SlideShare a Scribd company logo
1 of 2
Download to read offline
Microsoft Patch Management For Home Users
With easy access to Broadband and DSL the number of people using the Internet has skyrocket in
recent years. Email, instant messaging and file sharing with other Internet users has also provided a
platform for faster spreading of viruses, Trojans and Spyware. Being on the Internet without proper
protection is like walking in the rain with no umbrella – you’re gonna get wet no matter how fast you
run.
With so many computers installed in home offices it becomes critical that home users install the
latest Microsoft patches when they become available. Older operating systems like Windows 98,
Windows Millennium, Windows 2000, or Windows XP prior to Service Pack require the user to
initiate the process of checking for security patches. Windows XP Service Pack 2 has changed this
and the default settings are now notifying the user of available updates automatically. This has
increased the level of security in some areas, but there is a very large number of users and
computers that do not install security patches or hot fixes provided by Microsoft.
Once patches are available Microsoft recommends to install them immediately. Depending on the
confidence level of the user this should be done fairly soon after the patch release. If a users has
several systems available it is recommended to test the patches on the least critical system first
before updating all machines. Only one machine at a time is recommended to keep track of things
and to be able to fix problems. In Windows XP it is also recommended to create a restore point first
so that the system can revert back to the existing state before patching. Home users should closely
follow the media about virus outbreaks and updates. Waiting a few days with patching a machine
can make sense if some critical work is done on the computer an important deadline needs to be
kept. Nothing is more annoying than having to fight computer problems with limited time at hand.
Speaking of time – never install patches without having enough time at hand. Users should allocate
60 minutes of time just in case. If something goes wrong time pressure is the last thing you want to
face when troubleshooting a machine that is down.
Computer

More Related Content

What's hot

CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Todd Deshane
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Ict 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautionsIct 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautionsYonel Cadapan
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
KACE End Point Security Update
KACE End Point Security UpdateKACE End Point Security Update
KACE End Point Security Updatekenross15
 
Tips to avoid malware
Tips to avoid malwareTips to avoid malware
Tips to avoid malwareSpeedMaxPC
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license keyHayWhitfield72
 
Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Laynevine
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planningtmacuk
 
Business Continuity
Business  ContinuityBusiness  Continuity
Business ContinuityRedcliff
 

What's hot (20)

CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
CNMA data storage 101
CNMA data storage 101CNMA data storage 101
CNMA data storage 101
 
Windows XP End of Support
Windows XP End of SupportWindows XP End of Support
Windows XP End of Support
 
Virus hakers
Virus hakersVirus hakers
Virus hakers
 
Computervirus
Computervirus Computervirus
Computervirus
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Ict 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautionsIct 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautions
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
KACE End Point Security Update
KACE End Point Security UpdateKACE End Point Security Update
KACE End Point Security Update
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
 
Tips to avoid malware
Tips to avoid malwareTips to avoid malware
Tips to avoid malware
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 
Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planning
 
Avast installation and operation
Avast installation and operationAvast installation and operation
Avast installation and operation
 
Business Continuity
Business  ContinuityBusiness  Continuity
Business Continuity
 

Similar to Computer

GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishFelipe Luis Garcia C
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Jose Lopez
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious ServersRaleigh ISSA
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problemJohn Davis
 
Tackling Enterprise App Incompatibility
Tackling Enterprise App IncompatibilityTackling Enterprise App Incompatibility
Tackling Enterprise App Incompatibilityxpmigration
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
1 SecRecovery for restoring damaged Windows, data and files on your computer
1 SecRecovery for restoring damaged Windows, data and files on your computer1 SecRecovery for restoring damaged Windows, data and files on your computer
1 SecRecovery for restoring damaged Windows, data and files on your computerSANJAY KAPOOR
 
Deploying windows 7 from a to z
Deploying windows 7 from a to zDeploying windows 7 from a to z
Deploying windows 7 from a to zRose Valley Groups
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromiseCal Bryant
 
Do you want to restore a Lenovo ThinkPad?
Do you want to restore a Lenovo ThinkPad?Do you want to restore a Lenovo ThinkPad?
Do you want to restore a Lenovo ThinkPad?Dona Lytle
 

Similar to Computer (20)

GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 
BNI, 10-Minute Pres, IT Business
BNI, 10-Minute Pres, IT BusinessBNI, 10-Minute Pres, IT Business
BNI, 10-Minute Pres, IT Business
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Tackling Enterprise App Incompatibility
Tackling Enterprise App IncompatibilityTackling Enterprise App Incompatibility
Tackling Enterprise App Incompatibility
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
1 SecRecovery for restoring damaged Windows, data and files on your computer
1 SecRecovery for restoring damaged Windows, data and files on your computer1 SecRecovery for restoring damaged Windows, data and files on your computer
1 SecRecovery for restoring damaged Windows, data and files on your computer
 
Deploying windows 7 from a to z
Deploying windows 7 from a to zDeploying windows 7 from a to z
Deploying windows 7 from a to z
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Do you want to restore a Lenovo ThinkPad?
Do you want to restore a Lenovo ThinkPad?Do you want to restore a Lenovo ThinkPad?
Do you want to restore a Lenovo ThinkPad?
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 

Recently uploaded

Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Computer

  • 1. Microsoft Patch Management For Home Users With easy access to Broadband and DSL the number of people using the Internet has skyrocket in recent years. Email, instant messaging and file sharing with other Internet users has also provided a platform for faster spreading of viruses, Trojans and Spyware. Being on the Internet without proper protection is like walking in the rain with no umbrella – you’re gonna get wet no matter how fast you run. With so many computers installed in home offices it becomes critical that home users install the latest Microsoft patches when they become available. Older operating systems like Windows 98, Windows Millennium, Windows 2000, or Windows XP prior to Service Pack require the user to initiate the process of checking for security patches. Windows XP Service Pack 2 has changed this and the default settings are now notifying the user of available updates automatically. This has increased the level of security in some areas, but there is a very large number of users and computers that do not install security patches or hot fixes provided by Microsoft. Once patches are available Microsoft recommends to install them immediately. Depending on the confidence level of the user this should be done fairly soon after the patch release. If a users has several systems available it is recommended to test the patches on the least critical system first before updating all machines. Only one machine at a time is recommended to keep track of things and to be able to fix problems. In Windows XP it is also recommended to create a restore point first so that the system can revert back to the existing state before patching. Home users should closely follow the media about virus outbreaks and updates. Waiting a few days with patching a machine can make sense if some critical work is done on the computer an important deadline needs to be kept. Nothing is more annoying than having to fight computer problems with limited time at hand. Speaking of time – never install patches without having enough time at hand. Users should allocate 60 minutes of time just in case. If something goes wrong time pressure is the last thing you want to face when troubleshooting a machine that is down.