Raining Blessings From Holiness David's Heart


Holiness David Running Eagle Shooting Star

Search This Blog

Everyone is Welcome into the Heart of Holiness David, for he wants to help you with your questions! Nothing is too simple or complicated! Semiconductor World Trainer! He loves computers and he loves you too! Email holinessdavid@alightfromwithin.org

Saturday, December 18, 2010

Computer operating systems, Windows or Linux & Windows Vista warning

Hello to all relatives (and the means YOU),

I want to get my thoughts out there about operating systems. If a new computer is on your list for holiday giving or receiving, you'll want to be forewarned about what is on the shelf at your local computer store.
The operating system is what makes your computer work from the moment you turn it on until you turn it off.

When you turn on a computer, the very first screen displayed will be the manufacturer: Dell, or HP or Lenovo.
The second thing you will see displayed will be the operating system. It will display, “Windows 7” or “Windows XP” or “Windows Vista.” These are the most popular. A few manufacturers are using Linux, so you might see “Ubuntu” or “Debian” or “Red Hat.” Only three are listed, but there are many more Linux operating systems.

There are also Apple computers to choose from. Apple is a very closed minded company that allows only a limited, select list of software to run on their computers. Their computers are expensive.
The use of Apple computers is for a select bunch of people and I will not get into their product line or software at all.

I want to warn everyone about a bad product that Microsoft sold for a couple of years.
It is called “Windows Vista.”
If you have this software operating your computer, get rid of it and replace it with Windows 7.
If you have already bought a computer as a holiday gift that has Windows Vista installed on it, take it back, NOW and insist on getting Windows 7 for your new computer.
Sometimes a store will drop the price on a computer with Windows Vista just to get it off of the shelf. Unless you are really good on a computer, insist on Windows 7.

Upgrading your computer: If you need help upgrading from Windows Vista to Windows 7, I will be happy to help. I can even help you find the best price (about $100 these days).

New computer: For those of you who are buying a new computer, make sure that it does not have Windows Vista. Please, please do not buy a computer that has Windows Vista.

If you step up to a computer at the store, make sure it does not have Windows Vista.  You can ask a salesperson, or do the following:
Touch the Windows logo key (look to the left) and touch the Pause/Break key.


The System Properties box will pop up and will look something like this: (be sure you are on the General tab. This one shows that the System: is Microsoft Windows XP.

Everyone is entitled to their own opinion and this is my opinion: Microsoft Vista operating system is a bad product.
Thank you for reading. If you need help or want to state your point of view, please don't be shy about asking; it could save you a lot of money and frustration.

I would like to take a few minutes to tell you a bout an operating system that is FREE!!
That is Linux. It comes in many different flavors or Distributions (sometimes called Distros).
These days a lot of companies are designing their own distribution with cute names like Ubuntu or Knoppix.
Linux software engineers and pro-Linux organizations want Windows users to be able to move over to Linux without any problems. Also, there is more and more software available that supports Windows, Linux and other types of operating systems.  The big thing about Linux, and software that is used with it, is that is is free.

The computers that are currently being manufactured are made to standards that make it easier for any operating system to work on any computer.
When you buy a computer, you expect it to work. The Microsoft company has their stickers on computers indicating that that computer was designed to specifically run on the Microsoft operating system. So what is happening now is that the creators of the different Linux distributions are trying very hard to make it so that a person can install their, Linux, operating system without any problems.
It is working, their efforts to get a Linux operating system installed and working without a hitch are getting closer and closer to that point, making the change-over from Windows to Linux transparent.

Opinion: At this point in time, if I were to buy a brand new computer, I would spend the extra money to buy one with the Microsoft Windows operating system, specifically Windows 7. If you can afford Windows Office, I would recommend that as well.
Linux designers are making great strides toward that transparency that I mentioned in the previous paragraph but they aren't there yet.

Blessing, love and joy to you all this holiday season,
Holiness David



Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.

Tuesday, December 7, 2010

Getting rid of Microsoft Works. Get a better office suite for FREE!

Dear relatives,
We have some folks, world-wide, who are using Microsoft Works. This is a program that comes with computers as they are bought. It is part of the “package” software. I am asking you to please, please do not use this software when sharing documents, presentations, spreadsheet, etc. to the groups (or anyone else you converse with).

The Problem
The problem with Microsoft Works is that when files are saved, the file format is only useable to those folks who happen to have Microsoft Works.

FREE alternative choice! OpenOffice and LibreOffice

These two office suites have a document program as well as spreadsheet, presentation, drawing, database programs and others.
They will allow you to save documents (or whatever you are working on) in a format that is compatible with the rest of the world: the formats are world standard file formats.

Here are two wonderful office suites for FREE.
  1. OpenOffice.org: Next to Microsoft Office (Microsoft Office cost a bunch of money), it is THE most popular office suite in the world. Originally, it was a creation of Sun Microcomputers here in Silicone Valley (with engineers throughout the world). Now, OpenOffice.org is owned by Oracle who bought out Sun.
    1. Please go to this website and download OpenOffice: http://www.openoffice.org/
      Click on the button, “I want to download OpenOffice.org” and it will start the download to a file location of your choosing. After the download is finished, go to where the file was saved and double-click on the file name. Follow the instructions or email me and I'll walk you through it.
  2. LibreOffice is next. Some of the OpenOffice.org people have decided that their interest would be better served if they left Oracle and created another office suite of their own. It is called LibreOffice Version 3.3.0 and is sponsored by The Document Foundation. This product was created by The Document Foundation, based on OpenOffice.org, which is Copyright 2000, 2010 Oracle and/or its affiliates. The Document Foundation acknowledges all community members, please find more info at the link below: it supports all of the community member of the OpenOffice.org.
    1. Please go to http://www.documentfoundation.org/ and click on the button that says “Download LibreOffice.”
  3. Using either of these, OpenOffice or LibreOffice, is very simple/intuitive. If you need help, there is plenty of it on the websites. I will help you if the online or down-loadable documentation does not answer your questions.
  4. They are available in many languages. They are both world wide projects.

May God bless your homes and all things in them,
Holiness David

Sunday, February 21, 2010

GMAIL ACCOUNT FRAUD

GMAIL ACCOUNT FRAUD, Relatives BE AWARE, do not give your account information to these people, who have nothing to do but HATE.  Send LOVE to HATE.  VERIFY, that they are in need, because they make others bleed, they need to forgive all in their sleeves (hands given in sin).

NEVER, EVER give ur passwords away!! this is DEFINITELY a scam! they're just trying to steal information from u. never, EVER give passwords, account numbers or anything away. i remember a credit card scam like this going on. it was an elaborate scam. the email looked like a company email. it directed to to a website that even had the company name in it, but it was a scam! they said people had to either verify their personal identity and enter their account number and details into the website, or their credit account would be closed! they got a lot of credit card numbers and charged their accounts for everything they had!
NO BUSINESS EVER EMAILS U EITHER ASKING FOR UR PERSONAL ACCOUNT INFO, OR GIVING U A LINK DIRECTING U TO A WEBSITE TO ENTER ACCOUNT INFO!!! IF U EVER GET AN EMAIL LIKE THIS FROM UR BANK OR CREDIT CARD, OR EVEN UR EMAIL ACCOUNT, CALL THE COMPANY DIRECTLY AND ASK THEM IF THEY ARE DEMANDING ACCOUNT INFO TO BE ENTERED. EVEN IF THEY DO SAY THERE IS SUCH A THING, THE EMAIL U GOT COULD STILL BE A SCAM DIRECTING U TO A FALSE WEBSITE. NEVER, EVER EVEN GO TO THESE LINKS!! always just call the company and ask to speak to someone in charge. they will always tell u too, never give ur personal info away! they dont use email to do things like this!  22 days ago by   heatherbirdlady
http://www.complaintsboard.com/complaints/gmail-scam-c305178.html


Fraud begins: On Sun, Feb 21, 2010 at 9:58 AM, Gmail account-support@gmailservicess.com; wrote:


Dear Valued Member,



We are shutting down some email accounts and your account was automatically chosen to be deleted. If you are still interested in using our email service please fill in the space below for verification purpose by clicking the reply button. Learn more


Account:
Password:
Birth date:
Country:


Warning!!! Account owner that refuses to update his or her account within Seven days of receiving this warning will lose his or her account permanently.
Thank you for using Gmail !
The Gmail Team
GMAIL Fraud ends!

from    Twin Deer Mother
reply-to    TwinDeerMother@whitebuffalocalfwoman.org
to    Gmail ,
account-support@gmailservicess.com,
accounts@google.com
date    Sun, Feb 21, 2010 at 9:09 PM
subject    Re: Account Verification
mailed-by    gmail.com




Spammers beware, what you dish out, comes back to you!

White Buffalo Calf Woman Sings! Blessings to your heart, won't you come on in?  There is a place in paradise, when you listen to the within.  Don't find forgiveness in your heart, then find the time to pray, then you will know that God is here to alleviate your pain!

Mail Delivery Subsystem



Delivery to the following recipient failed permanently:

    accounts@google.com

Technical details of permanent failure:
Google tried to deliver your message, but it was rejected by the recipient domain. We recommend contacting the other email provider for further information about the cause of this error. The error that the other server returned was: 550 550 5.2.1 <accounts@google.com>... Mailbox disabled for this recipient (state 14).

Scam Gmail Verification Email is Identity Theft Effort in Disguise

Summary: A Gmail confirmation scam email is going around, asking you to verify your Gmail account. "Dear Account User," the request starts out - and goes on to say that you need to confirm your Gmail account, or it will be closed down. Of course, the language is wrong, and it wasn't even necessarily sent to your Gmail account, but still, people will be taken in by this scam, which asks for your account username and password, your date of birth, and your country of residence. Here's the scam reproduced in full - if you get this, don't reply!
Most Recent Searches that Led to This Page: gmail account verification, gmail scam, gmail verification email, gmail scams, Account Verification gmail, gmail verification, gmail verification scam, gmail account verification email, (kayt23401@gmail com), kayt23401@gmail com


GMail, AOL, Yahoo Mail also targeted in phishing scamGmail, AOL, Yahoo Mail also targeted in phishing scam

Google confirms problem is "industry-wide"

Google has confirmed that a large number of passwords to its email accounts have been stolen in an "industry-wide phishing scheme" which affects Hotmail, Gmail, Yahoo Mail, AOL and a number of other service providers.

Following the news that 10,000 Hotmail passwords had been posted on the Web, a second list surfaced - this time containing 20,000 account details from a string of different account providers. Some of the accounts are old, unused and fake, but many are genuine according to the BBC.

Google said: "We recently became aware of an industry-wide phishing scheme through which hackers gained user credentials for web-based mail accounts including Gmail accounts. "As soon as we learned of the attack, we forced password resets on the affected accounts. We will continue to force password resets on additional accounts when we become aware of them".

The company added that the password issue wasn't a breach of its security, it was instead a scam where users have been tricked into giving up their passwords on what they thought were legitimate sites. These types of attacks are known as "phishing".

Security experts have recommended that if users suspect they might be affected then they should immediately change their passwords, as well as on any other sites that share the same password.

Scams and fraud involving Gmail addresses

Print
If your credit card was used without your authorization, we recommend contacting your local authorities, your credit card company, and any website where the credit card was used.
If you have observed or been the victim of illicit activity on a non-Google website (i.e. Craigslist, Ebay, Paypal, and other sites), you'll need to contact your local authorities and the specific website that was involved.
In either case, you may also wish to file a report with the Internet Crime Complaint Center (www.ic3.gov), a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center. Unfortunately, Gmail is unable to participate in mediations involving third parties, or track suspicious credit card activity.
If you wish to inquire about a Gmail user's involvement in a scam or identity theft case, please note that in accordance with state and federal law, it is Google's policy only to provide this information pursuant to a valid third party subpoena or other appropriate legal process.
http://mail.google.com/support/bin/answer.py?hl=en&answer=62401

Remember that you can perform a reverse DNS lookup of the email's origin (http://www.ip2location.com/emailtracer.aspx)

Report fraud to EBAYto spoof@e-Bay.com

Warriors of the Earth  
 

Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.

Friday, February 12, 2010

Spybot Search and Destroy and Tea Timer Installation


Overview
This is a short tutorial to show you the first steps you have to do to remove spyware and other kinds of malware from your computer, using Spybot-Search and Destroy.

1. Download
Obviously, the first thing you need to do is download Spybot-Search and Destroy from our download page.
The download page first gives you a bit of donation information; if you like the program, I encourage you to come back later and donate something. But right now, you want to download. The downloads are on the same page, just scroll down a few lines and click Spybot-Search and Destroy 1.6.2. On the next page you will see a table with four download locations. Clicking on one of them will lead you to a page offering the download. Each of these pages is a bit different, but you should be able to find the download link there without problems.
2. Installation
The file you have downloaded will be named spybotsd162.exe or similar. To install Spybot-Search and Destroy, all you have to do is run the file, and the installation program will start (if you have downloaded with Internet Explorer, the download dialog will give you the option to open the file directly). The installer will show you the license and ask you for the installation location. You can go with the default settings here and just click your way through the installer by using the Next button.

After the installation has finished, you will see a Spybot-Search and Destroy button on your desktop and in your start menu. Click on it to start Spybot-Search and Destroy the first time.

3. First run
The first time you start Spybot-Search and Destroy, it will display a Wizard, a small window helping you through the first steps. It gives you the possibility to add or remove the icons you have or haven't created during install, for example. Let's just say you want them and proceed to the next page.
If you are using a proxy in Internet Explorer, Spybot-Search and Destroy will show you this proxy and a button will give you the opportunity to use it for Spybot-Search and Destroy, too. If the text field is blank, you don't need to do it, but in most cases this will show an internet address, and you should import this proxy setting.

The next page deals with updates. It is very important to keep up-to-date. Using the two buttons this page offers will do the updates for you, if you want to do it at a later point, read this.
The last page of the wizard will ask you to read the help file. The help file is always a good resource if you are unsure what to do, so please do at least read the first pages of it.

4. Doing a scan
After the tutorial has finished, you may find yourself on the Settings or Update page. As the default settings are ok right now, and you've already updated, let's ignore them for now and do the first scan.
The left side of the program has a navigation bar that can lead you to all functions of the program. The first section there (the top-most button) is labeled Spybot-Search and Destroy and leads you to the main page. Right now, you will see only an empty list and a toolbar at the bottom. The first button in this toolbar is named Check for problems - that is the button you've got to press to start the scanning. Lean back and watch the scan progress.

5. Interpreting the results
At this point, you could just jump to point 7, and remove the results. Instead we recommend that you first have a look at what all the stuff is that Spybot-Search and Destroy detected. The first thing you should know is to distinguish between the red entries, which represent spyware and similar threats, and the green entries, which are usage tracks.

For the usage tracks (I hope you have followed that link to read what they are), removal is non-critical, but depends on your personal preferences.

Ignoring the usage tracks for now, you should have a look at the red entries which represent the real threats. While you of course can trust us that we have chosen the targets using strict criteria, you can check for yourself if you click on each product and read the product information that will be shown in a pop-up window.

6. Decision on exceptions
All problems displayed in red are regarded as real threats and should be dealt with. But while you read the product description, you may still decide to keep a threat, or just a usage track. Maybe you don't want your list of most recently used Word documents removed? At this point you have three options.
  • You could decide on ignoring all usage tracks. In that case you could open the File sets page on the Settings section of the program, and disable the Usage tracks entries.
  • Or if you want to just keep all tracks from a specific product, just right-click a product in the results list.
  • Finally, if you want to keep just one file, that is possible the same way.
7. Removing the threats found
So now you should know about everything you've found. It's time to use the Fix selected problems button.
Once you start thinking about removing the usage tracks, too, you may think that ticking all the green entries is hard work. This is for a simple reason - to force you, the newbie - to look at the results. Once you know what you are dealing with, there is a hidden Select all button available for you.

8. Resident
If you use Spybot-Search and Destroy's realtime protection against spyware, nasty spies will not enter your system. Currently there are three different kinds of protection.
The Immunize function prevents e.g. Tracking Cookies from entering your system. Immunize works with Mozilla Firefox, Internet Explorer and Opera, allowing you to adjust specific settings of the browser to block known spyware installers, (and similar baddies) already included in Spybot-S&D's database. You start the Immunize function by clicking on Spybot-Search and DestroyImmunize on the left navigation bar.

Resident SDHelper is a second layer of protection for IE. Immunize function blocks installers by their ActiveX ID, while SDHelper blocks badware that tries to enter using a different method. Thus Internet Explorer cannot download bad files. You start SDHelper by clicking on ToolsResident on the left navigation bar (therefore Spybot-Search and Destroy has to run in Advanced Mode). There you can tick the checkboxes next to Resident "SDHelper" (Internet Explorer bad download blocker) active in order to activate SDHelper.

Resident TeaTimer prevents unwanted files from being installed – no matter how – on your system. It monitors the processes called/initiated perpetually. If known malicious processes want to start, TeaTimer immediately terminates them, giving you three options how to deal with this process in the future:
  • be informed when the process tries to start again
  • automatically kill the process
  • generally allow the process to run
There is also an option to delete the file associated with this process. If something tries to change critical registry keys, TeaTimer will detect it. TeaTimer can protect you against such changes by giving you an option: You can either Allow or Deny the change. TeaTimer is always running in the background.
Since Spybot-Search and Destroy 1.6 the TeaTimer uses our database where known files are rated as good or dangerous. This database contains several hundreds of thousands entries and is enlarged continuously. Nonetheless now and then there are files which are not contained yet. In these cases and if you use older Spybot versions Resident TeaTimer will ask your permission for every change. If you are not sure if you should allow the change, there is a simple rule of thumb:

If you have been installing something and/or if you judge the file that is going to be installed as good because you know its name, you can proceed by allowing the registry change (same thing if you or Spybot-Search and Destroy were deleting an application). But if the message comes out of the blue sky while you were surfing the web, you should get cautious. In this case it is better to deny the registry change.

You start Resident TeaTimer by clicking on ToolsResident on the left navigation bar (therefore Spybot-Search and Destroy has to run in Advanced Mode). There you can tick the checkboxes next to Resident "TeaTimer" (Protection of over-all system settings) active in order to activate TeaTimer.
Of course it is possible to revise each of your personal decisions. That could be necessary if you have denied some process which turns out as a good one later. You do so by right clicking on the TeaTimer symbol in the system tray - it is the blue one with the lock. (If you cannot see the symbol, it is probably hidden. Just click on the arrows in the system tray to show all hidden symbols.) A window appears where you have to click on Settings to modify your personal lists of registry changes and processes.
Overview
How to make a backup
How to disable Spybot-S&D temporarily
How to download Spybot-S&D
How to exclude products from the search
How to disable the proxy
How to make a recovery
How to enable the Select all button
How to export the Startup list
How to switch the language
How to uninstall
How to update

http://www.safer-networking.org/lv/tutorial/index.html


Download Page: http://www.safer-networking.org/en/download/index.html
Download Spybot-Search and Destroy from a mirror hosted by Safer-Networking
To avoid confusion often caused by download sites full of advertisements, we provide this service that is dependent upon donations. If you did not already send your donation, please give it a second thought.

Download Spybot - Search & Destroy©® 1.6.2 (15.6 MB)

md5: 54ACBA9CFD7154C02CEACF6310CF3CFA
x
Donate

NP. I like Spybot alot and want to see it grow. You can contribute to its success by sending threats you think it does not detect. Send the file in a zipped folder to: detections@spybot.info

Solution to fix the pop-ups in Spybot's TeaTimer

This fix is from Safer-Networking Ltd.

This is a provisory solution to fix the problem the bug in the pop-ups checkbox buttons

1.- Download "ResHacker" from here

2.- Deactivate the TeaTimer

Go into Spybot > Mode > Advanced Mode > Tools > Resident.
Uncheck the following: Resident "TeaTimer" (Protection of over-all system settings)

3.- Used "ResHacker" to open TeaTimer.exe (Should be in C:\Program Files\Spybot
- Spybot-Search and Destroy).

4.- Press Ctrl+F and searched for the word: decision

You will see this code:
Code:
object cbRemember: TCheckBox
Left = 8
Top = 160
Width = 339
Height = 17
Anchors = [akLeft, akTop, akRight]
Caption = '&Remember this decision.'
TabOrder = 2
end
 5.- Change the value "Top" from 160 to 190

6.- Press in "Compile Script" and File > Save

7.- Close the "Resource Hacker" and activate the TeaTimer again

This is the final result:

More information of this bug on Safer-Netowrking's Site:
http://www.safer-networking.org/en/news/2005-06-22.html

url:http://www.techsupportforum.com/networking-forum/security-firewalls/101314-solution-fix-pop-ups-spybots-teatimer.html

~~~~~~~~~~~~~~~~~~~
Angel Services around the world!
Client Security Solutions gifted by 
A Joy Light From Within .Org

Computer Weekly Telephone Free Access
Elders for Assistance Available by Telephone
Sun 5:30 pm PST Arrive between 5:30 to 6:00pm PST
Your Conference Access Number:     1-218-895-3911
Your Conference Passcode:     62013#



If you have any problems, please don't hesitate contacting me at holinessdavid@alightfromwithin.org
Cheers and Blessings, Holiness David Elder Lavender person alightfromwithin.org Rainbow Warriors of Prophecy



Warriors of the Earth  

  
Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.

Beware of Fraud: Be Careful of What You Click On!

Hello relatives,
I was reading my eWeek magazine and the editor was writing to remind readers that we all make mistakes regardless of how much experience we have with computers.  Name of the article, "Do the right thing."

An example in phishing was an email she received from the "IRS" letting her know that the 1040 tax form had been updated.  All she had to do was click on this link.  The email looked very official and being at the right time when everyone is filing returns, it offered a simple way to get a form that a great many taxpayers use.  She didn't click on the link and I hope that if you get such an email that you don't either.  If you want the latest IRS forms, go to http://www.irs.gov/formspubs/index.html


Here's another one:  a chain-mail email was sent to see if  people still think that they will get money by forwarding email to a friend, forwarded to a friend, forwarded to a friend, etc.  It's hard to believe that some folks are still falling for that sort of stuff.  Well, they are just going to have to sit there and wait for their checks.


Thirdly, if a virus is reported on your computer and your computer acts strangely then it is possible that the virus was not cleaned out properly.  One of the writers at eWeek had a problem when he installed an updated version of an anti-virus program.  The anti-virus program detected a trojan virus, but it didn't remove the part of the infection that gave the command to launch the trojan upon startup.  Note: the trojan infection puts commands in the Windows registry that will restart a removed virus.  The next day when restarting his computer he got an error stating that a file wasn't able to load.  After some careful thought, he remembered the trojan.  The missing file was part of the complex trojan virus.  If he had reloaded that missing file, he would have re-infected the computer.  So, even experienced computer users have challenges from malware.


Summary: Don't click on anything that sounds too good to be true.  It could be that it isn't true. Don't click until you read it, give it some thought, and give it some more thought.  Maybe then you'll decide not to click in it.  If you like, you can call me and we'll go through it together.


Angel Services around the world!
Client Security Solutions gifted by 
A Joy Light From Within .Org

Computer Weekly Telephone Free Access
Elders for Assistance Available by Telephone
Sun 5:30 pm PST Arrive between 5:30 to 6:00pm PST
Your Conference Access Number:     1-218-895-3911
Your Conference Passcode:     62013#

If you have any problems, please don't hesitate contacting me at holinessdavid@alightfromwithin.org

Cheers and Blessings,
Holiness David
Elder Lavender person
alightfromwithin.org Rainbow Warriors of Prophecy




Warriors of the Earth  

  
Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.

Saturday, January 23, 2010

Protecting Your Computer for Free!


Protecting Your Computer for Free!
Can Defragging and using Virus Scans protect you from Malicious Malware and Spyware Infestations? by Holiness David Running Eagle Shooting Star

Protecting Your Computer for Free!

There is so much spyware, spybots, and unwanted pop-ups that reduce your Computer's Speed. We can keep control over these issues with the few steps listed below. Now, I realize we don't want to do these things weekly or even daily if necessary. We have enough things to do. But if you don't do these tasks listed below, not only will you have a very slow computer, but it might, over time, stop working completely. Malware can mess up software and hardware.


We all learn how to clean our houses. Now, we have to learn how to clean our computers. These devices give access to your most intimate life details. Please learn how to protect your family from malicious malware and infestations. I hope that I have made these ideas simple and step by step. If you have any questions please feel free to leave a comment or question, so that I can reply.


This is the task of setting-up antivirus, antispybot, anti-everything programs, and defragmentation.  Check disk (or scan disc) and disc cleanup is performed through Windows Explorer (not Windows Internet Explorer). This will keep you free (no money and more time freed up) from going to the local hardware computer fix it person. This person will probably do the same thing we are doing here, but will not leave any of these maintenance programs installed. And of course charge you hundreds of dollars which you could have been done freely. (God gives us a voice, ask questions!)
There are numerous well documented improvements to system performance and reliability when an automated disk defragmentation program is used. Applications load faster and the computer boots to a usable state in less time. Backups require less time to transfer data. The purpose of this paper is to narrow the focus and address the tangible benefit of disk defragmentation to hardware and laptop client security. But if your program for defragmentation is not automatic, you must make settings to ensure this is done, or perform manually the operation of defragmentation.


This is a letter to help people!


Get protection for your computers for FREE!
I will go through how to get the software, how to install it and how to use it! (simple, you like?)


Briefly, this is what we are going to do:
1.    Install, update and run AVG Free antivirus
2.    Install, update and run Spybot Search and Destroy
3.    Install, update, and run Spywareblaster
4.    Disk Cleanup
5.    Error Checking (check disk or scan disk)
6.    Disk Defragmentation
7.    Registry Cleaner (Eusing)
  
It is recommended that you contact these vendor's websites once per week for the latest protection updates (download and scan everyday if used heavily by an active family). These updates will download and install with only a few keystrokes from you to make it happen. We will go through these processes as well; very simple, nothing to it! But you have to do these updates otherwise your software can't do its job of protecting you and your computer. Please let it be known that some types of malware can do physical damage to you computer. I won't try to explain it here, but it is real and it happens.


Here is how to download the required software programs that are designed to keep invaders out of your computers for FREE!!!


No catches; no gimmicks; just honest people giving us honest software. They have joined the Great Give-A-Way!

Please be aware that this website, like many others, is trying to get you to buy software from them. While this is not bad, it's not why we are here; we're here for the free stuff (you're welcome to buy what ever you want). My point here is watch out for which box you click on. If you click on the wrong box, you might end up buying something you didn't start out to buy.


Description: This one site has all three downloads for your clicking pleasure:
http://www.download.com/

These programs can be installed in any order, not necessarily in the order I have presented here.


AVG Free Antivirus
• Change Action: AVG Free is the first piece of software to download: http://free.avg.com/
Note: if you don't get the pages that I have tried to get you to go to, please be patient and look carefully for the proper box or text/link thingie that will get you the free software that you want. If you want to pay, then that is up to you; but I'm trying to get you to the web page that will get you the free software.


-Action 1: Look for a box that says, “Free basic protection” and “AVG Anti-Virus Free Edition” and click on the “Get it Now” button. The AVG website will take you to another page where they offer you software to buy. At the bottom of the left column (the Free column) click on the “Download” button. They take you to another page that prompts you to “Download AVG Free 9.0.” Click on that button and they take you to yet another page; which is http://www.download.com. Click on “Download Now (47.68MB)”; the file name (at the moment) is something like "avg_free_stf_en_90_169a1359.exe.” Download will start. But wait, there's more!
Hopefully you computer will prompt you to “Save file.” See Note 1.

Note 1.  regarding saving a file to hard drive: If your computer does not prompt you to save a file to a specific location you can change it.  In the Firefox browser, go to 'Tools' then 'Options'.  Check box for “Ask  or for Microsoft Internet Explorer, under 'Tools' then 'Internet Options.'



You want to save it to a folder where you can find it again!
Change Action:
-Action 2: Close all programs. Make sure you are connected to Internet access.

-Action 3: In Windows, they offer a “Downloads” folder under “My Documents”. You get to the “Downloads” folder by clicking on “My Documents” button and then double-clicking on “Downloads.”

-Action 4: Create an AVG folder and save the AVG Free software to that AVG folder.

-Action 5: Close all programs you are not using.

-Action 6: Find the downloaded program and double-click the file. It will start the installation process.

-Action 7: Let's use AVG Free: Double-click on the “AVG Free 9.0” icon on your desktop. When the program appears on the computer screen, it will be on the “Overview” page. This view will tell you the status of the different Components (or functions) the program handles for you.

-Action 8: After you do an “Update” all of the 7 components should have a green check-mark and say “Active.”  One icon says “Identity Protection,” to activate it you pay them money.

-Action 9: at the top left, click on “Components,” and then click on “Update Manager.”  It will take you to a window that will allow you to set-up when and how you want your update to occur. Look carefully through this window. Make your choices about how and when you want these functions to occur.  At the lower right, click on “Save Changes.”

-Action 10: Click the tab on the left side of the screen, “Update Now.” It will connect to the Internet (providing you're on-line) and a box will prompt you to “Update.”

-Action 11: Click on the button to continue. After the update has finished, a message is displayed, “Update was finished successfully.” 


-Action 12: Next we'll click on the tab “Computer Scanner.” Click on the tab and it will give you two choices, “Scan whole computer” or “Scan specific files and folders.” The length of time required to scan the entire computer will vary from computer to computer. It could take hours and can slow down your computer during the scan. Most people will start the scan and then minimize the window to work on something else. When the scan is complete, you'll be alerted. By default, the program will do all actions to infections and warnings automatically. All you have to do is acknowledge and close the program.

****Note:  This must be done daily, as even two or three times a day, they put out updates.  This can be done at worst once a week, but daily would be best.  There is an automatic immunization, however, you need to run your Scan after updates, to ensure your updates have taken affect.



Spybot Search and Destroy
•   Spybot Search and Destroy is the next program to install.
-Action 1: Please go to http://www.download.com/Spybot-Search-Destroy/3000-8022_4-10122137.html.  You will notice that it is the same website that we used for the AVG Free, cnet.com. They are a trusted site.

-Action 2: Click on the “Download Now (15.65MB)” button. A box will open prompting you to save
the file. We'll do as in the previous example of saving a download file to its own folder. The
file name is “spybotsd162.exe.”

-Action 3: Save it to Downloads, create a new folder named “Spybot Search and Destroy.”

-Action 4: After the download is complete, go back to the folder and double-click on the file “spybotsd162.exe.” Follow the prompts to install. Because the program will be installing additional files, you need to be online to do the installation.

After installation, there is a setup routine that will guide you through several steps.  Please go through these carefully.  It will take some time, so be patient.  When prompted to enable Tea Timer, make sure the check box is checked.

***** You must close your browser before immunization or you could destroy your browser data.  Again, very important note.  Close your browser, before you hit immunization, then bring your browser back up.  All your tabs should open up, if you gave it a command to remember this function.  This is imperative! Questions email holinessdavid@alightfromwithin.org



***** Update frequently, everyday or every other day.  This program will also clean your cache, which will make your computer internet access speed up.  If you are having problems with your cache, as a blank or stop will show up, close your browser, and restart again.  If this continues, a full shut down of your computer may necessary, but not usual.  Just make sure you update frequently.


SpywareBlaster

• The last and not the least is SpywareBlaster. Please go to
http://www.javacoolsoftware.com/sbdownload.html” and select on of the choices to
download:
  1. Download SpywareBlaster 4.2 from Download.com
  2. Download SpywareBlaster 4.2 from MajorGeeks (USA and other locations)
  3. Download SpywareBlaster 4.2 through the Coral Distribution Network
Let's use the first one from Download.com since we used it for the first two program
downloads.

-Action 1: Click on the “Download Now (2.94MB)” button. A box will open prompting you to save the file.

-Action 2: We'll do as in the previous example of saving a download file to its own folder.

-Action 3: The file name to download will be “spywareblastersetup42.exe.” (you have to do this in Windows Explorer again not Microsoft Internet Explorer!

-Action 4: Save it to Downloads, make a new folder named “SpywareBlaster.”

-Action 5: After the download is complete, go back to the folder and double-click on the file
“spywareblastersetup42.exe.”

-Action 6: Follow the prompts to install.

I will reiterate: This software is no good unless you keep up-to-date for the latest protection. These software vendors will have updates on a regular basis; so, you have to revisit to get the latest protection or set up your program to do this automatically.


-Action 7: Look for something regarding “downloads.” Select “Always ask me where to save files.”


-Action 8: You might also need to select “Show the Downloads window when downloading a file” and maybe deselect “Close it when all downloads are finished.”


-Action 9: By doing these two check boxes, you will be prompted where to save a file and also, when the download is finished, you will be prompted to “Open” the file, which will start the execution of the downloaded file and hence start the installation.


Note on Spybot Search and Destroy Immune function: before performing an “Immune,” operation, close our all browsers. This is important because the memory used for the web-page data on your browser can become corrupted. Therefore, before running an Immune operation, be sure to close your browsers first! 

Disk Cleanup
 Now we want to clean out some junk that is no longer used.  Disk Cleanup helps free up space on your hard drive. Disk Cleanup searches your drive, and then shows you temporary files, Internet cache files, and unnecessary program files that you can safely delete. You can direct Disk Cleanup to delete some or all of those files.

 Here's how to get to it:   put your cursor over Start and single right click.  From the menu, point to Explorer and click on it.  When Explorer comes up, single left-click on C: drive, then single right and from the menu, click on Properties.  When Properties comes up, click on Disk Cleanup. 

Un-check boxes for the ones you don't want to delete.  Click OK and OK again to confirm that you do indeed want to do this function.  It will take a few minutes, so be patient.

Please  note that there are other ways of getting to the Disk Cleanup.  For example, from Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup.  After this routine has does its job, do not close the box.  We will use it in the next part.


Check Disk
What is Check Disk ? (Window 98 calls it Scan Disk)
Let's continue from the above Disk Cleanup where we accessed it from C: drive Properties.  Click on the Tools tab at the top of the box.  Click on Error Checking, click on Check Now.  This is Check Disk (Scan disk on Windows 98).  A box will appear: check the box for Automatically fix file system errors, then click OK.  Another box will appear stating that disk check will be done upon next Windows start-up and prompting you to confirm: click on Yes.

The next time you start up your computer, a light blue and dark blue screen will come up indicating that error checking is about to start.  It gives you the option of canceling this operation by touching any key.  It takes about two or three minutes and then the computer restarts.




Defragmentation
Next is Defragmentation.  The built-in defragmentation program is OK, just barely OK.  The company that put in the defragmentation program wants you to buy their more expensive program.  We will put in a defragmentation program that is free and does a much better job.  Please read on.


Installation of MyDefrag v4.2.7
Description of defragmentation – Files get stored all over the place on the hard drive. Why? I don't know. It seems to me that if you store a file on the hard drive, it would all go to one place; but this is not so. One defragmentation program that I tried displayed the number of fragments for different files. It was amazing: one file had over 2000 fragments (meaning that the file was located in over 2000 different places on the hard drive)! That's nuts! In order for a file to run, the hard drive has to make many moves to get gather up all of the parts of the program. No wonder computers start running slow! The hard drive is busy running around gathering parts of the program. We want the programs on the hard drive to be contiguous, which means, “Connecting without a break.” When we run the defragmentation program, it puts all of the files together so that they are contiguous. If you are very busy at the computer, is advised to run defragmentation daily. If the computer is hardly touched, maybe once or twice per month. 

The defragmentation program that we're going to install is the improved version of what I have been using (JKDefrag) for a couple of years now.  One of the reasons I like this program is because it can be used very simply or in more complex modes (which are very simply to use).  you can read the website and learn how to get it to do more for you.

I'm very adamant that heavy users (and this includes a computer-active family), perform defrag on a daily basis.  If you do it every day, it only takes 2 to 3 minutes.  In the long run, it will save time, reduce hard drive wear and tear, and reduce user wear and tear.

Go to URL: http://www.mydefrag.com/Manual-DownloadAndInstall.html
Once on the website, download" MyDefrag-v4.2.7.exe. " Put it in a folder that you can easily find.
During installation, you will be prompted if you want to make it a Scheduled Task.  Click on the check-box to enable this function.  After the installation is complete, you'll want to set-up the Scheduled Task function for exactly when and how you want the task performed.  That is in the next paragraph.

Installing the program is very simple, but if you need help, let me know, we'll go through it step-by-step. 

Regarding Scheduled Task: if you didn't follow the prompt to create a Scheduled Task, or if you want to automate another task then here we go: 

1.    Click Start, Control Panel, Scheduled Task.

2.    The first item in the pane is Add Scheduled Task.  Double left click on it and the Scheduled Task Wizard comes up.

3.    Read what it says and then click Next.  The next window shows a list of programs for you to select from or you can find your program by clicking Browse.

4.    Find the file, MyDefrag, select it and click Next.  The next window of the wizard should show the name:  MyDefrag.

5.    Select from Perform this task:, click the button for Daily and click Next.

6.    The next window prompts you to select what time to run the program. Select Every Day, then enter today's date or tomorrow's date and click Next.


7.    The next window requires a Administrative password, do so and click Next. 

8.    The next window has a check box prompting you to enter Advanced Settings; click to fill the check box. 

9.    And click Finished.  The Advanced Setttings window will appear.  Click on the Settings tab. Click to fill the check box: Stop the task if it runs for:. Enter 2 hours and 0 minutes and click on Apply and click on OK.  This keeps the defrag program from running forever if something goes wrong.

10.    For laptop owners, near the bottom of the box, in Power Management, click to fill the check box for: Don;t start the task if the computer is running on batteries (it takes quite a bit of power to de defragmentation.  Also fill the check box for: Stop the task if battery mode begins.

11.    Click OK and you are finished.


MyDefrag was developed by Mr. Jeroen Kessels, Amsterdam, The Netherlands.  Please take the time to read and learn what he has on his web pages. Besides defragmentation, he also educates us on doing a page-file defragmentation (also known as: swap file or virtual memory space allocation).  He has pictures of his family, cats, etc.  He's a real person writing software for us to use for free (I love that word).  If you wish to donate to his efforts, please do so.


Scheduled Task
Regarding Scheduled Task: if you didn't follow the prompt to create a Scheduled Task, or if you want to automate another task then here we go: 

12.    Click Start, Control Panel, Scheduled Task.

13.    The first item in the pane is Add Scheduled Task.  Double left click on it and the Scheduled Task Wizard comes up.

14.    Read what it says and then click Next.  The next window shows a list of programs for you to select from or you can find your program by clicking Browse.

15.    Find the file, MyDefrag, select it and click Next.  The next window of the wizard should show the name:  MyDefrag.

16.    Select from Perform this task:, click the button for Daily and click Next.

17.    The next window prompts you to select what time to run the program. Select Every Day, then enter today's date or tomorrow's date and click Next. 

18.    The next window requires a Administrative password, do so and click Next. 

19.    The next window has a check box prompting you to enter Advanced Settings; click to fill the check box. 

20.    And click Finished.  The Advanced Setttings window will appear.  Click on the Settings tab. Click to fill the check box: Stop the task if it runs for:. Enter 2 hours and 0 minutes and click on Apply and click on OK.  This keeps the defrag program from running forever if something goes wrong.

21.    For laptop owners, near the bottom of the box, in Power Management, click to fill the check box for: Don;t start the task if the computer is running on batteries (it takes quite a bit of power to de defragmentation.  Also fill the check box for: Stop the task if battery mode begins.

22.    Click OK and you are finished.




Registry Cleaner
Caution: the following procedure is for advanced computer users only.  Please read it through twice and if you think you can do it then proceed with patience.  Keep in mind that I am there for you if you need help.

Eusing Registry Cleaner
 1.    Please go this website:  http://www.eusing.com/free_registry_cleaner/registry_cleaner.htm and download the program Eusing Free Registry Cleaner 2.5.1.

 2.    Near the top left, you'll see in blue print, Download Site 1    Site 2    Site 3    Site 4.  Click on any one to start the download.

 3.    Save it to a folder you can easily find again.  After download is complete, go to the folder the you saved it in and double click the file name.  Follow the prompts and it will quickly be installed.

 4.    Open the program and click on Skip unless you wish to register and make a donation.
 a)    I strongly encourage donating.

 5.    If you clicked on Skip, then the program will open on your screen.

 6.    Click on File, then from drop-down menu, click Backup Full Registry.
 a)    It is very important that you backup your registry every time you run this program.
 b)    If there is anything that no longer works, this backup is your way back to where you started.
 c)     Here's why: the registry is a database that has instructions that tell the computer how to function. For example it contains

•    Profiles for each user.
•    The programs installed on the computer and the types of documents each can create.
•    Property settings for folders and program icons.
•    What hardware exists on the system.
•    The above is an extremely simple description: it is very complex and almost a 100 MB   in file size.

 d)    The registry file is the heartbeat of the computer.  If it gets messed up, the computer stops working.   That is why that only recently have there been programs that would do this cleaning function without messing everything up.  But we still cover our selves by doing the backup.

 7.     Next, a box comes up asking where to save the backup file.  There is a little window that says, Save In:,  click on the arrow at the right and select (C:).  Now we are going to create a new folder for the registry backup to be saved in.  Along the top right hand side of the box, there are four icons, the second from the right is Create New Folder (if you hold your cursor over the icon, it should display those words).  Click on that icon and the words New Folder with a black background will appear in the main window where files are shown.  Type in the new name Registry and touch Enter.  Double left click on the Registry folder that you just created and it will appear in the Save In: window above.

 8.     Since we have already selected the (C:) drive, this new folder will be in the root directory of the (C:) drive.

 9.     Enter a file name.  This is how I do it: RegistryBackup01202010_133am.reg.  Where RegistryBackup is the description, then the date (month day and year), 01202010, and the time, _133pm.  The extension, .reg, will automatically be attached.  And touch Save.  It takes a couple of minutes.

 10.    There is one more step to protect you before doing the cleaning operation.  It is advisable to do a system backup.  Here's how:
 a)     Click on Edit and then click on Options.
 b)     Under the General tab, there is an option, Create a system restore point before repair (XP, Vista).   Click/fill this check box.
 c)    This will create another type of backup on your system.

 11.     On the left, under Task, click on Scan registry issue and the process will start.  It takes about 5 or 10 minutes.

 12.     When it is finished finding problems, click on Repair registry issue.  This only takes a few seconds and it's done.

 13.     Use File and then Exit to exit the program.

 14.    If you discover that something does not work correctly or does not work at all, then reinstall the backup registry that you saved before doing the scan and repair steps above.
 a)     Click on Action and then click on Restore previous registry. 

15.    Any questions, try the Help drop-down menu or call or email me holinessdavid@alightfromwithin.org

 



Website URLs are included for reference and more information.
We have different things that infest our computers:


1.  Viruses – A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  Please see: http://en.wikipedia.org/wiki/Computer_virus

2. Malware - any software designed to create havoc on your computer and anyone else you communicate with.  Please see: http://cybercoyote.org/security/malware.shtml

3. Spybot Worm - The Spybot worm is a large family of computer worms of varying characteristics.  Please see:  http://en.wikipedia.org/wiki/Spybot_worm

4.  Rootkits - A rootkit is a computer virus which is comprised of a program (or combination of several programs) designed to take fundamental control of a computer system, without knowledge or authorization by the system's owners. Please see: http://en.wikipedia.org/wiki/Rootkits. I have found that friendly rootkits can be installed on one's computer. Please be careful when running rootkit diagnostic programs. Look at the report carefully before deleting anything. Use your own judgment when deciding which items to be deleted from the list.



http://ajoylightfromwithin.org 
Client Security Solutions gifted by A Joy Light From Within .lOrg

Angel Services around the world!
Computer Weekly Telephone Free Access 
Elders for Assistance Available by Telephone
Sun 5:30 pm PST Arrive between 5:30 to 6:00pm PST
Your Conference Access Number:     1-218-895-3911
Your Conference Passcode:     62013#








Warriors of the Earth  
 

Welcome to the home of love, where your computer gets to know of hugs.  Take the time to give it love, to ensure the spine stands, on the test of time (until you update again protection files). For only you can operate the golden rule, do unto your computer, who knows who to fool.  But we do outwit the sliest fox, when we give love instead of gloves (put them up, combative forces).  The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.