Category Archives: Computer

How To Avoid Internet Scams

Keeping your data safe in the digital age can be such a chore. However it’s incredibly necessary to protect your data and important digital information from hackers. Having to dodge online scams, phishing emails, hackers, viruses, whew! The world can be a pretty scary place sometimes. It may seem like all the cons are outweighing the pros. However we all know that business, entertainment, shopping, and even social interaction have been impacted greatly by technology. There have been so many advancements in technology that the benefits most certainly outweigh the negatives, it can just be hard to see that sometimes. If you want to enjoy the very best that technology has to offer while avoiding the pitfalls of online interactions (like scams and hackers) then there are some simple ways you can do that.

First things first, do some research! Phishing emails and scams can be easy to avoid when you know what you’re looking for. There are teams and teams of people out there working to identify what makes up a common internet scam so that users can avoid them at all costs. Email scams are some of the easiest to get away with. These days people have tons of junk mail that they hardly ever look closely at anything. Scammers know this! That’s why it’s important to stay diligent. When you’re looking through your emails you might find one from a store that you shopped at recently. For example if you just rented a movie from RedBox and you see something in your inbox about movie rentals you might think it’s from Redbox and therefore trust it. Not so fast! Make sure that the email is coming from a reputable address, one that corresponds to the subject matter, often times scamming email addresses do not correspond at all. It’s a clear red flag! If you don’t trust where the email came from, don’t click on any links inside the message. That’s a surefire way to get a virus or to have your data stolen!

Of course researching the latest scam trends is a step in the right direction it isn’t a complete and total solution. Trying to stay ahead of scammers and professional online criminals is an incredibly difficult task, one that many people get paid to perform. That’s why it’s best to leave some things, like internet security, to the professionals. Norton Security offers incredible products and services designed to keep your data safe. Norton offers anti-virus software, ransomware protection, parental control capabilities, PC backup, and so much more. Choose from a wide variety of options to best suit your needs. Whether you’re a student, a business owner, or just a consumer that enjoys online shopping at places like eBay! You’re sure to find the best security for your needs with the help of Norton Security.

In this digital age it can be incredibly difficult to keep up with your security but protecting your data is something that needs to be done. Keep in mind that staying on top of scam trends is a great way to avoid terrible circumstances like identity theft or fraud but it’s not the best way to stay completely secure. For that you need professional help!

What You Should Do If Your Computer Can not Start

1. No Access to the Keyboard During the Boot Process?

Help, I can’t access my keyboard at boot!

If this is the case, I would recommend:

1-1. If using a USB keyboard, plug the keyboard into the primary USB ports on the back of the computer (on the motherboard). Restart the computer and try again.

1-2. Try another known working USB keyboard plugged into the primary USB ports on the back of the computer (on motherboard). Restart the computer and try again.

1-3. Try another known working PS/2 keyboard, restart the computer and try again.

1-4. If using a PS/2 Keyboard, try replacing your keyboard with a USB keyboard, restart the computer and try again.

1-5. If these steps fail, remove your keyboard connection and shut the computer off with the power button. While computer is off, plug the keyboard back into the computer and start the computer.

Still doesn’t work? Please go to “I need to flash my bios” section and proceed with flashing your bios.

2. Does Your Computer Freeze at Bios?

Why is my computer frozen?!

2-1. Remove all devices from your computer including removable hard drives, additional USB devices, and printers and faxes. Restart the computer and try again. If no result, go to step 2-2.

2-2. If you can see your bios screen, please tap the key to go into your bios settings. While inside of bios, make sure that your hard drive, memory and video card ( is applicable) are detected. If it is not, try re-seating or replacing the unit that is not being detected. If no result, go to step 2-3.

2-3. While looking in bios and all of your hardware is getting detected okay, please reset the bios back to its default settings and choose “save and quit.” The computer will restart and you should be looking at the operating system loading page at this point. If no result, go to step 2-4.

2-4. Open the computer, remove all but 1 memory module (usually closest to the CPU) and disconnect all hard drives. Also disconnect and PCI or AGP add on cards and start your computer. If you see “operating system not found” or a similar message, progress has been made. Then start adding back 1 item at a time, restarting the computer after each item to see when it fails.

If these steps still won’t work, please proceed to the “I need to flash my bios” section.

3. Computer Beeping Noises on Power Up

No data on screen and computer yelling at you?

3-1. If your computer is beeping at start up and you are not seeing anything on your screen. There is a hardware problem with your computer. Please check your motherboard or computer manufacturers website for bios code meanings. If this is not possible, first thing to try is remove all sticks of memory except for one, restart your computer and try again. If no result, please go to step 3-2.

3-2. If removed and tested all memory, please disconnect all internal connections EXCEPT for Power supply connections, Video card connections and the Power switch (PSW). Also leaving 1 stick of memory, heatsinks and fans plugged in as well, restart the computer and try again. If no result, please go to step 3-3.

3-3. If you have a video card installed and have on-board video as well, please remove the video card and the power connection to that card. Hook the video cable to your on board video connection. Restart your computer and try again. If no result, go to step 3-4.

3-4. If the beeping still exists, Try replacing the memory with a known working module. Restart the computer and try again, if no result, please replace the motherboard and try again. If still no result, go to step 3-5.

3-5. If beeping still exists, replace the processor and add only the necessary connections ( Power supply connections, Video card connections and the Power switch (PSW). Also leaving 1 stick of memory, heatsinks and fans plugged in as well ). Start the computer and try again.

Note: If all steps do not work, please review the steps one more time, if the computer is still beeping at start up, please contact a local computer repair technician.

4. Windows Was Unable to Start?

unmountable volume, windows did not start successfully?

4-1. First you should try “start Windows normally.” If this does not bring you back into Windows, move to step 4-2.

4-2. Choose the “Use last known good configuration”, you should be able to boot back into Windows at this point, if not proceed to step 4-3.

4-3. Choose “Repair” as an option and let the computer go through it’s motions, your computer may restart a couple of times in the process. You should now be able to get back in to Windows, if not please proceed to step 4-4.

4-4. You will need to boot from a Windows installation DVD or boot-able USB with the installation files on it. Make sure to press the adequate key at bios to view / change boot options. Boot the DVD / USB, choose repair and then choose your Windows installation directory. If prompted with a command prompt, type “chkdsk /r” and then press enter. If no result, move to step 4-5.

4-5. If another computer is available, please remove the hard drive from the affected computer, insert the hard drive into the working computer as a slave ( making the proper jumper configuration change on the primary and slave drive). Then boot into Windows using your known working hard drive, then try and recover as much personal data as possible and store it on the known working hard drive. If another computer is unavailable or this does not work for you, please proceed to step 4-6.

4-6. Attach a removable storage medium ( removable hard drive ) Boot to a recovery software utility or Live CD using your DVD drive or USB drive. A few of these utilities are Hiren’s Boot CD, Ultimate Boot CD, Knoppix and Ubuntu. Access your hard drive from this utility and back up all of your personal files and information. Then safely remove your removable hard drive, restart your computer and hit F11 or ctrl + F11 repeatedly if you have a factory installed windows recovery partition. Or if you have a DVD Windows installation disc insert this disc at start up. Choose the “install” option and install over your old broken Windows installation.

Note: If the above will not work, please contact a local computer repair technician.

5. I Need to Flash My Bios!

Bios corrupted, acting strange?

5-1. Obtain your bios compatible files. Most of the time, you can get these files from the manufacturer’s website. Just search for the files on their website using your model # of you computer or service tag.

5-2. Create a boot-able floppy drive with your bios files. Then manually copy the bios files onto the floppy drive, eject the floppy drive and insert it into the troubled computer and start the computer up. Press the specific key to access your boot menu when the computer is starting up, choose your floppy drive. If everything goes to plan, you should see a command prompt. Follow your manufacturers instructions on how to flash the bios. If you do not have a floppy drive, proceed to 5-3.

5-3. Create a boot-able USB with your bios files on it. One utility to get this job done would be HP’s USB Storage Format Tool. Then manually copy the bios files onto the USB drive, eject the USB drive and insert it into the troubled computer and start the computer up. Press the specific key to access your boot menu when the computer is starting up, choose your USB drive. If everything goes to plan, you should see a command prompt. Follow your manufacturers instructions on how to flash the bios. If you do not have a USB drive, proceed to 5-4.

5-4. Create a boot-able DVD with your bios files on it. When making your iso, copy the bios files into the ISO before compiling. Burn the DVD, eject the DVD and insert it into the troubled computer and start the computer up. Press the specific key to access your boot menu when the computer is starting up. Choose your DVD drive. If everything goes to plan, you should see a command prompt. Follow your manufacturers instructions on how to flash the bios.

Why You Got Eyestrain and The Need for Computer Eyewear

Computer eyestrain is the number one office-related health complaint in the U.S., with some 60 million Americans suffering from computer eyestrain according to the American Optometric Association. Computer use at work and home continues to grow exponentially. Computer use is associated with a number of visual and physical symptoms experienced by 50%-90% of all computer users. So, if you have experienced fatigue, headache, eye strain, blurred vision, dry or irritated eyes and neck or back aches at the computer it is possible that you are suffering just some of the symptoms called Computer Vision Syndrome (CVS). Solving the symptoms of CVS requires a visit to your eye doctor to determine if you need corrective lenses while working at the computer, especially if your computer use is two or more hours a day. The reason for computer vision related problems is further explained with a simplified description of how the eye and brain processes visual information.

Working at a computer is more visually demanding than doing other standard office work such as reading printed documents. Human vision is not designed for staring into a computer screen. Your eyes require constant sharp edged images like the characters found on ink and paper to process and focus on comfortably. The eye system of lens focusing is referred to as accommodation. Computer images are made up of tiny round dots, known as pixels. Since your eye cannot focus on the tiny round pixels, you must constantly refocus or accommodate to keep the images sharp. The eyes can’t keep a constant relaxed focus on the computer screen, even when you increased the number of pixels per square or max out the computer’s refresh rate. The monitor is constantly being “redrawn”, and this eventually leads to repetitive stress of the eye muscles and fatigue.

Bifocals are not helpful at the computer. In fact, the bifocal only increases the problem since the reading portion of the bifocal is designed for a shorter distance than a computer screen and for a much lower visual angle. The tendency to lift the chin up and move closer to the screen just leads to lower back and neck problems. Progressive lenses (eyeglasses without bifocal lines) have the same shortfalls since the area for intermediate computer vision is found in the lower half of the glasses and the area for viewing is limited.

If you spend two or more hours working at the computer CVS can be a real problem at home or in the workplace. Savvy employers are beginning to recognize that increase work production can be realized with eyewear designed for computer use. Visit your eye doctor who is ready to help you eliminate the problems of Computer Vision Syndrome with a dedicated pair of computer glasses. You can benefit from a natural head and neck position with computer glasses or the new ergonomically designed clip-on computer reading glasses.

You can choose to have a dedicated pair of computer glasses custom made or you may be wondering how to convert your existing general purpose pair of eyeglasses that you use for distance and reading only into computer glasses. Well, there is an easy and affordable way by using a new innovative clip-on lens to view a computer monitor. Simply clipping the lens on to the bridge portion of your general wear eyeglasses that you are already wearing, and you can immediately feel and see the difference while working on a computer. Save your eyes from nagging eyestrain and improve your ability to be productive in the workplace as well. A pair of dedicated computer glasses or the new clip-on computer reading glass will do much for you in all aspects of work, as well as and make you a feel better outside of work since they will eliminate much of the eyestrain, lower back discomfort and neck pains that you are experiencing.

tips on How to Build Selection on Computers and Components

I get asked the same question very often, how to build a computer? It can be very deceiving to the average person’s eyes when they glance into an open computer. There are different “pieces” to be found and quite a few wires running around from one part to the next. All of this can be quite confusing and discouraging. The best advice I can give is that it looks more complicated that what it actually is. Don’t be afraid to do some trial and error to figure things out, within reason. Of course you have to be careful and not force components in spots they do not belong, but it is difficult to mix up as most things can only go one way, and will only fit in the correct location. Over the years it is how I learned most of what I do today, trial and error. One something goes wrong, there is always a way to fix it, and sometimes it just takes some patience and research to figure out a way to fix the problem.

I started building computers around 1996, when I was ten years old, and it became a hobby of mine which led into a business about 16 months ago. Over the years there has been a lot to learn and pick up on, and that is the thing with technology and computers. Computers are always changing and updating for more performance, reliably, smaller size, ease of use and less energy consumption in more recent years to become “green” on the environment.

But that is enough with the history, it is now time to move onto the actual computer building process from start to finish. There is quite a bit to cover and there are many ways to go about the process, but I will share my personal views and opinions along the way.

To start things off you have to ask yourself what you want the computer for. It could be a basic machine for simple web browsing, such as Facebook and E-mail. Another need could be simply for a media center, a computer hooked up with an entertainment center for movie watching purposes, music, recording, and internet television as well as any other uses hooked up to a television full time. The machine may be used primarily for gaming. A gaming computer can be a touchy subject as everyone’s views are different. Some may just be happy with playing a game on lower setting, and others may want everything turned up to the max with room to spare for future game titles. The final use I will touch into would be photo and video editing. A lot of times a high end gaming computer, and a photo/video editing machine will have many similarities. You do not necessarily have to have an extremely powerful system for videos and photos, but it will certainly cut down on the time required. If someone is looking to produce lengthy videos, it could take ages to accomplish on a less powerful computer. One thing I will say is no matter what you are looking to build a computer for, figure out a budget of available funds and go from there. There is no sense in looking at very costly premium components, when there is just no budget for it. Many would be quite surprised at how inexpensive a fairly powerful system can be “now days.” I never recommend to buy the latest and greatest as it will cost a premium and will be replaced by something better in around six months’ time. That is just how the computer world works.

Once the purpose of the computer and a budget is planned out, there are a handful of main components that are required to assemble a fully functional computer. These core components include;

The chassis which houses and protects all of the components,

The power supply (PSU) which supplies power to the computer from the wall,

Motherboard which is the central location for all the components to communicate with each other,

Graphics card, which is responsible for putting an image on your computer screen that you can see and interact with,

Processor (CPU) which functions as the brains of the operation, calculating millions of operations every second,

Memory (RAM) which stores temporary information calculated by the processor for fast access,

Hard drive, or hard disk which is the permanent storage device, holding all of the user’s data and programs,

Removable storage such as CD/DVD/Blu-Ray readers and burners, USB drives and other storage devices.

The first component we will start with is the motherboard. This is pretty much the central location where everything plugs into. The motherboard is full of “highways” which pass data between all the components. There are many kinds of motherboards available, most commonly there are AMD and Intel based boards. An AMD bases motherboard must be matched with an AMD processor and vice versa. An Intel based motherboard with an Intel processor. There are also different form factors, or sizes available, which must be matched with a proper case for a proper fit. Most commonly there are Micro ATX, ATX, Extended ATX, and more recently Mini ITX which is of a very small size for when space is extremely limited, such as in an entertainment center. There are also other sizes available but these are the most common platforms I deal with. The computer case chosen must be compatible with the size of the motherboard, if the motherboard is an ATX form factor, the case has to support an ATX size. Another main factor to take into consideration is the type of socket. The processor (CPU) mounts onto the motherboard and the socket must be the same. Both AMD and Intel have their own sockets and naming schemes. For example a modern Intel machine may be a socket 1155, and AMD machine may be an AM3 socket. So if the motherboard is an 1155 board the CPU must also be an 1155. Just be sure to do your research and make sure that the chosen CPU and motherboard are compatible with each other. It is worth noting that a CPU cannot be returned after purchase unless it is defective. So a mistake pairing up an incorrect CPU with a motherboard would not be a good thing to happen

The processor or CPU is a small chip made of silicon wafers that calculates millions of numbers extremely fast. In the computer world everything is a binary system which is made up of ones and zeros. Different combinations result in different things. The CPU is usually referred to as the brains of the computer. On modern Intel processors the contact side contains a large amount of pads which make contact with pins on the motherboard socket. AMD is the opposite having the pins on the CPU itself, and the pads on the motherboard. Quite a few years ago, Intel also had the pins on the CPU but that changed over the years. I remember having bent pins and straightening them out with a tiny pointy object. That would be very hard to do now days as there can be in excess of over 1,000 pins in close proximity to each other.

A processor makes a significant amount of heat, and needs something to keep the temperatures under control. Otherwise in a matter of seconds under a lot of work, a CPU would “burn” itself up and become a paperweight. In most cases a heat sink and a cooling fan will accomplish this task. A thin layer of thermal compound is applied in between the surface of the processor and the heat sink to optimally unload heat. A heat sink will usually be made up of several cooling fins which are then cooled by a fan blowing air across. Many retail boxed AMD and Intel processors will come with a stock cooling solution which is sufficient for the average user. The manufacturer will not sell a cooler along with their product that is not adequate. An aftermarket cooler may be chosen for less fan noise, or for those who like to push their computers passed the manufactures settings, which creates more heat, resulting in a higher performing cooling unit.

In more extreme cases, there may be liquid cooling or sometimes called water cooling. Technically water should not be used as it is conductive and will create corrosion over time without proper additives. In a water cooling setup, there will still be a block attached to the top of the processor, which allows liquid to pass through the inside and keep it cool. There will then be a radiator just like an automobile, and a fan(s) to cool the liquid as it passes through the radiator with the use of a pump.

Next, we will move onto the memory (RAM). RAM stands for random access memory. It is used to temporarily store data and will lose all stored data upon power loss. Memory is very fast and is right in line with the processor to quickly pass data back and forth to be calculated. Memory comes in different forms as well. On most modern computers, the type of memory being required is DDR3. There are different speeds which memory comes in and must be matched up with the chosen motherboard as well, just like the processor. Memory comes in various capacities. Different memory kits will have a varying number of modules and capacities. I would recommend either 8GB or 16GB of memory as it is in a very good price range this day and age. For a memory hungry video editing/photo editing machine, 16GB would come in very handy or possibly even 32GB if going all out!

For the graphics card there are several possibilities. Many times the chosen motherboard/CPU combination will have integrated on board video. Which means the graphics card is already built into the computer. No additional hardware would be needed. In some cases, a discrete graphics card can be used in conjunction with the on board video to further performance. In other situations there may be no integrated video at all and a graphics cards is required for the computer to function. Current graphics cards will occupy a PCI express slot (PCIe). AMD and their A series processors are a great solution currently for integrated graphics. They perform very well and are plenty for a general use computer and light duty gaming. For higher end gaming a dedicated graphics card will be needed, and if wanting some bragging rights, many modern day graphics cards can be paired up to work with each other. Sometimes two, three, or even four graphics cards to extreme gaming performance. But most likely if you are reading this, you would not be looking into that as it is fairly advanced and requires a fair amount of knowledge to master.

Next, we will move onto the power supply, which is responsible for taking the AC (alternating current) power from the outlet in the wall, and converting it into DC (direct current). The power supply or PSU (power supply unit) is another crucial component as without it, there is no juice to get the computer running. Power supplies come in different wattage’s and efficiency ratings. Recently the power requirements of computers have gone way down from what they were a couple of years ago. What once required a 1200 watt power supply can be accomplished with an 800 watt power supply on new hardware. Of course that is just an estimate I threw out there, but you get the idea. Many general use computers will be just fine somewhere along the lines of a 500 watt unit. It is always good to go a little bigger just to allow for expansion in the future. Depending on the chosen components, various amounts of power will be required. It is always best practice to get a decent, quality unit and not the cheapest one available. A cheap unit can actually cause problems in the future with “unclean” power and may not last for a decent length of time. A quality power supply should last for many years to come and may be reused in a future build as well. In most cases a standard ATX power supply with a 24 pin main power connector will do the job. There are other cables as well to take account for such as SATA, Molex, and 4/8 pin EPS connectors which supply modern motherboard with extra power that the 24 pin connector cannot provide.

Moving on the chassis to house the computer, there are many possibilities to choose from. There are so many designs to take into consideration and different sizes. Some may have an acrylic window on the side to see all of the components once they are inside. As noted above with motherboards, the case has to match up to support the correct form factor motherboard. Be it ATX or Extended ATX, or whatever else it may be. Same cases may just be plain and simple for a nice clean look, while others may be all futuristic with their design and flashy lights. It all comes down to personal preference and what the case has to offer. Good airflow is key to keeping all of the components cool and quiet. Cases can be customized with many different size fans featuring different air flows and noise levels, again depending on personal preference. A case will last for a very long time and can be reused in multiple computer builds. I prefer a full tower chassis for my personal computers as they allow plenty of space inside and upgrade ability to last for years and years to come.

Moving onto the hard drives, there are a couple different possibilities. This is the device that stores all the data and programs, even when power is turned off, unlike with memory or RAM. Many get the memory and hard drives confused when looking into computer purchases. They are not the same thing and come in completely different sizes. There are the traditional mechanical hard drives which are very cheap now days. The cost per Gigabyte is extremely low and they work great for large amount of storage room at a very good price. More recently we now have affordable SSD (solid state drive) solutions which have no mechanical moving parts and are much faster and more responsive then a tradition mechanical drive. An SSD makes for a much snappier system, and is one of the best upgrades that can happen for many modern computers. Computers are so fast now that traditional mechanical drives act as a bottleneck in many cases. This is where the computer system has to take a break and pause while it waits for the drive to gather its data and send it out. With an SSD this process is considerably faster, resulting in a much faster overall system. I tell many first time SSD users that they will be greatly amazed at the difference in the responsiveness of their computer after swapping out a mechanical drive for an SSD. The fallback to an SSD is that they come in much smaller capacities and the price per Gigabyte is much higher, even though it continues to drop. To get the best of both worlds, an SSD drive can be used to install the operating system onto, such as Windows, as well as frequently used programs. Then a mechanical drive can be used as well for tasks like less used programs, backups, and large files that would otherwise take up way too much space on an SSD.

In my opinion CD and DVD drives are starting to become a thing of the past. They like to fail and have read and write errors after a while and can be not so reliable at time. A successful computer can be build now days without even having an optical drive installed. Just about anything you could possibly need can be download from the internet or installed with a USB device such as a thumb or pen drive. These devices are much faster and more reliable, not to mention they can be erased and written to over and over again with different data and application. Sure there are re-writable CD/DVD/Blu-Ray drives, but it is just not nearly as practical or convenient in my opinion to other non-mechanical solutions. Personally I have a computer with all my programs and data on it, which can be accessed over the network where I can then pull all that information onto another computer and install and run those programs. No CD’s or thumb drives even needed. There are a lot of external storage options to choose from, external USB/eSATA hard drives can be a great solution for performing backups or moving data from one computer to another.

Learn Why Clips-On Reading Computer Glasses Are Not All Created Equal

Comparing the new Computer Conversion Clips, to several other clip-on computer reading glasses offered on internet discount sites, have resulted in findings that show significant optical and structural differences among the clips. These differences can dramatically affect the computer user both negatively and positively. You can learn to get more value for your dollar with the following information. The clip-on computer reading glasses were compared by design advantages such as size, shape, weight, and optical lens quality to allow for the best computer user experience. It was an easy comparison to make with the computer conversion clips design advantages providing the best choice to reduce, eye fatigue, eyestrain and increased physical comfort from neck and shoulder pain. What are clip-on computer reading glasses?

A clip-on computer reading glass provides additional magnification to be attached over the upper portion of the wearer’s eyeglasses, converting the distance prescription of general wear bifocals or progressive lenses to mid-range computer distance; this will allow the wearer to see a computer monitor clearly in the intermediate ranges between 18 to 30 inches more comfortably. The wearer will then be able to view intermediate distances, such as the computer screen, while maintaining a normal head position. This would eliminate having to elevate the chin while moving closer to the computer screen to see what is on the monitor more clearly while lifting the chin up to see through the bifocal portion of their glasses. Ideally, the clip-on should only cover the top part of the eyeglasses to allow the wearer to continue to use the lower reading portion of their eyeglasses to see near.

Eye Care Professionals, and even Chiropractors, are the chief means of providing these newly designed Computer Conversion Clips to the public. You won’t find the new clip-on’s at the local internet discount sites. The many design advantages of CCC’s makes the small cost difference a bargain. Eye care professionals and chiropractors alike understand and trust the digital design advantages of the CCC’s for their bifocal age patients who show signs of eyestrain or neck problems while working at the computer with general wear glasses for 2 or more hours a day. Computer users buy clip-on computer reading glasses because of convenience and cost savings.

The general cost of a dedicated pair of computer glasses will range from $175 – $350. The cost and quality of the eyeglass frames and lens types used for a intermediate computer focus and near vision accounts for the wide range in costs. Buying a computer reading type clip-on at your local internet site to clip to your general wear glasses for about $20, sounds like a great deal… until you learn about the design differences with the new Computer Conversion Clips. It is good to remember that most of the neural input that comes into our body is from our eyes, so vision is one sense that you should value. Here are some of the valued differences in Computer Conversion Clips verses the other clip-on computer reading glasses you can find on discount internet sites.

Quality Lens Materials: All the usual brands of clip-on’s sold on the internet are made of a polycarbonate material. Polycarbonate is lightweight and strong, but also scratches easier than most other plastics. Polycarbonate material also tends to yellow with age and UV exposure. About 10% of the eyewear population discovered seeing through polycarbonate material more difficult than seeing through other lens materials.

CCC’s are made of an acrylic material that is more scratch resistant than polycarbonate, and acrylic transmits more light through the lens medium than polycarbonate to the back of the eye. Motor cycle shields are made from this material as well as windows on submarines. Digital design optics with the acrylic material gives you high visual performance across the entire area of the lenses.

Anti-fatigue Designed Optics: All the usual brands of clip-on’s sold on the internet have a very wide spacing for the optical centers of the clip-on lens. This makes it harder for the eye muscles to maintain a comfortable focus on the computer screen for long periods of time. The eyes are forced to compensate for the wide optical centering by turning in, commonly called converging, a greater amount than usual to maintain stereopsis and reduce the possibility of any possible double vision.

CCC’s are designed by eye professionals to eliminate the extra work on your eye muscles that have to turn in or converge in more than normal when viewing a computer monitor. This attention to preferred optical centering, so the eye muscles don’t overwork, helps to minimize any unwanted eyestrain and eye muscle fatigue.

Non-glare Anti-reflection Coating: All the usual brands of clip-on’s sold on the internet usually don’t apply a mulit-layered coating process to eliminate glare and reflections on the lenses. This is a more costly process, and would be reflected in the cost to the consumer.

CCC’s come with a non-glare anti-reflection coating to reduce headaches from excessive glare and reflection. The anti-reflection coating improves vision with the resulting increase of light transmission traveling through the lens to the back of the eye. All of us that are bifocal age need more light, and this non-glare anti-reflection coating will increase light to the back of the eye by another 8 to 10%!

Important Size, Shape and Weight Considerations: All the usual brands of clip-on’s sold on the internet are all larger in size and weight. A possible reason for this is that these clips were designed when eyeglass sizes were larger some twenty years ago. The smallest size I found was 58 mm X 30 mm, and even this smaller clip-on still was too large a size for today’s eyewear, and weighed 40% more than the CCC. Unless you are comfortable with millimeter measurements you are not sure what the size really is when purchasing on the internet. Heavier clips have a dramatic effect on the center of gravity of eyeglasses, and consequently, help pull the frame down on your face with the extra weight. The larger sizes make it difficult for you to use the reading portion of your general wear glasses at a normal reading focus. The extra magnification over the bottom reading area means you will now need to hold reading material closer than usual. The clamping arms that secure the clip to the user’s lenses had a minimal rubber coating dipped onto the clamp tips to protect the eyeglass lenses from scratching when taking the device on and off.

CCC’s were designed to be made to cover only the upper distant portion of your general wear eyeglasses, and are as much as 48% lighter in weight than general wear clips. The lens measurements are 51 mm X 26 mm. This size works well even on light weight rimless eyeglasses. The reduced weight of the computer conversion clips help to keep your current eyeglasses up in place with less trouble. The shape and size design feature turns your general wear glasses, with the CCC’s attached, into a task specific computer and reading eyeglass for greater utility both on the computer or working in a cubicle. You can always flip-up the computer conversion clip to see clearly at distances over 20 feet. The clip-on clamps that secure the device to the user’s glasses have soft gripping boots on the tips of the clamps to prevent the device from accidentally scratching the eyeglass lenses when attaching or taking off the clip-on.

Bonus Benefits of CCC’s: Depending on the age of the individual Computer Conversion Clips come in two easy to understand dynamic powers from which to choose. A custom made crush proof case to protect the clip-on along with a micro-fiber cloth for cleaning is included. ECP’s can give you additional advice, or you can use the below resource box to find answers to any additional questions; along with access to other facts and questions the CCC’s comes with a money back guarantee.

Computer conversion clips have important design benefits that include lens material, digitally designed optics for better vision and anti-fatigue comfort, special anti-reflection coating for increase light transmission, as well as size, shape and weight advantages. See all you can see with improved ergonomics, dynamic power choices based on science, hard case for protection, and a solid guarantee. Don’t be fooled by price alone, not all clip-on computer glasses are equal. The right clip-on can make your work easier, so be informed, and work at the computer smarter.

What is a Speed Memory on a Computer?

Increase Computer Speed Memory by Increasing the Ram (Memory)

Did you know that if you increase the memory on your computer, you can increase the speed? When you try to open a program on your computer, it needs to load itself from the hard drive into the memory. If the memory resources are low because there are too many programs open at the same time, or you have too many programs on your computer, this all takes memory to make things happen. The result will be a computer that runs very slow.

Nobody likes working with a computer that is slow. To have a computer that performs with speed, making the action process happen in 2-5 seconds, it is important to have ample RAM (memory) installed on your computer for computer speed memory. Many of the older computers might have 1 Gigabyte of memory if they are lucky, usually less. This is way too low by today’s standards. You should have a minimum of 5-6 Gigabytes of RAM and preferably 8-10 Gigabytes if you can afford it.

Each action performed, every program installed, takes up and uses computer memory. Don’t overload your computer. You can combat that by increasing the memory (RAM). Freeware contributes to a slow computer because it quite often comes bundled with other freeware that is installed on your computer. Many of those programs are just using up memory and are never used.

Tips for Computer Speed Memory Performance

There are several tips you should be aware of for computer speed memory to keep your computer running at maximum speed. Having the proper security programs on your computer is a must. If you try to shortchange yourself and your computer by not installing these mandatory programs just to save some money, you will ultimately pay the price down the road.

Security programs guard your computer against viruses such as worms, Trojan horses, adware, spyware, malware and other damaging viruses (just to name a few), to your PC. Use the best antivirus software, and keep it updated by version and daily updates. There is a constant new supply of viruses that attack your computer on a daily basis. Keeping all your programs updated, especially your security programs, should keep your computer protected.

When checking for the best antivirus programs, be sure and check all the problem areas listed on the landing page of the product, what the product protects, customer testimonials, product reviews, customer service, and a 30 day trial period with a full money back guarantee.

Ways to Speedup Computer Speed Memory

Run disk defragmentation.

Run disk cleanup.

Go to start all programs, click on accessories, system tools, and select disk defragmentation, and then run disk cleanup.

Uninstall programs that are no longer being used.

Click on start, control panel, uninstall programs, select and highlight program you want uninstalled, click on uninstall, when program is completely uninstalled, close out of the control panel and restart your computer to complete the uninstall.

Summary for Computer Speed Memory

Make sure you have plenty of RAM (Memory), preferable a minimum of 5-6 Gigabytes. If you can afford 8-10 Gigabytes this would be even better.

Using a good registry cleaner is the key to good performance

Use only the best antivirus software

To keep your computer safe, use good adware and spyware software programs

Also use a good Malware Program

Normally there is no – one program – that will deliver all the goods to keep your computer safe.

Keep your computer programs, driver devices, and all software updated at all times and make sure your computer is set for automatic updates from Windows Update.

Uninstall all the programs you no longer need or use on your computer.

Cloud Computing – Can It Be Safe?

On-premises computing is the traditional form of computing in which you or your company own and manage your own systems. All the applications you use, as well as your data files, are in your own computers on your own premises either on individual PCs or on an in-house local area network.

In cloud computing, by contrast, your applications and files are held remotely on the Internet (in cyberspace) in a network of servers which is operated by a third party. You access applications and work on your files from your PC simply by logging on to the network.

Cloud services are provided by cloud-hosting providers, companies such as Google, Amazon, Oracle Cloud, Rackspace, Microsoft Azure, and so on.

There is nothing fundamentally new about the concept of cloud services. If you are using Gmail, Hotmail or yahoo for your emails, you are using cloud services and probably have been for years.

What is relatively new is the types of services that are being offered in a cloud-environment. These now go far beyond email to cover all the IT services that an on-premises computing environment would deliver, such as accounting, marketing, human resources and so on.

Advantages of cloud computing

Cloud computing has several advantages over on-premises computing:

1) You can run an application or access your files from anywhere in the world using any computer.

2) Cloud computing is cheaper.

3) You need less technical knowledge.

4) Cloud computing delivers a better performance.

5) Cloud computing is eminently scalable. Increasing the number of applications you use or the amount of data you store does not require a heavy investment; you only need to advise the cloud-hosting adviser.

Given these advantages it no surprise that over the last few years there has been a widespread rapid adoption of cloud computing. Analysts estimate that the growth rate of all spending on cloud IT will soon be at least four times faster than the growth rate of all spending on on-premises computing.

Indeed, analysts are expecting the annual growth rate of spending on cloud computing to average 23.5% compound from now until 2017. In addition, by that year spending on cloud services will probably account for one-sixth of all spending on IT products, such as applications, system infrastructure software, and basic storage.

Given the rapid growth in cloud computing, the big question, of course, is whether cloud computing is safe. Is it more or less safe than on-premises computing?

The short answer is that cloud computing is not less safe than on-premises computing. However, the threats are somewhat different in nature, though they are converging.

Threats

Generally speaking, there are six major threats to computer security. These are:

Malware – is malicious software such as viruses, trojans, worms, spyware and zombies. Malware is installed on either a PC in your home-office or a cloud-computing server. Where malware gives control of a network of computers to a malicious group (eg, to send spam) it is called a botnet.

Web app attack – is an attack in which web-based applications are targeted. It is one of the most common forms of attack on the Internet.

Brute force attack – works by trying all possible combinations of letters or numbers in order to discover a cipher or secret key. For example, you could crack a password by repeatedly trying to guess it. Modern computing power and speed makes brute force a viable form of attack.

Recon – is reconnaissance activity that is used to choose victims that are both vulnerable and valuable.

Vulnerability scan – is an exploit using a special program to access weaknesses in computers, systems, networks or applications in order to generate information for planning an attack.

App attack – is an attack against an application or service that is not running on the web, ie the program will be on a computer somewhere.

Honeypots

A honeypot is a decoy website, network, system or application that has been intentionally designed to be vulnerable to attack. Its purpose is to gather information about attackers and how they work.

Honeypots allow researchers to:

  • collect data on new and emerging malware and determine trends in threats
  • identify the sources of attacks including details of their IP addresses
  • determine how attacks takes place and how best to counteract them
  • determine attack signatures (pieces of code that are unique to particular pieces of malware) so that anti-virus software can recognise them
  • develop defences against particular threats

Honeypots have proved to be invaluable in erecting defences against hackers.

The Spring 2014 Cloud Security Report

Alert Logic provides security services for both on-premises and cloud computer systems. The company began issuing cloud security reports in 2012. Its Spring 2014 Cloud Security Report covers the year ending 30th September 2013.

This report is based on a combination of real-world security incidents experienced by Alert Logic’s customers and data gathered from a series of honeypots the company set up around the world.

The report throws some interesting light of the security of on-premises and cloud computing relating to the company’s customers. Here are some of the highlights:

[1] Computing is shifting more and more from on-premises to cloud-based computing and the kinds of attacks that target on-premises systems are now targeting cloud environments. This is probably due to the increasing value of potential victims in the cloud.

[2] Although attacks on cloud environments are increasing in frequency, the cloud is not inherently less secure than traditional on-premises computing.

[3] The frequency of attacks in both on-premises and cloud computing has increased for most types of threats, though for a few types of threats it has fallen. Here are the main points of comparison between both computing environments:

The most prevalent types of attacks against on-premises customers were malware attacks (including botnets) at 56% during the six months ending 30th September. At only 11%, these attacks were much less frequent among cloud customers. However the number of cloud customers experiencing these attacks is rising quickly, more than doubling in one year.

Attacks using brute force increased from 30% to 44% of cloud customers but remained stable in on-premises environments at a high 49%. Vulnerability scans jumped dramatically in both environments. Brute force attacks and vulnerability scans are now occurring at almost the same rates in on-premises and cloud environments.

Web app attacks are more likely among cloud customers. However these attacks are down year-on-year in both cloud and on-premises computing, as are recons. App attacks increased slightly in both categories of customers.

The most prevalent types of attacks vary between on-premises and cloud environments. In on-premises computing the top three were malware (56% of customers), brute force (49%) and vulnerability scans (40%), while in the cloud the most common incidents were brute force, vulnerability scans and web app attacks, each of which affected 44% of customers.

[4] The incidents involving Alert Logic’s cloud-based honeypots varied in different parts of the world. Those hosted in Europe attracted twice as many attacks as honeypots in Asia and four times more than honeypots in the USA. This may be due to malware ‘factories’ operating in Eastern Europe and Russia testing their efforts locally before deploying them throughout the world.

[5] Chillingly, 14% of the malware collected by honeypots was not detectable by 51% of the world’s top antivirus vendors. Even more frightening: this was not because these were brand-new malware; much of the malware that was missed was repackaged variations of older malware and thus should have been detected.

The report concluded with a statement that security in the cloud is a shared responsibility. This is something that individual entrepreneurs as well as small and medium sized enterprises tend to forget.

In cloud computing, the service provider is responsible for the basics, for protecting the computing environment. But the customer is 100% responsible for what happens within that environment and, to ensure security, he or she needs to have some technical knowledge.

Conclusion

Advertisements by cloud service providers seem to imply that cloud computing is safer than an on-premises computing. This is simply not true. Both environments seem to be equally safe or unsafe viz-a-viz hackers and their malicious programs.

Attacks in the cloud are increasing as potential targets are becoming more ‘theft-worthy’. Thus, the security in the cloud needs to be just as robust as security in on-premises environments. However, you cannot rely solely on antivirus software vendors to detect all attacks.

Your best bet is therefore to enter an annual maintenance contract with an online computer maintenance firm that can periodically access your computer(s) from a remote location and ensure that it is protected as well as possible. This should not cost more than €120 to €150 a year depending on the number of computers you have.

Are We Always On The Computer?

A computer has been one of mankind’s greatest invention among other inventions ever since the foundation of science began. Its development was a result of years and years of long experiments spanning a hundred or so years conducted not just by one man, but many. Development of computers as it is today is a continuous process and it will ever be. Computers, however simple they may seem now to the computer literate, has a complex set of system underneath. It takes multiple disciplines in both computer studies and electronics to fully understand them. After all, computer in itself is subdivided into branches as is science itself.

While other technological inventions may have had already been developed prior to the foundation of science, “technology” is not yet a proper term for such. The word technology, after all, is always correlated with science and both science and technology are mutually inclusive to one another, strictly speaking in terminologies. Computers of today, however advanced they may seem, have had its origins in humble beginnings.

How did computer began?

Abacus, the earliest form of calculator, has been recorded to be in use since the early civilizations estimated to be around 1000 and 500 B.C., only to be adopted elsewhere in the world. The idea on how the algorithm of a computer does its arithmetic was based on this, in logic. Soon after, for as early as 1820’s, in the personification of Charles Babbage, dubbed to be one of the fathers of modern computer, developed ideas on how computers should do its math, initially known as the difference engine, it developed later after to become what is known as the analytical engine. While Charles Babbage, due to funding issues, didn’t get to see his ideas into fruition during his lifetime, it is his youngest son, Henry Babbage, who did so in 1910 based on his. However, this primitive form of computer is not as advanced as how we see on computers of today.

The idea of the need to do the computation on our behalf as man, hence the word ‘computer,’ came out of the need to handle complex problems and perform complex computations that is both difficult and takes longer time for man to handle. Especially true during the times of the industrialization era and great world war where the need for such arose. How a computer behaves is what’s in a library of a computer.

The development of computer grew by a lot since laying the foundation by Charles Babbage as was inspired by existing “technologies” of its time. From names of people of the past significant in the foundation of computers such as Ada Lovelace, Konrad Zuse, Alan Turing, John Atanasoff & Clifford Berry, Howard Aiken & Grace Hopper, so on and so forth, up to the present computer giant names such as William Gates, Steve Wozniak, and Steve Jobs, among others, computers of today are bigger in functions than they are their sizes and have found a spot in every people’s lives in both commercial and personal usage.

How do people use computers in their daily lives?

Modern day computers laid out the foundation on how we perform duties of today. It is a lot more efficient and makes the work done in shorter times. From a simple household leisure such is playing games or running multimedia programs, to doing office works, to a more difficult developing programs, up to a more complex computations such is done in NASA, computers made all this possible — all in a single box. What once takes a long time to finish in groups as in seen in companies without computers, can now be finished in shorter times with those.

Computers taking over the world

Also one of the most popular usage of computers is the internet. What once was the trend for telephones and telegrams, has become internet’s – and it is worldwide. Literally, computers taking over the world.
Although initially used for military purposes concurrent to the development of the computer, the internet grew up to become commercialized as it is used today. The internet, in conjunction to and other than the previous means, made communication around the world possible which also gave rise to communication tools such as the social media. To date, billions of people use computers with the internet every day.

Are we really too dependent on computers?

We may be are dependent on computers in relation to the internet given the information age we are in, since the computer age began. But such dependency was initially for a good intention – that is, to keep up with the demands of progress through the efficiency and rate the work demanded is done with computers as both our aid and tools. Let’s face it, there are complex works out there that can only be efficiently done if and only if we have computers. However, one should also ask whether such dependency is good for us. What if, by some chance, this technology called computers and the things it can do were taken from us? What then? Just like a bad addiction, computer dependency outside of our needs and moderation can be harmful for us, its users. An ideal tool for tyrants. While it may sound like it is out of context, it is not. In fact, we are as capable workers as our ancestors were without computers. Although obviously at a cost of the efficiency and ease we’ve known on how we do things with computers. These are not statements about abandoning computers as we know and use them, we’re just waking up with the idea of who we are without computers and who are ancestors were without those. No, we are not worthless without computers – we are not just as capable as someone who does and we alone are not capable as what a complex computer does as a computing machine. But do not be fooled, we are still the ones who made computers as they are today. In a way, we as a mankind is still superior to machines.

tips on Keeping Your Computer Cool

When your computer is on, nearly all of its components become hot. Constant exposure to high temperature can cause serious damage to your computer.

Here is a list of ways in keeping your PC cool.

Check if your fans are running.

This is the first step when you find your computer overheating. Open the case, and then check if all fans are still working. If at least one is not working anymore, consider doing repairs or getting a replacement.

Regularly clean your computer.

It is essential to regularly clean your computer, especially the cooling fans. The fans attached inside the computer case is used for active cooling of the computer. Over time, dust and dirt can accumulate in these fans. The accumulate dirt can slow down or, in worse, stop fans from working. If fans fail in expelling the hot air fast enough, some internal parts will eventually overheat.

To clean your cooling fan:

1. Shut down your PC.

2. Open the computer case.

3. If there is excessive dirt inside the computer case, take out the computer fan.

4. You can use compressed air, small electronic vacuum or duster, or damp cloth in cleaning the fan.

5. If you use moisten cloth, make sure that the cooling fan is dry or there is no remaining moisture before connecting it again.

Clean other computer parts as well such as the monitor, mouse, and keyboard.

Before cleaning any hardware component, make sure that your machine is turned off. Otherwise, your computer is susceptible to electrostatic discharge that can damage its parts and you are also prone to grounding yourself.

Before applying any cleaning procedures to hardware, make sure to check its manufacturer’s manual if they have provided you with the recommended instructions in cleaning or maintaining it.

Do not spray or spill any liquid directly in computer parts.

Do not limit the air flow around your computer.

Place your computer in a room that can provide sufficient air flow. Make sure that it is not sitting right next into other objects that prevent air circulation, like walls or other computers. There should be at least two to three inches of space on both sides. Since most of the hot air comes out from the air vent at the back end of the computer case, this part should be completely clear and open.

Move your computer to a cooler and cleaner environment.

Move your PC in a place with proper ventilation. It is important that the physical location will not contribute further heat to the computer. Make sure that your PC is not placed near a furnace, refrigerator, cooking appliances, and other things that can blow hot air or can transfer heat into your computer system.

To prevent your PC from overheating, it is advised to place it in an air-conditioned room.

Note: be careful when moving your computer in order to avoid damage on sensitive components inside it like the CPU, graphics card, hard drive, and motherboard.

Use your computer with case closed.

It seems logical to let the case open while the computer is running to keep it cooler. This is true. However, dirt and dust will accumulate and clog the computer fans faster when the case is opened. This can cause the fans to slow down or fail at cooling your computer.

Upgrade your CPU fan.

The CPU is the most important component inside the computer. When you are running demanding applications, the CPU and graphics card induce more heat. It can get so hot that it can be cooked.

Consider purchasing a high-quality and larger CPU fan that can keep the CPU temperature lower than the pre-built CPU fan in your computer could.

Consider installing a component-specific fan.

If you have observed that the other components are overheating, install a component-specific fan to cool them down.

Consider installing a case fan.

This small fan can be attached to either the front or back of the computer case. There are two types of case fan: one that can draw cooler air into the case, and one that can expel warm air from the case. Installing both is a great way to cool your computer.

Turn off your computer when not in use.

A computer continues to produce heat as long as it running, even if you aren’t using it. If you will only have a few minutes of inactivity, at least set your computer to hibernation. Basically, it will also turn off your computer but the opened files and programs are stored in your hard disk.

Also, unplug external hardware of no longer use like printers and scanners.

Overheating can destroy and shorten the lifespan of components inside your computer. The major upside of keeping your computer cool is that it can help you avoid expensive repairs or unnecessary upgrades.

Online Computer Repair and Remote Virus Removal

I have been doing remote computer repair for people across the United States and around the world for nearly a decade, giving PC help to people with malware removal, virus removal, pop ups, or a slow computer. Online computer repair or online virus removal is definitely a time saver and a money saver. Remote virus removal can certainly save a person hundreds of dollars over the cost of taking the PC to a local computer repair shop.

Although using a remote online computer technician is definitely the way to go for PC help, nevertheless there are some pitfalls. I constantly hear horror stories from customers that had previously used an online computer repair service for their computer problems with less than desirable results. Consequently I have put together this list of computer scams to watch out for when contracting with someone to provide remote computer help.

1. USA Based – Really? Most people don’t want to talk to someone in India with an accent so heavy that you can’t understand them. That’s why many websites will say, “USA Based.” But are they really? I have found that many websites advertise they are in the U.S. but the person on the phone, who claims they are in the U.S. still sounds like someone from India. It is not wise to deal with someone who has just lied to you. Hint: Read the text of a website carefully. You will probably find one or two grammatical errors on sites that they are not really U.S. based, and of course, you will know instantly when they answer the phone. Just say, “Sorry, wrong number.”

2. Super Low Price: There are companies out there claiming they can remove viruses, plus fix any and all problems, and do a PC tune-up, all for the low price of $39.99. As someone who has been doing computer service full time for 24 years, I can tell you that it takes several hours for a PC tech to do all that and do it right. How can they do this for such a cut-rate price? There are three ways: 1. Hire a bunch of young geeks that are still learning and let them practice on your computer. 2. Be based in India or the Philippines or some foreign country where labor is cheap. 3. Do the very minimum to just get by without concern for conscientious quality work. Some places do all three. The old adage – “You get what you pay for.” Applicable to online computer repair. If you want good quality remote computer repair you need to pay for it. Try to save a buck and you can end up with a destroyed computer and/or many hours of frustration as you call back over and over to try to get the online computer help you were promised. Good Advice: If you want a good PC tech, don’t pick the cheapest bidder.

3. Certified – Really? Does the website tell you who is going to be fixing your PC? Are the name, credentials and experience of the computer technician posted on the website? I have called some of these supposedly Microsoft certified websites and when I asked exactly which credential was held with Microsoft and the computer service company could not give me an answer.

4. Free Antivirus Software: The online computer service company offers a free antivirus software after the repair. Be aware that they are only giving you something you can get for free yourself. Again, you get what you pay for. Free antivirus software might be better than nothing, but not by much. I remove malware every day from computers that are protected by free antivirus products and they are very infected. Only the antivirus products that you purchase are adequate. When a remote computer repair company gives free inferior products to customers it gives them a false sense of security that will lead to their PC eventually getting hit by a virus. A PC technician that is really looking out for your best interests will offer to sell you a quality product that works.

5. Free Scan Scam: Here’s how it works. You call a remote computer repair service because your printer doesn’t work. The online computer service says they will connect to your machine and tell you what is wrong for free, no obligation. Then you can decide what to do next. Free diagnosis! Sounds good, right? Lots of people fall for this. So the PC technician connects to your machine and runs a program (that they have created) that pretends to do a scan of your computer. In just 3 minutes this software reports hundreds of registry errors, dozens of problems in the event log, dozens of viruses, trojans and spyware. They tell you that you have got to get this fixed right away before all your files disappear and your computer won’t work at all. After the scare tactics, they give you an outrageous price of $300.00. After paying that and they supposedly fix all these errors, chances are your printer still will not work. But the real fact is – there is not a piece of software in the world that can tell you what’s wrong with a computer in a few minutes. I have over two decades of experience and I can tell you that it takes a couple hours of careful work to properly evaluate a computer. I have helped many customers who told me they had just experienced this scam. Fortunately they called me and in many cases their computer was not in nearly as bad a shape as they had been led to believe.

6. One Year Service Contract Scam: Pay $300 per year and call for remote PC repair as often as you want. If it sounds too good to be true, it probably is. I’ve talked to lots of people that have been burned by this. There is only one way an online computer repair company can offer that and stay in business, and that is to not fulfill their promise. The service contract is long and in fine print and is not read by most customers. I have read them. The fine print says that if you bother them too much they can just cut you loose, provide no further computer help, and not give you any refund. Their interest is going to be in getting new customers to pay the $300, not in providing computer help for you over and over. You also have to wonder if such a computer service company will even still be in business six months down the road.

7. Cold Call Scam: “Microsoft called me and said my PC is infected.” I have heard this countless times from people that call me for advice. I tell them right off the bat: “I’ll be happy to do a virus check and perform malware removal on your PC for $59.99, but know this first, what you were told is not true and it was not Microsoft that called you. Microsoft doesn’t call anyone and they would have no way of knowing if your PC is infected.” This scam is very common. If you get this call do not be alarmed and don’t be suckered into paying them to “fix” it.

8. The Big Company Scam: Many of my customers have told me that they went to a company website for their computer problems and got a number and then called and talked with HP, or Dell, or the list goes on: Microsoft, IBM, Norton, Toshiba, etc. and this company told them they had multitudes of problems, they needed malware removal and other repairs to take care of pop ups, a slow computer, or other issues and they could fix all this for a certain price. What these people didn’t realize is that they were not actually speaking with the actual company they thought they were. Many online computer service companies unscrupulously advertise that they are Dell, or Microsoft or whoever. They put up websites and Google ads designed to trick you into thinking they are support for HP or whoever. Once they have you thinking they are the company that made your computer, or your software or your printer, then they have a better chance at selling you their next scam. Anytime you go to a website look at the URL and see where you are. If it says for example, FixMyHP.com or something like that and not, HP.com, then you are possibly on a scam website.