• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

What Should You Blog About?

July 20, 2009

What is going on in your industry right now? Look for interviews given by industry leaders, tips, opinion pieces, research, news, and posts from other bloggers. Find out who are the main bloggers in your field, and then determine what new or alternative context you can provide.

These all can give you ideas for your posts. While you might not be unconvering big news, you should concentrate on generating thought leadership by stating your own view of that’s going on in your industry.

Be Alert: Actively monitor your industry with Google Alerts, Technorati, and Blogpulse.

Get a Nose for News: Keep on top of big issues with news aggregators like Google News, Techmeme, and Topix.

Then, go beyond the news and try to describe your own experiences, interests, expertise, case studies, etc. Personal stories can often resonate with your readers.

Cautionary Tale About A PC And A Child’s Imagination

July 20, 2009

Let’s face it – computers can be downright aggravating at times. There is an old saying that they’re “dumb boxes” that only do what they’re told and not what you want them to  do. But some of the aggravations can be prevented.

I had a client a few years ago bring his system in because it was occasionally making strange noises. I started the computer up numerous times and it always sounded fine.

As a troubleshooting measure, I opened up the case to check inside for any obvious signs of trouble. What I found was obviously the problem. The inside of the case was  absolutely filled with CDROM disks. It was stuffed full!

I removed the 20 or so music and video game disks and returned them to the client when he picked his station up. Was he surprised!

“There are all the CDs I have been missing.”

My curiosity got the best of me and I asked him how they got in there. He had no idea at the time. When he asked his 2 year old son that was with him, “Have you been putting  disks in the computer?” the boy demonstrated how he put the disk in the little slot between the CDROM player and the case cover. This sent the CD right into the case. His father explained his old computer had a slot you would slide the disks in and the boy thought this computer worked the same way.

Although this may seem like the strangest thing that could happen with kids and computers, my favorite happened shortly after this episode. It has been said the kid’s say the  darndest things, but they can also do the strangest things.

This client brought in her station because the CD player wouldn’t open. I created the service ticket and placed it on the service bench. When the time came to repair the problem, I started the computer up and pushed the eject button on the player. The door tried to open but just wouldn’t go all the way. I tried to manually open the door and it felt like something was stuck in the player and perhaps preventing the door from properly operating.

This can commonly be caused by a disk becoming dislodged and jamming in the tray. I removed the player and shook it upside down to try and reseat the disk. Nothing that I tried  seemed to help.

I then pressed the manual release and pried the door open and the tray came out – along with a whole bunch of animal crackers. It seems her little one had a new game he was playing.

He would open the CD, lay an animal cracker in the tray and press the close button and send the animal for a ride. After having done this to the point of filling the player, his
game was over, the tray was stuck. Needless to say she was not thrilled with having to buy another player, and I’m afraid her son may have gotten into some hot water.

If you’re having any computer problems bring it to Tech Experts where our certified techs can get you back up and running quickly.

Do You Keep Critical Passwords On A Sticky Note Next To Your PC?

July 20, 2009

We constantly struggle to get our clients to stop writing down their passwords on sticky notes by the computers. Obviously this is a security risk. Another bad habit is choosing  really easy-toremember passwords such as “password.”

But admittedly, it CAN be hard remembering all of those passwords that are always changing. To solve this little dilemma, we’re suggesting to our clients to stop using passwords and use “pass-phrases.”

What is a “pass-phrase” you ask? They are letters and numbers put together in an easy-toremember phrase such as “!YEAHGoBlue!”

These are MUCH easier to remember than a random cluster of letters and numbers, which means you won’t have to write them down on a post-it note anymore! Plus, they’re much more secure than using a birthday or child’s name.

Pass-phrases can be built from anything, such as favorite quotes, lines from movies, sports team names, a favorite athlete’s name and jersey number, kids’ names and birthdates, pets, and so on.

Here’s some other examples that would be easy for you to remember, but hard for a hacker or criminal to guess:

ILike!ceTea

T&lkingOnTh3Phone

d3tro1tHockey

goneWithth3w!nd

Git-r-don3!!

Detroit-R3D-Wings

All you need to do is be a little creative to get numbers, letters and punctuation into the phrase. All of the normal suggestions remain the same – don’t make a password  exclusively a birthday or child’s name, and always include special letters and punctuation.

Since introducing this to our clients, we’ve found (believe it or not) they actually have fun doing this, and at the same time, are making their networks more secure!

Bing, Bing, Bing! Microsoft’s Search Engine A Hit!

July 20, 2009

If you haven’t heard, Microsoft has released their own search engine in an effort to compete with Google in the search engine market. Originally the search engine that was going to be called “Kumo” has been released and the name is “Bing.”

Microsoft is off to a pretty good start according to the marketing research company that provides marketing data and services to many of the Internet’s largest businesses,comScore Inc. Microsoft has improved their search market share by 1.7 points to 15.5% in the week following the release of Bing.

So what is causing all these improvements, and catching the eyes of the public? What does Bing have to offer that Google hasn’t already thought of? Here are a few of the features Bing has integrated into the search engine. Interface features, multimedia features, instant answers, product search, webmaster services, mobile services, toolbars, gadgets, advertising, and many more.

So let’s talk about some of these features and what they mean to us – the end user.

The interface feature is one of my favorites, probably because it’s so appealing to the eye, and got my attention right from the  very first visit to Bing. The background image changes each and every day, taking you to the most remarkable places in the world, with vivid colors, and great angles.

You can even view the information about the subject of the image by hovering over the image.

Video previewing has never been so cool. By hovering over a video thumbnail, the video actually will automatically start playing, and give you a taste of what the site offers, before you actually click on the result.

The image search is very impressive as well, allowing image searching with continuous scrolling images, with adjustable settings for size, layout, color, and style.

In addition to its tool(s) for searching WebPages, Bing also provides search offerings for health, images, local, maps, news, shopping, translator, travel, videos, and xRank. Most of those are pretty self explanatory, but what about xRank?

XRank is a feature that actually allows users to search for celebrities, musicians, politicians, and bloggers. You can read short biographies and news about them, and track  their own personal trends and/or popularity rankings.

All in all, it sounds like a pretty good engine Microsoft has put together, but will it be enough to compete with the market dominator Google?

Google is the king of search, of course, but the problem with Google’s results is that they’re based soley on mathematical calcualtions, whereas Bing employs some artificial intelligence. Only time will tell. In the meantime, go check Bing out first hand via http://www.bing.com/ and decide for yourself.

Hassett Title Counts On Tech Experts To Keep Their Network Problem-Free

June 28, 2009

For  Bill, Dan and Doug Hassett, the principals of Hassett Title Company Inc., downtime is a “killer.” Their title and real estate closing company relies on their computer network to be up and running.

“Every aspect of our business is computerized,” explained Doug Hassett. “We use our network to examine the register of deeds records online. Our computers are vital in preparing title and closing documents, and let us complete every transaction with ease and confidence.”

Hassett Title Company is a family-owned and operated full service title and escrow agent, founded by Bill Hassett in 1988. The company has offices in the heart of downtown Monroe at 33 East Front Street. Hassett Title is an agent for Stewart Title Guaranty Company.

“We have a responsibility to provide not only the fastest, but the most accurate and complete title and closing service to our clients,” said Doug. “Our clients deserve the best.”

Tech Experts recently upgraded the computers at Hassett Title to include several new Lenovo workstation computers, and assisted in the integration of a new multi-function copier/printer/scanner into the company’s network. Hassett Title also hosts it’s e-mail and web site services with Tech Experts.

“One of the biggest business benefits we’ve realized in working with Tech Experts is near constant uptime,” Doug continued. “Any time we have a repair or upgrade, the technicians make sure we stay up and running. Tech Experts understands we can’t have downtime.”

Hassett Title takes advantage of Tech Experts’ monthly systems check service. Every month, a Tech Experts engineer visits Hassett Title’s offices to make sure the computers, server and network are functioning properly, that all antivirus software is updated, all Windows updates are current, and handle any issues any of the staff are having with their computers

“Freeing us from the worry and maintenance of our network lets us focus on the needs of our clients,” explained Doug. “Tom Fox and Bob Saylors have been working with us for years. They know what we need and understand our needs when we express ourselves in a non-tech savvy way.”

For more information about Hassett Title’s services, contact them at (734) 242-9393, or visit their website: www.HassettTitle.com.

New Phishing Schemes You Should Know About

June 28, 2009

I know growing up as a child, I loved to go fishing. I never caught very many fish, but just being out on the water “drowning worms” was good enough for me. As the years have passed, though, a new kind of “phishing” has emerged.

The term phishing refers to luring techniques used by identity thieves to fish for personal information in a lake of unsuspecting Internet users.

Their purpose is to take this information and use it for criminal objectives such as identity theft and fraud.

Phishing is a general term for the creation and use by criminals of emails and websites – designed to look like they come from well-known, legitimate and trusted businesses, financial institutions and government agencies – in an attempt to gather personal, financial and sensitive information.

These criminals deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords.

Today a new form of phishing appears to be spreading through social websites such as Facebook. This new scam works like this.

As soon as you login to the site, it will steal your email and password and then log you into Facebook. Within a short period of time the system will automatically switch your password and block you from the site. It then begins to send the same URL to all of your Facebook friend’s inboxes.

As this spreads, the criminals gather thousands of email addresses and passwords before Facebook can stop all references to the website.

The scammers have developed a method to duplicate the scam immediately and the next thing you know they have four or five phishing scams going on at the same time all over Facebook. This allows them to gather hundreds of thousands of victims very quickly.

It is not known yet what these people intend to do with all these addresses, but you can almost guarantee that they will result in a malicious worm at some point. The potential to access a user’s financial information and accounts could result in the loss of millions of dollars.

Another form of phishing is called “in session” phishing. This form does not use email nor does it rely on the user having to be tricked into clicking on a link.

It works like this. Let’s say you go to your banking website that is secure. You login and take care of your business, then leaving that browser window open you innocently go to another website that has been compromised. All of a sudden a pop-up asks you to validate your login to continue your banking session.

Remember two things must happen in order for this scam to work. First, a website must be compromised and infected—the higher traffic the better, obviously.

Second, the downloaded malware must be able to identify whether or not the unknowing user is logged into a relevant website.

Most banking institutions have taken steps to prevent this. One step is having a rapid disconnect of an idle session.

But in order to be safe we would recommend closing all browser windows after you have visited a secure banking website.

In addition it is very important to keep your system free of all spyware, malware and viruses.

Tech Experts has certified technicians that clean these types of infections and malware from computers every day. We urge you to take advantage of our system checkup and cleaning service to keep your identity to yourself.

Saving Money On IT: 8 Tips To Speed Up Your Systems, Extend Their Life, And Be More Productive

June 28, 2009

Sluggish computers got you down? You’re not alone – many people make the mistake of letting their slow computers cost them time, money and headaches. Sometimes, folks will even resort to buying a new machine rather than resolving the slow computer issues.

Here are eight tips that will help you speed up your systems, extend their life, and let you be more productive – all without investing a lot of money or time.

Physical Cleanliness
It is a best practice to clean your system at least once every quarter. You can use a vacuum to clean the outside of the computer case, and keyboard for starters. You should NOT vacuum the inside of the case – this creates static electricity which could damage the system.

Obviously you never want to get the inside damp, wet, or use liquid cleaners on it. The best way to keep the inside clean is to get a can of compressed air. Simply blow out the system fans and any accumulated dust and debris. Fans can become clogged after time, and prevent proper cooling, which greatly affects the performance.

Software Management
Over time, installed software can clutter up the system, and often, installed applications are forgotten about over time. Regularly checking your program list and removing anything that hasn’t been used in a while is another best practice.

Simply go to Start->Control Panel->Add/Remove Programs. From there you can check through the list of installed programs, and decide which ones should go, and which ones can stay.

Start Up (Boot Up)
You may have noticed that the system used to start up a lot faster than it does now. In most cases, this can be easily resolved by clearing out the programs that are set to run at startup.

Most users don’t even realize there are several programs starting up when they turn their systems on. Ideally, you would want as few applications as possible to start up, and then open programs as they are needed.

Simply go to Start->Run>type in “msconfig” (without the parenthesis). This will bring up the Microsoft Configuration Utility. From there, you can choose the startup tab, and get a list of programs that are set to start when Windows is starting up. You can simply check/uncheck which programs you want.

Clean Up The Cache
Every time you visit a web site, the content and pictures are downloaded to a temporary holding area on your hard drive, called the cache. The Internet cache is useful because it helps websites load faster the next time you visit them. Over time, the cache can take up disk space, and cause the system to run slower.

I’d suggest keeping your cache cleared, simply by running a disk cleanup. This will allow you to remove the following: temporary Internet files, downloaded program files, offline webpage’s, files in the recycle bin, temporary files, and “compress old files.”

Disk Defragmentation
Sometimes when you install new programs, or create new data files, the files end up being chopped up into chunks and stored in multiple locations on the hard disk. This is called fragmentation.

Disk defragmentation basically takes all of your files, and arranges them in a logical order. It’s like having all of your files in a filing cabinet scattered, and then re-arranging so everything is in order, and similar files are grouped with each other.

So next time you go to call on a file, data source, program, etc.the specified data is all grouped together making it faster to access and load. This should be done at least once a month.

Antivirus Scanning
We all know the problems that viruses and spyware can cause! Spyware and virus activity is one of the biggest culprits of slow moving computers, and having an active antivirus program doing daily system scans is always a best practice. This will ensure your system’s performance is not at jeopardy due to malicious related software.

Keeping your Windows operating system up to date will ensure you have the latest service packs, security patches, third party device drivers, and many other critical updates to your Microsoft Windows operating system.

Keep Windows Up to Date
Microsoft allows the automatic update and installation of updates if configured properly. Simply right click the My Computer icon, and choose automatic updates tab. From there you can decide what day you want updates to run, and whether or not you want them to be downloaded and/or installed.

Clean The Registry
The registry is a database which stores most of the settings and options for Microsoft Windows operating systems. It contains information and settings for hardware, operating system software, and per-user settings.

CAUTION: In most cases, only advanced users should edit the registry!!

Over time, programs can cause clogging of the registry, which will affect system performance; a great tool to run on this would be CCleaner; which is a free download available at http://www.ccleaner.com/.

So if you want to speed your systems, extend the life of your computer, and learn to be more productive with your pc, without spending a bunch of money or time doing so, follow some of these best practices, and you will be well on your way to a more efficient, and pleasant time on the computer.

QuickTime Video Software Target Of Hacker Attack

June 28, 2009

We all remember that it was not too long ago when Microsoft had left a huge hole for attackers to exploit in Windows XP.  Microsoft corrected the error by releasing a new security update and including it as an important update in the Windows Update service.

Now for the third time, attackers have found a new vulnerability in Windows. This attack only affects Windows XP, Windows 2003 server and Windows 2000. Windows Vista, Server 2008 and surprisingly Windows 7 aren’t affected.

Microsoft has already discovered that the attackers are using the code on many different video websites. The attack starts with a QuickTime video and exploits a problem in the Direct X software that Windows uses in almost everything you do, from watching videos to playing video games.

The hackers are using the code in QuickTime files which is the default video for Apple, but not in Windows. You most likely have QuickTime installed on your PC if you have an iPhone or iPod.

The malicious code is hidden inside video files, and allows the attacker to execute any kind of program he would like on the victim’s personal computer. Then, depending on what the attacker planned to do, they could take over your computer or make all your data disappear.

In order to get infected, you’d have to open an infected QuickTime file. Opening the file allows the hacker to have control of your computer. This virus code could be sent by an attachment in email or posted on any website. You’d just have to click and download the file in order to infect your computer.

According to the developers of QuickTime, QuickTime is not the flawed code, but rather, the code inside Windows that displays the QuickTime movie using Direct X is to blame.

The reason the newer operating systems are not vulnerable to these attacks is that the code was removed when Microsoft began development of Windows Vista.

Microsoft has already released two fixes for this security vulnerability. One is pretty technical and requires the user to edit the system registry. The second is a tool that Microsoft has built to automatically disable this feature.

Microsoft hasn’t released a patch, but said that once they do, users that used the automated tool will automatically have the parser turned back on.

How To Prevent Downtime On Your Network

May 28, 2009

With the national average of computer related repairs at $95 – $125 per hour, a troubled economy, and so many security vulnerabilities lurking around the Internet, getting downtime on networks to a minimum is becoming the number one goal of Computer/IT support companies like Tech Experts.

Preventing downtime on your network starts at square one: Who provides your IT support, and what do they have to offer to ensure you’re getting a high quality support at a reasonable cost to your business. With the right kind of IT support, your employees can focus on their own work and maintain a high level of productivity, without the hassle of downtime.

Using a service company to manage your network can be done in a variety of different ways, but for the most part, there are two main forms of service:  Break-fix, better known as pay as you go, or managed service protection (MSP).  So the big question is: Which is right for your company?

So what are the key differences between the two?  We’ll start with the break fix approach.

This is the standard service model – when something breaks, you call your service provider and they repair it. For some companies, particularly smaller networks, this works very well. The costs are relatively low, but every time you have an issue, there’s a cost involved. Oftentimes, you’re reluctant to call for support for what seems to be a “minor” issue. Instead, you save them up to combine service visits. The problem comes in when what seems to be a minor issue is really something more significant.

On the other hand, we have the managed service model.  This type of service delivery plan  is designed to provide a high level of IT support to a company at a fixed IT budget, so there are no surprises.

Typically, a fixed monthly price negotiated by the IT support company and the client.  There are usually different levels of support, starting from basic support of servers, workstations, and network devices, all the way on up to fully managed networks.

The highest level of support typically gives the business “whatever it takes” support, meaning that whenever you have an issue, it’s taken care of, and again the price stays as agreed.  It’s always in the best interest of the managed service provider to maintain maximum uptime for your network.

Managed service provides full network maintenance, and proactive management, reducing the number of future issues, which again keeps your network uptime maximized, which ensures productivity is at the highest level possible.

There’s usually no minimum or maximum number of users, which provides scalability for your network, giving it room to grow in the future. No matter how large your company might grow, your managed service provider will provide peace of mind in keeping your network up and running at full proficiency.

Lastly, there is typically a hardware replacement plan in place.  Because the MSP is monitoring your network at all times, they actually create a “map” of the entire infrastructure, which gives the company the age and health of the equipment on the network. In most cases, you’ll have insight into which hardware needs to be replaced ahead of time, which lets you budget for equipment upgrades.

Overall, I think a managed service is the way to go. It provides the business with peace of mind that the entire network is being monitored, recurring issues are prevented, costs and hidden fees are eliminated, and network growth is scalable and affordable.

Top Four Threats Attacking Your Network And What You Can Do About Them

May 28, 2009

Do you ever feel like your computer network could be more secure? Chances are, keeping a few simple things in mind will improve security and reduce downtime. Here are some things to look out for.

Social Networking Sites
Social networking sites like Facebook are exploding in popularity. Threats range from malware (e.g. viruses, worms,spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are
using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable. Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies. We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network
access.

Attacks On Mobile Devices
Everyone is going mobile these days not just the “road warriors.” Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen. Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.

Cloud Computing
“The Cloud,” in its most simple form, involves using the Internet to access and store your data. When you access email using a web browser, you are working in “the cloud.” Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning. Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet. You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

Overconfidence
User overconfidence in security products is the top threat to your network. Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle key loggers that steal passwords. Surveys promising free stuff, result in theft of information like your mother’s maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data. Think before you click!

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Help Your Team Bridge The AI Gap

December 19, 2025

Is It Time to Rethink Your Phishing Training?

December 19, 2025

Your Best Defense Against A Cyberattack

November 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.