Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Ten Commandments of Home Computing. 7

Status
Not open for further replies.
Aug 2, 2001
5,203
0
0
US
One of the things we should be doing to help clients is to give them something that will allow them to remember us, and possibly help them. I was thinking about creating The Ten Commandments of Home Computing. When I visit a client at home who has a personal pc problem, when done I would give them a framed copy of this they could hang by there pc to help them remember me and things like running live update on a weekly basis. I'm going to post what I've started, and it's an open forum. If anybody has suggestions, problems etc., let us know. This will be open for anybody running a small business to pass out to clients. I realize some of the business people out here are programmers, some work on security, etc. My specialty currently is giving low cost home pc repair, where I can make money on quantity and not cost. I'm probably the lowest priced, so I get plenty of calls and most of the problems are fixed within a couple of hours. One lady called today that told me I worked on her pc 2 years ago, and she needed help again. Anyway, here's the startof the 10 Commandments.
1) Always have anti-virus software installed, running and up to date.
A good anti-virus program should be able to scan incoming e-mails, delete the infected e-mails and then notify you what the program has done. On a weekly basis, you should connect to the company and run a live-update to make sure the anti-virus program has the latest protection for the latest viruses.
2) Allow critical updates to be down-loaded from Microsoft. As the internet gets more and more complex, more and more ways of attacking a computer via the internet are being created. Microsoft now has an option to download any fixes to vulnerabilities which they call Critical Updates.
3) Run a program that hunts down spy’s on your hard drive. There are programs that are invisibly downloaded on your computer that will monitor what internet sites you are visiting and send the information back to the company that installed them. This is called spy-ware.

Feel free to pitch in.




Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
Screwloose, these are good points for us, but this is being written for someone that knows how to turn on the computer, then check e-mail. I would like this as simple as possible. Thanks.

Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
Here's where we are at now. Note, I did change the Microsoft Express, but did not add the Eudora. All systems are different, and I'm trying not to get to technical. I did not add the entry to #7 for the same reason. Getting to technical. Thanks for all the help. Here it is so far. FYI, it looks a lot better in Word, but pasting it here makes some changes. When all is said and done, if anybody wants a copy, let me know and I'll e-mail it as an attachment.
1) at first, re-boot.
If you have a system problem with the computer, such as it’s locking up or getting slower and slower, re-boot the machine. If it is locked and you can’t shut it down, press the power button to turn it off, then turn it back on after 10 seconds. (Disclaimer, this is not a good thing to do. Usually it will want to run check disk to see if your hard drive is damaged, allow it to do so.) If the problem isn’t solved by re-booting, or recurs later, contact a professional. Do NOT re-boot if it’s a software problem, such as spell check in Word doesn’t work.
2)Always have anti-virus software installed, running and up to date.
A good anti-virus program should be able to scan incoming e-mails, delete the infected e-mails and then notify you what the program has done. On a weekly basis, you should use the tools to connect to the company’s website to retrieve the latest protection so that your anti-virus checker can find the latest viruses.
3) Allow critical updates to be down-loaded from Microsoft. As the Internet gets more and more complex, more and more ways of attacking a computer via the Internet are being created. Microsoft now has an option to download any fixes to vulnerabilities which they call Critical Updates.
4) Run a program that hunts down spy’s on your hard drive. There are programs that are invisibly downloaded on your computer that will monitor what Internet sites you are visiting and send the information back to the company that installed them. This is called spy-ware. One of the best removal tools is located at Spy-Bot Search and Destroy. It’s free and you can find it at Donations are not necessary, just asked for. This is different from viruses in that it does not try and destroy your computer, but may slow it down or transmit information out to possible hackers.


5) Don’t use the preview pane in Microsoft outlook or outlook express.
Using the preview pane while viewing your e-mail is very handy, but it’s the same as opening an e-mail. At one time, someone discovered a flaw in the Outlook system, where they could infect your machine just by opening an e-mail, not attachments. This was called VBS/BubbleBoy. The flaw was fixed, but there may be others discovered later, so better safe than sorry.




6) If you receive an error message, make a copy of it.
Just by pressing PrintScrn on your keyboard, you make a snapshot of it, you can then go to Start, Run, type in “WordPad” without the quotes and press enter. At the top select Edit, and then from the drop down, choose paste. You can print this out for a technician to use later to help troubleshoot the problem.
7) If you receive an e-mail from a company and at the bottom it asks if you want to be removed from the mailer, don’t do anything.
This is a method spammers use to find valid e-mail addresses. They send out tens of thousand of these, and when someone clicks “Yes” or “No”, they know the e-mail address is valid, and it’s then sold to people to send you spam. Just click on the X in the upper right hand corner to close the e-mail, then delete it.
8) Always make sure you have a good back-up.
It doesn’t matter if you’re working with a file, a computer or a server. Make sure you always have valid backups. This can save you endless amounts of time, money and aggravation. If it’s an important file, back it up to floppy or burn it to cd, then store it somewhere other than where the computer is. If it’s an entire computer or server you are backing up, the same goes. Store your backups somewhere other than where the computer is, so if there is a fire or other problem, the backup is safe somewhere else.
9) Create and use passwords that won’t be able for others to figure out.
Hacking passwords today is second nature to some people. They can use a back door and run a dictionary hack. This is a program which will use every word in a dictionary automatically, and if your password is in the dictionary, this will allow the hacker to break into your computer remotely. A good password is something that is easy to remember, and not associated with any word in the dictionary. Ih3C@htLm. This is a great password. I have 3 cats @ home that Love me. All you have to remember is that the 1st letter of each word creates the password.
10) Learn your machine
Learn the sights and sounds of your computer. If the monitor starts to dim, or there is a funny sound coming out of the back of the machine, pay attention. You may want to call someone if your computer starts groaning or whining. It could mean something inside it going bad. Also take note of unexpected changes, such as the pc slowing down, funny error messages and dialup confirmation boxes coming up when they didn’t before.

Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
I would like to comment on #8 regarding backups.

- Before making any repairs, backup critical info.
- Before making changes to critical spreadsheets, documents, database, backup.
- Have a formal backup strategy, and not a lacksy-dazy ad hoc when I have time. When preparing a strategy, consider how much it will cost you if the system goes down. Backups will require an investment. CD burner for smallish sites to DLT tape drive and off-line storage for larger ones.
- For certain types of data, there are legal requirements for "document retention" - payroll, taxes, building code specifications, pricing, etc. Be aware of these. Seek legal advice if neccessary. (Ignorance is no escuse...)

I do not get a warm and fuzzy about giving backups to friends for safe keeping which as mentioned previously. But I do like the idead of storing backups other than by the computer.

Lastly, in IT the first three rules are "backup, backup, backup". But the first three rules for lawyers is "CYA, CYA, CYA". Meaning that backups can be used for incriminating yourself or your business. Be aware of this developing your backup strategy.

...Moving on
- Plan for obsolecence. Your computer will not last 10 years, and if it does, the software and technology will suck. Budget and plan for upgrades.

- Networking is almost always better than standalone solutions. If you are a small business, it is not expensive to setup a simple network - better printing solutions, shared high speed Internet access, share files and datbases.

- Databases require administration; beyond just backups. Simple Access databases should be compacted and repaired on a regular basis. MS*SQL and Oracle databases require more care -- properlu shut down the database before backups or invest in on-line backup software and setup archive logging.

- Do not use illegal software. The temptation is high, I am sure, but the legal issues and costs can be very high.

That's all for now...
 
8) Always make sure you have a good back-up.
It doesn’t matter if you’re working with a file, a computer or a server. Make sure you always have valid backups. This can save you endless amounts of time, money and aggravation. If it’s an important file, back it up to floppy or burn it to cd, then store it somewhere other than where the computer is. If it’s an entire computer or server you are backing up, the same goes. Store your backups somewhere other than where the computer is, so if there is a fire or other problem, the backup is safe somewhere else. Make sure you have a backup schedule, don’t just back-up when you feel like it. Depending on the amount of work you do, you may want to back-up daily, weekly or monthly.
Thanks. I didn't use the info for databases or hardware even though they are extremely good points. The whole concept of the 10 commandments is to have hard copy to hand to clients or prospective clients that is easy for them to understand. If the client needs info on databases or hardware, we'll discuss this one on one.


Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
6) If you receive an error message, make a copy of it.
Just by pressing PrintScrn on your keyboard, you make a snapshot of it, you can then go to Start, Run, type in “WordPad” without the quotes and press enter. At the top select Edit, and then from the drop down, choose paste. You can print this out for a technician to use later to help troubleshoot the problem.
I'd like to see this changed to the following (some rewording's probably needed):
6) If you have a problem or receive an error message, immediately recall and write down anything you changed on your computer or any previous steps that leading up to the problem as well as any errors you received.
I figure with some errors, they may not be able to get to wordpad and writing it on paper's much easier for the computer illiterate. Plus, how many times have you went to fix a problem and the user didn't know what they had done just before the error occured. This info can help greatly when trying to troubleshoot.

 
I find a good starting point in troubleshooting any problems is to ask the user(s) not what it is that it isn't doing, but what it is that they are trying to get it to do.

You'll get a better view of the 'bigger picture' this way, and understand the business impacts of the problems that the user is experiencing.



SjrH - Data Security Storage & Availability Specialist
 
Greetings,

In response to willir's comment on backup strategies from the lawyers cya standpoint, if I am working with a client who is concerned that doing a backup would be incriminating, then this is a client that I do not want to work for.

I do a lot of work with law firms and the all do daily backups. They are concerned with preseving the work that they do, not covering it up.

Just my thought.

Marc
 
Marc

I agree with you. It is really not a about self incrimination, it is about the cost of complying to a legal request.

Law suites are a fact of life. You have a business, and are sued for this or -- maybe there is just cause, maybe not. The sheriff comes in and has legal right to aquire all data regarding the suite.

They come in, spend a few days, and leave.

Okay, now you have backups. They come in, and then mandate you to restore ALL data going back X number of years. This includes email and documents. Because you have the backups, you now have to comply with the request.

Not personally, but I have been in a situation several times where this has happened. In each case, nothing became of the data - there was no case, but the company in question spent $100,000's US in resources, and months and months of IT time accomodating the directive. What seems like a small issue in the scheme of things can tie a corporation up for months and jerpodize the life of the comapny and all it's employees.

Apparently, there is a legal precedence. If you use backups for disaster recovery only, and not for restoring accidentally deleted files, then you have legal grounds not to restore the files for the suite.

Currently, procedure and policy for the business I support and several I am aquainted with requires VP approval plus a legal review to restore file(s). I have seen requests from senior managment to restore their entire mailboxes and/or critical documents get turned down; I have seen requests to restore corrupted Access databases with 1000's of hours of data be refused.

Being an IT guy, this goes against my grain. I have always thought the three most important rules for IT was backup - backup - backup.

But the pendulum has swung the other way. Last year, I flew to the corporate office and had a very entertaining conversation with a corporate lawyer on this issue -- Danial Webster and the Devil argument. We in the IT business just need to be aware of this potential issue - it will not apply to everyone.

But this is the story for another thread. I think the focus here is come up with 10 rules for home computing, and we all agree that backups are a good thing. Just be aware that their use can go beyond recovering a lost file or corrupted database...
 
Willir,

Most of my work is done with small firms and small businesses, so the scenerio you describe doesn't apply. I am glad that I am not in your shoes....Though it would be interesting to talk with my clients and see how they feel about your discussion...

We should start another thread on this...

Marc

Sorry Glen for getting off topic...
 
No problem, I like looking at all aspects of this. I will still tell people to backup, backup backup.

[2thumbsup]

Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
So, what is the final thought? Good to go? Thoughts on posting this in the faq section? (Most members should know this stuff, but this would be posted only if members wanted to spread the word.)

Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
I think in this day and age no computer that accesses the internet should be without a firewall of some sort, either hardware and/or software. The only problem is that you need some sort of knowledge to set it up, but that is the case with any software. Windows XP as you know comes with the ICF. Zone Alarm is pretty easy to set up if you put it in learning mode.

You may want to lump (antivirus, spyware and firewall,etc ) into one category of internet security.
 
GlenJohnson said:
2)Always have anti-virus software installed, running and up to date.
A good anti-virus program should be able to scan incoming e-mails, delete the infected e-mails and then notify you what the program has done. On a weekly basis, you should use the tools to connect to the company’s website to retrieve the latest protection so that your anti-virus checker can find the latest viruses.

How about we add to this

Always have anti-virus software installed, running and up to date.
A good anti-virus program should be able to scan incoming e-mails, delete the infected e-mails and then notify you what the program has done. On a weekly basis, you should use the tools to connect to the company’s website to retrieve the latest protection so that your anti-virus checker can find the latest viruses. Also, a good fire-wall to stop hackers from breaking into your computer is a must in this day and age. Zone-Alarm lite from
is free and easy to use.

Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.
TTinChicago
Johnson Computers
 
I am amazed by users trying to open all and everything in MS Word (ie ppt, xls, bmp, etc). I am trying to teach them to use Windows Explorer. Maybe a rule: Use Windows Explorer to open files.

JR
As a wise man once said: To build the house you need the stone.
Back to the Basics!
 
It seems to me that something big has been left out here. I always make a point to tell less computer savy friends to NOT, I repeat NOT, say yes when prompted at a web site to install any software. Also along those same lines not to respond to email, or popups asking them them to logon to there bank, paypal, etc. by typing their username and password in the email or popup itself.

Two strings walk into a bar. The first string says to the bartender: 'Bartender, I'll have a beer. u.5n$x5t?*&4ru!2[sACC~ErJ'. The second string says: 'Pardon my friend, he isn't NULL terminated'.
 
DrJavaJoe is almost correct.
Never click the Yes/OK button on popups,
better even > Dont click any buttons and do not use the close X of the window either.

These popups now come with 'onclose' scripts executing god knows what on closing or NO/Cancel.

Best? Go to task manager to close this nonsense, or install anti spyware/popup ware.

JR
As a wise man once said: To build the house you need the stone.
Back to the Basics!
 
Those of you who work as technical support have of course heard of PEBCAM and ID 10 T. My favorite to note on a work order is LNOK (Loose Nut On Keyboard). Blondes still don't get it.

DWalrus
 
PEBCAK (i.e., keyboard) is the way I heard it...

JTB
Have Certs, Will Travel
"A knight without armour in a [cyber] land."

 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top