Blog

October 17th, 2012

Computers are great devices, they help managers and employees do their jobs with a level of efficiency that is unattainable without them. Unlike items like paper or pencils which have gone largely unchanged over the past few decades, computers have gotten ever more advanced. When they get older, they will start to slow down causing many owners to want to upgrade. Before you do though you may be able to get your current computer running faster.

Here’s six things you can do to speed up your Windows machine.

Reduce programs that start at startup Any programs added to startup will be opened upon booting up of the computer. Programs that are resource intensive will cause a computer to be sluggish upon startup, and during operation as they will be open in the background. It’s a good idea to keep programs that open at startup to a minimum.

You can check what programs start up when your computer boots by clicking on the Start button and in the search box - the white box just above the start button - type: msconfig. This will open a window that allows you to configure parts of the OS. Click the Startup tab to see what programs open upon startup. Each program has a tick box beside it which you can unselect to stop the program from opening at startup. Unless you know exactly what all the programs on the list do, don’t click Disable all, just disable the programs you know and don’t want to open.

Remove bloatware Bloatware is software that comes installed on the computer, usually with trial licenses, and is non-essential. This software is added by some vendors in an attempt to get a few extra dollars out of customers, and the more of it, the slower the computer will run. You can get rid of it through the Add/Remove or Programs and Features tools in the Control Panel. Again, if you’re not too sure what the program does, don’t uninstall it. Instead, contact your hardware vendor or IT for guidance.

Remove malware Malware is any unwanted program that is of a malicious nature e.g., viruses and spyware. These programs will cause computer performance to drop. It’s important to install anti-virus programs and regularly run scans to find and delete, and keep malicious software off your computer.

Do a memory test A computer’s memory, much like our own, fades over time, and will eventually ‘forget’ things. This is true for both the hard disk and Random Access Memory (RAM) - Both are forms of storage: Hard disks are for long-term storage, RAM is short term. With memory, RAM especially, prolonged use will cause it to be less effective, which means your computer will run programs  more slowly. Sometimes, adding RAM to a slow-running computer will be the ticket to making it run faster.

Upgrade to a solid state Solid State Disks (SSD) are hard disks that don’t have many moving parts. They store data in memory cells that can be accessed faster than traditional hard disk storage methods. Many new laptops have an SSD with Windows installed on it which makes them incredibly fast, often able to boot in under five seconds. Adding an SSD to your machine and using it to store essential programs and data could dramatically increase speed. It does come at a price though and current SSDs are more expensive than their older hard disk counterparts. This is rapidly changing however, and you can probably find a good deal on lower capacity SSDs.

Defrag your system If you don’t have an SSD, you could always defrag your hard disk. A new hard drive will store data in chunks that are located close to each other. As more data is placed on the disk, these chunks will move apart which means the computer has to access data located in different parts of the drive, taking it longer to access and thus slowing down your computer. Running a system defragmentation will push the parts back together for easier access.

You can, and should, run a disk defragmentation at least once a month, just be sure to do so when you won’t need your computer, as it could take a few hours. To schedule or conduct a defrag click on Start followed by Accessories, Systems Tools and Disk Defragmenter.

As computers get older, they will run slower. Luckily on Windows machines, you have options and tools that can help speed it up, or at least keep it at the current speed. If you have any questions about slow computers or would like to speed yours up, please contact us.

Published with permission from TechAdvisory.org. Source.

October 12th, 2012

Security is an Internet issue that has never really gone away. If recent events are any indicator, security has become a hot-button issue, with many websites seeing some form of security related breach in the past year. The vast majority of these breaches target user’s personal information, which could lead to identity theft.

In the first quarter of 2012, nearly 12 million pieces of online identification and personal information were stolen by thieves. This represents a nearly threefold increase over the same time period in 2010. A staggering number for just three months, and it’s forecasted that the number will only increase in the years to come.

With this large amount of information being stolen, the question many are asking is why is this increasing? There are a number of reasons, the biggest being that netizens are signing up for more online accounts. Take a moment to try and count the number of accounts you have online; on average people have 26. Now, think how many passwords you use for these online accounts. An overwhelming majority use five or fewer. If thieves get a hold of one password, chances are nearly 80% that they will be able to gain access to other accounts.

If you are one of the many users who use the same email for a number of different accounts, your chances of having vital private information stolen from an account breach are nearly 100%. If you’ve connected or stored copies of identification or credit cards using an account that gets hacked, there’s no stopping someone from stealing your identity.

A recent study conducted by Experian, a credit-checking company, found that 14% of identity theft victims experience refusal of loans and credit-cards, 9% have debt racked up in their name, 7% are refused phone contracts and 7% are chased by debt collectors. While potentially scary stuff, most theft can luckily be prevented. You should ensure that you use a different password for every online account, that no important information (e.g., credit card, Social Insurance, Passport, etc.) is stored online and you use a password that is hard to guess.

If you have concerns about your online security, please contact us. We may have a solution for you.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 11th, 2012

“Please see attached” three words which have become synonymous with files attached to an email. Often, there is more than one file to send, or files can be large, which takes up bandwidth. Sending these files can be a real pain. To make things easier and quicker, you could compress the files into one neat little package. The question is, what program do you use to do that?

File compression, or zipping, is the process of using a program that takes files or a folder on your computer and combines them into one file, then compresses this into a smaller package. It does this by taking redundant information that is prolific in data, and paring it down to one list that all files in the compression can use. For a brilliant, in-depth explanation on how zipping works, you can checkout this article on HowStuffWorks. As with most computer related programs, choice isn’t limited to a couple of programs, rather there are hundreds. Here are five of the best:

WinZip
WinZip is the most popular compression/decompression program amongst PC users. The latest version of WinZip, WinZip 16.5, allows users to zip and send files via email – using YouSendIt, a program that uploads files to a server and sends a link over email that recipients click on to download the file. The program is easy to use, just open it up, select the files to zip and the program will help you to compress your files. Decompression is as easy as double clicking on the zipped file (.zip). WinZip also allows you to encrypt compressed files. The program has a free trial, but will cost around USD$30.00. Available for Mac and Windows.

WinRar
The second most popular compression program for Windows is WinRar. RAR files are another popular form of compression container used by Windows users for archiving purposes. WinRar offers a higher compression ratio than WinZip which means files will be smaller, while also offering tools that can help repair damaged RAR archives along with strong file encryption. Like WinZip, the tool has a free trial, but then costs around USD$29.00 per user, with the price per user reducing the more users there are. WinRar is available for Windows.

PeaZip
Looking for a free compression program that has an easy to navigate interface and supports a large number of compression formats? PeaZip is a good choice that has all these features. PeaZip also offers some of the strongest encryption features compared to other compression programs, including two-factor authentication. PeaZip is available for Windows and Unix.

Stuffit
Stuffit is the go-to file compression and decompression program for Mac users who want more robust features than those offered by the built-in OS X compression program. This program is similar to other zip programs, it opens, compresses, encrypts and can share your files. It does all this through an incredibly user friendly interface, and costs from USD$29.99. Stuffit is available for Mac and Windows.

7-Zip
If your compression needs go beyond simply compressing the odd file, and your budget doesn’t allow for extra licenses, 7-Zip is the program for you. It’s open-source, which means there is a solid base of experts working on constantly improving the program. As an added benefit, it’s free, while being fairly easy to use. You just have to get over the somewhat dated interface. Then again, retro is in style now isn’t it? 7-Zip is available for Mac, Windows, Linux, Ubuntu, Command Line Interfaces and Windows Phone.

These five programs should cover all your compression needs, while allowing you to send more files, or increase available storage space. If you have any questions about compression programs, please contact us.

Published with permission from TechAdvisory.org. Source.

October 11th, 2012

Imagine walking into your local coffee shop, ordering your usual beverage and instead of fumbling around with cash, or having to dig out your debit card, you can just swipe your phone over the counter to pay. This is actually a possibility that, while limited for the time being, is set to rocket to the mainstream in the next few years.

There’s a new phenomenon that ties your wallet together with your smartphone. This rising trend, commonly known as a digital wallet, is gaining popularity with a number of recently launched systems and being adopted by large companies. Yes, it looks like the days of carrying cash, credit and debit cards around are numbered.

What exactly is a digital wallet?
A digital wallet is the idea of essentially digitizing your credit and debit cards, and placing them on your smartphone, usually in the form of an app, with credit card numbers and information stored in the cloud. You can then use your phone in place of a card when you go to purchase something from a store, usually by swiping the phone over a special sensor then entering your pin.

If you’re a Starbucks fan, you might use their mobile app to load money onto your account and then simply scan your phone to pay for coffee. The digital wallet is a similar idea to this, the only difference being the card scanned is essentially a digital version of your normal bank card, or is linked to your bank account much like a debit card.

The technology behind this is largely based on Near Field Communication (NFC). NFC is a radio based technology that allows users to transmit data between devices when they are placed in close proximity. With digital wallets, either your smartphone, or a device that attaches to your phone, has an NFC chip in it that can talk to a related receiver. Another version of the digital wallet utilizes a dongle you attach to your phone, which allows it to function as a credit card or card reader (if you’re a vendor).

After you swipe your phone, the vendor’s system takes over and interacts with your bank or credit card provider, usually via the Internet, to charge you the appropriate amount.

What are some options available for my business?
While still in its infancy, digital wallets do provide some benefits for small to medium businesses. One provider, Square, uses a small device attached to a tablet or smartphone to process credit card payments. This negates the need for a costly payment system, as it can be easily run on common devices. PayPal has launched a similar device targeted at small business owners in Hong Kong, Australia, Canada and the USA.

With both of these services you sign up for accounts, get a dongle that you attach to your device which allows you to accept credit cards. Customers also get an app that they can link to credit cards and allows them to make payments through their phone without needing their physical cards while at the shop. The main downside to these forms of payments is that each transaction is charged over 2%, which could make them financially unfeasible for small businesses that do a lot of low-value transactions.

A digital wallet that utilizes NFC is Google Wallet. Users can link their cards to the wallet and simply swipe their phone over a Mastercard PayPass, or other compatible terminal. The card is charged, then the customer gets a confirmation and is on their way. Pretty slick. There are a few downsides to this however: only nine Android phones are supported, the service is only available in the US and only two mobile carriers support it.

While NFC based digital wallets appear to be a bit far from the mainstream for now, that will likely change as more phone companies and vendor payment providers adopt NFC. Digital wallets that utilize dongles like Square are set to take off, especially in the FMCG and service industries. Industry heavyweights like Starbucks have already announced they will adopt Square in their outlets to process payments. This definitely puts digital wallets on the fast-track to widespread adoption. If you’re interested in learning more, please contact us.

Published with permission from TechAdvisory.org. Source.

October 9th, 2012

Hold up your hand and count your fingers. Five fingers right? Did you know that’s about the same number of countries that block Facebook? You can access Facebook, in one form or another, in nearly every country. It just goes to show the reach and popularity of this platform rivals those of Coke or McDonalds. Businesses mostly benefit from its great marketing potential, which has recently been made even better due to a new feature.

Custom Audiences is Facebook’s new marketing feature, available through a plug-in called Power Editor for Google Chrome. If your company utilizes the Facebook Advertising API (Application Programming Interface) to manage Facebook related advertising, this feature is also available to you.

What exactly is Custom Audiences? If you conduct any form of email advertising, you likely have a list of email addresses that you send content like newsletters to on a regular basis. If you have this list saved as a single column CSV - Comma-Separated Value: A document that stores tabular data (e.g., Excel files) with no formatting, separated by commas - you can import it into Power Editor. Power Editor will match the email addresses with Facebook users and allow you to create ads to target just those users.

If you have a phone list, you can upload that to use as well. This is a good feature as it allows you to reach out, through Facebook, with ads to clients or customers who aren’t currently your fans or don’t like your page. In other words, your marketing reach through Facebook has just expanded.

Because you do upload your customer’s information to your Facebook account, the information is stored on Facebook’s servers. This move has come under scrutiny from many security experts, to which Facebook has responded that all data uploaded is hashed for security. On top of this, advertisers must have consent from data owners to use their information and agree to remove it when asked.

For now, this feature is only available through third-party vendors or to users of the Power Editor script. Power Editor is an extension for Chrome which helps users to create, edit and manage Facebook ad campaigns.

How to create a Custom Audience If you have Power Editor installed, navigate to it and you’ll notice a new tab labeled Custom Audiences. Click it and a pop-up window will open. In the window you’ll be able to pick a name for your audience and upload the file with the contact information and type of information. Select the relevant information and click Create.

After the upload is complete, you should see the new list on the main window. Select the list and press Create Ad Using Audience. You will create your ad as you normally would, and it will be sent to the list you selected.

If you are looking to expand your marketing platform or reach out to your customers in a new way, this is a good feature to do so. While it is free for now, it’s yet to be seen if it will become a paid feature in the near future. To learn more about how to use Facebook for your marketing, please contact us.

Published with permission from TechAdvisory.org. Source.

October 4th, 2012

Any new technology that is profoundly, or even remotely, popular will always have people who love it and people who hate it. Often, the opinion of experts in the same field is so widely varied that normal users are left wondering who to trust. One such debate that rages, almost daily in some circles, is over the cloud. One well-known tech guru has recently said he’s worried about the cloud.

Mike Daisey is an American monologist who did a show about Apple’s production plant (FOXCONN) in Shenzhen China that turned out to contain false facts. In August he updated his show and even brought on a special guest, Steve Wozniak (Woz), Co-founder of Apple.

On the show, Woz talked about many things, but one of the topics resonated with the tech crowd. The topic was the security of the cloud and ownership of data and files within it. Woz stated, in no uncertain terms, that, “there are going to be a lot of horrible problems in the next five years.”

He went on to explain that the reason he felt the next few years will be tough is due to ownership of information stored in the cloud. He explained, “a lot of people feel, ‘oh, everything is really on my computer’, but I say the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it…I really worry about everything going to the cloud.”

Woz and other critics of the cloud are worried about who really owns your personal information in the cloud, and how much actual control you have over data stored on a cloud provider’s servers - aka. the cloud. The underlying issue around this reservation is the question of what will happen to all of your data if there is a massive breakdown at remote storage locations. Some users had a recent glimpse into this possibility when Amazon’s data center was struck by lightning causing cloud services like Pinterest and Instagram to be unavailable for hours. Despite the fact that the issue was fairly small, groups of people were mad at not being able to access their data.

Users may be reserved in fully trusting cloud solutions and the companies offering them but the cloud is quickly becoming a backbone to many business oriented solutions. Chances are, you are using at least one cloud service right now. Many IT companies believe that the cloud is the way to go and strive to take steps to ensure ownership of stored information is as clear as possible.

What are your thoughts on this issue? Are you worried about cloud solutions or do you embrace them? Let us know.

Published with permission from TechAdvisory.org. Source.

October 4th, 2012

One of the hardest things about operating smaller businesses is often competing with larger businesses that have marketing budgets equal to your yearly profits. Where and how do you compete? One of the best ways is through the use of the Internet, more specifically social media sites like Facebook. A little apprehensive about how good of a service Facebook can be? Some facts and figures might help.

Here are some interesting Facebook facts and figures.

Number of active users: over 1 billion. Number of mobile users: 600 million. That’s right, over half of the users access Facebook from their mobile phones. Number of likes since launch: 1.13 trillion. It’s crazy, thats 1,130 likes per person. Number of connections: Facebook's 1 billion users are connected to 140.3 billion other users. Talk about six degrees of separation! Number of locally tagged posts: 17 billion. The ability to add your location to posts was introduced in August 2010, and this statistic came from September 2012.

These are just a few Facebook facts associated with the recent 1 billionth active user milestone, reached in October. It’s amazing to think that 1/7th of the world’s population are active Facebook users. Imagine what the number would be if it wasn’t blocked in China?

So, what do these numbers mean for you? Well, first of all, it means a huge potential network of clients/friends. If 1 billion users are connected with 140.3 billion other users, that means that the average number of friends a user has is 140.3. Imagine running an ad campaign on any medium, having 140 of your closest friends see it, and share it with their friends. Your brand has the potential to go global and viral in a very short amount of time.

How do you leverage these numbers? Most companies use Facebook Ads, a service which allows you to place ads that users will see and potentially click on. If leveraged correctly, Facebook is one powerful marketing platform, regardless of the size of the company. If your company doesn’t have a presence on Facebook, you’re missing out on the potential it can bring. Call us. We can help you establish a presence.

Published with permission from TechAdvisory.org. Source.

October 3rd, 2012

It can be moderately annoying to have to click to open programs that you use on a daily basis. It can take time and lead to you being less efficient, especially when it’s a program like Microsoft Outlook. One way to work around this is to set your computer to open this program when you turn it on, so that you time to go get a coffee and sit down ready to start your day.

Here’s how you can get an Office program to automatically open upon startup of your computer.

On Windows

  1. Start your computer normally and when you're at the desktop, click the Start button, or Windows orb, which is usually located in the bottom left of your desktop.
  2. Point to All Programs followed by Microsoft Office.
  3. In the drop-down menu, hover your mouse over the program you want to open when your computer starts up, press and hold Control and click and drag it into the Startup file.
If you follow this, a shortcut of the program will be made and placed into the startup folder. If you don’t press and hold Control, the program will be moved into the Startup folder, and you will have to navigate to Startup every time you want to open the Office program.

On Mac

  1. Open System Preferences and select Accounts.
  2. Select the account you log in with followed by Login Items.
  3. Press the plus button under the list of programs and select the Applications folder.
  4. Scroll down to the Microsoft Office program you would like to open at startup, click on it and press Add. If you can’t find it, type the name of the Office program into the field with the magnifying glass.
When you next start up your computer, the program(s) you have chosen should open as soon as the computer boots up. It’s important to remember that any programs you add to the startup process will cause the computer to boot up more slowly. If you’d like to learn more tips on using Office in your business or workplace, please contact us.
Published with permission from TechAdvisory.org. Source.

September 28th, 2012

Imagine this: it’s almost Friday, you’re scheduled to go out of town for the next two weeks on your first vacation in over three years. You wake up Friday morning with a sore throat, by Friday afternoon you are a mess. Viruses aren’t fun, they essentially render you useless, so you can imagine that’s why a devastating impact on your computer is called a virus too.The problem is, these virus terms have created some confusion over what exactly they are.

Here’s an overview of the most commonly used terms for malicious software.

Malware - Malware is a portmanteau of malicious and software. When we, or any other IT professional, talks about malware, we are generally speaking about any software that is designed to steal information, disrupt operations or gain access to a computer or network. In tech, and indeed many news articles, malware is used as a general term. It can also be referred to in legal circles as a ‘computer contaminant’.

Virus - A virus is a malicious code that is spread from one computer to another. Computer viruses are usually introduced to a system by a user downloading and opening an infected file. They can also be spread by any removable media including CDs, DVDs, USB drives, SD cards, etc. If an infected file is put onto say a USB drive, which is then plugged into a new computer and the infected file is opened, the virus will be introduced into the system. For malicious software to be labeled as a virus, it has to be spread through human action, usually in the form of the user unknowingly opening an infected file.

Trojan horse - A Trojan horse takes its name from the Greek story where a wooden horse was used to hide Greek soldiers who secretly entered Troy. In a similar way this computer virus is a program that is disguised as a useful program that when installed will do damage to your system. The severity of a Trojan horse varies from annoying to completely destructive, and while they are malicious, they will not replicate or transfer to other computers. Many modern Trojan horse programs also contain a backdoor (more on that below).

Worm - Worms are similar to a virus. In fact, many experts consider a worm to be a subclass of virus. Worms, like viruses, spread from computer to computer; the major difference being that worms can spread themselves. Computer worms also have the ability to replicate on a host system and send these copies to other users. The most common way of transmission is through email, or via a company's network, often causing computers to run slowly while using a ton of bandwidth, ultimately leading to a system crash.

Spyware - Spyware is a malware program that captures user activity and information without the user’s knowledge or consent. Some can even go so far as to capture every single keystroke a user makes - this is commonly known as a keylogger. Spyware infects computers either through user deception (i.e., “You’ve won 1,000,000,000 dollars” ads) or through exploits in programs. Some spyware has been known to redirect users to websites or even change computer settings.

Adware - The main purpose of adware is to show ads and gain the hacker ad revenue. These ads can be pop-ups, extra banners added to web browsers, or ads shown during the installation of third party software. While generally not a form of malicious software on its own, it can, and often does, come with spyware.

Rootkit - Rootkits are all about stealth. When installed they hide themselves from detection while allowing an unauthorized user to access and control your computer. Nine times out of ten, the unauthorized user will have full administrative access, which means that if they were malicious enough, they could really do some damage.

Backdoor - Backdoors are similar to Rootkits, in that they allow an unauthorized user to access your computer. Many Trojan horses install a backdoor for the hacker to access and remotely control your system.

Bug - Some users think that a bug in software is a form of malware, placed there by the developer to ruin the program or a system. In fact, bugs aren’t malware, they are an error or fault in the software’s code. It’s true that hackers have exploited bugs to infect systems, but the bug was the way in, not the malicious software itself.

In the early days of the Internet, viruses were often installed separately from Trojans and worms. With the rising complexity and effectiveness of malware prevention software, hackers have started to blend their attacks together, often using a combination of one or more types of malicious software to infect systems. These combination malware infections are normally complex, but have been incredibly effective.

While malware is usually malicious towards single users, a new form of warfare that utilizes malware has arisen. Cyberwarfare is rumored to have been used by governments and companies to steal information or completely disrupt a countries information networks. While most Cyberwarfare is conducted at the country or conglomerate organization level, it is only a matter of time before small to medium companies are targeted.

Tools like Microsoft’s Enhanced Mitigation Experience Toolkit (EMET), which is meant to fix bugs in Internet explorer, as well as strong anti-virus measures, timely virus scans and an efficient Internet use policy will go a long way toward preventing malware from infecting your computers. If you’re worried about the security of your computers and network, please give us a shout, we may have a solution for you.

Published with permission from TechAdvisory.org. Source.

Topic Security
September 27th, 2012

As children, many kids had the wonderful chore of washing mom and dad’s car in the summer. If your parents had a white car, you know that it was near impossible for it to look clean. White is a bad color for dirt, something many computer manufacturers don’t seem clued up on. The plus side to this is that it’s often obvious when it’s time to clean your computer, if you don’t do so on a regular basis already.

Here’s the main external parts of your computer you should clean on a regular basis and how to go about doing so. We recommend that you exercise caution when opening the case to your computer and not to just go in and clean willy-nilly. Some internal components are incredibly fragile and you could render your computer useless.

Keyboard Most people naturally rest one hand on the keyboard, this near constant contact means oil and dirt from your fingers will be transferred to the keys, causing a buildup of grime overtime. You may also find other nasties like crumbs get under the keys and can potentially hinder the operation of the keys.

The best way to clean a keyboard is by using compressed air, which can be found at any store that sells computers or computer parts. When cleaning, hold your keyboard upside down and blow the air into the spaces inbetween the keys. Sir Isaac Newton’s good friend gravity will take care of the rest.

If you have grime on the keys, you can use a number of methods to remove it. The most popular is to use distilled, denatured isopropyl alcohol - commonly called electronics cleaner - and a lint-free cloth. Dip the cloth in the alcohol and gently rub it over the keys, you’ll be amazed at how much gunk will come off. For spaces in between the keys, use a cotton swab/Q-tip.

Before you attempt to clean the keyboard, be sure to unplug it from your computer. If you use a laptop, turn it off and disconnect the power cord. Whatever you do, don’t spray or splash liquid on the keyboard this will likely cause it to stop working. You should take care not to use bleach, acetone, ethyl alcohol, acid or pure water. While these liquids will clean the keyboard, some tend to eat through plastic, or just straight up ruin anything electrical; best to avoid them.

Mouse Once your keyboard is spic-and-span, it’s time to look at your mouse. As with the keyboard, unplug it before you clean it. For mice with trackballs, flip them over and undo the cover that keeps the ball in place - usually achieved by turning the cover clockwise - take the ball out and gently scrape any lint or gunk off the rollers on the side of the area where the ball is housed.

For optical mice, using a Q-tip/cotton swab dipped in isopropyl alcohol to gently wipe down the mouse will work wonders.

Monitor Monitors, regardless of style, are dust and fingerprint magnets. To clean your monitor: turn it off unplug it, and run a lint-free cloth over the glass in a circular motion. If it’s really dirty, glass cleaner can be used. However, be warned that industrial glass cleaner will remove the anti-glare coating on the monitor, so look for a glass cleaner that’s safe to use on monitors instead - it should say so on the bottle.

Connector cables Cables are often the most neglected part of a computer, normally because they are black and it’s near impossible to see the dirt. Any Mac user who has had a laptop for a number of years can attest that the once white charging cord isn’t as white as it was when brand new. To clean any cable, first disconnect it from the power source. Use a cloth or Q-tip/cotton swab dampened in your, by now, good cleaning friend, denatured isopropyl alcohol, to clean the cable.

If the connector ports of the cable are dirty, don’t go dipping them in any liquid, this will likely ruin them. Instead, look for isopropyl rubbing pads, which have been dipped in a 99% isopropyl alcohol solution. If the isopropyl alcohol you have used for cleaning the other components is 99%, you can also use a cotton swab dipped in this solution. Just be careful not to apply any force and ensure the connector dries quickly.

Inside the case If you have a desktop, with a tower, chances are there’s a fair amount of dust inside the computer. This dust can slow components down, decrease the computers cooling ability and has, if left unabated, been known to be the cause of electrical fires.

Companies that have rented their computers from a vendor, or have machines still on warranty should not open the case, as they will void the warranty. If you feel the internal components need to be cleaned, contact your vendor and ask if they can come and clean your systems.

If you’re more of a do-it-yourself person, you can open the case to clean inside. Be sure to unplug ALL cords and when you lift the case off keep your hand on the metal frame. Be careful to touch NO COMPONENTS as a static shock could ruin them. Touching the metal part of the case should ground you. After that, you can use compressed air to blow the dust out of the case. You may want to do this away from the area where your computer is, as there can be a lot of dust.

After you have your computer case back on, plug in everything and start your showroom clean computer up. You may even notice it runs faster, or at the very least looks good. If you feel it’s time for a computer clean-up and have any questions then please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Hardware