User tips and Problem solution topics.

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Computer Hardware Tips

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Computer Tips

How to Remove Sortcut Virus Quickly

Sunday, April 2, 2017


Tuesday, November 3, 2015

Five Blogging Tips

Here are some of Irwin’s best tips for getting the most out of small business blogging.

  1. Consider your words. For Irwin, creating a post around his company’s keywords is huge. “A lot of times search engines will pick up on my posts based on the keywords I use within them. I want to make sure both Google and my customers know that my writings are significant in the field,” he says. In Irwin’s case, he uses phrases relevant to his business like “video production” in blog titles or tags. “There’s an emphasis on creating content on the web right now. It really helps establish you with new customers. You want to create a happy medium between what’s interesting to the consumer and what you’re trying to sell.”
  2. Find inspiration everywhere. When you’re writing about different topics all the time, it might become difficult to think of something new to say. Irwin suggests looking at your own life and experiences with customers for inspiration. “This week I posted an article about a guy who needed a piece of art installed in his house. He hired a crane to bring it six stories high and wanted me to film the experience for him. I called my post ‘Video One Gets Artsy’,” he says. Irwin also suggests writing about what you know and things you’ve done throughout your field. You may not think people will be interested but there’s always someone looking for the information you can provide. They could end up becoming a customer.
  1. Pay it forward. Irwin strongly believes that if you help people, they will be more inclined to help you. And this is the case for blogging as well. “I tend to create content around things that will help my clients. Maybe they can do some things themselves and I can help them learn how to do it. A blog entry is a great opportunity to show your personality and give customers a reason to like you” he says.
  2. Share your posts. Irwin and his team share their posts through Facebook, LinkedIn, Twitter and his personal site. He suggests getting another person to help you if you’re not familiar with social media to reach a wider audience. Soon, Irwin will also be sending out emails once or twice a month to existing clients highlighting some featured blog posts. “We’ll definitely include a way for clients to opt out if they’d like but overall, we only receive really positive comments about the blog.”
  1. Stay cool. It might seem overwhelming to consider creating an entire blog, especially if you’re a small business owner with a lot of time constraints, but Irwin doesn’t see this as a bad thing. “You don’t want to overload customers or yourself,” he says. He suggests determining the nature of an individual post first and allotting the right time to it. “If you need to do some research it might take up to two hours but other posts can be much shorter.” He also says it’s important to do what feels right for your business. “If there’s a week where you can’t get anything posted, it’s fine. Just pick back up when you can. Slowly building a content base is better than not having any at all.”

Monday, October 19, 2015

Email Tips

5 Ways to Protect Your Computer from Email Viruses and Scans

1. DON'T OPEN UNEXPECTED ATTACHMENTS

Viruses are often sent via email attachments. Macalester’s email service, Google Apps, scans incoming email (sent to @easiertips) and cleans known viruses. It is nevertheless good practice to be cautious about unexpected attachments in the unlikely event that a new virus escapes the anti-virus update. Learn how to manage email attachments

2. USE SPAM FILTERS

Macalester is fortunate in that Google Apps uses one of the most advanced and continually improved spam filters in existence. This function is greatly enhance when you report a message as spam.  Learn how to report spam

3. BEWARE OF EMAIL PHISHING OR SPOOFING

Phishing emails are an attempt by thieves to lure you into divulging personal information for their profit. Learn to recognize the telltale signs of phishing

4. USE CAUTION WITH SENSITIVE INFORMATION IN EMAIL

By default, @easiertips domain email messages are transferred securely via https. Nevertheless sensitive information, commonly known as Personal Information Requiring Notification (PIRN), should not be transferred via email. Learn more about PIRN
Even though all Macalester email through Google is secure in transfer (https is “on” all the time) this does not change anything that is transferred in the message. Viruses and worms can get through, and phishing and spoofing attempts can still happen.

5. AVOID CLICKING ON LINKS IN THE BODY OF AN EMAIL MESSAGE

While these links may not be a phishing attempt, they may not go to the site you intend. Unless you are completely comfortable that the email is legitimate, it is best to copy and paste the link or type it in directly in your browser.

Computer hard drive buying tips

When purchasing a hard drive, it is important to understand and verify the hard drive is suitable for your uses and has or does not have the options you may or may not need. Unfortunately, with hard drive technologies frequently changing, it is can sometimes be confusing and frustrating when looking to purchase a hard drive.

Computer hard driveComputer hard drive buying tips

This document covers all considerations you should think about when thinking about upgrading or buying a new computer hard drive.

Adding a new drive

If you are adding a new hard drive because you need more disk space, and you have a desktop computer, a new hard drive can be added without replacing the old drive.
The benefit of adding a new hard drive is that you gain additional storage without having to erase any of your existing files or reinstall any of your programs.

Replacing existing drive

If you have a laptop computer or want to replace an older hard drive (HDD) with a new solid state drive (SSD), keep in mind that anything on the drive will be lost. While it is possible to transfer all of the data from one drive to another drive, we recommend doing a fresh install to prevent any future problems and to clean all of the junk software.
Before replacing a hard drive make sure you:
  • Backup all important data
  • Make sure you have the operating system disc or recovery disc
  • Make sure you have all the necessary discs to reinstall your software

Interface

When looking to purchase a hard drive, the first and foremost important consideration is the interface the hard drive uses to connect and communicate with the computer. Below is a listing of each of the available interfaces with information how they may or may not apply to your computer.
    Sata cables and motherboard connection
  • SATA - The more commonly found hard drive and used with all new computers. Most computers today can accommodate at least two SATA devices, and sometimes up to four or six SATA devices. Hard drives and other devices, like CD and DVD drives, can utilize a SATA connection. Make sure your computer has a SATA connection before purchasing this type of hard drive.
  • IDE/ATAPI/ATA - Another common hard drive interface used with older IBM compatible computers. IDE supports a maximum of four IDE devices, which can include hard drives and CD-ROM drives. Make sure your computer has an IDE/ATAPI/ATA connection before purchasing this type of drive.
  • SCSI - A less common interface, SCSI devices are found on older Apple computers, older IBM computers, and some servers. The SCSI interface is a faster solution when compared to IDE/ATAPI and can support up to eight drives.
  • External (USB, FireWire, or Parallel) - Several external solutions are also available; these include but are not limited to USB, FireWire, eSATA, and Parallel. When considering an external hard drive, it is important to look at the speed difference for transferring data to and from the hard drive.

Speed of hard drive

In addition to the interface, it is also important to look at the transfer rates of the hard drive. Long transfer rates can reduce the overall speed of your computer. There are two types of hard drives: Solid-State Drive (SSD) and the traditional Hard Disk Drive (HDD).
Crucial SSD
SSD - An SSD is much faster than a traditional hard drive. If your computer is capable of accommodating an SSD, and cost and total space is not as much as a consideration, we highly recommend an SSD.
HDD - With traditional hard drives the speed is measured in RPM (Revolutions Per Minute). An example of this would be a speed of 7,200 RPM. The higher the RPM, the faster the hard drive, in general. In other words, 7,200 RPM is faster than 5,400 RPM.
Hybrid - Hybrid hard disk drives are drives that combine the above two technologies into one drive.
  • Advantages of SSD over HDD

Other considerations

Below is a listing of some other important considerations to look at when purchasing a computer hard drive.
Warranty - How long is the warranty and what does it cover.
Included components - Verify that the hard drive comes with all the needed components. Most hard drives should include an extra cable and instructions. However, if you need a mounting bracket to mount a smaller drive in a larger bay, make sure you also purchase one of these with the drive.
Support - Is the technical support number a free number and is it open 24 hours, seven days a week.
S.M.A.R.T. - S.M.A.R.T. is a technology used to help warn the computer user of possible problems with the hard drive.

Price range

The price can vary depending upon the type of hard drive (SSD or HDD), the interface, capacity of the drive, and speed of the drive. In general, drives can range from $70.00 to $300.00 (U.S.).

Ready to purchase

If after reviewing the above information you believe you are ready to make a purchase of a new hard drive, verify that the source you are purchasing the hard drive is a reputable source.
To help support Computer Hope, you can purchase through Amazon.

Installing a hard drive

  • Hard drive removal
  • Hard drive installation
  • Installing a PC IDE/EIDE hard drive.
  • Computer hard drive help and support.

Improve Your Website Security For 10 Tips

Ten-Tips-for-Improving-Website-Security
In recent years there has been a proliferation of great tools and services in the web development space. Content management systems (CMS) like WordPress, Joomla!, Drupal and so many other allow business owners to quickly and efficiently build their online presences. Their highly extensible architectures, rich plugin, module, extension ecosystem have made it easier than ever to get a website up and running without years of learning required.
This is undoubtedly a great thing; however, an unfortunate side effect is that now there are many webmasters who do not understand how to make sure their website is secure, or even understand the importance of securing their website. In this post I want to share with you the top 10 steps all webmasters, website owners, can, and should, take to keep their website secure.

1 – Update, Update, Update!

This is something we cannot stress enough here at Sucuri. Countless websites are compromised every day due to the outdated and insecure software used to run them. It is incredibly important to update your site as soon as a new plugin or CMS version is available. Most hacking these days is entirely automated, with bots constantly scanning every site they can looking for exploitation opportunities. It is not good enough to update once a month or even once a week because bots are very likely to find a vulnerability before you patch it. Unless you are running a website firewall like CloudProxy, you need to update as soon as updates are released. If running WordPress, I personally recommend the plugin ‘WP Updates Notifier‘ – it emails you to let you know when a plugin or WordPress core update is available. You should also follow @sucuri_security on Twitter to get notified about important updates and security warnings.

2 – Passwords

Working on client sites, I often need to log in to their site/server using their admin user details. I am frequently disturbed by how insecure their root passwords are. It is a little scary that I have to say this, but admin/admin is not a secure username and password combination. If your password appears in this list of most common passwords, it is guaranteed that your site will be hacked at some point.
Even if your password is not in that list, there are a lot of misconceptions about “strong” passwords. The lax requirements on most password strength meters are part of the problem. Our friends at WP Engine have put together some interesting research that debunks many of the myths surrounding passwords.
When it comes to choosing a password there are 3 key requirements that should always be followed (CLU – Complex, Long, Unique):
  • COMPLEX: Passwords should be random. Do not let someone hack your account just because they could find out your birth date or favorite sports team. Password-cracking programs can guess millions of passwords in minutes. If you have real words in your password, it isn’t random. You might think you are clever for using leetspeak (letters replaced with characters L1K3 TH15) but even these are not as secure as a completely random string of characters. Hackers have compiled some seriously impressive word lists for cracking passwords.
  • LONG: Passwords should be 12+ characters long. I know some in the security community would scoff at an 12 character password and insist that passwords should be longer. However, when it comes to online login systems, any system that is following simple security guide lines should limit the number of failed login attempts. If there is a limit on the number of failed login attempts, an 12 character password will easily stop anyone from guessing it in just a few attempts. Having said that, the longer the password, the better.
  • UNIQUE: Do not reuse passwords! Every single password you have should be unique. This simple rule dramatically limits the impact of any password being compromised. Having someone find out your FTP password should not enable them to log in to your email or internet banking account. Contrary to popular belief, we are not as unique as we believe ourselves to be; if you can randomly generate the password, even better.
Now I can already hear you ask, “how am I supposed to remember 10 random passwords which are all 12 characters long?” The good news is you don’t need to remember them all, and in fact you should not even try. The answer is to use a password manager such as “LastPass” (online) and “KeePass 2″ (offline). These brilliant tools store all your passwords in an encrypted format and can easily generate random passwords at the click of a button. Password managers make it much easier to use strong passwords than it is to memorize a couple of decent passwords.
Yes, these password managers  can present challenges and a possible weak point; just this week LastPass announced a compromise. Not all compromises are the same though, more on this another time.

3 – One Site = One Container

I understand the temptation. You have an ‘unlimited’ web hosting plan and figure why not host your numerous sites on a single server. Unfortunately this is one of the worst security practices I commonly see. Hosting many sites in the same location creates a very large attack surface.
For example, a server containing one site might have a single WordPress install with a theme and 10 plugins that can be potentially targeted by an attacker. If you host 5 sites on a single server now an attacker might have three WordPress installs, two Joomla installs, five themes and 50 plugins that can be potential targets. To make matters worse, once an attacker has found an exploit on one site, the infection can spread very easily.
Not only can this result in all your sites being hacked at the same time, it also makes the cleanup process much more time consuming and difficult. The infected sites can continue to reinfect one another in an endless loop.
After the cleanup is successful, you now have a much larger task when it comes to resetting your passwords. Instead of just one site, you have a number of them. Every single password associated with every website on the server must be changed after the infection is gone: all of your Content Management System (CMS), database, and File Transfer Protocol (FTP) users for all of those websites. If you skip this step, the websites could all be reinfected again and you are back to square one.

4 – Sensible User Access

This rule only applies to sites that have multiple logins. It’s important that every user has the appropriate permission they require to do their job; if they require escalated permissions momentarily, grant it, then reduce it once the job is complete. This is a concept known as Least Privileged.
For example, if you have a friend that wants to write a guest blog post for you, make sure their account does not have full administrator privileges. Your friend’s account should only be able to create new posts and edit their own posts because there is no need for them to be able to change website settings.
Having carefully defined access will limit any mistakes that can be made, it reduces the fallout of compromised accounts, and can protect against the damage done by ‘rogue’ users. This is a frequently overlooked part of user management: accountability and monitoring. If people share a user account and an unwanted change is made by that user, how do you find out which person on your team was responsible?
Once you have separate user accounts for every user, you can keep an eye on user behavior by reviewing logs and knowing the usual behavior (when and where they normally access the website) so you can spot anomalies and confirm with the person that their account hasn’t been compromised.

5 – Change the Default CMS Settings!

Today’s CMS applications, although easy to use, are horrible from a security perspective for the end users. By far the most common attacks against websites are entirely automated, and many of these attacks rely on the default settings being used. This means that you can avoid a large number of attacks simply by changing the default settings when installing your CMS of choice.
For example some CMS applications are writeable by the user – allowing a user to install whatever extensions they want. There are settings that you may want to adjust to control comments, users, and the visibility of your user information. The file permissions, which we discuss later, are another example of a default setting that can be hardened.
It is usually easiest to change these default details when installing your CMS, but they can be changed later.

6 – Extension Selection

One of the beautiful things about today’s CMS applications is it’s extensibility. What most don’t realize however is that, that same extensibility is it’s biggest weakness. There are a massive number of plugins, add-ons, and extensions providing virtually any functionality you can imagine. However the reality is that at times the massive number of extensions can be a double edged sword. Often there are multiple extensions offering similar functionality, so how do you know which one to install? Here are the things I always look at when deciding which extensions to use.
The first thing I look for is when the extension was last updated. If the last update was more than a year ago I get concerned that the author has stopped work on it. I much prefer to use extensions that are actively being developed because it indicates that the author would at least be willing to implement a fix if any security issues are discovered or reported. Furthermore if an extension is not supported by the author, then it makes little sense to use it for your website as it may stop working at any time.
I also like to look at the age of the extension and the number of installs. An extension developed by an established author that has numerous installs is much more trustworthy than one that has 100 installs and has been released by a first-time developer. Not only is the experienced developer much more likely to have a good idea about best security practices, but they are far less likely to damage their reputation by inserting malicious code into their extension. More importantly, the larger the user base, the more incentive attackers have to invest in trying to break it.
It is incredibly important that you download all your extensions and themes from legitimate sources. There are many sites that offer ‘free’ versions that are normally premium and require payment to download. These ‘free’ versions are pirated and frequently infected with malware. The websites offering these ‘free’ versions are setup with only one goal: to infect as many websites as possible with their malware.

7 – Backups

Like anything in the digital world, it can all be lost in a catastrophic event. We often don’t back up enough, but you will thank yourself if you take some time to consider the best website backup solutions for your website.
Making backups of your website is very important, but storing these backups on your web server is a major security risk. These backups invariably contain unpatched versions of your CMS and extensions which are publicly available, giving hackers easy access to your server.
If you’re interested in learning how to make reliable and secure backups of your website, I recommend you read my website backup strategy guide.

8 – Server Configuration Files

You should really get to know your web server configuration files. Apache web servers use the .htaccess file, Nginx servers use nginx.conf, and Microsoft IIS servers use web.config. Most often found in the root web directory, these files are very powerful. These files allows you to execute server rules, including directives that improve your website security.
If you aren’t sure which web server you use, you can run your website through Sitecheck and click the Website Details tab.
Here are a few rules that I recommend you research and add for your particular web server:
  • Prevent directory browsing: This prevents malicious users from viewing the contents of every directory on the website. Limiting the information available to attackers is always a useful security precaution.
  • Prevent image hotlinking: While this isn’t strictly a security improvement, it does prevent other websites from displaying the images hosted on your web server. If people start hotlinking images from your server, the bandwidth allowance of your hosting plan might quickly get eaten up displaying images for someone else’s site.
  • Protect sensitive files: You can set rules to protect certain files and folders. CMS configuration files are one of the most sensitive files stored on the web server as they contain the database login details in plain text. There may be other locations that can be locked down such as admin areas. You can also restrict PHP execution in directories that hold images or allow uploads.
There are many more rules and options that you can look into for your web server configuration file. You can search for the name of your CMS, your web server and “security” but make sure to confirm your findings are legitimate before implementing anything. Some people post bad information online with malicious intent.

9 – Install SSL

I’m actually of two minds as to whether or not to include this point because there have been so many articles incorrectly stating that installing SSL will solve all your security issues. SSL does nothing to protect your site against any malicious attacks, or stop it from distributing malware. SSL encrypts communications between Point A and Point B – the website server and browser. This encryption is important for one specific reason: it prevents anyone from being able to intercept that traffic, known as a Man in the Middle (MITM) attack.
SSL is especially important for E-Commerce website security and any website that accepts form submissions with sensitive user data or Personally Identifiable Information (PII). The SSL certificate protects your visitors information in transit, which in turn protects you from the fines that come along with being found non-compliant with PCI DSS.

10 – File Permissions

File permissions define who can do what to a file.
Each file has 3 permissions available and each permission is represented by a number:
  • Read‘ (4): View the file contents.
  • Write‘ (2): Change the file contents.
  • Execute‘ (1): Run the program file or script.
If you want to allow multiple permissions you just need to add the numbers together, e.g. to allow read (4) and write (2) you set the user permission to 6. If you want to allow a user to read (4), write (2) and execute (1) then you set the user permission to 7.

Sunday, October 18, 2015

So here are some computer mouse tips:

 mouse tips:

Shift + mouse

There’s a way to select entire paragraphs of text without needing to hold your mouse down and drag it across the desk like you’re wrestling with it. Simply place the cursor at the beginning of the text you wish to select, then scroll down to the end. Hold the shift key, and left click where you want the selection to end.

The third button

Unless you’re a gamer boasting a Razer Deathadder 2013 mouse with a dozen buttons, your mouse probably has two buttons and a wheel, right? Wrong. In case you didn’t know, the wheel is also a button and can be pressed down. Pressing a link in a browser with the wheel will open the link in a new tab, and pressing it anywhere else will allow you to fast scroll through the page. Holding the CTRL button while scrolling will zoom the browser in and out, and holding the Shift button will make the browser go back or forward.

Double-click and triple-click

Double-clicking a word selects it entirely, but triple-clicking the word will select the entire paragraph. Also, if you double-click a word, but keep your mouse button pressed, you can drag to select entire word by word.

CTRL Click

If you want to highlight particular parts of text that are not next to each other, that can be done simply by CTRL-left clicking whatever you wish to highlight. This might be useful when you’re trying to copy only parts of a table or a list.

There are other things you can do with your mouse, like switch the left and right button or set up additional buttons to do particular tasks. These are only some mouse tips I found particularly useful in an office environment.

Saturday, October 17, 2015

Need More Space On Your Mac?

Try These Tips 

 “Your startup disk is almost full. You need to make more space available on your startup disk by deleting files.”
If you are a Mac user and you haven’t run into this particular error message yet, chances are you will eventually. If there is less than 20 GB free on your hard drive, your computer will start to slow down. With less than 10 GB, you will be forced to quite running applications until more space is cleared.
Sometimes there’s an easy fix for a full disk—emptying your trash, clearing your cache, moving that three-hour video of your sister’s dance recital to an external hard drive, etc.
Detecting The Source
In other cases, clearing space requires a little detective work. Start by checking out your system information, available by selecting About This Mac, clicking on More Information, and checking out the storage tab. If you can see that audio or video are eating up your hard drive, the best option is moving songs and videos to the cloud or to some kind of external storage device.
The storage data for a relatively clean disk
The storage data for a relatively clean disk
If apps are the problem, think about removing applications you don’t use regularly.
The Obvious, First
The obvious choices are things that you’ve downloaded independently, but it’s worth looking at the default apps that came with your computer as well, i.e., Garage Band, iMovie, and temporary trial software that came automatically loaded.
Removing applications completely on a Mac requires a little creativity. Simply dragging the file from the applications folder to the trash will leave behind a lot of the associated files.
Use An Uninstaller
To make sure files are completely and totally deleted, use an uninstaller like Amnesia or AppTrap, or follow these instructions from MacRumors for manually deleting applications.
If a giant chunk of your storage space is taken up by the enigmatic yellow “other” bar (that was the case for me), look for file types that don’t fall into the named categories. Examples include email messages, zip files, and virtualized operating systems.
Helpful Tools
It may still not be clear what is hogging space on your Mac. If you’re still stumped, try downloading a tool to help visualize the files taking up your hard drive. Disk Inventory X worked well for me, but Grand Perspective and Daisy Disk are equally good options.
Disk Inventory X hard drive visualization
Disk Inventory X hard drive visualization
I can tell you from personal experience that cleaning out a full hard drive can make a serious difference in your computer’s performance.