ComputerCavalry: Slow Computer Repair and PC Maintenance | Computer Cavalry | Skillshare

ComputerCavalry: Slow Computer Repair and PC Maintenance

Computer Cavalry, Join The Cavalry!

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
26 Lessons (2h 17m)
    • 1. Disabling Start Up Applications

      4:11
    • 2. De-fragmentation

      4:45
    • 3. Uninstalling Applications

      2:49
    • 4. Deleting System Cache

      6:55
    • 5. Deleting Temp Files

      5:14
    • 6. Compression

      4:34
    • 7. Introduction to Task Manager

      3:04
    • 8. Task Manager - Applications

      4:21
    • 9. Task Manager - Processes

      6:12
    • 10. Task Manager - Services

      5:31
    • 11. Task Manager - Users

      6:55
    • 12. Task Manager - Performance

      3:04
    • 13. Introduction to Files

      2:58
    • 14. File Association

      5:27
    • 15. Hidden Files

      3:43
    • 16. Previous Versions

      8:02
    • 17. File Permissions

      5:16
    • 18. Data Recovery

      8:43
    • 19. Windows Remote Assistance

      4:50
    • 20. Bonus: Problem Step Recorder

      4:05
    • 21. Bonus: Reliability Monitor

      4:49
    • 22. Bonus: Task Scheduler

      6:04
    • 23. Bonus: Find Free Space with TreeSize

      3:48
    • 24. Bonus: GodMode

      2:52
    • 25. Bonus: Software Restriction Policy

      8:43
    • 26. Bonus: What is the Internet

      10:10

About This Class

Is your computer run slow? Take this course and learn how to speed up a slow computer!

Is your computer running slowly? Welcome to an easy-to-master web based course on basic computer maintenance to help keep your PC running in tip top shape and provide you a solid foundation in computer repair.

In this course you will learn all the various methods to answer the age old question: How to speed up a slow computer as well as a few little known features ( tips and tricks ) of Windows to help your productivity. After all, there must be more you can do with your PC besides online shop and check email right?

Welcome to ComputerCavalry!

Transcripts

1. Disabling Start Up Applications: in this session of the class, we're going to be discussing startup applications in every system. Majority of the applications that you installed in Windows, um, by default are set to run its start up. Now. How could this affect our system and its functionality? Well, let's go over to our whiteboard and see. So imagine every day you showed up to work and your supervisor gave you one task to do. One. Test Monday. One test Tuesday, one test Wednesday, one test Thursday. One test Friday seems simple enough, right? That's easy enough to accomplish unless you say by the second week he gave you another test to do on top of the one test that he gave you. So every day during your second week, you would have to test to do Still seems pretty simple, right? Let's just say a few more months go by and your supervisor has given you for more things to do. First thing in the morning. Nine things. 10 things. 11 things. What once was simple, no has reached a peak. It's now degrading the efficiency of whatever test that he gives you. That's kind of exactly what your system is going through. The more application that you install, the more applications by default is set to run at startup. So we're going to go in and disabled these applications that we do not necessarily need. So our system can load fast, Go ahead and click start and in the search programs and files tag type M S C O in F I G and hit in. This is the system M s CONFIG utility. This utility handles the starter process. It can disable or re enable software. I can say with drivers, drivers that you may need for your microphone or sound and it can also disabled services like your principle that you need in order to print any type of document. The section that we're going to be covering is in the start up, Tad. Now here you notice on this system, I have three applications. This is a fairly new system. But if you notice you see Skype in Microsoft being service now look at it this way. Let's just say every morning going into work when you get in your car, you have a few things that you normally going to do to make sure that you make it to work properly. You're getting your car. Um, you put on your seatbelt. You adjust your review mirror, you adjust, you see things like that. But what if you started hanging in air freshener every time you got? Now you need to put on your seat, Bill, and you need to adjust your review, Mir. But you don't necessarily need to hang a new air freshener every time you go to work. And that's what we're noticing. The difference here is do I absolutely need Skype to load every time I log in? No. Do I need Microsoft being toe run every time I log in? No. So now that those two are unchecked, I'm gonna hit, apply. And OK, now it's going to prompt you to restart. Make sure you don't have anything open that you need on restart the application. Now, when your system comes back up, it knows not to load any of those programs that you don't need and thus making sure that your system uses its resource is problem. I'll see you guys in the next section 2. De-fragmentation : today, we're going to be discussing fragmentation. What's fragmentation, how to fix our PCs, And what steps can we take to defrag our system and gained system optimization? What's the dis fragmentation? This fragmentation occurs when a file is broken up into pieces to fit on your hard drive. Now, because falls are constantly being written, deleted or resize things like that. Fragmentation is a natural currents. When a file is spread out over several locations over your hard drive, it takes longer to read and write. Hence your system performance is going to degree now. Naturally, we think the computer is saving data how we speak, but it's not. Let's take a look at our white board and see if we can get a better understanding this. It's fragmentation. This is naturally, in a way, how your PC saves your data. Um, for instance, for us, we may say the cow jumped over the moon in one sentence, but the way your hard drive is going to save that information is completely different. Is gonna look for open sectors on your hard drive to save it. So like you see in the pain here, it's kind of broken up the cow jumped over the moon kind of spread out. We want to go from this to this. This is D fragmentation. De fragmentation is when your system is going to piece together all information related UNWTO. One common sector is best as it can, hence increasing the read and write of the information to present to you. Let's go and take a look and see how we can do this. Go ahead and click. Start click Computer, Select the partition. In this case, we're going to do the C drive and right click and hit properties. Now you see you space free space disk cleanup under the general tab. But we want to go to tools now under tools. You'll see d fragmentation. I'm going to select Defrag Now, now here's my C drive and here's another partition. I'm gonna go ahead and select my C drive and hit Analyzed this. Now what this is doing This is seeing just how sloppy the room. It's just seeing how, um how the more complicated the cleanup is going to be. Eso is gonna analyze it now you can skip this and just go straight into defrag. I like to analyze so I can see how long possibly it would take. Now, here, you see that this drive is 9% fragmented, which means 9% of my total. Dis is kind of sloppy and messy, so it's going toe kind of mess with my overall performance, My read and write performance of the disc. Basically, when you request information, you create a file named A B and C. Um, if that file isn't together, if it's spaced out like we discussed the cow jumped over the moon. You're reads what it takes for the hard drive. To find that file and present it to you is going to take longer than if it was d fragmented in the right section, like in a library. So we're gonna go ahead and hit defragment. This is gonna analyze again on that doesn't affect anything, but first is going to analyze, then is going to DeFrank now. When it's done, you may see maybe 1% 2%. Something like that is never gonna be just zero. But that's exactly as long as your system is going under a regular defrag. Oh, you'll see a boost in system performance. This was Cory with computer cavalry dot com. I'm going to see you guys in the next section 3. Uninstalling Applications: today, we're going to be discussing uninstalling applications. Go ahead and click your start button and type uninstalled. Now you should see uninstall program. Pop up is an option. Go ahead and select Now here this was called The Programs and Features Pen. Here you can see what applications are listed. The publisher of the application. The data was installed on the size and the version. Now there's multiple reasons why you may want to uninstall an application. Maybe it's making your system freeze. Um, maybe the application isn't what you thought it was going to be. Or maybe you just want to free up more space. After all, each application does take a certain amount of memory or a hard drive space. I should say, Um, let's go ahead and uninstalling application. I'm going to click Skype now. Keep in mind, every application may uninstalled differently the next buttons or your options to uninstall what you want. Oh, completely remove all programs or things like that. So no two programs majority of time, will uninstall the same. But you just follow the props and you should be OK. So like I said, I'm going to select sky and click uninstalled, and it asked me just to make sure. Do you want to uninstall Skype? Yes, is preparing to remove the application now from the user account control I want to select? Yes, and just as an example, Skype Ear's one of the applications that bring you to the website. When you uninstalled the application, they really like feedback just as to why you wanted to uninstall the application. And that's about it. Um, some programs may prompt you for a reboot when the application is done, installing if no other uses along in and you have worked that you saved or whatever, it's perfectly fine to restart the system. Sometimes your system won't let you install other applications until that reboot is complete. I hope you guys enjoy this video and I will see you again in the next course. 4. Deleting System Cache: today, we're going to be discussing system cash. What is system cash, how it affects your PC And what are some of the things we can do to resolve thes issues Now ? What exactly is system Cash System Cache is the section of your computer's memory where your temporary Internet files or stored saving Internet files is your computer's way of speeding up the process of opening Web pages. So Internet files are basically your computers way of trying to help you get to commonly visited websites faster. Sounds like a great idea, right? Let's go over to our dry board and see how this can degrade our system over time. So let's just say every day you wake up for work, you get dressed, you leave, go out, you'll be successful. You come back home and you just throw your clothes on the ground and you do. There's not because you're just a messy person. You do this because in your mind well, I'm probably gonna wear this shirt again sometime this week. I'm probably gonna wear this tie against sometime this week, so it doesn't really make sense. Toe. Hang them back up. That makes sense to a certain degree. It's not sanitary, but it's makes sense to a certain degree. So you stick to this process? No. Every day you come home from work, you just store your clothes on the ground. So in the beginning, it may have seemed like a great idea. But now, just to navigate through your home, you need to step over close. Um, you're starting to get bugs. You can't find your keys, things like that. That's exactly what's going on with your PC, because your PC is trying to help you get to websites faster. It keeps thes Internet files on your PC and what happens over time they pile up just like a stack of clothes. So what we're going to do, we're going to try to organize these clothes Or even better yet, get rid of the close. We don't even wear, um, out. So let's see how we can do that. Go ahead, go to start, click computer, select your C drive, right click hit properties nine a section you see. Use face free space and disk cleanup. Go ahead and click disk cleanup. Now, here in this second window, the disk cleanup window for you see Dr. Your system is telling you. Hey, I found close in these sections. You have dirty clothes here. You have dirty clothes. Here, here, here, here, here. And it's also telling you the amount of free space you gain by picking up your dirty clothes. So we want to go ahead and select all of these boxes. Now, keep in mind if you notice here, you'll see the recycle bin. We know when we if you don't know when you delete certain files, they don't just go away. They go to the recycle bin first. Then to delete those files, you have to integrate cycle. Been to the point where you can't recover them. Um, so any files that you have here in the recycle bin are going to be gone. If that's what you want, go ahead and hit clean system files. Now your system is gradually collecting these clothes that we spoke about earlier from the different parts of your apartment, you can say and it's starting to put them together. Um, color clothes with color clothes, white clothes, white clothes, socks. Things like that is storing the organizing now. So that way, when it's time to clean up, everything would be fine. So we're gonna let this run, Um, for a second. Now, this may run a little longer, depending on how long it's been. Since you've cleaned your PC A Z, you can see it says this may take a few minutes to complete. This is a fairly new PC, so it shouldn't take too long. Now, after this is done, we're going to look at another section within Internet Explorer. Actually, we can do that now. Go ahead and open Internet Explorer in the top right corner. You're going to see a gear icon. Go ahead and click that. Go down to Internet options. Select that and in the browsing history section, if you, if you read it, says, delete temporary files, history cookies, safe password and Web information. Go ahead and hit. Delete another prop is going to come up now. I've unchecked all of these boxes. You can delete these, but where mainly focusing on. We see that the other window opened is the temporary Internet files and websites, so we want to go ahead and delete that close out. Now let's go back to our disk cleanup section. So it did an in depth scan of everything. So, like I said, this is a fairly new PC, so this is gonna be very low. Chances are on your PC. If it's been a long time since you've done this oil change, you can say this may be in the gigs. That's the relevance of this particular system of maintenance. Um, these temporary files, all of these clothes that we spoke about that's on the ground eventually will eat up space on the hard drive. Just like if you have clothes everywhere in your apartment, you're gonna be eating up the square footage. So we want more square footage back. Go ahead and hit. OK, so by deleting these files in these locations, I'm going overall gain one make of free space. Yours. It could be gigs. Five years, 10 gigs, things like that Go and hit. OK, delete files. Now your system is going to go in and get rid of all the clothes that were on the ground that you don't wear. That's taking up space. And that needs to be clean. Good Here, OK, and that's how we perform a system clean on our system as faras cashing goes, Um, I'll see you guys in the next section 5. Deleting Temp Files: today, we're going to be discussing temporary files. What are temporary files, how they affect our PC, and what do we need to do to remove temporary files in order to get a significant boost in our PCS performance? Now what a temporary files. Temporary files are files that are created and Windows as the Windows applications run. Now, these of files that can be removed when the application close. Most applications are set to remove these temporary files from your PC. Once they're no longer need it to conserve space, the majority of applications do not. So what happens? Well, Ah, these temporary files accumulate. They take up more and more and more space space that eyes basically going to trash. Um, so let's go over to our Dr board and see if we can get a better understanding of temporary files. Now, the name of this application is going to be long more when you purchase a long more and you go outside and you cut graze as you're cutting grass. The grass that you're cutting is blowing everywhere right as you're cutting, grass is grass blowing everywhere. The lawn war is the application. The grass that's being blown everywhere or your Tim files the lawn mowers. The application in the grass is the temp files. Basically your PC. The more time files you have, the more grasses all over your yard. So what we want to do, we want to rake the grass together, put it in a bag and get everything looking nice. And that's what we're going to do. So let's start off by going to start clicking computer, right click on the C drive and hit properties. You see you space free space and disk cleanup. Go ahead and click this cleanup. Now, your system is beginning to look in different areas for the grass. In here you'll see downloaded programs and files temporary Internet files, recycle bin thumbnails and temporary files. That's what we want to get rid off is our temporary files. So I'm gonna go ahead, uncheck all rest of these A Z, you can see it zero bytes of already. I've done a cleaning, and this is a brand new system. Anyway, I'm gonna click cleanup system files. So now your PC is beginning to Rick all the grass together, basically, and put them in a bag. We're gonna let this finish on. And after this, I'm going to show you the two locations that the system is looking out for these temporary files. Actually, while that's loading, we can go ahead and do that. So go ahead and hit. Start in type percent T e m p percent and hit Now. Now, this is one area off temporary files that needs regular cleaning. Now, it's advised that if sometimes if you don't recognize these files, I wouldn't necessarily delete them. We don't know what applications need these files to run. Um, that's one location. Now the other location is going to be on your C drive. So once again, go to start computer, see Dr Windows, and we want to scroll down to tempt. Now, this is the second area of temporary files. No, we're going to leave these two locations alone because, like I said, we're not exactly sure what applications need these to run. So you don't accidentally delete something. And then when your application like adobe tries to run, it freaks out and say, Hey, you're missing this file. I can't open now. You have to reinstall. But I just wanted to show you where the locations that it was looking for. So we're gonna close out of this. And here is the disk cleanup. For now, we're gonna uncheck everything, accept our temporary files, not even tells me how much this space I gained by deleting my temporary files. And like I said, this is a new PC, So this is gonna be zero, But on yours, it could be one gig to gig three gigs. You're going to gain space back. Your lawn is gonna look of bigger square footage wise. So go ahead and hit, OK, delete files. And that's it. And it deleted your temporary files. I will see you guys in the next section. 6. Compression: today, we're going to be discussing compression. What is compression? How it affects our PCs. And how can we use compression to gain more free space on our systems? So what is compression? Well, at a very, very, very simple basis Explanation. Compression means replacing one representation of data with another that takes up less space. Now, that sounds very simple. I know. So let's all get on the same page here and go over to our white board and see, we can explain that better. So let's just say you own a home, you live in the apartment or you just have your own room and you start to look around and you say, You know what I want to decorate. So you go out and by three trees. Now you love thes trees, but you're starting to notice. They take up a good amount of space in your room. You can't really put a couch in. Um, you have to walk around them to go to the restroom. There's kind of bulky, Um, but you like the look and feel you get. So you take the first step, you remove the trees and you do some thinking how can I have the exact same looking feel off those trees without taking up the space of the room? Well, you go out and you buy three paintings off three trees. Now, you still have the look and feel that you love. But on top of that, you have more space in your room. Now you can put a couch in. You can walk back and forward to the rest room. You can't friends over. That's compression. At the very basics, compression means replacing one representation of data with another that takes up less space. Now let's go back to our system and see compression in action. I'm gonna go to my Dumbo folder. Uh, sorry. Documents voted here and I have a folder name Dumbo. I'm going to right click on it. Hey, Properties. And as you can see, the toll file size for this file is 2.8 gigs. Let's comparison. I'm going to click advance And in the compress and encrypt attributes section, I'm going to click compress contents to save disk space, Hit okay and apply now, sometimes depending on the file size. Um, the compression may take a while. I've seen compression go through in matter of minutes. I've seen other files getting compressing. It took hours. This one shouldn't be too long because it's only three gigs. And, um, from there, we're gonna go into there it is. Now, look at that. The actual size of the file. 2.8 gigs. But the size on this is now only four kilobytes. That's amazing. Compression. We saved over 200. I'm sorry to gigs worth of space in our system. Go ahead in here. Okay. And now you'll see the file has this blue overtone to it. That's just to let you know that this file has been compressed. So how about we want un compress the file or decompress right? Click on the file and hit properties, go to advance and in the compress and encrypt attributes section, uncheck the compress contents and save disk space. Section it okay and apply. Now, this is going to take probably the same amount of time that it's the first time to compress the file. So I won't keep you guys on the line for that. But I will see you guys in the next section, and that is compression and how it affects our systems. 7. Introduction to Task Manager: in this section of the course, we will be discussing task manager. What is task manager? What are the various ways we can find it on our PC? And how can we use task manager to analyse PC performance? So what is Task Manager? Task manager is an application preinstalled in Windows that allows you to analyze what applications are running, what processes, services, PC performance, networking, statistics and user information, such as who's logged in and what are the resource is they're using. Let's go and take a look at our Dr Board and see if we can get a better understanding of task manager. So suppose you had a car. And, um, at this current state, your car isn't really performing like it used to. When you first got it, you're having problems very breaking your signal lights randomly work. Your engine is having problems responding. Your transmission doesn't really shift gears. You're having various problems, so you bring it into a mechanic and he hooks it up to a machine to analyze your overall um , state of your car. Now task manager can provide the same information when it comes to your PC, tell you your CPU utilization, your memory consumption, what processes are running, who's logged in? And, like I said, as well as what applications or resource is those users are using while long thin? Let's go ahead and take a look at some of the various ways we can access. Task Manager One of the most basic ways you can access. Task manager You want to right? Click you bar at the bottom and select start Task Manager The second way we can Access Task Manager is through hot key combination, which is control shift escape. That's method to now the last and final way we can access. Task Manager It's just the old school control Oh, delete and you'll see it listed within certain sections. Now let's take a closer look at task manager as a quick run down. Now here, you see Task Manager provides you with what current applications are running. What processes, services system performance, such a CPU usage and memory consumption. Your networking statistics and what users are logged in in the next course will look at applications how to end applications, start applications and so forth. I'll see you guys in the next course 8. Task Manager - Applications: today, we're going to be discussing task Manager the applications tank. Go ahead and right. Click your task bar at the bottom in Select START Task Manager Now here in the applications tab, you'll see a list of programs or applications currently running on your PC. Applications that run minimize, such as your antivirus software or Windows Update, will not be located in this section. So what we'll do? We'll grow, well, quick rundown of the various uses of the task manager applications, Tad. So I'm going to select Adobe Acrobat Reader from the list and I'm going to right click now . Here you see a few options switch to bring to front minimise maximise things like that, and we'll go over each in detail, so we'll start with the switch to option. Like I said, I'm going to select Adobe Reader, right click and select Switch to now. This will open the application. As you can see. Let's minimize that. Bring back up task manager and select libraries right click switch to, as you can see, that open the library's application. Another feature within Windows Task Manager in the applications is the ability to minimize and maximize your programs pretty self explanatory. You can right click the application, minimize or maximize. Like so. Another feature is the bring to front. Now. What that means is, if you have one window open and another one to open, you can select which application you want to bring toe front for you. Let's see how that works. I'm going to open Adobe Acrobat Reader, and I'm going to open Windows Media Player now. Currently, what's in front is Adobe Acrobat Reader, but I want to bring Windows Media Player to front, so I'm going to select it right click and select. Bring to front. As you can see, that brought the application to the front process. These are just some of the various task that you can run within the applications tat. Another very important feature that most technicians use to, um in test would be just that option. The Windows task manager provides you with way to end applications. As you can see, it's listed here one of the three radio ones, but let's select it from the list. I'm going to select Adobe Acrobat Reader, right click and select in tests or in this program. As you can see it closed out. I'm going to do the same for Windows Media Player Selected right click and select in tax Now a lot off. Like I said, technicians use that applications, and you can use it as well, particularly for application that you're having problems closing. Sometimes our systems get hung, applications get hung on and you're stuck clicking the Red X button at the top of an application, maybe 50 times before to close. Task manager the in tests, um, selection is a very easy way to close those applications. You may have to do it a few times, but that will give you more success than just clicking the expert. I will see you guys in the next course. We will discuss processes. 9. Task Manager - Processes: today, we're going to be discussing Windows Task Manager processes. What are Windows processes? Exactly Where can we find him on our system? And how can we manage Windows processes to make our system run more efficiently? So what are window processes? Windows Task Manager separates is display of what's running on your computer into two tabs . The Applications tab and the processes tab. The Processes tab is much longer list that shows every execute herbal file that's running on your system. Let's go ahead and take a look at this. Go ahead and right click your task bore and select start Task manager. And in the Processes tab, you'll see every execute herbal application that's currently running on your PC. No, we're going to select the program. Let's try no pain that e X e I'm going to right click, and here you see a variety of selections opened fire location in process set priority properties go to service. Let's go with the 1st 1 open file location when that selected Windows task manager will bring you to the e x e file of the application itself where it is exactly, we see the path here in the top of the bar gonna close that out. The other thing we're going to do is in process now when we in this process is the same as closing the application. Let's try that out. I'm going to right Click on no pad e x e Go down to in process and select and you'll get a pop of saying, Do you want to end? Whatever process you selected, I'm going to hit yes or in process. As you can see, No pad went away. Let's go ahead and look at another application. Chrome. I'm going to right click and I'm going to go down to set priority. Now, as we can see, Google Chrome has the normal section selected. Now, what exactly does set prod t two? Well, let's go over to our Dr Board and get an example out of this. Now suppose you and your friends go to a sports bar. And like most sports boys, you have to wait to order your drink. You have maybe 123456789 10 people ahead of you. So you know that this is going to take you a while to get your drink. You had a long week of work. You don't really feel like waiting. Understandable. But what if there was a way that when you showed up to the bar, you didn't have to wait? Your priority in this bar is at the top of the list. Basically, you're on the V I. P list of this bar, so when you show up, you don't have to wait for everyone else to order the drink first. Instead, you just go to the front of the line. You are the highest priority. This, in essence, is what setting power setting a priority is in. Windows Task Manager were saying that, um, regardless of the current state of the PC or what applications are open, I can adjust the priority off this application opening basically saying, regardless of what application is open, I want is much memory or CPU processing at the time to go to Google chrome. So I'm going to set it to a high priority, or I can change it to, above normal, below normal or low. It all depends on the current state of the resource is that are available. Sort of like if you go to that same bar and there's only one waitress if his one waitress and is 20 people at the bar, it doesn't matter. You have the highest priority, so your drink is going to be served to you first. That's what setting a priority is. Another thing we can look at is the properties. So we're going to right click on the e X e, go down to properties and select. Now here we get a good general feel, an idea of what exactly this execute herbal is. We know Google chrome, but sometimes you'll see different applications running in this section that you're not really familiar with, and this will be a good way to get more information. We have the creation date the size of the application that's running the details, Google chrome type application, things like that in XY and also security. What uses the groups have access to run this application, and that's a basic breakdown of Windows processes. Like I said, keep in mind, Windows Processes is a central location where you can see all execute herbal files that's running in the background, Um, now going forward in the future, we will discuss in the next section services. I'll see you guys in the next class 10. Task Manager - Services: today, we're going to be discussing Windows Task Manager services. What our services, Where can we find them and how do they affect our PC now? Although working with services can feel like configuring Cem secret part of your PC in actuality services or just programs now there are two different ways that services usually differ from regular program. First services require no user intervention to run. A servers won't pop up any windows asking for your input. Instead, it will simply carry out its tests silently in the background. Secondly, services are managed by the services tool in windows, where they can be enabled and disabled. Let's see if we get a better understanding of Windows services. No us as human beings. In order for us to function, we all have to have. The same service is actually in you right now. Your heart. In order for you to function as a human being, your heart service has to be running pumping blood through your system, keeping your entire body operation. But it does this silently in the background. Without any intervention from you. Your heart will continue to do his job or carry out its test. In fact, it's that we for all living creatures on the earth, the heart has to be beating in order for them to function. Can you run without your heart beating? No. Can you climb a mountain without your heart beating? Can you brush your teeth without your heart beating? No. Your heart service has to be running in the back room. Now. Windows Services are the exact same way. In order for certain programs to run, its services has to be enabled and running. Let's go ahead and take a look at this and RPC. I want you to right click on your task bar and select Start Task manager. Now here in the Services tab, you'll see the name, the pit or the process i d. Its description. Its status in the group that it belongs to now. Like I stated before, In order for certain applications to run on your system, it services have to be running. Let's take printing, for example, in order for you to print the prints, Schooler has to be running. Let's see if we can find it. I'm going to scroll up. Let's organize it first. That might help. Let's see if we can find anything relating to printing or Prince Fuller here. This so we see that our prints fool, is running. This has to be running in order for you to print documents at your job, print Web pages to a PdF anything and actually we see that it's running, so that's a good thing. Let's click services and see where that takes us. Now this is the extended version of your Windows services. Let's go down to the Prince Fool and there it is. We see that it's already started its Cento automatic. Let's right, click on it and go to properties. Now, in the properties of your services, you'll see different configuring custom configurations that you can use. Let's look at the start of type. So here we see at the drop down automatic has been selected because we want as soon as we log Intar PC, we want this service to start because there's no telling when we want to print something, I can manually start it, which means I don't want this to run unless I tell it to run, or I can disable the service altogether if if it's maybe just taking up resource is or causing issue or automatic, but a delayed start. So maybe this service will start after a certain point. Time is what you're looking for. We see we have log on what accounts can access it also, how we want this service to recover. Should our system fail or reset and its dependencies, we'll cancel out of that. And that's a quick breakdown of your Windows services. Once again, they silently run in the background in order for certain applications to run. I will see you guys in the next class. We'll we'll discuss performance. 11. Task Manager - Users: today, we're going to be discussing Windows Task Manager users. Let's take a look at how Dr Board and get a refresh on this. So remember in the beginning of the course, we related a car to the processes that run on your system, and we also covered how that car or task manager would inform you of what users were logged in. Let's go ahead and take a look at that on our system. Right click. The task bore and select start test manager. And here in the Users Tab, we see that I am the only one logged in on this system. Now what we're going to do, we're going to simulate multiple people being logged on onto one system. Let's just say this is a home PC in a public area, and the mom husband, um, Children all use the same computer, so that's let's simulate that I'm going to go over to the start button and I'm going to select lock, not log off luck. Now I'm going to switch user, and I'm going to click on your brother. Let's just say this is your brother long put in his password and no, your brother's log on, Let's go ahead and lock that as well switch user, and we're going to log in to the default administrator account on your PC, the built in administrator account. I'm going to log in with the password that I sit and hit in a Now I'm logged in as the administrator, I'm going to right Click the task bar, Select Start test manager and go over to the users. Take now. As you can see, this lets me know who's currently still logged into the system. Now their account may be locked, but their session here, their particular I D, is still active on the system, which means you can do certain things. Let's just say this is your brother's account. I'm going to right click his account and hit Send message. As you can see, it has a default administrative template. I will delete that in type from you're Dad and I'm going to type clean You're Rome and hit OK, now that little time that you heard was a confirmation that your message was sent to the individual. Let's go ahead and locked this system as the ministry account. No, let's switch back over to your brother's account. So he comes home from school logs in and there, As you can see, he logs in and see a message from his dad at the top to clean his room. Pretty cool, right? They see what else we can do. Gonna hit? Okay, I'm going to lock your brother account. Switch user, head over to the administrator, log in, log in and go back to the brother account. I'm going to right click and I'm going to hit. Log off. Now, Why would you want a long someone off? And what's the dangers? Well, as we mentioned before, things like CPU utilization in memory and networking is shared by all users logged into the system. So let's just say your brother is logged in and he's watching YouTube. But he never actually closed the Web browser. His account is just locked so technically behind the scenes under his account, you'll see a lot of networking, the traffic traffic as well as maybe CPU and memory utilization, and you may experience a PC. Slow down. That's one of the reasons why you may want to log another user off to free up. Those resource is, let's lock him off and he's gone. No, you have to be careful about this because let's just say he was watching you to to do a report for school. And he had Microsoft Word Power point, um, windows open to actually get work done. If he didn't save his information, he would have to start all over from scratch. And you would not be a good dad in that moment. No, if we go back to the lab and hit Connect and let's just say I know the lap passport. Let's just say this is ah, generic account set up for everyone to log into the family. I'm going to hit the password to log in. Sorry and hit. OK, now look at that. I just jumped over from my administrator account into the lab account in the blink of an eye. I hope you guys enjoy this section. I will see you again in another course. Please leave. Reviews, e mails, any questions you may have. Some of you may notice that I left certain things out, um, of each section, maybe show processes from users how to start a new tasks, things like that go ahead and share with anyone you may choose. That's fine. I like. Like I said, I will see you guys in the next course 12. Task Manager - Performance: today, we're going to be discussing Windows Task Manager performance and networking. Let's go ahead and take a look at our Dr board to get a better understanding of this section. Remember, in the beginning of the course, we related a car to the processes that run on your system. Well, the performance and networking section of Task Manager can also be related to the core. But in the sense of the gauges, the gauges off the performance and networking tabs will show you things like CPU utilization, memory consumption and networking statistics. Let's go ahead and take a look at this. Go ahead and right, click your task more and select start tests. Manager Now in the performance tab, you'll see in the Left section the CPU utilization percentage, the history of your CPU usage. Below that, the amount of memory that's being consumed by the system. Also on the network and tab. You'll see Thea amount of networking van with that's been recently used by your system. Percentage wise, let's go ahead and go back to the performance. I created this file called Spike because I wanted to show you how certain applications can spike the CPU usage of your system kind of like us stepping on the gas pedal in that car that we saw. I'm going to double click it. I'm going to drag it down. As you can see, the CPU utilization is beginning to spike as is now. We're going to double click it one more time. As you can see, it's almost upto 80% of the CPU utilization. Your foot is almost touching the ground of that car. This is something to consider when you have multiple applications open on your system. If your system begins to slow down the mawr application that you have open, it's probably going to be good practice to close some of these windows. So I'll close the 1st 1 Now if you notice Look how drastically the CPU percentage utilization dropped. This is something that can contribute to the freezing of your system. Now I'm gonna go ahead and close out of the next window. As you can see, it's almost like taking my foot completely off the gas. I hope you guys enjoy this course. You will see me again in the next section and final sections users 13. Introduction to Files: in this section of the course, we're going to discuss files, file association, hidden files, previous versions and data recovery. So what exactly is the fire? Ah, file is an object on a computer. Their stores? Data? No. When we think about objects that store things, what comes to mind, let's go and take a look at our Dr Board and see if we can get a very simple, clear understanding of what exactly file is now. No doubt. Majority of some things in your home I need to be stored. Sometimes perishable items, things like that. A file like we stayed. It is basically a container that stores data. Kind of like a container, their stores, fruit. The fruit in the container would be the data would be. Maybe you're paced up the amount you were paid or, um, birthday arrangements on a car, things like that. That's all the file is. Let's go ahead and take a look at a very simple demonstration of creating a text file. I'm going to right click on the desktop, select new and text document, and I'm going to name it my first file double Click it and as you can see There's no data within this text document exactly the same way we explained the fruit being in a bowl. So in this case, the file would be the container. The note pad document basically would be the container. No, let's go ahead and add fruit. This is equivalent to the picture that we just saw, and that's all the file is. A file is just a container that stores data. You have files for programs, files for, um, services processes things like that. So I just want to give a very basic introduction to files so that were there, not intimidating. In the next course, we're going to discuss file association. 14. File Association: in this section, we're going to discuss file extensions. There are millions of files use with computers today, and they are identified either by the file extension of the file or the data contained in the file. Let's go ahead and take a look at this. No. In the previous section, we discussed how a container relates to a file in how the data in the file relates to the contents of the container, like the fruit being inside a container. No, the question becomes, How do we know? But these are apples, limes of carrots. In other words, how does your systems? No, what these objects are. Well, that's where File association comes in. File Association tells a program on your system that I'm readable in your format. So hints on Lee Carrot applications can open carrot containers. Only Apple applications can open apples and on Lee lime applications can open the lime container. Look at it this way. Can a cat open a container? No. Doesn't have any thumbs. It's not associated with it. But you can. The human application has already been pre defined toe open containers. It's the same way in your computer Onley. Certain applications can open certain programs. Let's go ahead and take a look at this. Go ahead and click. Start. Well, first, let's never get to our desktop. I'm going to click Desktop. So that way we see my first file and the other fire we're going to demonstrate is this one the certified ethical hacker Exam Information file. I wanted something a little more realistic, so let's go ahead and click. Start in type folder options. As you can see, it popped up. I'm going to click it. I'm gonna go to view and I'm going to scroll down and uncheck hide extensions for known file types. I'm going to hit. Apply now. Watch what happens to these files once I hit. Apply. Uh huh. Now, if you notice the file extensions that's associated with these files are now exposed. We know that this is a dot txt file a text document. If you hover over, you'll see it by type for the pdf same thing dot Pdf adobe Acrobat document. So that means Onley Acrobat products can open this file Onley text file documents applications can open. This file would double click that. We see that no pad application opens the click. PDF in Adobe Acrobat Reader opens. But remember how we demonstrated how a cat is unable to open a container with his hands anyway, let's go ahead and change the extension. Actually, let's just right click on the document. Go to Open With and select Choose Default Program. Now what we're doing. We're changing the default application that opens. Pdf documents. I'm going to click No pad and click. OK, No, this is what happens when the wrong application attempts to open the wrong document. A document that's not associated with it. A file. As you can see, it doesn't really know how to make heads or tail of it. It doesn't know what it iss. No, let's go ahead and change it back. Right Click open with Choose Default program. And I want to select Adobe Acrobat Reader and hit OK and it opens fine. And that's because, like we discuss files, association is the key element to how a file will open with certain applications. That's it for now. I will see you guys in the next course hidden files 15. Hidden Files: in this section, we're going to discuss hidden files. What are hidden files? How can we find them if they're hidden? And one of the various ways we can hide in unhygienic files within Windows? Well, let's start off first. But our favorite text file my first file. I'm going to click it right click, go to properties and in the attributes section, I'm going to check the hidden box it apply. And OK, now look at that. As you can see, the file disappeared. We can even click in the section that the Fire waas and nothing happens. No, let's unhygienic file. I'm going to click organized in the top left corner. I'm going to go down to folder and search options. I'm gonna go into view, scroll down in the advanced settings and click the show Hidden files, folders and drives, but and apply. And OK, now, as you can see, our text file came back. But it doesn't quite look how the file looked before. As you can see, it's kind of faded. It's a little transparent. Well, that's because technically, we never unhinged the file by the fall itself. So let's select the file right click go down to properties. And as you can see, the hidden button in the attributes section is still checked. Let's go ahead and uncheck that it apply. And OK, As you can see, the file now looks exactly how it looked when we created. Now, why is this feature within Windows? Well, one of the main reasons that this features in Windows is because you do have a lot of, um, files or, uh, programs on your system that Windows doesn't really want you to change. Have you by accident, happened to modify these files or delete these files? You may run into a lot of system problems, kind of like going up to a car and pulling filters and power cables and things like that out of the car. Your car would eventually not start, so it's more of a precaution, then a feature. But it is something that we can use. Let's just say this is a generic area that not only you but your wife or kids or husband or parents along into, and you really don't want anyone to delete your work. You don't even want them to see it. Maybe for school war project. This is a very handy way that you can hide your files and still sort of know exactly where they are. Kind of your little secret. I will see you guys in the next course. I hope you enjoyed it So far. Our next course that we will be discussing is previous versions of our files. 16. Previous Versions: in this section, we're going to discuss files previous versions. Let's go ahead and take a look at our dry board to start off. Remember in the beginning how we related a file to a container and the contents of that container, whether it be online. Apple carrot relates to the contents within a file like a text file. Let's just say you've eaten all the lives Carrots in apples. Now you don't have any food, you have to go to the store, stand in line, pay things like that. Get home, washed the fruit off all this other things. What if you could just click a button and all the food you've eaten instantly returned back to the containers, the lines, the apples and the carrots, Basically restoring the previous versions of these items? That's exactly what we're going to look at here. How do we restore a file to a previous version of itself, and why would we do it? Let's go ahead and start. We're going to start with my first file. I'm going to right click hit properties. Go to previous versions. Now, as you can see, nothing's here. Let's create a snapshot of our system Quinn, Click store in type. Create a restore point and hit. Enter or select. You're going to go down to the bottom section. Where? Says creator, restore point right now for the drives that have system protection turned on. As you can see, our C drive Our route drive does have system protection on. So we want to hit, create. And actually, let's name our restore point. We're going to call this restore Points one now, before we hit. Create, Let's go ahead and open our text file and we're gonna change the contents. We're gonna put this information waas entered at 10. 53 PM and we're going to hit safe. Close it out now. Create the restore point. Now, sometimes created restore point can take time. A lot of things affect that. Your hard drive rpm. So you the reading rights. How much data is on your system? Um, different factors like that. Um, as you can see, this is completed and says the restore point was created successfully. Good job, right? So go ahead. He closed, and OK, now let's go back to our file. Are my text documents right? Click hit properties, previous versions. Wait a minute. Nothing is there. Let's do it again. But this time we're going to add MAWR information to our text file. I'm going to copy the line. We created Paste, but I'm going to change the time. 10 54 PM and it's safe. No, let's create another restore point. We're gonna hit, start in type, create, restore point and hit select. We're going to follow the same routine. We see our system protection is still on, going to create and restore point to and hit create. Like I said, sometimes creating a restore point can take a lot of time, depending on files. How fast your system runs of numbers, numerous amount of factors. Aziz. We know this pretty much is already done. And once again it says the restore point was created, successfully hit close and OK, now let's go to our my first text file right click hit properties in previous versions. Now look at that. We see we see a previous version of our file was taken. My first filed today at 10. 53 PM Now, as we can see, let's open our text file. We see the contents of our text file is the exact same, Um, is when we added the last line. Let's close out of that. No, let's restore the 10. 53 version PM the 10. 53 PM version of my first text file. I'm gonna collect selected and hit Restore. It says, Are you sure you want to restore the previous version three minutes ago? Yes, I do. And also, it's important to pay attention and says this will replace the current version of your file on your computer and cannot be undone. Which means unless you say you say something very, very, very important at this point in time, if you restore back to the 10 53 version, you're going to lose that very, very important information that you created. Three minutes later, I'm gonna hit, restore and OK, one last time. I'm going to be OK now let's open the text file. Wow, Now look at that. We see we have the 10 53 version of this file, not to 10 54 So that's the basis off previous versions. It's very helpful, very handy. If a system gets infected or um ah file gets corrupted, that's one of that's probably the most important factor off restoring previous versions. Majority About 80% of people restore previous versions because maybe their pdf file got corrupted or their resume got corrupted. Things like that. Um, now you know a way that you can just restore a previous version of your foul, but you have to create restore points. I hope you guys enjoyed this lesson we're going to be talking about in the next section file permissions and security. 17. File Permissions: in this section, we're going to discuss file permissions. What are file permissions? Where can we find them? And what of the various levels of file permissions that anyone uses can have? Let's go ahead and start off when I drive board. I believe this will be fun. Each file and folder on your systems is regulated by the various levels of file and folder permissions. Filing folder permissions is what allow users such as you and me to have access to this could be read only right or even full control. Um, these are the various levels of file permissions. There's read, right, read and execute, modify and full control. No. What's the details of each one of these levels? Well, the read permission Onley allows viewing listing an accessing file content, meaning you may be able to double click on a folder and entered. You may be able to double click on a document such as our text file and see the contents within the folder itself or file, but you won't be able to delete it or change the content of the file or add to it. You can strictly on Lee, review the file from a distance. Now what about the right permission? The right permissions gives you access to add files, folders or content inside of a file with the ability to make and save changes. So if a folder has one file, you'll be able to add additional files in that one photo. Let's just say it's your tax returns. You'll be able to add 2017 2016 2015 2014. You'll be able to add each file that you wish to that folder, and also you'll be able to change the data within the file. Um, words, music documents, anything with the ability to save those changes. Read and execute. We see there. Read and execute allows the viewing and executing of files and photos executing applications such as E X Files. When you want to install an application on your PC modify, we see that the modify access permits reading, writing and delicious so you can open a file and read it. You can add additional files to that follow folder or to the contents of that file, and you can also delete the file now top with appear full control. Full control gives you each of the various levels below it. Permissions all combining one. You have read access, right, access, execute, access, changing access or modifying and delicious. These are the various levels of file permissions. Let's go ahead and take a look at a file and see an example of this. We're gonna go to our first text, right click on it and go to properties under the security tab. We'll see the group or user names of the various users on this system and also there permissions. We see that the lab user has full control, modify, read and execute. Even right. Administrators, of course, also have those privileges. Now we can modify on these permissions. If you're logged in as a default, administrative or have certain levels administrative access, you'll be able to change these users allowance. So let's just say you have a son. And every time he gets on the computer, he deletes files off the desktop. You can go in and modify his access, saying, Um, I'm tired of him coming into deleting these files. I don't want him to have full control, not even execute, not even right to any files. I only allow him to read the files. That's a very easy way that you can lock down permissions on your systems. When it comes to file and folders, I will see you guys in the next course where we would discuss data recovery. 18. Data Recovery: In our final course, we will be discussing data recovery. What is data recovery? How can we perform data recovery on our own systems if a file gets deleted and what will be the condition of the file after the data recovery? Let's go ahead and take a look at our Dr Ward to get a very clear understanding of data and how it's recovered. Now I think it's safe to say that each one was Don't have a small a group of people standing by force whenever we need our system recovered, whether it from be from the electrical storm, hard drive just basically crashing or someone accidentally deleting our information. So in order to do this in a very cost effective way, let's first understand how data works on your hard drive and what we need to do to recover . No, our systems don't speak the same language as us. We may say the cow jumped over the moon, but your computer may say 1101010110 And of course we don't really speak that type of language. So how exactly is our data stored and recover? Well, whenever you write data to your system. When you create a file, a text fire or picture or anything, your system basically goes in. It marks that section on your hard drive as a one basically saying this section of the hard drive is reserved for this, But what happens when you delete your data? Actually, when you delete your data, if you don't do anything else, your data is still technically there. All your system does is go back in that same section and changed that one to a zero, basically saying the couple that said they were going to come in canceled and now this table was no longer reserved. You can right here. But until something is written there, the data that you perhaps lost is still on the systems hard drive, which is good news for us. But how would we recover this information? Let's see an example. I have an application installed on this system. Cold file scavenger. I've used this application in many different environments. Most companies do. It's a great tool. Recommend it to anyone, but we're going to do We're going to create a new file. We're gonna call it my deleted file that I love. And let's add some data, some data save and actually what we're going to do now we're going to delete this file, right? Click and hit. Delete. No, we're going to do in this. Look. Four section, we're going to hit the drop. Now we're going to look for text files, and, as you can see, just like we went over in the past. This application goes by file extensions. We know in the beginning of this course, we related files, two containers and the contents of those containers relating to the data written within the file. So a container full of limes would have a dot l m e extension things like that. So we're looking for text containers, so we're going to select the text, and we're going to select which partition. We want the system to look in. I want to see Dr. Now. We see we have two different molds quick and long. Now, the first mole, quick, basically kind of scans the surface of your hard drive. Sometimes it doesn't really find documents or information at that level, As you can see, actually, it found some here. Now, the long, um, mold kind of does a deeper scan of the system hard drive, See what files the older file is. Sometimes that sector on the hard drive has been written with another one, so the fire is no longer available. So you would have to do a long search to kind of dig deeper into the hard drive to find that file. And as you can see, after I did the quick find, the file that we delete, it actually showed up. This is my deleted file to recover. Actually, we see these are multiple files named that, but we know that this wasn't the file that we deleted. So let's do a long search. We're going to clear the scan and hit another skin, and we want to say no to this, um, pop up because we don't want the system to skip any deleted files. We wanted to show every file that has been deleted. Now, the long scan sometimes takes a while because you have a lot of sectors on your hard drive into paying on the size on the amount of information has been deleted. This could take a pretty good while. So we're going to do. We're gonna come back when this is completed and we're going to check and see if the file that we loved is in fact recoverable. So we see that our fire recovery has completed. Let's go ahead and see if the file that we love is in this list. I'm going to click on the filter, and I know it contains my to lead it in the subject. So I'm gonna hit, okay and we see it. Here it is at the top of the list, my deleted file that I love the day that it was deleted and the status of the file itself. The condition I'm going to click on it and I want to recover this. So I'm going to find a safe place where I want to recover to. I'm going to select my desktop, okay. And save now is that this is basically warning, saying it's not best practice to save the file to the same drive that you recovered it from . But I'm fine with that. You okay? And we see that this took one second to recover. Let's go in and see if the file indeed is the same as before. Going users lab, desktop and here it is my deleted file that I love. Let's see if the data is still there and it is. Some data is still there, and the most basic way that you could perform a data recovery is simply by just recovering from your cycle. Been whenever you delete a file from your desktop or different places on your hard drive, it doesn't exactly go strayed into oblivion. It goes into the recycling bin, and you can restore that. I'm going to right click on the file and hit, restored. And as you can see, it's been restored back to the desktop. I really hope you guys enjoyed these courses in this section. Check out more of the website computer calvary dot com. Leave reviews Share with your friends. I wanna thank you very much and I will see you guys soon. 19. Windows Remote Assistance: welcome to rocket science and rocket science. We discuss applications, uh, scripting or pretty much anything that you can use to better your experience with your PC. We analyze these applications and see just how simple they really are. Some things may be very intimidating, but we're here to prove that it's not rocket science, and it's very easy to use these applications if you just kind of take the first step. So today we're gonna be talking about quick assists or commonly called Windows Remote Assistance Windows Remote Assistance is a feature of a Windows XP and later that allows a user to temporarily view or control a remote windows computer. Now this can be carried out from your home unless you say you have something very important to work on for your job tonight. But it's raining outside. You're having issues, and the only person that knows how to work on this issue is your brother. Well, with Windows Remote assistance, it would generate a file that you can email to him or maybe upload to Dropbox. And when he runs that application on his PC, he can remote into your PC from his homeless. You say he lives in, um, Florida and you live in New York. He can remote in from Florida to your PC and fix whatever issues your head. Let's go ahead and take a look at this. We're going to click start in type Windows, remote assistance. I'm going to click it now before you can allow him or better yet, so you can get assistance from him. You need to basically enable access to your computer from the outside. I'm going to click Start right click on computer Hey Properties, and I'm going to click the remote settings Options. Now you want in the remote assistant section. You want a lot remote assistance connections to this computer to be checked because, after all, that's what we're doing. We want remote assistance, and also you want to check allow connections from computers running any version of remote desktop. Now you may see less secure because basically, you're opening Mawr options off remote desktop into your computer. What we're doing is because we don't know his version of PC, so we want to apply and OK, no, here you see the two options between invite and help. We want to invite someone in now you have the option to save this file as this invitation as a file. So maybe you can upload it and, you know, maybe through Dropbox and he can log in and run it, or you can e mail it as an invitation. This will basically prompt whatever your default, Um, email client application is at the time and automatically attaching, and then you can also use easy connect. This is kind of a team viewer feature where it will generate some numbers and he can enter it. So let's go ahead and just save this file. I'm going to select my desktop and hit Save No. Here you'll see another remote Windows Assistance window, but you'll see it says Give your help or the invitation file and password. As you can see, this is the password. So in his end, if he wants to connect to, you have to click. Basically, I want to help someone, and in this box it will be blank, and you have to type in these letters on in numbers so he can remotely connect into your PC . We see we have chat settings, troubleshoot and help. Like I said, this is a very cool application already built within Windows, so there's no need to buy a team viewer. I mean, it's a great application as well. You can buy a team U or V NC just if you want to run something free that's already part of your system. I want to thank you guys for attending rocket science and I will see you in the next class . 20. Bonus: Problem Step Recorder: welcome two rockets sides and rocket science. We cover cool tips and tricks that you may not know eyes already a part of your operating system, Windows seven or Windows 10. Certain things that may seem intimidating at first but actually is pretty simple. We're showing you that it's not rocket science. That's the irony of this section. Today we're going to be covering problem recording. Have you ever been in a situation where your car was making a funny noise? A screeching sound or the door didn't close all the way or something like that? And you brought your car into the mechanic, and it just so happens when you bring into the mechanic the car isn't making the sound or the doors opening fine. And you're promising to the mechanic that you're not crazy, that this does happen. Wouldn't it be great if you can provide a recording off when you driving your car as the issue is going on, providing him with statistics in how long you had the car, the vin number, everything that he needs in order for him to troubleshoot, that will be perfect. Actually, Windows seven and Windows 10 has this feature built in, We're gonna look at it. Let's go ahead and click. Start in type problem recorder. As you can see the section call records steps to reproduce. A problem comes up and I'm going to select that here. Props to you. Problem Steps Recorder application. I'm going to start recording. No, I'm going to simulate a user clicking on various things just so we can get some information gathered. Let's try Adobe Acrobat Reader, another document and my spike file that I created earlier in the course. Let's stop the recording. Let's name my file and safe. I see the follows the new Zip files now on the desktop. Let's go ahead and extract that and we see a dot image T five. Let's double click it and see what happens. Uh huh. Now, as you can see, the problem recorder is providing detailed information for you. So when you need to bring your system in for cleanings from virus or your system just isn't functioning properly, things like that problem recorder saves every click that you do with screenshots. So when the technician goes back and sees your system, it also sees where exactly the issue may be occurring we see that the Adobe Acrobat program opened when it closed the document that I opened when the document closed and also my spike file when it ran. It also provides the date and time a more detailed description of what exactly was going on at what certain point in time in history. And this can also be used for if you want to show someone how to use a certain application . Like I said, Guys, this is the rocket science section I hope you guys enjoyed. I will continue to bring features like this to the forefront so everyone can enjoy their system to the fullest extent. I will see you guys in the next course. 21. Bonus: Reliability Monitor: welcome two rocket science and rocket science. We cover little known facts or tips about your PC that you may not be aware off things that could help you in productivity or gather information or assist you in development. This normally includes pre installed applications by Microsoft that's already part of your operating system. Now, today we're going to be covering reliability monitor. Let's just say you're in a relationship and over time, in the beginning, everything is fine like most relationships. But over time you start to go through a few rough patches here and there, and you may not necessarily be getting along like you used to different things like that. And normally that's caused by maybe situations that happened. Maybe within laws or someone's ex from a previous relationship is causing issues, things like that. But if if you don't talk about the issue, it doesn't really help the situation. It just kind of builds on top of other issues, and over time you may even forget the entire reason why you were made in the first place. Um, resource monitor or reliability monitor is kind of the same thing. If you have certain issues on your computer, your computer will lock this and kind of display to you in a graphical user interface. On a scale of one to build 1 to 10 is going on display to your system stability over a period of time. And if a crash happened or warning, it will kind of let you know what application caused it and how often that situation happens. Let's go ahead and take a look at reliability monitor. Go ahead and click store in type view, reliability. And as you can see, it kind of pre popped up. So I'm gonna click that view. Reliability history. Now this. As you can see, you can view your computer's reliability and problem history if you notice here on the third, I had three issues to critical warned to critical events to warnings and 110 informational events. As you can see, it displays summary the date and the action that was took, and over time you see the graph depending on the issue. How frequent that issue is occurring now. This is extremely useful to users and technicians alike. That way, if it's an application causing the issue for instance, on 79 to 2017. We see that no pad stopped responding and Skype stopped responding. Now how could this be of service to us? Well, let's just say at some point in time, our system began to run slow, and it's because we installed a certain malicious tool and we may not know it. There's really very few other places within Windows that will tell you hey, this application on this day that was installed. Ever since you installed an application, your system has been running poorly. That's very useful, because then we'll know where exactly. The problem is kind of how we spoke about being in a relationship. If you can pinpoint where exactly in the relationship issues started, then you can go back and fix it. So let's just say, over time, Skype, uh, just continually to cause issues for my system. Well, then I know I can just go in and uninstalled the application to increase my system's performance and kind of be more area about installing applications. That sort. This can also be helpful. To prevent users from having to go to a system upgrade or cleaning is actually pretty useful to save money. Um, like I say, Guys, this is the Rocket Science Course. The foundation of this course is to instruct users or our home uses that a lot of these features aren't really rocket science, and they're very simple. So we try to walk you through very soft tutorial these I will see you guys of the next course. 22. Bonus: Task Scheduler : today, we're going to be discussing Task it. What is task it, Where can we find it on our PC, and how can we use test schedule to make our lives more simple? So what is Task Edgell Task Scheduler enables you toe automatically perform routine tests on a chosen computer. The task scheduler does this by monitoring whatever criteria you choose to initiate. The task referred to his triggers and then executing the task when the criteria is met. The task schedule can be used to execute tasks such as starting an application, sending an email message or showing a message box. Let's go ahead and take a look at our Dr board and see if we get a better understanding of the task schedule. So let's just say you enjoy cleaning your home every weekend. You do the same 10 task you spray for bugs, you clean the windows, you take out the trash and you vacuum the carpet. Um, are just some of the test you do on the weekend and you really enjoy it. But as life continues to go on, you get busy here. Busier. Uh, you don't really have the free time like you do, too, Do all these tests like you used to be able to so things get a little stressful for you. It would be great if these tests could do themselves. If the carpet could vacuum itself. If the trash could take itself out, that would be an amazing help. Or, better yet, what if the house could just clean itself? This fundamentally, is task Injury Task Scheduler executes certain tasks that you dictate at certain points in time and based on certain type of criteria. Let's go ahead and take a look at task. Go ahead and click. Start in type computer management. I'm going to select it. I'm going to extend Task Scheduler under the systems tools category, expand tax schedule libraries and select Microsoft, and you're right corner select. Create basic tasks. Let's name this test open note pad and in the description will put this test will open No pad. Sorry, no pad and go ahead and click next. Now here you seat the task trigger section. The triggers are basically when do you want to test to start that you wanted to do it daily ? Do you want a weekly monthly? One time when the computer starts when I log on when a specific event is triggered whom let's do when I log on going, could next. Now this is the action section. What action do you want to test to perform? Well, opening. No pad isn't sending an email, so we're not going to choose that. And we don't want to display a message within no pay or just to display a message from Windows. In general, we want to start no pan, so we want to start a program. So we're going to select that and click next now in the programs Last script section going click, browse and we're going to scroll down to see if we confined. No pay There it ISS applications. Gwen hit open. There's no extra arguments we want to add and no specific place we wanted to start. So click next and click finish. No, let's go ahead and log off and log back in and see if no pad starts. Okay, I'm going to log back in. Sorry. And there it is. There's no bad. So task scheduler schedules tests that you may run often. So you ah, good example of task. Every would be maybe when you log in and you want to go fix coffee, but you want your Web browsers open. You want Microsoft Excel open? You won't Outlook 2013 Open whatever applications you want to open at log in. That's how we can use Tass schedule to make our lives more simple. I will see you guys in the next course. 23. Bonus: Find Free Space with TreeSize: Welcome to rocket science and rocket science. We discuss preinstalled applications, external applications, um, tips, tricks, just various different things about your PC that can enhance your experience. Orosz issue in maintenance or just regular PC productivity. Today we're going to be discussing tree size tree sizes, a downloadable application that will display your various files and folders and the amount of space these files of photos take up on your hard drive. Well, what's the benefit that allows you to analyze your system and regain back that free space depending on what was installed or if you even need it? Let's go ahead and take a look. A tree size already have the application downloaded and installed. It's the free version and let's go ahead and go through it so I'm going to click, start and click tree size free. Now I'm going to select what Dr I want scanned so this can scan external drive. Internal drives, solid state drives, just various of um, spaces that can be consumed or in your system. So I'm going to click start scan and I'm going to click on my C drive. As you can see, it's starting to already scanned the system and list of files and folders that it discovered. We see we have the total size for the hard drive on the size. Also in the size table, the amount of space that's allocated the amount of files, folders and percentage usage. No, let's go ahead and give tree size a test drive to see it's true benefits. So I'm going to click under users where I see 5.9 gigs. Let's see, was taking up that amount of free space. I want to click under the lab account desktop. We see that's the most amounts face that's used in this entire directory. And I'm gonna look at the files that says We have five files on the desktop gonna click that and we see we have a text file that's 4.7 gigs in space. Okay, well, let's go ahead and have Gates are desktop and we see we see that same file here with that amount of space that's used now. Of course, I don't even five get text files, so I'm going to right click and hit. Delete. Now, if I scan the system again, we should see that text file going. I'm gonna go back. That's page file. And as you can see, it dropped down to 1.2 gigs. Like I said, tree size is great applications to help you find various, whether it's applications or files that's taking up you space that you don't really need. And it's always great to get back that you space. So this will kind of tighten down your system. I hope you guys enjoy this course. I hope you guys enjoy the entire computer. Cavalry dot com Experience. Please leave reviews. Visit the website. Join, Subscribe. Joined the calorie. That's that's what it's all about when you need backup. Call in the Calvary. 24. Bonus: GodMode: welcome two rockets signs and rocket science. We're going to bring very cool features about your system to the forefront features that you may not know about. That's actually a part of your system that could make your life a lot easier. Today in rocket signs. We're going to be discussing God view now. God View is a one stop shop to get all 207 configurable options in Windows right at your fingertips. Let's go ahead and set that up. I'm going to right click the desktop Go to New Unfolded, but I'm going to rename this folder to something very specific. I'm going to type God moves dot curly braces and I'm going to go slow e d seven b a 470 dash e 54 dash 46 five e Dash a to by sea dash 9971 204 three e zero one c. And I'm gonna do close curly braces and hit it as you can see the icon change. Let's go into God mode and see just exactly what's at our fingertips on a double. Click it, and as you can see, it's all of the sort of short cuts to the main features of the system that we care about, like adding a printer, setting up a computer. Multiple monitors. Um, we can go down to even change your mouse click settings. Let's go ahead and search for a few things and got moved. Let's try power. See you all. Everything about our power settings came up. Let's try history. We see various topics regarding history come up as well. Deleting cookies, browsing history, things like that. So God, mood is extremely useful. If you don't want to click around and find this if you have a problem, navigating through Windows God mode is a good set up for just one click and everything that you're looking for. 25. Bonus: Software Restriction Policy: today we're going to be discussing Windows Software Restriction Policy. Windows Software Restriction Policy is a group policy within Windows that you can use to restrict or allow certain applications or extensions to run on a PC. Now, how could this be beneficial? Well, let's just say you have a PC where you Onley want Adobe Acrobat to run Windows software Restriction policy is a good way to sort of locked that down on the system. Or, if you're on a PC, that, um, Onley handled scan documents. Or let's just take a PC use for one situation and you're worried about whether or not that PC can get infected from another virus or a Trojan. Things like that, you can limit what applications based on the extensions can run on the individual PC. Let's go ahead and take a look at this. The Windows Software Restriction Policy Click start in type local security. As you can see, it popped up that now in the local security policy window, I'm going to navigate to the software restriction policies, tab and expense. Now here we see the different security levels disallowed, basic or restricted disallowed as stated in the Description software will not run regardless of the access rights of the users. So even if you're a local administrator, if the local software restriction policy says you can't run shortcuts, then they won't run, and we'll see an example of that short. We have Basic User, which allow users to run. I'm sorry allow users to execute applications even though they don't have administrative rights and unrestricted basically saying anyone can run these applications or extensions. We have the enforcement policy. Let's take a look at that. We see that there's different categories, mainly three. We see the appliance software restriction policy to the following so we can do all software files except library, such as the L Elves or also for files, period. Now, Windows software restriction policy can really damage a system. We know we don't want Windows fouls restricted from running because we need windows to do our work. Basically, So this is where you want to be very careful in your selection on what file extensions or files you want to run on the system. You see, we have another category apply. Also apply software restriction policy, even to users. Do we want all users or everyone except local ministries. We want all users to abide by the software restriction policy in our last section. When applying software restriction policies, we can choose to enforce or ignore significance. Here is where we are actually going to, um, make our assignments in our policy in the designated file types I'm going to right click it hit properties Now here you see, we have batch files, command scripts, E X e applications and so forth. Shortcuts? No, In my experience in using Windows software restriction policy, it all depends on what? Your basic. I'm sorry your default secures security level. It says so. For example, let's go ahead and select this a lot and I'm going to set it. Is default gonna hit? Yes. Now disallow has been set as my defoe policy. What does that mean? Well, let's go back to our designated file types when Windows Software restriction policy is set to disallow sort of Look at it is the opposite. If the default is disallow and we take out, let's just say, uh l okay, Alan Kay short profiles. We're basically saying we do not want shortcuts. Toe run on our PC. I'm gonna hit. Apply and OK, now you need to reboot the system in order for this policy to take effect One hit start and restart. Give it a second to come back up. Yes, I'm using virtual box. Give it another second going to the administrator account? No. Now the Windows Software restriction policy to not allow or disallow shortcuts for applications to run has been enforced. As you can see, I have Windows in and explore on the desktop. I'm going to double click. As you can see, these shortcut files are not allowed, even though the dot txt file is allowed at this time, we see that the air message that we get is the program is blocked by the group policy. Let's try another five. I'm gonna go back back to local group policy. Open that and let's make a short cut for Windows Media Player. It's into desktop. Let's try that same error message because we disallowed Windows applications shortcuts to run on our PC. Now I'm going to set it back to unrestricted, said his default. Exit out and reboot one more time. See if the oh, I'm sorry, I need to add the short cut link back to the policy. I'm going to go under self restriction policies and designated file types Que and I'm gonna hit at now. We're saying all the files within this system are now unrestricted and they can run. Basically all green lights exit out and restart. I want to give it a second to come back up logging with my administrator credentials. Let's try to run Windows Media Player again, and it works. Like I said, Windows software restriction policy is a great, um, sort of tool within Windows or a feature of windows that you can use to combat viruses. If you only want users to access certain applications. Things like that. A very good central place to handle. Ah, policy for software. I hope you guys enjoyed this video. I want to see you again in the next one. 26. Bonus: What is the Internet: today, we're going to be discussing a very important topic, one that needs to be understood before anything else is branched off into about computers or the I T industry. What is the Internet? A computer calvary. We specialize in simplicity. Albert Einstein once stated that if you can't explain something simply then you don't understand it well enough. The Internet is just one computer connected to another computer through a computer. Now I know that sounds a little confusing, and like I said, we're going explain things in very great detail. For example, the cloud as complicated, amazing and over height as advertised that it may be. The cloud is just a computer somewhere else. This computer that somewhere else is called a server. A server is just that. A server is a computer that serves you re sources. These resource is could be information on a database such as user name and password. Things that authenticate you through websites that you log into could be a Web server such as yahoo dot com or computer calorie dot com, or it could be files that you upload and download, such as Dropbox or a local file repository that you have. But in order for this content, whether it be files data, bee's Web, whatever these computers must be made known in the world. After all, you can't visit a place you don't know exist, right? You need to be introduced. Have you ever been so single for such a long time that one of your friends makes it their life mission to help you find someone? Well, computers have that same friend in her name is I n the Internet Assigned Numbers Authority . Actually, I Anna isn't just one computer. It's dozens of core computers that run the world. The reason we're able to email is because of I am. The reason we're able to visit YouTube is because of I. In the reason you can post on Facebook, instagram even buy food at the grocery store. It's all because of I in without her. We would be back in the Stone Age overnight. All of our computers know each other and have relationships because of Iowa. But who is she? What does she do exactly? Let's see Diana in her sister Computers in action. This is Jim. Hi, Jim. Now we know Jim because his mother, who by right, named him Jim. Everyone loves Jim, not Raymond Jim. But there's an issue. How do you identify one Jim from another person named Jim? Well, the government had a brilliant idea named Social Security numbers. Your Social Security number identifies you apart from anyone else that has the same name is you. Your computer has a unique number that it uses toe Identify itself in the world, called an I P address. This is Jim to us, but this it's Jim to I Anna. Now that we have a basic understanding of computers, servers, Jim, Jim's friends, let's see how Anna works. But remember, because this is going to get a little complicated. I'm going to do my very best to explain it. Simply, The Internet is just one computer connected to another computer through I m remember that I n stands for the Internet Assigned numbers authority. That's what she and her many sister computers do. They assign numbers or so security numbers in a way. Two computers or servers remember, a server is just a computer that provides information or resource is that's all the same as if you were in the river in a restaurant and your server provides you with food, drinks, even entertainment. Well, good server. Anyway, we're going to look at three different servers. Max, Jim, hi, Jim and Tom. I n a has provided each one of these service with its own so security number or i p address . When you research things on the Internet such as cars, um, parties or money, the Internet is just one computer accessing another computer through I, Anna and her sister computers. Maybe when you access ah, car information, you're going to ford dot com or for parties, you're going to meet up dot com or for information regarding money. You're accessing Forbes dot com. Let's see how I m runs the Internet online. I'm gonna open my Web browser in This is I N. It looks simple right now. Let's go under domain names. I'm going to click on Root Zone Management and I'm gonna go to root servers. These or the computers that run the world, their names, their I p addresses or they're so security numbers and who manages them? We see here just a few that you may be familiar with. We see the U. S. Army U S Department of defense, NASA, University of Maryland. Things like that. So we see who manages the root servers or computers that run the Internet. All computers have to go through Diana to basically live and say, Hey, I exist. I need a so security number When you go to Facebook, Facebook has to be registered Things like that. Another thing that I n in her many sister and manage or the dot notations have you ever noticed Whenever you type something in your Web browser, whether it's dot org's dot pdf that com particularly we're all familiar with dot com. Let's see who manages that I'm going to scroll down and I want to look for dot com. Scroll down a little more here it IHS dot com. So this is the information or the delegation record for dot com. We see who basically runs this. The technical contact, the servers or the computers that operate dysfunction, and the company registration services in that is the Internet. The Internet is just one computer accessing another computer through i n. I hope I made this course very simple for you guys. I hope you enjoy it. I will see you again in the next