Pc Networks

What to Do When Your USB Ports Aren’t Working

By Marco Horn /  Jeremy Laukkonen

When your USB ports suddenly stops working, the problem can always be tracked down to either a hardware or software failure. Some of these problems are the same across both Windows and Mac, while others are unique to just one or the other.

Read more

Cleaning printer

How to Clean a Printer and Scanner

By Marco Horn /  Jordan Baranowski

One of the best ways to keep printers and scanners working at optimal levels for longer is by giving them regular cleanings. If you notice streaky, blurry, smudged, or otherwise distorted images when printing documents or scanning images, here’s how to clean a printer or scanner yourself before opening up your wallet for a costly fix or replacement.

Read more

Important Questions to Ask a Computer Repair Service

By Marco Horn /  Tim Fisher

Before you drop your computer off at a local computer repair service or call them for in-home or in business service, there are several very important questions you should ask.


How Much Do You Charge per Hour?

Asking the cost of a service seems like a question you’d be unlikely to forget but I am always amazed by stories of customers in absolute shock at the hourly rate for a particular computer repair service — after the fact.

Rates vary, and so do charging schemes (some computer repair services are billed per service, don’t wait until it’s time to pay the bill to find out how much per hour you’ll be paying.

Read more

3 critical steps to secure online banking

By Emile Greyling /  Gabriella DiDio

 

People often joke about having "bankers' hours," but really, aside from bankers, who works a standard 9-to-5 anymore? With the hours most of us work, it seems we can never make it into a branch in time, or we discover a banking need on a Sunday and are out of luck.

Now, thanks to online banking, we are able to have more flexibility over transactions. Online banking makes viewing your transactions, paying your bills and managing your finances a breeze.

 

But it's important not to get too comfortable with how easy it is, to the point that you're risking your security. There is no security guard standing watch over your online transactions. Online banking could expose you to hackers and malware that are looking for windows of opportunity to seize your sensitive information. So you need to be your own security guard!

You can use these three tips to protect your accounts…

 

 

Read more

3 ways to free up space on your smartphone

By Emile Greyling /  Kevin Downey

 

How did we live without our smartphones? 

Well, your everyday life wouldn't be nearly as nice without it. You're constantly taking photos and videos that you share with friends and family around the world on social media sites like Facebook and Whatsapp

You make phone calls,  You send thousands of text messages every year and, of course, there's so much more, like getting driving directions, finding out what time a store closes and checking your bank balance.

So, it's understandable that you cringe when you see a message pop up on your smartphone. The worst one is telling you that your battery is low, and you just arrived at a business meeting where you'll need it all day!

Yet, there's a close No. 2 when it comes to dreaded smartphone messages. That's "Your storage space is almost full."

Let's face it, you've deleted just about everything you can't live without, including photos and apps. Yet, you need more space, so you recklessly start deleting the big storage munchers, like Facebook, your bank account app, photos and videos.

 

Here are some of the best things to delete when you need space, and how to do it.

1. Delete apps

The way you delete an app is different depending on whether you're using an Android smartphone or iPhone, and which model you're using. However, the steps will most likely be similar to these.

 

 

Read more

Need faster internet? What are your options?

Choosing an Internet Connection South Africa

What are your options?

In our corner of the world we have 3 main varieties of internet that are commonly used at homes or in a businesses. There are more but should only be considered if none of the options bellow are available to you.

Those options are.

  1. Fibre (The fastest and most stable but not widely available yet)
  2. Fixed Broadband wireless (The competitor its fast and flexible and more readily available)
  3. ADSL/VDSL (Not that fast by today’s standard but still valuable if you’re out of coverage)

Read more

Chrome Remote Desktop

How to access your computer from anywhere using Chrome Remote Desktop

How to access your computer from anywhere using Chrome Remote Desktop 

Chrome Remote DesktopLooking for a quick and easy way to access your Windows, Mac or Linux machine from an Apple device, an Android device or even from another Windows, Mac or Linux machine?

 

If so, then there is one solution that works really, really well: Chrome Remote Desktop.

 

In order to use it, all you need is Google Chrome installed on your device.

 

After setting everything up, which we will explain below, you can access any of your computers from your device. This means you can remotely control your Windows machine from my iPhone, Nexus 6 and Mac laptop without having to worry about port forwarding, dynamic DNS, different operating systems or anything else.

 

The great advantage about using Google Chrome is that it takes about 5 minutes to setup and even  less than that if you already have Chrome installed on your devices.

 

Install Chrome Remote Desktop

 

The first thing we need to do is install Google Chrome itself on your computers. Since Chrome can be installed on Windows, Mac or Linux, it means you can remotely access any of those systems too.

 

Chrome Remote Desktop

 

Once you have Chrome installed, you need to install the free Chrome Remote Desktop add-on. Click the Add To Chrome button at the very top right. A popup will appear with the permissions the app needs in order to work properly. Click Add App to continue if you’re OK with the permissions.

 

At this point, the app should be installed and a new tab should appear where you can see all the apps that have been installed in Chrome. If this tab doesn’t appear, just open a new tab and type in chrome://apps/ in the top address-bar.

 

 

Read more

3 ways to keep sensitive files encrypted on a flash drive or external hard drive

3 ways to keep sensitive files encrypted on a flash drive or external hard drive

By Jeandre de Beer  /  Pc World

screen-encrypt_2868

Flash drives are easy to lose. And anything lost can fall into the wrong hands.

So if you’re carrying around sensitive information in your pocket, you need to make sure those files are encrypted. 

 

Buy an encrypted drive

 

You can buy a flash drive with built-in encryption, such as the DataTraveler Locker+ G3. When you plug the Locker+ in, it comes up as a 13MB, read-only drive.

 

But once you launch the program file on that drive and enter the password that you previously setup, another drive opens up with all the storage space you paid for. That drive, of course, is inaccessible without the password.

The software runs off the drive, and it can be used on multiple computers and operating systems.

 

But I strongly recommend against using this drive’s optional cloud backup feature. It uses Dropbox, OneDrive, or whichever cloud service you pick, which at first glance seems like a nice convenience.

But this feature uploads the files without its own encryption. That means you’re trusting your sensitive files to the encryption capabilities of Dropbox and similar services, and they aren’t all that secure. Find another way to backup these files—preferably one where you can can control the encryption.

 

Install specialized software on your drive

 

Read more

Bloatware: How, Why and Goodbye

Bloatware: How, Why and Goodbye

By Jeandre de Beer / Pc World

BLOATWARE, CRAPWARE: No matter what you call it, the junk  that PC makers dump onto new PCs is nothing short of a mess.

The situation was in the spotlight recently when it was revealed that several Lenovo PCs were preloaded with “Superfish” that actively left users vulnerable to attack.

The software compromised secure HTTPS web connections in a quest to inject ads on the sites you visit… and make Lenovo a few nickels. There’s no doubt about it: Even though the root vulnerability came from Superfish, Lenovo messed up. Hard.

This shouldn’t have happened, period. But Lenovo didn’t toss its users to the wolves out of malice—instead, the Superfish debacle is a natural extension of the entire bloatware epidemic.

Why does Bloatware exist?

 

Bloatware exists because we all like cheap or free software, and rightfully so. Money’s tight, and even the cheapest PCs are a major, multi-hundred dollar investment.

But good news! Prices are plummeting in the wake of dirt-cheap Chromebooks and Microsoft’s resulting counter-attack.

While that sounds good on paper, deep down it’s actually troubling news for the PC industry. Mainstream personal computers are a cutthroat business; prices have been racing to the bottom for years now.

PC vendors make little to no money on such slim margins, which is a core part of the reason HP is splitting off its PC division (again) , Dell took itself private, and Sony and Samsung have bowed out of the PC industry to varying degrees.

 

There’s simply no real money to be made on dirt-cheap hardware. Enter bloatware.

 

PC makers don’t really believe that short-lived antivirus trialware is the best security solution for you, or that adding browser toolbars will make your life easier, or that a “visual discovery tool” like Superfish truly adds to the user experience.

The developers of bloatware pay hardware makers cold, hard cash to pump your PC full of this crap and get in front of your eyeballs.

That extra revenue often makes all the difference for vendors between taking a bath on competitively priced PCs, or eking out a small profit. (There’s a reason pricier premium laptops often contain far less bloatware than budget PCs.)


It’s a symbiotic relationship for bloatware developers, PC makers, and everyday users. Bloatware effectively subsidizes PC prices. If it didn’t, you’d pay more—perhaps much more—for your computer.

 

How to beat Bloatware

 

 

Read more

Part 2 : Top 10 fixes for common PC Problems

Part 2 : Top 10 fixes for common PC Problems

By Jeandre de Beer / Pc World

 

This is part 2 of our blog regarding the top 10 fixes for common pc problems.

In the first blog we discussed the following fixes : Attack of the BlueScreen of Death,  Recover deleted files,  Back up your data files,  Protect your privacy while browsing and  Speed up a slow PC without buying new hardware.

In this blog we will discuss : One antivirus program is better than two,  Securely wipe sensitive files—or your entire hard drive,  A slow Internet connection when you’re paying for a fast one,  Archive files so they’ll stay around for years and You do need to share your passwords.

1. One antivirus program is better than two

 

PROBLEM:  Running two antivirus programs is a bit like mixing a fine, vintage Cabernet with breakfast cereal. Each is good in its own right, but the combination may have unpleasant side effects

 

 

 

 

 

 

 

 

 

 

FIX:    Before I explain why, let’s get some definitions out of the way. The term antivirus has come to mean a program that launches when you boot your PC and stays running in memory, protecting you in real time not just from viruses, but trojans, rootkits, and all other forms of malware.

Two antivirus programs, loaded and running simultaneously, will be, at the very least, redundant. And in this case, you don’t want redundancy. Keep in mind that every program running uses RAM and clock cycles, potentially slowing down every other running program.

A well-made antivirus program has a very small footprint, and doesn’t slow things down significantly. But two such programs running together will slow it down twice as much.

And it could be worse. The two programs may conflict with each other—remember that every time you download a file, both will try to scan it. Conflicts could result in other programs failing to work and Windows becoming less stable.

If you’re worried that one antivirus program isn’t enough, you can augment it with an on-demand malware scanner. Unlike antivirus programs, they don’t hang around. You load one, update its database, scan your hard drive with it, and close it when you’re done.

I use two of these programs—the free versions of SuperAntiSpyware and Malwarebytes Anti-Malware. Once a week, I scan my hard drive with one or the other.

 

2. Securely wipe sensitive files—or your entire hard drive

Read more