• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Lock Your Most Used Programs On The Windows Start Menu

August 26, 2007

The left panel of the Start menu consists of a divided list of programs that Windows XP thinks you’ll find handy: The pinned items list above the separator line, and the frequently used programs, displayed below the line.

By default, Windows XP places links to your Internet browser and e-mail in the pinned items list and will place as many as 30 shortcuts to the programs that you’ve recently used in the most frequently used programs list.

In order to really take advantage of the Start menu as a launching area for all the programs you use most often, you can configure the entire left panel as a pinned items list. Here’s how:

  1. Right-click the Start button and select the Properties command to display the Taskbar and Start Menu Properties dialog box.
  2. Click the Customize button adjacent to the Start Menu radio button to display the Customize Start Menu dialog box.
  3. In the Programs panel, use the Spin button to set the Number Of Programs On The Start Menu setting to 0. Click the Clear List button.
  4. In the Show On Start Menu panel, you can clear the Internet check box because the Internet Explorer icon already appears in the Quick Launch menu by default, and maybe even the e-mail check box, depending on how you launch your e-mail application.
  5. Click OK twice—once to close the Customize Start Menu dialog box and once to close the Taskbar and Start Menu Properties dialog boxes.
  6. Click the Start button and access the All Programs submenu.
  7. Locate and right-click on a shortcut to a program you use most often and select the Pin To Start Menu command.

You can pin up to 30 of your most-used programs to the Start menu, depending on your screen resolution setting. With your favorite programs on the pinned items list, you can really take advantage of the Start menu.

Please, Back Up Your Data!

July 26, 2007

All too often, we see clients who rarely, if ever, back up their critical data. And in all the years we’ve been repairing computers, we’ve never seen one break at a convenenient time. More often than not, your hard drive will fail at precisely the time you can least-afford to lose your data.

If all you use your computer for is occasional email or web browsing, a hard drive failure may not be too critical. But we’ll often go into a new client’s office and find their critical files aren’t being backed up, either locally on workstations, or on their server.

Even worse are those network installs we’ve encountered that don’t even include backup devices.

A recent issue of PC Magazine had an article on the nuts and bolts of data backup. It contained a lot of the same concepts that we’ve been preaching for eons and the highlights are worth repeating here.

  • Identify what you absolutely can’t afford to lose – photographs, financial information, address book, downloaded music, etc. – and ensure that they get backed up regularly.
  • For local computer and workstations, backup to compact disks if at all possible. They’re cheap, fast, safe and easy. If you have more data than will fit on a CD, go to DVD (which holds about 6 times more than a CD).  • If your files won’t fit on a DVD… think about a more professional backup system such as a REV drive from Iomega. If you have that much data, it is worth the investment in a professional backup solution to protect it.
  • Determine your optimal backup schedule by asking yourself how much data would be a hardship to reproduce if it were lost. Those who can’t afford to lose even one day’s work should back up every day. If recreating a week’s worth is no problem, then a weekly backup may do the trick. Either way, take the time to do the backup – recreating the data will take you much longer!
  • Store one copy of your data off-site. If your home or office burns down, backup disks that are sitting next to the computer won’t help you much.
  • Collect the installation CDs for all of your programs and store them together. Make copies of those disks that are critical to your business and keep them off-site.
  • Don’t be too quick to trash or overwrite older backups. If you encounter file troubles (data corruption or virus infection, for example), the most recent backup of that file may have the same problem.
  • Multiple solutions, such as daily back-ups on CD or DVD and weekly backups on a REV drive or tape system, give you more effective recovery and better protection.
  • Most consumer programs won’t copy files that are in use. Be sure to close all files before you run a backup. This is particularly important to note on server-based systems: You must invest in an open-file backup option for your backup system.
  • Check backups often to make sure they’re current (open the disk and verify the date of a recently used file). All too often, we hear horror stories from people who were convinced that they were backing up properly, only to find that nothing was actually being written to the disk or tape.

Backing up your important files can be painless. The same cannot be said of losing them. Give us a call and we’ll show how to make it quick and easy.

5 Simple Ways To Avoid Getting An Avalanche Of Spam

July 26, 2007

As you probably already know from firsthand experience, once you’re on a spammer’s list, it’s next to impossible to get off. And changing your e-mail address can be a major inconvenience especially if you rely on it to stay in touch with important business and personal contacts.

To reduce the chances of your e-mail address getting spammed, here are 5 simple preventive measures you can take that will go a long way in keeping not-so-delicious spam out of your in-box.

Use a disposable e-mail address
If you buy products online or occasionally subscribe to websites that interest you, chances are you’re going to get spammed.

To avoid your main e-mail address from ending up on their broadcast list, set up a free Internet e-mail address with Hotmail or Juno and use it when buying or opting in to online newsletters. You can also use a throwaway e-mail address when making purchases or subscribing to newsletters.

Pay attention to check boxes that automatically opt you in
Whenever you subscribe to a website or make a purchase online, be very watchful of small, pre-checked boxes that say, “Yes! I want to receive offers from third party companies.”

If you do not un-check the box to opt-out, your e-mail address can (and will) be sold to every online advertiser.  To avoid this from happening, simply take a closer look at every online form you fill out.

Don’t use your main e-mail address on your website or forums
Spammers have special programs that can glean e-mail addresses from websites without your permission. If you are posting to a web forum or newsgroup, use your disposable e-mail address instead of your main e-mail address.

If you want to post an e-mail address on your home page, use “info@” and have all replies forwarded to a folder in your in-box that won’t interfere with your main address.

Create throwaway e-mail accounts
If you own a web domain, all mail going to an address at your domain is probably set up to come directly to you by default.  For example, an e-mail addressed to anything@yourdomain will be delivered to your in-box.

This is a great way to fight spam without missing out on important e-mails you want to get. The next time you sign up for a newsletter, use the title of the website in your e-mail address. For example, if the website is titled “successsecrets.com,” enter “successsecrets@yourdomain.com” as your e-mail address. If you get spammed, look at what address the spam was sent to.

If successsecrets shows up as the original recipient, you know the source since that e-mail address was unique to that web site. Now you can easily stop the spam by making any e-mail sent to that address bounce back to the sender.

Don’t open, reply to or try to opt-out of obvious spam e-mails
Opening, replying to, or even clicking a bogus opt-out link in an obvious spam e-mail signals that your e-mail address is active, and more spam will follow.

The only time it is safe to click on the opt-out link or reply to the e-mail is when the message was sent from a company you know or do business with (for example, a company that you purchase from or a newsletter you subscribed to).

Malicious Software Is Spreading Through Multiple Operating Systems

July 26, 2007

“A new worm is being distributed within malicious OpenOffice documents. The worm can infect Windows, Linux and Mac OS X systems,” according to a Symantec Security Response advisory. “Be cautious when handling OpenOffice files from unknown sources.”

Apple’s Mac OS is not a virus-free platform, said Jan Hruska, who co-founded antivirus firm Sophos.

“Viruses on the Mac are here and now. They are available, and they are moving around. It is not as though the Mac is in some miraculous way a virus-free environment,” Hruska said. “The number of viruses coming out for non-Mac platforms is higher. It gives a false impression that somehow, Apple Macs are all virus-free.”

Once opened, the OpenOffice file, called badbunny.odg, launches a macro that behaves in several different ways, depending on the user’s operating system.

On Windows systems, it drops a file called drop.bad, which is moved to the system.ini file in the user’s mIRC folder. It also executes the JavaScript virus badbunny.js, which replicates to other files in the folder. On Apple Mac systems, the worm drops one of two Ruby script viruses in files respectively called badbunny.rb and badbunnya.rb.

Net Security Purr-Fected: Pictures Of Kittens Are The Unlikely New Weapon Against Online Fraud And Spam

July 26, 2007

There’s a new way to combat internet fraud, prevent spam and keep online shopping secure. But your first impressions may be that it’s not exactly high tech. It takes the form of a simple question: From a gallery of fluffy-animal snaps, can you tell which are cats and which are dogs?

Your answer is enough to find out whether you are human or an automated spam program, designed to send unwanted email.

The dog/cat question is the latest example of a security device called a Captcha, a simple puzzle that usually takes the form of a string of distorted letters and numbers.

Captcha stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart.

The idea behind a Captcha is that users have to perform a task that is simple for a human but incredibly difficult for a computer. Distorting random letters and numbers makes them confusing to a computer but readable to the human eye.

Regular web users will be familiar with Captchas, as they are ubiquitous on shopping, email and networking sites; during initial registration and sometimes log-in, Captchas are used as an additional gateway to passwords.

Although a number of computer researchers have claimed that they invented the Captcha, it’s generally acknowledged that Carnegie Mellon University led the charge after being asked by Yahoo in 2000 to create a security tool to stop spammers using computer programs to set email accounts and then use these accounts to send millions of spam messages.

According to Luis von Ahn, a member of the original Carnegie Mellon team, “Captchas are still the best defence against many types of automated attacks, and I believe they will be used for the foreseeable future. The only ones that can be broken are the extremely primitive ones that use a constant font, and apply no distortion to the characters other than thin lines that are easy to remove automatically.”

But as programs are written that can read heavily distorted codes, the distortions become even more extreme. And as they do so, some of the Captchas are becoming too tricky for many humans to decipher at first attempt. More and more users are finding that they need two or three attempts before they can confirm their shopping orders or set up their new email account. So, creators of Captchas are exploring new avenues.

Von Ahn is the executive producer of a new project, Recaptcha.net, which uses old tomes to create new Captchas. While digitally scanning books to make them available online, character recognition software often fails to recognise a word, because of smudges or damaged paper. If von Ahn’s software can’t read it, he’s assuming that other computers will also struggle. “The words in my Captchas come directly from old books that were recently scanned, and we are using people’s answers to decipher what the words are.”

Picture recognition is an increasingly popular alternative. People are asked to look at a grid of images and pick the ones that have something in common – straightforward for humans but impossible for computers, as it’s difficult for computers to accurately classify images.

Pix Captcha (www.captcha.net), a Carnegie Mellon project, displays pictures of certain things – worms, babies and so on – and then asks people to select the corresponding noun from a drop-down menu.

Most altruistic is a Microsoft research project called Asirra (research.microsoft.com/asirra) – Animal Species Recognition for Restricting Access – that uses pictures of rescue-home dogs and cats from Petfinder.com. It asks you to click on the cats, rather than the shots of aardvarks, bears and dogs thrown in to baffle the computers.

It also helps find homes for domestic animals – each image has a tag reading “adopt me” on it.

Although still in the “beta” testing stage, Asirra has a database of over two million images with which it can create Captchas. It has the potential to change the way we stay secure online – and give animal lovers everywhere a dose of cuteness.

Adapted from The London Independent.

Tech Experts Keeps Complete Packaging’s Network Running Problem-Free

June 26, 2007

No one knows better than Sue Brey, Complete Packaging Inc.’s controller, how important it is to have a problem-free computer network. Complete Packaging specializes in just in time inventory and production of specialized, “total-solution” packaging products, primarily for the automotive industry.

Complete Packaging is an ISO-9001 and Q9001-2000 certified supplier. “We manufacture wood pallets, crates, boxes, and coil cradles,” said Sue, “and we are a distributor for corrugated shipping containers and set up boxes. Our customers rely on Complete Packaging to provide the right product, at the right price, on time.”

To handle their orders and customer service, Complete relies on a Windows Server 2003 network installed by Technology Experts, using an IBM server, and various IBM workstation computers.

The company has a high-speed T1 Internet connection, facilitating online order entry and email service for the company’s employees. A nearby warehouse facility is connected by a private, secure wireless network to the main office building, allowing computers at both locations access to the Internet service and data stored on the file server.

“We rely on our computers for accounting and manufacturing planning,” continued Sue. “Tech Experts also developed a specialized program we use to prepare the shipping paperwork we use to deliver our products to our customers.”

Complete uses Quickbooks for accounting, payroll and payables. “One of the recent projects Tech Experts did for us was upgrading our Quickbooks,” said Sue. “I was really happy the upgrade process went smoothly.”

Network downtime is costly for any business, but even more so for a company like Complete Packaging that relies so heavily on its computer systems.

That’s why Sue and Complete have invested in a support agreement with Tech Experts.

“One of the most strategic advantages we’ve found working with Tech Experts is that they’re a local company. The support agreement we have gives me peace of mind, knowing they’ll be here right away when I need them,” said Sue.

Sue summed it up best: “Wow! That is all I can say about the team at Tech Experts. It’s so nice  to know that my entire network is handled so I can focus on running the business. I’ve worked with other computer consultants in the past and no one can touch their level of service or expertise.”

Take Advantage Of These Microsoft Incentives

June 26, 2007

As your local Gold Certified Microsoft Partner, and a Microsoft Small Business Specialist, Tech Experts has access to special promotion and incentives direct from Microsoft.

Microsoft Financing 6/50 Promotion, Ends: July 31, 2007

Use Microsoft Financing for any IT solution including Microsoft software and we will finance not only the hardware portion, but also the software and your services as part of the total solution.

You pay only $50 per month for six months, followed by 36 regular monthly payments. When you use Microsoft Financing, you conserve your capital, preserve your corporate credit lines, and own the hardware you purchase outright. Plus, you can add IT solutions to your contract at any time during the term of the loan.

Windows Server Partner Subsidy Program, Ends: June 29, 2007

Your business is growing, and Windows Server® 2003 R2 provides a winning platform for small and medium businesses. Now until June 29, 2007, Microsoft is offering partner subsidy dollars worth up to $10,000 to customers purchasing between three and twenty-five Windows Server® 2003 R2 Open licenses that include Software Assurance. That adds up to great growth investment!

Participate In Microsoft’s Business and Technology Assessment Program (Ongoing Promotion)

Spend 30 to 45 minutes working with a Tech Experts professional completing your small business technology assessment, and be entered in a monthly drawing for a $100 cash prize.

The assessment program consists of a series of questions designed to get an overall picture of how you use IT in your day to day business operations.

 

Finally! A Way To Stop Spam, Spyware And Pop-Ups From Taking Over Your Computer

June 26, 2007

If you are absolutely fed up with the number of spam e-mails you get every day, the annoying pop-ups being shoved in your face when you surf the net, and advertisers installing spyware on your computer to monitor your every move and serve up unwanted ads, then please read on.

We’re Waging War Against Spam, Spyware, and Pop-Ups!
Just recently we polled our clients to find out what their biggest frustration currently is with their computer networks.

Not too surprisingly, an overwhelming number of you said “SPAM” with pop-ups running a close second on the list of things that make you crazy.

That’s why we’ve decided to launch a war against spammers and unethical online advertisers for our clients by offering a FREE “Stop The Ads” audit.

We’ll Show You How To Stop Spammers And Unethical Advertisers In Their Tracks
During this free audit, one of our senior technicians will come onsite to review your network and uncover loopholes that allow spammers and advertisers to penetrate your network and install unwanted spyware on your computer.

Note: Spyware is a small program that online advertisers download to your computer without your permission or knowledge so they can monitor your web surfing and steal your confidential information. Sometimes they can even read your credit card information!

During this FREE “Stop The Ads” audit we’ll show you how to:

  •  Eliminate pop-ups finally and forever.
  •  Quarantine virus-riddled spam before it ever gets to your in-box.
  •  Filter spam without blocking important e-mails from clients and associates.
  •  Clean out any spyware installed on your individual PCs or network.
  •  Bulletproof your network from viruses and other cyber criminals.

And If You Are Not Currently Hosting Your Own E-mail In House, We’ll Also Show You How To:

  • Save hundreds or even thousands of dollars on costly bandwidth and ISP fees by bringing your e-mail in house.
  • Prevent your ISP’s spam filter from blocking important, non-spam e-mails you need to receive.
  • Make it easier to set up new e-mail accounts.
  • Stop employees from accidentally (or intentionally!) sending illegal, inappropriate, or confidential information via e-mail.
  • Set up a safe and secure filing system to store all of your important e-mail.
  • Eliminate the file size limitations on your in-box.

Here’s How It Works:
To request your free “Stop The Ads” Audit, simply call our offices or fill in and fax back the enclosed form.

If you have three or more computers in your office, we will send one of our senior, professional technicians to your office. If you have less than three computers, we’ll make arrangements for you to bring your machine into our professional repair shop.

Our technician will be on time, guaranteed. He will evaluate your network for FREE and give you a straightforward situation analysis, and explain the options you have available for eliminating spam, spyware, and pop-ups.

We will also give you a guaranteed price in writing – not an estimate – for the options you want to try. If you agree to allow us to do the work (you are under no obligation), we can usually start right away!

EVERY job is backed by our exclusive Peace of Mind Guarantee: if you are not happy with the work or the technician doing the job, simply say to the technician “this is not what I had in mind.”

That will be his cue to stop the work, restore your network, and leave your office – AND YOU WON’T PAY ONE PENNY!  No questions, No argument, No guilt, No payment. You can consider the job cancelled and the work ON US.

As you can see, we don’t think you should take a chance on hiring ANY computer support company – even us. We strongly feel that the client is number one and to prove our commitment to you, we are willing to put ourselves on the line.

It’s that simple and you have nothing to lose!

Give us a call at (734) 457-5000. You’ll be glad you did!

Michigan Man Fined For Using Free Wi-Fi

June 26, 2007

A Michigan man has been fined $400 and must work 40 hours of community service for using a local café’s Wi-Fi connection from his parked car to check his e-mail and surf the Web.

He got off easy, according to the local TV station that reported the case: under Michigan computer access law, using a Wi-Fi connection without authorization is a felony, punishable by as much a $10,000 fine and five years in prison.

But the story raises more questions than it answers, including whether the café’s Wi-Fi connection was a fee-based service, which would imply authorization was required, or a free service that, without any security restrictions, could be accessed by anyone within range, including someone outside the restaurant.

The story also doesn’t say whether the defendant, Sam Peterson II, of Sparta, Michigan was convicted of the crime or pled to the charge.

Peterson routinely drove to Sparta’s Re-Union Street Caf, to check his e-mail but never went into the coffee shop.

His regular routine drew the attention of Sparta Police Chief Andrew Milanowski, who asked Peterson what he was doing. Peterson told him.

After checking the Michigan statutes, the chief swore out a complaint of fraudulent computer access, and Peterson was charged.

Researcher: Don’t Trust Google Toolbar

June 26, 2007

Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday. The problem is that many widely used Firefox extensions, including toolbars from Google, Yahoo, and AOL, do not use secure connections to update themselves, according to Christopher Soghoian, a security researcher.

The Indiana University doctoral student discovered the Firefox issue last month while examining network traffic on his computer. He noticed that many of the most popular Firefox extensions are not hosted on servers that use the very secure SSL Web protocol.

Although the corporation behind Firefox, Mozilla, hosts the majority of Firefox extensions on its own SSL-enabled Web site, it is common for commercial extension-makers such as Google to host their software on an unsecured site, Soghoian said in an interview.

This leaves users vulnerable to a “man-in-the middle” attack, where Firefox could be tricked into downloading malicious software from a site it mistakenly thought was hosting an extension.

It wouldn’t be easy for an attacker to pull this off, however. In one scenario, the hacker would set up a malicious wireless access point in a public area where people are using wireless connections. He could then redirect extension update traffic to a malicious computer. “An attacker who sets up a wireless access point can then infect anyone who connects to it,” Soghoian said.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

The Hidden Cybersecurity Risk In Your Business

October 14, 2025

Advanced Strategies To Lock Down Your Business Logins

October 14, 2025

The Long-Term Costs Of Slow Computers

October 14, 2025

Five Simple Ways To Keep Your Business Data Clean

September 23, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Twitter Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.