When you first started using that new computer it booted up quickly; Excel, Word and your email client popped open almost instantly, and you were almost as happy as a gopher in soft dirt...
But lately things have changed. It has slowed to a crawl, taking forever to boot up and web surfing; especially if you are on a dial-up connection is excruciatingly, impossibly slow. Has a demon from the depths of hell possessed your PC? Nothing’s impossible, but it’s highly improbable. So what has happened?
While it could be hardware related, more likely the cause is fairly simple.
But lately things have changed. It has slowed to a crawl, taking forever to boot up and web surfing; especially if you are on a dial-up connection is excruciatingly, impossibly slow. Has a demon from the depths of hell possessed your PC? Nothing’s impossible, but it’s highly improbable. So what has happened?
While it could be hardware related, more likely the cause is fairly simple.
- You have not cleared out your Temporary Internet Files.
- Your registry is overloaded with redundant entries and invalid keys.
- Your computer is infested with adware, spyware, malware, foistware, viruses or worms.
Deleting Temporary Internet Files
If you are using Internet Explorer you can delete the Temporary Internet Files by selecting Internet Options and selecting the General tab. In the Temporary Internet files section click the button labeled Delete Files and then OK. This will remove all Temporary Internet files from their folder on your hard drive. Deleting Temporary Internet files does not however remove cookies that are set on your machine.
No we’re not talking chocolate chips here. An internet cookie is a small text file that is saved on your hard drive by a Web server and can save you time by personalizing pages, or remembering information that you enter when you register for products or services. The next time you return, it can guide you toward content of interest to you based on what you have looked at previously. When you register for another product or service, it can automatically fill in questions you've previously answered.
Cookies are generally harmless and we recommend keeping them and turn off the "Always confirm before setting a cookie" feature in your browser. Cookies are very popular these days and some sites will set several cookies on each page. It would be really annoying to confirm each and every cookie you receive. And many internet sites won't work properly without cookies.
If however, you want to clean out all unwanted and unneeded files and want to delete cookies, stop and think about each before deleting it. You should ask yourself, "did I submit information on that site that I do not want to submit over and over again every time I return?" If so, you will want to leave those cookies on your system.
The Registry
Whether your computer is brand new or dates back to the Stone Age, almost every PC contains Registry errors that can cause general slowdowns, system freezes, and phantom errors. Software can easily leave traces behind, so applications you think you have completely removed can still be cluttering up your computer.
Although registry problems are usually caused when you improperly install/uninstall software, minor things like shortcuts to non existent programs, redundant files, invalid application paths can also result in bugs and errors that can cripple your computer.
Registry cleaning is generally best left to your IT support person or support vendor, but if you insist on a D-I-Y approach use a trusted and proven product like CCleaner, McAfee or Norton and follow the directions to the letter. While they will not get everything cleaned up, you should see a definite improvement. But whatever you do, do not attempt to use RegEdit to directly edit your computer’s registry … leave that to a professional as editing the wrong entry can render your PC completely unusable.
The Wares
Adware is software that generates advertisements such as pop-up windows or hotlinks on Web pages that are not part of a page's code and may also add undesired links to your favorites and to your desktop. Adware can also change your home page and your search engine to sites designed to earn income from various advertisers.
Spyware is software that collects and transmits user specific behavior and information, with or without permission. Sometimes, permission to collect and transmit is assumed to have been given simply by the act of installing software or loading a Web page. In reality, few people even notice the “End-User License Agreement” or “Terms of Use/Service/Installation” that are displayed during installation.
Like adware, this data collection process is basically harmless if done with consent or for a reasonable purpose. For example, software that transmits user specific information for the legitimate purpose of confirming eligibility for updates or upgrades should not be classed as spyware. And most people would agree that software developers have a right to ensure that their software is not being pirated, and that the users of pirated software are not receiving the same benefits as legitimate users.
Malware is a completely different thing. Malware is software that damages your system, causes instability and exhibits such antisocial behavior as changing your personal settings or interfering with a computer's registry and security settings. Typical types include trojans, viruses and worms.
Bundled Software (sometimes called Foistware) is software (often adware and/or spyware) that is included with a particular product, and without which the product will not operate, or which is compulsory according to a product's “End-User License Agreement”.
When the wares first began appearing they were very simple and usually involved only a few files which could be easily deleted or disabled. However, as they have matured they have, like HAL in the 2001 Space Odyssey, become smarter. It seems as fast as the clean-up experts develop improved ways to eliminate or minimize them, those behind them fight back with new tricks.
For years now, malware has been polluting and changing our computers' registries, and using random file names that are increasingly harder to identify and remove. And even if victims are able to remove the offending malware, they are sometimes unable to change hijacked home pages or other settings back to what they want because the relevant buttons have been grayed out (made unavailable). Even entire sections sometimes disappear completely from within Internet Options when the bad guys take advantage and compromise your Internet Explorer settings.
Scary, you bet! And it gets scarier … Malware writers can now design their programs so that they reinstall automatically if removed, sometimes using completely different file names. It can now also monitor itself and even the computer registry for detrimental changes. If that’s not enough, other antisocial behavior that has appeared recently includes: using super hidden files, registering the malware processes as a Microsoft Windows Service, and changing a victim's security rights so that they are unable to remove the malware.
Ok, your PC is infected. Now what?
Back up all critical files and start cleaning up the mess. It isn’t easy and it can be time consuming and oftentimes intimidating for the average user when they are faced with the task of removing adware, malware and spyware. And it can be difficult, even for experts, to get rid of some of the worst offenders.
So what’s the answer?
- Keep informed about current virus trends by educating yourself about new viruses and their symptoms. This way, if you receive an email, for example, that contains a subject line that corresponds with a current virus; you will know not to open it. For example, one recent deception used by virus writers was to disguise an infected email to look like it came from Microsoft and contains an important update to Windows.
- Get a good Virus Scanner and a Firewall, available from McAfee, Norton (Symantec) or Trend Micro which incorporate virus scanning, personal firewall, PDA, wireless, and instant messaging protection into one easy-to-use application. And keep your virus scanner and firewall software updated, activate all real-time protection options, and scan your computer frequently, especially after receiving updates. There's always a chance of catching a virus between the times an update comes out which enables your virus scanner to recognize it and the time you install the update.
- Keep Windows Updated as many viruses exploit security vulnerabilities in Windows or its components, especially Internet Explorer, Outlook, Outlook Express, and subroutines and protocols involved in network connectivity. Upgrade to Microsoft XP Professional w/SP2 immediately as it is more secure than previous versions and makes it more difficult for the bad guys to compromise your machine and be certain to enable automatic updates.
- Avoid downloads from questionable sources or using "free" programs unless you are certain that they do not contain viruses or spyware. In addition, because viruses can spread over a network or via removable media (like floppies, CD's, or ZIP disks), be careful about sharing data or using programs that other people give you. Even if you do know and trust the person who just handed you that CD-R, run it through your virus scanner, anyway.
- Avoid Internet file sharing as many viruses and worms spread over public file-sharing networks such as KaZaa, Bearshare, or Morpheus. When you join a peer-to-peer network over the Internet, you are opening up your computer to ghosts, goblins and demons. Plus in most cases, you are also breaking the law and virtually guaranteeing that your machine will become filled with malware and spyware.
- Don't be fooled into downloading or purchasing BetrayWare (programs that claim to automatically fix everything wrong with your PC, optimize it and make the morning coffee) as the vast majority are a complete waste of time and money usually causing more harm than good.
If you have a stubborn virus infection that seems to be beyond the reach of McAfee, Norton or Trend Micro, you may be able to use an online virus scanner, but not necessarily. Like any other program, a virus cannot be removed from your computer while it is running. Usually it is necessary to first stop the running virus processes before a virus can be removed.
And if that’s the case, it is time to call in a “Microsoft Certified” professional.
We’re talking serious for a minute … If you have a PC or network problem that you don’t have the experience or knowledge to deal with always consult a bonded, certified, licensed professional. As with most things in life, you get what you pay for. Your computer infrastructure is the life blood of your company and should never be trusted to anyone without the training and experience only possessed by “Certified” professionals.
Be honest with yourself, and think “what would it cost to not have access to any of your customer, inventory or other files for an extended period”? Always buy “business grade”, never off-the-shelf or cheap white-box PCs, (we recommend the DELL Optiplex series which are highly configurable, reasonably priced and very reliable). Set aside time to maintain them on a regular basis, use a good anti-virus / firewall combination and automated back-up system and properly protect them with a quality UPS.
Nothing less makes any sense as its just too expensive not to!
Jaydien Network Solution
www.jaydien.com
Email Us: info@jaydien.com
Call Us: 877.561.6734
35 Beaverson Blvd, Suite 3A
Brick, NJ 08723
No comments:
Post a Comment