• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tips

Easy Spring Cleaning Steps For Your Computer

March 8, 2016

Just as it’s a good idea to periodically clean out closets and other areas of your home as part of spring cleaning, your computer needs decluttering attention as well.

This not only makes it easier for you to find files when you need them, but can also speed up the computer performance.

Check for viruses
If you do not have an antivirus installed and set to regularly check your system, make it your first priority to install an antivirus.

Not all viruses put out obvious signals like the blue screen of death; some can lurk in the background, slowing down your computer’s operations or running malware without your knowledge.

Use a disk cleaner
Disk cleaners scour your system looking for files you don’t use, particularly useless temporary ones. Such files won’t impact how your programs work, and they just take up valuable space and can even make your computer run slower than it should.

Organize your files
If you have long lists of files, try grouping them into folders. This will save you a lot of time when looking for something in particular and also makes your storage more aesthetically pleasing.

Toss unnecessary programs
You’ve likely tested out programs and decided they weren’t for you or even grown tired of them. There’s no reason to keep them. Go into your Control Panel and select Programs to see everything that’s on your computer.

Uninstall the ones you can readily identify as ones you no longer want or need, and leave the ones you don’t recognize alone in case they are important. Check and uninstall any web toolbars, too.

Delete your web history and cookies
Over time, all the little data records of where you’ve been while surfing the web accrue, and can greatly slow the functioning of your computer.

Deleting your web history, including cookies, is something you should not be doing just during spring cleaning, but on a regular basis to keep your computer operating at optimum speed.

How To Create A Windows 10 Recovery Drive

February 15, 2016

Since most Windows 10 users obtained their version of the latest Microsoft operating system as an upgrade from a previous version, there isn’t a built-in recovery system if your PC or other device is disabled.

You would have to revert to that previous operating system and re-download Windows 10. Unfortunately, if that occurs past Windows 10’s first year on the market, that download won’t be free.

To potentially save some money down the line and a significant hassle, it is a good idea to create your own Windows 10 recovery drive to re-install the operating system in the case of a system disaster.

A simple way to do this if you upgraded via the media creation tool is to use that same tool to create a recovery drive on removable media, such as a disc or USB flash drive.

To do this, run the tool, click whether you have a 64-bit or 32-bit system, and choose ‘Create installation media for another PC’ from the available options. This directs you to a screen asking what language you prefer and which version of Windows 10 you currently use. Make the appropriate selections, and you will be walked step-by-step through the rest of the process.

Another method to create a Windows 10 recovery drive is to use the Recovery Options within the Control Panel.

With previous versions of Windows, this feature was a tad easier to locate, but it still lurks in the background for you to find. From the Start menu, you can open Settings and then type Recovery in the top right dialogue box to reveal an option to ‘Create a Recovery Drive’ before following the steps to complete the action. Alternatively, you can just type Recovery Drive into Cortana’s search field on the bottom left of your screen.

With either method, choose to back up your system files, and you will be directed to insert your media after a short wait for a systems check.

You will need at least 4GB of space on your disc or USB drive, and bear in mind that any other information already on it will be erased with the addition of the Windows 10 recovery drive.

This process will take a while, but you are able to continue working as your device copies everything onto your removable media.

How to Up Your PowerPoint Game

January 15, 2016

Back when PowerPoint first came out, it didn’t take a lot of finesse to create something visually appealing and exciting. Now, however, PowerPoint and its similar counterparts like Keynote and Prezi, are old hats. It is no longer sufficient to add some generic photos and bullet points that outline your speech to grab your viewers’ attention.

In fact, such uninspiring presentations have led to the coinage of the phrase “death by PowerPoint” to describe PowerPoint strategies that fall flat and leave those forced to watch them on the verge of sleep.

Presentation slide templates for your business with infographics and diagram set
Presentation slide templates for your business with infographics and diagram set

Here are a few things to keep in mind when crafting your next presentation:

• Avoid the following kiss-of-death PowerPoint photo types. Some images have been overused to the point of having little to no meaning. This, consequently, leaves viewers bored because the photos add nothing to the material covered in the presentations. Archery targets, cogs, business people preparing to race or grouped around a monitor, jigsaw pieces, hand gestures, and globes are among these types of images.

• Instead, think outside of the box when choosing photos for your PowerPoint presentations. For example, pass over an image of a handshake to represent a partnership and choose something more untraditional like cheese and crackers or a needle and thread.

• Don’t hesitate to use some of Microsoft’s newly released tools to showcase your images. For example, you can create animations using Morph or try things like frames or transparencies. However, when using such tools and enhancements, make sure they fit the overall theme and feel of your presentation.

As such, your extras will be a seamless part of your PowerPoint and not stick out like a sore thumb.

• Most importantly, focus on the content of your PowerPoint presentation. That is, after all, the purpose – to inform and effectively convey ideas. Your photos are meant to complement your content, not overshadow it.

How to Cut Down Your Mobile Data Usage

January 15, 2016

With unlimited mobile data plans being few and far between, it is imperative to monitor and manage your data usage to prevent outrageously high cellular bills. Even if you have an unlimited plan grandfathered into your service, there are other benefits to cutting down your mobile data usage, including increased battery life on your device and faster service in general. Try these tips to keep your data usage at a minimum:

• Track your usage. It’s impossible to set a usage goal or identify problems without knowing how much data you use and how you use it. Within the settings of your smartphone, you can easily find how much data you’ve used in a billing period and even set warnings for when you approach your data limits.

• Identify what applications use the most data. This can also be done within your smartphone’s settings where you can see app usage at a glance and can also set warnings or cut-off limits at this level. After assessing how much data each application uses, you may even want to delete the most data-hungry ones.

• Take advantage of free WiFi. A wide array of businesses offer free wireless Internet service as a perk to customers, so don’t pass up the opportunity to get your high-usage needs met at no expense to you. You can even configure your settings where applications only update when WiFi is available.

• Put the stymie on streaming music and video. While you may like to show your friends the latest footage off of YouTube or listen to your playlists while on a run, these activities come with a high data usage price tag. Try waiting to view videos until WiFi is available and make your playlists available offline to listen to them at will without any costly data usage.

Just by implementing these simply usage-reducing and awareness strategies, you can greatly decrease your cellular data bill and the workload on your smartphone device. This is a win-win no matter how you look at it.

Beware The Fake Microsoft Cold Calls

October 27, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

The phone rings and you don’t recognize the number or name on the caller ID. You pick up anyway and the caller tells you that they work for Windows Support or Windows Service Center and they are a Microsoft Certified Technician.

They go on to say they have received log files or have determined that your computer is infected and causing corruption throughout your Windows operating system.

They ask if you’re at your computer now and, if not, to go there. Once there, they walk you through how to open your Event Viewer and show you the Administrative Events under the Custom Views folder.

They are quick to point out all of the red circles labeled “Error” are all Malware infections. They then ask you to look at the number of events listed and they go on to advise this is the total number of infections currently on your computer.

The caller then says they can clean your system of all infections, but they will need to have remote access to the computer.

At this point in the call, most people have been thoroughly convinced by the voice on the other end of the phone that their system is indeed infected and needs to be cleaned. After all, the caller knew where to look for the so-called infections and they do sound like they truly want to help.

The Microsoft “employee” will even tell you that if you don’t let them remove the infections, the “hackers” that placed the malware on your system will have complete access to all of your information.

They warn that your identity is in jeopardy of being stolen. You must give them remote access to your computer. They are your only hope and you must trust them. After all, they say they work for Microsoft.

The fact of the matter is that the caller does not work for Microsoft in any capacity. They don’t work for any of their third party vendors nor any security firm that has been retained by Microsoft.

They are in fact the “hackers” attempting to convince you to give them access to your computer to infect your system and steal your data.

If you allow them remote access, they will start to install malicious programs on your computer. They’ll copy all of your information and, in some cases, encrypt your data.

They will tell you that that the infection is too severe for a “standardized” cleaning and you will need to pay money to have them install removal programs to clean the system.

In mid-2013, NBC News Technology reporter Frank Catalano, reported on receiving one such phone call himself.

After his ordeal with the fake Microsoft, Mr. Catalano contacted the real Microsoft. He received the following reply:

“In 2010, Microsoft began receiving reports of scammers making phone calls or sending emails to people,” replied a spokesperson for Microsoft’s Digital Crimes Unit. They advised that they had referred the cases to the Federal Trade Commission.

One very important thing to remember is that Microsoft (or any of its partners) will never cold call you. They will never ask for remote assistance. They will never ask for usernames and passwords.

If you have fallen victim to such a scam, disconnect your network cable and take your computer to a trusted service center or repair facility and explain in detail what happened as soon as possible.

For questions or advice on what to do about cold call scammers, contact Tech Experts at (734) 457-5000, or by email at info@mytechexperts.com.

Should You Eject USB Drives Before Unplugging Them?

October 27, 2015

While it is possible in some cases to remove a USB drive without using the eject option and not cause harm, you should always eject a drive before removing it from your PC’s USB port to be on the safe side.

Some USB drive users thought this was only necessary with Linux and Mac because the dialog to eject a device is so prominent, and Windows doesn’t make it as clear to safely eject a USB drive.

It is, however, possible to accidentally lose or corrupt the data on the thumb drive even when using Windows.

The information stored on USB drives can become corrupt when the device is pulled out because most operating systems employ something called write caching, a fancy way of describing how Windows sometimes saves tasks to do all at once in order to be efficient.

When a computer user initiates the proper ejection process, it tells the OS to complete all those tasks first before it’s safe to remove the drive from the USB port.

Windows handles removable drives a little differently than Mac and Linux, which is perhaps why the way to safely eject USB drives isn’t as easy to find.

Often, Windows doesn’t recognize or categorize these drives as removable, and this actually makes proper ejection even more important. When a removable drive is identified as a non-removable one, Windows automatically uses write caching.

This means that any data associated with a saved task can be lost in the event that a user pulls the drive out without first clicking the “Safely Remove Hardware” option in the system tray.

Tips On Buying Smart Watches

October 27, 2015

The smart watch is one of the hottest new products in the tech market today, and it’s with good reason. These devices give users the ability to monitor and control more than one device simultaneously and can even eliminate the need for some items.

In addition to the obvious time function, you can make and receive calls and monitor fitness activities among a host of other features straight from your wrist. However, with the number of smart watch manufacturers growing, it can be hard to decide which one is best for your needs. Consider the following before making any costly purchase:

Is it compatible with your smartphone? Since most smart watches are designed to be a companion to your cell phone, it is important to check their compatibility. Some devices are designed to work only with the iPhone while others are mainly for Android products. Then, there are third-party manufacturers producing watches that are compatible with all smartphone operating systems. If in doubt about the compatibility of a smart watch with your smartphone, ask a salesperson or search for the product online.

How important is a full-color screen to you? When presented with the choice between a black-and-white E Ink and a full-color screen, you likely choose color without any other information. There are, however, some great benefits that come with the monochrome E Ink screen.

For starters, full-color screens produce more glare in the outdoors while E Ink ones are visible virtually anywhere. Monochrome screens also save considerable battery life compared to their color counterparts, lasting up to days longer between charges. They do, however, have a dated and less visually appealing look.

Do you want a touch screen or old-school button gadgetry? While most consumers opt for the familiar touch screen technology featured on smartphones, the simpler button styles have a following as well.

A touch-display interface usually has easier navigation, but the small screen size can cause lots of pressing errors. Smart watches with physical buttons also run a little cheaper, but the choice is ultimately based on personal preference.

What types of design extras do you value? Smart watches vary greatly when it comes to design and little extra touches. While a fashionista may delight in the ability to swap out bands to coordinate with particular outfits, this may not impress another consumer who consider the extra pieces a hassle to keep away from kids or pets.

Look at a variety of products, weighing the importance of certain features with any additional costs, and then make a decision.

Avoid These Five Email Annoyances

September 23, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Email is a primary form of communication in the business world because it allows people to work within their own schedules and time-management styles.

With its ease of use, however, we may be sending more messages than necessary, contributing to a general email overload that can mask which items are most important.

Here are some common pet peeves in regards to this lightning-fast communication that may help you refine your email practices:

Sending/Responding to All
Before you send a mass email to all of your contacts or reply to all on an email, ask yourself if each of those people really have a need to know the information within your message.

While this may cover all bases, it is disrespectful to the recipients of your message that aren’t an essential part of the conversation by wasting their time and clogging their inbox. [Read more…] about Avoid These Five Email Annoyances

Battling Bloatware, Trial Programs and Time Bomb Software

August 31, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

The day has finally come. You’ve saved money for what seems like a lifetime to purchase a new desktop or laptop. You’re all excited to get it unboxed and powered on… only to find yourself confronted with loads of bloatware, trial programs and time bomb software you will never use and never asked for. You quickly find yourself spending hours removing all the preinstalled programs instead of enjoying your new device. Why is that?

The sole intent of a vast majority of the programs you find already installed is to track your presence on the web. Some programs, such as Superfish (which Lenovo was installing on their computers), also change your search results so you see different ads than you would from normal browsing habits. This can also affect your computer’s security.

Some of the more common programs that tend to get overlooked are browser toolbars. Several of the most common toolbars you will find are Yahoo, AOL, Google and Ask. These are so common that most computer users think they are part of their browser.

The purpose of a browser toolbar is to gather information on your browsing habits such as popular search words or phrases and sites visited. This information is then sold to advertising companies or used to place custom targeted ads on the sites you visit. In most cases, you will also start to see an increase in spam messages in your email inbox. It’s recommended to properly remove all browser toolbars from your Internet device.

Just when you think you have removed everything that needs to be removed, look again. Most likely, you will find trial or time bomb software installed as well. These are programs that offer you their fully functional features for a predetermined amount of time.

Two of the most popular software programs preinstalled in this way are Microsoft Office and anti-virus programs. Office programs will give you full functionality of the Office suite for usually about 30 days, then features will become unavailable to the user after the program expires. In some cases, this has little to no effect on the user, but in other cases, it can have a severe financial impact.

Trial versions of anti-virus programs can be the most devastating to the user. A user will power on their computer, see there is an anti-virus program made by a large and well-known company already installed, and they think they are fully protected against the evils that await them. This may be true for the first 30 to 90 days. However, after the trial period ends, most users either ignore the pop-ups warning that the program is going to expire or they are not notified. This leaves the user in a state of vulnerability. After the program expires, they no longer receive regular security definition updates.

Let’s say you have taken the time to fully clean and remove all the bloatware, trial, and time bomb bloatwaresoftware from your computer. The only things you need to watch for now are third-party programs piggybacking on the installs or updates of other programs.

Two of the most common programs to pay attention to when updating or installing are Adobe Flash Player and Oracle’s Java. You need to pay close attention to the installer windows or you will end up spending more time removing unneeded security scanners, toolbars, and/or browsers. For more information about bloatware, trial programs, and time bomb software, contact Tech Experts at (734) 457-5000.

Internet Security: Beware Of “Malvertising”

July 27, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

As if Internet use wasn’t already troubled with cyber perils, users now have to add “malvertising” to the list of things from which they need to protect themselves.

“Malvertising,” like the name suggests, means “ads that contain malware.” Some mal-ads aren’t dangerous unless you click on them – but others can do “drive-by downloads,” sneaking their malware onto your computer simply because you’re viewing the page on which the ad appears.

While most malvertising is on websites, it can also show up on other ad-displaying apps, such as Facebook, Skype, some email programs, and many games.

The reason that malvertising is more of a problem than other malware approaches is that it can be spread through online advertising delivery networks like Google DoubleClick to legitimate sites that users routinely visit, like the New York Times, Huffington Post, and Yahoo, as well as routinely-used mobile apps that show ads. Malware-bearing ads can be “injected” either by hacking ads at the provider end or by buying and providing mal-ads. In most cases, there’s no way for a user to tell just by looking that an ad has been compromised.

The Potential Damage
The dangers of advertising-delivered malware are the same as those from malware you get any other way. Malware can steal account usernames and passwords, bank and credit card information, and other sensitive data.

It can encrypt your data and “hold it for ransom.” It can, in turn, infect other computers on your network and turn your computer into a “zombie,” spewing out spam and malware to the Internet.

July_2015_MalvertisingLike other viruses and malware, malvertisements take advantage of security vulnerabilities on users’ computers and mobile devices. These may be anywhere from the operating system, to web browsers and other applications, to add-ons and extensions like Java, JavaScript, and Flash.

How do you know if your computer has been infected by malware? One sign is that your web browser shows unexpected pop-ups or seems to be running slower. But many malware infections remain “stealthy,” possibly even eluding anti-malware scans.

Legitimate ad creators and ad delivery networks are working on ways to detect and prevent malware from getting into the digital ads they serve. Otherwise, people have even more reason to not look at ads or block ads entirely.

But, assuming it can be done, this won’t happen for a year or more. The burden is on companies and individuals to do their best to protect their networks, computers, and devices.

What Can Companies and Users Do?
Although malvertising is a relatively new vector, the best security practices still apply; if you’re already doing things right, keep doing them. But what does “doing things right” look like?

  1. Avoid clicking on those ads, even accidentally.
  2. Maintain strong network security measures. Next generation firewalls at the gateway can often detect malware payloads delivered by ads, block the ads entirely, and/or detect communication from already-infected devices.
  3. Regularly backup systems and critical files so you can quickly restore to a pre-infected state if your systems and data are compromised.
  4. Deploy endpoint security software on every device so that it’s protected on and off the network.
  5. Ensure that all operating systems and client software (especially web browsers) are fully patched and up to date.
  6. If you suspect a computer has been infected, stop using it for sensitive activities until it’s been “disinfected.” Again, many security appliances can help you identify and quarantine infected devices.

It’s unfortunate that even more of everyday Internet use is potentially unsafe, but the steps to fend off malvertising are essentially security precautions that companies and individuals should already be following.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.