In
part one of this series, I wrote about the dangers to computer
equipment from lightning and surges. In part 2, we discussed the
problems encountered from computer viruses. In part 3 we will
explore another consequence of the internet age.
There
are free programs on the internet to enhance your internet
experience. Browsers and browser plug-ins, email programs and
email managers, alternative communications packages to chat and
hold voice conversations are available to download over your
internet connection at no cost or offered at a fraction of what
would have been their pre-internet age pricing. The list of
internet enhancements goes on and on, the inventions of this new
age.
In
addition to internet-associated programs, there are programs of
every kind on the net for every other purpose. Word processors and
spreadsheets, screensavers, file managers, first-aid programs,
virus checkers and, of course, games, just to name a few. Some of
these programs are worth the time to download, some are mere
distractions, and some are a total waste of time. You never know
whether a downloaded FREE program is going to be great or a dud
until you have downloaded and finished the installation. But the
point is, there's a lot of software out there, and it can be yours
right now for the low, low price of $0. Hmmmm, the price and the
terms seem to be just right!
There
is, however, a hidden cost to playing the internet free-program
game. Your Windows PC is wide open and vulnerable in two major
areas, and — unlike attack from viruses, which can also be
spread via file downloads from the internet — this hidden cost
is not an intentional attempt to cause damage or wreak havoc.
The
first vulnerability your PC has is in the system REGISTRY, a place
where Windows 9X, NT, 2000 and ME keeps most of its settings and
information. Much of your program information is kept in the
registry, as well as color and font settings, the size and last
known position of every window you had open, the location of help
and dialog boxes, as well as all your file association
information. In a previous article I warned you that the REGISTRY
was very important, and regular REGISTRY backup was an essential
element in maintaining or redeeming your PC's health.
(To top of second
column)
|
The
REGISTRY is vulnerable, in part, because of the way Microsoft
engineered it. You see, the REGISTRY was actually present as an
infant in Windows 3.1, and with the advent of Windows 95 it
because the adult guardian of your Windows experience. Many PC
experts argue that the REGISTRY is a very poor guardian because of
its inherent flaws and vulnerabilities. They speak out because
REGISTRY corruption is a common experience among Windows users.
A
REGISTRY is corrupted when there are inadequate or conflicting
entries directing Windows behavior. For example, one REGISTRY
setting can turn on a function while another registry setting
prevents that same function. The result is that a program which
previously functioned perfectly now is hobbled and is rendered
less than useful. Uninstalling the hindered program usually
removes all the REGISTRY settings for that program but does not
correct the problem because the instruction to prevent the needed
function is not part of that program's REGISTRY settings.
Installing
and uninstalling programs can corrupt your REGISTRY by leaving
behind or accidentally deleting needed REGISTRY entries, or by
inserting REGISTRY entries that conflict with the entries for
other programs. With the volume and diversity of programs
available to the public for free on the internet, new-program
installation is a daily thing for many computer users. And
REGISTRY corruption is one of the more common problems we see in
our repair facility.
Many of the programs
offered for low or no cost on the internet are wonderful pieces of
software engineering. They truly have been worthwhile in my
computing experience, and I continue to search for the next free
gem which will take me on another adventure and solve another
yet-unknown problem that I have. But there are other programs out
there which are not quite perfect or finished or without problems,
and these are the stuff good registries die for. But you never
know whether a downloaded free program will behave or be
destructive until it is already installed. And then it is too
late.
(Note:
This article will continue with postings on Friday and Saturday.
[Jim
Youngquist]
|