SECHOTECH, LLC - Computer & Laser Printer Services

  • CLOSED
  • Newsletter

Home Tip-of-the-Month "How to Setup Two Monitors On Your Computer"

11/30/2011

0 Comments

 
Picture
_
It often times becomes necessary to have more computer monitor space.  One way to increase your amount of screen space is to buy an inexpensive second monitor or make use of an old monitor and connect it to your computer (if you're using Windows 7, Windows Vista, or Windows XP)—allowing for more free screen space in which you can work.


Dual Monitor Setup Checklist
  • Two or more monitors (one, if you’re setting up a laptop), which may be of any combination including the following: flat-panel LCD monitors, CRT monitors, one of each, or even a TV screen as a monitor.  If you are going to buy a monitor consider the following:
    • Picture quality
    • Screen size
    • Screen resolution
    • Compatibility with your computer port
    • Higher contrast ratio
    • Color richness
  • Two monitor cables that match the connection types of your computer to connect the monitors to the computer (one for a laptop).
  • A monitor connection on your computer for each monitor you want to connect such as the following:
    • Digital Visual Interface (DVI) connectors
    • Video Graphics Array (VGA) connectors
    • HDMI (High Definition Multimedia Interface) connectors
    • S-Video connectors for using your TV as a monitor

Picture
_
Connecting of Monitor Cables

Make sure the monitor is plugged in and turned on. Your computer should automatically detect the second monitor.  If you’re using Windows XP, you’ll need to enable Dualview.
When your computer detects the monitor, it should also automatically detect and apply the display settings appropriate for the monitor.

Configure your displays

If necessary, you can drag the monitor icons so that they are arranged in the same way as the monitors on your desk. Click Identify to verify which monitor is 1 and which monitor is 2. You’ll see the numbers appear on your monitors.

Under Multiple displays, you can also adjust what you see on the second monitor. You have the following choices:

  • Extend your displays. This spreads your desktop over both monitors and lets you drag items between the two screens.  After your monitor is set up, you can use your mouse to grab the title bar (the top portion) of a window and drag it to your new display.
     
  • Duplicate your displays. This displays the same desktop on both monitors. For a laptop, this is the default setting. This is useful if you're giving a presentation with your laptop connected to a projector or large monitor.
     
  • Show your desktop on only one monitor. This is most commonly used with a laptop if you want to keep your laptop screen blank after you connect to a large desktop monitor.
When you disconnect the additional monitor the following occurs:

  • Original display settings are restored to your primary display
  • All open files and program windows are moved to the primary display
The next time that you connect the same monitor, the Windows operating system automatically applies the display settings that you used the last time that you connected this monitor.

Want more tips like these? Subscribe, it's free!
0 Comments

Safe Computing Practices. Part 4.

9/29/2011

0 Comments

 
Avoid Being Hacked

Hacking is a major issue, and hackers use many tricks in an attempt to access your data. There are steps you can take to protect yourself and your data from the most common hacking methods.

Anti-virus software (Norton, McAfee, Sophos, etc.)
  • One of the most important steps you can take is to run an anti-virus program.  If cost is a concern, there are free anti-virus programs such as AVG http://free.grisoft.com/freeweb.php/doc/1/ or Microsoft's Security Essentials http://www.microsoft.com/en-us/security_essentials/default.aspx You must make sure that you keep your anti-virus program updated by downloading the latest virus definitions. It is important to remember that you should only run one anti-virus program on any given computer.
SPAM
  • Most spam will not cause harm, however the best practice is to delete emails from unknown sources and those with attachments. If you reply or attempt to unsubscribe, this will confirm to the spammer that your account is active and in use.
Anti-spyware
  • "Malware" or "spyware" are terms used to describe malicious software that can be used to cause denial of service attacks or harvest sensitive data (credit card numbers, etc.) from your computer. These programs can cause you to receive pop-up ads and/or track your web surfing habits. Attachments can be harmful to your computer and can carry malicious viruses and malware. There are tools available, such as Spybot Search and Destroy or Ad-Aware, that scan your computer and identify malware and other harmful items. Once found, these programs give you the option to delete the items. These programs also need to be updated so that you have the most current versions.
Patches, security updates, etc.
  • Virus writers and hackers will exploit holes in programs to gain access to your computer. To keep your computer up to date with the latest security fixes and patches, visit http://update.microsoft.com/microsoftupdate on a routine basis. If are you running an Apple or Linux machine, be sure to check routinely for updates also.
0 Comments

Safe Computing Practices. Part 3.

9/18/2011

0 Comments

 
Securing Your Computer and Personal Information
  • Passwords
    Everyone needs passwords for numerous applications, Web sites, and even to log on to computers. Passwords keep your data from being stolen by others. One of the easiest ways for someone to get to your data is to figure out your password(s). Here are some suggestions for creating a distinct password:
    • Make your password at least 7 characters long.
    • Include letters, numbers, and special characters such as @ or $.
    • Do not use information relevant to you such as names of relatives, pets, or special dates like birthdays and anniversaries.
    • Change your password every 3 to 6 months.
    • Do not write down your password. Memorize it.
    • Do not give your password to anyone. If you give your password to another person, you may be held responsible for any actions they commit. 
  • Protecting Your Data
    At some point, you have probably lost a document that you really needed. It is a good idea to make back-ups of your data from time to time in case you have the misfortune of losing a document. There are several ways you can do this without spending much time, effort, or money:
    • Backup to CD or DVD
      If you have a CD or DVD burner, you can make backups of your data. This is a quick, easy, and cheap way to save your files.
    • Backup to Network Share (Z: Drive)
      If you have a server or a network drive, you can store documents on your computer and also back them up to your network drive. This will store your documents in two separate locations.
    • Backup to Removable Media
      You can store documents on removable media such as USB drives (also known as thumb drives, flash drives, etc.) as a backup solution. These are good places to store your data, and since they are portable, you can take your data with you.
  • When Not In Use
    If you have to step away from your computer for a short period of time or if you are finished for the day, make sure that you secure the computer. There are three ways to do this:
    • Log off
      Logging off of your computer is especially important in public areas such as coffee shops, libraries, schools, etc. Logging off prevents anyone from using the computer under your username.
    • Lock your computer
      When you are leaving your computer for a short period of time, locking the computer will keep someone else from using it. To carry out this function press CTRL-ALT-DEL and click the "Lock Computer" button. This option is not available in the Winthrop computer labs.
    • Turn off your computer
      Turning off the computer is the most secure way to prevent unauthorized access. If the computer is not on, no one will be able to connect to it remotely and carry out any malicious actions.
  • Identify Theft
    You should adopt sound practices when using email and other forms of communication on your computer to protect yourself from identity theft. Never give out personal information such as your social security number, bank account numbers, or passwords. You are strongly advised against providing other personal information such as your home address and phone number.
0 Comments

Safe Computing Practices. Part 2.

9/8/2011

0 Comments

 
Downloading Content

Knowing how to use your computer responsibly is important to protect both yourself and those arround you. P2P or peer-to-peer programs have made news recently across the nation. Suits are being filed against users regarding illegal activity such as improper music downloads. We strongly suggests that you do not use peer-to-peer programs.

Always respect copyright laws.  This includes printed and digital material.  Do not engage in illicit music, video, or movie downloads.  Please be aware that the infringement of copyrighted music, videos, or movies can be punished by up to five years in prison and $250,000 in fines. Repeat offenders can be imprisoned up to ten years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright.

Also, please be advised that all telecoms and internet providers will notify the appropriate authorities whenever requests are made by the Recording Industry Association of America or any other legitimate enforcement or monitoring entity.

0 Comments

Safe Computing Practices. Part 1.

9/1/2011

1 Comment

 
Social Networking (Facebook, MySpace, etc.)
Social networking through the use of such services as Facebook have become part of everyday life for many of us. These types of networks can be used to find others with common interests, share personal information, and communicate with friends. While cyber communities can be used in positive ways, it is important to use common sense and keep several key thoughts in mind:
  • The information you place online can influence your future. Pictures that may demonstrate behaviors that are questionable or suggestive can be viewed by anyone on the Internet, including possible future employers. There have been instances where graduates have had their Facebook page called up during the interview process.
  • Making your information private does not mean that others are unable to view the material. Hackers have many tricks that enable them to view what is thought by you to be off limits. You should also remember that pictures or other information posted for a short period of time and then removed by you may have been downloaded by others and exist in cyberspace for years to come.
  • Be safe. Use common sense when entering information on Web sites. There is the illusion that your information is there for only your friends to view but realize that your information can be passed on to others that may not have your well being in mind. It is strongly suggested that you do not post information such as phone numbers or your place of residence.
  • Think about how you represent yourself and others. It is not only important to take note of what you say about yourself online but equally important are the comments you make about others. You do not want to face alleged violations that claim inappropriate behavior on your part.

1 Comment

Closing

8/27/2011

0 Comments

 
Due to Hurricane Irene hitting our area, SechoTech will remain closed from Saturday 8/27 through Monday 8/29.

Normal business operations will resume on Tuesday 8/28 or as soon as it is allowed by the authorities.

At this time we would like to thank you all for the support and hope everyone will remain safe throughout the weekend.

Please be safe.

*For those interested, we will be streaming live footage of Hurricane Irene from Whitestone, NY. Please follow the link below to access the live streaming.

http://www.ustream.tv/channel/weather-track


0 Comments

Business Computing Tip-of-the-Month: "Optimizing Battery Power on Your Laptop"

8/16/2011

0 Comments

 
Picture
The most basic step you can take to prevent power loss on your mobile PC is to invest in a high quality battery and always keep a spare on hand. Splurging on a quality battery and spare can save you from hours of lost access to your mobile PC.

Battery Care

Once you've invested in a good battery, you need to take care of it. To clean your battery contacts, first turn off and unplug your mobile PC. Remove the battery and wipe its metal contacts and its contacts inside the device with a cotton swab dipped in rubbing alcohol. Let dry completely before reinstalling and reconnecting to a power source. Repeat every two to three months.

Modern lithium ion batteries can be recharged and partially discharged time and time again, but you should never fully discharge them. Nickel-metal hydride (NiMH) batteries common to older laptops should be completely drained and recharged every one to three months.

After mastering the basics of battery care, make sure you are utilizing your mobile PC's built in energy saving features.

Optimize Your Power Settings

The hard disk and display on your mobile PC consume the most battery power. Choose a power plan, referred to as a power scheme in Windows XP, to reduce the use of power-hungry functions and lessen screen brightness.

Utilize the following battery-saving states:
  • Sleep or Standby

    In a sleep state, your hard disk and display turn off, and all open programs and files are saved in Random Access Memory. In case of a crash or power loss, save your work before placing your system in sleep mode. Your mobile PC should wake up quickly from sleep, and your desktop and files should appear just as you left them.

  • Hibernation

    When your computer hibernates, it saves everything to its hard disk before shutting down. When you restart, your desktop should be restored exactly as you left it. Hibernation takes a bit longer to wake up from than sleep, but it uses less power.
Further Tips for Lowering Your Energy Use:
  • Turn off your wireless device when you're not connected to a wireless network but you're using your mobile PC.

  • Turn off scheduled tasks.

  • Keep the use of tools in the notification bar minimal.

  • Limit power-intensive activities such as gaming, watching a DVD or listening to a CD.

  • Reduce power consumption by adding memory (RAM) to your mobile PC.

0 Comments

Home Computing Tip-of-the-month: "Tips for Printing Beautiful Digital Photos"

8/16/2011

1 Comment

 
Picture
Recent technology has made printing high-quality digital photos from your home computer a simple, inexpensive process. Using a basic inkjet printer and the following tips, you can easily transform your amateur shots into professional-looking photo albums, wall art or gifts for your loved ones.

Photo Resolution

Higher resolutions photos will produce better prints. However, resolution cannot be increased once the photo is snapped, so set your camera to the highest resolution possible. You can always reduce the size later. If you plan to print a photo that is less than 5x7 inches, 3 megapixels is sufficient. Larger photos require at least 5 megapixels.

Photo Editing

It is rare to capture a perfect image, so you may need to engage the services of photo editing software to enhance the photo quality. Free programs, such as Windows Live Photo Gallery for Windows 7 or Windows Photo Gallery for Windows Vista, allow you to apply a multitude of effects, including removing red eyes, balancing light and color, softening edges, rotating image orientation and cropping out unwanted elements.

Printer Settings

If you will be regularly printing photos at home, it is crucial that you purchase a quality machine capable of producing high dots per inch (dpi). Look for a printer that offers at least 600 dpi to produce vivid, crisp, finely detailed photos. These settings can be adjusted using your desktop computer or on the printer if it is equipped with a menu screen. High dpi settings will increase the amount of ink used and the time it takes to print the photo, so use the lowest quality settings to run a test print, then switch to the highest quality options when you are ready to run your final print.

Photo Quality Paper

Bright white glossy paper produces a vibrant, shiny image that reflects light well. Purchase paper that has a quick-dry surface and is water resistant to avoid bleeding issues. Matte paper is best for black-and-white or sepia colored prints due to its nonreflective coating. It is also less likely to become smudged from fingerprints and dust. Satin paper offers the best of glossy and matte prints, providing a semi-gloss finish that is still rich in color, yet reflects less light and is fingerprint resistant.

Printer Maintenance

Before printing, run the machine's print cartridge cleaning settings to remove any blockages that may have built up in the ink spray nozzles. You should also be able to adjust the machine's alignment and color calibration.


1 Comment

Desktop SlideShow

8/13/2011

0 Comments

 
Windows 7 comes with some very attractive new wallpapers, and it's not always easy to decide which one you like the best. So why not choose a few, and let Windows display them all in a desktop slideshow?

Right-click an empty part of the desktop, select Personalize > Desktop Background, then hold down Ctrl as you click on the images you like. Choose how often you'd like the images to be changed (anything from daily to once every 10 seconds), select Shuffle if you'd like the backgrounds to appear in a random order, then click Save Changes and enjoy the show.
Slideshow
DESKTOP SLIDESHOW: Select multiple background images and Windows will cycle through them
0 Comments

Windows 7 themes change your custom icons?

8/12/2011

0 Comments

 
Windows 7 has some spectacular new themes - there's a great selection at the Microsoft site - but installing them can have one annoying side-effect. If you've previously changed a system icon like Computer or the Recycle Bin then that could disappear, replaced by the equivalent icon from the theme pack.

To prevent this, right-click an empty part of the desktop, select Personalize > Change Desktop Icons, clear the "Allow themes to change desktop icons" box and click OK. Your icons will now be preserved, and the only way to change them will be manually, from the same Desktop Icons dialogue.
Desktop Icons
0 Comments
<<Previous
Forward>>
    Picture

    Tips and Newsletter

    "Advice for using technology better, faster, and smarter"

    Keep up to date in the latest security information and other tips that will help improve your computing.

    join our mailing list
    * indicates required
    Close

    Archives

    October 2013
    May 2013
    February 2013
    March 2012
    January 2012
    November 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    April 2011

    Categories

    All
    Air Flow
    Battery
    Calendar
    Data Breach
    Display
    Documents
    Fake
    Files
    Folders
    Games
    Identity Theft
    Law
    Mac
    Maintenance
    Malware
    Managing
    Meeting
    Office 2010
    Overheating
    Photo
    Photo Sharing
    Play
    Playstation Network
    Power Settings
    Printing
    Promotion
    Ram
    Recover
    Restore
    Rogue
    Security
    Sharing
    Social Network
    Software
    Sony
    Tips
    Troubleshooting
    Upgrade
    Weather
    Windows
    Windows 7

    RSS Feed


    Follow @SechoDB

    SechoTech LLC

    Promote Your Page Too

© Copyright 2011 - SechoTech, LLC