Computer Tips

When working (or playing) on your computer, you probably don’t think much about how you are going to clean up your files, backup your data, keep your system virus free, etc. However, these are tasks that need attention

Internet Tips

Spend much time surfing the web? If you do, you need to be wary of things that lurk on the dark side of the Internet. Not only are there viruses, hackers and spammers -- online predators and a bunch of evildoers are out there just waiting to pounce on teens in the digital world.

Computer Hardware Tips

Wipe the case and clear its ventilation ports of any obstructions. Compressed air is great for this, but don't blow dust into the PC or its optical and floppy drives. Keep all cables firmly attached to their connectors on the case.

Laptop Tips

Today's lithium batteries wear out no matter what you do, but you can postpone the inevitable. Avoid heat and use the battery as little as possible. If you're going to be running on AC power for awhile, shut down or hibernate the computer, remove the battery, and work without it.

Printing Tips

If you've tried your hand at printing your own photos and been disappointed in the results, you may be making some mistakes that are easy to correct.

9.06.2016

5 Bad Computer Habits To Break

We’ve all come to recognize our computers as being valuable tools for business and pleasure.  Keeping your computer working well for you requires some awareness and responsibility.  Here are 5 bad habits that many computer users should be aware of and break.



Not Backing Up Your Data Regularly

This is just tempting fate.  Eventually, all computers will fail for some reason or another.  Whether it is a maintenance issue, longevity or your computer burns up in a fire, computers will not last forever.  However, anything you create on your computer can and should be saved.

Your data includes: pictures, videos, emails, documents, lists, spreadsheets, bookmarks, favorites, etc.

Though programs cannot be saved, they can be easily reinstalled if you have:

    The name of the program to re-download or the disk to re-install
    The software installation key

Use Belarc Advisor to help you automatically backup your software installation keys.

Common programs include:

    Operating Systems
    Antivirus and other Malware Protection software
    Microsoft Word, MS Office or other word processing program
    Individual programs you may use such as Accounting Programs, Graphic/Picture Editing software, etc.
    Games
    Upgrades and patches to software

If your data is valuable to you- family pictures, business reports, etc. – keep them close to you and backed up in 2 locations: locally on an external device or disk, and off-site (such as in cloud storage such as Dropbox or with an online service such as Carbonite).

Unorganized Files

Keeping your data organized will help prevent you from being frustrated and inefficient with your time.  The importance of knowing where your data is comes in handy when you need to find it as a reference or to share with someone else.  By default, pictures will be saved in your computer’s “Picture” folder and documents will be saved in your computer’s “Documents” folder.

If you would like to have more specialized places to keep your data, be sure to create new folders and sub-folders and name each of them appropriately.  A good idea to start is to keep one or a couple of Main Folders on your desktop for easy access.  Within the main folders, you can then create sub-folders to further organize your data.

Here are some examples of creating a hierarchy of Folders and Sub-folders for you to more easily navigate your data:

On your desktop:

    HOUSEHOLD
    BUSINESS
    PERSONAL

Within each of these main folders, you may want to create sub-folders such as:

    Household –> pictures, videos, music, recipes, gardening tips, etc.
    Business –> records, invoices, emails, to-do lists, spreadsheets, etc.
    Personal –> pictures, bank and account information, journal/blog, etc.

To further organize your information, you can continue to create sub-folders within folders ad infinitum.  This is especially handy for organizing pictures, archiving records and categorizing music.

Organizing your data also helps you know where your important information is for when you regularly back it up.
Un-Managed and Under-Rated Passwords

Passwords are the keys to your private information on the computer.  If you leave your keys laying around or make simply-crafted keys that are easy to replicate, you are baiting fate.   Compromising your password security will cost you undue frustration, time and sometimes even money.
Tips for managing passwords:

    Have different passwords for different sites you use
    Keep a hand-written book of your passwords  and websites associated with them in your home
    Choose difficult combinations of letters, numbers, symbols and cases
    Change your passwords every 3-6 months and write down the new passwords in your book
    For more computer password tips, read our article, “Most Popular Passwords for 2012: Don’t Use These!”

Ignoring Error Messages, Dialogue Boxes And Postponing Updates

It is important to read the information in dialogue boxes before clicking OK, Cancel, Run, Save, Continue or any other options.  Sometimes this results in installing or enabling unwanted programs and add-ons such as malware, ad-ware, toolbars and other junk.

If your computer is giving you an error message that you do not understand, either copy and paste it and put the phrase into a Google Search, or write it down and call Christopher’s Computers at 828-670-9800.  We will help you figure out what is going on with your computer.

When your computer asks you to update a program, be sure that you know these things before agreeing:

    Do I recognize and use this program?
    Are there any other programs or applications that are attaching itself to this update that I do not want?

Wonder what to update?  Read our article on “Where Did That Program Come From” for more information on the top 3 programs that you should keep updated regularly.
Misuse of Computer’s Purpose

Your computer is a very delicate, complex and incredible tool.  We often take for granted the value that our computers give us until something goes wrong.  Here are some reminders that sometimes we forget:

    Do not use your laptop as a food tray.
    Keep your pets and sticky fingers away from bumping and touching your computer.
    Do not have liquids near your computer.

Respect your computer’s fragility.  Do not stack things on top of your laptop.  Make sure to free paper clips, pens and other things before you close the lid to your laptop.  Ensure your computer has enough ventilation.  Keep desktops from being sandwiched too close to walls, furniture and tightly enclosed areas; laptops to be used on a hard surface away from bunched up clothes and blankets.  Keep your computer’s area free of dust and pet hair.
Noticing bad habits are the first step in breaking them.

If you catch yourself in one of these bad habits, use the opportunity as a tool to help you break it.  By being aware and being pro-active, you can protect your computer and save yourself much frustration, time and energy in the future.
Source:http://www.christopherscomputers.com/tips.html

9 Useful Keyboard Shortcuts

Whether it is writing a paper for class, a document for colleagues or an article for your blog, there are a few useful keyboard shortcuts that will help save you time and frustration when you are composing on your computer.  Using computer keyboard shortcuts is also especially helpful when you do not have a working mouse, or if your computer seems to be otherwise frozen.


Ctrl-S will Save your document

SAVE OFTEN: This is rule number one when you are creating a document.  Whether you are composing while typing or re-typing a paper document onto the computer to digitize it, saving often while you work will keep ensure your hard work is safely kept in the memory of your computer.  This is especially useful if the power blinks out while you are working, or if your cat decides to walk across your keyboard and suddenly everything you were typing is just completely gone.

Ctrl-X will Cut the highlighted section of text

When you have either a single word, a phrase or paragraphs of information, you can easily cut out one section at a time using Ctrl-X.  Cutting the text will take the selected text out of your document and will keep it on your clipboard until you have copied or cut another piece of information.

Ctrl-C will Copy the highlighted section of text

Highlight a single word, phrase, paragraphs or pages of information and then hold down Ctrl-C to copy it onto your virtual clipboard.  “Copying” your selected text will keep the original document intact and unchanged, unlike “Cutting,” which removes the selected text from the original document.

Ctrl-V will Paste the previously cut or copied section

Wherever the cursor is placed within the document, the most recent “copy” will appear within the document.  Use the Paste option regularly when completing multiple repetitious documents such as address label templates.

Ctrl-P will Print your document to the assigned printer

Be sure that you have your printer already assigned to your computer when you use this shortcut. This shortcut will not work if you do not have your printer networked with your computer.  If you are having trouble getting your printer installed, contact us for help.

Ctrl-Z will Undo your last bit of typing

“Undo” is an especially helpful feature if you’ve highlighted and then deleted a large selection of text by accident.  Often, clicking Ctrl-Z with the Alt tab will allow you to go back and undo more than one step.

Ctrl-Y will Repeat your previously bit of typing

“Repeat” will re-do your undo.  The program will re-type whatever was last input as many times as you re-click “Y” while you are holding down the Control key.
Alt-Tab will Minimize the document

Utilizing a shortcut to minimize your document makes it easier to navigate through multiple windows and multiple documents that you may be using for a project.
Alt-F4 will Close the program

If your computer freezes up, the mouse will not work and there is no other way to close your program, hold down the Alt key and press the F4 key in the upper row of the keyboard.  This shortcut will not save any recent work that you’ve been doing prior to closing, so be sure you click Ctrl-S prior to Alt-F4!

Practice using these shortcuts for greater efficiency when creating documents on your computer.   In time, these keyboard shortcuts will become a familiar habit and then you will be ready to learn even more:

Ctrl-B = toggle for Bold

Ctrl-I = toggle for Italics

Ctrl-U = toggle for Underline

9.01.2016

How to Stay Safe When Using Public Wi-Fi

How to Stay Safe When Using Public Wi-Fi

Whilst Wi-Fi is undoubtedly incredibly useful for modern businesses and web users seeking to access the Internet when out and about, many people don’t realize that it can also pose quite a substantial security risk. That’s why we’ve written this piece focusing on the different ways in which you can keep your device secure whilst using a public WIFI spot, whether you’re using a new HP or a new Lenovo laptop tablet combo or a standard smartphone.
 Turn off the sharing features
It’s important to edit your sharing settings before you log onto any public Wi-Fi. Not doing so may allow anyone else using it to potentially access your computer or mobile device.Things that should be turned off include remote logins and the sharing of any music, printers or files. These can all be stopped by accessing the advanced sharing settings within the Network and Internet Settings in the control panel. On Macs, it’s a matter of simply going to system preferences, then to the Sharing tab and un-checking all of the options.

Use a VPN

A Virtual Private Network routes the traffic through a secure connection even when the actual web is powered by a public Wi-Fi, making it perfect for helping to increase the security of a the computer. Preferably, a paid Wi-Fi is a good idea for anyone that wants to absolutely guarantee security but there are also some free half-decent ones out there.

Don’t connect automatically

Many modern smartphones actually connect automatically to the nearest Wi-Fi hotspot without asking, which should be avoided. Double check the Wi-Fi settings of your handset to make sure that any options to disable auto-connection are turned off. Not doing so could theoretically mean that your device automatically connects to a malicious network without you realising.

Try and use HTTPS

HTTPS is a form of encryption that many websites use in order to keep the connection secure. (For instance, it’s used by banks and online retailers, who have to be safe if they’re to maintain the trust of their customers). Fortunately, there is an actual browser plugin that enables users to use an HTTPS connection every single time they visit a website. It’s called HTTPS Everywhere and it’s highly recommended for those that use public Wi-Fi frequently.

Use two-factor identification where possible

Two-factor identification has become more and more frequent in recent months, with companies keen to enhance their security processes. Two factor simply involves requiring two passwords to log-in, with a standard password usually matched with a code being sent to the user’s phone, which is then entered in. Without the user’s phone, a hacker will be unable to log into a two factor account, upping the security of it considerably.

Make sure you double check the network name

Anyone who regularly checks into free Wi-Fi will know that there are usually a number of different networks ready to go. It’s important to make sure that you don’t log into a fake one. Someone trying to catch people out in McDonalds (to use a hypothetical example) might set up a network called ‘MacD Wi-Fi’ in the vicinity of one of the restaurants. Those that think they’re using a legitimate hotspot would then log-in to a malicious network without realizing. Always double check that you’re connecting to the right network.
Conclusion
I know these tips are just few among many that you can use, but I have to leave the decision to you now! So, what are other effective security technique you’ve used in the past that worth sharing?
Source:http://techatlast.com/stay-safe-on-public-wi-fi/