3. What we’ll cover today… The basics of what you need to know about computers but no one tells you Shopping for and buying a computer Knowing your computer Maintaining your computer Keeping your computer secure
4. The couch vs. car principle The couch principle – many people like to think of buying a computer like buying a couch. Once you buy a couch it’s always a couch. You don’t upgrade it, you don’t have to worry about losing things on it in general unless they’re under the cushions (kind of like being somewhere else on the hard disk drive), it doesn’t get slower, it gets outdated only after about 10 years or so, you may have to clean it now and then but it’s basically always there functioning as a couch whenever you need to crash on it instead of it crashing on you.
5. The couch vs. car principle The computer principle– The computer is very much like having the responsibility of a car. You have to go through the process of shopping for one, buying it with just the right options including a warranty, maintaining it, being careful with it even gentle, replacing parts eventually, and eventually deciding to keep it or replace it. Also, backups of your files are like spare parts for your car especially when the ‘parts’ are important, hard to find, or expensive.
6. Buying a computer Buying and maintaining a computer is very much the same with your car Shop around with very little surety of what is best for you Coupons available through email, mail, and websites Websites listing promotions and deals www.slickdeals.net www.techbargains.com Holiday bargains are worth looking for 20-40% off typical with bundles Having a computer seller rep. will help get good deals especially for businesses
7. Buying a computer No interest APR often available for 12 months or more In-person vs. online (CompUSA/Costco vs. Dell/HP) You may want to get a literal feel for a new computer. Going to a retail store or outlet may better for those who are more visual in what they’re looking for. However, be wary of refurbished models, used computers, and computers selling for cheap but without essential software or a good warranty.
8. Buying a computer Online configuration and ordering is very easy now and often leads to deep discounts especially around big holidays or special promotions and also year-end models. However, online ‘deals’ can have hidden after purchase costs like extended warranties from buying one that is too short, not getting enough memory or the right software.
9. Components of a desktop system Hardware Desktop system Case Power supply Adequate space for components Fans and good airflow Drive bays
10. Components of a desktop computer system USB The more the better 1.1 vs. 2.0 vs. 3.0 Firewire (400 – 800 Mb/s) CD/DVD drives (700 MB/4.7 GB) Media +R vs. –R +RW vs. –RW Single vs. double-layer Multiple Speed Blue-Ray (25GB)
11. Components of a desktop computer system Processor Intel AMD Speed Cache (or memory) Core Duo (2) Multiple or Quad Core
12. Components of a desktop computer system Memory Capacity (you never can have too much with any OS) Speed # of memory slots
13. Components of a desktop computer system Internal hard drives - bottle neck and most likely part to fail the soonest 1-6 per personal computer (depending on design of case) PATA (300 Mb/s) – old type SATA (1.5 Mb/s – 3.0 Mb/s) Capacity (20 GB – 1.5 TB) Speed (5400 rpm – 10,000 rpm)
14. Components of a desktop computer system Video card Built-in PCI card Memory Speed Analog vs. digital ports Dual ports Multiple video cards
15. Components of a desktop computer system Modem Speed (28kb/s – 128kb/s) Fax feature Network card Built-in wired (100Mb/s – 1Gb/s) Wireless PCI card or USB Monitor/display CRT LCD flat panel Plasma HD
16. Components of a portable computer system Portable Laptop types Standard Notepad Case Power supply Fans and good airflow USB 2-6 ports available normally 1.1 vs. 2.0 Firewire (400 – 800 Mb/s) CD/DVD drives (700 MB/4.7 GB) Media +R vs. –R +RW vs. –RW Single vs. double-layer Speed Blue-Ray (25 GB)
17. Components of a portable computer system Processor Intel AMD Speed Cache (or memory) Core duo
18. Components of a portable computer system Memory Capacity (you never can have too much memory with any OS) Speed # of memory slots
19. Components of a portable computer system Internal hard drives – currently a computer’s “bottle neck” and most likely part to fail the soonest Capacity (20 GB – 500 GB) Speed (5400 rpm – 7200 rpm)
20. Components of a portable computer system Video card Built-in Memory Speed Analog vs. digital secondary port
21. Components of a portable computer system Screen Resolution Brightness Size (12” – 17”) Modem Speed (28 kb/s – 128 kb/s) Fax feature
22. Components of a portable computer system Network card Built-in wired (100Mb – 1Gb) Wireless B, G, A and N PC card USB Built-in
23. Components of a portable computer system PC card slot vs. Express card slot Complete Care extra protection – well worth it; covers drops, spills, power surges, etc.
24. Components of a portable computer system PDA With phone Without phone iPhone Windows Mobile 6.x – 7.0 Blackberry Symbian Palm OS Droid (Android)
25. Components of a computer system Printer Laser Multi-function DeskJet
26. Components of a computer system Backup drive – if you don’t have one, you’ll wish you had at some point Internal – spare vs. redundant External Memory stick MS Synctoy data sync Bluetooth Printers, keyboard, mouse PDAs, cell phones, headphones
27. Components of a computer system Hardware Support Warranty service Local service Warranty (think of it as insurance) Length of contract (90 days – 5 years) Provider of service (Dell, IBM, HP, GE) Type (Onsite vs. take in vs. send in) Support escalation
28. Components of a computer system Software Operating System Microsoft Windows 95/98/ME Windows NT4 Windows 2000 Windows XP Windows Vista Windows 7 Apple – Mac OS X Linux (SuSE, Ubuntu, Red Hat)
29. Components of a computer system Software Applications Internet Browser IE (6 vs. 7/8) Security issues almost constantly Memory pig Very hard to uninstall Must be updated even though you don’t use it Firefox Tabs Plug-ins Themes Smaller memory footprint, stable,secure Safari (Mac OS X) Opera Google Chrome
30. Components of a computer system Software Applications MS Office 97 – XP – still exist around the world 2003 – dominant version in the U.S.A. Word Excel PowerPoint Publisher Access Outlook (see below) 2007 – new look; will render older files even previous versions somewhat changed and not necessarily for the better 2010 – more features (of course), 64-bit, Web 2.0
31. Components of a computer system Software Applications Outlook Same basic design as always Never been as stable as it should be Export *.pst file periodically MS Office database backup utility available for download Separate email, calendar, and contacts for backup purposes for restoration ease Auto PST backup upon exit option (free from MS)
32. Components of a computer system Software Applications Other email applications Eudora Mozilla Thunderbird Pegasus
33. Components of a computer system Software Applications MS Works (Office ‘lite’) – not recommended Plug-ins – Quicktime, Acrobat Reader, Flashplayer, Java OpenOffice (Windows, OS X, Linux) – has Word, PowerPoint, Publisher, and Access basic equivalents Google Apps, Google Sync Windows Live, Office Live, Office Sync
34. Security Anti-virus Threat analysis Zero-day Trojans Worms SARC (www.sarc.com) – info source Symantec McAfee Frequency of scans – at least monthly
36. Security Email that can steal - examples Threat analysis (see email PDFs) Spam/Junk email Scams Bots Root kits If it’s too good to be true, it probably is Alternate web-based email address for sign-ups Complex passwords and IDs Anti-spam software Symantec McAfee
37. Security ID Theft Phishing Online – never send personal or account info through regular email (e.g. SS#, financial accounts #s, etc.) Phone calls – be suspicious of anyone asking for account, username, user ID or password info Contact your bank or credit card company immediately if you have replied to fraudulent email or by phone with sensitive information Pharming – redirecting online users from a legitimate website to a false one and collecting user info for identity and financial theft Online Predators (buddy lists, social networks)
38. Security Firewall Symantec Internet Security McAfee firewall Windows XP SP3, Windows Vista SP2, Windows 7 Privacy service Purpose – to house IDs and passwords securely Symantec McAfee Internet Security Suites Symantec McAfee
39. Security Operating System updates – be aware Windows Critical vs. recommended vs. optional/hardware IE, OE and OS patches are all connected Mac OS X Linux (SuSE, Red Hat/Fedora, Ubuntu) CERT email list (www.cert.org) Frequency to check for updates - monthly
40. Security Internet browser usage Secure transaction safety Close browser with after secure transactions such as purchases or on-line banking Logout of sites you’ve signed into before closing the browser Make sure there is an SSL (https://) link with secure transactions Look for the ‘padlock’ on the bottom of the browser Always download the latest version of your internet browsers whenever possible
41. Security OS need-to-knows Default access is administrator or equivalent (Windows and OS X) which gives total access to hardware and software – consider creating user only account to cut down on scripts, installing fluff software and others unnecessary that can harm a computer over time ‘Power-user’ can still have most of the same problems that come with admin Outlook Express is most vulnerable program on the planet – don’t use if you have email alternative To help stop spread of viruses, you need at least Windows 2000 and be using Outlook 2000 as opposed to Outlook Express Creating a profile for each user on a workstation can really help for simplification reasons for computer health Sync-toy available from MS for individual profiles
42. Computer Utilities Backup Registry Windows System Restore utility (built-in) – should be performed manually occasionally even though recovery points are supposed to be created automatically Regedit.exe export and store (for experts only) Disk Image Norton Ghost – multiple recovery points can be made and also while using computer; incremental backups available Files or Folders Manual – only for those who know where everything is MS Sync Toy Symantec IS 4 or 360 has built-in backup software
43. Computer Utilities Maintenance Defragmentation & Optimization (Diskeeper vs. Symantec built-in) File cleanup (e.g. Webroot Window Washer) Deletes temp files and other junk May need a ‘bleach’ feature to shred files Power Protect system hardware with UPS Available for desktop systems, laptops and servers
44. Purchasing software Know what you’re buying and from who Be aware of rebates and discounted bundles Educational, government, non-profit discounts ‘OEM’ usually OK – beware of non-USA origin Very cheap overseas software – most likely bootlegged and purchase may benefit terrorist groups, black market, or international mafias
45. Software support Computer manufacturer Limited time from purchase Extended time via purchase Software vendor Warranty service – at least 1 year, 3-4 years much better especially with ‘complete care’
46. Computer Physical Maintenance Laptop Keyboard Screen – water & cotton Desktop Screen Keyboard Mouse Case Dust problems Vacuum occasionally Avoid leaving case on carpet for extended periods Fans – replace fans when they burn out to avoid anything overheating (power supply fans usually require replacing the whole unit)
47. Internet connection Internet provider router Cable (6 Mb/s – 24 Mb/s) DSL (256 kb/s – 4.5 Mb/s) Satellite (2.5 Mb/s – 5.5 Mb/s) PC Card or My-Fi (384 kb/s – 1.5 Mb/s) 3G WiMax (1.5 Mb/s – 3.0 Mb/s) (e.g. Clearwire) Wireless router Types B (2.4 GHz, 150’ range, 11 Mb/s) G (2.4 GHz, 100’range, 54 Mb/s) A (5.0 GHz, 75’range, 54 Mb/s) N (2.4 GHz, 160’range, 200+ Mb/s) Frequency – changing from default channel to one higher or lower may help with 2.4 GHz broadcast or reception
48. Basic security for wireless routers Change admin password Rename default SSID Enable highest encryption WEP (or shared) WPA-PSK or WPA-PSK2 (best) Some wireless devices configuration come with a simple but secure “one button” setup with ‘key’ on bottom of router Disable broadcast of SSID Update firmware at least yearly Don’t assume public “hot spots” are secure Save login ID and password, SSID name, and passkey Consider MAC control Consider disabling DHCP for small networks Turn off wireless router when you know you won’t use it for long periods such as vacation
49. Wireless internet etiquette Is it illegal to use another’s wireless broadcast? ‘War-driving’ War-chalking – represented by )( Peer-to-peer – unless you’re sure you need it disable it
50. Other Internet connections Dial-up (28 kb/s – 128 kb/s) PC/Express Card (450 kb/s – 1.5 Mb/s) PDA (500 kb/s – 1.5 Mb/s) on 3G
51. Closing Consulting and support available from Nashville Technology Gurus (NTG) Phone – (615) 852-6470 Email – nashtechgreen@gmail.com Website – www.nashtechgurus.com Future seminars Dates Subjects Email list Thank-you for coming!