Setting-up Your New Computer: How To Move Your Old Files to Your New Computer

Written by Steven Presar


Continued from page 1

Some link transfer software packages that work with Microsoft's Windows are: PCsync, IntelliMover, PC Relocator, and PC Upgrade Commander.

In each case,repparttar software must be installed on both your old and new computers. The software scans your old computer hard drive, to inventoryrepparttar 104522 folders, subfolder, and files and then you selectrepparttar 104523 data files that you would like to transfer to your new computer.

It sounds like a fairly simple way to handle your data transfer. However, be aware:

~ Generally, these programs want to move allrepparttar 104524 contents of your old computer to your new computer. That's OK for your data files but movingrepparttar 104525 program files that run your applications may cause problems because older applications may not be supported by your new computer operating system. Transferring a Windows 95-era program to a computer preloaded withrepparttar 104526 Windows XP operating system could be a problem because many of those programs haven't been upgraded to run under Windows XP.

~ When you moverepparttar 104527 full contents of a computer system, everything moves over, including those obscure files that had your old computer running sluggish in its final days.

~ Moving data through a USB cable isn't fast, but it is faster than data transfer through a parallel port.

Choosing a Data Migration Software Package

~ Doesrepparttar 104528 software allow you to pick and choose which files are moved, or does it move EVERYTHING -- evenrepparttar 104529 junk files?

~ How isrepparttar 104530 data transferred? A wireless network is faster than a USB cable, which is faster than a USB cable, which is faster than a parallel cable. Are you prepared to wait hours or even days for this transfer to take place?

~ If you're usingrepparttar 104531 Internet as a holding place for your data, check your connection and upload speeds. It could take hours to move those files.

~ Consider investing in a high-capacity external hard drive, a plug-and-play device that you'll simply connect to your new computer. The drive, though more expensive, will get far more use than one-time migration software. Getting Ready for Your Data Migration

~ Get rid of all of your old files. Fill your recycle bin on your old computer with as much as you can. There's nothing worse than bringing useless data torepparttar 104532 new computer.

~ Make a software checklist. Is your versions of current program applications compatible with Windows XP? Look onrepparttar 104533 Web for free Windows XP upgrades to new versions ofrepparttar 104534 programs you need, such as your Palm desktop software.

~ Does your new computer have preloaded software on it? Chances are goodrepparttar 104535 latest Internet browser is already pre-load on your new computer and thus you do not have to transferrepparttar 104536 older browser version.

~ Make a list of user names and passwords that are stored in files on your old computer and automatically appear when you visit Web sites. They could be lost inrepparttar 104537 move, denying you access on your new computer.

Copyright Steven Presar

Steven Presar is a recognized small business technology coach, Internet publisher, author, speaker, and trainer. He provides personal, home, and computer security solutions at www.ProtectionConnect.com. He provides business software reviews at www.OnlineSoftwareGuide.com. In addition, he publishes articles for starting and running a small business at www.Agora-Business-Center.com. Be sure to sign-up for the SOHO newsletter at the site.


How to Prevent Computer Security Risk and How to Keep Your Small Business Safe

Written by Steven Presar


Continued from page 1

The loss or corruption of one small program utility may preventrepparttar entire program application from operating properly. The change of one parameter or setting (which easily can happen inadvertently or duringrepparttar 104521 installation of another piece of software) is enough to disruptrepparttar 104522 proper functioning of an application. The best protection against application software failure is:

~ keeprepparttar 104523 original program source (disks, CD-ROMs, saved and backed-up downloaded files) secure off-site (outside of your office) ~ install software from backup copies ofrepparttar 104524 originals, and use only authorized and registered copies of software applications (so thatrepparttar 104525 original software application vendor is available for technical support, replacement of disks, bugs fixes, and software updates).

Network software is notoriously finicky and requires frequent attention. Someone familiar withrepparttar 104526 network software either on staff or available on short notice is essential to troubleshoot and restorerepparttar 104527 network when it crashes, slows to a crawl or just doesn't act right. In some situations, loss of access to application programs, loss of data, or loss of access to data whenrepparttar 104528 network is down can be minimized by backing up or mirroring data on a local hard drive or floppy disk and by having key software such as word processing applications loaded also on local PC hard drives.

Corruption of software by viruses is another growing security risk, which is best handled by carefully designing procedures to limit unauthorized access to systems, by discouraging use of unauthorized software and by using specialized virus protection software. Some offices have systems that automatically bar any new software from being loaded even onto an individual PC onrepparttar 104529 network. Others automatically scan all new software for viruses. Anti-virus software must be updated continually to enable it to identify new viruses that are constantly being created and spread. Automatic update features are available forrepparttar 104530 major anti-virus software programs and should be implemented.

A particular problem is software that is acquired electronically, such as fromrepparttar 104531 Internet, whether public domain software or unauthorized copies of programs. Seemingly minor items such as games, utilities, screen savers or macros of unknown origin and provenance may put you at serious risk of contracting a virus. Email attachments are a frequent source of infected code. You need to be attentive to suspect email sent to you. Always pay attention to what you are loading or downloading onto your computer.

Throughrepparttar 104532 introduction of a computer viruses, your software programs and if not your entire computer network may be unusable byrepparttar 104533 simple installation of unauthorized software application on your computer system. Make sure your staff understandsrepparttar 104534 importance of your policy of banningrepparttar 104535 installation of unauthorized software. Then periodic "sweep" your computers to insure that your staff is helping you protect your computer investment.

These simple steps may result in big dividends torepparttar 104536 continued operation of your small business.

Copyright Steven Presar

Steven Presar is a recognized small business technology coach, Internet publisher, author, speaker, and trainer. He provides personal, home, and computer security solutions at www.ProtectionConnect.com. He provides business software reviews at www.OnlineSoftwareGuide.com. In addition, he publishes articles for starting and running a small business at www.Agora-Business-Center.com. Be sure to sign-up for the SOHO newsletter at the site.


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use