Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

How To Password Protect Files and Folders In Windows

September 4, 2013 by The T By D Team Leave a Comment

Dear Geek,

My computer at home is a family computer.  I want to keep a daily journal, but don’t want anyone else to have access to it.  How do I password protect the file?

Signed,

Secretive

Dear Secretive,

Before password-protecting any document, you might want to create a backup of the non-password protected folders and/or files in case you forget the password.

The majority of Microsoft Windows operating systems do not come with a method of password protecting your sensitive files and folders.  If you’re using Microsoft Windows 3.x, Windows 95, or Windows 98…you really need to upgrade.  Plus, you’ll have to download or purchase a 3rd-party program to password protect your files and folders in Windows.  If you’re using one of those operating systems, skip down to “Other Security Solutions” to find some security solutions.

Microsoft XP Professional Users:  

These steps are for users that are using a computer that has different user accounts set up on it.  If you’re using a single user account for all users that use the computer, skip down to “Other Security Solutions”.

1.  Select the folder you wish to encrypt (aka password protect).

2.  Right-click the folder and click ‘Properties’.

3.  Click the ‘Advanced’ button.

4.  Check ‘Encrypt Contents to Secure Data’ box.

5.  Click ‘Apply’, then ‘Ok’.

Microsoft Windows XP Home Edition Users:

1.  Select the folder you wish to encrypt.

2.  Right-click the folder and click ‘Properties’.

3.  Click the ‘Sharing’ tab.

4.  Check ‘Make This Folder Private’ box.

5.  Click ‘Apply’, then ‘Ok’.

On a side note:  XP will no longer be supported after April 2014, so if you don’t want your system to be ultra-vulnerable to hackers, I advise upgrading.

Other Security Solutions for Protecting Your Files And Folders in Windows

Files and Folders Not Frequently Used

If you need to password protect files/folder you do not frequently use, one of the simplest ways is to compress the folder and files with a compression utility and password protect the compressed file.  However, each time you want to modify the files, you will need to uncompress the files using the password.

Windows ME and Windows XP Users:  Microsoft Windows ME and Windows XP come with their own compression utility.  This utility      can also be used to compress and password protect files.

Note:  When a file is compressed, users can still view a listing of the files in the compressed file.  If you want both file names and content hidden, move all files into a single folder and password protect that folder.

Files and Folders Frequently Used or Accessed

If you need to password protect or encrypt data you frequently use, you will need to install a third-party program that will enable you to protect your files and folders.  You can check out the free and/or commercial solutions below:

AxCrypt:  A free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a password is known.

WinCry:  A freeware utility that enables your files to be encrypted, secure deletion, as well as other security method for protecting your files.

Folder Guard:  A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.

Things To Remember When Encrypting or Password Protecting Files and Folders:

1.  There is no such thing as a 100% protected file.  There are numerous tools, utilities, and instructions for how to break a lot of the encryption and passwords on files.  If your data is extremely sensitive, we suggest a commercial product for protecting your files and data.

2.  Even though a file or folder may be password protected it can still be deleted, unless the program supports the ability to protect files from being deleted.  Always remember to backup all your files, even those protected by passwords.

3.  If you forget the password, unless you’re willing to spend the time attempting to break it or pay someone else to break the password, all your data will be lost.  Make sure you’ve made a backup of the non-password protected data.

To find out what your business can do to protect your organization, call Technology by Design for an Email and Internet Usage Analysis.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

*TbyD assumes no responsibility for any 3rd party programs.  Any use of 3rd-party programs is at your own risk.

 

Filed Under: FAQ, Featured

We Were Wasting Valuable Time Struggling With Computer Problems!

August 30, 2013 by The T By D Team Leave a Comment

“Winnipeg Transition Centre Was Wasting Valuable Time Struggling With Computer Problems!”

Now They’ve Got Extra Hours For What’s Really
Important — Running Their Business

Winnipeg Transition Centre offers employment assistance and resource services which provides the job seeker with the tools and support they need to transition to meaningful employment.  WTC also empowers individuals to make meaningful work and life transitions using practical and effective coaching, counselling, and skill development training including national certification.  They offer employment counseling and assistance, as well as recruitment, and professional development courses.  They have over 10 computers in total, for both staff and students.

Winnipeg Transition Centre provides a valuable service to people requiring assistance and additional training in order to transition to meaningful employment, and to make meaningful work and life transitions.

They Weren’t Just Wasting Time.  

They Were Losing Out On Helping People!

The biggest problem wasn’t the frustrations and annoyances that come with day-to-day computer issues.  It was that they couldn’t fully devote their time to the business.  WTC staff was wasting valuable time with their computers and network.  Computers were constantly going down, the server was frequently going off-line, computers were performing slowly, and computer files were taking long to load and update.

“It was making our job more difficult, and decreased our efficiency.  We were making more and more calls to our IT provider for service.  It was taking up more and more of our time.  And time is money.”

From a dollar standpoint, you have to consider the lost opportunities, lost conversations, lost assistance to our clients.  It adds up.  Before Technology by Design installed their new server, WTC had an average of 16.5 hours of IT service calls per month.  Since Technology by Design installed a new server and updated their server software, WTC’s service calls went down to an average of .75 hours per month.  Not only was WTC losing money on service charges, they were losing money due to the downtime they were experiencing.

Technology by Design To The Rescue

“Once Technology by Design diagnosed the problems as stemming from our old server, it all happened very quickly – from discussion about what we needed specifically for our business, to the ordering, to the installation of the server, the upgrading from MS Server 2003 to MS Server 2011, and the migration of all of our files and data.  This decreased our service calls to IT, increased our productivity, increased our computer/network speed and efficiency, made our workplace more efficient, and made us more efficient.”

With Technology by Design, The Pressure’s Off

During the transition from the old server, to the new one, WTC staff experienced very little downtime.

“Technology by Design made sure we were kept up and running, and that our work day was interrupted as little as possible.  During the short time that we did not have a server, TbyD managed to connect us directly to the network so that we could keep working.  We were down for a very short period, if at all.  It was a much smoother transition than I expected.”

“Technology by Design has very friendly staff.  The processes and troubleshooting are explained in layman’s terms (in other words, easy-to-understand language).  TbyD is a one-stop shop that provides tech support, as well as hardware needs.  Technology by Design offers good suggestions re: software needs that we may not know about, and provide better efficiency for us.

We very much value our existing relationship with Technology by Design staff, and appreciate their honesty and integrity.

Absolutely I would recommend Technology by Design’s services to others.  Their integrity, honesty, and caring attitude is hard to find when it comes to IT support.”

Tracey Ediger, Office Manager/E.A.R.S. Program Coordinator, Winnipeg Transition Centre

Filed Under: Client Testimonials

ALERT: Held For Ransom

August 14, 2013 by The T By D Team Leave a Comment

A particularly effective scam is growing by the minute.  Though it’s not new, it’s been gaining “popularity” in the last few weeks.

The scam takes over the full screen of the computer, stating that the FBI has locked that PC until a fine is paid.  The computer may look locked down, but the culprit was a cyber-nasty criminal, not the FBI.

This is how your screen will look:

FBI Ransom Scam resized 600

DO NOT PAY!  This is malware on your computer.  Treat it as you should any malware, and clean your system.  The cyber-nasties have found that this is a very lucrative scam that works really well.  Scared PC users are often willing to pay hundreds of dollars to avoid getting in deep with the FBI.  More than $5 million per year is extorted from victims using this scam.

If you need help in freeing your computer of malware and/or viruses, call Technology by Design for an Optimization.  An Optimization deletes unnecessary temporary files, reorganizes your hard drive so your files are accessed faster, removes any malware and/or viruses from your system, and removes any unnecessary tool bars and software from you computer.  Long story short, it electronically cleans out and optimizes your computer so it can work at it’s full potential.  We have removed this malware, as well as many similar, hundreds of times.  This has saved our customers thousands of dollars.

As a rule, a workplace computer should be Optimized at least every 6 months.  Home computers, because of the nature of their use (and especially if you have kids or teens using it) should be Optimized more often.

Call Technology by Design at 204-800-3165 for more information.

Filed Under: ALERTS, Featured

August 2013 TechTips Newsletter

August 13, 2013 by The T By D Team Leave a Comment

August Newsletter
McDonalds blows their budget, urine fueled cellphones, and Sesame Street has street cred!

We also feature July’s trivia winner – Joe Jakab at Best-Way Cargo Management!

Get the newsletter by clicking here.

**************************************************************************

Skill testing question for coffee & donuts…
Answer the following trivia question by emailing answer@tbyd.ca.

Correct answers will be entered into our draw for FREE coffee and donuts!  Draw will be made on Monday August 26th.
Winner will be notified via email.
Multiple-Choice Question:  

Name the first animated character to get their own postal stamp in 1997?

In addition to the coffee & donuts (as if that wasn’t enough incentive!),the winning company will be featured in TechTips, on our blog, Twitter, and our Facebook page! 
If you know someone that would like, or would benefit from, the newsletter, feel free to forward it to them!

Your feature will reach over 2000 other people!
Remember Google is your friend – send your answers in to answer@tbyd.ca

***************************************************************************
Check out our blog at:  www.tbyd.ca for “Ask The Geek” where our resident Geek answers your questions, AND translates them from Geek-lish to English!
If you have a question for our resident Geek, email it to:  geek@tbyd.ca!

Like us on Facebook at:  facebook.com/TechnologybyDesign
Follow us on Twitter: @techbyd

Filed Under: Featured, TechTips Newsletter

Employees: How To Clear Your Internet Browser History. Employers: Why You Want To Monitor And/Or Restrict Internet Usage.

August 13, 2013 by The T By D Team Leave a Comment

Dear Geek,

I browse the Internet at work (during my breaks, of course).  Someone recently told me that the computer keeps a record of what I look up on the Internet.  I don’t want work to know I surf the net on my breaks.  Where is that record, and how can I wipe it out?  

Signed,

Just Browsing

Dear Just Browsing,

When you surf the ‘Net, each page you view is saved locally on your hard drive.  Your computer does this, because next time you visit that same website, the page will load faster by loading the files from your hard drive instead of having to download the website from scratch again.  To conserve hard drive space, or to keep their Internet browsing private, users may find it necessary to delete their Internet History.

INCOGNITO MODE:  If you feel the need to clear your Internet History often, you might want to consider browsing the Internet in “Incognito Mode”.    This is alternatively referred to as “Private Browsing”, “InPrivate Browsing”, “Private Window”, or less formally as “Porn Mode”.  Incognito Mode prevents any information from being stored locally on the hard drive (ie. when you visit any website, the text, video, etc that is loaded, or viewed, is stored on the computer.  In addition, any searches or forms that are filled out are stored in “AutoComplete” fields).  NOTE:  While in “Incognito Mode”, while nothing is stored on your computer, it doesn’t mean you are invisible to the internet.  Each page you visit will still recognize your IP address.

     Internet Explorer Users:  

Keyboard Shortcut = “Ctrl” + “Shift” + “P”

Or

1.  Click the “Safety” drop down menu.

2.  Click “InPrivate Browsing”.

     Chrome Users:

Keyboard Shortcut = “Ctrl” + “Shift” + “N”

Or

1.  Click the “Wrench”  or “Menu” Chrome Menu button icon in the top right corner.

2.  Click New “Incognito Window”.

     Firefox Users:

Keyboard Shortcut = “Ctrl” + “Shift” + “P”

Or

1.  Click “Tools”

2.  Click “Start Private Browsing”.

DELETE FROM ADDRESS BAR:  To individually delete items from your address bar, in the “Address Bar”  press the “Shift” + “DEL”.

VIEW YOUR INTERNET VIEWING HISTORY:  Click “Tools”, choose “Internet Options”.  Click “Settings” button under “Browsing History”, then click “View Files”.

TO DELETE YOUR INTERNET VIEWING HISTORY:  Press “Ctrl” + “Shift” + “DEL” to open the “Clear Browsing History” window.   OR Click “Tools” menu, choose “Internet Options”, and click “Delete Files” or “Delete” button.  Internet Explorer users also have the option of automatically deleting files each time you close the browser window by clicking the “Advanced” tab, and check the box next to “Empty Temporary Internet Files folder when browser is closed” under “Security”.

Following the steps above should clear your browsing history, and your conscience.  That said, you should check your workplace Internet Usage Policy.

BUSINESS OWNERS AND/OR EMPLOYERS NEED TO PAY ATTENTION:

What’s the harm in a little personal Internet surfing and emailing at work, on breaks or otherwise?  If you’re a business owner, you don’t want employees surfing the net, and checking out unauthorized websites.  Doing so can put your computer security at risk!  If you have employees with unmonitored access to email and the Internet, there are a number of activities they can participate in that can harm your business:

 1.  Bandwidth Costs:  Heavy graphics, video clips, and audio files are particularly notorious for clogging digital pipelines.  If your staff is emailing photos of their family vacations to their friends, paying bills online, or downloading music, they are using up a huge amount of expensive bandwidth and slowing down your organization as a result.

2.  Legal Liabilities:  70% of all Internet porn traffic occurs during the 9-to-5 workday (SexTracker), and 27% of Fortune 500 companies have been accused of sexual harassment stemming from inappropriate email and Internet usage.  The U.S. Supreme Court has ruled that companies can be held accountable for their employees forwarding offensive messages and viewing pornography.

3.  A Damaged Reputation:  A lawyer at a London firm forwarded email he received from a female acquaintance to several co-workers as a joke.  Unfortunately, they sent it on the a few of their friends and within a short period of time, thousands of people from around the world, including the press, received it.  Because of this email, the law firm ended up in a huge controversy that hurt their image and credibility.

4.  Loss of Production:  Email and the Internet offer a temptation that is hard to resist.  That’s why 73% of employees who use the Internet are fully aware that they are consuming valuable bandwidth and hampering critical business activities with inappropriate Internet usage – but do it anyway (see the letter above).

5.  Viruses and Spyware:  Employees can accidentally (or intentionally!) download harmful viruses and spyware through music files, screen savers, and other online files.

To find out what your business can do to protect your organization, call Technology by Design for an Email and Internet Usage Analysis.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

Updates: Should I Or Shouldn’t I?

August 7, 2013 by The T By D Team 1 Comment

Dear Geek,

I’m constantly getting pop-ups notifying me of updates.  I find it annoying to install them, as it takes time out of my day.  Do I have to install them?  

Signed,

Updated

Dear Updated,

Hackers use known vulnerabilities in OSs (Operating Systems) as loopholes to get into computer systems.  Many of the updates sent out by the OS manufacturers (ie Microsoft) that are marked “critical” are security-related.  This means that the update ‘patches’ a known flaw in the OS.  Because the updates could be fixing a vulnerability that a hacker has found, it’s a good idea to install the updates in the “Recommended” section.  At the very least, you should make certain to keep “Windows Update” active, so you’ll at least know about updates available to fix these OS loopholes.  Another reason to install updates is that they can sometimes add or improve features.  Microsoft also uses Windows Update to keep its software titles, such as Microsoft Office, up-to-date.  You can even allow Windows to automatically install updates, so you won’t need to do any manual work to install the updates.  Instead, you’ll just be alerted that Windows has installed the updates.

Technology by Design provides a monthly service for both workstations (computers) and servers, which automatically installs any updates required for your OS (Operating System) or 3rd party software without any disruption to your day.  Technology by Design provides updates for over 100 3rd-party software programs, such as Skype, iTunes, Flash, Java, Adobe Reader, Picasa, Spybot, DropBox, TeamViewer.  Depending on the package you choose, you could also receive a lower hourly service rate, quicker emergency response times, phone and remote support sessions, virus removal, optimizations (an electronic cleaning out of your computer to make it work its best), spyware monitoring and removal, an Executive Summary Report, a regular Review and Planning Meeting, and many other benefits.  What does this mean to you?  Depending on the package you choose, you could save up to (and above!) $2570/year for a computer, or $4640/year for a server!  That’s money that stays in your pocket!  If you add our Backup and Disaster Recovery package, the savings are incalculable.  To find out more on how Technology by Design can save your business money, call Earl at 204-800-3167.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

July 2013 Trivia Winner: Joe Jakab at Best-Way Cargo Management Inc.

July 30, 2013 by The T By D Team Leave a Comment

Congratulations to Joe Jakab at Best-Way Cargo Management Inc.

for winning Coffee & Donuts delivered to his workplace!

Located at Unit 5—935 McLeod Avenue, Best-Way Cargo Management Inc. has been in business since 2009.  They are a unique 24/7 operation, that prides itself in exceptional customer service.  We work with out clients to develop solutions based on their logistics/transportation requirements and their customer’s needs.

With vast experience in project work, they have assisted their clients in meeting delivery schedules and transportation budgets.

As a Transportation Intermediary, with extensive experience in Domestic, Transborder and International logistics, Best-Way Cargo Management Inc. has a strong competitive advantage in the industry.  They have the ability to individually meet their clients’ transportation objectives in a cost-effective, efficient manner that allows them to focus on their core business.

Consider Best-Way Cargo Management Inc. as one of your company’s service provider partners, and look forward to reviewing your company’s logistics needs in the very near future.  They can provide service rate and information in the following areas, depending on your company’s needs:

A) LTL or TL within Canada, between USA & Canada, Within USA (Decks, Vans, Reefers, Double Drops, Steps, Super B’s),

B) Single or Team service,

C) Overseas—Exports or Imports,

D) Warehousing & Distribution,

E) Work site deliveries/projects.

For more information, call Joe Jakab at 204-272-5622, or check out their website at www.best-waycargo.com

Don’t forget your entry for this month’s trivia for a chance to win coffee & donuts…delivered to your workplace!  PLUS, Your company will be featured In next month’s issue of TechTips, on our blog, and our Facebook page!

Your feature will reach over 2000 potential customers!!

Don’t forget your entry for this month’s trivia for a chance to win coffee & donuts…delivered to your workplace!  PLUS, Your company will be featured In next month’s issue of TechTips, on our blog, and our Facebook page!

Your feature will reach over 2000 potential customers!!

Filed Under: Trivia, Trivia Winners

June 2013 Trivia Winner: Ralph Abramson

July 30, 2013 by The T By D Team Leave a Comment

Congratulations to Ralph Abramson at

Treaty Aboriginal Rights Research Centre of Manitoba Inc. (T.A.R.R. Centre)

for winning Coffee & Donuts delivered to his workplace!

 

The Treaty Aboriginal Rights Research Centre, or T.A.R.R. Centre, has been in business since 1975.  They are a non-profit company, that works directly for most of Manitoba’s First Nations.

T.A.R.R. Centre provides historical research services to 51 First Nations of Manitoba.  Through the years, the focus has been on Aboriginal rights such as Treaty land entitlement, Treaty rights, hunting, fishing, trapping and gathering rights, and on Indian lands (reserve alienations, surrenders, leases and expropriations).  T.A.R.R. has been a part of the creation of the Specific Claims Tribunal (2006), with the power to make binding decisions on Land Claims of value up to $150 Million.

All Member First Nations are welcome to access their resources.  Non-First Nation members can receive photocopies at cost.  There are 3 T.A.R.R. locations:  Scanterbury, Thompson, and Winnipeg.  Head Office is located at  Brokenhead Ojibway Nation, Scanterbury, MB.

Technology by Design is currently responsible for handling all IT-related issues for T.A.R.R. Centre.

For more information, please contact Ralph at 204-943-6456, or email Ralph@tarr.mb.ca.

Don’t forget your entry for this month’s trivia for a chance to win coffee & donuts…delivered to your workplace!  PLUS, Your company will be featured In next month’s issue of TechTips, on our blog, and our Facebook page!

Your feature will reach over 2000 potential customers!!

Don’t forget your entry for this month’s trivia for a chance to win coffee & donuts…delivered to your workplace!  PLUS, Your company will be featured In next month’s issue of TechTips, on our blog, and our Facebook page!

Your feature will reach over 2000 potential customers!!

 

Filed Under: Trivia, Trivia Winners

ALERT: Christian Singles Scam

July 30, 2013 by The T By D Team Leave a Comment

The latest phishing scam preys on your curiosity.

The potential victim receives an email from “cara@ChristianMingle” which of course is a spoofed email address.  The email uses your first name in the email, to make you think it’s legit.  They usually start out with “Firstname, Ready to meet your newest match from ChristianMingle?”.  They then go on to state something similar to:  “meishac is 21 and lives in Hollywood, FL, USA.  Want to know more or see meishas photos?  Click here!”.

This is a TRAP.  DO NOT click on any of these links.  At the very least you will lose time, but most times, worse things happen, such as:

– Your computer will become infected with malware

– Your identity will be stolen

– Your bank account will be emptied.

DO NOT click on links in spam or phishing emails that make you curious!  Phishing scams rely on your curiosity to get you to click!

Filed Under: ALERTS, Featured

5 Steps to Troubleshooting Printer Troubles

July 30, 2013 by The T By D Team Leave a Comment

Dear Geek,

My printer suddenly stopped working.  I’m not sure if my printer’s calved, or if it’s a problem with my computer.  How can I tell?

Signed,

Calving

Dear Calving,

When you need a printer and it calves on you, it can put you into panic mode.  Especially since most people do all their editing on-screen, and wait to print until the last minute!

1.  The first step to solving this riddle, is to print a test page directly on the printer.  You can print an internal test page on most newer printers, by navigating through the menu system on the digital display (usually found under “Utilities”).

If your printer has this option, and you are unable to print the test page, the printer may be broken.  Then it’s either time to contact the manufacturer (if it’s under warrantee), or buy a new one.

2.  If you are able to print a test page, open up Windows’ “Printer dialog box” and print a test page from there.  This will tell you if there is a problem with communication between the computer and printer.  In Windows 7:  Click “Start”, select “Control Panel”, choose “Hardware And Sound”, and click “Printer”.  Right-click the specific printer that’s giving you problems, and click “Properties”.  Choose the “General” tab, and select “Print Test Page”.  In Windows 8:  Move the cursor to “Charms” bar, select “Search”, and click “Control Panel”.  Navigate the drop-down menu and select “View Device and Printers”.  Right-click the specific printer, and select “Printer Properties”, and click “Print Test Page”.

If the printer prints a test page, it indicates that the application (program) that you initially tried to print from, may be configured to use a different printer than you set up in Windows.

3.  If you change the printer in the specific program, and the printer still doesn’t respond, open up the “print queue dialog box”  that appears in the “Windows System Tray (located in the bottom right), to see if Windows can provide some reason for the problem.  It may tell you that a previous print job may paused, and preventing your job from printing.  Right-click the print job, select “Cancel Print Job” until your test print is at the top of the queue.  If the document fails to print, Windows should generate an error message (eg. “Windows Cannot Connect To The Printer”), which may help you determine the the cause of the problem.

4.  If the test page won’t print, it’s likely that, for some reason, you computer and printer are both working, but aren’t communicating with each other.  Check your cables or wireless connection.

5.  Last ditch effort:  Uninstall, then re-install, the printer in order to fix the problem.  Hopefully you still have the printer installation disks.  If not, you can usually go online to the manufacturer’s website and find the install software there.

Happy Printing!

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 32
  • 33
  • 34
  • 35
  • 36
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in