To do so only requires a little knowledge about the locations of these applications. Let's say that every day we need to load up the Yahoo web browser, Microsoft Word, and then the calculator that comes with Windows. Instead of doing this by hand, we could write a batch file to do it for us. First, we'd load up Notepad and type in the following: START "http://www. Regardless of cost, it's important to understand that accessories can become "necessities," and that the best time to get them is the moment you buy a new computer. Waiting too long to accessorize can cause more problems than necessary because while you wait, manufacturers continuously develop new technologies - technologies that your computer won't be able to accommodate in the future. Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null. We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Dust Kills Cleaning the Unit Fan is Essential Computer Care Between taking care of the household, the kids, the pets, and the district PTA, computer care is probably one of the last things that you think of doing on a regular basis. Without a regular maintenance schedule however, you could find out (the hard way) that a neglected computer is an energy hog - one that works harder than it needs to and one that could be a financial burden to replace. If you're having a problem with a piece of software or with a hardware part, try the website of that software's or hardware's manufacturer. Most (if not all) manufacturer's reserve a portion of cyberspace and dedicate it to support the products that they build. Microsoft's help desk is good example. 3. Your best protection against computer crimes is your own knowledge. Hopefully the suggestions above will prompt you into taking appropriate action and into protecting your computer with the suggested tools. In doing so, you'll not only protect yourself, you'll prevent the spread of these malicious activities and protect others at the same time.
Share This Page