• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tips

How To Ensure A Safe And Virus-free Internet Experience

April 29, 2011

Visiting websites like Facebook, Ebay, or Youtube at work may keep you busy while there’s “nothing to do.” However, if your computer system isn’t properly protected, you run the risk of a virus or malware infection.

We’ve put together some of our best tips in this “safe browsing habits” article. Following these general guidelines can help protect you against Internet based threats.

One of the dangers faced by users when they browse the Internet is a hacker or infected computer accessing the browser’s cookies. Cookies are small text files saved on the computer by the server of the page the user is visiting.

The information cookies contain is usually related to the page being visited, which can include user names and passwords, browsing preferences, etc.

Java Applets and JavaScripts can also put users at risk. Although the majority of these programs that are run on the user’s computer at the request of the server are harmless, they can be designed to steal system information and send it to a malicious user.

Another threat that is becoming one of the most dangerous threats on the Internet is phishing. This technique involves tricking users into thinking that are visiting a legitimate web page, when they are actually visiting a malicious page.

This technique is particularly dangerous when the malicious page simulates an online banking page. Web pages that perfectly imitate the appearance and functions of well-known banking entities are becoming increasingly common-place on the Internet and entice users into entering personal data that will fall directly in the hands of unscrupulous cyber criminals.

But that’s not all. There are also viruses that are capable of getting into computers when users browse the Internet. To do this, they usually exploit vulnerabilities that allow them to install themselves on computers without the user realizing.

The malicious code that have the capacity to do this include many Trojans designed to steal confidential information from affected computers.

Online banking
When making transactions on the Internet, check that the process is carried out through a secure server. Several characteristics identify these types of servers. One of these is the address that appears in the address bar in the browser, which starts with https://.

What’s more, a padlock or key icon will appear in the browser window. If the padlock is closed or the key is complete (not broken), the server is secure.

Disable cookies
Another recommendation is to disable the cookies from the toolbar in the browser you are using. Although they must be enabled in order to access some web pages, they can be enabled temporarily.

Even though it may be tiresome enabling and disabling the cookies, it can prevent a lot of serious problems.

Double check the URL
To avoid falling victim to phishing scams, make sure that the page you are visiting is legitimate. To do this, copy the URL of the website you want to visit and paste it in the address bar of the browser. It is also advisable to identify and monitor the Java Applets and JavaScripts on the system to avoid any nasty surprises.

Raise your security level
Raise the security zone in the browser to ‘medium’ or ‘high.’ This can be done from the toolbar in the browser you are using.

Anti-virus is key
Finally, make sure that you have a reliable antivirus installed, which is updated at least daily. This will prevent malicious code from slipping into your computer while you are browsing the Internet.

Simple Tips To Keep You Out Of Computer Trouble

April 29, 2011

As you can imagine, we see a lot of computer and network issues . Sometimes, they’re pretty difficult to diagnose and repair, but in some cases, a simple fix is all you need. Here are some tips you can refer to the next time your computer goes a little crazy, and some advice to keep you out of trouble.

Reboot!
Nine times out of ten, rebooting your computer and connected equipment will solve the problem you’re having.

Do a full restart, which means go to your Start menu, shut down the computer, and power down your peripherals and computer. Then, restart it fresh.

We know what you did
A good computer consultant can tell if you’ve been bad or good on your computer, and usually pretty quickly. Tell us what you really did right before the computer crashed – this will save time and aggravation.

Your consultant will figure it out eventually – why not make the repair quicker?

There is no free lunch
Downloading free music, movies and games from the Internet can open holes in the security system of your computer, making it easy for other people to access your files.

Be safe… Only use legitimate sites like iTunes and Netflix for your downloads.

Use strong passwords
We walk a fine line in recommending passwords. If they’re really easy to remember, that means they’re also really easy to guess. If we make the password very hard to guess, it’s also going to be very hard to remember.

Here’s a suggestion: Create a “main” password which you then modify for each site you use. A good main password would consist of numbers and letters (but not your birth date!).

Try using your first dog’s name combined with the address of the first house you lived in, and then add to the password for each site. For example, buffy1944 could be a good base password. Then, you’d add AMZ at the end for your login to Amazon.com – buffy1944AMZ, EBY at the end for your eBay account, etc.

Update your antivirus
Hackers don’t care that you’re too busy to renew your antivirus and anti-spyware software – in fact, they hope you don’t! Set your software to update at least once a day and run a full system scan at least once a week.This is also a good time to schedule system maintenance tasks, like your system defrag.

Public wi-fi is public
If you don’t have an urgent need to check your online banking or private e-mail at the coffee house, don’t do it. While you’re on a public network, even if it is encrypted, a nearby hacker can capture your passwords and other personal information

 

Helpful Microsoft Office Keyboard Shortcuts

February 2, 2011

Ctrl Z is the magic undo combo. It simply undoes your last action, say, the paragraph you accidentally erased (it works in other applications, too).

Programs vary in the number of times you can undo something, but some will let you Ctrl Z all the way back to the beginning. (And, yes, there is a redo command, just hit Ctrl Y.)

Ctrl B, Ctrl I, or Ctrl U apply bold, italics, or underline to highlighted text, respectively.

Ctrl P prints whatever is in an active window.

Ctrl Backspace erases an entire word at a time, instead of a letter.

Ctrl up or down arrows let you scroll an entire paragraph at a time, instead of one line, and Ctrl Shift up or down arrow will select an entire paragraph.

Ctrl Enter inserts a page break in Word.

Alt Ctrl C inserts the copyright symbol (Alt Ctrl R inserts the registered trademark symbol, and Alt Ctrl T makes the trademark symbol).

In Outlook, you can jump to the section you want: Ctrl 1 switches to the Mail window, Ctrl 2 switches to the Calender, Ctrl 3 to Contacts, Ctrl 4 to Tasks, and Ctrl 5 to Notes.

Ctrl Shift M starts a new message in Outlook. (Use Ctrl Shift C for a new contact.)

In Outlook e-mail, hit Ctrl N to compose a new message, Ctrl R to reply to a message.

In Microsoft Excel, you can select the entire column by pressing CTRL SPACEBAR, and select the entire row with SHIFT SPACEBAR.

 

Why Internet Predators Love Social Network Sites

February 2, 2011

Internet predators have become a fixture of sorts on many social media sites which necessitates the need for users to exercise caution.

Since the advent of the Internet “instances” of cyber crime have evolved into regular and expected occurrences.

Now the growing popularity of social network sites has cyber criminals taking direct aim at them with their Internet scams.

What is it that makes the social networks such an attractive target for this type criminal behavior?

Here are 3 very “inviting” reasons:

Casual Atmosphere
Social network sites are meant for just what they imply and that is to socialize.

This type of atmosphere is casual and relaxed therefore people for the most part are NOT expecting devious behavior.

It is just this type atmosphere that cyber criminals depend upon and thrive in. Their ability to manipulate others is based upon a “blind” trust or having others believe in their own sense of security.

Ease of Use
Most social media sites by and large are set up to be easy to use and navigate. This allows even the less than ‘tech savvy’ to become involved, but they also bring along their own naive nature relative to Internet security issues.

This makes them even easier prey since they are unaware of or unfamiliar with many Internet scams.

This ease of use on the other hand has also made it just as convenient for the “sinister online element” to gain access to their unsuspecting prey.

There are no security systems to work around or advanced coding to decipher therefore the “door” is wide open for the criminal element to gain easy access.

Popularity
As we all know crime always seems to gravitate towards the largest population bases offline and this remains true online as well. The very popularity of social media sites has put them in the “cross hairs” of the devious minded predators that lurk on the Internet.

Safety in numbers is NOT something innocent site members can count on when interacting within online social communities.

Internet predators have settled in quite comfortably on many social media sites to the point that they have almost become accepted “fixtures” to users.

For the 3 reasons we have spoken of above cyber criminals are attracted to many of the online communities.

The structure of these sites offers the perfect opportunity for the criminal element to successfully implement their Internet scams.

For the users they must simply be aware that cyber crime does exist and will continue to do so calling for the need to exercise caution when socializing online.

 

SPAM Prevention FAQ: Tips To Reduce Junkmail

January 20, 2011

How can you reduce the amount of junk email you receive? Here are our best tips!

Never Allow Your Email To Be Posted Or Listed
“Spiders” and web “crawlers” routinely “harvest” email addresses from web pages in an effort to build a collection of email addresses to send junk email to.

Never Unsubscribe Or Ask To Be Removed
The only exception to this rule is if you originally signed up for that particular list or asked to receive updates.

If you never asked to be part of a participating mailing list, why would you ask to be removed? Doesn’t make sense does it.

This is a common ploy spammers use to validate email addresses. If you respond, that proves to them that your email address is alive and active, and that you are receiving their emails.

Responding only encourages them to sell your email address to other spammers, and will ultimately increase the amount of junk email that you will receive.

Never Open Or Read Junk Email
Believe it or not, even if you never respond, but merely open a junk email, there could be special HTML code contained in that email message that will report back that you opened or read the message.

This provides validation to the spammer that your email address is alive and active, and you can bet you will start receiving more spam!

Be sure to turn off your email program’s Preview Pane feature, as this is essentially the same thing as “reading” a message.

Avoid Contests, Special Offers, And Chances To Win
These are gimmicks to get you to reveal your email address so they can send you special offers. Many free ecards (electronic greeting cards) are also ways companies collect email addresses.

Never Post To An Email List Using Your Private Email Address
Many spammers watch these posts in order to harvest new email addresses.So be very cautious when posting to these websites.

If you are a contact for a registered domain, do not list you private email address.

Instead of using your personal email address use a generic common mailbox for this purpose, or ask for domain registration privacy.

Create a public email address such as DNS@yourdomain.com or help@yourdomain.com.

Guard Your Computer Against Trojan Spyware And Software
Never open any attachments you don’t explicitly trust.

Some “fun” emails are often a ruse to steal email addresses or track your behavior on the Internet.

The use of both anti-virus, personal firewall, and or antispyware software is strongly recommended.

Use A Free Account As Your Public Email Address
Reserve your private email address for friends and select associates.

Never sign up for special offers using your private email address. Use your generic common email address for those.

Trick The Spammers
If you post an email address online, disguise its set-up, spelling out ‘dot com’ in place of .com.

Junk Mail Out Of Hand
If your junk mail has reached a level that it is just out of hand and you cannot handle it anymore, consider changing your email address.

If you don’t want to change your email address consider us to take advantage of our advanced SPAM filtering services.

We can make all necessary changes on your computer and with your email service to help prevent those spam messages.

New Technologies Make Proactive Service A Must

January 20, 2011

With today’s workplace relying more and more on information and computer systems, it just makes sense to leverage your IT investments.

Technology in the industry now allows IT professionals to take a proactive approach to network management, providing the entire infrastructure with a complete, secure, reliable, and fully automated solution to protect your IT infrastructure.

Deploying what are known as “agents,” you can add a fully automated virtual worker to your staff, which is working 24 hours, 7 days a week, 365 days a year. This agent will complete a long list of tasks that even a fully staffed IT department couldn’t handle.

You can now start to enjoy your away time when your network is being monitored by these solutions. So what exactly do they do?

Monitoring
When you use system monitoring, you can take the proactive approach to your computers and servers with a set of rules that your administrator defines.

They provide instant notifications of problems or changes such as low disk space on your hard drives, memory leaks, power problems, virus activity, and missing updates. Just about every critical component of a PC or server can be monitored.

Software Deployment
The software engines give us the ability to deploy software out to multiple systems simultaneously, which saves massive amounts of time and causes less downtime for the staff.

Given a set of rules and pre-requisites that are met prior to the install, you can ensure a smooth, fast, and worry free installation across your network.

Remote Control
Give your IT personnel a secure and quick way to remotely access your systems from any place at any time, giving your company its own help desk in a sense.

This increases productivity for staff, reducing the waiting time for a tech to show up at your location.

Patch Management
Keeping your computer systems up to date with operating system updates and security patches is critical to the health and safety of your network.

Given a set of predefined policies, all of your servers, workstations, and remote computers will automatically be receiving the latest security patches and software updates on a schedule that works for you.

Keeping the data traffic on the network during normal operation hours is crucial to the efficiency and productivity of the workplace and this will do just that.

Reporting
The reporting features will provide your administrators’ with quick and easy access to all the details of a network. Tactical and strategic planning become effortless when the agents are accumulating, tracking, and analyzing the way your network operates over time.

Audit & Inventory
Agents let the IT staff perform accurate and detailed reports on every server, computer, mobile device, and piece of equipment on your network.

This gives you a better look at what your network actually consists of and provides you and/or your IT personnel a complete detailed inventory of product specifications, versions.

An accurate network and infrastucture inventory lets you make intelligent decisions about upgrades, replacements, and maintenance.

Scripting
Possibilities are practically endless for what can be done with the scripting options. If you have a routine task that has to be done each and every day, week, or month, let your agents do the work.

They can automatically trigger those tasks to be done for you, on your time, your schedule, with no interaction required.

These are just a handful of the features that are possible, giving everyone a peace of mind when it comes to your IT.

Taking advantage of these technologies will give your IT personnel a complete set of tools to efficiently, securely, and cost effectively manage your systems.

Strong Passwords Keep Your Personal Information Secure

January 20, 2011

A recent ZoneAlarm survey revealed that 79 percent of consumers use risky password construction practices, such as including personal information and words.

The survey also revealed that 26 percent of respondents reuse the same password for important accounts such as e-mail, banking or shopping and social networking sites.

In addition, nearly 8 percent admit to copying an entire password found online in a listing of “good” passwords.

Given these numbers, it’s no wonder that 29 percent of respondents had their own e-mail or social network account hacked, and that over half (52 percent) know someone who has had a similar problem.

The first step a hacker will take when attempting to break into a computer or secure account is try to guess the victim’s password.

Automated programs are available to repeatedly guess passwords from a database of common words and other information.

Once a hacker gains access to one account, almost 30 percent of the time that information can be used to access other sites that contain financial data such as bank account numbers and credit card information. To ensure you stay safe online, here are a few tips for creating a strong password.

Use Unique Passwords For Each Account
Choose different and unique passwords for each account.

Passwords Should Be Eight To Ten Characters Long
Choose a password that is at least eight to 10 characters long. This should be long enough to prevent brute force attacks, which consist of trying every possible combination of a password until the right one is found.

Avoid Using Personal Information
Make sure your password is difficult for someone to guess. Do not use names of any kind, including your login name, family member’s name or a pet’s name. Also avoid using personal information such as a phone number, birthday or place of birth.

Avoid Words In The Dictionary
Avoid words that can be found in the dictionary. With the availability of online dictionaries, it is easy for someone to write a program to test all of the words until they find the right one.

Avoid Repeating Characters Or Sequences
Stay away from repeated characters or easy to guess sequences. For example: 77777, 12345, or abcde.

Use Numbers, Letters And Special Characters
Choose a password that is a mixture of numbers, letters and special characters. The more complex and random it is, the harder it will be to crack.

Use Word Fragments
Use fragments of words that will not be found in a dictionary. Break the word in half and put a special character in the middle.

Frequently Change Your Passwords
Change your passwords often. Even if someone cracks the system password file, the password they obtain is not likely to last long.

Cyber crime is on the rise. Taking the time to actively choose secure passwords will protect your identity, banking information and personal information. And remember, writing your password on a sticky note on your monitor isn’t secure!

Common Problems With Printers And How To Solve Them

October 15, 2010

If you have to print on any kind of regular basis, you know how frustrating printers can be. Fortunately, most printer problems are a lot simpler than they appear and are relatively easy to resolve.

Here are a few tips:

First, think about what has changed on your computer and printer since the last time you were able to use the printer. If nothing has changed, the problem should be easy to solve.

Check to see if the printer is on, you never know if someone during the day might have unplugged the printer or just turned it off.

Next, check the display on the printer if it has one. If it does not have one, then check for a status light. Usually if there is an issue, it will be blinking.

If it is blinking or there is an error code, then look in the owner’s manual which should give you a list of all the errors that occur with the printer. Most manuals will also give you a way to diagnose the problem.

A lot of printer issues are related to toner or paper and can usually be resolved very easily.

Check for obvious paper jams. There are usually a few covers that can be removed to help try to get the jam undone.

Most printer jams can be avoided if you flip through the paper before you put it in the printer. This eliminates static and clears any paper dust that might be on the paper.

If there is a toner issue, then it might be because either the cartridge is bad, low, or completely empty.

Almost all printers will give the computer user some sort of error message by either the display on the printer, status light, or the actual computer itself.

If the printer is a laser printer, then there is a toner drum that should be replaced about once a year depending on how much it is being used.

If your printout is fuzzy or faded, then this is a sure sign the drum needs replaced.

If there are no signs of issues with the printer then check the USB cable connected to the printer. Most cable problems will say the printer is offline due to connectivity issues.

Printers can be connected to a computer via USB or parallel port. Check both ends to make sure the cable is completely connected. If you have another cable, it never hurts just to swap them out to test the cable.

If you have an ink jet printer and you get smudged or blurry images, you might want to look up the utility on the printer that cleans and or aligns the print heads.

Most ink jet printers either have software that can start this process or have a setting on the printer itself that can kick start it.

If your printer produces strange characters, it’s likely that you have a printer driver problem. When a printer acts up and there are no hardware problem, the solution is often a driver issue.

A driver is a piece of software that helps the computer communicate with the printer. Drivers are updated constantly – be sure to check yours.

These are just a few problems that can happen. These should help a novice user start to troubleshoot typical problems with a printer.

Did You Know?

October 15, 2010

If you don’t know how to open a certain file type, go to www.openwith.org. There you can search by the extension (.doc, .mp4, .zip, etc.) or by the type of file (video, document, etc.), and the site will tell you which programs will open that file.

To delete multiple files, click the first file…press and hold the Shift key…then click on the last file. All the files from the first to the last clicked will be selected. Then drag to the recyce bin. To select files that are not next to each other, keep the Control keep pressed as you click on the files, and every file you click on will be selected.

To save a Web page as a PDF, enter the page you want to save at www.html-pdf-converter.com, and you’ll have a free PDF copy in moments.

If you need a quick and simple timer, use the “egg timer” website. Simply enter the time you want to count down at the end of the address. For five minutes, you’d enter http://e.ggtimer.com/5minutes. For three days and 12 hours, enter: http://e.ggtimer.com/3days12hours

 

Email Is Making You Stupid

August 30, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

“The research is overwhelming. Constant email interruptions make you less productive, less creative, and, if you’re emailing while you’re also doing something else, just plain dumb.”

That quote – and the headline – comes from an article by Joe Robinson in Information Week magazine. When it arrived in my inbox, I was compelled to read it.

The fact is, as business owners, our lives have gotten incredibly more complex as we become more and more connected. Smart phones keep our email in front of us 24 hours a day, seven days a week – which compels us to be available on the same schedule.

The study Robinson sites was conducted by the University of Minnesota. It found that managing “peripheral tasks” – those things we do while we’re also doing something else – triggered twice the number of errors, and increased levels of annoyance by anywhere from 31 to 106 percent.

Time Is Money
Given our constant state of “connectedness” to clients, employees and prospects, it’s easy to think that we have to respond instantly to a request. I get caught in that trap: Thinking I’m being efficient when I handle something immediately.

Interestingly, Intel conducted a study of employee productivity, and found that email overload cost the company almost $1 billion a year in lost productivity. Each day, a typical office employee checks email 50 times, and uses an instant messaging application 77 times.

Interruptions like this not only sidetrack employees from their jobs, but also lower overall attention spans and increase stress by measurable levels. Job satisfaction and creativity also suffer.

Myth Of Multitasking
Again, from Robinson’s article: “Human brains come equipped with two kinds of attention: Involuntary and voluntary. Involuntary attention, designed to be on the watch for threats to survival, is triggered by outside stimuli – what grabs you.

It’s automatically rattled by the workday cacophony of rings, pings and buzzes that are turning jobs into an electronic game of Whac-a-Mole. Voluntary attention is the ability to concentrate on a chosen task.”

As your attention span is bounced around by constant interruptions, your brain changes: Interruptions erode an area called effortful control, and with it the ability to regulate attention.

In other words, the more you check your messages, the more you feel the need to check them – an urge familiar to BlackBerry or iPhone users.

The cult of multitasking would have us believe that compulsive message-checking is the behavior of an always-on, hyper-productive worker. But it’s not. It’s the sign of a distracted employee who misguidedly believes he can do multiple tasks at one time. Science disagrees.

People may be able to chew gum and walk at the same time, but they can’t do two or more thinking tasks simultaneously.

So, how do we crawl out of the attention void? Interruption management. Here’s some things I’m trying:

Turn off all of the alerts that let you know you’ve got mail.

Pick a few times per day – four maximum – to check your email. Outside of those designated times, keep Outlook closed.

Don’t let email be the default communication device. Communicating by phone or face-to-face saves time and builds relationships.

Respond immediately only to urgent issues. Just because a message can be delivered instantly does not mean you must reply instantly.

Severely restrict use of the reply-all function.

Put “no reply necessary” in the subject line when you can. No one knows when an e-conversation is over without an explicit signal.

Resist your reply reflex. Don’t send emails that say “Got it” or “Thanks.”

Use automatic out-of-office messages to carve out focused work time, such as: “I’m on deadline with a project and will be back online after 4 p.m.”

Please email me at tfox@expertsmi.com and tell me about your interruption management methods. I’ll let you know in the next few months how it goes.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.