• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   The Sooner You Use Titanium’s System Tuner, the Better

The Sooner You Use Titanium’s System Tuner, the Better

  • Posted on:September 28, 2011
  • Posted in:Security
  • Posted by:
    Richard Medugno
7

By Jennifer Burns

Not only is it important to protect your computer, it is also important to have it running smoothly. Sometimes it feels like I have too many files on my machine. So many that I worry that files are almost taking it over! You’ll be happy to hear that Trend Micro™ Titanium™ Security has a feature you can use to tidy things up a bit. It’s called System Tuner and is offered in both the Internet Security and Maximum Security versions of Titanium.

System Tuner is a tool that optimizes your computer’s performance. Besides making Microsoft Windows® start up quicker, it also cleans out your computers instant message history and recovers disk space.

Here’s how to do a System Tuner full run:

  1. Select Tools
  2. Select System Tuner
  3. A screen will pop up with information around the System Tuner and then you can select OK.
  4. Another screen will show that asks you what you would like to “tune.”

Your choices for optimization are:

  • Disk space – this feature checks for space in your computers recycle bin, temporary folders and other locations
  • Start up programs – can help prevent start up issues and also eliminate some applications from starting automatically
  • System registry – remove unused, broken, or invalid registry entries
  • Internet privacy – deletes website cookies and browser history files  to protect your privacy online
  • Software histories – cleans the records of recently browsed files to prevent spyware from collecting information about you
  • Instant messaging privacy – removes details of chat logs, files downloaded, and other instant message records to prevent spyware from collecting more information about you

One thing that really bugs me is when my Skype account starts up automatically when I turn on my computer. By using System Tuner, I was able to remove Skype from my start up applications.

If you want to disable a start up program, select Start up programs.

 

A box will pop up asking you to confirm that you understand some programs are necessary for start up. You should only eliminate those from start up that you know will not affect your computer’s performance.

To confirm, select OK and a screen will pop up listing your start up programs. This is where you would check a box for the program you did not want to start up automatically. Then select OK.

After you remove the program, it will no longer show up in your console. In this case, I have already removed Skype.

After I ran System Tuner for 4 out of 5 options, I learned just how much room I gained on my machine. I recovered 193 MB of space! (See! I told you I had too many files.)

System Tuner can be used differently by each individual. I was pretty pleased with the results. I think you will be too.

I work for Trend Micro and all opinions expressed here are my own.

Related posts:

  1. CYBER SPRING CLEANING TIPS: Don’t Be a Digital Hoarder!
  2. Your startup disk is almost full – How you can fix it on your Mac
  3. Fighting Ransomware with Trend Micro Security 10 and the Trend Micro Anti-Ransomware Tool
  4. How to Restore Your Mac to Factory Settings

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.