Do you want your own screen in Windows 7 here is the process to do so.
You will need make a Registry Addition to do so. Please be careful and back-up your registry.
steps are on this site
http://www.sevenforums.com/tutorials/4230-registry-backup-restore.html
You will nee to modify the following key in the registry
to do so From the start menu or a command prompt enter REGEDIT
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Authentication\LogonUI\Background]
"OEMBackground"]
The OEMBackground entry needs to be changed to the following dword:00000001
You will need to create a few new folders steps below
The change you will need to make are here
2. Now, head over to the following folder:
C:\Windows\System32\oobe (“C” is your Windows Seven Installation drive)
3. Here, create a new folder named Info. Again, create a new folder inside the Info folder and rename it as backgrounds.
4. Copy your favorite image file to this folder and rename it as backgroundDefault. Note that the image must be in JPG format and the size should be less than 256 KB.
5. You are done. Reboot your system and see the change.
The following files (sorted by width-to-height ratio) are supported in C:\Windows\System32\oobe\Info\Backgrounds folder:
* backgroundDefault.jpg
* background768×1280.jpg (0.6)
* background900×1440.jpg (0.625)
* background960×1280.jpg (0.75)
* background1024×1280.jpg (0.8)
* background1280×1024.jpg (1.25)
* background1024×768.jpg (1.33-)
* background1280×960.jpg (1.33-)
* background1600×1200.jpg (1.33-)
* background1440×900.jpg (1.6)
* background1920×1200.jpg (1.6)
* background1280×768.jpg (1.66-)
* background1360×768.jpg (1.770833-)
Monday, June 28, 2010
Disable Hibernation in WIndows Vista
Hibernation has had issues in just about every version of windows and it still does in Windows 7
I tend to disable hibernation as one of the first things when i re-install a computer or set-up a computer for clients.
When making changes to systems just remember always becareful and document your changes
Here is the how to do it in Windows Vista
Unlike other versions of Windows Hibernation is part and parcel of the shutdown options of Vista. There are no options in Power options to actually disable it. If you don't use it then hibernation will be taking up valuable disk space, therefore it is easier to disable the option and reclaim the disk space allocated to the hiberfil.sys.
To disable hibernation proceed as follows:
1. Click Start followed by All Programs and then Accessories.
2. On the Accessories menu Right Click on the Command Prompt.
3. From the drop down menu, Click on the Run Administrator option.
4. The Command Prompt window will now open.
5. At the command prompt type: powercfg -H off
To enable hibernation
If, after you have disabled hibernation you wish to re-enable it, proceed as follows:
1. Click Start followed by All Programs and then Accessories.
2. On the Accessories menu Right Click on the Command Prompt.
3. From the drop down menu, Click on the Run Administrator option.
4. The Command Prompt window will now open.
5. At the command prompt type: powercfg -H on
Disk CleanUp Option
A less complex option for disabling hibernation is to use the Windows Disk Cleaner
1. Click Start followed by All Programs, Accessories and then System Tools.
2. From the System Tools menu, Click Disk Cleanup.
3. Choose which files to clean up.
4. Next select the Windows Vista drive and press OK.
5. Disk Cleanup will now scan your system.
6. When the Scan is complete the Disk Clenup for Vista window will open.
7. If it is not already there, Place a Tick in the box next to the Hibernation File Cleaner.
8. Enable or Disable any other file options you want to clean from the available list and then Press the OK button.
9. Hibernation will now be removed.
10. If you need to replace hibernation, follow the instruction in the 'To Enable Hibernation' section above.
I tend to disable hibernation as one of the first things when i re-install a computer or set-up a computer for clients.
When making changes to systems just remember always becareful and document your changes
Here is the how to do it in Windows Vista
Unlike other versions of Windows Hibernation is part and parcel of the shutdown options of Vista. There are no options in Power options to actually disable it. If you don't use it then hibernation will be taking up valuable disk space, therefore it is easier to disable the option and reclaim the disk space allocated to the hiberfil.sys.
To disable hibernation proceed as follows:
1. Click Start followed by All Programs and then Accessories.
2. On the Accessories menu Right Click on the Command Prompt.
3. From the drop down menu, Click on the Run Administrator option.
4. The Command Prompt window will now open.
5. At the command prompt type: powercfg -H off
To enable hibernation
If, after you have disabled hibernation you wish to re-enable it, proceed as follows:
1. Click Start followed by All Programs and then Accessories.
2. On the Accessories menu Right Click on the Command Prompt.
3. From the drop down menu, Click on the Run Administrator option.
4. The Command Prompt window will now open.
5. At the command prompt type: powercfg -H on
Disk CleanUp Option
A less complex option for disabling hibernation is to use the Windows Disk Cleaner
1. Click Start followed by All Programs, Accessories and then System Tools.
2. From the System Tools menu, Click Disk Cleanup.
3. Choose which files to clean up.
4. Next select the Windows Vista drive and press OK.
5. Disk Cleanup will now scan your system.
6. When the Scan is complete the Disk Clenup for Vista window will open.
7. If it is not already there, Place a Tick in the box next to the Hibernation File Cleaner.
8. Enable or Disable any other file options you want to clean from the available list and then Press the OK button.
9. Hibernation will now be removed.
10. If you need to replace hibernation, follow the instruction in the 'To Enable Hibernation' section above.
Labels:
Windows Vista Tips
Windows 7 Feel in XP
Do you have a machine at home that is not powerful enough for Windows 7 or you just like XP but like what you have seen in Windows 7.
This explains a little program I have found that will give you the Windows 7 look and feel in XP
The Windows 7 look and feel screen 1
Here is a little program that will give you that feel and look
Seven Remix Download Site http://seven-remix-xp.en.softonic.com/download - This little program is freeware
Screen Captures from the Program
Enjoy I am running it on my XP machine and since I have become used to Windows 7 on others it is nice to have that same feel flipping from machine to machine.
Not saying I am a sell out I still love XP and I have found that somethings are still better in XP.
Labels:
XP Solutions
Sunday, June 27, 2010
Changing RDP Listening Port
If you need to access Multiple Windows machines from other locations outside your firewall
To Alter the Port on the Client Side
SUMMARY
By default Terminal Server and Windows 2000 Terminal Services uses TCP port 3389 for client connections. Microsoft does not recommend that this value be changed. However, if it becomes necessary to change this port, follow these instructions.
MORE INFORMATION
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
To change the default port for all new connections created on the Terminal Server:
1.Run Regedt32 and go to this key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
NOTE: The above registry key is one path; it has been wrapped for readability.
2.Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389). Modify the port number in Hex and save the new value.
To change the port for a specific connection on the Terminal Server:
•Run Regedt32 and go to this key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\connection
NOTE: The above registry key is one path; it has been wrapped for readability.
3.Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389). Modify the port number in Hex and save the new value.
NOTE: Because the use of alternate ports has not been fully implemented for Terminal Server 4.0, support will be provided as "reasonable effort" only, and Microsoft may require you to set the port back to 3389, if any problems occur.
Back to the top
To Alter the Port on the Client Side
1.Open Client Connection Manager.
2.On the File menu, click New Connection, and then create the new connection. After running the wizard, you should have a new connection listed there.
3.Making sure that the new connection is highlighted, on the File menu, click Export. Save it as name.cns.
4.Edit the .cns file using Notepad changing "Server Port=3389" to "Server Port=xxxx" where xxxx is the new port that you specified on Terminal Server.
5.Now import the file back into Client Connection Manager. You may be prompted to overwrite the current one, if it has the same name. Go ahead and overwrite it. You now have a client that has the correct port settings to match your change Terminal Server settings.
NOTE The Windows 2000 Terminal Server ActiveX client connects only to TCP port 3389. This configuration cannot be changed. The Terminal Server ActiveX client that is available in Microsoft Windows XP and in Microsoft Windows Server 2003 supports the ability to modify the port settings. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
326945 How to change the listening port in the Windows Terminal Server Web client
http://support.microsoft.com/kb/187623
To Alter the Port on the Client Side
SUMMARY
By default Terminal Server and Windows 2000 Terminal Services uses TCP port 3389 for client connections. Microsoft does not recommend that this value be changed. However, if it becomes necessary to change this port, follow these instructions.
MORE INFORMATION
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
To change the default port for all new connections created on the Terminal Server:
1.Run Regedt32 and go to this key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
NOTE: The above registry key is one path; it has been wrapped for readability.
2.Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389). Modify the port number in Hex and save the new value.
To change the port for a specific connection on the Terminal Server:
•Run Regedt32 and go to this key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\connection
NOTE: The above registry key is one path; it has been wrapped for readability.
3.Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389). Modify the port number in Hex and save the new value.
NOTE: Because the use of alternate ports has not been fully implemented for Terminal Server 4.0, support will be provided as "reasonable effort" only, and Microsoft may require you to set the port back to 3389, if any problems occur.
Back to the top
To Alter the Port on the Client Side
1.Open Client Connection Manager.
2.On the File menu, click New Connection, and then create the new connection. After running the wizard, you should have a new connection listed there.
3.Making sure that the new connection is highlighted, on the File menu, click Export. Save it as name.cns.
4.Edit the .cns file using Notepad changing "Server Port=3389" to "Server Port=xxxx" where xxxx is the new port that you specified on Terminal Server.
5.Now import the file back into Client Connection Manager. You may be prompted to overwrite the current one, if it has the same name. Go ahead and overwrite it. You now have a client that has the correct port settings to match your change Terminal Server settings.
NOTE The Windows 2000 Terminal Server ActiveX client connects only to TCP port 3389. This configuration cannot be changed. The Terminal Server ActiveX client that is available in Microsoft Windows XP and in Microsoft Windows Server 2003 supports the ability to modify the port settings. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
326945 How to change the listening port in the Windows Terminal Server Web client
http://support.microsoft.com/kb/187623
Labels:
Computer KB
Wednesday, June 16, 2010
Wireless Security for your Home
Many folks setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. That's totally understandable. It's also quite risky as numerous security problems can result. Today's Wi Fi networking products don't always help the situation as configuring their security features can be time-consuming and non-intuitive. The recommendations below summarize the steps you should take to improve the security of your home wireless network.
1. Change Default Administrator Passwords (and Usernames)
At the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.2. Turn on (Compatible) WPA / WEP Encryption
All Wi-Fi equipment supports some form of encryption. Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. Naturally you will want to pick the strongest form of encryption that works with your wireless network. However, the way these technologies work, all Wi-Fi devices on your network must share the identical encryption settings. Therefore you may need to find a "lowest common demoninator" setting.3. Change the Default SSID
Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "linksys." True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring wireless security on your network.4. Enable MAC Address Filtering
Each piece of Wi-Fi gear possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hackers and their software programs can fake MAC addresses easily.5. Disable SSID Broadcast
In Wi-Fi networking, the wireless access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may roam in and out of range. In the home, this roaming feature is unnecessary, and it increases the likelihood someone will try to log in to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast feature to be disabled by the network administrator.6. Do Not Auto-Connect to Open Wi-Fi Networks
Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.7. Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range (like 10.0.0.x) to prevent computers from being directly reached from the Internet.8. Enable Firewalls On Each Computer and the Router
Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router.9. Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage.10. Turn Off the Network During Extended Periods of Non-Use
The ultimate in wireless security measures, shutting down your network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline. Computer disk drives have been known to suffer from power cycle wear-and-tear, but this is a secondary concern for broadband modems and routers.If you own a wireless router but are only using it wired (Ethernet) connections, you can also sometimes turn off Wi-Fi on a broadband router without powering down the entire network.
for more details and solutions or help contact us at service@duncanrealm.ca
Error on Vista or Windows 7 when mapping to a Windows XP machine
Trying to map from a Windows 7 or Vista machine to a XP machine you might recieve the following error
The mapped network drive could not be created because the following error has occurred:
Not enough server storage is available to process this command.
Solution Below:
The server's configuration parameter "irpstacksize" is too small for the server to use a local device.
A registry tweak is required remember when editing your registry be careful.
Start Regedit
Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameter s
Edit the IRPStackSize
Give it a value of 18 HEXADECIMAL or 24 Decimal
NOTE: If the IRPStackSize is not there create the DWORD Value for it and assign the value
Reboot the computer
The mapped network drive could not be created because the following error has occurred:
Not enough server storage is available to process this command.
Solution Below:
The server's configuration parameter "irpstacksize" is too small for the server to use a local device.
A registry tweak is required remember when editing your registry be careful.
Start Regedit
Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameter s
Edit the IRPStackSize
Give it a value of 18 HEXADECIMAL or 24 Decimal
NOTE: If the IRPStackSize is not there create the DWORD Value for it and assign the value
Reboot the computer
Labels:
Windows Issues
Friday, June 4, 2010
Messaging Tools
The Messaging revolution has taken off as most people are aware everyone has a messenging program and several messaging accounts
Do you have a MSN home and work account I will explain below how you can access the 2 at the same time.
Messaging Program overview.
The most popular is MSN or Windows Live messenger and it comes with Windows Vista and Windows 7. When you sign up for a hotmail or live account you automatically get a messenger ID.
Along with MSN there is Google, Yahoo There is AIM (Aol Instant Messaging) this one is dieing a slow death. There is the Twitter revolution which is messaging to all your followers or Tweets as they are known.
With MSN you can add in or Yahoo Contacts and in Yahoo messenger you can add in your MSN contacts. However with MSN the nice thing is you can get your MSN mail or even link it to Windows Mail or Outlook with Connectors from Microsoft. Outlook also links to your MSN program allowing you to send mail to your Messenger Contacts.
details at the following site for Outlook
http://office.microsoft.com/en-us/outlook/ha102218231033.aspx
Windows Mail allows youto put in Multiple accounts and links to your MSN
http://windows.microsoft.com/en-GB/windows-vista/Windows-Mail-setting-up-an-account-from-start-to-finish
There are also programs that allow you to run Multiple Accounts simultaneosuly through one program no need to have Yahoo, Google Talk, Twitter, MSN and even Face book chat running the easiest to use is Trillian
http://www.trillian.im/
Then there is the Messenger Plus which is an add in for MSN that gives you extra options andh the ability to sign in to multiple MSN accounts at one time .. ideal for people that need to be signed in to work and home accounts at one time.
http://messenger-plus.en.softonic.com/Screen captures of some of the features below
The Yellowed Portion is the Access Point for MessengerPlus
This shows the Mail options Screen you can add in notifications for a Program and an account as to when you have mail
With messenger Plus the options are extensisve here is another screen capture to show you
This one shows you the Coversation Customization options
you can organize Conversations in to Tabs instead of having each conversation in its own window.All I can say is download and use it you will be amazed at how it will help your messenger experience.
If you need to have your Yahoo account open and your Gmail contacts use Trillian and save having multiple programs running this will make your machine faster as well; since less resources are used.
Thursday, June 3, 2010
Simplifying IT Naming should be common place
Why does IT over complicate the nameing of devices and Computers
Things in the computer world seem to be designed to cofuse the common user
• Names that make no sense seems to be a common practice
– Eg: cparacct100
– Eg: pparacctf2100
– Eg: spbraengfs100
Simple Names
• I have believed in the K.I.S.S philosophy
• I think this pertains well to IT since the bulk of users want simple solutions
• Even for yourself or a new person coming in to the department it makes sense
Simple Examples
• BRA_ACCT_COMP_1 – this is to find and easy to read you can tell quickly what it is with out a convoluted matrix
• BRA_ACCT_PRINT_1
• BRA_ACCT_C_PRINT_1 (C = Colour)
• The one thing you need to remember is people will know the printer closest to them
Server Names
• BRAENGFILES – Engineering Files
• BRAPDC – Main Login or Domain Controller
• BRABDC – Backup Domain Controller
• BRAPRINT – Print Server
• BRAINTERNET – Internet Server
• BRAEXCH – Exchange
• BRAGENFILES – General File Sever
• These are examples in a mid-large environment
Small Company Names
• COMPDC – Company DC
• COMPFILE – Company File Server
• COMPEXCH – Exchange Server
• In a small company one of the other machines will have a dual role ie. DC is typically also a print server as it is not taxed
Documentation Organization
Reasons for Organizing
• Ease of finding information for yourself and others
• Organization that makes logical sense
• Remember K.I.S.S (Keep it Simple Stupid)
• Eliminates un-needed duplication of files
– Why reinvent the wheel when it has already been invented.
At DCS we believe in keeping things simple for every user level
sales@duncanrealm.ca
Things in the computer world seem to be designed to cofuse the common user
• Names that make no sense seems to be a common practice
– Eg: cparacct100
– Eg: pparacctf2100
– Eg: spbraengfs100
Simple Names
• I have believed in the K.I.S.S philosophy
• I think this pertains well to IT since the bulk of users want simple solutions
• Even for yourself or a new person coming in to the department it makes sense
Simple Examples
• BRA_ACCT_COMP_1 – this is to find and easy to read you can tell quickly what it is with out a convoluted matrix
• BRA_ACCT_PRINT_1
• BRA_ACCT_C_PRINT_1 (C = Colour)
• The one thing you need to remember is people will know the printer closest to them
Server Names
• BRAENGFILES – Engineering Files
• BRAPDC – Main Login or Domain Controller
• BRABDC – Backup Domain Controller
• BRAPRINT – Print Server
• BRAINTERNET – Internet Server
• BRAEXCH – Exchange
• BRAGENFILES – General File Sever
• These are examples in a mid-large environment
Small Company Names
• COMPDC – Company DC
• COMPFILE – Company File Server
• COMPEXCH – Exchange Server
• In a small company one of the other machines will have a dual role ie. DC is typically also a print server as it is not taxed
Documentation Organization
Reasons for Organizing
• Ease of finding information for yourself and others
• Organization that makes logical sense
• Remember K.I.S.S (Keep it Simple Stupid)
• Eliminates un-needed duplication of files
– Why reinvent the wheel when it has already been invented.
At DCS we believe in keeping things simple for every user level
sales@duncanrealm.ca
Wednesday, June 2, 2010
Anti-Virus and Mal-ware software
It is hard for the average person to determine the best course of action or the best Anti-Virus Software or Mal-ware software to use
What is mal-ware it is software that comes from a website and is unwanted. This type of Software comes in via security holes in Internet Explorer, Firefox or other web browsers as well as in the Operating System
The best way to stop this from happening is to update your computer with the latest service packs and hotfixes from Microsoft. if you are unable to do so contact a Computer Solutions Company to help.
Sorting out the flavours to remove Mal-ware if you get it
There are so many out there so many flavours
In the home user market the possibilities are endless which one is the best.
I have tried various kinds in order to help make the average person make an informed decision what I have come up with is listed below.
1. Mal-ware Bytes - free and easy to use and removes 99.9% of what is out there if it is kept up to date available from www.malwarebytes.org
2. Super-AntiSpyware free or paid version available from http://www.superantispyware.com
3. Adaware has been around along time and is still reliable but doesn't remove alot of the current ones out there but it does allow you to control what comes in by monitoring your system with Ad-watch.
There are other ones out there but I have had the luck with these.
The Anti-Virus Dilema what is best.
1. Norton Anti-Virus - is a good one but it has a tendancy to bog down systems with its real time scans and can be annoying when you are trying to do something - it also has alot of other features such as built in firewalls and other protection that makes it more cumbersome and a true resource hog. Norton has Live update set it and forget it
2. Avast Free Edition - is easy to use and does a good job of removing the majority of viruses and doesn't tie up resources with unneeded monitoring you can set it to scan when you want and how you want. It also has live update options as well
3. AVG Anti-Virus is easy to use and does a good job of removing the majority of viruses and doesn't tie up resources with unneeded monitoring you can set it to scan when you want and how you want. It also has live update options as well
In order to best protect your machine it is best to run an Anti-Virus program along with an Anti Mal-ware program scanning from time to time or when you notice a slow down in your machine.
A firewall is also another way to help stop unwanted software and attacks and will be covered in another post
Duncan Computer Services offers solutions in Brant County and Surrounding areas
What is mal-ware it is software that comes from a website and is unwanted. This type of Software comes in via security holes in Internet Explorer, Firefox or other web browsers as well as in the Operating System
The best way to stop this from happening is to update your computer with the latest service packs and hotfixes from Microsoft. if you are unable to do so contact a Computer Solutions Company to help.
Sorting out the flavours to remove Mal-ware if you get it
There are so many out there so many flavours
In the home user market the possibilities are endless which one is the best.
I have tried various kinds in order to help make the average person make an informed decision what I have come up with is listed below.
1. Mal-ware Bytes - free and easy to use and removes 99.9% of what is out there if it is kept up to date available from www.malwarebytes.org
2. Super-AntiSpyware free or paid version available from http://www.superantispyware.com
3. Adaware has been around along time and is still reliable but doesn't remove alot of the current ones out there but it does allow you to control what comes in by monitoring your system with Ad-watch.
There are other ones out there but I have had the luck with these.
The Anti-Virus Dilema what is best.
1. Norton Anti-Virus - is a good one but it has a tendancy to bog down systems with its real time scans and can be annoying when you are trying to do something - it also has alot of other features such as built in firewalls and other protection that makes it more cumbersome and a true resource hog. Norton has Live update set it and forget it
2. Avast Free Edition - is easy to use and does a good job of removing the majority of viruses and doesn't tie up resources with unneeded monitoring you can set it to scan when you want and how you want. It also has live update options as well
3. AVG Anti-Virus is easy to use and does a good job of removing the majority of viruses and doesn't tie up resources with unneeded monitoring you can set it to scan when you want and how you want. It also has live update options as well
In order to best protect your machine it is best to run an Anti-Virus program along with an Anti Mal-ware program scanning from time to time or when you notice a slow down in your machine.
A firewall is also another way to help stop unwanted software and attacks and will be covered in another post
Duncan Computer Services offers solutions in Brant County and Surrounding areas
Subscribe to:
Posts (Atom)