Saturday

TEN THINGS IMPORTANT THAT EVERY COMPUTER USERS SHOULD HAVE KNOWN TO DO.







 There are certain things every one of us has to deal with when using a computer—and we don’t always deal with them in the most efficient ways. Here are 10 things that everyone can learn to keep their computer fast, safe, and easy to use.Most common is on how to set system back up,avoidance of viruses and also using computer shortcuts.


Keep your personal information and data safe and secure.



Unfortunately, the internet isn’t always a safe place, which means everyone needs to make sure they’re keeping their personal information safe. Make sure you use strong passwords,remove personal information from photos and files and never use open public networks without protections.
Important secure procedures you can undertake when your online for your safety are;

 Use a password manager: We get it, you have a lot of passwords and you don't want to remember them all. Instead of reusing the same junky password, a password manager is a simple way to save them all securely.
 Use two-factor authentication whenever possible: Two-factor authentication is a simple way to lock your computer to an account so you have to verify your identity when you log onto a different computer.

 Shut down and unlink services you don't use: If you're the type to try out a lot of different web apps or mobile apps then you probably have a ton of passwords scattered around everywhere. When you decide you don't want to use a service anymore, remember to delete your account. This way, if the service is hacked you don't have to fumble around trying to remember your login information.

  ADBLOCKplus; Adblock Plus isn't just an ad blocking extension, it also helps keep the likes of Twitter, Facebook, and Google+ from transmitting data about you.

 GHOSTERY;Ghostery is an extension that's all about eliminating tracking cookies and plug-ins used by ad networks. With Ghostery installed, no advertiser can snoop on what you're doing online.

 DONOT TRACK EXTENSION; Do Not Track is an extension that eliminates sites with Facebook and Google+ buttons from tracking you. By default, a data exchange happens when you visit a site with one of these buttons, even if you don't click on them. Do Not Track stops that from happening.
The above  bolded extensions will help you in making safe browsing experience when using internet.

 Easy find your lost or stolen gadgets

 You never know when you might misplace your phone, laptop, or other tech, so set up some safeguards now. iPhone users can enable Find My iPhone, and Android users should enable the Android Device Manager, which allows you to track your phone if you lose it. Of course, you can always get a more check the video by following the below link.

Sharing files between two computers 

 So you’ve got some files you want to give to your friend sitting next to you, but your flash drive has mysteriously gone missing. Well guess what? You don’t need it! It’s very easy to transfer a file between two computers over your wireless (or wired) network, whether it’s between you and a friend or between multiple computers you own. Here are our favorite ways to share files with a nearby computer, but if you want to share them between multiple computers in your house, Windows’ Homegroup feature is a great option.

Keeping your computer in regular maintainance

 Computer maintenance has gotten really confusing over the years. Between defragging, cleaning up temporary files, and other tasks, it’s almost like trying to maintain a car. Luckily, it’s gotten a lot easier in recent years: you only really need to do one or two things to keep your computer running fast and smooth. Check out our guides to Windows maintenance and Mac maintenance for more info and keep your PC running like new. And if your phone’s feeling a little sluggish, we have guides for iOS and Android, too.

Set up network(wifi problems)


 

Understanding routers, modems, and the other things that make up your network can seem daunting, but there are a few basics that can fix most problems that come your way.For the problem with most routers is overheating you can check the link as it follows showing some major ways to resolve the problem,http://lifehacker.com/5910788/why-do-i-have-to-keep-resetting-my-router-and-how-can-i-fix-it.But also you can boost up your wifi network if its speed is not fast enough and low  range follow the link , http://lifehacker.com/5931743/top-10-ways-to-boost-your-home-wi+fi.


Protecting your PC from viruses and spywares

 Windows users have long known the pain of viruses and other malware, but the good news is it’s pretty easy to avoid.But its first important to know the differences between the viruses,trojan horse worms and other malicious wares.hen, install some good, free antivirus software to protect yourself . You can even get antivirus for your Android phone, if you so choose. But in the end, the best way to avoid viruses is to use common sense: don’t open links that look suspicious, don’t install programs from untrusted sources, and if a window pops up saying your computer’s infected, make sure it’s actually your antivirus software saying that and not a fake web page.

Using of computer shortcuts.


The great thing about computers is that they can do a lot of things much faster than a human. Say you’re looking for a specific word on a web page. Instead of scanning it yourself, all you need to do is press Ctrl+F and type the word you’re looking for. There are mountains of shortcut like this, from pressing Ctrl+S to instantly save the file you’re working on, Ctrl+P to print it out, or Ctrl+T to open a new tab in your web browser. It may seem like more trouble than its worth at first, but after you use a shortcut one or two times 
 you’ll wonder why you ever did anything with the mouse.some important computer keys to be known .

Setting a system backup system

 

We all know we should back up our computers, but it’s always one of those things that you’ll set up “one day”. Setting up a backup only takes minutes, though, so you can do it right now and forget about it until you need it—and when you do need it, you’ll be glad you set it up. If you’re just backing up to an external drive, you can just use the simple tools built in to your computer, like Windows Backup or Apple’s Time Machine. However, that’ll only keep you safe if your computer fails. If you lose your home in a fire, get all your gear stolen, or experience any other kind of disaster, you’ll have lost all those important documents, family photos, and other files forever. So, we recommend using a service like CrashPlan to back up your computer online. That way, it can back up no matter where you are, and that data will be safe no matter what happens to your hardware. 


Accessing your computer anywhere.

Ever go out with your laptop and realize you left something important on your computer at home? One way to solve this problem is to use a service like Dropbox, so your files are with you everywhere you go. However, it’s also handy to know how to use your home computer from anywhere. With a simple app like TeamViewer, you can log into your home computer from another machine and use it as if you were sitting right at your desk—whether you just need to grab a quick file or access a program you don’t have elsewhere.

Keeping your PC away from a crap.



 I love free apps. Who doesn’t love getting something for nothing? There’s just one problem: on the other side of that download link, every developer has to choose whether to charge money for their app, or offer it for free and find some other way to make money. And when we refuse to pay, we make that decision for them. We’ve created a demand for bundled crapware.

Ever wonder how that Yahoo toolbar got on your system, or why there’s so much junk installed on your brand new machine? Crapware is a huge problem in the world of Windows, but that doesn’t mean you have to take it lying down. With the right tools and a little know-how, you can avoid that crapware forevermore: just uninstall the stuff that came with your system, and learn the ways companies trick you into installing stuff you don’t want. You’ll keep that system nice and clean, and beat the scammers at their own game.

 

THE DIFFERENCE BETWEEN VIRUSES , TROJAN , WORMS AND SOME OTHER MALWARE

What is malware?The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.

 The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared.

Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff.

You can protect yourself from viruses by making certain your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you're dealing with a virus.

Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.

Since spyware is primarily meant to make money at your expense, it doesn't usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you've got that many pieces of software spying on you, your PC is going to become slow.

What many people don't realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.

Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC.
If you manage to come across a PC infected with one of these, your best bet is to Google the name of the virus and find specific instructions on how to remove it, but the steps are usually the same—run a combination of MalwareBytes, SuperAntiSpyware, and maybe ComboFix if you need to.


 Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user.

 Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don't open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop examplified.

Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.
  One of the most famous worms include the ILOVEYOU worm, transmitted as an email attachment, which cost businesses upwards of 5.5 billion dollars in damage. The Code Red worm defaced 359,000 web sites, SQL Slammer slowed down the entire internet for a brief period of time, and the Blaster worm would force your PC to reboot repeatedly.
Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down—you'll still need an updated antivirus software, of course.
  rootkit: software designed to illicitly gain administrative control of the computer by surreptitiously modifying OS software. Rootkits usually hide themselves from detection by the same modifications to the OS.
Rootkits can be used to install other harmful software, to monitor user activity, to steal user data, or to steal computing resources.
Also, it's probably better to divide malware along two orthogonal axes: attack vector and payload.
Things like virus, Trojan horse, rootkit, phishing are attack vectors. Things like stealing user data and causing data loss are payloads.
But these can be avoided by running on the firewall on your browser that can protect you against the malwares.
..All images with Google.