A sad day for our community

Blog 16.8.2012 Comments Off on A sad day for our community

We just got an email from one of our brethren small business owners informing us that they were permanently going out of business. This is a sad day because they were an amazing restaurant that KNEW their customers, made daily specials, and were involved with the community. You wouldn’t get that with a national chain…

Read More

Vinyl Records and Casette Tapes making a comeback???

Blog 15.8.2012 Comments Off on Vinyl Records and Casette Tapes making a comeback???

Over the last few years, there have been countless stories about the supposed “return” of vinyl, as people have actually been buying more vinyl records and we are seeing them pop up in stores like Fry’s Electronics. It still a tiny part of the market, but it has continued to grow over the past few…

Read More

Yahoo/SBC/ATT Mail Phishing Scam (Yes it’s back)

Blog, Windows Support 8.8.2012 Comments Off on Yahoo/SBC/ATT Mail Phishing Scam (Yes it’s back)

This is an oldie but a goodie that’s starting to rear it’s ugly head again… We just had a client leave who fell prey to a phishing (email) scam saying it was from Yahoo and needing to confirm his information including password. NO company will EVER ask you for a password. This is a fake,…

Read More

Computer Security Threats 101

Blog 4.8.2012 Comments Off on Computer Security Threats 101

Computer security threats are no longer limited to big companies with hundreds of employees. In fact, they’re not limited to companies at all. Even if all you have is one PC and a dial-up connection to AOL you’re vulnerable to attacks that range from viruses to trojan horses to a new style of con game…

Read More

Computer Security Threats: Hacking & Phishing

Blog 4.8.2012 Comments Off on Computer Security Threats: Hacking & Phishing

No, we’re not taking about baiting the hook while you have a bad cold. Hacking and Phishing are two very different types of computer security threats. Hacking is an extremely high tech attack which requires you to take certain precautions to protect your computer and all of the data which is stored in it. Phishing,…

Read More

Protect your identity 101

Blog 4.8.2012 Comments Off on Protect your identity 101

In order to protect yourself against identity theft, it’s important to understand the many methods fraudsters employ. Low-tech and high-tech, in your neighborhood or on the other side of the globe, identity thieves operate in a wide variety of ways. These include – but are certainly not limited to – the following: Rifling through your…

Read More

Windows 7 God Mode?

Blog, Windows Support 3.8.2012 Comments Off on Windows 7 God Mode?

Anyone unsure of a particular setting, please use at your own risk. Certain changes that you make to your Windows operating system can render it unusable or unstable. Know how to use system restore. Having said that, please read on 🙂 As groovy as Windows 7 is to use, let’s face it — we always…

Read More

Windows Command Line Tips That You Should Check Out

Blog, Windows Support 3.8.2012 Comments Off on Windows Command Line Tips That You Should Check Out

Linux geeks are proud of their command line prowess and generally have some tricks up their sleeves. While the Windows command line is not considered as powerful as a Linux’s, here are some Windows command line tips and tricks not everyone might know about. Drag and drop files for a full path Tired of typing…

Read More

How tablets & smartphones are affecting business

Blog, Mobile Users, Windows Support 1.8.2012 Comments Off on How tablets & smartphones are affecting business

Very good information about the growth in the use of tablets & smartphones in Business. John Golden talks about the benefits of tablets & smartphones and how they are affecting businesses of all sizes across the globe.

Read More

Fun iPhone Tricks

Blog, Mac Support, Mobile Users 31.7.2012 Comments Off on Fun iPhone Tricks

As the years go by and we see more iterations of Apple’s famed iOS ecosystem, we (the users) are still in awe of the myriad iPhone tweaks that can be found buried beneath the surface with a bit of digging.  Let’s have a look at some new and fun hacks we’ve found recently: Enable “Emoji”…

Read More