really isn t necessary: you could double-click it to see the MSE window, but you won t need to do that very often (if at all) and I ll show you the way to open the MSE window in a moment. Therefore you can delete this icon too. Finding Your Way Around the MSE Window As I ve mentioned, MSE just gets on with everything by itself. Along with the vital protection from viruses and spyware, it will update its definitions at regular intervals and scan your PC roughly once a week to ensure nothing managed to sneak past its defences in the meantime. 60

13 Protect Your PC with Microsoft Security Essentials P 920 / 13 Nevertheless, it s useful to know your way around the program, so let s explore. The first thing to do is to open the MSE window, and there are two easy ways to do that. One is to open the Start menu, go to All Programs and click Microsoft Security Essentials. The other is to find and double-click its small icon near the clock on the taskbar (shown in the margin): If you use Windows 7, click the little white upward-pointing arrow a little way to the left of the clock and you ll see this icon in the panel that appears. In Windows 7, click this arrow button to find the MSE icon If you use Windows Vista or XP, you may be able to see this icon among the others; if you can t, click the chevron button to reveal icons that are hidden and you ll find this one among them. When the window appears, you ll see that it contains four tabs at the top labelled Home, Update, History and Settings. Here s what each of those tabs is for: Home: you can see this tab pictured in the screenshot on page 12. As well as telling you whether or not the virus and spyware definitions are up-to-date, you can tell MSE to scan your PC Visit the Home tab if you want to scan your PC 61

14 P 920 / 14 Protect Your PC with Microsoft Security Essentials for infections if you ever suspect there s a problem. Using the panel on the right, choose between a Quick and a Full scan (a Quick scan is fine unless you re fairly sure there s something amiss) and click the Scan now button. Update: this tab gives you some fairly dull information about the collection of virus definitions MSE is currently using. More importantly, there s a large Update button. If you need to tell MSE to check for newer virus definitions and download them, click this button. If you feel there s a problem with your PC and you ve decided to use MSE to scan it, it s a good idea to visit the Update tab first and click the Update button. If there are newer virus definitions available, they ll be downloaded and used for the scan. Click this button if you want to check for newer virus definitions (usually before running a scan of your PC) 62

15 Protect Your PC with Microsoft Security Essentials P 920 / 15 History: on this tab you ll find a list of any viruses and spyware MSE detected on your PC, the date they were detected and what action was taken. In the vast majority of cases, as I ll explain below, you d have told MSE to remove any suspicious items, and that should be noted in the Action taken column. Settings: this tab is the most complex of the four, but you should never need to use it. Here you can adjust various aspects of the way MSE works, but the program is installed with sensible settings so nothing should need changing. One odd thing you might notice when looking at the Settings tab is that MSE is set to scan your PC every week on Sunday at 2 AM. Your PC probably isn t switched on at that time on a Sunday morning, but that doesn t really matter: it will simply take the first available opportunity to run the scan when you next leave your PC alone for a few minutes. The MSE Icon: Sometimes Green, Sometimes Yellow Let s briefly return to that little Microsoft Security Essentials icon that appears near the clock on the taskbar. Most of the time it should be green, and containing a tick, but occasionally you may find that it s turned yellow and bears an exclamation mark. Why? If the icon turns yellow (as I m sure it will from time to time), MSE is trying to draw your attention to a relatively-minor problem: it s either concerned that it hasn t been able to run a scan of your PC for a long time, or it feels that its virus definitions may be out-of-date. If you double-click the icon to open the MSE window, you ll find out which it is and, if you choose The icon in the tray is usually green but it sometimes turns yellow to indicate a problem 63

16 P 920 / 16 Protect Your PC with Microsoft Security Essentials to, you can update its definitions via the Update tab and/or run a scan from the Home tab. However, there s no real urgency to do either: as I ve mentioned a few times, MSE does take care of itself, and this yellow icon is intended more as information than as a warning. (If it really needed your attention, it would have popped up a message you couldn t ignore!) Left to its own devices, MSE should update itself and scan your PC, and the icon will return to its usual green colour after it s done so. What Happens if MSE Detects a Threat to Your PC To a large extent, then, you can completely ignore MSE once you ve finished installing it and it will do its level best not to bother you. The only time you won t be able to ignore it is when it finds evidence of a virus or spyware infection on your PC. If MSE does find an infected file on your PC, a red warning message like the one pictured in the next screenshot will appear at the bottom right corner of your screen, and won t go away until you deal with it. One way you could deal with this warning message is simply to close it by clicking the x button in its top right corner. I don t recommend you do that, of course, but it s something you may do accidentally. If you do, you ll find that the MSE icon in the taskbar turns red (rather than its familiar green or occasional yellow) as a warning that something is wrong. Double-click the MSE icon to open the program s window, and you ll see a large red Clean computer button: click that button to remove the infected file. 64

17 Protect Your PC with Microsoft Security Essentials P 920 / 17 Click Clean computer or Show details to see more information If you do see this message, the best course of action is to click the Clean computer button. The file (or files) that MSE regarded as a threat to your PC will then be safely deleted to prevent them from causing problems. Once the file has been removed, a green message will appear in the same corner of your screen to confirm that your computer was successfully cleaned. Rather than clicking the Clean computer button in that red warning message you can click the blue Show details link. If you do, you ll see a window like the one pictured in the next screenshot which provides more information about the type of threat that was found. In the Detected items column you ll see the name of the virus or spyware item discovered: these threats usually have very unusual names, and it won t mean much to you, but you might want to note it down and search for information about it either straight away, before deciding what to do about it, or later on (as a matter of curiosity). If you click the Show details button at the bottom, you can see the name and location of the file MSE suspects is infected along with a little If you prefer, you can see more details first... 65

18 P 920 / 18 Protect Your PC with Microsoft Security Essentials more (fairly general) information about the type of threat it s suspected to contain.... and then choose what action to take In this window you can click Clean computer with the same results as above: the infected file will be removed. Alternatively, if you open the drop-down list in the Recommendation column, you can choose one of the three actions offered and then click Apply actions: Remove: ths will do the same as the Clean computer button, deleting the offending file. Quarantine: this moves the file to a safe location on your computer where it can t do any damage, but isn t actually deleted. This allows you to recover the file from its quarantine location if you ever want to, but it s highly unlikely that you ever would. Allow: this tells MSE to ignore this threat, leaving the infected file in place. Unless you have some reason to be sure that MSE is mistaken about the threat, this is obviously not a sensible choice! You can choose an action to take from this list and click Apply actions Whether you choose Clean computer in this window or select one of the actions in the Recommendation column and click Apply actions, there will be a brief pause while MSE does as you ask and you ll see a green window confirming that the job has been done: click the Close button at the bottom of this window. 66

Speed Up Windows by Disabling Startup Programs

Speed Up Windows by Disabling Startup Programs Speed Up Windows by Disabling Startup Programs Increase Your PC s Speed by Preventing Unnecessary Programs from Running Windows All S 630 / 1 When you look at the tray area beside the clock, do you see

More information

Burning CDs in Windows XP

Burning CDs in Windows XP B 770 / 1 Make CD Burning a Breeze with Windows XP's Built-in Tools If your PC is equipped with a rewritable CD drive you ve almost certainly got some specialised software for copying files to CDs. If

More information

Clean & Speed Up Windows with AWO

Clean & Speed Up Windows with AWO Clean & Speed Up Windows with AWO C 400 / 1 Manage Windows with this Powerful Collection of System Tools Every version of Windows comes with at least a few programs for managing different aspects of your

More information

XP: Backup Your Important Files for Safety

XP: Backup Your Important Files for Safety XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to

More information

How to Rescue a Deleted File Using the Free Undelete 360 Program

How to Rescue a Deleted File Using the Free Undelete 360 Program R 095/1 How to Rescue a Deleted File Using the Free Program This article shows you how to: Maximise your chances of recovering the lost file View a list of all your deleted files in the free Restore a

More information

Taskbar: Working with Several Windows at Once

Taskbar: Working with Several Windows at Once Taskbar: Working with Several Windows at Once Your Best Friend at the Bottom of the Screen How to Make the Most of Your Taskbar The taskbar is the wide bar that stretches across the bottom of your screen,

More information

Browsing the World Wide Web with Firefox

Browsing the World Wide Web with Firefox Browsing the World Wide Web with Firefox B 660 / 1 Try this Popular and Featurepacked Free Alternative to Internet Explorer Internet Explorer 7 arrived with a bang a few months ago, but it hasn t brought

More information

Download Free Pictures & Wallpaper from the Internet

Download Free Pictures & Wallpaper from the Internet Download Free Pictures & Wallpaper from the Internet D 600 / 1 Millions of Free Graphics and Images at Your Fingertips! Discover How To Get Your Hands on Them Almost any type of document you create can

More information

Printing Envelopes in Microsoft Word

Printing Envelopes in Microsoft Word Printing Envelopes in Microsoft Word P 730 / 1 Stop Addressing Envelopes by Hand Let Word Print Them for You! One of the most common uses of Microsoft Word is for writing letters. With very little effort

More information

Keep Track of Your Passwords Easily

Keep Track of Your Passwords Easily Keep Track of Your Passwords Easily K 100 / 1 The Useful Free Program that Means You ll Never Forget a Password Again These days, everything you do seems to involve a username, a password or a reference

More information

Rescuing Lost Files from CDs and DVDs

Rescuing Lost Files from CDs and DVDs Rescuing Lost Files from CDs and DVDs R 200 / 1 Damaged CD? No Problem Let this Clever Software Recover Your Files! CDs and DVDs are among the most reliable types of computer disk to use for storing your

More information

Real Fast PC. Real Fast PC Win 7.

Real Fast PC. Real Fast PC Win 7. Real Fast PC Win 7 www.realfastpc.com 1 Real Fast PC Win 7 Disclaimer: Please note that while every effort is made to ensure that the information provided in this ebook is up to date, effective, and useful,

More information

Word: Print Address Labels Using Mail Merge

Word: Print Address Labels Using Mail Merge Word: Print Address Labels Using Mail Merge No Typing! The Quick and Easy Way to Print Sheets of Address Labels Here at PC Knowledge for Seniors we re often asked how to print sticky address labels in

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

CDs & DVDs: Different Types of Disk Explained

CDs & DVDs: Different Types of Disk Explained CDs & DVDs: Different Types of Disk Explained C 200 / 1 Don t Waste Money Buying the Wrong Type Find Out Which Disks Your PC Can Use! Your PC almost certainly has at least one CD/DVD drive. In its most

More information

Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs

Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs What is a Utility Program? Utility Program Definition Smaller than an application in size, a utility program is a computer

More information

Copy Music from CDs for Videos & Slideshows

Copy Music from CDs for Videos & Slideshows Copy Music from CDs for Videos & Slideshows C 528 / 1 Easily Create Music to Use in Your Personal Video Projects Digital cameras make it easy to take pictures and movie clips, and programs like Windows

More information

WHEN YOUR COMPUTER SLOWS TO A CRAWL

WHEN YOUR COMPUTER SLOWS TO A CRAWL WHEN YOUR COMPUTER SLOWS TO A CRAWL A Hands-On Class Featuring More Than a Dozen Individual Step-By-Step Ideas that You Can Use on Your Own Presented by Bill Wilkinson 1. Beware of Computer Repair Offers

More information

PowerPoint Basics: Create a Photo Slide Show

PowerPoint Basics: Create a Photo Slide Show PowerPoint Basics: Create a Photo Slide Show P 570 / 1 Here s an Enjoyable Way to Learn How to Use Microsoft PowerPoint Microsoft PowerPoint is a program included with all versions of Microsoft Office.

More information

Panda Antivirus Server for Mac User Manual

Panda Antivirus Server for Mac User Manual Panda Antivirus Server for Mac User Manual !"#$%&'()*+,$-'*(& Use of this product is subject to acceptance of the Panda Security End User License Agreement enclosed. Panda Security is registered in the

More information

Using Tab Stops in Microsoft Word

Using Tab Stops in Microsoft Word Using Tab Stops in Microsoft Word U 720 / 1 How to Set Up and Use Tab Stops to Align and Position Text on a Page If you ve tried to use tab stops to align text in Microsoft Word, there s every chance you

More information

Excel Basics: Working with Spreadsheets

Excel Basics: Working with Spreadsheets Excel Basics: Working with Spreadsheets E 890 / 1 Unravel the Mysteries of Cells, Rows, Ranges, Formulas and More Spreadsheets are all about numbers: they help us keep track of figures and make calculations.

More information

Activation Screen Virus

Activation Screen Virus How To Get Rid Of Spyware Windows Xp Activation Screen Virus Spyware Clear it's technically not a virus, but it does exhibit plenty of malicious To uninstall the Spyware Clear program from Windows XP,

More information

Navigating and Managing Files and Folders in Windows XP

Navigating and Managing Files and Folders in Windows XP Part 1 Navigating and Managing Files and Folders in Windows XP In the first part of this book, you ll become familiar with the Windows XP Home Edition interface and learn how to view and manage files,

More information

How to update Windows and Office offline

How to update Windows and Office offline How to update Windows and Office offline Computers which have fast Internet access can download and install Windows and Office updates automatically, through the Windows Automatic Updates service in the

More information

Turn On Windows Defender Windows 8.1 This App Has Been Turned Off

Turn On Windows Defender Windows 8.1 This App Has Been Turned Off Turn On Windows Defender Windows 8.1 This App Has Been Turned Off It comes built into Windows Vista, Windows 7, Windows 8 and Windows 8.1. Windows. Mar 12, 2015. Windows Defender: "the app has been turned

More information

Bitdefender Antivirus Plus 2016 User's Guide

Bitdefender Antivirus Plus 2016 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2016 User's Guide Publication date 09/05/2015 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5 E s s e n t i a l S e c u r i t y a g a i n s t E v o l v i n g T h r e a t s Typical Installation Guide 2 Installation Guide Typical installation only Standard version 2.5 2 Copyright 1997 2005 Eset LLC.

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Advanced Computer Skills and Hardware Instructor: Jonathan Barkand ( )

Advanced Computer Skills and Hardware Instructor: Jonathan Barkand ( ) Advanced Computer Skills and Hardware Instructor: Jonathan Barkand (412-655-8447) There are 2 types of systems: Intel and AMD All desktop computers are not created equal. They have significantly different

More information

A weekly Spa Day for your Computer

A weekly Spa Day for your Computer A weekly Spa Day for your Computer To keep your PC running smoothly and clean, I recommend this procedure on a weekly basis: 1. ATF Cleaner Double Click on ATF Cleaner on your desktop, Check Select All

More information

EDGE, MICROSOFT S BROWSER

EDGE, MICROSOFT S BROWSER EDGE, MICROSOFT S BROWSER To launch Microsoft Edge, click the Microsoft Edge button (it s the solid blue E) on the Windows Taskbar. Edge Replaces Internet Explorer Internet Explorer is no longer the default

More information

Word 2007: Inserting & Formatting Pictures

Word 2007: Inserting & Formatting Pictures Word 2007: Inserting & Formatting Pictures W 380 / 1 Spice Up Your Word Documents with Images to Create Stylish Effects Almost any word processor allows you to include pictures in the documents you write,

More information

Norton 360 Manual Scanning Not Working Windows 8

Norton 360 Manual Scanning Not Working Windows 8 Norton 360 Manual Scanning Not Working Windows 8 My Norton product isn't starting or working on my computer Go through the next sections in this page and follow the instructions for the scenario that best.

More information

_APP A_541_10/31/06. Appendix A. Backing Up Your Project Files

_APP A_541_10/31/06. Appendix A. Backing Up Your Project Files 1-59863-307-4_APP A_541_10/31/06 Appendix A Backing Up Your Project Files At the end of every recording session, I back up my project files. It doesn t matter whether I m running late or whether I m so

More information

CDs & DVDs: Easily Share Documents and Photos

CDs & DVDs: Easily Share Documents and Photos CDs & DVDs: Easily Share Documents and Photos C 204 / 1 Copy Files to CDs & DVDs to Share with Friends and Family Let s say you ve been researching your family history, and over the months you ve collected

More information

Tips & Tricks for Microsoft Word

Tips & Tricks for Microsoft Word T 330 / 1 Discover Useful Hidden Features to Speed-up Your Work in Word For what should be a straightforward wordprocessing program, Microsoft Word has a staggering number of features. Many of these you

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Remove Virus From Computer Without Using Antivirus In Windows Xp How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to

More information

ITConnect KEEPING TRACK OF YOUR EXPENSES WITH YNAB

ITConnect KEEPING TRACK OF YOUR EXPENSES WITH YNAB ITConnect Technology made practical for home APRIL 06 Edit PDF files with Word Word is the best tool we have at hand to edit PDFs without having to purchase extra software. Viruses distributed by email

More information

Single Product Review. escan Internet Security 11. Language: English September 2010 Last revision: 13 nd October

Single Product Review. escan Internet Security 11. Language: English September 2010 Last revision: 13 nd October Single Product Review escan Internet Security 11 Language: English September 2010 Last revision: 13 nd October 2010-1 - Content Downloading and installing the trial version... 3 Post-installation... 4

More information

Remove Fake Microsoft Security Essentials Alert Windows 7

Remove Fake Microsoft Security Essentials Alert Windows 7 Remove Fake Microsoft Security Essentials Alert Windows 7 Follow all steps to remove 'Microsoft Security Essentials Alert' and clean up your computer. Notice how scammers use Microsoft Security Essentials

More information

Windows XP. A Quick Tour of Windows XP Features

Windows XP. A Quick Tour of Windows XP Features Windows XP A Quick Tour of Windows XP Features Windows XP Windows XP is an operating system, which comes in several versions: Home, Media, Professional. The Windows XP computer uses a graphics-based operating

More information

Manual Removal Norton Internet Security Won't Open Or

Manual Removal Norton Internet Security Won't Open Or Manual Removal Norton Internet Security Won't Open Or Dec 3, 2014. Finally during the reinstall - I had to delete a key to get a new key other wise I would I have it shown on the prgrams and features -

More information

NCMail: Microsoft Outlook User s Guide

NCMail: Microsoft Outlook User s Guide NCMail: Microsoft Outlook 2007 Email User s Guide Revision 1.1 3/9/2009 This document covers how to use Microsoft Outlook 2007 for accessing your email with the NCMail Exchange email system. The syntax

More information

NCMail: Microsoft Outlook User s Guide

NCMail: Microsoft Outlook User s Guide NCMail: Microsoft Outlook 2003 Email User s Guide Revision 1.0 11/10/2007 This document covers how to use Microsoft Outlook 2003 for accessing your email with the NCMail Exchange email system. The syntax

More information

TRS2006 Content Manager Plus (CMP)

TRS2006 Content Manager Plus (CMP) TRS2006 Content Manager Plus (CMP) A Guide to its Use Content Summary: 1) Check your settings 2) Connecting and updating 3) CMP start-up problems. 4) Check and Activate First Class Ticket (FCT) 5) Server

More information

Installing Sophos Endpoint Security and Control on a Home Computer Contents

Installing Sophos Endpoint Security and Control on a Home Computer Contents Contents Licensing... 2 Apple Mac Users.... 2 Free Tools... 2 Support... 2 Installation Instructions for Windows PC... 2 Before installing Sophos for Windows... 3 Downloading Sophos Endpoint Security and

More information

User Experience Review

User Experience Review User Experience Review Review Format For each of the tested products, we have looked at the following points (where applicable). Which versions of Windows does it work with? We list the versions of Windows

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Important Things to Know... 4 Carbonite Features... 5 Setting Up and Installing... 6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription... 8 Subscription Pricing...

More information

Manual Update Avg Antivirus 2012 Full Version For Windows 7

Manual Update Avg Antivirus 2012 Full Version For Windows 7 Manual Update Avg Antivirus 2012 Full Version For Windows 7 AVG Antivirus software updates. Stay secure by Implemented support for Windows 10. Program Fixed issue with setup freeze during the process of

More information

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight Sandboxie.lwp revised

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight  Sandboxie.lwp revised Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight www.jimopi.net Sandboxie.lwp revised 11-8-2017 WINDOWS 10 USERS: The Fall Creators Update build 1709 requires Sandboxie

More information

Read this first. It ll help you get started.

Read this first. It ll help you get started. Your Sony EB1E0E laptop guide Read this first. It ll help you get started. We re better, connected Tips before getting started Some messages from McAfee might pop up while you set up your laptop. Close

More information

Bitdefender Antivirus Plus 2017 User's Guide

Bitdefender Antivirus Plus 2017 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2017 User's Guide Publication date 09/15/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

the NXT-G programming environment

the NXT-G programming environment 2 the NXT-G programming environment This chapter takes a close look at the NXT-G programming environment and presents a few simple programs. The NXT-G programming environment is fairly complex, with lots

More information

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How to find out if malware--a Trojan, virus, or worm got past your anti-virus and firewall, how to remove the malicious code manually.

More information

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender Anti-virus SCEP and Windows Defender The University of Aberdeen uses System Center Endpoint Protection software (SCEP) and Windows Defender to protect servers and networked Windows PCs against viruses,

More information

Windows users range in experience from people

Windows users range in experience from people Part I Getting Started, Windows users range in experience from people who are just getting started with their first PC to folks with years of Windows experience under their belts. Part I attempts to address

More information

3 USING NERO BURNING ROM

3 USING NERO BURNING ROM 3 USING NERO BURNING ROM Nero Burning ROM gives you the maximum amount of flexibility and options for burning data to create different types of CDs and DVDs, such as bootable CDs or Super Video CDs. Until

More information

The first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below.

The first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below. Graphing in Excel featuring Excel 2007 1 A spreadsheet can be a powerful tool for analyzing and graphing data, but it works completely differently from the graphing calculator that you re used to. If you

More information

Using Devices with Microsoft HealthVault

Using Devices with Microsoft HealthVault Using Devices with Microsoft HealthVault A Microsoft HealthVault Step-by-Step Guide This guide will help you get started using Microsoft HealthVault Connection Center to send information from your health

More information

LeakDAS Version 4 The Complete Guide

LeakDAS Version 4 The Complete Guide LeakDAS Version 4 The Complete Guide SECTION 4 LEAKDAS MOBILE Second Edition - 2014 Copyright InspectionLogic 2 Table of Contents CONNECTING LEAKDAS MOBILE TO AN ANALYZER VIA BLUETOOTH... 3 Bluetooth Devices...

More information

Use of this product is subject to acceptance of the Panda End User License Agreement enclosed. Panda Security TM. TruPrevent: registered in U.S.A. Pat

Use of this product is subject to acceptance of the Panda End User License Agreement enclosed. Panda Security TM. TruPrevent: registered in U.S.A. Pat Important! Please read the Service activation section of this guide carefully. The information in this section is essential to keep your PC protected. MEGA DETECTION Quick installation guide Windows Vista,

More information

Chapter The Juice: A Podcast Aggregator

Chapter The Juice: A Podcast Aggregator Chapter 12 The Juice: A Podcast Aggregator For those who may not be familiar, podcasts are audio programs, generally provided in a format that is convenient for handheld media players. The name is a play

More information

ANNOYING COMPUTER PROBLEMS

ANNOYING COMPUTER PROBLEMS ANNOYING COMPUTER PROBLEMS And their solution Before you do this to your computer read this information. Feel free to print it out. This will make it easier to reference. Table of Contents 1. Computer

More information

You might think of Windows XP as a set of cool accessories, such as

You might think of Windows XP as a set of cool accessories, such as Controlling Applications under Windows You might think of Windows XP as a set of cool accessories, such as games, a calculator, and an address book, but Windows is first and foremost an operating system.

More information

AVG ZEN. User Manual. Document revision (3/25/2014)

AVG ZEN. User Manual. Document revision (3/25/2014) AVG ZEN User Manual Document revision 2014.01 (3/25/2014) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. 1 Contents... 3

More information

Outlook is easier to use than you might think; it also does a lot more than. Fundamental Features: How Did You Ever Do without Outlook?

Outlook is easier to use than you might think; it also does a lot more than. Fundamental Features: How Did You Ever Do without Outlook? 04 537598 Ch01.qxd 9/2/03 9:46 AM Page 11 Chapter 1 Fundamental Features: How Did You Ever Do without Outlook? In This Chapter Reading e-mail Answering e-mail Creating new e-mail Entering an appointment

More information

CBS For Windows CDROM Backup System Quick Start Guide Installation Preparation:

CBS For Windows CDROM Backup System Quick Start Guide Installation Preparation: CBS For Windows CDROM Backup System Quick Start Guide Installation If you have your CBS CD Writer Backup system on CD, simply insert the CD. It will automatically start and install the software. If you

More information

Keeping Sane - Managing your

Keeping Sane - Managing your WITH KEVIN Keeping Sane - Managing your Email TODAY S COFFEE TALK Email is a wonderful tool for sending and receiving a lot of information quickly and securely. However, it s important that your personal

More information

Key questions to ask before commissioning any web designer to build your website.

Key questions to ask before commissioning any web designer to build your website. Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,

More information

Using Microsoft Excel

Using Microsoft Excel About Excel Using Microsoft Excel What is a Spreadsheet? Microsoft Excel is a program that s used for creating spreadsheets. So what is a spreadsheet? Before personal computers were common, spreadsheet

More information

2

2 1 2 3 4 5 All resources: how fast, how many? If all the CPUs are pegged, that s as fast as you can go. CPUs have followed Moore s law, the rest of the system hasn t. Not everything can be made threaded,

More information

This document is a visual step-by-step guide to download and activate DET Licensed Software on Student BYOD PCs.

This document is a visual step-by-step guide to download and activate DET Licensed Software on Student BYOD PCs. This document is a visual step-by-step guide to download and activate DET Licensed Software on Student BYOD PCs. The example device we used has Windows 10 Home edition installed, and the procedure will

More information

Welcome to the world of .

Welcome to the world of  . Welcome to the world of e-mail. E-mail, short for electronic mail, allows computer users to easily send messages back and forth between acquaintances around the world. There are a variety of ways to do

More information

Free antivirus software download

Free antivirus software download Cari untuk: Cari Cari Free antivirus software download 3-11-2015 Avast has one of the most popular antivirus apps around, due in part to offering a free version, and it's one that performs respectably.

More information

CHAPTER 1 COPYRIGHTED MATERIAL. Finding Your Way in the Inventor Interface

CHAPTER 1 COPYRIGHTED MATERIAL. Finding Your Way in the Inventor Interface CHAPTER 1 Finding Your Way in the Inventor Interface COPYRIGHTED MATERIAL Understanding Inventor s interface behavior Opening existing files Creating new files Modifying the look and feel of Inventor Managing

More information

Remove Trend Micro Titanium Internet Security Without Password

Remove Trend Micro Titanium Internet Security Without Password Remove Trend Micro Titanium Internet Security Without Password Uninstall Titanium Internet Security for Mac using the installer. Open the Trend Click Uninstall. Type the administrator name and password,

More information

How to remove Adware from Mozilla Firefox

How to remove Adware from Mozilla Firefox How to remove Adware from Mozilla Firefox Mozilla Firefox is one of the most popular browsers, and therefore also a popular target for installing adware and other untwanted extensions. In this article

More information

Bitdefender Antivirus Plus 2018 User's Guide

Bitdefender Antivirus Plus 2018 User's Guide USER'S GUIDE Bitdefender Antivirus Plus 2018 User's Guide Publication date 07/03/2017 Copyright 2017 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

2016 All Rights Reserved

2016 All Rights Reserved 2016 All Rights Reserved Table of Contents Chapter 1: The Truth About Safelists What is a Safelist Safelist myths busted Chapter 2: Getting Started What to look for before you join a Safelist Best Safelists

More information

Security for Everyone - Reviewing Microsoft Security Essentials 2.0 & the Windows 7 Firewall By Chuck

Security for Everyone - Reviewing Microsoft Security Essentials 2.0 & the Windows 7 Firewall By Chuck Security for Everyone - Reviewing Microsoft Security Essentials 2.0 & the Windows 7 Firewall By Chuck Security Essentials was released in September 2009 to differing opinions. In a short amount of time

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Focus on the ESET NOD32 antivirus system

Focus on the ESET NOD32 antivirus system INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2006; 16: 375 379 Published online in Wiley InterScience (www.interscience.wiley.com).623 Focus on the ESET NOD32 antivirus system By Gilbert

More information

Tutorial on Using Windows 8

Tutorial on Using Windows 8 Tutorial on Using Windows 8 Finding things and doing things from the new Windows 8 interface. By Rand Morimoto (original blog post http://www.networkworld.com/community/blog/tutorial-using-windows-8#disqus_thread)

More information

How to Use WindowsUpdate.Com

How to Use WindowsUpdate.Com Sunny Solutions Page 1 of 12 How to Use WindowsUpdate.Com (Last Update: 01/29/2010, 03:09 AM, Version 1.027) Microsoft (Microsoft) has created a website called WindowsUpdate.Com. This website distributes

More information

Windows 8.1. Tiles come in four shapes: small, medium, wide, and large. The red outlined tiles are live tiles.

Windows 8.1. Tiles come in four shapes: small, medium, wide, and large. The red outlined tiles are live tiles. Windows 8/8.1 was Microsoft s attempt to have one operating system for all devices desktops, laptops, phones, tablets, and everything else. Some like it more than others. Microsoft Windows 10 is supposed

More information

How to Configure Outlook 2016 to connect to Exchange 2010

How to Configure Outlook 2016 to connect to Exchange 2010 How to Configure Outlook 2016 to connect to Exchange 2010 Currently Outlook 2016 is the version of Outlook supplied with Office 365. Outlook 2016 will install and work correctly on any version of Windows

More information

SEP for Windows: FAQ. Updating Security. Definitions (AV and IPS) it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu)

SEP for Windows: FAQ. Updating Security. Definitions (AV and IPS) it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ Cyndi Galvan

More information

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39 Contents Before you begin... vii Topic 1: Start a computer and use system information and features... 1 1A Make your workspace safe... 3 1B Work safely... 14 1C Start up the computer... 17 1D Know about

More information

Publications Database

Publications Database Getting Started Guide Publications Database To w a r d s a S u s t a i n a b l e A s i a - P a c i f i c!1 Table of Contents Introduction 3 Conventions 3 Getting Started 4 Suggesting a Topic 11 Appendix

More information

UKNova s Getting Connectable Guide

UKNova s Getting Connectable Guide UKNova s Getting Connectable Guide Version 1.2 2010/03/22 1. WHAT IS "BEING CONNECTABLE" AND WHY DO I NEED IT? Being connectable means being able to give back to others it is the fundamental principle

More information

Rapid Software Testing Guide to Making Good Bug Reports

Rapid Software Testing Guide to Making Good Bug Reports Rapid Software Testing Guide to Making Good Bug Reports By James Bach, Satisfice, Inc. v.1.0 Bug reporting is a very important part of testing. The bug report, whether oral or written, is the single most

More information

University of Tennessee at Chattanooga ARCS, Michael Ward, Basic Windows Security

University of Tennessee at Chattanooga ARCS, Michael Ward, Basic Windows Security University of Tennessee at Chattanooga ARCS, Michael Ward, 2005-7-27 Basic Windows Security Nothing, besides turning off the power, can insure that your PC will be completely protected from hazards such

More information

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it. 7, 8, 8.1, 10 This presentation is on windows 10. Most if not all procedures we will discuss today will work on all 4 versions of windows talk about today. Below is when support ends for each version.

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Handout Objectives: a. b. c. d. 3. a. b. c. d. e a. b. 6. a. b. c. d. Overview:

Handout Objectives: a. b. c. d. 3. a. b. c. d. e a. b. 6. a. b. c. d. Overview: Computer Basics I Handout Objectives: 1. Control program windows and menus. 2. Graphical user interface (GUI) a. Desktop b. Manage Windows c. Recycle Bin d. Creating a New Folder 3. Control Panel. a. Appearance

More information

QuickBooks 2008 Software Installation Guide

QuickBooks 2008 Software Installation Guide 12/11/07; Ver. APD-1.2 Welcome This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in a networked environment. The guide also covers

More information