COMPUTER HOUSEKEEPING Keeping Your Computer in Top Working Order and Keeping Your Computer Secure By JCA and Volusia Flagler SeniorNet Learning Centers Computer Housekeeping Table of Contents Introduction ................................................................................... 1 Part I Computer Housekeeping .................................................... 3 I. II. III. IV. ScanDisk Defragmentation Program Windows Disk Cleanup Program Backing Up Files Part II Computer Security ............................................................ 15 I. II. III. IV. V. Passwords Virus Checkers Protecting Your Computer Against Program Bugs Firewalls Spyware Checker Appendix A Sources of Further Information ............................... 23 Appendix B How to Use Spybot Search & Destroy .................... 25 Appendix C: Backing Up Data Files ............................................ 31 Sponsored by: BellSouth Halifax Community Health System GE Elfun Volunteers Checkered Flag Committee Computer Housekeeping and Computer Security Keeping Your Computer in Top Working Order and Secure From Outside Attacks by SeniorNet Computer owners are often unaware of some useful ways to keep their machines in top working order. In this manual you will learn to use housekeeping programs that will both keep your computer running efficiently and also protect it against viral attacks. Viruses are mischievous and damaging programs that get into your computer via e-mail, over the Internet and even from shared floppy disks. You will also learn to back-up your files so they won't get lost if the hard drive (C Drive) fails. Computers are akin to the average teenager whose top priority is not orderliness. In the case of your computer, it throws new data helter-skelter onto the hard drive and then spends increasing time searching for the data you want. There are utility programs, in your computer that are designed to help you organize and protect the data on the hard drive. They can keep your computer from becoming seriously impaired as more and more data are added to the drive. GOALS To teach you ways to keep your computer running trouble-free with the help of a few housekeeping utility programs. This manual explains how to maintain computers from the older to the newest Microsoft Windows operating systems (i.e. Windows, 98, ME, 2000 and XP). You will learn how to do the following: Clean up your hard drive to run more efficiently Protect your files from loss with back-ups (duplicate copies) Secure your computer by keeping your Windows operating system updated; choosing well-formed passwords; using virus protection; and installing programs such as firewall and spyware. The good news is that a number of computer maintenance programs are built into all Microsoft operating systems. The trick is in locating the programs, learning what they do, knowing how they work and remembering to run them. 1 Revised: February 2005 Part I – Computer Housekeeping I. Using Microsoft's ScanDisk or XP’s Error-Checking Programs: Let's start with ScanDisk – called Error-Checking in Windows 2000 and XP -and see what it does and how to do it. ScanDisk checks your hard drive to make sure it's in good working order. Here's what it does: Repairs errors that can occur with improper shutdown of your computer Repairs file system errors Improves the response time of your computer Fixes errors on hard drives, floppy disks and most other data storage devices Note: If ScanDisk is unable to repair damaged data, or indicates that the hard drive may have sustained physical damage, you may need to take your computer in for repairs. The frequency for running this program depends on the amount of new data, including e-mail, which you put on your computer’s hard drive. As a general rule, plan on running the ScanDisk and the Defragment programs about once a month. The ScanDisk program examines the surface condition of your computer’s hard drive (or C Drive). It looks for flaws that can impair the recovery of data. If flaws are found, the program will isolate or "wall off" the flawed areas so your computer will not use them again. However, the ScanDisk program will not run if other programs are active, otherwise it will keep restarting and finally stop altogether. It is important to close any programs you have opened and to disable other running programs before launching this maintenance utility. (This process has been simplified in Windows 2000 & XP.) Make sure you have saved your work, as you will be restarting the computer in order to close all active programs. Consider running the ScanDisk and the Defragment programs at a time when you don’t need to use the computer for a while. The two programs can take several hours to run, depending on how much work your computer has to do to get the hard drive back in shape. 3 Revised: February 2005 1. Running Error-Checking in Windows 2000 and XP: Steps to locate the Error-Checking utility: Open the Start Menu Click My Computer Right click the C Drive icon Click Properties Click the Tools tab Click the Check Now button in the box labeled Error-Checking Check the Automatically Fix File System Errors box Check the Scan for and Attempt Recovery of Bad Sectors box Click the Start button Click the Yes button at the next prompt. This will tell the computer to run Error-Checking when the computer is restarted. Close the program and go to the Start Menu and restart your computer. This will allow the Error-Checking program to examine the C Drive before Windows fully loads all its programs. Note: If left untouched after Error-Checking is completed the computer will turn itself off. 2. Running ScanDisk in Windows 98 and ME: A. Shutting Down your Screen Saver: If you are running a Screen Saver that has moving elements, it must be shut down. Right click on your desktop Click on Properties to Display Properties dialogue box Click on the Screen Saver tab Open the Screen Saver pull down menu and highlight or select None Click Apply Return to desktop by pressing OK B. Shutting Down Open Programs: The first step to take before running ScanDisk is to shut down all open programs. When shutting down the Start Menu programs you have a choice of using one of the following two options. We’ll let you choose which method works best for you. In many cases, Option #1 will be the simplest unless you have a long list of programs that need to be shut down. If the list is long, try using Option #2 instead. 4 Revised: February 2005 Option #1 for shutting down open programs: Hold down the Ctrl, Alt and Delete keys all at the same time while at your desktop. The Windows Task Manager dialogue box will appear with a list of open applications or programs under the Applications tab. Your window will show two applications that should not be closed: Explore and Systray (i.e. system tray). It is important that you not close either of these applications. To continue the shutting down process: Click on one of the listed applications to highlight it highlighted under the Applications tab. Click the End Task button. The dialogue box will then disappear Again, hold down the Ctrl, Alt, and Delete keys all at the same time to again open the dialogue box. Repeat the process by clicking on the next open application until all the listed programs are closed except for Explore and Systray. Option #2 for shutting down open programs: Open Start Menu Click Run Type "msconfig" in dialogue box Click OK if you get a System Registry Notice dialogue box Click the Selective Startup button in the System Configuration Utility dialogue box (General tab). See illustration below 5 Revised: February 2005 Uncheck the Load startup group items box Click the Apply button and then click OK Restart the computer Note: You may get a warning box when you call up this program. It is safe to check OK and proceed. C. Steps for running ScanDisk in Windows 98 and ME: Click on the Start Menu, Programs, Accessories and System Tools Click ScanDisk Select or highlight C Drive Click either the “Standard” or “Thorough” radio button Click Automatically Fix Errors Click Start button to commence the scanning process If you used Option #2 above for shutting down programs, when the ScanDisk has completed, you must repeat the Option #2 steps and return the selection to Normal Startup and restart your computer. Lastly, reactivate your Screen saver program. II. Using Microsoft's Defragmentation Program: The Defragmentation program is designed to pull together the data for each file to improve the time it takes to launch, or open, programs. Disk fragmentation is a process that happens over time with normal use of your computer. This phenomenon is called fragmentation. Here is how your computer works in storing files – including your e-mail 6 Revised: February 2005 messages. Initially on a new computer, all files follow each other in lock step. As you begin to delete files you no longer need, you create “holes” in the file structure. Windows does not leave these holes empty on your disk, but begins to put new files in those spaces. However, sometimes the new files are bigger than an existing hole. So Windows puts part of the file in one hole and parts in other holes. This means the entire file is on your hard drive, but is “fragmented,” with pieces scattered in various places. Your computer will work OK in this condition, but it can take longer to load files and applications, and there is an increased chance of a piece of a file getting corrupted. The situation is illustrated below. The first line represents your “new” computer with all files in order. The second line shows what happens when you delete files. Deleted file B and file D leave empty holes. The third line shows the situation when a new long file F is added. It is fragmented into sections, filling in various holes on the hard disk. Finally, the fourth line illustrates the file structure after the disk has been defragmented. File Fragmentation Illustrated File A File B File C File D File E File A Hole File C Hole File E File A File F-1 File C File F-2 File E File A File C File A File E File F-3 File F When your computer is asked to retrieve file F from the hard drive, it has to move to several locations on the disk to pick up the various pieces. This slows down the computer and makes it more prone to errors. You can correct the fragmented situation by running the Defragmention program. This utility will put the files back in proper order, as they are in lines 1 and 4 of the above illustration. In Windows 2000 and XP you do not need to run the Error-Checking program prior to running the Defragmentation program. 1. Steps to running the Defragmentation program for Windows 2000 and XP: Begin by closing all programs you have opened. Then: 7 Revised: February 2005 Open the Start Menu Click My Computer Right click on the Local Disk C icon Click Properties Click the Tools tab Click the Defragment Now button in the box labeled Defragmentation Click the Analyze button Wait to see if you are told the C Drive needs to be defragmented, if so, Click the Defragment button Click Close Program when program finishes 2. Steps to running Defragmentation program for Windows 98 & ME: When the Defragmentation program runs, it will first run the ScanDisk program followed by the Defrag. It is necessary for you to follow the either Option #1 or #2 previously detailed for shutting down open programs before you start. After you shut down the open programs, then: Double Click My Computer Right click on the Local Disk C icon Click Properties Click the Tools tab Click Defragment now Once the program is launched, you can click on the Show Details bar to see the process at work. Click on the Legend bar to learn what the different colors mean. If you chose Option #2 for closing down active programs, you must go back and reset the Start Menu program control. To do this, after you have finished running the ScanDisk and the Defragmentation programs follow the directions above (Option #2) to re-access the System Configuration Utility dialogue box for shutting down Start Menu programs. After you have accessed the System Configuration Utility dialogue box: Click Normal Startup radio button in the dialogue box under the General tab Click Apply Restart your computer After you have restarted your computer, remember to reactivate your Screen Saver program (see 2A, page 4). 8 Revised: February 2005 III. Using the Windows Disk Cleanup Program: Disk Cleanup is a quick and easy way to remove unused system files, old programs and other extraneous bits of information that your computer collects as you cruise the web. (Disk Cleanup is accessed in the same way on all versions of Windows) Steps to Running Disk Cleanup: Click the Start Menu Go to Programs, Accessories, System Tools Click Disk Cleanup (see illustration on the next page) Under the Disk Cleanup tab you will get a display of how much space can be freed-up on your C Drive. Displayed are the items the computer recommends you trash, as they are no longer needed. By clicking on each file type, you will get a description of what's in each of the “components.” Check box on left if you want to remove the contents of file (see illustration on next page) Click OK There are other maintenance utilities available for Windows that are not free but can be useful: Norton Internet Security, which includes a virus checker, is one such highly rated product (http://symantec.com - See Appendix). 9 Revised: February 2005 IV. Backing up Your Files: About Backing Up The hard drive contains all the data that makes your computer useful. Any other part of the computer can fail and be replaced, but if the hard drive dies, all the data will be lost. Hard drive failures occur more often than you might expect, and often can't be prevented. The solution is to make backup copies and store them in a separate place. There are two types of files in your computer – data files and program files (often called application files): Data files are the documents you create: Word documents, Excel spreadsheets, pictures, e-mails, etc. Program files are the files you use to create your work: Word, Excel, Photoshop, etc. 10 Revised: February 2005 There's no need to backup the program files; they can be reinstalled from the CDs that were used to set up your computer. The important data to backup are the files you create. If they are lost, you'll have to recreate them. Backup storage devises used to protect your files: Floppy disks (limited space - not recommended for large amounts of data) Tape drive (outdated method) Iomega Zip Drive (becoming outdated) CD read/write Drive (preferred method) Or, have a second hard drive (C Drive) installed to receive your backup files. (A 40 gig. hard drive now costs less than $40.) You will need an Iomega Zip drive to use the Windows backup utility because it will not backup to you CD burner. You can backup to 3-1/2 floppies but they hold far too little data to be useful. To backup to your CD burner will need to use the software that came with the burner. The best option is to install a second hard drive. 1. Installing Windows XP Home Edition backup program: The Backup utility is not included in the default installation of Windows XP Home Edition. The Backup icon is not present on the Start menu nor is Backup listed in the Add/Remove Programs. The backup program is found on the Windows XP Home Edition CD that came with your computer. To manually install the Backup program: Insert the Windows XP in your CD driver. When the installation window appears, click Exit. Click Start, Run In the text window type the following where “X” is the letter of the CD drive: X:\valueadd\msft\ntbackup\ntbackup.msi When the wizard is complete, click Finish. 2. Backing up with Windows XP: Steps to locating and running the XP Backup program: Open the Start Menu and click My Computer Right click C Drive icon Click Properties Click the Tools tab Click Backup Now box Restore Wizard dialogue box will come up Click next Check Backup Documents and Settings in the wizard dialogue box or check Let me Choose What to Back Up Click Next 11 Revised: February 2005 Choose the backup type If you select floppy disks, you will need a large supply of blank disks as space on a floppy is limited. The other devises you can use with this utility is either Iomega’s Zip drive, if you have that device installed in your computer, or a second hard drive – either internal or external. 3. Installing Windows 98 backup program: A Microsoft backup program is available in your Windows 98 systems but it is often not installed. You may need to install it with the Windows 98 CDs that came with the computer. To install the backup program: Click Start Double click My Computer then double click on Control Panel Double click on the Add/Remove Programs icon Click the Windows Setup Tab Double click System Tools on the list Check Backup box and have Windows 98 CD ready. (This is a small program so it will load quickly.) Insert the Windows 98 CD into your CD drive and the program will load automatically. 4. Backing up with Windows 98: Steps to locating and running Windows Backup program: Click Start, Programs, Accessories, System Tools, Backup Click Create a New Backup Job then OK. Click Back up Selected Files, Folders and Drives then Next. Click the + at the C drive to expand the folder list. Click the box at My Documents to Select This for Backup. If you want to limit the backup size to a reasonable amount, it is suggested that My Documents contain your data files. If this has been done, then click only that folder. Click Next Select the All Selected Files button or the New and Changed Files button Click Next Select the destination for your back up in the Where To Back Up dialogue box. It may be to a floppy – the least desirable choice because they hold so little, or a larger removable device such as a Iomega ZIP disks. A better option is to install a second hard drive because you cannot backup to your CD-RW drive with this utility. You will need to use the CD burner’s backup software to write to CD’s.) After you have made your choice click Next. Check the Compress the Backup Data to Save Space box. 12 Revised: February 2005 Check the Compare Original and Backup Files to verify data was successfully backed up if you have previously backed up your files. Click Next. Give a name to your backup file. The current date is a good choice for a name. Click Start Click OK Exit Your backup is now complete. Remove the disk, or other media, and put it in a safe place. 5. Using the “Restore” feature with Windows 98: Steps to using the restore program: Click Start, Programs, Accessories, System Tools, Backup Click the Restore Backed Up Files button Click OK. Click on the Restore From box, which selects the location of your backup files and then click Next Select the Backup Set and click OK. Double click the left file tree to get to My Documents. Check My Documents. A single file may be deselected by un-checking those that are not wanted. Click Next. Select the location. The Original Location is the usual choice. However, the files may be restored to anywhere you select in the Alternate location by clicking on the folder and then choosing a location from the tree. Click Do Not Replace the file on my computer. Here you must make a choice about whether to overwrite the old files. Usually, it is best not to replace them unless there is a good reason. Click Start. Be sure the storage device, e.g. the floppy, Zip Disk, other media is in the drive and Click OK when selecting the location of the storage. Click OK when the Operation is complete, View the report if desired, and then close it. Click OK. Exit. The files in your back up are now restored to their original location or to another location, if selected. 13 Revised: February 2005 6. Running Windows ME & XP System Restore: Windows ME, 2000 and XP come with a System Restore program. The computer automatically records system data, not program data, on your computer at preset times, e.g., every 2 weeks. (Note: this program does not record your work product, only system settings.) The program is located under System Tools. With this tool, you can choose "restore my computer to an earlier time" or "create a restore point." If you plan on installing or removing a program, it's good practice to first select "create a restore point." The computer will make a backup file of your system data, which can be accessed if problems occur while adding or removing programs. If you forget to create a backup file, you can still access an earlier backup file, if needed. 14 Revised: February 2005 Part II – Computer Security Keeping your data and personal information private and your computer safe from unauthorized use If your computer is not connected to a network or the Internet and is in a location only you have access to, then there is no way for unauthorized use to occur. However, most computers whether at home or at work are connected to the Internet or to a network. Most computers at work are connected to both. In this connected situation, there is risk of your computer being compromised. Sometimes an unauthorized program created by another user will find its way into your computer. The most common way is via the Internet -- via e-mail, a floppy or CD from which you load a document. For example, a virus can take several forms such as bit of data (i.e. a macro) in word processing or in a spreadsheet. Another way to corrupt a program is when the program is launched or when the computer is restarted. Regardless of how it gets on your computer, it can corrupt your data and/or your operating system. It can even reformat your hard disk. I. Passwords: When you are setting-up your web access to your bank account, or your personal account on Amazon.com or other sites that require special secure access you will need to establish a password so when you return to that site you re-access your account. It is important that you choose a password that another person cannot guess at or use a computer program to access your personal accounts. Choosing a Good Password: For the most secure password you might be able to use special characters (*!$+) mixed with letters and numbers at some sites. You can always use mixed upper-and lower-case letters. Putting capitals in random locations throughout a password is effective. You also might consider using punctuation characters mixed with letters and numbers or nonsense words that are easy to pronounce but aren't in any dictionary. Whatever you choose for a password, make sure it has six or more characters. Do not use any of the following for a password: Any part of your name - first, last, or middle – or your initials; your social security number; names of friends, family or pets; birthdays, phone numbers, addresses or any other personal information that could be guessed at; place names. Also, don’t use words from the English dictionary; words from a foreign dictionary; your username or login name; your computer's name; repetition of 15 Revised: February 2005 the same letter; sequences of keyboard keys such as "12345" or "qwerty" or any minor variation of the above, such as spelling backwards or appending a character to the end of your name. One suggestion: you might use an old home address. For convenience sake don’t make the password too long. Long passwords increase the chance of typing errors. To increase security, consider mixing upper and lower case letters (most sites are case sensitive) and including symbols. Some examples: 4220walnUt reA157baD hOt*tea! II. Virus Checkers: What is a virus? - A virus is malicious software planted expressly to cause disruption and damage to computers. How does it get into your computer? In the 1980s, viruses were passed on by trading floppy disks. The next trend was the transport of viruses through e-mail attachments of Microsoft Word documents. The newest danger comes from mass-mailing (often called “spam”), which can contain "worms" -- self-replicating, mutating viruses that can penetrate your address book, and thus send themselves, randomly, to multiple recipients. One should be aware that Outlook Express (OE) users are much more vulnerable to virus attacks than users of Netscape, Eudora, Mozilla, or even AOL. There are two reasons for this: The most obvious is that it is the most widely used e-mail program -- it comes with every edition of Windows. John Gilroy author of The Washington Post’s column Ask the Computer Guy (10/19/03) explains that the problem goes deeper than just being the most popular program. Microsoft “…tried to make Outlook Express more powerful by integrating it with Microsoft’s Internet Explorer and allowing it to load types of data and run programs normally confined to Web browsers. As a result, OE can also run dangerous content sent to you by strangers…” Note: A virus is different from a Trojan horse. Trojan horses are back-door programs, attachments or downloads that masquerade as useful files while they actually contain nasty elements that open your operating system to hackers, who try to control your system remotely to compromise a web site or to extract personal information. (See "Cyberspace Invaders," Consumer Reports, June 2000, pp. 16-20) What is a virus checker? - A virus checker is a program that runs continuously whenever your computer is on. It monitors the contents of e-mail attachments as well as programs that run on your computer. It detects and disarms viruses and prevents damage to your computer before they start trouble. 16 Revised: February 2005 Why do you need a virus checker? - You need a virus checker to prevent corruption of your data and software. The program will also catch a virus attached to an e-mail. (If you use a Hotmail e-mail account, it comes with the McAfee virus checker/protector. An AOL account comes with the Panda virus checker.) There are currently some 60,000 known viruses in circulation. In any given month, hundreds of viruses are actively floating around – some harmless or simply annoying and others malicious and destructive. Your computer will almost certainly be corrupted sometime if you don’t have a virus protection program, which is updated regularly with new virus definitions. An ounce of prevention is worth a pound of cure. How do you select and maintain a virus checker? - The two most popular virus checkers, Norton and McAfee, have automatic update features that will keep your virus checker current. Because new viruses are constantly being created, these protection programs use a virus data-reference file that resides on your hard drive. Setting the automatic update feature will enable the virus checker to keep this file up-to-date without your intervention. In most cases, this automatic update is the best way to protect your computer from viral invasion. Update regularly: Remember, effective virus and Windows System protection depends on your computer being regularly updated. You should set your virus protection software so it calls in to Norton or McAfee’s web site get new virus “vaccines” updates at least every week. (Fairfax County updates their computers every day!) One survey found that Windows users were three times more likely to be infected by a virus than Macintosh users. For an informative article on this subject see Consumer Reports, June 2000, pg. 20, “How to Minimize the Probability You Will Contact a Virus.” III. Protecting your computer against program bugs: Bugs are not viruses or invaders but software program errors that often are only discovered after the product has been on the market for awhile. All programs contain bugs. For this reason it is important to remember to regularly update your operating system, web browser, and other key software by using the manufacturer’s update features. As the manufacturers of these programs discover the problems, they often offer updates, patches, hotfixes or service packs that can be downloaded from the manufacturer’s web site. You can find Microsoft’s update program in pre-XP versions of Windows by opening your Start Menu and clicking on “Windows Update.” In Windows XP: click on the start menu and then Programs. If you have just installed Windows XP or are upgrading your Windows Operating System, you will probably find that you will need to install a service pack that was developed after your version of Windows was shipped. Microsoft’s update web address is: www.windowsupdate.microsoft.com. Once you have connected with the Windows Update web site Microsoft will examine your computer to see what patches or critical updates are needed. Once your computer system has been scanned Microsoft will advise you how to proceed. Microsoft will also present you with 17 Revised: February 2005 a list of non-critical updates, utilities or programs. Examine these items carefully and download only those that you want. Activating Windows XP Auto Update Program: Windows XP can be set to automatically update your Windows operating system. The following steps show you have to set your computer to call into Microsoft to get critical updates as they become available. Steps for setting your computer to auto update Windows XP: Click on Start Click on Control Panel Double click on System icon Click on the Automatic Updates tab Check the first box (Keep my computer up to date) and the second or third radio button Click Apply To lean more, click on the blue link entitled: Automatic Updates. IV. Firewalls: What is a firewall? - A firewall is a program that examines incoming and outgoing traffic from another computer on your network or from the Internet. The firewall watches for unwanted traffic trying to get into your computer through the Internet. A firewall program should also have outbound controls to watch for a Trojan horse or spyware trying to call out from your system. All computers with a connection to the web should have firewall protection. This protection is strongly recommended if you are using a broadband cable modem or a high-speed DSL line (i.e. digital subscriber line -- usually from your phone company). If you are on a local area network a firewall is built into your internet access system (cable or DSL modem or router). Why do you need a firewall? - The short answer is that a firewall blocks unwanted access to your computer that could corrupt your data and operating system. While the virus checker looks at programs the firewall looks for unwanted traffic/data going from and to your computer. This unwanted traffic usually comes from a location with the intent to compromise your computer by installing a virus or Trojan horse. A Trojan horse is a program that has been installed on your computer without your knowledge. These insidious invaders are used for purposes such as gathering personal data, doing damage to your software and monitoring both your web usage and keystrokes. (Norton Internet Security software provides both virus and firewall protection. McAfee may also have a similar all in one software package.) 18 Revised: February 2005 How to maintain a firewall? - The two most popular virus checkers, Norton and McAfee, sell a firewall product, either stand-alone or as part of a suite of products. Both have automatic update features with a firewall data reference file that resides in your hard drive with the latest firewall information. Setting the automatic update feature will keep this file current without your intervention. In most cases, automatic update is a must feature. Activating Windows XP firewall: Windows XP comes with a built-in firewall that will block illegal attempts to access your computer. It does not, however, offer outgoing controls to block a Trojan horse or spyware from capturing your address book and mailing itself to all your friends. For this reason you are urged to purchase firewall software from Norton or McAfee rather than using the Microsoft program. However, if you choose to use the built-in program it will need to be activated before it will function. It is important that you not activate this program if you have installed another firewall – the programs will conflict with one another. Steps to activating the Windows XP firewall: Click on Control Panel Double click on Network Connections icon Right click the icon that represents your connection Click on Properties Click the Advanced tab Check the box labeled “Protect my computer & network by limiting or preventing access to this computer from the Internet.” OR Click on the hotlink labeled “Learn more about Internet connection firewall” OR Click the Network Setup Wizard link Note: We recommend that you purchase a virus utility rather than relying on the Windows XP program because of its inability to stop outgoing viruses and Trojan horses. V. Spyware Checker: Computer interconnectivity has opened a world of possibilities, and our lives are more convenient because of it. One trade-off, however, is that it's now possible for prying eyes to monitor virtually every action you take on your computer. - Laptop Magazine What is spyware? A spyware, unlike a virus or Trojan horse, is not designed to do mischief, but rather to gather 19 Revised: February 2005 information. It examines programs and “cookies” on your computer looking for items used to either gain data from your computer or track your Internet use. A spyware checker is a program designed to protect your personal information. It is now surprisingly easy for anyone to install spy programs on your computer and watch your every move. Identity theft is one of the fastest growing crimes. Spyware is becoming a major tool in the hands of unscrupulous people. With hundreds of thousands of copies of surveillance software currently in use worldwide, there's a good chance your computer may be infected already. Without Spyware protection you could easily become the target of anyone who wants to spy on your computer activity. There is also "hybrid spyware" which disguises itself as an E-Card greeting card! The moment you open it, you're infected. Unfortunately, spyware is so easy to install and use, it can turn any eight year old into a seasoned hacker. Spy software can even be installed remotely over the Internet without anyone ever going near your computer. Privacy software expert Steve Gibson of Gibson Research (www.GRC.com) explains: "Spyware is any software (that) employs a user's Internet connection in the background (the so called 'backchannel') without their knowledge or explicit permission. Silent background use of an Internet 'backchannel' connection must be preceded by a complete and truthful disclosure of proposed backchannel usage, followed by the receipt of explicit, informed consent for such use. Any software communicating across the Internet absent of these elements is guilty of information theft and is properly and rightfully termed: Spyware." Advertising companies often try to install additional tracking software on your system, which will then continuously "calling home", using your Internet connection to report information about you and your surfing habits to a remote location. While the privacy policies of the companies claim that there will be no sensitive or identifying data collected from your system, the fact remains that without firewall and anti-virus software programs installed, your PC is sending out information to an anonymous site about you and your surfing habits. Do I Need It? The answer is “Yes!” A number of software applications, including Ad Aware and OptOut (by Gibson's company), are available as freeware to help computer users search for and remove suspected spyware programs. Also, most of the firewall programs will stop a spyware from getting into you computer. A word about “Cookies” – Should I worry about them? Cookies are commonly used to rotate the banner ads that a site sends, so that it doesn't keep sending the same ad as it sends you a succession of requested pages. They can also be used to customize pages for you based on your browser type or other information you may have provided the Web site. Web users must agree to let cookies be saved for them, but, in 20 Revised: February 2005 general, it helps Web sites to serve users better. Numerous web sites won't work if you have cookies disabled - including almost all e-shopping sites. Activating XP’s Cookie Control Program: Click on Start Click on Control Panel Double click on Internet Options Click on the Privacy tab Use the slide bar to increase or decrease cookie control. 21 Revised: February 2005 APPENDIX A: Sources of Further Information Vendors are now bundling several security features in the software packages they sell. For instance, Norton Internet Security™ offers protection from viruses, hackers, and privacy threats. This product includes Norton AntiVirus™, Norton™ Personal Firewall and Norton™ Privacy Control. Please keep in mind that product vendors are the best source of information regarding the technical support of their products. ZoneAlarm offers a free firewall that can be downloaded from the web. The free ZoneAlarm program is a good choice, especially if you are using a dial-up modem and, therefore, your computer is connected to the outside world on a more limited basis than broadband, which is always connected. For Firewall and Virus checkers, see http://www.mcafee.com/ http://www.norton.com/ http://symantec.com/avcenter/ For a stand-alone firewall, see http://www.zonealarm.com Steve Gibson of Gibson Research gives you the latest updates on computer security issues. The site also provides a tool to check the quality of your computer security. The checker is called, appropriately: “Shields Up”. See www.grc.com For more information on the latest virus threats and description of viruses, see http:www.symantec.com/avcenter/ For information on virus hoaxes, see http://www.vmyths.com/ http://www.symantec.com/avcenter/hoax.html For information on spyware, see the following sources. Webroot offers a free Spy Audit program that will scan your PC for unwanted visitors. Spybot Search and Destroy by PepiMK: www.Security.kolla.de Ad-ware by LavaSoft: www.lavasoft.de Webroot: www.webroot.com For Product Reviews, check out these sources. Use the “Search Box on home pages to find specific information. http://www.pcmag.com http://www.pcworld.com http://www.zdnet.com To search in the Microsoft Knowledge Base, see http://support.microsoft.com 23 Revised: February 2005 APPENDIX B HOW TO USE SPYBOT SEARCH & DESTROY 1. Open the Spybot program. You will see this warning. Click OK. If you don’t want to see this message each time, put a check mark in the box before clicking OK. 2. The next view is this. Once in awhile, click on Search for updates, but be sure you are on-line before you do this. 3. Put a check on all the updates and then click “Download updates” You will see some action then the warning window will come up again, maybe. 4. Now you are ready to “Check for problems” Click on those words. You will see numbers changing and a progress bar in the status bar at the bottom of the window. Go get a cup of coffee and wait. When it is done you will see something like this. In this case there were no problems. See the check mark. If there were problems you would see one or more check boxes and a description of the problem. If you were to click on the problem, you would see more descriptions. I just always remove all problems no matter what they are. 25 Revised: February 2005 To remove the problems you will see a choice at the bottom of the window that says “Fix Selected Problems”. Check all the boxes and click that and follow the instructions. Lastly, after it is fixed click the Immunize button on the left and follow the instructions. HOW TO USE AD-AWARE 1.Open the Ad-Aware program. If you haven’t updated the program for awhile, you may see this notice. Click OK but be sure you are on-line before doing it. 2. The next view you will see is this. Click Connect. 3. It will download any updates then you will see this. Click Finish. 26 Revised: February 2005 4. The next view is this one. Click Start 5. The next view is this one. Notice there are 4 choices in “Select Scan Mode”. Most of the time you should select “Perform smart system scan”. It is a shorter scan and will get most of the problems. Do this about once a week. About once a month, you should select “Perform full system scan”. Then click Next. Sit back and wait until it tells you it is done. 27 Revised: February 2005 6. When it is done and if it found problems you will see something like this. In this example I have 3 problems. Click Next. 7. The next view will look like this. It will tell you more about the problems. I always remove all the problems . 8. You remove the problems by RIGHT clicking on any one of the problem boxes and left clicking on “Select all objects”. That will put check marks in all the boxes of all the problems. You can check each one without doing this just by clicking on each box. This is OK if you have just a few but if there are several, the other way is quicker. 28 Revised: February 2005 9. When you have checked each problem click Next and you will see this warning. Click OK and you will see quick action to remove them 10. The next view will be the status view like in #4 above except there will be no problems shown. You can click on the many different icons in the status window and learn what they do but my advice is to not change any settings. You are now done so close out the window. 29 Revised: February 2005 APPENDIX C BACKING UP DATA FILES - WINDOWS XP 1. Open your “My Documents” folder where all your data files should be saved. 2. Select the files and folders you wish to back up. Hint: to select all of them, click Edit, Select All. To select a few of them, hold down the Ctrl key and click each file and folder you wish to back up. Each one will be highlighted. 3. Right click on any of the selected (highlighted) files/folders and click on Send To in the menu and then click on the CD icon which is your CD-RW. 31 Revised: February 2005 4. A Balloon will appear at the bottom of your desktop by the clock, “You have files waiting to be written to the CD. To see the files, click this balloon.” You will also see a small CD icon indicating this. (It is the one to the far left in the picture below) 5. Click on the balloon or the icon and you will see the following view. Notice the files and folders are short cuts and not the actual files/folders. 6. Click on the words “Write these files to CD” and the Wizard will appear. Type the name of the CD (example: 012405 backup). It is best to state a date so you will always know when it occurred. Decide if you want the Wizard to close after writing the files (the check box near the bottom) then click on Next. 7. If you have not put a CD-W or a CD-RW in the drive, you will see a window telling you to do it. Follow the instructions that may appear. 32 Revised: February 2005 BACKING UP DATA FILES – ROXIO EASY CD CREATOR 1. Open the Roxio CD writing Program and select Make a Data CD, Data CD project 2. In this window, you have to find your My Documents folder where all your files are located. 3. The window will show all the folders and files in the My Documents folder. Select the files/folders you want to backup. 33 Revised: February 2005 4. After selecting the files and folders, click on the Add button and this will place the selection in the bottom half of the window. Notice at the bottom of the window (see arrow) you can see the total size of the files you are writing. This is helpful to know so that you do not exceed the capacity (650.4 MB) of the CD. In this example we are writing 10.6 MB and the remaining capacity is 639.75 MB You can change the selected files list you have added by clicking on the folder or file you do not want to write and click on the Remove button. This will remove it from the write list. Put the CD in the burner and click the red Record button. 5. In the following window, make the proper choices and click Start Recording 34 Revised: February 2005 35 Revised: February 2005 BACKING UP DATA FILES – NERO EXPRESS 1. Open the program and select Data and then Data Disc. 2. In the next window you will select the files to be written. 36 Revised: February 2005 3. Click on the Add button to start selecting the files. In the Location drop down window, select My Document. This is where all your files should be located. The window in the right side will show all your folders and files. If you want to copy everything in the My Documents folder, select the first file of folder in the list, scroll down to the last one, hold down the Shift key and select the last file or folder. This will highlight everything in My Documents. If you wish to copy only a few files or folders. Select the first one, hold down the Ctrl key and select each on the others you wish to copy. This will highlight onlt those you selected. In either case, next click on the Add button. 4. The next window will show all the files and folders you have selected. Note that the total size of the information to be copied in shown at the bottom right corner (see the arrow). In this example the size is 140 MB which will easily fit on a CD. Note the scale at the bottom of the page which graphically shows how much space will be used on the CD. Click the Next button. 37 Revised: February 2005 5. This window will give you some options on how to write your CD. The first is the choice to give the CD a name. It is good to give it a date so you will always know when it occurred. You also have a choice of how fast you want to write the CD. The speed you select will depend on your CD writer and the type of CD’s you have purchased. After making the choices, insert a CD in your burner and click on the Burn button. You will then see a progress window of the burning process. 38 Revised: February 2005