Category: Useful Websites

How to tell if you need a new computer / device

Filed under: Computing Tips,Useful Websites - Jan 30 2024

Determining whether you need a new computer or smartphone can be tricky, as it depends on several factors like your needs, budget, and the current performance of your device. Here are some signs that might indicate it’s time for an upgrade:

Performance Issues:

  • Slowness and Lag: If your device takes forever to boot up, open programs, or respond to your commands, it’s a clear sign of aging hardware struggling to keep up.
  • Frequent crashes and freezes: Unexpected crashes and freezes disrupt your workflow and can lead to data loss. If they happen regularly, an upgrade might be necessary.
  • Insufficient storage: Running out of storage space constantly, forcing you to delete files or struggle with cramped performance, signals the need for increased capacity.
  • Battery drain: Batteries degrade over time, and if your device needs constant charging or struggles to last a full day, replacing it might be a good option.

Software Compatibility:

  • Outdated operating system: Older devices might not be compatible with newer versions of their operating systems, missing out on security updates and features. (See EndOfLife.date for more information)
  • Incompatible software: Some software and apps require newer hardware features. If you constantly run into compatibility issues, consider an upgrade.

Security Concerns:

  • End of security updates: Manufacturers eventually stop providing security updates for older devices, leaving them vulnerable to malware and attacks. Upgrading ensures you have the latest security patches. (See EndOfLife.date for more information)
  • Physical damage: Cracked screens, damaged ports, or overheating issues can pose safety risks and impact functionality. Replacing a device with severe damage might be necessary.

Beyond the Basics:

  • Changing needs: If your needs have evolved and your current device no longer meets your demands, like needing more processing power for graphics work or enhanced photography capabilities, an upgrade might be worthwhile.
  • Frustration and inconvenience: If your device constantly frustrates you with its limitations, impacting your productivity or enjoyment, consider an upgrade for a smoother experience.

However, before rushing to buy a new device:

  • Perform maintenance: Try simple troubleshooting steps like clearing up storage, updating software, and running antivirus scans. These might rectify some issues without needing an upgrade.
  • Analyze your needs: Assess what you truly need from your device and prioritize your requirements. This will help you choose the right upgrade when the time comes.
  • Research and compare: Don’t make impulsive purchases. Research different options, compare features and prices, and choose a device that aligns with your budget and needs.

Remember, not every sign necessitates an immediate upgrade. Evaluate your specific situation, prioritize your needs, and make an informed decision based on your budget and comfort level. It’s better to wait for the right time than invest in a new device prematurely. Contact Computer Techs for expert advice.

Google being more transparent about the data it has about you and your devices

Filed under: Internet Tips,Useful Websites - Jan 08 2023

Google recently sent an email to Google account holders with a reminder that “You have Web & App Activity turned on”. Even though this setting may have been turned on by default for many years, Google is being more transparent about the data they have about the things you do on Google sites, apps and service. The timeliness of the recent email was likely sent to appease government regulators.

In the email, Google states that “Web & App Activity is a setting that lets you save to your Google Account the things you do on Google sites, apps, and services, including your searches and associated information, like location and language. It can also give you more personalized experiences across Google, like faster searches and better recommendations.”

Please read “Google Isn’t Evil – Why We Like Google” to help you understand some of the trade-offs when you supply information to Google.

You can view and manage the information and settings that Google has about your Google activity at myactivity.google.com

Print This Article Print This Article

New FCC map lets you check the broadband internet speed availability at any address

Filed under: Internet Tips,Useful Websites - Nov 21 2022

The Federal Communications Commission (FCC) has released a new broadband map where broadband Internet availability can be searched by address. Information for the map is reported by the service providers, and challenged if incorrect. 

The FCC considers broadband as speeds at a minimum of 25 megabits per second (Mbps) download and 3 Mbps upload. Some providers listed on the map fail to meet the minimum speeds defined.

The map not only displays traditional fixed/wired providers such as cable and DSL, it also shows newer technologies such as fixed wireless access (FWA) and fiber providers. Availability from mobile 4G and 5G providers is also included on the map.

The map can be useful if you are shopping for internet access at an address that you are considering a move to, or if you are considering switching providers at your current address. You can view and search the map at https://broadbandmap.fcc.gov/

2 new iPhone features you should turn on now

Filed under: Internet Tips,Passwords,Useful Websites - Dec 28 2021

Apple recently added two new features to their latest iOS 15 operating system that will help you and someone you trust access your Apple account and mobile device should you forget your password or when you die.

Setting up a Recovery Contact now will allow someone you know and trust help you regain access to your Apple/iCloud account or device should you forget your account password or device passcode.

Adding a Legacy Contact now will allow someone you know and trust access data such as your photos, messages and notes after your death.

For more details and instructions, see the Apple help articles below. If you need help with setup you may contact your tech.

Set up an account recovery contact

How to add a Legacy Contact for your Apple ID

Also read: Now’s the time to decide what to do with your online accounts when you pass away.

Print This Article Print This Article

Now’s the time to decide what to do with your online accounts when you pass away

Filed under: Internet Tips,Useful Websites - Dec 28 2021

Unfortunately, sometimes death is sudden. Therefore now is the time to decide what to do with your online accounts when you pass away. Refer to the links below for various popular online accounts and their digital legacy policy and instructions.

Facebook

Google

Apple

An article on The Verge has details about setting up your digital legacy on the 3 major services above and others together with screenshots.

Print This Article Print This Article

Keep your mobile phone number safe from hackers

Filed under: Internet Tips,Passwords,Security,Useful Websites - Dec 27 2021

Updated 7/3/25 with new information

Your mobile phone number has become increasingly valuable because it’s the way that hackers can gain access to your online financial, email and social media accounts. We now are encouraged to use our smartphone and attached phone number to prove who we are – often via Multi-Factor Authentication (MFA), a method that requires not only entering your username/email address and password into a website, but also entering a code or responding to a prompt sent to your cell phone.

But what if someone gained access to your mobile phone – or increasingly more common – your mobile phone number? Hackers that successfully SIM swap or port-out your phone number would have access to reset/change “forgotten” passwords and gain access to online financial, email and social media accounts.

Fortunately the major wireless carriers have taken steps to let you thwart hackers and prevent your phone number from being taken from you without your prior knowledge. It involves contacting your wireless carrier.

Instructions for the major U.S. carriers are below. If you use an MVNO (Mobile Virtual Network Operator) such as Consumer Cellular or Spectrum Mobile – call 611 from your wireless phone and ask to setup a port-out PIN or other port-out/SIM swap protection to prevent unauthorized porting of your phone number without your prior knowledge.

Verizon Wireless – Number Lock

AT&T Wireless – Wireless Account Lock

T-Mobile – SIM Protection

Also read: How to set up a SIM transfer PIN on every carrier

It’s important to protect your phone number before a hacker poses as you and takes over your phone number before you get a chance to protect it. If you need help with protecting your phone number, contact your tech.

Print This Article Print This Article

Watch the world from home

Filed under: Useful Websites - Jul 30 2020

To help pass the time while sheltering or quarantining at home, check out these websites to view live video of webcams featuring scenery and nature.

Print This Article Print This Article

The difference between Credit Monitoring Vs. Identity Theft Protection

Filed under: Internet Tips,Passwords,Security,Useful Websites - Aug 06 2019

Considering all the data breaches lately, you should be monitoring and protecting your accounts and personal information – but what is the best method for you? Should you use a credit monitoring service or subscribe to identity theft protection instead? What’s the difference between the two methods?

Credit monitoring services monitor activity on your accounts with the major credit reporting agencies (TransUnion, Experian, and Equifax). Creditors report all activities related to borrowing money, including your payment history, to credit reporting agencies. Monitoring services may monitor your history with all three agencies or be exclusive to a certain agency.

With credit monitoring, you’re alerted to various changes in your credit report – for example, when a potential creditor asks for your credit history or when new credit card accounts or loans are opened in your name. Any activity that is reported to the credit reporting agency is monitored.

However, identity theft can involve more than fraudulent loans or credit accounts in your name. Thieves can use your Social Security number and other personal information to open bank accounts, get jobs, receive government benefits – even commit crimes in your name. None of these activities will show up on your credit report because borrowing is not involved.

Identity theft protection services typically include credit monitoring and also check for non-credit related abuses of your information – or let you know that your compromised information is out there, available to thieves for future abuse. Monitoring may include dark web scans, arrest records, court filings, changes of address, and social media accounts.

Identity theft protection services may also include help to restore your identity and resolve fraudulent uses and claims, as well as identity theft insurance. However despite the marketing claims to scare you into buying such protections there are things that identity theft services can and cannot do for you.

Victims of data breaches are often offered free credit monitoring or identity protection services for a limited period of time – however you need long-term protection, especially once your personal data has been compromised. You can always cancel accounts and change passwords, but once your Social Security number is compromised, you are in for a lifelong battle with identity thieves.

If identity theft protection generally includes credit monitoring, why would you opt for credit monitoring alone? Cost could be a factor, along with any extra services that the identity theft protection service provides that an credit monitoring does not. With some effort on your part do-it-yourself safeguards can be just as effective as paid services. If you’d prefer to pay to have a service take care of it for you, here are some recommendations and paid endorsements for identity theft monitoring services.

Note that most credit monitoring and identity theft protection services are reactive, not proactive. They let you know when suspicious activity has occurred, but they can’t prevent it from happening. You can supplement either service by using following these proactive tips:

  • Shred any sensitive information before discarding it.
  • Follow through with our top 5 password tips.
  • Be suspicious of all e-mails, text messages, pop-ups and unsolicited phone calls claiming that there’s a problem that requires your immediate reaction – such as calling an unfamiliar phone number or divulging your personal information or login credentials over the phone or via an email link.
  • Check your credit frequently, and consider a credit freeze on your accounts to prevent thieves from opening fraudulent accounts in your name.

Help either service by making it more difficult for identity thieves to get your information, or to use your information if they do get it. Now is the time to follow through with whatever protection you choose. Identity thieves look for the easiest unprotected targets – don’t be one of them.

Print This Article Print This Article

Computer Techs News Feed Stream on Facebook

[fb_widget fb_url=”https://www.facebook.com/computertechs” width=”600″ height=”800″ data_small_header=”false” data_adapt_container_width=”false” data_hide_cover=”false” data_show_facepile=”false” data_show_posts=”true”]

How to find your lost or stolen mobile smartphone or tablet

Filed under: Computing Tips,Useful Websites - Apr 17 2018

Originally published 6/28/14
Updated 4/17/18

If you’ve lost your smartphone or tablet, or if your device is stolen, you can often find its location by using another similar device or computer. But before your device can be located, your device needs to be setup to allow it to be located. Now is the time to check and make sure your device is setup – before it becomes lost or stolen.

For an iOS device such as an iPhone or iPad, go into Settings > iCloud, and make sure “Find My iPhone” is on. Once setup on your device you can go to iCloud.com/find in your computer web browser, or the “Find My iPhone” app on another mobile device, sign into your iCloud account and choose Find My iPhone. More information here.

For an Android device with software version 4.1 or above, follow the instructions here to turn on Android Device Manager on your device. Then go to android.com/find in your computer web browser, or “Find My Device” app on another mobile device, sign into your Google account and follow the prompts.

 

Print This Article Print This Article

 

Next Page »