Computer Health Archives - MD Computing Blog http://www.mdcomputing.com/category/computer-health Keeping you and your computers, email, websites, and networks healthy Fri, 02 Mar 2012 16:01:34 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 Defragging Your Drive: What, When, Why and How http://www.mdcomputing.com/defragging-your-drive-what-when-why-and-how http://www.mdcomputing.com/defragging-your-drive-what-when-why-and-how#respond Fri, 02 Mar 2012 16:01:07 +0000 http://www.mdcomputing.com/?p=148 Computers require basic maintenance tasks to ensure they run smoothly and do not suffer performance degradation. One of the most basic tasks you can perform to speed up a sluggish PC is defragging the hard drive. While this may sound like a complicated task, it is relatively simple and can result in drastic speed improvements.

What Is Fragmentation?

defrag hard driveEvery time you use your computer, data is being written and rewritten to your PC’s hard drive. As time passes, this results in the data on your hard drive being fragmented or stored in un-optimized locations.

A simple way to visualize this process is to think of a jigsaw puzzle. You start with a puzzle that is completely assembled, but over time pieces of the puzzle are taken out so they can be examined and used. However, once they are examined, the pieces aren’t put back where they were taken from. Instead, they are tossed into a pile with other puzzle pieces. As the drive is used more and more, the pile grows and more of the puzzle is missing. This is a process called fragmentation.

When your drive becomes fragmented, it often drastically slows down the performance of your pc because each time it needs to access data it has to search across a wide area of the disk to find the pieces of data that goes together.

How to Fix Fragmentation

To fix fragmentation, a process called drive defragmentation should be performed periodically. Basically, the defragmentation process will take that pile of puzzle pieces and fit them back into the puzzle where they belong. Once the pieces are back where they belong, performance often drastically improves and your PC runs noticeably better.

On a Windows computer, the defragmentation process is completely automated. You run the defrag tool in Windows, and then the operating system does all of the work for you. However, during the process it is usually best if you do not use your PC for other tasks. The process works quicker if data is not being accessed during it. On a larger hard drive, the process can take a longer period of time. For very large drives, it can take hours to run, so it is often best to begin the defragmentation at night and leave it running without interference.

The Windows Defragmentation Tool

Starting with Windows Vista, newer versions of Windows automatically perform defragmentation tasks when they are needed. For people who use Vista or Windows 7, you will not need to run the defragmentation tool manually. The tool is still available within the operating system, but you do not need to manually perform this task on a regular basis.

For those using Windows XP or prior, the defragmentation tool is located within the computer properties under the tool tab. To access the tool, you would right click on “My Computer” and then click on properties. In the properties screen, you will then select the “Tools” tab. On the tools tab, there is a button labeled “Defragment Now.” Clicking this button will begin the defragmentation process.

How Often To Defragment Your Drive

There is no exact interval that this type of maintenance should be performed at. However, many people choose to defragment their drives every few months even if their performance has not slowed. By defragging the drive at a regular interval, you can avoid performance slowdowns, and it will make the defragmentation process quicker. If the drive is defragmented often, there is less work to be done during the process because there are less “puzzle pieces” in the pile to reassemble.

Regular Maintenance Results in A Healthier PC

Disk defragmentation is part of regular maintenance that results in a healthier computer. By regularly defragmenting your hard drive, you can prevent sluggish performance and ensure your computer operates at optimum efficiency. The process is fully automated and easy to begin, so you should not hesitate to perform this maintenance on your PC.

]]>
http://www.mdcomputing.com/defragging-your-drive-what-when-why-and-how/feed 0
How To Identify and Avoid Malware http://www.mdcomputing.com/how-to-identify-and-avoid-malware http://www.mdcomputing.com/how-to-identify-and-avoid-malware#respond Sun, 22 Jan 2012 18:28:32 +0000 http://www.mdcomputing.com/?p=129 The term “malware” is used to describe a wide range of malicious software programs. This includes viruses and worms, spyware and scareware. Basically, these programs and codes are developed with the intent to steal information, damage the operations of a computer or trick people into paying for an illegitimate service. Malware can include everything from Internet browser plug-ins to programs that appear to be legitimate antivirus suites.

identifying and avoiding malwareTypical malware infection behavior includes:
• Experiencing a large quantity of popup ads, even when not actively surfing websites
• Receiving a flood of spam emails
• Sudden poor computer performance
• The sudden appearance of new browser toolbars or applications
• Having credit card and other sensitive information stolen

What Are the Most Popular Types of Malware?

The most popular types of malware include viruses and worms, spyware and scareware. These forms of malware are quickly and easily spread over the Internet, and they pose the greatest risk to both home and business computer users.

Viruses and Worms

Viruses and worms are infectious malware programs that attempt to spread quickly from computer to computer, often without any user intervention. These types of infections are typically the most destructive. Viruses usually come in the form of an executable file that needs to be run on a system in order to do its damage. A worm normally does not need any user interaction to infect a machine and spread to other devices.

Viruses and worms are often used by malware authors to create backdoor access into a large amount of home or business computers. These computers are then remotely controlled by the attackers and used to populate botnets and send spam emails.

Spyware

There are two main types of spyware. The first type is typically benign and is generally referred to as “adware.” This type of spyware creates popup ads and is a general nuisance, but it does no actual harm to a computer. The second type of spyware is more nefarious. This type of spyware includes programs and codes that often act as key loggers, site redirectors and information gatherers.

The malicious form of spyware is commonly used to steal personal financial information. It records everything from keystrokes to mouse clicks and then relays this information back to hackers over the Internet. The hackers then use this information to access banking sites and charge fraudulent transactions to credit cards.

Scareware

Scareware is a popular and quickly growing subtype of traditional adware. While traditional adware is mainly nuisance software used to spread ads and increase website traffic, scareware takes this scenario one step further. With scareware, the malware authors attempt to fraudulently scare computer users into buying fake software.

One of the most popular scareware scams takes the form of fake antivirus software programs. A computer user will get a popup ad that states a virus has been found, and they need to pay a subscription fee to remove the virus. After the fee is paid, nothing happens. The computer user loses the fee they paid, and the scareware remains on their computer.

Avoiding Malware

Malware is widespread on the Internet, but it is not impossible to avoid. By using safe computing habits, you can avoid malware and keep your computer free from infections. The foundation of safe computing is comprised of using legitimate, and up-to-date, antivirus software and practicing secure computing habits.

Basic secure computing habits include:
• Avoiding suspicious or shady websites
• Using popup blockers and content filters
• Never clicking on popup ads
• Never downloading unknown or unverified files from the Internet
• Never opening emails from unknown or unrecognized senders
• Using secure passwords that are periodically changed
• Never using the same password for social networking or email sites and financial sites

The Internet can be a dangerous place, and you must be vigilant to keep your computer and sensitive information safeguarded. By practicing these habits and using an updated and legitimate antivirus product, you will be able to successfully avoid the vast majority of malware infections.

]]>
http://www.mdcomputing.com/how-to-identify-and-avoid-malware/feed 0
Introduction to Antivirus Software (Including Recommendations) http://www.mdcomputing.com/introduction-to-antivirus-software-including-recommendations http://www.mdcomputing.com/introduction-to-antivirus-software-including-recommendations#respond Sat, 31 Dec 2011 21:55:58 +0000 http://www.mdcomputing.com/?p=103 Dangers loom everywhere on the internet, and when surfing the net, it is always better to be safe than sorry. Even though you may not intentionally visit suspicious websites, one wrong click to a seemingly innocent site can still leave your computer infected with a malicious computer virus or malware. Once on your computer, these harmful programs can steal your sensitive information and destroy your files. Often, infected machines need to have their hard drives wiped completely clean in order to truly eradicate the virus. This results in the loss of files, photos and other vital data.

Computer Websites Being HackedHackers and other miscreants are constantly churning out new viruses and malware that is designed to steal financial information, website passwords and other sensitive information from innocent victims. Millions of new viruses pop up each year and new threats are discovered every day. In this constantly changing environment, it is impossible to completely avoid the threat of viruses, but using trustworthy antivirus software can minimize your risk for infection and the damage done.

What Is Antivirus Software?

Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs are able to scan your computer’s hard drive and identify files that are malicious or suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files that are harmful. Additionally, many antivirus software suites also have settings that can prevent your computer from downloading or executing harmful files in the first place.

Use Caution When Choosing Antivirus Software

Unfortunately, in the world of antivirus software, not all products provide equal protection. As awareness of antivirus software has spread, even antivirus programs have become the target of unscrupulous hackers and attackers. As a result, there are many programs on the internet that appear to be legitimate antivirus suites, yet they are really malicious programs designed to steal information and infect machines. This all-too-common scenario makes it even more important to choose a trustworthy antivirus software solution.

Thankfully, there are many trustworthy companies that produce antivirus software. These products have a wide range of features and a wide range of costs, but the available options provide a large scope of legitimate software suites to choose from.

Choosing the Best Antivirus Solution

The first aspect to consider when choosing antivirus software is typically cost. Full featured suites can cost a pretty penny, but there are also free options that provide adequate coverage for home computer users. The most popular free option is Microsoft Security Essentials.

Microsoft entered the antivirus arena in 2009, with its Microsoft Security Essentials product. Offered for free, this product provides a good level of support and protection for users of Microsoft Windows products. MSE has received rave reviews since its release, and it is currently the most popular antivirus software used in North America and the second most popular antivirus software used worldwide.

The product is easy to download and install, and is an excellent choice for those who are not computer savvy. Due to these factors, MSE is a full-featured suite that can be safely recommended for the vast majority of computer users. It can be downloaded here.

However, MSE can only be used on legally licensed Windows computers. For those who wish to seek other options here is a short list of the top software providers for both free and premium antivirus suites. While this list may not include all trustworthy antivirus vendors, it includes a good variety of different programs that should meet the needs of most computer users.

Free Antivirus Software Products
AVG Antivirus: http://free.avg.com
Avast!: http://www.avast.com

Premium Antivirus Software Products
McAfee VirusScan: http://www.mcafee.com
Symantic: http://www.symantic.com
Trend Micro: http://www.trendmicro.com
Kaspersky: http://www.kaspersky.com

Keeping Your Computer Safe

It is important to remember that even though antivirus software provides protection from malicious files, it is not foolproof. While the products available do an excellent job of detecting known viruses, there is always the potential of becoming infected with a piece of malware that is not yet detectable. The best way to avoid this scenario is to practice overall safe computing habits combined with your antivirus software.

]]>
http://www.mdcomputing.com/introduction-to-antivirus-software-including-recommendations/feed 0
What To Do If You Get a Computer Virus http://www.mdcomputing.com/what-to-do-if-you-get-a-computer-virus http://www.mdcomputing.com/what-to-do-if-you-get-a-computer-virus#respond Sun, 04 Dec 2011 06:48:58 +0000 http://www.mdcomputing.com/?p=6 Everyone dreads getting a pop-up notification stating that a virus has been found on their computer. However, you don’t need to panic the moment you get one of these dreaded notifications. Instead, you should follow these simple steps.

Step One: Isolate the Virus

computer virus cleanupFirst, you should isolate the virus from other computers by unplugging your network connection. When you see a virus notification pop up, the immediate reaction should be to remove your computer from the network it is on. Unplug your computer’s network cable or disable your wireless network card immediately. This will prevent the virus from spreading to other computers on your network or transmitting data to the Internet.

Step Two: Carefully Read the Notification

There are two reasons to carefully read the notification that pops up. First, you want to make sure that it is really your virus scan software that detected something. Then, you will need to know what exactly your software did to the threat. If the notification window wants you to purchase software, that should be an immediate red flag.

There are many viruses out there that appear to be virus scanning software and alert users to a threat found on their computer. Then, it directs you to purchase software that will remove the virus. Unfortunately, this is a nefarious scam, where a virus tries to trick people into paying for a fake product. In this situation, you will need to download a real antivirus product to remove the fake one.

Step Three: Determine if your Antivirus Removed the Virus

After verifying that it is really your virus scan software that detected something, it’s important to know if your software has removed or neutralized the threat by itself. Often, your virus scan software will be able to detect and remove minor malware infections, viruses and other unwanted programs on its own. If it shows the virus was removed or deleted, then you should reboot your computer and run another full scan. Unfortunately, many times a computer will appear to be clean, but the virus will reappear after the machine is rebooted.

Step Four: Know When to Call Tech Support

If your virus scan software cannot successfully remove the virus on its own, then it may be time to call for help. Some antivirus vendors offer phone support to their customers, and this can be an excellent resource for removing stubborn virus infections. Additionally, IT support services offered by companies like The Geek Squad or local computer companies can also help you successfully recover your computer. While it may not be fun to pay a professional to clean up your computer, it is the best way to insure the virus gets removed and your data is salvaged.

Prevention is the Best Cure

When it comes to dealing with viruses, prevention is truly the best cure possible. Even IT professionals cannot always remove a virus without losing data on your computer. The best way to avoid the frustration of dealing with viruses is to avoid downloading them completely. Good habits like avoiding malicious websites and refusing to open emails from senders you do not know are excellent ways to avoid the majority of computer viruses.

Additionally, if a virus does unintentionally get downloaded, antivirus software can prevent it from running and damaging your machine. Always run a trusted brand of antivirus software, and ensure it is kept up-to-date.

]]>
http://www.mdcomputing.com/what-to-do-if-you-get-a-computer-virus/feed 0