Be Your Own IT Department

If you use a computer, you need to know more than just how to use your email and surf the web. You need to know that you are protected. If there isn't someone responsible for the computers in your home or office, then pick someone, quick. Their job is to assure you that everything I've listed below is getting done on a regular basis so you can relax a little.

Antivirus

This should go without saying, but I still run into computers with expired Antivirus software quite often. In 2005, Antivirus software needs to be updated daily, and paid for yearly. If you haven't paid for a subscription, then you don't have current Antivirus Software.

Every month, someone should verify that your installed AV Software is running, and that is updating automatically, with current virus definitions. Sometimes they stop working or updating because they get attacked between updates. You must remain virus free.

Spyware

Spyware is EVIL software that is getting worse every day. Spyware is probably what's wrong with your computer. If you have not run spyware removal software lately then I guarantee that you have some on your system. It's that simple.

For you to remove the Spyware yourself, you must run an updated version of your favorite Spyware removal software at least once a month. Weekly is better. Just like Antivirus software, it needs to be updated all the time. However, unlike Antivirus software, most Anti-Spyware software will not update on its' own. Most have to be set to auto-update and protect you from further infection.

Windows Updates

Microsoft discovers and repairs flaws in their Windows Operating System on a near weekly basis. These "fixes" or "patches" are available for free at their website, and you should insure that your Windows updates are being done. Now that you probably have high speed internet, this step is critical for the security and functionality of your computers. Once you get some spyware, these security holes are being exploited.

In Windows XP, you can schedule this to happen automatically in the Properties of My Computer. I use auto update for myself, and all peer to peer networking customers. In a server environment, I don't recommend it. For other Windows versions than XP, you should update your Windows on a monthly basis at windowsupdate.com

Startup programs

There are dozens of software programs that can start up when Windows loads, slowing your computer to a crawl. These are usually apparent in the task bar by your clock, and by pressing CTL ? ALT ? DEL to see the services and applications. If you need a scroll bar, you're bogged down! By using a Windows utility called msconfig you can manage your startup items. Go to Start ? run and type msconfig ? then press Enter. Go to the Startup tab and you'll see the choices under the startup tab. Be careful in there, and pay attention.

Firewall

A Firewall keeps people from coming into your computer over the internet. Spyware and Trojan horse viruses make it easier for hackers to get into your computers, but even when your system is clean, the risk of attack is still there, if there's a Windows hole (and there is). You need a firewall, and if you have a wireless connection, you need secure password protection on the router to keep your neighbors out.

On a monthly basis, you need to be sure that your firewall, whether (software or hardware) is both turned on, and current. I can't tell you the number of times I find it intentionally disabled, with no malicious intent, but unprotected nonetheless. More knowledgeable users should review the logs for any abnormal activities.

Windows XP has a free firewall that is much better than nothing, and getting better every month with Windows update. To insure yours is on, go to Start ? Help and support ? and type firewall.

Disk Maintenance

Windows has two built in utilities called Scandisk and Disk Defragmenter. Scandisk checks the surface of your hard disk for flaws or errors that may be developing, and Disk Defragmenter rearranges the files on your hard drive for faster and easier access.

Depending on the version of Windows you're using, the names are a little different, but the utilities can always be accessed in the following way...

Reboot first, minimizing the amount of programs running in your Startup. Go to My Computer, and right click on your hard drive (usually the C: drive). Go to Properties and select the Tools tab and run Scandisk or "error checking" and Disk Defragmenter or "Defragmentation". In some computers, you'll need to reboot again.

It's well worth doing these once a month to keep an older computer running well, however, they are time consuming, and I confess, I do not run them. Ever. That's only because I have a good backup system.

Backup, Backup, Backup

You have to have a backup of all your important data. For some home users that means one folder (usually My Documents) and their email. For others, their data can be scattered all over a computer in different folders, or in some cases, a network. Just figuring out where the data is can be a problem. Get a handle on it right away and know what needs to be backed up.

You will lose data some day, and you'll either be inconvenienced or devastated. It's your choice. I prefer to use a convenient local disk copying program called Second Copy. However, to protect against fire or theft, everything from my kids' baby pictures to last night's spread sheet is securely backed up and archived over the internet.

Summary

These things above are not difficult, but they take time. Someone in the business or family needs to see these gets done on a routine basis. If you do them, your computers will not only be more secure, but they'll run faster and have fewer problems.

Scott Hendison lives in Oregon, and is the owner of Portland Technology Consultants. He is a computer and internet consultant, and has been in the industry since 1995. For over 75 other articles, visit his website at http://www.pdxtc.com

green cleaning service Park Ridge ..
In The News:

Take control of your digital privacy with actionable tips like Facebook privacy checkup, location tracking management and data removal services to protect your personal information.
Smart TVs and streaming devices manufactured in China are being compromised by BadBox 2.0 malware before users even power them on; infections have been detected in 222 countries.
The lightweight, 15-pound Tenniix tennis robot mimics pro playing styles like Nadal and Federer, using AI trained on 8,000 hours of professional tennis data.
Oak Ridge's uranium enrichment facility supports America's AI ambitions amid concerns that China's aggressive nuclear reactor construction could give it an edge in powering data centers.
Facebook scam ads now leverage AI and deepfakes to create convincing celebrity endorsements, targeting specific demographics with sophisticated schemes.
Apple unveils iOS 26, macOS 26 Tahoe and iPadOS 26 with translucent Liquid Glass design at WWDC 2025, featuring ChatGPT integration as competitors advance rapidly.
The Atom Touch prosthetic arm combines an AI neural interface with EMG sensors, allowing amputees to control individual fingers with precision at an affordable $25,000.
Aspen officials aim to have crews on the scene within five minutes — something they say would be nearly impossible without precise location data the AI technology gives.
Tech expert Kurt “CyberGuy" Knutsson says iPads are usually secure, but hackers can access them. Spot warning signs early to protect your data.
Tech expert Kurt Knutsson reveals how to easily move photos and videos off your iPhone or Android to securely protect your favorite moments.
The Social Security Administration is launching digital SSN access this summer. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to use it and protect your identity.
Glide underwater with CudaJet and make the ocean your playground. Kurt “CyberGuy" Knutsson discusses the redesigned tech that might be your next big thrilling adventure.
Protect yourself from login alert scams with five security steps, including avoiding suspicious links, checking account activity and enabling two-factor authentication
Skip the usual Father's Day gifts with personalized ideas for tech enthusiasts, home brewers, pool owners, seniors, outdoor lovers and privacy-conscious dads.
DMV text scam alert: Fraudsters impersonating motor vehicle departments nationwide are sending threatening messages about unpaid tickets and tolls to steal your information.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
E-BAR, MIT's mobile robot, provides physical support for seniors with handlebars that follow from behind, helping prevent falls while maintaining dignity for aging adults.
AI is changing everything – now, we can even use it to generate video. I tried OpenAI's Sora and Google's Veo – here's how they measure up against each other.
Five simple phone setting tweaks that make your device work harder for you, from automatic text message deletion to scheduled focus modes.
Android users can save time with 10 simple automations, including automatic battery saver mode, location-based Wi-Fi settings and scheduled "Do Not Disturb" mode.
Personal information from 364,000 people was compromised in a LexisNexis data breach that went undetected for months, highlighting privacy risks.
The Phantom 3500 jet features a windowless design that reduces drag and structural weak points, burning 50% less fuel than conventional business jets.
An Adidas data breach through a third-party vendor exposed customer details like emails and phone numbers, raising concerns about phishing and identity theft risks.
Nurabot, an AI nursing robot, helps Taiwan hospitals address nurse shortages by performing tasks like medication delivery, allowing nurses to focus on patient care.
Tech expert Kurt “CyberGuy" Knutsson says Google has expanded its privacy tool to easily remove personal information from search results.

EDTV: What You Should Know Before You Make That Purchase

Enhanced Definition Television ? also known as EDTV ? is... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

Selecting a Personal Digital Assistant

A Computer in Your HandCarrying around an address book and... Read More

Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

Lightning Season: How to Avoid Data Loss

We have just entered the time of year that most... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

Classification of Computers

Computers are available in different shapes, sizes and weights, due... Read More

Anti-Skip Protection on Mp3 Players

There have been some questions on anti-skip protection on mp3... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Review of Rio MP3 Players

Below you will find some useful information and comments about... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

404 Error Pages: What Are They And How Do You Create One?

We've all seen them, you've been browsing a website and... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Font Organizers Review, Part I

Do you know how many fonts are currently installed on... Read More

The Best MP3 Players Under $100

You don't have to fork out $250 for a super-diggy-whizbang... Read More

7 Reasons NOT to Take Your Laptop on Holiday!

Heading off on vacation soon?Then perhaps you're tempted to take... Read More

cleaning help near Bannockburn ..