A computer requires maintenance just like any mechanical device in order to operate properly. I use my computer extensively for school and personal use and need to keep it "bug free" and operating smoothly. Maintenance is really simple and requires very little time once you become familiar with the the programs. I think that the trade off of a few minutes for maintenance each week is well worth the time and effort compared to completely rebuilding an infested hard drive and the risk of losing important files.

One of the biggest problems for computers is infestation with spyware, adware, Trojans, viruses, key loggers, etc. Those pests can "gum up" a computer quicker than anything I have seen. The symptoms are many, such as: slowing the machine's performance, hijacking the Internet browser, blocking Internet access, interfering with installed programs, pop-up ads, and preventing a machine from starting. A computer can be infested and not show obvious symptoms.

The following are suggestions for routine maintenance and several programs to prevent, detect and remove pests. These are programs which I like and either currently use or have used in the past to keep my machine running optimally. There are many other programs available which do an excellent job as well. Many are free to download either as freeware, shareware, or trials and easy to use. As with all shareware, the authors would appreciate a $donation$ if you like the product.

Create a Backup

First and foremost, back up important files. One of the best computer technicians I know told me that the three cardinal rules for operating a computer are: 1) back up; 2) back up; and 3) back up. I use a second internal hard drive and a third external hard drive to back up critical files on a daily basis and frequently back up to a portable hard drive to store backups away from home. I suggest keeping a copy of your critical files away from home or office in case of fire.

Hard drives can and do fail and cause data loss. I have a friend who had two internal hard drives fail simultaneously and regretted not having an additional backup such as an external hard drive, a CD or DVD. Additional hard drives and recordable CD/DVD drives are relatively inexpensive compared to losing critical files.

I use Second Copy to perform automatic incremental backups of my critical files every night. It runs in the background and backs up data files with no user intervention. Acronis True Image will create an exact disk image for complete system backup and disk cloning. The disk backup file contains an exact copy of a hard disk, including all of the computer data, operating system, and programs. You can restore the entire system after a crash or simply replace lost files and folders from your disk backup. Additionally, Microsoft's operating systems include a backup utility.

Install Anti-Virus Software

Install anti-virus software. Viruses can infect your computer from many sources, such as: a Web page from the Internet, email, or a floppy disk.  Keeping your computer safe from viruses is just as important as backing up files. I have been using Comodo for about a year and really like the protection if offers. It has a firewall and anti-virus, and the free version is extremely effective. AVG, Grisoft's anti-virus software, is well respected and a free download to try. Trend Micro (PC-cillin) will perform a free virus scan online. Zone Alarm's Security Suite includes anti-virus software, a firewall and anti-spyware software (discussed below) . There are many effective programs on the market that are inexpensive compared to an infected hard drive, such as: McAfee, Norton by Symantec, PC-cillin by Trend Micro and EZ Antivirus by Computer Associates. Many Internet service providers offer anti-virus software as a part of the subscription price. Do not install multiple anti-virus programs since they will conflict with each other and cause problems.

Install a Firewall

A firewall (especially for cable and DSL connections) is critical to prevent access by intruders.  Install a firewall which will monitor outgoing access from a computer (Trojans, key loggers, etc.) as well as incoming access. Many firewalls will monitor only incoming access and you may not know if you have a "bug" trying to "phone home" from your computer. Many Internet service providers offer a firewall as part of the subscription price. Do not install multiple firewalls since they will conflict with each other and cause problems.

Zone Alarm's firewall is popular, very customizable and you can download the basic firewall free of charge. A subscription to the Zone Alarm Security Suite (free to try) includes a firewall, anti-virus and spyware protection. Be certain to view the tutorial and read the instructions for any firewall as they are very powerful programs and can block access which you do not intend. For example, while protecting your computer a firewall may interfere with interactive Web sites and programs. NS Online is an interactive program which has applications that are like pop-ups which are often blocked. You can always configure a firewall to grant access for specified programs and activities. It is worth the "learning curve" associated with all software.

Remove Garbage

Window Washer is a very customizable and thorough program for removing any unwanted garbage (cache, temp files, cookies, etc.) which accumulates during normal operation - much more so than the Windows clean-up utility. A free trial is available.

CCleaner is an excellent freeware program for removing unwanted garbage. This is my favorite as I have used it for years, and run the program daily.

Block Spyware and Adware

Spybot Search and Destroy is great for preventing access by many pests, getting rid of spyware and adware and offers frequent manual updates as new definitions are added. Have it search for updated definitions, use the immunization feature, and then have it scan problems. Spybot is free to download as shareware and the authors would appreciate a $donation$.

SUPERAntiSpyware really impresses me. They have a free version, a paid version, and a portable version that will run from a flash drive. The paid version offers real-time protection, scheduled scans, and automatic updates. They often have a good deal for a lifetime license.

Malwarebytes is one of the best programs I have found to identify and remove malicious software. It is free to download and use. Real-time protection can be activated for a modest price. It has removed "gremlins" that other programs could not.

AVG, Grisoft's anti-spyware software, is well respected and a free download to try.

Lavasoft's Ad-Aware is a great complement to Spybot since each will discover some things that the other may not. I have it search for updated definitions and then perform a deep scan. The personal edition is a free download.

Spyware Blaster automatically runs in the background whenever Internet Explorer or Mozilla's Firefox is launched and will prevent a lot of adware, spyware and ActiveX controls from ever getting in to your computer. I have it search for updated definitions at least weekly. The program and manual updates are free and you can pay a nominal fee to have it perform automatic updates.

Microsoft has joined the battle against spyware with the release of Microsoft Windows Defender. It is a free download and a very effective program. I like the continuous protection which it offers since it is always running in the background and updates itself automatically.

Spyware Sweeper is another excellent program worth the purchase price. It is always running in the background and updates itself automatically.

Scan Your Hard Drive

Windows includes ScanDisk to scan your hard drive for errors. A hard drive should be scanned occasionally to check the tables that contain information about the files on your computer, check the critical system files, and check the data areas to see if there are any bad files. This can uncover hidden problems before they become visible as critical ones.

Defragment Your Hard Drive

A hard drive should be defragmented occasionally. The information stored on a hard drive gets fragmented (out of order) from normal use and especially from installing and uninstalling programs. The more fragmented a hard drive becomes, the longer it takes for Windows and programs to find the files which they need to operate. Performance will deteriorate and there is additional wear and tear on your hard drive as the operating system has to spend more time searching for files. How often you defragment your drive depends on how much you use your machine and how often you install and uninstall programs.

Microsoft includes a defragmentation utility with their operating systems. Windows 2000, XP, Vista, and 7 allow you to determine the degree of fragmentation prior to running the program. I use Raxco's Perfect Disk which will defragment both the Master File Table and hard drive in addition to consolidating free space which slows the rate of refragmentation. Defragmentation may take a while depending on the percent of fragmentation. I suggest stopping as many programs as possible, especially a screensaver, prior to defragmenting your drive.

Protect Against Power Fluctuations

I will not start my computer without an Uninterruptible Power Supply (UPS) for protection from both power surges and decreases from the electric company. A power decrease can be equally or more destructive to computer components as a power surge. A UPS provides a steady stream of power to your computer and connected components. Most include software which will save your work, close programs, and shut down your computer in the event of a power failure.

Install Updates

Remember that Microsoft has an automatic update feature in Windows for the latest "fixes and patches" to their operating systems and related programs. Some of the downloads may take quite a while with a dial-up connection.

Clean the Registry - this is best left to the professionals

Finally, the registry, which is akin to the "central nervous system" for a computer, needs attention occasionally. The registry becomes cluttered over time with a great deal of useless information and develops large numbers of registry errors which degrade performance and can cause error messages and crashes. The registry is crucial to whether your computer operates properly or at all; consequently, making changes should be left to the most experienced computer technicians. A reputable registry cleaner will remove the unnecessary clutter and fix registry errors to improve system stability and performance.

CCleaner is an excellent freeware program that also contains a cleaner for unwanted garbage (cache, temp files, cookies, etc.) which accumulates.

When All Else Fails

Sometimes, a repair of the operating system is possible. Microsoft has a support articles with instructions to perform an in-place upgrade (reinstallation) of Windows XP, Vista, and 7.

I have used Windows File Protection with success on several (not all!) computers when there were problems with Windows XP system files. Click this link for an excellent article about using this utility.

Sadly, there can be so much damage to the system and program files that repair is either not possible, worth the time or economical. The only alternative is to format and rebuild the hard drive with the operating system, programs, and data. The payoff from the time and effort required is that your computer should perform as well as it did when you bought it. A complete backup image using software such as Acronis (see above) is a huge time saver if restoration of your hard drive becomes necessary. The best time to create and store an image of your hard drive is immediately after a complete rebuild.

My Current Configuration

There are many programs available which will do a good job of maintaining your computer. The ones I listed are simply some of my preferences. I suggest that you do a little price shopping if you decide to purchase any of the programs mentioned since prices can vary significantly. I hope that these programs and suggestions will improve your computing experience and welcome any suggestions which you wish to offer. As with any program... read the instructions and help files prior to use.


Definitions:
ActiveX Controls: A loosely defined set of technologies developed for sharing information among different applications.
Adware:
Software which is free to download and use but includes pop-up banner ads.
Fragmented: Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently by creating, deleting, and modifying files.
Key Logger: A key logger, or keystroke logger, is hardware or software which records user keystrokes.
Spyware: Software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
Trojan: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Virus: A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.