Tag Archives: windows xp
Do you turn off your computer during a storm? Unfortunately I have been one of those that has lost documents due to a storm. Now it wasn’t the data stored in my computer, but rather the documents I was working on, that I had not saved yet. All it takes is one power outage and POOF, bye bye they went. That was before the days of auto-save. We will usually get calls from people that have had their modems zapped, computers fried or routers blew away from storms. Are you our next client? We hope not for these calls. These calls usually include a complete new purchases and can be costly. While they may be able to be claimed on an insurance policy, the point is that it’s money you have to put out now and be down with work. The downtime to set up and reconfigure everything and get your data back is the biggest headache of the whole ordeal. Now on to some tips!
Tip #1, If it’s raining out, save often.
Tip #2, If it’s storming out, turn off your computer.
Tip #3, If it’s thundering out, turn off your computer and unplug it from the wall/electric source.
Tip #4, To avoid doing 1, 2 and 3, consider getting a UPS or Uninterrupted Power Supply. Not only do they save your computer from a meltdown, but keep your computer running during the storm. Most will let you computer remain on long enough to save your work and safely power down your computer.
If you need help with figuring out all of your cords and would like some help, please contact us and we will get back to you. If you have had a power surge destroy your computer and you want your data back, we can help with that too, of course. Or better yet, let’s set up online back up today!
It is the worst nightmare of every computer user: you wake up one day and realize that you have a virus, and you don’t know quite how
to get rid of it. Most people these days understand what a virus is and how harmful it can be, but they are still somewhat unsure how computer viruses spread. The truth is that there are dozens of different ways in which a virus can spread from computer to computer, but let’s take a look at the most frequent ways in which people run into viruses, spyware and Trojans on the Internet.
1. Email attachments.
The world became familiar with the phenomena of email attachments carrying viruses thanks to Microsoft’s Outlook Express automatically opening every attachment to every email you received a few years back. Now that email clients no longer do this, the infection rate from email attachments is significantly lower, but it can still be a common problem. The golden rule is that if you don’t know what an attachment is, don’t open it. To this day, many email users never open attachments, no matter what. You don’t have to take such drastic steps to protect yourself, however; simply use common sense when opening attachments in your email.
2. Rogue Websites.
It is depressing to know that you may become infected with spyware or a virus by doing nothing more than simply visiting a website, but it is true. Many adult websites, gambling websites and other less than trustworthy websites will attempt to automatically access your computer when you visit them. They often install adware bugs that will cause a
flurry of pop ups to appear on your screen. This adware will often allow for other programs with even more nefarious purposes to be installed and before you know it, your computer will be swamped. To stop these rogue websites, adjust the settings on your antivirus
software and firewall so that no outside connections can be made and no programs can be installed without your express permission.
If your computer is connected to a home network or if your work computer is part of a larger network, you may find yourself with an infection through no fault of your own. Someone else on the network downloaded a bug by accident, and within minutes, the entire network could be infected. There isn’t much you can do to stop these kinds of infections, short of having your network administrator ensure that everyone’s antivirus software is up to date so that the invading bug can be removed as quickly as possible.
4. Infected Boot disks.
Now that hard drives are obscenely large, the overwhelming percentage of us don’t bother to use boot disks anymore, but a virus can still be spread if an infected disk is in your hard drive and you attempt to restart. When you start your computer, your machine will always check your drives to see if a disk with boot information is present. If one is, your computer will likely automatically attempt to boot from the disk and not from your drive. If a virus is present, it will often be activated and you will become infected. Always know the origin of any disk you put into your drive.
5. Phishing Schemes.
Learning how computer viruses spread is important to keep yourself, and your personal information, safe online. Phishing schemes are one of the chief ways in which people end up with their identity stolen and a computer fill of viruses. A phishing scheme starts when you receive an email from a website claiming to be your bank or credit card company. You are asked to click a link and log in, but the truth is that you’ve just given away all of your personal information. Often times, when you visit these sites, spyware, adware and viruses are automatically installed on your computer (see Rogue Websites, above). Your lender or credit card will often send out a real notice that let’s you know that a phishing scheme is going around. The smartest thing you can do is to simply call your bank or credit card company if you receive an email saying there is a problem with your account instead of blindly following links in your email.
6. Infected Software.
One of the great things about the Internet is how many free games and programs there are out there, but these free programs often come at a price. Too many rogue websites intentionally infect their freeware (like Kazaa) with trojan viruses so that you unknowingly infect your computer every time you download a free game or piece of software. The key here is to only download freeware or shareware from a trusted source like CNet that always ensures your safety.
The Internet today is a much more law abiding place than it was ten years ago. Not only did most people not have antivirus protection and firewalls that could stop incoming attacks, most people didn’t even know what they were. Today, people understand the value of good online protection, but hackers can still pose a problem if you allow your protection software to lapse. The best way to beat hackers is to ensure that you have a firewall and up to date antivirus software.
8. Instant Messaging.
It is difficult to find a computer in this day and age that doesn’t have at least one instant messaging service installed on it. Unfortunately, these programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites. Common sense can keep you out of trouble, however. Only chat with people you know and never follow links to sites that you don’t recognize. You should easily be able to keep Internet worms, viruses and other bugs at bay.
9. Fake Anti Virus Software.
This is one of the most frustrating ways to become infected with a virus or worm. There are dozens of anti virus and anti spyware programs you can download for free on the Internet and a surprising number of them actually do exactly the opposite of what they claim. The product websites make outrageous claims that their product can protect you from a whole range of threats, when, in reality, their product will only make things a thousand times worse. Only download antivirus programs from trusted sites or from websites that you know are completely legit.
10. From Mobile Devices.
A recent story in the newspaper should serve as a wake up call for anyone who is getting ready to plug in a mobile device into their computer for the first time. A family purchased a digital picture frame from a local store and when they attempted to install the software that came with it, they inadvertently infected their computer with a virus. There really is no way to stop such an infection from happening, since we all buy peripherals that work with our computer, but we can ensure that we have the tools ready to go if an infection should happen. Keep your anti virus software up to date at all times and you should be able to wrestle control back from any Internet bug.
11. Friends and Relatives.
Often times, we are sent viruses through our email from people that we know and trust. The social networking site Facebook has had to battle this very problem when their serves get a bug and automatically send out emails to everyone on the system that are infected. Often times, these emails are extremely generic sounding and come with suspicious attachments, but people often open them anyway since they have come from a friend or from a site they trust, like Facebook. Remember, if you get an attachment with an .exe extension or a .dll, don’t ever open it.
Article Source: http://www.articlesbase.com/software-articles/11-ways-computer-viruses-are-spread-1018237.html
About the Author
Stephen is a publisher, editor, and reviewer for Antivirus Software Reviews.
Is your Windows operating system hanging up when you try to shut it down? Are you forced sometimes to hold the power button to force it to shut down? This is something that can happen after a virus update, after a new software install, or for no reason at all.
The first thing you will want to do is run your anti-virus software to check for a malware infection. If no infection is found, then the next step is to determine which software program on your computer is causing the hangup.
While there is no quick fix that guarantees you will find the faulty program on your own, one option you have is to review the programs that are set to auto-start when you turn your computer on. Here’s what to do:
Click the START button and type msconfig into your search box.
Click the START-UP tab. This tab will show you all the programs that are set to auto-start with your computer.
Go through the list of programs with a checkmark and uncheck the ones that you know for sure do not need to startup with your computer (e.g. – AIM, Quicktime, etc.).
After you have made your changes, save them and restart the computer.
CAUTION: Changing your startup configuration can negatively impact your computer’s functionality if you deselect a critical process that is needed to run. Only make changes that you are 100% certain about. You are welcome to call us if you are not sure and we will be happy to assist you.