• Handy Google Chrome Commands

    Google’s Chrome browser has special commands that can show you basic browser settings and info from within the browser’s main window. This can be helpful since it presents browser information in one neat page that can easily be searched. For example, to view bookmarks, type “chrome://bookmarks” in the search or URL box. To view downloads, type “chrome://downloads”, and to view your history, type “chrome://history”.

    Read More

  • Launching Multiple Instances of the Same Software in Windows 7

    There are times when you might want to open multiple instances of the same software program quickly, such as when you need to work on multiple documents in Word or Excel, or when you want to launch multiple windows of your browser. In Windows 7, you can do this easily. Just press and hold down the SHIFT key while left-clicking on the first instance of the program in the Windows taskbar, and a new instance of the same program is opened.

    Read More

  • Use Shortcuts Instead of File Duplicates

    Instead of copying files to multiple locations in your hard drive to make sure you can find it easily, consider using shortcuts instead. Shortcuts are simply links to the original file, folder, or programs from which it was created. You can distinguish a shortcut by the arrow in the lower-left corner of the icon. To create a shortcut, right-click the file and then click Create Shortcut . Create as many as you want, and drag them to the appropriate locations within your hard drive.

    Read More

  • “About” Commands in Firefox

    Did you know that typing “about:” plus another word in Firefox will allow you to view special configuration information of the browser—some of which you can actually tweak and customize? To try it, type “about:” to show general and version information. Try “about:cache” to view the browser cache, or “about:plugins” to show plugin information. If you are feeling adventurous, try “about:config” to show the browser configuration settings (but be careful when changing settings here). And for some extra fun, type “about:Mozilla” to see a special things provided by the developers.

    Read More

  • Restrict Users of Your Computer from Accessing Folder Options in Windows

    If you share your computer with other users or manage the computers in your home or office, there are times when you may want to restrict users from changing folder options, such as making Windows system files visible which are invisible by default or showing file extensions. To do this, go to the Windows Start Menu and click on Run . Type “regedit” to launch the windows system registry tool. Next, go to: HKEY_CURRENT_USER / Software / Microsoft / Windows / Curre ntVersion / Policies / Explorer. It may be a good idea to backup your registry at this point . After creating a back-up, double-click on NoFolderOptions and set its value to 1 . After doing so, users will no longer be able to edit Folder Options.   To reverse, set the value back to 0 .

    Read More

  • Using Outlook to Access your Gmail Account

    Do you have a Gmail account but prefer using Outlook to access your email? You can configure your Gmail to behave like a normal mailbox so that you can download it using your favorite desktop or mobile client such as Outlook. You can then access your mail offline, and use tools you already use with Outlook, such as Outlook’s mail formatting features and MS Office integration. Here’s how: 1.       First set up your Gmail account for POP or IMAP . If you use other Outlook features such as Tasks and Notes, consider using Google App Sync for Outlook instead. 2.       In Outlook, add a new email account.  Remember to use your email address when setting up your account (including ‘@gmail.com’ or ‘@your_domain.com’). For the exact steps, follow the instructions here . 3.       Are you using a mail client other than Outlook? Check out instructions from Google here .

    Read More

  • Research Initiatives in Internet Security Promise a Safer Web Experience

    Internet security is an issue not to be taken lightly. As an increasing number of businesses use the web for more efficient operations, there is also more risk of being affected by malware and viruses. But thanks to initiatives such as WebBlaze and BitBlaze from Professor Dawn Song, developers are better equipped to make more effective IT security systems. If you think hackers are the only ones doing their research to release newer and scarier viruses and malware on the web, think again. It is comforting to know that there are also very capable people doing what they can to make the internet a safer place – like Professor Dawn Song, associate professor at the University of California at Berkeley and MacArthur Foundation fellow. In a nutshell, Professor Song has been looking at different ways to make the internet experience more secure. Her two initiatives – WebBlaze and BitBlaze – are aimed toward developers who want to create better and much more secure programs and applications. WebBlaze is a compilation of different strategies from Song and other like minds who tackle different problems and solutions in all sorts of platforms, and BitBlaze is an analysis tool for malicious software. While we won’t go into too much detail (it involves very complicated math), the gist is that Song and her colleagues are drawing up some very solid solutions to constantly evolving security issues on the web. It’s exciting to see developments like these in the security industry. As threats continue to evolve, so does the means through which they are fought. The more we use the internet and the more the online experience becomes integral to the day-to-day operations of businesses big and small, the more important securing your data and information becomes. And because of efforts such as Professor Song’s, we can expect security programs to be much more effective and efficient as time passes. Know more about BitBlaze and WebBlaze Learn more about Dawn Song here If you are looking to assess and beef up your security systems, we’d be happy to sit down with you and take a look at improvements that can make your business and your data much more secure.

    Read More

  • Customize the Windows 7 Logon Screen

    Would you like to customize the Windows 7 Logon Screen and use your own wallpaper image? There are actually several ways to do this. The first method involves editing the registry and creating a folder containing your own custom images. However, if you are uncomfortable doing this, or if it seems like too much work, there is a free application that can do it for you called Windows 7 Logon Background Changer . The download is a zip file, and once you unzip it, just run the installer. After installation, the program will allow you to choose from images already on your drive and view a preview of how it will look. Find out more by downloading the program .

    Read More

  • Important Update: President Signs Red Flag Clarification Act into Law

    Professional service providers such as attorneys, accountants, and doctors no longer fall within the definition of a creditor under the Red Flag Rule. The Federal Trade Commission’s (FTC) so-called “Red Flag Rule,” which requires all businesses that are potential identity-theft targets to develop plans to spot red flags and prevent theft, received much criticism for being too broad. But now there’s some relief:  S. 3987, the Red Flag Clarification Act, which President Obama signed into law in December 2010. To recap, under the Red Flag Rule, the FTC had been interpreting “creditor” broadly by including organizations that defer payment for goods or services and bill clients later. This led to widespread concern that the Red Flag Rule would be applicable to entities not typically thought of as creditors, including law firms and health care providers. The Red Flag Clarification Act exempts such entities by revising the definition of creditor to exclude creditors “that advance funds on behalf of a person for expenses incidental to a service provided by the creditor to that person.” Essentially, the Red Flag Clarification Act limits the scope of the Red Flag Rule to creditors that regularly and in the ordinary course of business obtain or use consumer reports in connection with a credit transaction; furnish information to consumer reporting agencies in connection with a credit transaction; or advance funds to a person based on the person’s obligation to repay the funds. The legislation does include a provision that would allow other types of creditors to be subject to the Red Flag Rule if the agency with authority over the creditor (such as federal banking agencies) determines that the creditor has accounts that are subject to a reasonably foreseeable risk of identity theft.

    Read More