background image

Helpdesk -  

29

Definitions

What is a Virus?

Malicious software, typically called ‘viruses’, are programs designed to infect and damage computers. Most viruses 

are transmitted over the Internet, emails or malicious Web sites. A typical virus will replicate and pass itself 

undetected to multiple computers. Other forms of nuisance, such as Trojan horses, worms or spam can infect your 

computer in various ways, using up resources or clogging up a network.

Note:

 Gateway guarantees that your computer was 100% virus free at the time of purchase and does not 

cover damages due to viruses.

What is Spyware?

Spyware refers to generally unwanted programs that are downloaded onto your computer while connected to the 

Internet, often without you knowing it. Once it has infected your computer, it can snoop on your browsing activity, 

collect personal information, cause pop-up ads to appear, or even change the configuration of your computer. 

Spyware consumes resources on your computer; it can slow down your Internet connection or entire computer 

system, and even cause crashes.
Spyware is sometimes used by unscrupulous companies to monitor and track the sites you visit on the Internet so 

as to determine your web-surfing habits and display targeted pop-up ads on your screen. However, some kinds of 

spyware go beyond simple tracking and actually monitor keystrokes and capture passwords and other functions 

which pose a definite security risk. 

What is Malware?

Malicious software, also known as 

malware

, is software designed to deliberately harm your computer. For 

example, viruses, worms, and Trojan horses are malicious software. To help protect your computer against 

malware, make sure it is using up-to-date antivirus and anti-malware software.

What is a personal Firewall?

A personal firewall is a software program designed to prevent unauthorized access to or from a private network. It 

acts as a shield to protect your Internet connection from unwanted connections, some of which may attempt to 

take control of your computer to install or re-distribute viruses or malicious programs. Each connection to your 

computer is monitored - programs that attempt to receive information without your permission are detected and 

the firewall will display an alert. You can then decide if you will allow the connection, if the connection is to a 

program you are currently using then normally you would allow it (i.e. a game connecting to a multi-player server 

or an encyclopaedia making a content update).

How to protect your computer

Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, 

many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as 

possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an 

easier target. The tips below provide basic information on how you can prevent online fraud.

Keep your computer current with the latest patches and updates. 

One of the best ways to keep attackers away from your computer is to apply patches and other software fixes 

when they become available. By regularly updating your computer, you block attackers from being able to take 

advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system. 
While keeping your computer up-to-date will not protect you from all attacks, it makes it much more difficult for 

hackers to gain access to your system, blocks many basic and automated attacks completely, and might be enough 

to discourage a less-determined attacker to look for a more vulnerable computer elsewhere. 
More recent versions of Microsoft Windows and other popular software can be configured to download and apply 

updates automatically so that you do not have to remember to check for the latest software. Taking advantage of 

"auto-update" features in your software is a great start toward keeping yourself safe online. 

Summary of Contents for EC14

Page 1: ...rnet Security Offer 15 Gateway Recovery Management 16 Your Computer s Documentation 17 Playing Multimedia Files 18 First steps on the Net 20 Protecting your computer 20 Choose an Internet Service Prov...

Page 2: ...ease fill in the information and click Next The second window you ll see contains optional fields that will help us to provide you with a more personable customer service experience Another Option Ano...

Page 3: ...ame state as when you purchased it while giving you an option to retain all settings and personal data for later retrieval see page 45 for details Gateway InfoCentre To discover more about your comput...

Page 4: ...power cable from the computer Three pin power cords are connected to a grounded power outlet The power outlet is easily accessible and as close to the computer as possible do not overload it with too...

Page 5: ...ncrease volume gradually until you can hear clearly and comfortably do not increase the volume level after your ears have adjusted Do not listen to high volumes for extended periods Do not increase th...

Page 6: ...mlock key to switch between the two functions Note To optimise space and weight certain computers use compact keyboards that do not provide a numeric keypad If this is the case you may use the integra...

Page 7: ...Touchpad Lock button toggles the touchpad on or off to avoid unwanted cursor movements when using the keyboard This is most useful if you have connected a mouse to your computer On certain computers...

Page 8: ...Open Guide 6 Open Live TV 7 Direction keys up down left right and OK 8 Volume controls Volume up down and Mute 9 Program Channel up down 10 Back Start Windows key and More information 11 Teletext sele...

Page 9: ...Disc recording software must be used to write information to recordable discs Note Before copying a CD make sure that its content is not protected by Trademarks and Copyrights and that you are authori...

Page 10: ...apter that is supplied with your computer Although other adapters may look similar using them can damage your computer The AC adapter and the underside of the computer can become hot after prolonged u...

Page 11: ...ese ports To view documentation specific to the model you have purchased please check InfoCentre Precautions Before you attach any device check the installation instructions that were supplied with it...

Page 12: ...er Connectors Memory Card Reader Memory cards are used to store and transfer data by a wide selection of digital cameras PDAs MP3 players and mobile phones see page 8 TV Tuner Allows you to connect an...

Page 13: ...low power state so that you may quickly resume working see the Power Options section on page 14 for details Note You may also put your computer into sleep mode without going to the Windows Start menu...

Page 14: ...ng experience as easy and pleasant as possible Because your computing needs may evolve Gateway is here to help you choose the right accessories and make the most of your computer Memory Memory RAM is...

Page 15: ...the screen Windows Welcome Center The first time you turn on your computer the Welcome Center window opens The Welcome Center introduces you to the new features and tools of Windows You can access the...

Page 16: ...by on screen instructions Please read them carefully 1 Click on Start All Programs Gateway then click on Gateway Recovery Management Gateway Recovery Management opens 2 To create recovery discs for th...

Page 17: ...ocess is complete Your Computer s Documentation User s Guide Gateway InfoCentre This guide is not the only reference for information about your computer InfoCentre your electronic user s guide contain...

Page 18: ...tuner Other options allow you to create CDs or DVDs One or more media programs are installed on your computer Windows Media Player and optionally Windows Media Center are provided by Microsoft Other...

Page 19: ...y work with the media programs installed on your computer or may require specific programs Files that include DRM functions may only play in specific programs e g iTunes Windows Media Player or only o...

Page 20: ...the Internet as the connection speed is low and connection time is typically charged per hour DSL e g ADSL DSL Digital Subscriber Line is an always on connection that runs over the phone line As DSL...

Page 21: ...with other computers in your home Installation Speed and Simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cables through walls and ceilings Components o...

Page 22: ...th the members of an ad hoc wireless network This is the method of connection if you do not possess an Access Point router Turning On Off a WiFi Network Connection Most computers feature a WiFi button...

Page 23: ...le browser window by switching from one site to another through tabs at the top of the browser frame 7 Quick tabs Select and navigate through open tabs by displaying thumbnails of them all in a single...

Page 24: ...mation when you want it right on your computer s desktop Simply click on the Google Desktop search icon to start the program Note To learn more about Google products and features visit www google com...

Page 25: ...you tick Scan for and attempt recovery of bad sectors your computer will carry out the physical error checking when you next restart your computer Click on Start to proceed Disk Cleanup The Disk Clean...

Page 26: ...n will automatically appear Free some Space on your Hard Disk Drive 1 Empty the Recycle Bin When you delete a file from your computer Windows places it in the Recycle Bin All the deleted files remain...

Page 27: ...ng Windows System Restore from the Windows desktop Click on Start All Programs Accessories System Tools System Restore If you cannot access the Windows desktop 1 Press the Alt F10 key upon start up wh...

Page 28: ...ered everyday keeping your security applications and operating system up to date is crucial Norton Internet Security combined with other security applications can protect your computer from Internet a...

Page 29: ...acts as a shield to protect your Internet connection from unwanted connections some of which may attempt to take control of your computer to install or re distribute viruses or malicious programs Eac...

Page 30: ...ictionary Try to select especially strong unique passwords for protecting activities like online banking Keep your passwords in a safe place and try not to use the same password for every service you...

Page 31: ...es can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted One of the easiest ways to get the tip off that something has gon...

Page 32: ...ur computer from programs from the internet trying to access your computer this sometimes is necessary to allow access for program updates downloads etc Windows Updates If you have an active Internet...

Page 33: ...ser s security settings to determine how much or how little information you are willing to accept from a Web site To access Internet Explorer security settings 1 In Internet Explorer click on Tools In...

Page 34: ...e issue Also remember to read our recommendations in the Safe Computing section page 25 to get the most of your computer and prevent problems in the future Nothing displays on the screen page 34 The s...

Page 35: ...battery is correctly inserted 2 Check that the battery is sufficiently charged 3 Connect the AC adapter and attempt to start your computer Disconnect or remove additional devices A faulty device or ba...

Page 36: ...ter with a different boot device Press F12 when starting your computer to enter the boot menu this feature may not be available on all computers If your first boot device is HDD change it into CD or D...

Page 37: ...ious software propagated when you are connected To check if your computer has been infected run a check with your antivirus and anti spyware programs To be fully efficient these protection programs mu...

Page 38: ...gram in the list and click on End Task Does this happen with only one application If you notice that a specific program does not work correctly try uninstalling and reinstalling it Click on Start Cont...

Page 39: ...ce noise or distortion depends on your screen s proximity to sources such as TV sets mobile phones other monitors refrigerators large stereo speakers power adapters halogen lighting with built in powe...

Page 40: ...connection ensure that you Connect your modem directly to the phone socket Avoid using telephone extension cables this degrades the signal quality In thunderstorm conditions make sure that you discon...

Page 41: ...Panel Change the View by option to Large icons then select Phone and Modem Make any changes to match your phone configuration and click on OK to finish 4 The modem is used by another program COM port...

Page 42: ...at you have selected the correct ISP for the account you are attempting to use 4 Your Internet account settings may have been changed a Disconnect from the Internet Close Windows Mail and any other ap...

Page 43: ...t to product a Before installing any new program be sure all other applications are closed b Insert the CD or DVD Most CDs or DVDs start automatically and display an installation screen If the disc do...

Page 44: ...mory RAM or Processor CPU please refer to InfoCentre 3 External hardware device Installing a new hardware device such as a printer scanner joystick etc is not a complicated task Each type of device ha...

Page 45: ...ate when everything was working correctly For instructions see Returning to a previous system condition on page 46 4 Reset your system to its factory condition If nothing else has solved the problem a...

Page 46: ...e points to get your system running again Windows automatically creates an additional restore point each day and also each time you install software or device drivers Help For more information about u...

Page 47: ...to Caution Continuing the process will erase all files on your hard drive 4 Click on OK The recovery process begins by restarting your computer then continues by copying files to your hard drive This...

Page 48: ...on of the device UNINTENTIONAL EMITTER PER FCC PART 15 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC rules These limits ar...

Page 49: ...s on how to comply with the fax branding requirement INDUSTRY CANADA IC INTENTIONAL EMITTER PER RSS 210 Caution To prevent radio interference to licensed service or co channel Mobile Satellite systems...

Page 50: ...together This precaution may be particularly important in rural areas The Ringer Equivalence Number REN assigned to each terminal device provides an indication of the maximum number of terminals allo...

Page 51: ...iring regulations in your country In the U K these are the IEE regulations POWER SUPPLY AND CABLES Power Supply The power supply socket inlet and socket outlet if equipped are classified as Hazardous...

Page 52: ...NSIDE THE COMPUTER CAN BECOME HOT AFTER PROLONGED USE You then must close the chassis before you plug in and switch on the equipment LASER COMPLIANCE STATEMENT The optical devices are tested and certi...

Page 53: ...ectronic Equipment WEEE Directive requires that used electrical and electronic products must be disposed of separately from normal household waste in order to promote reuse recycling and other forms o...

Page 54: ...me it is in use then that person may also use the SOFTWARE on a portable or home computer 2 Copyright The SOFTWARE is owned by Gateway or its suppliers and is protected by United States copyright laws...

Page 55: ...ory card reader 8 Optical drives 9 DSL 20 41 DVI port 12 E Electronic Program Guide 19 Email 42 Environment 53 Epilepsy warning 5 Error checking 25 eSATA 12 ExpressCard 11 External hardware devices 44...

Page 56: ...oftware Removing software 26 Software License 54 Speakers 7 Spyware 29 Storage 14 S Video 12 System requirements 43 System Restore 27 38 System tools Disk Cleanup 25 Disk Defragmenter 25 Error checkin...

Reviews: