Thursday, May 22, 2008

All About Computer Viruses

by: Kara Glover


Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net

Word Count = 1,500
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
Author photo: http://www.karathecomputertutor.com
Date of copyright: November 2004

All About Computer Viruses
by Kara Glover
kara333@earthlink.net

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

©2004 by Kara Glover
About the author:
Kara Glover is a Computer Tutor and Troubleshooter.
You can find her articles and tutorials on topics such as
Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com



Circulated by Article Emporium

A Guide To Basic Computer Terminology

by: Bonnie Archer
Ram? Mouse? One is an animal and one is a rodent right? Ram...that is the zodiac sign for Aries... If this is what these words mean to you than you can surely use this quick glossary of computer terminology. It would be a good idea to read through them before purchasing a computer because these are things you should know about first. If you already have a computer then these computer terms can help you know what to do if your new computer equipment is unfamiliar. Also, this computer terminology can help you if you have to call in for technical help.

Okay lets go!

Cache: Cache is another type of memory kindred to RAM. The computer uses cache to quickly move data between the RAM and the CPU.

CD-ROM Drive: Most new computers now come with a CD-ROM drive as standard equipment. A CD-ROM drive reads data from a disc. These CDs look like a music CD, but hold data instead of music. CD-ROMs also contain games, dictionaries, recipe files, and lots of other things that you can load onto your computer.

CPU: The CPU, or central processing unit, is the brains of the computer. Most new Windows based programs use a Pentium processor or a AMD Athlon XP. New Macs use a different type of CPU called Power PC.

Disk Drive:Virtually all computers come with a disk drive that can read and save information on portable diskettes, also called floppy disks. You can use floppy disks to save information or to load new software onto your computer.

Hard Drive: The hard drive is also called the hard disk. You'll probably never see it because it is nestled inside your computer. It's the computer's electronic filling cabinet, and it stores the computer's operating system, files, programs and documents.

Keyboard: Just like a typewriter keyboard, this device is the primary way of inputting data into the computer programs.

Megahertz (MHz): This is the clock speed of the microprocessor. The higher the number, the quicker the information is processed. MHz relates to how many millions of instructions can be processed per second.

Memory:This is the circuitry or device that holds information in an electrical or magnetic form. There is read-only memory (ROM), which is information primarily stored on a disk, and random-access memory (RAM), which is chip-based storage inside the computer. Memory is typically measured in megabytes (MBs).

Modem:This mechanism connects a computer to a phone line so information can be sent from one computer to another or the user can access an on-line service or the Internet. In view of the popularity of the Internet, a modem is now considered basic equipment and comes on practically all-new computers. Most modems come with fax capabilities.

Monitor: An output device that allows you to see what you are doing (it is what you are looking into right now to see this). Most computers come with 14 or 15-inch monitors. This size is good for most people's needs. Larger 17 or 21-inch monitors also are available, but may cost more. Myself, I prefer the 17-inch.

Motherboard:The motherboard is the circuit board that everything in the computer plugs into. The CPU, RAM and cache all plug into the motherboard.

Mouse: The mouse is another input device that makes getting around in your computer easier. It is a handheld object that is good for doing tasks such as moving and pointing to objects on the screen, and can replace the function and control keys of the keyboard. (If you need a lesson on how the mouse works and how to use it click here for a tutorial.)

Printer: A printer is an essential part of the computer if you want a hard copy of your work. There are four types of printers on the market: dot matrix, inkjet, bubble jet and laser. The dot matrix is the most basic. Most inkjets and bubble jets can print color and graphics, and a laser printer offers the best resolution at the highest speed.

RAM:Computers save data in two ways: on the hard drive and in random access memory or internal memory. New computer buyers should look for models with at least 16 MBs of RAM (or more, depending on what types of programs you'll be running). Make sure that the computer can be upgraded.

Scanner:A scanner is a useful accessory to have if you are working with lots of artwork or photos. This device can copy written documents, pictures or photographs directly into your computer. There are three types of scanners: handheld, hopper-feed and flatbed.

Sound Card: This device allows your computer to reproduce music, sounds and voices. Make sure you have a sound card if you're planning to play multimedia games.

Video Card: The video card is the part of the computer that sends the images to the monitor.

Well there you have it, a quick course on computer terms. I hope it has helped to guide you in your purchase of a new computer; or to help you with the one you have.

About the author:

About The Author
B. Archer is a successful author and publisher of
http://www.A1-computers.net- A great source of
information about computers and computer accessories.

Check Out Our Blog!
http://a1-computers.blogspot.com


Circulated by Article Emporium

After the best sourced advice relating to computer securityrisk model computer securit

by: Tom Brown
After the best sourced advice relating to computer securityrisk model computer securit When you are in search of top advice concerning computer securityrisk model computer security, you'll find it easier said than done extricating superior advice from misguided computer securityrisk model computer security submissions and support so it is wise to recognize ways of judging the information you are offered.

Here's a few tips that we think you should use when you're searching for information about computer securityrisk model computer security. You need to realize the recommendation we give is only applicable to internet based information regarding computer securityrisk model computer security. We cannot offer any assistance or guidance when you are also conducting research offline.

A great hint to follow when offered help and advice regarding a computer securityrisk model computer security article is to verify the ownership of the website. Doing this could reveal the owners computer securityrisk model computer security qualifications The easiest way to work out who is at the back of the computer securityrisk model computer security website is to look on the 'about' page or 'contact' page.

All reliable sites providing content on computer securityrisk model computer security, will almost certainly provide an 'about' or 'contact' page which will list the site owner's details. The details should make known key points about the owner's necessary expertise. This permits you to make an informed assessment about the vendor's insight and appreciation, to provide advice to you regarding computer securityrisk model computer security.



About the author:
Tom Brown is the webmaster at news-special-news.info


Circulated by Article Emporium

Sunday, May 18, 2008

Advice about the most up-to-date advice with reference to computer virus.

by: Tom
When you are trying to find the best information relating to computer virus, you will find it hard separating quality information from ill-equiped computer virus suggestions or help so it's prudent to know how to qualify the advice you are presented with.

Avocent: Network Security Solution
Provides KVM switching and network connectivity solutions for data centers. Includes desktop, rackmount and wireless KVM connections and extenders.



Here's a few guidelines which we think you should use when you are searching for information about computer virus. Understand that the guidance we give is only applicable to internet advice about computer virus. We are unable to offer any advice or guidance when you are also conducting research in books or magazines.

INSA: Network Security Services
Reseller of network security products, including firewalls, intrusion detection and prevention devices, anti-virus appliances, and more.



An excellent piece of advice to follow when you're presented with help and advice regarding a computer virus web is to research who is behind the website. This may show you who owns the site computer virus authorizations The easiest way to reveal who owns the computer virus website is to look on the 'about' page or 'contact' page.

Any worthwhile website providing information on computer virus, will almost certainly provide an 'about' or 'contact' page which will record the site owner's contact details. The details should make known some advice about the owner's necessary expertise. This means you can conduct an appraisal about the webmaster's depth of experience, to offer guidance about computer virus.

About the author:
Joe Brown is the webmaster for http://www.detailsspecialnews.info


Circulated by Article Emporium

Advice about the most informative opinion regarding computer.

by: Tom Brown
Advice about the most informative opinion regarding computer. When you're trying to find high-class advice about computer, you'll find it difficult extricating the best information from misguided computer suggestions and help so it's best to know ways of judging the information you are offered.

COMPUTER in the Free Online Encyclopedia
Read about COMPUTER in the free online encyclopedia and dictionary. Over 700,000 articles on any topic.


Here are several guidelines which we believe you should use when you're searching for information regarding computer. Please understand that the advice we offer is only relevant to internet information about computer. We don't offer any guidance or advice for conducting research offline.

A great hint to follow when you are presented with information or advice on a computer web page is to verify the ownership of the website. This may show you the people behind the site computer authority The easiest way to reveal who owns the computer website is to look on the 'about' page or 'contact' page.

Any reputable site providing information about computer, will almost always provide an 'about' or 'contact' page which will list the people behind the site. The particulars should reveal key points concerning the owner's requisite knowledge. This enables you to make an assessment about the vendor's education and practical knowledge, to offer guidance about computer.



About the author:
Tom Brown is the webmaster at databasespecialnews.info


Circulated by Article Emporium

Advice about the latest and accurate help concerning computer components.

by: Tom
When you're after superior information about computer components, it will be intricate unscrambling quality advice from misguided computer components submissions and help so it is important to know how to judge the information you are presented with.

CDW: Computer Hardware
Shop CDW.com for the latest desktops, notebooks, printers, electronics and more. Pay just $9.99 for Ground Service shipping of any order up to 70 lbs.



Here's a few guidelines which we really think you should use when you're seeking information about computer components. You need to realize the advice we tender is only pertinent to internet based information concerning computer components. We don't offer any guidance or advice if you are receiving information offline.

Dell Small Business: Hardware & Accessories
Offers weekly specials on a range of computer hardware and accessories.



A great hint to follow when you're presented with information and advice about a computer components article would be to determine who owns the site. This may show you the people behind the site computer components authority The easiest way to find out who is behind the computer components website is to look on the 'about' page or 'contact' page.

Any reputable site providing information concerning computer components, will almost certainly provide an 'about' webpage which will list the site owner's details. The info should make known some specifications regarding the owner's proficency and credentials. You can then arrive at a decision about the webmaster's familiarity and qualifications, to advise you on the topic of computer components.


About the author:
Tom Brown is the webmaster for http://www.fact-special-news.info


Circulated by Article Emporium

Advice about the best sourced advice relating to computer prices.

by: Tom
When you're seeking the best information relating to computer prices, it'll be complex separating superior information from foolish computer prices proposals and directions so it's best to know how to qualify the information you are given.

HP Business Store: Computers
Purchase computers online. Also find HP Compaq notebooks and desktops, HP printers, servers, handhelds, and storage solutions.



Here's a few tips which we believe you should use when you're searching for information about computer prices. You need to realize the guidance we put forward is only pertinent to web based information about computer prices. We can't offer you any guidance or tips for conducting research offline.

Ubid: Computers
Brand name marketplace offers computers and electronics, including accessories and software. Most auctions start at $1 and come with warranties.



A terrifc piece of advice you can follow when offered information or advice on a computer prices webpage would be to determine who owns the site. This may show you the people behind the site computer prices integrity The quickest way to work out who owns the computer prices website is to look on the 'about' page or 'contact' page.

All reputable sites providing information about computer prices, will nearly always have a 'contact', or an 'about', page which will record the owner's details. The details should divulge major points about the owner's necessary expertise. You can then make a judgement about the vendor's education and practical knowledge, to provide advice to you regarding computer prices.


About the author:
Tom Brown is the webmaster for http://www.misinformation-special-news.info


Circulated by Article Emporium

Access Your PC From The Road

by: Jim Edwards
© Jim Edwards - All Rights reserved
http://www.thenetreporter.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Have you ever sat in front of your computer and wished you could show someone else what appeared on your screen?

Maybe you were experiencing a problem, or couldn't figure out how to make something work, but you knew if someone else could see what was happening on your screen, they could help you fix the problem immediately.

Ever had a phone conversation with someone about a particular business topic, but you just couldn't "connect" with your ideas because it was too hard to explain over the phone?

Now, visualize jumping on the phone with that same person and literally sharing your computer's desktop to collaborate, discuss, and create virtually anything together, even if you are separated by thousands of miles.

Though this may sound like an episode of Star Trek, remote computer sharing is actually a daily business reality.

Imagine you need to take a trip and you either don't want to or can't take your computer.

The thought of emails piling up for days makes you crazy and you also need to monitor some things on your pc.

Instead of trying to lug your laptop (or fit your desktop into your suitcase), you can use "remote desktop" software that allows you to access your computer through the Internet from any other computer in the world.

One of the most common remote desktop services is GoToMyPC.com, which provides a safe and secure way for you to go down to the local internet café, log on, and access your office or home computer just like sitting at your own desk.

Now, before you panic and think anyone can access your computer, let me explain security.

First, you log in to the GoToMyPC.com website with a username and password.

Once logged in, you then click a link to log onto your PC, which will then ask you for another password.

GoToMyPC.com has even thought of a solution for those of you worried about people looking over your shoulder as you enter your passwords on a public computer or if the computer you use might carry a keystroke logger.

Before leaving home, you can program in a series of up to 99 passwords that only work one time.

This means even if someone watches you log into your computer or records your keystrokes, the password you used won't work again.

If a would-be thief tries to access your computer too many times, GoToMyPC.com will shut down all access attempts to your PC.

The benefits of remotely accessing your PC from the road are numerous, but the bottom line is that it enables you to use your computer from the road like you never left home.

For example: while traveling to a conference this weekend, my wife (and business partner) accessed our office computer from my laptop and, instead of the usual pile of 4,000 emails that would normally await after 5 days away, we just picked up this morning like we'd never been gone.

The same company that offers GoToMyPC.com also offers a service called GoToMeeting.com which allows you to remotely host a meeting where multiple users can share and collaborate on a single computer desktop.

This service makes it super simple to provide online training, do software demos, and even make complete sales presentations.

I personally use both of these services and find them easy, reliable and well worth the price.


About the author:
Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> http://www.turnwordsintotraffic.com


Circulated by Article Emporium

Saturday, May 10, 2008

A Basic Introduction To Spyware

by: Philippa Smith
Spyware is the most troublesome software to appear on the
Internet in recent times. When spyware infects a computer
system, it may be relatively harmless or it may be
devastating.

Spyware like coolwebsearch and new.net are capable of
paralyzing a computer system. Laws to regulate spyware are
pending in many states and may take years to enforce.

What Is Spyware?

Spyware is any software that collects information about
computer usage and/or the computer user. It is installed on
one computer and sends information to another computer.
Some spywares like the Weather Bug, Bear Share and Kazaa
are knowingly downloaded and installed by users. Other
spyware is installed without the knowledge or permission of
the user.

How Does Spyware Affect A Computer?

Symptoms of spyware infection includes:

* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google,
Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are
trying to dupe you into buying spy ware removal software.

Many spyware detection and elimination programs are easily
available for free on the Internet.

How Does One Deal With Spyware?

There are many tools and catalogues available to deal with
spyware. One of these tools is Spybot Search and Destroy.
It scans computers for spyware and harmful programs. It
shows a list of problem areas to the user and allows him to
delete any or all of them.

A user can leave legitimate programs installed by him.
These may include peer-to-peer file sharing software or
software installed to monitor the on-line activities of
children.

A Comprehensive Solution

It may be a good idea for most computer owners to get a
comprehensive PC security solution as a bundle. Norton and
McAfee, now offer a complete security suite consisting of
anti-virus, personal firewall, anti-spam and privacy
offerings, and anti-spy ware.

They are quite easy to install and allow parents to monitor
children who use the computer. There are many threats on
the Internet, from which these suites can protect your
computer.
===========================================================
Click to find a daily updated blog of articles and news
about spyware ! Get advice and information about how to
protect your computer from attack, and disinfect it.. Click
http://www.spyware-101.com/

About the author:
Philippa Smith runs a home business in los angeles. The
constant attacks on here computer caused her to learn all
about spyware & viruses, and how to deal with them.


Circulated by Article Emporium

5 Sure-Fire Tips for Buying a New Computer

by: John Lenaghan
So you're thinking of buying a new computer...

Where do you start? There are so many brands and models of computers available, and it can all be a little overwhelming when you start to look around.

How do you decide what type of computer you need? And perhaps more importantly, how do you decide what the best value is?

I have sold computers professionally for almost 20 years, and there are certain "tricks of the trade" that most computer stores and salespeople use. Knowing these secrets can make your decision easier and will help you buy the right computer for your needs.

1. Buy What You Need, Maybe a Little More

One of the most important things you can do when buying a new computer is make a list of the things that you will be using it for. There are so many different models - with different capabilities - that you can easily buy more, or less, than you really need if you don't.

If this is your first computer, this can be a little tougher. Until you've used a computer, it's hard to know exactly what you might want to do with it beyond the obvious, like connecting to the internet.

Regardless, you should think about some of the things you might want to do. Some possibilities include:

- Connect to the internet
- Play games
- Digital photography
- Digital video
- Type documents
- Accounting
- Design websites
- Programming
- Digital scrapbooking
- Geneology

Some of these things need more power than others. For example, connecting to the internet really doesn't need a lot of power. Even the most basic computer available will probably work just fine.

Digital video and many games need a lot more power. If you don't get a fast enough computer with enough memory, you'll be disappointed with the performance.

Knowing what you're going to be using your computer for will help your salesperson, whether they're on the phone, the internet or standing in front of you, recommend the best system for your needs.

As a general rule you're always better off buying more power than you need rather than less, but buying too much can be a waste of money.

2. Warranty Considerations

Computer warranties are one of the most confusing and obscure parts of your purchase. Most manufacturers have cut back on their customer service to the point where poor service has become a given.

The three most common options are onsite, carry-in or manufacturer's depot service.

Onsite service can be helpful, but think about whether you want to have to be available for a technician to come and diagnose your computer, and possibly have to come back with parts at another time.

Carry in service is a good option, but find out whether the service center is factory authorized for warranty repairs, as well as whether the technicians are all certified.

Shipping your computer to a factory service center can take a long time - sometimes a number of weeks. It also creates risk that your computer will be damaged or even lost in shipping. In some cases, the manufacturer will even replace your computer with another unit and ship it back to you, rather than repairing it. This can result in your losing any information that was on your system and having to reload all your software.

Another aspect of the warranty to find out about is technical support. Find out if the computer manufacturer offers a toll-free phone number and what the quality of service is like.

The better computer salespeople will be honest about this and tell you if a company's service leaves something to be desired. You can also do some research on the internet - most of the computer magazines like PC Magazine and PC World have annual customer service comparisons that rate the larger computer companies.

Always find out how the warranty is handled before making your decision. Even if it doesn't influence your choice, knowing what to expect if something does go wrong will save some nasty surprises down the road.

3. Can You Negotiate the Price Down?

A computer is a relatively large investment - anywhere from a few hundred to a few thousand dollars. Many computer buyers expect that there is a significant amount of "wiggle room" on the price.

The reality is that most computer hardware - the physical pieces like the computer, monitor and printer - is sold at very low profit margins. Often, computer systems are even sold at or below the dealer cost. When you're buying a computer, it never hurts to ask for a better deal, but don't be surprised if you only get a few dollars off, if anything.

Over the close to 20 years I've sold computers, I watched the profit margins go from over 40% to less than 5%. It's almost embarassing to offer a $20 discount on a $2500 computer system, but that could mean the difference between making and losing money on the sale.

What you can do to get the best price is to do some comparison shopping. Most computer stores offer price-matching guarantees, so if you find your computer for less at another store, most dealers will match or beat that price, even if it means they lose money.

4. How Do Computer Stores Make Any Money?

You might be wondering how these computer stores make any money if they're selling computer for so little profit.

Their money is made on add-on items. The highest profit areas in most computer stores are cables and "consumable" products such as printer ink and paper.

Printer ink is a huge money-maker for most computer stores (even more so for the printer manufacturers). Why is this? Once you've bought a printer, you're going to have to replace your ink at some point, and continue to replace it as it runs out.

Most chain computer stores and office supply stores that carry a large selection of ink cartridges make more from ink than they do from the computers themselves.

Cables also have huge markups. A cable that costs the store $2-3 will often sell for $20-30. That's ten times their cost!

If you're buying a new computer, you will likely need to buy some cables. Some items - printers, for example - don't often include the cables needed to hook them up.

Many printers also come with "starter" ink cartridges that are only half-full. You might also want to pick up some extra ink cartridges.

This is where you should be able to negotiate a better price. Don't expect the salesperson to throw them in for nothing, but they should be willing to offer you a better price. After all, if you're happy with their service, you'll probably continue to buy your ink, paper and other products from that store in the future.

5. What Software is Included?

The last secret of buying a new computer has to do with the software that is included. Most new computer systems include quite a few programs and sometimes the value of the software can be quite high.

Something to watch out for when looking at the included software is "trial versions" or "limited editions".

Many programs that are preloaded are either crippled versions that don't have all the features of the full program, or trial versions that will only run for a certain amount of time before they expire.

Computer are often sold with trial versions of the following types of software:

- antivirus
- firewall
- MS Office or other office suites
- Accounting - both business and personal

The computer manufacturers generally don't make it easy to tell whether the software on their systems are trial versions or limited versions. This is a question that you should specifically ask if you can't find the answer in their promotional information.

If you're buying a new computer with trial versions of the software, keep in mind that you will need to pay to continue using it after the trial period is over. This is an added cost that you need to consider as part of your overall budget.

These five "secrets" of buying a new computer are fairly common sense, but they are not always made clear up front. Knowing what to ask will help you in two ways. First, you can be sure you are getting the right computer for your needs.

Second, if the salesperson or company that you're dealing with explains these things to you without being asked, you'll know you're dealing with someone who is honest and upfront.

Knowing you can trust the people you're dealing with is an invaluable feature of your new computer system.

About the author:
John Lenaghan offers easy-to-understand advice at the Computer Help Squad website. Sign up for our newsletter and receive your free report "5 Critical Steps to Protecting Your Computer on the Internet" at http://www.computer-help-squad.com/5steps


Circulated by Article Emporium

3 Summer Computer Tips

by: Sharron Senter


Written By: Sharron Senter


#1 – Summer Computer Travel
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.

Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.

We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm

#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"

There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.

Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).

Best compromise. First user in the morning turns it on; last user turns it off.

We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.

#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!

About the author:
About the Author
Sharron Senter is co-founder of http://www.VisitingGeeks.com- an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. Learn more about Sharron at http://www.SharronSenter.com