in

If It Ain't Broke, Don't Fix It

Aren’t we often following over-inflated promises such as those I just mentioned, in my previous post, or out of sheer desperation, I often see people trying to do things to their computers that have nothing to do with anything they’re experiencing? I was doing a lot of that once until my daughter, a computer science graduate, wised me up to some of what I was doing wrong, here are a few mistakes I can remember making: 

* I was trying to solve speed problems I didn’t have. 

* I was trying to remove malware that wasn’t present. 

* I was trying to update software I didn’t need or use. 

* I was trying to fix problems that had nothing to do with my computer. 

 The list went on and on. Now, I get that each of us assumes a certain amount of knowledge,

.* But, how would you know you don’t have a specific problem? 

* How do you know that malware isn’t present? 

 * How do you know the problem you’re experiencing is not with the website you are visiting, and that it has nothing to do with your computer? 

Those are some fair concerns. So, to quote my dear daughter: “if you don’t know you have a problem, why are you trying to fix it, dad? Let’s just turn the thinking around and examine the term, common sense which, as far as I can determine, broadly means “Don’t do something because you might have a problem; do something because you know you have a problem.” Research the problem first to confirm you have a problem that needs fixing, only then, try fixing it.

FOR MORE TUTORIALS: CLICK HERE

  • Was this post useful?

    • Yes
    • No

Report

What do you think?

One Comment

Leave a Reply
  1. The only flaw in that logic is that Hackers are not bound by rules. Those who build applications and computers are limited by law (other than Chinese companies) that prohibit certain things. Hackers, can attack from any angle.

    The best thing is to always assume you are at risk.
    1. update your virus scanner every single week or more often
    2. change your passwords every month
    3. Watch what you share online, the easiest way to steal your identity is the compiled information PII shared)

    Better to start with the assumption that you are compromised.

Leave a Reply