• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Take Advantage Of These Microsoft Incentives

June 26, 2007

As your local Gold Certified Microsoft Partner, and a Microsoft Small Business Specialist, Tech Experts has access to special promotion and incentives direct from Microsoft.

Microsoft Financing 6/50 Promotion, Ends: July 31, 2007

Use Microsoft Financing for any IT solution including Microsoft software and we will finance not only the hardware portion, but also the software and your services as part of the total solution.

You pay only $50 per month for six months, followed by 36 regular monthly payments. When you use Microsoft Financing, you conserve your capital, preserve your corporate credit lines, and own the hardware you purchase outright. Plus, you can add IT solutions to your contract at any time during the term of the loan.

Windows Server Partner Subsidy Program, Ends: June 29, 2007

Your business is growing, and Windows Server® 2003 R2 provides a winning platform for small and medium businesses. Now until June 29, 2007, Microsoft is offering partner subsidy dollars worth up to $10,000 to customers purchasing between three and twenty-five Windows Server® 2003 R2 Open licenses that include Software Assurance. That adds up to great growth investment!

Participate In Microsoft’s Business and Technology Assessment Program (Ongoing Promotion)

Spend 30 to 45 minutes working with a Tech Experts professional completing your small business technology assessment, and be entered in a monthly drawing for a $100 cash prize.

The assessment program consists of a series of questions designed to get an overall picture of how you use IT in your day to day business operations.

 

Finally! A Way To Stop Spam, Spyware And Pop-Ups From Taking Over Your Computer

June 26, 2007

If you are absolutely fed up with the number of spam e-mails you get every day, the annoying pop-ups being shoved in your face when you surf the net, and advertisers installing spyware on your computer to monitor your every move and serve up unwanted ads, then please read on.

We’re Waging War Against Spam, Spyware, and Pop-Ups!
Just recently we polled our clients to find out what their biggest frustration currently is with their computer networks.

Not too surprisingly, an overwhelming number of you said “SPAM” with pop-ups running a close second on the list of things that make you crazy.

That’s why we’ve decided to launch a war against spammers and unethical online advertisers for our clients by offering a FREE “Stop The Ads” audit.

We’ll Show You How To Stop Spammers And Unethical Advertisers In Their Tracks
During this free audit, one of our senior technicians will come onsite to review your network and uncover loopholes that allow spammers and advertisers to penetrate your network and install unwanted spyware on your computer.

Note: Spyware is a small program that online advertisers download to your computer without your permission or knowledge so they can monitor your web surfing and steal your confidential information. Sometimes they can even read your credit card information!

During this FREE “Stop The Ads” audit we’ll show you how to:

  •  Eliminate pop-ups finally and forever.
  •  Quarantine virus-riddled spam before it ever gets to your in-box.
  •  Filter spam without blocking important e-mails from clients and associates.
  •  Clean out any spyware installed on your individual PCs or network.
  •  Bulletproof your network from viruses and other cyber criminals.

And If You Are Not Currently Hosting Your Own E-mail In House, We’ll Also Show You How To:

  • Save hundreds or even thousands of dollars on costly bandwidth and ISP fees by bringing your e-mail in house.
  • Prevent your ISP’s spam filter from blocking important, non-spam e-mails you need to receive.
  • Make it easier to set up new e-mail accounts.
  • Stop employees from accidentally (or intentionally!) sending illegal, inappropriate, or confidential information via e-mail.
  • Set up a safe and secure filing system to store all of your important e-mail.
  • Eliminate the file size limitations on your in-box.

Here’s How It Works:
To request your free “Stop The Ads” Audit, simply call our offices or fill in and fax back the enclosed form.

If you have three or more computers in your office, we will send one of our senior, professional technicians to your office. If you have less than three computers, we’ll make arrangements for you to bring your machine into our professional repair shop.

Our technician will be on time, guaranteed. He will evaluate your network for FREE and give you a straightforward situation analysis, and explain the options you have available for eliminating spam, spyware, and pop-ups.

We will also give you a guaranteed price in writing – not an estimate – for the options you want to try. If you agree to allow us to do the work (you are under no obligation), we can usually start right away!

EVERY job is backed by our exclusive Peace of Mind Guarantee: if you are not happy with the work or the technician doing the job, simply say to the technician “this is not what I had in mind.”

That will be his cue to stop the work, restore your network, and leave your office – AND YOU WON’T PAY ONE PENNY!  No questions, No argument, No guilt, No payment. You can consider the job cancelled and the work ON US.

As you can see, we don’t think you should take a chance on hiring ANY computer support company – even us. We strongly feel that the client is number one and to prove our commitment to you, we are willing to put ourselves on the line.

It’s that simple and you have nothing to lose!

Give us a call at (734) 457-5000. You’ll be glad you did!

Michigan Man Fined For Using Free Wi-Fi

June 26, 2007

A Michigan man has been fined $400 and must work 40 hours of community service for using a local café’s Wi-Fi connection from his parked car to check his e-mail and surf the Web.

He got off easy, according to the local TV station that reported the case: under Michigan computer access law, using a Wi-Fi connection without authorization is a felony, punishable by as much a $10,000 fine and five years in prison.

But the story raises more questions than it answers, including whether the café’s Wi-Fi connection was a fee-based service, which would imply authorization was required, or a free service that, without any security restrictions, could be accessed by anyone within range, including someone outside the restaurant.

The story also doesn’t say whether the defendant, Sam Peterson II, of Sparta, Michigan was convicted of the crime or pled to the charge.

Peterson routinely drove to Sparta’s Re-Union Street Caf, to check his e-mail but never went into the coffee shop.

His regular routine drew the attention of Sparta Police Chief Andrew Milanowski, who asked Peterson what he was doing. Peterson told him.

After checking the Michigan statutes, the chief swore out a complaint of fraudulent computer access, and Peterson was charged.

Researcher: Don’t Trust Google Toolbar

June 26, 2007

Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday. The problem is that many widely used Firefox extensions, including toolbars from Google, Yahoo, and AOL, do not use secure connections to update themselves, according to Christopher Soghoian, a security researcher.

The Indiana University doctoral student discovered the Firefox issue last month while examining network traffic on his computer. He noticed that many of the most popular Firefox extensions are not hosted on servers that use the very secure SSL Web protocol.

Although the corporation behind Firefox, Mozilla, hosts the majority of Firefox extensions on its own SSL-enabled Web site, it is common for commercial extension-makers such as Google to host their software on an unsecured site, Soghoian said in an interview.

This leaves users vulnerable to a “man-in-the middle” attack, where Firefox could be tricked into downloading malicious software from a site it mistakenly thought was hosting an extension.

It wouldn’t be easy for an attacker to pull this off, however. In one scenario, the hacker would set up a malicious wireless access point in a public area where people are using wireless connections. He could then redirect extension update traffic to a malicious computer. “An attacker who sets up a wireless access point can then infect anyone who connects to it,” Soghoian said.

Why You Need A File Server Right Now

May 26, 2007

If you’re the owner or manager of a small- or medium-sized business that still uses peer-to-peer networking, it’s time to consider upgrading your network by installing a dedicated business server.

Due to recent technology advances, particularly the availability of Microsoft Small Business Server and Windows Sharepoint Portal Services, the pros definitely outweigh the cons. In fact, the upgrade may result in some benefits you hadn’t counted on.

How do you know when it’s time to upgrade to a server-based network? Here’s a simple checklist you can use to assess your needs, followed by a more detailed discussion.

It might be time to upgrade if:

  • Your staff is moving to laptop PCs.
  • Your staff is specializing and you need to start to segregate data.
  • You want critical data backed up securely and automatically.
  • Your office needs to use collaboration software, such as shared calendars.
  • Your staff requires remote access to shared data
  • Moving to Laptops

One characteristic of a peer-to-peer network is that individual member PCs share resources, such as files, printers, and fax modems, with each other.

Unfortunately, several recent technology trends are making peer-to-peer networks difficult to use and manage.

For example, many of today’s knowledge workers are switching to highly mobile laptop computers which may or may not be in the office at any given time.

When a PC is disconnected from the network, its resources aren’t available other users in the office.

Data Segregation
One of the most compelling reasons to upgrade your basic network to a server-based configuration is data security.

Even small companies have a legal responsibility to protect payroll, human resources, and other sensitive information from misuse, but the file sharing schemes used in peer-to-peer networks don’t provide the high level of control offered by server operating systems.

Automatic, Secure Backups
Along with access, backup is also an important part of any data security scheme. Regular and dependable backups are difficult to manage when data is stored on multiple desktop PCs because even the most sophisticated backup software can’t back up a PC that’s been turned off.

Once you move your critical data to a file server, regular automated backups can be scheduled to take place during off hours. Since the office staff doesn’t typically have access to the server’s operating system, it’s unlikely that anything will “interfere” with backup, and even if the network is down, a file server can faithfully back itself up to tape as long as it has power.

Collaboration
Although shared calendars and other collaboration tools are available from a number of Internet-based sources (Yahoo, Google, and others), your data is much more secure when it’s stored on your own file server.

You’ll also find that the selection of privately hosted collaboration software is broader and the applications are more customizable than those apps available online.

Remote Access
The increased use of laptop computers mentioned above eventually results in the need for remote access to company data. While this can be accomplished with products such as Symantec’s pcAnywhere, Citrix’s GoToMyPC, and even Windows XP’s built-in Remote Desktop Connection, secure remote access is built into most file server operating systems and remote users are subject to the same access restrictions and privileges as locally connected users.

In the past, one of the main deterrents to server-based networking has been the complexity of server operating systems, but this is rapidly changing. Once installed and properly configured, Windows Small Business Server (SBS) 2003 requires about the same day-to-day technical expertise as Windows XP or Windows Vista.

And later this year Microsoft will release a “server appliance” product called Windows Home Server (WHS) that will provide many file server features with almost no human interaction. In fact, the device won’t even require a keyboard, mouse, or monitor — just plug it in and you’ll have an instant file server!

Another traditional objection has been the cost of dedicated file servers, which often out-weighed the budget – and the benefits for many small offices. Fortunately, technology advances are making low-cost, easy-to-operate servers available to offices that wouldn’t have considered them just a few months ago. Server equipment from IBM and HP, combined with Microsoft’s Small Business Server software, is now more affordable than ever for small companies.

In summary, if you’re still using a basic peer to peer network, you’ve probably outgrown it! Consider adding a dedicated file server to your suite of office tools to improve data access, security, and usability.

Detect Hard Disk Failure Before It Happens

May 26, 2007

Roughly 60% of all disk drive failures are mechanical in nature – from spindle-bearing wear to read/write heads banging into delicate disk platters – and now technology built into the drives can report anticipated and specific failures to give you a chance to rectify the situation, hopefully before it is too late to retrieve your data.

In addition to monitoring a variety of parameters related to mechanical events (disk platter RPM, time to spin up, motor current, head seek failures, and sudden shock to the drive chassis), S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) can report read and write retry attempts necessary due to defective areas on the disk or head failure or drive temperature.

Many S.M.A.R.T.-enabled drives can also report how many times they have been turned on and off and the number of hours the drive has been on.

If S.M.A.R.T. is enabled in your system BIOS, the BIOS will check and report any early or permanent signs of disk failure. You can also monitor your drive’s condition with a S.M.A.R.T.-aware disk monitoring program.

To view all available S.M.A.R.T. information about your drive, try the free DiskCheck utility from http://www.passmark.com/products/diskcheckup.htm.

DiskCheck is a nonresident utility that will show you exact drive information and all of the supported S.M.A.R.T. statuses from your drive.

There’s also Ariolic Software’s ActiveSMART (http://www.ariolic.com/activesmart/) resident monitoring tool, which provides a wealth of detail on drive status and notification of potential failures.

If you get a S.M.A.R.T. warning about a drive failing, back up your data immediately and replace the drive.

A failing disk drive is no fun. A failed disk drive is even less so. In working with our clients, we’ve encountered a lot of grieving “Have I lost all of my data?” looks from end users.

It is indeed a sad time. Many times, clients don’t “get religion” about data backup until something catastrophic like this occurs.

A plethora of disk drive repair and data recovery tools are available to help recover your data. But, the single most effective way to ensure you won’t lose your data in the event of a hardware problem is to make regular backups!

We’ve long since given up on the pedestrian Norton Utilities like Norton Disk Doctor because it does not do enough to spend the time running it, especially for those really cranky lost partitions, erratic mechanical problems inside the drive, and when S.M.A.R.T. says the drive is bad or going to be bad soon.

When it’s time to recover partitions and data we unlock our arsenal of serious disk recovery tools, which are:

  • Steve Gibson’s SpinRite 6.0 (www.spinrite.com) for finding and fixing or moving bad data blocks on FAT, NTFS, Linux, Novell, Macintosh, and even TiVo volumes.
  • Ontrack’s Easy Data Recovery (www.ontrack.com) for digging deep inside a drive and extracting recovered data to other media.
  • Symantec’s GHOST (www.symantec.com) to “peel” data off a bad drive to a disk image for replacement onto another drive, or to extract individual datafiles with Ghost Explorer.

And, if our internal data recovery efforts fail, we always have the option  of sending a drive out to a special data recovery service, such as Ontrack (www.ontrack.com) or Action Front (www.actionfront.com).

These services are typically very expensive – sometimes $1000 or more – but if it is the only option to recover your data, other than re-keying everything, it may well be worth the cost.

Just remember – regular, monitored backups are your best defense against hardware failure and data loss.

Should You Be Concerned About Internet Cookies That Give Advertisers Unauthorized Access To Your Computer?

May 26, 2007

With the endless number of online hoaxes, viruses, phishing scams, and other threats, many people are suspicious of any online program that shares their personal information with the rest of the world – and rightfully so.

However, cookies aren’t always the menacing tools of surveillance many people believe them to be, and in most cases, they do more good than evil.

Unlike viruses and spyware, cookies are not programs that allow unauthorized access to your computer. Rather, they are simple text files that, on their own, can’t do much of anything.

Most cookies are designed to enhance web browsing. On a shopping site, for example, they can store a list of items you’ve selected to buy as you browse through an online catalog. They can also remember your web browsing preferences whenever you visit a particular site.

Most web browsers allow cookies to be read only by the web site to which they belong. This prevents other sites from tracking your online activities. However, some advertisers will put cookies on your computer as a way to recognize your computer at other web sites associated with that advertiser. These are called “third-party-cookies” and they allow advertisers to track your online activities across multiple and different sites.

These are the type of cookies that are good to block. Fortunately, blocking third-party cookies is easy. In Internet Explorer, click the “Tools” menu, and then choose “Internet Options.”

Then click the “Privacy” tab and then the “Advanced” button. Make sure the checkbox “Override automatic cookie handling” is checked. You’ll see options for first-party and third-party cookies. In the third-party cookie options, click “Block.” Then, click “Ok.”

Of course, you should always use a firewall, an up-to-date anti-virus program, and anti-spyware software to protect yourself from real online threats.

‘Surge’ In Hijacked PC Networks

May 26, 2007

The number of computers hijacked by malicious hackers to send out spam and viruses has grown almost 30% in the last year, according to a survey.

More than six million computers world wide are now part of a “bot network,” reported security firm Symantec.

Computer users typically do not know that their PC has been hijacked.

More than a third of all computer attacks in the second half of 2006 originated from PCs in the United States, the threat report said.

While the total number of bot-net PCs rose, the number of servers controlling them dropped by about 25% to 4,700, the twice-yearly report said.

Symantec researchers said the decrease showed that bot network owners were consolidating to expand their networks, creating a more centralised structure for launching attacks.

Ollie Whitehouse, senior consulting services director at Symantec, said: “This rise in the number of infected computers can certainly be attributed to the rise in the online population of countries like China and Spain, in Europe.”

Whitehouse continued: “There is almost an educational curve that the users and service providers have to go through. Unfortunately when certain countries go through rapid increases in connectivity and availability of technology that curve is not always kept up.”

Alfred Huger, vice president of Symantec Security Response, said online criminals appeared to be adopting more sophisticated means of “self-policing.”

He added: “They’re launching denial-of-service attacks on rivals’ servers and posting pictures online of competitors’ faces.”

Huger concluded: “It’s ruthless, highly organised and highly evolved.”

The best defense against attacks? Never click on an unknown link, regardless of who sent it, and always run up to date anti-virus and anti-spyware software.

Need a Large Monitor?

May 26, 2007

We have several large-sized CRT monitors, ranging from 19 to 21 inches, that came in from a client on a recent upgrade.

Normally, we dispose of old equipment for our clients by listing it on eBay.

Unfortunately, with the size and weight of these screens, it doesn’t make economic sense to try and ship them.

So, if you need a large sized screen, and would be interested in a “gently used” model, give us a call – we can make you a great deal!

Protect Your Computers From Spring Thunder

April 25, 2007

What’s the best way to keep your computer safe during a thunderstorm? Crawl under your desk and unplug it.

While not a particularly practical suggestion, unplugging your PC from AC power, a telephone line if  you use a modem, and your network will protect it from surges and power problems.

A more practical solution would be to use a power protection device, such as a true surge protector, or a business-grade battery backup system.

Computer damage from severe weather conditions is surprisingly a very common problem, despite warnings to installl power protection.

When power problems strike, they can cause permanent damage, to either your computer or your data.

To minimize the possibility of damage, install a true surge protector – not just a power strip. A true power strip will cost you in the neighborhood of $20 to $40, and most offer specific guarantees if your equipment is damaged after you properly install the power protection device.

Get a surge protector that also protects your network, phone lines or DSL connection. Some even offer a connection to provide surge protection on the cable line that services your cable modem. Remember, the more protection, the better.

Check your protection devices regularly. If you use  battery backup systems, use the testing feature at least quarterly to make sure your unit still functions properly.

Batteries in backup systems will typically last two or three years, unless your power environment is particularly troublesome.

Remember, too, that not all power problems result from electrical storms.

The every day variances in power quality – from smaller surges, sags, drops and brownouts – will also, over time, cause damage to your electronic equipment.

When  you invest in a high-quality surge protector, many of them will also compensate for these minor electrical fluctuations, protecting your equipment at its own expense. These are called line conditioning surge protectors.

Higher end line conditioning surge protectors will wear out and lose effectiveness after a few years, and should be replaced.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.