Malware
Possibly the most important contributor to a poorly performing computer is malware.
Stage 1. Update the explanations of your anti virus and run a full scan of your hard disk in Safe Mode. Resolve any unfixable issues. Notice that some infections need additional steps until they may be removed; ordinarily a web search will locate specific directions or a particular removal tool. If you can’t find a answer, use the BC forums to obtain help.
Step Two. You have recently downloaded an application, and if the slowness is unexpected, the issue might live there. Test this by entirely removing it. A sensible user will usually perform a web search about the application before getting because in most cases, any possible trouble with malware or inferior performance will have appeared.
Step three. Adware and Spyware can drastically effect your personal computer’s functionality, and these are all over the Web. A very recent study indicated that one out of every 20 executable files on Web sites is spyware, and 1 in 25 domains include at least one piece of spyware waiting for victims.
Experienced users will often operate several of these applications, because each company has its own criteria for what constitutes spyware and will only search against their own established. (A list of very good, free antispyware applications is given by BC). Again, resolve any open issues before continuing to the next step.
For further reading about Malware and some malware removal applications, use BC’s Tutorial section; most of the programs have quite good Help documents that explain how they function also as the special characteristics of each.
Uncontrolled Applications
Stage 4. Evaluation programs that self-launching on startup. You computer can be a battleground for your attention. Many programs, for example, install a fast-launch feature which permits them to be exposed rapidly; other programs may include an automatic update feature that requires them to be running in the background. Your launching Windows are slowed down by each of these and each needs a small bit of assets while your personal computer is running.
If, for instance, you have Spybot Search and Destroy, you may use its startup tool that lists startups and allows you to turn off any you do not need. Remember that BC maintains a very complete Startup Database that contains info about whether the item is needed, elective, or unnecessary, in case you are uncertain about what can be safely removed.
At the same time, remember that all those symbols in your Desktop also take a modest number of boot time to set themselves.
Lack of Care
Step 5. Delete unused applications and exchange old files into a CD. Unplayed games, lots of family images, zipped files that you have opened, applications you haven’t found in two years, software for the old printer you threw away last year—these are some types of files you can delete. Then use Window’s Disk Cleanup to delete temporary internet files, temporary PC health files, etc.
(Note for advanced level users: some experts would contain the additional care stage of cleaning the Windows registry, and you’ll find several apps to help try this. For the most part, so this measure is not contained, you may do significant damage by creating registry changes, registry maintenance won’t make a major difference, and unless you are very comfy with Windows, and cautiously make backups of the registry
Stage 6. Run scandisk / checkdisk in Safe Mode. Have it fix The requested address was rejected by the server..
Step 7. Defragment your personal computer.
Hopefully, now that you have have concluded, you’ll find a marked improvement in computer functionality.