Skip to content

download

5 Easy Wireless Security Hints

Thankfully, broadband (high speed) Internet is spreading further and further. I don’t walk into many homes anymore than don’t have high speed access, and I can’t remember the last time I helped a business customer who had dial-up access. With high speed Internet access, many computer users install a wireless router to the modem to allow multiple computer access to the Internet. Wireless routers are easier to setup than ever before and can be purchased for well under $50. However, with extra technology, comes extra problems.

With wireless, the extra problems can mean potentially slow, spotty, and unsecured Internet access. Follow these five steps to make your wireless Internet stronger, more secure and less problematic:

Desktop Shortcuts Make Computing Easier – Video Tip

Learning to make Windows work for you instead of you working for it can yield many more happy and productive hours using your computer. One highly under utilized feature of Windows is the shortcut icon. Learning to use and manage shortcuts will give you a huge advantage with your computer.

Track multiple time zones in Vista – Video Tip

Windows Vista has few redeeming qualities, in my humble opinion. Some users, however, may have the need to track multiple time zones for work or personal use. I use this tip to track the time in Arizona where my brother lives. Because they don’t follow daylight savings time, I am forever confused about what time it is for him when I call.

Watch the short video below to learn how to quickly track up to three time zones if you are a Windows Vista user.

3 Reasons NOT to use Registry Cleaners

I know that downloading can be fun and pop-ups can be enticing. But when it comes to most system utilities (programs supposedly designed to help your computer), just say “NO!” One of the worst add-on utilities you can get is the so-called “registry cleaner”. First, let me try to define the registry. Starting with Windows 95 and all versions of Windows since then, Microsoft has employed a large and complex database that tracks all hardware, software, user settings, drivers, and more for our computer. This “database” of information controls everything we do with our computers from the installation of software, customization of the desktop and more importantly how all the programs we use interact with each other and with Windows.

It’s the basics baby…5 of them

A customer of mine commented earlier in the week that he was “amazed” at my knowledge of computers. I thanked him then replied that all of my knowledge could fit in the head of a thimble. And it’s true. Many days I stew over how much more I would like to know and learn about computers, technology, programming (which I know butkus about), web design, and web marketing.

One reason I have been successful in supporting people and their computers is that I stick to the basics. Similar to cars, unless you REALLY know what you are doing and you don’t mind spending HOURS and HOURS troubleshooting a glitch, computers shouldn’t be expected to handle anything you dish out. Here are my five simple rules to living in harmony with your computer or any technology gadget.

Introduction to Ubuntu Linux – September 2007


I have written much about Ubuntu over the past six months, but today was my first public presentation of this fantastic operating system. Because it is different, many computer users tend to look upon it with eyes of confusion, but after discussing the possibilities and the opportunities with Ubuntu, those confused eyes turn to eyes of intrigue.

Getting people to think about an alternative to Windows and computing as we know it today were My only goals for today’s user group presentation. If you missed it, or you attended, here are some links to Ubuntu articles here at HelpMeRick.com and elsewhere:

Why would I pay 99 cents for a song?

That is a direct quote from a Freshman in college that I helped with her computer today. She purchased it just three days ago and already has Lime Wire installed. For those not familiar with Lime Wire, it is a service that many people use (especially college aged kids) to download free music, movies and more. In addition to be legally questionable (or downright illegal by some accounts), downloading free music is the single best way to completely screw-up a normally functioning computer.

Over the years, when we got calls from listeners with “slow computers”, our first question was “do you have any teenagers in the house?”. The reason we asked was that most unrestrained teenagers with Internet access will eventually install programs like Lime Wire and start downloading the free stuff.

Screen magnifiers for everyone!

I ran across this site today while searching for alternative screen magnification programs. Whether you use Mac, Linux or Windows, this site lists screen magnifiers for every platform. While you are here, click on the HOME link. This site is full of great information and product reviews for all computer users with impaired vision.

Another sony proprietary technology bites the dust

For every Apple device that becomes a standard there is a Sony technology that becomes obsolete. Apple and Sony both got off to a great start in the early 80s. Apple introduced the Mac and Sony gave us the Walkman.

From that point on, Apple has had only a handful of market failures and Sony has had nothing but. Sony announced their latest casualty this week by discontinuing their proprietary ATRAC audio compression file format.

While the rest of the world committed to MP3 and WMA or Apple’s music format for iTunes, Sony made up their own format only supported by their devices. Sony saw Apple succeeding with their own format and device and figured they could do the same.

How to Remove the Greeting Card Virus

Adam and I first mentioned this nasty little virus earlier this spring on our radio show. The email that spreads it poses as an electronic greeting card from your friend or relative. Because the email is so poorly constructed, is never from a known address, and the link it displays in the body of the message is a number (NEVER, EVER Click a link that is constructed of a number, ex: http://91.188.176.15/) we didn’t put much credence in how much damage it could do.