SlideShare a Scribd company logo
1 of 39
Keep Your PC Functioning




     Copyright 2012 Cyberspace Virtual Services
         http://www.virtualservices.com.au
Hardware




               Basic PC
              Maintenance




                Software
                  and
                Security


Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Dust



Enemies
                                                  HEAT




    Copyright 2012 Cyberspace Virtual Services
        http://www.virtualservices.com.au
"Your computer could fry if you
      don't keep it clean,"
says Jonathon Millman, Chief Technology
      Officer for Hooplah Interactive.



         Copyright 2012 Cyberspace Virtual Services
             http://www.virtualservices.com.au
Keep Your PC Squeaky Clean

You will need:
  can of compressed air (available from
   computer dealers or office-supply stores);
  cotton pads (do not use a cotton ball);
  paper towels or anti-static cloths;
  rubbing alcohol;
  screwdriver, and lastly
  clean water.

            Copyright 2012 Cyberspace Virtual Services
                http://www.virtualservices.com.au
Always…
turn your computer off before you set
  off and unplug all the connectors.




        Copyright 2012 Cyberspace Virtual Services
            http://www.virtualservices.com.au
Cleaning Steps
Step 1: Within the box
Step 2: Outside the box
Step 3: Keyboard
  Spills
      For all spills, be aware that anything other than plain
       water may cause severe damage. Never, ever, try to
       dry a keyboard or laptop in a microwave or
       conventional oven.
 Step 4: Mouse
Step 5: Monitor
            Copyright 2012 Cyberspace Virtual Services
                http://www.virtualservices.com.au
HEAT




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Software and Security




   Copyright 2012 Cyberspace Virtual Services
       http://www.virtualservices.com.au
Software
Preventive Maintenance Plan




   Copyright 2012 Cyberspace Virtual Services
       http://www.virtualservices.com.au
Software

            Schedule




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Software
           Hard Disk




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Software


             Windows Tools
Check Disk;

Disk Cleanup, and

Disk Defragmenter




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Software


            Run Frequency
Check Disk — Weekly;

Disk Cleanup — Weekly, and

Disk Defragmenter — Monthly




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Check Disk


    Check Disk won’t be available in the scroll-down list of
    programs that you can select from in the Task
    Scheduler; you will need to select it manually
•   Click Browse
•   Navigate to windows  system32 chkdsk.exe.
•   Select chkdsk.exe.
•   Click Open.



                 Copyright 2012 Cyberspace Virtual Services
                     http://www.virtualservices.com.au
Check Disk
           and Task Scheduler

  Task Scheduler, will enable you to schedule Check Disk
  to run automatically at weekly intervals, at times to suit
  your PC use.
                        Windows XP
• Click Start  All Programs;
• Point to Accessories; point to System Tools, click
  Scheduled Tasks, and
• Follow the instructions in the Scheduled Task Wizard.


                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
Check Disk
             and Task Scheduler
               Windows Vista and Windows 7
• Click Start  All Programs  Accessories  System Tools
   Task Scheduler;
• Click Create Basic Task;
• Type the task name and click Next;
• Click Daily  Next, and specify the schedule you want to use. Click
  Next;
• To schedule Check Disk to start automatically, click Start a
  program, and then click Next;
• Click Browse to find Check Disk, click Next, and
• Click Finish.

                  Copyright 2012 Cyberspace Virtual Services
                      http://www.virtualservices.com.au
Disk Cleanup

  Over time, a large number of temporary files, from
  several sources, can be collected. The World Wide Web
  is a principal offender, and the cumulative effect is to
  slow down the operation of your PC.

Use the Task Scheduler to run Disk Cleanup on a weekly basis.
The program you will need to add to your schedule is “cleanmgr.exe”.




                  Copyright 2012 Cyberspace Virtual Services
                      http://www.virtualservices.com.au
Disk Defragmenter
Files can become too large to store in a single position on your hard
disk, so your PC will split it into fragments.
These fragmented files build up on your hard disk, and degrade your
computer performance.
The built in program Disk Fragmenter will rearrange these file
fragments for quicker access.
Use the Task Scheduler to schedule the Disk Fragmenter program
to run monthly. The program to be scheduled is Defrag.exe.




                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
NASTIES




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Malware




“Nasties”can be lumped together under the heading
“malware”, which is short for “malicious software”.
They are:
• Spyware;
• Trojan Horses;
• Viruses, and
• Worms.
               Copyright 2012 Cyberspace Virtual Services
                   http://www.virtualservices.com.au
Destroy Malware




         Don’t take any chances with malware.
       Check for, and repair, any damage NOW.
                     A useful tool is:
     Microsoft’s “Malicious Software Removal Tool”.
              You can download this from:
http://www.microsoft.com/security/malwareremove/default.mspx

               Copyright 2012 Cyberspace Virtual Services
                   http://www.virtualservices.com.au
Use a Firewall




 A firewall is a hardware or software device that will protect
your PC by not allowing unauthorized users to gain access
             from either the Internet or a network.

Running one of the Windows Firewalls will not do any harm but I
 have a preference instead for the free PC Tools Firewall from
               http://www.pctools.com/firewall/ .

                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
Spyware



 Spyware collects information about you or your business without you
being aware of its existence. It can weigh down your system and even
                          shut down services.
   You should always use an anti-spyware program to scan for and
                  remove any spyware from your PC.
              A couple of good ones to use, that are free, are:
                      “Microsoft Security Essentials”,
     http://www.microsoft.com/download/en/details.aspx?id=5201 , and
                        “Spybot Search & Destroy”,
                     http://www.safer-networking.org/ .
                  Copyright 2012 Cyberspace Virtual Services
                      http://www.virtualservices.com.au
Trojan Horse




A Trojan Horse is a program that appears to be a
               useful application.
However, instead, it will compromise your security
        and cause wide ranging damage.

             Copyright 2012 Cyberspace Virtual Services
                 http://www.virtualservices.com.au
Virus



A virus takes the form of a piece of computer code that
 attaches itself to a program or file so it can spread from
       computer to computer, infecting as it travels.
Viruses can damage your software, your hardware, and
                          your files.
It is critical that the virus protection definition
       files on your computer stay updated.
              Copyright 2012 Cyberspace Virtual Services
                  http://www.virtualservices.com.au
Worms



               (They infect PCs too)

   A worm spreads without user action and
distributes complete copies of itself (sometimes
           modified), across networks.
  A worm can consume memory or network
     bandwidth, causing a computer to stop
                  responding.
          Copyright 2012 Cyberspace Virtual Services
              http://www.virtualservices.com.au
Microsoft Update


Microsoft regularly issues updates (patches) to fix
     bugs and plug security holes in Windows.
  These 'security holes' can be used by worms,
     viruses and hackers to compromise your
 system, so it is vital to keep Windows up-to-date.
        • How long does it take, and
           • How often do I do it?
             Copyright 2012 Cyberspace Virtual Services
                 http://www.virtualservices.com.au
Microsoft Update


The first time you carry out this procedure, it may
                  take a “long time”.
      It is so IMPORTANT not to be put off.
Even after you have updated your Windows you
   MUST repeat the update procedure at least
                   once per month.
These 'monthly' updates will be quick and easy.

             Copyright 2012 Cyberspace Virtual Services
                 http://www.virtualservices.com.au
Schedule Microsoft Update




To configure a schedule for Automatic Updates:
    1.Click the “Start button”;
    Click “Control Panel”; click “System and Security”, and
    then, four items down, click “Windows Update” and
    then in the left pane click “Change settings”.


              Copyright 2012 Cyberspace Virtual Services
                  http://www.virtualservices.com.au
Schedule Microsoft Update (2)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (3)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (4)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (5)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (5)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (6)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
SUMMARY
1. Routine Maintenance — Physical
       a) Internal, and
       b) External
2. Installation and regular updating of effective anti-virus
    and –malware software.
3. Regular updating of operating system and all installed
    applications.
4. Be careful of what you download and where you
    download it from.
5. Don’t click on links in e-mail messages from unknown
    sources.


                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
?

Any questions?




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au

More Related Content

What's hot (7)

Spring Launch
Spring LaunchSpring Launch
Spring Launch
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME's
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021
 
4.it activities one pager
4.it activities   one pager4.it activities   one pager
4.it activities one pager
 
L49 slides
L49 slidesL49 slides
L49 slides
 

Viewers also liked (10)

REC 3325 Budget Project
REC 3325 Budget ProjectREC 3325 Budget Project
REC 3325 Budget Project
 
Ejercicios estructira con arrays
Ejercicios estructira con arraysEjercicios estructira con arrays
Ejercicios estructira con arrays
 
Student Record
Student RecordStudent Record
Student Record
 
PRO_НАС для ВАС_new
PRO_НАС для ВАС_newPRO_НАС для ВАС_new
PRO_НАС для ВАС_new
 
TWT Tennis Camp Program Plan
TWT Tennis Camp Program PlanTWT Tennis Camp Program Plan
TWT Tennis Camp Program Plan
 
Erin Morin - cvr
Erin Morin - cvrErin Morin - cvr
Erin Morin - cvr
 
Content marketing in 2017
Content marketing in 2017Content marketing in 2017
Content marketing in 2017
 
Brenda Final Layout
Brenda Final LayoutBrenda Final Layout
Brenda Final Layout
 
Primary Research Task - Unit G324
Primary Research Task - Unit G324Primary Research Task - Unit G324
Primary Research Task - Unit G324
 
Propp's Character Roles and Narrative Functions - Unit G324
Propp's Character Roles and Narrative Functions - Unit G324Propp's Character Roles and Narrative Functions - Unit G324
Propp's Character Roles and Narrative Functions - Unit G324
 

Similar to PC Maintenance

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
Concentrated Technology
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
DiannClarke
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
DiannClarke
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
DiannClarke
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
HayWhitfield72
 

Similar to PC Maintenance (20)

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Optimize Your Pc
Optimize Your PcOptimize Your Pc
Optimize Your Pc
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 
Internet security
Internet securityInternet security
Internet security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.com
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

PC Maintenance

  • 1. Keep Your PC Functioning Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 2. Hardware Basic PC Maintenance Software and Security Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 3. Dust Enemies HEAT Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 4. "Your computer could fry if you don't keep it clean," says Jonathon Millman, Chief Technology Officer for Hooplah Interactive. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 5. Keep Your PC Squeaky Clean You will need: can of compressed air (available from computer dealers or office-supply stores); cotton pads (do not use a cotton ball); paper towels or anti-static cloths; rubbing alcohol; screwdriver, and lastly clean water. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 6. Always… turn your computer off before you set off and unplug all the connectors. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 7. Cleaning Steps Step 1: Within the box Step 2: Outside the box Step 3: Keyboard Spills  For all spills, be aware that anything other than plain water may cause severe damage. Never, ever, try to dry a keyboard or laptop in a microwave or conventional oven.  Step 4: Mouse Step 5: Monitor Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 8. HEAT Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 9. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 10. Software and Security Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 11. Software Preventive Maintenance Plan Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 12. Software Schedule Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 13. Software Hard Disk Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 14. Software Windows Tools Check Disk; Disk Cleanup, and Disk Defragmenter Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 15. Software Run Frequency Check Disk — Weekly; Disk Cleanup — Weekly, and Disk Defragmenter — Monthly Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 16. Check Disk Check Disk won’t be available in the scroll-down list of programs that you can select from in the Task Scheduler; you will need to select it manually • Click Browse • Navigate to windows system32 chkdsk.exe. • Select chkdsk.exe. • Click Open. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 17. Check Disk and Task Scheduler Task Scheduler, will enable you to schedule Check Disk to run automatically at weekly intervals, at times to suit your PC use. Windows XP • Click Start All Programs; • Point to Accessories; point to System Tools, click Scheduled Tasks, and • Follow the instructions in the Scheduled Task Wizard. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 18. Check Disk and Task Scheduler Windows Vista and Windows 7 • Click Start All Programs Accessories System Tools Task Scheduler; • Click Create Basic Task; • Type the task name and click Next; • Click Daily Next, and specify the schedule you want to use. Click Next; • To schedule Check Disk to start automatically, click Start a program, and then click Next; • Click Browse to find Check Disk, click Next, and • Click Finish. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 19. Disk Cleanup Over time, a large number of temporary files, from several sources, can be collected. The World Wide Web is a principal offender, and the cumulative effect is to slow down the operation of your PC. Use the Task Scheduler to run Disk Cleanup on a weekly basis. The program you will need to add to your schedule is “cleanmgr.exe”. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 20. Disk Defragmenter Files can become too large to store in a single position on your hard disk, so your PC will split it into fragments. These fragmented files build up on your hard disk, and degrade your computer performance. The built in program Disk Fragmenter will rearrange these file fragments for quicker access. Use the Task Scheduler to schedule the Disk Fragmenter program to run monthly. The program to be scheduled is Defrag.exe. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 21. NASTIES Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 22. Malware “Nasties”can be lumped together under the heading “malware”, which is short for “malicious software”. They are: • Spyware; • Trojan Horses; • Viruses, and • Worms. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 23. Destroy Malware Don’t take any chances with malware. Check for, and repair, any damage NOW. A useful tool is: Microsoft’s “Malicious Software Removal Tool”. You can download this from: http://www.microsoft.com/security/malwareremove/default.mspx Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 24. Use a Firewall A firewall is a hardware or software device that will protect your PC by not allowing unauthorized users to gain access from either the Internet or a network. Running one of the Windows Firewalls will not do any harm but I have a preference instead for the free PC Tools Firewall from http://www.pctools.com/firewall/ . Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 25. Spyware Spyware collects information about you or your business without you being aware of its existence. It can weigh down your system and even shut down services. You should always use an anti-spyware program to scan for and remove any spyware from your PC. A couple of good ones to use, that are free, are: “Microsoft Security Essentials”, http://www.microsoft.com/download/en/details.aspx?id=5201 , and “Spybot Search & Destroy”, http://www.safer-networking.org/ . Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 26. Trojan Horse A Trojan Horse is a program that appears to be a useful application. However, instead, it will compromise your security and cause wide ranging damage. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 27. Virus A virus takes the form of a piece of computer code that attaches itself to a program or file so it can spread from computer to computer, infecting as it travels. Viruses can damage your software, your hardware, and your files. It is critical that the virus protection definition files on your computer stay updated. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 28. Worms (They infect PCs too) A worm spreads without user action and distributes complete copies of itself (sometimes modified), across networks. A worm can consume memory or network bandwidth, causing a computer to stop responding. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 29. Microsoft Update Microsoft regularly issues updates (patches) to fix bugs and plug security holes in Windows. These 'security holes' can be used by worms, viruses and hackers to compromise your system, so it is vital to keep Windows up-to-date. • How long does it take, and • How often do I do it? Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 30. Microsoft Update The first time you carry out this procedure, it may take a “long time”. It is so IMPORTANT not to be put off. Even after you have updated your Windows you MUST repeat the update procedure at least once per month. These 'monthly' updates will be quick and easy. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 31. Schedule Microsoft Update To configure a schedule for Automatic Updates: 1.Click the “Start button”; Click “Control Panel”; click “System and Security”, and then, four items down, click “Windows Update” and then in the left pane click “Change settings”. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 32. Schedule Microsoft Update (2) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 33. Schedule Microsoft Update (3) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 34. Schedule Microsoft Update (4) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 35. Schedule Microsoft Update (5) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 36. Schedule Microsoft Update (5) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 37. Schedule Microsoft Update (6) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 38. SUMMARY 1. Routine Maintenance — Physical a) Internal, and b) External 2. Installation and regular updating of effective anti-virus and –malware software. 3. Regular updating of operating system and all installed applications. 4. Be careful of what you download and where you download it from. 5. Don’t click on links in e-mail messages from unknown sources. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 39. ? Any questions? Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au