Quick Assist allows one person to remotely connect with another. It connects two computers so that one PC will remotely control another PC. To access this Windows 10 feature, type Quick Assist in the Search window near the Start button.
You will need a Microsoft account to sign in. If you do not have one, it is free to create and the link to do so is in the window that pops up. Create the account or sign and you will get a code to give to the user of the system you are remoting into. That person does not need a Microsoft account to allow you access.
The limitation to this utility is that the remote computer will need to have someone on site to activate the link unlike other remote access programs that can be set to open automatically.
Yes. It is important to repeatedly clean your computer during the pandemic. How you do so is just as important.
First, use a disinfectant wipe to clean frequently touched surfaces. These include keyboard, mouse, front of your computer desktop or the covers, (top and bottom) of your laptop and the power cord if you are moving it to another location. If you are using a wipe, make sure to have the computer off first. The wipes can have excess moister that will drip into the keyboard, (of a laptop), or into a desktop, and cause a sudden short of the system. That could be catastrophic! When finished, wipe of any excess moister before rebooting the computer.
If you are using a spray to disinfect, make sure to spray onto a paper towel first and use it to wipe down the system rather than spray directly onto the computer. Again, turn the system off prior to cleaning.
When Outlook is being closed the program will run in the background syncing up with the email service. Doing this insures your email will be up to date and running as expected. However, sometimes when you go to open it again, it does not. That is because it is running in the background, syncing.
The best way to handle Outlook, (2019, in this case), is to open it and leave it open until you are finished with it for the day. Opening and closing Outlook multiple times during the day will cause this issue to re-occur.
Even Macs get viruses. Having an antivirus program makes sense. However, when you download and install one, the error message pops up stating your system is only partially protected! Why is that and what can be done?
The antivirus program requires Full Access to your hard drive. Only an authorized user can grant that access. First, make sure you are logged onto the Mac as the authorized user. Next, go to the System Preferences and select Security & Privacy. Scroll down to Full Access on the left side. Unlock the icon at the bottom by entering your Admin password, (most likely the same password as you logon with at boot up). Place a check mark next to the antivirus application that is listed.
and run the scan software again. You
should not see that message anymore.
This can be
annoying. You go to type in Word and
after each character there appears a dot.
While there is no obvious option to get rid of them, the answer is easy.
Click the “music”
symbol on the Home Ribbon. If that does
not do the trick, then click on File, Options and then Display. Go to the section “Always show these
formatting marks…” and uncheck the Spaces options. Do the same for any other option you want to
do not want. Click Okay and the dots
should be gone.
Low Tech ID theft
Low Tech ID theft It is still a great way for thieves to steal your data. If you put your trash out at the driveway for the garbage truck to pick up you are at risk of a criminal stealing your data right from the trash can. NEVER put credit card statements, electric bills, cable bills, insurance letters and last year’s health data in the trash without shredding first. Better still, burn them
not being used
We have been
using online accounts for decades now.
Do you remember all the ones you signed up for? Leaving old accounts active and not in use
can be a hackers dream come true. They
can hack the account and know you are not going to realize the hack until it is
accounts no longer being used. Any
account from Facebook to Email should be retired and deleted. If you want assistance doing this try using a
utility called Account Killer. Google to
find the site. Sites such as Skype,aol,
sbcglobal, old Insurance companies, Fitness centers, Store cards, TV sites,
Restaurant sites, etc should all be “killed.”
your online presence is a big step toward achieving online safety.
shopping is very convenient and easy. It
is also the best way to get hacked. We
use our personal information and credit card data to purchase items. Most online sites have taken additional steps
to protect your data when you buy, however, hackers are constantly coming up
with new ways to get your information.
is when a hacker skims your credit card information while your are shopping
online. You do not even know it is
happening at the time. They do this by
using “tricky bits of code” while they lay in wait for your data. To protect yourself better, NEVER shop on
sites that not secure. Secure sites will
have HTTPS: at the start of the url, (web address). If the site you are shopping is not secure
then find your item elsewhere.
coupons offering incredible discounts, yet require your credit card
information. Consider not using your
credit card to purchase online. Use a
cash card you can purchase at any grocery store for example. You can, for a couple dollars, purchase a
Visa cash card for the amount you need.
Use PayPal. Sign up and setup
your account. Lastly, use store gift
cards, or site cards such as Amazoncash.
We all love
to share what is happening in our lives on platforms such as Facebook. There is nothing wrong with sharing IF you
are careful doing so. Here are some
ideas to help protect yourself on social media, using Facebook as the
example. Other platforms have security
measures you can take as well, however, implementing them will take a different
set of steps.
strong passwords. You have read it in
these posts before, use strong passwords on everything. A great password should be a set of three
words from your life experience. A High
School mascot, plus a name of your first job, plus the model of your favorite
car, for example. Three random terms out
of your life will be very difficult for hackers to decipher. You can enhance the password by replacing
letters with symbols. @ for a; 4 for h;
3 for e, etc. We suggest creating a set
of six passwords using the same three terms with a mix of capital letters and
symbols. Do not use the same password
for every site, rather, use different passwords from this list.
Write them down and store them in a safe place in case you, or a loved one, need to reference them.
If you do
not use icloud, or have run out of space and do not want to pay for additional
storage, you can use a utility called MobiMover. It will scan and then save your entire iPhone
data unit to the computer. The folder is
placed on the desktop and is titled “Exported by MobiMover(then the date).
folder and you will see subfolders with the data within. Note:
If you use a web mail account, such as AOL, Gmail, etc, then the
contacts and other data will not be stored here as it is stored on the web mail
Click this link to download and save
your iPhone data!
We’re here to help.