• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

Secure Computing Practices

May 14, 2013 by Andy Thompson

Synopsis:  This blog article focuses on the privacy and personal security functionality of PC Clean Maestro– the removal of personal and private files.  There are numerous examples of cybercrime and online hacking which exemplify damages that can be lost in terms of financial wealth, private data, and personal information that can be used against your will.  In this article we will offer some examples of how you can prevent falling into malicious traps.  For more detail of cybercrime examples refer to our newsletter.  While encryption and firewall techniques are available, experts agree that there are always vulnerable points of entry.  We emphasize eliminating the risk by removal of data where possible.

Introducing – PC Clean Maestro:

The CompuClever application PC Clean Maestro has more than one major function.  It is used to remove junk files, to uninstall programs, and for removal of data for purposes of security and retaining PC privacy. Removing private data that is sensitive or can be stolen is done in the same manner as removing junk files with minor differences.  We will outline the procedure here in step-by-step fashion.  Before we begin, let’s start with a best practice tip.

Best Practices: 1. BackUp Data

As we stated in our previous article… backup your data!  This article deals with removal – permanent removal – of sensitive and private items.  As can be seen in the list provided below, these are items that are automatically created by ongoing functions of your PC including passwords, personal credentials and ID’s that you have entered when online.

It is good practice to make a copy of all files that are important to you and safer practice to keep these stored on an external hard drive. Today’s hard drives are often more gigabytes than the average person needs – and some are now terabyte in size (1,000 GBs).  External hard drives prices are very reasonable and there the added advantage of having a good backup and storage strategy is that you are working toward optimizing free space on your PC so that it can run faster.

Try out Microsoft’s Sync Toy.  This free tool makes synchronizing your files fast and easy.  You can avoid duplication and feel assured that you haven’t missed backing up all your files.

Best Practices: 2. Configure Your Browser Privacy

You can configure your browser settings to better restrict the privacy controls.  Refer to your browser settings and look for “privacy” or “security” (or both).  By configuring these settings you choose what items to block or restrict including cookies and Private browsing or Do Not Track (DNT) browsing traffic.  In recent years all major browsers have included a Do Not Track (DNT) option.  This enables a user to choose to not have their online activities tracked.  This applies to Internet Explorer, Google Chrome, Mozilla Firefox, Safari, and Opera.  The one shortcoming of this: “The Do Not Track system is completely voluntary, and there are no legal or technological requirements for its use. As such, not all websites and advertisers will honor the request or may completely ignore it altogether.”[1]

The Personal Security and Privacy Scan

By using PC Clean Maestro you can detect personal data items that are automatically stored on your PC.  Any of these items on their own may not constitute a substantial threat.  However, these items together – personal addresses, passwords, account information, and more – can be used together to provide an intruder what they need to gain access to perform financial transactions or use your data unlawfully. Here is a summary of the items that PC Clean Maestro scans:

Personal Security

  • Personal Identity Information: IDs and passwords used for Windows and for Internet access.
  • Saved Forms Entry Data: name, address, phone number, credit card information.

Privacy

  • Chat & Instant Messaging History: Skype and Windows Messenger messaging content.
  • Internet Browsing History: visited URLs, downloads, search history, cached images.
  • Multimedia History: videos watched.
  • Windows & Application History: Windows clipboard, document history, applications used.
Note: For a complete list of categories scanned, including sub items, see this knowledge-base article. As we will see, you have the option of choosing only the items you want to scan and remove.

The Steps:

There are three areas of cleaning using the Clean Tool.  We are staying focused on the privacy and security aspects of PC Clean Maestro.  The following instructions detail how to remove items that are a threat to personal security and privacy.

Step 1:  First you need to open the program.  The window will appear similar to as seen below.  We have expanded the Personal Security and Privacy sub-item sections to get a closer look at the items listed.

Select Items to Scan - PC Clean Maestro

Step 2:  Select items to scan.  Of the check boxes available you can review and clear items you want to remain on your PC.

Note: You can refer to the help file for instructions on how to use the three-state check box system.

Step 3:  Initiate the scan using the “Start” button.

Step 4:  Review and Clean.  A summary of the scan is displayed including the number of detected items found in each category, the size that can be reclaimed, and a “Details” link.  The link will provide the complete list of items found and the location of each item.  You can clear any selected items before moving on to the next step.

Privacy and Security Scan Results - PC Clean Maestro

Step 5: Clean.  Click the “Clean” button to permanently delete the selected items.

Note: Once you begin the Clean process, PC Clean Maestro presents a warning dialog when certain privacy items are selected from the Scan results.  This is a preventive step, a safeguard measure, so as to not unintentionally remove items.  Refer to the help file for a description of the warning, the list of items, and recommendations about what you need to do before choosing an option.

Best Practices:  3. Regular Use of PC Clean Maestro

Create an automated schedule.  Use the Options button in the Main window and select the Clean Scan Schedule.  From here you can configure when you want an automated scheduled scan to run.

Question Period:

What browsers do you support?
We support Google Chrome, Mozilla Firefox, and Windows Internet Explorer.  We also support the cleanup of history information recorded by Skype, Adobe Flash Player, Microsoft Excel, Power Point, Microsoft Word and several Windows items.

What are cookies?  Do I need to remove them?
Web cookies are used to identify you and prepare customized web pages.  Here is an example: you do online banking and it involves entering your account and password.  When you do a cookie is created that will store the account information so that when you next visit the site you only have to press the first letter or number of your account and it displays the rest.  This is pretty handy right?  This is where you have to decide if the convenience is worth the potential risk of having your account information passed on to someone who can access your PC without your knowledge or approval.

How often do I need to clean personal and private data?
Much of this depends on how often you perform certain functions on your PC.  For example, when you do online banking a cookie is created when one is absent (even though you removed it from the previous session).  You can look into not having your browser store web cookies but this is only one aspect of what you may want removed from your PC.  Regular removal of your browser cache is good practice – it maintains your privacy and frees up space.  Browser caches and a history of your online activities are automatically stored by your web browser.

Best Practices:  4. Staying on Guard

  • Take note of drastic changes to your PC!   If there is a malicious item that has infected your PC, chances are it will alter the functioning of your PC. Make sure your vital financial information is not accessible as stated in this article.  Next, consider using a trusted anti-malware application that can scan and remove the intrusion.
  • Be aware of suspicious emails and phone calls.  Here are two examples:
    1. An email arrives in your mailbox saying that your PayPal has been suspended (or your credit card is blocked).  The email looks very authenticate.  The same font and colors that PayPal uses on their website.  The email uses your email address in the “From” column.  The email goes on to instruct you to click a link to activate your account.What do you do? Not getting an actual email address from the trusted company is your first clue that something isn’t quite right.  An informed PC user will hover the mouse cursor over the link and look in the bottom of the window (the status bar) to see if the link that is displayed is in fact one belonging to PayPal.  To verify this is a potential hack or scam of some kind, you can also right-click the link – being very careful to not actually left-mouse click and get taken directly to a web page that may download unwanted items to your PC.  So… you carefully, right-click the link and select “Copy Link Location”.  You can now open your browser and check the validity of the URL by going to a site like URLVoid.  Simply paste the link and submit it for verification.  Even if it does come up clean… you can always go to the source.  Contact the trusted company and give them the details.  In this case… they will ask you to forward the emails so they can follow up with this spoof.
    2. You get a phone call (with no phone ID displayed) and someone says they are from “Windows” and states they have detected that there is a virus on your computer.  They immediately ask you if you are by your computer and if you can follow some instructions.  You are directed to go to a web site and run some tests.  What do you do?You do not have to follow their instructions if you do not trust who is on the other end of the phone.  Ask for verification of who they are.  Ask how they obtained your phone number.  Ask them for their name and phone number so that you can call them back.  You will find that the phone call will end quickly by them and you have protected your personal data and the integrity of your PC.

Keeping your PC safe requires a bit of effort and a whole lot of vigilance.  Hackers are like predators – they will prey on the weak.  In this case the weak are the uninformed.  We hope this has helped you gain an upper hand in defending your PC safety.

Reference

[1] www.Wikipedia.org

Filed Under: Blog, Newsletter, PC Clean Maestro, PC security, Protect online privacy, Windows tips

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.