Friday, August 30, 2013

Some Frequently Asked Questions about Computer Problems

Question 1: Why doesn’t my computer run as fast as it did when it was new? 

Answer: When you use your computer, you create files, install software, browse the Web and do a lot of other stuff. Windows works in such a way that pretty much everything you do creates temporary files and writes into the Windows registry. As time goes by, some registry entries become corrupted, temporary files don’t get deleted, and the list of programs launching on Windows boot grows. All this clutter makes your computer slow. 

Question 2: Why does the registry keep getting corrupted? 

Answer: The registry is a very complicated database that contains hundreds of entries. Every time you uninstall or update software, update your drivers, or even simply update Windows, registry entries are updated as well. Sometimes things go wrong and the registry gets updated incorrectly. As a result, some registry entries become corrupted or empty. A good registry cleaner can fix this. 

Question 3: How to get rid of unwanted bloatware? 

Answer: Getting rid of bloatware is easy you just need the right tools. To remove junk files and other debris, simply run disk cleanup, registry cleanup, remove unneeded startup entries, uninstall software you don’t use (like expired trial software), and finally use a duplicate file finder to get rid of duplicate files. 

Question 4: How do I make my PC boot faster? 

Answer: There are many ways to make your PC boot faster, but the easiest one is to remove unnecessary startup entries. You can use a startup manager to view the list of programs running on system startup and disable things like IM programs, toolbars, launchers, and players. 

Question 5: How to remove remnants of old programs that were uninstalled in the past? 

Answer: Leftovers from uninstalled programs are easy to remove. Just run a registry cleaner to get rid of empty keys and missing references and then go to your Program Files folder and remove empty folders (hover your mouse pointer over the folders and delete the ones that have 0 byte size). 

Wednesday, August 28, 2013

Are Home Computers are Safe?

This document is intended to prescribe basic guidelines to the home computer users working with computer systems running Windows Operating System. The basic purpose of this document is to create awareness about computer security issues among home computer users and suggest them the tasks to be performed to secure their computer systems to protect their information assets.

Why Home Computers?
Home computers are typically not very secure and are easy to break-in. When combined with high-speed Internet connections that are always turned on, intruders can quickly find and then attack home computers. While intruders also attack home computers connected to the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target. There may not be important data stored on the home computers but they are targeted by the intruders for launching attack against other computer systems.

How attackers do it?
In general, attack vectors which attackers use are:

  • Through E-mail
  • Through Un-trusted Websites
  • Through Internet Shares


In some cases, they send email with a virus. Reading that email activates the virus, creating an opening that intruders use to enter or access the computer. In other cases, they take advantage of a flaw or weakness in one of the computer program’s vulnerability to gain access. Once they’re on the computer, they often install new programs that let them continue to use the computer even after user plug the holes they used to get onto user’s computer in the first place. These are known as “backdoors” and are usually cleverly disguised so that they blend in with the other programs running on user’s computer.

What is Information Security?

Information security can be explained by the help of following example. If company sells bottled water purified using the process of reverse osmosis, the process is well known, and therefore it does not make good business sense for management to protect that information. However, if that company has a revolutionary process that cuts the cost and time for water purification in half, it would make sense to secure that information. There is a limit to the value of implementing protection so user must combine his knowledge of value, threats, vulnerabilities, and risks to put together a feasible plan.

Information security involves the measures and controls that ensure confidentiality, integrity, and availability
of the information processed by and stored in a computer or system.

Confidentiality: Ensures that information is accessed only by authorized personnel.
Integrity: Ensures that information is modified only by authorized personnel.
Availability: Ensures that information and systems can be accessed when needed by authorized personnel.

This practice include policies, procedures, hardware and software tools necessary to protect the computer systems and the information processed, stored, and transmitted by the systems.

When the user combines efforts to provide data confidentiality, data integrity, and data availability with physical security, then he can provide a very effective security solution.