Category Archives: Uncategorized

Shake

If you are the type of end user that loves having multiple windows open on the desktop, then Shake is for you.  Shake allows the user to click, hold and shake a window to minimize all others, leaving only the desired window open.  Shake again and the minimized windows re-appear. 

Simple and easy way to clear the clutter.

Quick Assist


Quick Assist allows one person to remotely connect with another.  It connects two computers so that one PC will remotely control another PC.  To access this Windows 10 feature, type Quick Assist in the Search window near the Start button.

You will need a Microsoft account to sign in.  If you do not have one, it is free to create and the link to do so is in the window that pops up.  Create the account or sign and you will get a code to give to the user of the system you are remoting into.  That person does not need a Microsoft account to allow you access.

The limitation to this utility is that the remote computer will need to have someone on site to activate the link unlike other remote access programs that can be set to open automatically.

Cleaning Computers during the Pandemic

Yes.  It is important to repeatedly clean your computer during the pandemic.  How you do so is just as important. 

First, use a disinfectant wipe to clean frequently touched surfaces.  These include keyboard, mouse, front of your computer desktop or the covers, (top and bottom) of your laptop and the power cord if you are moving it to another location.  If you are using a wipe, make sure to have the computer off first.  The wipes can have excess moister that will drip into the keyboard, (of a laptop), or into a desktop, and cause a sudden short of the system.  That could be catastrophic!  When finished, wipe of any excess moister before rebooting the computer.

If you are using a spray to disinfect, make sure to spray onto a paper towel first and use it to wipe down the system rather than spray directly onto the computer.  Again, turn the system off prior to cleaning.

Outlook

When Outlook is being closed the program will run in the background syncing up with the email service.  Doing this insures your email will be up to date and running as expected.  However, sometimes when you go to open it again, it does not.  That is because it is running in the background, syncing.

The best way to handle Outlook, (2019, in this case), is to open it and leave it open until you are finished with it for the day.  Opening and closing Outlook multiple times during the day will cause this issue to re-occur.

Scanning software on a Mac computer

Even Macs get viruses.  Having an antivirus program makes sense.  However, when you download and install one, the error message pops up stating your system is only partially protected!  Why is that and what can be done?

The antivirus program requires Full Access to your hard drive.  Only an authorized user can grant that access.  First, make sure you are logged onto the Mac as the authorized user.  Next, go to the System Preferences and select Security & Privacy.  Scroll down to Full Access on the left side.  Unlock the icon at the bottom by entering your Admin password, (most likely the same password as you logon with at boot up).  Place a check mark next to the antivirus application that is listed. 

Close out and run the scan software again.  You should not see that message anymore.

How to get rid of dots indicating a space between words

This can be annoying.  You go to type in Word and after each character there appears a dot.  While there is no obvious option to get rid of them, the answer is easy.

Click the “music” symbol on the Home Ribbon.  If that does not do the trick, then click on File, Options and then Display.  Go to the section “Always show these formatting marks…” and uncheck the Spaces options.  Do the same for any other option you want to do not want.  Click Okay and the dots should be gone.

Preventing Identity Theft: Part 4

Low Tech ID theft

Low Tech ID theft It is still a great way for thieves to steal your data.  If you put your trash out at the driveway for the garbage truck to pick up you are at risk of a criminal stealing your data right from the trash can.  NEVER put credit card statements, electric bills, cable bills, insurance letters and last year’s health data in the trash without shredding first.  Better still, burn them

Preventing Identity Theft: Part 3

Old Accounts not being used

We have been using online accounts for decades now.  Do you remember all the ones you signed up for?  Leaving old accounts active and not in use can be a hackers dream come true.  They can hack the account and know you are not going to realize the hack until it is too late.

Delete all accounts no longer being used.  Any account from Facebook to Email should be retired and deleted.  If you want assistance doing this try using a utility called Account Killer.  Google to find the site.  Sites such as Skype,aol, sbcglobal, old Insurance companies, Fitness centers, Store cards, TV sites, Restaurant sites, etc should all be “killed.”

Cleaning up your online presence is a big step toward achieving online safety.

Preventing Identity Theft: Part 2

Online Shopping

Online shopping is very convenient and easy.  It is also the best way to get hacked.  We use our personal information and credit card data to purchase items.  Most online sites have taken additional steps to protect your data when you buy, however, hackers are constantly coming up with new ways to get your information.

E-skimming is when a hacker skims your credit card information while your are shopping online.  You do not even know it is happening at the time.  They do this by using “tricky bits of code” while they lay in wait for your data.  To protect yourself better, NEVER shop on sites that not secure.  Secure sites will have HTTPS: at the start of the url, (web address).  If the site you are shopping is not secure then find your item elsewhere. 

Beware of coupons offering incredible discounts, yet require your credit card information.  Consider not using your credit card to purchase online.  Use a cash card you can purchase at any grocery store for example.  You can, for a couple dollars, purchase a Visa cash card for the amount you need.  Use PayPal.  Sign up and setup your account.  Lastly, use store gift cards, or site cards such as Amazoncash.

Preventing Identity Theft: Part 1

Sharing

We all love to share what is happening in our lives on platforms such as Facebook.  There is nothing wrong with sharing IF you are careful doing so.  Here are some ideas to help protect yourself on social media, using Facebook as the example.  Other platforms have security measures you can take as well, however, implementing them will take a different set of steps. 

Protect with strong passwords.  You have read it in these posts before, use strong passwords on everything.  A great password should be a set of three words from your life experience.  A High School mascot, plus a name of your first job, plus the model of your favorite car, for example.  Three random terms out of your life will be very difficult for hackers to decipher.  You can enhance the password by replacing letters with symbols.  @ for a; 4 for h; 3 for e, etc.  We suggest creating a set of six passwords using the same three terms with a mix of capital letters and symbols.  Do not use the same password for every site, rather, use different passwords from this list. 

Write them down and store them in a safe place in case you, or a loved one, need to reference them.