Showing posts with label computer tech support. Show all posts
Showing posts with label computer tech support. Show all posts

Thursday, February 10, 2011

Way To Get Great Technical Support

Follow the mentioned Tips to fix your problems faster :-

No one likes talking to tech support. Use our tips to help get your problem fixed - and maybe receive a little something extra, as well.

Like us, you probably find your PC, internet connection and mobile phone invaluable. They may save you tremendous amounts of time, but it's easy to forget that when you're spending hours on the line with tech support.
Here's how you can streamline the tech support process and make sure you get the fixes you need.

Computer Crashes


The scenario
Your PC is having issues. Maybe it's randomly crashing or devouring your data. Maybe it just won't start up.

Depending on your level of expertise, calling tech support could be either a really good way to fix a problem you would have never solved yourself, or a really good way to waste your afternoon.

Research and test
If you can, start by figuring out for yourself exactly what isn't working.

The more details you can put together about what part of your computer isn't working, the better - especially if you have a smartphone or an extra computer handy that you can use to plug those details into Google.

Chances are, any problem you have with a piece of technology is one that someone else has had as well, and if you're lucky, they've posted extensively about it on a forum or company's support site. Also, don't forget to keep your stress level low while you're troubleshooting.

You should also perform a few basic tests yourself: reboot into Safe Mode (press F8 while your PC starts up) and see if the problems persist, and try booting from a recovery disc and run Windows' included diagnostic tools to check the state of your hard drives, RAM and system install.

Also, make sure that all connected devices are firmly seated in their ports; if you've been fiddling with the insides of your PC you'll want to make sure a RAM chip or video card hasn't come unseated.

Ideally, you'll be able to figure out which component of your PC is acting up; this would make the call process much easier because the phone tech won't be able to refer you to another company because it's a problem with that third party's product, not with theirs.

Generally speaking, if you weren't able to fix the problem with Windows' built-in diagnostic tools, the first-level techs aren't going to be able to fix it by asking you to reboot or reinstall Windows, and you're probably calling tech support because your problem is so bad that you need someone to authorize a warranty replacement part.

courtsey-pcadvisor

Wednesday, February 9, 2011

McAfee Warns - "Malware Is on the Move"

Mobile operating systems are the new favorite target of malware, and social engineering remains the favorite old standby for launching attacks. Tried-and-true preventive care works best.
"Never give information via email, smartphone or on the Web, and verify independently before you click on any unknown text or email message, game, application or security update,"
advises UVa security expert Karen McDowell.

Cybercriminals are following innocent consumers away from email Increase sales with VerticalResponse. Free trial. and toward more popular, smartphone-style platforms, McAfee reported Tuesday.
"New mobile malware in 2010 increased by 46 percent compared with 2009," noted McAfee spokesperson Joris Evers.

Among the likeliest targets in 2010, Symbian and Android platforms were splattered by Trojans and bots with names like "SymbOS/Zitmo.A" and "Android/Geinimi."

"Consumers need to realize that mobiles, whether smartphone or tablet, are mini computers," said David Gorodyansky, CEO of AnchorFree. "This means all the vulnerabilities of a computer exist, often with a less-protected OS."

"From a hacker's point of view, the large user base created by wide scale adoption of iOS (iPhone) and Android will increasingly make these platforms a target, and I definitely expect to see some high-profile mobile attacks in the coming year,"
Cenzic CMO Mandeep Khera told TechNewsWorld.

"Smartphone access should be a concern to corporations that don't want employees accessing company secrets via unsecured mobile networks," Khera told TechNewsWorld. "For consumers, as banks and e-commerce sites deploy apps that give customers unprecedented access to their bank accounts, security Enterprise Payment Security 2.0 Whitepaper from CyberSource becomes more important than ever."

Unlike their mobile partners in crime, spam bots -- including Bredolab, Lethic, Xarvester, and parts of the Zeus botnet -- have gone dormant in droves this year,.

"Concurrently, spam accounted for 80 percent of total email traffic in Q4 2010, the lowest point since the first quarter of 2007," McAfee's Evers told TechNewsWorld.

The Bot Pack


Like a flu pandemic, botnet infections were particularly acute in Q4 2010, with Rustock, Cutwail and Bobax leading the bot pack. Social media sites, like mosquitoes, often acted as disease vectors.

"Whether we are using smartphones or computers, social engineering attacks are still the primary attack vector, and a major vector in the spread of botnet infections,"
University of Virginia information security analyst Karen McDowell, PhD, GCIH, told TechNewsWorld.

McAfee advises tablet and smartphone users to watch out for Zeus-Murofet, Conficker, and Koobface botnets specifically, and more generally, phishing URLs from the IRS, gift cards, rewards accounts, and social networking accounts.

Phishing vectors spread bot diseases when users click on phishing emails, answer phishing phone calls, or click on text messages that "appear to come from your carrier," McDowell explained, adding that tried-and-true preventive care works best. "Never give information via email, smartphone or on the Web, and verify independently before you click on any unknown text or email message, game, application or security update."

More preventive options: "Don't log onto unprotected WiFi, and use a VPN to encrypt and secure your browsing, which acts as a secure, encrypted tunnel for your communications," AnchorFree's Gorodyansky told TechNewsWorld.

Malware's Mantra


Twenty million new pieces of malware -- nearly 55,000 new malware threats every day -- plastered the cybersphere in 2010, migrating toward smartphones because "cybercriminals are keeping tabs on what's popular and what will have the biggest impact from the smallest effort," said Vincent Weafer, senior vice president of McAfee Labs.

"Think globally, act locally" might be malware's new mantra, with threats that "now tend to match the types of users, habits and events that are specific to a region," McAfee's Evers added. Global criminal favorites include AutoRun malware such as Generic!atr; banking Trojans and downloaders such as PWS or Generic.dx; and Web-based exploits such as StartPage and Exploit-MS04-028, the McAfee report claims.

To avoid malware, treat search terms and Adobe (Nasdaq: ADBE) products with extra care, McAfee advises. Of the top 100 search results, 51 percent led to malicious sites. And throughout 2010, malware developers exploited weaknesses in Flash and PDF, a trend McAfee sees continuing.

Despite the advice, pests will persist, driven to infect by "a general lack of awareness towards the need for security," Gorodyansky explained.

"This is the same as it was for computers, when most people thought they were completely safe once they installed an antivirus program," he recalled.

"It really doesn't matter what type of device is used -- the steps to secure a Web application haven't changed," Sam Shelby, e-government coordinator for the City of Columbia, Missouri, told TechNewsWorld. "You can never trust input: always authenticate, validate and sanitize input data."

courtsey-technewsworld

Friday, February 4, 2011

Troubleshoot Windows, Tweak Office & Add USB Ports

Here we'll discuss some questions about troubleshooting of Windows programs, making Office 2007 and 2010 look more like earlier versions of the suite, and the proper use of USB hubs.

Use a Spare User Account to Troubleshoot Windows Problems

Recently a couple readers wrote to me with very similar problems. One was having trouble getting Internet Explorer to run; the other, Windows Explorer.

In other words, a couple of Windows' own built-in tools were broken. (Note to Microsoft: That should not happen. Come on!)

Usually, for situations like these, I recommend an end-run around the problem. Internet Explorer won't work? Install Firefox or Chrome and use that instead. Can't load Windows Explorer? Switch to any number of even better Windows Explorer replacements.

Of course, that doesn't really solve the problem. If you're hoping to fix your broken tool, you'll need to do a little troubleshooting. To start, I recommend switching to (or creating) another user account, then seeing if Explorer runs properly. If it does, you've narrowed down the problem significantly (and should consider "moving" to a new user account permanently). If not, well, back to square one.

Either way, it's a simple method of figuring out how deeply rooted into Windows the problem is. And that will help considerably as you Google-search for an actual fix (assuming there is one--sometimes these things can be resolved only by reinstalling Windows).Make the Office 2007/2010 Toolbars More Familiar

Make the Office 2007/2010 Toolbars More Familiar

One of the reader recently found himself face-to-face with Word 2007 for the first time, and quickly declared the "top task bar too complicated for my novice use." He's referring to what Microsoft calls "the Ribbon," and he wants to know if there's a way to simplify it.

No doubt about it, the Ribbon (which appears in most Office 2007 and all Office 2010 programs) can seem daunting to anyone accustomed to earlier versions of Word, Excel, and the like. If that's you, check out UBitMenu. This free plug-in brings pull-down menus back to Office 2007 and 2010, thus easing your transition. Thankfully, it keeps the Ribbon, too, so you can learn the new interface without totally abandoning the old one.

After installing UBitMenu, you'll see a new tab next to Home: the aptly named Menu. Click it and you'll find File, Edit, View, Insert, Format, and all the rest of those long-lost drop-downs. Even better, UBitMenu retains most of Office's newer features, like the more robust Save As submenu. You get the best of both worlds. The program is free for private, personal use. I can't recommend it highly enough.

Add More USB Ports to Your PC

Another reader wants to know how many USB "splitters" he can use with his desktop. The system has four USB ports in the back and two in the front; Jay says he's already using one splitter, but needs two additional USB ports.

Holy mackerel, Jay, how many devices do you have? (I'm a power user myself, and only four of my desktop's six ports are occupied.)

To answer your question, yes, it's safe to add another splitter (which, although an apt description, is traditionally known as a USB hub). In fact, a PC is theoretically capable of accommodating up to 127 USB ports. However, the reality is a bit different.

By "splitting" a USB port, you reduce the power available to the newly added ports. Whether or not that's a problem depends on the kinds of devices you plug in, but I strongly recommend using only powered USB hubs. They cost a little more, and force you to find yet another free AC outlet, but they virtually eliminate the issues that tend to arise with non-powered hubs.

I also recommend plugging each hub directly into one of your PC's built-in USB ports. In other words, don't daisy-chain them. And if you use an external hard drive, plug that into a built-in (i.e. non-hub) port as well. When it comes to your data, it's not wise to risk any kind of power fluctuation.