Tips for a Problem-Free Computing Experience
Updated 07/23/2021

    The more of these suggestions you follow, the fewer problems you should have. They won't solve any existing problems you have, but if you follow them all you should be able to avoid problems in the future.

    If you are chiefly concerned about your privacy, including data theft, being tracked on the internet, or being monitored by your ISP you should consider using a Virtual Personal Network (VPN) along with secure search such as Duck, Duck, Go while you surf the net. In addition, here is a link to a page from How-to-Geek which explains what you shouldn't share. Finally, CloudsavvyIt presents an eye-opening article detailing some of the latest high-tech spoofs and scams.

NEVER open questionable internet links

NEVER give out personal information to strangers

NEVER download software from questionable sites

NEVER open mysterious messages or emails, especially emails with attachments

NEVER jailbreak or root (remove manufacturer security from) your device!

ALWAYS keep your Windows & internet device software up to date

ALWAYS use unique passwords for all of the different sites you must login to.

ALWAYS use secure passwords (at least 8 digits in length, containing numbers, letters, and special characters)


1: Never fail to keep your internet programs, your computer, and/or internet devices (Android & iOS) updated!
For a PC and other internet devices, many of the updates for both Operating Systems and internet apps & programs are security updates that your device needs to stay current in the battle against malware. Don't put your devices and yourself at risk, KEEP IT ALL UPDATED!

2: Never have more than one active antivirus (AV) program on your PC. Two active AV programs may conflict with one another rendering you defenseless. Use Programs and Features in the Control Panel or Apps and Features in Win 8 or 10 PC Settings to uninstall extra programs you don't want, or need. Then restart your PC.
    Unactivated Windows Microsoft Defender in Windows 8 and 10 and/or on-demand virus scanners such as Malwarebytes do not count as active antivirus programs.

3: Do not use unsafe email practices. (Where do I start?)

    Old programs such as Windows Mail and Outlook Express seem to invite spam.
    Windows 7 - Windows Live Mail, Yuck!
    Windows 8 Email - "It's too pooped to POP!"
    Use Outlook (if you have Microsoft Office) or Web Mail (, gmail, yahoo mail, etc), or Mozilla Thunderbird desktop email program
    Use the latest updated versions of desktop programs, if at all possible, for maximum protection.

Note: Since email and email attachments are the favorite way that hackers attempt to spread malware, especially Ransomware, you should pay careful attention here.

4: Never open emails from unknown or suspicious senders.

5: Never open email attachments you were not expecting, no matter who they appear to be from. Be Safe! JUST DELETE THEM!!

6: Never respond to obvious spam email messages. Be wary about using using unsubscribe links (just mark message as junk) and never click directly on links in email messages. Again, just delete them!
    If you have won a lottery, a gift certificate, or received an inheritance you should certainly know it, without having some spam email informing you and you should be able to claim it without paying an up-front fee..

7: Never visit questionable websites (ie porn, warez, hacking) However if you must download files from these sites use discretion, scan all downloads with your up-to-date antivirus program (or Malwarebytes) as soon as download is complete. If files are compressed, scan again after decompressing or extracting!
    Perhaps you've noticed the Scan command in the context menu when you right-click any file.

8: Never poke unnecessary holes in your firewall by clicking 'Allow' every time some program requests access to the Internet. When it doubt over whether or not to allow some program, use Google to find out what it is and whether or not it needs access to the Internet. Otherwise, denying access is the safest course of action, since you can always change the rule later if something does not work as you expect.

9: Never download programs and files from questionable sites. Use Filehippo (safe) or search with Google or Yahoo to find out what others are saying about a site before downloading any software or files.

10: It's not a good idea to use file sharing or P2P programs. (Torrent sites are filled with malware.)

11: Never use pirated programs. You have no idea what the creators have placed into these programs. There are too many free programs available to take such chances. See my Freeware page at

12: Never connect to unknown devices. Don't plug strange USB flash drives into your PC.
If you find a flash drive laying around in a public area just trash it.
    Be Wary.
    If you found a bottle of aspirin on the floor of a waiting room, would you keep them to take the next time you had a headache? Of course not! There's no telling what could be in those pills. Same with the USB drive. There's no telling what could be on it.
Virus? Ransomware? No telling.
    Garbage cans were made for things like this. Better to be safe! Remember. Curiosity Killed the Cat!

12.5: Also, never disconnect USB devices from your PC without using the Safely Remove Hardware feature in the notification section of the Windows toolbar. This ensures the drive has quit any activity so you can safely remove it without data loss or damage to the USB device itself.
(Note: As of Windows 10 version 1809 USB drives are optimized by default so you can remove them quickly without having to use the "Safely Remove Hardware" notification icon.) But, if you are running an earlier version of Windows you still should use the Safely Remove Hardware feature.

13: Never use Registry cleaners or optimizers unless you know EXACTLY what you are doing. No matter what anyone says you cannot magically gain great speed increases from using these programs. Leave the Windows Registry alone until you gain more knowledge about how it works. You can easily render your PC unusable by poking into the Registry.
    If you think your PC is running too slowly see this page for possible remedies.

14: Never use the same login credentials for every internet site you login to. If a hacker were to gain access to your username and password for one site then he (or she) would be able to login to any site you use and potentially create enormous problems for you.

15: Never click on bogus popup ads - especially if the ad says your PC is infected with a virus. Close the window or turn off the browser. Use Alt+F4 or the Task Manager to close the program or shut down your PC if nothing else works (hold down the power button). It's better to take the time to restart your PC than to take a chance of getting PC malware. At best you'll need to spend your valuable time researching and dealing with the problems or at worst you may need to replace your operating system, potentially losing files and installed programs.

If you think your PC may be infected run your antivirus scanner, run Malwarebytes, or run a malware scanner from this page to find out for sure. Don't take chances with your security!!

16: Never provide any passwords or personal information in response to any message, email or a phone call, informing you that your account(s) were hacked or compromised. Deleting all such emails or ending the phone call is the most appropriate response.

17: Both Windows XP and Windows Vista are obsolete!
    If you have an old PC which is still running Windows XP or Vista I strongly advise you NOT to connect it to the internet any longer. Neither Windows XP or Vista are being supported by Microsoft with critical security updates and are vulnerable to malware intrusion and hacking to a much greater extent than later operating systems.

    If you wish to continue using the PC hardware I suggest you replace Windows XP or Windows Vista operating system with a fast and FREE linux operating system such as LXLE, Puppy Linux or Manjaro Linux.

    If you need advice with purchasing a new PC see my page How to buy a "Cheap" PC.

    You should know, if your PC is running Windows 7, it has recently suffered the same fate as Windows XP and Vista. See this Microsoft page for an update on the status of Windows 7. I suggest either installing Windows 10 (if possible) or a FREE and secure Linux operating system such as Ubuntu or Linux Mint if you wish to continue using your old PC hardware.


1: Topping the list of the things you should do is to create recovery media (DVDs or USB Flash Drive) for your new Windows 10 computer. PC manufacturers typically no longer include recovery disks with new PCs.

    Also, make regular backups of your personal files.
    If your PC's hard drive quits or if Ransomware infects your PC you will be glad you did.
    See my page Backup your PC to learn how.

2:Also, if you have a new Windows 10 PC you should download all current Windows Updates to make your new PC as secure as it can be. Go to PC Settings by clicking the gear icon in the Windows 10 start menu, then choose Update and Security and then click the Check for Updates button.
Note: If you have recently updated (or clean installed) Windows 10 you should Check for Updates as soon as possible also.

    Allow Windows Update to download and install all current updates before you leave PC Settings. Depending on the speed of your internet connection it may take a while to get this done, but your PC will be much more safe and secure if you take the time to get fully updated.

3: Either disable all extensions (browser helper programs) in Internet Explorer or stop using Internet Explorer (probably best). Mozilla's Firefox and Google Chrome are much safer and better alternative Internet Browsers. Even Microsoft Edge which now comes with Windows 10 is much more secure than the old Internet Explorer.

4: Always have an up-to-date antivirus program running. There is no reason not to have one since it is not necessary to pay for a good antivirus program. (See the Security Programs section of my page Freeware to identify and locate them.)

    At least use Windows Defender for Windows 8 or 10. If every PC had a decent security program running many criminal hackers might need to find another line of work.
    If the paid antivirus that came with your PC expires because you didn't want to pay and you don't want to take the time to install a free antivirus program, it's wise to, at least, uninstall the expired paid program then restart your PC to allow Windows Defender to activate itself.
    To be sure it's running as it should go to PC Settings (gear menu in Start Menu or press the (Windows key + I). Click Update and Security, then click Windows Security (on the Left), then press Open Windows Security to be sure Windows Defender has been activated.

5: Always have a firewall running. Windows firewall should always be on unless you have a router or gateway that includes a firewall. Note: Running two firewalls may slow your connection speed.

6: Always use Windows Update to download and install all the latest Windows updates, including all security updates, from Microsoft. Don't be concerned with any Optional Updates unless you are positive you need them.

7: Always delete all unsolicited emails containing attachments without reading. Curiosity killed the cat. (I know, I mentioned some of these things earlier. But people can't hear it enough. It's important.)

8: Always use a different and secure password for each site where you must login. (use at least 8 digit passwords containing letters, numbers, and special characters)

9: Always copy and paste URLs from email messages into your web browser. Don't simply click on them! If they don't look right turn off your browser rather than going to a potentially dangerous site.

10: Always inspect links copied and pasted into your web browser to ensure they don't seem to contain a second/different address.

11: Always backup your data files. In Windows 10 you can go to PC Settings, then Update and Security, then Backup to Backup using file history. (you'll likely need an external hardrive to use as a backup disk, but don't leave it connected to your PC all the time) It's a good idea, especially if your hard drive contains irreplaceable or valuable data. At least copy your files to a USB Flash drive and use a free file-syncing service like Microsoft Onedrive to create another copy of your personal data.

12: Always download programs and files from reputable sources only. Filehippo, and others like it scan all their files and programs for viruses and malware before offering them for download. See my Freeware page to find good free software.

13: Watch the installer when installing new software - especially freeware. At times these installers will attempt to install software you neither want nor expect. Decline all extra software installs.

14: Keep your software updated.
    Especially internet programs such as Adobe Flash player & Reader, Internet Browser Software, and Oracle Java. Updates for these programs are normally offered for the express purpose of closing security holes. Don't ignore the update prompts for this type of software.

A note concerning Adobe Reader and Java.
    Internet helper programs such as Adobe Reader and Oracle Java are not essential.
    Foxit Reader & SumatraPDF are good, safe, and fast alternatives for Adobe Reader.
    Oracle Java is not necessary for general internet surfing. Very few sites require Java to be installed on your PC and very few programs need Java to function. These sites and software programs have many good alternatives.
    So if you wish to uninstall Java to avoid its problems, feel free to do so.

    If you want to speed up your PC disable unnecessary startup programs and/or install more Random Access Memory (RAM). (RAM is not that expensive now.) For help see Is your PC running Sloowly Now?.
    If you really want to energize your PC install a Solid State Drive (SSD). They are a bit on the pricy side, but well worth your money if speed is your goal.


1: Never send attachments in emails unless they are requested.

2: Never use stationary or any other kind of special formatting in emails.

    This is considered shouting, especially in web forums.

4: Avoid texting speak in forums.

5: Never poke sleeping bears.
    Most REAL hackers are quite content to leave you alone unless you make them take notice of you. No dinky little software firewall or consumer grade router is going to keep them out of your system. So do not go to some hacker website or chat room and start shooting your mouth off unless you're prepared to accept the consequences.

6: Avoid using online registry or PC check sites.
    Most of these sites and programs are scams, and wish to sell you something you don't need. Most of them report non-issues in an attempt to boost the number of "issues".
    Sometimes using these programs can lead to a non-functioning computer. There are some reputable sites such as online malware scans from some of the top antivirus vendors, but before using any other check it out!

7: Another last warning about Windows Registry.
    The Windows registry is not some mystical black box of untapped performance tweaks for Windows that will lead to untold improvements in system performance.
    Most of the tweaks will lead to very modest performance gains of 1-2% tops, and probably less than 10% all combined. There is also a good chance that you will render your system unbootable if you make a mistake when editing.
    Registry default settings are set that way for a reason. Just do yourself a favor, and forget you ever heard of the Windows registry until you have gained sufficient knowledge of the dangers of Registry editing.
BE VERY CAREFUL! Data loss and re-installing Windows is NOT fun.

If you should get a computer virus or malware on your computer use another PC to access internet help forums - such as Bleeping Computer - for advice on how to get rid of it. Quite frequently the advice you will receive will require that you have more than a passing knowledge about computers. So if you would rather have a technician solve your problem for you, be sure of the charges before leaving your PC with him/her.

Disabling Startup Programs
Unnecessary startup programs slow the startup of all PCs and since these programs are always running in the background they use valuable RAM memory that may be in short supply, especially on many older PCs with too little RAM installed.

It is possible for a user to run the Task Manager startup tab (right-click on the taskbar then choose Task Manager from the context menu) to disable some of these unnecessary or unwanted startup programs. However the best way to rid yourself of troublesome startup items is to change the settings of these programs or as a last option, uninstall the programs that put them there in the first place.

If you prefer to use a third-party utility then download a program called Ccleaner from Ccleaner is for beginning to moderate users. The Ccleaner program also does a very acceptable job of cleaning the trash files from your PC. (an excessive accumulation of trash files can slow your PC)

To learn how to safely disable unneeded startup programs see my page Is your PC running Sloowly Now.

Last things
In Windows 8 and 10, the revamped Task Manager now includes Tabs, including one called Startup which includes the feature to control and disable startup items, very handy! MSConfig is no longer necessary for this and it's startup tab redirects the user with a link to the Task Manager. Right-click the task bar then choose Task Manager, then click More Details to see all the Tabs.

    Traditionally, paranoid people have been criticized for believing that everyone is out to get them. These criticisms may have had some validity in the bygone era of personalized relationships since it has traditionally been assumed that the great majority of people are reasonably honest and are not normally out to take unfair advantage of others.
    The age of instant communications, computers, and the internet has changed that. Now it is reasonable and even fashionable to be paranoid because you don't just think, you know, there are many others out there who are out to get you and your money.

    If someone you don't know contacts you it is perfectly reasonable and likely much safer for you to disbelieve them.

    For example, If you get a telephone call from someone who claims to be a banking official you know they are lying since banks never call or email their customers (except, possibly, in response to your call), they simply send you a letter in the mail.

    Likewise, if someone calls claiming to be a Microsoft employee you should immediately hang up on them since Microsoft will never contact you saying there is a problem with your computer.

    AND IF SOMETHING SOUNDS TOO GOOD TO BE TRUE, IT PROBABLY IS! Don't be taken in by people like that long-suffering
Nigerian Prince or those put-upon Nigerian Scammers who want access to your bank account so he/they can tranfer his treasure into it to keep out of the hands of the bad guys.

    Hackers and scammers know your telephone number and/or your email. They are constantly trying to trick you into devulging your valuable personal information with the goal of stealing your identity then ripping you off. Don't be a sucker and be their latest victim. Just delete the email or hang up!

    If you want to read about more things you shouldn't do with your computer, PC Magazine has a good article called 8 Bad Habits That Are Destroying Your PC

When you decide you need a VPN (Virtual Personal Network) to avoid being tracked while you surf.
How should you evaluate VPN's

    If you value your internet security DON'T DEPEND ON A FREE VPN TO KEEP YOU SAFE! Free VPNs tend to leak information much more than the ones you pay for. Pick a good VPN!

Top VPN's by PC Magazine

Best VPN's by CNET

Best VPN services by PC World Magazine

Best VPNs from Toms Guide

Top Ten VPNs from ZDNET

What is a VPN and why do you need one? From ZDNet

Here are the webpages of some of the top VPN Services:

Note: This file of tips and suggestions was not originally compiled by me. The original file was downloaded from a PC help forum and I altered, updated, and refined it significantly before presenting it to others, but I do not claim original authorship. Be that as it may, it is good advice and I thank the unremembered and unknown person or persons who first came up with the idea on that forgotten forum.