• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Local Community Action Agency Says “Our Network Is Running Better Than Ever Now!”

July 23, 2008

MCOP Counts on Tech Experts For A Problem-Free Network

Monroe County Opportunity Program (MCOP) is one of Monroe County’s most successful community action agencies, serving thousands of residents every year. The agency relies on Tech Experts to keep their computers and network problem-free.

Founded in 1965, MCOP’s mission is “To enhance the quality of life and reduce the effects of poverty by providing opportunities, services, and collaborating with community agencies to foster self-sufficiency.”

They do this by administering programs such as Homeless Prevention, Homebuyer Rehab, Weatherization, Specialized Transportation, Utility Assistance, Food Programs and assistance for Seniors with lawn mowing, home making, unmet needs and resource advocacy.The agency uses computers and technology extensively on a day to day basis.

“We use Microsoft Office applications for spreadsheets, presentations and word processing,” explained Larry Hansen, MCOP’s fiscal director. “MCOP also uses a specialized software package, designed just for non-profit agencies, for general ledger, payroll accounts payable, etc.”

“Also as a nonprofit serving the low income population, MCOP uses an in-house Client Tracking software program,” Larry continued. “We also access web based systems that are utilized by various agencies within the community. These are communication tools that are required by the government agencies that provide MCOP’s funding.”

When it came time to upgrade MCOP’s network, Technology Experts installed a Microsoft Windows 2003 Server system along with Windows Terminal Services. Terminal Services allows users to connect to the server using thin client terminals, decreasing the need for individual computers on each employee’ desk.

Another advantage of employing a Terminal Services environment is that older computers can be used as clients without slowing down the computing performance of the user, since the applications run on the server instead of on the client stations. “Even though there were many changes that took time to get used to,” Larry said, “the entire process was a success and our network is running better than ever now.”

When asked what MCOP liked most about Tech Experts service, Larry was quick to answer: “The timeliness in responding to our calls for assistance. Help is usually on site the same day and many times within minutes.”

Monroe County Opportunity Program:  1140 South Telegraph Road Monroe, Michigan 48161 (734) 241-2775 www.monroecountyop.org

How to Declare Freedom from Slow Computers, Downtime, Viruses, Hackers, and Computer Problems Finally and Forever!

July 23, 2008

Are you sick and tired of worrying about the security of your network against the latest spyware, virus, or hacker threat?

Would you like to have peace of mind knowing that your backups are working properly and storing your data in a secure, easy to restore format?

Do you want your network to always be “up” and running fast?

Then we have a service you need to know about…

It’s called our Experts Total Support plan. This program gives you fast, 24-7 computer support, maintenance, and monitoring for one low, fixed monthly rate without any surprises, hidden costs, or the expense of a full time IT staff!

Why Do you Need This?
Having a secure, reliable computer system is no longer a luxury for businesses today. If you can’t access your e-mail, financial information, client database, or other critical data, you’re OUT of business.

Plus, you must keep your data secure from corruption, loss, and theft; if you don’t, it could not only cost you dearly in downtime, but it could also cause your reputation harm when customers find out your network (and their data) has been compromised, stolen, or lost forever.

How Does It Work?
The concept is simple. For a fixed monthly fee, we will monitor and maintain your computer network 24/7, 365 days a year. We will make sure your anti-virus, spyware, and security patches are up to date. We’ll monitor your network for looming problems that could turn into downtime or data loss such as hardware failures and disk space problems.

We’ll also watch your backups to make sure they truly are running and not giving you a false-positive reading, and we’ll constantly optimize the health and overall speed of your network. After all, nothing is more frustrating than a slow computer!

Last (but not least!) we’ll be able to provide remote support through a highly secure Internet connection to provide almost instant support whenever you need it. No more waiting around for a technician to show up!

FREE Network Check gets you Started…
If you want to find out how our Experts Total Support plan can help your business, call us for a FREE Network Health Check. At no charge or obligation, we’ll come onsite and…

  • Look for incorrect network configurations that show up as unexpected downtime, application errors, printers not working, e-mail problems, etc.
  • Assess your current security against data corruption, theft, hardware failures, power outages, computer viruses, worms, hacker attacks, spam, and even employee sabotage.
  • Scan for spyware that is secretly stealing your company’s bandwidth, jeopardizing the speed of your computer system, and embezzling confidential information about your company.
  • Check your data backup system to ensure it is working properly and accurately backing up all of the critical information you NEVER want to lose.
  • Diagnose slow, unstable PCs and perform a quick network “tune up” to make programs load faster.

When we’ve finished, we’ll give you a network ‘report card’ that will reveal any weaknesses in your security or trouble spots on your network that could lead to bigger (more expensive) problems.

Normally we charge $297 for this, but if you call during the month of July, we’ll give it to you for FREE as our gift for introducing our Experts Total Support plan. Again, you are not obligated to sign up for this program or pay us anything for this service—but you have to hurry!

To get signed up now, call 734-457-5000 or go online to www.ExpertsTotalSupport.com.

Secrets About your Customers Hidden In your Company’s Website Reports

July 23, 2008

No matter who hosts your website, it’s almost certain that you have website traffic reporting. These reports can tell you a LOT about your customer and who is visiting your web site IF you know how to read them. Here’s a quick less on how to decipher them…

Hits V. Unique Visitors
Its’ been said that “hits” is short for “How Idiots Track Sales.” That’s because “Total Hits” is a deceptive number: it counts every single graphics file, style sheet, and script a visitor pulls for each page. A single visitor on a single page could easily pull a dozen files or more.

The only number you should watch is “unique visitors” or “unique referrers.” This is your best indicator of how many individual people are actually visiting your site.

If your number of unique visitors is extremely low, you’re probably not marketing your website properly; but it could also be a sign of a technical issue. Occasionally a site is so far off the beaten path that it’s never been indexed by the search engines. Sites built in Flash or that use images instead of text are also difficult for search engines to index and, therefore, will get very low rankings and traffic.

Browsers
Your reports should give you a list of web browsers your clients are using when coming to your site. Most people use a recent version of Internet Explorer, but you may also see Firefox, Safari, or older versions of IE. Bottom line, you need to make sure your site works in all the browsers being used by your visitors.

Exit Page
Have you ever heard the term “website conversion?” It’s a measure of whether a visitor has done what you wanted them to do on your site. A conversion can be a purchase, an enrollment to your company’s e-zine, or a completed “contact us” form.

If the most popular exit pages correspond to your conversion pages, congratulations! If not, take a closer look. Why are people leaving? There may be a technical issue, a bad headline (or no headline), no offer, slow-loading graphics, or confusing copy. Something on this page is making your visitors leave abruptly.

Maybe it’s not clear where they should go next, or how to find out what they need to know. A few departures are expected, but if there’s a trend, you must address it. Experiment with various headlines, offers and designs until you find something more successful.

Keywords and Keyword Phrases
Keywords and keyword phrases are a list of words people type into search engines to find you.

This is very important information to have because it will allow you to further optimize your website to attract customers AND help you when using pay-per-click search engine marketing.

Browse this list regularly. If the words and phrases are not ones aligned with what you sell or whom you sell to, try changing the content on your site to be more targeted and specific.

Errors
Check out the error list from time to time to make sure you aren’t experiencing any technical issues. The most frequent error you’ll find is a “404” code, which means “document not found”—also known as broken links.

Broken links are caused by deleted pages, new page names, or links to other sites that may no longer exist. These errors should be corrected to keep your site current.

Another good tip is to have a custom “404” page that shows up instead of the stock standard “file not found” page that contains your company name, phone number, and a way to report the problem. Your web master can set this up for you.

Sam Walton’s 10 Rules for Building a Phenomenally Successful Business

July 23, 2008

Sam Walton, the founder of the Wal-Mart chain, had 10 rules for building a business that he adamantly believed in. According to the Wal-Mart website, the following are the principles that have enabled the company to experience more than 40 years of outrageous success:

1. Commit to your business. You have to believe in it more than anyone else. You have to have passion. Love your work and do it the best you can every day.

2. Share your profits with all your associates and treat them as partners. This will make the people who work for you perform beyond your wildest expectations. Behave as a servant leader.

3. Motivate your partners. You have to constantly think of new ways to motivate your partners.

4. Communicate everything you possibly can to your associates. The more they understand, the more they’ll care.

5. Appreciate everything your associates do for the business. Nothing else can quite substitute for a few well-chosen, well-timed, sincere words of praise. They’re absolutely free and worth a fortune.

6. Celebrate your success. Have fun. Find humor in your failures. Loosen up.

7. Listen to everyone in your company. And more important, try to get them talking. The ones who really talk to the customers are the ones who really know what’s going on.

8. Exceed your customers’ expectations. Give them what they want–then give ’em a little more.

9. Control your expenses better than your competitors. You can survive a lot of mistakes if you’re efficient.

10. Swim upstream. Ignore the conventional wisdom; find your niche by going another direction.

Take Caution Before Opening your Next e-greeting Card

July 23, 2008

According to a new article in PC Magazine, cyber criminals are now starting to exploit e-greeting card sites in an attempt to steal confidential information.

In 2007, nearly 1/3 of infected e-mail messages contained a phishing scam, while 7 percent of such e-mail messages masqueraded as an electronic greeting card and directed the target to a malicious site.

Here’s how it works: Hackers place a malicious hyperlink in the e-mail greeting, which first sends the user’s web browser to an exploit server that checks to see if the user’s machine has the most up-to-date security patches.

If it’s unpatched, the server silently force-downloads a rootkit and a keylogger onto the user’s computer before redirecting the web browser to an authentic Yahoo greetings card.

On the user-facing end, the victim clicks the link to view the card. However, the card does not let them know who sent it. The victim closes the card and goes about his business without realizing arootkit was delivered to his PC before he even picked up the card.

How do you avoid this from happening to you? First, never open emails from unknown sources. Second, make sure your PC/Servers always have the most up-to-date security patches. And finally, always maintain an active, up-to-date anti-virus software.

Lights Out?

June 11, 2008

Not For Local Manufacturing Company Who Turned On Tech Experts’ Disaster Recovery Planning Services

When spring storms rolled through the area and took out power to her company’s offices and plant, Sue Brey, Complete Packaging’s controller, knew she had to make two phone calls right away.

“My first call was to the power company,” she explained, “and my second call was to Tech Experts. I knew they’d have our computer systems handled.”

Complete Packaging is one of the industry’s leading suppliers of just in time inventory and specialized “total-solution” packaging products, working primarily in the automotive and glass industries. Because of the unique nature of their businesses, Complete Packaging’s clients require accurate and on-time deliveries of their packaging materials.

Sue’s first call, to the power company, didn’t go well. “Our power went out on Monday, and they told us it wouldn’t be restored until Friday,” Sue said. “We were in crisis mode.”

The Tech Experts support team sprang into action immediately, calling Complete’s telephone service provider to have the company’s main phone numbers transferred to staff member’s cell phones.

“Things were touch and go for a few hours,” Sue continued, “but when it became clear our power wasn’t coming back on, we had to get our office systems up and operational.”

Tech Experts relocated Complete Packaging’s server and several office workstations to spare office space in it’s building, and set up Complete’s phones to ring at the temporary desks.

“We moved right into the Tech Experts office,” Sue explained. “And they had our systems up and printing on their printers in less than an hour. We were able to print out orders, send and receive e-mail, and get production documents completed for the factory.”

Complete Packaging’s maintenance crew was able to get much of the factory running on generators, so the company was able to ship orders. “We have performance clauses in a lot of our contracts,” explained Sue. “If we didn’t ship our orders on time, we could have lost tens of thousands of dollars in business. Thanks to Tech Experts, we were able to fulfill our commitments to our customers.”

The Tech Experts Disaster Recovery service is part of the comprehensive management and maintenance program offered to every Tech Experts client who is a service agreement subscriber.

Three easy Steps to get Seven Years of Hassle Free Service From Your Laser Printer

June 11, 2008

Printers – the necessary evil of every office. From paper jams and error messages, to problems like smearing, misfeeds, and ghosting, printers can really make your blood pressure rise.

Plus, it’s easy to sink thousands of dollars into maintenance and repairs. If you want to avoid common printer problems AND save yourself a small fortune on replacements and repairs, follow these 3 easy steps:

Keep It Clean
There is no faster way to gunk up a laser printer and cause printing problems than by letting it get dirty.

On a monthly basis, use compressed air to blow out the inside of the printer. Remove the toner cartridge for better access, and don’t forget to do the back if it is accessible. It also helps to take a vacuum to the outside. If you print labels or use any other type of specialty media like transparencies, use rubbing alcohol to clean the rollers inside the printer.

Do Your Maintenance
You can almost infinitely extend your printers lifespan by doing the regular maintenance suggested by the manufacturer.

This includes replacing rollers, filters, and occasionally replacing the fuser (the printer’s internal furnace.) Here’s a little money-saving secret: you only need to do this type of maintenance at 1.5 to 2 times the manufacturer’s usage recommendation.

So, if the manufacturer says to replace rollers every 100,000 pages, you really only need to do so every 150,000 to 200,000 pages.

Use a Surge Protector
Nothing will send your printer to the bone yard faster than an electrical surge caused by lightning or other issues on the power grid.

When internal components are fried, it is often cheaper to buy a new printer than it is to fix the existing one. It is easy to protect yourself with a $25 surge protector. DO NOT plug a laser printer into a UPS or other battery backup system. The printer’s power draw is too much for a battery to handle.

Has Your Computer Been Taken Over By a Bot?

June 11, 2008

David Perry, global director of education for security software provider Trend Micro, was recently quoted in PCWorld as saying, “An unprotected [Windows] computer will become owned by a bot within 14 minutes.”

A bot is an automated program that takes over your computer and uses it as a spam machine, to copy your personal information, such as credit cards numbers, or something equally as evil.

One way to spot a bot is to be aware of network activity when you aren’t on the Internet. You can put a network status light in your system tray. If you see it blinking when you are not using the Internet, there might be a problem.

Do this: In Windows XP, choose Start, Control Panel, Network Connections. You will see an icon for your network connection. Right-click the network connection and select Properties from the popup menu. Check “Show icon in notification area when connected,” and click OK.

Remember, lots of unexplained network activity can mean your computer is “owned” by a bot.

Double check by going to one of several free scanning sites such as McAfee Free Scan or Trend Micro’s House-Call. Then buy antivirus software, install a firewall, and never open e-mail attachments from unknown sources.

What To Do When Things go Technically Wrong

June 11, 2008

It’s amazing how many things can go wrong with your computer; bad drivers, hardware malfunctions, viruses, software glitches, spyware… and this is only the beginning. Computer problems always seem to happen at the most inconvenient times and can leave you stranded for hours, even days without a computer. However, vendor “help desk” support can be frustrating and in some cases, expensive.

The next time you have a computer problem, here are six simple things you can do to try and resolve the problem yourself or to at least prepare and get the most out of your help desk support.

1. Check your connections. This may sound obvious, but check all the cables to make sure they are plugged in securely. Don’t ignore this step because USB, printer, and serial cables have a way of working themselves loose and causing problems.

2. Reboot. Windows sometimes gets into a state of confusion or overload and locks up. You can clear the memory and set things straight by simply rebooting your system. Similarly, if you’re having a problem connecting to the Internet, try rebooting your cable/DSL modem and router by unplugging them for 15 seconds to reset them.

However, this isn’t something you should have to do often. If you find yourself rebooting your router once a day, the problem is a bit deeper. If you still can’t resolve the problem yourself, then here are a few more steps to take before calling support that will save a lot of time and get your problem resolved quicker…

3. Try to narrow down the problem as much as possible. Identifying what went wrong is 90% of the journey to the solution. Try to isolate when and where the problem happened and note the last thing you installed, changed, or plugged in to your computer. You’ll also want to narrow down the error message as much as possible.

For example, if you discover your printer isn’t working from Word, try to print from another application.

Maybe you can print when you first boot up, but everything seems to go haywire after you scan a document. Does the problem occur all the time or only after the machine has been running for a while? Does the problem repeat itself or is it only occasional? Observing what situations lead up to a problem can be a great help in determining what is causing it.

4. Access crash logs. If you are using a Microsoft operating system, you can access an application called Dr. Watson that will report information about your memory and configuration to a crash log file.

In Windows XP, the default location is C:\Documents and Settings\All Users\Application Data\Microsoft\ Dr Watson. The crash log is a text file called Drwtsn32.log, which can be read in Notepad or sent via e-mail to a tech-support person.

5. Know your system. When you talk to a support technician on the phone, they are going to want to know what specific hardware, operating system, and software you’re using.

To save time, know the make and model numbers for all your hardware. You can access CPU and memory info by selecting Control Panel | System. Drill down from here into Hardware | Device Manager for information about other devices such as your sound and graphics cards.

Write down new software, no matter how small or insignificant, that you’ve downloaded and installed lately, including upgrades, screen savers, emoticon software, and web browser updates. It can also help to jot down any services running in the background.

To access a list of what is running on your Windows XP system, press Ctrl-Alt-Del and select Task Manager. You can also get very detailed info from Start | All Programs | Accessories | System Tools | System Information.

6. Back up your data. Before you start following directions over the phone from a support technician or tearing your system apart to fix it yourself, make sure you have a backup of all your important documents, e-mail, and other data.

Although many fixes will be as simple as downloading a new driver, you’ll be glad you have a backup if you find yourself reinstalling the operating system. You should also have your original CDs around in case you need to reinstall applications.

The ExpertsMobile: “What the heck is it?!”

June 11, 2008

 

What the heck is it?! Boy, do we get that question a lot!

The “ExpertsMobile” is a 2008 Smart fortwo. It is a two seat (“for two,” get it?!) gasoline-powered car manufactured by Smart, a division of Daimler. That’s right, it is a 100% gasoline engine, not electric. We’re averaging about 40 miles per gallon driving around town.

The fortwo received four out of five stars in front impact crash tests, and five out of five stars in side-impact crash tests, so it is very safe! The body panels are made out of 100% recyclable materials. And it has a lot more space for transporting sick computers than you might think!

We like the Smart for a couple of reasons, but most importantly, it is smart for the environment, and smart for our company, since it saves us so much money on gasoline and maintenance. Plus, it’s fun to drive!

The Smart is like our philosophy in supporting small business computer networks: The latest appropriate technology, delivered in an efficient and cost effective way.

If you’d like to learn more about the Tech Experts Smart car, visit: www.SmartComputerGuys.com.

For more information about Smart cars, visit www.smartusa.com.

 

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.