Finding The Laptop That is Right for You
Posted by admin on Jun 19, 2012
More and more people these days are choosing laptops instead of desktops, but how do you make sure you are choosing the right one? Here are a few things to keep in mind…
Boot Speed – using a stopwatch, measure the time between pushing the power button and when the machine is ready to use.
Program Launching – Fire up whatever applications are installed, and see how quick it feels – Internet Explorer, Control Panel and Antivirus are our favourites to use.
Viewing Angle – This is not really important for everyone, but look at the monitor from different angles to see if the screen looks fainter or if the colours change.
Display – If you can, look at the display under different lighting conditions and different brightness settings.
Keyboard – Keyboards are somewhat subjective – different people like different keyboards. Just make sure you are comfortable with the fell of the one you are trying out.
Touchpad – Test the touchpad’s responsiveness by scrolling through windows and clicking on things.
These are just a few things to look at… not to mention the RAM, Hard Drive, weight, warranty and price.
Windows 8 Upgrade Offer
Posted by admin on Jun 19, 2012
Microsoft has announced that end users who purchase a qualifying new Windows 7 PC from June 2, 2012 through January 31, 2013 will receive a promotional offer for a downloadable copy of Windows 8 when available. This “Windows Upgrade Offer” will be fulfilled by Microsoft directly to the end user. Because of this, we at ICS cannot get involved in the process, but can provide the information that you will need. The offer must be redeemed prior to February 28, 2013.
The first step is to purchase a qualifying PC running Windows 7 Home Basic, Home Premium, Professional or Ultimate from, June 2, 2012 to January 31, 2013.
Visit www.windowsupgradeoffer.com to register for the upgrade.
Download your copy of Windows 8 when it is available.
DNS Changer Update
Posted by admin on May 8, 2012
Taken from Windows Secrets By Woody Leonhard
DNSChanger virus spells ‘Internet Doomsday’ … The end is nigh, according to the FBI … ‘Internet doomsday’ will strike us all on July 9 …
That’s what a couple of popular websites had to say about the DNSChanger virus. What a crock! I’ve been writing about viruses for about two decades, and I don’t think I’ve ever seen headlines that ridiculous from sources that should know better. DNSChanger is a real piece of malware — it’s a variant of the TDSS/Alureon family of Trojans — and it was a real problem until taken down Nov. 8, 2011, in a joint FBI–Estonian police action code-named “Operation Ghost Click” (FBI site). Since then, it seems, DNSChanger has hit headline after headline — with dire warnings. Even local TV news programs have covered it in breathless terms, as if it were the worst thing to ever infect your computer.
Lemme tell ya. It’s easy to write scary headlines such as “New Mac Trojan makes your clicking finger fall off!” (no doubt because Mac mice have only one button) or “Log on to Windows and lose your life savings!” It’s not so easy to examine the threat, digest it, translate it into terms we can all understand, and make a few simple recommendations. That’s the goal for this column. Is it true that, as a Huffington Post U.K.headline put it, “The end is nigh, according to the FBI!”? I don’t think so.
Which Browser Should You Use?
Posted by admin on Apr 10, 2012
Taken from PCWorld Magazine, April 2012 Edition
Not all Web browsers are created equal. Some are faster, some are more versatile, others are especially secure. We tested six leading browsers to learn where each one excels… and fails.
Everyone needs a Web browser, but with so many different ones available, deciding which one is best for you can be hard. Are you looking for something blazing fast? Or is strong security your top priority? Or do you need lots and lots of add-ons? Here is how the browsers stack up.
1st Place – Google Chrome – 4 1/2 stars
Chrome wins our top spot thanks to its ease of use, numerous extensions and add-ons, and superb performance. It may not be perfect for everyone, but Chrome is a well-rounded browser that should meet most people’s needs. It lets you close slow or frozen pages without restarting the browser, and its sandbox design helps prevent malware infections.
2nd Place – Mozilla Firefox – 4 stars
The new design has removed the bulky toolbar and replaced it with a row of tabs, and the bookmark bar is hidden by default. It’s biggest advantage over its rivals is its vast library of add-ons, which you can use to customize your browsing and make it more useful. Be careful, however, as too many add-ons can slow the software down.
3rd Place – Facebook RockMelt – 4 stars
This browser if built on Googles Chromium browser framework, so it looks and acts a lot like Chrome. It is designed to appeal to social media fanatics, making communicating with Facebook friends easier. Pages load quite quickly, but extensions and add-ons are relatively scarce.
4th Place – Internet Explorer – 3 1/2 stars
IE has long lagged behind other browsers in features and ease of use. But the latest version offers a few functions that are at least as good as what the competition offers. Especially noteworthy are some great new privacy features, the ability to scan downloads and built-in cross-site script protection.
5th Place – Opera – 3 Stars
For internet users who prize speed above everything else, Opera should be the browser of choice. The interface looks like a polished version of Internet Explorer 9. It is not HTLM5 friendly, and there are fewer security options and add-ons than other browsers offer.
6th Place – Safari – 3 Stars
It is an adequate and fairly intuitive browser, but you can do better, especially if you use a Windows machine. It did not score well on any of the speed tests, and though its security has always been top-notch, organizing Safari can be troublesome. It plods through pages built with HTML5 and JavaScript.
Secure Your Home or Office Wi-Fi
Posted by admin on Apr 6, 2012
Taken from PCWorld Magazine, April 2012 Edition
By default, wireless routers and access points have security turned off. Without the security enabled, anyone nearby can leach off your wireless Internet, see where you’re browsing, capture your passwords to some websites, and possibly gain access to your PCs and files. Some models help you turn security on via a wizard during initial setup or recommend using buttons or PINs; others require you to enable it manually via the router’s Web interface.
But even with Wi-Fi Protected Access 2 enabled, hackers can exploit vulnerabilities to crack your Wi-Fi security. Here’s how to combat these weaknesses. If your router supports WPS (Wi-Fi Protected Setup), it is vulnerable. The best answer is to turn that feature off. If you cannot turn it off, then consider upgrading the firmware for your router. Each router has different ways to complete these tasks, so check out your manual for instructions.
If you have done these things and are still worried about someone hacking into your wireless connection, consider hiding your SSID (essentially making your wireless connection invisible) or using MAC addressing. There is no way to completely protect your wireless connection except to turn it off when you are not using it… but that is not convenient.
Six Basic Steps to Picking the Right Workgroup Printer
Posted by admin on Apr 3, 2012
Taken from PCWorld Magazine, April 2012 Edition
The good, and perhaps daunting, news about buying a workgroup printer is that you have a lot of choices. The standard monochrome laser or LED printer is now joined by colour laser and LED models, as well as by multifunction variants that offer scanning faxing and copying. Higher-end inkjets claim good speed, better image quality, and comparable or better consumables costs. So, how do you decide? This might help…
Match the printer to the task and volume. If your workgroup prints mostly text documents, a monochrome laser or LED printer will do the job.
Check compatibility. If you use Macs, Linux or different versions of Windows, check to make sure that appropriate drivers are available before you purchase.
Know who needs colour and who doesn’t. Monochrome printing is the bulk of printing for many businesses. If you only need a few colour prints occasionally, an inkjet printer can handle low volumes easily.
Balance volume with versatility. If you already have a copier, a fax machine, and a networked scanner, you may get better performance from sand-alone printers. Multifunctions are versatile, but have to juggle more.
Research costs and reliability. Cost of ownership includes the long-term need for replacing ink or toner, plus components such as a laser’s fuser or waste toner bottle. Gather all the pricing and page yields up front to make sure they’ll work with you print content and volume.
If you still cannot decide what printer is right for you, then talk to your I.T. provider or local computer store. The have experience that can help you decide what is best for your home or business. A reputable dealer will not sell you something that you don’t need. They want to make you happy, so that you will return and purchase the ink and toner you need!
How to Choose an ISP for Your Small Business
Posted by admin on Mar 29, 2012
Taken from PCWorld Magazine, April 2012 Edition
All Internet connections may seem the same, but you can find some differences – beyond price – between Internet service providers, and between the types of connections that an ISP offers. Here are tips on choosing an ISP and the connection that best suit your small or mid size business.
Internet Connection Types:
DSL – generally the cheapest connection type, uses traditional telephone lines, can support a dozen typical users.
Cable – usually faster than DSL, uses standard television cable, fast enough for a few dozen users.
Fiber – superior performance, can be expensive, great for more than 24 users and VOIP phone systems.
Bandwidth Speed:
ISPs offer different service levels or plans for each connection type. The main point of distinction between levels is the bandwidth speed. Choosing a suitable speed is one of the key decisions that you must make. Generally, the greater the number of people who’ll be using your connection, the more bandwidth you’ll need. In addition, the more performance-intensive your users requirements are (streaming video or VOIP phones) the more bandwidth you will need.
Bandwidth Cap:
Some ISPs have begun to cap data usage. Under a data cap, if you exceed the data transfer limit during a billing cycle, the ISP may automatically throttle back your speeds for the remainder of the cycle, or it may apply a surcharge to your bill.
The Fine Print:
Read the fine print of a service provider’s contract before signing up. The prices most companies post online are conditional: Many require contracts of 1 to 2 years to get the advertised monthly rate.
Equipment/Installation Fees:
Consider the hardware each ISP provides. Some services furnish nothing more than a basic model; others may give you a gateway that includes a router or even built-in WiFi. Some companies provide free installation and activation, but most make waiving the associated fees contingent on accepting a contract.
Why Desktop Software is so Vital
Posted by admin on Mar 9, 2012
Taken from PCWorld Magazine, March 2012 Edition
Online apps make sense for a lot of people these days, but sometimes desktop software is essential. Here are five advantages of such apps.
Security – Even a seemingly stable company may fold, or change its privacy standards. For important documents, family photos, and business presentations, you may want to use desktop software to ensure that the preservation and confidentiality of that content don’t depend on an outside company’s good behaviour.
Guaranteed Connection – If your Internet connection goes down, or if you can’t pick up a wireless signal on the road, you need on-board software to stay productive. Conveniently, many tools offer a sync button so your online database can catch up with your offline database when you reconnect.
Speed – Web services are sometimes agonizingly slow. Though offline programs may feel sluggish, too, you can take steps to speed them up. Online, you’re powerless.
Built-in Utilities – Web services can’t keep your system up and running the way local file management and cleanup utilities can.
Raw Power – Web-based photo editors are improving, but editing video from a browser is still next to impossible. The better way is to use the resources of your own PC.
Easeus Todo Backup Free
Posted by admin on Mar 6, 2012
Taken from PCWorld Magazine, March 2012 Edition
Already the most competent free backup program, Easeus Todo Backup moved beyond file backup and partition imaging in version 3.0. It schedules and performs incremental and differential backups, images your system partition from within Windows, and doesn’t split files unless you want it to. It integrates well with Windows. Double-click any Todo backup file, and the file will open as if it were a folder, for easy browsing and recovery of files and folders individually via Windows Explorer. The program has a full integrated restore function, too.
Todo Backup Free doesn’t do plain file backup – simply copying files to a backup location – and its file selection dialog box doesn’t allow you to drill down into folders in the right pane or expand them for easier viewing. As a result, selecting files is more difficult than it should be. Still, it will be a rare user who requires more features than Easeus provides.
DNS Changer Malware
Posted by admin on Mar 5, 2012
Recently, the FBI uncovered a network of Domain Name System (DNS) servers controlled by cyber criminals. The FBI worked in collaboration with international law enforcement agencies and the cyber security community to disable these malicious DNS servers. Unfortunately, this malicious infrastructure has been used for over 3 years to steal personal information from millions of people around the world. Cyber criminals managed to infect these users’computers with malicious code that changes the users’ DNS configurations to forward all their web content requests to a rogue DNS rather than a legitimate one. As DNS is necessary for most internet activities, the FBI implemented a plan for a trusted private-sector, non-government entity to operate and maintain a clean DNS server for the infected victims until they can be identified and notified.
Cybercriminals use malicious software (malware) called DNSChanger to change the DNS settings in your computer to use one of their DNS servers instead of the ones that your internet provider uses. This malware resides in your computer, but can also affect your home or business network. It may leave your vulnerable to criminal organizations that could misuse and redirect your internet traffic.
To see if your system has been infected, visit www.dns–ok.ca – this website checks your computer settings to see if it’s infected with DNSChanger. If the screen is green, you’re not affected. If the screen is red, your computer is infected with the DNSChanger malware. You should do this test on all computer/laptops within your household or business.
If you are infected, then take your system to your local computer repair shop and they will be able to remove the malware and restore the security settings in your system.
Click here for more information.