SlideShare una empresa de Scribd logo
1 de 98
Programs You Need!
Don’t Worry!
• You don’t need all of them, although after you
  hear about them, you may want some (or all)
• We’ll divide them into 3 categories:
  – Security
  – Maintenance
  – Utility
Why?

• Your operating system (XP, Vista, Win 7 or 8)
  likely came with only a minimum of extra
  features
• Without these features, you’re missing out on
  being able to make full use and enjoyment of
  your computer
• In fact, you may be risking your online safety
Why?
• The programs we’ll talk about are all free
• They come with recommendations from the
  Ewing CLC staff and most are:

  – Recommended by other independent parties,
    such as PC Magazine
  – Will help you enjoy your computer more and
    make it run better
Security
• Anti Virus
Security
• Anti Virus
• Firewall
Security
• Anti Virus
• Firewall
• Anti Malware
Security
•   Anti Virus
•   Firewall
•   Anti Malware
•   Cloud Access
    – Make sure your security is AGAP (as good as
      possible)
Security
•   Anti Virus
•   Firewall
•   Anti Malware
•   Cloud Access
    – Make sure your security is AGAP (as good as
      possible)
• Strong passwords
Security
•   Anti Virus
•   Firewall
•   Anti Malware
•   Cloud Access
    – Make sure your security is AGAP (as good as
      possible)
• Strong passwords
• Check online bank accounts frequently
Maintenance
• Eliminate duplicate files
Maintenance
• Eliminate duplicate files
• Check status of program updates
Maintenance
• Eliminate duplicate files
• Check status of program updates
• Fix registry errors
Maintenance
•   Eliminate duplicate files
•   Check status of program updates
•   Fix registry errors
•   Clean out unused programs
Maintenance
•   Eliminate duplicate files
•   Check status of program updates
•   Fix registry errors
•   Clean out unused programs
•   Check hard drive integrity
Maintenance
•   Eliminate duplicate files
•   Check status of program updates
•   Fix registry errors
•   Clean out unused programs
•   Check hard drive integrity
•   Create backups and restore files
Maintenance
•   Eliminate duplicate files
•   Check status of program updates
•   Fix registry errors
•   Clean out unused programs
•   Check hard drive integrity
•   Create backups and restore files
•   Streamline startup operation
Maintenance
•   Eliminate duplicate files
•   Check status of program updates
•   Fix registry errors
•   Clean out unused programs
•   Check hard drive integrity
•   Create backups and restore files
•   Streamline startup operation
•   Wipe clean hard drives
Utility
• Organize your photos and videos
Utility
• Organize your photos and videos
• Send large volumes of photos via. Internet
Utility
• Organize your photos and videos
• Send large volumes of photos via. internet
• Create and send documents easily
Utility
•   Organize your photos and videos
•   Send large volumes of photos via. internet
•   Create and send documents easily
•   Transfer files between PC’s, iPads, iPods,
    Android devices with no docking ports
Utility
• Organize your photos and videos
• Send large volumes of photos via. internet
• Create and send documents easily
• Transfer files between PC’s, iPads, iPods,
  Android devices with no docking ports
• Store your files on “the cloud” to always have
  them accessible no matter what device you’re
  using or where you are
• Stop worrying about backups
What to Look For
• When downloading a program, check its
  credentials
  – Go to Cnetdownload.com and check how many
    have been downloaded
What to Look For
• When downloading a program, check its
  credentials
  – Go to Cnetdownload.com and check how many
    have been downloaded
  – Check comments from other users
What to Look For
• When downloading a program, check its
  credentials
  – Go to Cnetdownload.com and check how many
    have been downloaded
  – Check comments from other users
  – Read carefully each screen to see what you’re
    agreeing to
What to Look For
• When downloading a program, check its
  credentials
  – Go to Cnetdownload.com and check how many
    have been downloaded
  – Check comments from other users
  – Read carefully each screen to see what you’re
    agreeing to
  – Don’t click on the first “download” button you see
What to Look For
• When downloading a program, check its
  credentials
  – Go to Cnetdownload.com and check how many
    have been downloaded
  – Check comments from other users
  – Read carefully each screen to see what you’re
    agreeing to
  – Don’t click on the first “download” button you see
  – Choose “run”, not “save”
Which Button?
Which Button?
Which Option?
Minimum Defense for Average PC User
• Windows firewall
Minimum Defense for Average PC User
• Windows firewall
• Good anti virus software
Minimum Defense for Average PC User
• Windows firewall
• Good anti virus software
• Automatic Windows updates
Minimum Defense for Average PC User
•   Windows firewall
•   Good anti virus software
•   Automatic Windows updates
•   Latest internet browser (IE 10, Firefox
    17.0, Chrome 23.0)
Minimum Defense for Average PC User
• Windows firewall
• Good anti virus software
• Automatic Windows updates
• Latest internet browser (IE 10, Firefox 17.0,
  Chrome 23.0)
• Antispyware program
Minimum Defense for Average PC User
• Windows firewall
• Good anti virus software
• Automatic Windows updates
• Latest internet browser (IE 10, Firefox 17.0,
  Chrome 23.0)
• Antispyware program
• Regular backups
Microsoft Security Essentials


• Comprehensive malware protection
• XP, Vista & Win7 Protection (use Windows
  Defender for Win8)
• Simple
• Quiet, works in background
• Automatic updates
Malwarebytes

• Works well with others
Malwarebytes

• Works well with others
• FAST!
Malwarebytes

• Works well with others
• FAST!
• Chameleon-gets working when otherwise
  locked down
Malwarebytes

• Works well with others
• FAST!
• Chameleon-gets working when otherwise
  locked down
• Free version, but pro is available for a one-
  time fee, no annual renewal
Malwarebytes

• Works well with others
• FAST!
• Chameleon-gets working when otherwise
  locked down
• Free version, but pro is available for a one-
  time fee, no annual renewal
• Supports XP, Vista, Win7 & 8 (32 & 64 bit)
Superantispyware


• Scans for harmful programs
• Removes malware, viruses missed by other
  programs
• Covers areas missed by other antispyware
  programs
CCleaner


• Cleans unneeded files
CCleaner


• Cleans unneeded files
• Checks for registry errors and inconsistencies
CCleaner


• Cleans unneeded files
• Checks for registry errors and inconsistencies
• Wipes drives
CCleaner


•   Cleans unneeded files
•   Checks for registry errors and inconsistencies
•   Wipes drives
•   Checks for duplicates
CCleaner


•   Cleans unneeded files
•   Checks for registry errors and inconsistencies
•   Wipes drives
•   Checks for duplicates
•   Uninstalls programs
CCleaner


•   Cleans unneeded files
•   Checks for registry errors and inconsistencies
•   Wipes drives
•   Checks for duplicates
•   Uninstalls programs
•   Displays startup programs by application
CCleaner


•   Cleans unneeded files
•   Checks for registry errors and inconsistencies
•   Wipes drives
•   Checks for duplicates
•   Uninstalls programs
•   Displays startup programs by application
•   Shows system restore points
Secunia Personal Software Inspector



•   MS provides updates; most programs do not
•   Scans for out of date programs
•   Helps prevent security breaches
•   One stop for updating multiple programs
Belarc Advisor

• Displays security vulnerabilities
Belarc Advisor

• Displays security vulnerabilities
• Shows software infrequently used
Belarc Advisor

• Displays security vulnerabilities
• Shows software infrequently used
• Displays software license codes
Belarc Advisor

•   Displays security vulnerabilities
•   Shows software infrequently used
•   Displays software license codes
•   Lists status of security patches
Belarc Advisor

•   Displays security vulnerabilities
•   Shows software infrequently used
•   Displays software license codes
•   Lists status of security patches
•   Lists hardware specs
Belarc Advisor

•   Displays security vulnerabilities
•   Shows software infrequently used
•   Displays software license codes
•   Lists status of security patches
•   Lists hardware specs
•   Memory types used
Belarc Advisor

•   Displays security vulnerabilities
•   Shows software infrequently used
•   Displays software license codes
•   Lists status of security patches
•   Lists hardware specs
•   Memory types used
•   Entire computer profile summary
Belarc Advisor
Glary Utilities


• Cleans & scans software
Glary Utilities


• Cleans & scans software
• Recovers files
Glary Utilities


• Cleans & scans software
• Recovers files
• Finds duplicate files
Glary Utilities


•   Cleans & scans software
•   Recovers files
•   Finds duplicate files
•   Manages startup files
Glary Utilities


•   Cleans & scans software
•   Recovers files
•   Finds duplicate files
•   Manages startup files
•   Shreds files
Glary Utilities


•   Cleans & scans software
•   Recovers files
•   Finds duplicate files
•   Manages startup files
•   Shreds files
•   Over 37,000,000 downloads
Auslogics Duplicate File Finder


•   Quick
•   Easy
•   Enables clean-up of extra photos, documents
•   Frees up hard drive space
Picasa

• Automatically indexes all your pictures
Picasa

• Automatically indexes all your pictures
• Does not duplicate their file structure
Picasa

• Automatically indexes all your pictures
• Does not duplicate their file structure
• Facial recognition is extraordinary
Picasa

•   Automatically indexes all your pictures
•   Does not duplicate their file structure
•   Facial recognition is extraordinary
•   Basic editing features
Picasa

•   Automatically indexes all your pictures
•   Does not duplicate their file structure
•   Facial recognition is extraordinary
•   Basic editing features
•   Photo timelines
Picasa

•   Automatically indexes all your pictures
•   Does not duplicate their file structure
•   Facial recognition is extraordinary
•   Basic editing features
•   Photo timelines
•   “Face” movies
Picasa

•   Automatically indexes all your pictures
•   Does not duplicate their file structure
•   Facial recognition is extraordinary
•   Basic editing features
•   Photo timelines
•   “Face” movies
•   Store & send large albums over the web
Picasa

•   Automatically indexes all your pictures
•   Does not duplicate their file structure
•   Facial recognition is extraordinary
•   Basic editing features
•   Photo timelines
•   “Face” movies
•   Store & send large albums over the web
•   Imbed audio in slide shows and movies
Picasa Face Recognition- Ageless
Picasa Face Recognition in a Group




         Even tiny images are recognizable
Paint.net


•   Expanded features from MS Paint
•   Special effects are simple to use
•   Layers for professional results
•   Unlimited history in “going back”
Google Docs


• Lets you send all documents directly to
  recipient without email
• Provides reply by recipient even if not on
  gmail
• Allows collaborative updating of documents
The “Cloud”
Why Cloud?
• Automatically synchronize across devices
  – Desktop
  – Laptop
  – iPad
  – iPhone
• No need for backups
• High need for security
Dropbox*


• Automatic backup via the “cloud”
• Transfer documents
  (photos, spreadsheets, letters, etc.) between
  multiple devices
  (PC’s, iPads, iPods, iPhones, MAC computers)
• Have access to them anywhere you are
• *Other “cloud” software will also do this
Cloud Software
• Cloud Access
  – MS Skydrive (No brainer if you have MS products
  – iCloud (No brainer if you have Apple products)
  – Google Cloud 5 GB free until 6/30/13
  – Many others
  – Dropbox (The one to beat)
• Say goodbye to backups(?)
Karen’s Replicator

• Very fast backup
• Unobtrusive
• Skips files that don’t need backing up

  Read more: Karens Replicator - CNET
  Download.com
Win 7/8 File Backup


•   Easy to use
•   Improvement from XP
•   Relatively fast
•   Built in to the operating system
•   Access from start menu
If You Have an “i” Device



• iPad, iPod, iPhone etc., get AirPlay
• Mirror your display on flat screen TV’s
• Need Apple TV device (not really a TV, but a
  wireless receiver/transmitter between your
  device and the flat screen TV)
Air Parrot


•   The PC equivalent to Apple Airplay
•   Still need Apple TV hardware
•   Allows PC to TV wireless transmission
•   Costs $9.99
Summary
• Security        • Maintenance       • Utility
 MS Security      Glary Util.        Google DOCS
  Essentials       Belarc Advisor     Picasa
 Malwarebytes     Ccleaner           Dropbox
 Superantispy-    Secunia            AirPlay
  ware             Auslogics Dupl.    Paint.net
                    File Finder        Air Parrott

Más contenido relacionado

La actualidad más candente

CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionSam Bowne
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwarePriyanka Aash
 
DevSecCon London 2017: Hands-on secure software development from design to de...
DevSecCon London 2017: Hands-on secure software development from design to de...DevSecCon London 2017: Hands-on secure software development from design to de...
DevSecCon London 2017: Hands-on secure software development from design to de...DevSecCon
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment isc2-hellenic
 
Troubleshooting K1000
Troubleshooting K1000Troubleshooting K1000
Troubleshooting K1000Dell World
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Michael Gough
 
DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...
DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...
DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...DevSecCon
 
Info sec is not daunting v1.0
Info sec is not daunting v1.0 Info sec is not daunting v1.0
Info sec is not daunting v1.0 Michael Gough
 
BlueHat v18 || An ice-cold boot to break bit locker
BlueHat v18 || An ice-cold boot to break bit lockerBlueHat v18 || An ice-cold boot to break bit locker
BlueHat v18 || An ice-cold boot to break bit lockerBlueHat Security Conference
 
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv ShahWindows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv ShahOWASP Delhi
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainPriyanka Aash
 
Elite Bug Squashing
Elite Bug SquashingElite Bug Squashing
Elite Bug SquashingTony Brown
 
Security workflow with ansible
Security  workflow with ansibleSecurity  workflow with ansible
Security workflow with ansibledevanshdubey7
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsEnclaveSecurity
 
Inventory Tips & Tricks
Inventory Tips & TricksInventory Tips & Tricks
Inventory Tips & TricksDell World
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShellkieranjacobsen
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Ask a Malware Archaeologist
Ask a Malware ArchaeologistAsk a Malware Archaeologist
Ask a Malware ArchaeologistMichael Gough
 

La actualidad más candente (19)

CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data Collection
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
DevSecCon London 2017: Hands-on secure software development from design to de...
DevSecCon London 2017: Hands-on secure software development from design to de...DevSecCon London 2017: Hands-on secure software development from design to de...
DevSecCon London 2017: Hands-on secure software development from design to de...
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
Troubleshooting K1000
Troubleshooting K1000Troubleshooting K1000
Troubleshooting K1000
 
Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1Detecting WMI Exploitation v1.1
Detecting WMI Exploitation v1.1
 
DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...
DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...
DevSecCon London 2017: Permitting agility whilst enforcing security by Alina ...
 
Info sec is not daunting v1.0
Info sec is not daunting v1.0 Info sec is not daunting v1.0
Info sec is not daunting v1.0
 
BlueHat v18 || An ice-cold boot to break bit locker
BlueHat v18 || An ice-cold boot to break bit lockerBlueHat v18 || An ice-cold boot to break bit locker
BlueHat v18 || An ice-cold boot to break bit locker
 
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv ShahWindows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
 
Elite Bug Squashing
Elite Bug SquashingElite Bug Squashing
Elite Bug Squashing
 
Security workflow with ansible
Security  workflow with ansibleSecurity  workflow with ansible
Security workflow with ansible
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
Inventory Tips & Tricks
Inventory Tips & TricksInventory Tips & Tricks
Inventory Tips & Tricks
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Ask a Malware Archaeologist
Ask a Malware ArchaeologistAsk a Malware Archaeologist
Ask a Malware Archaeologist
 

Destacado

16th January 2017 - What is inner healing, and is it biblical?
16th January 2017 - What is inner healing, and is it biblical?16th January 2017 - What is inner healing, and is it biblical?
16th January 2017 - What is inner healing, and is it biblical?Thorn Group Pvt Ltd
 
Encuesta hacia maestros de la primaria Felipe Carrillo puerto
Encuesta hacia maestros de la primaria Felipe Carrillo puertoEncuesta hacia maestros de la primaria Felipe Carrillo puerto
Encuesta hacia maestros de la primaria Felipe Carrillo puertoNathaniel Martin Estrada
 
Angle adjustable chair for stadium seats
Angle adjustable chair for stadium seatsAngle adjustable chair for stadium seats
Angle adjustable chair for stadium seatslunchNtouch
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
Grafico diario del eurostoxx 50 para el 07 08 2012
Grafico diario del eurostoxx 50 para el 07 08 2012Grafico diario del eurostoxx 50 para el 07 08 2012
Grafico diario del eurostoxx 50 para el 07 08 2012Experiencia Trading
 
Resultados de elecciones presidenciales 2006
Resultados de elecciones presidenciales 2006Resultados de elecciones presidenciales 2006
Resultados de elecciones presidenciales 2006Rafael Verde)
 
How to Get the Most Out of Your Graphic and Website Designers Slides
How to Get the Most Out of Your Graphic and Website Designers SlidesHow to Get the Most Out of Your Graphic and Website Designers Slides
How to Get the Most Out of Your Graphic and Website Designers SlidesLERN_AC_2015
 
청주오피 부천오피 목동오피 부천오피걸 무료성인자료
청주오피 부천오피 목동오피 부천오피걸 무료성인자료청주오피 부천오피 목동오피 부천오피걸 무료성인자료
청주오피 부천오피 목동오피 부천오피걸 무료성인자료lycttidl6
 
Research Services for the Food Industry
Research Services for the Food IndustryResearch Services for the Food Industry
Research Services for the Food IndustryMrieuxNutriSciencesN
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creationJoel May
 
Bibliotheekinstructie
BibliotheekinstructieBibliotheekinstructie
Bibliotheekinstructieboer0107
 
Saving the Planet
Saving the PlanetSaving the Planet
Saving the PlanetElizabeth_R
 
Coniferous Powerpoint Show
Coniferous Powerpoint ShowConiferous Powerpoint Show
Coniferous Powerpoint ShowElizabeth_R
 
Herramientas de gestion del conocimiento
Herramientas de gestion del conocimientoHerramientas de gestion del conocimiento
Herramientas de gestion del conocimientoSusy Mora
 

Destacado (20)

16th January 2017 - What is inner healing, and is it biblical?
16th January 2017 - What is inner healing, and is it biblical?16th January 2017 - What is inner healing, and is it biblical?
16th January 2017 - What is inner healing, and is it biblical?
 
Encuesta hacia maestros de la primaria Felipe Carrillo puerto
Encuesta hacia maestros de la primaria Felipe Carrillo puertoEncuesta hacia maestros de la primaria Felipe Carrillo puerto
Encuesta hacia maestros de la primaria Felipe Carrillo puerto
 
Angle adjustable chair for stadium seats
Angle adjustable chair for stadium seatsAngle adjustable chair for stadium seats
Angle adjustable chair for stadium seats
 
Boletim Virtual Cáritas Regional Nordeste 3 - Março 2016
Boletim Virtual Cáritas Regional Nordeste 3 - Março 2016Boletim Virtual Cáritas Regional Nordeste 3 - Março 2016
Boletim Virtual Cáritas Regional Nordeste 3 - Março 2016
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
Grafico diario del eurostoxx 50 para el 07 08 2012
Grafico diario del eurostoxx 50 para el 07 08 2012Grafico diario del eurostoxx 50 para el 07 08 2012
Grafico diario del eurostoxx 50 para el 07 08 2012
 
Resultados de elecciones presidenciales 2006
Resultados de elecciones presidenciales 2006Resultados de elecciones presidenciales 2006
Resultados de elecciones presidenciales 2006
 
BAA
BAABAA
BAA
 
How to Get the Most Out of Your Graphic and Website Designers Slides
How to Get the Most Out of Your Graphic and Website Designers SlidesHow to Get the Most Out of Your Graphic and Website Designers Slides
How to Get the Most Out of Your Graphic and Website Designers Slides
 
Cambridge Diploma
Cambridge DiplomaCambridge Diploma
Cambridge Diploma
 
청주오피 부천오피 목동오피 부천오피걸 무료성인자료
청주오피 부천오피 목동오피 부천오피걸 무료성인자료청주오피 부천오피 목동오피 부천오피걸 무료성인자료
청주오피 부천오피 목동오피 부천오피걸 무료성인자료
 
Research Services for the Food Industry
Research Services for the Food IndustryResearch Services for the Food Industry
Research Services for the Food Industry
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Storage devices (Important Differences)
Storage devices (Important Differences)Storage devices (Important Differences)
Storage devices (Important Differences)
 
Bibliotheekinstructie
BibliotheekinstructieBibliotheekinstructie
Bibliotheekinstructie
 
Saving the Planet
Saving the PlanetSaving the Planet
Saving the Planet
 
Coniferous Powerpoint Show
Coniferous Powerpoint ShowConiferous Powerpoint Show
Coniferous Powerpoint Show
 
Optical Storage
Optical StorageOptical Storage
Optical Storage
 
CV Amy Jaramazovic
CV Amy JaramazovicCV Amy Jaramazovic
CV Amy Jaramazovic
 
Herramientas de gestion del conocimiento
Herramientas de gestion del conocimientoHerramientas de gestion del conocimiento
Herramientas de gestion del conocimiento
 

Similar a Programs you need!

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
System software
System softwareSystem software
System softwareBushra M
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingRaj Alam
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus PrecautionsBilal Arif
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 ComputingMrJRogers
 
CONFidence 2017: Hiding in plain sight (Adam Burt)
CONFidence 2017: Hiding in plain sight (Adam Burt)CONFidence 2017: Hiding in plain sight (Adam Burt)
CONFidence 2017: Hiding in plain sight (Adam Burt)PROIDEA
 
Rick's assignment software utilities
Rick's assignment software utilitiesRick's assignment software utilities
Rick's assignment software utilitiesJames London
 
Sans london april sans at night - tearing apart a fileless malware sample
Sans london april   sans at night - tearing apart a fileless malware sampleSans london april   sans at night - tearing apart a fileless malware sample
Sans london april sans at night - tearing apart a fileless malware sampleMichel Coene
 
Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Ralf Schwoebel
 
Software Distribution
Software DistributionSoftware Distribution
Software DistributionDell World
 
Releasing To Production Every Week India
Releasing To Production Every Week   IndiaReleasing To Production Every Week   India
Releasing To Production Every Week Indiaexortech
 
Data Recovery Software
Data Recovery SoftwareData Recovery Software
Data Recovery SoftwareRemo Software
 

Similar a Programs you need! (20)

Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
System software
System softwareSystem software
System software
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and Troubleshooting
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 
Software
SoftwareSoftware
Software
 
5 pc maintenance
5 pc maintenance5 pc maintenance
5 pc maintenance
 
Anti virus
Anti virusAnti virus
Anti virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 Computing
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
 
CONFidence 2017: Hiding in plain sight (Adam Burt)
CONFidence 2017: Hiding in plain sight (Adam Burt)CONFidence 2017: Hiding in plain sight (Adam Burt)
CONFidence 2017: Hiding in plain sight (Adam Burt)
 
Rick's assignment software utilities
Rick's assignment software utilitiesRick's assignment software utilities
Rick's assignment software utilities
 
Sans london april sans at night - tearing apart a fileless malware sample
Sans london april   sans at night - tearing apart a fileless malware sampleSans london april   sans at night - tearing apart a fileless malware sample
Sans london april sans at night - tearing apart a fileless malware sample
 
Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
 
Releasing To Production Every Week India
Releasing To Production Every Week   IndiaReleasing To Production Every Week   India
Releasing To Production Every Week India
 
Data Recovery Software
Data Recovery SoftwareData Recovery Software
Data Recovery Software
 

Más de clcewing

Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwordsclcewing
 
How to buy a pc
How to buy a pcHow to buy a pc
How to buy a pcclcewing
 
Windows 10
Windows 10Windows 10
Windows 10clcewing
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10clcewing
 
Connecting your tv to the internet chromecast
Connecting your tv to the internet chromecastConnecting your tv to the internet chromecast
Connecting your tv to the internet chromecastclcewing
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secureclcewing
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Androidclcewing
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computingclcewing
 
Websites you don’t know about
Websites you don’t know aboutWebsites you don’t know about
Websites you don’t know aboutclcewing
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Backing up your computer
Backing up your computerBacking up your computer
Backing up your computerclcewing
 
30tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp0230tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp02clcewing
 
Virtual machines
Virtual machinesVirtual machines
Virtual machinesclcewing
 
Android Tablets
Android TabletsAndroid Tablets
Android Tabletsclcewing
 
Anniversary intro
Anniversary introAnniversary intro
Anniversary introclcewing
 

Más de clcewing (15)

Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
How to buy a pc
How to buy a pcHow to buy a pc
How to buy a pc
 
Windows 10
Windows 10Windows 10
Windows 10
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10
 
Connecting your tv to the internet chromecast
Connecting your tv to the internet chromecastConnecting your tv to the internet chromecast
Connecting your tv to the internet chromecast
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secure
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Android
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computing
 
Websites you don’t know about
Websites you don’t know aboutWebsites you don’t know about
Websites you don’t know about
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Backing up your computer
Backing up your computerBacking up your computer
Backing up your computer
 
30tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp0230tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp02
 
Virtual machines
Virtual machinesVirtual machines
Virtual machines
 
Android Tablets
Android TabletsAndroid Tablets
Android Tablets
 
Anniversary intro
Anniversary introAnniversary intro
Anniversary intro
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Programs you need!

  • 2. Don’t Worry! • You don’t need all of them, although after you hear about them, you may want some (or all) • We’ll divide them into 3 categories: – Security – Maintenance – Utility
  • 3. Why? • Your operating system (XP, Vista, Win 7 or 8) likely came with only a minimum of extra features • Without these features, you’re missing out on being able to make full use and enjoyment of your computer • In fact, you may be risking your online safety
  • 4. Why? • The programs we’ll talk about are all free • They come with recommendations from the Ewing CLC staff and most are: – Recommended by other independent parties, such as PC Magazine – Will help you enjoy your computer more and make it run better
  • 7. Security • Anti Virus • Firewall • Anti Malware
  • 8. Security • Anti Virus • Firewall • Anti Malware • Cloud Access – Make sure your security is AGAP (as good as possible)
  • 9. Security • Anti Virus • Firewall • Anti Malware • Cloud Access – Make sure your security is AGAP (as good as possible) • Strong passwords
  • 10. Security • Anti Virus • Firewall • Anti Malware • Cloud Access – Make sure your security is AGAP (as good as possible) • Strong passwords • Check online bank accounts frequently
  • 12. Maintenance • Eliminate duplicate files • Check status of program updates
  • 13. Maintenance • Eliminate duplicate files • Check status of program updates • Fix registry errors
  • 14. Maintenance • Eliminate duplicate files • Check status of program updates • Fix registry errors • Clean out unused programs
  • 15. Maintenance • Eliminate duplicate files • Check status of program updates • Fix registry errors • Clean out unused programs • Check hard drive integrity
  • 16. Maintenance • Eliminate duplicate files • Check status of program updates • Fix registry errors • Clean out unused programs • Check hard drive integrity • Create backups and restore files
  • 17. Maintenance • Eliminate duplicate files • Check status of program updates • Fix registry errors • Clean out unused programs • Check hard drive integrity • Create backups and restore files • Streamline startup operation
  • 18. Maintenance • Eliminate duplicate files • Check status of program updates • Fix registry errors • Clean out unused programs • Check hard drive integrity • Create backups and restore files • Streamline startup operation • Wipe clean hard drives
  • 19. Utility • Organize your photos and videos
  • 20. Utility • Organize your photos and videos • Send large volumes of photos via. Internet
  • 21. Utility • Organize your photos and videos • Send large volumes of photos via. internet • Create and send documents easily
  • 22. Utility • Organize your photos and videos • Send large volumes of photos via. internet • Create and send documents easily • Transfer files between PC’s, iPads, iPods, Android devices with no docking ports
  • 23. Utility • Organize your photos and videos • Send large volumes of photos via. internet • Create and send documents easily • Transfer files between PC’s, iPads, iPods, Android devices with no docking ports • Store your files on “the cloud” to always have them accessible no matter what device you’re using or where you are • Stop worrying about backups
  • 24. What to Look For • When downloading a program, check its credentials – Go to Cnetdownload.com and check how many have been downloaded
  • 25. What to Look For • When downloading a program, check its credentials – Go to Cnetdownload.com and check how many have been downloaded – Check comments from other users
  • 26. What to Look For • When downloading a program, check its credentials – Go to Cnetdownload.com and check how many have been downloaded – Check comments from other users – Read carefully each screen to see what you’re agreeing to
  • 27. What to Look For • When downloading a program, check its credentials – Go to Cnetdownload.com and check how many have been downloaded – Check comments from other users – Read carefully each screen to see what you’re agreeing to – Don’t click on the first “download” button you see
  • 28. What to Look For • When downloading a program, check its credentials – Go to Cnetdownload.com and check how many have been downloaded – Check comments from other users – Read carefully each screen to see what you’re agreeing to – Don’t click on the first “download” button you see – Choose “run”, not “save”
  • 32. Minimum Defense for Average PC User • Windows firewall
  • 33. Minimum Defense for Average PC User • Windows firewall • Good anti virus software
  • 34. Minimum Defense for Average PC User • Windows firewall • Good anti virus software • Automatic Windows updates
  • 35. Minimum Defense for Average PC User • Windows firewall • Good anti virus software • Automatic Windows updates • Latest internet browser (IE 10, Firefox 17.0, Chrome 23.0)
  • 36. Minimum Defense for Average PC User • Windows firewall • Good anti virus software • Automatic Windows updates • Latest internet browser (IE 10, Firefox 17.0, Chrome 23.0) • Antispyware program
  • 37. Minimum Defense for Average PC User • Windows firewall • Good anti virus software • Automatic Windows updates • Latest internet browser (IE 10, Firefox 17.0, Chrome 23.0) • Antispyware program • Regular backups
  • 38. Microsoft Security Essentials • Comprehensive malware protection • XP, Vista & Win7 Protection (use Windows Defender for Win8) • Simple • Quiet, works in background • Automatic updates
  • 39.
  • 41. Malwarebytes • Works well with others • FAST!
  • 42. Malwarebytes • Works well with others • FAST! • Chameleon-gets working when otherwise locked down
  • 43. Malwarebytes • Works well with others • FAST! • Chameleon-gets working when otherwise locked down • Free version, but pro is available for a one- time fee, no annual renewal
  • 44. Malwarebytes • Works well with others • FAST! • Chameleon-gets working when otherwise locked down • Free version, but pro is available for a one- time fee, no annual renewal • Supports XP, Vista, Win7 & 8 (32 & 64 bit)
  • 45. Superantispyware • Scans for harmful programs • Removes malware, viruses missed by other programs • Covers areas missed by other antispyware programs
  • 46.
  • 47.
  • 48.
  • 50. CCleaner • Cleans unneeded files • Checks for registry errors and inconsistencies
  • 51. CCleaner • Cleans unneeded files • Checks for registry errors and inconsistencies • Wipes drives
  • 52. CCleaner • Cleans unneeded files • Checks for registry errors and inconsistencies • Wipes drives • Checks for duplicates
  • 53. CCleaner • Cleans unneeded files • Checks for registry errors and inconsistencies • Wipes drives • Checks for duplicates • Uninstalls programs
  • 54. CCleaner • Cleans unneeded files • Checks for registry errors and inconsistencies • Wipes drives • Checks for duplicates • Uninstalls programs • Displays startup programs by application
  • 55. CCleaner • Cleans unneeded files • Checks for registry errors and inconsistencies • Wipes drives • Checks for duplicates • Uninstalls programs • Displays startup programs by application • Shows system restore points
  • 56.
  • 57.
  • 58. Secunia Personal Software Inspector • MS provides updates; most programs do not • Scans for out of date programs • Helps prevent security breaches • One stop for updating multiple programs
  • 59.
  • 60. Belarc Advisor • Displays security vulnerabilities
  • 61. Belarc Advisor • Displays security vulnerabilities • Shows software infrequently used
  • 62. Belarc Advisor • Displays security vulnerabilities • Shows software infrequently used • Displays software license codes
  • 63. Belarc Advisor • Displays security vulnerabilities • Shows software infrequently used • Displays software license codes • Lists status of security patches
  • 64. Belarc Advisor • Displays security vulnerabilities • Shows software infrequently used • Displays software license codes • Lists status of security patches • Lists hardware specs
  • 65. Belarc Advisor • Displays security vulnerabilities • Shows software infrequently used • Displays software license codes • Lists status of security patches • Lists hardware specs • Memory types used
  • 66. Belarc Advisor • Displays security vulnerabilities • Shows software infrequently used • Displays software license codes • Lists status of security patches • Lists hardware specs • Memory types used • Entire computer profile summary
  • 68.
  • 69. Glary Utilities • Cleans & scans software
  • 70. Glary Utilities • Cleans & scans software • Recovers files
  • 71. Glary Utilities • Cleans & scans software • Recovers files • Finds duplicate files
  • 72. Glary Utilities • Cleans & scans software • Recovers files • Finds duplicate files • Manages startup files
  • 73. Glary Utilities • Cleans & scans software • Recovers files • Finds duplicate files • Manages startup files • Shreds files
  • 74. Glary Utilities • Cleans & scans software • Recovers files • Finds duplicate files • Manages startup files • Shreds files • Over 37,000,000 downloads
  • 75.
  • 76. Auslogics Duplicate File Finder • Quick • Easy • Enables clean-up of extra photos, documents • Frees up hard drive space
  • 77.
  • 78. Picasa • Automatically indexes all your pictures
  • 79. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure
  • 80. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure • Facial recognition is extraordinary
  • 81. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure • Facial recognition is extraordinary • Basic editing features
  • 82. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure • Facial recognition is extraordinary • Basic editing features • Photo timelines
  • 83. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure • Facial recognition is extraordinary • Basic editing features • Photo timelines • “Face” movies
  • 84. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure • Facial recognition is extraordinary • Basic editing features • Photo timelines • “Face” movies • Store & send large albums over the web
  • 85. Picasa • Automatically indexes all your pictures • Does not duplicate their file structure • Facial recognition is extraordinary • Basic editing features • Photo timelines • “Face” movies • Store & send large albums over the web • Imbed audio in slide shows and movies
  • 87. Picasa Face Recognition in a Group Even tiny images are recognizable
  • 88. Paint.net • Expanded features from MS Paint • Special effects are simple to use • Layers for professional results • Unlimited history in “going back”
  • 89. Google Docs • Lets you send all documents directly to recipient without email • Provides reply by recipient even if not on gmail • Allows collaborative updating of documents
  • 91. Why Cloud? • Automatically synchronize across devices – Desktop – Laptop – iPad – iPhone • No need for backups • High need for security
  • 92. Dropbox* • Automatic backup via the “cloud” • Transfer documents (photos, spreadsheets, letters, etc.) between multiple devices (PC’s, iPads, iPods, iPhones, MAC computers) • Have access to them anywhere you are • *Other “cloud” software will also do this
  • 93. Cloud Software • Cloud Access – MS Skydrive (No brainer if you have MS products – iCloud (No brainer if you have Apple products) – Google Cloud 5 GB free until 6/30/13 – Many others – Dropbox (The one to beat) • Say goodbye to backups(?)
  • 94. Karen’s Replicator • Very fast backup • Unobtrusive • Skips files that don’t need backing up Read more: Karens Replicator - CNET Download.com
  • 95. Win 7/8 File Backup • Easy to use • Improvement from XP • Relatively fast • Built in to the operating system • Access from start menu
  • 96. If You Have an “i” Device • iPad, iPod, iPhone etc., get AirPlay • Mirror your display on flat screen TV’s • Need Apple TV device (not really a TV, but a wireless receiver/transmitter between your device and the flat screen TV)
  • 97. Air Parrot • The PC equivalent to Apple Airplay • Still need Apple TV hardware • Allows PC to TV wireless transmission • Costs $9.99
  • 98. Summary • Security • Maintenance • Utility  MS Security  Glary Util.  Google DOCS Essentials  Belarc Advisor  Picasa  Malwarebytes  Ccleaner  Dropbox  Superantispy-  Secunia  AirPlay ware  Auslogics Dupl.  Paint.net File Finder  Air Parrott