Tag Archives: files

Speed Up Your Computer with Auslogics Disk Defrag

Remember how fast your computer was out of the box? Your Windows loaded within seconds, files opened with a snap, and browsing the Web was a great experience. Unfortunately, computers slow down with time no matter how fast they are at first. This happens for a number of reasons, but the main cause of slow computer performance is disk fragmentation. Auslogics Disk Defrag can fix that.

File fragmentation occurs because Windows tries to save new files in the most space-efficient manner. It attempts to fill every available bit of space. To do that, it needs to split files, e.g. the files become fragmented. When you need to open a fragmented file, your hard drive’s read arm needs to perform a lot more operations than when you are opening a non-fragmented file. As a result, fragmented files take longer to open. But the worst bit is that this is true for every single piece of data stored on your computer – Windows system files, files needed by your software, your browser and so on. That’s why fragmentation reduces overall computer performance. Worse still, severe fragmentation can even lead to computer freeze-ups and crashes. The answer is to defragment your hard drive on a regular basis.

Windows has its own built-in disk defrag tool. However, it’s very slow and doesn’t do the job properly. It also lacks some important disk optimization features that guarantee flawless disk performance. Luckily, there are a lot of free alternatives. One of them is Auslogics Disk Defrag – a really well-known disk defrag and optimization utility. It’s a lot faster than the Windows defragmentation utility, can perform advanced disk optimization, and has a very intuitive interface.

Let’s have a look at some of its features:

Free Space Consolidation

Conventional defragmentation only defrags files, but does nothing to defragment free disk space. This means that free space remains fragmented. As bits of fragmented free space get filled with new files, the files become fragmented as well. As a result, fragmentation starts building up right after you defrag your files. Auslogics Disk Defrag can defragment the free space, which prevents new files from becoming fragmented.

Hard Drive Optimization

Windows system files are the most important and most used files on your PC. They are accessed no matter what you do and are essential for computer boot. Often Windows system files get placed on slower tracks of your hard drive and take longer to load. This slows down your whole operating system. Auslogics Disk Defrag defragments system files and moves them to the fast tracks of your disk. This keeps your system running fast and smooth.

Interactive Fragmentation Map

Auslogics Disk Defrag generates an interactive disk map that shows all files on your disk. The map is divided into blocks. You can see which files are in each block and whether they are fragmented or not by simply clicking on them. You can also personalize Disk Defrag by selecting the fragmentation map style and color theme that you like best.

Auslogics Disk Defrag is really easy to use. Novice users will have no problems figuring it out. As for more advanced users, they will appreciate Disk Defrag’s advanced options and command line tools.

Computing's Dirty Dozen: Malware (Page 1 of 2)

It seems that no sooner do you feel safe turning on your computer than you hear on the news about a new kind of internet security threat. Usually, the security threat is some kind of malware (though the term “security threat” no doubt sells more newspapers).

What is malware? Malware is exactly what its name implies: mal (meaning bad, in the sense of malignant or malicious rather than just poorly done) ware (short for software). More specifically, malware is software that does not benefit the computer’s owner, and may even harm it, and so is purely parasitic.

The Many Faces of Malware

According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.

1. Viruses. The malware that’s on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there’s no need to belabor the point.

2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.

3. Wabbits.Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it’s not hard to see why: they don’t do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that’s only because they have bigger targets: your financial information, your computer’s system resources, and sometimes even massive denial-of-service attacks launched by having thousands of computers all try to connect to a web server at the same time. Trojans can even

5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it’s possible to be both adware and spyware at the same time.)

6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a “backdoor” onto a computer, providing a network connection for hackers or other malware to enter or for viruses or spam to be sent out through.

7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.

Computing's Dirty Dozen: Malware (Page 1 of 2)

It seems that no sooner do you feel safe turning on your computer than you hear on the news about a new kind of internet security threat. Usually, the security threat is some kind of malware (though the term “security threat” no doubt sells more newspapers).

What is malware? Malware is exactly what its name implies: mal (meaning bad, in the sense of malignant or malicious rather than just poorly done) ware (short for software). More specifically, malware is software that does not benefit the computer’s owner, and may even harm it, and so is purely parasitic.

The Many Faces of Malware

According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.

1. Viruses. The malware that’s on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there’s no need to belabor the point.

2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.

3. Wabbits.Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it’s not hard to see why: they don’t do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that’s only because they have bigger targets: your financial information, your computer’s system resources, and sometimes even massive denial-of-service attacks launched by having thousands of computers all try to connect to a web server at the same time. Trojans can even

5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it’s possible to be both adware and spyware at the same time.)

6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a “backdoor” onto a computer, providing a network connection for hackers or other malware to enter or for viruses or spam to be sent out through.

7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.