Possibly the greatest contributor to a badly performing computer is malware. Generally this is associated with downloading an application that contains spyware, by not having browser security settings high enough, by carelessly downloading P2P files, or by failing to install security sections regularly.
Stage 1. Update the definitions of your antivirus and operate a full scan of your hard disk drive in Safe Mode. Resolve any unfixable problems. Note that some infections require additional measures until they could be removed; ordinarily a internet search will locate specific directions or a special removal tool. Use the BC forums to obtain help, if you cannot find a solution.
2. You’ve recently downloaded an application, and if the sluggishness is unexpected, the problem might rest there. Check this by completely removing it. A sensible user will typically perform a internet search about the application before getting because in most cases, any potential issue with malware or poor performance will have surfaced.
Stage 3. Adware and Spyware can radically effect your computer’s functionality, and these are throughout the Web. A very recent study showed that one out-of every 20 executable files on Web sites is spyware, and 1 in 25 domains contain at least one bit of spyware waiting for victims.
Experienced users will often run two or three of these programs, because each company has its own criteria for what constitutes spyware and will simply search against their own set. (A set of very good, free antispyware programs is supplied by BC). Again, solve any open issues before proceeding to the next step.
For further reading about Malware and some malware removal applications, use BC’s Tutorial section; most of the programs have very good Help documents that clarify how they function too as the special attributes of each.
Step 4. Review apps that self-launch on startup. You computer may be a battleground for your interest. Many programs, for instance, install a rapid-launch feature that allows them to be exposed fast; other programs will include an automated update feature that demands them to be operating in the background. Your launching Windows are slowed down by each of these and each requires a small bit of assets while your personal computer is running.
You may use its startup tool that lists startups and allows you to turn off any you usually do not need, if, for instance, you have Spybot Search and Destroy. If you’re uncertain about what may be safely deleted, remember that Bc maintains a quite comprehensive Startup Database that contains information about whether the inquired item is required, optional, or unnecessary.
At the same time, remember that all those icons on your own Desktop also take a modest number of trunk time to put themselves.
Lack of Care
Stage 5. Clean up your hard drive (preparation for Action 7). Delete unused programs and move old files to your CD. Unplayed games, tons of family images, zipped files that you have opened, applications you have not found in two years, software for the old printer you threw away last year—these are a few examples of files you can delete. Then use Window’s Disk Cleanup to remove temporary internet files, temporary PC health files, etc.
(Note for higher level users: some professionals would include the additional upkeep step of cleaning the Windows registry, and you’ll find plenty of apps to assist do this. For the most part, registry maintenance will not make a critical difference, and unless you are quite comfortable with Windows, and carefully make backups of-the registry, you may do serious damage by making registry changes, so this measure isn’t included
Step 6. Run scandisk / checkdisk in Safe Mode. Have it fix 090000009f.
Stage 7. Defragment your personal computer. Windows will set new documents in any available open space; defragging will place related segments of files closer together so your read arm has less going around the hard drive to do, saving wear-and tear while racing up programs.
Hopefully, since you have have finished, you will see a noticeable improvement in computer operation.