To do so only requires a little knowledge about the locations of these applications. Let's say that every day we need to load up the Yahoo web browser, Microsoft Word, and then the calculator that comes with Windows. Instead of doing this by hand, we could write a batch file to do it for us. First, we'd load up Notepad and type in the following: START "http://www. Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null. We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Use the computer in a dust-free environment and never smoke around it. Nicotine and tar mean certain death when it comes to computer fans, however should you find a need to clean the fan, do so with extreme care. It's quite easy to cause more damage from cleaning so if you're not comfortable with cleaning your PC yourself, take it to a shop for servicing. We often joke around the office about the "grandma" who refuses to use a computer until she can afford the "latest" one. Chances are, Grandma isn't ever going to shell out the bucks to buy the latest computer on the market, nor is she going to know how to use it once she gets it. What Grandma doesn't realize however is that a used computer is an excellent training tool that she can use to prepare herself for something "better" in the future. Another source for help that we shouldn't forget are the support systems of various manufacturers. You can reach these systems by calling the phone number associated with the product that you're having trouble with. Calls may be free (1-800 or 1-877 number), or they may cost a small fee (1-900). 6. PC support groups or user groups are another option for help. Anti-virus/anti-spyware programs are only effective after the effect. But you can prevent identity theft from occurring by installing a firewall. A firewall is software that checks all data entering and exiting a computer and it then blocks that which doesn't meet specified security criteria (user-defined rules).1 5.
Share This Page