Welcome to the Computer Techs Computer / Internet Tips & News blog. This purpose of this site is meant to provide a service to our valued customers, by keeping you informed with the latest news and tips related to your computer and the internet. Consider using the search box on the left side of the website to help you find a specific topic or article, or scroll through articles below to learn something new.


Get $25 Off your next service call for recommending Computer Techs

If you’re happy with our service, please consider recommending Computer Techs to a friend or relative. If we service their computer, you get $25 Off your next service call.

The details: Please have your friend or relative mention your name during the appointment, or after the appointment contact Mark Cobb with the name of the person that you recommended/referred. The referred person must be a new Computer Techs customer and not reside in the same household as the referrer.


Bitdefender Antivirus Free provides hassle-free virus protection

Filed under: Passwords,Security,Tech Support - Jan 04 2017

Updated 1/4/17:

We began recommending Bitdefender Antivirus Free Edition in late 2014 since it offers free detection of most viruses and malware, with little user interaction needed. For more details you can read PCMag’s review of Bitdefender Antivirus Free Edition (2017). After installation, Bitdefender requires creation of a free MyBitdefender account by providing your name, email address and a password to continue the free protection beyond 29 days.

BitDefender registration

 

After 29 days of installation if you have not created your free MyBitdefender account and confirmed your email address, you will get a notice that your computer is not protected. To create a MyBitdefender account, open the program and follow the prompts. After you create your account, go to your email and click the confirmation link in the email that Bitdefender sends immediately after registering. Within a minute or so, Bitdefender’s status should change to “Protected”.

If you have any questions or require assistance with registering or confirming your email address with Bitdefender, please contact your tech.

 

Print This Article Print This Article

Backing up your data/computer before disaster strikes

Filed under: Computing Tips,Tech Support - Nov 16 2016

Originally posted March 2006 – updated “Storage Sizes” November 2016.

I’ve had far too many service calls where a customer’s hard drive has failed and their data is unrecoverable. People have lost financial data, important documents and irreplaceable family photos. A hard drive can be compared to a car’s engine – it spins at approx. 7200 rpm for thousands of hours over its lifespan. Eventually – 5 years on average – the hard drive fails. Now is the time to start a backup routine so that when – not ‘if’ – disaster strikes, you or a Computer Techs technician will be able transfer your backed up data to a new hard drive.

The purpose of a backup is to have a second copy of your important data. For example if you’ve backed up your data to a CD and your hard drive fails, your data can be copied back to a new hard drive from the backup on your CD. If your CD got lost, stolen or damaged you would be able to create another CD from the data on your hard drive. To put it another way, you want your important data in at least 2 different places.

Backup Media – What should you backup to?

Good: If you’re familiar with writing/burning CD’s or DVD’s then that may be the quickest way for you to start a backup routine. To backup to CD or DVD you can use CD/DVD burning software that comes with the drive, or use the CD Writing Wizard that comes with Windows.

Better: USB flash drives and external hard drives have become increasingly affordable for backing up larger amounts of data more quickly and easily than CDs and DVDs. USB Flash Drives and external hard drives are more durable than CDs and DVD’s and will likely last longer. Backing up to external USB devices is as easy as copying and pasting files or folders from your hard drive to the USB device, or letting a synchronization or backup program do the backing up for you automatically.

Best: In the past few years online backup and synchronization services have become popular because they allow a copy of your data to reside securely off-site and away from the threat of theft, fire, flood and natural disasters that could cause you to lose any backup stored in your home. Online backup methods also include programs that automate the backup process so that without human intervention required, data is backed up instantaneously or on a daily schedule once any data has been added or changed.

Below is a comparison chart for the most common media that you can backup your data to. A digital photo takes up about 1 Megabyte of space.

Backup Media

Storage Size (in Megabytes)

Approx. Cost

3.5” Floppy Disk (obsolete)

1.4 MB

Under $1

CD

650 MB

Under $1

DVD – DVD-DL

4500 MB – 9000 MB

Under $1

USB Flash Drive

2,000,000 – 256,000,000 MB

$5 – $100

External USB Hard Drive

500,000 MB – 4,000,000 MB

$60 – $200

Online

2,000 MB – 1,000,000 MB+

Free – under $10/month

 

What files and folders you should backup…
Depending on the size of your backup media, and how much data you’ve added to your computer (and would have to restore) help determine what you should backup.

Backup just your data – At a minimum you should backup “My Documents”, “My Pictures” and financial program data. Depending on your Internet Service Provider and how you use its service, you may need to backup your contacts and e-mail addresses, email, and/or internet browser favorites/bookmarks since some Internet Service Providers do not store that information on their servers.

By default Windows puts all of the data you create in a folder with your username located in or C:\Users (current versions of Windows). You can use a CD/DVD burning program to make a copy of that folder or select sub-folders. Or if you use an external USB device you can manually copy that folder to it, or use a synchronization or backup program that will do it for you automatically.

If you backup just your data, in the event of a hard drive failure, your operating systems and all your programs would have to be re-installed and configured just the way you like them, potentially taking weeks to get everything back to exactly the way things were before a hard drive failure.

Backup your entire computer – (This is what I do). “Windows Backup” comes with Windows 7, or you can use a program such as Norton Ghost or StorageCraft ShadowProtect with all currently supported versions of Windows. It makes a bit-for-bit image/copy of my main hard drive to an external USB hard drive on a daily schedule. If my computer’s hard drive fails or if my computer gets corrupted by a virus or software problem, I can restore my entire computer’s image from a previous backup. This backup method allows me to be working on my computer with all the programs and files restored just as they were on the date and time of the last backup, in less than one hour after replacing the failed hard drive.

Online data backup – (I also do this). Even though I have my data and programs backed up to an external hard drive, what if my computer was stolen or destroyed by fire, lightning or earthquake? That’s why I use Carbonite, an online automatic backup service that keeps a copy of my personal files, pictures, music collection, etc. stored in a secure data centers across the nation.

If this seems a bit complicated, Computer Techs can setup a backup routine for your data in less than an hour. Call us today before disaster strikes.

Print This Article Print This Article

Secure your email account with 2-step verification

Filed under: Passwords,Security - Nov 08 2016

Updated 11/8/2016:

With email account hacking being a common occurrence, email providers Google, Yahoo and others introduced a 2-step verification process that can keep unwanted people from accessing your email account, or help you regain access to it in the event of a forgotten password or if it has been taken over by a hacker.

It is important to note that you must setup 2-step verification for your account before hackers have a chance to do it first – and potentially lock you out of your account. Computer Techs recommends that you set-up 2-step verification now, as a pro-active preventative measure to keep hackers from accessing and/or taking over your email account.

2-step verification, (also known as 2-factor or multi-factor authentication) requires that anyone accessing your online account have 2 pieces of information in order to prove legitimate access:

  • Something the user knows (e.g., password, security answer, PIN)
  • Something the user physically has (e.g., phone, smartphone displaying a randomly generated code, ATM card)

If you are unsure about setting up 2-step verification, please contact us and we will set it up for you. If you’d prefer to do it on your own, see the links below for instructions for the most popular email services.

• Google/Gmail:  If you use Gmail on your iPhone, an email program on your computer, or certain other 3rd-party applications that access your Google/Gmail account, you will need to generate a one-time application-specific password in your Google account settings page for each device or application. Please read the information and watch the video Sign in using application-specific passwords before proceeding. You can then follow the instructions at Getting started with 2-step verification.

• Outlook Mail/Hotmail: See this Microsoft support article to setup two-step verification, or this blog post for more information.

• AOL: See AOL’s information about 2-Step Verification: Stronger than your password alone.

• Yahoo: See Two-step verification for extra account security.

• AT&T/Yahoo accounts (att.net/nvbell.net/prodigy.net/sbcglobal.net): AT&T/Yahoo email accounts do not offer a 2nd verification method for account security, therefore we do not recommend using their email service. If you login to att.com to access your AT&T paid services (wireless or U-verse) you should register a cell phone number with your account to make resetting your password easier. See Use your wireless number to reset your password.

Additionally we recommend that you secure your other online financial, social and file sharing accounts. See the THE ULTIMATE GUIDE TO TWO-FACTOR AUTHENTICATION (2FA) website for tutorials for most popular websites.

For help with setting up 2-step verification on any of your online accounts, please contact us.

Print This Article Print This Article

How to print an email so that you can read it

Filed under: Computing Tips - Nov 06 2016

If you access your email via a web browser and use email services such as Yahoo Mail, Outlook Mail, Gmail or AOL Mail, you may have noticed that printing an email may include ads and a listing of your mailbox folders. If so, here’s how to print an email so that you can read it – which includes just the body of the email without extra stuff surrounding the message:

Along the horizontal list of actions directly above the email message and to the right of “Reply”, “Forward”, etc., look for “More” or 3 dots ““, the choose “Print”. Gmail users should look for a printer icon label “Print all”. When clicking “Print” or “Print all” as explained above, a new window should pop up with a preview displaying just the body of the email message. If a Windows doesn’t pop up, you may need to disable your browser’s pop up blocker for that website. You can then continue to follow the instructions on your screen to begin printing.

Print This Article Print This Article

How to manage your passwords – easily and safely

Filed under: Computing Tips,Passwords,Useful Websites - Nov 06 2016

Updated May 2023:

Password security

When helping clients log in to their computer or websites, often I will see them pull out a scratch pad or sticky notes with various passwords scribbled on the page. There’s a better organized and more secure method to record your login information.

Use a password system

For years I’ve recommended using a variant of my password system to help you memorize the unique passwords that you use for every device and web site. When changing existing passwords I recommend starting with your email password, then financial and social networking websites, followed by the less-important web sites that you’ve used over the years. Your email password is your most important password since many websites send password reset requests to your email address. If a hacker gains access to your email, they could change the passwords and lock you out of all of your online accounts.

Use the password manager built into your browser or device…

In addition to using a system where most of my passwords are easy to remember, I also use a password manager to keep my passwords and secure notes well-documented and synchronized between devices. If you don’t need the sophistication and advanced features of a paid password manager, you can use the password manager built right into your web browser, device and/or smartphone.

…or consider a password manager with more features that can be synced between multiple devices

But if you want your passwords synced between multiple web browsers (Chrome, Edge, Firefox, etc.) and/or multiple operating systems (Windows, macOS, ChromeOS, iOS, Android, etc.), you’ll need to pay for a multi-platform password manager, that also offers more advanced features such as:

  • Multi-factor authentication: This adds an extra layer of security to your password manager by requiring you to enter a code from your phone in addition to your master password.
  • Password sharing: This allows you to share selected passwords with others securely.
  • Password audits: This feature can help you to identify weak or compromised passwords. Some password managers will even automatically generate new passwords for you if they detect that a password has been compromised.
  • Security breach alerts: This feature will notify you if your password manager is ever hacked. This will give you the opportunity to change your passwords and protect your accounts.
  • Emergency Access: Setting up emergency access lets you share all of your passwords with predetermined person(s) in the event that you unexpectedly become hospitalized or die. If the person(s) request access to your passwords, if you didn’t want to allow the request you would have to deny the emailed request after a predetermined period of time – usually a week. Otherwise your passwords would be available after the waiting period.
  • Photo storage: Store photos of important documents such as a passport, driver license, social security card, insurance cards and credit cards.
  • Password generator: A password generator can help you to create strong, unique passwords for all of your accounts.
  • Password strength checker: A password strength checker can help you to identify weak or compromised passwords.
  • Form filling: A form filling feature can automatically fill in your login information on websites and apps.
  • Secure notes: A secure notes feature can allow you to store sensitive information, such as credit card numbers, bank account numbers and social security numbers.
  • Travel mode: A travel mode feature can temporarily disable your password manager when you are traveling, which can help to protect your accounts from being accessed while you are away.
  • Limit access to certain countries: If you don’t travel beyond the United States, consider allowing access to your password manager while logged in from the U.S. When traveling, temporarily allow access when logged in from other countries of your choosing.

To help you decide on a multi-platform password manager with advanced features, check out a review of The Best Password Managers | PCMag.

Less secure options, but better than nothing

Another option to manage your passwords that also backs up to the cloud so you don’t lose them is to use the Notes app on Apple/iCloud devices, or Google Keep which is available on most devices. Make sure that each of your devices where you use Notes or Google Keep are synchronizing with your cloud account, and each device where you are logged in needs to be protected with a secure password.

If you prefer to keep your passwords in a typewritten form such as a document or spreadsheet, never name the file “passwords”, nor include the name “password” in the content of a file – both are easily searchable on a computer. You can also password-protect a document or spreadsheet with a password that you can easily remember or is stored in a secure and memorable location. Also, don’t type the entire password – just parts that aren’t easily memorable. For example you could type the name of the website and date, but use an underscore “_” or dash “-” for characters of the password that you’ve memorized without revealing the entire password to someone that you may not want to view your password list. For example, my typed Yahoo password would be M – – Y – – 0 9 1 6 – I know what characters are represented by dashes.

The least secure option, with no backup in case of loss

A low-tech method for keeping track of your passwords is using a password log book such as this #1 Best Seller at Amazon. I suggest not writing complete passwords in the book, but hints to the password (see above). Also you should store the book in a locked fire-proof safe or non-obvious location, remove the cover sleeve that says “passwords”, and make sure your spouse and next of kin know the location of the book.

For all logins include the following 5 pieces of information at a minimum:

  1. Login name (e.g. AAA)
  2. Website address (e.g. www.aaa.com)
  3. Username/email address (e.g. myemail@myemail.com or mesmith89501)
  4. Password – labeled “pw” (e.g. AbcAaa123)
  5. Date (e.g. Changed 2/14/2014 due to data breach)

If you need help setting up any of the methods mentioned above, we can help.

Print This Article Print This Article

Why you should ditch your internet provider’s email – and how we can help

Filed under: Passwords,Security,Tech Support - Oct 26 2016

Updated May 2020:

Over the years we’ve written various articles about AT&T/Yahoo email being plagued by account security issues, bothersome ads in their webmail interface, forced password resets, spam messages sent to user’s contacts and more. The revelation that over 500 million Yahoo accounts have been compromised in recent years leads us to once again advise people to stop using AT&T/Yahoo Mail, and switch to using a more secure and reliable email provider such as Gmail.

If your email address ends in @att.net, @sbcglobal.net, @nvbell.net, or @prodigy.net, the advice above includes you – since Yahoo provides the email and web content services for AT&T Internet customers. We’ve had several customers over the years permanently lose access to their AT&T/Yahoo email due to the lack of security of the service.

In May 2020 AT&T once again changed their login procedure, and began blocking use of the website if you use an ad blocker.

An important security option for online accounts is 2-step verification – neither AT&T/Yahoo or Charter/Spectrum email accounts offer the option. Therefore we recommend that you ditch your internet provider’s email service and switch to Google’s Gmail or Microsoft’s Outlook Mail.

If you’ve got an Android smartphone, you should already have a Gmail address associated with the Google account required for your phone. If you don’t already have Gmail, it’s easy to get a free address and setup your account – and we can help.

Switching email providers can be a hassle. But we can setup the initial change for you, and give follow-up guidance on how to systematically inform business correspondence of the change over time. We’ve got a step-by-step procedure that includes (but not limited to):

Discontinuing AT&T/Yahoo email:

(more…)

Microsoft is making major changes to Outlook.com email

Filed under: Computing Tips - Aug 29 2016

Outlook Mail changesIf you have a Hotmail, MSN, Live or Outlook.com email address, Microsoft is in the process of making major changes to your “Outlook.com” email experience. For more information from Microsoft, read their support article.

Print This Article Print This Article

What’s wrong in these screenshots?

Filed under: Computing Tips,Scams,Security - Aug 28 2016

 

firefox-update-scam

Click on the screenshot above to see if you can spot what’s wrong, then click back to read below for the answers.

What’s wrong in the screenshot above?

  • Never install something from a website unless you specifically went looking for it.
  • Notice the website in the address bar. Is that a popular mainstream website that can be trusted?… No!

Click to view a larger image

Click on the screenshot above to see if you can spot what’s wrong, then click back to read below for the answers.

What’s wrong in the screenshot above?

  • Notice that it says “This site says…” Is the website in the address bar trustworthy?
  • Bad grammar and punctuation is a clue that this is not a website that is written by a professional company.
  • Warnings and urgency is meant to scare you into using your better judgement.
  • Never, ever call a phone number that pops up on your screen. It’s a scam!

If you see a screen similar to the one shown above, many times it won’t close by clicking the red “X” on the upper-right corner of the window. Instead, simply click on the Start button on the bottom-left corner of your screen, then follow the normal procedure to shutdown or restart your computer.

Print This Article Print This Article

Avoid Tech Support Phone Scams

Filed under: Scams,Security - Apr 25 2016

Originally posted April 2013. Updated April 25, 2016:

Microsoft, your Internet Service Provider (ISP), nor any legitimate company will call to tell you that your computer is infected, and that they need to remotely access your computer (for a fee) to fix it. It is a scam by crooks who are trying to access your computer, scare you into believing that there are multiple problems with it, and demand money to pay for a problem that didn’t exist in the first place.

Another common scam happens when you initiate the call. Don’t call a number that pops up on your screen unsolicited. If you call a company whose number you found from a web search, make sure you visit the company’s official web site – don’t click on an third-party ad. There are hundreds of fraudulent companies advertising on Google, Bing and other search sites masquerading as “tech support” for legitimate companies, and attempt to convince callers that they need to pay hundreds of dollars to “fix” multiple problems with their computer.

Never allow someone you don’t know remotely access your computer. For more detailed information please read New twists in tech support phone scams, Learn how to spot scams that pop-up on your screen, and the Federal Trade Commission’s information about Tech Support Scams.

Print This Article Print This Article

Give new speed to an old computer with a SSD

Filed under: Computing Tips - Apr 22 2016

SSD (Solid State Drive) is a newer type of hard drive for computers that is much faster and more reliable than the older standard HDD (Hard Disk Drive). The cost for SSD’s has come down considerably in the past few years, capacities have increased, and we are now recommending them to replace aging HDD’s in computers up to about 5 years old. Watch the short video below to see a comparison between a SSD and HDD.

In summary, the advantages of SSD’s are faster startup/boot times of typically 50% or greater, faster program load times, greater durability and a longer lifespan. We can replace your current hard drive with a speedy new SSD ranging from about $300-$375 which includes the drive and labor to clone your current drive to the new drive. We can also upgrade the drive in a new computer for the same price. Please contact us for details or to schedule an appointment.

Also read: Here’s an article describing the huge performance gains of SSD’s.

Print This Article Print This Article

« Previous PageNext Page »