PC Help

PC Help – General Computing Information Links

PC Disaster Recovery Help

NOTES: Data corruption (like virus damage etc) is a feared worst enemy of computers. 

Data backup software and disaster recovery solutions help you back up hard disk drive files, (Highy rated with users) “Acronis True Image Home 2009 complete PC protection: back up your entire PC, including the OS plus your data, applications, pictures, video, financial documents, settings and everything!” NOTE: This is not simple files back up – it backs up Windows too – THIS is the top back up scenario and is mandatory without an Emergency CD Repair to restore Windows. In a botnet hit there is definately going to be damage to Windows obviously which is the KEY important part of PREVENTION. (The “OS” is Operating System – Windows, Mac, Linux etc)

Back-Up and Recovery – Softpedia.com
Home / Windows / Categories / System / Back-Up and Recovery

Create an emergency repair CD
Don’t limit yourself to a floppy: Create an emergency repair CD Sep 25, 2002 … No support tech should be without a reliable boot disk. But with the venerable 3.5 floppy in its twilight, a bootable CD may be …

MyBootDisk 2.96
Start-up disk with system repair utilities, NTFS support and more

Symantec Norton Ghost – System Restore – PC Backup Software
System Restore – PC Backup Software | Norton Ghost Norton Ghost from Symantec

Windows XP CD Burning Secrets
Sep 16, 2003 … I assume you’ve already mastered the basics of CD burning in Windows XP. If you need a refresher course on burning data CDs, …
http://www.microsoft.com/windowsxp/using/setup/learnmore/bott_03september16.mspx Be Prepared: Create a Recovery Drive for Windows, Linux, Mac, or Chrome OS
Computers don’t come with operating system installation CDs anymore. If your operating system won’t boot, you’ll need a bootable recovery drive to fix it. All operating systems allow you to create these. …

Information / Help / Removal:

When should I re-format? How should I reinstall? (#10063)
http://www.dslreports.com/faq/10063OS Reinstallation vs. Virus Removal

Part Two: Reinstall an Infected Operating System

FOLDOC is a computing dictionary.
It includes definitions of acronyms, jargon, programming languages, tools, architecture, operating systems, networking, theory, conventions, standards, mathematics, telecoms, electronics, institutions, companies, projects, products, history, in fact any of the vocabulary you might expect to find in a computer dictionary.

Enable the (Hidden) Administrator Account on Windows 7, 8, or Vista

3 Ways to Enable Administrator Account in Windows 7

How to enable and disable the Windows Administrator account

Enable built-in Administrator in Local Users and Groups
NOTE: This option will only be available in the Windows 7 Professional, Ultimate, and Enterprise editions.

Enable and Disable the Built-in Administrator Account

Lost administrator account on Windows 7

12 Computer Security Mistakes You’re Probably Making
Tom’s Guide
http://www.tomsguide.com/us/computer-security-mistakes,news-19391.htmlWhy You Probably Aren’t Getting the Internet Speeds You’re Paying For (and How to Tell)
We’ll look at why actual speeds differ from advertised speeds and how you can identify whether you’re actually getting the Internet connection speeds you’re paying for.

Built In Restore Options / Enter Safe Mode to Scan For – Remove Malware When Can Not Normally
What is System Restore?
System Restore: frequently asked questions
Windows Vista System Restore – Softpedia
System Restore – Windows 7 features
Learn how Windows 7 can recover your data from a virus or catastrophic crash with System Restore.
Using Windows 7 or Vista System Restore – How-To Geek
Safe mode
Safe mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. Safe mode is intended to fix most, if not all problems within an operating system. It is also widely used for removing rogue security software.
Microsoft Windows XP – Start the computer in safe mode
Start your computer in safe mode Windows Vista
Start your computer in safe mode – Windows 7
Start Windows in a troubleshooting mode that is useful for diagnosing problems.
Startup Repair: frequently asked questions
What is Startup Repair?
Startup Repair is a Windows Vista recovery tool that can fix certain problems, such as missing or damaged system files, that might prevent Windows from starting correctly. When you run Startup Repair, it scans your computer for the problem and then tries to fix it so your computer can start correctly. MORE…
How to Remove Boot Block Malware
Boot block malware is malicious software that settles into your computer’s hard
drive in the first sector and replaces the boot block instructions with malware
instructions. When you start, or boot up, your computer, the malware is loaded
into your computer’s memory and from there it can spread to any other part of
your computer. ….
Troubleshoot problems waking computer from sleep mode
Unwanted wake-up events
may occur when you enable the Wake On LAN feature
in Windows 7 or in Windows Vista
How to Enable the Wake from Standby Option for a USB Mouse
By default, the Power Management feature of USB mouse devices is turned off.
This setting is different from classic PS/2 computer functionality.
Therefore, to enable the Wake from standby option, you must manually turn on the Power Management feature for the USB mouse.
To manually enable the Wake from standby option for the USB mouse, start Device Manager, right-click the USB mouse driver,
click Properties, and then click to select the Allow this device to wake the system from standby check box.
The monitor reverts to a low-power state several seconds after you wake it up by pressing the power button or by using the remote control on a computer that is running Windows Vista SP1 or Windows Server 2008….
Free On-line Dictionary of Computing
From Wikipedia, the free encyclopedia
Firefox crashes, Help – Remedies
http://kb.mozillazine.org/Firefox_crashesWindows Security Technologies
System security technologies built in, to enable, add on…

New Windows 8 Security Items
Unified Extensible Firmware Interface
Hardware Design and Development for Windows 8
Unified Extensible Firmware Interface


Windows 8 “Secure Boot”
Comprimised already by bootkit:
(This is a great debate and many, many articles already :

Early Launch Anti-Malware (ELAM) – Windows 8
Windows 8 Early Launch Anti-Malware from Third-Party AV Vendors
Managing early launch anti-malware (ELAM) detections
Windows 8 ELAM: too late, too little!
How to configure Early Launch Anti-Malware Protection in Windows 8
How to disable Early Launch Anti-Malware Protection
Understanding Early Launch Anti-Malware (ELAM) technology in Windows 8
[Hot Fix] B0006 – The Early Launch Anti-Malware of Titanium 2013 does not load properly
Windows 8: Trusted Boot: Secure Boot – Measured Boot

Windows 8
Support options, learn more and lifecycle information for Windows 8

Windows Security Technologies

Data Execution Prevention (DEP)
Data Execution Prevention (DEP) is a security feature included in modern operation systems. It is available in Linux, Mac OS X and the newer Microsoft …

Address Space Layout Randomization (ASLR)
Address space layout randomization (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, …

Structured Exception Handler Overwrite Protection (SEHOP)
Windows Vista Service Pack 1, Windows 7, Windows Server 2008 and Windows Server 2008 R2 now include support for Structured Exception Handling Overwrite Protection (SEHOP). This feature is designed to block exploits that use the Structured Exception Handler (SEH) overwrite technique. This protection mechanism is provided at run-time. Therefore, it helps protect applications regardless of whether they have been compiled with the latest improvements, such as the /SAFESEH option. We recommend that Windows users who are running any of the above operating systems enable this feature to improve the security profile of their systems.

Export Address Table Filtering (EAF)
In August 2010 we released the new version of EMET with brand new mitigations and a new user interface experience. Two new mitigations are included in this version: Mandatory ASLR (breaking current ROP exploits relying on DLLs located at predictable addresses) and Export Address Table filtering (EAF) (breaking virtually the big majority of shellcodes from running). EMET is not bulletproof but will break a lot of the bad guys’ tools and exploits. EMET makes it possible for f.i. to have SEHOP on an XP machine.

Heap Spray Allocation (HSA)
In computer security, heap spraying is a technique used in exploits to facilitate arbitrary code execution. The term is also used to describe the part of the source code of an exploit that implements this technique. In general, code that sprays the heap attempts to put a certain sequence of bytes at a predetermined location in the memory of a target process by having it allocate (large) blocks on the process’ heap and fill the bytes in these blocks with the right values. They commonly take advantage of the fact that these heap blocks will roughly be in the same location every time the heap spray is run. Execution flow can be redirected to the heap sprays via buffer overflow or heap overflow flaws.

Null Page Allocation (NPA)
May 23, 2011 … Null Page Allocation (NPA) guards against a piece of malware running itself by taking over a “null” page — a technique that’s never been …


Microsoft – Add more memory to your computer
If your computer seems slow, now’s the time for additional RAM

Ultimate Memory Guide
Kingston has written the definitive document related to memory and the technology behind it. Everything you ever wanted to know about memory can be found here.

Microsoft Support
RAM, Virtual Memory, Pagefile and all that stuff

Random-access memory [RAM Memory]
From Wikipedia, the free encyclopedia

FREE RAM BOOSTERS (Note don’t cause corruption/freeze-up …use when open programs are idle or closed)

Mz RAM Booster (works with Vista)
Speed up your computer, stop memory leaks and increase free RAM.
Mz RAM Booster is a program created to improve the performance of your computer by auto-recovering RAM and fine tuning some system settings! It uses minimal resources and almost no CPU time.
You will be able to experience the best performance boost, without the need of new hardware, hardware tweak and even without restricting your PC’s stability.
· .NET Framework 2.0 (Download at Windows Updates, upgrades)

Rambooster 2.0 (Great old Windows XP ram booster)
Rambooster is a software that helps you optimize your RAM. RAMBooster monitors the amount of RAM your system is using and allows you to free it up. This will let your PC run smoother and faster, and you won’t have to reboot as often. It will monitor the memory at all times, and if the amount of free RAM gets too low, it will automatically boost it for you, finding unused RAM and returning it to the free pool.
RAMBooster will also monitor your CPU usage. Includes replaced CPU-infotext with a gauge. RB now always minimizes to the tray instead of taskbar or tray. The GUI looks almost like the old GUI, to make things easier for those who have used RAMBooster for years. Supports RAM up to 9999 MB instead of previous 99. Help-file problems fixed.
Fixed conflicts with CPU-usage meter. Also some dial-up system caused to CPU-reading to freeze to 0%. This part has also been rewritten. Allows only one instance of the program. Lots of code optimization, invisible to users. It is bettter, faster, and more reliable now.

Windows Search 4.0 component of Windows enables instant search of your computer

Windows Search 4.0 Windows XP


Windows Search 4.0 Windows Vista


Windows 7


What to do if you forget your Windows password
If you’ve forgotten your Windows password and you’re on a domain, you should contact your system administrator to reset your password. If you’re not on a domain, you can reset your password by using a password reset disk or by using an administrator account. If you forget the administrator password and don’t have a password reset disk or another administrator account, you won’t be able to reset the password. If there are no other user accounts on the computer, you won’t be able to log on to Windows and will need to re-install Windows

Top 7 Free Windows Password Recovery Tools
A List of the Best Free Password Recovery & Reset Tools for Windows
“Windows password recovery tools are used to recover or reset lost user and administrator passwords used to log on to Windows operating systems. Password recovery tools are often called “password cracker” tools because they are sometimes used to “crack” passwords by hackers. Legally cracking your own Windows password is certainly a legitimate practice! “

Windows Vista

New Vista Empowered Computers, launch…..
TIPS: Vista Basic edition is less “microsoft intrusive” so to speak for preferences as they say – but if you have or get a Laptop or Notebook it is mandatory to
get Vista Home Premium that includes all the Network Automatic Wizards and battery -vs.- operating system optimization utilization settings neccessary for mobile.
These are not included in Basic edition. FIRST after launching and registering your Vista set Windows Updates to Automatic Download and Install.
(General recommendations from an Advanced User…follows)

FLASH !!! did u know ? DO NOT TURN OFF VISTA UAC ! Read……
Vista’s Despised UAC Nails Rootkits, Tests Find – Business Center …
May 25, 2008 … Most users find it annoying, but Vista’s Account Control
feature proves most effective in security tests…..
NEVER turn off UAC !!! And do NOT use “tweak softwares” for it. You have been
Circumventing Vista UAC Security is aiding cyber crime and we consider “Vista Bashing” as part of that. 

Vista User Account Control (UAC) Information links …..
User Account Control (UAC) in Windows Vista extends new privileges to
standard users while upholding robust protections against online threats
What is User Account Control?
User Account Control Overview
How to use User Account Control (UAC) in Windows Vista
User Account Control
First Look: New Security Features in Windows Vista
Explore the features: Windows Security Center
You can restore User Account Control to the recommended settings with the
click of a button. Ready to set up your computer? This paper offers specific
guidelines for securing your PC …
Description of User Account Control and remote restrictions in Windows Vista

Why you should not use a tweak UAC software utility…..
Silent Mode tweak…. DON’T !
Simple. Number one the software utility is not a Microsoft Windows product
which is what these “hacker” utilities will be making changes to – YOUR
Windows Operating System. Just because they can create software (anyone can)
does not mean it is safe and secure and will not corrupt Windows in some
Consider the following rather then these type “tweaks” ….
You may want to consider this article information (below) before
‘hacking’ the Windows system …. a Windows Vista empowered computer
is too pretty to “deface”:

Techworld.com – Vista’s UAC spots rootkits, tests find
Vista’s UAC spots rootkits, tests find
Vista’s Despised UAC Nails Rootkits, Tests Find
Do you know what a rootkit is ? (Certainly one of the most dangerous
malware threats aside from a ‘blended threat’ attack). Do you know
what notifications you are turning off ? Are they malware alerts you
should attend for a stable and secure system ?

An easy way to wade through this is simply if you have ever had a
personal firewall installed that is quality and a tad “agressive” and
you get the several alerts. You go through them one by one and off to
the search engine to see if the process is part of Windows or trusted
software to give permission to.
What you may turn off with some hacker tweak is an actual alert to
malware much as the same as turning off firewall protection to a port
malware is communicating through – or allowing malware by clicking
“OK” to allow it internet access and defeating the purpose of the
security software (antivirus, antispyware, firewall).
I would investigate with extreme prejudice before proceeding in changes not
recommended in today’s crimeware environment – see the following:
More Vista hacks NOT Recommended ! (Disable All Balloon Notifications)
June 18, 2008 by bluecollarpc
http :/ /bluecollar CLOSED pc.wordpress.com/2008/06/18/more-vista-hacks-not-recommended-disable-all-balloon-notifications/
Warning: Why you should not use a ‘tweaking UAC’ software utility
June 15, 2008 by bluecollarpc
ht tp:/ /bluecollarpc. CLOSED wordpress.com/2008/06/15/warning-why-you-should-not-use-a-tweaking-uac-software-utility/
Is Limited User Account enough? Not really…
Security: Inside Windows Vista User Account Control
User Account Control, or UAC, is one of the most misunderstood new features
in Windows Vista. But its goal-to enable users to run with standard user
rights-can solve many security issues. Get an inside look at the problems UAC is
designed to address and see exactly how this new feature works. ….

TIP: Great additional free Mail Client fom Microsoft:
Windows Live Mail… Do you know Microsoft Outlook Express or Windows Mail?
Then you pretty much already know how to use Windows Live Mail.
The clean design speeds you through … http://get.live.com/wlmail/overview

December 2007 Windows Vista Application Compatibility Update
View products that this article applies to.
Article ID : 943302
Last Review : January 11, 2008
Revision : 2.0

Windows Vista AppReadiness Beta
(Online Search Engine) Note this is community input by users !
Application Search Browse by Company
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z (Browse by Application)

Windows Genuine Advantage (WGA) for Windows Vista (excerpt)
Windows Vista has built in anti-piracy technology that enables Microsoft to combat piracy more effectively. This new technology is a part of the Windows
Genuine Advantage program. It changes how Windows Vista activates, validates, and behaves when attempts are made to tamper with the activation or
validation requirements of the operating system. This helps to make piracy harder and provides a better experience for customers running genuine Windows.
Using genuine Windows Vista helps customers enjoy the full functionality of Windows while helping to avoid viruses, tampered files, and other malicious software
often associated with counterfeit copies. Windows product activation and validation are the experiences customers see when using WGA……. MORE
WGA – Wikipedia (excerpt)
On Windows Vista, WGA validation failure has a greater impact. In addition to persistent notification and the disabling of non-critical updates, WGA also disables
Windows Aero, Windows Defender, and ReadyBoost. The user is given a grace period in which to then pass validation, after which most of the operating system
is disabled and Windows reverts to reduced functionality mode, which will be removed in Service Pack 1 of Windows Vista.

Windows Help and How-to: Windows Vista: Setup and maintenance (Microsoft)

Microsoft: New PC ? Tools, Products, and Tips…
Getting started with a new PC? Use these articles and communities to help you get going and be more productive right away…. ) at Microsoft

Microsoft: Windows Vista Home Premium, Help and How-to

Microsoft: 5 steps to help protect your new computer before you go online

Ease of Transition… (Idea Utility) ….Files from XP to Vista
Belkin MS Vista Transfer Cable

Windows Vista has built in anti-piracy technology that enables Microsoft to combat piracy more effectively. This new technology is a part of the Windows Genuine
Advantage program. It
changes how Windows Vista activates, validates, and behaves when attempts are made to tamper with the activation or validation
requirements of the operating system. This helps to make piracy harder and provides a better experience for customers running genuine Windows. Using genuine
Windows Vista helps customers enjoy the full functionality of Windows while helping to avoid viruses, tampered files, and other malicious software often associated
with counterfeit copies. Windows product activation and validation are the experiences customers see when using WGA……. MORE
WGA – Wikipedia (excerpt)
On Windows Vista, WGA validation failure has a greater impact. In addition to persistent notification and the disabling of non-critical updates, WGA also disables
Windows Aero, Windows Defender, and ReadyBoost. The user is given a grace period in which to then pass validation, after which most of the operating system
is disabled and Windows reverts to reduced functionality mode, which will be removed in Service Pack 1 of Windows Vista.
How To Rebuild Icon Cache In Windows 7 To Repair Icons
Mar 2, 2010 … Windows users often complain about corrupted desktop and
explorer icons. Like in Windows XP and Vista, Windows 7 icons also may
get …
Restore Missing Desktop Icons in Windows 7 or Vista – How-To Geek
Feb 9, 2007 … Restore Missing Desktop Icons in Windows 7 or Vista. If
you’ve removed your recycle bin icon, or you previously added the some
of the …
How to Rebuild the Icon Cache in Windows Vista and Windows 7 –
Apr 8, 2008 … How to Rebuild the Icon Cache in Windows Vista and
Windows 7. … type in Vista (March 31, 2008) tells you how to refresh
the shell icons in Vista. … Fix Windows 7 Backup and Restore Not
Launching After Uninstalling …
Icons randomly change to different icons
Jan 19, 2007 … Some icons in My Computer, Windows Explorer, on the
desktop …

Vista Wireless

Windows Vista Help: What are the different wireless network security …
This is referred to as WPA-Enterprise or WPA2-Enterprise . It can also be used in a pre-shared key (PSK) mode, where every user is given the same passphrase
Windows Vista Partners: D-Link Systems
Support for WEP, WPA, and WPA2 security standards help ensure that you will be able to use the best possible encryption—regardless of your other wireless
Windows Vista Help: Choosing a network location
For wireless networks, a wireless connection encrypted with Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA). (For WPA, WPA2 is preferred.
Windows Vista Help: Enable 802.1X authentication
On wireless networks, 802.1X can be used with Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) encryption. 5. In the Choose a network …
Windows Vista Help: Ad hoc networking
Security type. For your computer’s security, choose WPA-2 Personal. (We don’t recommend using WEP. WPA-2 is more secure. If you try WPA-2 and it doesn’t
work, we recommend that …
Windows Vista Help: Setting up a wireless network
We recommend that you use WPA because it offers better security than the traditional Wired Equivalent Privacy (WEP) security. With WPA you can also use a
passphrase , so you don’t …

Internet Ettiquette: (Appropriate behavior online)
Good manners online

snopes.com: Urban Legends Reference Pages
The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.
“Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?”
Mission Statement: The goal of the Hoax-Slayer Website is to help make the Internet a safer, more pleasant and more productive environment by: Debunking email and Internet hoaxes, Thwarting Internet scammers, Combating spam, Educating web users about email and Internet security issues.

How To Report UCE Unsolicited Commercial Email commonly known as “spam”…..
To Report Spam to the appropriate address, you must always include full message headers, or rejected:
NOTE: Do Not Even open unsolicited unknown sender email unless your pc is protected !

To Report Spam to the appropriate address, you must always include full message headers, or rejected:

SpamCop FAQ :
How do I get started reporting spam ?

Federal Trade Commission (Report UCE – Unsolicited Commercial Email):
Report Spam to spam@uce.gov
To forward unwanted or deceptive spam to the FTC send it to spam@uce.gov, and be sure to include the full email header. If you think you have been taken
advantage of by a spam scam, file a complaint with the FTC online at www.ftc.gov. Complaints will help the FTC find and stop people who are using spam to
defraud consumers.

UCE: (Spam) Definiton: http://en.wikipedia.org/wiki/E-mail_spam

Anti Phishing Working Group Org
Report Phishing: Report phishing emails, pharming sites and crimeware to the Anti-Phishing Working Group and help stop this insidious threat to e-commerce.
Click “Report Phishing” link below for instructions.
What is Phishing and Pharming?
Phishing attacks use both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials. Social-engineering
schemes use ‘spoofed’ e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers,
account usernames, passwords and social security numbers. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince
recipients to respond. Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using Trojan keylogger spyware. Pharming
crimeware misdirects users to fraudulent sites or proxy servers, typically through DNS hijacking or poisoning.

Email Message Headers Help: 

Email Headers
When forwarding an unwanted or abusive email to postmasters
for action, it’s very important that you include all of the header information.
A great number of spammers, for instance, will do all they can to blur the
origin of their message, but they can’t forge everything! So here’s a guide
to viewing full headers in a variety of popular mail clients.

byUsers :: Reading and Understanding Message Headers

Quick reference to Internet message headers

How to Read Email Headers

Microsoft Office Assistance: Hide or remove e-mail message headers

How to find the sender’s original IP Address using Email message …

Scrollbar for expanded message headers – MozillaZine Knowledge Base

Cookies – Information…
What are cookies, what do they do, what risks are involved, what types are there ?

Cookie – Webopedia Definition

Cookie Central
Cookie Central FAQ

How Internet Cookies Work

Microsoft.com Cookies FAQ

How Web Servers’ Cookies Threaten Your Privacy

Blocking Unwanted Cookies with IE 6
One of the new features built-in to IE 6 is the ability to accept and/or block any or all cookies if desired


Consumer Tips: How to Opt-Out of Cookies That Track You

Internet Explorer Gallery
Tracking Protection Lists
Control what third-party sites can track you while you’re online.
EasyPrivacy Tracking Protection List
EasyPrivacy Tracking Protection List is based on the popular EasyPrivacy subscription for Adblock Plus and is managed by the well-known EasyList project, which serves nearly ten million daily users and has a large support forum with dozens of experienced members able to assist resolving any issues that may arise.
Abine’s Kids and Teens Tracking Protection List
Abine’s Kids and Teens Tracking Protection List specifically blocks advertisers and data collectors we found in use on the Web sites most popular with kids and teens
Abine’s Standard Tracking Protection List
Abine’s Standard Tracking Protection List blocks many online advertising and marketing technologies that can track and profile you as you browse the Web. This list is updated frequently to keep you safer and more private
Fanboy – Adblock Tracking Protection List
The Fanboy Tracking Protection List is supported and maintained by the Fanboy group.
Fanboy – Tracking Protection List
Fanboy Tracking Protection List is supported and maintained by the Fanboy group.


Microsoft Windows Update
Latest bug fixes for Microsoft Windows, including
fixes for some possible DoS attacks.

Microsoft Help and Support
Technical support for Microsoft products.

You did originally activate ?
Software Piracy Protection Home – Activating Software

Check out:
Software Piracy Protection
Information on piracy as well as tips on how to protect yourself against it.

Microsoft does now have, and is instituting to a greater degree, the
validation of your Windows Operating System against a piracy bootleg copy – which will be denied Windows Updates.

Genuine Microsoft Software
One of the many benefits of owning genuine Microsoft software is gaining access to Microsoft Support Services. Below are two ways to help you determine
whether your version of Windows is genuine.

Microsoft Security Center fake warnings  in your task bar… (Example of these)
Briefly: “How to Remove SpyFalcon” (Review in full at website)
SpyFalcon is a anti-spyware program that is known to issue fake warnings on your computer in order to manipulate you into buying its full commercial version.
If you are infected with this program you may receive warnings in your task bar that appear to be from Microsoft Security Center stating that you are infected
with spyware and to run its special anti-spyware tool. This tool turns out to be the commercial version of SpyFalcon. These warnings are fake and are a goad
to have you buy the commercial version of this software…..


Microsoft Internet Explorer
Help and Support Center for
the Microsoft Internet Explorer Web Browser.

Internet Explorer Homepage

Internet Explorer 7 Preview

Microsoft Internet Explorer – Customizing the Links Bar
Customizing the Links Bar… Did you know that you can customize the
Links bar in the browser? You can add or remove shortcuts, rearrange the
order of shortcuts, and even change the icons associated with them. Here’s how: …..

Microsoft Outlook Express
Included POP Email Program

Windows Security Center
From Wikipedia, the free encyclopedia
Windows Security Center
A component of Microsoft Windows
The Windows Security Center or Action Center is a component included with Microsoft’s Windows XP (beginning with Service Pack 2), Windows Vista and
Windows 7 operating systems that provides users with the ability to view the status of computer security settings and services. Windows Security Center also
continually monitors these security settings, and informs the user via a pop-up notification balloon if there is a problem. It is renamed to Action Center in
Windows 7, where it covers maintenance as well as security.

Windows Updates URLs – add to Trusted Sites
To make this site a trusted website In Internet Explorer, click Tools, and then click Internet Options.
On the Security tab, click the Trusted Sites icon. Click Sites and under Add this website to the zone,
copy and paste these website addresses. You can only add one address at a time and you must
click Add after each one. Note that you may need to
uncheck “Require server verification (https:) for all sites in this zone.”

Windows Operating Systems (OS)

Microsoft Windows 95

Microsoft Windows 98 Support Center

Microsoft Windows ME

Microsoft Windows XP Support Center

List of Microsoft Windows components
From Wikipedia, the free encyclopedia

List of operating systems
From Wikipedia, the free encyclopedia

Inside the world’s long-lost first microcomputer

Windows XP Upgrade Advisor
The Upgrade Advisor is a tool that checks your system hardware and software to see if it is ready for upgrade to Windows XP. If you run Upgrade Advisor while
you are connected to the Internet, and if your system needs updates that are available on the Windows Update Web site, Upgrade Advisor will find and install
the updates for you.

Windows Vista Upgrade Advisor 1.0
Brief Description: Windows Vista Upgrade Advisor is designed to help Windows XP users identify whether their PCs are ready for an upgrade to Windows Vista,
which edition of Windows Vista meets their needs, and which features of Windows Vista will be able to run on their PCs.


How to Identify Files (file extensions Search Engine)
FILExt Home Page, The File Extension Source::;> Welcome to FILExt,
the file extension source. FILExt is a detailed database of file extensions and programs that use them. A file extension is simply the end characters after the
period in a file name (see here for a detailed description). A search in the database here might result in multiple possibilities. Use the context of where you got
the file to help you figure out exactly what it is if there are multiple  possibilities. To help, many of the links on this site will open a new browser window so you
have constant reference to the FILExt data.

Portable App Directory
The Application Directory lists free open source software and freeware portable apps.
As always, the PortableApps.com Platform, menu, backup utility, launchers, installer, format
and other utilities are open source.
Driver Guide com
Let’s face it, finding the right device driver can be a tedious, time consuming, often impossible task! The Driver Guide was created to make finding driver updates
a whole lot easier. With the help of thousands of our members, we have compiled a massive database archive of drivers and resources that is by far the largest
and most comprehensive on the Web.

Business Software Alliance – Software Piracy Prevention
Informing the public of the effects of software piracy, and of action
that can be taken to curb this ongoing activity.

Welcome to Annoyances.org
Annoyances.org is the most complete collection of information assembled for and by actual users of Microsoft Windows. Explore this free web resource by
selecting one of the destinations on your left, or use search to find a specific solution.

Infoplease Encyclopedia and Dictionary

Welcome to Wikipedia, the free encyclopedia
An excellent information source, which is updated on a continuous
basis. It is essentially an free, online encyclopedia, with answers to nearly
any human endeavour or experience. Enjoy!

Tips for Secure Browsing
Always use the most current version of your browser.

Internet Explorer Version 7 (latest greatest) has what would have prevented the over 3 billion dollars in phisher scams of the USA Public in 2007.. SEE:
Put safety first.
Robust new Internet Explorer 7 architecture and improved security features help protect you against malicious software, and help to keep your personal
data safe from fraudulent websites and online phishing scams.

Phishing Filter
This filter warns you about and helps to protect you against potential or known fraudulent websites, and blocks the sites if appropriate. This opt-in filter
is updated several times per hour using the latest security information from Microsoft and several industry partners.
ddress bar protection

Phishing Filter
…uses a combination of machine-learning heuristics, client-side scanning for suspicious characteristics and an opt-in online service that utilizes dynamic
industry-based reputation services to proactively warn about – and help protect against – potential or known fraudulent sites and blocks the sites if
Address bar protection
Every window, whether it’s a pop-up or standard window, will show you an address bar, helping to block malicious sites from emulating trusted sites.
Cross-domain barriers
Internet Explorer 7 helps to prevent the script on webpages from interacting with content from other domains or windows. This enhanced safeguard gives
you additional protection against malware by helping to prevent malicious websites from manipulating flaws in other websites or causing you to download
undesired content or software.

International Domain Name Anti-spoofing
…will notify users when visually similar characters in a URL are not expressed in the same language to help protect users against visiting sites that would
otherwise appear as a trustworthy site

Features unique to Windows Vista
These features are available only with Internet Explorer 7 in Windows Vista:
* Protected mode Internet Explorer 7 in Windows Vista runs in isolation from other applications in the operating system. It restricts exploits and malicious
software from writing to any location beyond Temporary Internet Files without explicit user consent.
* Parental controls To help keep kids safer online, parents can control browsing behavior through the parental control settings built into Windows Vista. The
child’s safety level can be monitored and changed remotely. The safety level carries over to many PC activities, such as playing games or browsing the Internet.
A child’s browsing session can even be examined by a parent afterwards, and cannot be removed without the parent’s permission.
Firewalls / Information Links:

Comodo Personal Firewall [new, advanced users]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)

Sygate Personal Firewall Free 5.6.2808 [Not supported, extinct]
(Old favorite now owned by Symantec)

ZoneAlarm Free Firewall
Protect your PC with #1 Free Firewall

Ashampoo FireWall Free 1.2 (popular) [wrkx w/ Netbooks]

Online Armor Personal Firewall Free [new/advanced users]
Online Armor Free provides both a firewall and a whitelist approach to program security for Windows NT, 2000 and XP. It does not show pop-ups for many
known good programs, and it scans all your installed programs when it first runs so that you can quickly tell it what to do with apps it doesn’t know about.
Operating Systems:  Windows XP, Windows 2000, Windows Vista
What is firewall? – A Word Definition From the Webopedia Computer …
This page describes the term firewall and lists other pages on the Web where you can find additional information.

Internet Firewalls: Frequently Asked Questions
3.1 What are some of the basic design decisions in a firewall? … Can’tI just poke a hole in the firewall and tunnel that port? …

Windows Firewall in Windows XP Service Pack 2
Learn the basics about the new Windows Firewall in Windows XP Service Pack 2, plus find out hot to adjust your firewall settings if you need to.

Firewall Builder
Firewall Builder is multi-platform object oriented firewall configuration and management tool. It consists of a GUI and set of policy compilers for iptables …

Firewall Net.com
Guide to install & configure for Windows Mac or …Firewall Net is a guide for installation and configuration of firewall with windows 95 98 NT 2000 Me Millenium
XP, linux or mac , using : conseal atguard …

Firewall Q&A (Questions & Answers)
A whitepaper on relevant firewall questions and answers. The knowledge of this subject relates to firewalls in general use, and stems from NAT and proxy …

Home PC Firewall Guide
Learn how to protect home computers and networks from Internet outlaws by using personal firewall, antivirus and anti-spyware software plus low-cost …

Howstuffworks “How Firewalls Work”
An introductory explanation of how a firewall works and the various filtering methods used, with related links.

IPCop Firewall
A secure Linux distribution managed through a web-interface. It turns an old PC into a firewall and VPN gateway. Features an Intrusion Detection System.

OpenOffice (comparable to Microsoft products)
OpenOffice.org is the leading open-source office software suite  for word processing, spreadsheets, presentations, graphics, databases and more. It is available
in many languages  and works on all common computers. It stores all your data in an international open standard format and can also read and write files from
other common office software packages. It can be downloaded and used completely free of charge for any purpose.
Fight Spam…

These are excellent seemless well known and used programs. The free ones work best the more “agressive” the settings you use. These are not going to work
with your normal ISP Subscription (AOL, MSN, Earthlink, Juno, etc) – they work with POP Mail you can set up with the accounts you have and not with the ISP
software. The free ones are spam filters that will strike through the known spam subject line of the message with (*****) the five asterik stars in front of and
in back of the spam subject line. I have used everything here and they generally do not miss or make mistakes. The shareware (buy) ones create a small toolbar
and a seperate folder not allowing the spam into the Inbox. They all have quick settings and are very , very quick to set up.
Cactus Spam Filter FREE! [working-freeware]
Cactus Spam Filter is a free easy-to-use spam blocker. It protects your inbox by learning to detect spam as it’s being used. After a short while it has adapted to
your personal mailbox and blocks out most of the junk e-mail. Since the filter becomes personal, spammers will not be able to fool it. Even though this is a brutal,
merciless spam killer, no e-mails will get lost unless you delete them. Installation is very simple. No setup is required in your e-mail client; this spam stopper
integrates seamlessly with all e-mail clients that use POP3. It has been successfully tested with Microsoft Outlook, Microsoft Outlook Express, Netscape, Opera,
Mozilla, Mozilla Thunderbird, Eudora, Pegasus Mail, IncrediMail, Foxmail, POP Peeper, Command Line POP Client, The Bat!, and Phoenix Mail.

SpamAssassin [working-freeware]
The Powerful #1 Open-Source Spam Filter Features: Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures.
This makes it harder for spammers to identify one aspect which they can craft their messages to work around. Free software: it is distributed under the same
terms and conditions as other popular open-source software packages such as the Apache web server. Easy to extend: Anti-spam tests and configuration are
stored in plain text, making it easy to configure and add new rules. Flexible: Spam Assassin encapsulates its logic in a well-designed, abstract API so it can be
integrated anywhere in the email stream. The Mail::SpamAssassin classes can be used on a wide variety of email systems including procmail, sendmail, Postfix,
qmail, and many others. Easy Configuration: SpamAssassin requires very little configuration; you do not need to continually update it with details of your mail
accounts, mailing list memberships, etc. Once classified, site and user-specific policies can then be applied against spam. Policies can be applied on both mail
servers and later using the user’s own mail user-agent application.
Comodo AntiSpam
Comodo AntiSpam easily integrates into your email system to block spam and junk mail without keeping wanted mail from reaching your inbox.

CA (Computer Associates) Anti-Spam [shareware]
CA Anti-Spam is the effective and easy-to-use spam filter that makes sure you get messages from people you know, while redirecting messages from people
you don’t. There are no complicated rules or filters to create or manage: CA Anti-Spam does it for you. And it works seamlessly with Microsoft Outlook and
Outlook Express to stop unwanted junk mail and fraudulent phishing scams, letting you take control of your Inbox. PC Magazine Editors’ Choice Award 3
years running!

SpamBully 4 for Outlook and Outlook Express [shareware]
End your spam nightmare and make email enjoyable again by keeping your Inbox free of annoying spam. Our intelligent spam filter for Outlook and Outlook
Express analyzes email so effectively that in many cases it is more …

ANTIVIRUS PROGRAMS ~Free Home versions

Windows OneCare Antivirus is now Free from Microsoft and very highly rated, Certified and has won the VB100 Award ! Now called Microsoft Essentials…..
About Microsoft Security Essentials (5* Stars!)
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft
Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is
protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.
Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without
interruptions or long computer wait times.

AVG Anti-Virus Free Edition [working-freeware]
Download, Information at this website :
AVG Free Edition is the well-known antivirus protection tool. AVG Free is available free of charge to home users for the life of the product. Rapid virus database
updates are available for the lifetime of the product, thereby providing the high level of detection capability that millions of users around the world trust to protect
their computers. AVG Free is easy to use and will not slow your system down (low system resource requirements). Highlights include automatic update functionality,
the AVG Resident Shield, which provides real-time protection as files are opened and programs are run, free Virus Database Updates for the lifetime of the product,
and AVG Virus Vault for safe handling of infected files.

ClamWin Free Antivirus [Open Source – working freeware]
ClamWin is a Free Antivirus for Microsoft Windows 98/Me/2000/XP and 2003. ClamWin Free Antivirus comes with an easy installer (and open source code). You
may download and use it absolutely free of charge. It features: High detection rates for viruses and spyware; Scanning Scheduler; Automatic downloads of
regularly updated Virus Database. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer; Addin to Microsoft Outlook to
remove virus-infected attachments automatically. The latest version of Clamwin Free Antivirus is . Please note that ClamWin Free Antivirus does not
include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.

Avast AntiVirus Home Edition [working-freeware]
Free avast! 4 Home Edition. avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use. Institutions
(even non-commercial ones) are not allowed to use avast! Home Edition. However, ALWIL Software provides the full line of avast! antivirus products at special
discount prices for non-profit, charity, educational and government institutions. Please see our price lists for details.

BitDefender Free Edition
BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. If you are on an “always-on”
Internet connection, we strongly advise you to consider using a more complex antivirus solution.
Glary Utilities 100% freeware
Glary Utilities is the #1 free, powerful and all-in-one utility in the world market! It offers numerous powerful and easy-to-use system tools and utilities to fix, speed up, maintain and protect your PC.

Article: NetworkworkWorld.Com – 15 free downloads to pep up your old PC
Can’t afford a new PC? These free tools for Windows will help breathe new
life into your old machine…..

Advanced SystemCareT Free v3
Trusted by 35 Million Users to Care for Their PCs
Works with: Windows 2000/XP/Vista

Glary Utilities
Works with: Windows 2000/XP/Vista

Works with: Windows 9x/Me/XP/Vista

Works with: Windows XP/Vista

Secunia Personal Software Inspector (PSI)
Works with: Windows 2000 SP4/XP SP2 or later/Vista

Eusing Free Registry Cleaner
Works with: Windows 9x/Me/NT/2000/XP/2003/Vista

Free Registry Defrag
Works with: Windows 98/ME/2000/XP/2003/Vista

PC Decrapifier
Works with: Windows XP/Vista

Works with: Windows 98/Me/2000/XP/Vista

Running out of disk space, but don’t want to spend the money for a new hard
disk? Here’s a simple solution — use this free online storage service from
Microsoft. You get 25GB of free online space to do anything you want with.

Belarc Advisor
Works with: Windows 95/98/Me/2000/XP/Vista

Works with: Windows 9x/Me/2000/XP/Vista

Wubi Ubuntu Installer
Sometimes you want a new PC because you’d like a new operating system, but
your PC’s processor and RAM can’t handle a new one. Here’s a way to get the
best of both worlds: Use this free program to install a dual-boot version of
Ubuntu Linux on your PC.
Works with: Windows 98/2000/XP/Vista

Comments Off on PC Help
%d bloggers like this: