• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tech Tips

Cautionary Tale About A PC And A Child’s Imagination

July 20, 2009

Let’s face it – computers can be downright aggravating at times. There is an old saying that they’re “dumb boxes” that only do what they’re told and not what you want them to  do. But some of the aggravations can be prevented.

I had a client a few years ago bring his system in because it was occasionally making strange noises. I started the computer up numerous times and it always sounded fine.

As a troubleshooting measure, I opened up the case to check inside for any obvious signs of trouble. What I found was obviously the problem. The inside of the case was  absolutely filled with CDROM disks. It was stuffed full!

I removed the 20 or so music and video game disks and returned them to the client when he picked his station up. Was he surprised!

“There are all the CDs I have been missing.”

My curiosity got the best of me and I asked him how they got in there. He had no idea at the time. When he asked his 2 year old son that was with him, “Have you been putting  disks in the computer?” the boy demonstrated how he put the disk in the little slot between the CDROM player and the case cover. This sent the CD right into the case. His father explained his old computer had a slot you would slide the disks in and the boy thought this computer worked the same way.

Although this may seem like the strangest thing that could happen with kids and computers, my favorite happened shortly after this episode. It has been said the kid’s say the  darndest things, but they can also do the strangest things.

This client brought in her station because the CD player wouldn’t open. I created the service ticket and placed it on the service bench. When the time came to repair the problem, I started the computer up and pushed the eject button on the player. The door tried to open but just wouldn’t go all the way. I tried to manually open the door and it felt like something was stuck in the player and perhaps preventing the door from properly operating.

This can commonly be caused by a disk becoming dislodged and jamming in the tray. I removed the player and shook it upside down to try and reseat the disk. Nothing that I tried  seemed to help.

I then pressed the manual release and pried the door open and the tray came out – along with a whole bunch of animal crackers. It seems her little one had a new game he was playing.

He would open the CD, lay an animal cracker in the tray and press the close button and send the animal for a ride. After having done this to the point of filling the player, his
game was over, the tray was stuck. Needless to say she was not thrilled with having to buy another player, and I’m afraid her son may have gotten into some hot water.

If you’re having any computer problems bring it to Tech Experts where our certified techs can get you back up and running quickly.

Saving Money On IT: 8 Tips To Speed Up Your Systems, Extend Their Life, And Be More Productive

June 28, 2009

Sluggish computers got you down? You’re not alone – many people make the mistake of letting their slow computers cost them time, money and headaches. Sometimes, folks will even resort to buying a new machine rather than resolving the slow computer issues.

Here are eight tips that will help you speed up your systems, extend their life, and let you be more productive – all without investing a lot of money or time.

Physical Cleanliness
It is a best practice to clean your system at least once every quarter. You can use a vacuum to clean the outside of the computer case, and keyboard for starters. You should NOT vacuum the inside of the case – this creates static electricity which could damage the system.

Obviously you never want to get the inside damp, wet, or use liquid cleaners on it. The best way to keep the inside clean is to get a can of compressed air. Simply blow out the system fans and any accumulated dust and debris. Fans can become clogged after time, and prevent proper cooling, which greatly affects the performance.

Software Management
Over time, installed software can clutter up the system, and often, installed applications are forgotten about over time. Regularly checking your program list and removing anything that hasn’t been used in a while is another best practice.

Simply go to Start->Control Panel->Add/Remove Programs. From there you can check through the list of installed programs, and decide which ones should go, and which ones can stay.

Start Up (Boot Up)
You may have noticed that the system used to start up a lot faster than it does now. In most cases, this can be easily resolved by clearing out the programs that are set to run at startup.

Most users don’t even realize there are several programs starting up when they turn their systems on. Ideally, you would want as few applications as possible to start up, and then open programs as they are needed.

Simply go to Start->Run>type in “msconfig” (without the parenthesis). This will bring up the Microsoft Configuration Utility. From there, you can choose the startup tab, and get a list of programs that are set to start when Windows is starting up. You can simply check/uncheck which programs you want.

Clean Up The Cache
Every time you visit a web site, the content and pictures are downloaded to a temporary holding area on your hard drive, called the cache. The Internet cache is useful because it helps websites load faster the next time you visit them. Over time, the cache can take up disk space, and cause the system to run slower.

I’d suggest keeping your cache cleared, simply by running a disk cleanup. This will allow you to remove the following: temporary Internet files, downloaded program files, offline webpage’s, files in the recycle bin, temporary files, and “compress old files.”

Disk Defragmentation
Sometimes when you install new programs, or create new data files, the files end up being chopped up into chunks and stored in multiple locations on the hard disk. This is called fragmentation.

Disk defragmentation basically takes all of your files, and arranges them in a logical order. It’s like having all of your files in a filing cabinet scattered, and then re-arranging so everything is in order, and similar files are grouped with each other.

So next time you go to call on a file, data source, program, etc.the specified data is all grouped together making it faster to access and load. This should be done at least once a month.

Antivirus Scanning
We all know the problems that viruses and spyware can cause! Spyware and virus activity is one of the biggest culprits of slow moving computers, and having an active antivirus program doing daily system scans is always a best practice. This will ensure your system’s performance is not at jeopardy due to malicious related software.

Keeping your Windows operating system up to date will ensure you have the latest service packs, security patches, third party device drivers, and many other critical updates to your Microsoft Windows operating system.

Keep Windows Up to Date
Microsoft allows the automatic update and installation of updates if configured properly. Simply right click the My Computer icon, and choose automatic updates tab. From there you can decide what day you want updates to run, and whether or not you want them to be downloaded and/or installed.

Clean The Registry
The registry is a database which stores most of the settings and options for Microsoft Windows operating systems. It contains information and settings for hardware, operating system software, and per-user settings.

CAUTION: In most cases, only advanced users should edit the registry!!

Over time, programs can cause clogging of the registry, which will affect system performance; a great tool to run on this would be CCleaner; which is a free download available at http://www.ccleaner.com/.

So if you want to speed your systems, extend the life of your computer, and learn to be more productive with your pc, without spending a bunch of money or time doing so, follow some of these best practices, and you will be well on your way to a more efficient, and pleasant time on the computer.

How To Prevent Downtime On Your Network

May 28, 2009

With the national average of computer related repairs at $95 – $125 per hour, a troubled economy, and so many security vulnerabilities lurking around the Internet, getting downtime on networks to a minimum is becoming the number one goal of Computer/IT support companies like Tech Experts.

Preventing downtime on your network starts at square one: Who provides your IT support, and what do they have to offer to ensure you’re getting a high quality support at a reasonable cost to your business. With the right kind of IT support, your employees can focus on their own work and maintain a high level of productivity, without the hassle of downtime.

Using a service company to manage your network can be done in a variety of different ways, but for the most part, there are two main forms of service:  Break-fix, better known as pay as you go, or managed service protection (MSP).  So the big question is: Which is right for your company?

So what are the key differences between the two?  We’ll start with the break fix approach.

This is the standard service model – when something breaks, you call your service provider and they repair it. For some companies, particularly smaller networks, this works very well. The costs are relatively low, but every time you have an issue, there’s a cost involved. Oftentimes, you’re reluctant to call for support for what seems to be a “minor” issue. Instead, you save them up to combine service visits. The problem comes in when what seems to be a minor issue is really something more significant.

On the other hand, we have the managed service model.  This type of service delivery plan  is designed to provide a high level of IT support to a company at a fixed IT budget, so there are no surprises.

Typically, a fixed monthly price negotiated by the IT support company and the client.  There are usually different levels of support, starting from basic support of servers, workstations, and network devices, all the way on up to fully managed networks.

The highest level of support typically gives the business “whatever it takes” support, meaning that whenever you have an issue, it’s taken care of, and again the price stays as agreed.  It’s always in the best interest of the managed service provider to maintain maximum uptime for your network.

Managed service provides full network maintenance, and proactive management, reducing the number of future issues, which again keeps your network uptime maximized, which ensures productivity is at the highest level possible.

There’s usually no minimum or maximum number of users, which provides scalability for your network, giving it room to grow in the future. No matter how large your company might grow, your managed service provider will provide peace of mind in keeping your network up and running at full proficiency.

Lastly, there is typically a hardware replacement plan in place.  Because the MSP is monitoring your network at all times, they actually create a “map” of the entire infrastructure, which gives the company the age and health of the equipment on the network. In most cases, you’ll have insight into which hardware needs to be replaced ahead of time, which lets you budget for equipment upgrades.

Overall, I think a managed service is the way to go. It provides the business with peace of mind that the entire network is being monitored, recurring issues are prevented, costs and hidden fees are eliminated, and network growth is scalable and affordable.

Top Four Threats Attacking Your Network And What You Can Do About Them

May 28, 2009

Do you ever feel like your computer network could be more secure? Chances are, keeping a few simple things in mind will improve security and reduce downtime. Here are some things to look out for.

Social Networking Sites
Social networking sites like Facebook are exploding in popularity. Threats range from malware (e.g. viruses, worms,spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are
using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable. Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies. We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network
access.

Attacks On Mobile Devices
Everyone is going mobile these days not just the “road warriors.” Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen. Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.

Cloud Computing
“The Cloud,” in its most simple form, involves using the Internet to access and store your data. When you access email using a web browser, you are working in “the cloud.” Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning. Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet. You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

Overconfidence
User overconfidence in security products is the top threat to your network. Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle key loggers that steal passwords. Surveys promising free stuff, result in theft of information like your mother’s maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data. Think before you click!

Your Computer Needs A Spring Cleaning, Too!

April 30, 2009

Now that it is spring time, I thought this would be a good idea to remind everyone of how important it is to clean out your dirty PCs.

Your computer should be cleaned every three to four months, and more if your office environment is very dusty or dirty. Keep in mind, it’s not just for sanitation purposes, either.

The electromagnetic field put off by your computer attracts dirt, dust, debris, animal hair, and lint – just take a look at the back of your PC near the fan vent. Pretty gross, huh?

It’s Not Just Dirty…It’s Dangerous!
The dust clogging those case openings will cause the processor inside your computer to heat up—and heat is the biggest cause of component failure in computers. That dirt and dust can end up shutting down your PC and costing you real money!

So how do you keep your computer clean and free from dust? The best way I’ve found is to use a can of compressed air. You should also use some eye protection like safety goggles or eye glasses along with a dust mask. I’ve found that the dust that settles on computers is often a very fine type of dust and it easily gets into your eyes and nose if you aren’t wearing any protection.

First and foremost, take the computer outside! Blowing the dust off the computer and onto your desk or office carpet really won’t do much long term good.

When blowing the dust out of the ports, it’s best to use short quick bursts. Also, don’t aim the air directly into the port. Blow the dust out at an angle.

Be careful that you don’t hold that plastic straw nozzle too close to any part of the computer – the freezing cold could damage the components. For best results, hold the nozzle about 3 – 6 inches away from the area that you are trying to clean. Sometimes people think using a vacuum cleaner is better than the compressed air, but I don’t recommend it. A lot of vacuum cleaners come with crevice attachments or other brush heads and the problem is that the plastic can cause a large build up of static electricity which can damage delicate electronic components.

Never spray or squirt any type of liquid onto ANY part of your computer. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.

When cleaning the monitor, use a lint-free cloth (like the one you use to clean your eyeglasses). Paper towels, dryer sheets, and other cloths may scratch the monitor. Also, never use Windex or a commercial cleaning product, and never spray anything directly onto the screen. Instead, lightly spray a mixture of rubbing alcohol and water onto your cloth and wipe it down.

We’ll Clean Your  Computer For You!
Want us to do the dirty work? Then just give us a call and ask for our spring computer clean-up service. For just $39 per computer, we’ll clean your system, remove any dust and debris, make sure all of your security updates are installed, and perform an additional 23 essential system checkup steps.

No more grime, germs, or dust bunnies—we’ll get rid of them all as part of our Spring-cleaning special! Just call the office at (734) 457-5000, or e-mail us at info@expertsmi.com, and we’ll make sure your computers shine!

Expert Advice On Choosing A New Computer

March 28, 2009

Picking out a new computer can be challenging. Questions you might want to ask yourself include: What is my budget, what do I need to use it for, and where do I plan to use it?

After you answer those questions, you need to think of more specific questions like should I get a laptop or desktop, how fast does it need to be, and how much memory or drive space do I need? All these will help get you an idea of what you are going to look for.

When looking for a computer the form factor is one of the biggest decisions. What I mean by that is the size of the computer, whether you want it to be a portable computer or a desktop computer.

The two most common sizes are a regular tower case (the kind that usually sits on the floor) or a laptop. Deciding on one of those will help eliminate half of the choices right away.

Next, ask yourself if your needs will pretty much stay the same, or is there a chance of needing upgrades as your needs and computer use change?

You’ll probably not be able to predict when you’ll need to upgrade your computer, but it’s something to keep in mind. Laptops are generally more expensive than tower computers, and can’t be upgraded as easily.
Most laptops can only have ram and hard drive upgrades. Tower computers have pretty much inlimited upgrade potential. From a new motherboard to just a simple RAM upgrade.

Be careful, though: Some major computer manufacturers like Dell make it so that you can only upgrade your computer with manufacturer parts – limiting choices and making upgrades much more expensive than on standard computers.

When reviewing the specs for your new computer, consider the kind of work you do and how fast you need to get it done. Two of the biggest factors to consider are hard drive space and the physical RAM.

Think of hard drive space like a file cabinet – this is where the computer stores all of your programs, files, pictures, music and so on. You can think of RAM memory as the computer’s working memory – where it does all of the different calculations you ask it to do.

If you do a lot of tasks that have very large files like video editing or pictures you would want to make sure you have a bigger hard drive so that don’t run out of space right away. Hard drive space is very inexpensive – less than $1/gigabyte – so it makes sense to buy as large a hard drive as is practical.

For the speed on the computer you need to look at the CPU type and speed, and the RAM.

CPU type will typically be single or dual core – without getting too technical, you’ll probably want to go with dual core, which makes the computer (in general) able to process twice as much information at the same time. The faster the speed, usually measured in gigahertz, the faster the computer can process information.

RAM is also a determining factor in the processing speed of the computer – the more RAM, the more the computer can process without accessing the hard drive. I recommend at least 2gb, and preferrably 4gb.

These are just a few things to keep in mind when buying a new computer. We’re very proud to offer IBM and Lenovo laptop and dektop computers at Tech Experts, so if you’re in the market for a new machine, give me a call!

How To Pick A Good Password

February 8, 2009

What’s the most common password? You guessed it…”password.” Obviously this is not the best way to protect yourself against hackers and online thieves. But even if you don’t use the word “password,” you might be using an equally easy password to decipher.
We suggest you DON’T use the following passwords for really important web sites, such as your online banking web site or other financially related sites.
• Your name or your spouse’s name.
• Your children’s names.
• Your pet’s name.
• Your birth date.
• The last four digits of your Social Security number.
• Your phone number.
• Your address.
• A series of consecutive numbers, such as “1, 2, 3, 4.”
• A single word that would appear in a dictionary.
Your best bet for creating a strong password: Use combinations of letters, numbers and special characters.

Simple Tips To Keep You Out Of Computer Trouble

January 21, 2009

As you can imagine, we see a lot of computer and network issues . Sometimes, they’re pretty difficult to diagnose and repair, but in some cases, a simple fix is all you need. Here are some tips you can refer to the next time your computer goes a little crazy, and some advice to keep you out of trouble.

Reboot!
Nine times out of ten, rebooting your computer and connected equipment will solve the problem you’re having. Do a full restart, which means go to your Start menu, shut down the computer, and power down your peripherals and computer. Then, restart it fresh.

We know what you did
A good computer consultant can tell if you’ve been bad or good on your computer, and usually pretty quickly. Tell us what you really did right before the computer crashed – this will save time and aggravation. Your consultant will figure it out eventually – why not make the repair quicker?

There is no free lunch
Downloading free music, movies and games from the Internet can open holes in the security system of your computer, making it easy for other people to access your files. Be safe… Only use legitimate sites like iTunes and Netflix for your downloads.

Use strong passwords
We walk a fine line in recommending passwords. If they’re really easy to remember, that means they’re also really easy to guess. If we make the password very hard to guess, it’s also going to be very hard to remember.

Here’s a suggestion: Create a “main” password which you then modify for each site you use. A good main password would consist of numbers and letters (but not your birth date!).

Try using your first dog’s name combined with the address of the first house you lived in, and then add to the password for each site. For example, buffy1944 could be a good base password. Then, you’d add AMZ at the end for your login to Amazon.com – buffy1944AMZ.

Update your antivirus
Hackers don’t care that you’re too busy to renew your antivirus and anti-spyware software – in fact, they hope you don’t! Set your software to update at least once a day and run a full system scan at least once a week.

Public wi-fi is public
If you don’t have an urgent need to check your online banking or private e-mail at the coffee house, don’t do it. While you’re on a public network, even if it is encrypted, a nearby hacker can capture your passwords and other personal information.

The Wrong Things?

December 22, 2008

Close your door. Turn off your computer monitor. Sit quietly and look out the window. Now – ask yourself the following question: “How much time do I spend on the wrong things each day?”

Don’t lie to yourself. Answer it as honestly as you can. 5 minutes? 15 minutes? 30 minutes? 60 minutes? 2 hours? 4 hours? More?

Now, turn on your computer monitor. Scan your inbox, even if it’s 4,137 messages. Bring up the weekly view on your calendar and look at it. Look at your todo list (if you have one).

Turn off your computer. Answer the question again.

Are you spending your time on the wrong things?

Looking Ahead: What’s In Store For Your Company?

December 22, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Our clients are typically small and medium sized companies, and while some of them are putting the brakes on and slowing down, most are still going strong.

We’re feverishly working with many clients to plan out their IT projects for 2009. Several clients are looking to upgrade their infrastructure with new servers, workstations and higher speed networking equipment. Even more will be enhancing their Internet speed and security and upgrading their websites (look for an incredible web and e-mail service promotion from us next month!).

These clients understand the importance of keeping their network and critical business systems update to date and in great operating condition.

What Is Your 2009 Plan?
By now, you’ve undoubtedly got the framework of your 2009 plan put together. What’s on the agenda?

From our corner of the world, as your computer guys, we’re seeing many companies looking for ways to decrease expenses and increase sales. We think some of the key technologies you’ll see helping with that include virtualization, unified communications, and cloud computing.

Virtualization
Virtualization technologies go back all the way to the 1960s and IBM’s M44 mainframe systems. In essence, virtualization lets you create and run more than one server “system” on a single piece of server “hardware.” The obvious benefit is that you’re able to run distinct servers on one piece of hardware.

An example application for small business would be a company that uses a specialized piece of software that requires a dedicated server. If the company is smaller, chances are a lot of that server’s horsepower is going to sit idle – because not a lot of people are using it. With virtualization, we would simply create another virtual server and install the special business software on that virtual server, saving the cost of an additional server.

Unified Communications
During the next few years, you’ll see the number of different communications vendors you work with reduced considerably. The technology already exists to check your e-mail from your cell phone, and to receive voice mails in your e-mail.

Cloud Computing
“The cloud” is a metaphor for the Internet. In general terms, cloud computing is the concept that your computing resources are no longer located in your office, or on your server, but rather, purchased as a service and delivered via the Internet. More and more, the services your company relies on every day will move to cloud computing applications, eliminating the need for hardware at your office.

The initial cost savings of cloud computing are obvious; the longer term cost savings will come from reduced operating expenses (employees can work from home, or anywhere, lowering the need for expensive office space) and access to higher quality services that are traditionally too expensive for small companies to implement. Salesforce.com is the perfect example of an enterprise-class application made available to small companies through the use of cloud computing.

Thank You!
As we wind down 2008, I’d like to thank the clients and friends that support Tech Experts. The trust and confidence you place in us as your IT company is invaluable, and everyone here is very thankful for your business. Happy new year!

A Great Book To Read
Panic: The Story of Modern Financial Insanity (edited by Michael Lewis) is a brilliant book and a good start to our new “Recommended Reading” list.

Panic covers five modern financial crashes: The Crash of 1987, The Russian Default / Collapse of Long Term Capital Management, The Asian Currency Crisis of 1999, The Internet Bubble and The Subprime Mortgage Disaster.

Each section has a perfect setup – a few articles preceding the actual crash followed by articles that are written as the crash is happening. Lewis finishes off each section with at least one post crash article.

There are some interesting characters throughout the book, but my favorite example is from The Internet Bubble section: Bernard Madoff – yes, the one that’s been in the news lately.

 

 

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.