Friday, September 6, 2013

What is Windows Easy Transfer?

Windows Easy Transfer guides you through the process of transferring files and settings from one Windows computer to another. Using Windows Easy Transfer, you can choose what to transfer to your new computer and how to transfer it.

·         Click to open Windows Easy Transfer. ‌If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

What can I transfer to my new computer?
You can transfer most files and program settings. Specifically:
·         Files and folders: Everything within the Documents, Music, Pictures, and Shared Documents folders. Using advanced options, you can select additional files and folders to transfer from other locations.
·         E‑mail settings, contacts, and messages.
·         Program settings: Settings that keep your programs configured as you had them on your old computer. Windows Easy Transfer doesn't transfer the programs themselves. Some programs might not work in this version of Windows, including security programs, antivirus programs, firewall programs (your new computer should already have a firewall running to help ensure safety during the transfer), and programs with software drivers.
·         User accounts and settings: Desktop backgrounds, network connections, screen savers, fonts, Start menu options, taskbar options, folders, specific files, network printers and drives, and accessibility options.
·         Internet settings and favorites: Internet connection settings, favorites, and cookies.
·         Music: Electronic music files, playlists, and album art.
·         Pictures and video: Pictures which includes any visual file type (for example, .jpg, .bmp, .gif) and personal videos.

Which versions of Windows will work with Windows Easy Transfer?
You can use Windows Easy Transfer to transfer files and settings from a computer running Windows XP, Windows Vista, or Windows 7 to another computer running Windows 7.

Note :  You can't transfer files from a 64-bit version of Windows to a 32-bit version of Windows.


Remove spyware from your computer

If you have spyware or other potentially unwanted software on your computer, you should use an anti-spyware scanner and removal tool to try to remove it. You can also try to remove spyware manually. You might need to use both of these methods more than once to completely remove the spyware or other potentially unwanted software.

Use an anti-spyware scanner and removal tool
Windows Defender is a feature in this version of Windows that helps prevent spyware and other potentially unwanted software from infecting your computer. When Windows Defender is on, you're alerted if spyware and other potentially unwanted software tries to run or install itself on your computer. You choose whether to ignore, quarantine (move to a different location on your computer where it can't run), or remove each item that is detected.
Spyware scanners are also frequently included in antivirus programs. If you have already installed an antivirus program, check to see if that program includes spyware protection features or if you can add them as an update, and then scan your computer regularly. To see a list of other spyware protection programs, go online to the Microsoft Security at Home website.
Remove spyware manually
Spyware can sometimes be hard to remove. If an anti-spyware program notifies you that it can't remove spyware, follow the instructions provided by the anti-spyware program. If that doesn't work, try these options:
  • Try installing an antivirus or another anti-spyware program. Many antivirus programs also come with anti-spyware protection.
  • Check Programs and Features for items that don't belong on your computer.
Click to open Programs and Features.
Use this method with extreme caution. Control Panel lists many programs, most of which are not spyware. Many spyware programs use special installation methods to avoid showing up in Programs and Features. Occasionally, a spyware program will offer an uninstall option and can be removed with this method. Only remove programs that you can positively identify as spyware, and don't remove programs that you might want to keep, even if you don't use them very often.
  • Re-install Windows.
Some spyware can hide itself so well that it can't be removed. If you still see evidence of spyware after trying to remove it with an anti-spyware program or after trying to uninstall it using Control Panel, you might need to re-install Windows and your programs.

Warning: Re-installing Windows will remove spyware, but it will also delete your files and programs. If you have to re-install Windows, make sure that you back up your documents and files, and make sure that you have access to the installation discs you will need to re-install your programs. 

What is InPrivate Browsing?

InPrivate Browsing enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing what sites you visited and what you looked at on the web. You can start InPrivate Browsing from the New Tab page or the Safety button.

When you start InPrivate Browsing, Internet Explorer opens a new browser window. The protection that InPrivate Browsing provides is in effect only during the time that you use that window. You can open as many tabs as you want in that window, and they will all be protected by InPrivate Browsing. However, if you open another browser window, that window will not be protected by InPrivate Browsing. To end your InPrivate Browsing session, close the browser window.

While you are surfing the web using InPrivate Browsing, Internet Explorer stores some information such as cookies and temporary Internet files, so the WebPages you visit will work correctly. However, at the end of your InPrivate Browsing session, this information is discarded. The following table describes which information InPrivate Browsing discards when you close the browser and how it is affected during your browsing session:

Information
How it is affected by InPrivate Browsing
Cookies
Kept in memory so pages work correctly, but cleared when you close the browser.
Temporary Internet Files
Stored on disk so pages work correctly, but deleted when you close the browser.
Webpage history
This information is not stored.
Form data and passwords
This information is not stored.
Anti-phishing cache
Temporary information is encrypted and stored so pages work correctly.
Address bar and search AutoComplete
This information is not stored.
Automatic Crash Restore (ACR)
ACR can restore a tab when it crashes in a session, but if the whole window crashes, data is deleted and the window cannot be restored.
Document Object Model (DOM) storage
The DOM storage is a kind of "super cookie" web developers can use to retain information. Like regular cookies, they are not kept after the window is closed.