Tag Archives: Computer Support

“How To Keep Your Kids Safe Online”

How To Keep Your Kids Safe Online

Now that school is out, thousands of children will be surfing the Internet in their free time.

Although the Internet provides a tremendous learning tool for children, left unchecked it can also expose them to inappropriate material and unscrupulous individuals looking to exploit innocent children.

The statistics of online abuse towards children are alarming. According to a new survey conducted by NetAlert, nearly one child in every five using the Internet has been approached online by a stranger, and 47 per cent of children have been exposed to material that is pornographic, sexually explicit, violent, hateful, or that encourages them to participate in dangerous or illegal activities.

According to Highlights of the Youth Internet Safety Survey conducted by the U.S. Department of Justice, one in five children received unwanted sexual solicitations online, and there are a growing number of cases of pedophiles using the Internet to gain a child’s confidence and arrange a face-to-face meetings (also known as ‘online grooming’).

These cyber criminals are using everything from spam e-mails to online messaging, children’s chat rooms, and misleading domain names to trap children. If your child is using the Internet, you must take measures to educate and protect them from these dangers. I’ve outlined 3 things you should be doing now to keep your kids safe online:

1. Install web and e-mail filtering software to prevent your children from viewing inappropriate material. A good, inexpensive software is offered on www.bsecure.com. Not only will this keep the trash off your computer screen, but it will also stop inappropriate spam from reaching your children.

2. Talk to your kids about online safety and proper Internet usage. Set limits and guidelines about when they can go online, what they can do, and how long they are allowed to be online. Explain why it is dangerous for them to “chat” with strangers online or download suspicious looking files.

3. Give your children specific online guidelines or rules to follow when using the Internet. It’s not enough to warn them about potential risks; pedophiles know how to cloak their identity and gain a child’s confidence to arrange face-to-face meetings.

Below is list of rules for kids to follow online:
• I will not give out personal information such as my address, telephone number, parents’ work address or telephone number to anyone online.
• I will not give out the name and location of the school I attend to anyone online.
• I will tell my parents right away if I see a web site, e-mail, or message that makes me feel uncomfortable.
• I will never send my picture to anyone online, or upload my picture to any web site without my parents knowledge and permission.
• I will never agree to meet someone face-to-face that I met online without my parents knowledge and permission.
• I will not respond to any messages that are mean or that make me feel uncomfortable in any way. If I get a message like that, I will tell my parents right away so that they can contact the online service.
• I will never give my parent’s financial information out to anyone, especially their credit card information, bank account information, or social security number.

If you want more information on how to keep your children safe online or to report illegal, violent, or explicit acts towards children, go to www.cybertipline.com. This site is run by the National Center for Missing & Exploited Children and is a great resource for parents, teachers, and guardians.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on “How To Keep Your Kids Safe Online”

“9 Warning Signs Your Computer Is Infected With Spyware”

9 Warning Signs Your Computer Is Infected With Spyware

Spyware is Internet jargon for hidden programs that advertisers install on your PC without your permission to spy on you, gather information, and report this information about you and your online activities to a third party.

Spyware is NOT harmless; it can be responsible for delivering a boatload of spam, altering your web browser, slowing down your PC, and serving up a bounty of pop-up ads. In some of the more extreme cases, spyware can also steal your identity, passwords, e-mail address book, and even use your PC for illegal activities.

Most spyware finds its way onto your computer via file downloads including free programs, music files, and screen savers found everywhere on the Internet. These nasty programs piggyback the download and run undetected on your computer collecting information about you and sending it out to a third party until they are removed. Although spyware has malicious components, it is not illegal, and it is not considered a virus because it doesn’t replicate itself or destroy data.

If you are experiencing one or more of these warning signs, chances are your computer is infected and you will need to seek professional help in getting the spyware removed.

#1. Your browser has been hijacked. If you open your Internet browser and a strange-looking homepage pops up and won’t go away, chances are you have a spyware program installed on your computer. You may also discover that you cannot modify your browser settings and that your favorites folder has been modified.

#2. You conduct a search but another (unauthorized) browser completes it for you. For example, you type a search term into Microsoft IE but another browser pops up and lists various websites tied to your search term. This is a surefire sign of a spyware infection. You’ll also notice that if you try and remove this program, it comes right back.

#3. Your computer is unstable, sluggish, locks up, or crashes frequently. Spyware programs run in the background taking up disk space and processor speed which will cause serious performance problems.

#4. You constantly get pop-up ads displayed on your screen, even if you aren’t browsing the Internet. Some of the ads may even be personalized with your name.

#5. You receive expensive phone bills for calls to 900 numbers that you didn’t make. Some spyware programs can use your computer to make calls on both a broadband and dial-up line.

#6. The send and receive lights on your modem blink actively as though you are surfing the Internet or downloading files online, even though you aren’t. More than likely this is due to spyware programs sending and receiving information via your computer without your permission or acknowledgement.

#7. Mysterious files suddenly start appearing on your computer, your files are moved or deleted, or the icons on your desktop and toolbars are blank or missing.

#8. Your CD drawer starts opening and closing by itself.

#9. You find e-mails in your “Sent Items” folder that you didn’t send.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on “9 Warning Signs Your Computer Is Infected With Spyware”

“Learning from your peers is better than learning from your own mistakes”

Learning from your peers is better than learning from your own mistakes.

I am a firm believer in peer groups. I always suggest that business owners look for peer groups in their industries. These groups can be invaluable. They can push you to get the impossible done. Your peers can also help you when you need it, because they have been there too.

Peer groups can allow you and your business to build a nationwide network.

I have found that is it much cheaper and easier to learn from your peers than to learn from your own mistakes.

For me and my business, peer groups have been invaluable.

So get out there and start looking for a group in your industry. You will be surprised at what you will find.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on “Learning from your peers is better than learning from your own mistakes”

“5 Ways To Keep Your Laptop Running – Without Plugging It In”

5 Ways To Keep Your Laptop Running – Without Plugging It In

On the road, in the airport, at a client’s site, or simply at home on the couch … these are places you can’t or don’t want to – plug in your laptop. Want to keep your laptop running as long as possible without searching for an outlet? Here are five tips to help:

1) Keep your screen dim. A laptop’s backlight requires a lot of power. Reducing the brightness conserves battery life.
2) Turn off unused hardware. Your Bluetooth and your Wi-Fi receiver can both be turned off if not in use. Unplug your external mouse or other device. Mute the PC’s sound system. Not only will these steps save power, they will avoid annoying everyone else around you.
3) Don’t multitask. Run as few programs as you can get away with. Stick to one application (word processor, browser, or whatever) if possible. (If online keep your antivirus and firewall on in the background.)
4) Avoid multimedia. Save your photo editing and video watching for when you have AC power. These tasks use immense battery life. To listen to music, use your iPod (or similar device).
5) Sleep, standby or hibernate. Sleep mode (a/k/a “standby” in XP) keeps your PC on. It still uses power, just less than normal. Hibernate uses no power initially, but a lot of battery life to start back up.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on “5 Ways To Keep Your Laptop Running – Without Plugging It In”

“What is your Centerpoint? Meet Blue Angels Pilot, John Foley”

What is your Centerpoint? Meet Blue Angels Pilot, John Foley

Recently while in Dallas at an industry conference for Tigerpaw Software, I had the great pleasure of hearing John Foley speak in person. He is Amazing and the focus that the Blue Angels have is Amazing. When the Blue Angels fly in formation, they start with the planes at 36 inches apart and get the planes as close as 18 inches apart. It must take incredible focus to achieve such precision. John explains that for every show, the Blue Angels have a centerpoint that everyone remains focused on. This centerpoint allows all of the pilots to focus on one thing and achieve unbelievable accuracy. Just imagine what you could do with that kind of focus. What is your centerpoint? What are you going to focus on that will make you achieve unbelievable goals?

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on “What is your Centerpoint? Meet Blue Angels Pilot, John Foley”

“10 Easy Ways To Eliminate E-mail Overload”

10 Easy Ways To Eliminate E-mail Overload

E-mail driving you crazy? Every time you delete one, do five more show up? Are you finding it impossible to answer every e-mail you receive? If this is you, then here are 10 tips to reduce e-mail overload.
1- Get a good spam filter. Even if it saves you just 10 minutes a day, that adds up to over 59 hours a year.
2- Cancel subscriptions to unwanted mailing lists. Also, make sure you are careful to check the “unsubscribe” or “opt-out” box when purchasing items online.
3- Ask your friends to remove you from joke groups or chain messages.
4- Don’t post or publish your e-mail on websites.
5- Don’t respond to every e-mail you receive. Yes, it’s okay NOT to respond to some e-mails.
6- Be succinct. Restrict your messages to a few sentences. If you can’t, pick up the phone or talk in person.
7- Take advantage of subject lines. If possible, put your question in the subject line of your message. Here’s another tip: create a set of codes with your co-workers and place them in the subject line to help them process and prioritize messages. For example, use “FYI” for informational messages. Use “AR” for action required and “URG” for urgent messages.
8- Block time to answer your e-mail and fight the temptation to check your e-mail every few minutes.
9- Respond to messages when you open them so you only read them once.
10- Set time aside in the morning and the evening to process your inbox. Shoot for a completely empty inbox. File messages you need to keep and set reminders for messages that require you to follow up.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on “10 Easy Ways To Eliminate E-mail Overload”

“What every business owner needs to know about tying shoes”

What every business owner needs to know about tying shoes

Please watch the video to get the most out of your day. Steve Miller from The Adventure introduced me to TED a couple of weeks ago. Steve is a great guy with a huge sense of humor. I thought I would share some of the humor with you.

So now that you have watched the video…..Which way do you tie your shoes?

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment