Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://cgltech.blogspot.com/rss.xml

  1. <?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-30397837</atom:id><lastBuildDate>Fri, 08 Mar 2024 06:16:57 +0000</lastBuildDate><title>Computer Guys Live Free Tech Tips</title><description>The Technicians at Computer Guys Live share their computer tech tips, reviews, and knowledge for the computer user.</description><link>http://cgltech.blogspot.com/</link><managingEditor>noreply@blogger.com (Lone Bird Studio Ltd.)</managingEditor><generator>Blogger</generator><openSearch:totalResults>21</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-8019028653343016099</guid><pubDate>Tue, 08 May 2007 13:55:00 +0000</pubDate><atom:updated>2007-05-08T09:16:41.453-05:00</atom:updated><title>E-mail survival / etiquette ....</title><description>If you haven’t noticed, email has replaced everything as the most common form of&lt;br /&gt;communication in use today. Text messaging is growing fast but that is for another&lt;br /&gt;article. &lt;br /&gt;&lt;br /&gt;This article is about e-mail. Email has become the preferred method of business, even for civilians. In fact, the largest and fastest segment of the computer market is the 60 and older crowd. &lt;br /&gt;&lt;br /&gt;It is easy to understand why. E-mail offers convenience and multi-media abilities.&lt;br /&gt;Now there are a lot of rules as far as security and safety are concerned. What about&lt;br /&gt;the rules of etiquette that govern e-mail? Do you know what the new rules are? Do&lt;br /&gt;you know when to respond or not? &lt;br /&gt;&lt;br /&gt;Well, I did some research and here is some of what the “experts” say: The first, and this is most important. E-mail  IS NOT PRIVATE! No matter what you may think or feel, email IS NOT PRIVATE. Once you write and send something, it is out there. And, it may be stored on a dozen servers along the way. NEVER put anything in an email that you would not want somebody to read. It will happen.&lt;br /&gt;&lt;br /&gt;Another important thing to remember is that  &lt;a href=&quot;http://computerguystechsupport.blogspot.com/&quot;&gt;e-mail is a “best effort” service&lt;/a&gt;. This&lt;br /&gt;means that it is not a guaranteed service. Nobody makes any promises as to delivery&lt;br /&gt;or security. Your email may get there instantly or it may take hours and it may do both in the same day. Once you send it and the mail clears your providers server, it is in the cloud and out of your control. So just be aware.&lt;br /&gt;&lt;br /&gt;Now on to the dos and don’ts. Don’t - Post your address on a website or anywhere&lt;br /&gt;online. Once the spam starts it does not end. Don’t - Send or forward chain letters.&lt;br /&gt;This is a fast way to spread infections. Don’t - Send large attachments. Don’t  - Reply to an email when angry. You will regret it. Don’t - Leave e-mail on the server,&lt;br /&gt;especially large attachments. This will clog your inbox and can prevent mail from&lt;br /&gt;coming in. Email is not a storage device and your data will not be safe.&lt;br /&gt;&lt;br /&gt;Now some dos: Do - Be polite, email can be easily misinterpreted. Do - Tell the&lt;br /&gt;recipient  when you  forward a message to someone else. Do - E-mail is generally&lt;br /&gt;informal but be careful. Because, again, email can easily be misinterpreted. Do - Keep messages to the point. Do - Reduce large files (pictures, video) before you send them.&lt;br /&gt;&lt;br /&gt;Most imaging software comes with a function to reduce these for e-mail. Also most&lt;br /&gt;e-mail services have a limit on the size of attachments. Do (and my personal peeve) -&lt;br /&gt;Not all e-mail requires a response. But there are times when a simple “got it” can save so much confusion. This is especially true if there is a question or attachment.&lt;br /&gt;&lt;br /&gt;So there you have it. There are more rules. These are just the ones I like. A simple&lt;br /&gt;understanding of how e-mail works will help relieve a lot of frustration.&lt;br /&gt;(Read More on &lt;em&gt;&lt;a href=&quot;http://computerguystechsupport.blogspot.com/&quot;&gt;How e-mail works&lt;/a&gt;)&lt;/em&gt;&lt;br /&gt;By Chris Kaminski,&lt;br /&gt;Head Tech for &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live&lt;/a&gt;</description><link>http://cgltech.blogspot.com/2007/05/e-mail-survival-etiquette.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-3000262642602650197</guid><pubDate>Sat, 24 Mar 2007 17:40:00 +0000</pubDate><atom:updated>2007-03-25T16:31:54.709-05:00</atom:updated><title>Dont&#39; Let Congress Gut the Internet&#39;s First Amendment</title><description>&lt;em&gt;&lt;strong&gt;Save The Internet For Small Business!!&lt;/strong&gt;&lt;/em&gt;&lt;br /&gt;&lt;br&gt;&lt;em&gt;&lt;strong&gt;&lt;strong&gt;&lt;a href=&quot;http://www.savethenet.com/&quot;&gt; Make NET NEUTRALITY the Law in 2007&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;&lt;br&gt;&lt;br /&gt;&lt;object width=&quot;325&quot; height=&quot;250&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/cWt0XUocViE&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/cWt0XUocViE&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;325&quot; height=&quot;250&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;A HREF=&quot;http://www.savetheinternet.com/&quot;&gt;&lt;br /&gt;&lt;IMG SRC=&quot;http://www.savetheinternet.com/images/blog_image.jpg&quot; WIDTH=&quot;150&quot; HEIGHT=&quot;200&quot; ALT=&quot;Save the Internet: Click here&quot; BORDER=&quot;3&quot; /&gt;&lt;/A&gt;</description><link>http://cgltech.blogspot.com/2007/03/dont-let-congress-gut-internets-first.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-155515125990606754</guid><pubDate>Mon, 19 Mar 2007 21:18:00 +0000</pubDate><atom:updated>2007-03-19T16:24:17.019-05:00</atom:updated><title>Have the virus suites become too big?</title><description>Everyone knows you cannot surf the Internet without good, active and up-to-date anti-virus software. But, on the other side, a large virus suite running in the background can have an adverse effect on your system performance.&lt;br /&gt;&lt;br /&gt;This article is directed at the Big Three. These are Norton (Symantec), Trend Micro, and McAFEE. When it comes to these products you have to ask, &quot;How much is too much?&quot; All three, while trying to compete for our desktop, have expanded to the point that they are now part of the problem.&lt;br /&gt;&lt;br /&gt;The problems vary, but here are a few: First is system resources. The most telling is the amount of RAM they use followed by CPU cycles. If you have a smaller, older or econo box you will see a considerable lose of performance. &lt;br /&gt;&lt;br /&gt;Next, is how they write themselves in to the operating system. To do their job virus software has to be fairly invasive.  But to make it work across a range of different operating systems, sacrifices need to be made. If they didn&#39;t, it would be impossible for the same piece of software to run on WIN98 and then work on XP. &lt;br /&gt;&lt;br /&gt;Now the problem here is usually when the software updates or, is not properly un-installed. This is especially true with Norton. It is not uncommon after an update to experience anything from system lock up to not being able to access secure sites.&lt;br /&gt;&lt;br /&gt;Another issue is confusion. All major manufacturers bundle the different suites with their systems. The problem is they are usually 30 - 60 day trial versions. When they expire most customers don&#39;t know what to do. Some buy the online upgrade, nine times out of ten, the upgrade will fail. This is especially true with Norton.&lt;br /&gt;&lt;br /&gt;In addition, many people try to uninstall these anti-virus programs improperly. Most people go right to add and remove programs not knowing there is a proper way to uninstall them. These will all lead to connection or performance issues. And, some people just ignore the expired software and either download another or go without. Each of these approaches causes it&#39;s own set of problems. &lt;br /&gt;&lt;br /&gt;All you really need is good basic virus scanning software with out all the bells and whistles. One product we like is called AVG anti-virus by Grisoft. It is not top heavy and does a a great job. You can get it at computerguyslive.com by clicking on the banner ad at the bottom of the page. Note: AVG will not work on Vista yet.&lt;br /&gt;&lt;br /&gt;Bottom line, you have to have virus protection, no question. But you are not limited to the Big Three, who seem to care more about your wallet than your computer.&lt;br /&gt;&lt;br /&gt;By Chris Kaminski&lt;br /&gt;Chris Kaminski is head technician for Computer Guys Live Inc., an online computer repair company based in Asheville, NC. He has been working in and computer repair for the last 18 years. Visit the techs at &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live&lt;/a&gt; for your computer repair and tech support.</description><link>http://cgltech.blogspot.com/2007/03/have-virus-suites-become-too-big.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-1043316209067116781</guid><pubDate>Wed, 21 Feb 2007 20:18:00 +0000</pubDate><atom:updated>2007-02-21T15:24:11.237-05:00</atom:updated><title>Memory Upgrades for Vista Operating Systems</title><description>Now that Vista is officially out, many of you are dying to run out and buy it. I know that many will upgrade without first checking system requirements or system compatibility. This article is for you. When you try to install Vista, you may quickly find out that something will need to be upgraded. Most likely it will be RAM, video or both. First we will look at memory. I am talking about system memory or RAM. Before we go further, my associate says I need to write about something more important. That is the peripherals, things like mice, cameras, scanners, printers. For most of these, you will find that there are no Vista compatible drivers available. The chain stores are going to be pushing Vista systems, but be patient and wait for the hardware to catch up. Here is where you will do better talking with your small neighborhood tech shops to find out if your computer will work with Vista.&lt;br /&gt;&lt;br /&gt;For those who want to upgrade for Vista, additional memory may have to be installed. RAM (Random Access Memory) is used by the system to run applications. You can never have enough RAM. The current standard has been 512megs. But as the software becomes larger, system resources really become an issue. This is true with the new security suites like Norton or McAfee. Today, I would not consider a system with less then 1gig of RAM. You can run Vista on 512megs, but you would not be able to enjoy all the features and your system may perform very poorly.&lt;br /&gt;&lt;br /&gt;To speed up your system and upgrade your RAM, you need to know a few details. You need to find out how much RAM you have, what type/speed, and how much your system will support. To find out how much, go to your START button, right click on My Computer, then select Properties. After the dialog box opens, look down to the bottom right. You will see information for the type and speed of the processor. There will also be a number indicating the amount of RAM installed. It will read 265, 512 or 1024 gigs. &lt;br /&gt;&lt;br /&gt;On many of the mass produced machines, there may be an odd number like 448. That is because system memory is shared with the video. To find out the type and how much the system will support, check the system documentation. Check the specs in either the printed materials or check online. Sometimes there are stickers on the front. Look for something that reads like DDR XXX, (DDR400 for example), or PCXXX (PC3200 as another example). If you have never done this, or are not comfortable opening your computer, you may want to get a service technician to install the RAM. They will still need all the above information. Now we can open the computer and install the memory. &lt;br /&gt;&lt;br /&gt;1) Unplug the power on the computer. Most motherboards still are powered, even with the power switch off. So remove the plug completely. Ok, pull the power and unplug everything that is attached to the tower. Mark them if you need to, so you can put them back.&lt;br /&gt;&lt;br /&gt;2) Lay the tower on the right side and remove the left side cover. Inside you will see many colored wires and cables. Carefully part these until you can get to the memory slots. They are called DIMM slots. There can be two or more depending on the motherboard. They will be located close to the processor (big metal fins with the fan motor). You will also see the existing memory stick.&lt;br /&gt;&lt;br /&gt;3) On each end of the DIMM slots there is a white clip. Make sure they are pushed back to the opened position. Look at your new stick of RAM. You will see 1 or 2 notches. These will match up with dimples in the memory slot. Carefully line up the stick and firmly press it into the slot until you hear it snap into place. Now, secure the two locking clips and you are done.&lt;br /&gt;&lt;br /&gt;4) Stand the system back up (leaving the cover off at this point). Plug in the mouse, keyboard and monitor. Plug in the power and fire the system up. One of 2 things will happen. If everything is alright, the system will boot like normal and you can watch the new amount of RAM count up on the screen. If this happens, then you are finished installing the RAM. &lt;br /&gt;&lt;br /&gt;The second thing that could happen is the machine starts beeping and will not boot. Do not panic, all this means is that the RAM is not seated correctly. Simply shut it down and unplug the power. Remove the new stick of RAM and reseat it again making sure it snaps firmly into place. You may need to press a little harder than you think. Test the system again by rebooting. Once you are done, replace the cover, put the tower back, and attach all the accessories. Let me just say again, if you are not comfortable opening and working on your computer then you will be better off letting a technician help you.&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;Chris Kaminski is head technician for Computer Guys Live Inc., an online computer repair company based in Asheville, NC. He has been working in web development and computer repair for the last 18 years. Visit the techs at &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live &lt;/a&gt;for your computer repair and tech support.</description><link>http://cgltech.blogspot.com/2007/02/memory-upgrades-for-vista-operating.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-7096531489434171241</guid><pubDate>Mon, 29 Jan 2007 17:21:00 +0000</pubDate><atom:updated>2007-01-29T14:42:38.222-05:00</atom:updated><title>Duck!!! Here Comes Vista</title><description>This January not only brings a new year, but also the long awaited release of Microsoft Vista. And I know many of you received new computers or components with a coupon to upgrade ... But wait. Before you run out and put down your money, you need to take a look, because Vista might not be the best choice for you. Vista is indeed a big step forward, but notice, I say step and not leap. It is the first ‘next generation’ operating system designed to make full use of all the changes in technology over the last 10 years. Vista is also heading toward the future with some very cool new features. Vista is such a step forward, it can be compared to the release of the Windows 95 operating system.&lt;br /&gt;&lt;br /&gt;Vista is termed as a “Technology Break”. This means the OS is a redesign, not just a re-build of the OS before it. Though much of it will seem familiar, many features are brand new. It also means that many of your existing components, or their drivers and software, will not be compatible with Vista. In reality, most current machines will not run Vista comfortably without a serious upgrade. This is because of the resources needed. This is especially true if your system does not have a separate graphics card. If your computer has less than a 2 Gig processor and 1 Gig of RAM; don’t consider Vista. In fact, the cost of upgrading will be so high Microsoft expects deployment of Vista to take 2 to 3 years while the hardware catches up.&lt;br /&gt;&lt;br /&gt;Starting in January most new systems will have Vista installed but again research before you buy because Vista may not be the best choice for your situation. Now do not panic, XP is going to be around for a while, and will still be for sale for at least another year. So the recomendation is, if your system is running happily on XP, there is no reason to up-grade yet. There are going to be 5 versions of Vista.&lt;br /&gt;1) For consumers: Vista Home Basic, $199.00 retail. No frills and will come pre-loaded on the commercial econo boxes like Dell.&lt;br /&gt;2) Vista Home Premium, $239.00 retail. This version will be for mid-range to hi-end and media systems.&lt;br /&gt;3) Vista Business, $299.00 retail, aimed at small business.&lt;br /&gt;4) Vista Enterprise, this version will not be commercially available, and is meant only for large enterprise situations.&lt;br /&gt;5) And finally, the Cadillac, Vista Ultimate, $ 399.00 retail (probably your best choice, if&lt;br /&gt;you can afford it). This version contains all the features of the above versions, plus a&lt;br /&gt;bundle of yet to be disclosed extras. This is for high end and business machines.&lt;br /&gt;So there you go, more to come as we look into Vista. Bottom line, Vista is good, not&lt;br /&gt;great, there are still a lot of bugs. Wait until service pack 1 comes out before you buy,&lt;br /&gt;and let others work out the bugs.&lt;br /&gt;&lt;br /&gt;As mentioned above, Vista will come in 5 flavors, but only 4 will be available to the&lt;br /&gt;public. The Enterprise edition will only be available to large corporations. Now everyone will benefit from some of the fundamental improvements in Vista like the security and search capabilities, but that is where the similarities end. There are 2 versions for the home market; Vista Home Basic ($99.95 retail) and Vista Home Premium ($239.00 retail). Basic is really the bottom of the line. This version is so limited in features that some say it is an intentional marketing ploy to force the OEM manufactures (Dell, HP etc.) to upgrade to Premium so that they can still offer some value to their computers. Who knows? But this version is very feature short.&lt;br /&gt;&lt;br /&gt;Home Basic does not include much of the new graphic interface or graphic capabilities of the other versions, none of the extras or bonus bells and whistles. You are better off with XP if you just surf the Internet or just check e-mail. Also if you look at the price of Vista compared to XP Home ($199.00), which has all the features, XP is the better deal.&lt;br /&gt;&lt;br /&gt;Vista Home Premium is where many of the new features surface. There is a new user interface (UI) called “Aero Glass” which is a very cool glass like effect. There are also new floating windows, translucent windows, the 3D scrolling called “Windows Flip”and a few other graphic goodies. With Premium, you also get the new Media Player 11, Windows Calendar, the new Media Center, Photo Gallery, DVD authoring, sound recording, Windows Movie Maker all aimed at making Vista your multi-media center.&lt;br /&gt;&lt;br /&gt;Speaking of media, one of Microsoft’s goals for Vista is to re-introduce the PC as a gaming platform. To achieve this, Vista introduces several new special gaming features. These include the new “Game Explorer”, peer-to-peer gaming, game related meta-data support and high end graphic, shadowing and 3D capabilities. Now, there is another price to be paid for all this graphic wonder and that is system resources. You will need a very strong video card, a fast processor, and a whole lot of RAM. Most current machines will need serious graphic and memory upgrades to take advantage of Vista.&lt;br /&gt;&lt;br /&gt;The retail price for Premium will be around $239.00. If you are running XP Home or XP Media Center and you do not need to be on the bleeding edge of technology, then just download IE 7 for the security up-grades and browsing features and keep XP. For those of you who want to have the latest Operating System, be prepared to purchase the latest hardware upgrades or the latest computer in order to run Vista.&lt;br /&gt;&lt;br /&gt;Chris Kaminski is head technician for Computer Guys Live Inc., an online computer repair company based in Asheville, NC. Visit &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;The Computer Guys Live&lt;/a&gt; for your secure, online computer repair and tech support.</description><link>http://cgltech.blogspot.com/2007/01/duck-here-comes-vista.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-116724421880948641</guid><pubDate>Wed, 27 Dec 2006 18:21:00 +0000</pubDate><atom:updated>2006-12-27T13:39:16.473-05:00</atom:updated><title>The Good, The Bad, The Virtual: Part 3</title><description>This is the last of my virtual world spout offs. It’s just that I hope I’m not the only onewho sees this and it does scare me. The point I’m trying to make in this series of articles is: Yes, the Internet and computers have changed our civilization and our history. Yes, they have brought us to new levels of communication and productivity.BUT ... look at the price we have paid.&lt;br /&gt; &lt;br /&gt;We have come to rely on this new technology so much that we have actually passed control to this non-living thing. So much that it has reached the point that it has not only supplemented but replaced.&lt;br /&gt;&lt;br /&gt;This really hit me back in August. I went to make a deposit but the ATM was down so I went inside. The friendly teller informed me that the computers were down and she could not take my transaction. I didn&#39;t think anything of it and asked her to take my deposit and give me a written receipt. She just looked at me with bewildered eyes and told me they no longer do that, no computer no transaction. She was too young to remember a world before ATM machines.&lt;br /&gt;&lt;br /&gt;The Internet has become this giant non-living entity of it&#39;s own! A hugh global network of computers around the world. We go to it for information, to shop, for advice, to learn, to travel, to keep records and to weigh facts and make decisions.&lt;br /&gt;&lt;br /&gt;We have handed off so much control that if it should stop, or worse, become with-held life as we know it would stop. We would simply be dead in the water, we couldn&#39;t even pump gas. This is not some future scenario. This is here and now, life has indeed become an X File episode.&lt;br /&gt;&lt;br /&gt;The worst (and to me scary) part is we have given in so willingly, no hesitation, no thought about the future. We handed control of our lives to a giant non-living cloud, a mass of wires chips and plastic boxes and we did it willingly. Think about that.&lt;br /&gt;&lt;br /&gt;Chris Kaminski is head technician for Computer Guys Live Inc., an online computer repair company based in Asheville, NC. Visit the &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live &lt;/a&gt;for your secure, online computer repair and tech support.</description><link>http://cgltech.blogspot.com/2006/12/good-bad-virtual-part-3.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-116610966383333011</guid><pubDate>Thu, 14 Dec 2006 15:16:00 +0000</pubDate><atom:updated>2006-12-14T10:21:03.846-05:00</atom:updated><title>The Good, The Bad, The Virtual…Part 2</title><description>Last week I started my rant on the duality of this new Internet society we now all live&lt;br /&gt;in. I know there are many examples and I bet you can think of some I have missed.&lt;br /&gt;Last week I used our seniors, well here’s another. Today, our kids can socialize through&lt;br /&gt;chat rooms and web cams, globally. It has opened up a whole new world of diversity,&lt;br /&gt;exchange and communication, this is a good thing. It has also given birth to a whole&lt;br /&gt;new type of child predator, a very bad thing.&lt;br /&gt;&lt;br /&gt;Everybody and everything has become totally reliant on computers and an Internet&lt;br /&gt;connection. Everything, business, banking. telephone communications. A simple cash&lt;br /&gt;register connects thru a modem when the clerk swipes your card.  Our new digital&lt;br /&gt;world has replaced the film camera, killed the record store. Email has been a&lt;br /&gt;wounding blow to the post office (though the Internet was a boom to the shipping&lt;br /&gt;companies).&lt;br /&gt;&lt;br /&gt;High speed connections coupled with high end graphics have allowed for the creation&lt;br /&gt;of whole new co-existing worlds. Some extremely real and some not so real but all&lt;br /&gt;of them virtual. And, when it comes to virtual worlds and interactive games the ‘cloud’&lt;br /&gt;is alive. Entire new worlds have been created and exist. In many instances people are&lt;br /&gt;starting to use these to replace their real lives. This could be a bad thing .&lt;br /&gt;It’s just that everything we do, everything we touch one way or another connects to&lt;br /&gt;this thing we call “the cloud”, the Internet.&lt;br /&gt;&lt;br /&gt;A scary result of this is how complacent people have become to computers being&lt;br /&gt;around them and how much power they give to it. A simple dumb box that only&lt;br /&gt;displays information that another person had put in. Ever notice how compliant people&lt;br /&gt;have become when they hear “I’m sorry, but that is what the computer said”. It&lt;br /&gt;doesn’t matter why. Credit card denied, club membership has expired, can’t get your&lt;br /&gt;license renewed (my other story). When you get to the point of “I’m sorry, but that is&lt;br /&gt;what the computer said”. The conversation is over. Neither you nor the other person&lt;br /&gt;is going to get much further.&lt;br /&gt;&lt;br /&gt;In our minds, this ‘Cloud’ has become an all knowing, all connecting abstract thing&lt;br /&gt;where the universe is stored. Something so big so complicated that we can only&lt;br /&gt;search it with Google. This ‘Cloud’, to us, is probably better off just being known&lt;br /&gt;as the ‘Cloud’ and all our computers and devices connect us to this Cloud’ and some&lt;br /&gt;all knowing data base hidden somewhere deep inside, so if the computer says so, it&lt;br /&gt;must be true right? This is a really a bad thing.&lt;br /&gt;&lt;br /&gt;This is where the Real world and Virtual world collide and mix and we start to hand&lt;br /&gt;off control to the virtual and this is where our heads get lost in the cloud.&lt;br /&gt;&lt;br /&gt;by Chris Kaminski,&lt;br /&gt;Head Technician for &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live Inc.&lt;/a&gt;&lt;br /&gt;An online computer repair company based in Asheville, NC</description><link>http://cgltech.blogspot.com/2006/12/good-bad-virtualpart-2.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-116543302578957589</guid><pubDate>Wed, 06 Dec 2006 19:22:00 +0000</pubDate><atom:updated>2006-12-06T15:03:11.726-05:00</atom:updated><title>The Good, The Bad, The Virtual…</title><description>&lt;a href=&quot;http://photos1.blogger.com/x/blogger/6917/3259/1600/117353/secondlife.jpg&quot;&gt;&lt;img style=&quot;CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/x/blogger/6917/3259/320/575546/secondlife.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This photo courtesy of The Second Life, an online virtual world of 1.8 million residents worldwide.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;This&lt;/span&gt; summer I lectured about the new social engineering. A totally new phenomenon&lt;br /&gt;brought on completely by the Internet. Nothing else has changed society, so greatly,&lt;br /&gt;so globally and in such a short time. With today’s technology and a laptop you can be&lt;br /&gt;at almost any point on the globe and get the Internet.&lt;br /&gt;&lt;br /&gt;That said, it has also severely divided our world, in fact we ALL now live in two co-&lt;br /&gt;existing worlds. One is Real and the other is Virtual. And the problem is we are drawn&lt;br /&gt;a little deeper in to the virtual world a little more everyday. And where the two worlds&lt;br /&gt;collide is not clear at all. Sony says “Live in your world. Play in ours.” But how much&lt;br /&gt;fun is it really and what do we give up to have it.&lt;br /&gt;&lt;br /&gt;Hackers for the most part have given up. Security and encryption have become so&lt;br /&gt;good that they have switched to new devices like Phishing. We haven’t had a good&lt;br /&gt;virus scare in almost a year. Because of this everything is moving online. Online&lt;br /&gt;shopping is positioned to exceed mall or store shopping. If you stick a card in a gas&lt;br /&gt;pump, you interact with this virtual world in some way. Business, banking, gaming,&lt;br /&gt;gambling, dating ... whoa right there. Dating? Not only dating but just socializing in&lt;br /&gt;general. E-mail, instant massaging, interactive games, online collaboration. At no&lt;br /&gt;other point in history could our 14 year old hold a 20 minute chat with some kid in&lt;br /&gt;China and never leave the bedroom.&lt;br /&gt;&lt;br /&gt;The virtual is becoming a powerful force.&lt;br /&gt;But ... the force has a dark side, young Skywalker. Have you noticed how deep we&lt;br /&gt;are withdrawing into, and relying on this new virtual world? And, have you noticed that&lt;br /&gt;for every good action there is a reaction that is just as or even more powerful?&lt;br /&gt;&lt;br /&gt;For example, our seniors, (who by the way are the larger part of the computer market&lt;br /&gt;right now),with a laptop and an Internet connection they can socialize, shop, order&lt;br /&gt;medication, watch or be watched with web cams. It has become a way for them to&lt;br /&gt;reach out and maintain their independence, a good thing. In exchange though,&lt;br /&gt;everything we do, everything we buy, everywhere we go is tracked. Which came to&lt;br /&gt;light during this past political campaign when “Micro- Marketing” broke the news.&lt;br /&gt;&lt;br /&gt;There is a profile on every individual who swipes a card. This is a BAD thing.&lt;br /&gt;This is the first of a few articles I decided to do about the duality of this new&lt;br /&gt;wonder and what it may cost us in the end.&lt;br /&gt;&lt;br /&gt;I would like to plug our great online computer repair company real quick. Are you ready for your online holiday shopping? Call us toll free, Computer Guys Live, 866-300-8181 or go online, &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;www.computerguyslive.com&lt;/a&gt;.&lt;br /&gt;We have a $20.00 special to remove all the spyware from your machine. And our techs can do it remotely. Be safe, shop securely online!&lt;br /&gt;&lt;br /&gt;by Chris Kaminski,&lt;br /&gt;Head Tech and CEO of Computer Guys Live Inc.</description><link>http://cgltech.blogspot.com/2006/12/good-bad-virtual.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-116369559581408953</guid><pubDate>Thu, 16 Nov 2006 16:14:00 +0000</pubDate><atom:updated>2006-11-16T12:03:16.216-05:00</atom:updated><title>Windows XP tips for computer security</title><description>Here are a couple of tips to speed up your Windows XP computer and help keep you protected and secure online. First you need to control which programs load on startup: Many of the programs you install on your computer automatically configure themselves to launch at startup, usually invisibly. The truly essential ones, such as anti-virus and firewall products, generally run as services and run fine in the background. Other less important software like media players don’t need to be running continually.&lt;br /&gt;&lt;br /&gt;These extra programs slow the boot process and then severely suck up resources like memory and CPU cycles. It is pretty easy to control which applications launch on startup. The System Configuration Utility lists all these applications in one place:&lt;br /&gt;&lt;br /&gt;1) To get there: Click the ‘Start’ button then choose the ‘Run’ command.&lt;br /&gt;2) In the text box type “msconfig”. - Across the top of the dialog box select the ‘Startup’ tab.&lt;br /&gt;3) The Startup Tab lists all the programs that launch at start-up.&lt;br /&gt;To disable any of these simply un-check the box on the left. Only non-essential programs are listed here it should be safe to un-check pretty much anything. If it turns out you needed it just go back and re-check it.&lt;br /&gt;4) Once you are done re-boot the machine.&lt;br /&gt;5) When the Desktop returns you will be presented with a window that says you have chosen Selective Startup. Just Check “Do not show this window again” and click OK.&lt;br /&gt;&lt;br /&gt;To keep your computer secure, turn on automatic updates. Seems like every virus writer has nothing better to do then attack Windows operating systems. Keeping the system patches and security fixes is critical. During the setup of XP Service Pack 2 with a new computer or an up-grade you are asked whether or not to turn on automatic updates, if you made the mistake of checking no you can find this option in the Windows Security Center (Start / Control Panel) and change it back. Even with all its faults, XP is a powerful operating system that has many good security features.&lt;br /&gt;&lt;br /&gt;Here are some more tips to help you get the most out of your operating system.&lt;br /&gt;Remove Windows components not found in ADD / REMOVE. Many Windows components, things like Network Services or Solitaire are easy to remove through the Add or Remove programs configuration window (Start / ControlPanel / Add and Remove Programs / Windows Components). Simply un-check them, but … some things are deliberately hidden.&lt;br /&gt;&lt;br /&gt;A good example would be MSN Messenger. To remove this from startup follow these steps:&lt;br /&gt;1) In Windows Explorer (right click Start / Explore), navigate to C:\Windows\Inf and make a copy of Sysoc.inf.&lt;br /&gt;2) Double click on Sysoc.inf and it will open in Notepad.&lt;br /&gt;3) Press Ctrl H (opens Find and Replace) and replace the string&lt;span style=&quot;color:#ff0000;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;,hide,&lt;/span&gt; with &lt;span style=&quot;color:#ff0000;&quot;&gt;,, &lt;/span&gt;then save and replace the file.&lt;br /&gt;Now all the hidden components will appear.&lt;br /&gt;4) Then follow the steps above for removing programs from the startup menu.&lt;br /&gt;&lt;br /&gt;To restore a corrupted system file: If a necessary system file should become missing or corrupted by a virus you can replace it from your Windows CD.&lt;br /&gt;1) Go to Start / Search and type in the file name replacing the last letter with an underscore (ex. Filename.ex_).&lt;br /&gt;2) If the file is found, open a command prompt (Start / Run, type CMD in the textbox).&lt;br /&gt;3) At the prompt type expand followed by the full pathname of the file and destination (expand D:\Windows\filename.ex_ C:\Windows\filename.exe) where D: is the letter of your disc drive. If either pathname contains spaces surround the entire pathname with double quotes.&lt;br /&gt;If the file isn’t found search again using the un-modified file name, it is probably in a CAB file, Windows treats these as folders, simply drag the new folder to the destination while holding down the right mouse button then select Copy Here.&lt;br /&gt;&lt;br /&gt;Contact &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live &lt;/a&gt;for further help with your computer repair and maintenance.&lt;br /&gt;We offer reliable, top notch, tech support online, when you need it.</description><link>http://cgltech.blogspot.com/2006/11/windows-xp-tips-for-computer-security.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-116301245968462818</guid><pubDate>Wed, 08 Nov 2006 18:16:00 +0000</pubDate><atom:updated>2006-11-08T15:47:51.813-05:00</atom:updated><title>Liar, Liar…Watch out for rogue software posing as anti-spyware.</title><description>Ever been tricked by one of those pop-up windows that says your system is infected&lt;br /&gt;and you should download this ‘cure’ right now? I have, and I should know better.&lt;br /&gt;But, I was in the middle of several tasks at once, I looked over and saw this warning&lt;br /&gt;window. Now this window looked similar to a window I have seen many times. With-&lt;br /&gt;out thinking I clicked the ‘OK’ button thinking this was a message from the security&lt;br /&gt;system. I knew when I clicked it I had made a mistake. My eye caught the web address the page was going to, and it wasn’t what it said in the link. Now fortunately our “Pest Patrol” got it and I was ok. But the point is that one rogue program got by me.&lt;br /&gt;&lt;br /&gt;The larger portion of issues causing connectivity or performance problems revolve&lt;br /&gt;around spyware or the products to remove them. And most of the spyware we receive&lt;br /&gt;is actually legal. The user agrees to install it when they agree to install another&lt;br /&gt;product like a search bar or email links.&lt;br /&gt;&lt;br /&gt;The big spreaders here are Yahoo, Google, MSN, AOL but there are many others. These come in the guise of weather, news, RSS feeds, stock tickers you name it. They gather information on the sites you visit and send the user data back to the companies. Always be mindful of what you allow to download. Always watch what you install. Look for checked boxes, read the license.&lt;br /&gt;Make sure you only get what you originally wanted. These components compete for&lt;br /&gt;the online connection and the result is, of course, connection issues.&lt;br /&gt;&lt;br /&gt;The spyware that got me above was fed to me by the web site I just went to. The browser window was re-directed to another window that looked like a warning screen. This is another favorite method to get spyware on your system. Pretend to be a product that removes it; wolf in sheepskin also known as Rogue/Suspect Anti-Spyware Software.&lt;br /&gt;&lt;br /&gt;Check out the website &lt;a href=&quot;http://www.spywarewarrior.com/rogue_anti-spyware.htm#sites&quot;&gt;Spyware Warrior &lt;/a&gt;that lists many suspect websites and programs. They have a long list of names: Adware Agent , SafeWebSurfer, Spy-Block for example. Many of the names are designed to confuse them with legitimate software like Ad-Aware. The only real protection here is to use common sense and some healthy fear. If you didn’t order it or are not sure of it, then don’t use it!&lt;br /&gt;&lt;br /&gt;The last performance killer is the spyware suites themselves. The newer ones are&lt;br /&gt;so large they kill performance on older machines or machines with modest resources.&lt;br /&gt;Also if one spyware scanner is good then two are better ... right? Wrong. If they&lt;br /&gt;are both running in the background and using system resources they can slow the&lt;br /&gt;system to a crawl.&lt;br /&gt;&lt;br /&gt;The best thing to do is find one good program to scan automatically and use another one to scan manually. The one we use and recommend to run in the background is called &lt;a href=&quot;http://www.pestpatrol.com&quot;&gt;Pest Patrol .&lt;/a&gt; Then we scan manually with the &lt;a href=&quot;http://www.lavasoftusa.com/products/ad-aware_se_personal.php&quot;&gt;Ad-Aware &lt;/a&gt;scanner, which offers a great free program for personal use. Just make sure you update your anti-spyware programs and scan regularly.&lt;br /&gt;&lt;br /&gt;Finally, always watch what you download and install and always beware and look closely when something pops up on your screen ... it may not be what it seems.&lt;br /&gt;Contact us at &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live &lt;/a&gt;for affordable online spyware scans and computer repair if your system slows to a crawl and you need professional tech support at your fingertips. Also, check out our handy &lt;a href=&quot;http://computerguyslive.com/content/wireless/wirelessindex.asp&quot;&gt;Wireless Connection Guide &lt;/a&gt;for step-by-step instructions.&lt;br /&gt;By Chris Kaminski, head technician for &lt;a href=&quot;http://www.computerguyslive.com/pages/faq.asp&quot;&gt;Computer Guys Live Inc&lt;/a&gt;., providing state of the art remote tech support to the USA.</description><link>http://cgltech.blogspot.com/2006/11/liar-liarwatch-out-for-rogue-software.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-116110696542433789</guid><pubDate>Tue, 17 Oct 2006 17:39:00 +0000</pubDate><atom:updated>2006-10-17T12:45:10.383-05:00</atom:updated><title>Windows Vista Coming Soon</title><description>Remember back when windows 95 was first released how people waited overnight&lt;br /&gt;online to get a copy? Well... maybe you don’t but Windows  95 was a huge step&lt;br /&gt;forward in personal computing. It was the interface that made it possible for the&lt;br /&gt;average person to own and interact with a computer. People might not line up to get the new Vista but never the less it will be the operating system to bring us into the next generation on PC’s.&lt;br /&gt;&lt;br /&gt;Originally labeled “Longhorn” Vista is scheduled to be released in December so &lt;br /&gt;production computers (Dell, Compaq etc.) will have it on the shelves by Christmas.&lt;br /&gt;The retail version is scheduled for January.  Vista had it’s release date moved back&lt;br /&gt;several times because MS was having trouble building in all the new features they&lt;br /&gt;wanted to introduce.  In fact this release will be missing some of these features but&lt;br /&gt;they will follow later as extensions.&lt;br /&gt;&lt;br /&gt;What is new in Vista?  Some of the features are new and very cool while others were&lt;br /&gt;badly needed. Obviously the most needed was security, and Vista now includes built in spyware tools and a phishing filter. Many of the network and browser security&lt;br /&gt;issues Vista has corrected. A new Internet Explorer browser, with very cool tabbing and search features. It will also allow multiple home pages. There are massive performance and stability improvements. New calendar, Media Player, DVD authoring and burning tools, a movie maker and a couple of versions will have Media Center built in.&lt;br /&gt;&lt;br /&gt;Now I mentioned versions, there will be six all together, so there is bound to be one&lt;br /&gt;that will suite your needs. For the business versions there are new search and productivity tools and the new integration with the new MS Office and business tools will make it even more productive.&lt;br /&gt;&lt;br /&gt;There is a price to pay for this, the new Vista is not a small program and though it is the first scalable OS, which means it will read your system and install only what your system will support you will need a fairly strong machine  They say it will run on 512 Megs of RAM but you better figure on at least a Gig. You will also need fairly decent graphic capabilities. If you have an older machine don’t think about running Vista. We will go into more detail about the different features in future articles but I can tell you that after training on Vista, I like it.</description><link>http://cgltech.blogspot.com/2006/10/windows-vista-coming-soon.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115997334366143899</guid><pubDate>Wed, 04 Oct 2006 14:41:00 +0000</pubDate><atom:updated>2006-10-04T09:56:12.753-05:00</atom:updated><title>Warning-DO NOT OPEN UNSOLICITED EMAIL</title><description>There are many threats online that may seem very safe when you recieve them in your inbox. Lets’ start with Phishing and Pharming because there is no software you can use to stop them. For these you need to be aware they exist and watch out for some tell tale signs. Also, the one golden rule that would prevent most email born issues ”Don’t open unsolicited email”! Let me say that again, “DO NOT OPEN UNSOLICITED EMAIL”.&lt;br /&gt;Phishing (pronounced ‘fishing’). This is a scam in which you receive an official looking email from eBay or PayPal or maybe it looks like it came from your bank. There will be some excuse for changes to your account and they need you to re-send your information. Sometimes they even provide a link. Either way don’t do it. This scam is designed to collect personal account and financial info and is one of the leading causes of idenity theft.&lt;br /&gt;You can tell the real from the fake if you look carefully.  First, official&lt;br /&gt;emails will address you by name not as ‘valued customer’. Second,&lt;br /&gt;official emails will direct you to log into your account, not solicit information right there. Again, don’t trust the link provided. Open a fresh browser window and type in the web address. This will prevent you from being re-directed. And third, if you really want to be sure, you can contact the company and see if they did indeed send you the email.&lt;br /&gt;A growing offshoot of this scam are the emails that offer cheap medications or unbelievable prices on software. The great majority of these are just to collect your credit card information. The thing to remember here is the old adage “If it is too good to be true, it isn’t”.&lt;br /&gt;And if they do ship you a product you can bet that it its either pirated or of inferior quality. The best thing to do is a Google search and sees what comes up.&lt;br /&gt;&lt;br /&gt;If you have recently ordered something on PayPal or Ebay, watch out for these fake e-mails that will look official, but have a fake return e-mail address. And remember to contact us at &lt;a href=&quot;http://www.computerguyslive.com&quot;&gt;Computer Guys Live &lt;/a&gt;if you need to scan your computer for spyware and viruses.</description><link>http://cgltech.blogspot.com/2006/10/warning-do-not-open-unsolicited-email.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115697105024427564</guid><pubDate>Wed, 30 Aug 2006 20:49:00 +0000</pubDate><atom:updated>2006-09-01T08:30:46.706-05:00</atom:updated><title>Please, protect our kids! Red Flags and Parental Control Software: Part 4</title><description>To help control how your child surfs the net, I discuss the various controls you can use at the end of the article. Parental control software is just a small part of the equation and can go only so far. The real first line of defense is the parent.&lt;br /&gt;So, while preventive steps like software can reduce the risks, they can’t eliminate&lt;br /&gt;them completely. So watch for red flags of behavior first, and then install software to increase safety.&lt;br /&gt;&lt;br /&gt;- Is your child minimizing or changing a browser window when ever you walk into the&lt;br /&gt;room?&lt;br /&gt;&lt;br /&gt;- Are they using instant message lingo like “POS” (parent over shoulder)?&lt;br /&gt;&lt;br /&gt;- Are they getting phone calls from people you don’t know or wearing new clothes?&lt;br /&gt;  These can be gifts from a predator.&lt;br /&gt;&lt;br /&gt;- Is your child reluctant to logon or go to school? Those could be signs they are being&lt;br /&gt;  cyberbullied.&lt;br /&gt;&lt;br /&gt;If you think there is a problem you need to report it. The National Center for Missing &amp; Exploited Children runs a hot line, both on the Web at www.cybertipline.com and the telephone at 800-843-5678. They will review your report and forward it to the proper authorities. Also let your ISP know, They face stiff fines for not reporting child pornography.&lt;br /&gt;&lt;br /&gt;But most important of all you want to educate yourself and your child on the risks that&lt;br /&gt;exist online. The Internet is a great thing, but it is also dangerous - like a swimming&lt;br /&gt;pool. Do you want fences? Sure. Do you want to have locks? Yes you do. Do you&lt;br /&gt;want to have laws? Yes. But the safest child is the one who knows how to swim.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;First, I would like to repeat,  that the software is no replacement for real parental control where you keep an eye over the child’s shoulder and keep watch for warning&lt;br /&gt;signs.&lt;br /&gt;&lt;br /&gt;Now, if you do a Google search for parental control software you will notice that there is no shortage of offers, but what features do you really need? The most important items to watch/monitor/block are website, email, instant messaging and downloads. Basically what you want to do is track everything they do or say on the computer or online. Every message they sent, every website visited and you want to control when they can be online to send those messages.&lt;br /&gt;&lt;br /&gt;This might sound like a lot but it is actually pretty basic and has been around for &lt;br /&gt;awhile. Spouses have been using it to catch each other for years it’s just been&lt;br /&gt;repackaged  and you can get pretty descent software for under $100 bucks. On the&lt;br /&gt;other hand if you’re really into it  you can spend thousands.&lt;br /&gt;Despite all the extra  fluff there are 5 basic features you want:&lt;br /&gt;&lt;br /&gt;Content Control - Flexible &quot;Internet Filtering&quot; allows you to select the types of&lt;br /&gt;    website that are appropriate.&lt;br /&gt;2. Program Control - Control Instant Messengers, P2P File Sharing, and other&lt;br /&gt;    harmful programs.&lt;br /&gt;3. Time Control - Control the amount of time spent online, and the times when the&lt;br /&gt;     Internet is available.&lt;br /&gt;4. Usage Logging - Create and review logs of website visited, programs used on&lt;br /&gt;    the Internet, and Instant Messaging Chats.&lt;br /&gt;5. Usage Alerts - Be notified (some have  instant)  via email, text message, or&lt;br /&gt;    phone call when someone visits inappropriate website.&lt;br /&gt;&lt;br /&gt;This is a good time to bring up another issue, how do you feel about spying on your&lt;br /&gt;kid? How would (did) you feel when mom went through your sock drawer? It brings&lt;br /&gt;us around to the new social engineering and the availability of threats. Our kids today&lt;br /&gt;have an access that we didn’t. When I was 13 to get in trouble I had to at least leave&lt;br /&gt;the house. With email and instant messaging our kids don’t even have to do that,&lt;br /&gt;so I guess it is a conscience call. Me, I would rather have a mad child then a&lt;br /&gt;picture on a milk carton.</description><link>http://cgltech.blogspot.com/2006/08/please-protect-our-kids-red-flags-and.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115678115175763208</guid><pubDate>Mon, 28 Aug 2006 16:01:00 +0000</pubDate><atom:updated>2006-08-30T15:47:16.650-05:00</atom:updated><title>Call Computer Guys Live!</title><description>&lt;a href=&quot;http://photos1.blogger.com/blogger/6917/3259/1600/IWantYouFinal_jpg.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;http://photos1.blogger.com/blogger/6917/3259/320/IWantYouFinal_jpg.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;We guarantee a trusted service for online computer repair.&lt;br /&gt;Give us a call at 866-300-8181 with any questions.</description><link>http://cgltech.blogspot.com/2006/08/call-computer-guys-live.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115635553546140418</guid><pubDate>Wed, 23 Aug 2006 17:51:00 +0000</pubDate><atom:updated>2006-08-28T11:22:49.370-05:00</atom:updated><title>Please, protect our kids!  Online Teenage Internet Use Statistics: Part 3</title><description>To understand the predator problem, you need to understand a little about another new&lt;br /&gt;phenomena called social engineering. Social engineering is the reshaping of parts of our real world life to blend with our lives in the virtual world. We are all familiar with the statistics for online shopping and the huge increase, but here are some statistics you may not know:&lt;br /&gt;&lt;br /&gt;87% of teens age 12 to 17 use the Internet in some aspect of their daily lives.&lt;br /&gt;(Source: Pew Internet &amp; American life Project).&lt;br /&gt;&lt;br /&gt;79% of online teens say they are not careful when sharing personal information.&lt;br /&gt;(Source: Pew Internet &amp;amp; American life Project).&lt;br /&gt;&lt;br /&gt;71% of teens have received messages online from someone they do not know.&lt;br /&gt;(Source: National Center For Missing &amp; Exploited Children).&lt;br /&gt;&lt;br /&gt;64% say they do things online they don’t want their parents to know about.&lt;br /&gt;(Source: Pew Internet &amp;amp; American life Project)&lt;br /&gt;&lt;br /&gt;45% of teens have been asked for personal information by someone they did not know.&lt;br /&gt;(Source: National Center For Missing &amp; Exploited Children)&lt;br /&gt;&lt;br /&gt;20% of 8-to-18 year olds have a computer with Internet access in their own room.&lt;br /&gt;(Source: Kaiser Foundation)&lt;br /&gt;&lt;br /&gt;14% of teens have met face-to-face with a person they had known only through the Internet. (Source: National Center For Missing &amp;amp; Exploited Children)&lt;br /&gt;&lt;br /&gt;14%, wow, that is a really high number, that equals 14 out of every 100 children!&lt;br /&gt;Multiply that by the millions online and that is why this is such a serious problem!&lt;br /&gt;&lt;br /&gt;Visit &lt;a href=&quot;http://computerguyslive.com&quot;&gt;http://computerguyslive.com &lt;/a&gt;for more tech tips, online computer repair and internet safety information.</description><link>http://cgltech.blogspot.com/2006/08/please-protect-our-kids-online-teenage.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115635296054471936</guid><pubDate>Wed, 23 Aug 2006 17:05:00 +0000</pubDate><atom:updated>2006-08-23T12:24:49.390-05:00</atom:updated><title>Please, protect our kids! How a Predator Can Find Children Online: Part 2</title><description>Last article I told you about steps you can take to protect your children from online predators. In this article, I’ll show you an example of how a predator works.&lt;br /&gt;The statistics show an increasing exploitation of the internet as a means for predators to communicate with and eventually meet their victims. This article shows you an example of how a predator finds innocent children and befriends them. How they can take the smallest piece of information and use it to meet and lure a child. We’ll call our child Amanda and assume she is using “MySpace”, a real favorite with the kids.&lt;br /&gt;&lt;br /&gt;1-Amanda’s profile looks safe enough. All she has listed is her first name, school and her interests. She writes about her parents and teachers who don’t understand her.&lt;br /&gt;&lt;br /&gt;2- Our predator draws a conclusion from her interests: Amanda may be on the softball team. He Googles the high school and finds a picture of the team. He now has her picture and her full name.&lt;br /&gt;&lt;br /&gt;3- Our predator heads back to Google and enters Amanda’s full name and school. He finds a newspaper story about her father Alfred, who raised money for the softball team.&lt;br /&gt;&lt;br /&gt;4- A new web search (don’t you love Google) provides our predator with a list of all the Alfred Simpsons in the city. Only one  of the dozen or so listings is near Amanda’s school.&lt;br /&gt;&lt;br /&gt;5- Now the predator is home free, in just a few minutes and with very little effort, our predator has Amanda’s full name, her address, and a picture to identify her. Now he knows where to find her.&lt;br /&gt;&lt;br /&gt;The rest is even easier, all he has to do is strike up a conversation online about softball and he’s in.&lt;br /&gt;&lt;br /&gt;In a short time he has contacted her thru IMs and email. They talk about parents and school, he is always friendly and reassuring and Amanda thinks she has finally found an adult who understands her.&lt;br /&gt;&lt;br /&gt;What happens next I’ll leave to your imagination. I wanted you to see how, with just the smallest bit of information and the power of the Internet, a predator can locate prey and strike.&lt;br /&gt;&lt;br /&gt;This drives home how important it is to keep an eye on what your kids are doing on the internet; who they are chatting with, what groups and chats they are joining. Make sure you read their profiles and read what the child is posting. Remember you are the parent and it is our responsibility to protect our children online.&lt;br /&gt;Visit &lt;a href=&quot;http://computerguyslive.com&quot;&gt;http://computerguyslive.com &lt;/a&gt;for more tech tips, online computer repair and internet safety information.</description><link>http://cgltech.blogspot.com/2006/08/please-protect-our-kids-how-predator.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115617714591426616</guid><pubDate>Mon, 21 Aug 2006 16:15:00 +0000</pubDate><atom:updated>2006-08-21T11:31:21.853-05:00</atom:updated><title>Please, protect our kids!  Internet safety for your children: Part I</title><description>This time last year, if we had one or two parents come in to our computer repair shop concerned about something they had found on their child’s computer, that was a lot. This year, we are seeing two or three a week and that is just the cases we know about. Now we are used to not having our advice listened to, advice on such things as back-up your data or don’t use your Outlook for storage, but as parents we are responsible for the safety of our children. Keeping them safe from online predators requires setting up limits.&lt;br /&gt;If you are a parent, you need to learn about this. If that means taking a course or buying a book, then do it. It is very hard to protect your kids if you don’t know what they are doing.&lt;br /&gt;The next articles discuss how a predator works and how easy you can make it for them. Then, after we thoroughly scare you we will show you how to set up protection. But, this week we will start with the 10 essential tips to safeguard your children.&lt;br /&gt;&lt;br /&gt;1- Don’t forbid Internet use. In all probability they will defy your ban on the sly.&lt;br /&gt;2- Filtering software won’t block all the dangers kids face online, but it is a good start. Visit web sites with your child wherever possible.&lt;br /&gt;3- Understand the technologies. Take a class, read books, try the sites yourself. The more you know the better you can talk to your children.&lt;br /&gt;4- Real important, place the computer in a common room. Kids won’t expect privacy there.&lt;br /&gt;5- Talk to the parents of your child’s friends. Most kids use computers at a friend’s home.&lt;br /&gt;6- Teach your kids the “embarrassment rule”. Never post anything they wouldn&#39;t want everyone to read.&lt;br /&gt;7- Tell them to be careful about what they post regarding other people. Predator friendly info is often left by friends posting comments.&lt;br /&gt;8- Let your child know that it’s important to tell you if he or she is ever approached online or receives inappropriate content.&lt;br /&gt;9- Look for red flags that your child is in danger, such as minimizing a browser when you enter the room or type phrases like POS (Parent over shoulder) into chat windows.&lt;br /&gt;10- If you think there may be a problem, report it to the authorities, and also to your Internet service provider.&lt;br /&gt;&lt;br /&gt;Keeping your child safe online requires constant vigilance. The high number of missing and exploited children attests to the fact that internet predators can be a real threat. In the next article we will discuss how a predator can find out information about your child, including where your child lives.&lt;br /&gt;&lt;br /&gt;Chris Kaminski has been working in computer repair and web development for the last 20 years. Kaminski is CEO and head technician for Computer Guys Live Inc., an online computer repair company based in Asheville, NC. He writes informative weekly articles about internet safety and computer technology.  Visit &lt;a href=&quot;http://computerguyslive.com&quot;&gt;http://computerguyslive.com &lt;/a&gt;for more tech tips, online computer repair and internet safety information.</description><link>http://cgltech.blogspot.com/2006/08/please-protect-our-kids-internet.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115463581566871487</guid><pubDate>Thu, 03 Aug 2006 20:08:00 +0000</pubDate><atom:updated>2006-08-03T15:37:34.860-05:00</atom:updated><title>Wireless Network Security 101</title><description>Wireless Network Security in 6 Easy Steps &lt;br /&gt;&lt;br /&gt;By &lt;a href=&quot;http://computerguyslive.com&quot;&gt;Computer Guys Live&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Connecting your home computers with a wireless network sure make things convenient ...BUT the very feature that makes them so popular is also their biggest weakness! Anyone with the knowledge can intercept your signal with something as simple as a Pringles can. &lt;br /&gt;&lt;br /&gt;1. Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of wireless equipment so you need to change this to something else. Use something unique- not your name or something easily guessed. &lt;br /&gt;&lt;br /&gt;2. Disable Identifier Broadcasting: Announcing that you have a wireless connection to the world is an invitation for hackers. You already know you have one so you don&#39;t need to broadcast it. Check the manual for your hardware and figure out how to disable broadcasting. &lt;br /&gt;&lt;br /&gt;3. Enable WEP (Wired Equivalent Privacy): WEP encrypts your data so that only the intended recipient is supposed to be able to read it. As with all security measures there are ways around it, but by using encryption you will keep the novice hackers out of your systems. It is best to use 128bit rather than 40bit encryption (it is exponentially harder to crack). &lt;br /&gt;&lt;br /&gt;4. Restrict Unnecessary Traffic: Many wired and wireless routers have built-in firewalls. They are not the most technically advanced firewalls, but they help create one more line of defense. Read the manual for your hardware and learn how to configure your router to only allow incoming or outgoing traffic that you have approved. &lt;br /&gt;&lt;br /&gt;5. Change the Default Administrator Password: This is just good practice for ALL hardware and software. The default passwords are easily obtained and because so many people don&#39;t bother to take the simple step of changing them they are usually what hackers try first. Make sure you change the default password on your wireless router / access point to something that is not easily guessed like your last name. &lt;br /&gt;&lt;br /&gt;6. Patch and Protect Your PC&#39;s: As a last line of defense you should have personal firewall software such as Zone Alarm Pro and anti-virus software installed on your computer. As important as installing the anti-virus software, you must keep it up to date. New viruses are discovered daily and anti-virus software vendors generally release updates at least once a week. You also must keep up to date with patches for known security vulnerabilities. For Microsoft operating systems you can use Windows Update to try and help keep you current with patches.&lt;br /&gt;&lt;br /&gt;If you need help with Wireless Connection Problems, Check out our step-by-step &lt;a href=&quot;http://computerguyslive.com/content/wireless/wirelessindex.asp&quot;&gt;wireless troubleshooting guide &lt;/a&gt; at Computerguyslive.com.</description><link>http://cgltech.blogspot.com/2006/08/wireless-network-security-101.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115289352091583399</guid><pubDate>Fri, 14 Jul 2006 16:03:00 +0000</pubDate><atom:updated>2006-07-14T11:12:00.916-05:00</atom:updated><title>Computer Security Primer 101</title><description>&lt;a href=&quot;http://photos1.blogger.com/blogger/6917/3259/1600/green-cross.gif&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;http://photos1.blogger.com/blogger/6917/3259/320/green-cross.gif&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Practical and invaluable steps to secure your computer today. &lt;br /&gt;&lt;br /&gt;1. Change your Windows settings so that you can see the true file extensions. For example, on Windows machines, open Windows Explorer. Under the View menu, select Options. Select &quot;Display the Full MS-DOS path in the title bar.&quot; You can also get to this by clicking on My Computer, then View, then Options, then the View tab. &lt;br /&gt;Never click on a file that ends in .exe or .pif or .vbs as these are files that launch programs. Even MS Word .doc files can be programmed to harm your computer, so while you do not need to be paranoid, you do need to be vigilant. Never open a file attachments from people you don&#39;t know, or where the email somehow seems strange. Your intuition is probably correct. &lt;br /&gt;2. Create a phony contact record within your email address book. If a worm virus gets onto your computer, it typically heads straight for your email address book. It then replicates itself and sends itself to everyone in your address book, thus sending infected emails to all your friends and associates. Use that fact to alert yourself when/if a virus slips past your anti-virus precautions! &lt;br /&gt;First, open your address book and click on &quot;new contact.&quot; In the window where you would enter a FIRST name, type in: 000_ (three zeroes followed by an underscore, which is located next to your zero key). In the box where it prompts you to enter the new email address, type: Wormalert2003@leapmail.net. If your program tells you this is not a valid address just say &#39;yes&#39; to add it, or click OK. &lt;br /&gt;Here&#39;s what you&#39;ve done and why it works: the &quot;name&quot; 000_ will be placed at the top of your address book as entry #1. This will be where the worm will start in an effort to send itself to all your friends. But when it tries to send itself to 000_ it will be undeliverable because of the phony email address you entered. If the first attempt fails (which it will because of the phony address), the worm goes no further and your friends will not be infected. &lt;br /&gt;Here&#39;s the second great advantage of this method: if an email cannot be delivered, you will be notified of this, because you will receive a MAILER DAEMON in your Inbox. So, if you ever get an email telling you that an email addressed to Wormalert2003@alertme.com could not be delivered, you know right away that a worm has infected your system. You can then take steps to get rid of it! &lt;br /&gt;3. Choose an Internet Service Provider (ISP) that offers virus filtering on all email. This means that your ISP should be able to catch and delete messages that have viruses or worms attached to them. Most ISPs will then send notice to you that the email did not get through because of the attachment. For a list of ISPs who provide specialized add-ons such as anti-spam and anti-virus filtering services, go to http://www.choosinganisp.com. &lt;br /&gt;4. Educate other people within your company and/or household how to scan for viruses on the computer. Teach children how to spot suspicious email attachments. &lt;br /&gt;5. Get in the real habit of backing up data. If you have had virus infections in the past, chances are that your backup disks are also infected and need to be scanned for viruses. Better be safe than sorry! &lt;br /&gt;6. Pay attention to your computer. If it starts to act strangely, or does not function in the normal manner, there is a good chance that your computer has become infected with a virus. STOP your work, and investigate it before it gets any worse. Run your virus scan. If you can&#39;t find the virus and know you have recent virus dat files ... contact your computer repair/maintenance company to see if they can help you. &lt;br /&gt;7. STOP FORWARDING &#39;WARNING&#39; EMAILS! There are billions of emails floating around in cyberspace warning of gloom, doom and falling skies. They usually tell the recipient to forward the email to everyone you know. The vast majority of these email alerts are a hoax. &lt;br /&gt;Here is why these are often just as harmful as a virus: &lt;br /&gt;A. After reading a so-called warning email, the recipient may delete legitimate files from their computer. These could be files that actually secure the computer. &lt;br /&gt;B. Repeated, false alarms desensitize the public to the problem of viruses. Cry wolf too many times, and when the real thing comes along, no one knows until the wolf is onto dessert. &lt;br /&gt;C. False alarms cause an overflow of traffic to websites like Microsoft, Symantec, and McAfee. You can check out the legitimacy of a virus by going to http://vil.nai.com/vil/hoaxes.asp and looking up the suspected virus. It will say HOAX if it is not real. This is a great resource for virus information. &lt;br /&gt;8. If you are using Windows XP. Always make sure to have the latest version of the operating system. Even years after it has been released, software testers, engineers and hackers continue to find security flaws within the XP operating system. Microsoft has set up a program in which it will release fixes, or patches, to XP. You can set your computer to either look for updates automatically (highly recommended) or you can check for updates manually. To verify and/or change your settings, look for &#39;Windows Updates&#39; from your Start button.</description><link>http://cgltech.blogspot.com/2006/07/computer-security-primer-101.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115278471455636183</guid><pubDate>Thu, 13 Jul 2006 09:53:00 +0000</pubDate><atom:updated>2006-07-14T11:02:11.630-05:00</atom:updated><title>Spyware 101</title><description>Spyware is any software placed on a computer without the user’s knowledge or permission for the purpose of employing the user’s Internet connection to collect information. Most of it is downloaded unwittingly with”free” ad supported software programs. Some of the most notorious are Gator’s eWallet, Netsonic, and GoZilla.&lt;br /&gt;The primary purpose of most of these programs is to send information back to the “mothership” that sent them out to track surfing habits of a user. This information may be sold to commercial interests or it is used to prove to advertisers that their ads are being viewed and that they should pay for the “views” recorded. In short, most of it is benign, except that it is using your bandwidth to transmit information while you are trying to use your connection, too. An effect is slowing your computing and connection.&lt;br /&gt;Some spyware is more malignant. It may cause you to receive targeted ads or pop up ads. It may be used for identity theft in the worst cases. Occasionally, it is the source of computer crashes, because it conflicts with normal programs.&lt;br /&gt;There are software programs designed to detect and remove spyware. For there effective use they have to be used routinely and frequently. They have to be kept up to date so that they can recognize new spyware that is introduced almost daily. No single anti-Spyware program detects and removes all known Spyware, so it is appropriate to use more than one.&lt;br /&gt;One of the best is Ad Aware 7.0. It is available as a free download and can be found easily using Google. Running this once or twice a week will find the malware deposited on your hard drive and remove it more effectively than you can by using Control Panel’s Add/Remove Programs or by trying to track it down manually in the Registry.&lt;br /&gt;Some removers can also eliminate key loggers, some Trojan horse viruses, and browser hijackers. SpywareBlaster is a special program that filters out Spyware before it ever gets onto your hard drive. All of the others are used to root out malware that has already been placed onto your PC. To be effect, its list of current Spyware has to be updated at least weekly.&lt;br /&gt;Computer Guys Live is currently offering a special online spyware scan and removal. If security is important to you, we also recommend downloading and installing Trend Micro&#39;s spyware remover. Just visit us at &lt;a href=&quot;http://computerguyslive.com&quot;&gt; computerguyslive.com&lt;/a&gt; for complete spyware removal and protection.</description><link>http://cgltech.blogspot.com/2006/07/spyware-101.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-30397837.post-115151269432578216</guid><pubDate>Wed, 28 Jun 2006 16:36:00 +0000</pubDate><atom:updated>2006-06-28T11:38:14.336-05:00</atom:updated><title>Welcome to the Computer Guys Live</title><description>We are happy you found us and look forward to giving you tips, advice, rants, and raves from our technicians</description><link>http://cgltech.blogspot.com/2006/06/welcome-to-computer-guys-live.html</link><author>noreply@blogger.com (Lone Bird Studio Ltd.)</author></item></channel></rss>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//cgltech.blogspot.com/rss.xml

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda