Computer Maintenance Checklist.
BACKING UP:
-
back up any documents you create on an external drive
-
disk, zip, jazz, tape, or CD-Rom are all acceptable
-
keep back-up copies of all computer programs in case you have to re-install
-
backing up your entire system at one time takes care of both concerns
-
back up as often as you regularly make changes to your documents
-
put your software drivers and your operating system disks in a safe place.
FIREWALLS ARE KEY:
-
programs that keep others from accessing your computer from the outside
-
acts as a “locked gate” for your computer hard drive
-
can be installed on your computer via software (Black Ice, Norton, etc.)
-
may also come with your operating system, router, or other networking hardware
KEEPING YOUR COMPUTER HEALTHY:
-
install a good anti-virus software program (Norton, AVG , VirusScan, etc.)
-
this program will scan your files, drives, and email for viruses
-
set up to scan external disks automatically when inserted into your machine
-
set up to scan your hard drive automatically when you start your machine
-
set up to scan email automatically when you send and receive
-
be sure to update your software regularly for virus updates
-
most programs give automatic prompt when new updates are available
-
run a disk defrag program to organise your files.
-
run a clean up to delete unneeded files
-
Register your software products
-
Schedule automated updates
POWER ISSUES:
-
surges in electrical power can harm your computer
-
get a good surge protector with multiple plugs and on / off switch
-
avoid cheap ones with a metal oxide varistor (MOV) suppressor that can fail
-
buy a surge protector with included insurance to cover damage to equipment
-
protects your computer even when turned off
-
if you don’t have a surge protector, unplug your equipment when not using
-
be particularly careful during storms or when it is lightning
PUTTING A STOP TO SPYING:
-
install a good spyware program (Spybot, AdAware, etc.)
-
tracks down programs secretly monitoring your computer activities
-
these programs may have been installed through internet downloads
-
can also be installed surreptitiously when installing other programs
-
know where programs are coming from before downloading from internet
-
research the software provider and make sure they are legitimate
-
run spyware program weekly to clean out rogue programs from hard drive
STAYING AWAY FROM TROUBLE:
-
don’t accept software or downloads from unconfirmed sources
-
many viruses embedded in email attachments and activated when opened
-
set your email program so it doesn’t open “preview” window
-
delete any suspicious email without opening it
-
don’t open attachments unless you know who and where they came from
-
.exe, .com, .vbs, .bat, .mdb, .reg, and .js file extensions are dangerous
Leave a Reply