Welcome to the Computer Techs Computer / Internet Tips & News blog. This purpose of this site is meant to provide a service to our valued customers, by keeping you informed with the latest news and tips related to your computer and the internet. Consider using the search box on the left side of the website to help you find a specific topic or article, or scroll through articles below to learn something new.


Get $25 Off your next service call for recommending Computer Techs

If you’re happy with our service, please consider recommending Computer Techs to a friend or relative. If we service their computer, you get $25 Off your next service call.

The details: Please have your friend or relative mention your name during the appointment, or after the appointment contact Mark Cobb with the name of the person that you recommended/referred. The referred person must be a new Computer Techs customer and not reside in the same household as the referrer.


The dangers of using the same password for different websites

Filed under: Passwords,Security - Apr 17 2020

Sure it’s easy to just use the same password for everything. But with data breaches seemingly occurring on a daily basis, your email address and password that’s part of any data breach is surely being used to try to log into your email account and other accounts that hold personal, financial and other private information.

It’s been suggested by some clients that nobody would be interested in reading their email, so their email password doesn’t need to be secure or unique. However if a hacker accesses your email consider the following common occurrences:

  • A hacker can reset/change your email password and lock you out of your account.
  • A hacker can read all of your emails to figure out all the financial and shopping accounts that you do business with. With that information they can begin attempting to login to those websites, and if unable to do so – they can intercept the password reset emails sent to your email address and reset the passwords for those accounts too.
  • A hacker can copy your contact list and/or send emails on your behalf asking for money, gift cards or to send spam and phishing emails that appear to come from you.

If your email password is not unique or easily guessed by others, please change your email password now!

Not only does your email account password need to be unique, your login information obtained from data breaches and phishing emails are also being used to login into other types of online accounts:

  • Online file storage and personal backup accounts – to access to any personal documents that may contain private or financial data.
  • Your wireless phone provider – to attempt to hijack your phone number and receive password reset codes.
  • Online shopping accounts – to order merchandise with your stored payment information, and have it sent to the hacker.
  • Online social media accounts – to impersonate you in attempt to convince friends or family to send money or gift cards to the hacker.

To create secure and unique passwords for every online account, check out how to safely manage your passwords, which includes tips for creating a secure a memorable password system.

For more information, I suggest reading this more in-depth article by security researcher and former Washington Post reporter, Brian Krebs: The Value of a Hacked Email Account.

Print This Article Print This Article

Need help understanding how to shop online? We can help.

Filed under: Internet Tips - Apr 01 2020

Shopping online is more common that ever as people have discovered the convenience of buying food, clothes and household supplies from their home computer or mobile device. Setting up accounts, payment methods and delivery/pick-up options with online retailers such as Amazon, Costco, Walmart, Raley’s or Smith’s can initially seem difficult. But with some virtual hand holding we can help you get everything setup for future ordering on your own.

Please contact us for more information, or to setup a remote or in-home appointment to help you get things started and place your first online order! After you receive your first order, you’ll be wondering why it took you so long to get started with such an easy and convenient process.

Give the gift of computer help or service

Filed under: Tech Support - Apr 01 2020

Are you looking for the perfect gift for someone who needs computer help or service? Consider giving the gift of computer help or service with the purchase of a Computer Techs eGift Card. eGift Cards can be used towards payment of remote support or on-site services. Click the link picture below for more details, or to purchase now.

How to clean and disinfect your screen, keyboard and mouse

Filed under: Computing Tips - Mar 16 2020

Cleaning and disinfecting your screen – including the one on your smartphone or tablet – as well as your keyboard and mouse can be done with some common items that you most likely already have around the house.

For cleaning your computer and smartphone screen you can use a soft lint-free cloth and a mix of isopropyl alcohol and water or disinfecting wipe. Turn off your device before cleaning, be careful not to scratch the surfaces or allow liquids to seep into any holes, and allow time for the surfaces to thoroughly dry before turning it back on.

Cleaning your keyboard includes turning it over to knock loose any debris. Then a small amount of isopropyl alcohol and water mix or disinfecting wipe can be used clean the surfaces of your keyboard and mouse.

For more information see this external article.

Print This Article Print This Article

Why you should keep your computer ON when not using it

Filed under: Computing Tips - Jan 29 2020

If you use a desktop computer, we recommend leaving it ON when not using it. Here’s why:

  • Your computer does important maintenance tasks when “idle” – basically the time when you walk away from it for 5-10 minutes or more. To be idle the computer needs to be left ON – not in sleep mode, standby, logged off, nor powered off.
  • Maintenance tasks include scanning for and installing Windows Updates, virus/malware scans, disk defragmentation, and any other updates that may be regularly checked by other apps.
  • If you are in the habit of turning on your computer, doing your business, then immediately turning it off – your computer may never get the chance to do maintenance tasks, or may eventually try to do them while you’re trying to use the computer. This can cause your computer to be much slower while you’re trying to use it.

If you use a laptop computer, we don’t recommend leaving it ON all the time, but rather leave it idle for a few hours once a week so that it can perform maintenance tasks while you’re not actively using it.

The rare occasion that we recommend turning the computer off is if there are currently thunderstorms approaching your area, or high winds that may cause the power to brown-out or completely go out. In those occasions it would be good to unplug the power and wired internet cables from the computer to help prevent any electrical surges from damaging it.

Print This Article Print This Article

The good and bad of browser extensions

Filed under: Internet Tips,Passwords,Security - Aug 20 2019

You likely spend most of the time on your computer using your web browser. Years ago the web browser was primarily used for reading news and email. Now we can do everything from grocery shopping, managing finances, word processing, and even work in browser-based versions of powerful business applications – without leaving a browser window. Part of what has made web browsers so useful – but also potentially hazardous – is the popularity of browser extensions.

Browser extensions are applications, often developed by third party developers, that users can download to expand the functionality of their web browsers. A few different extensions that we recommend can block ads, manage passwords, manage too many open browser tabs, or save web pages to Google Drive or Evernote – just to name a few. However there’s also an abundance of extensions that promise to do great things, yet cause far more trouble than they’re worth.

Some of these “bad” extensions just cause annoyances, displaying ads or automatically redirecting you to websites that you didn’t intend to browse to. Others are more malicious, spying on your browsing, stealing your data, or injecting malware into your system. What’s worse is that some extensions start out life perfectly legitimate, but then get bought by bad actors and become malicious.

Some of our most common calls for service are due to bad browser extensions. So how do you get the most out of browser extensions without falling prey to malicious ones? Here are 5 tips:

1. Be very wary of pop-ups advertising an extension.

Many users install extensions because they are prompted to in pop-up messages on websites. You always have the option to decline the extension, or close your browser to avoid installing a persistent installation prompt. If you didn’t go to a website looking to install an extension, it’s best to decline, since a large majority of the time the website is offering something that’s in their best interest – not yours.

2. Only download extensions from websites that you trust.

Do some research into the company behind the extension you’d like to download. Many extensions are developed by companies you know, such as Google or Microsoft, and these are generally safe. If you don’t recognize the vendor, be sure to read reviews of the extension on the browser’s extension interface – such as Chrome’s Web Store or Firefox’s Add-Ons page. Often malicious extensions will receive enough bad reviews to warn careful users away.

3. Take time to read all the fine print.

Whenever you’re downloading extensions, slow down to read all the messages your browser gives you about the extension. Chrome, for example, will show you exactly what information the extension will have access to, as pictured below.

In this example, you’d need to absolutely make sure that you want to give the extension – a third party app – access to “read and change all your data” and to “capture the content of your screen” before clicking “Add extension.”

4. Don’t download extensions bundled with other apps.

We’ve written before about the potential dangers of downloading/installing free software from the web. In many cases, free software applications will include browser extensions, which the user may download without paying attention, simply because they click “Next” on the installer window without reading the fine print. When downloading anything from the internet, always be sure to read every message carefully so that you are downloading only what you want and expect.

5. Monitor extension permissions

Be wary of any permission updates from extensions you already have installed. Pay attention to notifications about new permissions, especially if the extension has changed publishers.

6. Block or close prompts to allow websites to send notifications

Though not technically a browser extension – web browsers have enabled a “feature” to allow websites to pop-up notifications from a website, even when you’ve left that site. Though it may be useful to get notification alerts when you’re favorite news website is not open, or notifications about new email or Facebook activity – some untrustworthy websites have abused the feature and are causing excessive pop-ups for unrelated content. We recommend being very judicious if clicking to “allow” notifications, and only do so on websites that you know and trust. For more information read: How to block browser notification pop-ups.

Are you getting excessive pop-ups and getting redirected to websites that you didn’t intend to visit? Please contact us if you need help cleaning up your browser.

Print This Article Print This Article

Canceling your TV service – streaming TV over the internet

Filed under: Uncategorized - Aug 18 2019

Though we typical help people with their computers and internet service, we frequently get asked about canceling TV service and switching to streaming – aka TV via the internet. Consumer Reports recently published some helpful and informative articles about canceling your TV service. Some of those articles include:

Also read: Why you shouldn’t bundle all of your services with one provider

Print This Article Print This Article

Windows 10 semi-annual update cycle explained

Filed under: Computing Tips - Aug 18 2019

Microsoft’s Windows 10 operating system for personal computers has been said to be the “last version of Windows”. First released in July 2015, Windows 10 has been updated on roughly a semi-annual basis with “feature updates” – changes or improvements to the functionality or user interface of the operating system.

The latest version of Windows 10 – Version 1903 – has been slowly pushed out to computers over the past few months. Version 1903 was initially planned to be released in March 2019, but suffered some reliability problems and was delayed to May 2019.

Versions of Windows 10 have been identified by a 4-digit year and month of initial planned release – i.e. 1809, 1803, and so on going backwards to the original version of 1507. However due to frequent release delays, a new versioning system is expected to take effect with the next version of Windows 10 this fall. Subsequent versions are expected to be identified by the 4-digit year and half-year of planned release – i.e. 19H2, 20H1, and so on going forward.

For more information about the history of Windows 10, including changes that were made in the eight versions to-date, continue reading…

The difference between Credit Monitoring Vs. Identity Theft Protection

Filed under: Internet Tips,Passwords,Security,Useful Websites - Aug 06 2019

Considering all the data breaches lately, you should be monitoring and protecting your accounts and personal information – but what is the best method for you? Should you use a credit monitoring service or subscribe to identity theft protection instead? What’s the difference between the two methods?

Credit monitoring services monitor activity on your accounts with the major credit reporting agencies (TransUnion, Experian, and Equifax). Creditors report all activities related to borrowing money, including your payment history, to credit reporting agencies. Monitoring services may monitor your history with all three agencies or be exclusive to a certain agency.

With credit monitoring, you’re alerted to various changes in your credit report – for example, when a potential creditor asks for your credit history or when new credit card accounts or loans are opened in your name. Any activity that is reported to the credit reporting agency is monitored.

However, identity theft can involve more than fraudulent loans or credit accounts in your name. Thieves can use your Social Security number and other personal information to open bank accounts, get jobs, receive government benefits – even commit crimes in your name. None of these activities will show up on your credit report because borrowing is not involved.

Identity theft protection services typically include credit monitoring and also check for non-credit related abuses of your information – or let you know that your compromised information is out there, available to thieves for future abuse. Monitoring may include dark web scans, arrest records, court filings, changes of address, and social media accounts.

Identity theft protection services may also include help to restore your identity and resolve fraudulent uses and claims, as well as identity theft insurance. However despite the marketing claims to scare you into buying such protections there are things that identity theft services can and cannot do for you.

Victims of data breaches are often offered free credit monitoring or identity protection services for a limited period of time – however you need long-term protection, especially once your personal data has been compromised. You can always cancel accounts and change passwords, but once your Social Security number is compromised, you are in for a lifelong battle with identity thieves.

If identity theft protection generally includes credit monitoring, why would you opt for credit monitoring alone? Cost could be a factor, along with any extra services that the identity theft protection service provides that an credit monitoring does not. With some effort on your part do-it-yourself safeguards can be just as effective as paid services. If you’d prefer to pay to have a service take care of it for you, here are some recommendations and paid endorsements for identity theft monitoring services.

Note that most credit monitoring and identity theft protection services are reactive, not proactive. They let you know when suspicious activity has occurred, but they can’t prevent it from happening. You can supplement either service by using following these proactive tips:

  • Shred any sensitive information before discarding it.
  • Follow through with our top 5 password tips.
  • Be suspicious of all e-mails, text messages, pop-ups and unsolicited phone calls claiming that there’s a problem that requires your immediate reaction – such as calling an unfamiliar phone number or divulging your personal information or login credentials over the phone or via an email link.
  • Check your credit frequently, and consider a credit freeze on your accounts to prevent thieves from opening fraudulent accounts in your name.

Help either service by making it more difficult for identity thieves to get your information, or to use your information if they do get it. Now is the time to follow through with whatever protection you choose. Identity thieves look for the easiest unprotected targets – don’t be one of them.

Print This Article Print This Article

Why you should never unsubscribe from certain emails

Filed under: Internet Tips,Security - Jul 25 2019

Updated November 2023:

If you think the way to get less spam email is to click the “unsubscribe” link – not so fast. While legitimate email senders often will remove your email address from their list, spammers use unsubscribe links in emails to track people that take the time to open email and click the link. They then target you for even more junk email.

Some methods that you can use to help identify legitimately sent emails include:

  • Have you knowingly given your email address to the sender?
  • Look to see if the “from” email address closely matches the company that it says it came from. For example if you get an email from “JCPenney” promising $10 off, but the email address displays something@bestdeals.biz or someone@gmail.com – that’s not an email from JCPenney.
  • Does the grammar, spellling and punctuation in the email make it seem as if it was professionally written?
  • Click here for more examples of emails that aren’t from who they say they are.

You should only unsubscribe from emails that you are absolutely sure that they came from a legitimate company that you have given your email address to or conducted business with. Otherwise, just mark the email as Junk/Spam to help train the computer programs that filter your emails to the Inbox or Junk/Spam folders.

« Previous PageNext Page »