Did you know 90% of most computer problems can be resolved by safely
rebooting your system. However, if this does not work, see if your
question can be answered by our knowledge base.
What is Spyware?
Spyware is a generic term for ad-ware and malware.
You can find more information reading our article on Spyware.
Click here to visit.
What is SPAM?
Spam is unsolicited
"junk" e-mail sent to large numbers of people to promote products or
services. Sexually explicit unsolicited e-mail is called "porn spam."
Also refers to inappropriate promotional or commercial postings to
discussion groups or bulletin boards. You can find more information
reading our article on SPAM.
Click here to visit.
Should I have a firewall?
Today, all systems are vulnerable to outside
intrusion. To repair a system that has been infected by Spyware is
costly; not-to-mention the downtime you may experience. Therefore, it is
recommend every system – home and office – have protection.
What is web mail?
This is the term used
to differentiate formatted Internet e-mail sent via a web form from
unformatted Internet e-mail known as public e-mail.
What is the
difference between web form e-mail and public e-mail?
Web form is a form on a
web site that enables visitors to communicate with the host by filling
in the fields and submitting the information. E-mail received via a web
form is formatted ensuring that certain information (mane, address,
e-mail address, etc.) is included. Formatted e-mail also makes it easier
for other software programs to process the email. Web form e-mail is
often used on web sites that require forms to be filled out or e-mailing
companies for technical support.
Public e-mail is the
term used to differentiate unformatted Internet e-mail from the
formatted Internet e-mail via a web form. This is the e-mail most users
are used to. It is sent to an e-mail box using any e-mail editor
(Eudora, Microsoft Outlook and Outlook Express, Netscape, etc.) a person
has on his or her computer.
What is web based
Web-based free e-mail system which
adheres to the universal HTTP standard. It is based on the premise that
e-mail access should be easy and possible from any computer connected to
the World Wide Web. Web-based e-mail programs use a Web browser as an
e-mail program, providing a globally retrievable form of e-mail.
Most commonly used web-based e-mail systems are Yahoo and Hotmail.
Is my web-based
e-mail saved or backed-up?
The advantage of
web-based e-mail is that it is available from any computer with Internet
access. However, the amount of e-mail you can receive or store is
dependent on the amount of space you have available through the service.
The services such as, Yahoo or Hotmail can prohibit or remove your
e-mail if you have exceeded your storage limit. Also, unlike e-mail
editors (Eudora, Microsoft Outlook and Express, Netscape, etc.) stored
locally on your computer, you will not have a record of e-mails sent
unless you specifically elect to store this information. For permanent
storage of e-mails and attachments received through a web-based service,
e-mails and attachments must be transferred/saved to your local computer.
What causes a website to not function properly?
If you are visiting a
website and all of the features do not work correctly, or you are unable
to access some pages it may be due to your inactive system files,
firewall or corrupted cookies. Many problems can resolved by rebooting
your system. If you still experience difficulties clean out your
Temporary Internet Directory by going to Internet Options. You can
access Internet Options through your browser by clicking Tools on your
tool bar, then Internet Options. Or, you can go to START -> SETTINGS ->
CONTROL PANEL -> INTERNET OPTIONS. From the Internet Options Window,
delete cookies and clean out the temporary directory and reboot your
If this does not
resolve the problem, try disabling your software firewall. Usually, this
can be done by right-clicking the firewall icon in the task bar (bottom
right-hand corner) and selecting disable. If prompted "are you sure you
want to disable", click yes.
How do I protect my system from intrusions?
One of the largest problems plaguing the technology
industry and end-users is the epidemic of unwanted intrusions –
Trojan’s, Worms, Viruses, Ad-Ware, Malware and SPAM. The best defensive
is to protect your system and use common sense.
When you receive an e-mail with an attachment, do
not open it unless you know it to be virus free. Be aware that even if
the e-mail address is from someone you know, it may not be real. Next,
always have an antivirus program running and checking your emails and
internet activities. Finally, install a firewall. This could be software
or hardware based. As with any protection measures, these tools are only
effective if continuously running and updated.
Should I upgrade or purchase new?
That all depends on the age of your system and
computer needs. You can find more information by reading our article on
hardware upgrades. Click here to
Should I backup my system?
The first thing to remember is your computer is a
machine. Thus, it has the potential to breakdown or be infected with
Spyware that prevents it from functioning properly. Also, systems are
vulnerable to fire and weather hazards.
In today’s society, computers are very much a
integral part of our lives. Businesses and personal users depend on them
to store and retrieve information. Therefore, if your data is something
you could not live without, it is recommend that you back up your data on a
There are many ways to backup your system. However,
the backup system is only good if it works when your primary system
fails. Therefore, not only backup up your system, but test the backup to
be sure you can recover the data. If you need help designing and
implementing a backup system for your home or office, please
Should employee’s Internet usage be monitored?
The answer would depend on the organizational
culture. As a general rule, most business owners do not monitor their
employee’s computer usage. However, employers are responsible and liable
to protect their employees from unwanted exposure to questionable
Legally, the owner has a right to monitor e-mail
and Internet use by an employee because there is no reasonable
expectation of privacy. Thus, it is an business owner’s discretion to
implement monitoring tools. However, if the owner does install
monitoring tools, they must inform all employees of this company
policy. If you need assistance on monitoring policies and
Should I monitor my children’s computer
This is a difficult parental decision. One may
consider this spying on your child. However, consider that intruders can
gain access to your system and to your child without their knowledge or
permission. Therefore, this is personal decision. However, if you need
additional information or would like our assistance on this matter,
please contact us.
Are wireless networks safe?
Actually, many end-users install their own wireless
home networks without realizing they are opening their systems up to
intruders. It is like leaving your house without locking the door –
someone may or may not come in. In general, wireless networks can be
safe if you put a “lock” on your system. When installing a wireless
network, be sure to set the security parameters and change the password
to your wireless router.
What can I do if I cannot browse the Internet?
Most Internet access problems can be resolved by
resetting your service provider’s modem and rebooting your system. First
shut down all your hardware and network services (router, switches,
etc.). After approximately one minute, power up your service provider’s
modem. After it is completely up and functioning (all lights are green),
boot up your middleware and computer. If this does not resolve the
problem and your provider states all their systems are functioning, you
most likely have a virus or Spyware on your system preventing your
browser from accessing the Internet.
What do I do if my e-mail can receive messages,
but it will not send messages out?
Currently, many providers are reconfiguring their
networks to slow down SPAM activities. As such, they are shutting down
ports that indicate they are used for SPAM purposes. Your SMTP may be
linked to one of these ports. To resolve this problem, be sure your SMTP
is set to your service provider’s server. For additional information
contact your service provider.
What is SMTP?
Simple Mail Transfer
Protocol (SMTP). The Internet standard protocol for transferring
electronic mail messages from one computer to another. SMTP specifies
how two mail systems interact and the format of control messages they
exchange to transfer mail.
What is an IPOD?
IPOD is a digital music player by Apple that will
work in Mac and Windows environments. Primarily, it allows individuals
to transfer digital music from their computers to the player. But, the
IPOD is also much more offering calendar, contact management, and other
nice features. For more information visit Apple’s website at
What is Freeware?
Freeware is a form of
software distribution where the author retains copyright of the
software, but makes the program available to others at no cost. Freeware
is often distributed on bulletin boards, or through user groups. The
program may not be resold or distributed by others for profit. However
be cautious when downloading and installing freeware; often these
programs have spyware attached to the application. If you install
freeware, read all instructions carefully - know what you are getting.
What is Shareware?
Shareware is software that is openly distributed, but requires users
to pay a modest registration fee to the author
What is an e-card?
(e-cards) are digital versions of paper cards sent for birthdays,
holidays, special occasions, etc. They are electronic postcards sent to
family and friends via your e-mail or through a web based form service.
Some web sites offer free e-cards; while others are an annual paid
Are e-cards safe?
Yes and No. Users
should apply best Internet practices when sending and receiving
e-cards. If using a free site, most likely Spyware will be attached or
worse a virus. If using a fee based service, generally they are virus
free and ad-ware free.
Is it safe and legal to download music for free?
The rule of thumb is “nothing is for free”. If you
download any songs using a free service, chances are you will have
Spyware loaded on your system. Also, if you do not have a firewall, your
system is vulnerable to outside sources. Currently, the sites running
for free music downloads are legal, but this may change in the near
If you do download music,
it is recommend to run
Spyware removal applications immediately afterwards. Alternatively, you
can pay a reasonable membership fee that will turn off ad-ware
downloads. This site offers freeware applications for your use. Click
here to download