Reply to author. Report message as abuse. Show original message. Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message. My main toolbar which shows running programs has managed to duplicate itself. Therefore, I have two toolbars which simultaneously show the same running programs. I have right-clicked to uncheck toolbars, but the only toolbar shown is quick launch.
Do not use file sharing. Even the safest P2P file sharing programs that do not contain bundled spyware, still expose you to risks because of the very nature of the P2P file sharing process.
By default, most P2P file sharing programs are configured to automatically launch at startup. They are also configured to allow other P2P users on the same network open access to a shared directory on your computer. The reason for this is simple. File sharing relies on its members giving and gaining unfettered access to computers across the P2P network. However, this practice can make you vulnerable to data and identity theft. Even if you change those risky default settings to a safer configuration, the act of downloading files from an anonymous source greatly increases your exposure to infection.
That is because the files you are downloading may actually contain a disguised threat. Many very malicious worms and trojans, such as the Storm Worm, target and spread across P2P files sharing networks because of their known vulnerabilities. Keep your software updated Web Of Trust , uses colored alerts to warn about risky websites warns you about risky websites that try to scam visitors, deliver malware or send spam.
Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory.
WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:. There is a Web Of Trust version for Firefox as well. Restrict the actions of potentially unwanted sites in Internet Explorer. You might want to install Winpatrol. Winpatrol is heuristic protection program, meaning it looks for patterns in codes that work like malware.
It also takes a snapshot of your system's critical resources and alerts you to any changes that may occur without you knowing. You can read more about Winpatrol's features here.
You can download a free copy of Winpatrol or use the Plus version for more features. You can read Winpatrol's FAQ if you run into problems. Many of us in the online security community have tried and tested programs to determine their abilities. Please remember that there is no guarantee regarding computer security. However, the available software, combined with the rest of these recommendations will contribute to helping your system running safely.
Here are some helpful articles: How did I get infected? HERE I'm not pulling your leg, honest? If you use Social Media Facebook, Twitter, etc. Check to be sure that you are not one of those people who is using a dangerously easy-to-guess password at websites requiring passwords. There is a good how-to video HERE. Downloading to a USB memory stick is a good thing; in addition to conveniently allowing you to use another computer to download the files if necessary, it gives you a backup of them if you don't erase them.
Copying to the desktop on a Windows XP machine can lead to aggrevation, however. If you copy the files to the desktop instead of to a folder, there is a quirk in Windows XP that can make the system think that the files are always in use by some unnamed application. If that happens, it is nearly impossible to remove the file from your desktop. That is why I always suggest to make a folder in My Documents with a recognizable name to hold the driver file. This avoids the "impossible to erase" syndrome.
Also, when you start editing a file in word, there is always a "working copy" established that allows the edit to be made without modifying the original saved file. When you close Word properly, these working copies become the saved file and the old file is marked as "removed" so that only the saved file remains. Due to the way that Windows erases files, however, the working copy can still be seen by a program that ignores the bits in the directory that tell Windows the file has been erased.
Erasing data in Windows never actually removes it, which is why there are so many programs around to "kill" the data on computers you are trading in for newer models. You are very welcome. Helping our fellow computer owners is a pleasure, and often allows us to learn more about the way computers work as well. JackShack, Thank you for your response, yes I have removed the program. I have WOT installed and the website was green or I would not have downloaded the program. Type Dupfinder in the Open text box and click OK.
Once DupFinder loads, simply select the drive or folder to search and then click the Start Search button. When DupFinder completes its search, you can scan through the list and examine the duplicate files. Here are tips for working with the list of duplicate files: Use either the Print Report or Export Data commands on the File menu to create a permanent record of the duplicate files.
Use the Sort command on the View menu to reorganize the list for better analysis. To get more detailed information about any file, select the file, pull down the File menu, and select the Info command. Leave duplicate files in the Windows folder and its subfolders alone. If you don't recognize the duplicate file, it's better to use the Rename or Move commands on the File menu rather than the Delete command.
Miss a tip?
0コメント