Search
Search Keyword: Total 31 results found.
Tag: howto Ordering
Become a member, and start posting your favorite tutorials!  Get Your Geek On!  Is a new website out to create the only database of it's kind.  This is a social website that will store the tutorial gems found on the Internet.  Members are the backbone of the website.  They post their tutorial finds.  Vote on the ones worthy of keeping.  Comment on the tutorials. In the future we hope to give out awards to those who have done a outstanding authoring job. We also have a award system in place for members. Register now! Click here-->  Get Your Geek On! 

I always get the same question when it comes to security.  "How do I secure my computer to keep it from getting infected all the time?" Your security may not be failing.  It could be the person handling the keyboard and mouse.  Some see the warnings, and just ignore them.  Others see the warnings, don't understand them, and install/view anyway.  Plus some others see the warnings, and could care less about them, because it is not their computer.  Many people are also overwhelmed because they have several computers in the home scattered from one end of the home to the other.  So it makes it hard for them to keep track of how the computer is doing if they can't keep track of the location.  Mainly this would be laptops/notebooks.  In other homes it is the number of people using just one laptop/notebook or desktop, and keeping track of them to make sure they are not defeating the security settings/software.  Oh and we must not forget the computers that are never updated through windows update, never scanned, and the security software is never updated. I guess they like the pretty icons sitting in their task bar or something?  Or maybe the lack of the icons sitting in the task bar?  Because a few have even disabled their security software. Years ago a lady contacted me by email saying that her neighbors boy came over about once a week, and always when he left her computer was infected.  She asked me "what is a person to do?"  I said, "Plain and simple, he doesn't use your computer anymore."  She emailed me back stating... "I don't want to be rude."  I emailed her back and asked,  "And he is not being rude to you?"  I got a thank you back from her a month later.  She said it was the first month she had gone through without her computer being infected in the last eight months.  In the eight months this lady was not rude.  She did more cleaning of her computer, than she did actually using it.  She was more worried about being rude, than trying to protect her investment.   She had a great security setup, but the neighbors boy ignored her security even after she explained to him her rules. What was she thinking? Another email I got was from a guy.  He said his son was the problem every security he put in place this kid broke.  He even caught the boy on the computer at like 2:30am in the morning.  He wanted to stop him.  When I found out it was a laptop.  I could not help but to laugh to myself.  I emailed him back and told him to put the computer in his bedroom, under the bed, or in the closet so his son would not have access to it.  Then ground the boy from using the computer for a while.  Clean the computer if it needs cleaned, update everything make sure the security software is always running, and if he brakes the rules about the security settings again then take the computer from him, and tell him he is not using it if he can't follow the rules.  The older the child, the longer the no access to computer. A few days later I got a email back thanking me.  He said it just didn't dawn on him to parent the child.  The boy was sixteen, and he just did not think to do this. Another household both parents emailed me to inform me that they had a problem just keeping track, and keeping the computers clean.  I can't imagine what this household was like.  All I can tell you is their house was a revolving door.  Teens from everywhere.  Mainly because their four children were in sports.  So they had all of their desktops in a central location.  But anyone could use them.  All of the computers had XP and Vista.  They asked for suggestions.   My suggestions were for all of the computers to have passwords on the teen accounts, and parents accounts.  The guest account would be locked down.  They could not download anything etc.  They would have the most limits on this account on each of the computers.  No one (their teens or themselves) could give out the passwords to their own accounts to anyone.  The only password that was given out was to the limited account.  Just in case someone was able to guess or find out their account passwords, it would be a good idea to change the passwords every 60 days on the teen accounts and every 30 days on the parents accounts.  Someone from the home would be at or around the desktops when in use by someone outside the home.  All accounts used a different desktop background too.  You just about have to have this rule when there are so many using the computer.  if need be, change the passwords more often.   It puts a strain on the household. But it is necessary.   This is just in case one of the visitors knows how to go around your security.  So if that account's security does end up being breached, you can check the time and date of the breech, and have a general idea of who did it. It's not fool proof.  But most don't know how to change all of, or how to breech the settings on the computer.  So naturally you can find out.   As for the different desktop backgrounds for each account... This is done so you will know which account they are logged into.  You need only to glance at the screen to know.  This family took this one step further though.  They put a picture on the guest account that was only available to the guest account, and not to the others.  They were able to give privacy to the guest, and be assured they were logged into the right account.  This same account used a certain theme as well.  They could see from across the room, or at the door which account they were logged into.   They had emailed me later on and said they only had trouble with one guest because of this set up.  They did not tell me what the problem was.  They just said they had to stop this one guest from using their computers.  Other than that.  It has worked for them having this setup.  Their computers are more secure than they ever have been.  But it also put a strain on the family.  Because they only used their account, and no one else's...  They had to become more aware of what they themselves were doing on their account.  There was restrictions as to what they could download, because of size of the download, and where the download was located on line.  They followed my rules for downloading WOT and siteadvisor as well.  This made them more aware of the potential danger on line.  A lot of it they did not realize was on the websites they visited.  But they were thankful for the setup because it has saved them several times.  They were already avid users of security software like firewalls, and anti-virus programs. But they changed out their anti-virus software because it was not doing a good job.  They were now happy. Which brings me to another example of another user that emailed me stating that her anti-virus software was just not catching the bad stuff.  Her computer was infected at least once every month or two months.  It is not important to tell you the name of the anti-virus software she was using, but just to inform you that you are not stuck with a anti-virus software if it is not working, then change to something else.  Many things can cause this.  It could be the what you have installed on your computer.  What browser you use.  What firewall you use.  Or the lack of steady updates from the anti-virus software vendor.  What ever the case you are not stuck to always use that anti-virus software.  Change to something else.  You can choose free, or pay.  But be sure that you give the software a free run before you buy first.  That includes firewalls.  If your computer slows down, crashes, or is not able to catch the bad stuff then move on to another security software.  Keep in mind also that certain security software does not play nice with other security software on certain Operating Systems all the time.  Sometimes security software will have glitches, that will just about ruin a computers performance, or ruin the security on your computer.   So if you have a new security software keep a eye out for glitches, rather if they are small or large.  There very well could be something going on in the back ground that you are not aware of.   Your computer should run better, or the same, not worse after installing security software.  Run a test to see how the software is performing too. Firewall test:  https://www.grc.com/x/ne.dll?bh0bkyd2 and anti-virus test: http://www.virusportal.com/com/downloads/down_run.shtml  This lady thought she had to use the software that was installed on her computer when she bought it.  This simply is not true.  The choice is yours, not the security vendor, nor the vendor you purchased your computer from.  The choice is always yours to change to a different vendor for ALL of your software that you need, or want.

Solving their problems was easy, some of them had a hard time accepting the truth.  Others, well let's just say they had a duh moment.   

Find a gift for him or her that's in your budget range by searching for pages containing price numbers in that given range. Just type two numbers, separated by two periods, with no spaces, into the Google search box along with your other search terms. You can use this to set ranges for everything from prices, dates or any other term involving a number. Try searching:      toy $25..$50. The idea is to put your search term in but include the price range also, so you need not be bothered with over priced items.

For dates do the following...  somebooknamehere daterange:2008-01-13..2010-01-13   look very carefully.  The name of the book, and then a space, the rest has no spaces in it!

The last tip is for omitting certain words in your search.  If you put a search in for girls toys... You certainly don't want the word boys showing up in your search results.  So.  You put  Nameoftoy/toytype then you put a space and then -boys  the search will look like this  nameoftoy/ortoytype -boys  if you don't want any bikes in your search results then you put nameoftoy/ortoytype -boys -bikes

Easy! 

You can also put emphasis on certain words.  You want these or this word included in the search terms.  So you put  in the search box          dolls -boys -bikes +furniture

Test Your Facebook Privacy Settings

When your privacy went south at Facebook many cried foul.  They had every right to cry foul.  But now you have a tool to make sure that your Facebook account is private, and as secure as it can be. 

This article information will be located here, and as part of our links section.

From website:

 

It was the final unanswered question about Windows 7. But now, thanks to numerous reader reports, my own hands-on experience, and a briefing with the team at Microsoft responsible for this technology, I think we have some answers. Sadly, Microsoft is still making it difficult to clean install Windows 7 with Upgrade media, as it did with Windows Vista. But fear not, there is some good news. While you can't simply use Upgrade media to do a clean install of Windows 7 on a new or previously formatted PC, the workarounds this time are easier than ever. And that's what this article is all about: Revealing the secrets to clean-installing Windows 7 with Upgrade media.   - Paul

 

Ad-aware (Aims at Adware/Spyware.) http://www.lavasoftusa.com/ SpybotSD Aims for the dialers, trojans, hijackers and security/privacy issues. http://www.safer-networking.org/ Spyware Blaster http://www.wilderssecurity.net/spywareblaster.html A-spy For trojans hiding in startup entries. http://vipmeister.com/dl/aspy/aspy.html StartupList, HijackThis and CoolWebShredder http://www.merijn.org/files/hijackthis.zip http://www.merijn.org/files/cwshredder.zip http://www.merijn.org/cwschronicles.html http://www.merijn.org/htlogtutorial.html Info on above and more. http://www.generation.net/~hleboeuf/spyware.htm Parasites: Cookies, Dialers, Keyloggers, Trackers http://www.generation.net/~hleboeuf/bhoindex.htm ~ Spyware Information ~ http://www.mvps.org/inetexplorer/Darnit.htm http://www.cexx.org/adware.htm http://www.mvps.org/winhelp2002/unwanted.htm Online Antivirus scanners: ================ http://housecall.trendmicro.com/housecall/start_corp.asp http://www.kaspersky.com/remoteviruschk.html http://www3.ca.com/virusinfo/virusscan.aspx http://security.symantec.com/sscv6/default.asp http://www.pandasoftware.com/activescan/activescan.asp http://us.mcafee.com/root/mfs/default.asp http://commandondemand.com/eval/index.cfm http://www.ravantivirus.com/scan/ http://www.bitdefender.com/scan/licence.php http://www.drweb-online.com/en/online_check.asp http://www.pcpitstop.com/antivirus/default.asp http://scan.sygatetech.com/prestealthscan.html Anti-virus programs: (not in any type of order) -------------------- KAV (Kaspersky) http://www.kaspersky.com/ eZ Antivirus (Computer Associates) http://www.my-etrust.com/products/Antivirus.cfm Vet (Computer Associates) http://www.vet.com.au/html/products/index.html Sophos http://www.sophos.com/products/software/antivirus/ nod32 http://www.nod32.com/ Norton http://www.symantec.com/nav/

Comodo http://www.comodo.com/home/internet-security/free-internet-security.php

ADVANCED does not mean that newbies should not read these pages outlined below. Read them because I say to read them regardless if you know what they are discussing or not. One day you will pick up on this, and you will already have a some what general idea of what the content is, and you will pick up on it very quickly. Far better to read these pages than to keep yourself in the dark. So don't ignore them. Some of these page are geared towards a regular user. Others are geared towards a ADVANCED user, and the Professional. The pages are just some I came across, that I thought others may like to read. Post a comment if you have questions, or a new link to add. Some ideas on a few pages may ruffle a few feathers. I don't expect you to agree with everything they say. But before you get hot under the collar, do some research on it first. Then post your research , along with your reason for disagreeing. Installing the first three anti-spyware software is a personal preferance. I say to do this because just like some anti-virus software can miss some viruses, so can anti-spyware vendors miss a few. Center for Internet Security - Standards http://www.cisecurity.org/ http://www.cert.org/ http://isc.incidents.org/ ANS Top 20 Vulnerabilities - The Experts Consensus http://www.windowsecurity.com/ http://www.sans.org/top20/ http://www.security-forums.com/index.php http://www.securityfocus.com/ http://samspade.org/ http://www.itsecurity.com/ http://www.governmentsecurity.org/ http://www.bbb.org Federal Trade Commission - Consumer Information Security http://www.ftc.gov/bcp/conline/edcams/infosecurity/ Home PC Firewall Guide http://www.firewallguide.com/ Excellent page for everyone Internet Security Tips http://www.mbna.com/netaccess/mbnaspotlight.html LINKS http://www.isr.net/2005/NP01/cert_cybercrime.html http://www.onlyreviews.com/index.html honest opinions on internet oportunities keep in mind that just because they get a review here check with the BBB and get their two cents worth also. Regardless of how good/bad the review looked it still could be biased. http://www.secinf.net/ Network Security Library http://www.bbb.org/wise/index.asp The Wise Consumer: Online Newsletter

 This is a extensive list of tips to help you protect your computer against viruses.  No method is 100% secure, but this should really help you cut back on them, or even have large breaks in-between infections.  I follow these rules my self, but most call me a pro, but I consider myself as self taught, and somewhat wise.  I have not had a virus in nine years.  (knock on wood)

 

 

While many of us are blessed with sight.  There are many others that are not so blessed.  As a child gets use to a sightless world.  They also will be getting use to the Internet as well. It is very important for you to start a child out slow, but steady getting around the internet.  There is software that does this.  These software are either geared towards Windows, or they are geared towards Mac, or Linux, or all three.  Don't let anyone tell you that you have no options.  A added note is if the individual regardless of age is now having to get use to a sightless world, please spend time with them also at the keyboard.  Some individuals tend to feel overwhelmed, and having a good support system helps them to become independent faster.  

Install and run Software on a External Drive

In order to save space if you have a small internal hard drive you may want to consider installing software on a external hard drive.  This does not always work, you will have to experiment.  The problems you may run into are that the software needs to be administrator in order to run. The software may have dll

problems, or it could lock up, or freeze.  Not all software needs a strict regiment of required rules when it is installed, and they run fine on the external drive.

The following APP was downloaded using Firefox, and installed on a Toshiba

external hard drive that was located on the F: drive.  Your location could be

named different.  Named by the manufacturer for the hard drive and

depending on if you have multiple drives.  Follow along as you learn with

this picture tutorial on how to install a software and run the software on

the External hard drive.  It is not as hard as you may think.

 

There will come a time that you will install a Windows Update, and the update wont play nice with your computer.  If it starts to act up on day one of the install, then this is the time to remove it.  Some updates just get worse as you restart, or boot your system.  So act as soon as you spot trouble. 
You open a file, and you know you should be able to see it, the file is sitting on the taskbar, but when you click on it you can't see the file's window.  What do you do?  Well... You don't need to reinstall the Windows Operating System.  Do the following: Click the file in the taskbar.Press ALT + spacebar to summon the window's shortcut menu.Press M to choose the move command.Use the keyboards arrow keys to move the window.When you have it moved to the desired spot press the "enter" key on your keyboard.

Computer maintenance is done every month at least once a month more often if you use office software, graphics software, and add, edit, update, and remove software and files often. Scandisk can be done once a week if necessary. It helps to cut down on some error messages for some computer owners. keep a eye out on the amount of space left on your hard drive. letting it get below 25% of space left can cause problems. Others have said they are good till they get down to the 10% to 12% mark. Disk cleanup is no different than keeping a clean home. Use this as often as you want too. All of this maintenance will help your computer to have a longer life span. It will keep your computer from having to work overtime. A computer that is well maintained will last longer than one that is neglected.

 These tips will make things go more smoothly when it comes to storing files, folders, and using online menus.   Much needed considering the space included in today's computers.  Plus the use of drop down menus online has increased as well.   

 

Children love the computer. They will log on and stay on the computer all the time, or take up another users time unless you limit their use of the computer this can cause many headaches for family's. As I have said in the past, place the computer in a high traffic area of your home. Never allow a child, or even a teenager to have a computer in their bedrooms. Or permit them to have access to a computer that is placed in a private area of your home. This is really asking for trouble. Preditors are all over the internet, waiting for the opportunity to exploit your child(ren). Preditors are pros, and know what buttons to push.

 

 Years ago your password did not amount to much.  You could use your pet's name, child's, wife, or husband, and get away with it.  But today there are just too many password crackers out there waiting for you to be none creative.  They want you to be lazy so they can use a password cracker software to crack your password in less than two minutes.  With today's computers having 4gb of Ram, and more than one processor, you just are making their life more easier to get to your personal account.  You could be even opening a door up, so they have access to your wireless service.  You can't be lazy anymore.  You have to be creative, and make strong passwords. Thus I created this page to help you protect your personal accounts, files, wireless connections, etc.  Take this seriously, because you never know if someone is after your lifestyle, your livelihood, you could even wake up tomorrow, and find that your identity is gone.

Backing up your profile folder in Firefox is easy. Just follow these steps (which assumes you know how to manage files on your computer):

So your computer got infected and you are not too sure how it happened? This can happen to the best of us.  But here are the main reasons as to why.

My son-in-law bought a laptop, This is his first one. He wanted the flexibility to be able to work from any location in his home instead of being tied to a desk. So,  he had to learn about setting up a wireless network so he could use the laptop in the living room, out in the yard, or anywhere that he wanted.If you don't take security precautions others can tap into your home network quite easily. Here are the top eight tips for keeping your home network safe.

In the 1970's or somewhere in there the Creeper Virus was launched.  On a US military computer network which was the forerunner to our modern Internet. The virus was written for the Tenex operating system. The infected computers displayed a scroll across the screen that said:  I'M THE CREEPER : CATCH ME IF YOU CAN

<< Start < Prev 1 2 Next > End >>