title
Cleaning an Infected Windows PC

description
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2 Info Level: Beginner Date Created: January 14, 2012 Length of Class: 73 Minutes Tracks Computer Repair Prerequisites None Purpose of Class This class teaches the procedures and thought process behind trying to clean a Windows PC that has been infected with viruses. Chapters Introduction (00:00) First Steps (00:00) Uninstalling Crapware (00:00) Installing Security Software (00:00) Install ALL Updates (00:00) Run Scans (00:00) Final Thoughts (00:00) Class Notes Introduction Generally is a PC has a virus you should just do a Wipe and Reload Create a checklist for the procedures you will use to clean the PC Know when you will decide the computer is not repairable You can run the computer in Safe Mode is regular mode is not responsive. You access Safe Mode by pressing F8 while the PC boots, and then selecting "Safe Mode" option. MSCONFIG tool can be used to keep software from booting when the computer boots. To use MSCONFIG go to Start - Run - and then type MSCONFIG First Steps Try to do a System Restore to an earlier time before the computer had the virus with Windows built in System Restore Utility Use OpenDNS on your router to try to prevent the infected computer from "phoning home" Change the password on the system to prevent scripts from being able to easily modify configurations Reset Internet Explorer Settings to default to ensure that Internet Explorer will not block your attempts to download updates and software. Uninstall Crapware Uninstall ALL Toolbars and anything that you do not recognize Uninstall ALL Security, and "Tune Up" Software. This software can cause problems o the system. Use "Removal" tools to remove Norton or other Anti-Virus software if it does not uninstall correctly. Uninstallers for toolbars and "crapware" can many times be found within the folder that the software is installed in. Under C:\Program Folders. If crapware will not uninstall boot PC into Safe Mode, and then Rename the Folder that the Software is installed in. This will effectively brake the software. Tune Up Computer Use "Tune Up" software such as CCleaner to perform a basic Tune Up of the PC Delete ALL Temp files Defragment the Registry Disable Unnecessary Start Up Items Install Security Software Anti Virus Software is like condoms. One is good, but more then one is horrible. (Anti Virus software will attack each other) Minimize the number of "Tune Up" of Anti Malware pieces of software you use. These can actually cause problems unto themselves. Computer Security companies generally do a very good job creating one product, but then package that good product with other inferior ones into an "Internet Security Suite". I recommend you use different software from different manufacturers. Eli prefers Microsoft Security Essentials for Anti Virus, Spybot Search and Destroy for Anti Spyware, and Windows Firewall for Firewall. Immunize system immediately with Anti Malware software, but do not run scans yet. Disable "Registry Guards" such as Spybot's TeaTimer. these guards will ask you whether or not the computer should make a change to the Registry, and if you make the wrong choice you can create problems. Install ALL Updates Many times Updates themselves will fix problems with the PC, and disable Viruses and Malware Install ALL Windows and Office Updates Install Latest Adobe Reader and Flash Install Latest Java Install Updates to any other pieces of software on the PC (Quickbooks, iTunes, Quicktime, Word Perfect) Run Scans Run FULL Anti Virus Scan Run Anti Malware Scan You can run multiple scans at the same time If this does not fix the PC try Malwarebytes and Combofix (Only download Combofix from BleepingComputer.com, everywhere else is a piece of spyware) If computer still is infected then you must simply start trying to figure out how to remove the virus manually. Final Thoughts If you cannot remove the virus, but you can also not Wipe and Reload the system then you simply lock down the system as much as possible and use it as little as possible. Take a backup of the system, restrict user accounts to have as few rights as possible, etc. Resources Norton Removal Tool CCleaner Microsoft Security Essentials Combofix Malwarebytes

detail
{'title': 'Cleaning an Infected Windows PC', 'heatmap': [{'end': 759.096, 'start': 711.129, 'weight': 1}, {'end': 1335.347, 'start': 1295.77, 'weight': 0.907}, {'end': 2005.292, 'start': 1954.821, 'weight': 0.953}, {'end': 2453.588, 'start': 2401.478, 'weight': 0.71}, {'end': 2761.56, 'start': 2705.384, 'weight': 0.79}], 'summary': 'Discusses cleaning an infected windows pc, emphasizing the importance of regular maintenance, wipe and reload for 100% success rate, best practices for virus cleanup, and securing the network using opendns and strong passwords to prevent virus attacks.', 'chapters': [{'end': 70.277, 'segs': [{'end': 53.304, 'src': 'embed', 'start': 5.401, 'weight': 0, 'content': [{'end': 5.901, 'text': 'Hello again.', 'start': 5.401, 'duration': 0.5}, {'end': 10.965, 'text': "As you know, I'm Eli the Computer Guy over here at elithecomputerguy.com and everymanit.com.", 'start': 6.041, 'duration': 4.924}, {'end': 14.787, 'text': "Today's class is cleaning an infected Windows PC.", 'start': 11.025, 'duration': 3.762}, {'end': 18.45, 'text': 'So we just had a class on how to tune up your computer.', 'start': 15.228, 'duration': 3.222}, {'end': 20.671, 'text': 'So, when you tune up a computer,', 'start': 18.61, 'duration': 2.061}, {'end': 27.816, 'text': "basically what you're doing is you're taking a computer that's already pretty much okay and giving it the equivalent of an oil change.", 'start': 20.671, 'duration': 7.145}, {'end': 31.537, 'text': "you're deleting temporary files, you're defragmenting the registry.", 'start': 27.816, 'duration': 3.721}, {'end': 37.619, 'text': "basically you're taking a computer that, by and large, is okay and you're just making it run faster again.", 'start': 31.537, 'duration': 6.082}, {'end': 41.52, 'text': 'like i say, changing the oil filter, uh, air filter etc.', 'start': 37.619, 'duration': 3.901}, {'end': 42.701, 'text': 'for a computer.', 'start': 41.52, 'duration': 1.181}, {'end': 53.304, 'text': "well, today's class is going to be how to try to save a computer that has been infected with viruses, spyware, malware, uh, etc.", 'start': 42.701, 'duration': 10.603}], 'summary': 'Eli the computer guy discusses cleaning an infected windows pc and explains the process of tuning up a computer.', 'duration': 47.903, 'max_score': 5.401, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij05401.jpg'}], 'start': 5.401, 'title': 'Cleaning an infected windows pc', 'summary': 'Discusses the theory and concepts of cleaning an infected windows pc and emphasizes the importance of regular maintenance and the distinction between cleaning and tuning up a computer.', 'chapters': [{'end': 70.277, 'start': 5.401, 'title': 'Cleaning an infected windows pc', 'summary': 'Discusses the theory and concepts of cleaning an infected windows pc, following a class on tuning up a computer, emphasizing the importance of regular maintenance and the distinction between the two processes.', 'duration': 64.876, 'highlights': ['The process of cleaning an infected Windows PC involves removing viruses, spyware, and malware, with a focus on theory and concepts rather than specific tools.', 'Tuning up a computer involves deleting temporary files, defragmenting the registry, and making the computer run faster, akin to an oil change for a car.', 'The class emphasizes the changing nature of the tools and techniques used in cleaning infected PCs, with updates required every two to three to four months.']}], 'duration': 64.876, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij05401.jpg', 'highlights': ['The process of cleaning an infected Windows PC involves removing viruses, spyware, and malware, with a focus on theory and concepts rather than specific tools.', 'Tuning up a computer involves deleting temporary files, defragmenting the registry, and making the computer run faster, akin to an oil change for a car.', 'The class emphasizes the changing nature of the tools and techniques used in cleaning infected PCs, with updates required every two to three to four months.']}, {'end': 431.317, 'segs': [{'end': 160.24, 'src': 'embed', 'start': 128.864, 'weight': 0, 'content': [{'end': 134.389, 'text': 'I would suggest you do not ever try to clean out viruses from a computer.', 'start': 128.864, 'duration': 5.525}, {'end': 141.012, 'text': 'If you run out with a tool bag and you bill hourly, if they have a virus, just do a wipe and reload.', 'start': 134.749, 'duration': 6.263}, {'end': 152.817, 'text': "The reason is is because nowadays it is very difficult to get rid of viruses and it's almost impossible to warranty that you will have completely gotten rid of a virus.", 'start': 141.392, 'duration': 11.425}, {'end': 160.24, 'text': "So as you know, as a consultant, people don't feel so bad about giving you $200 or $300 to fix up their computer.", 'start': 153.237, 'duration': 7.003}], 'summary': "It's recommended to wipe and reload instead of cleaning viruses; people are willing to pay $200-$300 for computer fix.", 'duration': 31.376, 'max_score': 128.864, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0128864.jpg'}, {'end': 197.725, 'src': 'embed', 'start': 174.126, 'weight': 3, 'content': [{'end': 181.473, 'text': "So remember, when you're trying to remove viruses and spyware, I mean, these things are real pains in the asses.", 'start': 174.126, 'duration': 7.347}, {'end': 184.615, 'text': 'I mean the people that create new viruses,', 'start': 181.553, 'duration': 3.062}, {'end': 192.101, 'text': 'are on a level of programming engineering skill as the people who create QuickBooks and the Windows operating system.', 'start': 184.615, 'duration': 7.486}, {'end': 194.803, 'text': 'Now, these people are very, very, very, very, very good.', 'start': 192.141, 'duration': 2.662}, {'end': 197.725, 'text': 'So you can do a lot.', 'start': 196.304, 'duration': 1.421}], 'summary': 'Removing viruses and spyware requires high-level programming skills, equivalent to quickbooks and windows engineers.', 'duration': 23.599, 'max_score': 174.126, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0174126.jpg'}, {'end': 320.756, 'src': 'embed', 'start': 289.379, 'weight': 1, 'content': [{'end': 290.68, 'text': 'Remember I had a shop,', 'start': 289.379, 'duration': 1.301}, {'end': 304.861, 'text': 'we had 1800 work orders one year and we always did wipe and reloads because when my employees tried to be nice and tried to just get the viruses out you know We do a full try to clean out the viruses the computer would come back after a week.', 'start': 290.68, 'duration': 14.181}, {'end': 307.665, 'text': 'We do it some more, computer would come back after a week.', 'start': 305.342, 'duration': 2.323}, {'end': 315.875, 'text': "All of a sudden, you know, you've had a client come back three or four times and they are just super, super, super pissed off about it.", 'start': 307.805, 'duration': 8.07}, {'end': 320.756, 'text': "Now, as we're talking about this, is theory and concept.", 'start': 316.995, 'duration': 3.761}], 'summary': 'Shop had 1800 work orders, faced recurring virus issues causing client dissatisfaction.', 'duration': 31.377, 'max_score': 289.379, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0289379.jpg'}, {'end': 360.634, 'src': 'embed', 'start': 329.799, 'weight': 2, 'content': [{'end': 331.939, 'text': "Remember, we're doing engineering here.", 'start': 329.799, 'duration': 2.14}, {'end': 337.12, 'text': "You don't always have to fly by the seat of the pants for doing computers.", 'start': 334, 'duration': 3.12}, {'end': 343.342, 'text': "When you're doing things like tune-ups, when you're doing things like cleaning infections out of a computer, it is best to come up with a checklist.", 'start': 337.28, 'duration': 6.062}, {'end': 348.19, 'text': "And so you know your steps that you're going to take while you're cleaning out the computer.", 'start': 343.849, 'duration': 4.341}, {'end': 352.211, 'text': "So you can say, the first thing I'm going to do is do CC Cleaner and clean out temp files.", 'start': 348.55, 'duration': 3.661}, {'end': 353.152, 'text': "Then I'm going to do this.", 'start': 352.291, 'duration': 0.861}, {'end': 353.932, 'text': "Then I'm going to do this.", 'start': 353.232, 'duration': 0.7}, {'end': 354.752, 'text': "Then I'm going to do this.", 'start': 353.992, 'duration': 0.76}, {'end': 356.893, 'text': 'And you have a nice little checklist.', 'start': 355.072, 'duration': 1.821}, {'end': 360.634, 'text': 'Because again, these viruses can be a real pain in the butt to get rid of.', 'start': 357.113, 'duration': 3.521}], 'summary': 'Use a checklist for computer tune-ups and cleaning to ensure systematic approach and efficient virus removal.', 'duration': 30.835, 'max_score': 329.799, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0329799.jpg'}], 'start': 70.277, 'title': 'Virus cleaning and management', 'summary': 'Discusses the challenges and considerations for cleaning infected computers, emphasizing the recommendation of wipe and reload, based on a study of 1800 work orders, and the importance of having a checklist for virus removal.', 'chapters': [{'end': 239.197, 'start': 70.277, 'title': 'Virus cleaning process and considerations', 'summary': 'Discusses the thought process and considerations for cleaning infected computers, emphasizing the challenges of virus removal and the recommendation of wipe and reload for consultants and the time commitment for personal and organizational networks.', 'duration': 168.92, 'highlights': ["It's recommended for consultants to do a wipe and reload instead of cleaning viruses due to the difficulty and uncertainty of complete virus removal, as clients want a permanent solution after paying for the service. Consultants are advised to do a wipe and reload instead of cleaning viruses due to the difficulty and uncertainty of complete virus removal, as clients want a permanent solution after paying for the service.", 'Virus creators have high-level programming skills, making it challenging to completely remove viruses, and they can reappear even after extensive cleaning efforts, making it important to consider the time commitment for virus removal. Virus creators have high-level programming skills, making it challenging to completely remove viruses, and they can reappear even after extensive cleaning efforts, making it important to consider the time commitment for virus removal.', "For personal computers or computers within a network, it may be worthwhile to invest time in virus removal, but for IT support personnel in a company, the decision depends on the time commitment and whether it's worth the effort. For personal computers or computers within a network, it may be worthwhile to invest time in virus removal, but for IT support personnel in a company, the decision depends on the time commitment and whether it's worth the effort."]}, {'end': 431.317, 'start': 239.857, 'title': 'Computer virus management', 'summary': 'Discusses the challenges of computer virus management, advocating for a wipe and reload approach due to the difficulty of completely removing viruses, as seen from 1800 work orders in a shop, and emphasizes the importance of having a checklist for virus removal.', 'duration': 191.46, 'highlights': ['The chapter emphasizes the effectiveness of a wipe and reload approach for fixing computers with viruses, based on the experience of 1800 work orders in a shop, where attempting to clean viruses led to client dissatisfaction and repeat visits.', 'The importance of having a checklist for virus removal is stressed, as it provides a systematic approach to cleaning infections out of a computer, reducing the risk of forgetting steps and saving time during the cleaning process.', 'The difficulty of completely removing viruses is highlighted, especially root kits, and the need to recognize when to switch from attempting to clean the virus to performing a wipe and reload, regardless of the time invested in cleaning the computer.', 'The advice for IT professionals to adopt a consulting mindset and bill clients for virus removal services, with a suggested hourly rate of 50 to 100 bucks, is mentioned, advocating for a business-oriented approach to virus management.']}], 'duration': 361.04, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij070277.jpg', 'highlights': ["It's recommended for consultants to do a wipe and reload instead of cleaning viruses due to the difficulty and uncertainty of complete virus removal, as clients want a permanent solution after paying for the service.", 'The chapter emphasizes the effectiveness of a wipe and reload approach for fixing computers with viruses, based on the experience of 1800 work orders in a shop, where attempting to clean viruses led to client dissatisfaction and repeat visits.', 'The importance of having a checklist for virus removal is stressed, as it provides a systematic approach to cleaning infections out of a computer, reducing the risk of forgetting steps and saving time during the cleaning process.', 'Virus creators have high-level programming skills, making it challenging to completely remove viruses, and they can reappear even after extensive cleaning efforts, making it important to consider the time commitment for virus removal.']}, {'end': 964.862, 'segs': [{'end': 569.866, 'src': 'embed', 'start': 542.276, 'weight': 2, 'content': [{'end': 550.665, 'text': 'So if you boot up into safe mode, you may then be able to go in and delete files, rename folders, uninstall some software, that kind of stuff.', 'start': 542.276, 'duration': 8.389}, {'end': 563.32, 'text': 'The other tool that you can use is, once you boot into safe mode, you can do start run and then you type in the command msconfig m-s-c-o-n-f-i-g.', 'start': 551.066, 'duration': 12.254}, {'end': 569.866, 'text': 'this brings up a tool that allows you to say what services, drivers, etc.', 'start': 563.32, 'duration': 6.546}], 'summary': 'In safe mode, users can delete files, uninstall software, and manage system configuration using msconfig command.', 'duration': 27.59, 'max_score': 542.276, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0542276.jpg'}, {'end': 652.229, 'src': 'embed', 'start': 624.584, 'weight': 0, 'content': [{'end': 628.685, 'text': 'If you are a consultant, all the rest of this is completely and utterly academic.', 'start': 624.584, 'duration': 4.101}, {'end': 630.025, 'text': 'You should never do this.', 'start': 629.065, 'duration': 0.96}, {'end': 637.387, 'text': "The only time you're going to be cleaning an infected Windows PC again, if it's your computer and you have time to waste,", 'start': 630.585, 'duration': 6.802}, {'end': 642.683, 'text': "if you're an employee and you have your employer's salary to waste, etc.", 'start': 637.387, 'duration': 5.296}, {'end': 652.229, 'text': 'Basically, if you have more time than you know what to do with, if time is free for you, then clean and infected Windows PC.', 'start': 642.723, 'duration': 9.506}], 'summary': 'Consultants should not waste time cleaning infected windows pcs.', 'duration': 27.645, 'max_score': 624.584, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0624584.jpg'}, {'end': 759.096, 'src': 'heatmap', 'start': 711.129, 'weight': 1, 'content': [{'end': 712.794, 'text': 'Give me a second and we will dive into this class.', 'start': 711.129, 'duration': 1.665}, {'end': 725.38, 'text': "So let's talk about the first steps that you're going to take when you start trying to clean a Windows PC.", 'start': 718.459, 'duration': 6.921}, {'end': 735.462, 'text': "The first steps you're going to try to take basically are going to be to try to contain the viruses and contain the malware so that they don't get any worse.", 'start': 725.68, 'duration': 9.782}, {'end': 741.064, 'text': "You don't want the infections to get worse as you're trying to work on the computer.", 'start': 735.982, 'duration': 5.082}, {'end': 743.444, 'text': "It's just a bad thing all the way around.", 'start': 741.144, 'duration': 2.3}, {'end': 751.212, 'text': 'Now, now the first thing that I want you to try to do is trying to do something called system restore.', 'start': 743.908, 'duration': 7.304}, {'end': 755.674, 'text': "So if you're, if you're using windows or Vista, you can just in the little run bar type system restore.", 'start': 751.252, 'duration': 4.422}, {'end': 759.096, 'text': "If you're using windows XP, you can go to system restore.", 'start': 755.694, 'duration': 3.402}], 'summary': 'First steps in cleaning a windows pc: contain viruses and malware, use system restore.', 'duration': 47.967, 'max_score': 711.129, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0711129.jpg'}, {'end': 913.424, 'src': 'embed', 'start': 879.762, 'weight': 1, 'content': [{'end': 881.644, 'text': "And now you're not just cleaning one virus out.", 'start': 879.762, 'duration': 1.882}, {'end': 883.426, 'text': "You're now trying to clean 20 viruses out.", 'start': 881.664, 'duration': 1.762}, {'end': 890.753, 'text': "So the quicker that you can try to do the system restore, the more likely it is that you'll just be able to eliminate that virus altogether.", 'start': 883.726, 'duration': 7.027}, {'end': 895.115, 'text': "You'll be able to reinstall your security software and go on with your day.", 'start': 891.093, 'duration': 4.022}, {'end': 899.257, 'text': "Again, if it's your computer, you'll most likely be able to do this very quickly.", 'start': 895.555, 'duration': 3.702}, {'end': 905.5, 'text': "If you're in the corporate environment again, employees may dork around with their computer for a little bit,", 'start': 899.277, 'duration': 6.223}, {'end': 910.863, 'text': "but after an hour or two they're going to call the help desk and they're going to have somebody come to try to fix their computer.", 'start': 905.5, 'duration': 5.363}, {'end': 913.424, 'text': 'Again, the computer probably is not going to be too bad.', 'start': 910.943, 'duration': 2.481}], 'summary': 'System restore can eliminate 20 viruses quickly, enabling swift recovery and reinstatement of security software.', 'duration': 33.662, 'max_score': 879.762, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0879762.jpg'}], 'start': 431.798, 'title': 'Cleaning infected windows pc', 'summary': 'Provides a detailed guide on cleaning infected windows pcs, including entering safe mode, using msconfig to manage startup items, and emphasizing the recommendation to wipe and reload if working as a consultant. it also highlights the importance of using system restore to eliminate viruses, emphasizing the need for quick action to prevent the spread of multiple viruses and malware.', 'chapters': [{'end': 683.381, 'start': 431.798, 'title': 'Cleaning infected windows pc', 'summary': 'Discusses the process of cleaning an infected windows pc, focusing on entering safe mode, using msconfig to manage startup items, and emphasizing the recommendation to wipe and reload if working as a consultant.', 'duration': 251.583, 'highlights': ['Entering safe mode in a Windows PC allows the operating system to boot with minimal services, enabling users to perform tasks such as deleting files and uninstalling software. Entering safe mode in a Windows PC allows the operating system to boot with minimal services.', 'Using msconfig tool in safe mode enables users to manage startup items, services, and drivers, providing the option to disable them for the normal mode startup. Using msconfig tool in safe mode enables users to manage startup items, services, and drivers.', 'The recommendation for consultants is to avoid cleaning infected Windows PCs and instead opt for wiping and reloading the system, emphasizing the value of time and the inefficiency of cleaning infected PCs. The recommendation for consultants is to avoid cleaning infected Windows PCs and instead opt for wiping and reloading the system.']}, {'end': 964.862, 'start': 683.421, 'title': 'Cleaning infected windows pc', 'summary': 'Discusses the importance of using system restore to eliminate viruses from infected windows pcs, emphasizing the need for quick action to prevent the spread of multiple viruses and malware.', 'duration': 281.441, 'highlights': ['System restore can be used to go back to a previous point in time on a Windows PC, potentially eliminating viruses that were installed after that point.', 'Acting quickly to perform system restore is crucial to prevent the installation of multiple viruses and malware, as the longer a virus remains, the higher the likelihood of additional infections.', 'In a corporate setting, employees are likely to seek help for infected computers within an hour or two, making it easier to resolve the issue if detected early.', 'Noticing a virus on a computer for a week or more significantly reduces the chances of successful virus removal, emphasizing the importance of prompt action.', 'The chapter highlights the necessity of performing system restore to a few days before the virus infection to potentially eliminate the virus and subsequent scans for a clean PC.']}], 'duration': 533.064, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0431798.jpg', 'highlights': ['The recommendation for consultants is to avoid cleaning infected Windows PCs and instead opt for wiping and reloading the system, emphasizing the value of time and the inefficiency of cleaning infected PCs.', 'Acting quickly to perform system restore is crucial to prevent the installation of multiple viruses and malware, as the longer a virus remains, the higher the likelihood of additional infections.', 'Entering safe mode in a Windows PC allows the operating system to boot with minimal services, enabling users to perform tasks such as deleting files and uninstalling software.', 'Using msconfig tool in safe mode enables users to manage startup items, services, and drivers, providing the option to disable them for the normal mode startup.', 'In a corporate setting, employees are likely to seek help for infected computers within an hour or two, making it easier to resolve the issue if detected early.']}, {'end': 1443.126, 'segs': [{'end': 1037.323, 'src': 'embed', 'start': 1015.094, 'weight': 0, 'content': [{'end': 1023.276, 'text': 'Basically, within their configurations, they have domain names and they try to go out to those domain names and communicate with those home servers.', 'start': 1015.094, 'duration': 8.182}, {'end': 1027.117, 'text': 'Maybe they try to send data, maybe they try to bring in viruses, etc.', 'start': 1023.316, 'duration': 3.801}, {'end': 1030.46, 'text': 'So one of the things you want to do is try to stop that process.', 'start': 1027.417, 'duration': 3.043}, {'end': 1037.323, 'text': 'OpenDNS is a service that tries to block that DNS connection from happening.', 'start': 1031.079, 'duration': 6.244}], 'summary': 'Opendns blocks malicious dns connections to protect against data breaches and viruses.', 'duration': 22.229, 'max_score': 1015.094, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01015094.jpg'}, {'end': 1125.775, 'src': 'embed', 'start': 1102.162, 'weight': 1, 'content': [{'end': 1108.687, 'text': "The next thing that you should do is you should change the password or put a password onto the computer that you're working on.", 'start': 1102.162, 'duration': 6.525}, {'end': 1113.11, 'text': 'Many people nowadays still do not use passwords on their computer.', 'start': 1109.187, 'duration': 3.923}, {'end': 1125.775, 'text': 'The problem with this is that these viruses can script themselves or basically can do things on the computer simply using the username administrator with a blank password.', 'start': 1113.47, 'duration': 12.305}], 'summary': 'Change or set a password for computer security.', 'duration': 23.613, 'max_score': 1102.162, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01102162.jpg'}, {'end': 1240.942, 'src': 'embed', 'start': 1213.95, 'weight': 2, 'content': [{'end': 1222.115, 'text': 'The first thing, again, as soon as possible, do a system restore to try to put yourself to two days before when the virus infected the computer.', 'start': 1213.95, 'duration': 8.165}, {'end': 1227.262, 'text': "Then use a secure little network that you're going to plug this computer into.", 'start': 1222.779, 'duration': 4.483}, {'end': 1233.581, 'text': 'I would say do your own little DMZ or demilitarized zone where only infected computers are on.', 'start': 1227.759, 'duration': 5.822}, {'end': 1240.942, 'text': "So if you have a workbench, secure your workbench network so that the computer also doesn't try to infect other computers on the network.", 'start': 1233.661, 'duration': 7.281}], 'summary': 'Do a system restore, use a secure network, create a dmz to prevent infection.', 'duration': 26.992, 'max_score': 1213.95, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01213950.jpg'}, {'end': 1303.557, 'src': 'embed', 'start': 1274.594, 'weight': 6, 'content': [{'end': 1283.239, 'text': "Again as we go further and you start installing software and trying to download updates, and If your Internet Explorer hasn't been reset,", 'start': 1274.594, 'duration': 8.645}, {'end': 1284.8, 'text': 'it can cause a lot of problems.', 'start': 1283.239, 'duration': 1.561}, {'end': 1289.805, 'text': "So those are the first steps that you're going to be taking when you're going to be cleaning up an infected Windows PC.", 'start': 1284.84, 'duration': 4.965}, {'end': 1303.557, 'text': "Now, the next thing that you're going to do is you're going to uninstall all the crap that is on the computer.", 'start': 1295.77, 'duration': 7.787}], 'summary': 'Cleaning up an infected windows pc involves resetting internet explorer and uninstalling unnecessary software.', 'duration': 28.963, 'max_score': 1274.594, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01274594.jpg'}, {'end': 1335.347, 'src': 'heatmap', 'start': 1295.77, 'weight': 0.907, 'content': [{'end': 1303.557, 'text': "Now, the next thing that you're going to do is you're going to uninstall all the crap that is on the computer.", 'start': 1295.77, 'duration': 7.787}, {'end': 1306.78, 'text': 'Now, it is just horrible.', 'start': 1303.957, 'duration': 2.823}, {'end': 1310.442, 'text': 'It is horrible what users do to their poor little computers.', 'start': 1307.319, 'duration': 3.123}, {'end': 1316.447, 'text': 'They just install every possible thing that they find.', 'start': 1310.842, 'duration': 5.605}, {'end': 1319.67, 'text': "They're like kids in a candy store when it comes to applications.", 'start': 1316.467, 'duration': 3.203}, {'end': 1323.693, 'text': "They're like, oh, let me try this and let me try this and let me try this and let me try this and let me try this.", 'start': 1319.69, 'duration': 4.003}, {'end': 1329.238, 'text': "Many times, not only are the applications that they're installing viruses,", 'start': 1324.734, 'duration': 4.504}, {'end': 1335.347, 'text': 'but a lot of times the applications and the software that they are installing can just cause problems.', 'start': 1329.238, 'duration': 6.109}], 'summary': 'Users install numerous unnecessary applications, leading to computer issues.', 'duration': 39.577, 'max_score': 1295.77, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01295770.jpg'}, {'end': 1422.159, 'src': 'embed', 'start': 1390.413, 'weight': 8, 'content': [{'end': 1393.274, 'text': 'Again, not just the crapware, not just the toolbars.', 'start': 1390.413, 'duration': 2.861}, {'end': 1394.774, 'text': 'Make sure to get rid of all those toolbars.', 'start': 1393.314, 'duration': 1.46}, {'end': 1397.815, 'text': 'Toolbars are horrible as pieces of malware.', 'start': 1394.834, 'duration': 2.981}, {'end': 1401.336, 'text': 'Basically, they do redirection for Internet Explorer.', 'start': 1398.255, 'duration': 3.081}, {'end': 1402.976, 'text': 'They can just cause a whole bunch of problems.', 'start': 1401.376, 'duration': 1.6}, {'end': 1409.198, 'text': 'But beyond that, I actually want you to uninstall all the security software on the computer.', 'start': 1403.416, 'duration': 5.782}, {'end': 1412.558, 'text': 'Security software is much like condoms.', 'start': 1410.018, 'duration': 2.54}, {'end': 1415.539, 'text': 'One is good.', 'start': 1414.339, 'duration': 1.2}, {'end': 1422.159, 'text': 'Two, Three, four, five actually makes it worse.', 'start': 1415.559, 'duration': 6.6}], 'summary': 'Remove toolbars, uninstall extra security software for better computer performance.', 'duration': 31.746, 'max_score': 1390.413, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01390413.jpg'}], 'start': 964.862, 'title': 'Network security and windows pc cleaning', 'summary': 'Focuses on securing the network using opendns and strong passwords to block malicious servers and prevent virus attacks. it also outlines steps to clean an infected windows pc, including system restore, network security, opendns usage, password change, internet explorer reset, and uninstalling unnecessary applications and security software.', 'chapters': [{'end': 1148.402, 'start': 964.862, 'title': 'Secure network and password protection', 'summary': 'Emphasizes the importance of securing the network using opendns to block malicious servers and setting up a strong password to prevent unauthorized access and potential virus attacks.', 'duration': 183.54, 'highlights': ['Using OpenDNS to block malicious servers is crucial for network security. OpenDNS blocks connections to infected servers, preventing potential virus infections. It is important for securing the network and preventing unauthorized access. The service is effective in blocking malicious websites and preventing pop-up ads, as demonstrated by the example of preventing porn site pop-ups.', "Setting up a strong password on the computer is essential to prevent unauthorized access and potential virus attacks. Having a strong password on the computer is crucial to prevent unauthorized access and potential virus attacks. Without a password, malicious software can easily execute tasks using the default username 'administrator' with a blank password, posing significant security risks."]}, {'end': 1443.126, 'start': 1148.742, 'title': 'Cleaning infected windows pc', 'summary': 'Outlines the steps to clean an infected windows pc, including system restore, network security, opendns usage, password change, internet explorer reset, and uninstalling unnecessary applications and security software.', 'duration': 294.384, 'highlights': ['Utilize system restore to revert to a previous state before the virus infection. System restore can revert the computer to a state before virus infection, mitigating its impact.', 'Implement a secure network for the infected computer to prevent it from infecting other systems. Securing the network prevents the infected computer from spreading the virus to other systems, mitigating further damage.', 'Utilize OpenDNS to block connections for viruses attempting to communicate and spread. OpenDNS can effectively block virus communication and prevent further spread, enhancing system security.', 'Change the password to prevent unauthorized access and control by malicious scripts. Changing the password prevents unauthorized access and control by malicious scripts, strengthening system security.', 'Reset Internet Explorer settings to resolve potential issues caused by the virus. Resetting Internet Explorer settings can resolve virus-induced problems and enhance system stability and security.', 'Uninstall unnecessary applications and software from the infected computer. Removing unnecessary applications and software reduces the risk of virus-laden or problematic software causing further issues, improving system stability and security.', 'Uninstall security software to avoid conflicts and ensure optimal protection. Removing excess security software reduces conflicts and ensures efficient protection, enhancing system security.']}], 'duration': 478.264, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij0964862.jpg', 'highlights': ['Using OpenDNS to block malicious servers is crucial for network security. OpenDNS blocks connections to infected servers, preventing potential virus infections.', 'Setting up a strong password on the computer is essential to prevent unauthorized access and potential virus attacks.', 'Utilize system restore to revert to a previous state before the virus infection. System restore can revert the computer to a state before virus infection, mitigating its impact.', 'Implement a secure network for the infected computer to prevent it from infecting other systems. Securing the network prevents the infected computer from spreading the virus to other systems, mitigating further damage.', 'Utilize OpenDNS to block connections for viruses attempting to communicate and spread. OpenDNS can effectively block virus communication and prevent further spread, enhancing system security.', 'Change the password to prevent unauthorized access and control by malicious scripts. Changing the password prevents unauthorized access and control by malicious scripts, strengthening system security.', 'Reset Internet Explorer settings to resolve potential issues caused by the virus. Resetting Internet Explorer settings can resolve virus-induced problems and enhance system stability and security.', 'Uninstall unnecessary applications and software from the infected computer. Removing unnecessary applications and software reduces the risk of virus-laden or problematic software causing further issues, improving system stability and security.', 'Uninstall security software to avoid conflicts and ensure optimal protection. Removing excess security software reduces conflicts and ensures efficient protection, enhancing system security.']}, {'end': 2412.664, 'segs': [{'end': 1522.947, 'src': 'embed', 'start': 1490.814, 'weight': 0, 'content': [{'end': 1497.296, 'text': 'Uninstall McAfee, AVG, Microsoft Security Essentials, WebRoot, Spy Sweeper, tune-up software.', 'start': 1490.814, 'duration': 6.482}, {'end': 1501.818, 'text': 'So if they have three or four different types of pieces of tune-up software, get all of that off of there.', 'start': 1497.336, 'duration': 4.482}, {'end': 1509.38, 'text': 'The reason is because all of this software is going to be trying to do changes to the configurations of your computer.', 'start': 1502.138, 'duration': 7.242}, {'end': 1513.222, 'text': 'And those changes may or may not be good.', 'start': 1509.62, 'duration': 3.602}, {'end': 1522.947, 'text': "Just because the client spent 80 bucks on a piece of tune-up software doesn't mean that tune-up software is worth a damn and doesn't mean it's not causing problems to the computer.", 'start': 1513.702, 'duration': 9.245}], 'summary': 'Uninstall multiple tune-up software to avoid conflicting changes to computer configurations.', 'duration': 32.133, 'max_score': 1490.814, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01490814.jpg'}, {'end': 1633.491, 'src': 'embed', 'start': 1610.143, 'weight': 1, 'content': [{'end': 1617.285, 'text': "So on your computer, again, in this class, I'm not going to argue about which piece of antivirus software you should use.", 'start': 1610.143, 'duration': 7.142}, {'end': 1618.326, 'text': "That's up to you.", 'start': 1617.665, 'duration': 0.661}, {'end': 1620.306, 'text': 'I like Microsoft Security Essentials.', 'start': 1618.346, 'duration': 1.96}, {'end': 1622.747, 'text': 'But you should only use one.', 'start': 1621.147, 'duration': 1.6}, {'end': 1624.108, 'text': 'Only use Norton.', 'start': 1623.348, 'duration': 0.76}, {'end': 1625.488, 'text': 'Only use McAfee.', 'start': 1624.548, 'duration': 0.94}, {'end': 1629.75, 'text': 'Only use Kaspersky or AVG or Panda or Microsoft Security Essentials.', 'start': 1625.728, 'duration': 4.022}, {'end': 1633.491, 'text': 'Whatever the hell you use, only use one.', 'start': 1630.11, 'duration': 3.381}], 'summary': 'Choose and use only one antivirus software for your computer, such as microsoft security essentials, norton, mcafee, kaspersky, avg, or panda.', 'duration': 23.348, 'max_score': 1610.143, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01610143.jpg'}, {'end': 1741.856, 'src': 'embed', 'start': 1716.761, 'weight': 2, 'content': [{'end': 1721.864, 'text': 'A lot of times that settings, uh, that are stuck in the computer from the antivirus software.', 'start': 1716.761, 'duration': 5.103}, {'end': 1728.628, 'text': 'So Again, all you have to do is, after you uninstall Norton or McAfee or Kaspersky or whatever,', 'start': 1722.305, 'duration': 6.323}, {'end': 1736.452, 'text': 'download the removal tool for the software from the manufacturer, and then that will rip out all those extra settings.', 'start': 1728.628, 'duration': 7.824}, {'end': 1741.856, 'text': "Again, I've seen this with Norton where when you try to run the uninstaller, the uninstaller would just fail for some reason.", 'start': 1736.572, 'duration': 5.284}], 'summary': "Removing antivirus software using manufacturer's removal tool resolves extra settings stuck in the computer.", 'duration': 25.095, 'max_score': 1716.761, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01716761.jpg'}, {'end': 1876.86, 'src': 'embed', 'start': 1833.202, 'weight': 3, 'content': [{'end': 1840.848, 'text': "So basically, a lot of times they'll hide the uninstaller within the folder that the application or toolbar is installed.", 'start': 1833.202, 'duration': 7.646}, {'end': 1848.214, 'text': "Now the final thing, if you're having a problem getting rid of toolbars, getting rid of some of the security software, etc.", 'start': 1841.308, 'duration': 6.906}, {'end': 1855.78, 'text': ', one of the things that you can do is you can rename the folder where that software is installed.', 'start': 1849.154, 'duration': 6.626}, {'end': 1866.25, 'text': 'So in order for the software to work, you always have to have pointers within the software pointing back to different files that the software uses.', 'start': 1856.141, 'duration': 10.109}, {'end': 1876.86, 'text': "So if you rename the folder where that application is installed, those pointers will now point to a folder that doesn't exist.", 'start': 1866.671, 'duration': 10.189}], 'summary': "To remove toolbars or security software, consider renaming the software's folder to break the pointers to non-existing files.", 'duration': 43.658, 'max_score': 1833.202, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01833202.jpg'}, {'end': 2014.215, 'src': 'heatmap', 'start': 1954.821, 'weight': 7, 'content': [{'end': 1958.563, 'text': 'If the client needs it, or if you need it, you can reinstall it later.', 'start': 1954.821, 'duration': 3.742}, {'end': 1966.048, 'text': 'Again, with all this, remember with security software, I try to give you ways to think about this so that it makes sense.', 'start': 1959.105, 'duration': 6.943}, {'end': 1968.308, 'text': 'Think about security software like condoms.', 'start': 1966.188, 'duration': 2.12}, {'end': 1969.429, 'text': 'One is good.', 'start': 1968.869, 'duration': 0.56}, {'end': 1972.07, 'text': "More than one isn't.", 'start': 1970.969, 'duration': 1.101}, {'end': 1974.551, 'text': "It's just a bad thing.", 'start': 1972.51, 'duration': 2.041}, {'end': 1978.612, 'text': "And again, with the antivirus software, I've had a big problem with this.", 'start': 1974.931, 'duration': 3.681}, {'end': 1984.617, 'text': "out normally, you can't uninstall it normally, so you may have to use it.", 'start': 1981.272, 'duration': 3.345}, {'end': 1986.279, 'text': "It's called the Norton Removal Tool.", 'start': 1984.637, 'duration': 1.642}, {'end': 1993.188, 'text': 'Just Google it, you can get it from the Norton website and that will go in and it will rip out all of the software.', 'start': 1986.719, 'duration': 6.469}, {'end': 2005.292, 'text': "So, once you've uninstalled all the crapware, the anti-virus software, all that on the computer,", 'start': 1999.81, 'duration': 5.482}, {'end': 2009.734, 'text': "the next thing you're going to do is you're going to do a very quick tune-up of the computer.", 'start': 2005.292, 'duration': 4.442}, {'end': 2014.215, 'text': 'So, with the tune-up, we had a full class, a 30-minute class on tune-up.', 'start': 2010.174, 'duration': 4.041}], 'summary': 'Advice on uninstalling and re-installing security software, using norton removal tool for antivirus, and performing a quick tune-up.', 'duration': 59.394, 'max_score': 1954.821, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01954821.jpg'}, {'end': 2251.594, 'src': 'embed', 'start': 2217.356, 'weight': 5, 'content': [{'end': 2223.338, 'text': "And again, if there's some malicious piece of software that you've missed,", 'start': 2217.356, 'duration': 5.982}, {'end': 2227.4, 'text': "you'll be able to make sure that it doesn't start when the rest of the computer starts.", 'start': 2223.338, 'duration': 4.062}, {'end': 2229.841, 'text': "So that's the next thing you're going to be doing is a tune-up.", 'start': 2227.74, 'duration': 2.101}, {'end': 2234.843, 'text': 'Again, clean out the temporary files, defragment the registry, disable the startup items.', 'start': 2229.941, 'duration': 4.902}, {'end': 2237.784, 'text': 'I would say use a piece of software called CCleaner.', 'start': 2235.203, 'duration': 2.581}, {'end': 2240.265, 'text': "But again, there's a lot of different software out there.", 'start': 2238.184, 'duration': 2.081}, {'end': 2241.245, 'text': 'You can use whatever you like.', 'start': 2240.365, 'duration': 0.88}, {'end': 2251.594, 'text': 'So now we get to installing the security software on your computer.', 'start': 2247.13, 'duration': 4.464}], 'summary': 'Perform a tune-up by cleaning temporary files, defragmenting registry, and disabling startup items using ccleaner or a preferred software before installing security software.', 'duration': 34.238, 'max_score': 2217.356, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02217356.jpg'}, {'end': 2357.614, 'src': 'embed', 'start': 2331.393, 'weight': 6, 'content': [{'end': 2339.077, 'text': 'so what i would suggest you do is you always try to find the best in class or what is going to do best for you.', 'start': 2331.393, 'duration': 7.684}, {'end': 2346.771, 'text': 'so with me, i always install anti-virus software from one manufacturer, anti-malware software from another manufacturer and, frankly,', 'start': 2339.077, 'duration': 7.694}, {'end': 2350.312, 'text': 'I leave the firewall as Windows firewall.', 'start': 2346.771, 'duration': 3.541}, {'end': 2357.614, 'text': "One of the things again, when you're looking at security software, you don't just have to look at its ability to rip out viruses and malware,", 'start': 2350.852, 'duration': 6.762}], 'summary': 'Install best-in-class antivirus and anti-malware software, use windows firewall.', 'duration': 26.221, 'max_score': 2331.393, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02331393.jpg'}], 'start': 1443.447, 'title': 'Best security software practices', 'summary': 'Covers best practices for uninstalling security software, emphasizes using only one antivirus software, and provides guidance for computer tune-up and security installation, aiming to optimize computer performance and avoid potential conflicts.', 'chapters': [{'end': 1588.8, 'start': 1443.447, 'title': 'Uninstalling security software best practices', 'summary': 'Emphasizes the importance of uninstalling various security software, such as antivirus, firewall, and tune-up software, due to potential conflicts and negative impacts on system configurations, cautioning against having multiple antivirus programs and highlighting the concept of heuristic testing in antivirus software.', 'duration': 145.353, 'highlights': ['Uninstalling various security software, including antivirus, firewall, and tune-up software, is crucial to prevent conflicts and negative impacts on system configurations.', 'Caution against having multiple pieces of antivirus software on the computer, as it can lead to conflicts and negative impacts on the system configurations.', 'Heuristic testing in antivirus software is explained, highlighting its function in detecting overall virus patterns and cautioning against the automatic deletion, renaming, or changes of files that may resemble viruses.']}, {'end': 1984.617, 'start': 1589.14, 'title': 'Best practices for antivirus software', 'summary': 'Emphasizes the importance of using only one piece of antivirus software on a computer, providing specific guidance on uninstalling and removing remnants of security software, and advises using safe mode and renaming application folders for successful removal.', 'duration': 395.477, 'highlights': ['The importance of using only one piece of antivirus software on a computer is emphasized, with specific recommendations provided for popular antivirus software such as Norton, McAfee, Kaspersky, AVG, Panda, and Microsoft Security Essentials. Specific antivirus software removal tools are recommended, such as Norton removal tool, McAfee removal tool, Kaspersky removal tool, etc., to address uninstallation issues and remove leftover configurations.', 'Guidance is provided on using the removal tools from antivirus software manufacturers to effectively remove leftover settings and configurations from the computer, especially in cases where traditional uninstallation methods fail. The chapter stresses the use of removal tools for antivirus software, particularly highlighting the challenges with uninstalling Norton and the effectiveness of removal tools in addressing these issues.', 'The process of locating and executing uninstall executables within the program files folder is explained as a method to remove toolbars and applications that are not easily uninstallable through conventional means. The chapter provides insights into locating and executing uninstall executables within the program files folder, emphasizing the legality of providing a way to uninstall applications and toolbars.', "The concept of renaming the folder where an application is installed as a method to disrupt the pointers and render the software inoperable is discussed, with a specific emphasis on performing this action in safe mode for successful execution. The chapter advises on the process of renaming the folder where applications are installed, highlighting the necessity of performing this action in safe mode and the potential impact on disrupting the software's functionality."]}, {'end': 2412.664, 'start': 1984.637, 'title': 'Computer tune-up and security installation', 'summary': 'Discusses the norton removal tool, the process of computer tune-up involving cleaning up temporary files, disabling startup items, and defragmenting the registry, and the importance of choosing separate best-in-class security software for antivirus, anti-malware, and firewall to avoid potential issues and optimize computer performance.', 'duration': 428.027, 'highlights': ['The importance of cleaning up temporary files, disabling startup items, and defragmenting the registry as part of the computer tune-up process to facilitate the installation of antivirus and anti-malware software. The process of computer tune-up involves cleaning up temporary files, disabling startup items, and defragmenting the registry to prepare for installing antivirus and anti-malware software.', 'The recommendation to use separate best-in-class security software for antivirus, anti-malware, and firewall to avoid potential issues and optimize computer performance. It is suggested to choose separate best-in-class security software for antivirus, anti-malware, and firewall to avoid potential problems and ensure optimal computer performance.', "The Norton Removal Tool's role in removing all software from Norton and the importance of choosing the best security software to avoid potential issues and optimize computer performance. The Norton Removal Tool is recommended for removing all software from Norton, and it's important to choose the best security software to avoid potential problems and optimize computer performance."]}], 'duration': 969.217, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij01443447.jpg', 'highlights': ['Uninstalling various security software, including antivirus, firewall, and tune-up software, is crucial to prevent conflicts and negative impacts on system configurations.', 'The importance of using only one piece of antivirus software on a computer is emphasized, with specific recommendations provided for popular antivirus software such as Norton, McAfee, Kaspersky, AVG, Panda, and Microsoft Security Essentials.', 'Guidance is provided on using the removal tools from antivirus software manufacturers to effectively remove leftover settings and configurations from the computer, especially in cases where traditional uninstallation methods fail.', 'The process of locating and executing uninstall executables within the program files folder is explained as a method to remove toolbars and applications that are not easily uninstallable through conventional means.', 'The concept of renaming the folder where an application is installed as a method to disrupt the pointers and render the software inoperable is discussed, with a specific emphasis on performing this action in safe mode for successful execution.', 'The importance of cleaning up temporary files, disabling startup items, and defragmenting the registry as part of the computer tune-up process to facilitate the installation of antivirus and anti-malware software.', 'The recommendation to use separate best-in-class security software for antivirus, anti-malware, and firewall to avoid potential issues and optimize computer performance.', "The Norton Removal Tool's role in removing all software from Norton and the importance of choosing the best security software to avoid potential issues and optimize computer performance."]}, {'end': 2790.524, 'segs': [{'end': 2459.45, 'src': 'embed', 'start': 2431.7, 'weight': 1, 'content': [{'end': 2441.423, 'text': 'For me, uh, what I prefer right now, 2012, 2012 already is I like Microsoft security essentials for the antivirus software.', 'start': 2431.7, 'duration': 9.723}, {'end': 2445.984, 'text': 'Uh, I like spy bot search and destroy for the anti malware software.', 'start': 2442.003, 'duration': 3.981}, {'end': 2453.588, 'text': 'and I like just the normal Windows Firewall for protecting the traffic on my computer.', 'start': 2446.525, 'duration': 7.063}, {'end': 2459.45, 'text': "Again, you may listen to those and you may think, oh those are cheesy, those aren't secure enough.", 'start': 2454.188, 'duration': 5.262}], 'summary': 'Prefer microsoft security essentials for antivirus, spybot for anti-malware, and windows firewall for traffic protection in 2012.', 'duration': 27.75, 'max_score': 2431.7, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02431700.jpg'}, {'end': 2504.795, 'src': 'embed', 'start': 2479.113, 'weight': 0, 'content': [{'end': 2484.075, 'text': "You're going to find whatever piece of anti-malware software that you're going to use, then you're going to install that.", 'start': 2479.113, 'duration': 4.962}, {'end': 2487.237, 'text': "Again, the firewall, and you're going to install that.", 'start': 2484.515, 'duration': 2.722}, {'end': 2494.183, 'text': "with the anti-malware software, even some of the anti-virus software, right at this time we're not going to do a scan yet.", 'start': 2488.257, 'duration': 5.926}, {'end': 2500.49, 'text': "we're not going to do a scan yet, but you may have the ability to do something called immunizing your system.", 'start': 2494.183, 'duration': 6.307}, {'end': 2504.795, 'text': 'so, like with spybot, search and destroy, they have an option to immunize a system.', 'start': 2500.49, 'duration': 4.305}], 'summary': 'Install anti-malware and firewall software, consider immunizing system.', 'duration': 25.682, 'max_score': 2479.113, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02479113.jpg'}, {'end': 2732.942, 'src': 'embed', 'start': 2705.384, 'weight': 2, 'content': [{'end': 2713.619, 'text': 'If the security software keeps you from doing what you need to do, is that any better than a virus not allowing you to do what you need to do?', 'start': 2705.384, 'duration': 8.235}, {'end': 2714.661, 'text': "You know what I'm saying?", 'start': 2713.639, 'duration': 1.022}, {'end': 2717.787, 'text': "So that's the security software you need to be thinking about.", 'start': 2715.202, 'duration': 2.585}, {'end': 2726.841, 'text': "So now, after you've installed the security software,", 'start': 2723.72, 'duration': 3.121}, {'end': 2732.942, 'text': "the next thing that you're going to need to do is install all the software updates for your computer.", 'start': 2726.841, 'duration': 6.101}], 'summary': 'Security software should not hinder tasks; prioritize software updates to enhance security.', 'duration': 27.558, 'max_score': 2705.384, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02705384.jpg'}, {'end': 2761.56, 'src': 'heatmap', 'start': 2705.384, 'weight': 0.79, 'content': [{'end': 2713.619, 'text': 'If the security software keeps you from doing what you need to do, is that any better than a virus not allowing you to do what you need to do?', 'start': 2705.384, 'duration': 8.235}, {'end': 2714.661, 'text': "You know what I'm saying?", 'start': 2713.639, 'duration': 1.022}, {'end': 2717.787, 'text': "So that's the security software you need to be thinking about.", 'start': 2715.202, 'duration': 2.585}, {'end': 2726.841, 'text': "So now, after you've installed the security software,", 'start': 2723.72, 'duration': 3.121}, {'end': 2732.942, 'text': "the next thing that you're going to need to do is install all the software updates for your computer.", 'start': 2726.841, 'duration': 6.101}, {'end': 2742.585, 'text': "So a lot of times viruses, malware, they exploit weaknesses in the operating system or in software that's installed on your computer.", 'start': 2733.423, 'duration': 9.162}, {'end': 2748.347, 'text': 'Well, the manufacturers of software many times will come up with fixes, uh, for those weaknesses.', 'start': 2742.965, 'duration': 5.382}, {'end': 2751.791, 'text': "and if you install those fixes, then the virus just doesn't work anymore.", 'start': 2748.347, 'duration': 3.444}, {'end': 2757.756, 'text': "even if it's still on your computer, it no longer has the hole to exploit, and so it's just kind of sitting there twiddling.", 'start': 2751.791, 'duration': 5.965}, {'end': 2761.56, 'text': "it stops and and for all intents and purposes, it's dead.", 'start': 2757.756, 'duration': 3.804}], 'summary': 'Installing security software and software updates can prevent viruses and malware from exploiting weaknesses in the system, rendering them ineffective.', 'duration': 56.176, 'max_score': 2705.384, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02705384.jpg'}], 'start': 2412.664, 'title': 'Security software and installation', 'summary': 'Emphasizes the use of best-in-class antivirus, anti-malware, and firewall software, recommending specific tools. it also highlights the importance of installing software updates to protect against vulnerabilities, noting it may take four to six hours to download updates.', 'chapters': [{'end': 2577.164, 'start': 2412.664, 'title': 'Best security software recommendations', 'summary': 'Emphasizes the importance of using best-in-class antivirus, anti-malware, and firewall software, and recommends microsoft security essentials for antivirus, spybot search and destroy for anti-malware, and windows firewall for traffic protection, highlighting the significance of immunizing the system and cautioning against using registry guards.', 'duration': 164.5, 'highlights': ['The significance of using best-in-class antivirus, anti-malware, and firewall software is emphasized, with recommendations for Microsoft Security Essentials for antivirus, Spybot Search and Destroy for anti-malware, and Windows Firewall for traffic protection.', 'Immunizing the system is highlighted as an important step to lock down the system and prevent new changes from taking place, contributing to overall system security.', 'Caution is advised against using registry guards or similar features, as they may lead to confusion and potential security risks by allowing or preventing changes without clear information.']}, {'end': 2790.524, 'start': 2577.244, 'title': 'Installing security software and software updates', 'summary': 'Discusses the importance of installing security software, including antivirus, anti-malware, and firewall, and emphasizes the need to disable registry guards. it also highlights the significance of installing software updates to protect against vulnerabilities, mentioning that it may take four to six hours to download all updates.', 'duration': 213.28, 'highlights': ['Installing security software and the need to disable registry guards The chapter emphasizes the importance of installing security software like antivirus, anti-malware, and firewall, while also recommending disabling registry guards to avoid blocking registry changes.', 'Importance of installing software updates to protect against vulnerabilities The transcript highlights the significance of installing software updates to protect against vulnerabilities, mentioning that it may take four to six hours to download all updates and bring the computer up to the current update state.']}], 'duration': 377.86, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02412664.jpg', 'highlights': ['Recommend best-in-class antivirus, anti-malware, and firewall software.', 'Install Microsoft Security Essentials for antivirus, Spybot Search and Destroy for anti-malware, and Windows Firewall for traffic protection.', 'Emphasize the importance of installing software updates to protect against vulnerabilities.']}, {'end': 3762.486, 'segs': [{'end': 2999.112, 'src': 'embed', 'start': 2966.37, 'weight': 2, 'content': [{'end': 2969.071, 'text': 'So if they have iTunes, update to the latest iTunes.', 'start': 2966.37, 'duration': 2.701}, {'end': 2971.412, 'text': 'If they have QuickBooks, update to the latest QuickBooks.', 'start': 2969.171, 'duration': 2.241}, {'end': 2980.034, 'text': 'definitely do Java, definitely do Adobe Reader, definitely do Flash, and again, also do all of the Microsoft updates.', 'start': 2972.152, 'duration': 7.882}, {'end': 2985.296, 'text': 'Again, a lot of the viruses and a lot of the malware exploit weaknesses in old software.', 'start': 2980.154, 'duration': 5.142}, {'end': 2990.318, 'text': "You'd be surprised how effective it is to simply update your computer.", 'start': 2986.156, 'duration': 4.162}, {'end': 2999.112, 'text': 'Many times, all you have to do is update your computer and again, even if the viruses are there, the holes that they were exploiting no longer exist,', 'start': 2990.758, 'duration': 8.354}], 'summary': 'Regularly update itunes, quickbooks, java, adobe reader, flash, and microsoft updates to prevent malware and viruses.', 'duration': 32.742, 'max_score': 2966.37, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02966370.jpg'}, {'end': 3065.937, 'src': 'embed', 'start': 3036.536, 'weight': 4, 'content': [{'end': 3040.771, 'text': 'So I would say, if you install Microsoft Security Essentials, You can run a full scan.', 'start': 3036.536, 'duration': 4.235}, {'end': 3045.052, 'text': "at the exact same time you're running a full scan of Spybot, Search and Destroy.", 'start': 3040.771, 'duration': 4.281}, {'end': 3048.953, 'text': 'You can run them side by side at the exact same time.', 'start': 3045.372, 'duration': 3.581}, {'end': 3053.234, 'text': "It's going to take a long time to do, so you might as well do them together.", 'start': 3049.293, 'duration': 3.941}, {'end': 3055.995, 'text': 'So at this point, run full scans.', 'start': 3053.694, 'duration': 2.301}, {'end': 3059.616, 'text': "Again, you're going to have the option of quick scan many times or full scan.", 'start': 3056.035, 'duration': 3.581}, {'end': 3060.916, 'text': 'Do a full scan.', 'start': 3060.036, 'duration': 0.88}, {'end': 3065.937, 'text': "If you've already seen that your computer's infected, you want to try to make sure that you rip out all that stuff.", 'start': 3060.936, 'duration': 5.001}], 'summary': 'Install microsoft security essentials, run full scans of spybot search and destroy alongside it for comprehensive malware removal.', 'duration': 29.401, 'max_score': 3036.536, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03036536.jpg'}, {'end': 3115.893, 'src': 'embed', 'start': 3090.67, 'weight': 1, 'content': [{'end': 3100.28, 'text': 'At this point you need to start trying to find security software that may be able to rip out whatever virus or malware is on your computer.', 'start': 3090.67, 'duration': 9.61}, {'end': 3105.885, 'text': 'One of the pieces of software that is very, very effective is something called ComboFix.', 'start': 3100.94, 'duration': 4.945}, {'end': 3107.926, 'text': "So it's a free piece of software.", 'start': 3106.325, 'duration': 1.601}, {'end': 3109.368, 'text': "I'll have a link somewhere.", 'start': 3108.207, 'duration': 1.161}, {'end': 3115.893, 'text': 'You can download ComboFix, and ComboFix tries to both rip out malware and viruses,', 'start': 3109.668, 'duration': 6.225}], 'summary': 'Recommend using combofix, a free and effective security software to remove malware and viruses.', 'duration': 25.223, 'max_score': 3090.67, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03090670.jpg'}, {'end': 3369.671, 'src': 'embed', 'start': 3343.82, 'weight': 0, 'content': [{'end': 3351.103, 'text': "That, if you do a wipe and reload with Data Recovery, you know that you're giving back your client a solid working computer.", 'start': 3343.82, 'duration': 7.283}, {'end': 3358.126, 'text': "If you try to get rid of the viruses, you never know if you're going to be 100% successful.", 'start': 3351.523, 'duration': 6.603}, {'end': 3360.207, 'text': 'Now with me.', 'start': 3358.286, 'duration': 1.921}, {'end': 3369.671, 'text': "I'm a bit of a not quite a perfectionist on this, but when I give systems back to my clients, I want to be able to give them the gold standard.", 'start': 3360.207, 'duration': 9.464}], 'summary': 'Wipe and reload with data recovery ensures 100% success in giving back a solid working computer to clients, providing the gold standard in service.', 'duration': 25.851, 'max_score': 3343.82, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03343820.jpg'}, {'end': 3478.999, 'src': 'embed', 'start': 3456.352, 'weight': 3, 'content': [{'end': 3463.794, 'text': "So what I would say If there's a virus, do a wipe and reload, especially if you're a consultant.", 'start': 3456.352, 'duration': 7.442}, {'end': 3473.497, 'text': "If time is pretty much free to you, so you're working on your own systems, or you're an employee and you're getting paid salary anyway,", 'start': 3463.954, 'duration': 9.543}, {'end': 3478.999, 'text': "then you can try to go in and actually try to clean out an infection, because it's going to take a long time.", 'start': 3473.497, 'duration': 5.502}], 'summary': 'For virus removal, do a wipe and reload, especially for consultants. cleaning an infection takes a long time.', 'duration': 22.647, 'max_score': 3456.352, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03456352.jpg'}, {'end': 3716.422, 'src': 'embed', 'start': 3692.366, 'weight': 7, 'content': [{'end': 3698.89, 'text': "Basically, it'll try to restore the computer back to configurations of before when the virus happened.", 'start': 3692.366, 'duration': 6.524}, {'end': 3700.451, 'text': "You'll still need to run virus scans.", 'start': 3698.91, 'duration': 1.541}, {'end': 3702.133, 'text': "You'll still need to do the rest of the process.", 'start': 3700.471, 'duration': 1.662}, {'end': 3707.936, 'text': 'But if you can get your computer to a state before the virus got really bad,', 'start': 3702.633, 'duration': 5.303}, {'end': 3712.72, 'text': "you have a better chance about being able to clean up the virus while you're working on it.", 'start': 3707.936, 'duration': 4.784}, {'end': 3716.422, 'text': "Once that virus is entrenched on your computer, it's very difficult to get out.", 'start': 3712.78, 'duration': 3.642}], 'summary': 'Restoring computer to pre-virus state improves virus cleanup chances.', 'duration': 24.056, 'max_score': 3692.366, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03692366.jpg'}, {'end': 3762.486, 'src': 'embed', 'start': 3732.449, 'weight': 6, 'content': [{'end': 3736.911, 'text': 'and have the router connect to open DNS for the DNS service.', 'start': 3732.449, 'duration': 4.462}, {'end': 3745.113, 'text': 'DNS, domain name services, this is what resolves domain names, the IP addresses, so cnn.com to 208.55.', 'start': 3737.111, 'duration': 8.002}, {'end': 3751.398, 'text': '26.5 Well, these little viruses phone home based on domain names.', 'start': 3745.113, 'duration': 6.285}, {'end': 3753.359, 'text': "They don't do it based on IP addresses.", 'start': 3751.458, 'duration': 1.901}, {'end': 3762.486, 'text': "So by using OpenDNS, OpenDNS can block some of these malicious or bad domains so that your computer can't phone home.", 'start': 3753.64, 'duration': 8.846}], 'summary': 'Using opendns can block malicious domains, preventing viruses from phoning home.', 'duration': 30.037, 'max_score': 3732.449, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03732449.jpg'}], 'start': 2790.845, 'title': 'Computer security and virus cleanup', 'summary': 'Emphasizes the importance of updating software to prevent vulnerabilities and malware attacks, while also covering the process of cleaning an infected windows pc and best practices for virus cleanup, including the use of specific tools and a wipe and reload approach for 100% success rate and long-term client satisfaction.', 'chapters': [{'end': 3090.67, 'start': 2790.845, 'title': 'Computer security updates and scans', 'summary': 'Emphasizes the importance of updating microsoft, adobe, java, and other software to prevent vulnerabilities and malware attacks, followed by running simultaneous full scans with microsoft security essentials and spybot search and destroy to ensure computer security.', 'duration': 299.825, 'highlights': ['Updating Microsoft, Adobe, Java, and other software is crucial to prevent vulnerabilities and malware attacks. The chapter highlights the importance of updating Microsoft, Adobe, Java, and other software to prevent vulnerabilities and malware attacks. Outdated software can be exploited by viruses and malware, emphasizing the need to update software to prevent security breaches.', 'Running simultaneous full scans with Microsoft Security Essentials and Spybot Search and Destroy is recommended to ensure computer security. The chapter recommends running simultaneous full scans with Microsoft Security Essentials and Spybot Search and Destroy to ensure computer security. It advises against quick scans and suggests rebooting the computer if necessary.']}, {'end': 3456.051, 'start': 3090.67, 'title': 'Cleaning infected windows pc', 'summary': 'Covers the process of cleaning an infected windows pc, recommending the use of combofix and malwarebytes to remove viruses and malware, and emphasizing the benefits of a wipe and reload approach for 100% success rate and long-term client satisfaction.', 'duration': 365.381, 'highlights': ['The chapter recommends using ComboFix and Malwarebytes to remove viruses and malware from an infected Windows PC. ComboFix and Malwarebytes are suggested as effective tools to remove viruses and malware from an infected Windows PC, with ComboFix also addressing issues created by viruses, such as disabling task manager and hiding control panel.', 'Emphasizes the benefits of a wipe and reload approach for 100% success rate and long-term client satisfaction. The wipe and reload approach is recommended for 100% success rate and long-term client satisfaction, ensuring that the system is returned in a solid working condition, avoiding potential recurrence of virus problems, and providing the gold standard of service.', 'Explains the challenges of attempting to clean viruses, highlighting the potential for 80-90% success rate and the significant impact of failures in a professional setting. The challenges of attempting to clean viruses are explained, with emphasis on the 80-90% success rate and the significant impact of failures, particularly for consultants charging for their services, where even a small failure rate can lead to client dissatisfaction and problems.']}, {'end': 3597.873, 'start': 3456.352, 'title': 'Virus cleanup best practices', 'summary': 'Emphasizes the importance of doing a wipe and reload for virus cleanup, highlighting the time-consuming process of cleaning an infection and the need for a checklist to avoid redundant steps, while also stressing the importance of setting a limit on time spent on the cleanup.', 'duration': 141.521, 'highlights': ['The importance of doing a wipe and reload for virus cleanup, as it saves time and effort, especially for consultants. Cleaning out a virus can take one to two days, and even longer if things start going badly.', 'Emphasizing the need for a checklist when cleaning viruses out of computers to avoid redundant steps and to keep track of the process, as cleaning out a computer can take a long time, ranging from one day to two weeks.', 'Stressing the importance of setting a limit on time spent on virus cleanup, as not having a limit can lead to working on the system for an extended period, highlighting the need to know when to pull the plug on the cleanup project.']}, {'end': 3762.486, 'start': 3597.873, 'title': 'Computer booting and virus handling', 'summary': 'Explains how to boot a computer in safe mode to work with minimal processes and how to use system restore to revert to a state before a virus occurred, increasing the chances of virus cleanup.', 'duration': 164.613, 'highlights': ['You can boot the computer into safe mode, which only starts the necessary processes and services to get the GUI up and running, providing a minimal working environment. Safe mode only starts the processes and services needed to get the GUI up and running, allowing for minimal functionality.', 'Using system restore can revert the computer back to a state before the virus occurred, potentially making virus cleanup easier and more effective. System restore can revert the computer back to a state before the virus occurred, facilitating more effective virus cleanup.', "By securing the computer on its own private network with OpenDNS, malicious domains that viruses attempt to contact can be blocked, preventing the computer from 'phoning home'. Securing the computer on a private network with OpenDNS can block malicious domains, preventing virus communication and potential further infection."]}], 'duration': 971.641, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij02790845.jpg', 'highlights': ['The wipe and reload approach is recommended for 100% success rate and long-term client satisfaction.', 'The chapter recommends using ComboFix and Malwarebytes to remove viruses and malware from an infected Windows PC.', 'Updating Microsoft, Adobe, Java, and other software is crucial to prevent vulnerabilities and malware attacks.', 'The importance of doing a wipe and reload for virus cleanup, as it saves time and effort, especially for consultants.', 'The chapter recommends running simultaneous full scans with Microsoft Security Essentials and Spybot Search and Destroy to ensure computer security.', 'Emphasizes the benefits of a wipe and reload approach for 100% success rate and long-term client satisfaction.', "By securing the computer on its own private network with OpenDNS, malicious domains that viruses attempt to contact can be blocked, preventing the computer from 'phoning home'.", 'System restore can revert the computer back to a state before the virus occurred, potentially making virus cleanup easier and more effective.', 'The importance of updating Microsoft, Adobe, Java, and other software to prevent vulnerabilities and malware attacks.', 'Using system restore can revert the computer back to a state before the virus occurred, potentially making virus cleanup easier and more effective.']}, {'end': 4441.828, 'segs': [{'end': 3800.404, 'src': 'embed', 'start': 3762.867, 'weight': 1, 'content': [{'end': 3768.551, 'text': 'So that can be a way to, again, to try to keep the infection from spreading on your computer.', 'start': 3762.867, 'duration': 5.684}, {'end': 3774.614, 'text': 'The next thing is you want to change the password or you want to at least put a password onto the computer.', 'start': 3769.031, 'duration': 5.583}, {'end': 3777.455, 'text': 'So a lot of people, their administrator or clients have a blank password.', 'start': 3774.634, 'duration': 2.821}, {'end': 3783.218, 'text': "If you have a blank password, it's very easy for scripts to just do a lot of stuff to your computer, you know, really mess it up.", 'start': 3777.475, 'duration': 5.743}, {'end': 3789.741, 'text': 'By putting a password there, again, it tries to stop any more damage happening to that computer.', 'start': 3783.278, 'duration': 6.463}, {'end': 3794.863, 'text': 'And then the final thing is you want to reset your Internet Explorer settings.', 'start': 3791.201, 'duration': 3.662}, {'end': 3800.404, 'text': 'So Internet Explorer in a Windows computer affects more than simply Internet Explorer.', 'start': 3794.903, 'duration': 5.501}], 'summary': 'Protect your computer by setting a password and resetting internet explorer. blank passwords make it vulnerable to attacks.', 'duration': 37.537, 'max_score': 3762.867, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03762867.jpg'}, {'end': 3858.861, 'src': 'embed', 'start': 3823.012, 'weight': 4, 'content': [{'end': 3825.934, 'text': 'So you want to reset the default configurations.', 'start': 3823.012, 'duration': 2.922}, {'end': 3832.058, 'text': 'Again, you just open up Internet Explorer, you go to Tools, Internet Options, the Advanced tab, and then Reset Internet Explorer.', 'start': 3826.014, 'duration': 6.044}, {'end': 3835.161, 'text': 'This will put everything back to square one.', 'start': 3832.379, 'duration': 2.782}, {'end': 3837.362, 'text': 'After you do that,', 'start': 3836.281, 'duration': 1.081}, {'end': 3846.352, 'text': "you want to uninstall all the crapware and all the antivirus software and tune up software and all the security software that's on your computer.", 'start': 3837.362, 'duration': 8.99}, {'end': 3849.774, 'text': 'All this software can actually cause problems.', 'start': 3846.852, 'duration': 2.922}, {'end': 3858.861, 'text': 'So you want to get rid of all the toolbars, um, you know, anti spyware stuff, Java games, all the garbage that people put onto their computers.', 'start': 3850.035, 'duration': 8.826}], 'summary': 'Reset internet explorer to default configurations, uninstall all unnecessary software causing problems.', 'duration': 35.849, 'max_score': 3823.012, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03823012.jpg'}, {'end': 3913.484, 'src': 'embed', 'start': 3888.21, 'weight': 5, 'content': [{'end': 3893.193, 'text': "And so a lot of times they'll change the configurations and cause problems on your computer.", 'start': 3888.21, 'duration': 4.983}, {'end': 3895.214, 'text': 'So all, I would suggest.', 'start': 3893.573, 'duration': 1.641}, {'end': 3898.255, 'text': 'you should have one piece of software for what you like.', 'start': 3895.214, 'duration': 3.041}, {'end': 3902.978, 'text': 'you know one antivirus software, one anti malware software and one firewall software.', 'start': 3898.255, 'duration': 4.723}, {'end': 3906.82, 'text': 'I suggest Microsoft Security Essentials for security for antivirus.', 'start': 3903.438, 'duration': 3.382}, {'end': 3913.484, 'text': 'Spybot Search and Destroy for spyware and I just like Windows Firewall for the firewall software.', 'start': 3907.1, 'duration': 6.384}], 'summary': 'Use one antivirus, one anti-malware, and one firewall software for computer security, such as microsoft security essentials, spybot search and destroy, and windows firewall.', 'duration': 25.274, 'max_score': 3888.21, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03888210.jpg'}, {'end': 4128.644, 'src': 'embed', 'start': 4099.397, 'weight': 0, 'content': [{'end': 4104.038, 'text': 'Update Windows, so the Windows operating system, Office, etc.', 'start': 4099.397, 'duration': 4.641}, {'end': 4105.819, 'text': 'Do all the updates.', 'start': 4104.399, 'duration': 1.42}, {'end': 4111.964, 'text': 'Then update Java, update Adobe Reader, Adobe Flash, update QuickBooks, iTunes.', 'start': 4106, 'duration': 5.964}, {'end': 4117.587, 'text': 'Again, a lot of these viruses look for weaknesses in old pieces of software.', 'start': 4112.084, 'duration': 5.503}, {'end': 4122.14, 'text': "a lot of times all you have to do is update your computer and then you're fine.", 'start': 4118.399, 'duration': 3.741}, {'end': 4124.402, 'text': 'The holes and weaknesses simply go away.', 'start': 4122.421, 'duration': 1.981}, {'end': 4128.644, 'text': "So even if you still have the virus technically on your computer, it can't do anything because the hole's not there anymore.", 'start': 4124.462, 'duration': 4.182}], 'summary': 'Regularly update windows, java, adobe, quickbooks, and itunes to prevent virus vulnerabilities.', 'duration': 29.247, 'max_score': 4099.397, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij04099397.jpg'}], 'start': 3762.867, 'title': 'Computer and internet security practices', 'summary': 'Covers computer security best practices including changing passwords, resetting internet explorer settings, avoiding infections, resetting default configurations, removing unnecessary software, managing antivirus software, and updating software for a secure pc.', 'chapters': [{'end': 3822.732, 'start': 3762.867, 'title': 'Computer security best practices', 'summary': 'Discusses the importance of securing a computer by changing the password from blank to a strong one, resetting internet explorer settings, and avoiding infection spread.', 'duration': 59.865, 'highlights': ['Changing the password from blank to a strong one is crucial to prevent unauthorized access and potential damage to the computer.', 'Resetting Internet Explorer settings is important as it affects more than just web browsing, impacting computer updates and other functionalities.', 'Avoiding infection spread on the computer by taking preventive measures can help in maintaining its security and integrity.']}, {'end': 4441.828, 'start': 3823.012, 'title': 'Resetting default configurations and removing crapware', 'summary': 'Discusses the process of resetting default configurations in internet explorer, uninstalling unnecessary software, recommending specific security software, and providing tips for managing antivirus software. it also covers the importance of updating software and the steps to clean an infected windows pc.', 'duration': 618.816, 'highlights': ['The chapter discusses the process of resetting default configurations in Internet Explorer and the importance of uninstalling unnecessary software. The chapter provides a step-by-step guide to reset Internet Explorer to default configurations and emphasizes the need to uninstall all unnecessary crapware, antivirus software, and security software from the computer.', 'The chapter recommends specific security software and provides tips for managing antivirus software. The chapter recommends using specific security software such as Microsoft Security Essentials for antivirus, Spybot Search and Destroy for spyware, and Windows Firewall for firewall protection. It also advises against having multiple antivirus software installed due to potential conflicts.', 'The chapter emphasizes the importance of updating software and provides steps to clean an infected Windows PC. The chapter highlights the significance of updating Windows, Office, Java, Adobe Reader, Adobe Flash, QuickBooks, and iTunes to mitigate security vulnerabilities. Additionally, it provides steps to clean an infected Windows PC including immunization, running scans, and using tools like ComboFix and Malwarebytes.']}], 'duration': 678.961, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GySdZHaoij0/pics/GySdZHaoij03762867.jpg', 'highlights': ['Updating software is crucial for mitigating security vulnerabilities and maintaining a secure PC.', 'Changing the password from blank to a strong one is crucial to prevent unauthorized access and potential damage to the computer.', 'Resetting Internet Explorer settings is important as it affects more than just web browsing, impacting computer updates and other functionalities.', 'Avoiding infection spread on the computer by taking preventive measures can help in maintaining its security and integrity.', 'The chapter provides a step-by-step guide to reset Internet Explorer to default configurations and emphasizes the need to uninstall all unnecessary crapware, antivirus software, and security software from the computer.', 'The chapter recommends specific security software such as Microsoft Security Essentials for antivirus, Spybot Search and Destroy for spyware, and Windows Firewall for firewall protection. It also advises against having multiple antivirus software installed due to potential conflicts.']}], 'highlights': ['The wipe and reload approach is recommended for 100% success rate and long-term client satisfaction.', 'Using OpenDNS to block malicious servers is crucial for network security.', 'The process of cleaning an infected Windows PC involves removing viruses, spyware, and malware, with a focus on theory and concepts rather than specific tools.', "It's recommended for consultants to do a wipe and reload instead of cleaning viruses due to the difficulty and uncertainty of complete virus removal, as clients want a permanent solution after paying for the service.", 'The recommendation for consultants is to avoid cleaning infected Windows PCs and instead opt for wiping and reloading the system, emphasizing the value of time and the inefficiency of cleaning infected PCs.', 'The importance of having a checklist for virus removal is stressed, as it provides a systematic approach to cleaning infections out of a computer, reducing the risk of forgetting steps and saving time during the cleaning process.', 'The class emphasizes the changing nature of the tools and techniques used in cleaning infected PCs, with updates required every two to three to four months.', 'The recommendation to use separate best-in-class security software for antivirus, anti-malware, and firewall to avoid potential issues and optimize computer performance.', 'The importance of using only one piece of antivirus software on a computer is emphasized, with specific recommendations provided for popular antivirus software such as Norton, McAfee, Kaspersky, AVG, Panda, and Microsoft Security Essentials.', 'The importance of cleaning up temporary files, disabling startup items, and defragmenting the registry as part of the computer tune-up process to facilitate the installation of antivirus and anti-malware software.']}