Find yourself with a new Window 8 or 8.1 computer and wish you could take a chainsaw to it?
Are you tired of living in the land of apps when all you really want is a desktop?
Isn’t it great to have a touch screen designed interface on a device sold without a touch screen!
Do you just wish they left well enough alone and you could hop back to an experience you are familiar with?
[av_animated_numbers number=’$40.00′ icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ color=” custom_color=’#444444′ font_size=” font_size_description=” link=” linktarget=’no’ av_uid=’av-7q1pmn’]
Windows 8/8.1 optimization and tweaking package promo.
[/av_animated_numbers]
[av_two_third first av_uid=’av-58n9fj’]Computer Doctor of Hampden is offering a special package which will optimize the performance of your computer and return your desktop to its rightful place, and give you a real start button! Don’t worry your Apps will still be around just not in your face as much. While we have your system in the shop we will do a free hardware check and have a look at your security software.[/av_two_third]
The holiday season is a time of good will, but it also attracts a crowd decidedly lacking in that spirit.
“Holidays, like disasters, are a common time for scams to increase,” said Ed Mierzwinski, director of the consumer program at the U.S. Public Interest Research Group.
With the convenience of online shopping, consumers need to consider the possibility of identity theft. Other holiday rip-offs might not seem as obvious — disguising themselves through advertisements, fake charities or gift cards — but they are a threat nonetheless.
According to an October National Retail Federation survey, one-quarter of consumers plan on completing 26% to 50% of their holiday shopping online this year. Mierzwinski recommends the use of credit cards — not debit cards — when shopping online.
If someone is a victim of identity theft using a credit card, they still will have to undergo an investigation to validate the fraud, but they won’t lose the money in their account.
“You have more rights by law with a credit card than a debit card,” Mierzwinski said.
Other important tips:
Be careful with gift cards: Consumers need to act cautiously because scammers can copy or use portable scanners to get the code of a gift card and place it back on the rack. When consumers purchase the cards and activate them, the thieves can discover the values and take advantage online or in stores.
Make sure your shopping sites are legit: National Consumers League executive director Sally Greenberg said consumers should check the legitimacy of online shopping websites, especially when buying from unknown stores, and read the return policies.
Be wary of cut-rate pricing: Online advertisements for merchandise priced well below the product’s typical cost are a trick used by scammers looking to get personal identification from consumers or to install malware — software that performs unwanted tasks and gathers private information — on their computers.
As a precaution, said John Breyault, a consumers league vice president who specializes in telecommunications and fraud policy, people should have their antivirus software up to date when shopping online.
Watch out for charity scams: Phone calls and websites can solicit information from donors by posing as charities, and then steal from those who fall for the trap.
Mierzwinski said potential donors should use websites to check the legitimacy of charities, including GuideStar USA Inc. (www.guidestar.org) and CharityWatch (www.charitywatch.org). Fraudulent charities can disguise themselves by using names and Web addresses similar to real ones.
In terms of phone calls and emails from charities, Breyault recommended hanging up and deleting the emails. “If you’re thinking about donating to a charity,” Breyault said, “go to that website on your own.”
As if there aren’t enough scams out there, here is another one to add to the mix. There are reports of residential and business users receiving call stating they are from a “global it center” and reporting that you have been sending out viruses and it is your responsibility to stop doing this. It is a pretty elaborate scam that hooks folks in by building fear and panic.
One of the claims they use is that your “Windows Warranty” has expired and because you let it expire, this is causing your problems and you are required to fix it”.
It appears these cold calls originate in India and are routed through US numbers. If you think you may have been a victim of one of these scams please contact your local better business bureau and credit card company.
If you have a question about the benefits of any performance , security or extended warrant programs. Feel free to give me a call at our office 207.862.7019 or email [email protected]
As a Computer repair specialist in the Bangor Maine area, I find myself in need of specific parts for PC’s and Mac’s and given the urgency that customers want their system’s back, I utilize every resource to get the right part ASAP. This brings me at times to Craigslist. I want to preface this by saying, not all craigslist deals are bogus, but I have found a disturbing trend of Spam generating specifically from replies I have made to craigslist. The ones I have seen are primarily sent from Russia and because I am responding to computer related sales, the Spam I am getting is for discount software. The way I was able to discern the Spam was coming from Craigslist specifically is actually the solution to the problem.
I started my online adventures in technology at a time when the internet for commercial use was in it’s infancy, so, yes right after Al Gore invented it! I was screaming across the internet at blazing speeds on my 14.4k dial up connection on my way too expensive 386/16 machine with 4 megabytes of ram, that was when someone actually published a hard copy yellow pages of the internet. As time passed I eventually opened up a yahoo email in 1997 and still have it to this day, it is now the repository of tens of thousands of Spam emails as over time I relegated this account as my garbage email address. Any online forum or inquiry that doesn’t have something to do with someone or some entity that I know or do business with gets replied to with my yahoo address.
This kind of tactic has kept my main email addresses on my own domain relatively spam free, not to say I never see an ad for a “genuine rolex” or queries on my need for Viagra or Cialis, which thankfully at 46 I am not in the market for. No I still get the occasional offer of ex Soviet block single ladies looking for Mr. Right in America, but in comparison my daily Spam intake is minimal. Out of haste one day I made the faux pas of replying to a Craigslist ad using my “good” email address. It took me a few days to make the connection that my new found techno based russian originated spam was a direct result of my craigslist responses, how I nailed it was to start another throw away account on my own domain. I quickly set up [email protected] and responded to a few ads, within 24 hours I had no replies to my inquires on items for sale, but started receiving the russian based software selling spam 3-4 times a day.
My advise is to create your own “throw away” email specifically for correspondence with unknown entities. Save yourself the hassle of a spam filled inbox and possibly risking a virus attack. When you do make a connection with someone for a purchase here is what Craigslist recommends
Insist on a public meeting place like a cafe
Do not meet in a secluded place, or invite strangers into your home
Be especially careful when buying/selling high value items
Not that we need another label to identify something we already know, I ran across this little article and thought I would share with you. As a computer technician and business owner, I see the impact that technology has in regards to enhancing productivity as well as the frustration when things “don’t work as they should”. The millennial generation which has grown up with computers have a much greater understanding and sometimes more patience when dealing with the benefits and shortcomings of technology. As the “baby boomer’s” and to a lesser extent “Gen Xer’s” are forced to embrace technology either by changing job descriptions or peer and family pressure I see the frustration when things go awry and are not as intuitive as they should be. I have battled with tech support, usually advocating for a warranty claim for my customers, and can see how someone without a technical background and an extreme level of patience would hang up and throw in the towel when faced with technology failures. Is there a solution? No, but realizing we are all in the same boat is a start. Don’t forget to BACK UP YOUR DATA!
<Slow boot times, continually crashing PC’s and annoying tech support people all add to our overwhelming sense of Computer Stress Syndrome in today’s digital society, according to a new study.
We are all digital-dependents now, whether we embrace tech or reject it like modern-day Luddites.
As such we find ourselves “increasingly overwhelmed and upset with technical glitches and problems in [our] daily lives,” says a new report called “Combating Computer Stress Syndrome.”
Computer Stress increases
The report was based on a survey of over 1000 American communications workers by a Customer Experience Board created by the Chief Marketing Officer Council.
It pointed towards “frustrating, complex computers and devices, technical failures, viral infections, and long waits to resolve support issues” as the primary reasons for computer related stress in workers.
The study concluded that: “The reality is that numerous, persistent problems are troubling most computer users, creating unnecessary anguish and anxiety as a result.
“Digitally dependent users are getting fed up and frustrated with the current state of computer related stress, and clearly looking for a better way to address and reduce it.
“Users face a continuous state of technical anxiety and challenge such as setting up new computer products, keeping up with software upgrades and migrating to new applications and operating systems, as well as dealing with malware infections, web threats, identity theft and more.”>
With the yet to be seen onslaught of hurricane Irene pending, as folks scramble for bottles of water and stashes of Butterfinger’s to ride out the storm, it might be time to consider a back up plan. While we may not be able to have a back up or do over for everything in life, isn’t it nice to know we can at least safeguard our digital memories and important data files. On a daily basis I see customers walk in with a dead laptop looking like their favorite dog just got hit by a car. After a bit of small talk and background information I get to the key question ” how is your data backed up”? Usually what follows is a long sigh…a look of despair and the inevitable answer, nothing is backed up.
With luck and some level of skill I can usually save the day and pull years of birthday parties, summer vacations and countless tax returns out of the firm grasp of a dying or infected hard drive. But the other option is the rebuilding of your hard drive in a clean room environment at the cost of hundreds to thousands of dollars, or even worse, that cherished picture of your crazy uncle who since passed away doing something incredibly stupid is gone for good.
So before the category three or tropical storm hits you here are some basics points to ponder.
Computer don’t like water.
If it gets wet leave it alone and bring it to someone who knows what they are doing, never mind the blow dryer and the finger crossing. Don’t turn it on!
Have a back up of all your critical data.
Have another back up in a different location, either online or stored somewhere else.
Remember your hard drive will fail, not if , but when and as computers get cheaper, hard drives fail sooner. I see it daily.
If your system or primary backup system involves a raid array, make sure you have a back up system that doesn’t.
Having recently been diagnosed with tendonitis in both arms and wrists, I am trying to implement some changes to make working more comfortable. Here is some information to help promote work comfort.
Those include your posture, the way you are using the mouse and keyboard, and monitor position.
Frequent inaccurate use of a mouse when working on the computer can lead to a condition called as repetitive strain injury or mouse arm.
Arm pain includes tingling, numbness, and weakness in the lower arm and hands.
These signs are due to overstressing of the tendons and nerves due to repetitive motion.
What cause arm pain?
Constant clicking with the computer mouse and abnormal hand position can cause damage to the tissues and in the long run which can lead to inflammation of the nerve fibers. The mouse click movements on its own can also trigger pain.
How to reduce arm pain?
Following ergonomic working methods can prevent RSI.
Restrict the use of mouse and use keyboard commands, since there are many program functions that can be executed with keyboard commands.
To perform the double click action there is the middle mouse button or the scroll wheel.
The size of the mouse should be appropriate and is suitable for your hand.
Use a wrist rest. They can guard against inflammation.
Padded rests for the ball of the hand can also reduce the strain on your arm.
Some other alternate input options like voice recognition or graphic tables can reduce arm pain.
Regularly perform stretching exercises, natural arm and hand movements and also take frequent work breaks help keep the arm musculature relaxed.
Use of forearm support can reduce supper body pain and prevent musculoskeletal disorders. This is a good solution for those who use computer for more than 20 hours per week.
Maintain an erect posture to reduce pain in your arm.
Adjust the arm support and work surface height so that forearms are parallel to the floor.
Proper positioning of your keyboard and mouse can minimize the pain.
Your chair height should be arranged in a fashion so that your thighs are parallel to the floor.
When you are sitting and working in front of the computer, don’t twist your body.
Keep your back at a right angle when your arm rest is at the right height.
One of the best things I have found is to get up and move. I have the benefit and curse of being self employed, so theoretically I can get up and move whenever I want. Sounds good doesn’t it? Well I tend to get engrossed in what I am doing and the time flies by. So I am now setting a timer on my computer to go off every 45 minutes to remind me it’s time to take a break, walk around and stretch.
I was happy to hear that I am not yet diagnosed with arthritis, come on I am too young for that, right? But this chronic pain really stinks, I thought I could rehab myself by cranking open every canal lock in the midlands of England, while fun and great exercise, I didn’t come home with forearms like Popeye or any less pain in my arms. I am hopeful that using some of these tips will help, voice recoognition is not the easiset way to get around a computer…yet.
Take a proactive approach to protecting your data. Here are some great tips that can save frustration and potential loss of data and productivity.
The links will take you to the US-Computer Emergency Readiness Team website, an ounce of prevention is worth a pound of cure!
Safeguarding Your Data
When there are multiple people using your computer and/or you store sensitive personal and work-related data on your computer, it is especially important to take extra security precautions.
Why isn’t “more” better?
Maybe there is an extra software program included with a program you bought. Or perhaps you found a free download online. You may be tempted to install the programs just because you can, or because you think you might use them later. However, even if the source and the software are legitimate, there may be hidden risks. And if other people use your computer, there are additional risks.
These risks become especially important if you use your computer to manage your personal finances (banking, taxes, online bill payment, etc.), store sensitive personal data, or perform work-related activities away from the office. However, there are steps you can take to protect yourself.
How can you protect both your personal and work-related data?
Use and maintain anti-virus software and a firewall – Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall (see Understanding Anti-Virus Software and Understanding Firewalls for more information). Make sure to keep your virus definitions up to date.
Regularly scan your computer for spyware – Spyware or adware hidden in software programs may affect the performance of your computer and give attackers access to your data. Use a legitimate anti-spyware program to scan your computer and remove any of these files (see Recognizing and Avoiding Spyware for more information). Many anti-virus products have incorporated spyware detection.
Keep software up to date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities (see Understanding Patches for more information). Many operating systems offer automatic updates. If this option is available, you should turn it on.
Evaluate your software’s settings – The default settings of most software enable all available functionality. However, attackers may be able to take advantage of this functionality to access your computer. It is especially important to check the settings for software that connects to the internet (browsers, email clients, etc.). Apply the highest level of security available that still gives you the functionality you need.
Avoid unused software programs – Do not clutter your computer with unnecessary software programs. If you have programs on your computer that you do not use, consider uninstalling them. In addition to consuming system resources, these programs may contain vulnerabilities that, if not patched, may allow an attacker to access your computer.
Consider creating separate user accounts – If there are other people using your computer, you may be worried that someone else may accidentally access, modify, and/or delete your files. Most operating systems (including Windows XP and Vista, Mac OS X, and Linux) give you the option of creating a different user account for each user, and you can set the amount of access and privileges for each account. You may also choose to have separate accounts for your work and personal purposes. While this approach will not completely isolate each area, it does offer some additional protection. However, it will not protect your computer against vulnerabilities that give an attacker administrative privileges. Ideally, you will have separate computers for work and personal use; this will offer a different type of protection.
Establish guidelines for computer use – If there are multiple people using your computer, especially children, make sure they understand how to use the computer and internet safely. Setting boundaries and guidelines will help to protect your data (see Keeping Children Safe Online for more information).
Use passwords and encrypt sensitive files – Passwords and other security features add layers of protection if used appropriately (see Choosing and Protecting Passwords and Supplementing Passwords for more information). By encrypting files, you ensure that unauthorized people can’t view data even if they can physically access it. You may also want to consider options for full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data.
Follow corporate policies for handling and storing work-related information – If you use your computer for work-related purposes, make sure to follow any corporate policies for handling and storing the information. These policies were likely established to protect proprietary information and customer data, as well as to protect you and the company from liability. Even if it is not explicitly stated in your corporate policy, you should avoid allowing other people, including family members, to use a computer that contains corporate data.
Dispose of sensitive information properly – Simply deleting a file does not completely erase it. To ensure that an attacker cannot access these files, make sure that you adequately erase sensitive files (see Effectively Erasing Filesfor more information).
Follow good security habits – Review other security tips for ways to protect yourself and your data.
Here is something to think about, generally as long as the computer is working, we don’t give it much thought. When a virus strikes many jump into action as their data may not be backed up and they run the risk of losing pictures, music, video, documents, spreadsheets, tax info Quickbooks, you get the idea. Something else to consider is disk space. Modern computers generally come with much larger hard drives then those we say even 5 or 6 years ago. As the computer becomes the catch all for our memories and in some cases business life we need to keep an eye on how much storage we have. Windows itself, takes more and more space with each update, compound that with the files that may get stored from emails, programs you install and may never use space disappears rapidly. If you have large video/music collection that is stored on your main hard drive and/or have an older XP machine that may only have a 40-80 GB hard drive you run the risk of running out of space.
What can happen? On older machines with limited physical memory (RAM) as you open more programs windows needs more resources to keep things going and it tries to use hard disk space (swap file) to execute your commands. When this is limited windows grinds to halt, some folks will delete a few files here and there to try and keep things going, what happens is the drive becomes more and more fragmented, slowing you down even further. I recently ran into a situation that required extensive data recovery due to file system corruption from running out of space.
What are some of your options?
When purchasing a new computer go for a big hard drive! Setting up a second partition for data files can simplify things for data management and if you need to recover files.
For desktop computers there is usually space and accommodations for multiple hard drives. Hard drives can be “cloned” to the larger drive to increase space or transfer the data files to the new hard drive.
Laptops generally have space for one drive, again we can clone the drive to a larger one, or set up an external drive or network storage drive to store the files.
Cloud storage is an inexpensive way to back up or store data files.
A good rule of thumb is when your free disk space is less than 30% of the total drive it is time to start looking into options.
Need help? Call, email or check our website, we have a live chat feature and can help find a solution that works for you.
Hard drives fail. All of them…eventually. I love my iMac, It is a finely crafted piece of aluminum that greets me everyday with a beautiful bright gl...
Here is something to think about, generally as long as the computer is working, we don’t give it much thought. When a virus strikes many jump into action as...