You are on page 1of 163

Table of Contents

Glossary . . . . . . . . Page 6

Implementing preventive measures on PC Components

Introduction . . . . . . . Page 10
Mouse . . . . . . . . Page 10
Keyboard . . . . . . . Page 10
Drives
Floppy drive . . . . . . Page 11
CD-ROM drive . . . . . Page 11
Hard Disk drive . . . . . Page 11
Monitor . . . . . . . Page 12
Printer . . . . . . . . Page 12
Review Questions . . . . . . Page 12

How to keep computers safe from the humidity

Introduction . . . . . . . Page 13
Some basic tips . . . . . . Page 13
Review Questions . . . . . . Page 13

Basic Hardware Troubleshooting

Introduction . . . . . . . Page 14
Typical Hardware Problems
Mouse . . . . . . . Page 14
Keyboard . . . . . . Page 15
Floppy disk drive . . . . . Page 16
Hard disk drive . . . . . Page 17
Monitor . . . . . . Page 18
Review Questions . . . . . . Page 20

User accounts and security

Introduction . . . . . . . Page 21
The two different types of accounts . . . . Page 21
User Accounts
Creating user accounts . . . . . Page 21
Deleting User Accounts . . . . Page 23
Exercises . . . . . . Page 25
Review Questions . . . . . Page 26
Passwords and User Accounts
Introduction . . . . . . Page 26
Creating a passwords . . . . . Page 26
Exercises . . . . . . Page 28
Review Questions . . . . . Page 29
Creating a Password Policy and an Account Lockout Policy
Introduction . . . . . . Page 29
Creating a password policy . . . . Page 29
Creating an account lockout policy . . . Page 31
-1-
Our recommendations . . . . . Page 32
Exercises . . . . . . Page 32
Review Questions . . . . . Page 33

Backups

Introduction . . . . . . . Page 34
Types of Storage Media . . . . . Page 34
General advice . . . . . . . Page 35
Backing Up and Restoring the Windows XP Registry
Introduction . . . . . . Page 35
Using the Windows backup program for system state . Page 36
Exercises . . . . . . Page 43
Review Questions . . . . . Page 44
Using Windows Backup to backup data
Backing up your data . . . . . Page 44
Restoring your data . . . . . Page 52
Exercises . . . . . . Page 56
Review Questions . . . . . Page 56

Windows XP System restore functions

Introduction . . . . . . . Page 57
Windows XP System Restore . . . . . Page 57
Enabling System Restore . . . . . Page 58
Manually Creating Restore Points . . . . Page 59
Restoring Windows XP to a previous state . . . Page 61
Deleting Restore Points . . . . . Page 64
Conclusion . . . . . . . Page 64
Exercises . . . . . . . Page 65
Review Questions . . . . . . Page 65

Operating System Updates

Introduction . . . . . . . Page 66

Service Pack 2 for Windows XP update section


Introduction . . . . . . Page 66
How to check what service pack is installed . . Page 66
Installing Windows XP service pack 2 . . . Page 67
Exercises . . . . . . Page 69
Review Questions . . . . . Page 69

Performing a manual Windows XP update


Introduction . . . . . . Page 70
How to find Windows updates . . . . Page 70
How to find updates for MS Office programs . . Page 73
Exercises . . . . . . Page 76
Review Questions . . . . . Page 76

Automatic Update for Windows XP


Introduction . . . . . . Page 77
Setting up Automatic Updates . . . . Page 77

-2-
Exercises . . . . . . Page 79
Review Questions . . . . . Page 79

Removing unwanted Programs

Introduction . . . . . . . Page 80
How to remove unwanted programs . . . . Page 80
Exercises . . . . . . . Page 81
Review Questions . . . . . . Page 81

Disk Management

Introduction . . . . . . . Page 82

Check Disk Utility (CHKDSK)


Introduction . . . . . . Page 82
Using the Check Disk Utility . . . . Page 82
Exercises . . . . . . Page 83
Review Questions . . . . . Page 84

Disk Cleanup Utility


Introduction . . . . . . Page 84
Starting Disk Cleanup . . . . . Page 84
File Categories in Disk Cleanup Utility . . Page 86
More Options Tab . . . . . Page 87
Exercises . . . . . . Page 88
Review Questions . . . . . Page 88

Disk Defragmenter Utility


Introduction . . . . . . Page 89
Using Disk Defragmenter . . . . Page 89
Exercises . . . . . . Page 93
Review Questions . . . . . Page 93

Viruses

Introduction . . . . . . . Page 94
Why do people write viruses? . . . . . Page 94
All about Viruses . . . . . . Page 95
How to Protect Yourself . . . . . Page 96
Installing and using anti-virus software
Introduction . . . . . . Page 98
How to install AVG anti-virus software . . Page 98
Exercises . . . . . . Page 108
Review Questions . . . . . Page 108
Macro virus security in Word/Excel
Introduction . . . . . . Page 108
Setting macro security levels . . . . Page 108
Exercises . . . . . . Page 110
Review Questions . . . . . Page 110
Further Resources . . . . . . Page 110

-3-
Spyware/Malware

Introduction . . . . . . . Page 111


Checking for Spyware and Adware
Installing and Using – AdAware
Introduction . . . . . . Page 111
Installing on your computer . . . . Page 112
Exercises . . . . . . Page 114

Firewalls

Introduction . . . . . . . Page 115


What a firewall does . . . . . . Page 115
Types of firewalls – hardware and software . . . Page 117
Review Questions . . . . . . Page 117
The Windows XP Internet Connection Firewall (ICF)
Introduction . . . . . . Page 118
Turning on ICF . . . . . Page 118
Exercises . . . . . . Page 122
Review Questions . . . . . Page 122
Third-party options
Zone Lab – ZoneAlarm . . . . Page 123
Exercises . . . . . . Page 123
Review Questions . . . . . Page 124
Checking the effectiveness of your Firewall
Introduction . . . . . . Page 124
Testing using shields-up . . . . Page 124
Exercises . . . . . . Page 126
Review Questions . . . . . Page 126

File Security

Introduction . . . . . . . Page 127


Setting Security for WinZip files . . . . Page 127
Exercises . . . . . . Page 131
Review Questions . . . . . Page 131
Setting Security for Word/Excel files . . . . Page 132
Exercises . . . . . . Page 134
Review Questions . . . . . Page 134
Setting Security for PDF files . . . . . Page 134
Exercises . . . . . . Page 139
Review Questions . . . . . Page 139

Browser and Internet Security

Introduction . . . . . . . Page 140


How to set your Internet Explorer Security options . . Page 140
Exercises . . . . . . Page 142
Review Questions . . . . . Page 143
Blocking pop-up windows in Internet Explorer . . Page 143
Exercises . . . . . . Page 147
Review Questions . . . . . Page 147

-4-
Advanced Topics

Introduction . . . . . . . Page 149

Computer and program freezes


Introduction . . . . . . Page 149
Starting the Task Manager . . . . Page 149
Using the Task Manager . . . . Page 150
Exercises . . . . . . Page 154

Blue Screens
Introduction . . . . . . Page 154
Definition . . . . . . Page 154
What is the Blue Screen of Death? . . . Page 155
What do I do after one occurs? . . . Page 156
Conclusion . . . . . . Page 158
Exercises . . . . . . Page 158
Review Questions . . . . . Page 158

What to do when Windows XP won’t start


Introduction . . . . . . Page 158
What to do
Method 1 . . . . . Page 158
Method 2 . . . . . Page 159
Method 3 . . . . . Page 159
Method 4 . . . . . Page 160
The Windows XP Recovery Console . . . Page 161

Check List . . . . . . . . Page 162

-5-
Glossary

Adware - Typically a separate program that is installed at the same time as a shareware or
similar program, adware generates advertising, and will often cause pop-up windows advertising
a website or product, even when you are not on the internet.

Automatic Updates - Updates from Microsoft Update can include those for Windows itself,
Office, SQL Server, and sometimes hardware drivers as well. These updates are primarily
security and bug-related fixes, although they occasionally contain new features.

Bandwidth - A measure of the capacity of a communications channel – like the telephone line
or your ADSL Internet connection. The higher a channel's bandwidth, the more information it
can carry or the faster your connection is.

BIOS - Basic Input/Output System - The BIOS is built-in software that determines what a
computer can do without accessing programs from a disk. On PCs, the BIOS contains all the
code required to control the keyboard, display screen, disk drives, serial communications, and a
number of other functions.

Blue Screen Of Death (BSOD) - The blue screen of death is a rather frightening display image
containing white text on a blue background that is generated by Windows operating systems
when the system has suddenly terminated with an error.

Boot - To start up or turn on your computer.

Boot Sector - The very first sector on a hard drive. It contains the codes necessary for the
computer to start up. It also contains the ‘partition table’, which describes how the hard drive is
organised. Also called the ‘Master Boot Record’.

Cache - A memory area where frequently accessed data can be stored for rapid access, the
location where visited web pages are stored, enabling them to be displayed more rapidly at the
next visit.

Clean install – When an operating system such as Windows XP is installed on a computer as a


new operating system instead of upgrading an old operating system.

Command prompt - A screen symbol such as C:> that requests user input. Also called the MS-
DOS prompt / a symbol that appears on the computer screen to indicate that the computer is
ready to receive a command.

Cookie – A small text file of information that certain Web sites attach to a user's hard drive
while the user is browsing the Web site. A Cookie can contain information such as user ID, user
preferences, shopping cart information, etc. Cookies can contain Personally Identifiable
Information.

Critical update - A critical update is a broadly released fix for a specific problem that addresses
a very important fix for either the operating system or program on your computer.

Dialog box - a window that 'pops up' to gather additional information or to allow you to
change settings.

-6-
Dial-up Connection - A type of Internet connection that is made by connecting a normal
telephone line to the phone jack at the back of a computer which, in turn connects to the
internal modem of the computer, and allows the user to dial a phone number of an Internet
Service Provider (ISP) and connect to the Internet.

Driver – A program that contains instructions that allows the computer to communicate with
its peripheral devices (eg. printers, digital cameras, scanners etc).

Emergency boot floppy - A floppy disk which can be used to boot the system if the hard disk
has suffered damage on its file system.

File infector: A type of virus that attaches itself to another program file. They infect your
computer when the program is launched.

Firewall - Computer hardware and/or software that limits access to a computer over a network
or from an outside source like the Internet.

Hard drive - A computer's internal disk drive. The hard drive stores all the computer's
information and retains the information when the computer is turned off.

Hardware - The physical components of a computer system. Reference is often made to


"hardware" and "software"; in that context, "hardware" consists of the computer itself, input
and output devices and other peripheral equipment (printers, scanners etc).

Hoax – A hoax is designed to trick you - an untrue, invalid, or outdated email message written
to convince the recipient to send the message to others.

Install – “Installing a program” means putting a new program onto a computer.

Internet Explorer – Also known as ‘IE’ – this is a computer program made by Microsoft that
you use to look at websites, or ‘browse’ the Internet.

Internet Service Provider (ISP) – A company that you usually have to pay to give you access
to the internet (like Csloxinfo, TOT etc)

IP address - Each machine connected to the Internet has an address known as an Internet
Protocol address (IP address). The IP address takes the form of four numbers separated by
dots, for example: 123.45.67.890

Master boot record - The first logical sector on a disk, this is (usually) where the BIOS looks to
load a small program that will boot the computer.

Metadata - "data about data." Contrast the actual data that the file contains, which is referred to
as "user data".

Network – Is concerned with communication between computers. The computers can be


separated by a few meters (e.g. via Bluetooth) or thousands of kilometres (e.g. via the Internet).

Operating System – An operating system (OS) is the program that, after being initially loaded
into the computer by a boot program, manages all the other programs in a computer. For
example Windows XP, Windows 98 & Linux are Operating Systems.

Partition – A division of the hard drive.

-7-
Ports - a port is like a invisible ‘doorway’ into and out of your computer. A place where
information goes into or out of a computer.

Proxy - Server placed between a user's machine and the Internet. It can act as a firewall to
provide protection and as a cache area to speed up Web page display.

Recovery Console - The Recovery Console is a Windows XP feature that helps you restore
your operating system when you cannot start your computer.

Remote Desktop utility – A utility built into Windows XP that allows you to remotely connect
to another computer on your local network, and you will see the other computer’s desktop on
your computer.

Restore point – By creating a restore point, you can save the state of the operating system and
your data so that if future changes cause a problem, you can restore the system and your data to
the way it was before the changes were made.

Scan - To search backward and forward at high speed.

Service Pack - Service Packs offer convenient, all-in-one access to the most up-to-date drivers,
tools, security enhancements, and other critical updates.

Software - Programs that run on a computer (eg Microsoft Word, Excel, Photoshop etc). Also
known as ‘Applications’.

Spyware - Any software that secretly gathers user information through the user's Internet
connection without his or her knowledge, usually for advertising purposes.

Stop error - Stop Errors are errors that result in the Blue Screens of Death (BSOD) you get
with Windows XP & Windows 2000 often occurring when you start your computer.

Trojan horse - A virus that disguises itself as something else – often something desirable. They
usually don't replicate, but if they are launched (by opening a program file or executing some
other action to trigger it), they wreak havoc on your computer by destroying files or changing
data. They usually come in the form of e-mail.

UPS - Uninterruptible Power Supply – something the allows your computers to stay on when
the power in the building goes off. It is a device that plugs into your power outlets and you then
plug your computer, monitor, and other components into. It uses a battery to make sure that the
computer will stay on even if there is a power outage.

Utility – A software program that aids in system management or performs a useful job for the
users

Virus – a software program capable of reproducing itself and often capable of causing great
harm to files or other programs on the same computer

Voltage - The driving force behind the flow of electricity somewhat like pressure is in a water
pipe. Electrical force, or pressure, that causes current to flow in a circuit.

Windows Component - One element of a larger system. A reusable program that performs a
specific function and is designed to work with other components and programs.

-8-
Windows Security Centre (WSC) - Part of Windows XP (introduced with service pack 2) that
is used to monitor essential security elements of the system.

Windows XP Automatic Updates – See ‘Automatic Updates’

Wizard – A pop-up window that will let you do something on a computer using simple, step-
by-step instructions.

Worm - A computer worm is a self-replicating computer program, similar to a computer virus.


A virus attaches itself to, and becomes part of, another program; however, a worm is self-
contained and does not need to be part of another program to propagate itself.

Zip file - A file or group of files that have been compressed in order to take up less space on a
hard drive or download faster over the Internet.

-9-
Implementing preventive measures on PC
Components
Introduction

For smooth functioning of a computer, all the


components of a computer need preventive
maintenance. Examples of these components
are:

• Mouse
• Keyboard
• Drives
ƒ Floppy drive
ƒ CD ROM drive
ƒ Hard Disk drive
• Monitor
• Printer

All these components require regular


maintenance. However, the methods and
procedures to clean and maintain these
components vary.

Mouse

If you are using a mechanical mouse, the mouse ball or rollers easily collect dirt even if you
cover the mouse when you do not use it. This affects the cursor movement. To avoid this, you
need to clean the mouse ball and rollers.

To clean the mouse, follow these steps:


1. Switch off the PC.
2. Disconnect the mouse from the computer.
3. Locate the cover at the back of the mouse. Open the cover
4. Remove the ball from the bottom of the mouse.
5. Wash the ball in a soapy water to remove the dirt.
6. Clean the rollers with a cotton swab dipped in isopropyl alcohol.
7. Dry the ball and rollers with a lint-free cloth.
8. Put the ball and cover back in place.
9. Connect the mouse to the computer.

Keyboard

Keyboard also accumulates dirt. This affects the working of


the keyboard and causes the keys to stick with the dust
particles on being pressed. The dust particles can also cause
short-circuit, which results in incorrect characters being
displayed on the screen. Liquids such as tea or coffee spilled
on the keyboard can also cause a short-circuit. To avoid this,
cover the keyboard when not in use.

- 10 -
To clean the keyboard, follow these steps:
1. Switch off the computer.
2. Disconnect the keyboard from the computer.
3. Remove the key tops from the keyboard.
4. Blow the dust using a vacuum cleaner.
5. Clean the key tops with a cotton swab dipped in denatured alcohol.
6. Dry the key tops with a lint-free cloth.
7. Put the key tops back in place
8. Connect the keyboard to the computer

Drives

Standard PC(s) consists of a floppy drive(s), a CD-Rom/CD-writer/DVD drive, and a hard disk
drive(s). These drives are fixed inside the system; however, these drives accumulate dust with
time.

Floppy Drive(s): A floppy may not be accessible if dirt


has accumulated in the floppy drive. Dirt can also cause a
floppy to get corrupted. To avoid this, clean the floppy
drive head using a floppy drive cleaning kit. The kit
contains a cleaning disk and a bottle of isopropyl alcohol.

The steps to clean the floppy drive are as follows:


1. Put a few drops of isopropyl alcohol in the access
hole of the cleaning disk.
2. Insert the cleaning disk in the floppy drive. When
the disk spins over the head, it cleans the head.

CD-ROM/CD-writer/DVD Drive: To clean the CD-ROM/CD-writer/DVD drive, you


need a CD lens cleaner, which is similar to a CD but has a tiny brush on track zero.

The steps are as follows:


1. Insert the CD lens cleaner in the CD-Rom drive.
2. Access the drive. When the CD lens cleaner rotates, the brush cleans the CD lens.

Hard Disk Drive: The hard disk is a sealed unit and


therefore it needs less maintenance. As a preventive
measure, you must check the following issues:
• Heat: A new hard disk generates lot of heat
while running. To control the heat, ensure
that the interior case has sufficient cooling
and ventilation. Avoid placing the hard disk
between other hot components and prevent
it from excessive dust.
• Vibration: A new hard disk vibrates more
when it runs at high speed. If a hard disk
begins to vibrate more over time than it did
before, it indicates some problem.
• Shock: Many people prefer carrying hard disk drives from one place to another,
though it is not recommended by the manufacturer. Hard disks are prone to
permanent damages when moved out of a computer while the disks inside are
still spinning

- 11 -
Monitor

Monitors consist of two types, Cathode Ray Tube (CRT) and flat
panel Liquid Crystal Device (LCD). Monitors gather dust quickly
due to static charge generation. Therefore, the outer case and
screen require regular cleaning.

The correct way to clean the monitor depends on the type of


monitor:
• CRTs: Use a cloth dampened with water or a mild window
cleaning solution to wipe the glass screen and clean the
monitor case. Alternatively, you can use moistened paper
towels to clean them. Do not spray any liquid directly on
the screen. Never open the monitor case which contains
electric voltage that can cause a shock.
• LCDs: Use a soft, dry cotton cloth or a small amount of isopropyl alcohol with
dampened cloth to remove finger prints and smudges from an LCD screen. To avoid
any damage, do not use paper towels, sharp objects, and strong cleaners such as
ammonia to clean an LCD screen.

Printer

A printer can gather dust while printing. Bits of


paper can also gather inside the printer. The dust
particles and bits of paper produce electrical
charge that is harmful for the components of the
printer. The dust particles are also responsible for
mechanical wear and tear of the components of
the printer. To avoid this, insert papers with clean
edges and stack them evenly in the printer tray.
Remove bits of paper that are stuck in the printer
using tweezers. If you open the printer for repair,
clean it using a vacuum cleaner.

Review Questions
Question 1: Which of the following computer components require maintenance?
F Mouse
F Keyboard
F Printer
F All of the above

Question 2: What problems can you can face if keyboard is not maintained properly?
F The keys might stick with the dust particles.
F Incorrect characters display on the screen.
F Liquids spilled on the keyboard can cause an electrical short circuit.
F All of the above.

Question 3: To clean the CD-ROM drive, you use:


F CD lens cleaner
F Tiny brush
F Cotton swab dipped in cleaning alcohol

- 12 -
F None of the above

Question 4: You should only perform maintenance on your computer components when
something goes wrong.
F True – handling computer components too much can cause damage.
F False – performing regular maintenance may stop problems happening in the first
place.

How to keep computers safe from the effects


of heat and humidity
Introduction

It's not just people that suffer in the hot weather. Hot temperatures can create problems for
hard drives, and computers can suffer big problems due to lightning strikes and flooding in
storms.

Storms hold dangers for hardware too — power surges, floods and lightning strikes can all cause
problems for computers and even completely destroy them.

Some basic tips:

Here are some tips to keep your computers running happily through the heat and humidity.

1. Keep computers in a cool, dry area to prevent them from overheating (getting too hot).
2. Don't have too many computers running off one power supply or power board. If the
power socket is affected by a power surge, then all the machines could suffer damage.
3. Install a surge protector between the power socket and the computer's power cable.
Some brands offer guaranteed lightning protection.
4. Organisations with networks should get surge protectors to stop power spikes which can
be transmitted through network cables.
5. At least once per year users should inspect power protection devices to make sure they
are functioning properly.
6. Ensure computer equipment has its own power circuit, so it isn't sharing the power with
air conditioners, fans and/or other devices.
7. Turn off and disconnect the power cord during an electrical storm.
8. Turn off power during a blackout. When power is restored after a blackout, the
electricity supply can initially be inconsistent, which can cause damage.
9. High voltages can enter the computer through a phone line connected to the modem.
To protect your computer during electrical storms, unplug the telephone line from the
modem jack or use a telephone line surge suppressor.
10. Organisations with network servers should invest in some form of uninterruptible
power supply (commonly referred to as a UPS).

Review Questions
Question 1: High voltages (too much electricity) can enter the computer through which of the
following?
F A phone line connected to the modem.
F The power cable.

- 13 -
F A network cable attached to the computer.
F A wireless (wi-fi) connection.
F All of the above.

Question 2: It is better to place computers in a cool and dry area.


F True – It will help stop the computer from overheating.
F False – The computer will not overheat as it has its own fan.

Basic Hardware Troubleshooting


Introduction

In this section we will describe some of the more common hardware problems that may occur
with your computers. Please note that there are many problems that can occur with computers
so we will only cover the main components as discussed in the previous section.

Typical Hardware Problems


Mouse problems

A mouse is a hardware device which allows the user to control a cursor to control data without
complicated commands.

1. Problem: Mouse acting unevenly and/or is


not moving properly.

Cause: This issue can occur because of one of


the possibilities below. These may vary
depending upon the type of mouse you have
connected to the computer.

• Mouse is not clean.


• Optical portion of mouse is
blocked.
• Moisture or other material on finger.

Solution:

Mouse is not clean:

Users who have a mechanical mouse (most


common mouse for desktop computers) are
likely experiencing strange behaviour because
the mouse is not clean or is dirty. Clean the
mouse as described in the section earlier in the
workbook.

Optical portion of mouse is blocked:

Users who have an optical mouse are likely experiencing strange behaviour because a
portion of the optical eye is blocked. Most commonly this is caused by a hair.

- 14 -
Moisture or other material on finger:

Users who are using a touchpad (as found on a laptop) may experience strange
behaviour because of moisture or other material on the finger such as lotion.

Keyboard problems

1. Problem: Keyboard error when starting computer.

Cause: An error with the keyboard can be caused by any of the below possibilities.

• Keyboard is not connected properly.


• Stuck key.
• Faulty keyboard.
• Faulty connection port on the keyboard.

Solution:

Keyboard is not connected properly

Verify that the keyboard is connected properly to the computer by disconnecting and
reconnecting the keyboard to the computer.

Stuck key

Ensure that there are no stuck keys on the keyboard. If


all keys appear to be ok and you have a standard
desktop computer with keyboard, attempt to turn
keyboard over and gently hit the back of the keyboard
to loosen any dirt or hair that may be stuck in the
keyboard.

Faulty keyboard

Try another keyboard on the computer to verify that the keyboard has not become
faulty.

Faulty connection port on the computer

If all of the above solutions are not able to resolve your issue it is likely that the port on
the back of the computer may be faulty. You will need to take the computer to a
technician to fix this problem.

2. Problem: Not all keys on keyboard work.

Cause: This issue is generally caused by a bad keyboard or software preventing these
keys to be pressed.

Solution:

- 15 -
Make sure that the key is not working in another program. It is possible that some keys
may not be used in all programs. This generally always applies to the Function keys F1
through F12.

If not all keys are working in all programs try running a simple program like [Notepad]
and check to see if the key is working in that program.

If it appears that a substance has been spilt into the keyboard, please refer to the section
earlier in the workbook about cleaning a keyboard.

If all the above suggestions have been completed it is likely that the keyboard and/or
keys are faulty and it is recommended that the keyboard be replaced with a new one.

Floppy drive problems

1. Problem: Unable to read floppy disk.

Cause: This issue could be caused by one of the below possibilities.

• Faulty floppy disk.


• Faulty floppy disk drive.

Solution:

Faulty floppy or error with disk

This issue is most often caused by a faulty floppy disk. Try other floppy disks in the
computer. If other disks are able to be read in your computer it is likely to be a faulty
disk.

If the disk contains valuable information or information that is only able to be found on
this disk, try reading the disk in another computer. If the disk works in the other
computer it is still likely errors exist with the disk; copy the contents of the disk to the
computer and try using another floppy disk to transfer the information.

Faulty floppy disk drive

If no floppy disk can be read in the computer, but other computers read the disk, refer
to the issue discussed below for floppy disk drive troubleshooting.

2. Problem: Basic floppy disk drive troubleshooting.

Cause: A floppy drive may not work because of one or more of the below reasons.

• Faulty floppy disk.


• Faulty hardware.

Solution:

Faulty floppy disk.

Make sure that the floppy disk that you are attempting to
read from is not write protected or faulty. Verify that the

- 16 -
disk is not write protected by sliding the tab into the position not allowing light to shine
through it. If you do not have a tab, place tape over this hole.

Because of the technology of floppy disk drives, it is very easy for a floppy disk to
become faulty.

If other floppies work it is likely that you may have a faulty floppy disk.

Faulty hardware.

If you continue to have problems after following the above steps it is likely that
hardware within the computer is faulty. You can try to clean the floppy drive by
following the steps in the first section or take the computer to a technician.

Hard Drive problems

1. Problem: Sector not found error

Cause: This issue occurs when the hard drive is


faulty or starting to fail.

Solution:

Unfortunately this error usually means that the drive


is faulty and starting to fail and therefore must be
replaced.

You may be able to resolve this issue by running a


checkdisk (chkdsk – refer to section later in this
workbook) and having the checkdisk utility mark the
sectors as bad. However, it is recommended that the drive be replaced as eventually it
will completely fail.

2. Problem: Fixed disk failure.

Additional Information: You may get one of the following errors when you first turn
on your computer.

• Fixed disk 0 failure


• Fixed disk 1 failure
• Fixed disk C failure
• Fixed disk D failure

Cause: This issue is probably caused by a hard disk drive that has failed.

Solution:

Bad hard disk drive

Most of the steps required to determine if a hard drive has completely failed are fairly
technical (and not covered in this course). Your best option is to have a technician look
at the computer for you.

- 17 -
Monitor problems

1. Problem: No display on monitor.

Cause: This issue can be caused by any of the below possibilities.

• Connections not connected properly.


• Monitor settings are not correct.
• No Post.
• Hardware issue.

Solution:

Connections not connected


properly

Make sure that you are


connecting the monitor to the
back of the computer in the 15
pin or older computer 9 pin
connection.

If the computer is properly


plugged in, ensure that the
computer monitor is getting
power.

If you are not receiving power


from a known working wall
outlet and if the power cord is
removable, replace it with the one connected to the computer and attempt to turn on
the monitor again. If the monitor still does not get power or the power cable is not
removable, it is recommended that the monitor be replaced or serviced at a computer
repair shop.

If the monitor is receiving power, check the status light.

If the light is orange or flashing ensure that the monitor is not in a suspend mode by
moving the mouse or pressing a key on the keyboard. If the computer does not get a
display by moving the mouse or touching the keyboard, turn off the computer and
monitor and reconnect the data cable from the back of the computer, and if removable,
the back of the monitor. Turn the computer back on; if you still encounter the same
issue, continue reading through the other possibilities.

Monitor settings are not correct

Ensure that the brightness and contrast is turned up or attempt to change the brightness
and contrast. If changing the brightness or contrast has no affect on the monitor
continue reading through the other possibilities.

- 18 -
No Post

Does the computer beep when it is first turned on and/or does it appear that the
computer is doing anything? If the computer does not beep or beeps strangely it is
possible that the computer itself has a hardware problem or in technical terms - is
exhibiting a ‘No Post’.

Hardware Issue

If you have followed the above recommendations and are still encountering the same
issue, it is likely that the computer may have either a bad video card or monitor. The
best method of determining this is to do one or both of the following:

• Disconnect your monitor and attempt to connect it to another computer.


This can be a friend or family's computer and/or it can be taken to a service
centre.
• Borrow a computer monitor and connect it to your computer. This will not
harm the other computer monitor in any way.

If your monitor works on another computer it is safe to assume that the video card on
your computer is bad.

If another monitor works on your computer it is safe to assume that your monitor is
bad.

2. Problem: Monitor colours are strange.

Cause: This issue can be caused by one of the below reasons.

• Monitor cable is defective.


• Monitor is bad.

Solution:

Monitor cable is defective

Disconnect the monitor from the back of the computer and verify that there are no
bent, burnt or broken pins on the cable connection.

If the end of the cable appears to be fine, reattach the cable and ensure it is firmly
connected to the back of the computer. If you continue to experience the same issue,
continue reading through the other possibilities.

Monitor is faulty

If you have verified that the cable is not defective and is firmly connected to the back of
the computer, unfortunately, it is likely that the cable connected to the monitor or the
actual monitor is faulty. It is recommended that it be taken to a computer technician.

3. Problem: Monitor clicks, pops, or makes other noises (CRT monitors only.

Cause: This issue could be caused by any of the below possibilities:

- 19 -
• Monitor degaussing.
• Monitor changing resolution.
• Monitor syncing with the video card.
• Monitor warming up.

Solution:

Noise when turned on or off

It is normal for standard computer monitors to make a click, pop, crackle, hum, buzz, or
other type of noises when they are first turned on or turned off.

Noise when monitor goes into standby mode

When the monitor enters a "standby mode" or "power savings mode" this is similar to
the monitor being turned off. It is completely normal for the monitor to make a noise
when the monitor enters this mode.

Noise when opening Microsoft Windows or other operating system or when


opening a game

When a computer opens its operating system, for example, a computer opening
Microsoft Windows or when a user runs a computer game it is very common that the
monitor will need to switch its resolution of the operating system or game. When
switching resolutions it is normal for the computer monitor to make some type of noise
and/or for the computer monitor to flick or flash.

Noise during normal operation

If the computer monitor click, pops, or flashes while it is being used this is not normal
operation. It is very likely that the monitor may be failing or a component within the
monitor has already failed and could also potentially catch on fire. We highly
recommend that the monitor be repaired, replaced, and/or looked at by a computer
technician.

Review Questions
Question 1: If you turn on the computer and it displays an error message saying ‘Fixed disk C
failure’, it is quite likely a serious problem that needs a technician to fix.
F True
F False

Question 2: If your monitor isn’t working, and you unplug it and connect it to another
computer and it still isn’t working, the problem is likely to be:
F Your computer’s video card is bad.
F Your monitor is bad.
F Both computers have a problem.
F None of the above.

- 20 -
User accounts and security
Introduction - Why Set Up Separate User Accounts?

Windows XP allows you to establish separate accounts for each person who uses your
computer. But if the only people who use your computer are family, why would you establish
separate accounts for each person?

Setting up separate accounts for each person who uses your computer provides the following
benefits:

• Users can change the way Windows and the desktop looks just for themselves.
• Users can have their own list of Favourites and recently visited websites in Internet
Explorer or other browsers.
• Users can keep their files in a separate My Documents folder and password protect their
files.
• Users can place files in a shared document folder if they want other users to be able to
read or modify them.
• Administrators can protect important computer settings.

Two different account types – Administrator and Limited

Windows XP provides two different types of user accounts: limited and administrator.
Administrator accounts have unlimited access to the computer, while limited accounts have
some restrictions. One significant difference between limited and administrator accounts is the
ease with which both types of users can download and install programs.

Since it's easy for you to download and install programs while using an administrator account,
it's also easier for attackers to download and install programs to your computer without your
knowledge. If an attacker entices you to visit their Web site and you're using an administrator
account, the attacker may be able to put programs on your computer that could delete your files,
spy on your activity, use your computer to attack others, and more.

In contrast, if you're using a limited account when you visit an attacker's Web site, it is less likely
the attacker will be able to download and install the program or file that's necessary to infect
your computer.

As a result, using limited accounts in Windows XP for daily use can reduce your risk of being
the victim of a computer attack.

How to Create a New Windows XP User

1. To start, click on [Control Panel] in the [Start] menu.

2. Click on the [User Accounts] icon.

Please note: If your Control Panel looks different from the one pictured below, switch
to [Category View].

- 21 -
3. Under [Pick a Task], click on [Create a new account].

4. Enter a name for the new account and click [Next] as shown below.

- 22 -
5. Select the type of account you wish to create. In most cases, you probably want to create
a [Limited] account.

6. Click [Create Account] to create the account.

Deleting User Accounts

1. From the [Start] menu, click on [Control Panel].

2. Click on the [User Accounts] icon.

Note: If your Control Panel looks different from the one pictured below make sure you
select [Switch to Category View].

3. Click on the account that you want to delete.

- 23 -
4. Click on [Delete the account].

Windows prompts you to decide if you want Windows to save some of the user's files
and settings. If you want Windows to keep the files, click [Keep Files]. Otherwise,
select [Delete Files].

- 24 -
5. Windows prompts you to ensure you want to delete the account. Click [Delete
Account] to permanently delete the account.

Exercises
Exercise 1: Create 3 new user accounts as described below on your computer using the
instructions above.
• User name – ‘your name’ with account type - Administrator.
• User name – ‘User 2’ with account type – Limited.
• User name – ‘User 3’ with account type – Limited.

- 25 -
Exercise 2: Log off from the current account and log on as ‘User 2’.

Exercise 3: Create a word document and save a copy in your ‘my documents’ folder and
another copy in the ‘shared documents’ folder.

Exercise 4: Check to see if you can see other users documents using ‘my computer’.

Exercise 5: Log off and log in using your newly created admin account under your own name.

Exercise 6: Try and find both copies of the file you created using ‘my computer’.

Exercise 7: Delete the user account for ‘User 2’ including all of their files using the instructions
above.

Review Questions
Question 1: Why is it a good idea to set user accounts to ‘Limited’ type accounts?
F If your computer gets a virus, it is possible that not as much damage will be done.
F It makes it harder for someone to install harmful programs on your computer.
F It can help stop users from accidentally making changes to programs when they
shouldn’t.
F All of the above.

Question 2: When deleting an account, if you choose to delete the files when asked, it will
remove the following.
F ‘My Documents’ folder.
F Web page favourites.
F Desktop settings.
F Any shared documents they created.
F All of the above.
F None of the above.

Passwords and User Accounts


Introduction

During Windows XP installation you are asked to enter a password for the Administrator
account. When installation completes you are asked to create additional user accounts. These
user accounts are separate and apart from the Administrator account as evidenced if you try and
use “Administrator” as a choice during installation. XP will deny its use and require you to enter
a different user name. After these user names (at least one) have been entered XP continues to
load. By default, these additional user accounts are not password protected. After the process is
completed, you have the option of password protecting these additional accounts.

Creating passwords

To set passwords for these additional user accounts follow these steps:

1. Click on [Start] and then select the [Control Panel] and then [User Accounts]. The
following screen will be displayed.

- 26 -
2. Select the user you wish to password protect. In this case, we have chosen the account
for [Mae Sot User]. The following screen will open.

- 27 -
3. To create the password for the “Mae Sot User” account in the example above, select the
[Create A Password] option. The screen below will open.

4. Read the warning about losing certain stored items at the top, then complete the
password entry and confirmation fields. Passwords are case sensitive. If you want to add
a password hint, enter it in the last box and then click [Create Password].

When you select the user account at the logon screen a prompt for the password will
appear. If you have forgotten the password, click the question mark [?] and the
password hint you entered will appear. Type the password (case sensitive) and you will
be logged into XP. The [User Account] screen shown above can also be used to
change or remove passwords.

Exercises
Exercise 1: Create a new password for the ‘User 1’ account you created in the previous section.

Exercise 2: Add a password hint for the ‘User 1’ account.

Exercise 3: Log off and then log back on using the ‘User 1’ account. Can you view the
password hint? How do you view it?

- 28 -
Review Questions
Question 1: When you first create a new user, Windows XP sets a default password
automatically for you.
F True
F False

Question 2: If you add a password hint when creating a password for a user, the user will see
the hint when:
F They click on the ? on the login screen.
F If they try their password 3 times incorrectly.
F None of the above.

Question 3: A user can create any password that they want.


F True
F False

Question 4: You can choose to have a blank password if you want.


F True
F False

Question 5: Creating a short and easy password is good because:


F It makes it easy to remember.
F There is less chance that you will make a typing mistake.
F None of the above.
F All of the above.

Question 6: How many times can you try to guess your password?
F 1 time.
F 3 times.
F As many times as you want.

Creating a Password Policy and an Account Lockout Policy


Introduction

A Password Policy will help you to apply and maintain strong passwords, and having an
Account Lockout Policy in place will limit the number of repeatedly failed log on attempts to
your computer.

To create a Password Policy:

1. Go to the [Control Panel] and then select [Administrative Tools] and then [Local
Security Policy].

2. In the [Security Settings] tree, click [Account Policies] and then the [Password
Policy] folder as shown below.

- 29 -
3. To change the options to meet your needs, double click any of the options listed in the
right pane and adjust the properties as appropriate.

Notes on the available options:

• Enforce password history: This setting makes sure that a password can not just be
re-used. Set this policy to force a wider variety of passwords and make sure that the
same password is not re-used over and over again. In other words, if you set this
value to 3, then the user must use at least 3 different passwords each time they
change it before they can use one of their previous passwords.

You can assign any number between 0 and 24. Setting the policy at 0 means that
password history is not enforced. Any other number assigns the number of
passwords that will be saved.

• Maximum password age: This setting basically sets an expiry date for user
passwords. The policy can be set for anything between 0 and 42 days. Setting the
policy at 0 is the same as setting the passwords to never expire.

It is recommended that this policy be set for 30 or less to ensure user passwords are
changed on at least once a month.

• Minimum password age: This policy sets the minimum number of days that must
pass before the password is allowed to be changed again. This policy, in combination
with the Enforce password history policy, can be used to make sure that users don't
just keep resetting their password until they can use the same one again. If the
Enforce password history policy is enabled, this policy should be set for at least 3
days.

• Minimum password length: Generally speaking the longer a password is, the
harder it is for someone to work out the password and are therefore more secure.

With this policy setting, you can assign a minimum number of characters for
passwords. The number can be anything from 0 to 14. It is generally recommended
that passwords be a minimum of 7 or 8 characters to make them sufficiently secure.

- 30 -
• Password must meet complexity requirements: Having a password of 8
characters is generally more secure than a password of 6 characters. However, if the
8-character password is "password" and the 6-character password is "p@swRd", the
6-character password will be much more difficult to guess.

Enabling this policy forces users to include different characters into their passwords
which will make them harder to guess. The complexity requirements are:

o Password must not contain significant portions of the user's account name
or full name
o Password must be at least six characters in length
o Password must contain characters from at least three of the following
categories:
ƒ Uppercase characters (A through Z)
ƒ Lowercase characters (a through z)
ƒ Numbers (0 through 9)
ƒ Special characters (for example, &, $, #, %)

• Store Password Using Reverse Encryption For All Users In The Domain:
Enabling this policy actually makes the overall password security less secure. Using
reversible encryption is essentially the same as storing the passwords in plain-text, or
not using any encryption at all and it is recommended that you don’t turn this option
on.

To create an Account Lockout Policy

1. In the [Security Settings] tree, click [Account Policies] and then the [Account
Lockout Policy] folder as shown below.

2. To change the options to meet your needs, double click any of the options listed in the
right pane and adjust the properties as required.

- 31 -
Notes on the available options:

• Account lockout duration: This policy allows you to specify a time period after
which the account will automatically unlock and resume normal operation. If you
specify 0 the account will be locked out indefinitely until an administrator manually
unlocks it.

• Account lockout threshold: This policy determines the number of failed login
attempts allowed before the account is locked out. If the threshold is set at 3 for
example, the account will be locked out after a user enters incorrect login
information 3 times within a specified timeframe.

• Reset account lockout counter after: This policy defines a time period for
counting the incorrect login attempts. If the policy is set for 1 hour and the Account
Lockout Threshold is set for 3 attempts a user can enter the incorrect login
information 3 times within 1 hour. If they enter the incorrect information twice, but
get it correct the third time the counter will reset after 1 hour has elapsed (from the
first incorrect entry) so that future failed attempts will again start counting at 1.

Our recommendations

Remember when changing these settings that sometimes people do make normal sorts of
mistakes and so you don’t want to make your policy settings so difficult that it becomes
annoying for your users. For example, it is quite common for someone to type there password
wrongly maybe 1 or 2 times so you wouldn’t want to lock them out for just making a simple
mistake.

For standard computers we would recommend:

• Account Lockout Threshold: A number between 3 and 5 should be ok to allow for


honest mistakes and typing errors.

• Reset Account Lockout Counter After: Using a time period between 30 and 60 minutes
should be enough to deter automated attacks as well as manual attempts by an attacker
to guess a password.

• Account Lockout Duration: A lockout duration of 1 hour to 90 minutes should work


well here.

Exercises
Exercise 1: Create a password policy for your computer so that the minimum password length
is 6 characters.

Exercise 2: Change the password for the ‘User 1’ account. Is your new password policy being
enforced?

- 32 -
Review Questions
Question 1: By creating a password policy on your computer, you can stop users from creating
very short and simple passwords.
F True
F False

Question 2: By using a password policy and an account lockout policy on your computer, it
will make it harder for someone to break into your computer.
F True
F False

Question 3: Is it possible to make your policies too difficult for the users of your computer?
F Yes
F No

Question 4: It is recommended that you make the users of your computer choose a password
that is at least 4 characters in length.
F True
F False

Question 5: It is recommended that you make the users of your computer change the
password at least once a month.
F True
F False

- 33 -
Backups
Introduction

In the field of computers, a backup refers to the copying of data so that these additional copies
may be restored after a data loss event.

Backups are useful for two main reasons:

1. To restore a computer to an operational state following a disaster (called disaster


recovery).

2. To restore small numbers of files after they have been accidentally deleted or corrupted.

Types of Storage media

Data has to be stored on some data storage medium somewhere. There are a large number of
storage media to choose from including:

• Magnetic tape

Magnetic tape has long been the most commonly used medium for large amounts of
data storage. Tape has typically had a much better capacity/price ratio when compared
to hard disks, but recently this ratio has become a lot closer. Tape is a sequential access
medium, so even though access times may be poor, the rate of continuously writing or
reading data can actually be very fast. Some new tape drives are even faster than modern
hard disks.

• Hard disk

The capacity/price ratio of hard disk has been rapidly improving for many years. This is
making it more competitive with magnetic tape for storing large amounts of data. The
main advantages of hard disk storage are the high capacity and speed.

• Optical disk

A CD-R can be used as a backup device. One advantage of CDs is that they can hold
650/700 MB of data on a 12 cm (4.75") reflective optical disc. (This is equivalent to
12,000 images or 200,000 pages of text.) They can also be restored on any machine with
a CD-ROM drive. CDs may all look the same, but there are different file formats for
different applications. Another common format is DVD-R.

• Floppy disk

During the period 1975–95, most personal/home computer users associated backup
mostly with copying floppy disks. The low data capacity of floppy disks make it an
unpopular choice in 2006.

- 34 -
• Solid state storage

Also known as flash memory, thumb drives, USB keys, compact flash, smart media,
memory stick, Secure Digital cards, etc., these devices are relatively expensive for the
amount of data that they can store, but they offer excellent portability and ease-of-use.

• Remote backup

As broadband internet access becomes more widespread, network and remote


backup/online backups are gaining in popularity. Backing up online via the internet to a
remote location can eliminate some worse case scenarios, such as someone's office
burning down to the ground along with the computer, its hard drive, and any on-site
backup disks. A problem with this type of backup is the speed of an internet connection
is usually much slower than the speed of local data storage devices, so this can be a
problem for people with large amounts of data. It also has the risk of losing control over
personal or sensitive data.

Some General Advice on Backups

• The more important the data that is stored in the computer the greater the need for
backing up these data.

• A backup is only as useful as its associated restore strategy.

• Storing the copy near the original is unwise, since many disasters such as fire, flood and
electrical surges are likely to cause damage to the backup at the same time.

• Automated backup should be considered, as manual backups are affected by human


error.

Backing Up and Restoring the Windows XP Registry


Introduction

The Windows XP registry is the database that contains settings for all the hardware and software
in the computer.

The Registry can be edited directly, but that is usually only done for very technical reasons or as
a last resort. A computer that has many applications and has been used for a while can easily
have a hundred thousand or more Registry entries.

There are two ways of backing up the registry; software based (refer to the next section in the
workbook) and direct access. The software based method is generally considered to be safer
(and easier), although a badly behaved piece of software that causes errors in the registry can
make you doubt the wisdom of this statement.

Directly accessing the registry is far more dangerous. For this reason, we will only use the
software method to make a backup of the registry.

- 35 -
Using Windows Backup to Backup the Windows XP Registry
Introduction

Here we will look at the software method using the standard Windows XP Backup utility.

Using the Windows Backup program

1. To start the backup program, go to [Start] then select [All Programs] and then
[Accessories], followed by [System Tools] then finally [Backup].

2. When you first start the backup program you will see the Backup or Restore Wizard.
Start by clicking [Next] as shown below.

3. Click [Next] making sure that the backup option is selected as shown below.

- 36 -
4. The next screen displayed gives you a number of options. To make a backup of the
registry, you need to select [Let me choose what to back up]. Select that option and
click [Next].

5. Select [System State] which will backup all applicable system information.

- 37 -
Notes on System State Data:

With Backup, you can back up and restore the following system components to back up
the System State:

Name of Component When this component is included in


System State?
Registry Always
COM+ Class Registration database Always
Boot files, including the system files Always
Certificate Services database If it is a Certificate Services server
Active Directory directory service If it is a domain
SYSVOL directory Only if it is a domain controller
Cluster service information If it is within a cluster
IIS Metadirectory If it is installed
System files that are under Windows Always
File Protection

Backup refers to these system components as the System State data. The exact system
components that make up your computer's System State data depend on the computer's
operating system and configuration.

6. Once you have selected the [System State], click [Next].

7. Choose the location you wish to backup to. Click [Next].

- 38 -
8. Click on the [Advanced] button if you wish to select additional options.

9. Here you can select your backup type.

- 39 -
Note: The backup types available are as follows:

Normal is the default and backups up daily normally. The other options changes the
type of backup, eg. a differential type of backup, backs up data that has changed from
one backup to another. Leave it as [Normal] and click [Next].

10. On the [How to Back Up] screen, we're going to add the [Verify data after backup]
selection so we can make sure the backup is good. Click [Next].

- 40 -
11. You can append the backup to an existing backup – adding to the data already present –
or you can replace the existing backup – remove those files. By appending, your disk
space will be quickly eaten up. Click [Next].

12. You can set a schedule for the backup to run at or just run it now. Click [Next].

- 41 -
13. Click [Finish] to complete the wizard.

14. The system will now begin backing up data.

- 42 -
15. Once it is complete, click [Close]. You have now backed up the folders you selected.

Exercises
Exercise 1: Backup the registry on your computer using the Windows backup program as
described above.

- 43 -
Review Questions
Question 1: The Windows XP registry can be backed up using the standard Windows backup
program.
F True
F False

Question 2: You can select to just backup the registry and none of the other system files when
using the Windows backup program.
F True
F False

Question 3: Once you have created a backup of your computers ‘System State’, a good
place to store the backup is on the desktop so that it is easy to find.
F True
F False

Using Windows Backup for data files

Backing up Your Data


Introduction

Though Microsoft has now included a “System Restore” functionality within Windows XP, it
does not replace the need for regular backups of your system and your data. System Restore is
designed primarily to offer unattended system file backups to prevent a new software install
becoming corrupt and destroying your computer. By performing regular system file backups,
Microsoft gives the option of quickly restoring your system to working order if something bad
happens.

This does not, however, backup any user data nor does it provide a complete system backup. To
perform these functions, Microsoft includes its own backup utility in Windows which you
should become familiar with.

Using the Windows Backup program

1. To start the backup program, go to [Start] then select [All Programs] and then
[Accessories], followed by [System Tools] then finally [Backup].

2. When you first start the backup program you will see the Backup or Restore Wizard.
Start by clicking [Next] as shown below.

- 44 -
3. Click [Next] making sure that the backup option is selected as shown below.

4. The next screen displayed gives you a number of options. The most flexible option is to
select [Let me choose what to back up]. Select that option and click [Next].

- 45 -
5. Select the folders you wish to backup. You can go several folders deep and select one if
you do not want the whole root directory. In addition, you can select [System State] as
we did in the previous section which will backup system information such as the
Registry in addition to the data that you select. Once you have selected your folders,
click [Next].

6. Choose the location you wish to backup to. Click [Next].

- 46 -
7. Click on the [Advanced] button if you wish to select additional options.

8. Here you can select your backup type.

- 47 -
Note: The backup types available are as follows:

Normal is the default and backups up daily normally. The other options changes the
type of backup, eg. a differential type of backup, backs up data that has changed from
one backup to another. Leave it as [Normal] and click [Next].

9. On the [How to Back Up] screen, we're going to add the [Verify data after backup]
selection so we can make sure the backup is good. Click [Next].

- 48 -
10. You can append the backup to an existing backup – adding to the data already present –
or you can replace the existing backup – remove those files. By appending, your disk
space will be quickly eaten up. Click [Next].

11. You can set a schedule for the backup to run at or just run it now. Click [Next].

- 49 -
12. Click [Finish] to complete the wizard.

- 50 -
13. The system will now begin backing up data.

14. Once it is complete, click [Close]. You have now backed up the folders you selected.

- 51 -
Restoring your data
1. To start the backup program, go to [Start] then select [All Programs] and then
[Accessories], followed by [System Tools] then finally [Backup].

2. When you first start the backup program you will see the Backup or Restore Wizard.
Start by clicking [Next] as shown below.

3. Click [Next] making sure that the restore option is selected as shown below.

- 52 -
4. Select the files you want to restore from the backup that you made earlier and then
click [Next]. You can select either a single file, multiple files or select folders to
restore.

5. Click on [Finish] to start the restore process.

- 53 -
6. If you want to change any of the advanced options, select the [Advanced] button. The
first advanced option allows you to restore the different location to the one that it was
backed up in. Make your selection and click [Next] to continue.

7. The next option determines what happens if the file you are restoring already exists.
Choose the appropriate option and click [Next] to continue.

- 54 -
8. The next option determines whether the security settings are restored and whether to
restore special system files. The default options can be selected here. Click [Next] to
continue.

9. Click [Finish] to start the restore process.

- 55 -
Exercises
Exercise 1: Make a backup of the [My Documents] folder using the instructions above.

Exercise 2: Delete a file from your [My Documents] folder (make sure that it’s not
something important just in case this exercise doesn’t work!!). Now try and restore just the
single file that you deleted using the restore function as described above. Were you able to
restore your file?

Review Questions
Question 1: When backing up your data files, you cannot backup the system information at the
same time.
F True
F False

Question 2: You can only use the Windows Backup program to make backups of your data
files.
F True
F False

Question 3: You can create scheduled backups using the Windows Backup program.
F True
F False

- 56 -
Windows XP System Restore Function
Introduction

With new programs being installed, viruses


infecting, and spyware lurking in your
browsers it is not uncommon for your
computer to suddenly stop behaving
correctly. In fact, it is almost guaranteed
that at some point your computer will just
not do what you expect it to. This is not
because your a lousy computer user or even
a bad person, this is just the life as we know
it when working with computers. Luckily
for us, Microsoft includes an application
called ‘System Restore’ into Windows XP
to help solve this problem. This section will cover what System Restore is, how it works, and
how you can use it to protect your computer.

System Restore

System Restore is a feature of Windows XP that allows you to restore your computer to a
previous known working state in the event of a problem. This is done without loss of personal
files or data such as word processing documents, spreadsheets, music, images, etc. This feature
is turned on by default and runs in the background making backups after certain events happen
on your computer. System restore functions are only available to an administrator of the
computer, therefore if you are not logged on as the administrator, you will not be able to follow
this tutorial.

System Restore protects your computer by creating backups of vital system configurations and
files. These backups are known as ‘restore points’. These restore points are created before
certain events take place in order to give you a recourse in case something bad happens during
that event. These events are as follows:

• If you install a new program then a new restore point will be created.
• Installation of Microsoft security and operating system updates will trigger a Restore
Point creation.
• If you choose to use system restore to restore to a previous restore point, system restore
will create a new restore point prior to restoring a previous state in case something goes
wrong.
• Before a Microsoft Backup Utility Recovery operation.
• By manually creating a new restore point.
• By default at a 24 hour interval a new restore point will be made. This restore point will
only be made if the system is in an idle state.
• If system restore is disabled and then reenabled a new restore point will be made.

These restore points contain configuration and settings and files that are necessary for your
computer to run correctly.

- 57 -
What System Restore does not store in a Restore Point include:

• Windows XP passwords and hints are not restored. This is done so that you do not by
accident restore an old password and then lock yourself out of the computer..
• Microsoft Internet Explorer passwords and hints are not restored.
• Any file types not monitored by System Restore like personal data files eg. Word
documents, pictures, power-point presentations etc…
• User-created data stored in the user profile

Enabling System Restore

NOTE: You need to be logged in as an Administrator to use System Restore. If you are not
logged in as an administrator you will not be able to follow these steps.

To enable system restore you should follow these steps.

1. By default system restore is enabled on Windows XP machines, so there is a good


chance that it is already enabled if this is your first time working with system restore.

2. You should first go into the [Control Panel] and then double click on the [System]
icon.

Note: If you are in the control panel and do not see the System icon, then click on the
link that says [Switch to classic view] in the upper left hand side of the window.

- 58 -
3. Now you should be able to see the [System] icon. After you double click on it you
should then click on the [System Restore] tab. If system restore is turned off you will
see an image like Figure 2 below.

4. If you see in the [Status] section that it is Monitoring a partition, then system restore is
already enabled and you do not have to do anything further.

5. If it is showing that it is turned off as shown above, then you should uncheck the
checkbox labelled [Turn off System Restore], and then adjust how much disk space
you want to allow system restore to use, which is by default 12 percent of your entire
disk space.

6. When you are done with making your settings, you should click on the [Apply] button.

Note: Since you are turning system restore back on, a new restore point will
automatically be made. After the new restore point is made, you should see in the status
section that system restore is monitoring the partition; which means it is enabled.

Manually Creating Restore Points

It is possible to manually make restore points when you wish by using the System Restore utility.
Common reasons to do this are because you feel have your computer set up perfectly and would
like to save that state in case something goes wrong in the future.

To create a manual restore point, follow these steps:

1. To open the utility, click on [Start], [All Programs], [Accessories], [System Tools]
then select [System Restore]. You will be presented with a screen similar to that
shown below.

- 59 -
2. To create a manual restore point select the radio dial labelled [Create a restore point]
and press the [Next] button. You will then be presented with a screen similar to that
shown below.

- 60 -
3. At this point you should type the name you would like this restore point to be referred
to in the [Restore point description] field. The current date and time will
automatically be appended to the name you choose.

4. When you are done, press the [Create] button. System restore will create the restore
point and give you a confirmation screen with information as shown below.

5. At this point you can press the [Close] button to close the System Restore utility.

Restoring Windows XP to a previous State

To restore Windows XP to a previous restore point you need to open the System Restore
Utility.
- 61 -
1. To open the utility, click on [Start], [All Programs], [Accessories], [System Tools]
then select [System Restore]. You will be presented with a screen similar to that
shown below.

2. You should select the radio button that is labelled [Restore my computer to an earlier
time]. When that is selected press the [Next] button. You will then be presented with a
screen similar to that shown below.

- 62 -
3. At this point you should select a restore point that you would like to restore. If a
particular day has any restore points created on it the date will be in bold. You can then
select the restore point by clicking once on its name and then pressing the [Next]
button.

4. At this point you will be prompted with a confirmation as to whether or not you want to
continue. If you do want to continue, you should press the [Next] button again,
otherwise press [cancel].

5. System restore will then shut down all open applications and reboot the computer.

6. After the computer is rebooted you will see a screen that contains information as shown
below confirming that the restoration to the restore point is complete.

7. If there are any problems with your computer since you restored to this restore point,
you can revert back to your previous settings by going back into the System Restore
Utility and selecting the [Undo my last restoration] radio button and pressing the
[Next] button as shown below.

- 63 -
Deleting Restore Points

There are three safe ways to delete restore points stored on your computer. These ways are
described below:

Disk Cleanup - Launch the Disk Cleanup tool and then select the more options tab. On this
tab you will find a section for System Restore. If you press the Clean Up button for that section,
Windows will delete all restore points except for the most recent one.

Turn off System Restore - Just by turning off System Restore all your restore points will be
deleted. Unless you want this to happen, be careful that you don't mistakenly delete all your
restore points by disabling system restore.

System Restore runs out of storage space - If system restore runs out of the storage space
that has been allocated towards its use, it will delete the oldest restore point in order to create
space for the new restore point.

Conclusion

The System Restore application is a powerful tool for keeping your Windows Installation
running smoothly and safely. If you use this feature you will be guaranteed to have a valid
restore point to revert to if any issues arise in the future.

- 64 -
Exercises
Exercise 1: We will demonstrate this as a group exercise in class.

Revision Questions
Question 1: If you restore your system back to a previous date, all your word documents that
you have created since will be lost.
F True
F False

Question 2: You need to be logged in as an Administrator to use System Restore.


F True
F False

Question 3: The system restore function is turned on by default if you are running Windows
XP.
F True
F False

Question 4: Why would you create a manual restore point?


F Because Windows XP won’t do it for you automatically.
F You know you are going to make a lot of changes to your computer and want a safe
restore point.
F Creating a manual restore point should be part of your maintenance routine.
F None of the above.

- 65 -
Operating System Updates
Introduction

Computers are becoming remarkably capable and advanced. The trouble is, so are the hackers,
viruses, and worms that threaten them. That's why Microsoft is helping users like you take a
proactive approach to protecting your PC, information, and privacy by providing you with
updates to your computer software.

Service Pack 2 for Windows XP


Introduction

Service Packs offer easy, packaged together updates for drivers, tools, security enhancements,
and other critical updates. The advantage of this full download is that it can be used on any
computer - plus it doesn't require an Internet connection to install once you have the service
pack. You can download SP2, burn it to CD and use it on multiple computers.

The latest service pack for Windows XP—Service Pack 2 (SP2)—is all about security
improvements, and it's one of the most important service packs ever released. Therefore it is
very important to make sure that your computer is running the latest service pack.

How to check what service pack is installed

So how do you know what is the latest service pack that is installed on your computer?

1. Locate the [My Computer] on your desktop and right-mouse click on it. From the
menu select [Properties].

2. You should then be shown a screen similar to the one below.

- 66 -
3. As you can see from the screen shot above, this computer has Service Pack 2 installed.
If your computer says Service Pack 1 then you need to upgrade to service pack 2. If
there is no mention of any service pack on this screen then you have no service packs
installed on your computer and you definitely need to install the latest service pack.

Note: If you have no service packs installed on your computer, it is not necessary to
install service pack 1 before installing service pack 2. It is perfectly ok to install service
pack 2 only.

Installing Windows XP Service Pack 2

If, after you have checked what service pack is installed on your computer, you need to install
service pack 2 on your computer, following these instructions to do so.

1. Service pack 2 for Windows XP can be downloaded from the Microsoft website but it is
a very large file and will take a long time! You can also find it on your training CD
under the [Windows XP SP2] folder.

2. Once you have the service pack, double click on the program icon to start the
installation process and follow the wizard process.

3. Once the installation is complete, the computer will restart and you will be shown the
following screen. You can either choose to turn on the [Automatic Updates] feature
now or do it later (refer to the section on Automatic updates in this workbook for full
details on how this works).

- 67 -
4. Once the service pack has finished installing, you can confirm that it has worked ok by
right-mouse click on [My Computer] and choosing [Properties]. You now should see
[Service Pack 2] mentioned as shown below.

- 68 -
Exercises
Exercise 1: Use the instructions above to work out what service pack is installed on your
computer. Is it the latest version?

Exercise 2: Only do this exercise if you don’t have the latest service pack installed on your
computer. Install service pack 2 using the file found on the training CD.

Review Questions
Question 1: What is the latest service pack available for Windows XP?
F Service Pack 1
F Service Pack 2
F Service Pack 3
F None of the above

Question 2: It is very important to have the latest service pack installed on your computer as
service packs include updates that can solve a lot of security problems with Windows XP.
F True
F False

- 69 -
Performing a manual Windows XP update
Introduction

Windows Update is website where you can find the most recent updates for your operating
system, software programs, and hardware. Windows Update scans your computer and lists the
updates needed on your computer. Then you can choose whether to download and install
them.

How to find Windows Update

1. Start by running Microsoft Internet Explorer.


2. Select the [Tools] menu then click [Windows Update].

3. Click [Review your update history] to view a complete list of completed updates and
when they were installed on your computer.

- 70 -
To find available updates:

1. Open Windows Update.


2. Click either [Express] or [Custom] button to find out about recent releases for your
computer. Note: It is highly recommended that you select the [Custom] option as
this allows you to review what updates are available and provides further information
before allowing you to selectively choose which updates you want to download and
install.

- 71 -
3. Select [Review and install updates] if there are updates available for your computer.
If you click on an update, you will be provided with further information about that
particular update including download size and the estimated time to download.

- 72 -
Notes:

• The first time you go to the Windows Update Web site, click [Yes] when prompted to
install any required software or controls.
• To use Windows Update, you need to establish a connection to the Internet.
• You might need to be logged on as an administrator or a member of the Administrators
group in order to perform some tasks.

To find available updates for Microsoft Office programs

Introduction

Just as it is important to make sure you have the latest security patches and updates for
Windows XP, it is important that your Microsoft Office programs also have the latest security
patches and updates installed on your computer to help protect against any security threats.

Finding the updates

1. Open the [Windows Update] webpage as described in the previous section.

2. Click on the [Office Family] link at the top of the page and the following page will
appear.

- 73 -
3. Click the [Check for Updates] link to scan your computer to find Office updates you
need for your computer.

4. The Office update site will then give you a list of updates that are available for your
computer as shown below.

- 74 -
5. Select the updates you want to download and install from the list and then click the
[Agree and Install] button. The updates will then be downloaded to your computer
and installed as shown below.

Note: Some of these updates can be very large! They may take a long time to
download, especially if you have a slow connection to the internet.

6. Hopefully everything went ok and you will then get the following screen. Click on
[Finish] to complete the installation wizard.

- 75 -
7. You may need to restart your computer for the new updates to be installed properly as
shown below. You can either choose to restart now or do it later.

Exercises
Exercise 1: Using the instructions above, go to the Microsoft update site and see if there are
any updates available for your computer. Are there? Are there any critical updates required?

Select a small update (an update that is quick to download), and go through the process of
downloading and installing on your computer. How can you check to see if the update has been
installed correctly?

Exercise 2: Using the instructions above, check to see if there are any Microsoft Office
updates available for your computer. Are there?

Select a small update (an update that is quick to download), and go through the process of
downloading and installing on your computer.

Review Questions
Question 1: The Windows update website allows you to download updates for your operating
system and all of your Microsoft Office applications such as Word and Excel.
F True
F False

Question 2: It is better to use the ‘Custom’ option rather than the ‘Express’ option when using
the update site so that you can see what updates the site is recommending for your computer.
F True
F False

Question 3: It is a good idea to be logged on to your computer as the ‘Administrator’ when


performing updates.
F True
F False

- 76 -
Automatic Updates for Windows XP
Introduction

The most reliable way to get updates from Microsoft is to have the updates delivered
automatically to your computer using Automatic Updates.

Once you determine how often and what time of day or night you want Automatic Updates to
connect to the Internet and scan your computer for updates, Automatic Updates automatically
keeps your computer up-to-date with the latest bug fixes and security patches. Automatic
Updates is a good way to defend your computer from various security threats.

Instead of giving you a list of updates for your computer, Automatic Updates can also download
and install them at your convenience.

Setting up Automatic Updates

Following the instructions below will allow you to set up Automatic Updates in Windows XP.

1. Click the [Start] button and then select [Control Panel].

2. Select the [Performance and Maintenance] icon as shown below.

Note: Make sure that you are viewing the control panel in Category view. If not, click on
the [Switch to Category View] link in the top left section of the window so that your
control panel looks like the one shown below.

3. Select the [System] icon as shown below.

- 77 -
4. The System Properties Property Sheet will open.

5. Click the [Automatic Updates] tab and you will see a screen as shown below.

There are four options available for Automatic Updates. Below we tell you what we think
about each option and why we would or wouldn't use it on our computers.

• Automatic (recommended) Option - There is no way we would ever allow this


option. Just because a security update, service pack or critical update is issued by
Microsoft, it doesn't mean it's absolutely necessary for every computer. Giving any
application or utility the right to download and install something automatically on your
computer is just asking for trouble. Some of the updates issued by Microsoft can be
quite large and if you are connected to the internet by a slow connection, it can take a
long time to download all the updates.

• Download Updates for Me, But Let Me Choose When to Install Them Option -
This is a better choice than the first option but still not ideal. On the plus side, you are at
- 78 -
least told about when (or if) the downloaded updates will be installed. The bad part of
this option is that your internet connection speed and hard drive space are wasted if an
update is downloaded that you don't need and will never be installed.

• Notify Me But Don't Automatically Download or Install Them Option - This is


the best option. It let’s you know when there is an update available. From there you can
go to Windows Update or look it up on the Microsoft site to get more information and
work out if it's necessary for your computer and how it is used. Even if the update is
required, you may want to wait before downloading and installing until a later stage.

• Turn Off Automatic Updates Option - There are certain situations where you really
don't want any updates at all. It may be because you like to scan for your own updates
using the manual method. The option is available if needed, but it will likely be a very
small percentage of users that should select this option.

Exercises
Exercise 1: Using the instructions above, work out whether automatic updates are turned on
for your computer. Are they? What option is currently selected?

Review Questions
Question 1: You don’t need to be connected to the internet to be notified of updates.
F True.
F False.

Question 2: You can turn off Automatic updates and check your computer yourself on the
internet if you want to.
F True.
F False.

Question 3: The best option to choose for ‘Automatic Updates’ is the ‘Notify Me Before
Downloading Any Updates and Notify Me Again Before Installing Them On My Computer’
option.
F True
F False

- 79 -
Removing unwanted Programs
Introduction - Why should I remove unwanted/unused programs?

Removing programs that you no longer use can free up space on your computer. It can also
reduce clutter in your Start menu, making it easier to find the program you want to use.

How to remove unwanted programs

1. In the [Start] menu, click on the [Control Panel] icon.

2. After the Control Panel opens, double-click on the [Add or Remove Programs] icon.

Please note: If your Control Panel looks different from the one pictured below – make
sure you select [Switch to Classic View].

3. From the list of currently installed programs, click on the program you want to remove.

4. Click on the [Remove] or [Change/Remove] button.

5. Follow the instructions on the screen to finish removing the program.

- 80 -
Exercises
Exercise 1: Remove a program from your computer (you will be instructed in class which
program to remove) using the instructions above.

Review Questions
Question 1: You should only remove programs that you haven’t used for more than 1 year.
F True
F False

Question 2: You can also remove programs by just deleting the program folder using the
standard Windows Explorer.
F True
F False

- 81 -
Disk Management
Introduction

Disk management is all about maintaining the disk


drives in your computer and the data that they store
to make sure that they perform as best as possible
and reduce the chances of any problems occurring
which may result in lost information.

In this section we will discuss a number of


programs that are part of Windows XP which allow
us to make sure the disk drives are performing well.

Check Disk Program (CHKDSK)


Introduction

Chkdsk is a program which makes sure that all the files on your computer and all the
information about these files is stored correctly. If the program finds a problem with any of
your file system information, it will perform the necessary actions to repair the file system
information.

The equivalent utility in earlier versions of Windows was called ScanDisk.

Using the Check Disk Program

The following describes how to perform error-checking of a hard drive under Windows XP.

1. Launch disk error checking by double-clicking [My Computer], right-clicking the hard
disk drive you want to have checked, clicking [Properties] and selecting the [Tools]
tab. You should now see the following screen as shown below.

2. Click [Check Now] to start the utility.


- 82 -
A dialogue box showing the Check disk options is displayed.

3. Select the options as appropriate and click [Start].

If either of the Check disk options are selected, you will be notified that the check
cannot be performed immediately, and offered the opportunity to schedule this to occur
the next time your system is booted.

4. Click [Yes] to schedule the disk check.

The next time you start your computer, the chkdsk program will be run prior to
Windows being loaded, examining all the metadata on the volume in five separate
phases. The phases are as follows:

• Phase 1: Verifying file data


• Phase 2: Verifying security descriptors
• Phase 3: Verifying indexes
• Phase 4: Verifying files
• Phase 5: Verifying free space.

5. When the utility finishes, Windows will continue to load as per a normal system start-up.

Exercises
Exercise 1: Scan your hard drive for problems using the instructions above.

- 83 -
Review Questions
Question 1: The check disk program will tell you if it finds a virus on your computer.
F True
F False

Question 2: If there are faulty storage areas on your hard drive, the check disk program can
mark these as ‘bad’ so that Windows XP will not try and use them when writing data to the hard
drive.
F True
F False

Disk Cleanup Program


Introduction

To keep a PC running smoothly, regular maintenance is critical. Many users shy away from
maintenance tasks, thinking it is a long, drawn out manual affair, but the Disk Cleanup Utility
can easily determine which files on a hard drive may no longer be needed and delete those files.
In addition to freeing up potentially significant amounts of hard drive space, using Disk Cleanup
on a regular basis can significantly improve system performance.

Starting Disk Cleanup

1. Disk Cleanup is available on both Home and Professional versions of Windows XP. The
utility can be accessed using any of the methods listed below.

• Option 1: Click on [Start] then select [All Programs].


Select [Accessories] then [System Tools] then click on [Disk Cleanup].

• Option 2: In [Windows Explorer] or [My Computer], right-click the disk in


which you want to free up space, choose [Properties], click the [General] tab,
and then click [Disk Cleanup].

2. Use the drop down menu arrow to select the drive you want to clean as shown below.

3. Click on [OK] and Disk Cleanup will analyse the selected drive to determine the amount
of space that can be freed.

- 84 -
Please Note: Be patient. Analysing the drive can be a lengthy process depending
on the drive size and how much data is on the drive.

4. Once the drive analysis is complete a list of file categories will be presented for your
selection (an example is shown below).

Instead of automatically proceeding with cleanup once the drive analysis is complete,
Disk Cleanup allows you to review the categories of files that can be deleted.

5. Click on any of the categories to display more information about that category in the
[Description] section of the window. If you're unsure if you want to delete the files in a
category from the description, use the [View Files] button. A complete list of files
scheduled for deletion will be displayed in Windows Explorer. Use drag and drop to
move any files you want to save to a safe location and leave the category selected. If all
the files are to be saved, close the window and then remove the checkmark from the file
category so it will not be included in the disk cleanup.

- 85 -
6. After all the categories have been reviewed, click [OK] to begin the disk cleanup
process.

File Categories in Disk Cleanup Utility

There are a number of different types of file categories that Disk Cleanup targets when it
performs the initial disk analysis. Depending on the individual system, you may or may not have
all the categories below. An excellent example of this would be Backup Files from a Previous
Operating System. If a clean install of XP was performed then this category will not exist. It
pays to click on each of the categories and note that the [View Files] button can change
depending on the category selected.

• Downloaded Program Files

These are web programs that are automatically downloaded from some web sites that are
temporarily stored in the Downloaded Program Files folder. It's not program files or zip files
that you have downloaded from other locations.

• Temporary Internet Files

This refers to Internet Explorer's cache of Web pages that are stored on the hard drive for
quicker viewing. None of your personal web settings are affected by selecting this category, nor
does it delete any of your cookie files.

• Recycle Bin

The main thing to be aware of in this category is that it only refers to the Recycle Bin for the
selected hard drive or partition. This is important since XP uses an individual Recycle Bin for
each drive and partition, not just one as is the case in some earlier Windows versions.

• Temporary Remote Desktop Files

These files are the result of using the Remote Desktop utility. If you repeatedly use Remote
Desktop on the same computer or group of computers, leaving these files intact will maintain
the speed of future connections. Deleting them will necessitate downloading the remote systems
icons and wallpaper the next time a connection is established.

• Setup Log Files

These are really pretty useless unless you have a specific reason to go back and see what
happened when Windows XP was first installed on your computer.

• Backup Files For Previous Operating System

As mentioned earlier, this is a category you may not have, but if you did upgrade from a
previous Windows version and selected the option to be able to uninstall XP, it may well exist.
It takes up a lot of hard drive space to copy all the files necessary to back up a previous system's
core files, drivers, etc… This entry can range anywhere from a few hundred megabytes up to a
gigabyte, so unless you are still considering removing Windows XP, this is a good category to
select for deletion.

• Offline Files

- 86 -
Users with slower dialup connections and those using laptops frequently make websites they use
often available offline. Depending on how many levels deep you save the sites, they can use up
gigabytes of hard drive space very quickly. Worse than taking up space, the sites often contain
outdated information and are a good candidate for deletion.

• Compress Old Files

Unlike the other categories, Compress Old Files doesn't delete any files from the drive. It
compresses files that Windows hasn't accessed for a specified period of time. The files are still
available, but there will be a slight increase in access times because the files will be
decompressed the next time they are accessed.

Note that when Compress Old Files is highlighted an Options button appears. Clicking it will
allow you to set the number of days to wait before an unaccessed file is compressed.
There may be other categories that appear in your Disk Cleanup window, but in all cases,
highlighting the item will display an explanation of the category in the Description area.

More Options Tab

In addition to the categories that appear on the [Disk Cleanup] tab, the [More Options] tab
offers additional opportunities for freeing up hard drive space. There is nothing on this tab that
cannot be accessed elsewhere within XP, but having them grouped here does serve as a
convenient reminder.

In Windows XP there are three choices available on the More Options tab: Windows
Components, Installed Programs, and System Restore.

- 87 -
• Windows Components

The Cleanup button in the Windows Components section launches the Windows Components
Wizard. Select a general category of components and click the [Details] button to locate the
desired Windows component.

• Installed Programs

The Cleanup button in the Installed Programs section opens the Add/Remove Programs dialog
box. All installed programs can be removed by selecting the individual program and clicking the
Change/Remove button. You cannot remove several programs at the same time. Each program
must be removed one at a time.

• System Restore

Clicking the Cleanup button in the System Restore section opens a dialog box where it asks if
you are sure you want to delete all but the most recent restore point. The difference between
using this option and going directly to System Restore is that you have no option to selectively
delete restore points with this method. It's "all but most recent" or nothing when accessed via
Disk Cleanup. Click [Yes] or [No] depending on your choice.

Exercises
Exercise 1: Use the disk cleanup program to remove all the temporary internet files and setup
log files that are on your computer. Did you have any on your computer? Were they removed
after you ran the program? How do you know if they are gone?

Review Questions
Question 1: The Disk Cleanup utility will automatically remove the following for you:
F Unused Windows XP programs.
F Installed programs that haven’t been used for a long time.
F Data files that haven’t been accessed for more than the specified time.
F All of the above.
F None of the above.

Question 2: If you choose to remove your temporary internet files, the Disk Cleanup utility
will remove all your web cookies.
F True.
F False.

- 88 -
Disk Defragmenter Utility
Introduction

As advanced as hard drives have become, one thing they are


not very good at is managing how data is stored on the
drive. When files are created, deleted, or modified it's
almost a certainty they will become fragmented. Fragmented
simply means the file is not stored in one place in full.
Different parts of the file end up scattered across the hard
disk in separate pieces. The more fragmented files there are
on a drive, the more performance and reliability suffer as the
drive heads have to search for all the pieces in different
locations. The Disk Defragmenter Utility is designed to
reorganise fragmented files back into continuous files and
optimise the placement on the hard drive for increased
reliability and performance.

Using Disk Defragmenter

1. Disk Defragmenter can be opened a number of different ways. The most common
methods are listed below.

• Option 1: Click on [Start] then select [All Programs].


Navigate to [Accessories] then [System Tools] and finally select [Disk
Defragmenter].

• Option 2: Click on [Start] and select [Run].


In the text field type [dfrg.msc] and click [OK].

• Option 3: Click on [Start] and select the [Control Panel].


Select [Administrative Tools] and then [Computer Management]. Expand
[Storage] and select [Disk Defragmenter].

2. The first two methods take you to a single window containing Disk Defragmenter. The
last method opens the Microsoft Management Console and displays Disk Defragmenter
in the list. In all cases, a window similar to the one below will be displayed.

- 89 -
3. When Disk Defragmenter first opens you will see a list of the hard drives displayed at
the top of the screen. The [Estimated Disk Usage Before Defragmentation] and
[Estimated Disk Usage After Defragmentation] will be blank until a drive is selected
and the [Analyse] button is clicked. In the screen shot above, we have already analysed
the drives as shown in the [Session Status] column which shows it as [Analysed] and
the Estimated Disk Usage Before Defragmentation area containing a graphical
representation of the disk fragmentation.

4. After the [Analyse] button has been clicked and the process completes the window
shown above opens with a brief recommendation of what action Disk Defragmenter
thinks should be taken regarding the drive. It's important to note that this is just a
recommendation based on the percentage of fragmented files to total files and doesn't
prevent the drive from being defragmented if you feel it needs to be done and might
improve system performance. If you want to go ahead and defragment without more
information, click the [Defragment] button. If you're in agreement with their
recommendation and don't want to defragment, click the [Close] button. Click the
[View Report] button to view a more detailed drive analysis.

- 90 -
5. An [Analysis Report] as shown above contains quite a bit of additional information
about the selected drive. The report shown above details the File Fragmentation status
of drive C. The top pane provides Volume information, and as you can see there are
7,805 fragmented files. It also shows that 18% of the total drive space is currently
unused. Look at the [Average Fragments Per File] number 1.23. Experience shows
that when this number reaches 1.05 the message in the quick analysis window will
recommend defragmenting the drive.

6. In the bottom pane, [Most Fragmented Files], lists the files in descending order that
are the most fragmented.

7. In spite of the recommendation not to defragment this particular disk, we went ahead
and clicked the [Defragment] button. The results of that choice are shown below in the
[Estimated Disk Usage After Defragmentation] section. The graphical
representation clearly shows that not only have the red sections depicting fragmented
files been eliminated, many of the contiguous files indicated by the blue have been
repositioned toward the beginning of the drive, reducing the amount of searching the
drive heads have to do to locate a file.

- 91 -
8. After the defragmentation process completes, clicking the [View Report] button will
bring up the Defragmentation Report. It takes the exact same form as the Analysis
Report but shows the post defragmentation results. The [Total Files] and [Average
File Size] remain identical, but note that [Total Fragmented Files] and [Total
Excess Fragments] have been reduced to zero (0) and the [Average Fragments Per
File] is now 1.00, indicating most or all of the files are contiguous. In addition, there are
files listed that did not defragment.

- 92 -
Exercises
Exercise 1: Run the defragmenter program to organise the files on your hard drive using the
instructions above. What is the [Average Fragments per file] on your hard drive before you
ran the program? What is it after the program has finished?

Review Questions
Question 1: When files are created, deleted, or modified they will NOT become fragmented
because the hard drive makes sure that they are stored in order on the drive.
F True
F False

Question 2: The Disk Defragmenter Utility is designed to reorganise non-contiguous files into
contiguous files and optimize the placement on the hard drive for increased reliability and
performance.
F True
F False

Question 3: The Disk Defragmenter Utility can take a long time to reorganise the files on your
hard drive.
F True
F False

- 93 -
Viruses
Introduction to Viruses
We'll discuss what they are, give you some history, discuss
protection from viruses, and mention some of the
characteristics of a virus hoax.

Keep in mind that not everything that goes wrong with a


computer is caused by a computer virus or worm. Both
hardware and software failure are still a leading cause of
computer problems.

Here is some general facts about viruses:

• The normal virus behaviour is to infect a computer


and then do something bad.
• There are lots and lots of viruses out there.
• There are lots of virus names and they are not always easy or standardised.
• Viruses should be considered as a serious threat.
• There is no such thing as a good virus.
• There are many reasons why people write viruses, one of them is money (refer below for
more information).
• Viruses are not the only things that can cause damage to your computer. It is possible
that your computer has either a hardware or other software problem.
• Viruses use a variety of ways to hide themselves.
• On some defined cause, some viruses will then activate.
o Some viruses will not do something straight away, they may wait for a certain
amount of time or for a particular program to run on your computer before they
activate.
o Not all viruses activate, but all viruses use up computer power and memory and
they often have mistakes (bugs) that might do destructive things.

Why do people write viruses?


People create viruses. A person has to write the code, test it to make sure it spreads properly
and then release the virus. A person also designs the virus's attack time, whether it's a silly
message or destruction of a hard disk. So why do people do it?

The first reason is the same thinking that drives vandals and arsonists. Some people enjoy the
thrill of watching things blow up or watching things be destroyed. If these sort of people
happen to know about computer programming, then they may use this kind of thinking to
create programs that cause some sort of destruction.

Another reason involves ‘bragging rights’ – being able to tell your friends all about it, or the
thrill of doing it. Sort of like Mount Everest. The mountain is there, so someone is compelled to
climb it. If you are a certain type of programmer and you see a security hole that could be
broken, you might simply be compelled to exploit the hole yourself before someone else beats

- 94 -
you to it. "Sure, I could TELL someone about the hole. But wouldn't it be better to SHOW
them the hole???" That sort of logic leads to many viruses.

Some people write viruses to try and obtain information from people’s computers which they
could then possibly use to get money. It is similar to stealing a credit card or cheque from
someone’s mailbox.

Of course, most virus creators seem to miss the point that they cause real damage to real people
with their creations. Destroying everything on a person's hard disk is real damage. Forcing the
people inside a large organisation to waste thousands of hours cleaning up after a virus is real
damage. Even a silly message is real damage because a person then has to waste time getting rid
of it. For this reason, the legal system in some countries is getting much harsher in punishing the
people who create viruses.

All about Viruses


So what exactly is a virus? A virus is described as a piece of code,
usually written to do something bad, that attaches itself to a
program or file under the disguise of something positive, and
spreads to other files, program systems, or other people, without
the knowing about it.

You've probably heard of some of the following types of viruses, but aren't sure what they
mean.

1. File infector: Parasites that attach themselves to program files, usually with the
extensions .exe or .com. They infect your computer when the program is launched.

2. Trojan horses: Disguise themselves as something good. They usually don't replicate,
but if they are launched (by opening a program file or executing some other action to
trigger it), they wreak havoc on your computer by destroying files or changing data.
They usually come in the form of e-mail.

A Trojan horse is simply a computer program. The program claims to do one thing (it
may claim to be a game) but instead does damage when you run it (it may erase your
hard disk). Trojan horses have no way to replicate automatically.

3. Worms: These are probably the ones that you've heard of the
most. You might remember the "I Love You" worm. Like the
latter, worms come via e-mail, and if opened, they copy
themselves, take up space in your hard drive and send
themselves to everyone in your address book. It's not fun
explaining to all your friends in your address book that you're
responsible for the virus they just received.

A worm is a small piece of software that uses computer


networks and security holes to replicate itself. A copy of the
worm scans the network for another machine that has a specific security hole. It copies
itself to the new machine using the security hole, and then starts replicating from there,
as well.

- 95 -
4. Macro Viruses: A macro virus is a computer virus that ‘infects’ a Microsoft Word or
other Microsoft Office program. Macro viruses are extremely common due to the large
number of people who use the Office programs and also that macro viruses are
considered to be relatively simple to create.

How to Protect Yourself


Stay alert

Viruses can attach themselves to files that you download off the Internet, so make sure you
know what you're downloading, and whether it's from a trustworthy website. Also, make sure
you know where a floppy disk or USB key has been before you put into your computer and
make sure you trust whoever is sending you the e-mail and attachments.

Be cautious of e-mail

Most common computer viruses these days travel by email.

The easiest defence against viruses that are spread using e-mail is simply to use a Yahoo or
Hotmail account for your e-mail, instead of using Microsoft's email programs such as MS
Outlook or MS Outlook Express. Yahoo, Hotmail and some other free web-based e-mail
services have virus-scanners built into their e-mail systems.

Try to avoid opening attachments that end with .exe, .com, .vbt extensions, and always read the
subject headers. Remember that a subject line "Congratulations From Me" may seem innocent,
but it could be one of those Trojan horses referred to earlier.

Be cautious if you don't know the sender, and even if you do know the sender, since they may
not know that they sent you the e-mail (some viruses automatically send themselves to everyone
in your address book). If you're unsure, you can always ask the sender to find out whether they
meant to send you the e-mail you received.

As long as you don't open the attachment itself, you are generally considered safe. Therefore,
choose an e-mail program that has a preview pane, which allows you to read the e-mail without
actually opening it. If it looks suspicious, delete it from your inbox and permanently delete it
from your "Deleted Messages" folder. You don't want any viruses remaining in your e-mail
account.

Remember the most basic rule: Don't open file attachments unless you have some way of
knowing that they are real.

Here are some examples:

• If someone sends you a program, and the sender didn't write it himself, don't run it! If
someone sends you a "fun" program or screensaver that they "found" somewhere, do
not open it. It doesn't matter whether they tried it or not -- these things can contain
"time bombs" so that they appear to work as advertised for a while before doing their
damage, so testing it cannot prove that it is safe.

• If the file attachment comes from a stranger, you cannot know that it is genuine, so
don't open it.

- 96 -
• If it appears to be from someone you know, but there's nothing to prove that it is really
from him, then you can't know that it is genuine, so don't open it. Worms/viruses often
use fake details, so most computer worms and viruses that you will receive will appear to
be from someone you know.

• On the other hand, if your friend told you on the phone, "I'll send you the JPEG picture
this afternoon," and, as promised, it shows up, it is pretty safe. (But avoid Word .doc
files and Excel .xls files if possible, since they occasionally contain macro viruses – refer
to the section later in this workbook for more information on macro viruses).

• Or if the e-mail contains identifying information that could not have been written by a
stranger (eg. if it is signed, "your little brother, Frank"), it is probably safe.

How else can you avoid viruses?

Install antivirus software

Antivirus software can recognise if your computer has been infected, and clean up a virus if you
happen to let a virus slide past your watchful eye. The two most popular software brands are
McAfee and Symantec (the maker of Norton AntiVirus). If you use either of these, always make
sure to visit their websites to make sure you have the most current versions of the software.

Antivirus software allows you to scan disks and email attachments to make sure they are virus-
free, and quarantines and cleans the virus if you have been infected, preventing it from
spreading through your computer.

Stay informed

Part of protecting yourself is knowing which viruses are going around. So visit the antivirus
websites and other reputable computer websites to stay informed on the latest ones. Knowing
about specific viruses makes your virus prevention that much easier (refer to the Further
Resources section below for sites that you can visit online).

Don't be fooled by hoaxes

"Virus warning" emails which ask you to forward them on to lots of other people are almost
always hoaxes. Don't forward them.

In fact, almost all emails which ask you to forward them on to lots of other people are untrue.
Most are pure hoaxes, a few are partially true, and almost none are completely true.

If you receive any message that asks you to forward it on to lots of other people, you can be
almost certain that it is a hoax or a scam. They are all false.

You can do whatever you like with your chain letters, but DON’T follow the directions that
these types of e-mail offer, as they are probably hoaxes. So while it's very tempting to rearrange
your hard drive thinking you're doing your computer a favour, you should never pay attention to
these types of email; only follow the directions of reputable websites and newsletters.

Usually, the easiest way to verify that email chain-letters are untrue is to look for them on one of
the "hoax buster" web sites. Also, virus warning chain-letters can be checked on the usual
virus information web sites.

- 97 -
Here are some "hoax buster" web sites for checking suspected email hoaxes. We suggest
bookmarking at least the first two of these links (if using Internet Explorer, add them to your
"favourites" list):

• www.truthorfiction.com
• www.snopes.com/info/search
• UrbanLegends.MiningCo.com
• www.breakthechain.org
• hoaxbusters.ciac.org
• www.truthminers.com/truth
• www.hoax-slayer.com

Always back up

You can follow all the preventive measures to avoid receiving a computer virus, but you can
never be 100% safe. That's why it's very important that you back up your operating systems and
all important data, in case you do receive a nasty virus. If you back up everything, you'll lessen
the damage done and will simply have to replace everything; it's frustrating, but not the end of
the world.

If you feel that your life is on your computer, then consider it your "baby"; it needs the
necessary care to keep it healthy and virus-free, so make sure to be cautious, do your research
and guard your computer against all those viruses.

Installing and using Anti-Virus Software


Introduction

There are a large number of virus software programs available on the market today, both free
and commercial products.

For this course we are going to look at using the free version of the AVG Anti-virus program.

How to install AVG Anti-virus program

There are a lot of steps involved in installing the AVG anti-virus program but they are all
relatively simple!

1. Firstly you need to get the latest copy of the program from the AVG website. This can
be found at free.grisoft.com. For this course you can also find it on the supplied CD.

2. Once the file has been downloaded, you should have a program named
[avg75free_428a818.exe] or similar. Double-click on this program to start the install
process. The first screen you will be shown should be similar to the welcome screen as
seen below. Click on [Next] to go the next step.

- 98 -
3. The next screen you will be presented with is the License Agreement. Agree to the
terms by clicking on [Accept].

4. The program will now display a [Checking System Status] screen and if everything is
OK will then ask you to select an installation type. The easiest method is to choose the
[Standard Installation] as shown below and then click [Next].

- 99 -
5. On the next screen enter in your [User Name] in the appropriate field. The [License
Number] field will already be filled out for you using a free license key. Click on
[Next] to continue.

6. You will then be presented with an [Installlation Summary]. If you are happy with all
the details then click [Finish] to start the installation of the program.

- 100 -
7. If you see a screen as shown below, it means you have some programs running on your
computer that need to be closed before the AVG anti-virus program can be installed.
Make sure you close all other programs and then click [Next].

8. The program will now install all the files it needs, and if everything works OK, you will
then be presented with the [Installation Complete!] screen as shown below.

- 101 -
9. Click on the [OK] button and you will be congratulated, yet again! Now the program
will take you through the ‘First Run’ Wizard. Click on [Next] to continue.

10. You will then be asked if you want to check for updates for the AVG anti-virus
program. It is a good idea to that now, but if you aren’t connected to the internet and
you don’t have an update on a CD or your computer, then you can do this step at a later
stage. Click on [Check for Updates] to update the program now.

- 102 -
11. If you choose to perform an update now, AVG will ask you where it can find the
updated files. You can select either from the [Internet] or from a [Folder] on your
computer if you have downloaded the updates directly from the website and saved them
on your computer. It is recommended that you get the updates directly from the
internet by clicking on the [Internet] button.

12. If there are any updates available for AVG anti-virus, they will be displayed to you in a
box as shown below. Click on the update and then click the [Update] button at the
bottom of the screen.

- 103 -
13. The updates will then be downloaded from the internet and installed on your computer.
If everything has worked ok you will then see the screen as shown below. Click [OK] to
finish the update process.

14. You will then be asked if you want to setup a daily scanning schedule. Accept the
recommended defaults and click on [Next].

- 104 -
15. Here you can choose whether you want to run a full scan of your computer now, to
check whether you have any viruses. Running a full scan of your computer can take a
long time so for now, just click on [Next] to continue.

16. You can choose to register the AVG anti-virus program if you wish. Click on [Next] to
continue.

- 105 -
17. Finally, the last step! Your computer is now protected. Click on [Continue] to finish
the ‘first run’ wizard.

18. You will now be taken to the main AVG Test Center screen where you can perform a
number of different functions including changing some of the options that you selected
during the ‘wizard’ process.

Now would be a good time to run a scan on your computer and see if you have any
viruses.

- 106 -
19. Once the scan has finished, you will be presented with a screen as shown below. It will
tell you if there were any viruses found on your computer, and if it did, what they are
called and whether they have been cleaned up.

- 107 -
Exercises
Exercise 1: Install the AVG anti-virus software on your computer using the instructions above.
Update the definitions and run a scan on your computer. What do the reports show? Did your
computer have any viruses?

Review Questions
Question 1: Is AVG anti-virus the only free anti-virus program available to install on your
computer?
F Yes
F No

Question 2: Free anti-virus programs aren’t as good as anti-virus programs that you have to
pay money for.
F True
F False

Macro Virus Security in Word/Excel


Introduction

A macro virus is a computer virus that "infects" a Microsoft


Word or other Microsoft Office program and causes a
sequence of actions to be performed automatically when the
program is started or something else triggers it. Macro viruses
tend to be surprising but relatively harmless but this is not
always the case. Sometimes they can be harmful to your
computer. A typical effect is the undesired insertion of some
comic text at certain points when writing some text for
example. A macro virus is often spread as an e-mail virus.

How to avoid getting a Macro Virus

One of the things you can do stop your computer getting infected with a macro virus is to use
the macro security built into the Microsoft Office programs. Macro security is used to help
control the activation of a virus that has been placed within a template, document, workbook, or
power point presentation

Setting macro security levels in Office programs

Macro security for Word, Excel, Outlook, Publisher, Access, PowerPoint, Project, and Visio can
be set to High, Medium, or Low through the Security dialog box of the user interface. This
dialog box can be found by the following steps:

1. Click on the [Tools] menu in the Office application.

2. Select [Macro], and then click on [Security] as shown below.

- 108 -
3. The following screen will be displayed.

4. Select the appropriate [Security Level] and then press [OK].

Notes:

It is highly recommended that you select High and only select Medium if absolutely
necessary to allow you to run a macro that you know is safe. Setting the security level to
Low allows a macro or other program to run without the knowledge of the user. Setting
macro security level to Very High is only recommended in cases where a user is

- 109 -
expected to run a known set of macros and will never need to run macros from another
source.

When you set security levels to Very High, High, Medium, or Low, the following conditions
apply:

• Very High security

Macros can run only if the Trust all installed add-ins and templates option is checked
and the macros are stored in a specific trusted folder on the user's hard disk.

• High security

Macros must be signed by an acknowledged trusted source (certificate of trust) in order


to run. Otherwise, all macros associated with, or embedded in, documents are
automatically disabled without warning the user when the documents are opened. All
Office applications are installed with macro security set to High by default.

• Medium security

Users are prompted to enable or disable macros in documents when the documents are
opened.

• Low security

Macros are run without restrictions. This security level does not protect against
malicious programs, does not allow for acceptance of certificates of trust, is considered
generally insecure and, therefore, is not recommended.

Exercises
Exercise 1: What macro security is Microsoft Word set to on your computer? Is it the same as
Microsoft Excel on your computer?

Review Questions
Question 1: It is a good idea to set the Macro Security level in MS Word to high to stop any
macro viruses from infecting your machine when opening documents from other people.
F True
F False

Question 2: Macro viruses are not very common and it is unlikely that you will get one on your
computer.
F True
F False

Further Resources
This is a list of websites that you might find useful to find more information on things such as
what viruses are currently causing problems etc…

- 110 -
• Good virus encyclopedia’s can be found at these sites which allow you to search for a
virus name and find out more information about them.

www3.ca.com/securityadvisor/virusinfo/browse.aspx
www.symantec.com/enterprise/security_response/threatexplorer/threats.jsp
www.viruslist.com/en/viruslist.html
www.trendmicro.com/vinfo/virusencyclo/
www.pandasoftware.com/virus_info/encyclopedia/

• Some sites where you can find both free and commercial anti-virus software programs.

www.avast.com
www.mcafee.com
www.grisoft.com
www.symantec.com
www.pandasoftware.com

Spyware/Malware/Adware
Introduction

Spyware and Malware refers to a large range of programs that are designed to capture
information or take partial control of your computer without you knowing about it.

Spyware is a type of program that watches what you do with your computer and then sends that
information over the internet to someone else. Spyware can collect many different types of
information about a user. More simpler programs can attempt to track what types of websites
you visit and send this information to an advertisement agency for example. More dangerous
versions can try to record what you type to try to intercept passwords or credit card numbers.

Adware is a type of program that displays advertisements, normally when you are connected to
the internet. Adware can produce a lot of pop-ups and other advertisements on websites that
you visit.

Checking for Spyware and Adware


Installing and using AdAware
Introduction

Lavasoft produces a program called AdAware, which is a program that you can use to detect
and delete spyware and adware on your computer. A free version of this program can be
downloaded from Lavasoft's website at www.lavasoft.com. For this course, you will find the
program on your training CD in the AdAware folder.

- 111 -
To install on your computer

1. After you have downloaded the software, double-click on the file to install it. Follow the
instructions on the screen.

2. After AdAware has been installed, check the [Perform a Full System Scan now] box
and click [Finish]. AdAware will begin to scan your system for adware.

3. If AdAware asks you to update your definitions, click [OK]. Keeping your definitions
up to date is a very good idea and allows AdAware to scan for new adware programs.

- 112 -
4. After you update your definitions, Adaware will begin scanning for spyware and adware
that may be installed on your computer.

5. Once the scan is complete, Adaware lists the items that it considers a potential security
threat. The default view, shown below, groups the potential threats by type. To learn
more about an item listed, right click on the item and select the [Show TAC page]
option.

To remove the item, check the box next to each of the items and then click [Next].

- 113 -
If you only want to remove the most critical objects that are found, click on the
[Critical Objects] tab. Check the items that you want to remove, and then click
[Next].

6. AdAware will then ask you to confirm that you want to delete the items that you have
selected. Click on [OK] to continue.

7. AdAware will then delete all of the items you have selected and then take you back to
the main screen.

Exercises
Exercise 1: Install AdAware on to your computer using the instructions above. Make sure you
update the definitions and then run a full scan on your computer. Did it find anything? Was it
considered critical?

- 114 -
Firewalls
Introduction - The Basics

When you first connect to the internet via your Internet Service
Provider (ISP) your computer is available to send and receive
information. But we don't want to be exchanging information with
anybody. This is where a Firewall can come in handy.

Firewall's split all communications into two distinct category's.


Incoming and Outgoing.

Incoming

This is the most dangerous, so to speak. Information has to come in


to your computer.

What you don't is to allow just anyone to connect to your computer.


Without a firewall your computer could accept connections from
un-trusted sources and this could potentially cause problems.

People who want to try to exploit your computer can scan for open ports on your computer. If
they find one then they can potentially exploit your computer and gain access to all your
information. A good Firewall will close most open ports and good firewall's will hide (stealth)
your ports totally.

Outgoing

Outgoing communication is a lot simpler than incoming. Out going communications are usually
initiated by programs or services running on your computer. This gives you control over what
you allow or disallow on your computer.

However there are malicious programs and scripts (commonly known as Trojans) that are
spread by Email usually. Once these programs get onto your computer they can open a port
and just sit quietly until a hacker makes contact. This might not be the hacker that created the
Trojan in the first place.

The thing to remember is that one trojan can be used by any hacker. So be warned you need to
do something to protect your computer.

Again a firewall can help. A good firewall will control outgoing communications at the same
time as protecting you from incoming communications.

What a firewall does

A lot of people are under the impression that a firewall prevents viruses from entering the
network/computer. A firewall, by definition, does nothing of the sort. Here's what a firewall
does do.

Put simply what a firewall does is to monitor communication into your computer and
sometimes out of your computer and stop what it thinks shouldn't be allowed.

- 115 -
When you are connected to the internet, you are plugged into a giant network of computers.
Anyone on the internet can make requests to your computer to browse files, use printers, probe
around for services with open security holes, etc.

How a Firewall does this

The firewall sits between your computer and the Internet. When your computer is probed from
the outside world it just ignores it. Thus making people think that the computer is not switched
on.

If a potential attacker scans your computer (and they will) getting no answer is the best thing to
make them move on.

You might think that if a firewall blocks all access to the Internet then you won't be able to
access the World Wide Web at all. Don't worry you can still remain safe and use the computer.

Read on to find out how to allow access through your computer.

Outgoing Program Control

When you first install a firewall it will normally configure its self to allow web browsing and
some other features. When you first run a program that needs access to the internet the firewall
will stop it. A popup will appear asking you if you wish this program to access the Internet. If
you say YES then the program will be allowed to send and receive information from the World
Wide Web. If you say NO the firewall will block all further attempts by this program to access
the internet.

Programs that will need Internet access are things like your web browser, E-mail program, FTP
program, News reader, Google Toolbar, etc. Lots of programs use the Internet in some way so
check every popup carefully.

If a popup appears with a program name you don't recognise then say NO. You can always
change the setting in your firewall's configuration. This feature sometimes refereed to as
'Outgoing Program Control' is great for stooping trojans from being abused.

- 116 -
Remember. If you are unsure SAY NO

You can always change your answer in the firewall's configuration software if you need to.

After you have run a firewall for a few days check the log files created by the firewall. You might
be surprised about the number of port scans and attempted break ins of your system.

Types of Firewalls – Hardware and Software

Firewalls can be either hardware or software.

• Hardware Firewalls

Hardware firewalls can be purchased as a stand-alone product but more recently


hardware firewalls are typically found in broadband routers, and should be considered an
important part of your system and network set-up, especially for anyone on a broadband
connection. Hardware firewalls can be effective
with little or no configuration, and they can
protect every machine on a local network.

For example, the D-Link product pictured


opposite has an ADSL modem, router, switch,
wireless connectivity and firewall all built into the
one product so that each of these components
doesn’t have to bought separately.

• Software Firewalls

For individual home users, the most popular firewall choice is a software firewall.
Software firewalls are installed on your computer (like any other software program) and
you can customize it; allowing you some control over its function and protection
features. A software firewall will protect your computer from outside attempts to
control or gain access your computer, and, depending on your choice of software
firewall, it could also provide protection against the most common Trojan programs or
e-mail worms. The downside to software firewalls is that they will only protect the
computer they are installed on, not a network, so each computer will need to have a
software firewall installed on it.

The differences between a software and hardware firewall are vast, and the best protection for
your computer and network is to use both, as each offers different but much-needed security
features and benefits. Updating your firewall and your operating system is essential to
maintaining optimal protection, as is testing your firewall to ensure it is connected and working
correctly.

Note: In this course we will only be looking at software based firewalls.

Review Questions
Question 1: By using a firewall, it will make sure that you don’t receive any viruses.
F True
F False

- 117 -
Question 2: Hardware firewalls are much better than software firewalls.
F True
F False

The Windows XP Internet Connection Firewall


Introduction

In Windows XP, Microsoft included Internet Connection Firewall (ICF) to supposedly keep
your system safe while connected to the internet. The most important thing to understand about
ICF is that it provides only inbound protection; information moving from the internet to your
machine. There are other firewalls available which provide both inbound and outbound
protection but understand that ICF does not fall into this category (refer to the next section on
ZoneAlarm which does monitor both inbound and outbound information).

Turn Internet Connection Firewall on

To verify if Internet Connection Firewall is enabled on your computer do the following:

1. Open the [Control Panel] and then select [Network Connections].

2. Right-mouse-click on the connection that you are trying to protect. If you are on a
network, this will most likely be called [Local Area Connection]. If you are trying to
protect an internet dial-up connection, then select the connection icon and choose
[Properties]. A property sheet similar to the one below should open. If it doesn’t look
similar, check the tabs at the top to be sure [Advanced] is selected.

- 118 -
3. Click on the [Settings] button to set options for Internet Connection Firewall and the
following screen will appear.

- 119 -
4. This window contains 3 options: On, On with no exceptions, and Off.

• [On] is the default setting. If you want to spend more time on more important
things, you can select this option and return to this article or any firewall
specifics later.

• [Off] turns the firewall off, usually when you need to quickly test something. It
makes your computer more vulnerable and it’s recommended to use it in
exceptional cases only or if you are using another third-party firewall solution
(refer to section later in this workbook).

• [On] and [Don’t allow exceptions] restricts your online experience mostly to
browsing web pages and sending emails. This option is recommended when
your computer is connected to public networks and needs a higher level of
protection. Please note that the [Exceptions] tab contains pre-added Files,
Settings Transfer Wizard and File and Printer Sharing, which will be disabled if
[Don’t allow exceptions] is checked.

5. We strongly suggest that after you have enabled Internet Connection Firewall you visit a
site which allows testing to see if it is performing not only properly, but as you expected.
Just because it is doing what Microsoft expected doesn’t mean it is doing what you
expect from a firewall!

- 120 -
The site we recommend for testing is Gibson Research, owned by Steve Gibson. The
website can be found at www.grc.com. An outstanding feature of the site is ShieldsUp,
a port scanner that will test your connection and provide analysis (see section later in
this workbook).

6. When the default setting is selected, Windows Firewall will block most programs to
prevent unsolicited requests and a window like this will be displayed:

7. If you decide to unblock it, this program will be added to Exceptions. Exceptions can be
viewed with the [Exceptions] tab, which contains a list of allowed programs and ports.
Here you can add the software that you use in addition to a browser and email client,
your instant messenger or a game using Internet:

- 121 -
One last note - A firewall is not a substitute for security patches or antivirus software. Check
frequently to make sure your system has the latest updates installed and is running an up to date
virus detection program.

Exercises
Exercise 1: Is the Windows XP Internet Connection Firewall turned on for your computer?
How did you check it?

Exercise 2: Turn off the Internet Connection Firewall. What happens? Do you get any
warnings?

Review Questions
Question 1: The Windows XP Internet Connection Firewall monitors all incoming and
outgoing traffic when you are connected to the internet.
F True
F False

- 122 -
Question 2: The Windows XP Internet Connection Firewall comes pre-installed with all
versions of Windows such as 95, 98, ME, 2000 and XP.
F True
F False

Third-party options
Introduction to Zone Lab’s Zonealarm

Zone lab's Zonealarm software is probably the most popular of the free software firewall
applications, and for good reason. It offers excellent basic firewall capabilities, plus the vital
ability to monitor and block outgoing traffic as well as incoming data. This offers you the ability
to see which programs are calling out to the Internet on a regular basis (you may be surprised)
and detect malicious software like Trojan horse, viruses and spyware that may have been
installed on your computer without your knowledge.

You can download Zonealarm at www.zonelabs.com. It can also be found on the training CD
under the [Zone Alarm] folder. Once you have the install file, install and run the program to
activate the firewall.

Be sure to select 'Zonealarm' and not its paid sister product 'Zonealarm Pro' during the install
process, unless you want to pay for the extra features that the latter offers.
The install process will now ask for permission to set Internet Explorer as a 'trusted' program so
that you can use it to access the Internet immediately. To simplify things, answer 'yes' to the
'configure Internet access to allow web surfing' question, then restart your system when
prompted.

It's a good idea to go through the program guide that you are presented with when your
computer restarts, as this will give you a basic grounding in how the program works. Otherwise,
your computer is now adequately protected.

Zonealarm's implementation differs from the XP firewall in the way it handles how programs
are allowed to send and receive data. Zone Lab's product keeps a database of the programs
installed on your computer, and when one attempts to access the Internet, or attempts to set
itself up as a server process so that other computers can access it from the Internet, the firewall
halts the attempt and pops up a message box informing you of the program and its intentions.

At this point you can grant the program permanent or temporary permission to use the Internet,
or deny it completely. This type of program-based control is completely absent in the Windows
XP firewall and in most low end hardware firewalls such as the ones found in home Internet
sharing devices, and is the main reason why Zonealarm is so appealing as a home security
choice.

Exercises
Exercise 1: Install ZoneAlarm onto your computer using the program found on the training
CD. Open up your Internet Explorer and browse some websites on the internet. Do you
notice anything different?

- 123 -
Review Questions
Question 1: Free firewall programs are not as good as firewall programs that you have to pay
money for.
F True
F False

Checking the effectiveness of your Firewall


Introduction

As mentioned previously, one of the best ways to test how your firewall is working, is to use an
external site such as the Gibson Research website found at www.grc.com.

Using the Shields Up utility can give you a good idea as to what users on the internet can see on
your computer.

Testing your firewall using Shields Up

1. Go to the website www.grc.com and select the Shields Up utility. You will be displayed
the following screen.

2. Scroll down to the section where you can choose what type of scan to run, and select
the [Common Ports] option.

- 124 -
3. Once you have run a scan, you will receive a report similar to the one below.

4. As you can see in the above example, there is a port that is considered to be [Open].
Unless you are hosting your own website or mail server, then it is not a good idea to
have any ports open to the internet as people can take advantage of this to get access to
your computer. By making changes to your system, it is possible to close this port so
that it is not available to people on the internet if it is not required.

5. A further scan then reveals that our solution has worked!

- 125 -
6. If you would like more information on what the port is used for, click on the port
number and Shields Up will give you more information as to that port is commonly used
for.

Exercises
Exercise 1: Use the Shields Up website using the instructions above to see if the firewall is
working on your computer.

Exercise 2: Turn your firewall off and then run the test again. Is there any difference?

Review Questions
Question 1: Using the internet is the best way to test to see if your firewall is working.
F True
F False

- 126 -
File Security
Introduction

Quite often you will have information on your computer that you don’t want everyone to be
able to either read or change.

File security and encryption techniques can become quite technical, but in this course we will
look at some fairly simple ways of protecting some of your information using WinZip, Acrobat
PDF and Word/Excel.

Read on to learn how…

Setting Security on WinZip files


Introduction

WinZip uses the standard Zip 2.0 encryption format, a format that is also supported by most
other Zip utilities.

Password protecting files in a Zip file provides some protection against users who do not have
the password and are trying to determine the contents of the files. However, the Zip 2.0
encryption format is known to be relatively weak, and cannot be expected to provide protection
from individuals with access to specialized password recovery tools.

You should not rely on WinZip password protection to provide strong security for your data. If
you have important security requirements for your data, you should look into more stronger
solutions.

Using password security while using the Extract, Test, CheckOut, or Install features:

If you use the Extract, Test, CheckOut, or Install features on a password protected archive, you
will automatically be prompted for the password.

Using password security while adding or updating an archive:

To password protect files, it is important to specify the password AFTER opening or creating
an archive and BEFORE adding the files.

Follow these steps to password protect files in an archive:

1. Start the WinZip application by clicking on [Start] then [All Programs] then navigating
to [WinZip] and then clicking on the WinZip application. The program will then start
and you should be displayed a screen similar to the one below.

- 127 -
2. Click on the [New] icon to create a new WinZip file. When presented with the [New
Archive] box, give the WinZip file a name and select a location to save it to and then
click on [OK].

3. In the [Add] dialog box, click the [Password] button, and type a password.

- 128 -
4. Once you have typed in the password and confirmed it, you can then select the files to
be added to the archive and then press the [Add] button.

- 129 -
5. You will notice in the main WinZip window that files that are protected with a password
will have a small plus (+) sign following the filename.

6. Once you have closed the archive, and you re-open it and double-click on the archived
file to view it, you will now be prompted to enter a password as shown below. You will
also be prompted for the password if you try and extract the file as well.

- 130 -
Notes:

• In general, longer passwords (for example, passwords with 8 or more characters)


are more secure than shorter passwords, and passwords that contain a mixture
of alphabetic characters, numeric characters, and punctuation characters are
more secure than passwords containing only alphabetic characters.

• Be sure to remember any passwords you use, so that you can extract your files,
but don’t write the password down where someone could easily find it!

Exercises
Exercise 1: Create a new WinZip file and add some documents to it from your [My
Documents] folder. Close then re-open the zip file. Can you view the files?

Exercise 2: Create another WinZip file and add some documents to it from your [My
Documents] folder but add a password to them using the instructions above. Close then re-
open the zip file. Can you view the files now? Are you asked for a password to view them?

Review Questions
Question 1: WinZip provides one of the strongest encryption methods available today and is
highly recommended for securing important information.
F True
F False

Question 2: In general, longer passwords (for example, passwords with 8 or more characters)
are more secure than shorter passwords, and passwords that contain a mixture of alphabetic
characters, numeric characters, and punctuation characters are more secure than passwords
containing only alphabetic characters.
F True
F False

- 131 -
Setting Security for Word and Excel files
Introduction

Word, Excel, PowerPoint, and other Microsoft Office programs offer password protection
("File Protection") to help prevent unwanted access to your critical information.

There are two password protection levels:

• Read-Only. Anyone can read the doc, but only those with the password can make
changes to it.

• Password-Protected. Can only be opened by someone with the password.

To set read-only protection on a file follow these steps:

1. Open the file.

2. On the [Tools] menu, click [Options], and then click [Security]. The following screen
will be displayed (may differ depending on what version of MS Office you are running).

3. In the [Password to modify] box, type a password, and then click [OK].

- 132 -
4. In the [Reenter password to modify] box, type the password again, and then click
[OK].

To password protect a file:

1. Open the file.

2. On the [Tools] menu, click [Options], and then click [Security]. The following screen
will be displayed (may differ depending on what version of MS Office you are running).

3. In the [Password to open] box, type a password, and then click [OK].

4. In the [Reenter password to open] box, type the password again, and then click [OK].

- 133 -
Exercises
Exercise 1: Create a new MS Word document and make it read-only using the instructions
above.

Exercise 2: Create a new MS Word document and password protect the whole document
using the instructions above.

Review Questions
Question 1: There are 2 password protection levels in Microsoft Office programs. They are:
F Cannot modify and Cannot open documents.
F Cannot modify and cannot print documents.
F Cannot open and cannot print documents.
F None of the above.

Question 2: If you forget the password you set to open a document, the administrator of the
computer can open the file for you.
F True
F False

Setting Security for PDF files


Introduction

You can limit access to a PDF document when you save it. When files have restricted access,
any restricted tools and menu items are dimmed (greyed out) and cannot be selected. If you set
any security options, you should also set an owner password. Otherwise, anyone who opens the
file could remove the restrictions. A document with both open and owner passwords can be
opened with either one. If opened with the owner password, the security settings are
temporarily disabled and the document can be edited.

Creating a password to open a PDF file

1. Open the pdf document in Adobe PDF Writer.

2. Select the [File] menu from the top menu, then select [Document Properties]. You
should then be presented with a screen as shown below.

- 134 -
3. Select [Security] on the left hand menu as has been done above. In the popup menu next
to [Security Method], select [Password Security]. You will then be presented with the
following screen.

- 135 -
4. Check the box next to [Require a password to open the document] and then type in a
password and click [OK].

Please note:
It is not a good idea to make the Open Document password and the Permissions
Password the same.

5. Reconfirm the password you entered when prompted and press [OK].

6. Take note that the password will not be applied to the document until you re-save your
PDF document.

- 136 -
7. Once you have saved the document, the next time you try and open it, you will be
prompted to enter the password to view it.

Modifying the PDF document restrictions

1. Open the pdf document in Adobe PDF Writer.

2. Select the [File] menu from the top menu, then select [Document Properties]. You
should then be presented with a screen as shown below.

- 137 -
3. Select [Security] on the left hand menu as has been done above. In the popup menu next
to [Security Method], select [Password Security]. You will then be presented with the
following screen.

4. It is a good idea to set a [Permissions Password]. If you don’t, then anyone can turn off
any of the restrictions that have set for the PDF docuemtn.

5. In the Permissions section you can select one or more items to prevent viewers from:

• Printing the document (in the Reader or the full Acrobat editor)
• Changing the Document (even if they have the Acrobat editor)
• Copying or Extracting content from the document (selecting also disables the
accessibility features)
• Adding or Changing Comments and Form Fields (users will be able to enter
information into fields but will not be able to save the changes if they are
working in Acrobat editor).

6. The [Encryption Level] setting you select will depend on the version of Acrobat used by
the people who will receive this file. If in doubt, select the lower level.

7. Click [OK] when finished. If you entered passwords, retype the passwords in the
Confirmation dialog box and click [OK].

8. Save the document.

Note: You can change or remove a password after setting it by going back to the security
settings. However, if you forget the password to a document, there is no way to recover it.
- 138 -
It is a good idea to store the password in another secure location in case you forget it.
Secured files cannot be viewed by Acrobat programs prior to version 2.0.

Exercises
Exercise 1: Create a new pdf document and make it so that people can read it, but cannot print
it?

Exercise 2: Change the document security settings so that people are able to read it, cannot
change it, cannot print it, but CAN copy text from the document.

Review Questions
Question 1: You can password protect Adobe PDF documents so that people cannot open
them at all.
F True
F False

Question 2: Using Adobe PDF permissions security, it is possible to stop people from printing
your PDF documents but they can still read the document.
F True
F False

Question 3: Can you set document restrictions for your pdf document without having a
permissions password?
F Yes
F No

Question 4: How do you remove restrictions that have already been set in your pdf document?
F Delete the pdf document and recreate it.
F Set the document security method to ‘No security’.
F By changing the document password will reset the restrictions.
F None of the above.

Question 5: If you send someone a pdf document and they cannot open it, what could be the
problem?
F They don’t have the Acrobat Reader installed on their computer.
F Their computer isn’t compatible with pdf documents.
F Something happened to the document when emailing.
F All of the above.

Question 6: Do you need the professional version of Adobe Acrobat to be able to read a pdf
document?
F Yes
F No

Question 7: Where can you find the Acrobat Reader program?


F You can buy it from a computer shop.
F It is available free on the internet.
F Don’t know.

- 139 -
Browser and Internet Security
How to Set Your Internet Explorer Security and Privacy
Options
Introduction

Internet Explorer contains many security and privacy settings to help users when surfing the
Internet. With the big increase of Internet based worms and viruses, it is a great idea to
understand the security settings on your own computer so you can protect yourself. This
combined with a firewall and antivirus software will help protect you from all the viruses and
bad programs that are out there.

Internet Explorer supports many security “zones”, or areas you will be using Internet Explorer,
and supports different security settings for each zone. You can customize the security in IE to
support many different configurations or requirements.

Making Internet Explorer more secure

1. Open [Internet Explorer]. Go to the [Tools] menu and select [Internet Options].
Click on the [Security] tab.

At the top, you see each zone in which security can be customized. The Internet zone
affects sites on the Internet which you haven't placed in the Trusted or Restricted zones.

- 140 -
At the bottom, you see the “Security level for this zone”, that is the security level which
the Internet is currently configured at, Medium.

There are five security levels you should be aware of: Low, Medium-low, Medium, High,
and Custom.

Low is designed with the minimum safeguards and prompts. Most content is run or
downloaded without any prompts. Active content, such as scripting, runs without
prompting you. This setting should probably never be used, it should only be used on
sites which are completely trusted.

Medium-low is the same as Medium but with less frequent prompts. It is appropriate
for your local intranet sites or sites you completely trust.

Medium is the default security level for the Internet. It is the most functional while
preventing things like “unsigned ActiveX controls” from being downloaded.

High is the security level for Restricted sites by default. It prevents most potentially
harmful items from being downloaded and provides the least functionality.

Custom is the security level when you have changed specific security settings in one of
the prepackaged security levels.

2. Click on the [Custom Level] button to change specific settings within the framework
of the current security level.

3. Browse through the list of the settings and peruse the functionality you can enable or
disable through the security settings. Try and become familiar with this list and the items
you can customize in the security options.

- 141 -
4. Click on the [Privacy tab] of Internet Options. This section allows you to customize
the handling of personally-identifiable information – such as website cookies. Years ago,
cookies got a bad rap from websites which track their users, however, from a website
perspective they are very easy to use to allow for a better experience for users. There are
six different levels you can set your cookie handling from Block All Cookies to Accept
All Cookies. In addition, you can change options manually in with the [Advanced]
button and also [Edit] individual sites to manual tweak the cookie handling on your
machine.

Security is a very important part of any operating system and understanding the security
functions of Internet Explorer is essential to securing your machine.

Exercises
Exercise 1: Check the security settings of your browser. Are they set to ‘Standard’ for the
different zones?

Exercise 2: Are web cookies allowed to be written to your hard drive? How do you find out?

- 142 -
Review Questions
Question 1: When setting the security level for the Internet Zone, it is a good idea to set it to
low so that your browser doesn’t block any information on websites.
F True
F False

Question 2: It is a good idea to block all cookies using the Internet Explorer privacy settings.
F True
F False

Blocking pop-up windows in Internet Explorer?


Introduction

Pop-ups are annoying! Wherever you find them, pop-up ads


(new browser windows that appear out of nowhere, urging you
to buy this product or that) are at best irritating and at worst a
serious nuisance; they are fast becoming the scum of the internet,
much like spam is to email.

Chances are that if you use the internet, you've come across these
at one time or another; these unrequested advertisements jump
out at you and force you to dispense with them before you can
continue your work. Even worse, some of them will open up
new pop-ups when you try to close one of them, creating a
never-ending loop that can create a rift in the very fabric of
space-time itself. Wouldn't it be great if you could just prevent
these little annoyances from appearing in the first place?

Fortunately, unlike spam, pop-up ads are easy to block. Most browsers have this feature built-in:

• Firefox - Blocks pop-ups by default.


• Internet Explorer - Blocks pop-ups by default (with Windows XP SP 2)

These browsers can block unrequested pop-up windows; however, note that Internet Explorer
will only do so if you have Windows XP Service Pack 2 installed. If you cannot or do not want
to install SP 2, there are add-on tools available online that can perform popup blocking and
other helpful functions. For example, the Google Toolbar is a free Internet Explorer add-on
that can block pop-ups, as well as provide other useful web browsing features.

What about those few pop-ups that are actually necessary? For example, some sites use popup
windows to request confirmation before showing content that may not be suitable for all ages; if
your browser blocks all pop-up windows, the confirmation window won't appear and you may
not be able to reach the site you want. No problem: most pop-up blockers allow you to specify
exceptions -- websites that are allowed to open pop-up windows on their own.

Important Note: If pop-up ads are appearing on your computer even when you're not
browsing the internet, chances are you have some adware or spyware installed on your computer
(refer to the section on removing adware/spyware in this workbook).

- 143 -
Turning On/Off the Pop-up Blocker

To turn on the pop-up blocker within Microsoft Internet Explorer, follow these steps:

1. Run [Internet Explorer] as per normal

2. Drop down the [Tools] menu at the top of the browser and select [Pop-up Blocker]
menu, then select [Turn On Pop-up Blocker] as shown in the diagram below.

3. To turn off the pop-up blocker, follow the same steps as before, the only difference
being that the menu selection will now say [Turn Off Pop-up Blocker].

Changing the Pop-up Block Settings…

1. From within Internet Explorer, select the [Tools] menu then select [Pop-up Blocker]
and then select [Pop-up Blocker Settings].

Note 1: You can also select the pop-up blocker settings by navigating to [Tools], then
[Internet Options…] then selecting the [Privacy] tab and then clicking on the
[Settings] button.

- 144 -
Note 2: If you do not have the [Pop-up Blocker] section in the menu, this is an indication
that you do NOT have Service Pack 2 installed and therefore, cannot follow these
instructions until it is installed.

2. In the [Address of Web site to allow] text box, type in the name of the website that you
wish to allow and then click the [Add] button.

- 145 -
3. Make sure there is a check in the box for [Show Information Bar when a pop-up is
blocked]. This will ensure that you will get a small message showing in your browser
when the pop-up block stops a window from opening.

4. Click the [Close] button when you have made all your changes.

Modifying the Pop-Up Blocker Filter Level

1. Select the pop-up blocker settings as per previous section.

2. Drop down the menu under the [Filter Level] title as shown below.

You are offered 3 options to choose from:

• High: Block all pop-ups (Ctrl to override).


• Medium: Block most automatic pop-ups.
• Low: Allow pop-ups from secure sites.

- 146 -
Exercises
Exercise 1: Is the pop-up blocker turned on in your Internet Explorer? How do you check?

Exercise 2: Turn off the pop-up blocker. Go to the following website – www.azlyrics.com.
What happens when you go to this site?

Exercise 3: Turn your pop-up block back on. Go back to the same website. What happens
now?

Review Questions
Question 1: All Internet Explorer browsers have the pop-up blocking feature built into them.
F True – this feature has always been available.
F False – this feature is only available once service pack 2 for XP has been installed.

Question 2: If pop-up ads are appearing on your computer even when you're not connected to
the internet:
F Your browser pop-up settings aren’t working properly.
F Your browser pop-up program has been turned off.
F Chances are you have some adware or spyware installed on your computer.
F It’s normal, don’t worry about it.

- 147 -
Question 3: Pop-up blocking features are only available in the Microsoft Internet Explorer
browser and is not available in other browsers.
F True
F False

- 148 -
Advanced Topics
Introduction

The topics that are discussed in this section require a bit more computer knowledge and
experience than topics in the previous sections.

However, it is highly recommended that you attempt to at least get a basic understanding of the
ideas and techniques that are presented in this section.

Computer/Program Freezes
Introduction

What do you do if one of your programs stops responding and how


do you keep track of all those programs running on your computer?
Well Microsoft have given us a program called the Windows XP
Task Manager.

Starting the Task Manager

There are 2 ways to start the Task Manager:

1. Press these 3 buttons together: [Ctrl] + [Alt] + [Delete]

2. Right-mouse click on an empty part of the task bar and select [Task Manager] from
the pop-up menu.

Now you should have the Windows XP Task Manager on your screen as shown below.

- 149 -
Using the Task Manager

The Task Manager can be used to perform the following functions:

1. Closing a program that has become stuck.

2. Closing a program in the Processes tab.

3. Checking out the CPU and memory usage.

4. Getting out of trouble by creating a new task.

5. Leave the Task Manager running in the system tray to monitor performance.

Now lets look at these functions in some more detail:

1. Closing a program that has become stuck.

There are times when Windows XP will just stop responding when you are using a
program.

For instance you may be typing a document and MS Word just freezes. So how do you
shut down the program when the mouse will not let you click the close button?

Well open up the Windows XP Task Manager (as described in the section above) and
select the [Applications] tab. Now look at the programs running and check the
[Status]. In our example or MS Word freezing on you, you will more than likely see the
Status for word as [Not Responding] instead of [Running].

- 150 -
If this is the case then click MS Word in the list and then click the [End Task] button
at the bottom of the window.

The program that is Not Responding should now close. If not then repeat the process
again.

This is a very handy way of closing programs that are "frozen"!

2. Closing a program in the Processes tab.

The Processes tab is very useful as it tells us what programs are running on your
computer and how much computing power and memory they are consuming.

- 151 -
If you are trying to fix a program that has frozen and using the advice in the previous
section has not helped then you can locate the program on the Processes tab and then
click the [End Process] tab at the bottom of the window.

However, please be careful on what programs you close in this section as it is possible to
close something that will turn your computer into a complete mess!

3. Checking out the CPU and memory usage.

You can get a great idea of how things are performing on your computer by using
Windows XP Task Manager.

Start up the task manager and then select the [Performance] Tab. Now you will see a
graphical representation of the CPU and Memory usage.

- 152 -
This is useful if for instance your computer seems a little "sluggish" or slow.

By looking at the information here you can see for instance how much of your memory
is being used. Or perhaps the CPU is running at 100% constantly.

If your CPU is running at 100% all the time, this is a good indication that there is a
problem with a program that is currently in use.

In this instance you can then look in the [Processes] tab and locate the program that is
causing the problem (see previous section.)

4. Leave the Task Manager running in the system tray.

Sometimes it is useful to have the Windows XP Task Manager running in the system
tray (the bottom right hand corner of your screen – see below).

You can to this if you are running a program and you want to see how much CPU it is
using on starting up and for how long.

- 153 -
When the CPU is busy you will see the icon change colour. By moving the mouse over
the icon you will see the CPU percentage being used.

Exercises
Exercise 1: Start the task manager on your computer using the instructions above. How much
memory is your computer using? How hard is your computer working?

Exercise 2: Open up MS Word. How hard was your computer working while the program
was starting?

Blue Screens
Introduction

It is important to understand that ‘blue screens’


usually indicate a serious problem and can be very
complicated to solve.

The reasons for getting a ‘blue screen’ can be many


and varied. There is sometimes NO simple fix and
can be quite confusing to solve, even for
professional computer people.

In this course we will look at a few simple things


you can do to help solve the problem but there will
be occasions where maybe you cannot solve the
problem and will need to take your computer to a
technician to fix.

Definition

The Blue Screen of Death (BSOD) is an error that


occurs in the Windows operating system. Although
sounding humorous, the BSOD was given its name
because after an error occurs, a blue screen will often appear (as shown below), indicating that
your computer needs a reboot, a repair or some other sort of troubleshooting.

- 154 -
What is the Blue Screen of Death?

The “Blue Screen of Death” is a common industry or popular term for a ‘Stop Error’, a system
error characterised by a blue screen showing an error code (see picture above), the name of the
device or function which caused the error, and sometimes the contents of the system’s memory
when the error occurred.

A stop error can be caused by a number of reasons, including:

• A driver (piece of software that allows a piece of hardware to work) on the computer is
faulty.

• A new piece of hardware that you have just installed in your computer is bad.

• A piece of existing hardware has become bad.

• Environmental factors (eg. The temperature inside the computer is too hot, there has
been a build up of dust or moisture in the computer or there may be an electrical
problem) which has caused a problem.

• Sometimes a program will cause a stop error in some circumstances.

- 155 -
What do I do after one occurs?

The first thing to understand is that when a stop


error occurs, that is it. There is no way to ignore it
and continue working normally. It normally means
that whatever you were working on will have been
lost up until the last time you saved it.

The first step is to figure out why the error occurred,


which as mentioned at the start, can be a difficult
thing to do.

Leave the computer on with the blue screen


displayed for a moment; you aren’t going to damage
anything further by leaving it displayed long enough
to read it properly. Read the information and write it down on a piece of paper, with all the
information on the screen except perhaps the “Memory Dump” section if one exists. The most
important piece of information to write down is the stop error code. Once you have the
information written down, switch your computer off.

From here, you need to try and work out what it was that caused the error.

1. If you have just installed a new piece of hardware in your computer you could try re-
booting your computer in [Safe Mode].

To do this, turn the computer back on, and while it is starting up press the [F8] key on
the keyboard when you first see some text on the screen and you should see a boot menu
appear (as shown below). From this menu select [Safe Mode] using the arrow keys, press
[Enter].

Safe Mode is a special mode for loading Windows without running any programs that are
not considered to be important such as the one you may have just installed.

- 156 -
Note that because of this, some programs will not work properly. We are only using safe
mode to try and fix our problem. You should not try and use the computer normally
while in safe mode.

While in safe mode, try un-installing the hardware and/or software that you just installed
(refer to the section on Removing Unwanted Programs in this workbook). Once you have
done this, reboot your computer into normal mode and see if this has fixed the problem.

You also have another option in the boot menu called [Last Known Good
Configuration]. When you successfully start in Windows XP, it remembers that it has
everything organised and working and stores the configuration as a reference point that is
loaded when you select [Last Know Good Configuration]. This means that you can still
do a lot of other things that you can’t usually do in Safe Mode, only the most recently
installed programs or hardware that maybe causing a problem are disabled.

If the case is that you have installed some bad software or hardware, remove it, and then
re-boot your computer in normal mode and see if the problem has been fixed.

2. If you didn’t install any new programs or hardware, and this has just started happening
after you were making some physical changes to the computer it is likely you have done
one of two things;

In some cases, you will find articles that describe an exact list of instructions that you can
follow to fix the problem.
(a) There are environmental reasons why the STOP error is occurring.
(b) Hardware has been damaged.

(a) Your computer needs to be within certain conditions to work properly such as
temperature, humidity and pressure.

The most important of these is temperature. It is possible that your computer is too
hot and some of the components inside your computer are causing errors.

You can also consider magnetic fields affecting the hard disks, loose wires arcing
against the case and numerous other factors; the best thing to do is open up your
computer case and have a look for anything that doesn’t look right.

(b) Hardware damage can be a result of environmental factors or accidental physical


contact. Check inside the computer case for anything that doesn’t look right. Look
for hardware that is not plugged in correctly, cracked, on an incorrect angle, or
something that is not screwed in correctly.

3. By writing down the stop error code, it is possible to use the Microsoft Knowledge Base
to help determine what caused the blue screen error. The knowledge base can be found at
www.microsoft.com/technet.

Enter the stop error code into the search field on the website (eg. 0x0000008E) and
review the articles that the search returns. In some cases, you will find articles that
describe an exact list of instructions that you can follow to fix the problem.

- 157 -
Conclusion

STOP errors are always serious and can be quite complicated to solve. But with a few basic
troubleshooting techniques and some background knowledge on their cause, they can be
resolved and become a minor and rare issue.

Exercises
Exercise 1: Use the Microsoft Knowledge Base to determine what the problem may be on a
computer system that received a stop error code of 0x0000008E.

Exercise 2: Reboot your computer and start it in Safe Mode.

Review Questions
Question 1: STOP errors can occur in a computer due to hardware errors only.
True.
False.

What to do when Windows XP won't start


Introduction

This section can be a little difficult to understand and


involves using things such as the ‘boot menu’. However, it
can be very useful in helping you fix a computer that just
won’t start up Windows when you turn it on.

What to do

We will describe a few different ways of trying to solve this


problem, starting with the easier options and working to
some more difficult methods.

Method 1

1. If Windows XP doesn’t start when you first turn the computer on, press the [F8] key a
few times right after you turn on your PC but before the Windows log-on screen
appears (it may take a few attempts to get the timing right). This should then display the
[Windows Advanced Options Menu] for you as shown below.

- 158 -
2. At this menu, select [Last Known Good Configuration] to restore your Registry to an
earlier date.

3. Try starting the computer again and see if this method has worked for you.

Method 2

1. If the method hasn’t got your computer working, restart the computer and press the
[F8] key again, but this time select [Safe Mode] in the menu.

2. Once your computer has started in safe mode, choose [Start], [All Programs],
[Accessories], [System Tools], [System Restore]. This will allow you to perform a
system restore to a selected restore point of your choice (please refer to the System
Restore section in this workbook for full instructions on how to do this).

Method 3

If that approach doesn't work either, or if you can't even get to this menu, it is possible to use a
special floppy disk called the ‘emergency boot floppy’. If you don't have an emergency boot
floppy, you can create one another PC running Windows XP, but there's no guarantee that it
will boot your machine.

Creating an Emergency Boot Floppy

1. On a computer that is working and is using Windows XP, insert a blank floppy disk into
the floppy disk drive.

2. Select [Start], [All Programs], [Accessories], [Command Prompt]

3. Type [format a:] and press [Enter].

- 159 -
4. When asked if you want to format another disk, type [n] and press [Enter].

5. Type the following commands, pressing [Enter] after each one.

• xcopy c:\boot.ini a: /h
• xcopy c:\ntdetect.com a: /h
• xcopy c:\ntldr a: /h

6. Now type [exit] and press [Enter] to close the window.

7. Remove the floppy disk and label it "Windows XP boot floppy."

8. Put this emergency disk in the floppy drive of the computer that is not working and then
turn the computer on. Windows should run with no problems.

9. You could simply keep the floppy in the drive all the time, but to truly fix the problem,
launch the command prompt as described above, type xcopy a:*.* c:\ /h, and press
[Enter].

Method 4

This method involves using a tool called the ‘Windows XP Recovery Console’. This section is
getting quite complicated but we are mentioning it in this workbook so you are aware that it
exists.

The Windows XP Recovery Console

If the emergency boot floppy doesn't work, you could try using the Recovery Console, a
Windows utility that provides a DOS-like command line from which you can run some repair

- 160 -
programs. It's a bit difficult to use if you are not used to command lines, and you can damage
your data, so be careful if using it!

1. If you have a Microsoft Windows XP CD-ROM, you can get to the Recovery Console
by booting from that CD and pressing any key when you're told to [Press any key to
boot from CD].

2. At the [Welcome to Setup] screen, press [r] for Repair.

3. Below is a list of the Recovery Console's most useful commands. For detailed
information on a particular command, type the command followed by a space and /?, as
in chkdsk /?.

• Chkdsk1 Checks disks for errors.


• Diskpart Creates and deletes partitions.
• Extract2 Extracts files from compressed.cab archives.
• Fixboot Writes a new boot sector.
• Fixmbr Writes a new master boot record.
• Help Lists the Recovery Console commands.

4. We won’t go into more detail about the Recovery Console as it is too complicated for
this course. However, if you would like to know more information about using the
Recovery Console, you can read more about it at
http://support.microsoft.com/kb/314058.

- 161 -
Check List
The recommended steps…
Step 1: Backup.
• Make a backup of your System state – which will include the registry.
• Your data files.
• Your user settings.
• Work out the best way for your organisation to store the backup information.
• Think about having 2 copies of your backup information on 2 different types of
media and store at least 1 of these away from the office.

Step 2: Operating System Updates.


• Check to see if Windows XP service pack 2 is installed. If it isn’t, install it.
• Perform a manual Windows XP update by going to the Windows Update website
and make sure that you download and install any high priority updates.
• Turn on automatic updates, and select the ‘Notify me before downloading and
installing updates’ option.

Step 3: Remove unwanted programs.


• Using the ‘add/remove programs’ tool, have a look for any programs that shouldn’t
be installed, or programs that haven’t been used for a long time and remove them.

Step 4: Check disk.


• Run the check disk program.
• The first time you use this program, it might be a good idea to choose the option
that will scan for and mark sectors as bad if it finds anyway.

Step 5: Disk Cleanup.


• Run the disk cleanup program and remove all of the temporary files, log files etc…
that you don’t need anymore.
• If your hard drive is running out of space, maybe think about compressing files that
haven’t been accessed for a long time.

Step 6: Disk Defragmenter.


• Run the disk defragmenter program. If this is the first time you have used this
program on your computer, it is a good idea to defragment your hard drive even if
the program tells you that your hard drive doesn’t need defragmenting.

Step 7: Viruses.
• Make sure you have anti-virus software installed on the computer. We recommend
that you install AVG anti-virus.
• If you choose to either install AVG or keep your current anti-virus program, make
sure that you have the very latest virus definitions.
• Run a full scan on your computer to make sure you have no viruses.

Step 8: Spyware.
• Install the AdAware program on your computer.
• Make sure you have the latest spyware definition updates.
• Run a full scan on your computer to make sure you have no spyware.

- 162 -
Step 9: Firewall.
• Run a test using the ShieldsUp web program and scan all of your common ports.
• If the test shows that you have open ports on your computer, think about installing
a software firewall such as Zone Alarm or maybe turning on the Windows XP
firewall.
• If you choose to install a software firewall or if you decide to set up a hardware
firewall, run the test again and make sure that your firewall passes the test.

Step 10: User accounts.


• Come up with a plan of how you want users to log on to their computer.
• If you are the only one using the computer, create a ‘limited’ account for yourself
that you use for doing day-to-day work – leave the admin account for making
changes to your computer only.
• Make sure all the accounts on your computer have a password and that the password
is not easily worked out.
• If you have many people using the computer, think about setting up a password
policy to make sure people choose difficult passwords.

Step 11: Browser Security.


• Open up Internet Explorer and check that your security settings are at the default
levels or higher.
• Make sure that you have the pop-up blocker turned on.

Step 12: File security.


• Come up with a plan and discuss with others in your organisation about the best way
of sending information to other people.
• Consider password protecting your documents if security is a concern.

- 163 -

You might also like