SlideShare a Scribd company logo
Common Tasks

        Jere Minich
Lake-Sumter Computer Society



                               1
Overview:

– What you will Learn: How to…..
  1. Add hardware,
  2. Download S/W, Install S/W,
  3. Remove S/W,
  4. Manage Windows Updates
  5. Define & manage a Firewall
  6. Create & Change User Accounts,

                                      2
Adding Hardware
• When you plug in new USB devices:
a. portable devices
   1.   you may hear the computer beep (make a sound)
   2.   see a pop-up message
   3.   this is good, your PC is talking to you
b. Plugging in and turning on a device (camera, smart Phone, etc)
   1. Connect first, then turn on the device..




                                                                    3
Sample Pop-up




                4
device isn't recognized by Windows
Reasons: When the computer resumes from standby or hibernation:
       there is a five-to-ten-second. The time delay depends on the following factors:
           Host controller hardware
           Attached hubs
           Attached devices
           USB driver versions
           Support for USB 2.0
• Answer: Unplug the USB device, and then plug the device back into the
  computer or hub.
    – 1. check website of the device manufacturer
    – download drivers from the "Support" section of such sites
Watch your monitor when adding hardware


                                                                                          5
a device driver or software driver is:
• a computer program allowing higher-level
  computer programs to interact with a
  hardware device.
• A driver typically communicates with the
  device through the:
  – computer bus or communications subsystem to
    which the hardware connects. (USB Port, HDMI
    Port, etc)


                                                   6
Hardware requires ‘Driver’ software

   1. can be in Windows itself = (plug & Play)
   2. additional software may be required
         a. it must be installed.
         b. must follow the software installation instructions :
            sometimes:
                   (1). hardware installed before the software,
                   (2). Software installed before Hardware.
   3. After adding hardware devices, restart Windows.
         a. Run POST. (Power On Startup Test) – Beeps = problems
If Windows fails to recognize the new hardware,
    1. use ‘Devices and Printers’ in the Control Panel. (Add Hardware)


                                                                         7
Control Panel – Devices and Printers




                                       8
Download Software – from the Internet

• Overview- Download and install a program.
Go To: www.filehippo.com – Why?
  Major Geeks
Select ‘Foxit Reader’ for download
Caution: ‘Beware of Advertisements’
•   After you click the ‘right’ software download link, a dialog box will pop up, you
    will be given the options to: (depends on Browser)
     – Run
     – Save – (choose this one….)
     – Cancel
          • the software for download.

                                                                                    9
http://filehippo.com/




                        10
http://majorgeeks.com/




                         11
File Download Window
   Always pick “Save”




     Selections = Browser used.
                                  12
When ‘Run’ is selected
• An automatic two step process:
    1. file is downloaded to your Computer
        – A. It's normally placed in your browser's:
            » "Temporary Internet Files",
            » or Windows temporary file location.
        – B. Piggyback software may also be included.
     2. The file is automatically :
       a. installed on your computer.
       b. run on your computer.
You have lost control of your computer.

                                                        13
When ‘Save’ is Selected
• in response to a software download:
  – the browser will simply download the file.
     • Usually a compressed file
  – The file is copied to your hard disk,
     • You can choose where to save.
  – you install it.
  – You select piggyback software to install or not..
You have control of your computer & Programs.

                                                        14
Scan & Install the Software
• Scan the download for Virus. (if not already performed)
   – Right click the download.
   – Select ‘Scan for Viruses’.
• After Scan – Double click the “.exe” download icon.
   – Read all the different options.
   – Watch close for ‘Piggyback’ software.
• After Install – Open the Program & check it out.
   – If it work right,
       • Delete the downloaded software.

                                                            15
Scan Downloads you have saved.
 Right Click the software icon before install




                                                16
Remove Software

Choose what software to remove.
 1. Google programs you do not use or know about
   a. Find out what they are.
 2. Only programs written for Windows will appear in
        Programs and Features.
 3. If you don't see the program listed:
      1.    check the information that came with your program,
      2.    go to the manufacturer's website.
 4. Certain Windows programs can be controlled by
      using “Program and Features” in Control Panel.
                I use ‘Revouninstaller Free’ – Google it.
                                                                 17
Problems in removing apps

• If you do not see the program that you want to
  remove:
   – Google it to get the answer.
       • Example: 'Remove Napster'
       • Go to Google Search and Type in 'Remove Napster'
If you can not get rid of a program:
   a. it is running in the Background.
   b. it is a DRM.(Digital rights management) a protected file.
   c. Google it…
         Example: How to delete Napster


                                                                  18
Windows Updates - Overview
• There are different kinds of updates.
  – Security updates or critical updates protect against
    vulnerabilities to:
     • malware
     • security exploits.
  – Other updates correct errors that aren't related to
    security, or enhance functionality.
• Security updates are routinely provided on:
  – the second Tuesday of each month, Patch Tuesday,
  – but can be provided whenever:
     • a new update is urgently required to prevent a newly
       discovered or prevalent exploit targeting Windows users.

                                                                  19
Windows Update - download
• using Internet Explorer. (best for Windows Update)
• Automatic Updates - checks the Windows Update
  servers once a day.
   – 90% of all PC Users - use automatic updates
   – 10% - using the Windows Update web site.
• some updates are:
   – not needed
   – just take up space.
   – cause compatability with some business software,
• so it's important to know what you're downloading.

                                                        20
Windows Update Display




Change Settings




                                           21
Change Setting Page –
default is ‘Automatic Updates’




                                 22
Has this Happen to you ?
• You start to shut down your computer and:
  – Do not shut down Computer, Installing X of Y
    Software Updates.
• You leave your computer for a few minutes
  and:
  – When you return your computer is restarting, or
    doing something, and what you were doing is lost.



                                                    23
Change Settings –Windows Update.




Multiple
Choices




                                    24
Sample Windows Update
  ‘Control Panel’ Page




                Click here to see what they are.




                                            25
Sample ‘Select Updates to install’
      Control Panel Page




            Select this item

             Get Explanation here




                                     26
Windows Update Process
• A dialog box will open to display the download and
  installation progress.
   – If you are prompted for any license agreements, you will
     need to accept them.
• Wait for the updates to download and install.
   – You CAN minimize Windows Update and perform other
     tasks.
• Always RESTART your computer.
   – repeat the process until you are sure there aren't any more
     critical updates.
• Often, installing a major update like a Service Pack
  makes a whole new set of important updates available.

                                                                27
Firewall – What is it??
• Firewall – defined = software or hardware that checks
  information coming from the Internet,
   – either blocks or allows it to pass through to your computer,
   – depending on your firewall settings.
• can help prevent hackers or malicious
• can also help stop your computer from sending malicious
  software to other computers.
• implemented in either hardware (Router) or software,
• Or a combination of both.



                                                                    28
Windows Firewall
• Verify that a Firewall is enabled
   – ‘Windows Firewall’ in control Panel.
   – Run only 1 Firewall on your computer
   – A second Firewall (hardware) in a Router is OK.
• What are some of the things that a firewall can't
  prevent?
   – E-mail viruses
   – Phishing scams – get your personal info.
• Use a Firewall that checks incoming and outgoing
  data.
                                                       29
Create & Change User Accounts.
•  Change User Accounts - create separate accounts for each person using the
   computer.
   1. each user to have their own:
          a. document folders
          b. settings such as the wallpaper,
          c. Start menu
   2. Two types of Accounts;
Administrator –
          a. change security settings,
          b. install software and hardware,
          c. access all files on the computer.
          d. make changes to other user accounts.
Limited –
          a. prohibited from changing most computer settings
          b. prohibited from deleting important files.



                                                                               30
Don't stay logged on as an
             administrator
• Why use a standard user account instead of an
  administrator account?
• When you are using programs that require
  Internet access, such as:
  – a web browser
  – an e-mail program,
• we recommend that you log on as a standard
  user rather than an administrator.
• That's because many viruses and worms can't be
  stored and run on your computer unless you're
  logged on as an administrator.
                                                   31
Manage Accounts in Control Panel




    Sign in each days as ‘Standard’ account, NOT as ‘Administrator’

                                                                      32
User Accounts
• Note: You can not delete the account for a user that is
  currently logged on to the computer.
• The standard account can help protect your computer
• Always login using a Standard Account- never as
  “Administrator”
   – If you are hacked while on the internet:
       • The hacker has limited capabilities..
   – you can do almost anything that you can do with an
     administrator account,
       • Windows will ask you to provide a password for an
         administrator account.
                                                             33
Users at Home
• On Your Home Computer: ‘Security
  Companies recommend’
  – Create a password for all computers (Desktop or
    Laptop).
  – Create a Standard Account with Hard Password in
    your name.
     • Use that to Login every day.
  – Have a Guest Account for Grandchildren & other
    guests, with a simple password.

                                                  34
Review
•   How easy adding Hardware can be, Wizard.
•   Risk in Downloading S/W.
•   Remove unknown S/W using Google Search.
•   Windows Update- How you control.
•   What is a Firewall.
•   The Best & worst of a Firewall.
•   Everything about User Accounts.

                                               35

More Related Content

What's hot

Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Danladi Gambo
 
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machinesUnit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
Erdo Deshiant Garnaby
 
De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PC
JimWhite
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
mrspetty19
 
Installing win 7 os
Installing win 7 osInstalling win 7 os
Installing win 7 os
Leonel Rivas
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
Mohit Patodia
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Johndion Ruloma
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
Erdo Deshiant Garnaby
 
Template 6
Template 6Template 6
Template 6
Icostyle
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
Rachel Espino
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
Johndion Ruloma
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
Erdo Deshiant Garnaby
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
Tech Day Camp
 
Computer fault
Computer fault Computer fault
Windows 8 Client Part 2 "The Application internals for IT-Pro's"
Windows 8 Client Part 2 "The Application internals for IT-Pro's"  Windows 8 Client Part 2 "The Application internals for IT-Pro's"
Windows 8 Client Part 2 "The Application internals for IT-Pro's"
Microsoft TechNet - Belgium and Luxembourg
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
Erdo Deshiant Garnaby
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
Nazrul Islam
 

What's hot (20)

Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machinesUnit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
 
De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PC
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
 
Installing win 7 os
Installing win 7 osInstalling win 7 os
Installing win 7 os
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
 
Template 6
Template 6Template 6
Template 6
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
 
Computer fault
Computer fault Computer fault
Computer fault
 
Windows 8 Client Part 2 "The Application internals for IT-Pro's"
Windows 8 Client Part 2 "The Application internals for IT-Pro's"  Windows 8 Client Part 2 "The Application internals for IT-Pro's"
Windows 8 Client Part 2 "The Application internals for IT-Pro's"
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
 
Error,Failure and Risk
Error,Failure and RiskError,Failure and Risk
Error,Failure and Risk
 

Viewers also liked

Webinar hardware presentation1
Webinar  hardware presentation1Webinar  hardware presentation1
Webinar hardware presentation1
mike2977
 
Seasons Of Life
Seasons Of LifeSeasons Of Life
Seasons Of Life
mike2977
 
Windows 8 requirements
Windows 8 requirementsWindows 8 requirements
Windows 8 requirements
mike2977
 
Memories of Milne
Memories of MilneMemories of Milne
Memories of Milne
mike2977
 
Seasons And Peoples
Seasons And PeoplesSeasons And Peoples
Seasons And Peoples
guestba960ff
 
The Milne School: 1845-1977
The Milne School: 1845-1977The Milne School: 1845-1977
The Milne School: 1845-1977
mike2977
 

Viewers also liked (6)

Webinar hardware presentation1
Webinar  hardware presentation1Webinar  hardware presentation1
Webinar hardware presentation1
 
Seasons Of Life
Seasons Of LifeSeasons Of Life
Seasons Of Life
 
Windows 8 requirements
Windows 8 requirementsWindows 8 requirements
Windows 8 requirements
 
Memories of Milne
Memories of MilneMemories of Milne
Memories of Milne
 
Seasons And Peoples
Seasons And PeoplesSeasons And Peoples
Seasons And Peoples
 
The Milne School: 1845-1977
The Milne School: 1845-1977The Milne School: 1845-1977
The Milne School: 1845-1977
 

Similar to Common tasks oct 2012

Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
Ralf Schwoebel
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
ChandniK7
 
Online Security
Online Security Online Security
Online Security
JimWhite
 
Manual english
Manual englishManual english
Manual english
bejt10
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
EchelleOgatis
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructions
itwebresources
 
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
Patrick Presley
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
Dell World
 
Ch1 2
Ch1 2Ch1 2
chapter2windowsxpinsideandoutofwinxp.ppt
chapter2windowsxpinsideandoutofwinxp.pptchapter2windowsxpinsideandoutofwinxp.ppt
chapter2windowsxpinsideandoutofwinxp.ppt
sandhyashankar20
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015
AVG Technologies
 
File hippo
File hippoFile hippo
File hippo
Sandeep Kamath
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
Fizaril Amzari Omar
 
Cloud ready+installation+instructions
Cloud ready+installation+instructionsCloud ready+installation+instructions
Cloud ready+installation+instructions
Vishrut Chhajer
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
San Diego Continuing Education
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
Fizaril Amzari Omar
 
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
kd123is123live
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
Christine Domingo
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
Raleigh ISSA
 

Similar to Common tasks oct 2012 (20)

Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
Online Security
Online Security Online Security
Online Security
 
Manual english
Manual englishManual english
Manual english
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructions
 
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
 
Ch1 2
Ch1 2Ch1 2
Ch1 2
 
chapter2windowsxpinsideandoutofwinxp.ppt
chapter2windowsxpinsideandoutofwinxp.pptchapter2windowsxpinsideandoutofwinxp.ppt
chapter2windowsxpinsideandoutofwinxp.ppt
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015
 
File hippo
File hippoFile hippo
File hippo
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
 
Cloud ready+installation+instructions
Cloud ready+installation+instructionsCloud ready+installation+instructions
Cloud ready+installation+instructions
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
 
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
 

Common tasks oct 2012

  • 1. Common Tasks Jere Minich Lake-Sumter Computer Society 1
  • 2. Overview: – What you will Learn: How to….. 1. Add hardware, 2. Download S/W, Install S/W, 3. Remove S/W, 4. Manage Windows Updates 5. Define & manage a Firewall 6. Create & Change User Accounts, 2
  • 3. Adding Hardware • When you plug in new USB devices: a. portable devices 1. you may hear the computer beep (make a sound) 2. see a pop-up message 3. this is good, your PC is talking to you b. Plugging in and turning on a device (camera, smart Phone, etc) 1. Connect first, then turn on the device.. 3
  • 5. device isn't recognized by Windows Reasons: When the computer resumes from standby or hibernation:  there is a five-to-ten-second. The time delay depends on the following factors:  Host controller hardware  Attached hubs  Attached devices  USB driver versions  Support for USB 2.0 • Answer: Unplug the USB device, and then plug the device back into the computer or hub. – 1. check website of the device manufacturer – download drivers from the "Support" section of such sites Watch your monitor when adding hardware 5
  • 6. a device driver or software driver is: • a computer program allowing higher-level computer programs to interact with a hardware device. • A driver typically communicates with the device through the: – computer bus or communications subsystem to which the hardware connects. (USB Port, HDMI Port, etc) 6
  • 7. Hardware requires ‘Driver’ software 1. can be in Windows itself = (plug & Play) 2. additional software may be required a. it must be installed. b. must follow the software installation instructions : sometimes: (1). hardware installed before the software, (2). Software installed before Hardware. 3. After adding hardware devices, restart Windows. a. Run POST. (Power On Startup Test) – Beeps = problems If Windows fails to recognize the new hardware, 1. use ‘Devices and Printers’ in the Control Panel. (Add Hardware) 7
  • 8. Control Panel – Devices and Printers 8
  • 9. Download Software – from the Internet • Overview- Download and install a program. Go To: www.filehippo.com – Why? Major Geeks Select ‘Foxit Reader’ for download Caution: ‘Beware of Advertisements’ • After you click the ‘right’ software download link, a dialog box will pop up, you will be given the options to: (depends on Browser) – Run – Save – (choose this one….) – Cancel • the software for download. 9
  • 12. File Download Window Always pick “Save” Selections = Browser used. 12
  • 13. When ‘Run’ is selected • An automatic two step process: 1. file is downloaded to your Computer – A. It's normally placed in your browser's: » "Temporary Internet Files", » or Windows temporary file location. – B. Piggyback software may also be included. 2. The file is automatically : a. installed on your computer. b. run on your computer. You have lost control of your computer. 13
  • 14. When ‘Save’ is Selected • in response to a software download: – the browser will simply download the file. • Usually a compressed file – The file is copied to your hard disk, • You can choose where to save. – you install it. – You select piggyback software to install or not.. You have control of your computer & Programs. 14
  • 15. Scan & Install the Software • Scan the download for Virus. (if not already performed) – Right click the download. – Select ‘Scan for Viruses’. • After Scan – Double click the “.exe” download icon. – Read all the different options. – Watch close for ‘Piggyback’ software. • After Install – Open the Program & check it out. – If it work right, • Delete the downloaded software. 15
  • 16. Scan Downloads you have saved. Right Click the software icon before install 16
  • 17. Remove Software Choose what software to remove. 1. Google programs you do not use or know about a. Find out what they are. 2. Only programs written for Windows will appear in Programs and Features. 3. If you don't see the program listed: 1. check the information that came with your program, 2. go to the manufacturer's website. 4. Certain Windows programs can be controlled by using “Program and Features” in Control Panel. I use ‘Revouninstaller Free’ – Google it. 17
  • 18. Problems in removing apps • If you do not see the program that you want to remove: – Google it to get the answer. • Example: 'Remove Napster' • Go to Google Search and Type in 'Remove Napster' If you can not get rid of a program: a. it is running in the Background. b. it is a DRM.(Digital rights management) a protected file. c. Google it… Example: How to delete Napster 18
  • 19. Windows Updates - Overview • There are different kinds of updates. – Security updates or critical updates protect against vulnerabilities to: • malware • security exploits. – Other updates correct errors that aren't related to security, or enhance functionality. • Security updates are routinely provided on: – the second Tuesday of each month, Patch Tuesday, – but can be provided whenever: • a new update is urgently required to prevent a newly discovered or prevalent exploit targeting Windows users. 19
  • 20. Windows Update - download • using Internet Explorer. (best for Windows Update) • Automatic Updates - checks the Windows Update servers once a day. – 90% of all PC Users - use automatic updates – 10% - using the Windows Update web site. • some updates are: – not needed – just take up space. – cause compatability with some business software, • so it's important to know what you're downloading. 20
  • 22. Change Setting Page – default is ‘Automatic Updates’ 22
  • 23. Has this Happen to you ? • You start to shut down your computer and: – Do not shut down Computer, Installing X of Y Software Updates. • You leave your computer for a few minutes and: – When you return your computer is restarting, or doing something, and what you were doing is lost. 23
  • 24. Change Settings –Windows Update. Multiple Choices 24
  • 25. Sample Windows Update ‘Control Panel’ Page Click here to see what they are. 25
  • 26. Sample ‘Select Updates to install’ Control Panel Page Select this item Get Explanation here 26
  • 27. Windows Update Process • A dialog box will open to display the download and installation progress. – If you are prompted for any license agreements, you will need to accept them. • Wait for the updates to download and install. – You CAN minimize Windows Update and perform other tasks. • Always RESTART your computer. – repeat the process until you are sure there aren't any more critical updates. • Often, installing a major update like a Service Pack makes a whole new set of important updates available. 27
  • 28. Firewall – What is it?? • Firewall – defined = software or hardware that checks information coming from the Internet, – either blocks or allows it to pass through to your computer, – depending on your firewall settings. • can help prevent hackers or malicious • can also help stop your computer from sending malicious software to other computers. • implemented in either hardware (Router) or software, • Or a combination of both. 28
  • 29. Windows Firewall • Verify that a Firewall is enabled – ‘Windows Firewall’ in control Panel. – Run only 1 Firewall on your computer – A second Firewall (hardware) in a Router is OK. • What are some of the things that a firewall can't prevent? – E-mail viruses – Phishing scams – get your personal info. • Use a Firewall that checks incoming and outgoing data. 29
  • 30. Create & Change User Accounts. • Change User Accounts - create separate accounts for each person using the computer. 1. each user to have their own: a. document folders b. settings such as the wallpaper, c. Start menu 2. Two types of Accounts; Administrator – a. change security settings, b. install software and hardware, c. access all files on the computer. d. make changes to other user accounts. Limited – a. prohibited from changing most computer settings b. prohibited from deleting important files. 30
  • 31. Don't stay logged on as an administrator • Why use a standard user account instead of an administrator account? • When you are using programs that require Internet access, such as: – a web browser – an e-mail program, • we recommend that you log on as a standard user rather than an administrator. • That's because many viruses and worms can't be stored and run on your computer unless you're logged on as an administrator. 31
  • 32. Manage Accounts in Control Panel Sign in each days as ‘Standard’ account, NOT as ‘Administrator’ 32
  • 33. User Accounts • Note: You can not delete the account for a user that is currently logged on to the computer. • The standard account can help protect your computer • Always login using a Standard Account- never as “Administrator” – If you are hacked while on the internet: • The hacker has limited capabilities.. – you can do almost anything that you can do with an administrator account, • Windows will ask you to provide a password for an administrator account. 33
  • 34. Users at Home • On Your Home Computer: ‘Security Companies recommend’ – Create a password for all computers (Desktop or Laptop). – Create a Standard Account with Hard Password in your name. • Use that to Login every day. – Have a Guest Account for Grandchildren & other guests, with a simple password. 34
  • 35. Review • How easy adding Hardware can be, Wizard. • Risk in Downloading S/W. • Remove unknown S/W using Google Search. • Windows Update- How you control. • What is a Firewall. • The Best & worst of a Firewall. • Everything about User Accounts. 35