• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

Secure Computing Practices

May 14, 2013 by Andy Thompson

Synopsis:  This blog article focuses on the privacy and personal security functionality of PC Clean Maestro– the removal of personal and private files.  There are numerous examples of cybercrime and online hacking which exemplify damages that can be lost in terms of financial wealth, private data, and personal information that can be used against your will.  In this article we will offer some examples of how you can prevent falling into malicious traps.  For more detail of cybercrime examples refer to our newsletter.  While encryption and firewall techniques are available, experts agree that there are always vulnerable points of entry.  We emphasize eliminating the risk by removal of data where possible.

Introducing – PC Clean Maestro:

The CompuClever application PC Clean Maestro has more than one major function.  It is used to remove junk files, to uninstall programs, and for removal of data for purposes of security and retaining PC privacy. Removing private data that is sensitive or can be stolen is done in the same manner as removing junk files with minor differences.  We will outline the procedure here in step-by-step fashion.  Before we begin, let’s start with a best practice tip.

Best Practices: 1. BackUp Data

As we stated in our previous article… backup your data!  This article deals with removal – permanent removal – of sensitive and private items.  As can be seen in the list provided below, these are items that are automatically created by ongoing functions of your PC including passwords, personal credentials and ID’s that you have entered when online.

It is good practice to make a copy of all files that are important to you and safer practice to keep these stored on an external hard drive. Today’s hard drives are often more gigabytes than the average person needs – and some are now terabyte in size (1,000 GBs).  External hard drives prices are very reasonable and there the added advantage of having a good backup and storage strategy is that you are working toward optimizing free space on your PC so that it can run faster.

Try out Microsoft’s Sync Toy.  This free tool makes synchronizing your files fast and easy.  You can avoid duplication and feel assured that you haven’t missed backing up all your files.

Best Practices: 2. Configure Your Browser Privacy

You can configure your browser settings to better restrict the privacy controls.  Refer to your browser settings and look for “privacy” or “security” (or both).  By configuring these settings you choose what items to block or restrict including cookies and Private browsing or Do Not Track (DNT) browsing traffic.  In recent years all major browsers have included a Do Not Track (DNT) option.  This enables a user to choose to not have their online activities tracked.  This applies to Internet Explorer, Google Chrome, Mozilla Firefox, Safari, and Opera.  The one shortcoming of this: “The Do Not Track system is completely voluntary, and there are no legal or technological requirements for its use. As such, not all websites and advertisers will honor the request or may completely ignore it altogether.”[1]

The Personal Security and Privacy Scan

By using PC Clean Maestro you can detect personal data items that are automatically stored on your PC.  Any of these items on their own may not constitute a substantial threat.  However, these items together – personal addresses, passwords, account information, and more – can be used together to provide an intruder what they need to gain access to perform financial transactions or use your data unlawfully. Here is a summary of the items that PC Clean Maestro scans:

Personal Security

  • Personal Identity Information: IDs and passwords used for Windows and for Internet access.
  • Saved Forms Entry Data: name, address, phone number, credit card information.

Privacy

  • Chat & Instant Messaging History: Skype and Windows Messenger messaging content.
  • Internet Browsing History: visited URLs, downloads, search history, cached images.
  • Multimedia History: videos watched.
  • Windows & Application History: Windows clipboard, document history, applications used.
Note: For a complete list of categories scanned, including sub items, see this knowledge-base article. As we will see, you have the option of choosing only the items you want to scan and remove.

The Steps:

There are three areas of cleaning using the Clean Tool.  We are staying focused on the privacy and security aspects of PC Clean Maestro.  The following instructions detail how to remove items that are a threat to personal security and privacy.

Step 1:  First you need to open the program.  The window will appear similar to as seen below.  We have expanded the Personal Security and Privacy sub-item sections to get a closer look at the items listed.

Select Items to Scan - PC Clean Maestro

Step 2:  Select items to scan.  Of the check boxes available you can review and clear items you want to remain on your PC.

Note: You can refer to the help file for instructions on how to use the three-state check box system.

Step 3:  Initiate the scan using the “Start” button.

Step 4:  Review and Clean.  A summary of the scan is displayed including the number of detected items found in each category, the size that can be reclaimed, and a “Details” link.  The link will provide the complete list of items found and the location of each item.  You can clear any selected items before moving on to the next step.

Privacy and Security Scan Results - PC Clean Maestro

Step 5: Clean.  Click the “Clean” button to permanently delete the selected items.

Note: Once you begin the Clean process, PC Clean Maestro presents a warning dialog when certain privacy items are selected from the Scan results.  This is a preventive step, a safeguard measure, so as to not unintentionally remove items.  Refer to the help file for a description of the warning, the list of items, and recommendations about what you need to do before choosing an option.

Best Practices:  3. Regular Use of PC Clean Maestro

Create an automated schedule.  Use the Options button in the Main window and select the Clean Scan Schedule.  From here you can configure when you want an automated scheduled scan to run.

Question Period:

What browsers do you support?
We support Google Chrome, Mozilla Firefox, and Windows Internet Explorer.  We also support the cleanup of history information recorded by Skype, Adobe Flash Player, Microsoft Excel, Power Point, Microsoft Word and several Windows items.

What are cookies?  Do I need to remove them?
Web cookies are used to identify you and prepare customized web pages.  Here is an example: you do online banking and it involves entering your account and password.  When you do a cookie is created that will store the account information so that when you next visit the site you only have to press the first letter or number of your account and it displays the rest.  This is pretty handy right?  This is where you have to decide if the convenience is worth the potential risk of having your account information passed on to someone who can access your PC without your knowledge or approval.

How often do I need to clean personal and private data?
Much of this depends on how often you perform certain functions on your PC.  For example, when you do online banking a cookie is created when one is absent (even though you removed it from the previous session).  You can look into not having your browser store web cookies but this is only one aspect of what you may want removed from your PC.  Regular removal of your browser cache is good practice – it maintains your privacy and frees up space.  Browser caches and a history of your online activities are automatically stored by your web browser.

Best Practices:  4. Staying on Guard

  • Take note of drastic changes to your PC!   If there is a malicious item that has infected your PC, chances are it will alter the functioning of your PC. Make sure your vital financial information is not accessible as stated in this article.  Next, consider using a trusted anti-malware application that can scan and remove the intrusion.
  • Be aware of suspicious emails and phone calls.  Here are two examples:
    1. An email arrives in your mailbox saying that your PayPal has been suspended (or your credit card is blocked).  The email looks very authenticate.  The same font and colors that PayPal uses on their website.  The email uses your email address in the “From” column.  The email goes on to instruct you to click a link to activate your account.What do you do? Not getting an actual email address from the trusted company is your first clue that something isn’t quite right.  An informed PC user will hover the mouse cursor over the link and look in the bottom of the window (the status bar) to see if the link that is displayed is in fact one belonging to PayPal.  To verify this is a potential hack or scam of some kind, you can also right-click the link – being very careful to not actually left-mouse click and get taken directly to a web page that may download unwanted items to your PC.  So… you carefully, right-click the link and select “Copy Link Location”.  You can now open your browser and check the validity of the URL by going to a site like URLVoid.  Simply paste the link and submit it for verification.  Even if it does come up clean… you can always go to the source.  Contact the trusted company and give them the details.  In this case… they will ask you to forward the emails so they can follow up with this spoof.
    2. You get a phone call (with no phone ID displayed) and someone says they are from “Windows” and states they have detected that there is a virus on your computer.  They immediately ask you if you are by your computer and if you can follow some instructions.  You are directed to go to a web site and run some tests.  What do you do?You do not have to follow their instructions if you do not trust who is on the other end of the phone.  Ask for verification of who they are.  Ask how they obtained your phone number.  Ask them for their name and phone number so that you can call them back.  You will find that the phone call will end quickly by them and you have protected your personal data and the integrity of your PC.

Keeping your PC safe requires a bit of effort and a whole lot of vigilance.  Hackers are like predators – they will prey on the weak.  In this case the weak are the uninformed.  We hope this has helped you gain an upper hand in defending your PC safety.

Reference

[1] www.Wikipedia.org

Filed Under: Blog, Newsletter, PC Clean Maestro, PC security, Protect online privacy, Windows tips

Privacy and Security – Touchless Cyber Crime

May 14, 2013 by Andy Thompson

Synopsis: Our goal in presenting the following information is not to scare our reader base but to inform. With knowledge of real and potential PC crimes and threats you can take steps to guard yourself. Brace yourself for the real world as we take a look at some of the trends in cybercrime and security breaches. After that we introduce the privacy and security features available with PC Clean Maestro.

Cybercrime has been a growing concern since the onset of the first computer virus. The very first PC threats were more about status and cyber geeks flexing their brain muscle as they penetrate computer defenses and proliferate in typical virus fashion. These days there is much more to lose. Personal information and finances can be stolen with the use of more sophisticated and stealthy technology. One recent hot topics in this field is “skimming wallets” – theft which involves just walking past someone and picking up there credit card information. We will look at this and other forms of cybercrime and speak to how to guard yourself from PC cyber attacks.

Trends and Threats:

Researchers and security professional are in agreement: breaches of PC security are on the rise.  This is not only at an individual level but even with institutions and businesses that have considerable expertise and finances directed specifically at cybercrime prevention.

Here are some outstanding examples:

  • In 2011, Sony failed to protect over 100 million user records and suffered losses of over 1 billion dollars along with customer relations.
  • Google, Yahoo, and dozens of Silicon Valley companies were hacked by the government of China in 2009.  It was announced that it was for the purpose of gathering information on Chinese human rights activists although Google also stated that intellectual property was stolen.  The exploitation took advantage of a weakness in Internet Explorer.
  • NASA experienced 13 security breaches in 2011.  This occurred after spending just over a third of its 1.5 billion annual IT budget on cybersecurity.  The attack resulted in hackers gaining full functional control of the NASA Jet Propulsion Laboratory systems.
  • 134 million credit and debit cards were exposed in March of 2008.  This occurred despite the fact that security analysts had warned online retailers of the vulnerability.  The attackers were able to install spyware via a SQL injection and obtain Heartland Payment Systems data.
  • April 26, 2013 – the website LivingSocial which offers online deals suffered a database hack and compromised the personal information of over 50 million people including names, email addresses, and encrypted passwords. The attacks utilized web applications to access the databases.

There are numerous examples and the instances will go on despite the fact that continual research and money goes into prevention.  The fact is cybercrime is innovative and exploits mistakes and takes advantage of technologies that are designed for our convenience.Several of the above examples involve institutional, corporate or business attacks – systems that were fortified by well-financed security systems.  If these can fall prey to cyber attacks, it becomes easy to imagine how personal PC attacks can occur.

Identity Theft:  This form of theft is considered one of the fastest growing crimes.  Some reports[1] state that 9 million people in the US fall victim to identity theft and that in 2010 there were $37 billion in losses.  For the most part online hackers are able to avoid being caught as less than 700 crimes lead to an arrest.  One of the most challenging thefts in terms of detection is that of child identity theft:

Child advocates, regulators, financial services and other professionals agree it is a particularly damaging crime that can go undetected for years, only to be discovered when the victim applies for a student loan or credit card.[2]

At Stake:

There are those that feel there likely isn’t much at stake with respect to data obtained from a PC.  However, with identify theft you stand the chance of a thief running up thousands of dollars in charges, committing crimes using your name, opening up a bank account and running up bills on credit cards that are charged to you.  Identify theft can result in financial fraud involving frauds related to credit cards, tax refunds, social programs, mail fraud, and even other computer crime.  What could be worse than becoming the victim of a cybercrime and be held accountable for other cybercrime?  An example of this is the case in December of 2000 where a U.S. Air Force system was hacked and code for controlling communication and spy satellites was downloaded to a computer in Sweden.  The Swedish destination had no idea and cooperated with the investigation and further activity was traced to Germany which was also believed to be used by a distant hacker

Then there is a loss of private information.  On March of 2013, a website titled “The Secret Files” became public.  It exposed personal and private information of numerous public figures and celebrities such as Ashton Kutcher, Jay-Z, Tiger Woods, Bill Gates, Mitt Romney and Hillary Clinton.  The information included social security numbers, credit reports, addresses and phone numbers of celebrities and public figures.

What about the ramifications with respect to loss of data?  In 2006 a laptop in custody of a data analyst was stolen that contained personal and health data of about 26.5 million active duty troops and veterans. The agency has estimated that it will cost between $100 million to $500 million to prevent and cover possible losses from the data theft.[3]

The Technology:

Advancements in computing technology can lead to both convenience and, when used for fraudulent or harmful purposes, invasion and loss of proprietary data and personal finances. There are those referred to as “black hat” hackers that can carry out targeted attacks (possibly picked at random or for personal gain).  They will scan the network to determine how vulnerable it is by testing all the ports on a host machine.  Any open ports that do respond can allow access to the hacker.

Even more prominent is the onslaught of a new breed of hackers that have little to no expertise.  These hackers are referred to as a “script kiddie” or skiddie. They simply download from the web pre-made automated tools to break into other’s computers.

Near Field: Smartphones and mobile devices can use Near Field Communications in such a manner as to conduct data exchange, contactless transactions, and more complex communications such as Wi-Fi.   Hackers are using this technology to brush by someone to gain credit card information.  It’s a form of pick pocketing without even touching someone.

More widespread and well-established techniques involve stealing ones laptop or gaining online access to ones PC.  Accessing the data is a matter of getting past and security and encryption by means of hacking the code.

All websites and computer-related programs are run by some sort of code. Whatever program was used to design it, such as HTML, C++ or JavaScript, hackers try to exploit the code and find its weakness. They try to find a way to get around the security codes by using special programs or writing their own codes to try and alter the original. [4]

Drive-by Downloads: A special note must be made for the drive-by download method of hacking.  This involves the following steps:

  1. A hacker injects code into a vulnerable website that is malicious in nature.
  2. The injected code exploits vulnerabilities in the browser of those people that surf to the infected website.  This can also occur through commonly used plug-ins such as Flash and Adobe.
  3. The malware silently works in a way that, in some cases, can evade antivirus detection.  It launches malicious applications that control the infected machine and steals private and personal information.

If you are interested in reading more on the subject of hacking we recommend that you take a look at the PC World article that describes the process used by a 23 year old white hacker (an ethical security expert) and a 19 year old black hat hacker.  This describes the use of programs that can identify the computer information, ones to crack passwords, and other tools to examine the content of the PC being targeted. [5]

Private Data: One important note about information that can be collected and used by companies: there are public and private databases that gather up statistics about you: “everything from your shopping habits to your health history”.  This information can be made available, even bought and sold “to creditors, employers, landlords, insurers, law enforcement agencies, and, of course, criminals”.[6] This can have life-changing impacts on you or it can merely be used to direct advertisements in your direction when you are browsing online.

Solution – Guard Yourself:

Common strategies to guarding yourself from attacks include – what else – using technologies designed to protect your PC.  This includes security firewalls, data encryption, and using passwords (and regularly changing passwords).  However, it is commonly agreed that utilizing security tools alone, such as antivirus software, firewall and intrusion detection applications, will not suffice.  You need to patch up vulnerabilities.  Commonly used programs, including your web browser and your operating system, need to have the latest security patch upgrades.

Those that are self-proclaimed hackers will state that there are no safe places to hide your personal information once hacked.  For this reason alone, we recommend the most effective strategy – remove confidential and private data on your PC.

Remove and protect Confidential Data:

Although you may not be aware of it, your PC stores personal and private information such as passwords, credit card information, email, chat communications, and more.  This exposes you to identity and security threats.  The need to completely remove confidential data from your PC is fundamental but requires some understanding of the fact that data can be recreated even after you have supposedly deleted it.

Tip – Deletion:  Complete deletion of data needs to occur when throwing out or re-selling devices including PC’s, laptops, mobile devices, USB keys, external data storage, and the like.  You need to look into methods of file deletion and reformatting of the drive.

Keep in mind that standard deletion of files in most cases will not be sufficient.  When you delete something it is removed to the Recycle bin so that you have the opportunity to re-claim it.  You need to empty it periodically.  We recommend that your use the technology available with PC Clean Maestro as an effective method of cleaning your PC as we have outlined in our previous article, and to remove private data to safely protect yourself from losing private information as a result of a malicious incident of cybercrime.

Tip – Configure Your Browser:  You can configure your browser settings to better restrict the privacy controls.  By doing so you choose what items to block or restrict including cookies and Private browsing or Do Not Track (DNT) browsing traffic.  In recent years all major browsers have included a Do Not Track option.  This enables a user to choose to not have their online activities tracked.  This applies to Internet Explorer, Google Chrome, Mozilla Firefox, Safari, and Opera.  The one shortcoming of this: “The Do Not Track system is completely voluntary, and there are no legal or technological requirements for its use. As such, not all websites and advertisers will honor the request or may completely ignore it altogether.”[7]

For a list of items identified as private and related to personal security, please see our blog article along with complete instructions on how to safely remove these.

Now that you are in the know about the potential of hacking and about keeping your personal computing private, we will provide some instruction on how to go about it in our blog article including how to use the Security and Privacy tools.  We hope the PC Clean Maestro operations will help you feel more confident about operating your PC safely.

References

[1] www.InvestingAnswers.com

[2] www.IdentityTheftAssistance.org

[3] Wikipedia.org 

[4] www.ehow.com

[5] PCWorld.com

[6] www.consumerreports.org

[7] Wikipedia.org

Filed Under: Blog, Newsletter, PC Cleaner, PC security, Protect online privacy

The Clean and Uninstaller Tools

April 16, 2013 by Andy Thompson

Synopsis: This blog article focuses on the free functionality of PC Clean Maestro – the removal of junk files and the Uninstaller.  There are considerable advantages to be realized by cleaning your PC which we cover in our newsletter.  In a nutshell, systematic cleaning can improve PC performance and responsiveness.  It is also a highly recommended step in the process of defragmentation.

Introducing – PC Clean Maestro:

With PC Clean Maestro you can remove junk files and uninstall programs so as to free up space.  By doing so you clear up PC clutter which can bog down the system and lead to poor system performance.   We will provide two sets of instructions for the Clean tool and for the Uninstaller.  Some best practices are provided so that your experience can be simplified and more trouble-free.  Before we begin, let’s start with a best practice tip.

Best Practices:

Backup!  This article deals with removal – permanent removal – of unwanted items.  The key is “unwanted”.  We strongly recommend that you make a copy of all files that are important to you.  The price of external hard drives makes this a no-brainer.  Today’s hard drives are often more gigabytes than the average person needs – and some are now terabyte in size (1,000 GBs).  The added advantage of having a good backup and storage strategy is that you are working toward optimizing free space on your PC.

Recommendation: Try out Microsoft’s Sync Toy.  This free tool makes synchronizing your files fast and easy.  You can avoid duplication and feel assured that you haven’t missed backing up all your files.

The Tools:

1. The Clean Tool

There are three areas of cleaning that can take place using the Clean Tool.  We are staying focused on the free aspects of PC Clean Maestro.  The following instructions detail how to remove junk files from your PC.

Step 1:  First you need to open the program.  The window will appear as seen here:

Scan & Clean Junk from Your PC - PC Clean Maestro

 

Step 2:  Select items to clean.  We are going to focus on junk items only so clear the checkboxes for Personal Security and Privacy.  You can then review and select any of the items in the Junk section (Installer Files, Log Files, Temp Files, etc.).

Note: You can refer to the help file for instructions on how to display all the individual items that are categorized.  You can also get information on the three state check box system.

Step 3:  Initiate the scan using the “Start” button.

Step 4:  Review and Clean.  A summary of the scan is displayed including the number of detected items found in each category, the size that can be reclaimed, and a “Details” link.  The link will provide the complete list of items found and the location of each item.  You can clear any selected items before moving on to the next step.

Step 5: Clean.  Click the “Clean” button to permanently delete these junk items.

Best Practices:
Create an automated schedule.  Use the Options button in the Main window and select the Clean Scan Schedule.  From here you can configure when you want an automated scheduled scan to run.

2. The Uninstaller

The second tool we are outlining in this article is designed to uninstall programs.  As you will see, you also have the option of modifying and repairing certain applications.  Let’s get started.

Step 1:  Open the program and click the “Uninstaller” button in the navigation panel located on the left side.  The window will appear as seen here:

Uninstall Application Cleanly - PC Clean Maestro

 

Step2:  Review the list.  You can select items in the list and refer to the information that is displayed in the right panel.

Step 3:  Select one of the available options in the right panel.  In some cases an application will provide the options of “Repair” and “Change”.  If you are certain you no longer use an application you can click the “Uninstall” button.

Note: This procedure cannot be undone.   You would need to re-install the program to restore it to your PC.

Question Period:

How do I know if a program can be removed?

The rule of thumb is to only remove items you know are not required.  For example, A third party application that is not part of the operating system and is rarely used can be removed without too much impact to you or the system.

There are a lot of Windows Driver Package items in my list.  Can I remove them?

It is best not to remove Windows drivers as this can have an impact on how your computer and peripherals function.  In most all cases these are not large in size and you would not gain much by removing them.

How do I know if a program is from a trusted source?

Select the item in the list and make sure that the manufacturer of the application (refer to the “Publisher” portion in the information panel on the right), is a trusted one.

Best Practices:

  • Vigilance!  Use caution when installing programs.  Sometimes add-ons can come with programs and there are cases where you are not getting what you expect.  Make sure to do your homework before you commit.  Look for a digital signature from the manufacturer during installation.  These are obtained from only a few security companies that issue digital signatures that go through rigid methods of testing. You can also perform Google searches to display objective customer reviews.  Be careful that these are from valid sources.  With a little effort you can better authenticate the validity of an application and the manufacturer of the program.
  • We also recommend that you keep your programs up-to-date.  Make sure to check that you are running secure programs with all the latest patches and updates.
Keeping your PC clean is like house chores… it is something we all tend to avoid but when you make the effort the rewards are really noticeable and can be maintained.  We hope this article brings you closer to a more positive PC experience.

Filed Under: Blog, PC Clean Maestro, PC Cleaner

Too Much Junk: Stay Lean and Clean

April 15, 2013 by Andy Thompson

Synopsis:  Two months ago we presented articles on defragmentation – one of the most effective methods of improving PC system performance.  Prior to applying this procedure it is highly recommended to remove clutter from your PC – what is often referred to as “junk” files.  We are going to look at the symptoms your PC could be displaying.  Next, we will examine what some experts suggest and some of the challenges associated with these tasks.  Finally we are going to look at performing two solutions using PC Clean Maestro:  one, cleaning junk files and two, uninstalling programs that are not necessary.


There are many online references providing information and instruction on cleaning junk files and cleaning your PC.  Many of these articles offer instructions on how to go about manually using the onboard tools supplied by your PC operating system.  The difficulty with this is:

  1. Much of this depends on what operating system you are running.
  2. This can be time consuming if you do not know where these Microsoft tools are located.
  3. Manual removal of files is almost always tedious and does not produce thorough results as items are stored by programs in areas without your awareness.
  4. Quite often you need a fair bit of PC expertise and a whole lot of patience.

What you are basically being told to do is to locate some tool which would depend on what OS you are running (for example, there is the “Add or Remove Programs” tool for XP and the “Program and Features” tool in Windows 7).  Then you can locate and delete items one by one.  Some of these instructions can be challenging for some.  For example: “Delete the contents of the “Windows/Temp” folder located in the root directory of the hard drive”.  Even if you complete on this task it is incomplete as the items are placed in the Recycle bin.

Some of the instructions that we have come across even include inserting the Windows installation disk and reinstalling the operating system.  This is a major undertaking and should only be done after thorough backing up of programs and files and when all other attempts have failed.  Typically this would mean there is something even more wrong with your system such as having a computer malware or PC viral infection that cannot be easily removed.  What we are looking at though is something more common and less desperate – a gradual PC performance slow down.

Symptoms:

Let’s start by looking at the common symptoms you may be experiencing as a result of too much clutter on your PC.  By confirming the symptoms you can feel more assured that the treatment plan will be the correct one.  Generally speaking we are comparing the performance when a PC is freshly installed and running to the overall responsiveness you now experience with your PC.

Typical symptoms include:

  • Slow startup time.
  • Slower times to open programs, save files, close programs, and perform regular operations.
  • Computer freezes or locks up.  This means that your PC does not respond or stalls as if waiting for you to do something.  It can be more frequently experienced when more than one program is running at a time.
  • Computer crashes or shuts down on its own.

Cause and Effect:

There are numerous causes that are contributing to poor performance as a result of PC clutter. Over time and daily use, PC’s get clogged with clutter and junk files clog up the system.

Most commonly experienced causes of “Too Much Junk”:

  • Unwanted files get stored on your PC when you browse the Internet.  Web browsers produce caches of files when you surf the net.
  • Unwanted files get stored on your PC during downloads.  Programs create Temp folders and files to temporarily use during an installation.
  • Uninstalled remnants:  Items are not always removed when uninstalling programs.  This can happen even after you have successfully completed the un-installation of a program.  These are sometimes referred to as “orphan” strings and files which are left in the registry and on the hard drive.
  • Redundant programs can lead to excessive action behind the scene (taking up PC processing).

Surfing the net, getting files in email attachments, installing applications from the Internet… these are regular day-to-day activities. The result is fragmentation – files not stored in a contiguous manner. This can include having many interdependent files that make up a program stored further apart. These items become scattered across the hard drive which causes excessive movement of the hard drive and undo wear and tear. In the case when there are too many redundant applications running there can be processes that are actively competing for computer resources in the background.

Solutions – Clean & Uninstall:

So what have we learned?  Too much clutter of junk items can cause your PC to be slow in many ways.  To be specific, the result of junk files and unnecessary programs is that these items take up disk space and can use available memory thereby resulting in slowdown and unexpected behaviours.  Maybe the real question though is: how do you best remove these especially when considering that it is a task that you need to do periodically – it’s not a one-time fix.  As we stated, having too many programs that can perform the same functions can also be detrimental.  This is why PC Clean Maestro is so crucial to cleaning up and improving the PC state.  Let’s take a closer look.

Clean:

There are junk items that are considered to be the “low hanging fruit”.  That is, they are somewhat less challenging to locate and remove.  They also, in this case, produce some pretty good results in terms of how much hard drive space is reclaimed as a result.  Here is what we consider to be the top five items for removal.

A Comprehensive Junk Scan of Your PC - PC Clean Maestro
  1. Recycle bin items:  If you are a fairly new PC user you may be unaware that when you delete items they get moved to the “Recycle bin”.  The reason for this is that you have the option to reclaim them if you decide you were too hasty deleting them.  However, these still take up hard drive space and the bin can get as full as you have available space on your PC.
  2. IE download files:  Just surfing web pages leads to downloading of content including media files.  This can add up over time and it needs to be flushed from your system on a periodic basis.
  3. Installer files:  Cab files are downloaded to your system during an installation of programs that are sizeable.  For example, Windows Office.  A cab file (short for cabinet and seen as “.cab”), is a library of compressed files.  They can be used to reduce the download size and time for web content required for an installation.  Once an install is complete you no longer require these files.  For some programs you may want to back these files up to an external hard disk to prevent having to re-download them.
  4. Windows Temp folder:  Temporary folders are for storing temporary files.  This is intended to be a temporary storage and some operating systems automatically delete the items with each reboot.  Windows does not and you need to initiate this procedure.  In some cases it is best to remove only items that are considered older than seven days.
  5. Windows cache files, dump files, and error reports:  Windows automatically creates files and reports that are based on certain incidents for purposes of troubleshooting or re-simulation for analysis.  These files can accumulate over time and are not relevant after the incident has passed (assuming it has been resolved).

PC Clean Maestro is designed to clean.  All of these items we have mentioned, and more, can be detected and cleaned.  After performing a quick scan a complete summary is provided and the total size of the junk items is tallied up.  In some cases, this can add up to gigabytes of “junk” and can account for 5 -10% of your disk capacity.

Uninstaller:

The Uninstaller tool in PC Clean Maestro is easy to use.  Having this tool in the same program consolidates the clean process.  Often times, applications are downloaded to your system when you are installing another program.  This especially occurs when you are installing a program that is sponsored by a second manufacturer designed to appear on your browser toolbar or display popups prompting you to buy.

Cleanly Uninstall any Program - PC Clean Maestro

With the Uninstaller you get a complete list of installed items on your computer.  You can select on any item from the list and, depending on how the item was designed, you are presented with being able to Uninstall, Repair, or Change.  With the Change option you can modify the settings that you were first presented when you installed the program.

One of the more challenging questions facing every user ultimately is… how do I know what to uninstall?  The basic answer is to resolve two questions: how is this application used on my PC and can I trust the manufacturers of this software.  This can involve doing some online research.  You can examine a program and verify that it is has gone through an authentication or certification process; type the program name and “certified” in a Google search and check the results.   For more information, refer to our blog article: “The Clean and Uninstaller Tools”.

In Summary – Lean & Clean:

We’ve covered the basics to understanding the importance of cleaning your PC.  We’ve introduced the tool to use: PC Clean Maestro.  One important item to mention, users of PC Clean Maestro can use all the functionality presented here for free.

Tip: There are other functionalities to improve your PC computing experience relating to security and privacy which are included in the full version of the product.  We hope to provide more information on this for you in an upcoming article.

Now that you are in the know about the benefits of keeping your PC lean and clean, we will provide some instruction on how to go about it in our blog article including how to use the Clean Scan Schedule tool.  We hope the PC Clean Maestro operations will help you recapture the computing experience you once had when first operating your PC.

Filed Under: Blog, PC Clean Maestro, PC Cleaner, Windows tips

Fix or Disable Java

March 12, 2013 by Andy Thompson

 

Synopsis: There are Java errors that can appear and require your attention to resolve. Another major issue with Java relates to security. Many experts are beginning to say turn off Java altogether. This is a difficult decision to make and we have covered this in some detail in our newsletter: “Java – The Hacked.” For the purposes of this article we will focus on how to fix Java errors, keep your version of Java recent, and offer recommendations. Simply put: if you want to use Java error free –run the updated version. If you decide on continued use… consider our suggestion for safe surfing.

What is Java? Where is it Used?

Java is a programming language and platform used with many devices and on web pages. Frequently, Java is used to run applets – small applications that perform a specific task on a web page. Without Java, these little applets would show as blank areas on a web page and you would not have access to the interactive features they provide. From the Java site, examples are provided including chatting with people online, using mortgage interest calculators, viewing 3D images. The site also states that unless you have Java installed some websites and applications will not work.

The Java Question. To use Java or to not use Java. Getting rid of Java errors is a fairly easy process and will also provide you with the latest security updates. The most challenging question related to using Java is the ongoing potential for security exploitation. There are numerous examples of hackers exploiting or creating loopholes. For more information about this please refer to our latest newsletter.

Solutions. This article focuses on solutions.  We recommend that if you are having issues with Java or if you want to continue using it, begin by applying a simple fix.

Solution 1 – Update and Fix Java Errors:

With PC TuneUp Maestro you can easily update Java to address issues.

Step 1:  First you need to open the program and click “Fix & Clean” in the left panel.  The window will appear as seen here:

Java Error Repair - PC TuneUp Maestro

Step 2:  Click the Java Error Repair tool.

Step 3:  Compare the version you have installed with the version that is available.  If you do not have the latest version you can proceed by clicking the “Fix” button.

Fix Java Errors - PC TuneUp Maestro

Step 4:  Click the “Fix” button.

The Results:  You now are running the most recent version of Java.  For some users this means that previous errors that were appearing should now be resolved.  Keep in mind that we encourage our registered users to seek support from our team if problems continue to appear.

Best Practices: Now that you are running the most recent version of Java and you can verify this from time to time by following the same procedure above, let’s look at other alternatives.  Here are the choices as we see them:

  1. Continue to use the most recent Java version.
  2. Use a safe browsing method.
  3. Disable Java completely.

We have provided these decisions in a step-by-step format.  In other words, if you are not completely sure then you can try these one at a time.  The first step we have covered.  The next step is to begin using safer browsing and online practices.

Safe browsing:   To begin a new safe browsing practice we have two suggestions for you.

  1. Try out Mozilla Firefox as it has Click to Play and Blocklist technologies that you can customize to give you control of what Java and other add-ons and plugins you want enabled.  See this page for more information: Mozilla Support for Java.
  2. You can also try using more than one web browser. For this solution we recommend that you use two different web browsers: one with Java disabled completely (Mozilla Firefox or Google Chrome) and one that still supports Java (such as Internet Explorer).  If you come across a site that uses Java and you feel it is safe, you can switch to the backup browser.  In this example, Internet Explorer is the recommended backup choice as it is the most difficult one to bring to a Java disabled state.

Solution 2 – Disable Java:

Maybe after you have tried these first two choices, you can get a better sense of how much you really need Java.  If you feel the chance of a security threat is not worth the risk, maybe now is the time to disable it completely.  Depending on which web browser you use this can be either an easy process or a challenging one.  Here is the breakdown:

Internet Explorer:  The steps to disabling Java in IE are complex.  If you have fairly good technical abilities, we recommend that you get started with this Microsoft knowledge base article.  However, when doing this you may find that Java is invoked in other ways in IE and you need to take further methods at the registry level (for advanced users there are steps available in another Microsoft knowledge base article).

Chrome:  In your web browser, type: “chrome://plugins” and  click the “Disable” links that are associated with Java(TM) – there are three disable links.

Firefox:  At the top of the Firefox window, click the Firefox button and click “Add-ons”.  In the Add-on Manager select the “Plugins” panel.  Click the Java TM Platform plugin(s) and click disable.

We hope the information presented here has made your Java experience a more safe and healthy one.

Filed Under: Blog, computer fixes, PC security Tagged With: java

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.