Save $25 First-time repair — call today
75 North Bridge St, Somerville NJ 08876 - (Behind Bank of America) Hours M-F 10am-5pm Sa 9-2 (908) 428-9558

One of the worst things you can do with your technology is to neglect it to the point that it is causing you to lose time. You might not notice it because it doesn't seem like it takes a lot of time, but if it is something you do every day, or even multiple times a day, that time will add up over time. Sometimes, things like computer repair might cause you to notice, but you don't do anything about it once you've fixed it.

Those few minutes are killing your business, even if you don't want to admit it. Here are some of the most common ways we see that businesses are losing time and killing themselves - from computer repair to cleaning up your messy desk:

You Aren't Automating Tasks When You Could

One of the best things about technology is that you have the ability to automate tasks. Time consuming tasks that don't add to your value but you need to do can really add up over time, eliminating any benefits they may have.

For example, you may be scheduling employees by hand, confirming meeting times, or even confirming work completion might only take a few minutes, but once again, that is every day and minutes add up to hours and days.

There are plenty of applications, programs, and pieces of technology that you can use to streamline your day. When you make it part of your day and create systems that you can trust, you won't have to worry about it.

Other tasks you can automate include social media, email, data back ups, and even accounting and invoicing. Many tools are free, while others come at very affordable monthly rates. Some require you to set up new pieces of tech while others only require an initial account set.

Your Technology is Slow - Computer Repair Is Necessary

Another way you are losing a ton of time is by not using your technology properly. This means you aren't updating it or upgrading it when necessary. Over time, almost everything has software that needs to be updated - from your printer to your phone.

You should create a schedule for updating or get some help ensuring that everything in your system is up to date and running smoothly. Trying to fix printer issues or dealing with a slower network isn't part of your job description, nor is it something the intern should have to handle.

Slow Wi-Fi (Including After Computer Repair)

Whether you are downloading PDFs, trying to open web pages, or simply answering emails, Wi-Fi that isn't running at its best speed will completely slow you down. Even worse, Wi-Fi that consistently goes out and you have to fix it will really slow you down. For businesses that have a lot of data coming and going, you will be particularly hindered by this.

How does slow Wi-Fi really kill your business? It makes you seem unprofessional. Not only will you be unable to help clients in real time, but you will also probably have issues with timely responses, sharing information, sharing your screen, or even updating your system. Those few seconds can make or break your reputation and the way that people see you. Even if you aren't, it can make you seem inept.

Disable Distracting Notifications

There are so many distractions to our work every single day. No matter how you think you can avoid them or ignore them, you really aren't. In fact, studies have shown that when you look at a notification on your phone, for example, it can take more than 25 minutes to fully recover your focus. Most of us don't even go that long between notifications. Remember to turn them off after computer repair!

Notifications from things like emails, social media apps, and instant message platforms, regardless of their intended purposes, will almost always pull you away from whatever task you’re focusing on and make your work less productive. This is the time when you make those silly mistakes that can cost your brand.

Consider turning all of your notifications off; you might be offline for a few hours, but you’ll get so much more done and what you actually get done will be more effective and better work: meaning it is almost always a good pay off. Depending on the culture of your workplace, you may need to send a proactive heads-up to let people know that you might not be able to get back to them as quickly. However, you should also tell them why you are doing what you are doing and they may follow suit.

Declutter

Have wires all over your desk? Weeks old memos that you are never going to do anything with? We can all get a little messy when we are trying to get work done. One of the best things you can do if simplify your workspace and put as little as you can on top of your desk.

Try to clear away as much as you can by going wireless with certain things or setting up a desk where you can put the wires underneath. Not only will this help with cluttering, it will help to keep everything safe. Even better, you won't be ashamed if someone sees your desk. For the most part, clutter doesn't only distract us, it can actually make our work less.

Losing time at work is a serious problem for so many people, but they don't even realize it because they are losing only minutes at a time. Still, sometimes over half of our days aren't productive.

Our team takes pride in being the most experienced team of IT professionals in New Jersey. You can count on us to have solutions to problems that you may not have had luck with before. When it comes to data recovery in New Jersey, you simply cannot go to anyone better. We have technical support available to the public every day of the week: you’ll have the option to talk to an experienced technician if a problem arises.

Looking for the Best Computer Services in New Jersey? Call: (908) 332-5051

Related Posts

Christmas is my favorite time of year but it is also when the scammers and fraudsters come out to play. I have heard of a couple of people who received cold calls supposedly from a computer repair outfit and even pretending to be Microsoft offering to fix issues with the person’s computer. One type of call says Microsoft have seen issues with the computer and offer to fix it for free. It’s a scam. All cold calls like these are scams. Don’t fall for them.

Windows and computer support

No computer support company or Microsoft will know how well, or not, your computer is working. Windows 10 does report a lot of data to Microsoft, but the health of the system is not something it tells them. As someone who owns a computer support company, I know for a fact that we cannot know whether your computer is behaving erratically or has a problem until you tell us. Dave’s Computers in New Jersey and other outfits like us are how you get your computer fixed. We are good. In fact, we are very good but there’s no way on earth we can tell remotely whether your computer is working or not. This is the holiday season and we want all our New Jersey customers to have the best Christmas possible. If you receive a cold call offering tech support, put the phone down. Don’t even dignify them with a response and don’t identify yourself or where you live. Record the number if there is one and report it. Remember: Companies can only remotely access your computer if you give them permission and allow them remote access. Otherwise they cannot see how Windows is performing or access Event Viewer to see errors. It’s a scam. If you do have issues with your computer, bring it to someone you trust. Bring it over to Dave’s Computers in New Jersey and we will make sure everything runs perfectly.

Related Posts

If you want to deliver excellent IT support to your customers, you must be able to protect them as well as keep their infrastructure up and running. One key aspect of that is knowing your enemy. That means assessing threats from the outside and getting to know how and why a hacker will penetrate a network. One great way to do that is by reading The Black Report from Nuix. You have to log in to get a copy but if you’re tasked with network security, it is a download well worth getting. The Black Report provides an insight into the mind of a hacker and is partly filled with surveys completed by hackers themselves. It is a great resource for anyone who provides security or IT support for business customers as it shows you how a hacker thinks and just how vulnerable networks are.

The Black Report

So what does The Black Report tell us? Here are some highlights. If you are providing IT support for your organization or those of customers, it makes for sobering reading. So what can we do about these threats?

Humans are better than machines

Industries of all shapes and sizes are all about automation and using AI or machine learning to take care of many tasks. This report proves that network security is not one of those tasks. Many automated security devices don’t even notice many hacks and are simply unable to cope with many of them. If 88 percent of hackers can breach a network within 12 hours, hardware alone is not up to the task. Skilled, experienced and well trained humans are the only real defense against hack attacks. While using automation as part of a defense in depth is well worth the investment, devices alone are not enough.

Education is key to preventing data loss

Phishing and social engineering is a primary way to breach a network. Whether that’s through email, chat, social networking or something else, the human element is also the weakest element. A single hacker can generate millions of phishing emails or messages. It only takes one to be opened for the attack to be successful. A robust staff education program can go a long way to protecting networks from data loss or breaches. Teaching users not to click links, open attachments or interact on social media during work time can avoid the huge majority of these threats. Explaining why staff cannot use social media at work also increases the buy-in rate. If staff know there is a good reason for sites being blocked, they won’t mind quite so much.

Know the tools of the trade

Hacking tools are often free and open source and will be utilized in the majority of hacks. Not many hackers will write their own exploits, so it pays to know the hackers’ weapons of choice and learn from them. Such tools include Metasploit, Cobalt Strike, Core Impact, BeEF and the Burp Suite. Many are free and easily accessible online. Some cost a lot of money. Start with the free ones and learn how they work. You can move on to the paid ones if you need to. While it won’t turn you into a hacker overnight, it will give you an idea of what to look for and how to defend against them. This is core tenet of excellent IT support. Know what weapons your enemy uses.

Ransomware is taking over from viruses

Ransomware is becoming more popular than destructive attacks for obvious reasons. Hacks were once methods of revenge or protest against the government or big business. Now hacking is a business in itself. The rise of ransomware has been huge and is rapidly overtaking virus attacks as the number one cybersecurity threat. This evolution is also showing signs of interbreeding. Viruses such as Conficker are now being reconfigured with ransomware payloads. So rather than deleting files and wiping systems they are penetrating networks and delivering ransomware directly to user machines. As the Internet of Things (IoT) develops, this vulnerability will also develop. Learn more about developing cyber security threats at Techrepublic.

Penetration testing is your best defense

As the theme of this article is know thy enemy, employing or using penetration testing to probe your own defenses is a great idea. It is the only true way to test your network and see exactly what a determined hacker can access and how much damage they can do. Once you know your weaknesses, you can do something about them.

Backups could save your life

A determined hacker will find a way into your system regardless of any defenses you might have. In this case, a robust backup system is going to pay dividends. Our IT support teams will always suggest instigating a reliable backup system that utilizes a local and remote copy of all your important data. Running daily backups of key data will offset any difficulties a hack might deliver. While a backup won’t protect you from ransomware, it will at least give you options.

Treat cyber security like insurance

Insurance is often seen as a resource drain and an unnecessary expense. That is until you need it, then it is the best thing ever. Cyber security is exactly the same. It is a drain on resources but pays dividends when it saves the day. It is an investment, not a cost. While there is an inevitable CAPEX involved, the cost of defenses is usually far less than the cost of reputational damage or fines should your defenses be found wanting. We have all heard of the big brands who have been hacked. Nobody in their right mind would ever want to be in the same situation if they could avoid it. The Black Report should be mandatory reading for every IT support team that provides cyber security. Read it today and begin to know your enemy.

Related Posts

With Solid State Drives (SSD) becoming cheaper than ever, it has never been a better time to upgrade from a hard drive (HDD) to a Solid State Drive. SSDs are many times faster than a HDD and are a worthwhile investment to make in terms of speed. Not only will your computer boot much faster but it will work faster too. The computer support team here at Dave’s Computers are asked to do many SSD upgrades but it is entirely possible to do it yourself. We are of course more than happy to perform an SSD upgrade for you but you can also do it yourself. I’ll show you how. You will need:
  1. An SSD drive large enough to take Windows 10 and your programs.
  2. Cloning software. I suggest EaseUS Todo Backup for home users. It is free and very good.
  3. Spare SATA cable and port on your motherboard.
  4. A recent Windows restore point and separate backup of your files

Getting things ready

Before migrating your hard drives, there is a little preparatory work we need to do first. We need to tidy up your current installation and remove the trash. Then we need to make sure the version of Windows you are migrating is the latest and greatest.
  1. Back up anything you don’t want to lose. Store it separately from the computer.
  2. Select Windows Settings and Update & security.
  3. Select Windows update and perform any updates.
  4. Open Windows Explorer and right click your C: drive.
  5. Select Properties and then Disk Cleanup.
  6. Remove any files within the next window by selecting them and confirming deletion.
  7. Go back into Disk Cleanup and select Clean up system files. Select all large files and delete those too.
  8. Select Windows Settings, Apps and Apps & features.
  9. Go through the list and delete any apps or programs you no longer use.
  10. Check your Documents, Downloads, Music, Pictures and Video files and delete anything you don’t need.
  11. Right click Recycle Bin and select Empty Recycle Bin.
Then turn off your computer and attach the SSD to a spare SATA port on your motherboard. To begin with we will run it alongside your current hard drive so we can make sure everything works and create a clone of the drive. Boot your computer into Windows again and download and install EaseUS Todo Backup. There are other cloning tools out there but I know and use this one a lot at home and can recommend it. Here at Dave’s Computers, our computer support team uses enterprise-grade cloning tools but this costs a lot of money so a free option makes more sense for home users.

Creating a clone

Once booted into Windows, it is time to update the new SSD and create a copy of your operating system. Exactly how you update SSD firmware depends on the manufacturer of your disk. Some provide a CD with new drivers while other download and install firmware from within Windows. Now is a good time to check the manual and do whatever your manufacturer suggests. Then:
  1. Open EaseUS Todo Backup and select Clone.
  2. Set the source as your current C: drive and the destination as your new SSD drive.
  3. Double check that you have selected the entire C: drive with its multiple Windows partitions and the correct destination drive. The cloning process will overwrite everything on the destination drive so it pays to check again.
  4. Select Proceed once you have configured everything to your liking and confirm when prompted.
EaseUS Todo Backup will now lock both drives down and begin the cloning process. Depending on the speed of your computer and size of the drive, this could take as little as 15 minutes or as long as an hour. Do not interrupt the process! Once complete, EaseUS Todo Backup will tell you so. Select Finish and the new cloned drive will show up in Windows Explorer. If it does, turn off your computer. Unplug your old hard drive and replace it with the SSD. Then boot into Windows. Everything should run perfectly but much faster. Windows should load, the desktop should be identical to how it was and all the files and folders you elected to keep should still be there. Run a few programs, browse a few websites and open your email client to test everything.

Finishing off

Now the main work is done there are a couple of tasks still to do. First we need to make sure Windows picked up the SSD and utilized TRIM and then we need to make sure Windows 10 didn’t have any issues activating.
  1. Open a CMD window as an administrator.
  2. Type ‘fsutil behavior query DisableDeleteNotify’. If the result is 0, TRIM is enabled. If the result is 1, TRIM was not enabled.
  3. Type ‘fsutil behavior set DisableNotify 0’ to enable TRIM if you saw a 1.
TRIM is a system that allows SSD to be very space efficient and  retain its speed. Our final task is to check that Windows 10 had no issues with activation. As you may know, Windows 10 uses digital entitlement instead of a product key to make sure it is legitimate. As part of that process it uses hardware signatures of your computer to create that entitlement. While you can of course upgrade your own hardware on your own computer, Windows sometimes has a problem with it.
  1. Select Windows Settings and Update & security.
  2. Select Activation and ensure that Windows is activated.
If Windows is activated there is nothing that needs doing. If Windows is not activated, select Activate and allow the system to do its work. If it doesn’t activate right away, give it a few hours to sort itself out. That’s how to migrate Windows 10 to an SSD. It is quite an involved process but one that is achievable by someone with decent computer knowledge. If you want to upgrade to solid state but don’t want the hassle of doing it yourself, bring your device to Dave’s Computers. Our computer support team will be happy to do it for you.

Related Posts

You know the saying ‘look after your equipment and it will look after you?’ This is very relevant to computers. If you look after your laptop, desktop or server, it can continue serving you for much longer than if you left it alone. So this week’s IT support post is all about spring cleaning your computer to extend its operating life. Whether you’re a home user or a business user, the more you use your computer, the more you should look after it. In this context, spring cleaning means both cleaning the physical computer and the software inside it. It will take around an hour but can have a serious impact on the longevity and usability of your machine. In our experience, a regularly maintained computer works faster and breaks down much less often. That makes spring cleaning a tasks that returns your effort many times over the operating life of your computer. Our IT support team regularly perform these tasks on client machines. You should try it too.

Take backups before anything

While most of the spring cleaning we do is non-intrusive, we always take a backup of a computer before we do anything with it. Whether it’s our own computers in the store or a client computer on their site, we back up everything. It is one of those IT support tasks that could save you time, money, effort and tears. In that order! Make sure to create a Windows restore point or backed up to Time Machine on a Mac. If you can, also take file backups to the cloud outside your usual backup location.

Physical spring cleaning

You will need a clean cloth, a can of compressed air or a lot of patience do properly spring clean a computer or server. These steps obviously do not apply to laptop or tablet users. Once you have backed up your computer, it’s time to get down and dirty. Switch off your computer at the mains but leave it plugged in. Take off the case to expose the innards. You will likely see lots of dust everywhere and we need to remove it. Take the front off the computer case to expose the intake fan. If the fan has a cover, remove it and remove the dust. Remove dust from the fan blades too. Repeat for all fans on the system. Using the can of compressed air, blow dust off the computer internals trying to catch as much of it as possible with the cloth. Do this for the whole interior of the computer case. The more dust you can remove, the better. If you have a small vacuum, you could have that suck out the dust you blow with the air. Pay particular attention to the CPU and GPU coolers and remove as much dust as you can. Dust is not a good conductor of heat and the more dust you have in a computer, the warmer it operates. By removing as much dust as possible, we ensure good air flow and maximum cooling. This can seriously improve the operating life of your machine. Once the interior of the computer is dust free, do a manual check of all cables to make sure they are in good condition and are connected firmly. Then check the cables to see if they get in the way of air flow. Typically, air is taken in from the front and expelled at the rear. Try to keep all cables tidy and out of the way of this airflow to ensure maximum possible cooling. Put the case back together and restart the computer.

Spring cleaning the operating system

Apple Mac and Linux are both very efficient operating systems that can manage themselves pretty well. Most software spring cleaning is performed on Windows computers so the following is based on Windows 10.
  1. Right click on the Windows Taskbar and select Task Manager.
  2. Select Start-up and double click any program with startup enabled to stop them loading with Windows.
  3. Select Settings from Windows and Apps.
  4. Work your way through all listed apps, click ones you don’t need and select Uninstall.
  5. Select Update & security and Windows Update.
  6. Select Check for updates on the right and install all that are relevant to your machine.
  7. Select Devices from the Settings menu and scroll down to Device manager. Click it.
  8. Right click and select your graphics card, network card, audio card and input devices in turn. Select Update driver software, Automatic and let Windows find any new drivers.
  9. Select This PC in Windows Explorer.
  10. Right click a hard drive, select Properties and Disk Cleanup. Select any entry that takes up significant disk space and allow Windows to clean it up.
  11. Select Disk Cleanup again and select Clean up system files. Again, select any entries that take up significant storage space and clear it out.
  12. Download and install CCleaner.
  13. Select Tools then Uninstall and select any programs not listed earlier and uninstall them.
  14. Run Disk Analyzer from within the Tools menu to see if any files are taking up too much space. Delete any you don’t need.
  15. Run Cleaner from the left menu, select Analyze and Run Cleaner when complete.
  16. Select Registry from the left menu, select Scan for Issues and Fix selected issues when complete.
Finally, reboot your computer to make sure everything works properly. Then set aside a time overnight where your computer can run without being disturbed and without disturbing you.
  1. Update your antivirus to the very latest version.
  2. Run a full antivirus scan overnight to make sure nothing lurks in the operating system.
  3. Download and install Malwarebytes and run a full malware scan too.
Take care to remove anything suspicious from the results of either the antivirus scan or malware scan. Then reboot your machine back into Windows. Many of these actions can be performed on Apple or Linux machines too but are not usually necessary. If you do run either of these, make sure you use antivirus, firewall and a malware scanner to keep them protected. There you go. That is what our IT support guys would consider a system spring clean. We not only ensure your hardware can keep cool, we also make sure Windows is running well, all your drivers are up to date, your registry is tidy and those other tasks. Now your computer should run faster and more reliably than ever!

Related Posts

An effective computer support team should be like the Navy SEALS. Invisible and out of sight when you don’t need them but right there and ready to rock when you do. When not in use, they should be training and practicing for when they are needed, ready to leap into action to fix whatever problem it is that you need fixing. Now I’m not saying that the reality of computer support is even remotely like serving your country or laying your life on the line like a SEAL. What I am saying is that we could take a leaf out of their book if we want to deliver excellent IT support to clients. SEALS work hard, train harder and achieve every mission they are given. You don’t see them or hear them but stuff gets done. We can go about our daily lives without having to worry about a thing because they keep us safe. If a computer support team can achieve something even close to that, everyone is a winner. Unfortunately, many IT support teams get it very wrong. It’s why our industry is viewed the way it is. Similar to insurance, the product itself is designed to help you but the way it is administered is painful and getting help when you need it is even more painful. Just like some computer support outfits. Dave’s Computers is going change that. I’m listing five things our clients have told us irritate them about computer support. We have done something about all of them for our own remote support customers. Has your IT support done the same?

Five things that make clients dislike computer support

There are many things that irritate people about IT but these are the most common.

1. Not putting yourself in the client’s shoes

A key skill for any technical support team is to have empathy. You must appreciate the position your customer is in and be able to empathize with that position. For example, you might not think losing access to a shared drive is a showstopper, but for the client it might be. All of their work might be there and they may be stuck without it. They may miss a deadline, get into trouble for not being productive or all manner of things. Good computer support will put themselves in the position of the customer and do whatever they can to help. If you can go the extra mile you should and if you can add extra value to your service, you should do that too.

2. Making assumptions with no real evidence

I heard a recorded tech support call once that made me quite angry. An enterprise customer in New Jersey had called their IT support who had been offshored to India. Language and understanding was already an issue and as soon as the customer went off script, the agent was lost. They also assumed that because a computer wouldn’t boot that the power supply was faulty and needed replacing. It went downhill from there and no matter what the client said, the agent had already made their mind up. There are a dozen different things that can cause a computer to not boot and a few extra questions would have isolated the problem. Which turned out to be the UPS, not the computer. The customer experienced a delay while spares were sent and the expense of a new power supply when they could have just shifted to a different outlet for a while and carried on working.

3. Not asking enough, or the right, questions

Taking tech support calls involves a balancing act. We want to engage with the customer, ask lots of questions and get to the root of the issue but we have to appreciate that they might not have the time or knowledge to answer them all. Instead, what we have are a series of questions tailored to different situations to try to get the information we need to help. We also engage the caller and let them know that we appreciate there are a lot of questions, but spending an extra couple of minutes on the phone to us could save a couple hours when fixing the issue.

4. Not getting to know the customer and their situation

Being treated as just a number is the main complaint of any number of customers of enterprise organizations. The bigger a company gets, the less able they are to respond quickly or offer a truly personal service. That’s one of the reasons computer repair outfits like ours is so popular, because we are small enough to care and large enough to cope. Knowing whether a particular server going down cripples the customer or not is an essential part of that. If you already know what they have installed and how they work, you know what kind of impact any issue will have. You can then respond accordingly and deliver the kind of service they pay you for.

5. Not being organized

Organization covers a few key elements. It includes call monitoring, ticket tracking, an escalation path, recovery plan, critical spares, complaints procedures, transparent severity categories, SLAs and more. The more organized you are as a company, the more confident the customer will be in you. This comes into its own if there are issues with expectations or service delivery. If you can demonstrate your processes, prove your point and provide evidence to back it up, most customers will relax a lot more and be much easier to work with. Providing great IT support is not rocket science, it’s computer science. Like any industry, if you tune your service to meet the needs of the customer and not what you want to offer, your customers respond positively. Once you appreciate that offering computer support is like being a cop in that people only call you when they need you most, you begin to offer the quality compassionate service they deserve. If you’re looking for top class remote computer support from a company that cares, Dave’s Computers can help. Our team of experience professionals are ready and willing to assist in any situation. Contact our New Jersey store today at 908-428-9558 and we would be happy to discuss your needs.

Related Posts

While many elements of computer science, server configuration and networking are complicated, many aspects of computer repair are not. Our industry is full of myths and legends, most are harmless and a big of fun and some are a barrier to entry for both newcomers into the industry and to potential customers looking to keep their computer working. So we thought we would put together some of the most common computer repair myths and bust them right here. That way, you have a better understanding of what to believe when the media or your friends talk about computers or IT subjects.

1. A slow computer will need reformatting

‘If your computer is running slowly, you need to reinstall Windows’. We hear this one a lot, both in our store and online. It is a myth. A slow computer can be caused by many things including not enough hard drive space, too much clutter, a virus or malware, unwanted software using up resources and a few other things besides. When we get a slow computer into the shop, reformatting the hard drive is the very last thing we do and only if all else fails!

2. My computer has slowed down so I need a new one

‘My computer is slow and I was told I need to buy a new one’. Who are we to get in the way of you buying a new computer, but don’t do it just because your existing one has slowed down. As above, there are many reasons a computer might be running slow but it won’t be because your computer is getting tired. If you want a new computer, by all means buy one, but don’t believe your old one cannot be revitalized with some expert care.

3. Macs don’t get viruses

‘Only Windows get viruses, Mac and other iOS devices are immune to them’. This is another popular myth. Apple never used to get viruses as the operating system is based on Unix, which works in a way that viruses couldn’t handle. Now there are a range of malware and viruses that can attack OSX or iOS. One such virus, KeRanger can do quite a lot of damage. Other browser based viruses, Java exploits and of course, phishing and social engineering can all affect Mac users.

4. Windows Firewall is enough to keep you safe

‘If you have Windows 8.1 or Windows 10, Windows firewall is all you need to stay safe online’. We heard this one the other day and just had to bust it. While Windows Firewall is better than ever, it still falls short of other third-party firewall software. Plus, it alone cannot protect you from every threat out there in the wild. You need effective antivirus and malware protection too if you’re to avoid trouble. Leading to…

5. Windows Defender is the best because it is built into Windows

‘Windows Defender is the best antivirus because it is built into Windows and doesn’t conflict.’ We heard this one during the summer and just had to correct it. Windows Defender is built into Windows and is better than ever but it still falls short of other third-party antivirus software. Visit AV-Test and AV-Comparatives to see which is the best antivirus of the moment.

6. If Windows keeps crashing, you need new memory

‘If your Windows computer keeps crashing, your memory is broken and you need to replace it’. I heard this from another IT technician at a conference earlier in the year and I couldn’t believe my ears. There are dozens of reasons why a computer would crash and only one of them is through faulty RAM. It could also be misconfiguration, a Windows error, a faulty update, software conflict and a few other things besides. Hardware rarely fails if it is looked after. Many things can cause random crashes.

7. Premium branded parts last longer and work more efficiently

‘Like anything, buy a recognized brand and you get quality that lasts longer and works better’. Sometimes true but not always so. Branded parts tend to have much better quality control but unbranded parts are often made from the same materials in the same factory by the same people. It isn’t enough to just say that brand name will last longer either, as a thousand different things influence how long a component last, the name on the box being the least of them.

8. You have to drain your laptop battery to get a longer life

‘When you get a new laptop you have to drain the battery completely otherwise it won’t  last or charge for as long’. This is an old myth and goes back to the days of Nickel-Metal Hydride (NiMH) batteries. Most portable devices now use lithium ion which has no such restrictions. In fact, the opposite is now thought to be true. Completely drain a lithium ion battery and it is thought it generates chemical resistance to charging, which degrades its operation.

9. Use a magnet to securely wipe your hard drives before selling them

‘I use a magnet to wipe all the data from my hard drive before selling them on eBay’. That’s a shame because it doesn’t work. Back in the days of floppy disks, running a magnet over them did wipe data. Since hard drives and solid state drives work differently, using a magnet does nothing. To securely wipe a hard drive you need to use special software that overwrites each memory sector multiple times. Nothing else will do.

10. Using my browsers private mode means I’m completely safe online

‘I use incognito mode on my browser so nobody can see me and I cannot get a virus’. This myth is dangerous as it is completely untrue. A customer in our store was told to do this by a family member. Private browsing stops the browser from collecting data and using cookies. It only stops you being tracked on your computer. It does not keep you safe from being tracked from the outside or from being hacked or from malware or viruses.

Related Posts

If you keep up with tech news, you could be forgiven for thinking that the internet is full of viruses and malware vying to steal your passwords, identity and money. While there are all those things on the internet, they are not all after you. Not all of them can get to you either, especially if you action the things you learn on this page. There are some practical things you can do to protect yourself from the vast majority of these risks. I have broken them down into five simple steps. Everyone who uses a Windows computer connected to the internet would benefit from using them. While I talk about Windows in this guide, Mac and Linux users also need to take precautions as you are also vulnerable to some of these threats. Simply adjust these steps to suit your own operating system. Mac users once thought themselves safe from risks but threats have evolved to attack iOS too. Linux, while safer than Windows or Mac is not immune to malware. All operating systems, regardless of type will not protect you from phishing or social engineering, which I tackle further on in this guide. So without further ado, let’s get to those five simple steps to protect your computer from viruses and malware.

1. Keep Windows updated

While you may find the seemingly continuous requests to reboot Windows to apply updates annoying, they are there to help you. Microsoft is constantly working to tackle bugs and errors and also increase security with fixes and updates. Keeping Windows up to date and current not only gives you the latest features, but also the latest protection. Unless you run an enterprise network and need to soak test or analyze updates before release, you should always set Windows Update to automatically download. If you use Windows 10 you can now set ‘active hours’ within which your computer will not reboot. Set it to the times you don’t want to be disturbed and updates and the inevitable reboot will be scheduled outside those hours. To check Windows Update in Windows 10:
  1. Click the Windows Start button and select Settings.
  2. Select Update & security. Here you can control how and when updates are delivered.
  3. Click the Change active hours text link to change when reboots will happen.

2. Use reliable antivirus software

Windows 10 comes with Windows Defender built in but it is woefully inadequate for anything but the occasional computer user. It is much better to disable Defender and install a reliable third party antivirus solution. Visit AV-Test and AV-Comparatives to see which is the best solution for your situation. Alternatively, use Dave’s Computers antivirus. It utilizes the acclaimed BitDefender engine which regularly features at the top of the charts in Windows antivirus tests. Once installed, it is vital that you allow the antivirus software to run and scan automatically. You should also enable it to update itself automatically, which it will do almost every day. This is to ensure you get adequate protection from the latest threats.

3. Use a reliable software and hardware firewall

A firewall prevents unauthorized traffic flowing to or from your computer or home network. Many routers, including some provided by ISPs include a hardware firewall. It makes sense to have this running while also having a local software firewall running on every computer. Windows 10 has Windows Firewall which is okay but if you’re a heavy internet user isn’t necessarily the best option. There are a range of third party firewall solutions out there that do the job better and with fewer system resources. A quick internet search should generate lots of reviews recommending the current cream of the crop. I won’t suggest any here, as like antivirus, these programs are constantly changing and what is relevant today will be out of date next week.

4. Use a malware scanner

A malware scanner is an optional extra step for more peace of mind. Some antivirus solutions include malware scanning within their features but not all of them do. Not all antivirus software will pick up all malware, so it makes sense to add another layer of defense to keep yourself safe. There are a range of free malware scanners on the market that work very well indeed. Again, their effectiveness changes all the time so I won’t name names. Just do an internet search for ‘best free malware scanner’ or words to that effect. Unlike antivirus, malware scanners often need to be manually run unless you buy a premium product. Set a reminder for at least once per week to run a scan. You will be surprised at what it picks up!

5. Use common sense

This final tip for protecting your computer from viruses and malware is the most important one. All the other tips in this guide are only effective if used properly and not compromised by the user. So here are a few common sense tips to help keep your digital life secure.
  1. Don’t click email links unless you know who sent it. Never click a link within an unsolicited email.
  2. Be careful where you download files. Use reputable websites and verify the file once downloaded. Check it for malware or viruses before opening. Simply right click the download and select ‘scan for viruses’ or ‘scan with…’.
  3. Use an adblocker. Yes you need to pay for good quality content on the internet but many websites that use advertising have no control over what ads are shown. Some can be infected with malware.
  4. Keep your browser updated and check the security options within them.
  5. Use a password manager if you cannot remember passwords. It is much more secure than using the same password for multiple sites. If a hacker gets ahold of one, they can access all your websites.
  6. Don’t give away too much on social media as it can all be used to build a profile of you. Be aware of privacy settings and know exactly what you are sharing and what someone could do with that information.
While it might look a lot when reading it on the page, these five simple steps to protect your computer from viruses and malware will take less than an hour to set up and only a few minutes each week to manage. Considering the damage that can be done if you don’t protect yourself, I think that is time well spent. Remember, if you need help with any aspect of computing or IT, the team here at Dave’s Computers are ready to help. Contact us if you need us!

Related Posts

Dave's Computer Repair Blog – How to tell whether a computer issue is hardware or software part 1. This is part 1 of a three part series on computer troubleshooting. We are going to tackle how to whether a computer issue is hardware or software. Part 2 will be published in a few days’ time and part 3 a few days after that. Look out for it on Dave’s Computers! Computers are complex machines and any number of things can go wrong with them. As reliable as they may be for the majority of the time, there will always be exceptions. But if something is going wrong with your computer, how do you know whether the problem is with hardware or software? Sometimes it’s easy. If the computer won’t even start, chances are it’s the power supply or processor. If the computer makes lots of beeping noises before is shuts down it could be overheating or suffering a memory error. If the computer starts but nothing appears on screen, it could be your graphics processor. More often, the answer is actually quite difficult to pin down. Fortunately, there are a few things you can do to tell whether a computer issue is hardware or software. Here are some of the steps the computer repair technicians at Dave’s Computers would take to find out. Check the symptoms – Is the computer slow? Will it boot? Does it blue screen? Make funny noises? Not start at all? The very first step in troubleshooting a computer is to find out exactly what is going on. It can often tell us precisely where and what the issue is. If you’re not in a position to tell us, we would test to find out ourselves. Isolate any recent changes – We would also ask you if you have made any recent changes to your computer before the problem started. Have you added hardware? Updated drivers? Made any other changes? This can often tell us immediately what the problem could be. We would then reverse or undo those changes to see if it fixes the problem. Nine times out of ten it does. Boot into Safe Mode – We would boot Windows into Safe Mode to see if we can replicate or avoid the symptoms you describe. If the computer works fine in Safe Mode it means it’s a software issue and we have a repertoire of tools and techniques to overcome that. If the symptoms persist, it could be core Windows files or hardware. From within Safe Mode we would perform file checks and repairs to see if we can fix the issue from within Windows. If the issue looks to be hardware, we would check that too by swapping out components with our own working spares to see if the symptoms persist or not. Join us in a couple days for part 2 of How to tell whether a computer issue is hardware or software!

Related Posts

Dave's Computer Repair Blog – Top computer security tips for home users Of all the computer subjects we read about in the media, security is usually top of the agenda. For longer than I can remember, computer users have had to protect their networks and their computers from hacking, viruses and malware. So we were surprised when a customer came into our Hillsborough computer store with absolutely no knowledge of how to protect their computer. That got us thinking about network and computer security and we wrote two posts on the subject. This first post, protecting your computer and the second, protecting your home network. They contain the essentials for keeping yourself safe while connected to the internet.

Computer security tips

Protecting your computer doesn’t have to cost a dime. It is entirely possible to protect your computer by using entirely free software products. That does not include Microsoft Security Essentials. Even though it comes bundled with Windows, it isn’t capable of adequately protecting you from external threats. What you need is: 1.    A software firewall 2.    An antivirus product 3.    A malware scanner All of these products are available free from reputable vendors. Paying for more feature-rich versions is purely optional.

A software firewall

A firewall sits between your computer and the internet and inspects al traffic that flows between them. It looks for hack attacks and traffic that says it is something it is not. It also analyzes traffic looking for applications accessing the internet that shouldn’t be in case you are being, or have been, hacked.

An antivirus product

Antivirus is another essential computer security application that helps keep you safe. Good ones will keep watch over everything that happens on your computer and ensures nothing untoward goes on that you are not aware of. They use virus signatures which shows them what a virus looks like and compares files on your computer to those signatures to make a detection.

A malware scanner

Malware scanners are optional but very useful as another layer of defense. They can often pick up things antivirus products miss so it’s worth running a malware scan on a weekly basis if you’re a heavy internet user. Like antivirus, malware scanners use signatures of known viruses plus some behavioral stuff to detect malicious code.

Important note on computer security

These products are very effective at protecting your computer but they must be allowed to automatically update themselves and be working 24/7 or whenever your computer is switched on. Check them periodically to make sure they are running the latest version and haven’t been inadvertently disabled. If you do use a third-party firewall and antivirus, switch the Windows versions off so they don’t conflict. Do that in Control Panel, System and Security. Then select Windows Firewall and disable. Do the same for Windows Defender. To find free security products, just search for ‘best free antivirus’ or ‘best free software firewall’. There are literally millions of pages out there on the subject. Select a reputable source and follow their recommendation. Visit again tomorrow as we continue with ‘Top network security tips for home and business’! Thank you for reading Dave's Computer Repair Blog, if you ever need computer repair or data recovery assistance give us a call or fill out the contact form on the bottom right of the website.

Related Posts

📞 Call Dave's — 908-428-9558