The 7 Commandments Of Computer Usage

From the creators of the infograph featuring the most popular holiday toys The Most Popular Holiday Toys From The Past 50 Years Here's a look back at some of the most popular holiday toys from the past fifty years. Do some of them bring back memories? Read More from the past fifty years, comes a simple yet effective poster detailing the seven commandments of computer usage.

Read, remember, repeat. These are the seven rules to using computers. Think of it as a cheatsheet, if you will — one to be shared with every novice computer user you know. Recall everyone who has ever bothered you with a simple computer question, people who are incapable of using Google to troubleshoot their own computer issues, and share this infograph with them.

Click to enlarge.

The 7 Commandments Of Computer Usage 7 commandments of computer usage

  1. Use only one antivirus software Stay Protected From Every Type Of Malware With Avast Free Antivirus Comprehensive malware protection doesn't need to cost a fortune. Many reputable free antivirus programs are equally effective as paid ones, and avast! Free Antivirus stands with the best Windows antivirus programs. Read More .
  2. Always update your antivirus definitions.
  3. Be mindful of your browsing habits Really Private Browsing: An Unofficial User’s Guide to Tor Tor provides truly anonymous and untraceable browsing and messaging, as well as access to the so called “Deep Web”. Tor can’t plausibly be broken by any organization on the planet. Read More and what you download from the Internet.
  4. Delete emails from unrecognised senders, and those containing dangerous unknown attachments How to Spot Unsafe Email Attachments: 6 Red Flags Reading an email should be safe, but attachments can be harmful. Look for these red flags to spot unsafe email attachments. Read More .
  5. If it isn’t broken, don’t fix it Why Does Rebooting Your Computer Fix So Many Issues? "Have you tried rebooting?" It's technical advice that gets thrown around a lot, but there's a reason: it works. Not just for PCs, but a wide range of devices. We explain why. Read More .
  6. Unless you know what you’re doing 10 Common PC Maintenance Errors That You Can Avoid PCs still require maintenance, as much as we wish they were magic boxes that did all the work for us. Unfortunately, many people make mistakes when it comes to maintaining their PC. These mistakes could... Read More , don’t try and fix a broken computer yourself.
  7. Back up your data The Windows Backup and Restore Guide Disasters happen. Unless you're willing to lose your data, you need a good Windows backup routine. We'll show you how to prepare backups and restore them. Read More .

via AbbyRyanDesign for PCNinja

Enjoyed this article? Stay informed by joining our newsletter!

Enter your Email

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Aaron Delwiche
    June 12, 2014 at 3:26 am

    This sounds like Ten Commandments designed to reinforce computer phobia and the technical priesthood. I agree wholeheartedly with ReadandShare. All we need are two commandments: back up and experiment.

  2. ReadandShare
    June 11, 2014 at 12:56 am

    Just 2 commandments:

    1. Backup - system and data.
    2. Then experiment to your heart's delight!

    I lose count of the times I've had to do system reinstall -- but then, with system backup, I also learn a lot from trying out stuff that I otherwise wouldn't dare try.

  3. Moo Kahn
    June 10, 2014 at 7:48 pm

    Useful info (the don't open email from unknown, etc etc) for 1995, maybe. The big problem now is that the REALLY heinous phishing scumware/ransomware/ malware shows up from senders that appear to be people from your most trusted circle of confidants - your own address book... your bank.... your doctor's office, and so forth. We had a client lose over $500K in an ACH (Automated Clearing House - bank processing) cam that started with a clerk logging in to what she thought was their bank's home page. It was an identical pixel-by-pixel copy - unfortunately it allowed some keylogging malware to be installed, which in-turn somehow reconfigured their network firewall and installed some other back doors. The net result was a transfer of $100K per night for several nights from the company's operating accounts to some bank account in eastern Europe where it could not be retrieved. Bottom line - the entire 'cloud' is vulnerable to this kind of a scam - until we get past last-century conventions like "passwords" the damage will continue.

  4. Humza A
    June 10, 2014 at 5:37 pm

    Hilarious and useful :)

  5. Maryon Jeane
    June 10, 2014 at 2:36 pm

    If you abide by No. 1 you're going to get fried sooner or later. HitmanPro for ever!

  6. Fred
    June 10, 2014 at 2:24 pm

    you forgot.......if its not on fire, it must be a software problem

  7. Paul J
    June 10, 2014 at 1:47 pm

    How about use Linux, and forget about rules 1-6? Just do rule 7 and you should be fine.
    By the way, rules 1 and 2 should be just one rule, and the same goes to rule 5 and 6.

    • Jackson
      June 14, 2014 at 6:43 am

      Good idea. Now, let's hire some fanboys to spread the gospel.

  8. A41202813GMAIL
    June 10, 2014 at 1:42 pm

    Number 5, The Reason I Am Still Saying...


    • Jackson
      June 14, 2014 at 6:42 am


  9. Alan W
    June 10, 2014 at 10:42 am

    Very good but I always break rule number 7 :)

    • Jackson
      June 14, 2014 at 6:42 am

      Don't we all? Until the inevitable happens.

  10. Dimantha P
    June 10, 2014 at 9:03 am

    And better away from cracked softwares

    • Jackson
      June 14, 2014 at 6:42 am

      Back away?

  11. Jeremy G
    June 10, 2014 at 3:24 am
    • Jackson
      June 14, 2014 at 6:41 am

      Woah. Who compiled that?