1. Use Gmail - not only can you get to your mail from any computer, you can't get a virus through Gmail. Labels are how you 'organize' your mail, 'archive' is what you do to mail in your inbox if you want to keep it, and you can search your mail using a search engine that works like google search. No more 'where the heck did I put that email?' In the Google Pack is Norton's Security Scan so if you somehow got a virus by also using another mail system, it will catch it and again, it's free from Google. Get Google Earth while in the Google Pack!
2. Use Chrome from Google as your browser. It's faster and much more secure.
3. Use the OpenOffice suite for all your word processing, spreadsheet, and presentation work. It's free, exports to any format, has more capabilities, and there are even more programs within the suite.
4. Use "Replicator" for free from KarenWare.com to backup your "My Documents" daily using the 'day of week' tag so you have 7 copies from the past 7 days on an external hard drive. Don't back up anything but your documents and photos.
In "Replicator" create a job and set it up with the fields filed like these:
Job Name: My Documents to external
Source folder: C:\Users\Jim\Documents\
Destination folder: J:\jim\<dow>\
Note: The tag <dow> stands for Day of Week and the Replicator will create under the directory "jim" on my external "J" drive, seven sub-directories numbered 1-7 where 1 stands for Sunday. Everything in my "Documents" folder on Sunday night will be updated in the external drive J:\jim\1 and on Monday it will be updated in J:\jim\2 etc. This gives you seven daily backups before a directory is 'reused'. The first run will take some time, but every other run for that day of week will only copy changed files and takes very little time.
You can set the schedule by clicking on the "Change Schedule"
As you save the changes, you get back to the screen that has two tabs named "Job Settings" and "Other Settings" and you should click on the "Other Settings" tab and under "Miscellaneous", click the box "Launch the Replicator each time user Logs on" and either of the next 2 boxes to minimize it to the Task Bar at the bottom of the main window, or to the system tray when started. That way, you won't be bothered to do that each time you reboot.
To make certain it has been running correctly, click to open the Replicator window from the Task Bar or System tray and click on "View Log". The log shows every attempt to run a backup.
Great suggestions from Cnet:
by Jimmy Greystone - 10/15/08 8:07 PM
In reply to: Best way to get my computer back up to speed. by iamlost2006
And on the other end, since clearing up the malware you have now is only the first part... Some things to do and not do to avoid repeat occurrences.
TIPS FOR A SMOOTH RUNNING SYSTEM
The more of these suggestions you follow, the fewer problems you should have. They won't solve any existing problems you have, but if you follow them all you should be able to avoid virtually all problems in the future.
Things you should NOT do
1: Use Internet Explorer (1)
2: Use any browser based on Internet Explorer
3: Use Outlook or Outlook Express (2)
4: Open email attachments you haven't manually scanned with your virus scanner
5: Open email attachments you were not expecting, no matter who they appear to be from
6: Respond to spam messages, including using unsubscribe links
7: Visit questionable websites (e.g. porn, warez, hacking)
8: Poke unnecessary holes in your firewall by clicking "Allow" every time some program requests access to the Internet (3)
9: Click directly on links in email messages
10: Use file sharing or P2P programs
11: Use pirated programs
Things you SHOULD do
1: Use a non-IE or IE based browser (4)
2: Always have an up to date virus scanner running (5)
3: Always have a firewall running (6)
4: Install all the latest security updates (7)(8)(9)
5: Delete all unsolicited emails containing attachments without reading
6: Manually scan all email attachments with your virus scanner, regardless of whether it's supposed to be done automatically
7: Copy and paste URLs from email messages into your web browser
8: Inspect links copied and pasted into your web browser to ensure they don't seem to contain a second/different address
9: Establish a regular backup regimin (10)(11)
10: Make regular checks of your backup media to ensure it is still good (12)
Being a considerate Internet user & other misc tips
1: Do not send attachments in emails (13)(14)
2: Do not use stationary or any other kind of special formatting in emails (13)
3: Do not TYPE IN ALL CAPS (15)
4: Avoid texting speak or "l33t speak" (16)
5: Do not poke the sleeping bear (17)
(1) Sadly sometimes this is unavoidable, so only use IE when the site absolutely will not work with any other browser and you cannot get that information/service anywhere else, and only use IE for that one specific site.
(2) Outlook and Outlook Express are very insecure, and basically invite spam. Possible replacements include Mozilla Thunderbird, Eudora, The Bat, and dozens of others.
(3) When it doubt over whether or not to allow some program, use Google to find out what it is and whether or not it needs access to the Internet. Otherwise, denying access is the safest course of action, since you can always change the rule later.
(4) On Windows your options include: Mozilla Firefox, Seamonkey, Opera, Flock, Chrome, and Safari. It doesn't matter which one you pick so much as that you pick one of them and use it over IE.
(5) AVG Free and Avast are available if you need a decent free virus scanner
(6) XP/Vista's firewall is probably good enough for 99% of all Windows users, but other options include ZoneAlarm, Outpost Firewall, and Comodo. If you have a router with a firewall built into it, there is no need for any of the aforementioned firewalls to be running.
(7) Microsoft's usual system is to release security updates every second Tuesday of the month.
(8) Use of Windows Update on Windows operating systems prior to Windows Vista requires Internet Explorer, and is thus a valid exception to the "No IE" rule.
(9) Service packs should ALWAYS be installed. They frequently contain security updates that will ONLY be found in that service pack.
(10) You can go with a full fledged backup program, or simply copying important files onto a CD/DVD/Flash drive.
(11) I'd recommend a tiered backup system. For example, you might have 5 rewritable DVDs, and every day you burn your backup onto a new disc. On the 6th day, you erase the disc for Day #1 for your backup, and so on so that you have multiple backups should one disc ever go bad.
(12) Replace rewritable CDs and DVDs approximately every 3-6 months.
(13) These dramatically increase the size of email messages (2-3X minimum) and clog up email servers already straining to cope with the flood of spam pouring in daily.
(14) If you want to share photos with friends/family, upload them to some photo sharing site like Flickr or Google's Picasa Web and then send people a link to that particular photo gallery.
(15) This is considered to be the same as SHOUTING and many people find it to be hard to read along with highly annoying.
(16) Unless the goal is to make yourself look like a pre-adolescent girl, or someone overcompensating for their gross inadequacies, and you don't want people to take you seriously.
(17) Most REAL hackers are quite content to leave you alone unless you make them take notice of you. No dinky little software firewall or consumer grade router is going to keep them out of your system. So do not go to some hacker website or chat room and start shooting your mouth off unless you're prepared to accept the consequences