Restore Your Computer's Performance with Windows XP
If your computer seems slower than it used to be, it probably is. My one-year old Dell laptop is much slower now than when it was new. Over time, computers get slower for a variety of reasons: files become disorganized, unnecessary software consumes resources, unused network drives slow startup, or too many programs automatically run at startup. Larger, serious issues can dramatically slow your computer's performance too. You may have a virus or need to troubleshoot problems by clean booting.
Fortunately, Windows XP includes tools to clean your computer and restore its performance. As I write this column, I'll be cleaning up my own computer and explaining how its performance improves. I'll cover Backup, Disk Cleanup, Disk Defragmenter, Add or Remove Programs, and the System Configuration tool.
Back Up First
Back up your computer before you run any system tools or do any troubleshooting. This is not just an over-cautious warning. Some of the steps I recommend in this column can cause pre-existing but hidden problems to surface, which may keep your computer from starting. Windows XP includes Backup, a tool that helps you protect your data.
To open the Backup or Restore Wizard
• | Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Backup. |
For information on how to use this tool, see Ed Bott's column, Backup Made Easy and the Microsoft Knowledge Base article, How to Use Backup to Restore Files and Folders on Your Computer in Windows XP.
Before I make any changes, I'm going to time my computer to see how long it takes to restart. That way I know which of the changes helps the most. My computer took about three minutes to shut down, restart, and then open my e-mail client and browser. Of course, I hope to improve the computer's overall performance, but the time it takes to restart is easiest to measure.
Clear Out Forgotten Programs
The first step in tuning up your computer's performance is to remove any unnecessary programs. I install new programs all the time. Sometimes I'm thrilled with the new program and I continue to use it. Other times, it doesn't do what I hoped, and the program sits on my computer consuming resources and hurting performance.
Follow these steps to remove unneeded programs:
1. | Click Start, and then click Control Panel. |
2. | Click Add or Remove Programs. |
3. | Scroll through the list and examine each program. Windows XP lists how often you use a program and what day you last started it. As shown in Figure 1, the Age of Mythology Trial is a good candidate for removal from my computer. Though I liked the game, I haven't used it recently and it's consuming a lot of disk space. You shouldn't remove anything labeled as an Update or Hotfix, however, because they improve the security of your computer. ![]() Figure 1: The Add or Remove Programs window. |
4. | Click each program you no longer need, click the Remove button, and then follow the prompts to uninstall it. |
You may have to restart your computer after removing a program. After your computer restarts, repeat the steps above to remove more programs.
Free Up Wasted Space
Removing unused programs is a great way to free up disk space, which will speed up your computer. Another way to find wasted disk space is to use the Disk Cleanup tool by following these steps:
1. | Open My Computer, right-click Local Disk, and then click Properties. |
2. | On the General tab, click the Disk Cleanup button. Disk Cleanup will spend a few minutes examining your disk. |
3. | The Disk Cleanup dialog box opens. As you can see in Figure 2, it found almost three gigs of space on my computer that it could free up! ![]() Figure 2: The Disk Cleanup tool. |
4. | Select the desired check boxes in the Files to Delete list, and then click OK. Disk Cleanup will spend several minutes clearing space. |
5. | If you have more than one hard disk, repeat this process for each hard disk listed in My Computer. |
You can save yourself some time by automating the disk cleanup process. For more information, read the Microsoft Knowledge Basic article, How to Automate the Disk Cleanup Tool in Windows XP.
Defragment Your Computer
I hate newspaper articles that start on the front page but continue somewhere in the middle of the newspaper. I could get through the article much faster if it was printed on consecutive pages like a magazine article. Files on your computer can either be fragmented like a newspaper, or unfragmented like a magazine. Over time, more and more files become fragmented. When a file is fragmented, it takes longer for the computer to read it because it has to skip to different sections of the hard disk—just like it takes me a few seconds to find a page in the middle of a newspaper. Figure 3 compares how a computer reads unfragmented and fragmented files.

Figure 3: Fragmented and unfragmented files compared.
You need administrator privileges to defragment a drive or volume. Although fragmentation is complicated, it's easy to defragment your computer by following these steps:
1. | Open My Computer, right-click Local Disk, and then click Properties. |
2. | On the Tools tab, click Defragment Now. The Disk Defragmenter opens. |
3. | Click your first hard disk, and then click Defragment. As shown in Figure 4, Disk Defragmenter will work for at least several minutes, though it may take several hours. ![]() Figure 4: The Disk Defragmenter tool. |
Free Virus Repair and Prevention Tips
Boot sector virus repair
What is a boot sector? All disks and hard drives are divided into small sectors. The first sector is called the boot sector and contains the Master Boot Record (MBR). The MBR contains the information concerning the location of partitions on the drive and reading of the bootable operating system partition. During the bootup sequence on a DOS-based PC, the BIOS searches for certain system files, IO.SYS and MS-DOS.SYS. When those files have been located, the BIOS then searches for the first sector on that disk or drive and loads the needed Master Boot Record information into memory. The BIOS passes control to a program in the MBR which in turn loads IO.SYS. This latter file is responsible for loading the remainder of the operating system.What is a boot sector virus? A boot sector virus is one that infects the first sector, i.e. the boot sector, of a floppy disk or hard drive. Boot sector viruses can also infect the MBR. The first PC virus in the wild was Brain, a boot sector virus that exhibited stealth techniques to avoid detection. Brain also changed the volume label of the disk drive.
How to avoid boot sector viruses. Commonly, infected floppies and subsequent boot sector infections result from "shared" diskettes and pirated software applications. It is relatively easy to avoid boot sector viruses. Most are spread when users inadvertently leave floppy disks in the drive - which happen to be infected with a boot sector virus. The next time they boot up their PC, the virus infects the local drive. Most systems allow users to change the boot sequence so that the system always attempts to boot first from the local hard drive (C:\) or CD-ROM drive.
Disinfecting boot sector viruses. Boot sector repair is best accomplished by the use of antivirus software. Because some boot sector viruses encrypt the MBR, improper removal can result in a drive that is inaccessible. However, if you are certain the virus has only affected the boot sector and is not an encrypting virus, the DOS SYS command can be used to restore the first sector. Additionally, the DOS LABEL command can be used to restore a damaged volume label and FDISK /MBR will replace the MBR. None of these methods is recommended, however. Antivirus software remains the best tool for cleanly and accuarately removing boot sector viruses with minimal threat to data and files.
Creating a system disk. When disinfecting a boot sector virus, the system should always be booted from a known clean system disk. On a DOS-based PC, a bootable system disk can be created on a clean system running the exact same version of DOS as the infected PC. From a DOS prompt, type:
- SYS C:\ A:\
and press enter. This will copy the system files from the local hard drive (C:\) to the floppy drive (A:\).
If the disk has not been formatted, the use of FORMAT /S will format the disk and transfer the necessary system files. On Windows 3.1x systems, the disk should be created as described above for DOS-based PC's. On Windows 95/98/NT systems, click Start | Settings | Control Panel | Add/Remove Programs and choose the Startup Disk tab. Then click on "Create Disk". Windows 2000 users should insert the Windows 2000 CD-ROM into the CD-ROM drive, click Start | Run and type the name of the drive followed by bootdisk\makeboot a: and then click OK. For example:
- d:\bootdisk\makeboot a:
Follow the screen prompts to finish creating the bootable system disk. In all cases, after the creation of the bootable system disk, the disk should be write protected to avoid infection.
Wireless Product Equipment - Network Routers, Access Points, Adapters and More
Wireless Game Adapters
Linksys WGA54G Wireless Game Adapter
linksys.comA wireless game adapter connects a video game console to a Wi-Fi home network to enable Internet or head-to-head LAN gaming. Wireless game adapters for home networks are available in both 802.11b and 802.11g varieties. An example of an 802.11g wireless game adapter appears above, the Linksys WGA54G (compare prices).
Wireless game adapters can be connected either to a wireless router using an Ethernet cable (for best reliability and performance) or over Wi-Fi (for greater reach and convenience). Wireless game adapter products include setup software on a CD-ROM that must be installed on one computer to complete initial configuration of the device. As with generic network adapters, wireless game adapters must be configured with the correct network name (SSID) and encryption setting.
Wireless Internet Video Cameras
Linksys WVC54G Wireless Internet Video Camera
linksys.comA wireless Internet video camera allows video (and sometimes audio) data to be captured and transmitted across a WiFi computer network. Wireless Internet video cameras are available in both 802.11b and 802.11g varieties. The Linksys WVC54G (compare prices) 802.11g wireless camera is shown above.
Wireless Internet video cameras work by serving up data streams to any computer that connects to them. Cameras like the one above contain a built in Web server. Computers connect to the camera using either a standard Web browser or through a special client user interface provided on CD-ROM with the product. With proper security information, video streams from these cameras can also be viewed across the Internet from authorized computers.
Wi-Fi Internet video cameras can be connected to a wireless router using either an Ethernet cable or wirelessly. These products include setup software on a CD-ROM that must be installed on one computer to complete initial Wi-Fi configuration of the device.
Features that distinguish different wireless Internet video cameras from each other include:
- resolution of the captured video images (for example, 320x240 pixel, 640x480 pixel, and other image sizes)
- motion sensors, and the ability to send email alerts when new activity is detected and captured
- ability to timestamp images
- built-in microphones and/or jacks for external microphones, for audio support
- types of WiFi security supported, such as WEP or WAP
Wireless Range Extender
Linksys WRE54G Wireless Range Expander
Linksys WRE54G Wireless Range ExpanderA wireless range extender increases the distance over which a WLAN signal can spread, overcoming obstacles and enhancing overall network signal quality. Several different forms of wireless range extenders are available. These products are sometimes called "range expanders" or "signal boosters." The Linksys WRE54G (compare prices) 802.11g Wireless Range Expander is shown above.
A wireless range extender works as a relay or network repeater, picking up and reflecting WiFi signals from a network's base router or access point. The network performance of devices connected through a range extender will generally be lower than if they were connected directly to the primary base station.
A wireless range extender connects wirelessly to a WiFi router or access point. However, due to the nature of this technology, most wireless range extenders work only with a limited set of other equipment. Check the manufacturer's specifications carefully for compatiblity information.
Free Virus Removal Tools
Getting a virus on your system is frustrating to say the least, and can be hazardous to the health of your computer. Indeed, today's malicious software can even steal your identity and wreck your hard-earned credit rating. To help fight back, here's a list of free tools, tips, and tricks to get rid of viruses and keep them from getting back on your system.
Free Virus Removal Tools
Sure the antivirus vendors want to make money, but if you ever get the chance to meet one of their virus researchers, you'll find their real motivation is to protect users. As corny as that may sound, it's true. That's why when stubborn or fast-spreading infectors are discovered, antivirus vendors release special tools to remove the malware - and give the tools away free. It's no substitute for installed antivirus software, but if you're already infected and in a pinch, it's the next best thing to, well, installed antivirus software.
- It's ideal for making a rescue CD so you can scan the system from a clean boot.
- McAfee AVERT Stinger - McAfee AVERT Labs offers a handy utility to run in Windows that cleans some of the more common malware.
- Microsoft Malicious Software Removal Tool - Microsoft offers a free tool to remove prevalent software active on the system. The tool is offered via Automatic Updates, Windows Updates, and Microsoft Updates, or it can be manually downloaded using the provided link.
- Symantec Virus Removal Tools - Antivirus vendor Symantec offers a wide range of free cleaning tools for individual malware removal.
- F-Secure Virus Removal Tools - Another good choice for individual malware removal are these free tools from F-Secure.
- For a second opinion scan or a not-so-stubborn infector, try one of the Top Online Scanners
No comments:
Post a Comment