Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

FAQ

FAQs

Got a question about computers or technology?

This is where you find real answers…for real people!Questions and Answers

This is where you will find some of our most common questions and emails we receive, as well as things we think you’d like to know.

Answer Writing
The Resident Geek answers all your questions, in plain, easy-to-understand, non-geeky language. 

Got a Question2Have a question for the Resident Geek?  Email:  geek@tbyd.ca.

 

credentials-theftHow Employees Help Bad Guys Steal Credentials

How exactly do CyberCriminals gain access to a company’s network?

Read More…

How to be an Easy Hacker Targethacker

How Hillary Clinton’s server got hacked, and how you can learn from it.

Read More…

Facebook vs AdBlock Plusfb-vs-adblock-plus

Is it a case of Robin Hood fighting for the good of the people…or is there deeper motivation?

Read More…

brand new computer with tft monitor in modern classroom at school

Budgeting for Technology

Budgets are hard at the best of times.  Budgeting for technology can be just plain painful.  We help take the pain and confusion out of I.T. budgets!

Read More…

network server room routers and cables

Why Replace Old Servers?

Read More…

You’ve Been Scammed:  Now What?Youve Been Scammed

Read More…

Ransomware
Ransomware:  What You Can Do To Prevent It

Read More…

iPhone Photos1 How to Take Better iPhone Photos

Read More…

The Worst Passwords of 2015password 2

Read More…

What Are Viruses, Trojans, Worms, and Other Malware?  science_1000009285-120613int

What they are, what they actually do, and how to avoid them!

Read More…

Use This Trick to See if Your Fb Account Was Hacked!

We tell you if it works, and whyMark Zuckerberg

Read More…

On the Hook for Hackers?

Why you could be on the hook for being hacked!Hooked for Hackers

How easy it is to let your I.T. security lapse, and how to avoid it!

Read More…

CyberSecurity:  What, Me Worry?Worry

We take on 2 of the most common excuses not to worry about your network security.

Read More…

BSoDConquer the Blue Screen of Death!

Read More… 

Top 5 Time Wasters
Shorten Emails to Save Time & Increase Productivity!
 Read More…
Take control
Take Back Control of Your Inbox!

Read More…

 

Battery Drain

 

Why is My iPhone 6 Battery Draining So Fast?

 Read More…

Juice Jack Dont Trust

Beware of Juice-Jacking!

How ‘free’ charge stations aren’t really free…

Read More…

May the 4th be with you2
May the Fourth Be With You

The origin of the May the Fourth celebration

Read More…

Don't Get Hooked by Email Scam
3 Reasons Email Scams Still Work,
and Why they Remain a Threat to All Companies
Read More…
 credit cards 2What is PCI Compliance?

PCI Compliance has been in the news recently.  What is it and why is it important?

Read More…

World Backup Day2World Backup Day:  9 Questions You Must Ask When Planning A Backup Strategy

83% of us own a computer.  89% own a mobile phone.

But only 1 in 4 people make regular backups of their data.

Think You’re Safe?  THINK AGAIN!

Read More…

WiFi HotSpot2Stay Safe on Public HotSpots

Public WiFi HotSpots are everywhere.

And wherever there’s free WiFi, there’s security risks

Read More…

Power Surge vs. PC - Had a power surge? Here are some things to check.

Power Surge vs. PC – Had a power surge? Here are some things to check.

Power Surge vs PC

A power surge is a damaging spike of voltage through the electrical network.

If your computer was plugged in and on during one, you’re more than likely to see some evidence of damage to your computer.

What To Look For

 Read More…

Shutdown vs SleepSleep vs ShutDown

Putting the debate “to bed”

Read More…

Laptop BatteryBatteries – To Drain or Not to Drain
Read More…
CD DriveCD/DVD Drive Not Reading Discs

What to Look For

Read More…

password incorrectWorst (and Most Popular) Passwords of 2014

Resist the urge to choose “123456” or “password”

…it’s not that secret!

Read More…

Email attachmentNot Receiving Email Attachments

Email attachments not showing up?

Here’s what to check for

Read More…

Hard Drive FailureTesting a Hard Drive for Failures

Issues caused by a bad hard drive & how to test for them.  

Read More…

Slow Computer2S…L…O…W Computer

What to do if your computer is running slow…before you take it out to the back 40

Read More…

XP UpgradeXP – Is it Safe to Use?

Do you really need to upgrade?

Read More…

Slow ComputerComputer Running Slow

Why your computer is running slower than usual

Read More…

Stop AutoPlayPut a Stop to AutoPlay Ads

Step-by-step instructions on how to put a stop to those annoying autoplay ads.

Read More…

PasswordPassword:  123456

With all the cyber-attacks, how do you protect your computer/network?

Here’s How!

Read More…

Black HoleCommon Monitor Troubles

Common monitor complaints…and how to trouble-shoot them!

Read More!

Shut DownComputer Turn-Off’s

Should you shut down the computer when you’re done with it, or simply put it into “sleep mode”?

What To Do, and When!

Read More…

Computer MouseMouse Has a Mind of its Own!

Simple check to fix an erratic mouse problem.

Read More…

Computer CrashComputer Crashes

What to do when your computer crashes:  stops responding to keyboard or mouse directions, or “freezes”.

Read More…

Sick computerComputer Won’t Turn On

What to do when your computer won’t turn on.

Read More…

2f70959Ending Programs

What programs are running behind the scenes that slow down your computer?

And which ones you can close…

Read More…

11Parental Controls

How to put child blocks on your computer.

Read More…

Facebook-OutlivingHow to Remove Deceased Accounts

How to remove inactive accounts – from email to Facebook.

Read More…

images-3Turning Off GIFs

Turning off annoying flashing GIFs on websites

Read More…

we-do-not-provide-any-government-organization-with-direct-access-to-facebook-serversFacebook at Work

Why you are unable to access your social media while at work

Read More…

danger-free-wi-fiOpen WiFi

Is it Safe?

Read More…

just_how_you_feel_out_of_memorySize Does Matter!

Bytes, Gigabytes, Terabytes…

How Big Are They Really?

Read More…

cookieC is for Cookie

What are they, and how do they get on my computer?

Read More…

relaxing-computer-outsideScreen Brightness

How to change screen settings to suit the environment.

Read More…

Chromecast_dongleProjectors vs. Chromcast

Who wins?

Read More…

keep_computer_virusfree_update_antivirus_600x450Multiple Anti-Virus Programs

Is “the more the better” or “less is best”?

Read More…

iStock_000013926354XSmall1-300x199Case-Sensitive Email
Read More...
Low Speaker Volumemix_at-lower-volume-300x274
Read More…

 

Ransomware!  What is it?ransomware_header_1_contentfullwidth
Read More…

 

Speeding Miceimage
Read More…

 

Ghost Mouseghost-in-computer
Read More…

 

Clean Keyboardsimage
Read More…

 

Time Travelerstime-travel-clock
Read More…

 

 

image
Creating Users
Read More…
image
Phone Calls from Microsoft
Read More…
image
Stuck on XP
Read More…
computer power button
Leaving Computers On
Read More…
image
Photo Backups
Read More…
image
Travelling Laptops
Read More…

 

deleted
Deleted Files

What to do (after panicking)…

Read More…

winver
Checking Windows
Read More…
Disk-Not-Ejected-Warning-Message-in-Macintosh
USB Eject Function
Read More…
facebook hacked
Facebook Hacked

What to do & how to do it, when your Facebook account is hacked!

Read More…

images-2
Email Breaches

How to keep your accounts, and your money, safe from hackers.

Read More…

clippy6
Can We Keep It?  PLEEEEEASE?
Read More…
misspelled.jpg.scaled1000
Microsoft Says I Ken’t Spel
Read More…
virus image
Malware, Viruses, and Spyware!

What are they, and how are they different?  Are Macs really immune?

Read More…

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in