• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

SPAM Prevention FAQ: Tips To Reduce Junkmail

January 20, 2011

How can you reduce the amount of junk email you receive? Here are our best tips!

Never Allow Your Email To Be Posted Or Listed
“Spiders” and web “crawlers” routinely “harvest” email addresses from web pages in an effort to build a collection of email addresses to send junk email to.

Never Unsubscribe Or Ask To Be Removed
The only exception to this rule is if you originally signed up for that particular list or asked to receive updates.

If you never asked to be part of a participating mailing list, why would you ask to be removed? Doesn’t make sense does it.

This is a common ploy spammers use to validate email addresses. If you respond, that proves to them that your email address is alive and active, and that you are receiving their emails.

Responding only encourages them to sell your email address to other spammers, and will ultimately increase the amount of junk email that you will receive.

Never Open Or Read Junk Email
Believe it or not, even if you never respond, but merely open a junk email, there could be special HTML code contained in that email message that will report back that you opened or read the message.

This provides validation to the spammer that your email address is alive and active, and you can bet you will start receiving more spam!

Be sure to turn off your email program’s Preview Pane feature, as this is essentially the same thing as “reading” a message.

Avoid Contests, Special Offers, And Chances To Win
These are gimmicks to get you to reveal your email address so they can send you special offers. Many free ecards (electronic greeting cards) are also ways companies collect email addresses.

Never Post To An Email List Using Your Private Email Address
Many spammers watch these posts in order to harvest new email addresses.So be very cautious when posting to these websites.

If you are a contact for a registered domain, do not list you private email address.

Instead of using your personal email address use a generic common mailbox for this purpose, or ask for domain registration privacy.

Create a public email address such as DNS@yourdomain.com or help@yourdomain.com.

Guard Your Computer Against Trojan Spyware And Software
Never open any attachments you don’t explicitly trust.

Some “fun” emails are often a ruse to steal email addresses or track your behavior on the Internet.

The use of both anti-virus, personal firewall, and or antispyware software is strongly recommended.

Use A Free Account As Your Public Email Address
Reserve your private email address for friends and select associates.

Never sign up for special offers using your private email address. Use your generic common email address for those.

Trick The Spammers
If you post an email address online, disguise its set-up, spelling out ‘dot com’ in place of .com.

Junk Mail Out Of Hand
If your junk mail has reached a level that it is just out of hand and you cannot handle it anymore, consider changing your email address.

If you don’t want to change your email address consider us to take advantage of our advanced SPAM filtering services.

We can make all necessary changes on your computer and with your email service to help prevent those spam messages.

New Technologies Make Proactive Service A Must

January 20, 2011

With today’s workplace relying more and more on information and computer systems, it just makes sense to leverage your IT investments.

Technology in the industry now allows IT professionals to take a proactive approach to network management, providing the entire infrastructure with a complete, secure, reliable, and fully automated solution to protect your IT infrastructure.

Deploying what are known as “agents,” you can add a fully automated virtual worker to your staff, which is working 24 hours, 7 days a week, 365 days a year. This agent will complete a long list of tasks that even a fully staffed IT department couldn’t handle.

You can now start to enjoy your away time when your network is being monitored by these solutions. So what exactly do they do?

Monitoring
When you use system monitoring, you can take the proactive approach to your computers and servers with a set of rules that your administrator defines.

They provide instant notifications of problems or changes such as low disk space on your hard drives, memory leaks, power problems, virus activity, and missing updates. Just about every critical component of a PC or server can be monitored.

Software Deployment
The software engines give us the ability to deploy software out to multiple systems simultaneously, which saves massive amounts of time and causes less downtime for the staff.

Given a set of rules and pre-requisites that are met prior to the install, you can ensure a smooth, fast, and worry free installation across your network.

Remote Control
Give your IT personnel a secure and quick way to remotely access your systems from any place at any time, giving your company its own help desk in a sense.

This increases productivity for staff, reducing the waiting time for a tech to show up at your location.

Patch Management
Keeping your computer systems up to date with operating system updates and security patches is critical to the health and safety of your network.

Given a set of predefined policies, all of your servers, workstations, and remote computers will automatically be receiving the latest security patches and software updates on a schedule that works for you.

Keeping the data traffic on the network during normal operation hours is crucial to the efficiency and productivity of the workplace and this will do just that.

Reporting
The reporting features will provide your administrators’ with quick and easy access to all the details of a network. Tactical and strategic planning become effortless when the agents are accumulating, tracking, and analyzing the way your network operates over time.

Audit & Inventory
Agents let the IT staff perform accurate and detailed reports on every server, computer, mobile device, and piece of equipment on your network.

This gives you a better look at what your network actually consists of and provides you and/or your IT personnel a complete detailed inventory of product specifications, versions.

An accurate network and infrastucture inventory lets you make intelligent decisions about upgrades, replacements, and maintenance.

Scripting
Possibilities are practically endless for what can be done with the scripting options. If you have a routine task that has to be done each and every day, week, or month, let your agents do the work.

They can automatically trigger those tasks to be done for you, on your time, your schedule, with no interaction required.

These are just a handful of the features that are possible, giving everyone a peace of mind when it comes to your IT.

Taking advantage of these technologies will give your IT personnel a complete set of tools to efficiently, securely, and cost effectively manage your systems.

Strong Passwords Keep Your Personal Information Secure

January 20, 2011

A recent ZoneAlarm survey revealed that 79 percent of consumers use risky password construction practices, such as including personal information and words.

The survey also revealed that 26 percent of respondents reuse the same password for important accounts such as e-mail, banking or shopping and social networking sites.

In addition, nearly 8 percent admit to copying an entire password found online in a listing of “good” passwords.

Given these numbers, it’s no wonder that 29 percent of respondents had their own e-mail or social network account hacked, and that over half (52 percent) know someone who has had a similar problem.

The first step a hacker will take when attempting to break into a computer or secure account is try to guess the victim’s password.

Automated programs are available to repeatedly guess passwords from a database of common words and other information.

Once a hacker gains access to one account, almost 30 percent of the time that information can be used to access other sites that contain financial data such as bank account numbers and credit card information. To ensure you stay safe online, here are a few tips for creating a strong password.

Use Unique Passwords For Each Account
Choose different and unique passwords for each account.

Passwords Should Be Eight To Ten Characters Long
Choose a password that is at least eight to 10 characters long. This should be long enough to prevent brute force attacks, which consist of trying every possible combination of a password until the right one is found.

Avoid Using Personal Information
Make sure your password is difficult for someone to guess. Do not use names of any kind, including your login name, family member’s name or a pet’s name. Also avoid using personal information such as a phone number, birthday or place of birth.

Avoid Words In The Dictionary
Avoid words that can be found in the dictionary. With the availability of online dictionaries, it is easy for someone to write a program to test all of the words until they find the right one.

Avoid Repeating Characters Or Sequences
Stay away from repeated characters or easy to guess sequences. For example: 77777, 12345, or abcde.

Use Numbers, Letters And Special Characters
Choose a password that is a mixture of numbers, letters and special characters. The more complex and random it is, the harder it will be to crack.

Use Word Fragments
Use fragments of words that will not be found in a dictionary. Break the word in half and put a special character in the middle.

Frequently Change Your Passwords
Change your passwords often. Even if someone cracks the system password file, the password they obtain is not likely to last long.

Cyber crime is on the rise. Taking the time to actively choose secure passwords will protect your identity, banking information and personal information. And remember, writing your password on a sticky note on your monitor isn’t secure!

The Three Scariest Threats To Small Business Networks

October 15, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.
While spam, pop-ups, and hackers are a real threat to any small business network, there are three security measures that you should be focusing on first before you do anything else.

Worry About E-mail Attachments, Not Spam
Sure, spam is annoying and wastes your time, but the real danger with spam is in the attachments.

Viruses and worms spread primarily through cleverly disguised attachments to messages that trick you or your employees into opening them.

Another threat is phishing e-mails that trick you by appearing to be legitimate e-mails from your bank, eBay, or other financial accounts.

Here are three things you must have in place to avoid this nightmare. First, keep your anti-virus up to date and enabled. This sounds like a no-brainer, but it’s not uncommon for an employee to disable their antivirus software “because it bothers them.”

Second, educate your employees on what is and isn’t allowed on company computers, e-mail, Internet access, etc. One thing that should be on the list is that they should never open suspicious attachments or respond to phishing e-mails. We highly recommend creating an acceptable use policy (AUP) to teach your staff what NOT to do.

Third, put monitoring software in place to maintain the health of employees’ desktops and automatically “police” employees from accidentally visiting a phishing website, downloading a virus, or visiting questionable web sites.

Fear Downloads Before Pop-Ups
Did you know that most computers and networks get infected with viruses because the user actually invited the threat in by downloading a file (screen saver, music file, PDF document, pictures, etc.)?

Again, this comes down to training your staff on what they can and cannot do with your company’s network. Again, the best way to avoid trouble is to remove temptation by installing monitoring software that will prevent employees from downloading or opening dangerous items.

We also recommend installing and maintaining a good firewall, which will block Internet traffic to and from dangerous sites.

Lose Sleep Over Backups, Not Hackers
You are more likely to lose data from hardware failure, accidental deletion, human error, flood, fire, natural disaster or software corruption than a hacker.

Sure, you should do everything to keep hackers out of your network, but not backing up your data to a remote location is incredibly dangerous. At a minimum, you should have an onsite and offsite copy of your data, and you should be testing your data backups regularly to make sure your data can be restored in the event of an emergency.

So, here’s the scary Halloween question for you: If you came into your office tomorrow morning, and your computers and server were destroyed or missing, could you recover your data, and how long would it take?

Common Problems With Printers And How To Solve Them

October 15, 2010

If you have to print on any kind of regular basis, you know how frustrating printers can be. Fortunately, most printer problems are a lot simpler than they appear and are relatively easy to resolve.

Here are a few tips:

First, think about what has changed on your computer and printer since the last time you were able to use the printer. If nothing has changed, the problem should be easy to solve.

Check to see if the printer is on, you never know if someone during the day might have unplugged the printer or just turned it off.

Next, check the display on the printer if it has one. If it does not have one, then check for a status light. Usually if there is an issue, it will be blinking.

If it is blinking or there is an error code, then look in the owner’s manual which should give you a list of all the errors that occur with the printer. Most manuals will also give you a way to diagnose the problem.

A lot of printer issues are related to toner or paper and can usually be resolved very easily.

Check for obvious paper jams. There are usually a few covers that can be removed to help try to get the jam undone.

Most printer jams can be avoided if you flip through the paper before you put it in the printer. This eliminates static and clears any paper dust that might be on the paper.

If there is a toner issue, then it might be because either the cartridge is bad, low, or completely empty.

Almost all printers will give the computer user some sort of error message by either the display on the printer, status light, or the actual computer itself.

If the printer is a laser printer, then there is a toner drum that should be replaced about once a year depending on how much it is being used.

If your printout is fuzzy or faded, then this is a sure sign the drum needs replaced.

If there are no signs of issues with the printer then check the USB cable connected to the printer. Most cable problems will say the printer is offline due to connectivity issues.

Printers can be connected to a computer via USB or parallel port. Check both ends to make sure the cable is completely connected. If you have another cable, it never hurts just to swap them out to test the cable.

If you have an ink jet printer and you get smudged or blurry images, you might want to look up the utility on the printer that cleans and or aligns the print heads.

Most ink jet printers either have software that can start this process or have a setting on the printer itself that can kick start it.

If your printer produces strange characters, it’s likely that you have a printer driver problem. When a printer acts up and there are no hardware problem, the solution is often a driver issue.

A driver is a piece of software that helps the computer communicate with the printer. Drivers are updated constantly – be sure to check yours.

These are just a few problems that can happen. These should help a novice user start to troubleshoot typical problems with a printer.

Did You Know?

October 15, 2010

If you don’t know how to open a certain file type, go to www.openwith.org. There you can search by the extension (.doc, .mp4, .zip, etc.) or by the type of file (video, document, etc.), and the site will tell you which programs will open that file.

To delete multiple files, click the first file…press and hold the Shift key…then click on the last file. All the files from the first to the last clicked will be selected. Then drag to the recyce bin. To select files that are not next to each other, keep the Control keep pressed as you click on the files, and every file you click on will be selected.

To save a Web page as a PDF, enter the page you want to save at www.html-pdf-converter.com, and you’ll have a free PDF copy in moments.

If you need a quick and simple timer, use the “egg timer” website. Simply enter the time you want to count down at the end of the address. For five minutes, you’d enter http://e.ggtimer.com/5minutes. For three days and 12 hours, enter: http://e.ggtimer.com/3days12hours

 

Desktop or Laptop? What To Consider When Choosing

October 15, 2010

Are you out shopping for a new computer, but are unsure of what to buy as far as a laptop or a desktop? If so, here are some simple factors to keep in mind to make that decision.

Price
Because of the higher cost of computer components and assembling them, a laptop computer will be more expensive than a desktop model with the same specifications.

If you are only going to be using the computer for basic tasks such as word processing and surfing the Internet, a laptop would be perfect for you.

If you are more into playing video games or running video editing software, a desktop computer would be suited more towards your needs.

It will have the memory to run those programs and the hard drive space to store everything.

Space
It may seem like a contradiction, but while desktop computers are getting smaller, laptops are going in the other direction because of the greater number of functions they are being asked to perform.

A laptop is still more easily stored out of the way than a desktop. The laptop is the obvious choice if space is an issue.

The real question to ask is whether the space which the computer will be occupied can be permanently sacrificed for housing information.

Portability
If you are looking for portability then there is only one obvious winner here. However, it should be asked whether a computer is likely to get the most use out of it being placed in one spot or when it is moved around for use in different rooms.

If you are going to use your PC at home, at work, and on business trips, then a laptop would definitely be the better value.

Ergonomics
The most important thing is being comfortable while using your computer; especially if you are going to be using it for long periods at a time.

So a big question that you must ask yourself is “Can the existing area where my laptop will be used be made comfortable if I’m going to be using it for long periods of time?”

This can be a vital consideration in the choice between a laptop and desktop model. Their very lightness and portability work against people adopting a suitable posture when using a laptop.

The name suggests they are more suited to being used sitting anywhere other than at a desk, which is not true.

A bad case of hand, wrist, back, neck, or eye strain is too high a price to pay for portability and style.

Upgrade/Repair Cost
Laptops are less robust and more difficult to upgrade than their desktop equivalents. In general, your upgrade options for a laptop are limited to increasing the memory or replacing the hard drive for more storage.

Desktop computers, on the other hand, offer almost unlimited upgrade options.

An important thing to remember is damage to a laptop keyboard or screen will be much more serious than to a desktop because the vital working and moving parts have far less protection.

Wireless Fidelity Expands Its Broadcast

October 15, 2010

Every day, technology advancements are changing the way we live our lives.

From the way we communicate with family, friends and co-workers to the way we shop, provide healthcare, and even land that dream job.

Now, thanks to advancements in the standard known as “WiFi” or wireless fidelity, we can now add the way we watch television to that list.

A recent study shows that by the end of 2011, more than 20 million television sets equipped with WiFi connectivity will have been shipped worldwide to mainly North America, Western Europe, and a handful of selected Asian countries.

So you might ask yourself, “What is WiFi equipped television?” To better understand this new rising technology, we need to take a look at what WiFi is.

WiFi, which stands for wireless fidelity, is a communications standard that allows WiFi enabled devices such as laptop computers, MP3 players, smart phones, and soon televisions to connect to an access point (a wireless router or hotspot) which then connects your device to the Internet.

From there, the possibilities are almost endless as to what you can access.

TV industry producers now understand the power of this technology. They are also realizing how many people would love to be able to stream their favorite media websites such as YouTube, Metcalfe, CNN, Facebook, and MySpace directly to their television sets.

One of the big trends this year has been the rise of Netflix, (which seems to be why we’ve seen the fall of Blockbuster and any other video/media rental business).

Why would you ever leave your home if you could simply connect to a site like Netflix, or any of the other super popular media sites, and browse their thousands of movie titles right from the comfort of your own home, without having to leave the couch? You probably wouldn’t.

This is why giants like Sony, Samsung, and Toshiba are working closely with technology gurus to make what could be the next big thing in television. As of right now, the people who already have this technology in their homes are pretty limited to what content they can stream to their sets.

However, as this begins to boom in the marketplace, the evolution of full web browsing on your TV is something I’m sure we can look forward to seeing in the future.

What To Do When You Drop Your Cell Phone In Water

October 15, 2010

If you’ve ever been unlucky enough to drop your cell phone into water, take some solace in knowing you’re not alone.

Dropping a cell phone into the swimming pool, bathtub or toilet is such a common occurrence that some cell phone manufacturers include a sensor that will detect if it’s been submerged in water, so users can’t return them saying they are defective.

If it happens to you, it’s important to act quickly. First, don’t turn the phone on until it has been completely dried out or you’ll probably end up shorting out some circuits. Cell phone repair services recommend taking out the battery right away and wiping it off.

Shake out any excess moisture from the phone. Unfasten the screws and open up the device. Then use an electrical-contact cleaning spray or rubbing alcohol to remove corrosive moisture. When you think it’s completely dry, wait another day before turning it on.

There are a number of recommended drying techniques, but the key to all of them is to dry the phone as soon as possible.

One proven phone-drying method is to use a hair dryer set on cool. You don’t want to use high heat – that could cause even more damage to the phone.

Another method is to seal the phone in a jar with uncooked rice. The rice absorbs the moisture, but it does take a few days.

Most important: Make sure you always back up your smart phone! Most cell phone providers offer this service, and many phones come with software you can load on your computer to perform a backup using a USB cable.

 

Fall Is The Perfect Time For An IT And Network Checkup

September 30, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

To make the most of your IT investment,  you don’t need to be a technology whiz. However, you should have a plan in place for making the most of your company’s data. As fall approaches, now is an excellent time to examine your company’s technology to determine what’s working well and what could be improved.

Is It Time To Update?
Technology changes rapidly. While your systems may appear to be working well, you may be missing out on new ways to protect your business information, help your business run more efficiently, and better serve your customers.

For example, to run some of today’s most powerful programs, you need a fast and large hard drive with significant memory capacity.

You might consider adding newer technology – such as wireless capabilities – to older equipment; but the cost of upgrading a computer is often more than the cost of a new model.

Check Your Power Protection
Loss of electrical power and power surges are the most common causes of data loss and weaken computer components. If your business depends on computers, protecting the power source is critical.

This is especially important if your area is prone to power fluctuations or electrical storms.

An Uninterrupted Power Supply (UPS) unit offers both superior surge protection and, depending on the model, anywhere from 15 to 45 minutes of backup power-enough time to save and copy critical files.

The idea of a UPS isn’t to continue your business dealings while the lights are out. Rather, it is to ensure that your data is available when the lights come back on.

Have You Patched Windows?
Have you installed the latest version of Windows on your computer, and do you keep it updated? Do you do this automatically?

It is incredibly important that you keep Windows and your software applications current. Updates improve performance, fix bugs, and many add new features. You should also regularly update and run anti-virus software.

How’s Your Backup?
Consider storage needs in terms of both capacity and physical location. Depending on the amount of data, you can back up to USB flash drives, CDs, DVDs, tapes, or an external drive.

You might also want to look into off-site backup. Our Experts Total Backup System is an excellent backup, disaster recovery, and offsite storage service.

Integrate Your Data
Over the years, businesses tend to produce multiple silos of data. Your inventory, sales data, and marketing information need to be linked together to better serve your customers and increase your company’s productivity and profitability.

Without this integration, you may not know who your best customers are or you could end up agreeing to provide a top customer with an item you don’t have in your inventory.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.