The type of data retrieved by these programs includes, the users internet surfing habits, online purchases and even keystrokes such as passwords. The programs may even change the computers setting and functionality. Anti-spyware software seeks to block and remove such programs.
- Removal of cookies and internet history.
To remove cookies in Google Chrome
Click on the "Tools" menu and select "Options".
Click the "Under the Bonnet" tab, locate the "Privacy" section and click the "Clear browsing data" button.
Select "Delete cookies and other site data" to delete all cookies from the list (alternatively, you can remove all cookies created within a specific time period by selecting the period you want from the dropdown list).
Select "Clear browsing history" to delete traces of which websites you've visited.
Then click on the "Clear browsing data" button.
Click on the Close button when you've finished.
To remove cookies in Internet Explorer 8:
Click "Safety" on the Command bar
Select "Delete Browsing History"
Select the option for cookies and click Delete.
- Drive cleaning:
Disc Cleanup utility is already available to use from the operating system. To use this features click on Start, All programs, Accessories, System Tools and Disc clean up.
- Drive scanning:
To run disc check on a hard drive:
Open the Start Menu and click on the Computer button.
Right click the hard disk drive that you want to check, and click on Properties.
Click on the Tools tab, and click on the Check now button.
To start the drive scanning click Start.
- Drive defragmentation:
To open the defragmentation utility in Vista/Windows 7:
Press the start button and type disc frag in the search box the utility should appear in the programs section.
To open the defragmentation utility in Windows XP:
Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
Click the volume that you want to analyse.
Click Defragment to begin the operation.
- Anti-virus software:
- Protect your PC from viruses and spyware.
- Block malicious changes to your applications.
- Block email and image spam.
- Secure your network.
- Stop attacks on your PC from nefarious websites.
- Prevent access to inappropriate websites.
- Validate wireless hotspots and Wi-Fi networks.
- Protect your information from online theft.
- Firewall
Firewalls protect private local area networks from threats from the Internet. Consequently, many networks are now connected to the Internet where Internet connectivity would otherwise have been too great a risk.
Firewalls allow network administrators/user to offer access to specific types of Internet services to selected network users. This selectivity is an essential part of any information management program, and involves not only protecting private information assets, but also knowing who has access to what. Privileges can be granted or declined.
Firewall utilities can be found in most antivirus software and are easy to use, the software should prompt you if you would like to allow access to internet?
- Ant spyware:
Document how and why we do the following:
- The safe cleaning of hardware e.g. keyboard, mouse, displays and ventilation grills.
Keyboard cleaning: The computer keyboard is often the most germ infected items in your home. Cleaning it can help remove any dangerous bacteria. Dirt, dust and hair can also build up causing the keyboard to not function properly.
-
The steps below show how to clean a keyboard.
- Before cleaning the keyboard first turn off the computer.
- If you're using a USB keyboard unplug it.
-
An effective method is to use compressed air.
- Compressed air is pressurized air contained in a can with a very long nozzle.
- Aim the air between the keys and this should blow away all of the dust and debris that has gathered.
- A vacuum cleaner can also be used.
-
The steps below show how to clean a monitor.
-The glass monitor screen can be cleaned with ordinary household glass cleaner.
-Be sure to remove power from the monitor.
-Spray the cleaner onto a cloth so the fluid doesn't leak into the electrical components inside the monitor.
-Vacuum off any dust that has settled on top of the monitor.
-
The steps below show how to clean a computers ventilation grills:
- You will need to use compressed air.
- Start by powering down your PC.
- Removing the case lid, and locating the various fans.
-
Starting with the power supply, blow through the internal slits from inside the chassis, aiming so dust will exit the back.
- Replace consumables e.g. Printer paper, ink or toner cartridges.
- Wait for the current print job to finish
-
Pull out the bottom tray of the printer.
- Lie the paper flat down into the paper tray.
- Do not fill the paper to the brim; otherwise you might cause a paper jam.
- Fill the bottom tray up with the standard-sized printer paper.
- Then close the tray once you have finished.
- You are now ready to continue printing.
- Replace damaged components:
- It is very important to wear a antistatic wrist strap to prevent damage to the components while working inside the computer.
- The first step to replacing a power supply or any other component in a PC is to unplug the power cable from the back of the power supply.
- The next step is to remove the cover from the case; cases vary from brand to brand.
- After removing the four mounting screws from the old PC power supply, it is ready to be replaced.
-
The new power supply should have instruction on how to fit the unit but basically just screw the unit back to the case with the screws provided.
- The first step to replace a CPU is to remove the heat sink.
- All modern CPU's require an active heat sink; the leading cause of CPU failure is probably fan failure.
- Since the CPU can overheat and sustain damage if there's not enough cooling air flowing over the fins.
- All modern CPUs require some sort of thermal material be added to the die to improve the thermal interface with the heat sink.
- The final step is reconnecting the power to the heat sink fan to the CPU fan point on the motherboard.
Use of antivirus protection can protect computer system from online threats but this has a drawback on the computers performance. In the context of administering computer systems, defragmentation is a process that reduces the amount of fragmentation in file systems.
It does this by physically organizing the contents of the disk to store the pieces of each file close together and contiguously. It also attempts to create larger regions of free space using compaction to impede the return of fragmentation.
Some defragmenters also try to keep smaller files within a single directory together, as they are often accessed in sequence. The movement of the hard drive's read/write heads over different areas of the disk when accessing fragmented files is slower compared to accessing a non fragmented file in sequence, without moving the read/write heads.
While cookie files are quite small, they can still build up and slow down your system performance. When too many cookies are allowed to accumulate, those unneeded files can bog down the system and cause it to run more slowly than it should. By taking the time to delete the cookies and temporary Internet files from your computer, you can increase the speed and performance of your web browsing software.
Sufficient hard drive space is an important consideration for computer users, and deleting cookies on a regular basis will free space on your hard drive. When you start to run low on hard drive space, you may notice a decrease in performance and an increase in the number of system crashes. That is because the operating system will use hard drive space to mimic physical memory, and if sufficient space is not available, the performance of the computer will suffer. Clearing that hard drive space by deleting your cookies can increase the performance of your computer.
While many cookies are harmless, others can be used to track your every move on the Internet. Businesses often use these tracking cookies to study consumer behaviour, but many computer users consider them an invasion of privacy. By setting your web browser to delete cookies each time you close your browser, you can thwart these tracking attempts and reduce the risk of a security breach.