PM & AI Chronicles

From Product Thinking to Prompt Engineering – One Tool at a Time

Utility Software 🧼: Powering Performance & Protection🛡️

In the last article, we explored how modern tools empower teams to communicate, share, and get work done efficiently from anywhere, from word processors and spreadsheets to online teamwork tools that make modern work and study smoother than ever. 👉Productivity & Collaboration Software

Many of the extra services you can use on a computer are nice to have — they make your system safer, faster, or easier to maintain — but they aren’t the ones that help you finish a project or collaborate with others. These behind-the-scenes functions are handled by utility software.

Utility software focuses on the health and performance of your system — protecting it from threats, optimizing its speed, and keeping your files organized. In this section, we’ll look at some of the most useful utilities you’ll encounter, including Instant Messaging, Remote Support, Antimalware Tools, Software Firewalls, and Compression Software — each serving a unique role in keeping your computer running smoothly and securely.

Instant Messaging (IM) is the process of sending text messages to another user in real time. If you’re doing this on your phone, it’s typically called texting; on computers, IM is a quick, efficient way to communicate instantly with colleagues, friends, or support teams.

Most IM software keeps a contact list of people you’ve added, showing who’s available and online. Some tools, like Microsoft Teams, even synchronize with your Microsoft Outlook address book to make finding your contacts effortless.

While some IM programs are built purely for text chatting, many modern ones go far beyond that. They allow users to share screens, make voice or video calls, exchange files, and even collaborate within shared workspaces — making them powerful communication hubs.

There are dozens of IM applications available today, and most of them are free. In addition to Microsoft Teams, some popular examples include:

  • Slack
  • Google Chat
  • Zoom Chat
  • Discord
  • Skype
  • WhatsApp (Desktop/Web version)
  • Telegram Desktop
  • Signal Desktop

No matter which one you use, the key point remains: the person you’re trying to chat with must be on the same messaging platform — otherwise, your messages won’t go through.

If you’ve ever had to call tech support for a computer problem, you know how frustrating it can be to explain what’s going wrong. Maybe you’re unfamiliar with the device or program, or perhaps you feel a bit intimidated talking to someone who’s supposed to be an expert. From the support specialist’s perspective, it can be equally challenging — the user might not describe the issue clearly, remember when it began, or know what recent changes might have caused it. And let’s be honest, most people who reach out for help aren’t in the best mood to begin with!

Fortunately, remote support software has made this process much easier for both sides. These tools allow a technician or trained professional to access a user’s device remotely over the internet, view the problem firsthand, and even take temporary control of the device to fix the issue. It’s a huge time- and stress-saver for everyone involved.

When evaluating or using remote support software, here are a few key features to look for:

  • 🧩 Cross-platform support: It should work across Windows, macOS, and mobile devices.
  • 📂 File transfer & info sharing: Enables the technician to upload patches, drivers, or troubleshooting files.
  • 🎥 Screen recording or event logging: Useful for diagnosing recurring issues or for later training.
  • ⚙️ Ease of installation and use: Both the user and technician should be able to set it up quickly.

Some of the most widely used remote support tools include:

  • TeamViewer
  • AnyDesk
  • LogMeIn Rescue
  • Zoho Assist
  • ConnectWise Control
  • Splashtop SOS
  • BeyondTrust Remote Support (formerly Bomgar)

When you connect with a support technician, the software will usually ask for your explicit permission before granting remote control. Once access is approved, the technician can operate your computer or mobile device as if they were sitting right in front of it.

While this technology is incredibly convenient, it also comes with a security warning — always make sure the person you’re granting access to is legitimate and authorized to perform repairs. Unauthorized remote access can expose your system to serious risks.

Malware is software designed to harm your computer — and unfortunately, it exists because some people choose to use their technical skills in destructive ways. It’s sad but true: while technology can do amazing things, there are always a few who exploit it to cause trouble.

That’s why protecting your computer is so essential. The term malware is a broad category that encompasses several types of harmful programs, including viruses, worms, spyware, trojans, ransomware, and rootkits. Each has its own way of infecting systems and causing damage — from slowing your computer down to stealing personal data.

As the name implies, antimalware software is designed to prevent these malicious programs from infecting your machine. These tools scan, detect, and remove harmful software before it can do damage — and often provide real-time protection against new threats as well.

Some of the most popular and trusted antimalware programs include:

  • Norton 360 (by Symantec)
  • McAfee Antivirus
  • AVG AntiVirus
  • Avast Antivirus
  • Bitdefender
  • Windows Defender (built into Windows)

When selecting an antimalware package, it’s essential to understand what it protects explicitly against. Some applications offer comprehensive protection against viruses, spyware, phishing, and ransomware, while others focus only on specific types of threats (such as antivirus or antispyware). Specialized tools are perfectly fine — as long as you know what level of coverage your system actually has.

⚠️ A word of caution: even with antimalware software installed, no protection is 100% foolproof. New threats appear daily, and attackers constantly evolve their tactics. However, running without any antimalware protection — especially on a computer connected to the internet — is extremely risky. Having a strong security tool is your first line of defense.

Generally speaking, antimalware software works by monitoring your computer’s activity and looking for anything that seems suspicious or out of the ordinary.

For example, an antivirus program usually runs quietly in the background, examining every file that’s opened, downloaded, or modified on your computer. When it detects unusual behavior — such as a file trying to modify system settings or replicate itself — the program will alert you about the potential threat and often ask what action to take, such as deleting, quarantining, or ignoring the file.

Some modern antivirus tools can even make intelligent, automatic decisions based on built-in rules and cloud-based threat intelligence, minimizing user effort. The overall process of running antivirus software to detect and remove infections is sometimes referred to as inoculating your computer — much like giving it a vaccine to stay protected.

Antivirus and antimalware programs rely on a threat database to recognize malicious patterns. This database should be updated frequently — ideally once a week or more often. Most tools can be set to update automatically, so your system stays protected from the latest threats.

While traditional antivirus programs focus mainly on detecting viruses, antimalware solutions are a broader, more advanced category. They detect and defend against newer threats, such as spyware, ransomware, adware, and trojans, offering more comprehensive protection.

Microsoft recognized the widespread prevalence of spyware on its operating systems, so starting with Windows 7, it introduced Microsoft Defender (now part of Windows Security) to help combat these issues. While Windows Security provides solid basic protection and is free, most experts agree it’s not a full replacement for premium security suites like Norton, McAfee, or Malwarebytes. It’s definitely better than having nothing, but pairing it with a reputable third-party solution offers stronger, layered protection.

After you install your antimalware software, the next important step is to configure it properly. Thankfully, most modern antimalware programs come with default settings that are already optimized for typical users, so you usually don’t need to make many changes.

The most critical configuration to check is that your software is set to update automatically. Since new threats emerge daily, keeping your virus definitions and protection database up to date ensures your system stays secure. Many programs can be configured to download updates in the background without interrupting your work. For example, in Norton 360, you can open the Settings panel to view and adjust your security options, such as:

  • Turning real-time protection on or off
  • Scheduling automatic scans
  • Running a manual scan immediately
  • Installing protection on another device

These options give you flexibility while ensuring your system remains guarded around the clock.

In short, while default settings work well for most users, taking a few minutes to confirm automatic updates and scan schedules are enabled can make a big difference in keeping your system protected.

If you suspect your computer is infected with malware, it’s important to act carefully and methodically. The goal isn’t just to remove the malware but also to prevent it from spreading or coming back. Here’s a simple, step-by-step approach:

  • Confirm the infection : Before jumping into fixes, take a moment to be sure your system is truly infected. Unusual pop-ups, sudden slowness, or strange programs starting automatically can all be warning signs. If you suspect something, scan your system with trusted antimalware software and look for clear evidence before making big changes.
  • Quarantine the device: Once you’ve confirmed that malware is present, disconnect the infected computer from the internet or the local network to prevent further spread. Malware can spread through shared drives, Wi-Fi, or even email. Keeping the device isolated helps contain the problem.
  • Clean or remediate the system: Run a full system scan using updated antivirus or antimalware software. The program will detect and remove infected files. Depending on the type of malware, you might need specialized tools or safe-mode cleaning methods. Always ensure your security software is up to date before scanning.
  • Schedule regular scans and updates: Prevention is easier than cleanup. Set your antimalware program to run automatic scans and download updates regularly. This helps reduce the chances of future infections and keeps your protection current.
  • Educate yourself and others: The final step is learning from the experience. Understand what caused the infection — was it a suspicious download, a fake email, or an outdated program? Being aware of these sources helps you avoid repeating the same mistake.

This process not only removes malware but also strengthens your computer’s defenses going forward.

A firewall is like your computer or network’s security guard — standing at the door, watching everything that comes in or goes out. It’s one of the most important defenses for any device connected to the internet. Firewalls protect you in two major ways:

  • They block hackers and malicious traffic from reaching your computer or network.
  • They prevent users or systems on your network from visiting unsafe or restricted websites.

At its core, a firewall filters network traffic according to a set of rules defined by a network administrator (or by default settings). If incoming or outgoing traffic doesn’t meet those rules, it’s blocked — keeping harmful data streams out.

💡 Note: Antimalware software scans individual files for threats, while firewalls guard your system against entire streams of network traffic that could be dangerous.

Firewalls come in several forms:

  • They can be standalone hardware devices (sometimes called “black boxes”) placed between your computer and the internet.
  • They can be software-based firewalls, installed directly on a computer, router, or server.
  • Some setups use a combination of both hardware and software for layered protection.

There are also two main types of firewalls based on where and how they operate:

These are designed to protect an entire network of computers. They’re usually hardware devices that include built-in software for configuration and monitoring. You’ll often find them in businesses, schools, and organizations.

These protect a single computer. They’re almost always software solutions built into many operating systems — like Windows Defender Firewall in Windows or macOS Firewall in Apple systems.

Together, firewalls and antimalware software form a powerful first line of defense, protecting both your files and your network from unwanted intrusions.

To understand how firewalls protect your computer, imagine your home has two doors — one that opens to the outside world (the internet) and another that leads into your private living space (your internal network). A firewall acts as the security guard standing between those doors, checking every visitor (piece of data) to make sure they’re safe before letting them in. Most network-based firewalls have at least two network connections:

  • One connects to the public side (the internet).
  • The other connects to the private side (your internal network of computers and devices).
  • Some advanced firewalls include a third connection that links to screened subnet (sometimes called a DMZ, or Demilitarized Zone). This area is used for servers that need to be accessible both internally and externally, such as web servers or email servers. Think of it like this:

💡 Your company has a lobby (the screened subnet) where visitors can come in to deliver mail or ask questions, but they can’t freely walk into the private office area. The firewall ensures they stay in that safe, controlled space.

Firewalls decide which network traffic to allow or block using a set of rules, kind of like a guest list at an event. Only the “approved guests” are allowed through.

By default, most firewalls use a “default deny” policy — meaning everything is blocked unless it’s specifically allowed. This is the safest approach. These rules are stored in something called an Access Control List (ACL). The ACL tells the firewall what to do with each packet of data (like a digital envelope) that tries to pass through. Firewalls can make decisions based on:

  • IP Address: where the traffic is coming from or going to
  • Port Number: which service or application it’s trying to use (like web browsing, email, or file transfer)
  • Domain Name: the website or server being contacted

If the packet meets the conditions in the ACL, the firewall allows it through to its destination. Otherwise, it’s blocked or dropped — never reaching your system.

In short, a firewall is your digital gatekeeper, controlling and filtering all data flowing in and out of your network to keep it safe from unwanted intrusions.

Most modern computers come with a built-in software firewall to help keep unwanted traffic out — and in Windows, that’s the Windows Defender Firewall. It acts as your system’s first layer of protection, filtering out suspicious network connections and blocking unauthorized access attempts.

While this article doesn’t go into the detailed configuration of Windows Defender Firewall, it’s important to understand one simple fact: keeping your firewall turned on is essential. It’s one of the easiest and most effective ways to protect your computer from hackers or malicious programs trying to reach it over the internet. You can access Windows Defender Firewall through:

  • The Control Panel, or
  • By typing “firewall” into the Windows search box and opening it directly.

In most cases, the firewall is enabled by default, which means your computer is already protected right out of the box.

Some third-party security software, such as Norton 360, McAfee, or Bitdefender, includes its own built-in firewall. When these programs are installed, they usually automatically disable the Windows Defender Firewall to avoid conflicts. This is perfectly normal — you only need one active firewall at a time to maintain smooth and secure system operation.

You probably share files with other people quite often — documents, photos, or project folders. Sometimes those files are too large to send through email or upload to the web easily. Other times, you may have a bunch of smaller files you want to send together without attaching them one by one.

That’s where compression software comes in handy. It can reduce the size of large files and combine multiple files into a single, easy-to-share package.

💡 Note: The process of compressing a file is often called “zipping” — named after one of the most common compression file types, the .zip format.

Compression software works by finding and removing redundant information within a file, shrinking its size without changing its content. The amount of compression you get depends on the file type — text files and spreadsheets usually compress well, while images and videos may not shrink much because they’re already optimized.

Another great feature is the ability to bundle multiple files together into a single compressed archive. This makes sharing and storing files simpler. When needed, you can unzip or extract the archive to restore all the original files to their exact form.

For years, WinZip was considered the gold standard in compression software — it’s reliable but not free. Fortunately, Windows 11 includes a built-in compression utility that can easily open and create .zip files. If you’d like to explore other popular tools, here are some of the most common compression formats and their uses:

ExtensionUse
.rarMost computers support the most common compression format created by PKWARE.
.tar“Tape archive” format used in UNIX/Linux systems. Not compressed by default; when compressed, it often becomes .tar.gz.
.zipCreated by the gzip program, which is common in UNIX/Linux environments.
.dmgmacOS disk image file format.
.isoDisk image format for optical media like CD-ROMs or DVDs.
.7zFormat used by the free and open-source 7-Zip program.
.gzCreated by the gzip program, common in UNIX/Linux environments.
.jarShort for Java Archive, similar to .zip, used for distributing Java programs.

✅ Note: Before performing this exercise, make sure 7-Zip is downloaded and installed on your computer from the official website https://www.7-zip.org/

  • Open 7-Zip
    • In the Windows search box, type 7-Zip and press Enter.
    • The 7-Zip File Manager window will appear, showing your folders and files.
    • You can browse to any location using the folder tree or click the up arrow beside the location bar to move up one level.
  • Select Files or Folders to Compress
    • Navigate to the file or folder you want to add to your archive.
    • Click the green Add (+) button in the toolbar.
    • This will open the Add to Archive dialog box.
  • Adjust Archive Settings (Optional)
    • The default settings work fine for most users, but you can customize if needed.
    • Common options include:
      • Archive name: Rename your compressed file.
      • Compression level: Choose between “Fast,” “Normal,” or “Ultra.”
      • Password protection: Add a password if you want to secure the archive.
  • Create the Archive
    • Click OK when you’re ready.
    • 7-Zip will process your files and create the compressed archive (for example, example.7z).
  • Verify the Result
    • Locate the new archive file and compare its size to the original files.
    • Notice how much smaller the compressed file is — this shows how effective file compression can be!

Utility software may not always be the star of your computer setup, but it quietly plays one of the most important roles — keeping your system secure, optimized, and running smoothly. From instant messaging tools that simplify communication to antimalware and firewalls that protect your data, and compression programs that make sharing files effortless, each utility serves a unique purpose in maintaining both performance and protection.

The right combination of these tools helps ensure that your computer isn’t just powerful, but also safe, efficient, and reliable — ready for anything you need it to do.

This article is part of the Software Applications Series — where we explore how software brings computers to life and helps us get things done. Check out the main article: 👉 — Software Applications: Powering Digital World