Be Your Own IT Department

If you use a computer, you need to know more than just how to use your email and surf the web. You need to know that you are protected. If there isn't someone responsible for the computers in your home or office, then pick someone, quick. Their job is to assure you that everything I've listed below is getting done on a regular basis so you can relax a little.

Antivirus

This should go without saying, but I still run into computers with expired Antivirus software quite often. In 2005, Antivirus software needs to be updated daily, and paid for yearly. If you haven't paid for a subscription, then you don't have current Antivirus Software.

Every month, someone should verify that your installed AV Software is running, and that is updating automatically, with current virus definitions. Sometimes they stop working or updating because they get attacked between updates. You must remain virus free.

Spyware

Spyware is EVIL software that is getting worse every day. Spyware is probably what's wrong with your computer. If you have not run spyware removal software lately then I guarantee that you have some on your system. It's that simple.

For you to remove the Spyware yourself, you must run an updated version of your favorite Spyware removal software at least once a month. Weekly is better. Just like Antivirus software, it needs to be updated all the time. However, unlike Antivirus software, most Anti-Spyware software will not update on its' own. Most have to be set to auto-update and protect you from further infection.

Windows Updates

Microsoft discovers and repairs flaws in their Windows Operating System on a near weekly basis. These "fixes" or "patches" are available for free at their website, and you should insure that your Windows updates are being done. Now that you probably have high speed internet, this step is critical for the security and functionality of your computers. Once you get some spyware, these security holes are being exploited.

In Windows XP, you can schedule this to happen automatically in the Properties of My Computer. I use auto update for myself, and all peer to peer networking customers. In a server environment, I don't recommend it. For other Windows versions than XP, you should update your Windows on a monthly basis at windowsupdate.com

Startup programs

There are dozens of software programs that can start up when Windows loads, slowing your computer to a crawl. These are usually apparent in the task bar by your clock, and by pressing CTL ? ALT ? DEL to see the services and applications. If you need a scroll bar, you're bogged down! By using a Windows utility called msconfig you can manage your startup items. Go to Start ? run and type msconfig ? then press Enter. Go to the Startup tab and you'll see the choices under the startup tab. Be careful in there, and pay attention.

Firewall

A Firewall keeps people from coming into your computer over the internet. Spyware and Trojan horse viruses make it easier for hackers to get into your computers, but even when your system is clean, the risk of attack is still there, if there's a Windows hole (and there is). You need a firewall, and if you have a wireless connection, you need secure password protection on the router to keep your neighbors out.

On a monthly basis, you need to be sure that your firewall, whether (software or hardware) is both turned on, and current. I can't tell you the number of times I find it intentionally disabled, with no malicious intent, but unprotected nonetheless. More knowledgeable users should review the logs for any abnormal activities.

Windows XP has a free firewall that is much better than nothing, and getting better every month with Windows update. To insure yours is on, go to Start ? Help and support ? and type firewall.

Disk Maintenance

Windows has two built in utilities called Scandisk and Disk Defragmenter. Scandisk checks the surface of your hard disk for flaws or errors that may be developing, and Disk Defragmenter rearranges the files on your hard drive for faster and easier access.

Depending on the version of Windows you're using, the names are a little different, but the utilities can always be accessed in the following way...

Reboot first, minimizing the amount of programs running in your Startup. Go to My Computer, and right click on your hard drive (usually the C: drive). Go to Properties and select the Tools tab and run Scandisk or "error checking" and Disk Defragmenter or "Defragmentation". In some computers, you'll need to reboot again.

It's well worth doing these once a month to keep an older computer running well, however, they are time consuming, and I confess, I do not run them. Ever. That's only because I have a good backup system.

Backup, Backup, Backup

You have to have a backup of all your important data. For some home users that means one folder (usually My Documents) and their email. For others, their data can be scattered all over a computer in different folders, or in some cases, a network. Just figuring out where the data is can be a problem. Get a handle on it right away and know what needs to be backed up.

You will lose data some day, and you'll either be inconvenienced or devastated. It's your choice. I prefer to use a convenient local disk copying program called Second Copy. However, to protect against fire or theft, everything from my kids' baby pictures to last night's spread sheet is securely backed up and archived over the internet.

Summary

These things above are not difficult, but they take time. Someone in the business or family needs to see these gets done on a routine basis. If you do them, your computers will not only be more secure, but they'll run faster and have fewer problems.

Scott Hendison lives in Oregon, and is the owner of Portland Technology Consultants. He is a computer and internet consultant, and has been in the industry since 1995. For over 75 other articles, visit his website at http://www.pdxtc.com

cleaning help near Mundelein ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

5 Ways to Speed Up Your PC

No matter how fast your processor and regardless of how... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

How to Save an Image in a SQL Server Database?

Most of the web applications have a lot of images... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

Although there are many things that can affect the performance... Read More

5 Steps to Remove Spyware for Free

Have you ever tried to remove Spyware off your PC... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

The Newbies Guide to Personal Computer Maintenance

When you turn on your computer, does it act like... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

How to Switch to Firefox and Why You should

First things first, what is Firefox? Well, it's a browser.... Read More

Email Management

If you utilize a computer at home or work it... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

Digital Cameras + Photo Printers = Quality Instant Photographs

In the 1950's and 1960's Polaroid's instant cameras were all... Read More

Selecting a Personal Digital Assistant

A Computer in Your HandCarrying around an address book and... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

Why Get a Microsoft MCSE Certification?

In the years of the dot com boom and bust,... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

Best PC Pocket GPS

Stop Getting LostOne of the greatest uses for a pocket... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

reliable maid service Wilmette ..