Results 1 to 13 of 13
  1. #1
    Join Date
    Jan 2007
    Location
    The Biggest Little City In The World
    Posts
    1,569
    Thanks (Given)
    0
    Thanks (Received)
    2
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    0

    Arrow Maintaining a Healthy PC

    Maintaining a Healthy PC



    The holiday season is over and the 2007 New Year has begun. It’s time to start making New Year’s resolutions. If you are like most people, one of your resolutions will be to get back into shape. Everyone knows how important it is to maintain a healthy lifestyle. But when was the last time you’ve thought about the health of your computer? For many, the computer is an integral part of their everyday life. You pay your bills online, perform online shopping, and use your computer for fun. Maintaining a healthy system is vital to an enjoyable computing experience. So why not make a resolution to get your computer in shape? With a little know how and some good advice, you will not forget about that resolution two months after you've started.

    Preventative Steps

    The Internet is lurking with viruses, worms, trojan horses, adware, spyware and other malicious programs collectively known as malware. These programs are just waiting to attack a vulnerable machine. The best way to maintain a healthy system is to prevent malware from entering your machine in the first place. The following recommendations will help build a solid wall between you and the Internet.

    Run anti-virus, anti-spyware, and firewall programs. The foundation to any secure system is to have antivirus, anti-spyware, and firewall programs. Charter offers the comprehensive, all in one Charter High-Speed Security Suite® at no additional charge for 3, 5, and 10Mbps subscribers. For more information and to download the security suite, please visit: http://charter.com/security.

    Keep your operating system up-to-date. Microsoft releases critical updates for its Windows XP and 2000 operating systems on the second Tuesday of every month. Updates can be obtained automatically and also through http://windowsupdate.microsoft.com. Microsoft ended its support for Windows ME, 98SE, and 98 on July 11, 2006. Support for Windows 95 ended in 2001. No critical updates are available for those operating systems.

    Consider upgrading your Windows operating system. If you are running an operating system that is no longer supported by its manufacturer, you are potentially leaving your computer vulnerable to security risks. Many malicious programs take advantage of holes in your operating system. By upgrading to a supported operating system, you will be able to help close the security holes and reduce your risk of attack.

    Consider upgrading your web browser to IE7, Firefox2, or Opera 9. Microsoft, Mozilla and Opera Software ASA recently published major security upgrades to their web browsers. Some of the new features for these web browsers include: detection of phishing sites, spyware detection, simplified deletion of private information and improved data encryption.

    Safe Computing Practices

    Your doctor makes recommendations on how to maintain a healthy body. You try to eat right, exercise, and limit unhealthy practices. The same is true for your computer. Healthy computing practices will minimize your risk of getting your machine infected. The following tips will minimize your risk.

    Avoid using file sharing programs. Not only can downloading copyrighted material without permission from the copyright holder be illegal, you are also opening your machine up for infections. Many file sharing programs automatically share files and folders on your computer. When you are downloading files from file sharing programs, you are downloading something from a complete stranger. You inherently assume that person you are downloading the file from is trustworthy and that you are receiving the file you requested. That’s a risky assumption. The safest way to avoid getting infected by a file sharing program is not to use one

    Only download programs from trusted websites. Freeware/Shareware often includes spyware and adware. Be sure to read the End User License Agreement before installing Freeware/Shareware. The agreement usually states what else you will be installing if you install the downloaded program and what information it sends back to the company. If it is not a reputable source, don’t use it.

    Use caution with IM attachments, links, and social networking websites. Avoid downloading attachments and clicking on links from unknown sources using instant messaging programs. If you are chatting with someone you do trust, scan the attachment using an antivirus program before opening. Even someone you know can accidentally send you an infected attachment. Use caution while surfing social networking website. Websense Security Labs recently announced a new worm spreading on the MySpace network. The MySpace XSS QuickTime worm exploits the JavaScript support within Apple's embedded QuickTime player. The vulnerabilities are being used to replace the legitimate links on the user's MySpace profile with links to phishing sites.

    Only open email attachments from trusted sources. Most viruses and worms replicate themselves through email. Only open email attachments from people you trust and expect attachments from. Also, before opening the attachment, ensure your antivirus program scans the attachment for malware.

    Turn off Preview Pane for your email client. Many malicious emails embed code into the body of the email. When the email is opened, the code is automatically executed. The Preview Pane feature automatically opens your email. This can execute the malicious code and infect your machine. Turning off the preview pane will safely allow you to select and delete the malicious email without actually opening it.

    Infected PCs

    You cannot trust an infected computer. If your computer is infected with malware, the malicious program often tries to spread and replicate itself to other machines. It attempts to damage data on your computer, and track your surfing habits. The infected machine may also try to steal your personal information which could lead to identity theft. Phishing, the most common form of identity theft, accounted for more than $2.8 billion in financial losses in 2006, according to Gartner Research . The following tips will aid you in cleaning your machine.

    Perform local and online virus scans. F-Secure, the developer of the Charter High-Speed Security Suite® offers an online virus scan free of charge. F-Secure’s online virus scan will detect and attempt to remove viruses on your computer. You can run the online scan by visiting: http://support.f-secure.com/enu/home/ols.shtml.

    Perform a local virus scan using an emergency rescue disk. Many antivirus programs allow you to create an emergency rescue disk to use in the event your computer becomes infected. When you boot from your rescue disk, the antivirus program will scan your computer for viruses before your operating system loads. Performing this process will give your antivirus program access to files that may have been locked by the operating system. Refer to your antivirus help files for assistance with creating an emergency disk.

    Manually remove malware. Not all malware can be removed by a local or online virus scan, so manual removal of the malware may be required. If you know the name of the malware that is infecting your computer, perform an online search with the key words of “removal” and the name of the virus. You will find a wealth of information on how to manually remove the malware. Many antivirus companies provide removal tools for a specific virus outbreak, which makes the virus easier to remove. Note: manually removing a virus can be a tedious and a difficult talk. If you do not feel comfortable with the process, take your computer to a professional for cleaning.

    Reformat and reinstall your operating system. Reformatting your hard drive will remove most malware but it will also delete all of your personal files. Due to the data loss involved with this process, this step should only be used as a last resort. Before you begin this process, have your operating system or restore disk handy and refer to your PC manufacturer for assistance.

    For more information about online security, please visit http://charter.com/security.

    http://connect.charter.com/articles/...om@charter.net

  2. #2
    Join Date
    Jan 2007
    Posts
    990
    Thanks (Given)
    0
    Thanks (Received)
    0
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    556

    Default

    Is anyone else suspicious that spyware and anti-spyware are produced by the same people?
    America: White people footing the bill for a party they're not allowed to attend.

  3. #3
    Join Date
    Jan 2007
    Location
    The Biggest Little City In The World
    Posts
    1,569
    Thanks (Given)
    0
    Thanks (Received)
    2
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    0

    Default

    Quote Originally Posted by Hugh Lincoln View Post
    Is anyone else suspicious that spyware and anti-spyware are produced by the same people?
    Probably not the same people, but quite likely the same KIND of people. Geeks.

  4. #4
    Join Date
    May 2015
    Posts
    93
    Thanks (Given)
    8
    Thanks (Received)
    99
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    108461

    Default

    I run windows 7 ultimate (password copy) 32 bit on a Lenovo G460 with IE11.
    Because there’s very little copyright law in Asia, well none really, everything is a copy and passwords to programmes are simply got from hacker sites or passed around word to mouth. My USB stick contains viruses every time I use it on another machine here, but it’s never a problem.

    I use Microsoft Security Essentials as anti-virus (free), with Malwarebytes premium running in real time alongside it (full copy password) and USB guard (full copy password). My firewall is windows, tweaked.
    I also use CCleaner (free) and AVG PC Clean up 2011 version (full copy password), both of which I run every two days and a quick scan by MSE and Malwarebytes daily.
    The best ever virus finder I’ve come across is SUPERAntiSpyware, which is available as a free product. I use it for a quick 3 minute scan two or three times a day and every time I’ve used my USB on another machine.

    Never open attachments or links in your email if you don’t know who they’re from and even if you do, beware if the first visible line of the email sounds ‘strange’, their email has probably been hacked and it’s sending out spam.

    I use Vuze for downloading films and sites like isohunt to download torrents, plus VLC media to play them. If you’re going to download, always run a full virus and malware scan (including PUPS), after you’ve finished.

    Always, always back up important data on an external drive. You can easily reinstall, but using a specialised service to get back lost hard drive data is expensive.

    Just like every other piece of machinery, a computer requires maintenance and that’s up to you. Ten minutes a day spent cleaning it up and checking it pays dividends in the long run.


  5. Thanks Drummond, jimnyc thanked this post
  6. #5
    Join Date
    Sep 2014
    Location
    At your Six
    Posts
    16,429
    Thanks (Given)
    24430
    Thanks (Received)
    11203
    Likes (Given)
    6054
    Likes (Received)
    4658
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    26 Post(s)
    Rep Power
    13945541

    Default

    Hmmmmm.....



  7. #6
    Join Date
    May 2015
    Posts
    93
    Thanks (Given)
    8
    Thanks (Received)
    99
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    108461

    Default

    Quote Originally Posted by LongTermGuy View Post
    Hmmmmm.....
    ?

  8. #7
    Join Date
    Jul 2013
    Posts
    5,206
    Thanks (Given)
    5230
    Thanks (Received)
    5014
    Likes (Given)
    0
    Likes (Received)
    5
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    49 Post(s)
    Rep Power
    0

    Default

    Quote Originally Posted by John V View Post
    ?
    Hmmmmm.

  9. #8
    Join Date
    Jan 2007
    Location
    Arizona
    Posts
    49,013
    Thanks (Given)
    25501
    Thanks (Received)
    18957
    Likes (Given)
    10828
    Likes (Received)
    7417
    Piss Off (Given)
    86
    Piss Off (Received)
    10
    Mentioned
    206 Post(s)
    Rep Power
    21475543

    Default

    Nothing to see here, this post had zero to do with the ban. It's fine.


    "The government is a child that has found their parents credit card, and spends knowing that they never have to reconcile the bill with their own money"-Shannon Churchill


  10. Thanks LongTermGuy thanked this post
  11. #9
    Join Date
    Sep 2014
    Location
    At your Six
    Posts
    16,429
    Thanks (Given)
    24430
    Thanks (Received)
    11203
    Likes (Given)
    6054
    Likes (Received)
    4658
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    26 Post(s)
    Rep Power
    13945541

    Default

    Quote Originally Posted by Perianne View Post
    Hmmmmm.

    What Kat said...



  12. Thanks Kathianne thanked this post
  13. #10
    Join Date
    May 2015
    Posts
    93
    Thanks (Given)
    8
    Thanks (Received)
    99
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    108461

    Default

    Quote Originally Posted by LongTermGuy View Post
    What Kat said...
    Is this 'Hmmm' and 'ban' some sort of code that I'm missing out on?

  14. #11
    Join Date
    Sep 2014
    Location
    At your Six
    Posts
    16,429
    Thanks (Given)
    24430
    Thanks (Received)
    11203
    Likes (Given)
    6054
    Likes (Received)
    4658
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    26 Post(s)
    Rep Power
    13945541

    Default

    Quote Originally Posted by John V View Post
    Is this 'Hmmm' and 'ban' some sort of code that I'm missing out on?

    `what Kat said....all is good....take a deep breath



  15. #12
    Join Date
    May 2015
    Posts
    93
    Thanks (Given)
    8
    Thanks (Received)
    99
    Likes (Given)
    0
    Likes (Received)
    0
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    0 Post(s)
    Rep Power
    108461

    Default

    Quote Originally Posted by LongTermGuy View Post
    `what Kat said....all is good....take a deep breath
    OK, I'm doing that, what now?

  16. #13
    Join Date
    Jan 2007
    Location
    Westchester, New York
    Posts
    67,826
    Thanks (Given)
    7315
    Thanks (Received)
    34158
    Likes (Given)
    7051
    Likes (Received)
    7777
    Piss Off (Given)
    14
    Piss Off (Received)
    19
    Mentioned
    515 Post(s)
    Rep Power
    21475731

    Default

    For others reading, no mystery... I believe some thought that Pale somehow posted this thread although he was banned. John just added an awesome tidbit is all. Normally necroposting sucks - but stuff like this is always good for readers, for computer users.
    “You know the world is going crazy when the best rapper is a white guy, the best golfer is a black guy, the tallest guy in the NBA is Chinese, the Swiss hold the America's Cup, France is accusing the U.S. of arrogance, Germany doesn't want to go to war, and the three most powerful men in America are named "Bush", "Dick", and "Colin." Need I say more?” - Chris Rock

  17. Thanks LongTermGuy thanked this post

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Debate Policy - Political Forums