Datasheet
Chapter 6: Troubleshooting Startup Problems . . . . . . . . . . . . . . . . . 97
The Computer Won’t Start ..........................................................................................................97
Non System Disk or Disk Error ........................................................................................97
Computer starts but mouse and keyboard don’t work ......................................................98
Computer keeps trying to start, but never gets there ........................................................98
Screen turns blue during startup, then stops ....................................................................98
Computer Takes Too Long to Start ..............................................................................................98
Restore system files to an earlier time................................................................................99
Repair Install Windows Vista ............................................................................................99
The instruction manual that came with your computer ....................................................99
Resources in this book ......................................................................................................99
Resources in Windows Help............................................................................................100
Online resources ............................................................................................................100
Programs Won’t Start ................................................................................................................100
Part II: Batten Down the Security Hatches 101
Chapter 7: Blocking Hackers with Windows Firewall . . . . . . . . . . . . 103
How Firewalls Work..................................................................................................................103
What a firewall doesn’t protect against ............................................................................104
Introducing Security Center ......................................................................................................105
Turning Windows Firewall on or off................................................................................105
Making Exceptions to Firewall Protection..................................................................................107
Manually configuring firewall exceptions ........................................................................107
Adding a program exception ..........................................................................................108
Choosing a scope ............................................................................................................110
Disabling, changing, and deleting exceptions..................................................................111
Advanced firewall settings ..............................................................................................111
Advanced Firewall Configuration ..............................................................................................112
Open the Windows Firewall with Advanced Security icon ..............................................112
Changing Firewall Profile Properties ..............................................................................113
Firewall alerts, unicast response, local administrator control ................................113
Security Logging ..................................................................................................114
Customizing IPsec settings....................................................................................115
Inbound and Outbound Rules ........................................................................................116
Wrap Up ..................................................................................................................................116
Chapter 8: Conquering Malicious Software. . . . . . . . . . . . . . . . . . 119
Types of Malware ......................................................................................................................119
Viruses and worms..........................................................................................................119
Spyware and adware ......................................................................................................120
Trojan horses and rootkits ..............................................................................................120
Conquering Spyware with Windows Defender ..........................................................................121
Opening Windows Defender ..........................................................................................122
Removing spyware from your computer..........................................................................123
Doing a quick scan ..............................................................................................124
Doing a custom scan ............................................................................................124
Automatic scanning ..............................................................................................124
xii
Contents
02_040300 ftoc.qxp 12/27/06 12:08 AM Page xii