|
|
|
|
||||||||
|
|
||||||||||
|
|
||||||||||
|
|
|
|
|
|
|
|||||
|
|
|
HOW TO and TOOLS: This area is for highly technical
users who understand the risks associated with using the information below.
Use the information below at your own risk. Be sure to backup and/or image
before using this information. ·
Rootkit killers and other Malware removers. o We recommend
Malwarebytes, Symantec, Kaspersky and Mcafee removal tools. ·
How to upgrade to Windows 8.1 or 10 and specifically use
Secure Boot. o Windows 8 and
Windows 10 offer an enhanced security function called Secure Boot. We highly recommend using it. In short, it's a database of approved
vendors whose software is certified to be on the machine. This database minimizes the changes of
rootkit infiltrations. o Those who
install the free upgrade from Microsoft usually do so on a hard drive that
previously had Windows 7 on it.
Although Windows 8 or 10 will run just fine on those machines, Secure
boot is not configured during the upgrade process. For home users who want the added
functionally of secure boot, it's best to purchase a new machine that has
Windows 8 or 10 on it. As long as the
computer is from a reputable source, it will come configured with secure
boot. If home users want their
existing machine configured for secure boot, please consult an IT
professional to do it for you. o For IT
professionals who want to configure Secure boot, here are the
instructions. I use Acronis True Image Home which offers the ability to
hand pick favorites, documents, etc from the old image and restore files
individuals onto the newly configured machine. Built in Windows Backup Restore does not
provide the functionality to pull individual files from the backup image. |
||||||||
|
|
||||||||||
|
|
||||||||||
|
|
|
|
|
|
|
|||||
|
© PC Tutor, Ltd.. All Rights Reserved |
||||||||||
|
|
|
|
|
|
|
|||||