Home Classifieds Work For Us Rack Locations Order Photos Contact Us Advertising Info Featured Advertisers

Click here to read
the latest issue

Browse Sections:

Forever Young
Rants & Raves
Crime Report
Calendar of Events
Dining Guide
Special Section Publications
Business & Finance
Business Columns
Star Scopes
Family Issues
Columnist Archives
Crossword Puzzle
Jail Court Live Web Cams

Weather Cams:

Now browsing: Hometown News > Computer/Technology > Sean McCarthy

Debunking computer myths
Rating: 2.64 / 5 (33 votes)  
Posted: 2012 Sep 14 - 02:54

There are a lot of myths surrounding computers out there, some based on reality, some based on the way technology used to be and some based on plain old fear and paranoia.

Some computer myths tend to be so prevalent I often see veteran computer users falling prey to some of them. This week I thought I would try to dispel some of these myths.

The first myth is, if you connect to the Internet you will immediately become a target for some hacker who is out to steal your identity.

This myth is one that is born out of paranoia and misinformation. We have all seen stories in the news about some hacker getting caught accessing some big company database or some poor people getting their identities stolen, but the fact of the matter is most hackers just aren't interested in you. Hackers tend to go after the "big" targets, such as corporate databases, and don't spend too much time hunting individual end users.

But that's not what the Internet security software companies want you to think. There is a big market for computer security programs and firewall software, but if it's not configured or installed correctly (which is most of the time) it can bring your machine to a crawl and still leave you vulnerable.

As long as you have an up-to-date anti-virus program installed and running, and have all the current operating system updates installed, you should be safe plugging your machine into the Internet.

If it's identity theft you are worried about, I would be more concerned about all those big corporate entities out there that already have your personal information on file. It's databases such as those that are the real targets. Why take the time to hack into one user's machine for one identity when there are so many other systems out there that hold thousands (even millions) of identities in their databases?

Another common myth is, "regularly defragging my hard drive will make it run faster." This myth has its origins from the way technology used to be. Sure, if you are running an old 486 machine with Windows 95 and a 1 gig hard drive, defragging it periodically will clean things up a bit and give you a noticeable increase in performance.

If, on the other hand, you are running something a little more modern (any machine built within the last five years) defragging the hard drive all the time to increase performance is often just a waste of time.

Any increase in performance gained by defragging will typically be unnoticeable. Sure, it's nice to see all those red areas turn blue when you do defrag a modern machine, but don't be fooled. You aren't gaining much. I will concede that running defrag periodically to "tidy up" is good practice, but it's not the cure-all that some people still think it is.

The next myth comes from unclear advertisements that some computer manufacturers run. Many ads today for new computers tout their systems as being "wireless ready" right out of the box. And, to a degree, this may be true, with things such as WiFi chips being built into the motherboard, but the thing that the ads tend to leave out (or bury in fine print) is that you need to be in an area of wireless service for it to work.

If you don't have wireless Internet access and are contemplating buying a new computer that's wireless ready because you are under the impression that it will connect to the Internet right out of the box, you are about to make a mistake.

All this "wireless ready" stuff means is that you won't need any extra hardware to connect to an existing wireless service. It doesn't mean that you can just turn it on and be online as some people have been led to believe.

In order for these systems to work, they need to be in a wireless "cloud" - either your own wireless service, DSL or cable plugged into a wireless router, or a public wireless hotspot, such as those found in many hotels, airports and coffee shops.

Sean McCarthy fixes computers. He can be reached at (772) 408-0680 or help@ComputeThisOnline.com (no hyphens).

Comments powered by Disqus
Can't see the comments?
Make this site your Homepage e-mail us

Legal Notices

Join our Mailing List:

Crossword Puzzle:

Archives Calendar:

« Sep, 2014 »
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30

Search Stories: