Archives 2010

10 free anti-malware tools worth checking out

Over the last few years, anti-malware software has become increasingly costly. But believe it or not, there are still ways to protect your computer for free. In this article, I will list 10 free utilities you can use to either prevent malware infections or to help clean up the mess once a PC becomes infected.

1: AVG Anti-Virus Free Edition 2011
I have been using AVG’s free antivirus product for a few years now, and although it isn’t perfect, it seems to be at least as good as most of the commercial anti-malware products. AVG’s free edition provides basic protection against viruses and spyware, but the company also offers a more comprehensive security suite called AVG Internet Security 2011. This suite offers the same anti-malware protection as the free edition, but it also provides real-time protection against Internet search and social networking sites.

2: Comodo Antivirus
Comodo Antivirus takes a different approach to virus protection than most other antivirus products do. Comodo is based on the idea that it is foolish to allow code to run without first proving itself to be benign. So Comodo implements a default denial until an executable proves itself trustworthy. To keep the software from being too chatty, Comodo executes unknown code in an isolated sandbox where its behavior can be monitored without running the risk of the executable harming the system.

3: PC Tools AntiVirus Free 2011
PC Tools AntiVirus Free 2011 is a basic antivirus / anti-spyware program that is designed to protect Windows desktops against various forms of malware. Besides its basic detection capabilities, PC Tools includes a feature called Search Defender that is designed to warn you about unsafe Web sites (or phishing sites) before you click on them. The software also includes a File Guard component that monitors the file system and blocks attempted malware infections in real time.

4: Avast Free Antivirus
Like AVG, Avast sells comprehensive security suites, but makes its basic antivirus / anti-spyware product available for free to home users. Although I have never used Avast Free Antivirus, I’ve recently noticed posts in various message boards from people who claim that Avast provides better protection than some of the commercial products.

5: Ad-Aware Free Internet Security
Although it was originally designed as a product for detecting adware, Lavasoft’s Ad-Aware has evolved into a complete anti-malware product. Ad-Aware Free Internet Security provides real-time protection against spyware, rootkits, and more. It also includes a utility called The Neutralizer, which you can use to clean a PC that has already been infected.

6: HijackThis
HijackThis is one of my favorite anti-malware utilities, but it’s not for the faint of heart. HijackThis is designed to compile a report of critical file and registry settings that are often prone to viral infections. The thing that makes HijackThis difficult to use is that it makes no distinction between malicious and legitimate entries. As a result, you can end up doing even more damage to a PC unless you know what you are doing. Even so, I consider HijackThis to be a must-have utility.

7: Microsoft Security Essentials
Microsoft provides free antivirus protection for home users through a relatively new application called Microsoft Security Essentials. Microsoft Security Essentials is based on the same ForeFront technology as Microsoft’s enterprise class anti-malware software. The difference is that Microsoft Security Essentials is available solely to home users and businesses with fewer than 10 Windows desktops.

8: Windows Defender
Microsoft’s Windows Defender is a free anti-spyware utility for Windows. It’s not comprehensive, but it does a surprisingly good job of protecting Windows as long as you install it before an infection occurs.
Windows Defender is included with Windows Vista and Windows 7, but you can also download a version for Windows XP. If you are using Windows 7 or Windows Vista, Windows Defender is disabled by default. You can enable Windows Defender by typing the word Defender into the Windows search box and then double-clicking on the Windows Defender option. When you do, Windows will tell you that Windows Defender is turned off and will give you the opportunity to enable it.

9: Malicious Software Removal Tool
Although not a comprehensive antivirus tool by any stretch of the imagination, Microsoft’s Malicious Software Removal Tool does a good job of detecting and removing the most common viruses. The Malicious Software Removal Tool works with Windows 7, Vista, XP, and Server 2003. Microsoft releases updates to this tool on the second Tuesday of each month.

10: McAfee virus removal tools
McAfee makes commercial antivirus products, but it also offers some free tools for removing viruses. Specifically, it offers tools for removing Sasser, Bagle, Zafi, Mydoom, Lovsan / Balster, Klez, and Bugbear. You can download all of these tools here

To view the original article in it’s entirety Click Here

Which Cell Phone is Right for You?

There are so many choices these days when it comes to choosing a new cellphone or smartphone. Believe it or not there are now utilities out there that can help you make an educated decision based on your answers to a handful of questions. WWW.TopTenREVIEWS.com has a great Mobile Phone Configuration that can guide you in the direction to your perfect phone match. Click Here to be directed to their site to try out this very helpful utility.

5 Tips to Keep You Cyber-Safe this Buying Season

With more consumers spending money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

Black Friday and Cyber Monday may mark the high points of the holiday shopping season, but they are by no means the end of it. In a still struggling economy, with everyone searching for value, consumers will encounter technology deals that might seem too good to be true.

As reported by the Dow Jones newswires, online shopping may well top $1 billion dollars on a single day this year. With more and more consumers willing to spend money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

So, how can you avoid being taken advantage of?

There are many ways to keep yourself, your privacy, and your money safe this holiday season. But, as the countdown to Christmas grows shorter, many of us abandon our common sense in the desperate pursuit of that one great gift or that one fantastic deal.

Therein lies the problem. The number one way to guard against online scams is to employ some common sense.
For example, many of us will go to extreme lengths to save a few dollars. This often includes venturing off the ‘beaten path’ and looking outside the major retailers on online auction or classified sites such as E-Bay or Craigslist, which the Better Business Bureau has cautioned against. While many of the deals offered on such sites are perfectly legitimate, the likelihood of stumbling into a scam is far greater on these sorts of sites.

Tip #1 — If a deal seems too great, it probably is, especially if it’s from an individual user or a ‘minor’ retailer. Be suspicious of any deal or sale that you can’t believe is real. Maybe you’ve found the best buy of the season, but it’s more likely that you’ve stumbled into a scam set up to defraud you and steal your money or information.
It’s also important to remember that anyone you do business with online knows more about Internet commerce — and its dangers — than you do.

An excellent Tip #2 is to do some research about any online vendor you’re considering making a purchase from. Some vendors believe quality customer service goes hand in hand with turning a profit. Others, however, such as Vitaly Borker, seem to value their bottom line over the satisfaction of their customers.

As reported in the New York Times and on Cnet.com, Borker took advantage of loopholes in credit card policies to refuse refunds and threaten customers. Only when he was in danger of being cut off by Visa and MasterCard did Borker begin meeting his customer’s needs.

Some simple research might have tipped customers off that Borker’s website was one to be avoided.

As heinous as Borker’s actions may seem, they do bring to light Tip #3 for the online shopper: understand your credit cards. Borker and other merchants like him, were able to take advantage of customers because of the rules set up by the credit cards those customers use.

With credit card purchases being the dominant form of online shopping, it’s vital that consumers know the policies of the cards they use and what recourse they have should those policies be abused.

Tip #4 — Consumers would also be wise to investigate other forms of payment, such as PayPal or Bill Me Later, a PayPal service. While alternative methods may not offer the convenience of credit cards, they may provide more security against potential scams and those who know how to abuse the system.

Regardless of where and when you shop online, Tip #5 applies: be cautious. The Internet can be a dangerous place at the best of times. During the often stressful and expensive holiday season the dangers increase exponentially.

Be wary every time you shop online and help to make sure this time remains a time of giving, and not of taking.

To read the original article in it’s entirety please Click Here

iPad’s big upgrade: The top 10 iOS features for business

Apple has released the first major software update for the iPad. The 4.2 version of iOS brings a slew of new capabilities to the iPad, including many that will be of interest to business professionals and to IT departments that have deployed or are considering a deployment of the iPad.

The update, which is available as a free download through iTunes, is the first jump to iOS 4 for the iPad. The iPhone got iOS 4 in the spring but the iPad has been stuck on iOS 3.2 until now. With iOS 4.2, the two devices are now unified on the same operating system (along with the iPod Touch as well).

Below is my list of the 10 most important iOS 4 updates for iPad business users.

1. Multitasking
The biggest factor holding back the iPad has been its lack of multitasking. With the 4.2 update, multitasking has finally arrived. It works the same way as iPhone multitasking, which arrived earlier this year. To be clear, iOS 4.2 multitasking is actually more like quick-switching between apps while saving the state of open apps. But, at least it changes the iPad from being a one-app-at-a-time experience. This is especially important for workers who need to copy-and-paste between apps and do other types of multi-app integration. To access multitasking you simply double-click the home button.

2. AirPlay
AirPlay is the flashiest new feature in iOS 4.2. It allows you to quickly stream media from an iPad (or iPhone or iPod Touch) to an Apple TV. The functionality is in its infancy and it may not sound like it has much use for business, but it could be huge. Today, once you have video or photo open, it only takes two taps to throw it up on the big screen. Plus, you can almost-instantaneously switch between different presenters. In the future, imagine hooking up an Apple TV — a tiny $99 box not much bigger than a smartphone — to a projector or a 60-inch LCD TV in a conference room and being able to quickly and easily share charts, graphs, media clips, and presentations straight from your iPad. Look for lots of apps to find ways to take advantage of AirPlay.

3. Wireless app distribution
With 4.2, enterprises can push out their own custom business apps to corporate iPad users over Wi-Fi or 3G. The apps don’t have to go through the Apple App Store and users don’t have to sync through iTunes or a computer in order to get the company apps.

4. AirPrint
Another one of the most talked-about features of 4.2 is AirPrint, which lets you print wirelessly from the iPad. The implementation on this is pretty good. A print option is added to the menu for printing documents, photos, and web pages and the iPad automatically recognizes compatible printers nearby. Unfortunately, the list of compatible printers is very small for now, and apps will need to add this functionality to their software so that printing will be possible in more places on the iPad.

5. Find My iPad
This was previously part of Apple’s paid MobileMe service but with iOS 4.2 it is now a free option. Once you activate this on your iPad you can go to the Apple website to locate your lost iPad on a map, send a message to display on the iPad screen (”I lost my iPad, please call 987-654-3210?), set a remote passcode to lock out prying eyes, or even remotely wipe the device and all of its data.

6. Folders
You can now create folders on the iPad to organize your apps into groups, tuck away the apps you don’t use as often, and save yourself from having to flip through an endless number of screens to find the app you’re trying to locate.

7. Unified inbox
The Mail app offers an improved interface that reminds me of the terrific email functionality on the Palm Pre. It gives you a quick jump directly to the inbox (new messages) of each of your multiple email accounts, or to your list of folders for those email accounts, or into a unified inbox where you can see all of your latest messages threaded together by timestamp. The 4.2 upgrade also now supports multiple Microsoft Exchange mailboxes.

8. Remote device management
Another development on the enterprise front is that the 4.2 upgrade offers Mobile Device Management APIs that allow companies to wirelessly push out configuration changes, monitor compliance with policies, and lock or wipe an iPad managed by the IT department. These features are aimed squarely at the companies deploying fleets of iPads to workers.

9. Web browser search on page
The web browser on the iPad has always had a search box for searching the Internet, but now Apple has added functionality to that box that allows you to use it to search for text on the current web page as well. This is especially useful when you do a web search and land on a page but can’t find the reference to the keyword you were looking for.

10. New quick controls console
If you click the Home button twice to go into multitasking and swipe to the panel on the left you’ll find a new quick control console that has a play/pause button and forward/back buttons for the iPod app, a volumne control slider, a brightness slider, and a new virtual orientation lock setting. The old physical orientation lock button (on the right side above the volumn buttons) has now been converted into a mute button

To view the original article in it’s entirety Click Here

Check Out These Tools to Help Safeguard Facebook Privacy

Hopefully, why you should never trust Facebook is obvious by now. Perhaps you feel like you still need it, though — or stubbornly refuse to believe it is really all that bad, whether because you think it is not much of a risk or just do not believe the evidence.

You may take all reasonable precautions, including using no personally identifiable or sensitive information in your account or profile data. Maybe you use a password and email address for the account that you use for nothing else, and refuse to communicate with anyone who actually knows any personally identifiable information or secrets about you on Facebook. Even so, there are risks.

Facebook clearly is not concerned with your privacy any more than the absolute minimum required to keep itself in business. There’s no such thing as a trusted brand, but there is certainly such a thing as a brand that is thoroughly suspicious — and Facebook seems to fit the description when it comes to personal privacy. Any time Facebook appears to care about your privacy, keep in mind that it took Congressional posturing to keep the corporation in line even to that small degree.

It is clear that even when Facebook offers something that looks like some kind of privacy protection, the offer is not a promise, and relying on it is a recipe for disappointment. With that in mind, the problem of protecting even the most minimal sense of privacy while using Facebook seems insurmountable. Thanks to the efforts of a number of hackers and entrepreneurs who actually care about privacy — not only theirs, but that of others as well, even if only because it serves as a convenient business model — there are some options that can help at least a little.

In no particular order:

1. SaveFace
Untangle offers the SaveFace bookmarklet, a script that can be saved as a bookmark in your browser. When you click a bookmarklet, it does “something” — usually involving whatever page you happen to be visiting at that moment. In the case of SaveFace, you can visit your Facebook page then click on the bookmarklet to rest your privacy settings to Private. According to Untangle, it currently covers Contact Information; Search Settings; Friends, Tags, and Connections; and Personal Information and Posts.

2. ReclaimPrivacy.org
A similar bookmarklet is offered by ReclaimPrivacy.org. Unlike SaveFace, the purpose of ReclaimPrivacy.org’s tool is to scan your Facebook settings and detect certain types of privacy vulnerabilities in your account settings. In theory, at least, it should be more thorough than SaveFace — but less automated as a means of protecting yourself.

3. Connect In Private
At ConnectInPrivate there is an annoying tablike thing floating over the left-hand side of the page. Take a closer look: it reads “Secure Your Facebook Profile”. If you click on that, it takes you to a Facebook application that offers a fairly comprehensive Facebook privacy feature set. Of course, what it provides is little more than a convenience layer over manually adjusting your own Facebook privacy settings, but it can be used for free and, if you like that kind of thing, you might find it valuable.

Using Connect In Private’s Facebook privacy scanner is a remarkably tedious and uncomfortable process for something so simple. It involves reading, and thinking about, a series of questions about what kind of privacy preferences you have — in ways that are poorly defined, and requiring Facebook account access that should make the average security concerned user hesitate. Access to the source code is not exactly a matter of easy access the way it is with the JavaScript in the ReclaimPrivacy.org bookmarklet and the .js page it references, either.

A final word
Connect In Private has one definite advantage over the other tools, though: it is more actively maintained. As of this writing, ReclaimPrivacy.org’s script is not compatible with current Facebook privacy settings, and there is a note on the page to that effect. SaveFace is far from a complete solution, for that matter. None of them are perfect, and there is always a risk if you trust your private data to a site like Facebook. Each of them might help a little, though.

In the end, I for one find it difficult to trust the Facebook application offered by Connect In Private. Your mileage may vary.

To read the original article in it’s entirety Click Here

Rogue Anti-Virus Software Explained

What Is Rogue Anti-virus Software?

It is almost unheard of in this day and age to be online without using anti-spyware and anti-virus software to safeguard your computer against viruses and other malicious code. It’s not surprising to see the prevalence of rogue anti-virus software.

Also called scareware, or rogue security software, or smitfraud, this type of software is also most commonly defined as malware—it is designed specifically to damage or disrupt your computer system. In this case, not only is the software going to disrupt your system, it’s going to try and trick you into making an unsecure credit card purchase.
Rogue anti-virus programs usually appears in the form of a fake Windows warning on your computer system that reads something like, you have a specific number of viruses on your computer (usually in the hundreds) and that this software has detected those viruses. To get rid of these viruses, you’re prompted to buy the full-version of the antivirus software (which is really rogue antivirus software).

The good news is that you probably do not have a computer that is infested with hundreds of viruses as the rouge software claims. The bad news is that the rogue antivirus software itself is on your computer and you must remove it. Removal is hindered as rouge software can lock the control panel and the the Add/Remove Programs function to prevent you from removing it easily.

Other things that may be disrupted by the rogue software include being unable to visit reputable and valid anti-virus and malware Web sites, being able to install legitimate antivirus software and also being unable to access your desktop.

The rogue software wants to stop users from removing the program and proceeding with the purchase instead. It’s important to remember that by purchasing the “claimed full version to remove the viruses” you will be submitting your personal information to unscrupulous persons and may also end up being a victim of credit card or identity theft.

Common names of rogue antivirus software include; AntiVirus (2007, 2008, and 2009), MS-Antispyware, XP AntiVirus (2007, 2008, and 2009), Home Antivirus 2009, SpyWareGuard, Malware Cleaner, Extra Antivirus, AV AntiSpyware, SpywareProtect2009, WinPC Defender as well as many other names.

How Does a Computer Get Infected with Rogue Antivirus Programs?
The reason these rogue anti-virus programs are successful (for the malicious coders) is because the warning screens very closely resemble legitimate Windows warning screens, plus the rouge software program names closely resemble or sound like legitimate antivirus programs.

When you load an infected Web site you might see a warning screen pop up and think that it is a legitimate Windows warning. Users unknowingly are tricked into downloading the software because they believe the warning to be a legitimate Windows messages.

You might also be on a Web site trying to view a video and a screen may pop-up telling you that you need to download a codec to view the file. The window prompting you to download the codec looks legitimate, however you are not going to download a codec—instead you will receive one of the many rogue antivirus software programs.

In April of this year, it was also reported that systems that had been previously infected with Conficker, found this worm had began installing rogue antivirus programs on infected machines. In the early cases this turned out to be a rogue application called SpywareProtect2009. Kaspersky researchers reported this was a typical rogue program that offered to clean the computer for $49.95.

Lastly, if you use file sharing networks you also risk downloading a rogue antivirus as it can be easily hidden inside a legitimate program—that you may or may not be legitimately downloading.
How to Spot Rogue Antivirus Warnings

For the most part, you need to look at the windows that are popping up and the name of the program being shown. If you know the program name of the antivirus and spyware software you use, then seeing a different name in the warning window is the first clue. Also, Windows itself doesn’t warn you of a virus. Legitimate warnings on your system would come from the anti-virus program you have installed, not a random Windows operating system style pop-up window. A great resource for learning how to spot these malicious programs through fake warning messages can be found on bleepingcomputer.com. This page lists the text of some of the more common false warning screens, including the following:

Malware Cleaner: Trojan detected! A piece of malicious code was found in your system that can replicate itself if no action is taken. Click here to have your system cleaned by Malware Cleaner.

AV AntiSpyware: Spyware Alert! Your computer is infected with spyware. It could damage your critical files or expose your private data on the Internet. Click here to register your copy of AV AntiSpyware and remove spyware threats from your PC.
How Do I Get Rid of Rogue Antivirus Programs?

It can be a difficult task to get rogue anti-virus programs off your computer. To complicate the matter, there are many variations of this malicious program and not all variants can be removed in the same way. This is not something that novice computer users may be able to deal with on their own.

Also, due to the popularity of these infections and people searching for answers on how to remove the program a number of scam programs also exist that lead users to believe it will remove the infection. Yes, these programs that claim to rid your system of Antivirus 2009 (or whichever variant you have been infected with) will scan your system and then prompt you for a credit card number so you can download a full version to remove the infection. Sound familiar? It should. This is a vicious cycle that users can unwittingly become trapped in.

Still, the good news is that in many instances you can get rid of the rouge antivirus program without wiping and formatting your hard drive. If you are already infected and you cannot access legitimate security related Web sites, you will need to download the following programs from a second computer and burn them to CD to run on the infected computer.

WARNING: Before running any of the following programs, you should turn off System Restore (you won’t be able to use System Restore as this deletes all restore points). If you don’t turn it off, the programs may not be able to access those system files to clean them. If you are infected the System Restore is not going to return you to an earlier uninfected date anyway. You can turn it back on after you have successfully removed the rouge antivirus program.

The quickest way, and first thing to try is to download Malwarebytes Anti-Malware to get rid of the rogue antivirus. On it’s own this will usually rid your computer of the problem. If Malwarebytes didn’t have the desired results, or you simply want to do a total and complete system clean, you will want to use a combination of CCleaner, Malwarebytes, Asquared, and SpyBot Search and Destroy. These programs all offer freeware versions.

NOTE: In some cases, the rogue anti-virus may block one or more of these legitimate programs. If this is the case, you will need to open the folder where you installed the program on your hard drive and rename the executable file (.exe) to anything other than the program’s name. (e.g. rename mbam.exe to aaa.exe).

Once you have run all the programs, be sure to go back and run CCleaner a final time to get rid of dead registry links from having the rouge antivirus removed. Continue to run the registry option of this program until no problems are found.

Here are additional removal resources:
bleepingcomputer.com: How to remove Extra Antivirus
bleepingcomputer.com: How to uninstall and remove AV AntiSpyware
bleepingcomputer.com: How to uninstall and remove WiniBlueSoft
bleepingcomputer.com: How to uninstall and remove HomeAntivirus 2009
bleepingcomputer.com: How to uninstall and remove Antivirus 2009 (Antivirus 09)
bleepingcomputer.com: How to uninstall and remove PAntispyware09
bleepingcomputer.com: How to uninstall and remove Virus Sweeper
bleepingcomputer.com: How to uninstall and remove WinPC Antivirus
Kaspersky Technical Support and Knowledge Base: How to disinfect rogue spyware

DID YOU KNOW…

In December 2008 it was reported that a Google sponsored link pointed to a malicious Web site where users were redirected to a spoofed CNET Download.com site with offers to download a “spyware free” copy of Winrar. This file included the rogue antivirus program “AntiSpyware2008” (Source)

How to Clean Common Computer Parts and Devices

From dusty computer fans to fingerprints on compact discs, computer parts and devices can get awfully dirty from normal everyday use or when left sitting unused. The best way to have any computer component cleaned is to have it professionally serviced, but if you no longer have a service warranty, or if you picked up a second-hand item and want to clean it to see if it even works, here are some tips on how to clean some common items.
General Precautions

When working around electronics there are some precautions you should always take when cleaning:

* The best way to clean any computer component or device is to follow the manufacturer’s instructions in your user manual.
* Always power off the system first
* Always use anti-static wristband or other professional grounding devices
* Never work on carpeted surfaces
* Never spray cleaning fluids directly onto computer components. Always spray the cleaner onto a cloth then wipe
* Do not allow any cleaner to run or drip near circuit boards, or near seams on device casings.
* Never allow circuits or electronics to become damp or wet.
* Some cleaning solvents can damage components. In most cases, water will work just as well.
* Cleaning electronics and circuit boards requires experience, knowledge and special electronics cleaners. This type of cleaning is best left to professionals.

General Cleaning Tricks & Tips

* If compressed air is too strong for little dust jobs, try using a plastic liquid medicine plunger style dispenser. Pull the plunger all the way back to fill it with air and then push it forward quickly for a quick output of air to blow away dust in small places such as USB ports or SD memory card slots. The small ends of these dispensers enable you to reach a more concentrated area with the air then you could get with just blowing our air yourself (from your mouth).
* When using compressed air, always release in short blasts. Longer blasts can actually result in condensation.
* Anti-static cloths are great for attracting dust and are safe to use around computer equipment.
* The cleaner you keep your work space, the cleaner your equipment will be
* Be sure to hang on to your user manuals as they provide you with the best cleaning methods for that particular device.

How Do I Clean That?

A Digital Camera
The lens on a digital camera should never be touched and should be cleaned only when absolutely necessary, so be sure to put that lens cap to good use. For basic dust removal, you can buy a soft lens brush or plastic air blowers which remove dust and particles without anything touching the lens that could damage it.

For cleansing stubborn dirt, invest in a microfiber cleaning cloth for gently wiping off the lens. It’s very important to use a brush or blower first, then use a cloth to remove particles. For more stubborn dirt, you should use only a special fluid designed for lens cleaning. Never use paper towel or similar paper products to clean the lens as it may result in scratching. If you are using a fluid lens cleaner, be sure to put a drop onto proper lens tissues to clean — never put the fluid directly on the lens itself. Cannon also recommends that in place of a lens cleaner you can blow gently on the lens so that moisture condenses on its surface. Use gentle lifting motions (not rubbing motions) to clean and do not press hard. Use a clean lens tissue each time you move over the surface. This will prevent any dirt that is clinging to the tissue from scratching the lens.

The outside of the camera can be wiped down using a lint-free cotton cloth, and you can also use the soft brush and blower for cleaning dust from the battery, memory card, power adapter and USB adapter slots.

CD & DVD Discs
Dirty media can cause errors or make the media not work at all. You can remove fingerprints and dirt by lightly rubbing with a clean lint-free cloth. Cotton is the best material to use. You need to wipe starting at the middle of the disc and work your way to the outer edge. Never wipe in the direction of the tracks (the lines running around the disc). If the dirt is harder to remove, like dried on liquids for example, use water or a spot of rubbing alcohol on a cotton swab to clean it. You can also purchase disc cleaning kits. Never use a general all-purpose cleaner on a disc.

Dust Inside The Case
If you want to clean the build-up of dust from inside your computer case, you must shut the system down first, and make sure you are not working on carpet or any surface which is a electricity conductor. It is recommended you ground yourself (using an electronics wristband or other professional grounding equipment and follow the procedure for your equipment). To clean dust from the components inside you will need compressed air, an anti-static cloth, a small (child size) soft paint brush, and a cleaning fluid made specifically for electronics.

Inside the case you will want to use the compressed air to clean around the fans, power supply and areas where the dust is building up. Be careful not to aim the air directly towards any circuit board or electronic components in the case. Use short blasts and arm movement to direct the falling dust outside of the case. You can use the small brush to dislodge dust in areas where the compressed air did not remove the build-up (such as the edges of fan blades). You can also use the brush to wipe dust away from the inside case walls and the wires. If you find dust has fallen down to the bottom of your case, dampen the anti-static cloth with the electronics cleaner and wipe along the bottom of the case to remove it. You can also use the damp cloth to wipe all around the metal case of your tower and the cover.

A CRT Monitor
Monitors that are made of glass and do not have any special coatings can be cleaned using a basic glass cleaner, or water (preferred). Do not spray directly on the monitor as the liquid could run down into seams and into the electronics. Using a soft lint-free cloth cloth such as cotton, spray the cleaner onto the cloth to moisten it and gently wipe the viewable surface. You can use a computer vacuum or compressed air to remove dust from the monitor housing, paying special attention to the vents, to make sure they are free of dust. Cleaners may damage the plastic casing of your monitor, so avoid this. Use a cloth slightly moistened with water if you need on the case.

An LCD Display
LCD monitors require a different cleaning than a CRT does. LCDs are not made of glass and will have special coating on them for anti-glare. Following your manufacturer’s recommendations is the best method for cleaning an LCD. If you can’t obtained this information, here are a few general tips: Never use paper towel on an LCD as it can cause scratching. Instead be sure to use a soft cotton cloth. You can also purchase microfiber cleaning cloths that are designed for LCD and camera lens cleaning. If a dry cloth cannot remove the prints, you can use a special LCD cleaning liquid. Always slightly dampen the cloth and wipe, do not put any liquid directly onto the display.

A Keyboard
Keyboards that are dirty can cause some keys to stick when pressed or other malfunctions. Dirt and dust can easily be cleaned from your keyboard by periodically holding it upside down and shaking it, or blasting it with compressed air. If the keys are dirty, once you have powered off the system, you can use a damp lint-free cloth to wipe the top facings of the keys. Never spray cleaner directly onto the keys as it may drip down into the circuitry beneath.

If you spill a liquid on the keyboard, you should immediately shut down the computer (or if using a plug-and-play keyboard, unplug it from the computer). Turn the keyboard over onto a towel or cloth to prevent as much liquid from getting into the circuits as possible. You can use a small lint-free cloth to help clean the liquid out from between the keys, but do so with the keyboard still upside down. Leave the keyboard upside down for a day to help ensure as much of the liquid dries out as possible. A large amount of liquid spilled into the keyboard will usually result in the keyboard needing to be replaced, regardless of how well you try to clean it.

If you just want to freshen up the look of the keyboard (e.g. not clean due from problems or spilling of liquid) a cloth that has been moistened with warm water and a gentle soap will work quite well.

A PDA, Smartphone, Cellphone, & Similar Displays
Many of these devices do not contain glass, and glass cleaner and paper towel should never be used. For these devices, use the same procedure for cleaning the display area as listed for LCD monitors. Use a slightly moistened (water and gently soap) soft cotton cloth to wipe the external casing on these types of devices.

Non-optical Mouse
A trackball and roller mouse will need regular cleaning. When you begin to notice delays or jerkiness in cursor movement on the screen chances are your mouse needs a a good cleaning. To clean the mouse you will need to have a few supplies in easy reach such as cotton swabs, rubbing alcohol and a soft lint-free cloth.

With the mouse disconnected from the computer, you turn the mouse over and unlock the cover ring that holds the trackball inside. When you turn the mouse back over, both should fall out easily (be sure to catch them with your hand — don’t drop the trackball onto your desk or other surface). Both the trackball and ring can be cleaned using a soft lint-free cloth. Set the ring down and place the trackball on top of the ring to securely hold it while cleaning the rest of the mouse.

Start by blowing into the trackball holder area of the mouse to get rid of dust and loose particles. Inside you will see the rollers that hold the trackball in place. Chances are you will also see strands of dirt all the way around the rollers. Use a drop of alcohol on the cotton swap (just enough to dampen it) and use the swab to push against the dirt buildup on the roller to free it. Keep the tip of the swab against the dirt and rotate the rollers. You usually will see the dirt come off in a long piece (or several small if it breaks). You can also use your fingernail to pull the strip off instead of the cotton swab, once it has been loosened. Don’t use anything sharp that could damage the rollers. Make sure you pull the gunk out of the trackball hole when it comes off the roller. You will need to repeat the process on each of the rollers inside. Leave the mouse opened to the air to ensure any wetness from the alcohol has completely dried up before replacing the trackball and cover ring.

Every time you move this type of mouse across a mouse pad it picks up dirt and dust. To help cut down on the amount of dirt buildup in the mouse, you should ensure that the surface of your mouse pad is clean and dry. Wash it frequently making sure you give it lots of drying time before using the mouse on it again.
Optical or Laser Mouse

An optical or laser mouse usually won’t malfunction like a mechanical trackball mouse will, but you can still clean them for optimal performance. Wipe the bottom surface of the mouse with a clean lint-free cloth. For dust and particles over the lens area, you can use compressed air to blow it away. If you don’t have compressed air you can also try just blowing air (from your mouth) in a couple quick strong spurts. If this doesn’t clear the lens, you can also try a cotton swab to clean it without scratching.

USB Connectors and Ports
With USB powering so many devices, these ports get a lot of usage. Some front USB ports come with covers, which many people actually leave open because they are used so frequently. Thumb drives get left laying on desks, without the caps on and so on. Digital camera cords pick up dust then get transferred when plugged into the USB port. The list goes on. For the most part you can clean around the USB connector to remove dust and particles, simply by using compressed air or blowing inside of it. You can also wipe the plastic case area near the USB port every so often with an anti-static wipe which helps to repel dust.

Battery Contacts
There are professional battery contact cleaners available. If there is only a small buildup but enough to cause problems with enabling the battery to get a good contact you can clean the contact by rubbing them gently with a cotton swab that has been slightly dampened with alcohol. If it is a heavier buildup, you can also try rubbing gently with a pencil eraser. Just remember not to apply too much pressure when rubbing as you could damage the contacts

Detecting and Preventing Computer Overheating

Many people don’t think about the hidden danger of heat to their computers, or how easy computer overheating is to prevent.

A lot of people don’t think about the effects of heat on their personal computer or laptop. The effects of overheating may be subtle, such as causing the computer to run slower or shortening the expected lifespan of the components; or it can be so devastating as to cause a fire. The most common side effect of overheating is having programs freeze or the computer shutting down sporadically.

How Computers Handle Heat
Computer heat is most efficiently handled by fans. The main fan is usually in the back and blows out. In addition there’s usually a heat sink — cooled by another fan or by a coolant system — over the CPU to prevent the processor from overheating. Some computers have additional fans to encourage airflow and help cool off high-heat components, but this varies from computer to computer.

The power supply can cause overheating if it is not properly installed in the case; if the vents aren’t positioned correctly the hot air can end up in the wrong place. The amount of free space inside the computer also matters; if all the hot components are close together, or if the placements of cords/components is impeding airflow, it can cause more heat problems.

What Can Cause Computer Overheating

There are several things that can cause a computer to overheat.

•Dust inside the computer and around the fans acts as an insulator, causing overheating.
•Running the computer in a hot environment also causes overheating.
•Running a lot of unnecessary programs can aid overheating.
•If the fans are obstructed by walls or drapes it can impede airflow.
•If the computer is being overclocked it can cause the components to overheat.
•Leaving the computer on for extended periods of time can cause overheating.
•Having the computer next to a hot device (a hot vent, other machinery, etc) can heat the computer.

How to Prevent Computer Overheating
By looking at the causes of overheating it’s often easy to diagnose and fix the problem that causes it. It’s important to resist the temptation to leave the computer open while running; the typical computer case is designed to conduct airflow, and leaving the computer open may make the overheating worse.
Simple Ways to Increase the Life of Any Computer’s Parts

The easiest way to prevent the computer from overheating is to clean it out. Most retail stores carry compressed air in their computer aisles, and it’s the easiest way to clean dust out of a dirty computer. A vacuum cleaner can also be used to suck the dust out of fans and ports along the outside of the computer. For more in-depth cleaning instructions, Lifehacker offers a step-by-step guide to computer cleaning: Geek to Live: Evacuate PC Dust Bunnies

Keeping the computer off the floor can help keep excess dust and dirt from mucking up the inside of the computer and fans. Also, putting additional fans in the computer can help improve ventilation. Many cases have specific spots for installing these extra fans; make sure that they blow the hot air out.
Don’t keep the computer too close to the wall, or near anything that keeps the hot air around the case rather than dissipating. It’s also helpful to make sure that the computer is free of debris — keeping stuff on top of the computer can insulate the computer as well.

When Nothing Else Works
When nothing else seems to be fixing the problem it may be hardware related: a broken fan or heat sink can cause major heating issues. If there’s a warranty in effect, contacting the manufacturer about any heat problems may be the easiest solution.

An overheated computer can cause any multitude of trouble. Knowing what can cause the overheating is most of the battle, and even the most novice computer user can get inside to clean the parts and check for broken fans.

Warm Laptop on your legs can cause skin damage!

CHICAGO — Have you ever worked on your laptop computer with it sitting on your lap, heating up your legs? If so, you might want to rethink that habit.

Doing it a lot can lead to “toasted skin syndrome,” an unusual-looking mottled skin condition caused by long-term heat exposure, according to medical reports.

In one recent case, a 12-year-old boy developed a sponge-patterned skin discoloration on his left thigh after playing computer games a few hours every day for several months.

“He recognized that the laptop got hot on the left side; however, regardless of that, he did not change its position,” Swiss researchers reported in an article published Monday in the journal Pediatrics.

Another case involved a Virginia law student who sought treatment for the mottled discoloration on her leg.

Dr. Kimberley Salkey, who treated the young woman, was stumped until she learned the student spent about six hours a day working with her computer propped on her lap. The temperature underneath registered 125 degrees.

That case, from 2007, is one of 10 laptop-related cases reported in medical journals in the past six years.

The condition also can be caused by overuse of heating pads and other heat sources that usually aren’t hot enough to cause burns. It’s generally harmless but can cause permanent skin darkening. In very rare cases, it can cause damage leading to skin cancers, said the Swiss researchers, Drs. Andreas Arnold and Peter Itin from University Hospital Basel. They do not cite any skin cancer cases linked to laptop use, but suggest, to be safe, placing a carrying case or other heat shield under the laptop if you have to hold it in your lap.

Salkey, an assistant dermatology professor at Eastern Virginia Medical School, said that under the microscope, the affected skin resembles skin damaged by long-term sun exposure.

Major manufacturers including Apple, Hewlett Packard and Dell warn in user manuals against placing laptops on laps or exposed skin for extended periods of time because of the risk for burns.

View full sizeAP Photo/HO via PediatricsA 12-year-old boy with evidence of “toasted skin syndrome” on his left leg caused by exposure to high temperatures while spending a great deal of time playing video games with a laptop resting on his legs.

A medical report several years ago found that men who used laptops on their laps had elevated scrotum temperatures. If prolonged, that kind of heat can decrease sperm production, which can potentially lead to infertility. Whether laptop use itself can cause that kind of harm hasn’t been confirmed.

In the past, “toasted skin syndrome” has occurred in workers whose jobs require being close to a heat source, including bakers and glass blowers, and, before central heating, in people who huddled near potbellied stoves to stay warm.

Dr. Anthony J. Mancini, dermatology chief at Children’s Memorial Hospital in Chicago, said he’d treated a boy who developed the condition from using a heating pad “hours at a time” to soothe a thigh injured in soccer. Mancini said he’d also seen a case caused by a hot water bottle.

He noted that chronic, prolonged skin inflammation can potentially increase chances for squamous cell skin cancer, which is more aggressive than the most common skin cancer. But Mancini said it’s unlikely computer use would lead to cancer since it’s so easy to avoid prolonged close skin contact with laptops.

To view the full article Click Here