Wednesday, May 1, 2013

Computer Jargon Explained – Part 2


This month’s article is part two of a series to understanding, in simple language, the myriad of “jargon” associated with computers.

Broadband
Of all the issues I deal with internet connectivity is by far the most misunderstood by computer users. Over and over again I see the same mistakes being made due to lack of understanding about broadband and the method used to provide it. This month I will begin to address this topic.

Fixed Line Broadband
This method of receiving broadband is delivered over your telephone and is currently by far the most reliable solution. Not everyone can get it as the distance from your home to the local telephone exchange is a factor.

Fixed line Broadband Providers
It is very important to understand that while there are many companies selling broadband services such as Vodafone the broadband network is owned and operated by Eircom. They maintain the entire domestic telephone system which includes the telephone line and exchanges. No company other than Eircom has physical access to these lines or exchanges and any repairs required are carried out by Eircom.

Before selecting a broadband provider you should seek professional advice and also consult your friends and family in the locality to see their experience with the broadband provider. Most if not all of the providers will lock you into a 12 or even 18 month contract so before you agree to change providers you should be 100% happy that you are making the right decision.

Fixed Line Broadband Connectivity
It is also important to understand how you pc actually connects to the internet.
Each broadband provider, be it Eircom Vodafone or someone else, operates their own DNS servers. These servers are your computers index to the internet and if these servers are unreliable or over subscribed you broadband will suffer severely.

Broadband Speed
On your bill or contract you will find the speed of your broadband connection.
You should periodically check that you are getting what you paid for. Towards this end I provide a page on my website http://www.reidyonline.com/broadband.htm that links to three broadband speed tests. I recommend you watch the video on this page and do the tests.  

Broadband Modem/Router
Your broadband modem is key to good connectivity and I advise all customers to consider purchasing a good quality modem. This will not only give you more reliable internet connectivity but will also provide better wireless networking within your home. I will continue with this topic next month.

.

Friday, April 5, 2013

Computer Jargon Explained – Part 1

Computer Jargon Explained – Part 1

This month’s article is part one of a series to understanding, in simple language, the myriad of “jargon” associated with computers. I hope they will be of value to my readers in sorting the “wheat from the chaff” when next you purchase a pc.

Tablets
Tablets were made famous by the Apple Ipad but they are no longer the only company offering these products. These devices are ideally suited for accessing the internet on the move and for providing a quick and easy way to access your email.

If you have been used to a traditional desktop or laptop computer then do not make the mistake of buying one of these devices as a replacement. Tablets were never designed as a complete solution to computing needs. They are designed to provide a limited set of functions and no more. Don’t expect more than they can deliver.

Apple, until recently, was way ahead of the competition but the gap is closing and competing products are gaining ground.

Apple offers the Ipad in the regular and mini models. The mini model was brought to market to halt the progress of the likes of Samsung. In fairness apple is a very hard act to follow.


Sample of Models Available      
Model                        Price Base Models         Screen Size                 Apple Ipad 2                           €509                        9.7 inches      
Apple Ipad Mini                      €339                       7.9 inches       
Samsung Galaxy Tab 10.1    €337+                   10.1 inches      
Samsung Galaxy Tab 7.0      €220+                     7.0 inches
      
   


Pros:
Very easy to use.  Lightweight and Portable. Fast internet browsing, Skype Enabled. Built-in camera and video recording.

Cons:
No keyboard (you can buy one but it costs extra). Easily damaged and very expensive to repair. Very limited storage which usually cannot be expanded. Cannot be easily upgraded. Expensive compared to traditional computers.

Conclusion: For people who have limited computer training these are excellent devices to get them on the internet.
Do not store important information or your valuable photos on these devices.


Review Of Apple Ipad2 (€509) Click Here

Review Of Apple Ipad (€339) Mini Click Here

Review Of Samsung Galaxy (€337+)10.1 Click Here 

Review Of Samsung Galaxy 7.0 (€220+) Click Here 




.

Friday, March 1, 2013

Protecting Your Internet Identity - Part 2

This month’s article is part two of the series “Protecting Your Internet Identity”.

Click Here To Be Notified When New Articles Are Published

Tip  3. Protecting Your Computer
When you think of protecting your computer from attack the image that springs to mind is some cyber criminal “hacking” remotely into your pc and stealing your information. For the most part this is pure fantasy and Hollywood has exploited this myth to the point that the general population are convinced a group of super hackers exist. They don’t.
There are no magic tools that can penetrate a strong defence on your computer and if your computer is hacked 99% of the time it is you or someone using your pc that has enabled this to happen. Simply put the real threat to your computer is those whom you allow to use it.  In most cases of virus infection I come across, the computer user has either disabled their protection or has actively allowed a website or individual to gain access to the computer. Here are a few simple steps to avoid this.
  • Restrict access to your computer to just yourself and if you can’t do this ensure that anyone using the computer uses the guest account only.
  • Never under any circumstances give your password to someone so they can use your account on your pc.
  • Ensure you install a proper anti-virus on your machine and ensure that it cannot be disabled without entering a password. Please note Anti-Virus software is not foolproof and viruses can get past it under the right circumstances. Thus exercise caution on the web at all times.
  • Scan your machine frequently for virus and spyware infection and if one is detected do not rely on the anti-virus to remove it. Seek Professional help immediately. One virus detected usually indicates that more are lurking on your pc.
  • Actively avoid all illegal music video gaming sites.
  • Use Fire foxes web browser and avoid using Internet Explorer, Google Chrome and Safari for web browsing. (donwload Firefox from this link -http://www.mozilla.org/en-US/firefox/all/)
  • Don’t download every “whiz-bang” program you come across on the internet. Chances are you really don’t need it.
  •  Have your computer checked regularly by a qualified and trusted computer technician and if you notice unexplained slowdowns or error messages seek technical help immediately.
  •    Never respond to unsolicited emails and be suspicious of emails purporting to come from friends that seem odd. It is very simple for any hacker to impersonate anyone’s email.
  •  Don’t allow friends or family to connect usb or external hard drives to your computer. These can contain viruses which will infect your machine.
Oliver Reidy is a computer technician and has been in the industry since 1981.You can contact him via email  at

Click Here To Go to the on-line email form

Friday, February 1, 2013

Protecting Your Internet Identity – Part 1

This month’s article deals with the every present threat of identity theft on the internet. Increasingly cyber criminals have turned to this method as it presents the easiest way to part you from your hard earned money. Coupled with this is the increased use of email accounts and passwords as the primary method to access online services. Identify theft can result in serious financial loss coupled with embarrassment when your friends and family are targeted as a result of your web address book becoming available to the cyber criminal.

The following are some simple, but very important, steps to reduce the risk of your email being hacked.

Tip  1. Use Strong Passwords
Any password you use should not be easily guessed by the cyber criminal. Thus you should avoid simple passwords such as your own name or indeed those of your siblings or children. Passwords should be at least eight characters in length and should contain a combination of upper and lower case letters and numbers. By default we tend to use easy to remember passwords such as “ashling”. Changing this to a stronger password by adding numbers and upper/lower case letter would result in a password such as aSh83Li19Ng. The chances of the new password being guessed are much less likely. Remembering it is not so simple. If you must record it then record it on paper! Do not put it in a file on your computer as a hacker may gain access to your pc and find it.

Tip 2. Setup Security For Cloud Email  Accounts
I have seen many cases where “cloud” email accounts have been stolen. By cloud email I am referring specifically to Microsoft hotmail, live and Google gmail accounts. If you must use one of these services, I don’t recommend them, then take the time to setup the security correctly and record this information on paper. It is critical that you maintain this information as without it is very difficult to regain access to your account should it be stolen.

I recommend you have multiple email accounts and use them as follows:
·    Use one account for high security such as banking and buying online. Never use this account for any other correspondence and use an extra strong password and change it frequently.
·    Use a second account for regular email to friends and family but do not use it for sign up notification services from retailers.
·    Use your third account as your scrap account for signing up to online offers and correspondence with internet sites.

In the March edition I will provide some additional tips on this issue,  Stay safe!

Oliver Reidy is a computer technician and has been in the industry since 1981.You can contact him via email at help.desk@reidyonline.com. The link for this article for friends and family is  http://reidyonline.blogspot.ie/   His  facebook account is :  Http://www.facebook.com/reidyonline.

Tuesday, January 1, 2013

Five Computer Tips For 2013

When it comes to your computer taking some simple steps will ensure that when trouble strikes on your pc you will be in a good position to recover from it. Chances are many of you will ignore them but those who take the time to implement these simple steps will be rewarded.

Tip  1. Protect Your Pc From Power Problems
Electrical problems will kill your machine faster than any virus and it is one of the most common causes of damaged machines I come across. Purchase a good surge protector and use it. I recommend Belkin. If you have a damaged laptop power supply replace it and if the connector is damaged get it repaired before it shorts out and blows the laptop.

Tip 2. Invest in a Good Backup device
Safeguard your data by purchasing a solid backup drive and regularly backing up your information. You will spend around 100 euro. Seek technical assistance to ensure you are backing up all your key information. Use the two copy rule for all important information (two copies on two separate devices) and don’t use your backup drive to store information other than your backups.

Tip 3. Invest in a Good Anti-Virus Program
There is no free lunch when it comes to security and if you rely on so called “free” products to protect you on the internet you will get burned sooner or later. Seek professional advice on which anti-virus program to purchase and ensure it is properly installed and configured. The anti-virus program installed on your computer is not there because it was the best it’s installed because it was the cheapest the manufacturer could find ! Visit my website at www.reidyonline.com to see a comparison of some of the leading anti-virus programs.

Tip 4. Restrict Access
Don’t allow others to use your computer unless you want to get virus infected.
If you must allow someone to use the machine then either create a restricted account or activate the guest feature on your operating system. Guard your password and don’t give it out as once you do you have compromised your security.

Tip 5. Avoid Overloading Your PC
Avoid installing toolbars and extensions to your browser and avoid downloading Google apps and in particular google desktop, earth etc. These applications can hog the internet and make your browsing experience slow and frustrating. Less is better when it comes to the internet.



Tuesday, December 18, 2012

Buying A New PC For Christmas



Probably one of the most daunting tasks is choosing to purchase a computer for you or your family. This month I will outline some basic guidelines to buying a computer that suits your needs.

Step 1. Desktop/Laptop/Tablet
Laptops: The convenience of laptops has attracted many people to purchase laptops but there are significant tradeoffs if you choose a laptop over a desktop model. Quite simply laptops are not as robust as desktops, cannot be easily upgraded, are expensive to repair, and finally are prone to more damage. While laptops can be purchased for as little as €400 be aware these cheap laptops are not bargains. For the most part they suffer from poor manufacturing quality and consequently will be prone to early failure. They are usually seriously underpowered resulting in dreadful performance.
Cost: I found not one decent laptop in the stores for under €600.

 Desktops:The desktop is currently in decline but despite this is still, in my opinion, the best bang for your euro.  Models are limited but still available.
Cost: Expect to pay over €600.

Tablets: The Tablet, and primarily the Apple Ipad, is the largest seller worldwide but not it appears in Ireland. Tablets are not a replacement for a laptop or desktop computer but are good at what they do. As a family computer they are a non-runner but for the individual user with limited requirements they do the job. The lack of connectivity on these devices means printing and backup is a big pain in the neck and it is likely if you drop, damage, or lose your tablet you can kiss your photos goodbye.
Cost: Expect to pay  €300 for non Apple and 400+ for Apple models.

Step 2. Brand
The old adage “You get what you pay for” applies when purchasing a pc. Stick with a name brand and avoid the temptation to buy the “all singing all dancing” no name brand.

Step 3. Software
All new computers now have Windows 7 or 8 installed and it is likely that if you are moving from an XP computer some or all of your software may require upgrade or replacement. Budget for some new software and if you have a student in the house you can get a special version of Microsoft office for under €200.

Step 4. Warranty
Don’t ignore the warranty. A poor warranty will mean you must pay for the repairs and this may be sooner than you think on a new computer. Get the manufacturers extended warranty and ensure it covers all aspects of repair and replacement of the computer.

Thursday, November 1, 2012

Internet Safety – Part Two

This month’s article is the second in a series dealing with the topic of protecting both yourself and your computer when using the internet. To let others know about this article direct them to visit  my blog: http://reidyonline.blogspot.com/ or my facebook page facebook.com/reidyonline

Computer Security
Effectively protecting your computer on the internet requires commitments from you to avoiding the obvious traps that exist on the internet. Plainly speaking that means if the site contains illegal music, video or programs you must actively avoid these sites. There is "no free lunch" when it comes to the internet and if you download illegal content from the internet you will eventually fall victim to a virus attack. The following five tips will help in protecting your computer while on the internet.

1. Install a proven anti-virus program and ensure it has all the latest updates. The "free" anti-virus programs available cannot effectively protect your machine and are not recommended. Consult a computer technician before purchasing and installing an anti-virus program. On my website at http://www.reidyonline.com you will see comparisons of various anti-virus programs available and why I don’t recommend them.

2. Adjust Login Security Levels. By default most users have administrator rights on their computer. You don’t need this level of security under normal circumstances. Viruses take advantage of this fact and can easily infect your computer when you are logged in with administrator rights. Create an admin account on your pc, login to it and adjust down all other accounts to restricted user level. Seek technical help on this one if you are unsure.

3. Avoid downloading Junk Software Resist the temptation to download programs that have not been recommended to you by a qualified technician. The so called speedup cleanup tools that you find advertised are for the most part junk and in many cases lead to sites that will spyware infect your machine. If your machine is slow contact a qualified technician to get it corrected.

4. Think Before Your Google Virus writers will setup fake sites to trap the unsuspecting user. Once you click on these sites you are going to get infected. If you are prompted by a site that you need to install software to view it don’t!

5. Restrict Access To Your Computer. Activate the guest account on your computer and only allow guests to use this account. Do not allow others to browse the web with your login. If you do chances are you’ll regret it.

Oliver Reidy is a computer technician and has been in the industry since 1981.Locally he is a member of Mebo (Meath East Business Owners) Http://www.mebo.biz. You can view this article online at http://reidyonline.blogspot.com/ or via his facebook page at facebook.com/reidyonline

You can contact him via email at