Monday, August 29, 2011

3 stubborn PC problems you can fix

Ever notice how each PC has a personality of its own? Or maybe even multiple personalities? In the course of a week, your computer may act friendly, moody, and sometimes downright mean.

However, don't take a hammer to your PC just yet. The following is a list of common symptoms and treatments to help even the most troublesome PCs. You don't even have to be a psychologist (at least not yet) to deal with your PC's neuroses.

Windows 7 and Windows Vista usually manage this automatically, but overall you'll find that these tips work for all versions of Windows, from Windows 95 to Windows 7.

1. You keep getting a "your system is running low on virtual memory" message

Perhaps you're more than familiar with this scenario: You're working on your PC and notice performance getting gradually slower and slower. Programs become harder to open and close. You wait forever for Web pages to be displayed. And then, you get some serious-sounding "virtual memory is too low" message, like the one in the following graphic.

Don't worry: This message isn't as scary as it sounds.


Virtual memory low message

Virtual memory is the space your computer uses when it's short of RAM (Random Access Memory), which is the memory used when running programs like Microsoft Office Word or Microsoft Office PowerPoint.

So what can you do to correct this problem and prevent this message from coming up in the future? The following are some solutions to keep your computer from displaying the "virtual memory minimum is too low" message.

Solution 1: Bump up the virtual memory size on your computer

The first solution is to increase your computer's virtual memory settings. To do so, you first need to determine how much RAM you currently have.

Windows 7: On the Start menu, click Control Panel, then click System.

In the left pane, click Advanced system settings. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

On the Advanced tab, under Performance, click Settings.

Click the Advanced tab, and then, under Virtual memory, click Change.

Clear the Automatically manage paging file size for all drives check box.


Clearing the Automatically manage paging file size for all drives check box

Under Drive [Volume Label], click the drive that contains the paging file you want to change.

Click Custom size, type a new size in the Initial size (MB) or Maximum size (MB) box, click Set, and then click OK.

Note Increases in size usually don't require you to restart your computer for the changes to take effect, but if you decrease the size, you'll need to restart your computer. We recommend that you don't disable or delete the paging file.

Solution 2: Add more RAM to your computer

If you keep getting that dreaded "Your system is running low on virtual memory" message—even after you increase your computer's virtual memory—then you may need to buy more memory for your computer. To really work well:

Windows 7 needs at least 1 GB of RAM to run. See more system requirements for Windows 7.

Windows Vista needs at least 512 MB of RAM to run, but for some applications (like gaming) 1 GB or more of RAM is recommended.

Windows XP needs a minimum of 256 MB of RAM.

The more RAM you have, the better.

Find out how much RAM you have in your computer: On the Start menu, click Control Panel, then click System.

Under System, next to Installed memory (RAM), you can see the amount of RAM your computer has.

Note In some cases, Windows reports both the amount of memory that's installed on your computer and the amount of memory that's usable. If you're using a 32-bit version of Windows, the amount of usable memory might be less than the total amount of memory installed.

If you're at work, contact your company's IT administrator before updating the memory on your computer. They may have some memory available and can help you install it.

If you do need to purchase some more memory, stop by your local computer shop. You can probably buy memory from them, and they'll probably install it for you. Or, you can buy memory online.



--------------------------------------------------------------------------------

2. Your windows slide off the desktop—and you can't grab them

We're all familiar with moving program windows around the desktop. You can click-and-hold the window's title bar to move it around. But what do you do when you accidentally move a window's title bar off the desktop so you can't grab it anymore? The window is stuck in that inconvenient position.

Solution: Use your keyboard to help move your window

The trick to moving these stubborn program windows is to use your keyboard.

Use your keyboard to move a window:Select the program window you're trying to move, and then press ALT+SPACEBAR on your keyboard. The program's shortcut menu is displayed.


Accessing shortcut menu

Click Move.

Use your LEFT ARROW, RIGHT ARROW, UP ARROW, or DOWN ARROW keys to move the window so you can see its title bar on your screen.

After you move the window where you want it, press ENTER.



--------------------------------------------------------------------------------

3. Your taskbar has disappeared

The taskbar is that horizontal bar at the bottom or your computer screen that displays open programs on your desktop. The taskbar also contains the Start menu, which allows you to navigate to various programs installed on your computer. In many ways, it's your command central.

Thus, there's nothing more frustrating than going to start a program, only to find the taskbar gone. A computer without a taskbar will bring you to a grinding halt.

The good news is that the taskbar never disappears—it just hides. It may be hiding behind other open windows, or at the top or side of your screen. You can also (unintentionally) make the taskbar so thin that it seems invisible.

The following are possible reasons why your taskbar has vanished, as well as solutions to keep your taskbar from ever running away again.

Solution 1: Find your taskbar behind other windows

If you don't see your taskbar, minimize all windows on your desktop. See if your taskbar is hiding behind your open windows.


Finding your taskbar behind maximized windows

Set your taskbar so it's always on top of all desktop windows:

Right-click the taskbar, and click Properties.

Select the Lock the taskbar check box.

Make sure the Auto-hide the taskbar check box is not selected.


Locking and keeping the taskbar on top

Now your taskbar will always be visible, no matter how many windows you have open. Locking your taskbar also keeps you from accidentally moving it around.

Solution 2: Find your taskbar elsewhere on your screen

If you have tried minimizing all windows on your desktop and you still don't see your taskbar—perhaps it has been moved. Maybe you've moved it yourself by accident. Or, perhaps someone's playing a practical joke on you. Regardless, the following will help you get your taskbar back to its proper size.

As you did in the previous steps, minimize all windows on your desktop. If you don't see your taskbar at the bottom of the screen, perhaps it's hanging out to the side or at the top of your desktop.


Finding a hidden taskbar

Click-and-drag your taskbar back to the bottom of your screen.

Right-click the taskbar, and then click Properties.

Click to select the Lock the taskbar check box.

Solution 3: Thicken your taskbar

You can make your taskbar a thin line—so skinny it's hard to see. To see if you've done this unintentionally, perform the following:

Minimize all windows on your desktop. Look at each side of your screen. If you see a thin strip, that's the taskbar.


Finding a thin taskbar

Point your mouse at the strip. It changes into a double-sided arrow

Click-and-drag the mouse toward the center of the screen to thicken your taskbar.

After you thicken the taskbar, you can drag it back to the bottom of the screen by following the steps in "Solution 2" above.


Thursday, August 25, 2011

5 ways thieves steal your credit

Personal data can be stolen in seconds, but knowing how it most often happens can help you protect yourself or, if you're a victim, minimize the damage.
Almost gone are the days of the good old-fashioned purse snatcher. With less brute force and more skill, thieves need only a minute, sometimes less, to pilfer your credit card data.

The schemes are simpler than you think. Here are the most common ways thieves pilfer your credit card information.

Suspects: The toy store trio
Modus operandi: Sally, Simon and Bud walk into a toy store. Sally and Simon roam the aisles, while Bud waits in line to check out. When Bud is at the register, Simon comes running up to the clerk, screaming that his wife has fainted. As Sally and Simon distract the salesclerk, Bud switches the credit card reader at the register with a modified one of his own, says FICO's fraud chief, Mike Urban. For the next week, the salesclerk unwittingly collects credit card data on the modified reader until the trio returns, takes back the modified reader and restores the original terminal.

Known whereabouts: The trio will hit other retailers and restaurants, but sometimes the threesome will instead be a twosome or a solo criminal.

Suspect: The waitress at the diner
Modus operandi: The waitress whisks away your credit card and swipes it through the restaurant's register. Then she pulls a small device -- about the size of an ice cube -- from her apron and swipes it through that, says Sgt. David Schultz of the Fort Bend County Sheriff's Office in Texas. While you're scraping the last of the chocolate frosting from your plate, your credit card information has been stored in the device, known as a skimmer. The waitress returns your card and performs the same magic trick on dozens of credit cards in a week.

Known whereabouts: The data-stealing waitress has been known to moonlight as a bartender, salesclerk or at any other job that allows her to take your credit card out of sight.

Suspect: The Gas Lass
Modus operandi: The Gas Lass parks her car in front of a gasoline station off the turnpike. It's late. There's no one around except a sleepy attendant at the register inside. The Gas Lass attaches a skimmer over the credit card reader at the pump. It's a special skimmer: It emits a Bluetooth signal to a laptop close by, says Noonan. The Gas Lass pays, heads off to the motel next door and sets up her laptop to receive the data from the compromised pump over the next several days.

Known whereabouts: The Gas Lass installs skimmers over ATMs, parking meters, vending machines and other places with unmanned credit card readers.

Suspects: Harry the Hacker and Phishing Phil
Modus operandi: Harry the Hacker installs malware -- a type of software that damages or infiltrates a computer or network -- onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer, says Urban. Harry also infiltrates the computer system of banks, retailers and other businesses and extracts personal account information, Noonan says.

Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke, including passwords to your financial accounts.

Suspects: The rest of the criminal crew
Modus operandi: So what happens to these pieces of data when they're in no-good hands? They get sold.

The waitress, trio or Gas Lass sells each swipe for $20 to $40, says Urban. Harry the Hacker and Phishing Phil will get $5 to $10 a card and may sell the information online. The person who buys the information verifies it and then sells it to a person who creates fraudulent credit cards with victims' account information attached to them. The card-maker then sells cards to other criminals who buy goods, such as stereos or baby formula, and sell them to regular consumers.

What you can do
1.Set up mobile alerts for your phone if your financial institution provides the feature. That way, you can be aware of unusual activity as quickly as possible.

2.Regularly monitor your accounts online, so you can identify fraudulent transactions faster.

3.Avoid public computers. Don't log on to your email if your bank corresponds with you there. WebAddo suggests setting up an email account just for your finances and checking it from safe locations.

4.Avoid doing business with unfamiliar online vendors. Stick to established merchants and websites.

5.If your information has been compromised, notify your financial institutions and local law enforcement, which will contact the Secret Service if necessary. Also notify any of the three major credit reporting agencies -- Experian, Equifax and TransUnion -- to set up a fraud alert on your credit reports.

6.Get Identity Theft Protection. If your data is compromised, companies such as Pre-Paid Legal can help you restore your good name.

Thursday, August 11, 2011

Top free PC programs everyone should have

There are millions of free and open source projects available, many of them better than any commercially available product. Below is a short listing of what we think is the best out there, broken down into three categories.

Anti-virus and malware protection

Most PC users realize that they need protection on their computer or may have an installed anti-virus program from their computer manufacturer. What most don't realize is that there are free programs that are just as good and in some cases better than the commercial products. Below are our recommendations

Anti-virus program: Avast! or AVG

Malware / Spyware protection: Malwarebytes

Backup solutions

There are dozens of free and commercially available backup programs for computers. Unfortunately many of those backups are stored locally, meaning if your house were to catch fire, get robbed, or if you lost your backup discs all your data would be lost. This is why when dealing with important data we suggest users use online backup services.

Online backup solution: Mozy * or Dropbox or IDrive
* Free 2 or 5 GB of online backup for personal use

Browsers

Although Microsoft Internet Explorer comes pre-installed on Windows computers. There are several excellent free alternatives that everyone should try. These free alternatives can often be faster, have more options, and in many cases be more secure than Internet Explorer.

Internet Browser: Mozilla Firefox or Google Chrome

Monday, July 18, 2011

Ever wonder how to clean out your computer?

Ever wonder how to clean out your computer? Many people do, because it’s not unusual to have your PC’s hard disk filled with games and other programs you no longer need. In fact, some technology analysts believe that we use less than 10 percent of the programs installed on our computers. The following instructions describe how to safely—and easily—uninstall old or unused programs and remove files from your Windows-based computer.

Decide which programs to purge

When planning a disk cleanup, the first step is to decide which programs you no longer need. You may want to keep only the programs you use regularly. For example, has it been a year since your child played that action game? Chances are good that you still have the original CDs anyway (if you want to reinstall it later), so perhaps it's time to wipe it off the hard drive.

If you don't know the purpose of a program that's on your hard drive, you can always use a favorite search engine, such as Bing, to see what it is. For example, if you don't plan to buy a camcorder, remove any preinstalled video-editing software that may have come bundled on your PC.

If it helps, make a list of programs you want to keep and others you can do away with or store on disk.


--------------------------------------------------------------------------------

Delete unused programs, beginning at the Start menu

While it’s easy to remove software, many novice computer users believe a program can be removed by simply deleting the program’s icon from the desktop. This method doesn’t work because the icon is only a shortcut to the real program, which consists of many files.

You can uninstall programs from your computer by using one of two methods, both located on the Start menu:

Uninstall from the All Programs list

Click the Start menu, and then click All Programs (or Program Files) to see a list of programs installed on your computer. Programs installed as part of a program group are identified by a folder icon in the list. When you click the program group, you should see an option that enables you to remove or uninstall the program. Click this option, and then follow the on-screen wizard to safely remove the program from your PC. You may be asked to restart your computer. Don’t restart the PC until after you have saved any files that are open.


You can follow an on-screen wizard to safely remove programs from your PC.

Uninstall from Control Panel

Some programs don’t give you the option to uninstall them from a program group, but you can uninstall them from Control Panel.

On the Start menu, click Control Panel, and then, under Programs, do one of the following:

Windows 7 and Windows Vista users: Click Uninstall a Program.

Windows XP users: Click Add or Remove Programs.

It may take a few seconds for this page to open, but when it appears, you’ll see a long alphabetical list of installed programs.


When you see the name of a program you no longer want on your hard disk, click it, and then do one of the following:

Windows 7 and Windows Vista users: Click Uninstall.

Windows XP users: Click the Remove or Change/Removetab (to the right of the program).

Follow the prompts. A progress bar shows you how long it will take to safely remove the program. When it's finished, you will see the list again.

Go through the list, but leave those programs that you are unsure of. And don’t remove a program group if you use one of the programs. For example, if you use Microsoft Works Database, don’t uninstall Microsoft Works, because Works Database is part of it.

When you uninstall a program, you may also get a message that says that uninstalling the program may remove a file that is shared by another program. To be safe, keep these suggested files on your PC (they shouldn't take up much room on your hard disk, anyway). When you uninstall a game, the program may ask if you want to keep saved game files. If you think that you will reinstall and play this game again, you can choose to keep the files.


--------------------------------------------------------------------------------

Use System Restore

Your PC automatically creates restore points while you use your computer. That way, if you accidentally delete a program that you want to keep, you can restore your PC back to an earlier time to get the program back. To restore, on the Start menu, click All Programs (or Program Files), click Accessories, and then click System Tools. Click System Restore, and the program will guide you through the steps.

--------------------------------------------------------------------------------

Scan your computer for performance and security problems

You can also download a free safety scan from the Internet for your computer. The Windows Live OneCare safety scanner includes a virus and spyware scan, a free registry cleaner scan, and more. And while you’re doing these cleanup chores, you can also download and run Security Essentials to help ensure that your computer is free of viruses, spyware, and other malicious programs—at no charge.


--------------------------------------------------------------------------------

Delete files

This article focuses on uninstalling entire programs, but it's even easier to delete individual files. If your musical tastes have changed since you went through that country-and-western stage, you can easily delete downloaded music files or at least burn them to a CD to free some space on your PC.

Go to Computer (or My Computer) or Windows Explorer, highlight the files that you no longer want on your hard disk, and press the Delete key (or right-click the file name, and then select Delete). This will send your unwanted files to the Recycle Bin for safekeeping—until you're sure that you no longer want them. To free space on your computer, you’ll need to empty the Recycle Bin periodically. To empty the Recycle Bin, right-click the icon on your desktop, and then click Empty Recycle Bin.


--------------------------------------------------------------------------------

Remove temporary files

If you’ve downloaded a .zip or .exe file from the web and then installed the program on your hard disk, you can delete the original file. To delete the file, right-click the file name, and then click Delete.

And here’s a final tip to help keep your computer lean. If you want to free even more room on your hard disk, get rid of the temporary files that your computer amasses over time. Go to Computer (or My Computer) or Windows Explorer, and right-click the letter associated with your hard disk (usually C:). Click Properties, and then click Disk Cleanup.
--------------------------------------------------------------------------------

Format disks and drives

If you need to perform the ultimate cleanup on your computer and you need to know how to delete all files on your computer, learn about formatting disks and drives. Keep in mind, however, that this is not a reversible process, so be sure that you have a good reason to reformat your hard drive (for example, you have backed up all of your files and need to reformat the hard drive to install a new operating system, or you are selling your computer and need to remove all of the information on it).


--------------------------------------------------------------------------------

Saturday, July 16, 2011

Harmful Software Spreads Viruses Using the latest News Headlines

Here's proof that criminals do keep up with current events:

The Federal Bureau of Investlgation and U.s. Better Business Bureau have issued a warning that U.S. military action in Pakistan has led to malicious software being launched to entrap those surfing for the latest news.

The online scams have been specificaiiy targeting social media sites, image search engines and emails links that lure victims with promises of specific details and photos of the successful military mtssion.

Here are some of the tips for online safety from the BBB:

- Adjust privacy settings on social network sites so it's more difficult for anyone
to post content to your page. Even "friends" can unknowinqly pass on software
viruses.
- Read emails carefully. Fake messages often have misspellings, bad grammar and unusual English usage.
- Never provide your bank account number or other private information when requested
through an email.
- Be a skeptic of links to videos or photos that are not widely available from respected news sources.
- Be wary of "free" offers noting any occasion, especially if it comes from an unknown company or website.

It is suggested that you spread the word to family and friends that this viral software is making the rounds.

Tuesday, February 8, 2011

3 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This post discusses how to use the tools available in Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you're online.

Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren't logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses
Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer's performance.
Download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.

The Microsoft Windows Malicious Software Removal Tool is another utility that checks computers running Windows 7, Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software, including Blaster, Sasser, and Mydoom, and helps remove any infection found.

2. Free up disk space
The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.

Use Disk Cleanup to:

Remove temporary Internet files.
Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
Empty the Recycle Bin.
Remove Windows temporary files, such as error reports.
Delete optional Windows components that you don't use.
Delete installed programs that you no longer use.
Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup:

Windows 7 usersClick Start, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

When Disk Cleanup has calculated how much space you can free up, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.
Clear the check boxes for files that you don't want to delete, and then click OK.

For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, and then click the More Options tab.

When prompted to confirm that you want to delete the specified files, click Yes.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner, performing better, and potentially increasing your PC speed.

Windows Vista usersIn the Start menu, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup.

In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.

If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.

Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.

When you finish selecting the files you want to delete, click OK, and then, to confirm the operation, click Delete files. Disk Cleanup then removes all unnecessary files from your computer. This may take a few minutes.

The More Options tab is available when you choose to clean files from all users on the computer.

Windows XP usersClick Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

Clear the check boxes for files that you don't want to delete, and then click OK.
When prompted to confirm that you want to delete the specified files, click Yes.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and potentially performing better.

3. Speed up access to data
Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.

Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.

In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:

You add a large number of files.
Your free disk space totals 15 percent or less.
You install new programs or a new version of the Windows operating system.

To use Disk Defragmenter:

Windows 7 usersClick Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.

In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze disk button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

To display detailed information about the defragmented disk or partition, click View Report.

To close the View Report dialog box, click Close.

You can also schedule the Disk Defragmenter to run automatically. (Your computer might even be set up this way by default.) Under Schedule, it reads Scheduled defragmentation is turned on and then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or to change the time or frequency, click Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Change the settings, and then click OK.

To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Windows Vista users Open Disk Defragmenter: Click the Start button, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze disk button. After the disk is analyzed, a dialog box appears letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

To display detailed information about the defragmented disk or partition, click View Report.

To close the View Report dialog box, click Close.

You can also schedule the Disk Defragmenter to run automatically. (Your computer might be set up this way by default.) Click Modify schedule....

In the Disk Defragmenter: Modify Schedule dialog box, choose how often, which day, and at what time of day you want defragmentation to occur, and then click OK.

Click OK again.

Windows XP users Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.

After the defragmentation is complete, Disk Defragmenter displays the results.

To display detailed information about the defragmented disk or partition, click View Report.

To close the View Report dialog box, click Close.

To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently.

Friday, September 24, 2010

Facebook password scam warning!

If you get an e-mail telling you your Facebook password has been changed and a new one Is attached, delete it immediately -- it's the latest Facebook scam, according to an alert from the Better Business Bureau.

Here's what it looks like:

From: Facebook, Artemus Rubert [mailto:amazor@facebook.com]
Sent: Wednesday, September 22, 2010 2:48 AM
To: MY EMAIL ADDRESS DELETED
Subject: Facebook password has been changed.

Dear user of facebook.
Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.
Thanks,
Your Facebook.


"With 500 million users, Facebook is one of the largest breeding grounds on the Internet for 'phishing' scams," said BBB President Tom Bartholomy in a statement. "Scammers are looking for any hook to get you to click on their links or attachments so they can get to your personal information."

The BBB warning comes exactly one day after their last Facebook scam alert, cautioning users to beware of another phishing scam known as "clickjacking," which tricks users into clicking on a link that triggers a program bombarding their e-mail accounts and everyone in their address books with spam.

Although Facebook did not immediately respond to a request from Consumer Ally to comment, these scams are literally becoming a daily occurrence, due primarily to the extraordinary amount of Facebook users, which at half a billion, exceeds the population of every nation on earth -- apart from India and China.

If Facebook's rapid growth continues, it's on course to exceed the total number of Internet users in China, which the Economist places at 420 million. According to Facebook, more than 50% of its 500 million active users log on in any given day and spend more than 700 billion minutes per month on the social networking site.

Apart from the enormous target of opportunity presented by the sheer number of Facebook users, scammers are undoubtedly aided by the fact that many Facebook users are young, and as such, probably more gullible and prone to click before they think.

The BBB urges Facebook users to be on the alert for the following red flags to avoid becoming a victim of identity theft:

Password changes -- Facebook is NOT going to send you an e-mail with a new password. If Facebook suspects fraudulently activity with your account, it will send a direct message to your Facebook account, and instruct you to go to your "Settings" button to change your password yourself.

Attachments/Links -- You should always be suspicious of e-mails that instruct you to download an attachment or click on a link. Attachments and links are the primary methods by which viruses, spyware and malware are spread.

E-mail address – If you only have your personal email address on your Facebook account and you get a "Facebook" e-mail on your business account, you should be suspicious and not open the e-mail.

Grammar, punctuation and typos – The grammar and incorrect punctuation used in the latest e-mail scam indicates that English is probably not the sender's first language. "Dear user of Facebook" is an example. In American English, it would more likely be "Dear Facebook User." Grammatical errors and awkward phrasing are tip-offs that the sender is probably in another country and that the e-mail is a scam. This is a red flag for any suspect e-mail you get, as most corporations will have any written information they send out to users and clients professionally copy edited.

The BBB also offers this general advice to stay safe online:

Delete any suspicious e-mails as soon as you receive them.
Do not click on any links.
Do not download any attachments.
Do not call any telephone numbers that may be in the e-mail.
Protect your computer with a good quality, up-to-date, anti-virus software program.
Since many Facebook users are young people, parents should talk to their children about Facebook scams and how to spot them. Young people are very computer savvy, but may not be scam savvy.