Three Reasons to Get Rid of an Old Computer

old comp

It is virtually impossible to keep up with technology, but it is also hard to get rid of a computer that still works.  Use these simple guidelines to see if your computer might be ready to be traded in or recycled.

  • Doesn’t fit needs: Your computer no longer meets your current computer needs.
  • Can’t load certain programs: If you can’t load the latest word processing programs or security packages, you probably want to get a computer with a more current operating system.
  • It takes longer to warm up than work on it: Do you find yourself leaving the room after you turn your computer on because it takes so long to load and get on the internet? This might be a sign that a new computer with faster processing speeds in your near future.

If you find that it is time to get rid of your old computer, check to see if your local computer store will offer you a discount on your new computer purchase if you trade it in.

When a computer is beyond worth or repair, make sure to recycle it through an authorized computer recycling location.

Written By: A. Murphy, TLC Computer Solutions, Las Vegas, NV

Top Causes of Identity Theft

Identity-Theft

With all the news about security breaches from various companies and institutions, you would think that the internet is the most common way thieves steal your identity, but there are many other ways to have your personal information taken advantage of quickly.  Here are a few:

  • Purse or wallet: A stolen or lost wallet is the easiest way for a thief to steal your identity and have direct access to your identification and credit cards including the code on the back.
  • Shoulder Surfing: Be aware of your surroundings, many sneaky thieves peek over your shoulder while in ordinary places like the grocery store or library.
  • Mail: A thief may steal mail from financial institutions right out of your mailbox or forward your mail directly to them until you notice.
  • Garbage: Some thieves are not above dumpster diving and stealing information from mail and publications you throw away, be sure to remove all personal information.
  • Scanning Devices: Some thieves put scanning devices on ATM’s and other self-pay devices, these scanners copy and steal the information right off your credit card
  • Phone Scam: Never give out personal information over the phone, many scammers convince you to give them personal and financial information by claiming to be a trusted a source.
  • Internet: There are many phishing scams on the internet that entice you to click on a link that allows the thief to obtain your personal and financial information.

Although you can’t guarantee the safety of your personal information, even if you are careful, there are companies that will monitor it and notify you immediately if identity or financial theft is suspected.

Written By: A. Murphy, TLC Computer Solutions, Las Vegas, NV

Three Top Security Packages for your Computer

Most people have a considerable amount of important, sensitive data stored on their computers.  This includes everything from bank access and credit cards, to personal identity information.  It is important to use a security package that covers important security issues to avoid financial or identity theft. Here are 3 of the top rated security packages of 2015.

  • Bitdefender Total Security: This package does well against malware, spam, and phishing. It also includes parental controls and a password manager. It does lack some extra features on the parental controls and doesn’t offer any backup.
  • Webroot Secure Anywhere Internet Security Complete: This Webroot program installs and scans very quickly. It also provides great protection against malicious URLs.  Unfortunately, it doesn’t have spam protection or parental controls.
  • Kaspersky Internet Security: This packages scores well in all security areas and has no-hassle firewall protection. On the down side, the parental controls don’t offer real time notification and don’t allow you to configure them remotely.

When you get a new computer, make sure you are protected by a reputable security suite or ask your local computer technician to install one on your computer before you access the internet.

Written By: A. Murphy, TLC Computer Solutions, Las Vegas, NV

Why do I Need to Delete Temporary Internet Files?

Cleaning_Files

Every time you go to a website, temporary files are being stored on your computer.  This may be anything from pictures or text to items in a shopping cart.  Over time, these files begin to take up a great deal of space on your hard drive.   To prevent the buildup of these files, clear your browsing history and delete your cookies every month or so, depending upon how often you access the internet.  When clearing these files, you can choose which files to delete permanently and which you find convenient to keep (such as logins, etc.).  It is not recommended that you keep your password files stored.  It may seem convenient, but it can be a security threat.  A better option would be to keep your passwords in a password manager that encrypts them.

Here are simple instructions to clearing your temporary internet files in the most popular browsers:

Google Chrome:

  • Click on Tools
  • Select History
  • Click on Clear Browsing Data
  • Select Empty the Browsing History, Download History, Cookies and Cache
  • Click on the Clear Browsing Data button

Firefox

  • Click on Tools
  • Select the Options button
  • Go to the Privacy tab and click on Settings
  • Check the Cache
  • Click on OK and Clear Now

Opera

  • Click on Tools
  • Click on Delete Private Data
  • Click on the Details button
  • Check Browsing History and Cookies
  • Click Delete

Safari

  • On Mac products, click on the menu, then Empty Cache
  • On Windows, click Edit, Select Empty Cache, then click Empty

Internet Explorer

  • Click on Tools
  • Click on Clear Browsing History
  • Select Temporary Internet Files, Cookies, and History
  • Click on Delete

Written By: A. Murphy, TLC Computer Solutions, Las Vegas, NV

Ransomware…fast-growing form of hacking

ran

One of the latest forms of hacking involves a software that hackers use to lock your files and then request a ransom to have them unlocked.  It can happen to large business networks as well as home computers.  The request often comes after you open a link or attachment in an email.  It explains that all your files will remain locked until you pay a certain amount, often around $500.  Hackers usually prefer payment in bitcoin, which is tougher to trace, and once the payment is received, they send you a code to unlock your files one by one.  This can be extremely costly to a business with thousands of important documents as well as individuals with just a few critical documents encrypted.  The best way to avoid the consequences of ransomware is to have your files backed up in a separate location (hard drive or cloud storage) and to not open any suspicious links or attachments.  Once your computer has been infected, there is not much you can do to unlock you files without paying the ransom. The best case scenario would be to reset your computer to the factory settings and reload your documents from a backed up version.

Written By: A. Murphy, TLC Computer Solutions, Las Vegas, NV

Is Your Watch Smart?

 watch

Twenty years ago, most people didn’t believe that they would be carrying around a personal computer in their pocket (cell phone) let alone on their wrist (smart watch).  Today, wearing your computer on your wrist might be normal, not just a crazy idea from a futuristic movie. Many companies have come out with smart watches that are able to handle phone calls, text messages and even keep up with social media.  Before Apple launches the long awaited “iWatch”, let’s look at some of the most important features to consider and some the best ones currently on the market.

Before buying a smart watch, you might want to consider its compatibility; some are built for Androids, some for Windows, and some for iPhones, while others work with multiple operating systems. Make sure the watch you choose works seamlessly with your device.  Also, check out the features on the watch.  Almost all of them come with basic time and calendar options, but others have more options such as social media alerts and voice features. Lastly, look at the design and see if it is aesthetically pleasing to you.  Some watches are big and bulky and others look very similar to a traditional watch.

Here are some of the top watches on the market this year:

Samsung Galaxy Gear – This stylish watch pairs with the Galaxy S3 or S4 phone which allows you to customize the interface.  It is a touchscreen watch and has some voice activated features.  Automatically locking your phone when more than five feet away is a nice security feature offered on this phone.

MetaWatch Frame – This watch is a little bulkier than others but it is very rugged and may withstand a depth up to 65 feet.  It works off an app on your phone and the features are somewhat dependent upon which operating system you use.  The screen is easy to read without an LED display but it does not offer a microphone or speaker for voice commands.

Pebble – One of the most customizable watches on the market, the Pebble allows you to download various watch faces to reflect your personal style. Navigation is done by four buttons on the side of the phone and it does not have a voice control feature. The Pebble does provide notifications for texts, email, social media and weather updates as well have a non-LED screen that is easy to read.

I’m Watch – With a bigger display screen, this watch may be a little bulky for some users. This watch has its own app store which allows users to run many social media apps in addition to email and text messaging.  The speaker and microphone is convenient for voice commands and playing music. Also, the charging port doubles as a speaker input, but you will need it often because it has a short battery life when it is connected to Bluetooth.

What technology do you think will be next? Will we be wearing our computers on our glasses and manipulate them with our eyes? Good luck finding the smart watch for you.

Written By: Amy Murphy, TLC Computer Solutions, Las Vegas, NV

Deleting Cookies from Your Computer

Image

Cookies may sound like a nice idea after lunch…unless they are on your computer.  A cookie may also be called HTTP cookie, web cookie, or browser cookie.  They are little pieces of data that a website sends to your computer and gets stored in your browser. Originally, cookies were meant to be helpful, they can  remember previous visits, including product preferences, personal information, and items in your shopping cart.  This saves the user time from re-entering data every time they go to a website.  Unfortunately, third parties and hackers are sometimes able to get to this personal information and use it in a malicious way.

Each browser requires a little different process to remove cookies, but once you learn the simple steps for the browser you use, deleting cookies can become a simple process you do frequently.

Internet Explorer

  1. Go up to the Internet Explorer window and click on the “Tools” button.
  2. Scroll down and click on “Delete Browsing History”.
  3. A box will come up on the screen, check the box next to “Cookies” and any other browsing data you wish to remove.
  4. Go down to the bottom of the box and click on the “Delete” button.

Google Chrome

  1. Click on the Chrome menu icon on the top right side of the window (3 lines).
  2. Go down to “History”.
  3. Click on “Clear Browsing History”.
  4. A box of options will come up.  Check the box with “Delete cookies and other site and plug-in data”.  Look through the other options and click others you wish to delete.
  5. Then, click on the “Clear Browsing Data” button at the bottom.

Firefox

  1. Click on the Firefox menu.
  2. Scroll down and click on “Options”
  3. Click on “Options” again.
  4. Click the “Privacy” tab.
  5. Go to the “History” section and click on “Remove Individual Cookies”.
  6. At the bottom, click on the button that says “Remove All Cookies”.

Safari

  1. Click on the “Gears Menu” in the upper right hand corner.
  2. Select “Reset Safari”.
  3. A box of options will come up, click on the “Remove all website data”.  You can check more options if you would like to clear up other items on your computer.
  4. At the bottom of the box, click on the “Reset” button.

Each browser controls cookies a little differently.  Some browsers will allow you to disable all cookies.  This means your data will not be stored when you go back to a website.  In addition, some browsers allow you to “view” cookies and see exactly which cookies are on your computer.  As a user, you need to make the decision about how much information you want accessible to the websites you use and if you are willing to take a risk that a hacker could possibly gain access to that information.

Now that you are more familiar with cookies and comfortable removing them from your computer, sit back, knowing your computer is more secure, and enjoy a chocolate chip cookie.

Written By Amy Murphy, TLC Computer Solutions, Las Vegas, NV

www.tlcpcsolutions.com

Music Apps Made Simple

Do you ever rack your brain trying to remember who sings the song that’s playing on the radio? Are you ever in the mood to listen to a certain type of music, but it’s not in your music library?  Well, you’re in luck, there are many music apps out there which can help music lovers find what they are looking for.

One type of music app helps you locate the names of songs and artists that you are listening to at the moment.  Here are two popular ones to check out:

 Shazam – This app allows you to hold up your phone to your radio, at a concert, in an elevator, or anywhere you hear music and determine the title and artist in seconds. Once the app has determined the song, it allows you to see the lyrics, learn more about the artist, find concert schedules, and other information related to the song.  Shazam doesn’t forget the social aspect, allowing users to comment on tags and share comments with other users.  

Soundhound – In addition to identifying songs and providing information, Soundhoud also recognizes melodies from a person humming or singing.  This app is also capable of using your IOS library and playing the song from your own device.

If you are tired of listening to the same limited radio stations, there are apps which help you create “new stations” and/or provide you with a massive library of music, more than you could ever own. Here are a several popular apps in this category:

Pandora  – This widely used app allows you to create up to 100 of your own unique stations based on artists, genres, beats, etc. Once you have created a station, you can create a profile and share your stations with other users.

Spotify – The free version of this app is like radio with advertising.  In addition to stations, you can also share music and access information from many other related apps through Spotify.

Songza – If you are looking for music to pump you up, help you relax, play in the background while you work, Songza will pick the right songs for you.  You can also save your playlists and share them with friends on social media outlets like Facebook and Twitter.

Rdio – This is a subscription based app that allows you access to millions of songs and allows you to share without having to go through a social media source. You can also use this app on multiple devices and control one device from another.

Music on demand has revolutionized the way we listen to and share our music today.  There are apps out there for every type of music lover and his/her mood.   It starts out as simple as holding your phone next to a speaker and before you know it, you’re friend across the country is listening to the same “station”.

Written By: Amy Murphy, TLC Computer Solutions, Las Vegas, NVImage

Child-proofing Your Computer

Are you missing files? Did your settings change unexpectedly? Does your child spend too much time on the computer?  If you answered “yes” to any of these questions, you might have an experimental toddler, a computer savvy teen, or any age in between child that uses your computer also.

Password Protection

Put a password in place for each user.  Also, make sure that if you walk away from your computer it goes into a locked mode when the screen saver or sleep mode comes on.  If you are unfamiliar with how to set passwords, go into your computer’s control panel and click on “user accounts and family safety”, then click on “user accounts”, and finally, “create a password for your account”.

Use a Guest Account

You could allow your child to use a guest account in Windows.  By nature, this account has less permissions.  Guest account users won’t be able to install programs or change settings. By default the guest account is turned off in Windows, but is simple to turn on under account users in the control panel.

Built-in Parental Controls

Both Windows 7 and Windows 8 come equipped with built-in parental controls.  You can gain access to these controls under “user accounts and family safety”.  The parental controls allow you to monitor the time your child is on the computer.  You can block off specific days and times the child is allowed access.  In addition, you can filter games your child is able to play by the game’s rating and name. Lastly, the parental controls allow you to designate which programs your child is allowed access to. 

File Protection

You are able to lock or encrypt certain files you want to make sure your child does not read or change. To encrypt a single file, right click on the file, choose “properties”, then under the “general” tab click “advanced”, and then “encrypt contents to secure data”.  To build a container for encrypted files, many computer users turn to TrueCrypt, a free program, that allows you store files securely and doesn’t show up on your computer unless you need to use it.

Two Operating Systems

It is possible to install two operating systems.  You may want to use Windows 7 for your personal computing and put and old copy of Windows XP on as a secondary operating system for guests.  This assures you that guests cannot make any changes to your system, or if they do, you can reinstall the original settings without touching your other operating system.

Buy a Program

The software market has many options for parental control programs, from very basic to being able to watch every move your child makes on the computer. One free program is OnlineNorton.Family offering many parental controls including supervised chats and blockage of specific sites.  Due to the cloud storage of the controls, you are able to change settings and monitor remotely.  NetNanny 6.0 for about $39.95 provides many parental controls as well as recording chat sessions and emails.  It can also be accessed remotely.   A third software program out there is Safe Eyes 5.0 for about $49.95.  Providing tough security for children and monitoring of up to three computers, it provides more security features than many of the other software options.

It’s important to look at the ages of your children and security your needs before you decide on a security program or combination or security controls.

Written By:  Amy Murphy, TLC Computer Solutions, Las Vegas, NV

 Image

“Falling” for iOS7

With the release of iOS7 sometime this fall, Apple users will see big changes in the most popular operating system for phones and tablets.   Although not all the new features have been divulged by Apple, they have shared some significant ones.

Control Center

Icons on the control center have been given an overhaul; most noticeably, they appear more flat and have slight changes to their colors and fonts.  One of the bigger changes is a translucent bar that you can swipe from the bottom.  It allows you to control more items quickly such as airplane mode, brightness, and the integrated flashlight.  The music options will still be available on this tool bar.  In addition, a full-screen notifications bar is available in the lock screen so you don’t have to go into individual apps.

Camera and Photos

The camera feature has some new options including adding different shapes to pictures and using different lenses to change the appearance of pictures.  Zooming in on videos will now be available by pinching the screen out just like on the camera mode. The photo gallery will now organize your pictures into “moments” by location, putting all the pictures from a specific event together for easier viewing.

Music

The music from the cloud will now be visible on your phone alongside the music stored internally.  When holding your phone horizontally, you will be able to see all your tracks by swiping sideways and touching the albums you want to zoom in on.  With the new iOS7, Apple will also be releasing iTunes Radio, an integrated music system that has been in the works for quite some time.

Safari

This browser look has changed slightly, most evidently in the URL bar design which has been condensed, allowing for more to be seen on the screen.  Also, being limited to 8 open tabs is no longer a concern, with the cloud, tabs are almost limitless.

Siri

Siri will no longer be only a woman; you will be able to change her voice to a male voice or to different languages.  Siri will also be “smarter” and understand more commands such as “turn up brightness”.

Along with all of these new changes in the operating system arriving this fall, you can be assured that Apple has some more features tucked up its sleeves.

Written By:  Amy Murphy, TLC Computer Solutions, Las Vegas, NVImage