Clean up your PC Some things to do
Minimum Memory • XP – 1 Gig • Vista/W7/8 • At least 2Gig
Which OS version • 4 GB or less 32 bit • Else 64 bit OS • To address hard drive over 2.2GB need a 64 bit OS
Do not install more than one AntiVirus • Will slow machine down
Registry Cleaners do not do much
Do not run speedup/startup managers • Most people do not need them
Malwarebytes • Very Good cleaner of annoying and dangerous downloads • Recommend Pro
Blocking Bad Places Pro
My Recommendations
Problems with Antivirus Very Subjective
Problems AVG –slows machine, false positives BitDefender slows machine Norton Bad in Past , very difficult to remove, slow ESET Techie, Firewall issues with sharing Kaspersky Very Techie, difficult to use
Do not say yes to free scan or programs
Browser add-ons • Coupons • Games
Reset browsers Firefox
IE
Three Essential Steps to Make Yourself More Hack-Proof • Look, there’s no hiding from being hacked. Everything is vulnerable, and if you haven’t been personally affected by a data breach yet, you will. But while you can’t ever protect yourself 100 percent from malicious data theft, you can at least put a better lock on your door than the one your neighbor has. These three simple tips will go a long way toward helping you avoid having a hacker rifling through your files.
1. Don’t Reuse Passwords If they get you, this is how you’ll get got. Password reuse is a huge problem. That’s because when one service has a breach (say, LinkedIn or Adobe), people rush to try the exposed passwords on other sites—especially email, social media, and banking. If you use the same password multiple places, it makes you only as secure as the most vulnerable target. The same thing goes for your clever password schemes, too. If a human being can’t figure out the slight variations you’ve set up to track your Gmail, Facebook, and Wells Fargo passwords, a machine will.
2. Set Up Two-Factor Authentication I know two-factor authentication sounds a little scary. It even sounds a little scary when you call it two-step authentication. I know. But basically, it just means that when someone tries to log into an account from a new location (a different computer, a different phone, whatever) they also have to enter a code that’s sent to a trusted device. This usually means that you’ll get some sort of text message with a six-digit number you have to enter if you want to, say, log into Facebook from a computer in the library (bad idea!) or reset the password on your Google account. The thing you should know about two-factor is that once you have it set up, which is typically an easy process, you’ll rarely have to actually use it. It’s mostly a set it and forget it operation.
3. Use a Password Manager A good password manager will help you create and manage strong passwords that you can use to log in from the Web or your mobile device. All you’ll ever need to know is the master password. The rest of your passwords are encrypted, and can only be unlocked by that master password. You can use a password manager to both generate and track new passwords, and to perform a password audit of your existing ones. Dashlane, 1Password, Keeper and LastPass are all great options.
Roboform Everywhere • Works on all devices • Autofill forms • Remember passwords • Windows , Android, Ipad, Mac • Separate class hopefully
System Restore • Restores to an earlier time • Does not affect documents
Backup Sometimes Bad Things Happen
At least two Backup Types Online
Local
Pick up a hard disk • Less than $100 • Consider not keeping it connected
• There are virus that will encrypt your data
• CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows[1] and was first observed by Dell SecureWorks in September 2013.[2][3] CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin. • Although CryptoLocker itself is readily removed, files remained encrypted in a way which researchers considered infeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.