- pcminds

Home Page

Desktops Hardware

Internet Explorer

Fix Repair Windows

Internet Security

Windows Vista / XP

Memory Help


Printers Help


How To Use Email

 


Help Keep Children Activities Safe Online Parental User Accounts


 We found some pages with help about Parental Controls which can  help keep children safe while online. To use these features, you need to set up user accounts, plus we have links with instructions on how to set up Parental Controls and activity reports for both Windows Vista and XP.
From Parental Controls panel, review easy read activity reports that show how much your children have been using the computer. Monitoring your children's computer behavior helps make it easy for you to keep track of what they are seeing, hearing, and doing, and also enables you to refine and modify parental controls based on actual feedback. View sample pictures and description.
Vista Features Parental Controls

In Windows XP and Vista, a user account is a collection of information that tells Windows what files and folders you can access, what changes you can make to the computer, and your personal preferences, such as your desktop background or color theme. User accounts make it so that you can share a computer with several people, but still have your own files and settings. Each person accesses their user account with a user name and password. Administrator accounts are the default type of account for Windows XP.

What's the difference between Administrator and Limited User accounts?
An Administrator account is an account that lets you make changes that will affect other users, such as changing security settings. You can access all the files on the computer from an Administrator account.
A Limited User account lets you use most of the capabilities of the computer, but only an Administrator can make changes that affect other users.
Applies Vista WinXP.
How to add user accounts and view XP display pictures
XP User Setup Help

This Paper offers Windows Vista help for securing your machine, Word
 


Comcast Free Norton Antivirus Bloated


Comcast replaces free McAfee Antivirus
with new Norton 360 version 4.0
by Mike Wells pcminds

Customers Complain:

 The problem with Norton version 4.0, a replacement for McAfee is, it is one huge resource hog. If you don't have at least 2GB of memory on your computer, you will probably find that it will slow your computer down enormously. The install I did on a persons computer went smooth and easy. If you are someone who likes to tweak around and do periodic maintenance tasks yourself, Norton has lots of stuff it can do for you. But if you have insufficient memory to handle this program, you will have to  disable many of the added features. If you don't know how to do this yourself, then you will probably need Support to help, or uninstall Norton and use something else.

Too Much Unnecessary Stuff:
The antivirus, spyware remover and firewall are all that you need. You can basically turn the rest of the bloated program off. Unneeded Add ons - Norton has phishing, safe site detection, but if you have Firefox or Internet Explorer, you already have these features, and they are turned on by default. You don't need Norton.  Norton has a registry cleaner! Another memory hog. There are registry cleaner programs specifically designed to do this, which are superior. Use them. If you are not experienced, do not use anything. Messing with the registry can cause your computer to stop working correctly. Norton has a defragmenter program for your hard drive and by default the setting is "on," which takes up extra memory. Windows has a defragmenter program already, which can be used when you want and not automatically scheduled to run. Turn off Norton. Norton has antispam detection which has default set to "ön"... Turn Norton off to save more memory and speed up computer performance. If you use remote email, you have a spam, junk filter usually included. Comcast, Hotmail, Yahoo, and more all have filters. If you use Outlook or other, you should have this feature, or download a less memory consuming freebie.

Norton has "add on" Toolbar with features you don't need. Toolbars use lots of memory, especially if you already have one installed. On Internet Explorer, find "Tools" up top, click, find "manage add ons," then click and uncheck Norton. Toolbar removed. Norton has a feature which lists all programs on your computer and all running processes. Useful, but Windows already has many system devices to monitor this. Turn Norton off. Norton has a delete Temp file and Temporary files and cookies cleaner. This is an antivirus program. Windows has all this stuff. Norton has System backup feature. Norton has files clean up. Windows has this too. Norton has start up menu features which turns off unnecessary programs running at start up. Windows has this. Turn them "all" off. There are "many" more features Norton has thrown in on this program that simply should not be included with an antivirus program. It just eats up memory and slows your computer down. You need to go through Norton and check the settings, or get help. The McAfee Antivirus Comcast freebie, did not have all these unneeded features. Easy install, moderate memory consumption. If you want to do any of the maintenance tasks, find free smaller individual programs. You use each program when needed and turn it off when done. They don't stay on. Norton has all these features, "packed in" and turned on all at once. It's like running several maintenance programs all at the same time.

If you have enough memory, Norton, all bloated, will still work if you don't turn off extra features. If your computer is sluggish however, then use another antivirus program or turn the extra stuff off. Comcast should know better and probably worked a cheaper deal with Norton, so they switched. Normal Antivirus programs don't pack in all the waste and Comcast should offer another option for customers. When uninstalling, Norton also can be one of the hardest antivirus programs to remove, compared to other brand names. Hope this helped.
http://blog.comcast.com/2010/01/norton-security-suite-available-at-no-additional-cost-to-high-speed-data-customers.html
end

Internet Antivirus Security Help

We used an article for you from McAfee Antivirus site and it offers many helpful hints on avoiding viruses and help protecting Internet users from not so fun experiences.
The article mentions Comcast who provides online high speed Internet cable. Read the article and then we have more useful information for you.

From McAfee Antivirus Site Article
Tips More Secure Internet Experience
And Sync Magazine/Comcast Questions

 What are the primary security concerns that Internet users should be aware of?
Home users often do not maintain adequate security protection on their PCs, which makes them easy, lucrative targets for hackers and other cyber-criminals. There are several security concerns that Internet users need to be aware of, all of which can be avoided by installing up-to-date Internet antivirus security software and malware help.

By accessing the Internet from an unsecured PC, an Internet user is exposed to Spam, viruses, Spyware, Adware, Trojans, and dialers, and is therefore exposed to serious issues such as identity theft and the loss of valuable PC data including photos, movies, music, resumes, family information, antivirus and other irreplaceable documents.


The best way to protect your PC and identity is to use up-to-date security software. McAfee® Internet Security Suite, for example, provides comprehensive, multi-layered PC antivirus security against inbound and outbound Internet threats. It protects users from viruses, spyware, hackers, unwanted emails, phishing scams, and identity theft, all in one easy-to-install antivirus and easy-to-manage product.

How does McAfee help prevent Comcast customers’ personal information from being stolen? The single best step to help protect your PC and identity is to use up-to-date PC antivirus security software. McAfee Internet Security Suite provides comprehensive, multi-layered PC security against inbound and outbound Internet threats.
It helps protect you from viruses, spyware, hackers, unwanted emails, phishing scams, and more.

Antivirus:
Detect and blocks viruses before they infect your PC.
Spyware Blocker:
Detects and blocks potentially unwanted programs (PUPs), such as spyware and adware, before they can retrieve your personal information or slow your PC.
Firewall: 
Continuously monitors your broadband, dial-up, or wireless Internet connection, preventing unwanted traffic to and from your PC.
Spam Filter:
Helps keep your inbox free from unwanted, fraudulent, offensive, and phishing emails that deceive users into providing personal information to identity thieves.
Identity Prevention:
Protects your identity by alerting you before personal information is transmitted via an unsecured Internet connection.

How often should Comcast users check for McAfee updates?
Comcast users need not check for updates, as McAfee products are updated automatically, on a daily basis.
FYI - This needs to be set up for automatic or manual..

Beginners 50 Plus And Seniors:
Do you have any advice for people who want to protect themselves when paying bills online?
The U.S. Federal Trade Commission offers the following list of tips to help ensure that your online shopping experience is a safe one:

Use a secure browser that complies with industry security standards, such as Secure Sockets Layer (SSL). These standards scramble the purchase information you send over the Internet, helping to secure your transaction Shop with companies you know. Anyone can set up shop online under almost any name If you’re not familiar with a merchant, ask for a paper catalog or brochure to get a better idea of their merchandise and services. Also, determine the company’s refund and return policies before you place your order. These should be posted on the company’s web site Keep your password(s) private. Be creative when you establish a password, and never give it to anyone. Avoid using a telephone number, birth date or a portion of your Social Security number. Instead, use a combination of numbers, letters, and symbols Pay by credit or charge card.

If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. In the event of unauthorized use of your credit or charge card, you generally would be held liable only for the first $50 in charges. Some companies offer an online shopping guarantee that ensures you will not be held responsible for any unauthorized charges made online, and some cards may provide additional warranty, return, and/or purchase protection benefits Keep a record. Be sure to print a copy of your purchase order and confirmation number for your records. Also, you should know that the Mail and Telephone Order Merchandise Rule covers online orders.

Many companies explain their security procedures on their web site. If you don’t see a security description, call or email the company and ask.
Do you have any other tips for Comcast customers who want to protect themselves online? Here are several tips to protect your online experience:

Be smart when using instant messaging (IM) programs. If you use an IM program to communicate with friends and family, be careful about sending any personal information. Protect yourself by using a nickname for your IM screen name. Never accept strangers into your IM groups. Be smart about how you use IM at work because your employer may have the right to monitor and view your messages Watch out for phishing scams.

What Are Phishing Scams - fraud email and web sites, masquerade as legitimate businesses, to lure unsuspecting users into revealing private account or login information. Even if you have PC security, you still might visit a malicious web site without knowing it. Legitimate businesses will never ask you to update your personal information via email.

Always verify web addresses before submitting your personal information Use email wisely. Email is a great way to keep in touch with friends and family. Even if you have good security software on your PC, your friends and family might not have the right protection. Be careful about what information you submit via email. Never send your credit card information, Social Security number, and other private information via email Create smart and strong passwords. Make it difficult for hackers to crack your password.

You can create a smart password by incorporating capital letters, numbers, and special characters, and by using more than six characters.
An example of a strong password is: Go1dM!n3 Shop safely.
Many online stores have the right protection for you to purchase online.
But shop safely!

Vista and XP
Internet Explorer provides a Phishing Filter and it should be located top near right corner. Look for "Views" and click arrow for menu and find "Phishing Filter" which can help with "Phishing scams." Sometimes email filters can help with this problem, but not always, so be careful.

Email Links And Viruses
An email "link" or "attachment" from an questionable sender might release viruses into your computer and do lots of damage.  A link is not always obvious or a different color and it does not have to be text. When you move your mouse arrow around an email, if it turns into a hand on any "text" or "picture," then you are on a link. Click a link and you may be taken to place where a virus is released. Also watch for "photo" links.

A mouse arrow also turns into a hand when placed on an attachment. Email attachments are usually located near bottom of email. The email has a message and will try and get to, Open the Attachment. Some attachments will be a file with an extension .exe which means execute and clicking on that might be a virus or worm. Something not very nice. If you are not sure, do not click, just delete the email. Check and see if your email provider has an email virus scanner.
Stay Safe Online provides free and non-technical cyber security and safety resources to the public, so consumers, small businesses and educators have the know how to avoid cyber crime. This site has all kinds of information on Phishing and real examples of scams. antiphishing.org

Internet games are fun for the whole family. Make sure you are careful when playing online games, especially when chatting with other players. Be sure that your security software still functions when you are in game mode Pay attention to your children’s online activities. Keep your home computer in a community area and invest in child safety for your PC that is age appropriate. Limit your children’s time spent online and install and use parental controls software that allows you to monitor your children’s online activity. This will keep your children from accessing undesirable web sites and sharing personal information via online communications. staysafeonline
Always verify web addresses before submitting your personal information. People can protect themselves from phishing scams by never clicking on questionable links in emails and never transmitting sensitive data to companies by email.
Mcafee Find New Virus Information

Internet Security Information:

McAfee has a free SiteAdvisor which you download to your Browser, IE or other. It tells you security information on Internet Sites. For example, if safe to download or warns you about known and potential fraud scam web sites.
SiteAdvisor Video
Safety help security risks online and in Windows Programs
SANS top20
Malware is software designed to infiltrate or damage a computer system without any owner informed consent and malicious software program code. Learn More
Answers Malware




Learn About Spyware Firewall Malware


What Is A Firewall?
A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules.

Why do I need a firewall?
The Internet has revolutionized the way we communicate, shop, and bank, making it easier for users to reach out to any website or individual PC, at any time. Each unprotected connection, whether to or from the Internet, leaves your PC vulnerable to hacker attacks.

Whether you are on a home network, broadband or dial-up connection, or simply enjoying a hotspot, a firewall helps ensure your personal files and information are not compromised.

How does a firewall work?
A firewall filters and routes incoming traffic and makes outgoing requests (to the Internet, for example) on behalf of local workstations. A good firewall has complete inbound and outbound security, automatically trusting known good applications and blocking spyware, Trojans, and key loggers.

Copyright © 2003-2008 McAfee, Inc. All Rights Reserved.

Use this McAfee link and watch informative short security videos.
McAfee Antivirus

Video from McAfee Site Advisor for free and more helpful information.


FYI
Beginners 50 plus, seniors should ask experienced user for help..

Usually before you can install new antivirus software, you need to uninstall any existing security software program in your computer. Beginners may require help with any program removal and to identify the brand name, if any security software
currently installed. Most should uninstall fairly easy and may use an Uninstall Wizard to help. Sometimes Symantec, Norton, security software may require extra help. If there is a problem with uninstall use this tool and link.
Norton Uninstaller


Spyware is a program installed on your computer, with or without your permission that can change system configurations, monitor your Internet activity and broadcast the information back to an outside party, often advertisers. The milder forms of spyware are simply annoying, with increased spam and unwanted pop-ups; these are known as adware. Malware refers to more malicious programs that can rob your PC of its ability to run efficiently. The newer, more advanced forms can actually steal personal information like bank passwords or credit card numbers. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Occasionally, spyware authors will pay shareware creators to wrap-in spyware with their software.

If you really want to learn all about spyware view link
Lavasoft Spyware Education Glossary

What Are Cookies ?

Cookies:
A piece of data that a website -- or a third party that was commissioned or approved by the website -- saves on users' hard drives and retrieves when the users revisit that site. Some cookies may use a unique identifier that links to information such as login or registration data, online 'shopping cart' selections, user preferences, websites a user has visited. Cookies Definition

Tracking Cookies:
Tracking Cookie is any Cookie used for tracking users' surfing habits. Tracking Cookies are a form of Tracking Technology. They are typically used by advertisers wishing to analyze and manage advertising data, but they may be used to profile and track user activity more closely. However, tracking cookies are simply a text file, and a record of visits or activity with a single website or its affiliated sites.
Keylogger:
(or Keystroke Logger) Tracking Software that records keyboard and/or mouse activity. Keyloggers typically either store the recorded keystrokes for later retrieval or they transmit them to the remote process or person employing the keylogger. While there are some legitimate uses of keyloggers, but they are often used maliciously by attackers to surreptitiously track behavior to perform unwanted or unauthorized actions included but not limited to identity theft.
Registry:
A database integrated into certain operating systems which store information, including user preferences, settings and license information, about hardware and software installed on a user's computer. The individual entries in the Registry. The value of the keys is changed every time a new program is installed or configuration settings are modified. Spyware often changes registry key values in order to take control of parts of the system. These changes can impair the regular function of the computer.

Spyware is becoming more sophisticated and many applications are designed to spread themselves out on your PC, making it more difficult to wipe them out completely.
Summary from Lavasoft site.

Free Adaware Spyware Remover.
Download Ad-Aware-2008
We chosee this site to learn about Spyware, because they offer both a paid and free Spyware Blocker and are one of the more popular Spyware software sites. If you Internet Service provider does not offer free Spyware protection then free download here would be useful.
Click on one of the links above provided and Top find "Products"...
Click products and drop down menu appears...
Click on Adaware Free and on new page click download.

FYI
* Beginners 50 plus, seniors, might be wise to get experienced user to help install and then help with instructions on how to use Adaware Free 2008.
There are paid versions too here so ask your helper to compare.

FYI
PCTools AntiVirus Free Edition
PCTools AntiVirus
Free Spyware Malware Remover download and read reviews.
HijackThis


For reviews and downloads of many popular Security Software CNet link:
Download Firewall Antivirus Spyware


Spyware, antivirus, spam filters programs can be hard to learn even for experienced users. If you have a program that has received good reviews and feel is easy to use then some of the more complicated ones, please help by letting us know.
Plus:
If you live in within say fifty miles of DC please let us know if you like or dislike your current Internet Provider, including the online experience, price, phone support, for dial up dsl cable or other. Please email us a short review maybe 100 to 150 words.
Help us help


           Search Engines Explained And Security


Free Or Pay Stuff
During classes we found many people who had home computers and Internet service where unaware that many Dial Up, DSL, Cable and other services, include free antivirus software, firewall, spyware removers, spam filters and more!! Plus email too!

Many Beginners for some reason, were using Hotmail, Yahoo and other free email services. If you have no computer at home that's fine. If you have home computer with an Internet Provider, use their email!  It is probably better.. Less users, less ads and should have email spam filters, email attachment virus scan, and more features. Plus you can have several email addresses. Ask before you pay.

*Remember to update Antivirus, Spyware, Firewall often.
Why update so much?
Internet Security companies have a database of cures for viruses and spyware that were created in the past. But when some nice person releases a brand new virus or spyware, security software companies then work to find a cure for the new problem. If a cure has been added to the database 48 hours ago and you haven't updated your software for over a week, then your computer will not be protected.
*Update Windows for security!!
*Plus new security software is needs more memory these days.
If you don't have at least 1024 mb of RAM, you might want to ad more if you notice the computer is running slow.

Beginners 50 plus specifically, read information here use link:

Staysafe

1/18/10
Comcast customers still are provided with free anti-virus, firewall, and spyware, protection for free when using Comcast Internet service. Please verify this if you are interested in using this company because sometimes deals expire after a while.
Security Comcast
Verizon DSL also gives free antivirus and firewall when you use their high speed Internet and sign up for MSN package, or yahoo, again verify.
Verizon DSL

Plus, AOL dial up, uses Mcafee Antivirus protection, spyware and firewall may be different companies, please verify. Other Internet Service Providers may offer free Security software too. Before you subscribe to any Provider, ask if they include any. Also, ask companies who include free software, how long it is free.
Free software is nice.

There are many other reliable antivirus software companies and basically it is who you talk to as to who is considered the best. Ask a friends opinion. Security software prices are competitive between the companies.

IE Cookies View Download:
IE Cookies View Free Here
CNet Review:
Pros: It downloads in a zipped folder then you have to open the zipped folder, and double click set up and click run. Now you have to click file and installation options, and choose show shortcut on desktop so you have access to this program.
It shows the date when the cookies were created, accessed, modified and expiration date. And tells you if cookies are suspect, to block suspect cookies. Check the boxes and click edit go to cookie blocking options, and block selected cookies. One more feature is you can right click on any cookie, and it will open that web site. And it also shows user name and password, if you open and read the cookie.

Search Engines:
Search Engines are used to help you find web sites. Two of the most popular search engines are Google and Yahoo.
Type google.com in rectangular box up top, to use Google.
Type in keyword(s) ...
The keywords tell google what exactly you would like to search for.
Suppose you want to find information about, "astronomy clubs." Type those words and click on search button.
The "results" usually show up in a list of pages from web sites that match your search keywords. You should see title which are in larger letters and then a description as to what the main theme of the page or site is about. Click on the top title link, you will be connected to site. After you become more familiar with basic searches such as this, learn how to do a more efficient and specific keyword searches, because the amount of information that these search engines provide can be overwhelming. By narrowing your search to a specific "keyword phrase," you can find sites which will meet your needs much more quickly. We will teach how to do this in another lesson. Many search  engines display results fairly quickly. But, not necessarily in same order or same sites. Search Engines use specific methods and reasons when they display sites. Type the same keywords in various search engines and notice how they display results differently. Each Engine's Site list may be different in Site names and in order shown.    If you don't find the information you want try different keywords.
Microsoft Search Engine Tips
site map here