PC Help

PC Help – General Computing Information Links

PC Disaster Recovery Help

NOTES: Data corruption (like virus damage etc) is a feared worst enemy of computers. 

Acronis
Data backup software and disaster recovery solutions help you back up hard disk drive files, (Highy rated with users) “Acronis True Image Home 2009 complete PC protection: back up your entire PC, including the OS plus your data, applications, pictures, video, financial documents, settings and everything!” NOTE: This is not simple files back up – it backs up Windows too – THIS is the top back up scenario and is mandatory without an Emergency CD Repair to restore Windows. In a botnet hit there is definately going to be damage to Windows obviously which is the KEY important part of PREVENTION. (The “OS” is Operating System – Windows, Mac, Linux etc)
http://www.acronis.com/

Back-Up and Recovery – Softpedia.com
Home / Windows / Categories / System / Back-Up and Recovery
http://www.softpedia.com/get/System/Back-Up-and-Recovery/

Create an emergency repair CD
Don’t limit yourself to a floppy: Create an emergency repair CD Sep 25, 2002 … No support tech should be without a reliable boot disk. But with the venerable 3.5 floppy in its twilight, a bootable CD may be …
http://articles.techrepublic.com.com/5100-10878_11-1053250.html

MyBootDisk 2.96
Start-up disk with system repair utilities, NTFS support and more
http://www.softpedia.com/get/System/Boot-Manager-Disk/My-BootDisk.shtml

Symantec Norton Ghost – System Restore – PC Backup Software
System Restore – PC Backup Software | Norton Ghost Norton Ghost from Symantec
http://www.symantec.com/norton/ghost

Windows XP CD Burning Secrets
Sep 16, 2003 … I assume you’ve already mastered the basics of CD burning in Windows XP. If you need a refresher course on burning data CDs, …
http://www.microsoft.com/windowsxp/using/setup/learnmore/bott_03september16.mspx Be Prepared: Create a Recovery Drive for Windows, Linux, Mac, or Chrome OS
Computers don’t come with operating system installation CDs anymore. If your operating system won’t boot, you’ll need a bootable recovery drive to fix it. All operating systems allow you to create these. …
http://www.howtogeek.com/194521/be-prepared-create-a-recovery-drive-for-windows-linux-mac-or-chrome-os/

Information / Help / Removal:
MORE OPTIONS:

When should I re-format? How should I reinstall? (#10063)
http://www.dslreports.com/faq/10063OS Reinstallation vs. Virus Removal
http://safecomputing.umn.edu/guides/rebuild_repair.html

Part Two: Reinstall an Infected Operating System
http://safecomputing.umn.edu/studentchecklist.html

FOLDOC is a computing dictionary.
http://foldoc.org/
It includes definitions of acronyms, jargon, programming languages, tools, architecture, operating systems, networking, theory, conventions, standards, mathematics, telecoms, electronics, institutions, companies, projects, products, history, in fact any of the vocabulary you might expect to find in a computer dictionary.

USE COMMAND TO ENABLE HIDDEN COMPUTER ADMINISTRATOR….
Enable the (Hidden) Administrator Account on Windows 7, 8, or Vista
http://www.howtogeek.com/howto/windows-vista/enable-the-hidden-administrator-account-on-windows-vista/

3 Ways to Enable Administrator Account in Windows 7
http://www.instructables.com/id/3-Ways-to-Enable-Administrator-Account-in-Windows-/

How to enable and disable the Windows Administrator account
http://www.bleepingcomputer.com/tutorials/enable-disable-windows-administrator-account/

WITHOUT COMMAND – ACCESS LOCAL USERS/GROUPS MANAGER
Enable built-in Administrator in Local Users and Groups
http://www.sevenforums.com/tutorials/507-built-administrator-account-enable-disable.html
NOTE: This option will only be available in the Windows 7 Professional, Ultimate, and Enterprise editions.

MICROSOFT:
Enable and Disable the Built-in Administrator Account
https://technet.microsoft.com/en-us/library/dd744293%28v=ws.10%29.aspx

ALTERNATIVE OPTIONS…..
Lost administrator account on Windows 7
http://answers.microsoft.com/en-us/windows/forum/windows_7-security/lost-administrator-account-on-windows-7/62a99dcc-b976-4ad1-9ac5-e7bf803eab83

12 Computer Security Mistakes You’re Probably Making
Tom’s Guide
http://www.tomsguide.com/us/computer-security-mistakes,news-19391.htmlWhy You Probably Aren’t Getting the Internet Speeds You’re Paying For (and How to Tell)
http://www.howtogeek.com/165321/why-you-probably-arent-getting-the-internet-speeds-youre-paying-for-and-how-to-tell/?utm_source=newsletter&utm_medium=email&utm_campaign=150613
We’ll look at why actual speeds differ from advertised speeds and how you can identify whether you’re actually getting the Internet connection speeds you’re paying for.

Built In Restore Options / Enter Safe Mode to Scan For – Remove Malware When Can Not Normally
What is System Restore?
http://windows.microsoft.com/en-IL/windows-vista/What-is-System-Restore
System Restore: frequently asked questions
http://windows.microsoft.com/en-XM/windows-vista/System-Restore-frequently-asked-questions
Windows Vista System Restore – Softpedia
System Restore – Windows 7 features
http://windows.microsoft.com/en-US/windows7/products/features/system-restore
Learn how Windows 7 can recover your data from a virus or catastrophic crash with System Restore.
http://news.softpedia.com/news/Windows-Vista-System-Restore-47381.shtml
Using Windows 7 or Vista System Restore – How-To Geek
http://www.howtogeek.com/howto/windows-vista/using-windows-vista-system-restore/
Safe mode
http://en.wikipedia.org/wiki/Safe_mode
Safe mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. Safe mode is intended to fix most, if not all problems within an operating system. It is also widely used for removing rogue security software.
Microsoft Windows XP – Start the computer in safe mode
http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/boot_failsafe.mspx?mfr=true
Start your computer in safe mode Windows Vista
http://windows.microsoft.com/en-SG/windows-vista/Start-your-computer-in-safe-mode
Start your computer in safe mode – Windows 7
Start Windows in a troubleshooting mode that is useful for diagnosing problems.
http://windows.microsoft.com/en-US/windows7/Start-your-computer-in-safe-mode 
Startup Repair: frequently asked questions
What is Startup Repair?
Startup Repair is a Windows Vista recovery tool that can fix certain problems, such as missing or damaged system files, that might prevent Windows from starting correctly. When you run Startup Repair, it scans your computer for the problem and then tries to fix it so your computer can start correctly. MORE…
http://windows.microsoft.com/en-US/windows-vista/Startup-Repair-frequently-asked-questions
How to Remove Boot Block Malware
http://www.ehow.com/how_5941797_remove-boot-block-malware.html
Boot block malware is malicious software that settles into your computer’s hard
drive in the first sector and replaces the boot block instructions with malware
instructions. When you start, or boot up, your computer, the malware is loaded
into your computer’s memory and from there it can spread to any other part of
your computer. ….
http://www.ehow.com/how_5941797_remove-boot-block-malware.html
Troubleshoot problems waking computer from sleep mode
http://support.microsoft.com/kb/266283
Unwanted wake-up events
may occur when you enable the Wake On LAN feature
in Windows 7 or in Windows Vista
http://support.microsoft.com/kb/941145
How to Enable the Wake from Standby Option for a USB Mouse
http://support.microsoft.com/kb/280108
By default, the Power Management feature of USB mouse devices is turned off.
This setting is different from classic PS/2 computer functionality.
Therefore, to enable the Wake from standby option, you must manually turn on the Power Management feature for the USB mouse.
To manually enable the Wake from standby option for the USB mouse, start Device Manager, right-click the USB mouse driver,
click Properties, and then click to select the Allow this device to wake the system from standby check box.
The monitor reverts to a low-power state several seconds after you wake it up by pressing the power button or by using the remote control on a computer that is running Windows Vista SP1 or Windows Server 2008….
http://support.microsoft.com/kb/953029
HOTFIX AVAILABLE
http://support.microsoft.com/kb/953029
Free On-line Dictionary of Computing
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Free_On-line_Dictionary_of_Computing
Firefox crashes, Help – Remedies
http://kb.mozillazine.org/Firefox_crashesWindows Security Technologies
System security technologies built in, to enable, add on…

New Windows 8 Security Items
Unified Extensible Firmware Interface
http://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface
Hardware Design and Development for Windows 8
Unified Extensible Firmware Interface
http://msdn.microsoft.com/en-us/library/windows/hardware/br259114.aspx

Bootkits
http://en.wikipedia.org/wiki/Rootkit#bootkit
BIOS
http://en.wikipedia.org/wiki/BIOS

Windows 8 “Secure Boot”
http://news.softpedia.com/news/Windows-8-Bootkit-Might-Prove-Secure-Boot-Ineffective-235138.shtml
Comprimised already by bootkit:
http://www.itworld.com/security/225417/windows-8-secure-boot-already-cracked
http://arstechnica.com/business/news/2011/11/security-researcher-defeats-windows-8-secure-boot.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
http://www.pcworld.com/businesscenter/article/248342/windows_8_secure_boot_the_controversy_continues.html
(This is a great debate and many, many articles already :
http://linuxducks.free-forums.org/fsf-warns-of-windows-8-secure-boot-sign-petition-vt508.html

Early Launch Anti-Malware (ELAM) – Windows 8
http://www.techopedia.com/definition/29079/early-launch-anti-malware-elam-windows-8
Windows 8 Early Launch Anti-Malware from Third-Party AV Vendors
http://news.softpedia.com/news/Windows-8-Early-Launch-Anti-Malware-from-Third-Party-AV-Vendors-226789.shtml
Managing early launch anti-malware (ELAM) detections
http://www.symantec.com/business/support/index?page=content&id=HOWTO81107
Windows 8 ELAM: too late, too little!
http://www.virusbtn.com/conference/vb2012/abstracts/KulkarniJagdale.xml
How to configure Early Launch Anti-Malware Protection in Windows 8
http://www.bleepingcomputer.com/tutorials/configure-early-launch-antimalware-protection/
How to disable Early Launch Anti-Malware Protection
http://www.bleepingcomputer.com/tutorials/disable-early-launch-antimalware-protection/
Understanding Early Launch Anti-Malware (ELAM) technology in Windows 8
http://www.thewindowsclub.com/earlylaunch-antimalware-elam-technology-windows-8
[Hot Fix] B0006 – The Early Launch Anti-Malware of Titanium 2013 does not load properly
http://esupport.trendmicro.com/solution/en-US/1095123.aspx
Windows 8: Trusted Boot: Secure Boot – Measured Boot
http://blogs.msdn.com/b/olivnie/archive/2013/01/09/windows-8-trusted-boot-secure-boot-measured-boot.aspx

Windows 8
http://support.microsoft.com/gp/windows-8
Support options, learn more and lifecycle information for Windows 8

Windows Security Technologies

Data Execution Prevention (DEP)
Data Execution Prevention (DEP) is a security feature included in modern operation systems. It is available in Linux, Mac OS X and the newer Microsoft …
http://en.wikipedia.org/wiki/Data_Execution_Prevention

Address Space Layout Randomization (ASLR)
Address space layout randomization (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, …
http://en.wikipedia.org/wiki/Address_space_layout_randomization

Structured Exception Handler Overwrite Protection (SEHOP)
Windows Vista Service Pack 1, Windows 7, Windows Server 2008 and Windows Server 2008 R2 now include support for Structured Exception Handling Overwrite Protection (SEHOP). This feature is designed to block exploits that use the Structured Exception Handler (SEH) overwrite technique. This protection mechanism is provided at run-time. Therefore, it helps protect applications regardless of whether they have been compiled with the latest improvements, such as the /SAFESEH option. We recommend that Windows users who are running any of the above operating systems enable this feature to improve the security profile of their systems.
http://support.microsoft.com/kb/956607

Export Address Table Filtering (EAF)
In August 2010 we released the new version of EMET with brand new mitigations and a new user interface experience. Two new mitigations are included in this version: Mandatory ASLR (breaking current ROP exploits relying on DLLs located at predictable addresses) and Export Address Table filtering (EAF) (breaking virtually the big majority of shellcodes from running). EMET is not bulletproof but will break a lot of the bad guys’ tools and exploits. EMET makes it possible for f.i. to have SEHOP on an XP machine.
http://technet.microsoft.com/en-us/security/Video/gg469855

Heap Spray Allocation (HSA)
In computer security, heap spraying is a technique used in exploits to facilitate arbitrary code execution. The term is also used to describe the part of the source code of an exploit that implements this technique. In general, code that sprays the heap attempts to put a certain sequence of bytes at a predetermined location in the memory of a target process by having it allocate (large) blocks on the process’ heap and fill the bytes in these blocks with the right values. They commonly take advantage of the fact that these heap blocks will roughly be in the same location every time the heap spray is run. Execution flow can be redirected to the heap sprays via buffer overflow or heap overflow flaws.
http://en.wikipedia.org/wiki/Heap_spraying

Null Page Allocation (NPA)
May 23, 2011 … Null Page Allocation (NPA) guards against a piece of malware running itself by taking over a “null” page — a technique that’s never been …
http://www.infoworld.com/t/microsoft-windows/microsoft-shuffles-windows-security-deck-emet-21-831

MEMORY / RAM / UPGRADES / RAM BOOSTERS

Microsoft – Add more memory to your computer
If your computer seems slow, now’s the time for additional RAM
http://www.microsoft.com/athome/moredone/addmemory.mspx

Ultimate Memory Guide
http://www.kingston.com/tools/umg/default.asp
Kingston has written the definitive document related to memory and the technology behind it. Everything you ever wanted to know about memory can be found here.

Microsoft Support
RAM, Virtual Memory, Pagefile and all that stuff
http://support.microsoft.com/kb/2267427

Random-access memory [RAM Memory]
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Random-access_memory

FREE RAM BOOSTERS (Note don’t cause corruption/freeze-up …use when open programs are idle or closed)

Mz RAM Booster (works with Vista)
http://www.softpedia.com/get/Tweak/Memory-Tweak/Mz-Ram-Booster.shtml
Speed up your computer, stop memory leaks and increase free RAM.
Mz RAM Booster is a program created to improve the performance of your computer by auto-recovering RAM and fine tuning some system settings! It uses minimal resources and almost no CPU time.
You will be able to experience the best performance boost, without the need of new hardware, hardware tweak and even without restricting your PC’s stability.
Requirements:
· .NET Framework 2.0 (Download at Windows Updates, upgrades)

Rambooster 2.0 (Great old Windows XP ram booster)
http://www.softpedia.com/get/Tweak/Memory-Tweak/Rambooster-Bilton.shtml
Rambooster is a software that helps you optimize your RAM. RAMBooster monitors the amount of RAM your system is using and allows you to free it up. This will let your PC run smoother and faster, and you won’t have to reboot as often. It will monitor the memory at all times, and if the amount of free RAM gets too low, it will automatically boost it for you, finding unused RAM and returning it to the free pool.
RAMBooster will also monitor your CPU usage. Includes replaced CPU-infotext with a gauge. RB now always minimizes to the tray instead of taskbar or tray. The GUI looks almost like the old GUI, to make things easier for those who have used RAMBooster for years. Supports RAM up to 9999 MB instead of previous 99. Help-file problems fixed.
Fixed conflicts with CPU-usage meter. Also some dial-up system caused to CPU-reading to freeze to 0%. This part has also been rewritten. Allows only one instance of the program. Lots of code optimization, invisible to users. It is bettter, faster, and more reliable now.

Windows Search 4.0 component of Windows enables instant search of your computer

Windows Search 4.0 Windows XP

http://www.microsoft.com/downloads/en/details.aspx?FamilyId=55C18CB3-C916-4298-ABA3-5B98904F7CDA&displaylang=en

Windows Search 4.0 Windows Vista

http://www.microsoft.com/downloads/en/details.aspx?FamilyId=BC28ED7F-C51B-49CD-B505-95B91B453284&displaylang=en

Windows 7

DON’T FORGET YOUR PASSWORD !

What to do if you forget your Windows password
http://windows.microsoft.com/en-US/windows-vista/What-to-do-if-you-forget-your-Windows-password
If you’ve forgotten your Windows password and you’re on a domain, you should contact your system administrator to reset your password. If you’re not on a domain, you can reset your password by using a password reset disk or by using an administrator account. If you forget the administrator password and don’t have a password reset disk or another administrator account, you won’t be able to reset the password. If there are no other user accounts on the computer, you won’t be able to log on to Windows and will need to re-install Windows

POSSIBLE REMEDY
Top 7 Free Windows Password Recovery Tools
http://pcsupport.about.com/od/toolsofthetrade/tp/passrecovery.htm
A List of the Best Free Password Recovery & Reset Tools for Windows
“Windows password recovery tools are used to recover or reset lost user and administrator passwords used to log on to Windows operating systems. Password recovery tools are often called “password cracker” tools because they are sometimes used to “crack” passwords by hackers. Legally cracking your own Windows password is certainly a legitimate practice! “

Windows Vista

New Vista Empowered Computers, launch…..
TIPS: Vista Basic edition is less “microsoft intrusive” so to speak for preferences as they say – but if you have or get a Laptop or Notebook it is mandatory to
get Vista Home Premium that includes all the Network Automatic Wizards and battery -vs.- operating system optimization utilization settings neccessary for mobile.
These are not included in Basic edition. FIRST after launching and registering your Vista set Windows Updates to Automatic Download and Install.
(General recommendations from an Advanced User…follows)

FLASH !!! did u know ? DO NOT TURN OFF VISTA UAC ! Read……
Vista’s Despised UAC Nails Rootkits, Tests Find – Business Center …
http://www.pcworld.com/businesscenter/article/146256/vistas_despised_uac_nails_rootkits_tests_find.html
May 25, 2008 … Most users find it annoying, but Vista’s Account Control
feature proves most effective in security tests…..
http://www.pcworld.com/businesscenter/article/146256/vistas_despised_uac_nails_rootkits_tests_find.html
NEVER turn off UAC !!! And do NOT use “tweak softwares” for it. You have been
warned…..
Circumventing Vista UAC Security is aiding cyber crime and we consider “Vista Bashing” as part of that. 

Vista User Account Control (UAC) Information links …..
User Account Control (UAC) in Windows Vista extends new privileges to
standard users while upholding robust protections against online threats
http://www.microsoft.com/windows/windows-vista/features/user-account-control.aspx
What is User Account Control?
http://windowshelp.microsoft.com/Windows/en-US/Help/0eeb9ddd-ddaa-4cc5-a092-9908305665471033.mspx
User Account Control Overview
http://windowshelp.microsoft.com/Windows/en-US/Help/9812d370-e66a-451a-80c9-f028d402d4281033.mspx
How to use User Account Control (UAC) in Windows Vista
http://support.microsoft.com/kb/922708
User Account Control
http://www.microsoft.com/singapore/windows/products/windowsvista/features/details/useraccountcontrol.mspx
First Look: New Security Features in Windows Vista
http://technet.microsoft.com/en-us/magazine/cc160980.aspx
Explore the features: Windows Security Center
You can restore User Account Control to the recommended settings with the
click of a button. Ready to set up your computer? This paper offers specific
guidelines for securing your PC …
http://www.microsoft.com/windows/windows-vista/features/security-center.aspx
Description of User Account Control and remote restrictions in Windows Vista
http://support.microsoft.com/kb/951016

Why you should not use a tweak UAC software utility…..
Silent Mode tweak…. DON’T !
Simple. Number one the software utility is not a Microsoft Windows product
which is what these “hacker” utilities will be making changes to – YOUR
Windows Operating System. Just because they can create software (anyone can)
does not mean it is safe and secure and will not corrupt Windows in some
manner.
Consider the following rather then these type “tweaks” ….
You may want to consider this article information (below) before
‘hacking’ the Windows system …. a Windows Vista empowered computer
is too pretty to “deface”:

Techworld.com – Vista’s UAC spots rootkits, tests find
http://www.techworld.com/security/news/index.cfm?newsid=101583
Vista’s UAC spots rootkits, tests find
Vista’s Despised UAC Nails Rootkits, Tests Find
Do you know what a rootkit is ? (Certainly one of the most dangerous
malware threats aside from a ‘blended threat’ attack). Do you know
what notifications you are turning off ? Are they malware alerts you
should attend for a stable and secure system ?

An easy way to wade through this is simply if you have ever had a
personal firewall installed that is quality and a tad “agressive” and
you get the several alerts. You go through them one by one and off to
the search engine to see if the process is part of Windows or trusted
software to give permission to.
What you may turn off with some hacker tweak is an actual alert to
malware much as the same as turning off firewall protection to a port
malware is communicating through – or allowing malware by clicking
“OK” to allow it internet access and defeating the purpose of the
security software (antivirus, antispyware, firewall).
I would investigate with extreme prejudice before proceeding in changes not
recommended in today’s crimeware environment – see the following:
MORE:
More Vista hacks NOT Recommended ! (Disable All Balloon Notifications)
June 18, 2008 by bluecollarpc
http :/ /bluecollar CLOSED pc.wordpress.com/2008/06/18/more-vista-hacks-not-recommended-disable-all-balloon-notifications/
Warning: Why you should not use a ‘tweaking UAC’ software utility
June 15, 2008 by bluecollarpc
ht tp:/ /bluecollarpc. CLOSED wordpress.com/2008/06/15/warning-why-you-should-not-use-a-tweaking-uac-software-utility/
Is Limited User Account enough? Not really…
http://www.prevx.com/blog/83/Is-Limited-User-Account-enough-Not-really.html
Security: Inside Windows Vista User Account Control
http://technet.microsoft.com/en-us/magazine/cc138019.aspx
User Account Control, or UAC, is one of the most misunderstood new features
in Windows Vista. But its goal-to enable users to run with standard user
rights-can solve many security issues. Get an inside look at the problems UAC is
designed to address and see exactly how this new feature works. ….

TIP: Great additional free Mail Client fom Microsoft:
Windows Live Mail… Do you know Microsoft Outlook Express or Windows Mail?
Then you pretty much already know how to use Windows Live Mail.
The clean design speeds you through … http://get.live.com/wlmail/overview

December 2007 Windows Vista Application Compatibility Update
http://support.microsoft.com/kb/943302
View products that this article applies to.
Article ID : 943302
Last Review : January 11, 2008
Revision : 2.0
http://support.microsoft.com/kb/943302

SEE:
Windows Vista AppReadiness Beta
(Online Search Engine) Note this is community input by users !
Application Search Browse by Company
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z (Browse by Application)
http://www.appreadiness.com/default.aspx

Windows Genuine Advantage (WGA) for Windows Vista (excerpt)
http://www.microsoft.com/genuine/ProgramInfo.aspx?displaylang=en&tab=Vista
Windows Vista has built in anti-piracy technology that enables Microsoft to combat piracy more effectively. This new technology is a part of the Windows
Genuine Advantage program. It changes how Windows Vista activates, validates, and behaves when attempts are made to tamper with the activation or
validation requirements of the operating system. This helps to make piracy harder and provides a better experience for customers running genuine Windows.
Using genuine Windows Vista helps customers enjoy the full functionality of Windows while helping to avoid viruses, tampered files, and other malicious software
often associated with counterfeit copies. Windows product activation and validation are the experiences customers see when using WGA……. MORE
WGA – Wikipedia (excerpt)
On Windows Vista, WGA validation failure has a greater impact. In addition to persistent notification and the disabling of non-critical updates, WGA also disables
Windows Aero, Windows Defender, and ReadyBoost. The user is given a grace period in which to then pass validation, after which most of the operating system
is disabled and Windows reverts to reduced functionality mode, which will be removed in Service Pack 1 of Windows Vista.
http://en.wikipedia.org/wiki/Windows_Genuine_Advantage

Windows Help and How-to: Windows Vista: Setup and maintenance (Microsoft)
http://windowshelp.microsoft.com/Windows/en-US/maintenance.mspx

Microsoft: New PC ? Tools, Products, and Tips…
Getting started with a new PC? Use these articles and communities to help you get going and be more productive right away…. ) at Microsoft
http://www.microsoft.com/athome/moredone/yournewpc.mspx

Microsoft: Windows Vista Home Premium, Help and How-to
http://windowshelp.microsoft.com/windows/en-us/help/a89698a2-dede-44ec-b4a6-e93ef2860c461033.mspx

Microsoft: 5 steps to help protect your new computer before you go online
http://www.microsoft.com/protect/computer/advanced/xppc.mspx

Ease of Transition… (Idea Utility) ….Files from XP to Vista
Belkin MS Vista Transfer Cable
http://www.radioshack.com/product/index.jsp?productId=2590892&cp=2032061.2032365.2032390&parentPage=family

Windows Vista has built in anti-piracy technology that enables Microsoft to combat piracy more effectively. This new technology is a part of the Windows Genuine
Advantage program. It
changes how Windows Vista activates, validates, and behaves when attempts are made to tamper with the activation or validation
requirements of the operating system. This helps to make piracy harder and provides a better experience for customers running genuine Windows. Using genuine
Windows Vista helps customers enjoy the full functionality of Windows while helping to avoid viruses, tampered files, and other malicious software often associated
with counterfeit copies. Windows product activation and validation are the experiences customers see when using WGA……. MORE
WGA – Wikipedia (excerpt)
On Windows Vista, WGA validation failure has a greater impact. In addition to persistent notification and the disabling of non-critical updates, WGA also disables
Windows Aero, Windows Defender, and ReadyBoost. The user is given a grace period in which to then pass validation, after which most of the operating system
is disabled and Windows reverts to reduced functionality mode, which will be removed in Service Pack 1 of Windows Vista.
http://en.wikipedia.org/wiki/Windows_Genuine_Advantage
How To Rebuild Icon Cache In Windows 7 To Repair Icons
http://www.intowindows.com/how-to-rebuild-icon-cache-in-windows-7-to-repair-icons/
Mar 2, 2010 … Windows users often complain about corrupted desktop and
explorer icons. Like in Windows XP and Vista, Windows 7 icons also may
get …
Restore Missing Desktop Icons in Windows 7 or Vista – How-To Geek
Feb 9, 2007 … Restore Missing Desktop Icons in Windows 7 or Vista. If
you’ve removed your recycle bin icon, or you previously added the some
of the …
http://www.howtogeek.com/howto/windows-vista/restore-missing-desktop-icons-in-windows-vista/
How to Rebuild the Icon Cache in Windows Vista and Windows 7 –
http://www.winhelponline.com/blog/how-to-rebuild-the-icon-cache-in-windows-vista/
Apr 8, 2008 … How to Rebuild the Icon Cache in Windows Vista and
Windows 7. … type in Vista (March 31, 2008) tells you how to refresh
the shell icons in Vista. … Fix Windows 7 Backup and Restore Not
Launching After Uninstalling …
Icons randomly change to different icons
http://support.microsoft.com/kb/132668
XP
http://support.microsoft.com/kb/279769
Jan 19, 2007 … Some icons in My Computer, Windows Explorer, on the
desktop …

Vista Wireless

VISTA LINKS:
Windows Vista Help: What are the different wireless network security …
This is referred to as WPA-Enterprise or WPA2-Enterprise . It can also be used in a pre-shared key (PSK) mode, where every user is given the same passphrase
http://windowshelp.microsoft.com/Windows/en-US/Help/b385cc8a-af25-489e-a82e-decf6df26b681033.mspx
Windows Vista Partners: D-Link Systems
Support for WEP, WPA, and WPA2 security standards help ensure that you will be able to use the best possible encryption—regardless of your other wireless
devices.
http://www.microsoft.com/windows/shop/partners/dlink.mspx
Windows Vista Help: Choosing a network location
For wireless networks, a wireless connection encrypted with Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA). (For WPA, WPA2 is preferred.
http://windowshelp.microsoft.com/Windows/en-US/Help/6ddfa83c-01c8-441e-b041-1fd912c3fe601033.mspx
Windows Vista Help: Enable 802.1X authentication
On wireless networks, 802.1X can be used with Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) encryption. 5. In the Choose a network …
http://windowshelp.microsoft.com/Windows/en-US/Help/d4a8a69a-f885-4766-a991-446031bc32881033.mspx
Windows Vista Help: Ad hoc networking
Security type. For your computer’s security, choose WPA-2 Personal. (We don’t recommend using WEP. WPA-2 is more secure. If you try WPA-2 and it doesn’t
work, we recommend that …
http://windowshelp.microsoft.com/windows/en-us/help/0e158c21-4c70-4235-879d-0c9133218e561033.mspx
Windows Vista Help: Setting up a wireless network
We recommend that you use WPA because it offers better security than the traditional Wired Equivalent Privacy (WEP) security. With WPA you can also use a
passphrase , so you don’t …
http://windowshelp.microsoft.com/windows/en-us/help/297fa2dc-b20b-4327-b673-707a968c86801033.mspx#EK

Netiquette
Internet Ettiquette: (Appropriate behavior online)
Good manners online
http://www.earthlink.net/elink/issue93/focus.html

SCAMS, HOAX, CYBER URBAN LEGENDS….
snopes.com: Urban Legends Reference Pages
The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.
http://www.snopes.com/
Scambusters.org
“Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?”
http://www.scambusters.org/
Hoax-Slayer.Com
Mission Statement: The goal of the Hoax-Slayer Website is to help make the Internet a safer, more pleasant and more productive environment by: Debunking email and Internet hoaxes, Thwarting Internet scammers, Combating spam, Educating web users about email and Internet security issues.
http://www.hoax-slayer.com/

How To Report UCE Unsolicited Commercial Email commonly known as “spam”…..
To Report Spam to the appropriate address, you must always include full message headers, or rejected:
NOTE: Do Not Even open unsolicited unknown sender email unless your pc is protected !

To Report Spam to the appropriate address, you must always include full message headers, or rejected:

SpamCop FAQ :
How do I get started reporting spam ?
http://www.spamcop.net/fom-serve/cache/125.html

Federal Trade Commission (Report UCE – Unsolicited Commercial Email):
http://www.ftc.gov/bcp/conline/edcams/spam/report.html
Report Spam to spam@uce.gov
To forward unwanted or deceptive spam to the FTC send it to spam@uce.gov, and be sure to include the full email header. If you think you have been taken
advantage of by a spam scam, file a complaint with the FTC online at www.ftc.gov. Complaints will help the FTC find and stop people who are using spam to
defraud consumers.

UCE: (Spam) Definiton: http://en.wikipedia.org/wiki/E-mail_spam

Anti Phishing Working Group Org
http://www.antiphishing.org/
Report Phishing: Report phishing emails, pharming sites and crimeware to the Anti-Phishing Working Group and help stop this insidious threat to e-commerce.
Click “Report Phishing” link below for instructions.
What is Phishing and Pharming?
Phishing attacks use both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials. Social-engineering
schemes use ‘spoofed’ e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers,
account usernames, passwords and social security numbers. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince
recipients to respond. Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using Trojan keylogger spyware. Pharming
crimeware misdirects users to fraudulent sites or proxy servers, typically through DNS hijacking or poisoning.

Email Message Headers Help: 

Email Headers
http://cf.stanford.edu/doc/email/headers.php
When forwarding an unwanted or abusive email to postmasters
for action, it’s very important that you include all of the header information.
A great number of spammers, for instance, will do all they can to blur the
origin of their message, but they can’t forge everything! So here’s a guide
to viewing full headers in a variety of popular mail clients.

byUsers :: Reading and Understanding Message Headers
http://www.by-users.co.uk/faqs/email/headers/

Quick reference to Internet message headers
http://www.cs.tut.fi/~jkorpela/headers.html

How to Read Email Headers
http://pobox.com/headers.mhtml

Microsoft Office Assistance: Hide or remove e-mail message headers
http://office.microsoft.com/en-us/assistance/HA010872971033.aspx

How to find the sender’s original IP Address using Email message …
http://www.johnru.com/active-whois/trace-email.html

Scrollbar for expanded message headers – MozillaZine Knowledge Base
http://kb.mozillazine.org/Scrollbar_for_expanded_message_headers

Cookies – Information…
What are cookies, what do they do, what risks are involved, what types are there ?

Cookie – Webopedia Definition
http://www.webopedia.com/TERM/c/cookie.html

Cookie Central
http://www.cookiecentral.com/
Cookie Central FAQ
http://www.cookiecentral.com/faq/

How Internet Cookies Work
http://www.howstuffworks.com/cookie.htm

Microsoft.com Cookies FAQ
http://www.microsoft.com/info/cookies.mspx

How Web Servers’ Cookies Threaten Your Privacy
http://www.junkbusters.com/cookies.html

Blocking Unwanted Cookies with IE 6
http://www.mvps.org/winhelp2002/cookies.htm
One of the new features built-in to IE 6 is the ability to accept and/or block any or all cookies if desired

ONLINE TRACKING: How ANONYMOUS is the INTERNET?
http://www.slais.ubc.ca/courses/libr500/fall1999/www_presentations/g_coleman/cookie.htm

Consumer Tips: How to Opt-Out of Cookies That Track You
http://www.worldprivacyforum.org/cookieoptout.html

Internet Explorer Gallery
Tracking Protection Lists
http://www.iegallery.com/us/trackingprotectionlists/default.aspx
Control what third-party sites can track you while you’re online.
EasyPrivacy Tracking Protection List
https://easylist.adblockplus.org/en/
EasyPrivacy Tracking Protection List is based on the popular EasyPrivacy subscription for Adblock Plus and is managed by the well-known EasyList project, which serves nearly ten million daily users and has a large support forum with dozens of experienced members able to assist resolving any issues that may arise.
Abine’s Kids and Teens Tracking Protection List
http://www.abine.com/tpl/
Abine’s Kids and Teens Tracking Protection List specifically blocks advertisers and data collectors we found in use on the Web sites most popular with kids and teens
Abine’s Standard Tracking Protection List
http://www.abine.com/tpl/
Abine’s Standard Tracking Protection List blocks many online advertising and marketing technologies that can track and profile you as you browse the Web. This list is updated frequently to keep you safer and more private
Fanboy – Adblock Tracking Protection List
http://fanboy.co.nz/adblock/ie.html
The Fanboy Tracking Protection List is supported and maintained by the Fanboy group.
Fanboy – Tracking Protection List
http://fanboy.co.nz/adblock/ie.html
Fanboy Tracking Protection List is supported and maintained by the Fanboy group.

Microsoft.com
http://www.microsoft.com/

Microsoft Windows Update
Latest bug fixes for Microsoft Windows, including
fixes for some possible DoS attacks.
windowsupdate.microsoft.com/

Microsoft Help and Support
Technical support for Microsoft products.
http://support.microsoft.com/

You did originally activate ?
Software Piracy Protection Home – Activating Software
http://www.microsoft.com/piracy/activation.mspx

Check out:
Software Piracy Protection
http://www.microsoft.com/piracy/default.mspx
Information on piracy as well as tips on how to protect yourself against it.

Microsoft does now have, and is instituting to a greater degree, the
validation of your Windows Operating System against a piracy bootleg copy – which will be denied Windows Updates.
SEE:

Genuine Microsoft Software
http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx
One of the many benefits of owning genuine Microsoft software is gaining access to Microsoft Support Services. Below are two ways to help you determine
whether your version of Windows is genuine.

Microsoft Security Center fake warnings  in your task bar… (Example of these)
Briefly: “How to Remove SpyFalcon” (Review in full at website)
http://www.bleepingcomputer.com/forums/topic43659.html
SpyFalcon is a anti-spyware program that is known to issue fake warnings on your computer in order to manipulate you into buying its full commercial version.
If you are infected with this program you may receive warnings in your task bar that appear to be from Microsoft Security Center stating that you are infected
with spyware and to run its special anti-spyware tool. This tool turns out to be the commercial version of SpyFalcon. These warnings are fake and are a goad
to have you buy the commercial version of this software…..

Components

Microsoft Internet Explorer
Help and Support Center for
the Microsoft Internet Explorer Web Browser.
http://support.microsoft.com/ie6

Internet Explorer Homepage
http://www.microsoft.com/windows/ie/default.mspx

Internet Explorer 7 Preview
http://www.microsoft.com/windows/ie/ie7/default.mspx

Microsoft Internet Explorer – Customizing the Links Bar
http://www.microsoft.com/windows/customizelinks.htm
Customizing the Links Bar… Did you know that you can customize the
Links bar in the browser? You can add or remove shortcuts, rearrange the
order of shortcuts, and even change the icons associated with them. Here’s how: …..

Microsoft Outlook Express
Included POP Email Program

http://support.microsoft.com/oex
Windows Security Center
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Windows_Security_Center
Windows Security Center
A component of Microsoft Windows
The Windows Security Center or Action Center is a component included with Microsoft’s Windows XP (beginning with Service Pack 2), Windows Vista and
Windows 7 operating systems that provides users with the ability to view the status of computer security settings and services. Windows Security Center also
continually monitors these security settings, and informs the user via a pop-up notification balloon if there is a problem. It is renamed to Action Center in
Windows 7, where it covers maintenance as well as security.

Windows Updates URLs – add to Trusted Sites
http://update.microsoft.com/windowsupdate/v6/default.aspx
To make this site a trusted website In Internet Explorer, click Tools, and then click Internet Options.
On the Security tab, click the Trusted Sites icon. Click Sites and under Add this website to the zone,
copy and paste these website addresses. You can only add one address at a time and you must
click Add after each one. Note that you may need to
uncheck “Require server verification (https:) for all sites in this zone.”
http://update.microsoft.com
https://update.microsoft.com
http://*.update.microsoft.com
https://*.update.microsoft.com
http://download.windowsupdate.com

Windows Operating Systems (OS)

Microsoft Windows 95
http://www.microsoft.com/windows95/

Microsoft Windows 98 Support Center
http://support.microsoft.com/win98

Microsoft Windows ME
http://www.microsoft.com/Windowsme/

Microsoft Windows XP Support Center
http://support.microsoft.com/winxp

List of Microsoft Windows components
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_components

List of operating systems
From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/List_of_operating_systems#UNIVAC_.28later_Unisys.29

NOSTALGIA
Inside the world’s long-lost first microcomputer
http://news.cnet.com/8301-13772_3-10429544-52.html?tag=rtcol;inTheNewsNow

Windows XP Upgrade Advisor
http://www.microsoft.com/windowsxp/pro/upgrading/advisor.mspx
The Upgrade Advisor is a tool that checks your system hardware and software to see if it is ready for upgrade to Windows XP. If you run Upgrade Advisor while
you are connected to the Internet, and if your system needs updates that are available on the Windows Update Web site, Upgrade Advisor will find and install
the updates for you.

Windows Vista Upgrade Advisor 1.0
http://www.microsoft.com/downloads/details.aspx?familyid=42B5AC83-C24F-4863-A389-3FFC194924F8&mg_id=10105&displaylang=en
Brief Description: Windows Vista Upgrade Advisor is designed to help Windows XP users identify whether their PCs are ready for an upgrade to Windows Vista,
which edition of Windows Vista meets their needs, and which features of Windows Vista will be able to run on their PCs.

Bookmarks: 

How to Identify Files (file extensions Search Engine)
http://filext.com/
FILExt Home Page, The File Extension Source::;> Welcome to FILExt,
the file extension source. FILExt is a detailed database of file extensions and programs that use them. A file extension is simply the end characters after the
period in a file name (see here for a detailed description). A search in the database here might result in multiple possibilities. Use the context of where you got
the file to help you figure out exactly what it is if there are multiple  possibilities. To help, many of the links on this site will open a new browser window so you
have constant reference to the FILExt data.

Portable App Directory
The Application Directory lists free open source software and freeware portable apps.
As always, the PortableApps.com Platform, menu, backup utility, launchers, installer, format
and other utilities are open source.
http://portableapps.com/apps
Driver Guide com
http://www.driverguide.com/
Let’s face it, finding the right device driver can be a tedious, time consuming, often impossible task! The Driver Guide was created to make finding driver updates
a whole lot easier. With the help of thousands of our members, we have compiled a massive database archive of drivers and resources that is by far the largest
and most comprehensive on the Web.

Business Software Alliance – Software Piracy Prevention
Informing the public of the effects of software piracy, and of action
that can be taken to curb this ongoing activity.
http://www.bsa.org/usa/antipiracy/

Welcome to Annoyances.org
http://www.annoyances.org/
Annoyances.org is the most complete collection of information assembled for and by actual users of Microsoft Windows. Explore this free web resource by
selecting one of the destinations on your left, or use search to find a specific solution.

Infoplease
Infoplease Encyclopedia and Dictionary
http://www.infoplease.com/encyclopdict.html

Welcome to Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Main_Page
An excellent information source, which is updated on a continuous
basis. It is essentially an free, online encyclopedia, with answers to nearly
any human endeavour or experience. Enjoy!

Tips for Secure Browsing
Always use the most current version of your browser.
http://www.mozilla.org/security/#Security_Alerts

Internet Explorer Version 7 (latest greatest) has what would have prevented the over 3 billion dollars in phisher scams of the USA Public in 2007.. SEE:
Put safety first.
http://www.microsoft.com/windows/products/winfamily/ie/default.mspx
Robust new Internet Explorer 7 architecture and improved security features help protect you against malicious software, and help to keep your personal
data safe from fraudulent websites and online phishing scams.

Phishing Filter
http://www.microsoft.com/windows/products/winfamily/ie/features.mspx
This filter warns you about and helps to protect you against potential or known fraudulent websites, and blocks the sites if appropriate. This opt-in filter
is updated several times per hour using the latest security information from Microsoft and several industry partners.
ddress bar protection

Phishing Filter
http://www.microsoft.com/canada/midsizebusiness/businessvalue/local/dm3.mspx
…uses a combination of machine-learning heuristics, client-side scanning for suspicious characteristics and an opt-in online service that utilizes dynamic
industry-based reputation services to proactively warn about – and help protect against – potential or known fraudulent sites and blocks the sites if
appropriate
AND MORE:
Address bar protection
Every window, whether it’s a pop-up or standard window, will show you an address bar, helping to block malicious sites from emulating trusted sites.
YET MORE
Cross-domain barriers
Internet Explorer 7 helps to prevent the script on webpages from interacting with content from other domains or windows. This enhanced safeguard gives
you additional protection against malware by helping to prevent malicious websites from manipulating flaws in other websites or causing you to download
undesired content or software.

International Domain Name Anti-spoofing
http://www.microsoft.com/canada/midsizebusiness/businessvalue/local/dm3.mspx
…will notify users when visually similar characters in a URL are not expressed in the same language to help protect users against visiting sites that would
otherwise appear as a trustworthy site

Features unique to Windows Vista
http://www.microsoft.com/windows/products/winfamily/ie/features.mspx
These features are available only with Internet Explorer 7 in Windows Vista:
* Protected mode Internet Explorer 7 in Windows Vista runs in isolation from other applications in the operating system. It restricts exploits and malicious
software from writing to any location beyond Temporary Internet Files without explicit user consent.
* Parental controls To help keep kids safer online, parents can control browsing behavior through the parental control settings built into Windows Vista. The
child’s safety level can be monitored and changed remotely. The safety level carries over to many PC activities, such as playing games or browsing the Internet.
A child’s browsing session can even be examined by a parent afterwards, and cannot be removed without the parent’s permission.
Firewalls / Information Links:

Comodo Personal Firewall [new, advanced users]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

Sygate Personal Firewall Free 5.6.2808 [Not supported, extinct]
(Old favorite now owned by Symantec)
http://www.softpedia.com/get/Security/Firewall/Sygate-Personal-Firewall-Free.shtml

ZoneAlarm Free Firewall
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Ashampoo FireWall Free 1.2 (popular) [wrkx w/ Netbooks]
http://www.download.com/Ashampoo-FireWall-Free/3000-10435_4-10575187.html

Online Armor Personal Firewall Free [new/advanced users]
http://www.tallemu.com/
Online Armor Free provides both a firewall and a whitelist approach to program security for Windows NT, 2000 and XP. It does not show pop-ups for many
known good programs, and it scans all your installed programs when it first runs so that you can quickly tell it what to do with apps it doesn’t know about.
Operating Systems:  Windows XP, Windows 2000, Windows Vista
What is firewall? – A Word Definition From the Webopedia Computer …
http://www.webopedia.com/TERM/f/firewall.html
This page describes the term firewall and lists other pages on the Web where you can find additional information.

Internet Firewalls: Frequently Asked Questions
http://www.interhack.net/pubs/fwfaq/
3.1 What are some of the basic design decisions in a firewall? … Can’tI just poke a hole in the firewall and tunnel that port? …

Windows Firewall in Windows XP Service Pack 2
http://www.microsoft.com/windowsxp/%20using/security/internet/sp2_wfintro.mspx
Learn the basics about the new Windows Firewall in Windows XP Service Pack 2, plus find out hot to adjust your firewall settings if you need to.

Firewall Builder
http://www.fwbuilder.org/
Firewall Builder is multi-platform object oriented firewall configuration and management tool. It consists of a GUI and set of policy compilers for iptables …

Firewall Net.com
http://www.firewall-net.com/en/
Guide to install & configure for Windows Mac or …Firewall Net is a guide for installation and configuration of firewall with windows 95 98 NT 2000 Me Millenium
XP, linux or mac , using : conseal atguard …

Firewall Q&A (Questions & Answers)
http://www.vicomsoft.com/knowledge/reference/firewalls1.html
A whitepaper on relevant firewall questions and answers. The knowledge of this subject relates to firewalls in general use, and stems from NAT and proxy …

Home PC Firewall Guide
http://www.firewallguide.com/
Learn how to protect home computers and networks from Internet outlaws by using personal firewall, antivirus and anti-spyware software plus low-cost …

Howstuffworks “How Firewalls Work”
http://www.howstuffworks.com/firewall.htm
An introductory explanation of how a firewall works and the various filtering methods used, with related links.

IPCop Firewall
http://www.ipcop.org/
A secure Linux distribution managed through a web-interface. It turns an old PC into a firewall and VPN gateway. Features an Intrusion Detection System.

OpenOffice (comparable to Microsoft products)
http://www.openoffice.org/
OpenOffice.org is the leading open-source office software suite  for word processing, spreadsheets, presentations, graphics, databases and more. It is available
in many languages  and works on all common computers. It stores all your data in an international open standard format and can also read and write files from
other common office software packages. It can be downloaded and used completely free of charge for any purpose.
Fight Spam…

These are excellent seemless well known and used programs. The free ones work best the more “agressive” the settings you use. These are not going to work
with your normal ISP Subscription (AOL, MSN, Earthlink, Juno, etc) – they work with POP Mail you can set up with the accounts you have and not with the ISP
software. The free ones are spam filters that will strike through the known spam subject line of the message with (*****) the five asterik stars in front of and
in back of the spam subject line. I have used everything here and they generally do not miss or make mistakes. The shareware (buy) ones create a small toolbar
and a seperate folder not allowing the spam into the Inbox. They all have quick settings and are very , very quick to set up.
Cactus Spam Filter FREE! [working-freeware]
http://www.codeode.com/spamfilter/
Cactus Spam Filter is a free easy-to-use spam blocker. It protects your inbox by learning to detect spam as it’s being used. After a short while it has adapted to
your personal mailbox and blocks out most of the junk e-mail. Since the filter becomes personal, spammers will not be able to fool it. Even though this is a brutal,
merciless spam killer, no e-mails will get lost unless you delete them. Installation is very simple. No setup is required in your e-mail client; this spam stopper
integrates seamlessly with all e-mail clients that use POP3. It has been successfully tested with Microsoft Outlook, Microsoft Outlook Express, Netscape, Opera,
Mozilla, Mozilla Thunderbird, Eudora, Pegasus Mail, IncrediMail, Foxmail, POP Peeper, Command Line POP Client, The Bat!, and Phoenix Mail.

SpamAssassin [working-freeware]
http://spamassassin.apache.org/
The Powerful #1 Open-Source Spam Filter Features: Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures.
This makes it harder for spammers to identify one aspect which they can craft their messages to work around. Free software: it is distributed under the same
terms and conditions as other popular open-source software packages such as the Apache web server. Easy to extend: Anti-spam tests and configuration are
stored in plain text, making it easy to configure and add new rules. Flexible: Spam Assassin encapsulates its logic in a well-designed, abstract API so it can be
integrated anywhere in the email stream. The Mail::SpamAssassin classes can be used on a wide variety of email systems including procmail, sendmail, Postfix,
qmail, and many others. Easy Configuration: SpamAssassin requires very little configuration; you do not need to continually update it with details of your mail
accounts, mailing list memberships, etc. Once classified, site and user-specific policies can then be applied against spam. Policies can be applied on both mail
servers and later using the user’s own mail user-agent application.
Comodo AntiSpam
http://www.comodo.com/home/email-security/anti-spam.php
Comodo AntiSpam easily integrates into your email system to block spam and junk mail without keeping wanted mail from reaching your inbox.

CA (Computer Associates) Anti-Spam [shareware]
http://home3.ca.com/STContent/Products/All_Products.aspx?sc_lang=en-US
CA Anti-Spam is the effective and easy-to-use spam filter that makes sure you get messages from people you know, while redirecting messages from people
you don’t. There are no complicated rules or filters to create or manage: CA Anti-Spam does it for you. And it works seamlessly with Microsoft Outlook and
Outlook Express to stop unwanted junk mail and fraudulent phishing scams, letting you take control of your Inbox. PC Magazine Editors’ Choice Award 3
years running!

SpamBully 4 for Outlook and Outlook Express [shareware]
http://www.spambully.com/
End your spam nightmare and make email enjoyable again by keeping your Inbox free of annoying spam. Our intelligent spam filter for Outlook and Outlook
Express analyzes email so effectively that in many cases it is more …

ANTIVIRUS PROGRAMS ~Free Home versions

Windows OneCare Antivirus is now Free from Microsoft and very highly rated, Certified and has won the VB100 Award ! Now called Microsoft Essentials…..
About Microsoft Security Essentials (5* Stars!)
http://www.microsoft.com/security_essentials/
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft
Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is
protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.
Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without
interruptions or long computer wait times.

AVG Anti-Virus Free Edition [working-freeware]
Download, Information at this website :
http://www.download.com/AVG-Anti-Virus-Free-Edition/3000-2239_4-10320142.html
http://www.grisoft.com/
AVG Free Edition is the well-known antivirus protection tool. AVG Free is available free of charge to home users for the life of the product. Rapid virus database
updates are available for the lifetime of the product, thereby providing the high level of detection capability that millions of users around the world trust to protect
their computers. AVG Free is easy to use and will not slow your system down (low system resource requirements). Highlights include automatic update functionality,
the AVG Resident Shield, which provides real-time protection as files are opened and programs are run, free Virus Database Updates for the lifetime of the product,
and AVG Virus Vault for safe handling of infected files.

ClamWin Free Antivirus [Open Source – working freeware]
http://www.clamwin.com/
ClamWin is a Free Antivirus for Microsoft Windows 98/Me/2000/XP and 2003. ClamWin Free Antivirus comes with an easy installer (and open source code). You
may download and use it absolutely free of charge. It features: High detection rates for viruses and spyware; Scanning Scheduler; Automatic downloads of
regularly updated Virus Database. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer; Addin to Microsoft Outlook to
remove virus-infected attachments automatically. The latest version of Clamwin Free Antivirus is 0.88.2.3 . Please note that ClamWin Free Antivirus does not
include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.

Avast AntiVirus Home Edition [working-freeware]
http://www.avast.com/eng/avast_4_home.html
Free avast! 4 Home Edition. avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use. Institutions
(even non-commercial ones) are not allowed to use avast! Home Edition. However, ALWIL Software provides the full line of avast! antivirus products at special
discount prices for non-profit, charity, educational and government institutions. Please see our price lists for details.

BitDefender Free Edition
BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. If you are on an “always-on”
Internet connection, we strongly advise you to consider using a more complex antivirus solution.
http://www.bitdefender.com/PRODUCT-14-en–BitDefender-Free-Edition.html
Glary Utilities 100% freeware
http://www.glaryutilities.com/
Glary Utilities is the #1 free, powerful and all-in-one utility in the world market! It offers numerous powerful and easy-to-use system tools and utilities to fix, speed up, maintain and protect your PC.

Article: NetworkworkWorld.Com – 15 free downloads to pep up your old PC
Can’t afford a new PC? These free tools for Windows will help breathe new
life into your old machine…..
http://www.networkworld.com/slideshows/2009/111909-free-downloads.html?source=NWWNLE_nlt_daily_am_2009-11-24#slide2

Advanced SystemCareT Free v3
http://www.iobit.com/advancedwindowscareper.html
Trusted by 35 Million Users to Care for Their PCs
Works with: Windows 2000/XP/Vista

Glary Utilities
http://www.glaryutilities.com/gu.html
Works with: Windows 2000/XP/Vista

WinPatrol
http://www.winpatrol.com/
Works with: Windows 9x/Me/XP/Vista

Autoruns
http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx
Works with: Windows XP/Vista

Secunia Personal Software Inspector (PSI)
http://secunia.com/vulnerability_scanning/personal/
Works with: Windows 2000 SP4/XP SP2 or later/Vista

Eusing Free Registry Cleaner
http://www.eusing.com/free_registry_cleaner/registry_cleaner.htm
Works with: Windows 9x/Me/NT/2000/XP/2003/Vista

Free Registry Defrag
http://www.registry-clean.net/free-registry-defrag.htm
Works with: Windows 98/ME/2000/XP/2003/Vista

PC Decrapifier
http://www.pcdecrapifier.com/download
Works with: Windows XP/Vista

CCleaner
http://www.ccleaner.com/features
Works with: Windows 98/Me/2000/XP/Vista

SkyDrive
http://skydrive.live.com/
Running out of disk space, but don’t want to spend the money for a new hard
disk? Here’s a simple solution — use this free online storage service from
Microsoft. You get 25GB of free online space to do anything you want with.

Belarc Advisor
http://www.belarc.com/free_download.html
Works with: Windows 95/98/Me/2000/XP/Vista

SpeedFan
http://www.almico.com/speedfan.php
Works with: Windows 9x/Me/2000/XP/Vista

Wubi Ubuntu Installer
http://wubi-installer.org/
Sometimes you want a new PC because you’d like a new operating system, but
your PC’s processor and RAM can’t handle a new one. Here’s a way to get the
best of both worlds: Use this free program to install a dual-boot version of
Ubuntu Linux on your PC.
Works with: Windows 98/2000/XP/Vista

Comments Off on PC Help
%d bloggers like this: