Sabtu, 08 Februari 2014

Accessorizing Computers


Accessorizing Computers
Yesterday, we spent about three hours trying to convince a client of ours that brand new computers just don't come equipped with the all things that most computers need in a PC. We tried to convince him that a fully functional computer is one that is personalized with specially selected hardware and software accessories - and that the computer purchased at the store doesn't come with these things. Unfortunately, all of our convincing was to our avail. Our client insisted that he should never need more than what came with his boxed product and that we were just trying "bilk" more money out of him.

As computer consultants, it's our job and mission to make sure our clients are 100% satisfied when they walk out our offices. But our job is unnecessarily made harder when people don't take the time to learn about computer accessories and familiarize themselves with the limitations of store-bought computers. Hopefully by the time you finish reading this article, you'll understand the lesson that we were trying to teach our client: "What comes out of the box is really just a starter kit."

The typical computer package comes with a CPU unit, keyboard, mouse, and speaker set. That may be just fine for some, but most people require more than that especially in today's "connected" society. Today's users require full multimedia capabilities, a wide range of graphics tools, and accommodations for the various portables we now enjoy. These extras aren't included with "what comes out of the box," and the only way to get them is to accessorize.

To illustrate the importance of accessorizing, we like to use the "plain dough" analogy. Let's say that a brand new computer is a batch of plain dough - waiting to be flavored and baked into something useful. If we want to use this dough to make a delicious batch of chocolate chip cookies, we would need to "accessorize" this dough with chocolate chips and a little brown sugar. If we want to use this dough into in a warm loaf of sesame seed bread on the other hand, we'd need to "accessorize" the dough with yeast and sesame seeds.

Like "plain dough," the brand new computer isn't very useful by itself. It needs accessorizing.

Depending on what's needed, accessorizing doesn't need to be expensive.  In fact, you can get away with paying a minimal amount for extra software and hardware if these accessories are for children. It's when these accessories are work requirements or when they're needed to produce works of quality for any other reason that they can become rather expensive. And this expense applies to microphones, digital cameras, PDAs, scanners, video cams, and more.

Regardless of cost, it's important to understand that accessories can become "necessities," and that the best time to get them is the moment you buy a new computer. Waiting too long to accessorize can cause more problems than necessary because while you wait, manufacturers continuously develop new technologies - technologies that your computer won't be able to accommodate in the future. Once you're ready to accessorize, the new products on the market are too advanced for your computer and they just won't work. This is a typical problem experienced by those who want to use hardware designed for Windows Vista on a Windows XP or Windows 2000 machine.

Minggu, 02 Februari 2014

Networking Home Computers


Networking Home Computers


Have you ever thought about networking your computers at home? If you have a small collection of computers around the house (and a small collection of computer users), you can connect each one of those computers to one another and share data, software, and hardware including a single Internet connection. There are many creative uses for home networking, however it's an ideal situation when upgrading each computer to the same capability is financially out of the question. On a home network, each computer has access to the equipment of the better machine in the group as if that equipment were their own.

Connecting computers with either an Ethernet cable or a Wireless connection can create a home network. The easiest and cheapest method uses an Ethernet connection, which requires a series of network cards, a cable for each computer, and a router. The network card is similar to the old modems we used in the past to connect to the Internet, however in a home network, it's used to communicate with every computer that's connected to it.

You'll want to first, select the computers that will connect to each other and then install the network cards inside each of them. Then you'll connect a cable to each computer that will communicate with the server. These cables won't connect to the server directly. Instead, they'll connect to the router. To enable Internet access for each computer, this router will need to connect with a modem of the host machine.

Once the hardware is set up correctly (you'll need to read the instruction manual of your equipment for details), you can then setup the network from Windows on each machine. Within Windows, you can set up a home network similar to the way that you set up an Internet connection. Only this time, you'll set up a LAN (Local Area Network) connection.

Windows should walk you through setting up a LAN after starting the computer and once complete, you can begin to connect one of your machines to the network. You can do this through Internet Explorer by typing in the address and password required to access the router (the address and password required to access the router will be in the router manual).

Connected to the network, each computer can send files back and forth, open programs on a remote computer, play the sound files and videos located on another computer, and share a single Internet account to browse the web, download files, or chat with someone in an entirely different country.  If a single printer is available on only one computer in the network, every connected PC can send documents to it and print them out. Kids will enjoy the ability to play multi-player games and adults will enjoy the ability to blast a single message to everyone at once or maintain a group schedule.

Since we're describing a home network that will connect to the Internet, you're strongly advised to install a protective firewall program to thwart Internet viruses, worms, or other damaging spyware code. Firewalls prevent - but they don't repair. Only anti-virus and anti-spyware programs can reverse damage. So you should install a firewall on the computer that grants access to the computer, and then install an anti-virus and anti-spyware program on each of the remaining computers in the network.

If you have files that shouldn't be shared (bank statements, credit card information, etc.), you can restrict their access in one of several ways. You can put them in a new folder and then remove the "read" permissions for that folder. Or you can specify who can (and who cannot) access specific files with a password from within Windows Control Panel.

Viruses Computer


Viruses Computer
What They Are And One Reason Why People Make Them

Over recent years, computers have become synonymous with viruses and viruses don't show any signs of disappearing any time soon. In recent news, LiveScience.com reported that "Before the month is even done, April has set a record for virus e-mails."1 In the past, we would be comfortable in telling new computer users not to worry about viruses and that catching a computer virus is rare. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention.

In short, a computer virus is a software program designed to destroy or steal data. It attacks computers via distribution - often unknowingly - through email attachments, software downloads, and even some types of advanced web scripting. Viruses that destroy data are known as Trojan horses, viruses that explode their attacks are called bombs, and viruses that duplicate themselves are called worms. Some viruses are a combination of each, however they can be further identified according to where they're located on a computer.

A virus originating from the boot sector of a computer is a boot-sector virus and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to (infects) other programs is a file virus and activates the moment that an infected program starts. File viruses may also be referred to as parasitic viruses, however should a virus work from both the boot-sector and from an infected program, the virus is then known as a multipartite virus.

Why viruses exist remains a mystery, however we had privy access to the mind behind a virus programmer who explained his motivation behind his destructive inclinations. Apparently, this person had a deep grudge against a popular online service which shall remain unnamed. In this hacker's mind, the online service failed to do a quality job in protecting children from online smut and as retaliation, he created and distributed a virus to as many file libraries of this service as he could. His intentions were to disable the computers of the online service's users so much that they wouldn't be able to connect for days. In his mind, the loss of connection meant loss of revenue for the online service.

Although the malicious code that this person generated may have worked for a small percentage of users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null.

We wouldn't be surprised to learn if other motivations behind spreading viruses were similar to this person's, but that doesn't justify the damage that viruses do. Innocent people become pawns for the evil plans of others who've convinced themselves they're doing the "right" thing.

To protect a computer from getting a virus, or clean a virus from a computer system once infected requires the use of an antivirus utility. But may be something else we can do. Perhaps we could make an effort to educate the people who want put viruses into the public about ways to display dissatisfaction with a service or product that don't involve harming innocent parties. In doing so, we just might reduce the number of virus news stories and protect our own investments at the same time.


Protecting Children Online


Protecting Children Online
Steps Toward Making Your Computer "Weirdo-Proof"

It's an unfortunate fact of reality, but children are the most victimized computer users on the Internet today. The good news is that there are some practical steps you can take to protect your children from sexual predators, hackers, and other seedy individuals who want to cause harm. This article will describe a few of them.

The first step in protecting your children at the computer is to prevent their access to  passwords. This will keep them from sharing passwords with others and inadvertently enabling hacking into your system. If you think about it, there's no reason why a five, seven, or even twelve year old needs to know the passwords to sensitive areas on the computer unless you've given them permission! In fact, children don't need to know the password used to access the Internet either. It may be a hassle to type it in each time they want to get online, but it's better to know the times that they connect than to have them sneak online without your permission and knowledge of their activities.

The second step towards protecting your children online is using the computer together. Siting next to your child while he or she peruses the Internet, you can guide him or her to make safe and intelligent decisions. You can approve websites and bookmark them together. You can monitor the conversations your children have with their friends and teach them appropriate online behavior at the same time. You can make recommendations and create a private time for quality time as well.

The third step involves blocking access to inappropriate areas altogether. You and your children may not always agree about what's appropriate, but as a guardian, you're in control and you're ultimately responsible for their safety. Take the time to investigate software tools that put you in control and allow you to block access to certain websites. If you use an online service like AOL (America Online), you can use its internal Parental Control settings to block access to various chatrooms and websites. You could even block instant messaging and email from anyone who isn't a fellow AOL user.

Other tools available online operate similar to the way that AOL's Parental Control settings work, however no collection of tools could replace the reinforcement of mom and dad. Never let your children speak with strangers and never leave them alone at the computer unattended. Children just don't have the experience that adults have and they don't have the skills required to handle inappropriate conversations, emails, or images found online.

NOTE: Some of these tools include kid-specific web browsers that will visit pre-approved websites. Others include browser plug-ins that won't allow access to online areas that contain forbidden keywords.

Another step requires teaching your children to never ever volunteer personal information. Under no circumstances, should children give their personal names, home addresses, phone numbers, or school information to anyone over the Internet regardless of the situation.  In the even this information is required to enter a contest of some sort, be sure that you're the one who makes the decision to supply it and that you're the one who does it.

Performing all of these steps won't be easy. However you can help minimize resistance to your monitoring efforts by explaining why you're taking these precautions. Smaller children will probably enjoy the time you spend together at the computer, but older children and pre-teens may resent it. To help build a case for your concern, you might want to show your older children a few news stories that exemplify the dangers that unsupervised children are exposed to. The newspaper is unfortunately full of examples but with your help, we can reduce them world-wide.





Computer Security


Computer Security
In Today's Society, Protecting Your Computer Is A Requirement

Advances in computer technology is a double-edged sword. On one hand, it affords us quick and easy access to numerous conveniences such as bank statements, favorite shopping centers, school and health records, and more. On the other hand, it can also grant the same access to those who aren't supposed to get it. Although it's a rare occurrence, hacking has become the biggest criminal nuisance in computer history.

Make no bones about it. There's nothing innocent or cute about the hacker. Today's hackers aren't the pimply-faced teen rebels that you might be thinking of. Instead, this generation of hackers are grown individuals who are more than likely earning a living by stealing the identities of innocent, law abiding individuals and then selling those identities to others who want to slip by the system. And the only protection against these seedy people is prevention.

Computer security couldn't be more important than it is today and that's why we've taken the time to introduce it to you.  You can reduce the probability of experiencing identity theft by making your computer as hacker-proof as possible. All that's needed is a little software and a lot of common sense.

1. Install an anti-virus/anti-spyware program. Anti-virus/anti-spyware software will stop malicious code from downloading and installing onto your computer while you peruse the Internet. Known as viruses, worms, or spyware, this malicious code can destroy important files and render your computer good for only one thing: sending sensitive data back to the server of an identity thief.

2. Don't store sensitive data on your computer in the first place. Should your computer get infected with a virus, worm, or piece of spyware, you can thwart the individuals responsible by not storing your personal information on your PC so that when and if your computer does send back data - it won't be anything valuable. Hackers look for things like full names, social security numbers, phone numbers, home addresses, work-related information, and credit card numbers. If these things aren't saved onto a computer, there's nothing critical to worry about other than restoring your computer to a non-virus condition.

3. Don't open files without scanning them with an anti-virus/anti-spyware program. In the past, the warning was to avoid opening files from people that you don't know. Today it's really not safe to open files from anyone (without scanning the files) because that's how viruses get spread - through files - even by mistake. So even though your co-worker may have emailed a funny video, it's no more safe to open than a video downloaded from a complete stranger. Be safe and scan each and every file you download from the Internet or receive through email regardless of where it came from.

4. Create a barrier between your computer and prying eyes. Anti-virus/anti-spyware programs are only effective after the effect. But you can prevent identity theft from occurring by installing a firewall. A firewall is software that checks all data entering and exiting a computer and it then blocks that which doesn't meet specified security criteria (user-defined rules).1

5. Don't click on website links in spam messages. In an effort to obtain personal information, some spammers will send email that asks you to click on a link. The email messages are often disguised as important messages from well-known online establishments, and they often try to scare their readers into clicking links with threats of closing an account of some sort. Sometimes the links are harmless and attempt to con the reader into volunteering personal information (credit card number), but other times the links attempt to download harmful software onto a computer.

Your best protection against computer crimes is your own knowledge. Hopefully the suggestions above will prompt you into taking appropriate action and into protecting your computer with the suggested tools. In doing so, you'll not only protect yourself, you'll prevent the spread of these malicious activities and protect others at the same time.


Basic GUI Terminology


Basic GUI Terminology
Knowing What You're Working With Helps Technicians

Getting help with your computer software can be easier when you know the correct terms to use. One of the biggest problems that new computer users have with technical support is not knowing how to correctly describe the problem that they're having. And it isn't fair to expect a tech support person to automatically know what a "thing-a-ma-jingy," or "whatcha-ma-call-it" is.

The following describes the correct names for common components of software so that when you experience a problem, you can effectively describe an issue that you're having and a technician can readily resolve it.

User interface - this is the visual design of a program. It may contain squares, boxes, words, icons, and buttons. If you're experiencing insufficient memory for example, you might see black rectangles across the user interface of your software programs.

Title bar - this is the top-most part of a program that displays its own name or it may describe the contents displayed in another part of the interface. If a program is incorrectly coded, you may see a wrong description in this part of its interface.

Menu bar - this part of a program displays menu items and menu options. Some of the most common parts of a menu bar grants access to File commands, Open commands, Save commands, and Print commands. An example of an error in this part of an interface would be if an option was missing or grayed out (lighter in color).

Tool bar - this part of a program displays small icons across the top which represent tools. Clicking an icon will open a tool or process a command that might also exist on a program's menu bar. Problems in this part of an interface are uncommon, however if you find yourself repeatedly clicking an icon with no results, you can correctly describe the problem by referring to the toolbar.

Minimize, Restore, and Exit buttons - these three buttons are usually located on the right-most upper part of a program's interface and each allow you to minimize a program's screen, restore it to its original size, or shut down the program completely.

Scroll bar - this convenient tool allows users to move data up and down the computer screen.

Status bar - this part of a program is located at the bottom-most part of its interface, and it usually displays small messages that indicate the progress of a command or task. If programmed incorrectly, an application might display the wrong information in this area.

Context menu - like the menu bar, a context menu displays when a user right-clicks on something. It displays commands just like what you see on a File menu or a Help menu.

Input box - input boxes are usually small rectangles that allow you to type data into a simple interfaces like a webpage or browser window. If you find that you can't type information into one of these, you can effectively resolve the issue with a technician by calling it an input box, rather than a "white rectangle," or "place to put in text."

Button - buttons perform a command after a user clicks them with a mouse. Problems occur when the text of a button is grayed out or if it doesn't appear to sink into the screen when clicked.

Check box - a check box is a small box that allows a user to indicate several choices among many. When clicked, a small "x" displays inside a box. Similar to the check box, a radio button allows a user to indicate a single choice among many. Problems with radio buttons and check boxes occur when a user makes one choice, but the interface reacts as if the user made many choices (or none at all). When describing a problem to a technician, be sure to indicate whether the problem occurs with a check box or a radio box. Computer novices mistakenly interchange the names of both of these controls.