User Support Editorial Report – January 2015

Latest Technology

Quantum Credit Cards:

In a report issued last month, a team of scientists from the Netherlands is proposing a security system for credit cards and passports that would leverage the power of quantum physics. Dubbed quantum-secure authentication (QSA), the technology uses a strip of nanoparticles on the card that would be virtually impossible to hack. Read on…                               

Tips & Tricks

tipBot

Best Free Panorama Software
How to Resize Icons in Windows 8.1
Backing up the Outlook Address Book
Rename Email Accounts and Mailbox Folders
How to Manage Attachments in Outlook 2013

 Computer Safety

Make Your Entire Internet Life More Secure in One Day:

From chat encryption to secure backups, time to find the easiest ways to make your online life secure without causing too much inconvenience..  Read on

 

 

Bonus Video of the Month

User Support Editorial Report – July 2014

Advertisements

User Support Editorial Report – July 2014

Latest Technology

Google Invents Smart Contact Lens with Built-in Camera:

google-smart-contact-lens-glucose-sensor-640x353Google has invented a new smart contact lens with an integrated camera. The camera would be very small and sit near the edge of the contact lens so that it doesn’t obscure your vision. This new smart contact lens would have a tiny CMOS camera sensor just below your pupil, control circuit, and some method of receiving power wirelessly. Read on

                                  

Tips & Tricks

tipBot

How to Create Shortcuts in Windows 7 & Windows 8.1
How to Easily Send Emails from the Windows Task Scheduler
How to Merge Duplicate Contacts in MS Outlook 2007/2010/2013
How to Force SkyDrive to Store Your Files on the Hard Drive in Windows 8.1
How to Sync Mail, Calendar, Contacts and Tasks in Outlook with a Smartphone or Tablet

Computer Safety

Top 10 Cyber Security Tips:

If you run a business and have valuable customer data to protect or even if you just enjoy visiting sites online and shopping at eCommerce hubs and want to keep your personal information safe, you may worry about hacker attacks. But there are steps you can take to reduce the risk. Here are 10 ways to keep your personal or business information safer. Read on

 

Bonus Video of the Month

User Support Editorial Report – February 2013

Office 2013 QuickStart Guides

Approach Shots Tips | One Move to Pure It

Get used to this left-arm rotation with half shots. Shorten your back-swing, then rotate your left arm through. It will feel as if you’re directing the clubhead out toward the ball. You’ll start striping it.

Thanks go to Mike Malaska

User Support Editorial Report – February 2014

Latest Technology

Solar Cells on Your Smartphone:

SunPartner Technologies hopes to finally bring to the consumer market its Wysips Crystal technology, which overlays “invisible” solar cells onto the smartphone display. The company claims that Wysips, which stands for “What You See Is Photovoltaic Surface,” can capture energy from any light source, natural and artificial, indoor and outdoor, and convert it at a rate of 15 to 20 percent efficiency. This translates to an additional 1o minutes of talk time for every hour the cells are exposed to light. And the kicker is that the company assures everyone that human eyes won’t even notice the thin layer of solar cells that’s embedded into the touchscreen.

                                  

Tips & Tricks

tipBot

Personalize Your Windows 8.1 PC
Where is My Outlook PST File Located?
How to Default Applications in Windows 8.1
How to Use the Signature Editor in Outlook 2013
How to Choose Wired over Wireless Connection on Your Laptop

Computer Safety

Avoiding a Social Engineering and Phishing Attacks:

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity.  Read on

Bonus Video of the Month

User Support Editorial Report – October 2013

User Support Editorial Report – October 2013

Latest Technology

Wall Sized Displays:

Adapting conventional printing technology, researchers have developed a way to rapidly and inexpensively make uniform arrays of high-performing transistors out of carbon nanotubes on flexible plastic sheets. The process could eventually lead to a tool for manufacturing large-area, low-power sensor arrays and displays. Read on

                                  

Tips & Tricks

tipBot

65 Best Free Software 2013
How to Find a Long-Lost Web Site
How to Get Rid of Bloatware on Your Phone or PC
How to View Your Google Calendars in Outlook 2013
How to Send Text Messages to Verizon Customers from Your PC


 

Computer Safety

detected

What is a Phishing Attack?:

A phishing attack is a specific form of cyber crime. The criminal creates an almost 100 percent perfect replica of a chosen financial institution’s website, then attempts to trick the user in to disclosing their personal details – username, password, PIN etc – via a form on the fake website, allowing the criminal to use the details to obtain money.

Phishers use various techniques to trick users in to accessing the fake website, such as sending emails that pretend to be from a bank. These emails often use legitimate logos, a good business style and often spoof the header of the email to make it look like it came from a legitimate bank. In general, these letters inform recipients that the bank has changed its IT infrastructure and asks all customers to re-confirm their user information. When the recipient clicks on the link in the email, they are directed to the fake website, where they are prompted to divulge their personal information. Read on

Bonus Tip of the Month:

How to Boot into Safe Mode in Windows 7:

Safe Mode is for those situations in which you cannot boot your Windows 7 normally because of software issues. In order to do this, you basically hold down your F8 key while your computer is starting up, immediately after turning it on. Some systems may get a stuck key error for doing this, for those cases simply tap the F8 key rapidly instead of holding it down.

This will bring up the Advanced Boot Options window, in which you are able to choose to boot in Safe Mode, Safe Mode with Networking, and Safe Mode with Command Prompt among several other options. Use the arrow keys to select one of these and hit Enter.

Now you can uninstall that software you just downloaded, or with Networking support you can update drivers. If you system is really having issues, use Last Known Good Configuration instead of Safe Mode. Read on

User Support Editorial Report – August 2013

How to Transfer iTunes to Your New PC

If you just bought a new computer, more than likely it is a Windows 8 PC. And if you use iTunes, we will show you how to move your iTunes library to your new Windows 8 PC.

First: Find your iTunes Library. (This only works if you were using iTunes to organize your music. Any music you uploaded into iTunes’ interface are automatically copied and placed into a specific location by the program)

Pull up iTunes’ Preferences windows and click its Advanced icon. iTunes will tell you exactly where it’s keeping its Media folder. Navigate to this location within Windows Explorer and copy all the directories representing your music to some kind of external storage device.

iTunes’ ability to automatically organize your music library folder is an invaluable tool when it comes to moving your music around. In other words: Don’t just copy your music in File Explorer!

Before you go dumping these tunes onto your new Windows 8 PC, download and install iTunes, and then go back to the same Preferences > Advanced window on your new PC.

Make sure the location you want iTunes to use for your new Media folder is set, and check the following two options: “Keep iTunes Media folder organized,” and “Copy files to iTunes Media folder when adding to library.”

From there, all you have to do is drag-and-drop the folders full of music on your external drive directly into your new, empty iTunes folder on your Windows 8 PC—the app will take care of the rest.