• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Will Your Internet Stop Working In July?

May 16, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

You’ve probably read in the paper or saw on the news that hundreds of thousands of computers might lose Internet access after July 9. I’ve had several clients ask, “Is this true? How serious is it?”

The short answer is, you’re probably fine. If you use Tech Experts for your anti-spyware, anti-virus, and anti-malware services, we have you covered.

Don’t get me wrong, this is a serious threat. If you happen to be one of the people with an infected computer, then yes – there’s a good chance you could wake up on July 9 to no Internet.

What’s This All About?
In a word, malware.

Last year, malware infected over half a million computers worldwide. This nasty virus modified the process your computer uses to translate domain names – like “MyTechExperts.com” – into IP addresses – like 209.151.164.50. It’s the IP address that locates the actual physical server that houses the website.

To perform that translation, computers are programmed with translators – DNS servers – that answer questions like, “What’s the IP address for www.google.com?” DNS servers are automatically provided by your Internet provider when you connect to the Internet.

When this “DNS Changer” malware infected a computer, it altered the translation server that the computer would use. Rather than a legitimate DNS server, PCs were silently reconfigured to use a bogus one.

The problem is, this new bogus server sometimes lies.

False DNS Responses
Rather than answering the question, “What’s the IP address for google.com?” with the correct answer, the fake DNS server would return a different IP address: the address of a malicious server that was configured to look like Google, but that is really a server run by identity theives.

As long as the malicious server looked enough like Google, the computer user wouldn’t know until it was too late that something was wrong. They’d be tricked into thinking it was Google.

The bogus site (which could be any site the hackers chose, not just Google) could itself install more malware, display additional advertising, or do just about anything that a malicious website could do. All without warning.

What Happens In July
In November, the hackers were caught. But hundreds of thousands of infected machines were left with their DNS settings pointing to the fake DNS servers.

So, rather than removing the fake DNS servers from the Internet, the agencies that caught the hackers changed them to be legitimate ones. The government is spending about $10,000 per month to maintain these servers.

While this meant that people with infected PCs would be able to surf the net more safely, it didn’t change the fact that their computers were, fundamentally, still infected.

On July 9th, the government is shutting down the temporary DNS servers. Anyone whose computer is still infected, and is using those servers to get DNS answers, won’t get an answer at all.

Without a working translator – DNS server – your computer can’t answer the “What’s the IP address of xyz.com” for any site on the Internet. For those people with infected computers, the Internet will simply stop working.

Let me be clear: the Internet will stop working only if your machine is infected. It’s easy to find out if you’re infected. Visit the DNS Changer Working Group at http://www.dcwg.org/ and click the green button labeled “Detect.”

This will examine whether or not your computer is affected by the DNS Changer malware. If you’re not, you’re done. July 9 will be a non-event for you.

What To Do If You’re Infected
If DCWG indicates that you’re affected, the page should also include information on what to do to clean the infection from your system.

The good news is that there are many free tools that are listed as resolving the issue – free tools from most of the major anti-malware utility vendors.

Specifically, Windows Defender Offline (formerly Microsoft Standalone System Sweeper) is listed, and it would probably be the tool I’d reach for first.

After cleaning DNS Changer off of your machine, I would also seriously review the anti-malware tools that you’re currently using. Put simply, it should have been caught by now.

Will Multiple Monitors Increase Your Performance?

May 16, 2012

by Jeremy Miller, Technician
When debating whether adding another monitor will increase productivity enough to justify the cost, consider this.

• What positions would need additional monitors?
• What sizes would be necessary?
• The product you have on hand?
• Are there any other solutions?

Different jobs and job types might require additional monitors. For example, any position that needs to be viewing more than one full-screen window at a time.

People who receive information electronically, such as an email, and then have to input information into some form or database would benefit from an additional monitor.

Also any one working with large or wide documents such as an Excel document with a lot of columns. Researchers can easily read from one screen and take notes on another.

If deciding to go with an additional monitor or multiple monitors you must decide on the size to be cost efficient as well. If you just need two screens to display information then you could use screens in the range of 16 inches and 22 inches.

Going above 26 inches can sometimes decrease productivity. In some cases having very large screens or even a single very large screen can leave you searching longer for information.

Exceptions to this could be a graphic designer or a video surveillance personal. It has been found that having more smaller-sized screens than one larger screen increases productivity in low-cost monitors.

Next, consider your product on hand. By this I mean: Do you have laptops, computers, monitors, desk space, or additional ports available?

If you already have a tower and a monitor, check to see if you can support additional monitors by checking if you have an open video port. If not, then you have to add a video card or use a USB monitor, and this can add to the cost.

Most laptops and notebooks come with an external video port. Also consider the type of available video port. There are many types of video ports including VGA, DVI, HDMI and less commonly, S-Video.

If your desk area is not large enough to support more than one monitor then you would have to either add desk space or mount the monitors in a manner that meets your space needs.

If for some reason you cannot support multiple monitors but wish to increase productivity from your monitors you can always purchase a higher pixel resolution one.

A good resolution is 2560×1440; this will add desktop space with minimal monitor size increase. The higher resolution the more that fits on to one monitor.

Consider the cost of the separate options. The cost of adding a monitor to an existing computer can be costly if you also have to purchase another video card.

If you are planning on purchasing new computers it might be more cost effective to be sure that they are capable of supporting multiple monitors from the start.

The Internet: Employees Are Wasting Your Money

May 16, 2012

By Tech Experts Staff
With today’s tight budgets every business is making cuts in some fashion. One interesting fact is that, in the United States, businesses waste some $760 billion every year on unproductive payroll.

If companies could find a way to cut back on this waste, then they would not need to cut as much elsewhere.

What do employees do to waste almost a trillion dollars a year? According to numerous studies, employees waste an average of just over two hours per day on unproductive or non-work related activities.

If you take that average and multiply it across your workforce, how much money could you be saving if you knew how? Fortunately we can help!

Internet Abuse Costly
While we don’t have a way to solve all of your company’s time wasting issues, we do have several solutions for the number one time waster by employees: Internet abuse.

Internet usage is the cause of nearly 50% of wasted time in the workplace! That adds up to 364 hours of wasted time per employee per year.

This is an incredibly easy fix, technically, and there are numerous prevention measures you can implement.

Acceptable Use Policy
The first prevention measure to help to prevent misuse of company time: Let your employees know what is – and is not – acceptable on your company network.

While most employees know that being online and goofing off is not right, if they haven’t been told they tend to not think twice. Implement a comprehensive acceptable use policy in your employee handbook.

Employees should be told what is acceptable and what consequences are in place should the acceptable use policy be breached.

Implement Filtering
The second way to keep employees from misusing the company network is to have proper measures in place to prevent unauthoroized use.

Most higher end routers have the ability to add websites to a filter and block them. This is a great way to prevent employees from having access to unauthorized or unnecessary websites.

If you don’t mind employees having access to websites such as Facebook during certain hours of the day, say lunch for example, then a policy can be put in place to allow access to these websites only during the specified hours.

While we don’t recommend access to websites such as Facebook on company networks, due to the possibility of easily accessing infected websites, ads, or popups, there are some companies that allow this.

Some companies have smaller networks where it is harder to justify the cost of a high end router, but still want to be able to control their employee’s network use.

For companies like this, there are other options. For example, there are some DNS providers that specialize in blocking non-work access. You simply point your router to the service to block the websites you don’t want employees to have access to.

One other option for those on a tight budget is to manually block websites by turning on the content advisor within each computers Internet settings and allowing only those specific sites an employee needs to complete their work.

Monitor Compliance
The final step is to have some sort of monitoring system in place and let your employees know it is being checked. Letting your employees know their usage is being tracked and monitored is generally an effective deterrent.

There are many different monitoring systems that can be installed on a user’s workstation and that run silently in the background. These systems can monitor everything on a user’s computers from keystrokes to taking screen shots of a user’s computer.

If you would like to speak with us on steps to improve your businesses productivity and cut down on wasted time give us a call. No matter what the size of your business, there are steps that can be put in place to help combat this rampant problem.

Track The Right Issues To Measure Sales Efforts

May 16, 2012

If you manage a sales team, you know that sales volume is an important measure of a salesperson’s success. But you also probably realize that other metrics are useful, too.

To keep your sales force productive over the long term, pay attention to these additional areas:

• Sales volume vs. units sold. One salesperson closes a single deal worth $1 million. Another lands 10 sales worth $100,000 each. Which sales pro is more valuable to your organization? Don’t overlook salespeople who produce consistent numbers in favor of those who score an occasional high-ticket shot.

• Profitability. Generating revenue is good, but if that doesn’t translate into profits, your efforts are ultimately futile. Make sure your sales force is pursuing deals that contribute to the bottom line, not just looking for break-even sales.

• Productivity and efficiency. A salesperson who spends 12 hours a day, 7 days a week to make his or her numbers probably isn’t managing his or her time as effectively as possible. Beware of honoring Sally for all her extra hours if Jill brings in the same sales figures in less time.

• Customer service. Retaining current customers is vital to most companies. It requires time that might be spent chasing new business, though. Do you reward salespeople for keeping today’s customers satisfied, or penalize them for ignoring existing customers in favor of new ones?

Tips For Buying A New Laptop Computer

May 16, 2012

Purchasing a brand new laptop computer can be something of a challenge given the amount of options and choices which are available.

For many people the process of buying a new laptop computer can actually turn out to be quite overwhelming. Fortunately there are some simple tips which can be followed to make the purchasing process much simpler.

One tip is to try and narrow down some of the key choices and options.

Identify and focus on the requirements and features which are the most important and this will help you to narrow it down to the best laptop computer which you can buy for your budget and needs.

The first thing to determine is what you will use the laptop computer for, as this helps to clear up your needs in terms of battery life, performance, size, storage capacity and weight.

If you need to use the laptop outside of your home or office, then this makes the weight of the system and the size of the screen important.

A non-glare screen might come in handy if you will use it outdoors or in bright rooms.

If there are a large number of files you wish to store, then a bigger hard disk drive will also be needed.  Asking these questions can make the whole process much less intimidating.

Springtime Brings Seasonal Storms – Protect Your Network!

April 9, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

It’s a topic I touch on every year around this time – the criticality of power protection and backups for your network. The sad fact of the matter is, no matter how often I preach about it, too many of our clients still aren’t adequately protecting their systems.

Adequate power protection entails three things: Prevention, protection, and testing.

Prevention
During thunderstorms, many people leave their computers unprotected. Simply turning a computer off during a thunderstorm does nothing whatsoever to protect the computer.

Nearby lightning strikes can cause surges through the power lines or phone lines into your house or office, and these often damage your equipment.

The easiest way to prevent problems caused by lightning and power surges is to unplug your computer during a storm. Don’t forget to unplug your phone line or cable Internet from the computer too. These are the second most likely way for surges to get into your computer.

Protection
Having a good, quality surge protector is great for the day-to-day power surges that happen mostly unseen in the background. Don’t skimp on your power protection.

The $9 “surge strip” you can pick up at a hardware store simply gives you more outlets to use – it doesn’t provide protection against power problems.

A good surge protector should run you around $50 – a small investment when you consider the cost of the computer and the value of your data.

Servers and critical workstations should be protected by a battery backup system. We prefer APC because they offer an equipment insurance policy, but any good, well known brand will protect your network.

Testing
Power protection devices, whether a surge protector or battery backup, are designed to fail. They absorb the power fluctuations that could damage your server or workstation.

Your battery backup unit should be tested at least twice per year to ensure it’s functioning properly. The test can be as simple as plugging in a lamp, and disconnecting the unit from utility power. The lamp should stay lit. If it doesn’t, it’s time to replace the batteries in the UPS.

In general, surge protectors and battery backup units should be replaced every three years. This ensures your network, servers and computers are protected by the latest technology in surge supression.

 

Windows 8, A Diamond in the Rough?

April 9, 2012

Feature article by Tech Experts
So should you be planning to upgrade to Windows 7 or hold off for Windows 8?

If you’re still running Windows XP, Microsoft is saying to not bother waiting for Windows 8 and jump into Windows 7. That being said, from a business point of view should you wait for Windows 8 or go for Windows 7?

Windows 8 was initially released as a developer preview on September 13th of 2011 and since has been pushed very hard by Microsoft and the media alike to many IT professionals.

After Microsoft boasted over the drastic rethinking of Windows 8 and how it has revolutionized Windows as a whole, IT pros everywhere picked every aspect of Windows 8 apart.

Is Change A Good Thing?
Many feel it is not going to make a very good business operating system for end users. The reason for this? Change. Windows 8 brings a vast amount of change to the table, some good, some not so good…

After the release of the Developer preview and several months of time for Microsoft to further polish their new Operating System, they released the current version Windows 8 Consumer Preview build 8250 on February 29th 2012.

Microsoft again touted the newly improved OS citing it has made over 100,000 code changes since its previously released Developer version.

So, just what is Windows 8? Well Windows 8 is Microsoft’s attempt at making an operating system to bridge the hardware gaps between mobile platforms and the widely used PC.

Complete Overhaul
Windows 8 has been completely overhauled to give end users a similar user experience whether they are sitting at their desktop computer, using it on a tablet, or (as some experts believe) using a new Windows phone.

While Microsoft has not officially stated that this OS is going to be released on the Windows phone platform yet, it surely would not take them much to do so and would allow them to have their devices all synced.

Synced? That’s right! The new OS relies heavily on the cloud. The way this operating system has been developed it will allow users to login on any computer (provided they have an internet connection) and have the same application access they had on their computer at home.

With further integration of cloud services users will also have access to all of their documents, pictures, and videos via cloud based storage.

Many of Windows 8 features have a long way to go still before they are developed enough for everyday public use.

Metro Interface
One of the most notable features of Windows 8 is its new “Metro” style interface pictured above

This screen is your start menu now. Yes, Microsoft removed the start button that has been in Windows for more than 20 years… This new way of accessing your icons and applications allows you to click on (or touch if you have a touchscreen monitor or tablet) an icon and instantly be using it.

Load times for applications are very low, at least with the applications that have been released via their app store at this point.

Applications opened from this screen also do not need to be closed according to Microsoft (Again very similar to many mobile operating systems today).

The only problem with not actually closing the applications is for those people that never turn their computer off, everything you ever open will stay open and if you don’t force close the programs they will continue to run and use system resources which over time will make your computer run slow.

Even though Microsoft has removed the start menu they have kept the desktop..somewhat. The desktop is still able to be accessed via the Metro application menu but again is not meant to be used unless you need access to files and folders.

One other new feature Microsoft has added to Windows 8 is the ability to have “Picture Passwords”. A Picture Password allows you to select a picture you want to use as your password, and then draw three gestures on the picture to allow access to the computer or tablet.

This new feature is meant to increase security as it will make it more difficult for hackers to gain access to a user’s computer (At least via a keylogger).

One of the big reasons to steer clear of Windows 8, at least at this point, is numerous bugs within the OS and the apps it uses. Bugs range from minor issues such as lack of support for common email protocols such as IMAP and POP, to more major issues related to hardware not functioning inside Windows 8 due to conflicts.

At this point with Windows 8 still being in Beta it is perfectly normal to have the issues they are having with the operating system but, if the issues continue into the retail release of the software they will have another Windows Vista on their hands.

If Microsoft turns this operating system into a winner, it could mean big things for Microsoft.

One major point is if Windows 8 becomes popular, Windows will make a break into the tablet market which is predominately Android and iOS based. This would also give Windows an edge on other mobile operating systems as they would be able to operate across multiple platforms without any lapse in functionality.

So, is Windows 8 worth waiting for? At this point it makes more sense to go with Windows 7. If you are the kind of person that is into change…a lot of change…then hold off for Windows 8, but at this point Windows 8 is looking rough.

 

Why You Should Avoid Using A Debit Card When Shopping Online

April 9, 2012

If you shop online (and these days, who doesn’t?),  you’ll want to make sure you use a credit card instead of a debit card to protect yourself from online scams and rip offs.
The biggest advantage credit cards offer is a buffer for payment. By law, your maximum loss if your credit card number is stolen is $50, and most credit card companies and banks will cover the entire cost.
When you use a debit card, the funds come directly out of your bank account, which means you might have trouble disputing the charge if you get scammed or if you are not happy with the product or service you purchased.
Here are some other tips to make shopping online safer:

Research your merchant before buying. The Federal Trade Commission maintains a web site (www.consumer.gov) that provides many buyer’s guides, lists of tips, and links to helpful resources.

Make sure you are on a secure web site before you give your name, address or credit card details. Look for a padlock or a key symbol in the bottom corner of your screen.
Never send your credit card number in an e-mail because it can easily be stolen.
Frequently check your credit card statements for suspicious entries. If you spot anything strange, contact your credit card company immediately to question the charge.
Call the company before placing an order. See if a real person answers the phone and how difficult it is to get someone live. Ask for their return policy for damaged or inadequate goods, expected delivery dates, shipping and handling fees, and after-purchase support.
Think before you buy. If the online advertisement or junk e-mail offer sounds too good to be true, it probably is!
If you have any reason to be suspicious, you are better to err on the side of NOT buying.
Watch for hidden extras added on at checkout such as postage and packing costs, and handling fees.
VAT and customs charges for goods from overseas can add greatly to the final cost, so double check your order before you hit the final submit button.
Read the company’s privacy policy carefully. Make sure you uncheck any boxes giving the vendor permission to sell or share your information with other vendors, especially your email address.

Time To Wake Up? Here’s How To Get Off To An Early Start

April 6, 2012

For many of us, the “early to rise” part of Benjamin Franklin’s famous advice is the hardest. But if you want to be healthy, wealthy, and wise, you can’t lie under the covers all day.

To get an early start on a productive day, try these strategies:

• Give yourself a good reason to get up. Choose something important to do first thing in the morning—something you enjoy and feel passionate about. Think about this as you go to sleep, and you’ll be more eager to get up the next morning.

• Practice good sleep habits. Avoid caffeine or alcohol, both of which can disturb your sleep patterns. Getting enough sleep is key to waking up on time.

• Don’t just hit snooze. Set multiple alarm clocks, and place them across the room so you have to get up and get moving in order to shut them off.

• Have a buddy system. Schedule an early-morning activity with a friend (like a walk), or just a phone call to ensure you get up on time.

• Develop a consistent habit. Get up at the same time every day, regardless of what you’re doing. Your body will adjust to a fixed routine.

• Drink some water. A glass of cold water first thing in the morning will revive and refresh you.

• Keep track of your success. Motivate yourself with a diary of what time you get up every morning. After a while, your desire to sleep will be outweighed by the knowledge that you’ll have to log a later waking time.

Making Use Of Google To Help Your Day Run Smoother

April 6, 2012

The Internet is a very big place. Anyone who wishes to use the Internet in an effective manner needs to be familiar with search engines.

Google has become the primary choice for millions of users, although there are some others.

One of the main reasons for Google’s popularity and general reputation as being the best of the search engines is that they keep on coming up with new methods for surfing the Internet.

For instance, if you wish to look up a news story or current event, then http://news.google.com allows you to instantly have access to news stories that are literally just a couple of minutes old.

Anyone who is looking for a picture of just about anything is almost sure to find it at http://images.google.com, which is quite possibly the largest image search engine in the whole world.

If you’re looking for map or address information, check out http://maps.google.com – hundreds of thousands of addresses now have street view, showing you the actual view from a car in front of the building you’re looking for.

Google also has specific search engines for books, videos and even stock market developments.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.