Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

Nagging prompts

Dec 24, 2009 6:02AM PST

Some of the utility apps that I use generate the following prompt from Win 7: "Do you want the program to make changes to this computer?"

This happens every time I use the program (which is the freebie Search Everything, by the way).

I can see that the question would be asked the first time a program is used, but not every time.

Also, it doesn't appear in the task bar when I open it (it did in XP, and I can't put it in the quick launch bar either.

Please be aware that I am a rank beginner with Win 7.

HP Pavilion P6247, Athlon quad 4, 6 GB RAM.

Merry Christmas!

Vince

Discussion is locked

- Collapse -
Nagging prompts.
Dec 24, 2009 6:03AM PST

Did it again. Forgot to click Track this thread.

- Collapse -
Well
Dec 24, 2009 12:06PM PST

Well, the issue is likely with the User Agent Control (UAC), which really is designed to make you think about whether or not you really want to do this or that. And believe it or not, it's quite a bit better than it was in Vista.

You can adjust these settings in the Control Panel, but take care if you rank yourself a beginner.

- Collapse -
Adjust 'User Account Control' with the Slider
Dec 29, 2009 6:19AM PST
- Collapse -
User Control
Dec 29, 2009 6:29AM PST

Grif, et al:

Thanks for the replies and advice. I guess the safest thing to do is to keep the slider at the recommended settings, and I agree that being warned that a program is going to make changes is a very good thing.

What I don't get, however, is that once I allow a program to run (and make changes), why do I need to approve it every time?

Am I missing something?

Thanks,

Vince

- Collapse -
No
Dec 29, 2009 10:17AM PST

No, and it's a legitimate complaint, though Microsoft could easily counter that programs can be hijacked and this will alert you to that fact.

The UAC is still probably about the worst possible solution to the problem of lax security in Windows, but it'll probably be a very long time yet before we ever see a version of Windows with a proper security model. Microsoft could well be out of business before then.

- Collapse -
'Why do I need to approve it every time?'
Dec 30, 2009 1:11AM PST

Each time the program runs, it's a new instance of potential security problems. As such, you get a new warning and choice to make. Many find that some of those warnings can be reduced by tinkering with the UAC slider.. It's your choice.

Hope this helps.

Grif

- Collapse -
Why do I need to Approve every time?
Dec 30, 2009 1:57AM PST

Grif, et al:

Thanks for the considered replies.

Having recently been seriouly burned by a worm (?), I am going to stay on the side of caution.

Ten days ago I was surfing and got a notice that "Windows has detected a virus on your computer." A table appeared, filling rapidly with the names of viruses. The the message, "Click here to have Windows clean the viruses." I clicked, then got an offer for only $49 to download a virus cleaner!

I shut off as quickly as my wits let me, but it was downhill from there. The botttom line is I panicked, and probably shut off stuff that I shouldn't have, resulting in the need to restore the opeating system. Then, as long as I was back to square one, I got a new computer!

This has been a wonderful site for insight, and I thank all who have helped me during the year. (No doubt I will have many more issues.)

Happy New Year!

Vince

- Collapse -
In that case
Dec 30, 2009 9:35AM PST

In that case, allow me to share with you my set of tips to avoid this sort of thing.

TIPS FOR A PROBLEM FREE COMPUTING EXPERIENCE
============================================

The more of these suggestions you follow, the fewer problems you should have. They won't solve any existing problems you have, but if you follow them all you should be able to avoid virtually all problems in the future.

Things you should NOT do
--------------------------------
1: Use Internet Explorer (1)
2: Use any browser based on Internet Explorer (e.g. Maxathon and MSN Explorer)
3: Use Outlook or Outlook Express (2)
4: Open email attachments you haven't manually scanned with your virus scanner
5: Open email attachments you were not expecting, no matter who they appear to be from
6: Respond to spam messages, including using unsubscribe links
7: Visit questionable websites (e.g. porn, warez, hacking)
8: Poke unnecessary holes in your firewall by clicking "Allow" every time some program requests access to the Internet (3)
9: Click directly on links in email messages
10: Use file sharing or P2P programs
11: Use pirated programs

Things you SHOULD do
-----------------------------
1: Use a non-IE or IE based browser (4)
2: Always have an up to date virus scanner running (5)
3: Always have a firewall running (6)
4: Install all the latest security updates (7)(Cool(9)
5: Delete all unsolicited emails containing attachments without reading
6: Manually scan all email attachments with your virus scanner, regardless of whether it's supposed to be done automatically
7: Copy and paste URLs from email messages into your web browser
8: Inspect links copied and pasted into your web browser to ensure they don't seem to contain a second/different address
9: Establish a regular backup regimen (10)(11)
10: Make regular checks of your backup media to ensure it is still good (12)

Being a considerate Internet user & other online tips
----------------------------------------------------------------
1: Do not send attachments in emails (13)(14)
2: Do not use stationary or any other kind of special formatting in emails (13)
3: Do not TYPE IN ALL CAPS (15)
4: Avoid texting speak or "l33t speak" (16)
5: Do not poke sleeping bears (17)
6: Do not use registry cleaners/fixers/optimizers (1Cool(19)

Offline tips and suggestions
----------------------------------------------------------------
1: Avoid buying Acer, HP. Compaq, Gateway, and eMachines computers (20)(21)(22)(23)
2: Avoid sub-$500 systems that aren't netbooks or part of some limited time price promotion (24)

Notes
--------

(1) Sadly sometimes this is unavoidable, so only use IE when the site absolutely will not work with any other browser and you cannot get that information/service anywhere else, and only use IE for that one specific site.
(2) Outlook and Outlook Express are very insecure, and basically invite spam. The jury is still out on Vista's Windows Mail, but given Microsoft's history with email programs, extreme caution is advised. Possible replacements include Mozilla Thunderbird, Eudora, The Bat, and dozens of others.
(3) When it doubt over whether or not to allow some program, use Google to find out what it is and whether or not it needs access to the Internet. Otherwise, denying access is the safest course of action, since you can always change the rule later.
(4) On Windows your options include: Mozilla Firefox, Seamonkey, Opera, Flock, Chrome, and Safari. I would personally recommend Firefox with the NoScript extension for added security, but it the important thing is to pick one and use it instead of IE.
(5) AVG Free and Avast are available if you need a decent free virus scanner
(6) XP/Vista's firewall is probably good enough for 99% of all Windows users, but other options include ZoneAlarm, Outpost Firewall, and Comodo. If you have a router with a firewall built into it, there is no need for any of the aforementioned firewalls to be running.
(7) Microsoft's usual system is to release security updates every second Tuesday of the month.
(Cool Use of Windows Update on Windows operating systems prior to Windows Vista requires Internet Explorer, and is thus a valid exception to the "No IE" rule.
(9) Service packs should ALWAYS be installed. They frequently contain security updates that will ONLY be found in that service pack.
(10) You can go with a full fledged backup program, or simply copying important files onto a CD/DVD/Flash drive.
(11) I'd recommend a tiered backup system. For example, you might have 5 rewritable DVDs, and every day you burn your backup onto a new disc. On the 6th day, you erase the disc for Day #1 for your backup, and so on so that you have multiple backups should one disc ever go bad.
(12) Replace rewritable CDs and DVDs approximately every 3-6 months.
(13) These dramatically increase the size of email messages (2-3X minimum) and clog up email servers already straining to cope with the flood of spam pouring in daily.
(14) If you want to share photos with friends/family, upload them to some photo sharing site like Flickr or Google's Picasa Web and then send people a link to that particular photo gallery.
(15) This is considered to be the same as SHOUTING and many people find it to be hard to read along with highly annoying.
(16) Unless the goal is to make yourself look like a pre-adolescent girl, or someone overcompensating for their gross inadequacies, and you don't want people to take you seriously.
(17) Most REAL hackers are quite content to leave you alone unless you make them take notice of you. No dinky little software firewall or consumer grade router is going to keep them out of your system. So do not go to some hacker website or chat room and start shooting your mouth off unless you're prepared to accept the consequences
(1Cool Most of these programs are scams, and sell you something you don't need. Most of them report non-issues in an attempt to boost the number of "issues". Sometimes using these programs can lead to a non-functioning computer.
(19) The Windows registry is not some mystical black box of untapped performance tweaks for Windows, that will lead to untold improvements in system performance. Most of the tweaks will lead to very modest performance gains of 1-2% tops, and probably less than 10% all combined. There is also a good chance that you will render your system unbootable if you make a mistake when editing. Registry default settings are set that way for a reason. Just do yourself a favor, and forget you ever heard of the Windows registry unless you are a computer programmer/debugger and your job requires knowledge of the registry.
(20) Acer now owns Gateway and eMachines
(21) HP owns Compaq
(22) Hardware failures seem far more common with these brands than can be considered normal
(23) These companies use cheap labor in Asian countries were working conditions are often what would be considered sweat shops, and are run by brutal dictatorships, which you are supporting by buying from these companies
(24) If you just do some simple math, and realize that the cost of individual components like the CPU are around 25-33% of the total retail cost of the system, and everyone involved in the making and selling of the system is looking to make a profit, how much money can they possibly be making on each system. And if you're only making a few pennies on every system, how much quality control do you really think is going to go into the manufacturing process?

- Collapse -
Security resources
Dec 31, 2009 2:45AM PST