Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: Fake Invoices

October 15, 2013 by The T By D Team Leave a Comment

This week, CyberNasties are using a well-known social engineering trick to try to make company employees click on fake invoices to distribute a piece of malware.  This is especially nasty, because they are trying to reach employees that work in company finance departments.  They are hoping the employees either open the attachment, or get it forwarded by a co-worker that is not sure what it is so they send it to Accounting.

The emails are titled “Invoice #3404196 – Remit File”.  They contain the following (or something similar):  “The following is issued on the behalf of the Hong Kong Monetary Authority.  Attached is the invoice (Invoice_3604196 (dot).zip) received from your bank.  Please print this label and fill in the requested information.”

If anyone in your organization opens the attachment, a malware dropper may get downloaded, which will pull down a large amount of malware that allows the CyberNasties to take over the whole machine.

The Moral of the Story:  STOP – LOOK – THINK before you click.

Filed Under: ALERTS, Featured

Cold Computing

October 9, 2013 by The T By D Team Leave a Comment

Dear Geek,

The inevitable is coming, winter.  With the cold weather, should I be worried about leaving my laptop in my car or having my computer in a room that’s cold?

Signed,

Mr. Freeze

Dear Mr. Freeze,

The cold itself won’t damage your computer, however, drastic temperature changes from cold to warm can cause condensation in the computer, which can. For example, accidentally leaving a laptop in your car overnight during winter, bringing it inside, and immediately turning on to see if anyone has read the new chapter of your Star Wars fan-fiction isn’t a good idea.  Immediately turning the computer on once you bring it inside, can cause damage by condensation.
It’s best to avoid situations like this.  If it happens, it’s a good idea to leave your computer off for several minutes (at least 30 minutes, longer if it’s below zero) before turning it on. If the computer is a laptop, it’s a good idea to keep it in a laptop carrying case, so it has an extra insulating layer.
If you are really worried about the temperature, you can check with the computer manufacturer for their recommended operating temperatures.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

FBI: “Beta Bot” Malware Kills Your Antivirus & Steals Your Data

September 24, 2013 by The T By D Team Leave a Comment

This week the FBI sent out a warning that a commercial strain of malware known as “Beta Bot” can turn off your antivirus, stops access to the websites of antivirus vendors so that your antivirus program cannot call home for fresh definitions, and steals your user name and password when you log into your financial institutions, e-commerce sites, online payment platforms, and social networks.

The Beta Box malware masks itself as the “User Account Control” message box, but when you click on this box, it will infect your computer.  If the above pop-up message or a similar prompt appears on your computer and you did not ask for it, or are not making changes to your system’s configuration, do not authorize this fake “Windows Command Processor” to make any changes.

Beta Bot is commercial malware, meaning it was made by cyber criminals to be sold to other cyber criminals who can then use it to steal your personal information.  It also means the quality is very high, and it’s hard to get rid of when you PC gets infected.  So have another look at the screenshot above, as it is much easier to prevent this infection than cure it which will likely require a call to the helpdesk and lost production time, or a trip to your computer retailer so they can fix it.

Filed Under: ALERTS, Featured

How To Diagnose Printer Issues

September 18, 2013 by The T By D Team Leave a Comment

Dear Geek,

My printer isn’t printing.  How can I tell if my printer’s broken, or if it’s a problem with my computer?

Signed,

My Printer Ate My Homework!

Dear Best Excuse Ever!,

The bad news is your printer isn’t working.  The good news is that you (or your kids) now have an excuse why their homework isn’t done!  However, that excuse isn’t going to work forever, so one of the first things to do when your printer isn’t working, is to print a test page directly on the printer.  Most new printers make it easy to print an internal test page through the menu system built into a digital display on the printer itself.  Usually, you can find it under the “Utilities” page of the settings.  If it won’t print the test page directly from the printer, it may be broken.  If it’s new, contact the manufacturer.  If it’s not, it’s most likely cheaper to buy a new printer than to have that one fixed.

If your printer prints a test page, it’s time to move onto the computer.  Open Windows’ “Printer” dialogue box, and print a test page from there.  Doing this checks if there is a communication problem between the computer and printer.

Windows 7:  Go to “Start”, select “Control Panel”, then “Hardware and Sound”, then “Printer”.  Right-click the printer you want to                 test, and click “Properties”.  Choose the “General” tab, and click “Print Test Page”.

Windows 8:  Move the cursor over the “Charms” bar, select “Search”, and click “Control Panel”.  Select “View Device and Printers”                 from the drop-down menu.  Right-click your printer, click “Printer Properties”, then click “Print Test Page”.  If there is no “Print Test         Page” button, you can open a different program (eg word processor, etc), and click “Print” under “File”.

If the printer starts working, check the printer configuration (which printer is chosen to print to) in the program you were trying to print from originally.  If the printer still isn’t working, open up the “Print Queue” dialogue box in the “Windows System Tray”, in the bottom right-hand corner, to see if Windows can provide a reason for the problem.  Sometimes a previous print job is the culprit (document was paused & is in the queue ahead of your print job).  If this is the case, right-click the print job and select “Cancel Print Job” until your test print is at the top of the queue.  If the document still fails to print, Windows should automatically generate an error message that may help explain the issue (eg. “Windows cannot connect to the printer”.  If the test page won’t print it’s likely that, for whatever reason, your computer and printer are both working but aren’t communicating with each other.  Check all cables and/or wireless connections.  If all cables and/or wireless connections are secure, as a last resort you can uninstall the printer, then reinstall it.  This should fix the problem.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

September 2013 TechTips Newsletter

September 16, 2013 by The T By D Team Leave a Comment

September Newsletter
Spider clones invade the earth, Google has their wings clipped, Christmas comes early!AND…
How to Geek out your pencil box (or pocket protector)!

We also feature August’s trivia winner:
Perry Grosshans at Winnipeg International Writers Festival!
The Festival runs September 20-28, 2013.  Check out www.thinairwinnipeg.ca.
Get the newsletter by clicking here.

**************************************************************************

Skill testing question for coffee & donuts…
Answer the following trivia question by emailing answer@tbyd.ca.

Correct answers will be entered into our draw for FREE coffee and donuts!  Draw will be made on Friday September 27th.
Winner will be notified via email.
Multiple-Choice Question:  Which one of the A-Team was a pilot?

In addition to the coffee & donuts (as if that wasn’t enough incentive!),the winning company will be featured in TechTips, on our blog, Twitter, and our Facebook page! 
If you know someone that would like, or would benefit from, the newsletter, feel free to forward it to them!

Your feature will reach over 2000 other people!
Remember Google is your friend – send your answers in to answer@tbyd.ca

***************************************************************************
Check out our blog at:  www.tbyd.ca for “Ask The Geek” where our resident Geek answers your questions, AND translates them from Geek-lish to English!
If you have a question for our resident Geek, email it to:  geek@tbyd.ca!

Like us on Facebook at:  facebook.com/TechnologybyDesign
Follow us on Twitter: @techbyd

Filed Under: Featured, TechTips Newsletter

Mouse Extras: What To Look For

September 11, 2013 by The T By D Team Leave a Comment

Dear Geek,

My mouse finally bit it.  Is there something new & improved out there that I should be aware of?

Signed,

Mouse Bites the Cheese

Dear Cheesy,

When it comes to choosing a mouse, you wouldn’t think there would be much choice out there.  However, with the evolution of computers, also comes the evolution of mice (mouses?).  Wired vs wireless, small and portable vs larger & more comfortable; basic two-button vs luxury version with extra configurable buttons (usually used for gaming).  When shopping for a new mouse, it’s best to know what you need (or want) before you go shopping.

First of all, you’ll want to know if you need a right-handed mouse, or left-handed (or ambidextrous – for both lefties and righties).  No matter which model and/or extras you want, you’ll want to check out the mouse’s DPI (dots per inch) rating.  This is a measure of the mouse’s optical (or laser) beam.  If you’re just doing general computer work, it may not make a difference to you.  However, if you are using programs that require precision (e.g. graphics programs), you’ll want a high DPI, as the higher the DPI, the more accurate your mouse movements will be.

Another factor to consider is comfort.  Everyone’s hand is shaped differently, and everyone holds their mouse differently.  You’ll want test drive the mouse out to see how comfortable it is for you.  Especially if you’re using it for long periods of time.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

How To Password Protect Files and Folders In Windows

September 4, 2013 by The T By D Team Leave a Comment

Dear Geek,

My computer at home is a family computer.  I want to keep a daily journal, but don’t want anyone else to have access to it.  How do I password protect the file?

Signed,

Secretive

Dear Secretive,

Before password-protecting any document, you might want to create a backup of the non-password protected folders and/or files in case you forget the password.

The majority of Microsoft Windows operating systems do not come with a method of password protecting your sensitive files and folders.  If you’re using Microsoft Windows 3.x, Windows 95, or Windows 98…you really need to upgrade.  Plus, you’ll have to download or purchase a 3rd-party program to password protect your files and folders in Windows.  If you’re using one of those operating systems, skip down to “Other Security Solutions” to find some security solutions.

Microsoft XP Professional Users:  

These steps are for users that are using a computer that has different user accounts set up on it.  If you’re using a single user account for all users that use the computer, skip down to “Other Security Solutions”.

1.  Select the folder you wish to encrypt (aka password protect).

2.  Right-click the folder and click ‘Properties’.

3.  Click the ‘Advanced’ button.

4.  Check ‘Encrypt Contents to Secure Data’ box.

5.  Click ‘Apply’, then ‘Ok’.

Microsoft Windows XP Home Edition Users:

1.  Select the folder you wish to encrypt.

2.  Right-click the folder and click ‘Properties’.

3.  Click the ‘Sharing’ tab.

4.  Check ‘Make This Folder Private’ box.

5.  Click ‘Apply’, then ‘Ok’.

On a side note:  XP will no longer be supported after April 2014, so if you don’t want your system to be ultra-vulnerable to hackers, I advise upgrading.

Other Security Solutions for Protecting Your Files And Folders in Windows

Files and Folders Not Frequently Used

If you need to password protect files/folder you do not frequently use, one of the simplest ways is to compress the folder and files with a compression utility and password protect the compressed file.  However, each time you want to modify the files, you will need to uncompress the files using the password.

Windows ME and Windows XP Users:  Microsoft Windows ME and Windows XP come with their own compression utility.  This utility      can also be used to compress and password protect files.

Note:  When a file is compressed, users can still view a listing of the files in the compressed file.  If you want both file names and content hidden, move all files into a single folder and password protect that folder.

Files and Folders Frequently Used or Accessed

If you need to password protect or encrypt data you frequently use, you will need to install a third-party program that will enable you to protect your files and folders.  You can check out the free and/or commercial solutions below:

AxCrypt:  A free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a password is known.

WinCry:  A freeware utility that enables your files to be encrypted, secure deletion, as well as other security method for protecting your files.

Folder Guard:  A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.

Things To Remember When Encrypting or Password Protecting Files and Folders:

1.  There is no such thing as a 100% protected file.  There are numerous tools, utilities, and instructions for how to break a lot of the encryption and passwords on files.  If your data is extremely sensitive, we suggest a commercial product for protecting your files and data.

2.  Even though a file or folder may be password protected it can still be deleted, unless the program supports the ability to protect files from being deleted.  Always remember to backup all your files, even those protected by passwords.

3.  If you forget the password, unless you’re willing to spend the time attempting to break it or pay someone else to break the password, all your data will be lost.  Make sure you’ve made a backup of the non-password protected data.

To find out what your business can do to protect your organization, call Technology by Design for an Email and Internet Usage Analysis.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

*TbyD assumes no responsibility for any 3rd party programs.  Any use of 3rd-party programs is at your own risk.

 

Filed Under: FAQ, Featured

ALERT: Held For Ransom

August 14, 2013 by The T By D Team Leave a Comment

A particularly effective scam is growing by the minute.  Though it’s not new, it’s been gaining “popularity” in the last few weeks.

The scam takes over the full screen of the computer, stating that the FBI has locked that PC until a fine is paid.  The computer may look locked down, but the culprit was a cyber-nasty criminal, not the FBI.

This is how your screen will look:

FBI Ransom Scam resized 600

DO NOT PAY!  This is malware on your computer.  Treat it as you should any malware, and clean your system.  The cyber-nasties have found that this is a very lucrative scam that works really well.  Scared PC users are often willing to pay hundreds of dollars to avoid getting in deep with the FBI.  More than $5 million per year is extorted from victims using this scam.

If you need help in freeing your computer of malware and/or viruses, call Technology by Design for an Optimization.  An Optimization deletes unnecessary temporary files, reorganizes your hard drive so your files are accessed faster, removes any malware and/or viruses from your system, and removes any unnecessary tool bars and software from you computer.  Long story short, it electronically cleans out and optimizes your computer so it can work at it’s full potential.  We have removed this malware, as well as many similar, hundreds of times.  This has saved our customers thousands of dollars.

As a rule, a workplace computer should be Optimized at least every 6 months.  Home computers, because of the nature of their use (and especially if you have kids or teens using it) should be Optimized more often.

Call Technology by Design at 204-800-3165 for more information.

Filed Under: ALERTS, Featured

August 2013 TechTips Newsletter

August 13, 2013 by The T By D Team Leave a Comment

August Newsletter
McDonalds blows their budget, urine fueled cellphones, and Sesame Street has street cred!

We also feature July’s trivia winner – Joe Jakab at Best-Way Cargo Management!

Get the newsletter by clicking here.

**************************************************************************

Skill testing question for coffee & donuts…
Answer the following trivia question by emailing answer@tbyd.ca.

Correct answers will be entered into our draw for FREE coffee and donuts!  Draw will be made on Monday August 26th.
Winner will be notified via email.
Multiple-Choice Question:  

Name the first animated character to get their own postal stamp in 1997?

In addition to the coffee & donuts (as if that wasn’t enough incentive!),the winning company will be featured in TechTips, on our blog, Twitter, and our Facebook page! 
If you know someone that would like, or would benefit from, the newsletter, feel free to forward it to them!

Your feature will reach over 2000 other people!
Remember Google is your friend – send your answers in to answer@tbyd.ca

***************************************************************************
Check out our blog at:  www.tbyd.ca for “Ask The Geek” where our resident Geek answers your questions, AND translates them from Geek-lish to English!
If you have a question for our resident Geek, email it to:  geek@tbyd.ca!

Like us on Facebook at:  facebook.com/TechnologybyDesign
Follow us on Twitter: @techbyd

Filed Under: Featured, TechTips Newsletter

Employees: How To Clear Your Internet Browser History. Employers: Why You Want To Monitor And/Or Restrict Internet Usage.

August 13, 2013 by The T By D Team Leave a Comment

Dear Geek,

I browse the Internet at work (during my breaks, of course).  Someone recently told me that the computer keeps a record of what I look up on the Internet.  I don’t want work to know I surf the net on my breaks.  Where is that record, and how can I wipe it out?  

Signed,

Just Browsing

Dear Just Browsing,

When you surf the ‘Net, each page you view is saved locally on your hard drive.  Your computer does this, because next time you visit that same website, the page will load faster by loading the files from your hard drive instead of having to download the website from scratch again.  To conserve hard drive space, or to keep their Internet browsing private, users may find it necessary to delete their Internet History.

INCOGNITO MODE:  If you feel the need to clear your Internet History often, you might want to consider browsing the Internet in “Incognito Mode”.    This is alternatively referred to as “Private Browsing”, “InPrivate Browsing”, “Private Window”, or less formally as “Porn Mode”.  Incognito Mode prevents any information from being stored locally on the hard drive (ie. when you visit any website, the text, video, etc that is loaded, or viewed, is stored on the computer.  In addition, any searches or forms that are filled out are stored in “AutoComplete” fields).  NOTE:  While in “Incognito Mode”, while nothing is stored on your computer, it doesn’t mean you are invisible to the internet.  Each page you visit will still recognize your IP address.

     Internet Explorer Users:  

Keyboard Shortcut = “Ctrl” + “Shift” + “P”

Or

1.  Click the “Safety” drop down menu.

2.  Click “InPrivate Browsing”.

     Chrome Users:

Keyboard Shortcut = “Ctrl” + “Shift” + “N”

Or

1.  Click the “Wrench”  or “Menu” Chrome Menu button icon in the top right corner.

2.  Click New “Incognito Window”.

     Firefox Users:

Keyboard Shortcut = “Ctrl” + “Shift” + “P”

Or

1.  Click “Tools”

2.  Click “Start Private Browsing”.

DELETE FROM ADDRESS BAR:  To individually delete items from your address bar, in the “Address Bar”  press the “Shift” + “DEL”.

VIEW YOUR INTERNET VIEWING HISTORY:  Click “Tools”, choose “Internet Options”.  Click “Settings” button under “Browsing History”, then click “View Files”.

TO DELETE YOUR INTERNET VIEWING HISTORY:  Press “Ctrl” + “Shift” + “DEL” to open the “Clear Browsing History” window.   OR Click “Tools” menu, choose “Internet Options”, and click “Delete Files” or “Delete” button.  Internet Explorer users also have the option of automatically deleting files each time you close the browser window by clicking the “Advanced” tab, and check the box next to “Empty Temporary Internet Files folder when browser is closed” under “Security”.

Following the steps above should clear your browsing history, and your conscience.  That said, you should check your workplace Internet Usage Policy.

BUSINESS OWNERS AND/OR EMPLOYERS NEED TO PAY ATTENTION:

What’s the harm in a little personal Internet surfing and emailing at work, on breaks or otherwise?  If you’re a business owner, you don’t want employees surfing the net, and checking out unauthorized websites.  Doing so can put your computer security at risk!  If you have employees with unmonitored access to email and the Internet, there are a number of activities they can participate in that can harm your business:

 1.  Bandwidth Costs:  Heavy graphics, video clips, and audio files are particularly notorious for clogging digital pipelines.  If your staff is emailing photos of their family vacations to their friends, paying bills online, or downloading music, they are using up a huge amount of expensive bandwidth and slowing down your organization as a result.

2.  Legal Liabilities:  70% of all Internet porn traffic occurs during the 9-to-5 workday (SexTracker), and 27% of Fortune 500 companies have been accused of sexual harassment stemming from inappropriate email and Internet usage.  The U.S. Supreme Court has ruled that companies can be held accountable for their employees forwarding offensive messages and viewing pornography.

3.  A Damaged Reputation:  A lawyer at a London firm forwarded email he received from a female acquaintance to several co-workers as a joke.  Unfortunately, they sent it on the a few of their friends and within a short period of time, thousands of people from around the world, including the press, received it.  Because of this email, the law firm ended up in a huge controversy that hurt their image and credibility.

4.  Loss of Production:  Email and the Internet offer a temptation that is hard to resist.  That’s why 73% of employees who use the Internet are fully aware that they are consuming valuable bandwidth and hampering critical business activities with inappropriate Internet usage – but do it anyway (see the letter above).

5.  Viruses and Spyware:  Employees can accidentally (or intentionally!) download harmful viruses and spyware through music files, screen savers, and other online files.

To find out what your business can do to protect your organization, call Technology by Design for an Email and Internet Usage Analysis.

If you have a question for our Resident Geek, send it to:  geek@tbyd.ca.  We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 24
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in