Welcome to YLOAN.COM
yloan.com » Computers & Internet » Removing Unwanted Items From Your Computer - Part I
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Removing Unwanted Items From Your Computer - Part I

Removing an unwanted item from your computer can range from the trivial

, to the downright nerve-wracking.

First let us classify the various types of 'unwanted items' in existence. Also for the purposes of this article, assume that a Windows-based computer is the object of this exercise.

Unwanted items in the most generic sense may appear in the form of files (items of data), or programs (executables), either fully installed in the normal fashion (using the Windows Installer program), or simply stored in some folder location. The latter simply needs to be clicked on for it to run as intended, or unintentionally triggered by some other process. Moreover, programs may be 'hostile'. In other words they may be malware - a virus, trojan, spyware or Adware.

Below are listed some of the more common types of unwanted items that may be found on your computer.


Unwanted Data:

Removal of unwanted data can be simply by identifying, locating and deleting the data file, followed by emptying the trash can.

However, you should be aware that if security is an issue, simple file deletion as described above will not completely remove all traces of the data. To ensure that sensitive data is removed 'forever' the data must be overwritten with new data designed according to recognized secure methods. Details of such a procedure are beyond the scope of this article.

Since it is theoretically possible to retrieve even data that has been overwritten, some would argue that the only secure way to prevent sensitive data from ever being retrieved is to physically destroy the hard disk originally used to store the data. It is safe to say, though, that such retrieval would be way beyond the capabilities of all but the most technically sophisticated.

Cache Files:

Cache files are used by Windows to help speed up the execution of routing and/or repetitive operations. While these are not 'unwanted' in the strictest sense of the term, over time the cache file size may grow unnecessarily large, thereby degrading computer performance.

Internet Temporary Files:

During the course of the normal use of Internet Explorer of other Internet browser, many temporary files are created.

Windows Temporary Files:

Windows creates temp files during software installation as well as various other operations. These files provide the ability to easily recover from various possible 'glitches' that may occur during execution of a given process.

Similar to Cache files, Windows uses 'temp' (temporary) files to provide smoother operation of various installed programs. Temp files are conspicuous by their '.tmp' file extension. For example, you will find temp files being created whenever programs such as MSWord or Excel are used.

Unwanted Installed Programs:

Any program originally installed using the Windows installer may be uninstalled by the usual (recommended) method of going to the Control Panel and running the 'Add/Remove Programs' utility. Many programs are also supplied with their own uninstaller. In such cases this feature should be used as a first option for its removal from your computer.

It should be noted that if the program's own uninstaller and/or Windows Add/Remove Program utility fail to remove the program, other more intrusive means of removal may be employed.

Malware:

The removal of malware (spyware, adware, etc.) is typically the most challenging of all the procedures described thus far. In fact, the initial obstacle is recognizing that such an 'infestation' does indeed exist.

Some of the first signs of possible malware infestation are:

- Erratic computer operation.

- Computer crashes.

- Slower-than-normal operation.

- Pop-up messages warning of virus infestation or other problem (trying to scare you into taking some particular action, such as visiting a website promising to fix the problem).


- Your Home Page suddenly being changed from the normal site (home-page hijacking).

To be sure, there are other factors that may slow down your computer or cause erratic behavior, such as file corruption, or software bugs. However, there are a few procedures you can follow which will reduce or eliminate the possibility that your computer is in fact the victim of a malware 'attack'.

It makes good sense to run a complete check for malware and remove any items found, and then perform routine maintenance procedures (temp file removal, etc.).

by: Ryan Round
Which Movie Is Your Wonderful Memory? Few Facts About Inkjet Cartridges Saving Money On Your Ink Cartridges Printer Ink Cartridges - How Do They Work? Three Easy Ways To Save Money On Printer Ink Cartridges Oem Vs Remanufactured Ink Cartridges How To Refill Your Printer Ink Cartridge And Recycle It Cheap Magazine Printing Secrets Revealed - Part 1 A Printer Owner's Guide To Remanufactured Inkjet Cartridges Make The World A Better Place With Your Empty Printer Ink Cartridges The History Of Printer Ink Cartridges Make Your Ink Cartridges Last Longer Ink Cartridges High Cost - Solutions To Save A Lot Of Money On Ink Cartridges
print
www.yloan.com guest:  register | login | search IP(3.129.10.46) / Processed in 0.009188 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 56 , 4665, 55,
Removing Unwanted Items From Your Computer - Part I