How to Maintain pc

The internet is flooded with tips and advice on PC cleaning.
Much of this advice urges you to buy useless programs that
cost hundreds of [insert your currency here.] Look no further:
you can follow this guide and get your PC clean without
spending any money whatsoever. I do recommend programs,
which have  paid upgrades; however, I am confident these
programs,  when upgraded,  are  worth every penny and
hundreds of Windows Guides readers. 
agree with me.

Let’s get right into things; to clean and maintain your PC:
1.  Find and remove malware.
2.  Uninstall unnecessary programs.
3.  Delete junk/temporary files.
4.  Optimize your system.
5.  Defragment your hard drive.
6.  Backup your data.
By following these steps, you’ll ensure your computer is
performing at its best and is error free.
Because this book is designed for beginners, instructions on

manually tweaking your PC are not included.

AVG Internet Security
I’ve used AVG for many years on my computers because I trust
it and it has always protected my files from malicious .

AVG helps you stay safe while you shop, bank online,
watch videos, search or surf the web, download
music, documents and pictures, and email or chat.
Every document or file you download, every web page or
link you click on, is scanned by AVG before you open it.
Unlike other security products, we stop the threats
before they reach your hard drive and become a
problem. Safe internet surfing is now possible.


Protection against viruses is great but prevention is even better
and ESET constantly update their virus definitions to ensure
that the even the newest viruses are well protected against.
Virus updates do not consume unnecessary system resources
and do not fail–other antivirus programs I have used have
issues with updating and sometimes need a manual fix.

Malware – The generic term used for all forms of software
designed with malicious intent. Viruses, worms, spyware etc.
are all forms of malware. The term virus is often used when
malware should really be used as it describes all forms of
malicious software.
Spyware  –  Spyware tracks a user’s activity by monitoring
browsing habits and key board activity and can even take
screenshots while you use your PC. This information is sent
back to the creator or beneficiary of the spyware. Signs of
spyware include: modified browser homepages, slow internet,
and suspicious looking sites in place of legitimate sites

Related Posts:
  • whiat is fuzzy logic? A form of logic used in some expert systems and other artificial-intelligence applications in which variables can have degrees of truthfulness or falsehood represented by a range of values between 1-true and  0 -fals… Read More
  • What is Internet domain? Internet Domains  In database design and management, the set of valid values for a given attribute. For example, the domain for the attribute AREA-CODE might be the list of all valid three-digit numeric telephone are… Read More
  • what is file fragmentation? The breaking apart of files as they are stored by the operating system into small, separate segments on disk. The condition is a natural consequence of enlarging files and saving them on a crowded disk that no longer conta… Read More
  • What is data management? The control of data from acquisition and input through processing, output, and storage. In microcomputers, hardware manages data by gathering it, moving it, and following instructions to process it. The operating system m… Read More
  • .NET Framework A platform for building, deploying, and running XML Web services and applications. It provides a highly productive, standards-based, multilanguage environment for integrating existing investments with next generation appl… Read More
  • what is three-tier client/server? A client/server architecture in which software systems are structured into three tiers or layers: the user interface layer, the business logic layer, and the database layer. Layers may have one or more components. For exa… Read More
  • why need For a relational database? A database or database management system that stores information in tables—rows and columns of data—and conducts searches by using data in specified columns of one table to find additional data in another table. In a rela… Read More
  • what is X Series for Network Communications A set of recommendations adopted by the International Telecommunication Union Telecommunication Standardization Sector ITU-T, formerly the CCITT, and International Organization for Standardization ISO for standardizing eq… Read More
  • What is ini file? ini file:-Short for initialization file, a text file containing information about the initial configuration of Windows and Windows-based applications, such as default settings for fonts, margins, and line spacing. Two ini… Read More
  • HTTP status codes Three-digit codes sent by an HTTP server that indicate the results of a request for data. Codes beginning with 1 respond to requests that the client may not have finished sending; with 2, successful requests; with 3, furt… Read More
  • What is memory management? In operating systems for personal computers, procedures for optimizing the use of RAM (random access memory). These procedures include selectively storing data, monitoring it carefully, and freeing memory when the data is … Read More
  • What is markup language? A set of codes in a text file that instructs a computer how to format the file on a printer or video display or how to index and link its contents. Examples of markup languages are Hypertext Markup LanguageHTML and Extens… Read More
  • What is MIME? Acronym for Multipurpose Internet Mail Extensions. A protocol widely used on the Internet that extends the SMTP Simple Mail Transfer Protocol to permit data, such as video, sound, and binary files, to be transmitted by In… Read More
  • Whst is Password Authentication Protocol Acronym for Password Authentication Protocol. A method for verifying the identity of a user attempting to log on to a Point-to-Point Protocol (PPP) server. PAP is used if a more rigorous method, such as the Challenge Hand… Read More
  • What is GPS receiver? A device that includes an antenna, a radio receiver, and a processor for use with the worldwide GPS -Global Positioning System. A GPS receiver uses position and time information from four GPS satellites to calculate preci… Read More