Tuesday, May 20, 2014

DEALING WITH MALICIOUS PC-SOFTWARE ATTACKS

Republished: 22 Apr 14
Posted:  21 Sep 13

IS YOUR PC (Not for Apple Computers*)
SLOWING DOWN 
OR BEHAVING WEIRDLY? 

It could be due to a stranger's sneaky mischief.
Sadly, malice or too-hasty downloads should be early suspicions.
A little preventive & corrective 
house-cleaning should save the day!

A.  Purpose

1.  To share some tools and experiences that might be well worth adding to your PC Security Toolboxes and regular computing routines.  I often use these daily, sometimes more or less -- usually, in combination -- depending on what I'm working on -- or on the problems that have cropped up. These tools help you to both find and remove the trouble-makers.

*(Sorry, no Apple experience.  
I've only used tons of PC's over 35 years -- circumstance dictates all!)

2.  Here's what's in my basic security arsenal, so far. They all have their strengths and weaknesses -- but, together, they make a strong and winning team for our side.  Your added suggestions and opinions -- in the comment section, below -- are most welcome.

3.  Surprisingly, it almost takes more time to tell than to actually use.  A breeze, once you become familiar -- and even that's a breeze.

4.  To make it easy for you to get these programs, I've attached handy hyperlinks to the vendors' websites, below (except for Norton Security Suites -- you'll need to get your own high-speed provider's security software directly from them)

4.  CNET.COM is a good, reputable, well-documented source or gateway for free and paid downloads, but note the precautions in paragraph 2, below.

***************
B.  The Straight Scoop

1.  STANDARD GEAR -- Norton Security Suite -- came free (meaning, at no extra charge -- it's built-into total cost) with my Comcast subscription.  Been around a long, long time. Proven reliability. Well-maintained.  Saved my bacon, countless times. Set to run automatically.  Good basics, but sometimes needs help.  Whatever came with your high-speed service is probably just fine for this purpose.

Be sure to look at all things your various security software can do for you.  Sometimes you need to start things, deliberately, in order to optimize -- like de-fragmenters, registry cleaners, back-ups, file clean-ups, memory and processor behaviors, and the like.


2.  A PRECAUTION ON THE FREE DOWNLOADS -- Be alert -- don't rush to click check-boxes without looking closely --  Here's where you can hassle yourself -- a hasty click might give you unwanted programs, piggy-backed with the ones you wanted -- which can result in a lot of time-wasting surgery to remove them.  Open eyes will reduce open-mouthed screams.

For example:  You might get to a choice like this, during the downloading process: "recommended" versus "advanced or custom" checkboxes. If you wisely ignore the recommendation, you'll get to see exactly what you're getting. by clicking "custom" -- when it opens, simply uncheck what you don't want -- then, proceed with the download.  I find UNWANTED TOOLBARS to be especially annoying to remove.

Some downloads offer freebies with an option to "DECLINE."  I use that option often.  If I want it, then I accept it -- or would have asked for it.  Usually, I don't -- so, "decline" is a good buddy.


3.  MALWAREBYTES -- An awesome free program -- I've loved it for years. I run this daily, to augment Norton Security Suite and the others.  It finds and fixes many things that are missed.  Very quick, too.  It has more powerful paid versions, but the free one is satisfactory for most uses. I had used it so often, I began to feel guilty, so eventually, I bought the paid version from this loyal, reliable friend (fair is fair)
.

4. HITMAN PRO -- A phenomenal "second opinion" program -- I'm in love with it -- it does the really deep detective work for me -- This super-power is free to try for 30 days.  It's so good, I had to reward them (and myself) with a purchase, for even more power (and longevity of use).  You'll see.  AND, IT'S FAST, FAST, FAST. (I run this automatically, on reboot and during idled periods.


5. CCLEANER --  in their own words:

"CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. [Additionally it contains a fully featured registry cleaner (pay attention when using this).]  But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware!"

'Nuff said -- except that it's all true.  (I run this every week or so)


***************

C.  Finally -- a fantastic, different-purpose program 

-- and a MUST for your toolboxes, 
called BELARCADVISOR.  

In their own words: "The Belarc Advisor builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server."

  • This magnificent free program is an absolute blessing.  
  • For your own troubleshooting or to inform help-desks, here's the information you'll want to have handy -- information you might not be able to get, even if you opened your machines and looked -- so cool!   So thorough!  So clear!  So precise!  ELEGANT'S THE WORD!
  • I've loved it for years, now.   
  • This one you won't need to run every day -- only after big changes or every few years.
  • Just run it the first time and when you need to freshen up the information it provides.  
  • Print the results for your equipment history files. 

***************

HERE'S TO HAPPIER COMPUTING 
-- the world is much better that way.  


David Nelson


All Original Content © 2013 , The MENTOR Enterprises / ELMS, All Rights Reserved -- BUT, I hereby waive those rights, to this extent: You may freely copy and pass this along, if you think it will do some good -- as long as it's free of charge, unchanged, and you include this statement.

No comments:

Post a Comment