Add a Spelling Checker to Internet Explorer
Posted by admin on Aug 3, 2011
Taken from PC World Magazine, August 2011 Edition
Even the latest Internet Explorer doesn’t do bad spellers any favours. But Speckie, a free add-on, offers a real-time spelling checker.
Once installed, Speckie – which is compatible with all versions of Windows and all versions of Internet Explorer (including IE 9) – immediately starts working, underscoring any unrecognized word with a squiggly red line. To see the program’s suggestions for possible correct spellings, just right-click the word.
So if you’re an Internet Explorer user who needs a utility to check your spelling in e-mail, Web forms, and other browser-based activities, Speckie gets the job done quickly and efficiently.
Protect Your Data From The Breach Epidemic
Posted by admin on Jul 14, 2011
Taken from PC World Magazine, July 2011 Edition
In 2011 alone, tens of millions of users have had personal information exposed or put at risk in some way by data breaches at Epsilon, RSA Security, the PlayStation Network, among others.
The impact of a data breach depends on what information is compromised and what the attackers do with the data they steal. If a breach is limited to exposing e-mail addresses, as was the case with the Epsilon data breach, the main concern it raised is the possibility of targeting phishing attacks.
If a breach exposes personal details such as names, addresses, birth dates, Social Insurance numbers, and driver’s license numbers, identity theft becomes a serious concern.
The worst case involves the loss of actual bank account or credit card numbers. The attacker can use your credit card information to buy things or – with additional information such as your account password – drain your bank account.
5 Ways To Keep Your I.T. Guy Away
Posted by admin on Jul 11, 2011
Why would I write an article that would make me lose business? Well, a happy customer will be a long-term customer. I would rather get you to spend your money on improving your equipment, than paying me to fix things you can prevent.
Rule #1 – Keep your computer free of malware and viruses. Make sure you have a good antivirus program installed, keep it renewed & updated, and schedule a regular scan. Sometimes you get a virus, even if you have done everything right – but at least give your computer a fighting chance.
Rule #2 – Keep your software patched. Virtually every program – from Accounting Software to Windows – checks itself for updates. When a program pops up a notice that there is an update – download and install it. In most cases, these updates provide security patches and feature enhancements that will help keep your system safe.
Rule #3 – Keep your equipment clean. Dust is public enemy number one. Due to the nature of electronic devices, they attract dust. Most computers have at least a few fans that move air through the system to keep it cool. When dust builds up in the fans and heat-sinks, your system starts to run hotter, and won’t run as well.
Rule #4 – Protect your hardware. Make sure your system is plugged into a good surge protector, or better yet, a battery backup unit. If your tower sits on the floor, consider placing it on a platform to raise it off the floor a few inches. That will help with dust control and potential water damage, as well as making the drives easier to access. Don’t place your electronics where they could get wet, dirty or in direct sunlight.
Rule #5 – If you notice your system acting a bit strange, or you are not sure about installing a certain update, give your “computer guy” a call. If you rely on someone to keep your systems running smoothly, then ask for their advice. Why wait until there is a major problem, and you have time-sensitive tasks to complete? Chances are, you can avoid a catastrophe buy keeping your I.T. guy in the loop.
If you follow these simple rules, you should be able to keep your equipment running problem-free and avoid costly emergency repairs. Then, you can plan to invest in new and better equipment – a task your I.T. guys would prefer to help you with.
RIM’s Blackberry Playbook: A Promising Tablet
Posted by admin on Jul 8, 2011
Taken from PC World Magazine, July 2011 Edition
Research in Motion’s Blackberry Playbook offers a convenient size and novel navigation, but its software can be frustrating.
In some respects, the Playbook is the most impressive tablet I’ve seen. But native apps such as its browser have disappointing glitches, and its variety of third-party apps is limited.
The Playbook is compact and light. Offering a 7-inch display, it can fit into a roomy coat pocket. And its weight is just under 1 pound, which makes it lighter than the iPad2. The Playbook is very easy to hold too.
There is a front-facing camera, as well as a rear-facing camera. The stereo speakers offer the best audio output I’ve heard yet from a tablet. Along the bottom of the tablet are three ports, for HDMI Micro, Micro-USB, and a magnetic rapid charger connection.
Powering the tablet is a 1Ghz dual-core processor and 1GB of memory. It connects to 802.11 a/b/g/n Wi-Fi, but a mobile broadband connection must wait until late summer, when RIM will release 4G LTE and WiMax versions. The tablet has no memory expansion card slot.
What Size Screen is Right?
Posted by admin on Jul 5, 2011
Taken from PC World Magazine, July 2011 Edition
A 65-inch 3D TV looks great – if you can fit it into your living room. Before you choose between LCD, LED and Plasma sets, you need to determine the size of the HDTV you want to buy.
To determine the right size for your room, get a tape measure and figure out how far away you plan to sit from your screen once you have it in place. You can find several Web tools, including this table on Amazon’s site, that show how to translate that distance into the correct screen size.
Choosing the most appropriate HDTV size is not an exact science, however, and people have very different viewing preferences. Keep Amazon’s tool in mind, but go to a local store and stand the same distance away from your desired set as you would be when you’re home.
Battery Backup – Cheap Insurance
Posted by admin on Jun 3, 2011
You probably know that you should have an uninterruptible power supply (UPS) on your work systems, but you probably don’t have one. Did you know that installing a battery backup system is just like cheap insurance? Tornadoes, floods and fires aren’t the only disasters that damage PCs, servers and other computers. An abrupt loss of electricity prevents systems from closing programs, finishing updates, and shutting down properly. Lost data and corrupted operating systems and programs often result.
Powerful electrical spikes can also cause trouble. A computer’s sensitive electronics can easily be destroyed by power surges created by lightning strikes or power fluctuations. Your computer can also be damaged by a dip in electrical current, also known as a “brown-out”, and that is something that a standard surge protector cannot guard against – not even an expensive one.
A UPS can prevent the damage that occurs from both power loss and common power fluctuations. Keep in mind, however, that just plugging in a UPS and connecting your computer does not guarantee systems are properly protected. Here are a few things to keep in mind when choosing a UPS.
Internet Bandwidth Explained
Posted by admin on May 20, 2011
I have had a number of clients asking questions related to internet bandwidth lately, and I thought I would try and explain it here. The reason for the questions, is probably the result of the recent CRTC decisions, and the subsequent reversal by the Supreme Court. If you are unware of what I am talking about, then you should probably check out this article at the CBC first.
The first question I get asked is… “What is difference between Internet Bandwidth and Internet Useage?” Well, bandwidth is just what it sounds like… the width of your band of internet. You will also hear it referred to as your download and upload speeds. In a nutshell, the wider the band, the faster the internet. Internet useage is the amount of data that has been uploaded or downloaded.
I find that using an analogy sometimes helps. You could compare your bandwidth to a highway – the more lanes the road has, the more cars can travel it. Internet useage would be the number of cars that have travelled that road in a month.
When you are looking at internet companies, you want to compare price for sure, but also look at their bandwidth speeds and if they enforce monthly useage-based billing. If you are an ocassional internet user, then speed and useage will probably not be an issue, but if you want to download music or movies, or watch streaming TV or videos, your monthly bill could be outrageous.
Watch out for Microsoft Tech Support scams
Posted by admin on May 10, 2011
An edited article by Woody Leonhard, Windows Secrets
“I’m from Microsoft and I’m here to help.” At least, that’s what reader MP thought he heard when he answered the phone. It wasn’t.
Con artists all over the world are bilking big bucks out of unsuspecting Microsoft customers — including savvy Windows users.
In this new epidemic, the scammers are sophisticated, glib, and oh-so-convincing. Know the warning signs. You may be next.
Inside one con that almost succeeded
Here’s how MP describes his experience:
“I was having a problem with Windows XP and posted an inquiry on one of the [presumed to be] Microsoft support sites. My wife received a call from someone wanting to talk to me about my computer. She gave a time when I would be home. I was expecting a call from my ISP. The call came at the arranged time, but it was not the ISP. The caller said he was working on behalf of Microsoft and directed me to a very convincing website for confirmation of his company and his credentials. The caller knew my name and telephone number.
“We talked about the problems I’ve been having with Windows XP. He said it sounded like a virus. He guided me into Windows XP’s Event Viewer and showed me a number of red and yellow flags for applications and systems, which he said were indicative of a malware attack.
“He offered to get a technician to sort the problem for free and directed me to a website, where I had to enter some contact information and my Windows activation code, from the sticker on my PC. He talked me through the process — we were on the phone for almost an hour at that point — and it all went smoothly until I had to enter some sort of warranty code that I didn’t have. He told me to hang on while he checked with his boss.
“A few minutes later, he was back and gave me the unfortunate news that my free support period had ended. He told me I would have to pay $99 for extended support and directed me to a place on the website to enter my credit card information. I’m not sure why, but I smelled a rat, so I hung up on him.
“The caller knew what he was talking about, knew my name and phone number, knew that I was running Windows XP, and knew that I was having problems. I’m a professional electrical engineer and fully aware of phishing and other scams, but I was nearly taken in.”
MP sent me the address of the site the caller used for a reference. I won’t repeat it here because, to this day, I’m not sure whether it’s a legitimate consulting firm site or whether it exists only to provide a backstory for swindlers.
The website certainly had an air of legitimacy. It identified the caller’s company as a “Microsoft Registered Partner” with an official Microsoft logo. “This company is a Technical Support Provider,” the site says. “As computers have become more popular and sophisticated, the job of keeping them running has fallen to an ever-expanding group of specialists, collectively known as Solution Engineers.”
The site went on to say, “The first point of contact is generally the manufacturer’s tech support. However, as manufacturers and others scale back on in-house technical support to control costs, innovative and entrepreneurial technical support companies are building a robust business of providing help and a sense of security to consumers.”
Then I noticed that the site’s mailing address is in Kolkata and the domain is registered in Jharkhand, India — a long, long way from MP’s stomping grounds.
Robust? You could call it that.
No password on your Wi-Fi? This nightmare could happen to you.
Posted by admin on May 6, 2011
Taken from The Toronto Star, article by Carolyn Thompson, Associated Press
Lying on his family-room floor with assault weapons trained on him, shouts of “pedophile!” and “pornographer!” stinging like his fresh cuts and bruises, the Buffalo homeowner didn’t need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.
That new wireless router. He’d gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.
“We know who you are! You downloaded thousands of images at 11:30 last night,” the man’s lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, “Doldrum.”
“No, I didn’t,” he insisted. “Somebody else could have, but I didn’t do anything like that.”
“You’re a creep . . . just admit it,” they said.
Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.
LizaMoon Infection: A Blow-by-Blow Account
Posted by admin on May 1, 2011
An edited version of an Article by Fred Langa, Windows Secrets
A nasty piece of malware known as LizaMoon has hijacked links on millions of websites in the past weeks, including some normally safe iTunes and Google links.
Fortunately, LizaMoon is easy to avoid if you know what to look for.
Using rogue-AV scare tactics, LizaMoon tries to trick you into running bogus security-scan and virus-cleanup tools on your PC — but it’s pure malware.
If allowed onto your PC, this particular ploy is especially troublesome because it can partially disable the Windows Security Center and change the Registry so that the full WSC can’t be restarted. It also interferes with Microsoft Security Essentials, if MSE is running. (You’ll find lots more LizaMoon news coverage via Google.)
My encounter with LizaMoon started unexpectedly one evening when a suspicious warning popped up on my screen. As discussed in a previous Top Story, I use Microsoft Security Essentials and the Windows 7 firewall to protect all of my PCs. In over a year of constant use, I’d never had any malware trouble. But that abruptly changed.
That evening, I was searching for something through Google — I don’t recall what. When I clicked a link, a blank page overlaid with a dialog popped up instead of the site I was expecting.