Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Popup Dilemma

July 24, 2012 by The T By D Team Leave a Comment

Question:

Sometimes when I’m online, a website says that I need to disable my “popup blocker” to continue using the site.  What is a “popup blocker”?

Answer:

Popular during the 90’s, popups were browser windows that opened when you visited certain webpages.  Especially if you frequented ‘questionable’ websites, then you’d spend more time closing these popups than checking out the website content.  Now your browser has got a built-in “popup blocker”, which prevents unwanted popups from polluting your eye candy.  However, it also sometimes prevents you from opening windows that you actually want to open.

When a popup blocker prevents a window from opening, a message will show up somewhere on your monitor.  It will likely have an option for you to allow the popup window to open temporarily.  If it doesn’t offer this temporary option, you will have to manually disable the blocker.

To manually disable you popup blocker, click on the “Options”, “Settings”, or “Preferences” portion of your browser’s toolbar, and look for a popup blocker setting.  Alternatively, you can check your browser for the same options.

If you have manually turned off your popup blocker, don’t forget to turn it back on after you’re done, or you may end up with an eye-full!

Filed Under: FAQ

Time To Clear the Air…

July 16, 2012 by The T By D Team Leave a Comment

Question:

My computer tower is stored under my desk, so I don’t look at it very often.  I happened to drop something under my desk today, and saw my computer tower for the first time since…well, probably since I stuck it under there 6 months ago.  It looks like 2 dust bunnies were going at it like…well, like rabbits (c’mon, you knew that one was coming, right?) under there!  I know you can use ‘canned air’ to clean it out, but how?

Answer:  

When your computer tower looks like it was taken over by bunnies of the dust variety, you’re right, it’s time to clean!  A dusty tower can slow your computer, make it hard for your fan to cool the tower, and put your computer at risk!  If there’s dust on the outside, there’s bound to be dust inside.  To avoid a bunny-inspired computer meltdown follow these quick & easy steps:

1.  Before you tackle the inside of the tower, turn the power off, and unplug the main power cord.

2.  Disconnect the mouse and keyboard cords (if you haven’t gone wireless yet), as well as any other cables, from the back of the tower if there is heavy dust present.

3.  Remove the dust from the outside of your computer tower.  This way you’ll avoid kicking up dust, and your computer tower drawing the dust air in AFTER you’ve already cleaned the inside.

4.  Remove both side panels from the case, if possible.  Use a screwdriver if needed.

5.  Use an antistatic wrist strap, if you have one.  It will help to discharge the electricity that’s built up in the tower.  If you don’t have one, touch a metal part on the outside of the case, and this should discharge built-up electricity.  Do not touch any parts inside until you have done this!

6.  A can of compressed air (available in any office supply store, or big chain store that sells computer accessories) works great to get the majority of the dust out of your tower.  And, at a few dollars a pop, they also work well for cleaning out keyboards.

7.  Aiming from the inside of the tower to the outside, spray the compressed air using short bursts.  Blow the air (and dust/debris) from inside the case towards the vents and grilles.

8.  Move from the top of the case to the bottom, hold the can of compressed air several inches from any components, to prevent condensation from forming.

9.  DO NOT blow compressed air directly into a CD, DVD, or floppy diskette (ask you parents what this is) drive.

10.  Ensure that you clear the dust from the fan blades.

11.  Re-attach the side panels of the case.

Quick & easy, and no more dust bunny invasion!  I’m betting, if your tower is as dusty as it sounds, that you will notice a significant improvement in its performance.

If you have a question for our Resident Geek, send it to geek@tbyd.ca.  We’ll answer it, and translate it from Geek-lish to English for you!

 

 

Filed Under: FAQ

Protect The Keys to The Kingdom…and Other Security Measures

July 10, 2012 by The T By D Team Leave a Comment

Question:

Hackers, malware, viruses, phishing scams…there are so many ways that people can get into your computer and jeopardize your computer and it’s data.  What can I do to prevent all of this?

Answer:

There are many assaults on your computer’s security these days, and the consequences of not having a secure computer is huge.  Here are 6 vital steps that will help to keep your computer locked up tight…and your data safe from those pests:

1.  Block Malware

One of the most important things on your security list for any computer, is to make sure it’s running antivirus software.  With many free options, as well as paid ones, there really is no excuse not to.  Of course, with so many options, comes different security features.  Some features that are a must-have are real-time protection and frequently updating virus definitions.  These updates are usually very small, so they don’t take much time or energy when downloading/installing, but they are an easy way to make sure that your system is protected from the latest malware out there.

2.  Stay Current

Security is constantly being updated.  So it’s very important to keep your PC updates coming by turning on automatic updating.  To do so, click “Start”, then “Control Panel”, then “System And Security”.  Then, on the hyperlink underneath “Windows Update”, click the “Turn Automatic Updating On Or Off”.  Then choose the “Install Updates Automatically” option.

3.  Change Your Passwords Regularly

Your passwords are the keys to your PC kingdom, and they should be protected as such.  If you use one single password for all your PC applications (banking, social networks, email, etc) then you’re putting yourself (and your information) at risk by making it easy for hackers to access everything once they hack the one password.  Pick 3 or 4 passwords, making them difficult to guess by using upper & lowercase letters, as well as numbers.  The more characters in your password, the more secure.  If you use several passwords that are hard to remember, you can use a ‘Password Manager’ (see blog titled “Magic Password, Please…”).

4.  Secure Your Wi-Fi Network

Your Wi-Fi network provides an open invitation to anyone driving by to have access to your PCs, notebooks or devices.  To prevent this, you need to enable your router’s security protocols.  Most routers support WPA (Wireless Protected Access) or WPA2 encryption.  WEP (Wireless Encryption Protocol), is an older technology (aka more vulnerable), but it can be used if no other option is available…it’s better than nothing!  To enable these protocols, you have to log into your Router’s setup utility using a browser and the router’s IP address.  You may need consult your router manual (yes…directions!).  From there you will choose your security type, and input a password (don’t choose the same one you use for everything else!).  By doing this, any device attempting to access your network will have to use this password.

5.  Permanently Delete Files

We create and destroy computer files daily.  BUT are they really being destroyed?  Getting rid of files (especially sensitive ones) is vital to your computer’s security, and dumping them in your recycle bin doesn’t cut it.  Even if you are diligent about regularly emptying the recycle bin, it still does not ensure the security of your computer.  Hackers have their ways of finding and recovering those files.  To ensure that deleted files are deleted permanently, you need a third-party application.  Unfortunately, you’ll have to pay for this, but it’s much cheaper than having some hacker find and use those sensitive files!  You can try WebMinds’ ‘Easy File Shredder’ (www.easyfileshredder.com).  This program ensures that those deleted files stay deleted.  It also protects your whole disk drive and lets you shred files on USB and SD cards.

6.  Enable User Account Control

User Account Control is the security that notifies you anytime a program or user attempts to make changes to Windows settings or to install something on your PC.  To access User Account Control, click “Start”, then “Control Panel”, then “System And Security”.  Then find the “Action Centre” section at the top of the window, and click “Change User Account Control Settings”.  The settings with the maximum security for your PC is “Always Notify” and “Default”.  Only users that run applications not certified for use on Windows 7, are recommended to drag the slider to the bottom two settings.

By making sure you follow this short list, you are ensuring that your PC is more secure against the ne’er-do-wells out there that are bound & determined to find your favorite pasta recipe that is saved on your computer…or your banking information.

If you have a question for our resident geek, email geek@tbyd.ca.  We’ll answer your question…AND translate it from geek-lish to English!

 

Filed Under: FAQ

Magic Password, Please…

July 3, 2012 by The T By D Team Leave a Comment

Question:

We’re constantly told NOT to use the same password for everything.  However, with so many passwords, it’s impossible to remember them all!  Is it safe to store all my different usernames & passwords in a spreadsheet, if it’s password-protected?

Answer:

With all the abundance of hacking, phishing, viruses, etc, security is a hot topic these days.

The answer to your question really boils down to your comfort level.  Does the spreadsheet contain ultra-important information (eg bank account passwords, passwords to online retailers that store your credit card information)?  Do you connect to public networks?  How strong is your computer security system?  Do you use a hardware firewall (in your router), a software firewall, as well as antivirus software (that is up-to-date)?

You can use a “password manager” that can store AND encrypt your passwords.  These programs can recognize when you pay a visit to a website, and automatically inputs your username and password.  Some are capable of handling the multi-check logins that banks use.  They often include password generators that can create long, secure passwords (the ones that are impossible to remember) for each of your logins.

You are right to use multiple (different) passwords for each application.  Those that use the same password for each of their applications, do have an easy time of remembering their password.  However, they run a HUGE risk of having a malicious user break that single password which opens up every single one of that person’s applications.

An important thing to keep in mind about online retailers is that they may have access to your password.  So if you complain about a company online, make sure you use different passwords for that company’s site and the site on which you post your comments.  Or you may be providing that company with the opportunity to access your posts and “edit” them.

Email your question for our resident geekto:  geek@tbyd.ca!

Filed Under: FAQ

Troubled Nigerian Prince? – Scammers Are Smarter Than Their Emails Look

June 25, 2012 by The T By D Team 1 Comment

Question:

I get so many of those stupid emails from ‘troubled princes’ or ‘a long-lost relative’, ALWAYS asking for money.  I know they’re scams, but ….don’t they know how to spell??  Almost every 2nd word is spelled wrong, not to mention the grammar.  Are these guys dumb, or what??  And how do people keep falling for these scams??

Answer:

Everyone has gotten at least one email from a troubled Nigerian prince, a long-long relative, or a damsel in distress who needs money to fly home…and instantly trashed the email.  These emails are instantly recognizable, with their unbelievable stories, and their typo-filled run-on sentences…and they always offer you a HUGE reward, if only you help them in their hour of need.  Most people recognize these emails as scams.

So why don’t these lowlifes learn how to spell, and write better, more convincing emails?  Wouldn’t they get more people to fall for their scam?

Apparently the lowlifes that write these emails are smarter (and I use that term loosely) than we think.  The poor spelling and lousy sentence structure actually HELP them to find the poor saps that will actually send money to these guys!  According to Cormac Herley (principal researcher at Microsoft Research’s Machine Learning Department), who wrote a research paper on the subject (you can read it if you want, but it contains headache-inducing math) “By sending an email that repels all but the most gullible the scammer gets the most promising marks to self-select”.

Basically, this means that by sending emails which are full of spelling and grammar mistakes, along with ‘known’ scam plots or extremely unbelievable plots (ie  the Nigerian prince), they weed out the skeptics and others that wouldn’t easily believe that a total stranger would send them millions in exchange for a ‘small’ fee.  By weeding out these people that wouldn’t ever believe their unbelievable plot, they (the scammers) can then focus on those poor saps who are most likely to believe the unbelievable, and proceed to lure them into their schemes.  By using the thoroughly scam-like emails for the initial contact, the scammers avoid wasting their valuable time communicating with people who would likely recognize the scam for what it is before they buy in completely.

The moral of the story?  Don’t underestimate the lowlifes behind The ‘troubled Nigerian Prince’.  They are smarter than their emails indicate.  AND (unfortunately) they know exactly who they are targeting with these emails.

 

 

Filed Under: FAQ

“Pimped” Gaming Computer Claustrophobic

June 18, 2012 by The T By D Team 1 Comment

Question:

I just got a new computer tower, pimped up for gaming.  The manual (yes, I read the instructions!) says I need to put it somewhere with a specific amount of space.  Can’t I just put it where my old tower was?

Answer:

Congrats on your new computer.  And condolences to your family, they likely won’t see you except for bathroom breaks (unless you take an empty coffee can with you…and we won’t go there!).

Computer towers today, especially the “pimped up” ones generate a lot of heat.  That heat needs to be removed from the tower, and cooler air needs to be pulled inside the tower to replace it.  When you put a computer tower in a small space, the fan can’t vent the heat properly.  Also, when the tower attempts to pull in cool air, the air it pulls in tends to be the same hot air it just vented out.  This results in overheating…and possibly a short life for your new “pimped up” computer.

The best thing for the life of your computer (and your gaming) is to always follow the manufacturer’s suggestions, and make sure you don’t block the air intake vents.  Happy gaming!

If you have a question for our resident geek, email it to geek@tbyd.ca!

 

Filed Under: FAQ

Free Security Software Is Good Enough…Isn’t It?

June 11, 2012 by The T By D Team Leave a Comment

Question:

I’ve been using free security software.  My buddy tells me that his security software is better, because he pays for it.  Who’s right?

Answer:

Free software is available all over the internet, including security (aka anti-virus) software.  Some of the freebie anti-virus software (most notable Avast) work just as good as some of the programs you can buy.  However, if you want the most effective anti-virus products out there, you’re going to have to shell out some bucks.  Security products from Norton, Kaspersky and Trend Microbrands tend to prevent or remove more infections more often than free security products available from Microsoft and AVG.  Keep in mind that NO anti-virus product is 100% effective, despite what the manufacturers claim.

While we’re on the subject of security, let’s talk firewalls.  You may think shelling out for personal firewall software isn’t necessary, after all your broadband router likely has a built-in firewall, along with Windows.  Both are fairly good at fending off incoming attacks.

However, cyber-criminals like tricking people into connecting to infected websites.  By connecting to the infected website, you are allowing the website to infect your computer with malware.  This malware steals personal information and/or data from your computer, and sends it out to the world wide web for all to see (those that know where to look).  Unfortunately your broadband firewall will not prevent this.  Neither will your Windows firewall.

A good, value-for-money solution is to buy an “internet security suite”, which usually combines the anti-virus with a better firewall.  This powerful firewall is capable of detecting unwanted connections coming from your computer, and you stand a much better chance of preventing theft of your information or data.

If you have a question for our resident geek, email geek@tbyd.ca.

Filed Under: FAQ

Security Email or Scam?

May 28, 2012 by The T By D Team Leave a Comment

Question:

I recently received an email stating that my security software (it mentioned my security software by name) needs to be updated.  It included an attached file, which it asks me to open, in order to update Norton.  I haven’t opened it yet, because of recent scams involving attachments.  Is this a scam too?

Answer:

Short answer – YES.  Good call on not opening the attachment, it most likely contains malware.  DELETE THE EMAIL IMMEDIATELY.  Then, you will want to run a virus scan, after updating its virus definition lists.

Open the antivirus software and initiate an update check from within the program.  With most software, you will find an “Update” button.  Click it and install any updates it suggests.

Your antivirus software can be trusted to locate legitimate updates.  So don’t trust emails that claim to know that your computer is infected or that your antivirus software is out of date.  Even if the email appears to come directly from the publisher of your antivirus software.

It’s prudent to beware of “official”-looking emails that ask you for your account number.  If you think the email is legit, DO NOT CLICK ON THE LINK.  Instead, open your account the way you normally would (enter the address for the site’s main page into your browser’s address bar, and log in).  The main page should point you to any issues you should be aware of.

Filed Under: FAQ

How Do I Provide a “Screenshot”?

May 24, 2012 by The T By D Team 1 Comment

Question:

I have an error message on my screen, and my IT provider wants me to send him a “screen shot” of the error message.  How do I do this?

Answer:

Many IT people prefer to see the error message for themselves, as sometimes things are lost in translation.  By sending your IT provider a “screen shot”, or picture of the image on your screen, he/she can see the exact error message for themselves.

Providing a screen shot is as simple as pressing the “PRTSCN” key, found on your keyboard, usually by the backspace key.   Then paste the image into a document by pressing “CNTRL” & “V” (at the same time).  This will provide an image of the entire screen.

If you want to provide an image of a portion of your screen, click “START”.  Then type “Snip” into the search field.  Click the “Snipping Tool” when it appears.  This way you can choose the shape (free-form or rectangular) and size (window, or full-screen) of the screenshot.

Filed Under: FAQ

Hi-Tech Backyard Entertainment

May 2, 2012 by The T By D Team Leave a Comment

Question:

What would the right router be for us. We run the following devices on a home network:  PS3, Xbox360, WII, 2 PCS, iPAD, cell phones, internet on the Panasonic TV.  We also want to be able to connect wirelessly when we are in the back yard so it should have a very long range.

Answer:

Backyards entertainment used to entail a sprinkler, a stereo brought outside, and some brews.  These days, people want more entertainment available to them while they soak up some rays lounging by the BBQ, or surfing channels from the living room couch.  However, everyone wants more bang for their buck, and to be able to use their home devices no matter where they are…inside the home, or in the backyard.

Our resident geek suggests:

We’ve had good luck with this one which is approximately $139
http://ca.asus.com/en/Networks/Wireless_Routers/RTN56U/
You could purchase another, or one with a few less options and use it as an access point placed close to a wall near the back yard, or if you really wanted to get fancy, we could install an outdoor access point for the best signal.
Tip:  Be sure to read our previous blog on securing your Wi-Fi network, to ensure you don’t have any unwanted guests accessing your network!

 

Filed Under: FAQ

  • « Previous Page
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in