The new basics of computing

I was setting up a couple of new computers this last week with an eye towards how I will go about explaining computer basics in the current computer world. Setting up machines from scratch (or from commercially installed windows or Linux, or macOS) has become much more time consuming than I remember it being just 8 years ago when 40 minutes was more than sufficient time to get to the GUI (graphical user interface) and start using the computer. Now, the updates can take forever (1.5 hrs on a fast Debian system to 28 hrs on a fast windows 10 system) and the wait for initial setup simply adds to that (okay, the Linux setup time is very fast if you ignore updates).

So, is the first thing we should discuss when talking about computer basics the need for updates, security, network connectivity, and data security? That could take hours and wouldn’t have the user any closer to typing their first letter; but, they are necessary topics, particularly for those new to using a computer. Perhaps it would be good to back up even further (along the lines of basics) and discuss power sources with an eye to user safety and good long term operation of the computer, protection from power surges, brownouts, and all the other issues that can befall any device connected to the outside world.

Thus let me get on my soapbox and rant a bit. Yes, good clean power and well-grounded data sources are important (some computers do not use a grounded power cord – laptops mostly) and the ground is the preferred route for any high voltage (lightning) events to use instead of the computer or you (so, it might not be a bad idea to disconnect that laptop from everything during a thunderstorm). Yes, updates really are necessary because the threat posed by malware, viruses, hackers, and a host of other sources requires constant improvements in system security. In addition, many new devices coming out on the market require additions to the Operating System in order to work with your computer.

On the topics of malware, viruses, and hacking, a multi-pronged defense is what I currently recommend. First, keep your OS up-to-date (so you are less of a target to known threats). Second, keep a firewall between you and the outside world (either built into a router or running locally on your system). Third, keep and maintain (more updates) an anti-virus product running in the background. And Fourth, choose a “second opinion” malware scanner to use when anything suspicious occurs (because the first target of many hacks is the installed anti-virus)(Malwarebytes, Sophos, and Microsoft all provide reliable such products).It helps to have a very basic understanding of how your network connectivity (access to the internet, wireless printers, scanners, etc.) works. No, I am not suggesting you want to learn about transfer protocols and the like; but, are you connected by wire? Or, are you connected wirelessly by WiFi or Bluetooth? Does the device that connects you to the internet provide an adequate firewall? And, roughly what kind of data speed (bandwidth) does it provide. Generally, your ISP can provide this information either when they connect you up or upon being asked about your LAN (Local Area Network).

Data security, at its basic level, hasn’t changed in 30+ years. Storage devices fail (fact) and when they do, your photos, documents, etc. can be lost if you do not have backups or synchronized copies (perhaps in the cloud), or just plain copies on some other device (a second computer, thumb drive, USB drive, or other backup devices). The same applies when you are working on any project, document, spreadsheet, etc. you need to save early and often and even create multiple copies on occasion. The use of encryption is up to the user in most cases and prevents data recovery attempts in the case of equipment damage or failure while making it very difficult for a successful hacker to get anything useful from you.

Clear as mud? Like operating a vehicle, there is a lot to understand in order to do so safely and efficiently. Various service providers can be quite helpful if asked (they might well assume you don’t need help with the basics). Duplicating important data remains a necessary if inconvenient step.