Nobody Does IT Better, Period!

By

Safe Browsing

Opening your computer, connecting to the internet, and opening a browser also opens your computer to an entire world of dangerous sites and downloads. Being knowledgeable on how to prevent these computer infections can save both, your computer and your private information.

Let’s say you are doing research, and come across a site you’ve never heard of before. An advertisement appears, and you try to close it using the ‘X’ at the top of the ad. It’s too late, but you’ve noticed the X is drawn onto the advertisement, so clicking the X is just like clicking the ad. You are sent to a boring page you try to exit, but it starts an installation on your computer without your acknowledgment. You are now at risk with spyware and having your personal information taken by complete strangers. That doesn’t sound very exciting, and you may be regretting even doing research in the first place. However, there are multiple other ways this same outcome can happen. Simply by opening a Webpage or HTML email can do the notorious trick.

A few ways to protect yourself from possible spyware, or malware, you could download anti-spyware software or antivirus protection with a firewall. Making sure that you are visiting only sites you know are safe is also critical in safe browsing. Stay away from unknown adult sites, file sharing services, and social media websites (Facebook, Twitter, and other well-known social media are O.K. to continue using).

Updating your browser and operating system, when needed, plays another huge part in safe browsing. Updates sometimes help to patch bugs or work-arounds for viruses. Always having the newest version available means that more has been fixed and there are (typically) less problems.

Preventing any form of harmful content from your computer will help to make sure your personal information is kept personal, your data is secure, and you are also preventing your computer from obtaining malware which can damage or seriously slow your machine.

We, Computers on the Run, can help you to make sure your computer is kept safe and has the right tools to prevent any future complications.

Contact us at: (308) 381-0561
3415 W State St, Grand Island, NE 68803

http://www.corcomputers.com/

 

By

Office Lens

Have you ever hooked up a scanner and tried copying papers, receipts, checks, or any other information you’d like to store on your phone? Then you know the hassle of not being able to carry around a big scanning machine all day. Introducing Office Lens; available on iPhone and Android.

Office Lens allows mobile users to take a paper, or any file/document, and align a visible square around detected edges. These edges allow the app to detect the paper (or other files) and create a full scanned image, which can be exported to the phone’s gallery, to OneNote, OneDrive, Word, PowerPoint, as a PDF, or send through email.

Of course, you may be wondering how this works, and that it probably has detection problems of some sort.. right? Yes. Office Lens looks for changes in color which create lines around the “detected” file you’re trying to scan. Although this works very efficiently and effectively, there are points in time where.. what if your desk is white, and the paper is white? They’ve added manual cropping for this exact reason.

If you are having troubles trying to scan a region because the app isn’t detecting your paper, or it’s including extra areas, you can manually crop your own selection. SImply take a photo of the paper, and then press the crop button on the top-right hand side. This will add a square onto the screen with 4 bubbles on each corner of the square. Drag these bubbles until you’ve outlined the file, page, document, etc. and it’ll create an up-close and scanned file for you to save!

This program is very unique in the fact that you don’t have to scan an image that’s directly in front of you. You can take a photo of a billboard from an angle, and it will take a photo like you were up-close and standing right up in front of the board. As a mobile scanner, it’s simple to use and friendly to everyone.

By

4G+, Road to 5G

In a world full of smartphones, it’s essential to have fast connection speeds, a low costing charge per month for said connection, and a large abundant of data chunks at once. However, 3G and 4G connections are just the beginning of increasing everything mentioned above.

I’m sure we’re all familiar with 3G and 4G connections. If you aren’t, it’s basically like having internet service on your phone at all times, no matter where you are (with connection, that is). This allows you to browse the internet anywhere you go, or do other things like using Facebook and email. Just like having limited texts or limited calling, these data streams have limits. Some plans include 8GB per month, and will charge extra if you go over that 8GB data limit. Data is used by using the 3G/4G internet connection, so it’s very easy to go over the limit.

What if there was a new service that could give you more browsing speed, more data, and allow users a higher data limit? Well.. there is.. and it’s directly around the corner. 4G+ will include nearly DOUBLE 4G’s speed and ensure less latency (or buffers) and enables more data chunking, which gives programs and games much more to work with, like having a GPS on your smartphone that reroutes almost instantly when a turn is missed or taking a different path to reach the destination. This is only one step to 5G, and it already sounds great.

By

Stream Processing

As larger software and services require more data, like from navigation or movie/music streaming, it is essential that the user receive that data quickly without buffer. Stream processing is here to do exactly that; to allow huge chunks of data to be received with no effort at all.

If you’ve ever listened to music from streaming sites, such as Pandora, or watched YouTube videos, or even ran navigation to find your way around town, then you know just what buffer is. Buffering happens when data isn’t being received, or when the data is too large to receive all at once. This makes music or videos stop loading before it receives the next set of data. It can also occur when a connection is weak, or too far away from the device receiving said data.

Stream processing, which is to become a huge boost in internet speeds and software updates, like receiving a comment on Facebook directly as someone is to send it, or having your navigational device give new routes consistently without delay or giving live results on upcoming traffic. This can also be great for online traffic — decreasing chances of “flood,” where too many users are on a connection at once. Since there is less total data to send, from data crunching, this means twice the people can be connected, and even if on a 4G network with data-limits, can reduce how much data is being used, therefore reducing your bill.

By

Windows 10 Icon

Before Windows 10 officially releases this July 29th, Microsoft wants to make sure that all Windows users who reserve their free Windows 10 version before the 29th be able to download Windows 10 for absolutely no charge. There is not (yet) a specific date for the last day to get your free copy of Windows 10, but if you are awaiting the update, it’d be best to spend a few seconds reserving your free copy to be safe. To reserve a free copy of the upcoming update, an icon on Windows computers displays.

The Windows 10 icon sits on the bottom-right of the taskbar, and even after reserving a copy does this icon stay put. This image is only there to be sure you know that Windows 10 will be released soon as to assure everyone knows, and for those who don’t know: to get a free copy.

Although there are many “solutions” to changing the visibility of this icon, it will likely be removed on it’s own in less than 2 months. If you are just seeing the image for the first time and want your free Windows 10 upgrade when it is released, it is highly suggested to click the icon and follow the short steps. If you aren’t interested, I would convey ignoring the icon.

If you have any further questions on the Windows 10 Icon, you can contact us at:
(308) 381-0561
3415 W State St, Grand Island, NE 68803

http://www.corcomputers.com/

By

Password Security

Passwords can sometimes be hard to remember, especially when you have multiple different passwords, so writing them down and storing them in your household sounds like a safe and secure location. However, it isn’t; in fact, it’s just as easy for someone to get your password online as it is just walking into your house and grabbing the paper. How is that possible? Keyloggers and phishing sites. It’s highly recommended to keep all of your password information safe, even by storing them on your computer.

Keyloggers and phishing sites allow hackers the ability to grab your password without you ever knowing who has taken it. A keylogger is a program that hides in your computer and sends to the hacker every button you press. This means that if you type your password into a site online, they are given each button pressed, and therefore getting your password. Another is phishing sites. Typing a website’s name wrong, or clicking a look-alike site (for example, “mail.yaho.com” instead of “mail.yahoo.com”). These sites typically look identical to the actual sites, but aren’t. As you try to log into your email and input your email/password, you’ll be redirected to look exactly as if you’ve logged in. But they have your password now. Double-check URLs and websites before visiting and make sure they are correct.

Changing passwords frequently and setting monthly reminders to update your password is a great way to prevent account theft. The change of a password will usually boot everyone, except the computer with the new password, out of the email so they no longer have access. There are still holes in this type of security, again with keyloggers, that just give them the new password.

The most stable and secure option for storing passwords is to download a password manager, such as LastPass, which can save passwords and security information on your computer without allowing access from outside connections. This can allow you to automatically sign into websites, automatically fill out information (like your credit card), or any other types of required information. This means your computer isn’t storing saved passwords on the web browser, you don’t have to type out your passwords on each site, and you can still log in without issues remembering passwords.

Lastly, make sure that your password is of a great length and includes numbers. Doing so, there are many more combinations and those who know you will never even guess correctly. For example, instead of using “myPassword” (which is so easy to gain access to), try “myyP4ssw0rd37”. Who’s going to guess that?

Password security should be a top-priority, especially in businesses and companies, and everyone should take just a few minutes to make sure they are safe from account theft.

 

By

Office 365

Used for businesses, colleges, schools, and personal use all around the globe, Office 365 is a productive set of software with many purposes. Office 365 supports online storage using “OneDrive” and can operate on almost any system, including Windows and Mac. Files, such as PowerPoints or SpreadSheets, can be shared to multiple users and collaboratively edited. Office 365 will soon be updated to include higher protection, even with custom encryption methods, discussed soon.

Office 365 allows users to use software like Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Access, Lync, InfoPath, and Office Online. These tools can help promote efficiency on professional tasks, and can come with templates and pre-created files for easy-to-use quality.

If you would like to save files to use throughout multiple devices, Office 365 allows you to do so as well. “How is this possible?” you may be asking. With OneDrive. OneDrive is a service that enables saving files, without saving files locally on your computer. They are stored within the Microsoft storage center and can be accessed from any computer with access.

Soon, Microsoft will be updating their security systems to be even more advanced than they already are, and will allow users to create their own custom safety keys. This will make it so no one can grab an important or private file of yours and view it — it will only be accessible through your computer or those manually given rights to.

With the advanced Office 365 software available, we highly suggest you set up a plan, especially for business, with us. We, at Computers on the Run, can help set up Office products and get everything required ready to operate. If you would like to receive more information, would like to receive the Office applications, or have any questions, you could contact us and we would be happy to help.

Contact us at: (308) 381-0561
3415 W State St, Grand Island, NE 68803

http://www.corcomputers.com/

By

Virus Protection

Computers, much alike many other devices, are constantly surrounded by viruses and data loss. If you’ve ever had an issue with your PC, including abnormally slow speeds, your device may have issues that should be dealt with immediately!

Here at Computers on the Run, not only do we know how to remove viruses and infectious software, we can help to prevent them as well! We can also help you to make sure all of your files are safely stored to be restored in case of virus attacks.

Contact us at: (308) 381-0561
3415 W State St, Grand Island, NE 68803

http://www.corcomputers.com/

By

Project Spartan

With the soon-to-be-release of Windows 10 comes the new Windows browser, codenamed Project Spartan, as a lightweight browser with ActiveX implementation for modern-use between mobile and PC compatibility.
Project Spartan will include a number of unique browser features, including Cortana, annotation tools, and reading mode.

What is Cortana? “Not what, but who.” Cortana is the new “personal assistant” which will be operable through Windows or Project Spartan. She (Cortana) can be relatively similar to Siri, the Apple assistant, and can help you with any needs such as setting alarms, taking notes, finding nearby restaurants, telling you the weather, looking at flight paths, telling jokes, and much more. Cortana can be used through text or voice. What’s very cool is that she even recognizes your voice, too! This means that people cannot walk nearby your phone and use her (by talking) without permission.

Okay so Cortana sounds pretty cool.. But what else does Windows 10 offer us? Annotation tools. A few of these tools are drawing on web pages, even collaboratively with groups of people, taking notes, and attaching reviews to websites.
If you are reading an online book, review, blog, or anything with text, Windows 10’s Project Spartan will even come with “Reading Mode.”

Reading Mode is a feature that allows users to efficiently read pages like a book. This strips content, such as advertisements and images, out of the page and displays all text like a book for easy-reading. Along with this, you will also be able to save pages, read them offline, and even sync them across multiple supported mobile devices.

We are definitely excited to see Windows 10 and Project Spartan grow into something very beautiful in the near-future. To receive help upgrading your system from Windows 7 or Windows 8 to Windows 10, you can contact us, at Computers on the Run, for information after Windows 10 has been officially released.

Contact us at: (308) 381-0561
3415 W State St, Grand Island, NE 68803

http://www.corcomputers.com/

By

Carbonite

Computer hard drives do sometimes happen to fail or die. If you’ve ever had this happen, then you realize how big of a pain it is to recover every file that was important to you; whether that be a receipt in a text document, a spreadsheet for work, or even a file save data. There are many ways that your computer can be stolen, lost, or ruined. Maybe you even decided to get a new computer, but don’t want to waste time manually transferring every single file. We really suggest you look into getting an automated off-site backup plan!

Affordably, there are ways to protect your computer from ever losing important files, which you need access to. Carbonite is a cloud-based system that keeps all of your files secure, and against hackers or viruses! You can even access your files directly from a different computer, of course, securely.

”Well, let’s just say that not using the cloud is the equivalent of keeping your money in your mattress. Storing your data in a professionally managed data center means it is given the proper TLC and attention it needs — redundant disk arrays, temperature controlled environments, backup power generators and more.” It’s always better to be safe than sorry! You wouldn’t want to lose family pictures, road-trip videos, or important work files you’d been working so hard on.

Not only can Carbonite be used for personal computers, it can also be used for protecting your business computers or servers. There is so much information on one business computer that you can absolutely not afford to lose something so important. No longer do you need to stay up all night wondering about how you will ever get your documents back without having to redo all of the hard work.

For protecting your important data from corruption or disaster, contact us today. We will get you set up with the Carbonite automate off-site backup plan that is right for you.

Contact us at: (308) 381-0561
3415 W State St, Grand Island, NE 68803

http://www.corcomputers.com/