• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tired Of Being Tied Down? It’s Time To Lose The Wires!

August 10, 2009

Security Tips For Your New Wireless Network

With the decline in the cost of wireless equipment and “point and click” configuration ability most newer equipment offers, more and more people are setting up wireless networks in their homes and businesses.

One key configuration that is often missed, though, is security of the wireless network.

Is the wireless connection you’re using secure, is your data in jeopardy, and is your identity safe?

You might be asking yourself “How do I secure my network, and what does it mean so say a wireless network is unsecure?”

If a network is classified as unsecure, it means that the network can be accessed without the need for a key, or password. You’ll find unsecure networks in a lot of public places, such as coffee shops and airports.

The problem is that once a  user is connected to an unsecure network, it is possible they could access network resources such as files, folders, printers, etc. that are shared on your computer – many times, without you even knowing.

As you know, this could be a world of trouble if your confidential data is obtained by an unknown user.

A number of things can be done to ensure your wireless network is safe, network resources are protected, and your data is securely stored on your system.

Firewall
Software or hardware devices can be implemented, and are one of the first lines of defense, to prevent unauthorized access of your wireless network. Most wireless routers include basic firewall protection – it just has to be turned on when the unit is configured.

SSID
The SSID is the name of your network. Most routers come with a default SSID, which, if left that way, is a sign of a poorly configured network. This makes you an easy targets for hackers.

Password Changes
By default, wireless routers have a standard username and password that can be easily looked up on the web.

You should definitely set up your own username and password to access your wireless device’s setup screens, so hackers or unwanted Internet users can’t go into the settings on your router and make changes to your security settings.

Be sure to follow standard password security when coming up with the password for your wireless router – you don’t want hackers to be able to easily guess your password, and access your setup screens.

Signal Strength
Most routers allow you to set the signal strength of the network broadcast. Turning the signal down on your router lowers the  chances of outsiders being in range of your wireless network.

Enable Encryption
This is one of the most important steps to securing your wireless network- require a key or network password in order to connect to the wireless network.

There are several types of encryption, the most common being WEP, WAP, and WAP2. Each provides a different level and method of network security. Any form of encryption is better than having an open wireless network.

Securing your wireless network plays a key role in the protection of your data, network resources, and overall privacy when you’re using a home or work network. It’s a quick and easy process, requiring just a few changes to the default setup. The peace of mind and convenience of wireless networking are worth the extra few steps.

Tips To Improve Your Wireless Signal Strength

August 10, 2009

If Windows notifies you about a weak signal, it probably means your connection isn’t as fast or as reliable as it could be. If you’re looking to improve the signal for your wireless network, try some of these tips.

Position your wireless router in a central location
When possible, place your wireless router in a central location in your office. If your router is against an outside wall, the signal will be weak on the other side of your office.

Move the router away from walls and metal objects
Metal, walls, and floors will interfere with your router’s wireless signals. The closer your router is to these obstructions, the more severe the interference, and the weaker your connection will be.

Replace your router’s antenna
The antennas that came with your router are omni-directional, meaning they broadcast in all directions. If the router is near an outside wall, half of the wireless signals will be sent outside the building, and much of your router’s power will be wasted. Upgrade to a hi-gain antenna that focuses the wireless signals only one direction. You can aim the signal in the direction you need it most.

Add a wireless repeater
Wireless repeaters extend your wireless network range without requiring you to add any wiring. Just place the wireless repeater halfway between your wireless access point and your computer, and you’ll get an instant boost to your wireless signal strength. Check out the wireless repeaters from ViewSonic, D-Link, Linksys, and Buffalo Technology.

How To Stop The Number One Cause Of Computer Slow Downs And Crashes!

August 10, 2009

Wouldn’t it be nice if your computer still ran like it did back when you first bought it? Before you go and buy a new computer try this key maintenance step you can use to put life back into the computer you already have.

Imagine that you start up your PC just to find yourself staring at a blue screen with white writing, termed “the blue screen of death” by those of us who work a lot with Microsoft software. So, you power it down – and when it starts back up, the computer is even slower. Within a few minutes it locks up again.

This happened to a friend of mine. When she asked me what she could do, I asked her if she had ever defragmented her computer. She got that “deer in the headlights” look, so I knew she hadn’t. Defragmenting her PC, after three years of never doing so, took about 14 hours to complete.

One of the main reasons that computers slow down is poor maintenance practices like this. Unfortunately, when you buy a new computer you don’t usually get any instruction on how to maintain it. Poor or no maintenance allows your hard drive to become more and more fragmented which will slow it down over time.

To best explain hard drive fragmentation think of your hard drive as a file cabinet. In this cabinet there are folders with documents (files) in them.

When you need to work on something you open the folder containing the necessary file, pull out what you need and put the folder back. The files go on your desk so you can work on them.

Over time certain files don’t get put back, or they get put back in different places. When this happens on the hard drive it leads to fragmentation. Think of defragmenting as going through the files on your desk, and in the cabinet, and putting them back in order in the correct folders.

Just as staying this disorganized would lead to a significant loss in your own productivity, the same thing happens to your computer. Eventually it causes a crash because of how scattered all of the information gets.

Disk fragmentation can even shorten the lifespan of your computer because your hard drive works so hard that it wears out faster.

So the one step solution for this part of computer maintenance, run the defragmenting tool that comes with Windows at least once every couple of weeks.

Do this by clicking Start, click All Programs, click Accessories, click System Tools, then click Disk Defragmenter. Choose the disk you want to defragment and click the defragment button. You can also schedule this maintenance inside the Disk Defragmenter application, so you don’t have to remember to run it.

Take care of your hard disk maintenance and you will continue to enjoy the speed you experienced when you first made that investment!

Optimize Your Online Time With Keyboard Shortcuts

August 10, 2009

Save precious time and effort by optimizing your computer usage skills. Here are a few keyboard shortcuts that will save you time online:

Pressing and holding down your control key, and then the “F” key, will bring up the `find` function. This is really useful when you’re searching for some text on a web page, or trying to find a particular e-mail. This shortcut also works in Word documents.

Control plus “N” will open up a new window. Excellent when reading e-mails and you need to visit some other link without exiting your e-mail program. Or you need to open two e-mails in the same account at the same time, or compose a reply with the e-mail open in front of you.

Pressing shift while you click on a link will open that link in a new window. This is good when you need to visit another site but don’t want to leave the current site.

Pressing your ALT key plus the left arrow key lets you to move to the last page you visited on the web. ALT plus your right arrow key lets you to move forward through websites you’ve visited.

Slow Down And Save Your Software Media

August 10, 2009

My how times have changed. Nothing seems to change as fast as they do in the computing world. In particular the way they package and distribute software.

When I first started in this business many years ago, computers had no hard drives and came with two 5-1/4” floppy drives. One drive was what you used to load the operating system into memory and load the program. The other drive was for storing your data.

Then came hard drives, with operating systems permanently loaded on the drive. If you wanted to load additional programs, you would go to the store and buy the program. It typically came with a large number of 3-1/2” floppy disks. You could
spend an hour or more loading a new application onto your system.

Then as things evolved, programs started shipping on CDROMS. This media was much more durable than floppy disks. With the dawn of the Internet and the variety of places to purchase software, most companies now allow you to buy and download the software immediately.

This is no doubt due to the availability (and popularity) of high speed Internet access. You can purchase a copy of Microsoft’s Office Basic 2007 and download and install the program all in less than an hour.

We’re starting to see a problem though, with the easy availability of software applications – users who don’t create any backup  disks or restore disks during the initial setup of their new computer, or when they download a new program. I am sure the anxiousness of having a new computer means they want to enjoy their new computer as soon as possible.

Please, take the time to make these disks! I’ve found that hours of time and numerous service dollars can be saved if the disks are readily available for the technician to use.

I had a business client recently who needed to have Microsoft Office reinstalled on a station. I said “Sure where are your disks?” He said that a co-worker had borrowed them and he needed to get them back.

A few days later he called and said he had the disks. I drove to the client’s office, only to discover he had the disk for re-installing his operating system, not Office Basic.

I was able to go online and download his software, because he did have his install code. Unfortunately, the download takes quite awhile.

This just illustrates the need for keeping copies of all your software that is installed or may need to be re-installed. If you’d like assistance with this cataloging your software library, please don’t hesitate to give us a call.

Should Your Small Business Have A Blog?

July 20, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

By now, everyone is familiar with socal networking sites such as Twitter, Facebook, and YouTube. Businesses and business owners are flocking to these sites to promote their companies and their brands. And with socal networking all the rage, blogging has become the forgotten stepchild of web marketing for small business. But this doesn’t make sense.

Blogging can be one of the most effective marketing tools for the small business owner because it’s easy to start, it’s easy to maintain, and it’s easy to leverage in enhancing your marketing mix. Here are some reasons why you should consider a blog for your company.

Improve Search Engine Rankings
Google, Yahoo and Bing LOVE blogs. They’re indexed almost overnight, and usually rank high in the search engine results. This helps you drive more qualified traffic to your website.

Engage with Prospective Customers
Blogging presents a unique opportunity to engage in dialog with your prospective customers on a continual basis. Anytime a new prospect visits your blog, you immediately leverage the vast arsenal of posts, comments and writing to help sell your products or services.

Dig Deeper
The pace of business is fast. Blogging is an opportunity to dig into a particular subject a little deeper without slowing down. You can write an extended blog post, or you can break up your thoughts into a dozen posts related to a particular topic.

Improve Your Writing Skills
One of the biggest benefits to blogging is the opportunity to improve your writing skills. Ideally, you’re going to post several times a week – frequent writing and editing means your writing skills will improve – which helps the rest of your marketing efforts, too.

Be Unique
Let’s face it – most business marketing materials like company brochures are incredibly boring. Blogging lets you put a little personality into your marketing. Customers and prospects get to see the real you, and your uniqueness could be the difference between you winning the business, and your competitor winning.

Listen and Learn
Read all the blog comments and email you receive, and read the comments on other blogs about your writings. Learn what your customers and prospects are thinking.

Test Ideas
Innovation is the engine that drives business growth. A blog is an excellent platform to test thoughts and ideas in a risk-free environment.

Become An Expert
Prove your expertise to new prospective customers with your knowledge and insights.

Supplement Your Other Marketing
Support your other marketing investments by leveraging your blog for promotion, marketing and feedback.

Get Subscribers
Many readers who like what you write will subscribe to your blog, providing you with a direct, ongoing communications channel with your target audience.

Uncover New Opportunities
The more you blog, the more opportunities will present themselves to you. You’ll gain a reputation as an expert in your field, which means clients and prospects are already sold on your ability to deliver results.

Tech Experts maintains two blog sites for our clients. The first, www.ExpertsGuys.com, is a blog written and maintained by our technical staff. It offers interesting ideas and timely technical advice based on our daily service work.

My blog at www.ExpertTechTips.com offers some of my insights on small business computing with an eye toward growing your company.

We offer a blog hosting package, that will work alongside your existing website. For example, if your website was at www.MyTechExperts.com, we could set up a blog site for you at blog.MyTechExperts.com (or at any domain name you’d like).

If you’re interested in learning more about blogging, or would like to set up a blog site for your business, please give us a call at (734) 457-5000.

What Should You Blog About?

July 20, 2009

What is going on in your industry right now? Look for interviews given by industry leaders, tips, opinion pieces, research, news, and posts from other bloggers. Find out who are the main bloggers in your field, and then determine what new or alternative context you can provide.

These all can give you ideas for your posts. While you might not be unconvering big news, you should concentrate on generating thought leadership by stating your own view of that’s going on in your industry.

Be Alert: Actively monitor your industry with Google Alerts, Technorati, and Blogpulse.

Get a Nose for News: Keep on top of big issues with news aggregators like Google News, Techmeme, and Topix.

Then, go beyond the news and try to describe your own experiences, interests, expertise, case studies, etc. Personal stories can often resonate with your readers.

Cautionary Tale About A PC And A Child’s Imagination

July 20, 2009

Let’s face it – computers can be downright aggravating at times. There is an old saying that they’re “dumb boxes” that only do what they’re told and not what you want them to  do. But some of the aggravations can be prevented.

I had a client a few years ago bring his system in because it was occasionally making strange noises. I started the computer up numerous times and it always sounded fine.

As a troubleshooting measure, I opened up the case to check inside for any obvious signs of trouble. What I found was obviously the problem. The inside of the case was  absolutely filled with CDROM disks. It was stuffed full!

I removed the 20 or so music and video game disks and returned them to the client when he picked his station up. Was he surprised!

“There are all the CDs I have been missing.”

My curiosity got the best of me and I asked him how they got in there. He had no idea at the time. When he asked his 2 year old son that was with him, “Have you been putting  disks in the computer?” the boy demonstrated how he put the disk in the little slot between the CDROM player and the case cover. This sent the CD right into the case. His father explained his old computer had a slot you would slide the disks in and the boy thought this computer worked the same way.

Although this may seem like the strangest thing that could happen with kids and computers, my favorite happened shortly after this episode. It has been said the kid’s say the  darndest things, but they can also do the strangest things.

This client brought in her station because the CD player wouldn’t open. I created the service ticket and placed it on the service bench. When the time came to repair the problem, I started the computer up and pushed the eject button on the player. The door tried to open but just wouldn’t go all the way. I tried to manually open the door and it felt like something was stuck in the player and perhaps preventing the door from properly operating.

This can commonly be caused by a disk becoming dislodged and jamming in the tray. I removed the player and shook it upside down to try and reseat the disk. Nothing that I tried  seemed to help.

I then pressed the manual release and pried the door open and the tray came out – along with a whole bunch of animal crackers. It seems her little one had a new game he was playing.

He would open the CD, lay an animal cracker in the tray and press the close button and send the animal for a ride. After having done this to the point of filling the player, his
game was over, the tray was stuck. Needless to say she was not thrilled with having to buy another player, and I’m afraid her son may have gotten into some hot water.

If you’re having any computer problems bring it to Tech Experts where our certified techs can get you back up and running quickly.

Do You Keep Critical Passwords On A Sticky Note Next To Your PC?

July 20, 2009

We constantly struggle to get our clients to stop writing down their passwords on sticky notes by the computers. Obviously this is a security risk. Another bad habit is choosing  really easy-toremember passwords such as “password.”

But admittedly, it CAN be hard remembering all of those passwords that are always changing. To solve this little dilemma, we’re suggesting to our clients to stop using passwords and use “pass-phrases.”

What is a “pass-phrase” you ask? They are letters and numbers put together in an easy-toremember phrase such as “!YEAHGoBlue!”

These are MUCH easier to remember than a random cluster of letters and numbers, which means you won’t have to write them down on a post-it note anymore! Plus, they’re much more secure than using a birthday or child’s name.

Pass-phrases can be built from anything, such as favorite quotes, lines from movies, sports team names, a favorite athlete’s name and jersey number, kids’ names and birthdates, pets, and so on.

Here’s some other examples that would be easy for you to remember, but hard for a hacker or criminal to guess:

ILike!ceTea

T&lkingOnTh3Phone

d3tro1tHockey

goneWithth3w!nd

Git-r-don3!!

Detroit-R3D-Wings

All you need to do is be a little creative to get numbers, letters and punctuation into the phrase. All of the normal suggestions remain the same – don’t make a password  exclusively a birthday or child’s name, and always include special letters and punctuation.

Since introducing this to our clients, we’ve found (believe it or not) they actually have fun doing this, and at the same time, are making their networks more secure!

Bing, Bing, Bing! Microsoft’s Search Engine A Hit!

July 20, 2009

If you haven’t heard, Microsoft has released their own search engine in an effort to compete with Google in the search engine market. Originally the search engine that was going to be called “Kumo” has been released and the name is “Bing.”

Microsoft is off to a pretty good start according to the marketing research company that provides marketing data and services to many of the Internet’s largest businesses,comScore Inc. Microsoft has improved their search market share by 1.7 points to 15.5% in the week following the release of Bing.

So what is causing all these improvements, and catching the eyes of the public? What does Bing have to offer that Google hasn’t already thought of? Here are a few of the features Bing has integrated into the search engine. Interface features, multimedia features, instant answers, product search, webmaster services, mobile services, toolbars, gadgets, advertising, and many more.

So let’s talk about some of these features and what they mean to us – the end user.

The interface feature is one of my favorites, probably because it’s so appealing to the eye, and got my attention right from the  very first visit to Bing. The background image changes each and every day, taking you to the most remarkable places in the world, with vivid colors, and great angles.

You can even view the information about the subject of the image by hovering over the image.

Video previewing has never been so cool. By hovering over a video thumbnail, the video actually will automatically start playing, and give you a taste of what the site offers, before you actually click on the result.

The image search is very impressive as well, allowing image searching with continuous scrolling images, with adjustable settings for size, layout, color, and style.

In addition to its tool(s) for searching WebPages, Bing also provides search offerings for health, images, local, maps, news, shopping, translator, travel, videos, and xRank. Most of those are pretty self explanatory, but what about xRank?

XRank is a feature that actually allows users to search for celebrities, musicians, politicians, and bloggers. You can read short biographies and news about them, and track  their own personal trends and/or popularity rankings.

All in all, it sounds like a pretty good engine Microsoft has put together, but will it be enough to compete with the market dominator Google?

Google is the king of search, of course, but the problem with Google’s results is that they’re based soley on mathematical calcualtions, whereas Bing employs some artificial intelligence. Only time will tell. In the meantime, go check Bing out first hand via http://www.bing.com/ and decide for yourself.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.