Tips and Tricks Tips and Tricks

Using the Security Features Present on Microsoft Office by Kelly Lynn

If you use Microsoft Word to create important business documents, you may want to lock up access with a password to make sure it doesn't get into the wrong hands. To do this, you need to click on File -  Save as - Tools (Tools is at the bottom of the dialog box, right next to Save), and General Options. You can type in different passwords both to open the document and to modify it under File sharing options. You do get access your document as long as you have the password. What happens, though, if you lose the password? It could be a document that your business depends on. The general feeling tends to be that password-protected documents are lost forever. It's a reasonable idea -- Word uses high-strength … Continue reading

Wi-Fi Direct: What It is and What It Does by Kelly Lynn

Chromecast is a popular device that's seen as on the cutting edge of digital home entertainment today. Yet, it comes with an annoying shortcoming -- if you need to stream movies, YouTube or anything else from your phone or computer to your Chromecast-equipped television, the entire stream needs to go through your Wi-Fi router. It doesn't matter if you are right in front of your television with your smartphone in your hand -- the signal needs to get to your television through the router that's far away in another room. Often, if the Wi-Fi signal from your router isn't particularly strong, you'll have trouble getting anything done. If you've ever experienced such a scenario, you've probably wondered why your Wi-Fi can't be more like Bluetooth, and offer direct connections. This … Continue reading

Opening Office Files Safely by Kelly Lynn

Opening Office Files Safely Microsoft Word allows different ways in which to access documents. Depending on the situation, you can choose to open one in the normal mode that allows editing, for example, or allow nothing greater than read-only access. This can be useful when you need to distribute a document, making sure that no one makes changes. It's simple enough to do this. The easy way In Windows, go to the folder that contains the document that you wish to turn read-only, right-click on the file, and go to Properties. When the Properties dialog box opens, you simply need to go to the Security tab, click on Edit, and click on the check boxes that offer restrictions for various activities. This simple approach, though, isn't particularly meaningful. Anyone who … Continue reading

What to Do When You See the Get Windows 10 Item in Your System Tray? by Kelly Lynn

Microsoft has begun advertising Windows 10 prior to release on July 29. While you can get the operating system on a new computer bought after that date, the company is also beginning to push the other route to obtaining it -- upgrading as an existing user. Unlike the way it's been with previous versions, Microsoft doesn't expect to sell these upgrades. Users with existing copies of Windows 7, 8 and 8.1 don't pay for their new OS; for anyone who upgrades within the first year, Windows 10 is free. There's a reason why Microsoft is giving up potential sales worth billions: it gets to rationalize the Windows user base by clearing up the version hodgepodge in existence now. It no longer needs to offer support for multiple operating systems. The … Continue reading

Do You Realize That Auto-Sync on Cloud Backup Solutions Has a Huge Flaw? by Kelly Lynn

Automatic synchronization is one of the most important reasons why you would choose to use an online backup service like Google Drive or Dropbox. Whatever important files you may have, auto-synced cloud backup solutions can help you maintain up-to-date copies in safekeeping. When you lose a file or see it damaged by malware, you can rest assured that your online cloud backup will have a copy. Unfortunately, this may not always work out as you expect. The problem is that auto-sync synchronizes your cloud backup to whatever state your computer is in, good or bad. If you accidentally delete a file, your cloud backup copy will delete it, too. If you accidentally delete an important part of a document, the backup will do the same thing. It's the same story … Continue reading

Using Timestamps in Windows Search by Kelly Lynn

Windows indexes every file present on your system on a number of parameters. Windows' indexing method can be very helpful when you need to find a file. You get to locate it by using Windows Search filtering with any of the parameters that Windows records. The timestamp on each file is one of them. Timestamps on files   Every file saved by Windows is identified through at least three timestamps. File time: Windows records the exact time that you've saved the file down to a hundredth of a nanosecond. While file lists in Explorer do not display time resolutions greater than seconds, Windows does internally store this information. This can help Windows list several files in the correct order of time, even if it is only a few nanoseconds that … Continue reading

Can Overclocking and Other Tweaks Really Improve Your Gaming Performance? by Kelly Lynn

When you search on the Internet for advice on improving your computer's gaming performance, you often read that you can get serious improvements without spending anything. Tweaking your computer, overclocking your graphics card and other such free improvements, they tell you, can easily give you enough of a performance boost to keep your system going for longer. Overclockers especially love this line of thought -- overclocking magazines have long argued that manufacturers underclock their systems simply to get people to upgrade more often. What if you tested these claims out? What if you got a simple, but effective benchmarking tool such as 3dMark Vantage and tested your computer to see how the tweaks recommended improved your computer's gaming ability? What you learn through actual testing is this -- the only … Continue reading

Why Doesn't Antivirus Protect You from Bad Add-Ons? by Kelly Lynn

Anyone can be tricked into installing an extension or toolbar by Conduit, Delta Search, Ask or any one of the other adware makers. Once you get one of these programs on your computer it can change your default search engine in a way that is very difficult to change back. It can clutter up your search results with a bunch of advertising, too. The inexperienced may get stuck with a bad toolbar by carelessly clicking on one of those pop-up offers on the Internet that come with a message like "Your drivers are outdated! Update them now." The more experienced may simply get tricked when they come included with legitimate software like Java (Java comes with the Ask toolbar). Once these toolbars get on your computer, they can get their … Continue reading

Why You Should Take Your Photos First to Flickr, Then to Facebook by Kelly Lynn

If you have photos to upload to the Internet, what's the best place to head to: Facebook or Flickr? You can look at the question in two ways.   If you simply want to go with the choice that's popular with the greatest number of people, Facebook is so loved that it gets a third of a billion photos each day. Snapchat gets about half as many (Snapchat doesn't actually delete photos once they are viewed -- it only removes them from view). Instagram is much more modest -- it only gets 50 million photos each day.   Next to these numbers, Flickr is but a speck -- it gets a little more than 1 million photos a day. If you want your pictures to be on the most popular … Continue reading

When the Free Trial on the Internet Security Suite Expires, Should You Renew? by Kelly Lynn

To their makers, Internet security suites are profitable products. To expand market share, each vendor has tie-ups with computer manufacturers to have trial versions placed on every new computer sold. When the trial version on your computer is about to expire, you get hit with reminders - pay $50 for a year's worth of protection or remain condemned to either the partial protection that free antivirus software offers or no protection at all. What should you do? Is the protection offered by the full Internet security suite that your trial gives you worth the asking price? With their full complement of firewalls, browser extensions, phishing scanners and cookie protectors, Internet security suites do offer functions that are thoughtful and useful. Most people, though, don't need those features. For them, the … Continue reading