1 warrington u3a pc maintenance and security. 2 pc maintenance temporary files are caused by web...
Post on 15-Jan-2016
216 Views
Preview:
TRANSCRIPT
1
Warrington U3A
PC Maintenance and Security
2
PC MaintenanceTemporary files are caused by web browsing, loading new programs, switching off the computer improperly, dealing with very large files in documents, photos, movies, etc.
Removal of temporary files – why?
– They start to fill up your hard disk
– They will slow your computer down
– They can represent a security/privacy risk if anyone else has access to the PC
3
Browser problemsA slowing browser, or failure to log in or access certain pages, can be due to problems in the browser cache.
Load ExplorerChoose Tools-Internet OptionsChoose the General TabClick Delete button and choose Options. Then click Delete
Click Settings button in Browsing historyClick View FilesSelect them all with CTRL-AClick Right mouse button over them and choose Delete.Close the Windows
This will speed up the browser and reduce your exposure to viruses and tracking.
4
Remove tick from “Preserve Favourites website data”
Choose which options to delete.
Click OK to exit the box
This will speed up the browser and reduce your exposure to viruses and tracking.
5
Complete reset
of Browser• Browser
problems• Another option with Explorer
is to reset the browser to its default settings.
• Use Tools- Internet Options – Advanced Tab
• Reset
• But it resets everything!
6
Removal of Temporary DISK Files
• Windows utility– (Win 8) Click File Explorer – bottom
left yellow folder - to show your library of files.
– OR (Win 7) Click Start- Computer
– Right-click on your hard disk Drive C:
– Select Properties
– Click on Disk Cleanup adjacent to the Pie Chart of usage.
7
You will be asked to tick which folders to delete. Choose at least the following:-
Downloaded Program Files Temporary Internet Files Recycle Bin Temporary FilesPlus any others you feel are unnecessarily large. No harm will be done.Click OK
Repeat the above, and choose to “Clean up System Files” this time.
Some of these clean up operations will take some time …..
8
Defragmentation
• Why?– Files become split up into many parts– Fragmented files are slower to load– Causes extra wear & tear on hard disk
• How to defragment (“defrag”) the hard diskwith a Windows utility
9
• Click to show your library of files
-(Win 8 Yellow folder bottom left, Win 7 Start button)
• and right button your hard disk, Drive C:
• Select Properties
• Click on Tools tab
• Choose Defragment now or Optimise.
• If given a choice, “Analyse” and “Defrag/Optimise” afterwards.
Some of these clean up operations will take some time …..Go and have a coffee – or if really bad, go for a walk!
Defragmentation Process
10
Defragmentation Diagrams
11
The Control Panel
In Windows 8Right button the Windows Tiles key in the bottom left corner and pick “Control Panel”
In Windows 7 and earlierClick the START button, bottom left, and choose “Control Panel” on right hand side of Menu lists.
Click “View by” top right and choose either “Large Icons” or “Small Icons”.
Here are most of the applications which control your machine.
12
Keep your machine up to date
New Security threats emerge every day in the form of new virus attacks on Windows and application programs that are running on your computer.
Microsoft, and other software companies, issue regular updates to block these attempts to hack into your machine, and to improve the performance of everyday programs.
Always install these updates to keep on top of these problems. These are best done automatically.
Check this is so by using the Control Panel to choose “Windows Update”. Click “Change Settings” on left hand side if needed.
13
Anti-Virus Software
• Why?– Lots of viruses in circulation.– Modern viruses aim to steal personal
information for financial gain• Credit card info• Passwords• Identity theft
14
Anti-Virus Software• What choices?
– Free AV software• Microsoft Security Essentials (Defender in Win7)• AVG• Avast
– Paid-for AV software• McAfee• Norton• Kaspersky
Only have one Anti-Virus software program running at once on your computer
15
Malware Infection Ratesfrom PCPro magazine
16
17
ID Scams, part of Phishing ScamsID Scams, part of Phishing Scams
Contact is often made by telephone. They may pose as a policeman, working for banking security, or for anti-virus firms. They want your ID name and account password. Only use your usual log in to the Bank site or other websites which are likely to be targeted.
18
5 tell tale signs of a phishing email5 tell tale signs of a phishing email
No name given – Dear Customer
Pressure to take immediate action - “We have deactivated your account”, “We need to perform a security upgrade”, etc
Request for ID details – log in details, etcEx Validate account login
web address looks official but links to a fake website.Ex http://www.online.lloydsbank.co.uk/customeraccount
19
PrivacyPrivacy
Five common passwords 123456 abc123 qwerty admin password123
Make your passwords individual to you include characters, numbers and perhaps
punctuation marks Don't have the same one for large numbers of
accounts Don't have a password file on your PC If you do keep a record, keep it safe.
I would use combinations of homes, and significant numbers which are not on social networking sites.
Ex Westbrook;54 where my primary school friend lived in an area called Westbrook, we went to school on the 54 bus, separated by a punctuation mark.
I do have a password file in case I forget them.
I keep it on an old memory stick that only has this file
When I update any records, the internet is unplugged.
20
21
Anti-Virus Software
• Allow your AV software to update as often as necessary.
• Invoke a manual scan if you think there are problems
• Anti-Virus programs take processor time and hence do slow your machine.
22
Jan '15
23
Checking & Scanning• Goto your Control Panel and click on Windows Defender
• This tells you about Microsoft Protection
• If you are using Norton, McAfee, etc you need to run their icon
• It is important to run a manual scan on your machine periodically.
24
Firewall
• Controls access to and from your computer via the network connections
• Prevents intruders accessing your PC
• Prevents rogue programs “phoning home” with your data
25
Firewall• Windows has a built-in firewall
• A Firewall is also built into most commercial security suites
• Use the Control Panel to access Windows Firewall
26
Overall Checks• Use the Control Panel to choose “Action Centre”.
• Click the Security tab
27
Wireless Internet Access (“Wi-Fi”)• Home routers usually have wi-fi built in
• Important to enable wi-fi security
– (If your wi-fi is not secured, anyone can use it (neighbours, passers-by, etc)
– If they can connect to your network, they can try to attack your PC
– If you are using a WiFi password, it is probably stamped on the underneath of your router.
– These passwords can be changed and are more secure when you do so. You would need to consult your manual.
28
Restoring when things go wrong 1
It is possible to save the programs and settings of the machine at a single point in time such that when problems occur, you can return to previous settings.
Goto the Control Panel Choose Systems Choose System Protection Choose Configure to set up this option
29
Restoring when things go wrong 2
Ensure you have turned on “System Protection”
Allocate 5-10% of disc space Click OK
30
Restoring when things go wrong 3
Choose “Create” to copy the current settings for possible use later.
Choose “System Restore” to return to settings you previously had.
The computer will automatically create restore points of its own when it updates your machine with the latest programs.
top related