RSS

Monthly Archives: February 2014

Understanding The Internet: A different Approach

Understanding The Internet: A different Approach

.

Evolution of Education: Wordle Logo

.


Understanding Internet-Internet, the virtual savant child

Internet is a “living producttechnique! To be viewed as a “childto be educated by millions of people simultaneously, with different traditions and languages, with different mentalities and this in real time.

“The child” Internet, with instant contributions from users around the world (all of us) will be “fed” so + / – “textual” and “audio-visual”. The quality of this “food” is dependent on ourselves, our contributions to the community!

This “child” Internet, is gathering all the knowledge of the world and we shall get an answer, as soon as we ask it, of course!

Character, honesty and credibility of this “child” is formed by those who educate it. Those who educate, are necessarily all of us, everyone, the community!

I hope that this practice visualization, pushes you to think a bit further and THAT it helps you to better understand and / or better-learn Internet!

.

Understanding the internet-QUOTE-12-2014

.

===> There are no problems, only solutions! THE Whole (Community), WE will find the right solution! <===

Nature shows us (bees, ants) and history too. Misstep learn from the past and try to “set” to do better! Internet is the perfect tool for this, but beware, it’s us (community) that are building it! WE, those who feed and educate this “savant child“!

When I say “WE“, it means: our character, our beliefs, our weaknesses, our honesty, in short, our whole being. Internet, THE  “virtual savant child” is the product of our entire society!

Internet is THE “virtual savant child“, created by the world!

.

Savant

.

 


Internet The Revolution, A New Mass-Media

As at the time the TV was as new means of communication, today a new mass media just appeared . Internet, mass media apart, which “a priori” has nothing extraordinary, but is it true ? No, certainly NOT. We have to do with a bi- directional mass media (two-way). Until now we used to click a button to access the music and multimedia content (stereo , TV, etc. .), BUT WE could not communicate with these technical devices , WE were only transmitter. Now , with the Internet it is different.

.

Through actions and also a click (a button on the mouse) WE can do a lot with technique, involves writing texts, receive answers back …

===> WE are both transmitter and receiver. <===
.

WE all newborns in the virtual life like in the real world, there are people who have more knowledge and experiences , which does mean that WE all must follow a lifelong learning

.

Learn more:

.


Internet, freedom of expression and total anarchy?

.
.

ICT (Information and Communication Technologies), are now irreplaceable and necessary in a changing world with new technology.

.
.

A technology that is reflected in our real world, and both influence each other!
.

Please NOTE: concerning Internet and its use there are many laws (must accept…)! And above all respect! This is comparable to our real world …
.

Also see my blog:


“Computer mafia” (the bad boys) works very fast and it takes advantage of the non vigilance and lack of knowledge of Internet users (ourselves)! It is not only security software that can help secure and protect our computers , but first we must know how to use them too!

.

Well yes, that’s us, the users of our computers (whereby smartphones and tablets are ALSO computers…) and the Internet, who are responsible and who will be more accountable in the future! .

.

===> A “CLICK” solution, as with a remote control at home, does not exist and never will be invented to ensure 100% security. <===

.

Anyway, a 100% security does not exist and is an illusion!

This new mass media (computers & Internet) is not only indomitable with the technique, but also with vigilance and knowledge necessary to use the software (programs) security!

===> It is up on us to learn how to use those software and learn to be vigilant! <===

Learn more:

.


.

Well yes, we have no choice. It is not enough to use this technical tool and believe that everything works perfectly, but this “toy” (Internet), which is not but most people believe that it is one, is intelligent and it grows at an incredible rate.

.

It is a “toy” that lives, it is a virtual world for which we are responsible. WE copy ourselves into this world with all our merits and shortcomings!

Internet is the mirror of morality in our society! Does this make YOU think and reflect? I hope, may be then you will understand how the Internet really works?

.

Related links:

My FREE courses about Cyber-Security are on the server of the Ministry Of Education in Luxembourg (Europe).

.

MySchool-Mausi

 

.

.


GUST-AVRIL2014-800px-2L’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEE-SECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..


.
The author Gust MEES is ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEE-SECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Curation: The 21st Century Way To Learn On Its Own Pace And To Organize THE Learning?

Curation: The 21st Century Way To Learn On Its Own Pace And To Organize THE Learning?

.

Evolution of Education: Wordle Logo.


Curation: The 21st Century Way To Learn On Its Own Pace And To Organize THE Learning?

Already since 2011 I use Curation for my learning and through it I built my “Professional Knowledge Management“, called also PKM. But WHAT is Curation?

5-Steps-for-Content-CurationFirst I was wondering about this new trend and was not sure what to do with it, but after some research on Internet about it I found out that curation to me is the best way to collect articles which I select through quality criteria, which I can archive under different topics and which I find easily back through the “Tags”, as the “Tags” play the role of a table of content. For a Life-Long-Learner like me curation is like a treasure of knowledge and information that is getting shared through the online community.

Through curation one has the possibility to FREE online learning and through sharing it on Social Media to create a community with the same interests. This community is called a “PLN” (Personal [Professional] Learning Network).

Curation could also save people of same interests a lot of time and provides them with valuable content which could get used to link back to them in written articles, blogs, web sites and social media sites. Also one learns from each other in the curation community as one has the possibility to follow interesting curation.

As an ICT course instructor most of my curation is related to educational content and so I provide the curate content to an educational audience and to people who are willing to learn. Therefore I see curation also as help for a collective global learning and a contribution to a collective intelligence.

Read the full article here:

 

 

BUT, WHY and HOW do I use Curation for my PKM (Personal [Professional] Knowledge Management)?

Content Curation gives me the freedom to OWN my learning, through well chosen sources on the internet, and by giving them the right “Tags” it allows me to find the sources easily back later. BUT first of all I read the articles before I curate them, so I learn through the reading and as more often I do this as BETTER my brain gets trained to understand very quickly!

.

 

Learn more:

Curation itself is nothing new, since 1998 I used the same system already with Word documents (in my documents I used keywords at that time…) to create my own learning; curation platforms although have a nice user interface, integrated Social Media sharing options and a possibility for “Tags” creation, as also included statistics!

To me, Curation together with Social Media (especially twitter) and blogging is THE BEST way to learn and ALSO for teaching online!

Synthesizing Mind-5 Minds for the future

Through THESE daily routines I learn very quick!!

Check out my Curation site, please:

 

And for the “Learning-To-Learn“, please check my blog posts below:

 

Keywords necessary for me to create this blog post: Curation, tags, user interface, UI, Lord of Curation, SEO, Learning To Learn, PKM, PLN, Social Media, twitter, Synthesizing Mind, …


.

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


...

Stay tuned for next blog post(s) 😉

 

.

.

 

.

 

Tags: , , , , , , , , , , , , , ,

Curation: Tips And Tricks With Scoop.it-Rescoop And Tags

Curation: Tips And Tricks With Scoop.it-Rescoop And Tags

.

Evolution of Education: Wordle Logo.


WHAT is Curation And What Is NOT Curation?

.

go through worse to get to better

.

.

Most of people know WHAT “Aggregation” is, it is the simplest way to share links, YOU just forward it! BUT that is NOT “Curation“, most people didn’t YET understood this and using “Curation Services” as platforms for ONLY sharing links! That is a lazy attitude, sorry to say this!!!

Curation needs a bit effort and people, especially Educators and Teachers, need to take THEIR time to evaluate the found information by giving it THEIR insight(s) to share with OTHERS! This is very IMPORTANT, as the human can so give BETTER results as a search engine (Google, Yahoo, and others…) as the proposed results are human based, reviewed links and articles.

.

SO… Knowing NOW what Curation is NOT, let us find out WHAT CURATION IS, please check the image below, who explains it BEST.

.

5-Steps-for-Content-Curation

Image credit ===> http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=basic+guide <===

.

I invite YOU also to check my Curation about Curation below, please:

.


How-To Use Scoop.it To Get Out BEST Curation From It

1ibdy1vf6wghd-n05dgl-aigainformation1First of all, please check the FAQ’s from Scoop.it itself to find out the basics of using Scoop.it here:

A question I am getting asked very often: WHY SHOULD WE trust YOU!? Well, that is a good question and it deserves ALSO an answer. Let me brag a little bit (sorry), a MUST to explain WHY: I started with Curation on Scoop.it on ===> waiting 2 find out <=== and I got honored as ===> Lord Of Curation <=== as well as I got awarded by a ===> Rewarded PRO account <=== from Scoop.it. I hope that this will give YOU some trust on what I am posting here 😉 Check below, please to find out:


BUT, let us go NOW for the essential, HOW can WE do BEST Curation? 

Well, it is actually NOT that difficult at all, BUT WE need to invest a bit of work 😉 With a lazy bone attitude WE will not come far, sorry. Good results need ALSO good preparation as well!

To do this, WE need first to understand (as mentioned already above) that WE have to give OUR insight when curating an article, thus meaning: WE need to read the article and to build OUR OWN view about it first, then curating the article and ALSO to publish OUR insight about it! Check below on practical examples, please.

Screenshots in English and in French about GREAT “Insights” from members of my “PLN” (Personal [Professional! Learning Network) to show YOU some practical examples which are worth to copy (the way how they did, not the text…) 😉

.

curation top tips

Image credit ===> http://curation.masternewmedia.org/ <===

.

I will give you some visual examples below who show you, so you can have a direct impression of it. No need to talk too much (what most of the teachers and educators do, sorry…), we go straight to the point…

.

Curation insight-1

As you can see in the above screenshot, there is some text and also some links linking to similar content… The above screenshot is taken from ===> http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers

.

.

BUT the above shown isn’t YET enough! HOW will YOU find back later ALL YOUR curated articles and/or when YOU use the search engine in Scoop.it, HOW will YOU find other interesting curated articles? YOU need to index YOUR curated articles and this is done by the so called “Tags“.


The Tags And Their Importance

Let us first check about WHAT Scoop.it itself tells us about the “Tags“, check image and link below, please.

.

Scoop.it-Tags

Image credit ===> http://feedback.scoop.it/knowledgebase/articles/92998-6-6-3-how-can-i-manage-edit-delete-tags- <===

.

WE will look at some OTHER practical examples below as well.

Once built up some topics with your curation, you have already some articles curated under the same “Tags

What are “Tags“?

.

Tags in Scoop.it

.

In the above screenshot you can see used “Tags” from our example from http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers. You will remark that there are a lot, and that should be as you will better find back the curated article, as well as there will be a better ranking in the search-engines…

.

Learn more about the “Tags” from Scoop.it here:

.

Having created your “Tags” on ALL your curated articles you are able NOW ALSO to post Tweets on Twitter with a specific “Tag”, see example here:

===> #Update YOUR #knowledge and/or get ready 4 #learning about ===> #Curation <=== Check ===> http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Curation

.


Re-Scoops And Their Importance

SO… WE were talking a lot already about the so called “Tags” in above mentioned content, BUT WE are coming back again to THEM, sorry 😉 Scoop.it allows it to “Re-Scoop” a curated article, thus meaning: taking over a curated article from somebody else curation to YOUR own curation, which is actually very easy to do with ONLY two (2) clicks. YOU might see on Social-Media Twitter people who are sharing a curation and that one could fit YOUR interests as well as YOU would like to have it ALSO in YOUR curation TOPICS, BUT HOW-TO do: check screenshots below, please.

.

Re-Scooping-1

Image credit ===> http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security <===

.

Click on that proposed link then and wait till the curated article on Scoop.it appears. NOW click on the green buttonScoop.it!” as shown in above screenshot.

YOU will get directed NOW to YOUR own Scoop.it account and YOU could chose onto which TOPIC YOU would like to save it, as shown in below screenshot. Make YOUR choice and save it.

.

Re-Scoop-Scoop.it-2

Image credit ===> http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security <===

.

Once selected YOUR chosen TOPIC YOU will see this, see pic below, please:

.

Re-Scoop from Scoop.it-Curation

.

===> Your post has been successfully published on “Link of YOUR chosen TOPIC” <===. Click NOW that link which will open the chosen TOPIC page.

.

Re-Scoop with Scoop.it and Tags

Image credit ===> http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security <===

.

Check out ALSO the video about it below, please:

.

.

NOW comes the moment of truth, did the curator from whom YOU made the re-scoop brought in the “Tags“? YOU will see this by ===> check screenshot below, please.

.

Tags_in_Scoop.it

.

As the MOST of people who make curation didn’t really understand the importance of TAGS, YOU probably will see this case empty or not really well used. The above screenshot is from my own curation and shows a lot of TAGS, as it should be. Let me explain a bit about WHY:

As I am multilingual, so I curate in English, French and German, that’s why YOU see also the “Tag” => English <= which I use when the curated article is in “English”. If the article is in French, I will “Tag” it with => Français <= and when it is in German, I will “Tag” it with => Deutsch <=. So I can find back easily my articles by category (Tags). The same for the other “Tags”, YOU need to chose them very wisely, as they will be a great help for later when YOU want to share multiple articles under ONLY one “Tag”, check example below, please:

.

TOPICS: articles regrouping with Tags

Check out ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=country <===

.

Click the image above to find a practical example on How-To use the “Tags” to regroup different articles into ONLY one “keyword“. This is very IMPORTANT when YOU want to share those curated articles on Social-Media, like Twitter. Here below one example which I used on Twitter, see screenshot, please.

.

Using regrouping-Tags on Twitter

.

As YOU might see, I used the same link as in OUR mentioned example above. YOU can EVEN use Twitter then to ask YOUR Learners and Students above a chosen TOPIC, like I did 😉 And the right answer came straight, thanks 🙂 This is then ALSO a NEW possibility to propose to YOUR Learners and Students where YOU propose THEM lots of different articles regrouped under ONLY one “Tag”, BUT being part of a certain TOPIC… Start NOW for ===> Deep-THINKing <=== on How-To YOU can use it in YOUR courses 😉


PKM-Personal [Professional] Knowledge Management

By going into ===> Deep-THINKing <=== YOU might have found already that the right use of the “Tags” gives us ALSO another positive side affect, WE can use Curation combined with well organized and thought “Tags” as OUR ===> PKM <===!

WE will NOT discuss here,as I created already a blog post about it. Please check below:

.

Keywords for me to realize this blog post: Curation, Scoop.it, FAQ’s, Tutorial in depth, Tags, rescooping, SEO, NOT aggregation but Curation => difference <=, insights, PKM, importance of PKM, sharing Responsibility, sharing QUALITY, related links, investing first time to save time later ==> PKM <===…

.

Stay tuned for next blog post(s) 😉

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

.

Learning basics of IT-Security and Cyber-Security.


WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

globe-pc

.

To understand the impact of Cyber-Security, Cyber-Crime, Cyber-Attacks, Spam, on a global view it is important to know which countries are involved. WE will see this through the below published graphics and related articles by professional companies. Those articles and graphics will get presented by year publishing and so making it possible to see if there is an improvement (if so…). WE will get the possibility ALSO to learn about the mentioned, such as Spam, web site vulnerability scan , botnet, and…

.


2015: “Dirty Dozen” SPAMPIONSHIP

So here are the results for Q1 (January-February-March 2015) of 2015.

.

SPAMPIONSHIP-Q1-2015

Click on above image, please, to access the article.


 

2014: “Dirty Dozen” SPAMPIONSHIP

So here are the results for Q3 (July, August, September) of 2014.

.

2014-q3-dirty-dozen-by-pop-vol-0500Click the image above to access the article from SOPHOS.

.

2014-q3-dirty-dozen-by-pop-eng-0500

.


2013: Top 10 Countries with the Most Number of Botnet C&C Servers

.

2013-101112-spamvol-eng-0500

.

 

.

Top 10 Countries with the Most Number of Botnet C&C Servers

Image credit => http://www.trendmicro.com/us/security-intelligence/current-threat-activity/malicious-top-ten/ <=

.

WHAT is a Botnet?

.

WHAT is a C&C Server?

.

Check also the video below, please.

.

Video-Botnets

Click the image to access the video.

.


2013: Top 10 Countries with the Most Number of Botnet-Connected Computers

.

Top 10 Countries with the Most Number of Botnet-Connected Computers

Image credit => http://www.trendmicro.com/us/security-intelligence/current-threat-activity/malicious-top-ten/ <=

.


Botnet Control Servers Span the Globe

.

botnet_map

Click image to go to the article.

.

Click the image above to find out if YOUR country is involved.

Read ALSO:

.


2013: “Dirty Dozen” SPAMPIONSHIP 

[START Text from SOPHOS] At the end of each calendar quarter, we dig into our spam databases and calculate each country’s scores in a league table we jokingly call the SPAMPIONSHIP.

Unlike conventional sporting events such as the Superbowl, the Six Nations or the Bundesliga, the Spampionship is one title that no team wants to win. [END Text from SOPHOS]

.

2013-101112-spamvol-eng-0500

Click image to read the article.

.

.

2013-101112-spampop-eng-0500

Click image to read the article.

 


WHAT YOU Should Know About Spam

sharing-iconI will use again the text from SOPHOS, as it explains BEST what SPAM is:

Spam is almost always sent by regular computers – in other words, by desktop or laptop computers at home or at work – rather than by dedicated email servers.

You’re probably familiar with the process by now:

  1. Your computer gets infected with a bot, also known as zombie malware.
  2. The bot “calls home”, typically using a simple web download, to fetch a spam message and a list of addresses to send it to.
  3. The bot sends the message over and over again, using your computer and your internet connection to clock up the mail deliveries.
  4. GOTO 2.

.

I invite YOU also to read my tutorial on How-To fight SPAM:

.


This blog post will get updated as soon as there will be new information.

 

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

 


..

Keywords necessary for me to remember about to create this blog post: Spam, Cyber-Security, Web-Attacks, related links, curation, Malware, Malware-Hosting countries, knowledge links, Cyber-Espionage, Privacy…

.

.

Stay tuned for next blog post(s) 😉

.

 

.

.

.

.

 
3 Comments

Posted by on February 15, 2014 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, DDoS, Education, eLearning, Europe, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, ICT Awareness, Identity Theft, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Proactive Thinking, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Spam, Spampionship, Students 21st Century Survival Guide, Sustainability, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: My PC Slows Down On Speed, WHY And WHAT To Do?

Often Asked Questions: My PC Slows Down On Speed, WHY And WHAT To Do?

.

Evolution of Education: Wordle Logo.


My PC Slows Down On Speed, WHY And WHAT To Do?

programmerman2First of all, let me please, say this: WE get supplied with NEW technology (commercial way…) without getting any advice on How-To use it, that is MY personal complain about it! In the 21st Century this SHOULD be anyway the case, the problems are known since ages and the manufacturers SHOULD provide to the customers a comprehensible guide ONLINE (less costs than a printed version…) about how customers have to deal with slowing down PC’s and BEST protection for Cyber-Security issues, WE are NOT living anymore in the Middle-Ages 😉 In the 21st Century WE MUST go for Proactive-THINKing and that is ALSO a RESPONSIBILITY for the manufacturers as:

===> WE are ALL responsible for a more secure internet!!! <===

SO… Sorry, this had to get said as WE have ALL to work more together as WE are using Social-Media as well, remember the word SOCIAL in it! Let us go now for it to explain the possibilities (there are several…) for a slow PC

  • Infected PC through Malware (an online Check will reveal mostly…)
  • Slowing down PC because of NO MAINTENANCE of it!
    • WE will discuss this in the sections below, step by step with different programs to clean the PC.
  • NOT enough space left on the hard disk (hard disk is full!!!)
  • Press simultaneously the “Windows logo Key” and the “letter [E]“.
    • ONLY way is to buy a NEW one, copy the existing stuff from the old one to the new one…
  • NOT enough Memory available!
  • PC needs long time to START:
    • Check YOUR START-UP programs… ONLY for advanced users!!!

Important notice: to know the reason WHY a PC is slowing down, a few questions need to get asked to find the right solution, follow the step-by-step guide below, please… Some ore necessary in case of YOU can’t resolve YOUR problem with the proposed FREEWARE (this could be possible also…) to post on internet help forums

ruotadentata2architet01But first WE will go for Praxis with different FREEWARE tools, such as (download them, please):

WE will see, by using the above mentioned FREEWARE tools, that NONE of them can do the job ALONE, YOU will see this later… YOU will see ALSO, that after having used them ALL that YOUR PC will have accelerated for good!

*******************************************************************************************************************************  VERY IMPORTANT: make sure that YOU have made an UPDATE of YOUR OS before any changes!!!

******************************************************************************************************************************

.


1st Step To Know: WHAT OS is Installed?

From my year long experience, most people even don’t know what “Operating System” (OS) and how much Memory is installed, NOR the size of the hard disk, here an easy way to find it out:

Press simultaneously the “Windows logo Key” and the “Pause Key [Break]”.

Windows Key+Pause

.

YOU will see then a pop-up window showing ALL the necessary information, similar to the screenshot below…

.

windows key+pause-system information

Image credit Microsoft

.

Useful links:

.


2nd Step: Delete The Browser Cache And The Browser History

About the Browser Cache

ruotadentata2architet01[START Text from New York University] In order to speed up web browsing, browsers are designed to download web pages and store them on your computer in an area called the cache (pronounced cash). When you visit the same page for a second time, the browser speeds up the display time by loading the pages locally from the cache instead of downloading everything again. This sometimes results in less than current versions of web pages being displayed, along with problems on registration and authentication pages.

Over time, this process may actually begin to slow down your browser as large amounts of data are saved to your hard drive. A cache does not empty itself and anyone who gains access to your computer can tell from these files what websites you have visited. To make matters worse, this caching is not limited to pages, but can also include login IDs, passwords, banking information, and other sensitive information.

Clearing your cache can significantly improve the speed and performance of your browser and ensures that anyone who uses the same computer and browser after you (particularly on public computers) will not see your private information.

===> It’s a good habit to clear your cache from time to time.  <=== [END Text from New York University]

Links:

.


Use Freeware Tools To Clean Your PC: 1. CCleaner

As described already WE will try out different FREEWARE tools, which are mostly well known over the years to clean our PC, WE will start with CCleaner, check below for download link, please:

Download the program, install it and let it scan YOUR PC, here below some help:

.

CCleaner-1

Above screenshot shows (after scanning) 41, 4MB of unnecessary stuff could get removed and deleted

.

As YOU might have seen on the left hand side navigation of the program, there is also a button “Registry“. It is possible to scan ALSO the “Registry” and to delete orphan entries, do so by clicking that button, check screenshot below…

.

CCleaner-2

.


Use Freeware Tools To Clean Your PC: 2. Sweepi

As mentioned above, WE will use different FREE programs one after each other to find out about the performance of each one and ALSO to maximize the cleaning. Of course I know it already, BUT YOU should find it out as well as ALSO this will convince some hardliners that CCleaner isn’t the best existing program and that one program alone isn’t enough for a deep cleaning of the PC!

So, first download the program at following address ===> Sweepi <=== and install it! Launch the scan and wait till YOU will see the below result.

.

Sweepi scanning

.

The below window will get displayed now. Click on the button “Reboot“. The important about this action is that the “index.dat” files will get deleted and overwritten

.

Sweepi final stage

.

Conclusion: CCleaner found  41, 4MB of unnecessary stuff and NOW after the scan of CCleaner, Sweepi found STILL 438MB!!! Sweepi can do actually even more, check here ===> http://www.sweepi.com/index.php/tools/ <===

.


3d Step: Defragmentation Of The Harddisk

What is “Fragmentation” and WHY is “Defragmentation” A MUST?

ruotadentata2architet01[Start TEXT from Microsoft] Disk defragmentation is the process of consolidating fragmented data on a volume (such as a hard disk or a storage device) so it will work more efficiently.

Fragmentation happens to a volume over time as you save, change, or delete files. The changes that you save to a file are often stored in a different place on the volume than the original file. This doesn’t change where the file appears in Windows—only where the bits of information that make up the file are stored on the actual volume. Over time, both the file and the volume itself become fragmented, and your computer slows down as it has to look in different places to open a single file. [END TEXT from Microsoft]

Windows PC’s have a FREE build in “Disk Defragmenter“, check below, please:

In OUR example below, WE will use the FREEiObit SmartDefrag” program…

.

fragmented HardDisk (2.5%)

As YOU can see there are a lot of “red squares” shown, that is fragmented space, in this case: it took about 2.48%, a lot! Defragmentation is required by +/- 1% of fragmentation!

.

Defragmented HardDisk

After defragmentation the “red squares“, the fragmention, have disappeared and the hard disk is now ONLY on 0.73%, acceptable!

WE will STOP here, there is actually even more, BUT WE will discuss this in another post; such as Anti-Spyware and Anti-Malware Check! With the proposed programs here YOU will be able to make YOUR PC running more quick anyway…

 OK, I know, YOU are curious 😉 SO… For those who will straight go further already NOW, please check the following links:

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
..

Keywords reminding me about what I have to post:  Sweepi, CCleaner, Online Antivirus Check, temporary folders, Memory, Malware Check, Spyware Check, visited websites in cache, NOT more than 1 Antivirus, deleting Windows restore points, Backup, Wise Care 365, Registry Cleaner, Disk Defragmentation, Browser Cache, index.dat file…

.

.

Stay tuned for next blog post(s) 😉

.

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

.

Evolution of Education: Wordle Logo.


I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

programmerman-animatedActually it is not really a question BUT a statement from MOST people ===> I Have Installed An Anti-Virus And A Firewall, I Am Protected NOW! <=== BUT is that true!? NO, NOT anymore, this was true ages ago BUT NOT anymore today! When YOU use the two above mentioned then YOU are already a bit protected, but far away that YOU can say, I am safe now! WHY? First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

..

I will cite ALSO my online friend https://twitter.com/dougpete about WHAT he has to say about. Check below, please.

.

Doug PETERSON - coding- nobody is perfect

Check the original blog here ===> http://dougpete.wordpress.com/2014/03/01/a-wakeup-call/ <===

.

Find out more about Doug PETERSON here:

.

SO… NOW WE know that WE have to be aware a bit MORE and that WE have to create a Cyber-Security Mentality for ourselves and for the community! Even Anti-Virus programs have sometimes ALSO vulnerabilities! These vulnerabilities can even bypass the installed protection software, such as Anti-Virus and Firewall and the bad boys (Cyber-Criminals) can take the control over the computers by exploiting these vulnerabilities! Once a computer controlled by the cyber-criminals (===> YOU don’t remark it <===) they include it into a network of other controlled computers, that network is called a “Botnet”! These so called “Botnets” are getting used to attack Government websites and ALSO other websites as well as “Spam” generating computers, and this ALL without the knowledge of THEIR owners!!! So, let us find out NOW what “Botnets” are and WHAT they can perform, YOU might get impressed, there is a BIG POWER behind, and that with OUR computers and without OUR knowledge!!!

Learn more:

Thus meaning ALSO that YOUR computer could become a Cyber-Weapon who is attacking YOUR own Government and this without YOUR knowledge!!! Sounds strange, isn’t it!? BUT that’s REALITY! Check my blog post below for more information, please:

As YOU might have remarked (for those who follow my posts…) I bring every time a bit of creativity and also music in to my posts, so this time it will be a music video from ===> “Weird Al” Yankovic – called Virus Alert <=== Check it, watch it and listen to the music as well, it is funny and great to watch. It shows the REALITY 😉 BTW: there are lots of other interesting music videos from  “Weird Al” Yankovic”, check them ALSO…

.

.

===> Forewarned is Forearmed!!! <===

.

As WE know NOW, after reading the above mentioned, there is certainly the question: WHAT else SHOULD I do then to get BEST protection!?

.


WHAT else SHOULD I do to get BEST protection!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01WE learned already that even Antivirus-Programs could have vulnerabilities and ALSO the reason WHY (inevitable bugs in programming code, as a reminder), SO, what’s NEXT!? Thus meaning: ===> Nobody Is Perfect <=== (Mac, Apple and Linux included)! WHEN such problems are getting known by the manufacturers of software programs, THEY release as soon as possible (asap) UPDATES!!! These UPDATES are NOT ONLY an option BUT a MUST to install!!! YOU understood already NOW THAT UPDATES are a MUST, right 😉 And a MUST for any “Operating System” (OS)!!! NO exception!!!

So, let us have a look on those vulnerabilities on any “Operating system” (OS):

OK, I got the message NOW and I don’t have THAT much time to spend to UPDATE manually ALL my installed programs and WHATEVER, this is stressing me really!!! I can’t cope with THAT!!! Isn’t there around some solution for ALL THAT, an automated solution!? Of course there is an automated solution for the so called “Third Party Applications“, and that on is actually very easy to install and FREE, check my blog post (tutorial) about it below, please:

BUT: please don’t let us forget about the ===> Patch-Tuesday <===, that is THE day to UPDATE YOUR Windows machines and ALSO ADOBE related products such as FLASH-PLAYER and ADOBE READER (PDF), and THIS for any Operating System (OS)!!! Make sure to get THE ===> reflex <=== to UPDATE them! BTW: this is any second Tuesday on each month!

An OTHER, OH YES, there is STILL some OTHER, sorry: ===> Browsers (ALL of them…) <=== are THE Gateway for Malware infections, this is NOT known by MOST users!!!

Learn more below, please:

.

OH MY GOD, again so much stuff to remember, how could I do this!? Well, I agree with that and therefore I started ages ago (???) on Social-Media Twitter the “Hashtag” ===> #FSCD <=== who means ===> Friday Security Check Day <=== and who reminds YOU on any FRIDAY about to get THE ===> REFLEX <=== to take care about YOUR security 😉

.

book-question-markI invite YOU ALSO to read my following blog posts:

.

.

Keywords as a reminder for me to create this blog post: Anti-Virus, Firewall, Third Party Programs, Updates, Drive-By-Download, Flash vulnerabilities, adobe vulnerabilities, Plugins vulnerabilities, Bad programming, Cyber-Security, Responsibility, links to related blog posts, Cyber-Crime, Passwords, human behavior, naivety, Computer as Cyber-Weapon, malware bypasses anti-virus and Firewall, Countries worldwide and Cyber-Security,

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.
.Stay tuned for next blog(s) 😉

.

.

 
5 Comments

Posted by on February 9, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Europe, Facebook, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Motivation, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Security in Schools, SID2014, Social Engineering, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

.

Evolution of Education: Wordle Logo.


Are WE Becoming Too Paranoid About Cyber-Security?

This is a question I get asked very often, and I got remembered again by my online friend Doug PETERSON ===> @dougpete <=== about it on a Social-Media conversation (BTW: it’s called a “convo” on Twitter) on Twitter, check below please:

.

Twitter Conversation about cyber-Security

.

SO… As I can’t answer Doug’s very good question on a Twitter based conversation, as it would be too long, I took the challenge to create a new blog post here. And actually it inspired me to create a series of new blog posts with the TOPIC ===> Often Asked Questions:… <=== This was the introduction, now let us go for it…

.


Shouldn’t WE Have A bit Of Paranoia Anyway!?

sharing-iconA good question back, isn’t it? My direct answer to this would be, YES! A healthy paranoia attitude, why!? Let us try to go a bit for Deep-THINKing if YOU permit 😉 Let us ALSO try to make a comparison between the Real-World and the Virtual-World (the internet). WHEN YOU take the time to compare both worlds YOU would find out that there really few differences, apart that the internet is technology driven and that WE connect global on instantly actions

===> BUT: Let us first admit that the Real-World and the Virtual-World have MORE positive attributes than negative ones!!! <===

Mausi-parapluie.

BUT ALSO: WE have to accept THAT WE are NOT gods, and therefore WE are ALSO on a status as ===> Nobody-Is-Perfect!!! <=== 

ALSO negative things as present in the Real-World are ALSO present in the Virtual-World, as WE copy ourselves ONLY into the Virtual-World with ALL OUR character

.

.

Let us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

WHAT do the Governments worldwide say!? Check below, please:

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Check ALSO:

Coming back to the negative things as THEY are present in both worlds, let us be honest, as new born people into the Virtual-World  (mostly…), WE have to acknowledge THAT there is a STRONG (actually on 2014) dominance of the bad boys, the criminal ones!!! Don’t believe me? BETTER to check out the shown resources below, please:

Please, take YOUR time to UNDERSTAND the shown resources above, OTHERWISE YOU won’t get THEIR importance and YOU will go on with YOUR same question, which is NOT the goal of this blog post anyway! YOU SHOULD read it to get the message and the answer to YOUR question 😉 To give YOU an answer to YOUR question, the BEST way is to read about it and to go for Deep-THINKing anyway, NO ONE can convince YOU about WHAT YOU don’t want to accept, so build YOUR own Mentality about it through the published facts 😉

.

Meanwhile listen to the music below… Bridge Over Troubled Water (Simon & Garfunkel)

.

.

As the title of the music video tells us “Bridge Over Troubled Waters“, it is exactly THAT what this blog post wants to bring over! Trying to get YOU convinced about the present dangers , to make YOU aware about the present dangers (OH YES, there are MORE as YOU might expect…) and to SHOW YOU as well WHERE those dangers are and making YOU fit to fight against THOSE dangers, to make YOU responsible “Digital-Citizens“! YES, the word RESPONSIBILITY is being used again, YOU SHOULD remember it 😉

.

I invite YOU ALSO to read my following blog posts as well, please:

.

WHEN coming back to the TOPIC ===> Are WE Becoming Too Paranoid About Cyber-Security? <=== I think that YOU, after reading the above mentioned, that YOUR question is answered and that YOU go for a ===> Community-Mentality <=== as it is THIS what would fight against the bad boys

.

Keywords:  often asked questions, what do people think about Cyber-Security, Mac Mentality, I installed Antivirus & Firewall, I am secure, Cyber-Security is ONLY for paranoia people, Cyber-Security is ONLY a hype, Sharing Responsibility, community, Critical Thinking, Proactive Thinking, any device as Cyber-Weapon possibility, patriotism, holistic view, selfish mentality, community mentality, Technology and maintenance as well as Safety and Security, Education’s Responsibility, everybody’s Responsibility, Curation about Cyber-Security, it’s ONLY ALL about commercial to sell…, Cyber-Espionage, NEUTRALITY of the internet?, Privacy, 20th Century Mentality expressed through 21st Century Technology,

 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

.
.Stay tuned for next blog(s) 😉

.

.

 
8 Comments

Posted by on February 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, browser, Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Home-Work, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Quality Courses, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Technology Integration, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

.

Wordl Logo Malware-Adware.


What Is Potentially Unwanted Programs (PUPs)? And How-To Remove Them.

programmerman2Potentially Unwanted Programs (PUP)” are a piece of software that is also downloaded when a user downloads a specific program or application. THEY are similar to malware in that it will cause problems when it is downloaded and installed. THEY can be very embarrassing as one doesn’t get rid of them with normal tools, one needs definitely to use special tools to remove them.

Freeware publishers offer their products for free, but bundle them with PUPs in order to earn revenue and users are unaware of these additional installations because ===> they do not read agreements thoroughly. <===

WE will take an practical example while WE are downloading a specific FREEWARE program and discuss on it on How-To. Here below on example where YOU MUST take care when downloading FREEWARE:

.

PUPS-1

.

As YOU might see in above screenshot there are pre-installed PUPs integrated, uncheck these boxes before YOU click the “Next” button!

Once the software installed, I recommend to shut down the PC and to restart it. If there is STILL a PUP on YOUR PC YOU will see it then! BUT, it isn’t a 100% sure way to know if so, BETTER is to install a FREEWARE program (without PUPs) to check the PC, find THEM and to remove THEM! WE will see this in the section below…

.

Related links to PUPs:

.


How-To Check And Remove PUPs On My PC?

1ibdy1vf6wghd-n05dgl-aigainformation1I tried out a lot of solutions over the years and this one, the one WE will describe below, gave me the best results to remove ONLY the PUPs! WE will discuss, in an other section as well, How-To prevent that PUPs get installed. SO, before installing and running the test of that program, let me give YOU an advice, please: depending on how many programs YOU have installed on YOUR PC the test and removing process could take about 30 minutes; the time YOU can’t work anymore with YOUR PC. Make sure when YOU do this task to have foreseen something else to do. Some possibilities are, running the program before a meal, a shower, before shopping, and… YOU decide 😉 As WE are using the download page from Bleeping Computer, I will use their text as well…

BleepingComputer Review:

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.

So let us go now and download this program at following address:

Once having installed the program and started it, it will look like this (see screenshot). YOU don’t have to fear as well to lose some programs as the program creates ALSO a “Registry Backup”!

.

jrtcmdsm

.

As mentioned already above, it will take time, so wait and see 😉 YOU will get later provided a detailed report about what was removed, report which YOU could save, see screenshot below, please.

.

JRT Report

.


How-To Prevent The Installation Of PUPs?

SO… NOW WE know How-To remove those unwanted, stressing programs, BUT doesn’t there are existing programs who help us to protect against those PUPs? YES, there is actually one very good program existing since ages and STILL developed, who makes a great job on preventing and ALSO on removing PUPs, Adware, Spyware, and… It is called “SpyBot Search&Destroy”

Spybot for private use

Why use the Free Edition?

If all you require is to be able to scan and remove malware and rootkits from your system. Or if you want to protect your PC by immunizing your browser and hosts file, the ‘Free Edition’ is the choice for you. If you are a more experienced user you can also check various ‘autostart’ locations using the ‘Startup Tools’. Spybot 2 can scan single files or specific folders and unlike other software it doesn’t matter if the file is located on your local drives or on a network share. Spybot 2 comes with its own whitelist which helps to identify if files are legitimate or not. This useful addition helps to speed up the scan. Even though this fully functioning product is free of charge you can still get free support by emailing our support team.

SO… Let us go to download it from the original website of its creator here:

I recommend to use the FREEWARE version, but anyway YOU might chose what YOU want…

SO… Once installed it will look like this, see screenshot below, please.

.

Spyware Search&Destroy 1

.

Once started, the first step to do is to look for up updates by clicking on the button “Search for Updates” (see screenshot). Once the Updates downloaded click the button “Check for problems“, see screenshot below, please.

.

Spybot Search & Destroy 2

.

The program will get launched (this will take some time, be patient…) and meanwhile YOU STILL can work with YOUR PC, but it will slow down…

.

Check the screenshot below to find out how the scanning process looks and YOU will see ALSO that YOU can use some tutorials through the scan window, in the “Help” menu, read carefully 😉

.

Spybot Search&Destroy 3

.

Once the scan is finished, WE will see the results, check screenshot, please.

.

Spybot Search&Destroy-NO infection

.

If there were some infections, WE will see this (see screenshot below, please).

.

Spybot

.

YOU need NOW to click the button “Fix selected problems” and the found problems will get removed.

BUT, there is STILL something more and very smart to do, using the “Immunize” function! This allows YOU to get a passive protection  as well, see text here, please ===> Spybot – Search & Destroy offers the Immunization – a feature to allow you to immunize your computer against certain pieces of spyware.
It also allows you to use native browser settings to block cookies, malware installations, bad websites and other threats via ActiveX. SDHelper is an Internet Explorer plugin that adds a second layer for blocking threats. While the Permanent Immunity blocks installers by their ActiveX ID, this one blocks anything that should come through by different aspects.

Anything else WE could do? Of course, I invite YOU to read my following blog posts:

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.Stay tuned for next blog(s) 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,