SlideShare a Scribd company logo
1 of 39
Keep Your PC Functioning




     Copyright 2012 Cyberspace Virtual Services
         http://www.virtualservices.com.au
Hardware




               Basic PC
              Maintenance




                Software
                  and
                Security


Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Dust



Enemies
                                                  HEAT




    Copyright 2012 Cyberspace Virtual Services
        http://www.virtualservices.com.au
"Your computer could fry if you
      don't keep it clean,"
says Jonathon Millman, Chief Technology
      Officer for Hooplah Interactive.



         Copyright 2012 Cyberspace Virtual Services
             http://www.virtualservices.com.au
Keep Your PC Squeaky Clean

You will need:
  can of compressed air (available from
   computer dealers or office-supply stores);
  cotton pads (do not use a cotton ball);
  paper towels or anti-static cloths;
  rubbing alcohol;
  screwdriver, and lastly
  clean water.

            Copyright 2012 Cyberspace Virtual Services
                http://www.virtualservices.com.au
Always…
turn your computer off before you set
  off and unplug all the connectors.




        Copyright 2012 Cyberspace Virtual Services
            http://www.virtualservices.com.au
Cleaning Steps
Step 1: Within the box
Step 2: Outside the box
Step 3: Keyboard
  Spills
      For all spills, be aware that anything other than plain
       water may cause severe damage. Never, ever, try to
       dry a keyboard or laptop in a microwave or
       conventional oven.
 Step 4: Mouse
Step 5: Monitor
            Copyright 2012 Cyberspace Virtual Services
                http://www.virtualservices.com.au
HEAT




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Software and Security




   Copyright 2012 Cyberspace Virtual Services
       http://www.virtualservices.com.au
Software
Preventive Maintenance Plan




   Copyright 2012 Cyberspace Virtual Services
       http://www.virtualservices.com.au
Software

            Schedule




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Software
           Hard Disk




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Software


             Windows Tools
Check Disk;

Disk Cleanup, and

Disk Defragmenter




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Software


            Run Frequency
Check Disk — Weekly;

Disk Cleanup — Weekly, and

Disk Defragmenter — Monthly




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Check Disk


    Check Disk won’t be available in the scroll-down list of
    programs that you can select from in the Task
    Scheduler; you will need to select it manually
•   Click Browse
•   Navigate to windows  system32 chkdsk.exe.
•   Select chkdsk.exe.
•   Click Open.



                 Copyright 2012 Cyberspace Virtual Services
                     http://www.virtualservices.com.au
Check Disk
           and Task Scheduler

  Task Scheduler, will enable you to schedule Check Disk
  to run automatically at weekly intervals, at times to suit
  your PC use.
                        Windows XP
• Click Start  All Programs;
• Point to Accessories; point to System Tools, click
  Scheduled Tasks, and
• Follow the instructions in the Scheduled Task Wizard.


                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
Check Disk
             and Task Scheduler
               Windows Vista and Windows 7
• Click Start  All Programs  Accessories  System Tools
   Task Scheduler;
• Click Create Basic Task;
• Type the task name and click Next;
• Click Daily  Next, and specify the schedule you want to use. Click
  Next;
• To schedule Check Disk to start automatically, click Start a
  program, and then click Next;
• Click Browse to find Check Disk, click Next, and
• Click Finish.

                  Copyright 2012 Cyberspace Virtual Services
                      http://www.virtualservices.com.au
Disk Cleanup

  Over time, a large number of temporary files, from
  several sources, can be collected. The World Wide Web
  is a principal offender, and the cumulative effect is to
  slow down the operation of your PC.

Use the Task Scheduler to run Disk Cleanup on a weekly basis.
The program you will need to add to your schedule is “cleanmgr.exe”.




                  Copyright 2012 Cyberspace Virtual Services
                      http://www.virtualservices.com.au
Disk Defragmenter
Files can become too large to store in a single position on your hard
disk, so your PC will split it into fragments.
These fragmented files build up on your hard disk, and degrade your
computer performance.
The built in program Disk Fragmenter will rearrange these file
fragments for quicker access.
Use the Task Scheduler to schedule the Disk Fragmenter program
to run monthly. The program to be scheduled is Defrag.exe.




                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
NASTIES




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au
Malware




“Nasties”can be lumped together under the heading
“malware”, which is short for “malicious software”.
They are:
• Spyware;
• Trojan Horses;
• Viruses, and
• Worms.
               Copyright 2012 Cyberspace Virtual Services
                   http://www.virtualservices.com.au
Destroy Malware




         Don’t take any chances with malware.
       Check for, and repair, any damage NOW.
                     A useful tool is:
     Microsoft’s “Malicious Software Removal Tool”.
              You can download this from:
http://www.microsoft.com/security/malwareremove/default.mspx

               Copyright 2012 Cyberspace Virtual Services
                   http://www.virtualservices.com.au
Use a Firewall




 A firewall is a hardware or software device that will protect
your PC by not allowing unauthorized users to gain access
             from either the Internet or a network.

Running one of the Windows Firewalls will not do any harm but I
 have a preference instead for the free PC Tools Firewall from
               http://www.pctools.com/firewall/ .

                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
Spyware



 Spyware collects information about you or your business without you
being aware of its existence. It can weigh down your system and even
                          shut down services.
   You should always use an anti-spyware program to scan for and
                  remove any spyware from your PC.
              A couple of good ones to use, that are free, are:
                      “Microsoft Security Essentials”,
     http://www.microsoft.com/download/en/details.aspx?id=5201 , and
                        “Spybot Search & Destroy”,
                     http://www.safer-networking.org/ .
                  Copyright 2012 Cyberspace Virtual Services
                      http://www.virtualservices.com.au
Trojan Horse




A Trojan Horse is a program that appears to be a
               useful application.
However, instead, it will compromise your security
        and cause wide ranging damage.

             Copyright 2012 Cyberspace Virtual Services
                 http://www.virtualservices.com.au
Virus



A virus takes the form of a piece of computer code that
 attaches itself to a program or file so it can spread from
       computer to computer, infecting as it travels.
Viruses can damage your software, your hardware, and
                          your files.
It is critical that the virus protection definition
       files on your computer stay updated.
              Copyright 2012 Cyberspace Virtual Services
                  http://www.virtualservices.com.au
Worms



               (They infect PCs too)

   A worm spreads without user action and
distributes complete copies of itself (sometimes
           modified), across networks.
  A worm can consume memory or network
     bandwidth, causing a computer to stop
                  responding.
          Copyright 2012 Cyberspace Virtual Services
              http://www.virtualservices.com.au
Microsoft Update


Microsoft regularly issues updates (patches) to fix
     bugs and plug security holes in Windows.
  These 'security holes' can be used by worms,
     viruses and hackers to compromise your
 system, so it is vital to keep Windows up-to-date.
        • How long does it take, and
           • How often do I do it?
             Copyright 2012 Cyberspace Virtual Services
                 http://www.virtualservices.com.au
Microsoft Update


The first time you carry out this procedure, it may
                  take a “long time”.
      It is so IMPORTANT not to be put off.
Even after you have updated your Windows you
   MUST repeat the update procedure at least
                   once per month.
These 'monthly' updates will be quick and easy.

             Copyright 2012 Cyberspace Virtual Services
                 http://www.virtualservices.com.au
Schedule Microsoft Update




To configure a schedule for Automatic Updates:
    1.Click the “Start button”;
    Click “Control Panel”; click “System and Security”, and
    then, four items down, click “Windows Update” and
    then in the left pane click “Change settings”.


              Copyright 2012 Cyberspace Virtual Services
                  http://www.virtualservices.com.au
Schedule Microsoft Update (2)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (3)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (4)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (5)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (5)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
Schedule Microsoft Update (6)




       Copyright 2012 Cyberspace Virtual Services
           http://www.virtualservices.com.au
SUMMARY
1. Routine Maintenance — Physical
       a) Internal, and
       b) External
2. Installation and regular updating of effective anti-virus
    and –malware software.
3. Regular updating of operating system and all installed
    applications.
4. Be careful of what you download and where you
    download it from.
5. Don’t click on links in e-mail messages from unknown
    sources.


                Copyright 2012 Cyberspace Virtual Services
                    http://www.virtualservices.com.au
?

Any questions?




Copyright 2012 Cyberspace Virtual Services
    http://www.virtualservices.com.au

More Related Content

What's hot

Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentationDarshan Khant
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME'sBright Technology
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021IJMER
 
4.it activities one pager
4.it activities   one pager4.it activities   one pager
4.it activities one pagerkaseyaindia
 

What's hot (7)

Spring Launch
Spring LaunchSpring Launch
Spring Launch
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME's
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021
 
4.it activities one pager
4.it activities   one pager4.it activities   one pager
4.it activities one pager
 
L49 slides
L49 slidesL49 slides
L49 slides
 

Viewers also liked

REC 3325 Budget Project
REC 3325 Budget ProjectREC 3325 Budget Project
REC 3325 Budget ProjectSarah Walters
 
PRO_НАС для ВАС_new
PRO_НАС для ВАС_newPRO_НАС для ВАС_new
PRO_НАС для ВАС_newAleksey Fokin
 
TWT Tennis Camp Program Plan
TWT Tennis Camp Program PlanTWT Tennis Camp Program Plan
TWT Tennis Camp Program PlanSarah Walters
 
Erin Morin - cvr
Erin Morin - cvrErin Morin - cvr
Erin Morin - cvrErin Morin
 
Content marketing in 2017
Content marketing in 2017Content marketing in 2017
Content marketing in 2017Asad Haroon
 
Brenda Final Layout
Brenda Final LayoutBrenda Final Layout
Brenda Final LayoutSarah Maisel
 
Primary Research Task - Unit G324
Primary Research Task - Unit G324Primary Research Task - Unit G324
Primary Research Task - Unit G324tj_salango
 
Propp's Character Roles and Narrative Functions - Unit G324
Propp's Character Roles and Narrative Functions - Unit G324Propp's Character Roles and Narrative Functions - Unit G324
Propp's Character Roles and Narrative Functions - Unit G324tj_salango
 

Viewers also liked (10)

REC 3325 Budget Project
REC 3325 Budget ProjectREC 3325 Budget Project
REC 3325 Budget Project
 
Ejercicios estructira con arrays
Ejercicios estructira con arraysEjercicios estructira con arrays
Ejercicios estructira con arrays
 
Student Record
Student RecordStudent Record
Student Record
 
PRO_НАС для ВАС_new
PRO_НАС для ВАС_newPRO_НАС для ВАС_new
PRO_НАС для ВАС_new
 
TWT Tennis Camp Program Plan
TWT Tennis Camp Program PlanTWT Tennis Camp Program Plan
TWT Tennis Camp Program Plan
 
Erin Morin - cvr
Erin Morin - cvrErin Morin - cvr
Erin Morin - cvr
 
Content marketing in 2017
Content marketing in 2017Content marketing in 2017
Content marketing in 2017
 
Brenda Final Layout
Brenda Final LayoutBrenda Final Layout
Brenda Final Layout
 
Primary Research Task - Unit G324
Primary Research Task - Unit G324Primary Research Task - Unit G324
Primary Research Task - Unit G324
 
Propp's Character Roles and Narrative Functions - Unit G324
Propp's Character Roles and Narrative Functions - Unit G324Propp's Character Roles and Narrative Functions - Unit G324
Propp's Character Roles and Narrative Functions - Unit G324
 

Similar to PC Maintenance

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsAsep Sopyan
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license keyHayWhitfield72
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.comgerryfebre
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)Mirco Vanini
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 

Similar to PC Maintenance (20)

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Optimize Your Pc
Optimize Your PcOptimize Your Pc
Optimize Your Pc
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 
Internet security
Internet securityInternet security
Internet security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.com
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

PC Maintenance

  • 1. Keep Your PC Functioning Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 2. Hardware Basic PC Maintenance Software and Security Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 3. Dust Enemies HEAT Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 4. "Your computer could fry if you don't keep it clean," says Jonathon Millman, Chief Technology Officer for Hooplah Interactive. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 5. Keep Your PC Squeaky Clean You will need: can of compressed air (available from computer dealers or office-supply stores); cotton pads (do not use a cotton ball); paper towels or anti-static cloths; rubbing alcohol; screwdriver, and lastly clean water. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 6. Always… turn your computer off before you set off and unplug all the connectors. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 7. Cleaning Steps Step 1: Within the box Step 2: Outside the box Step 3: Keyboard Spills  For all spills, be aware that anything other than plain water may cause severe damage. Never, ever, try to dry a keyboard or laptop in a microwave or conventional oven.  Step 4: Mouse Step 5: Monitor Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 8. HEAT Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 9. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 10. Software and Security Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 11. Software Preventive Maintenance Plan Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 12. Software Schedule Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 13. Software Hard Disk Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 14. Software Windows Tools Check Disk; Disk Cleanup, and Disk Defragmenter Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 15. Software Run Frequency Check Disk — Weekly; Disk Cleanup — Weekly, and Disk Defragmenter — Monthly Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 16. Check Disk Check Disk won’t be available in the scroll-down list of programs that you can select from in the Task Scheduler; you will need to select it manually • Click Browse • Navigate to windows system32 chkdsk.exe. • Select chkdsk.exe. • Click Open. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 17. Check Disk and Task Scheduler Task Scheduler, will enable you to schedule Check Disk to run automatically at weekly intervals, at times to suit your PC use. Windows XP • Click Start All Programs; • Point to Accessories; point to System Tools, click Scheduled Tasks, and • Follow the instructions in the Scheduled Task Wizard. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 18. Check Disk and Task Scheduler Windows Vista and Windows 7 • Click Start All Programs Accessories System Tools Task Scheduler; • Click Create Basic Task; • Type the task name and click Next; • Click Daily Next, and specify the schedule you want to use. Click Next; • To schedule Check Disk to start automatically, click Start a program, and then click Next; • Click Browse to find Check Disk, click Next, and • Click Finish. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 19. Disk Cleanup Over time, a large number of temporary files, from several sources, can be collected. The World Wide Web is a principal offender, and the cumulative effect is to slow down the operation of your PC. Use the Task Scheduler to run Disk Cleanup on a weekly basis. The program you will need to add to your schedule is “cleanmgr.exe”. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 20. Disk Defragmenter Files can become too large to store in a single position on your hard disk, so your PC will split it into fragments. These fragmented files build up on your hard disk, and degrade your computer performance. The built in program Disk Fragmenter will rearrange these file fragments for quicker access. Use the Task Scheduler to schedule the Disk Fragmenter program to run monthly. The program to be scheduled is Defrag.exe. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 21. NASTIES Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 22. Malware “Nasties”can be lumped together under the heading “malware”, which is short for “malicious software”. They are: • Spyware; • Trojan Horses; • Viruses, and • Worms. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 23. Destroy Malware Don’t take any chances with malware. Check for, and repair, any damage NOW. A useful tool is: Microsoft’s “Malicious Software Removal Tool”. You can download this from: http://www.microsoft.com/security/malwareremove/default.mspx Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 24. Use a Firewall A firewall is a hardware or software device that will protect your PC by not allowing unauthorized users to gain access from either the Internet or a network. Running one of the Windows Firewalls will not do any harm but I have a preference instead for the free PC Tools Firewall from http://www.pctools.com/firewall/ . Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 25. Spyware Spyware collects information about you or your business without you being aware of its existence. It can weigh down your system and even shut down services. You should always use an anti-spyware program to scan for and remove any spyware from your PC. A couple of good ones to use, that are free, are: “Microsoft Security Essentials”, http://www.microsoft.com/download/en/details.aspx?id=5201 , and “Spybot Search & Destroy”, http://www.safer-networking.org/ . Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 26. Trojan Horse A Trojan Horse is a program that appears to be a useful application. However, instead, it will compromise your security and cause wide ranging damage. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 27. Virus A virus takes the form of a piece of computer code that attaches itself to a program or file so it can spread from computer to computer, infecting as it travels. Viruses can damage your software, your hardware, and your files. It is critical that the virus protection definition files on your computer stay updated. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 28. Worms (They infect PCs too) A worm spreads without user action and distributes complete copies of itself (sometimes modified), across networks. A worm can consume memory or network bandwidth, causing a computer to stop responding. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 29. Microsoft Update Microsoft regularly issues updates (patches) to fix bugs and plug security holes in Windows. These 'security holes' can be used by worms, viruses and hackers to compromise your system, so it is vital to keep Windows up-to-date. • How long does it take, and • How often do I do it? Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 30. Microsoft Update The first time you carry out this procedure, it may take a “long time”. It is so IMPORTANT not to be put off. Even after you have updated your Windows you MUST repeat the update procedure at least once per month. These 'monthly' updates will be quick and easy. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 31. Schedule Microsoft Update To configure a schedule for Automatic Updates: 1.Click the “Start button”; Click “Control Panel”; click “System and Security”, and then, four items down, click “Windows Update” and then in the left pane click “Change settings”. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 32. Schedule Microsoft Update (2) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 33. Schedule Microsoft Update (3) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 34. Schedule Microsoft Update (4) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 35. Schedule Microsoft Update (5) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 36. Schedule Microsoft Update (5) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 37. Schedule Microsoft Update (6) Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 38. SUMMARY 1. Routine Maintenance — Physical a) Internal, and b) External 2. Installation and regular updating of effective anti-virus and –malware software. 3. Regular updating of operating system and all installed applications. 4. Be careful of what you download and where you download it from. 5. Don’t click on links in e-mail messages from unknown sources. Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au
  • 39. ? Any questions? Copyright 2012 Cyberspace Virtual Services http://www.virtualservices.com.au