- 5 THINGS TO DO – As soon as you purchase a new computer
- SIMPLE COMPUTER JARGON – Definition for common internet terms
- DONATING YOUR COMPUTER – Before you give away or donate an older machine, be sure to follow these five steps first.
- WHY DO INSTALL PROGRAMS ASK YOU TO CLOSE EVERYTHING FIRST – When installing software, here’s why you should close down all running applications.
- 7 REASONS WHY COMPUTERS RUN SLOWER AS THEY GET OLDER – Unfortunately as the computer got older, problems started occurring. Crashes became more frequent, web pages took longer to load, games appeared slightly jerky, and the overall computing experience lost its luster. Why did this happen?
- Converting to Windows 10?
Microsoft released Windows 10 for public use in July 2015 and announced that home users could convert for free until July 2016. You should invest some time to read and consider the preparation and possible concerns before proceeding with a conversion. While at VDO, you need a private unlimited source of internet such as Wydebeam, or a strong Ethernet connection such as in the new internet café, before proceeding with an upgrade. Please read the following articles to guide you through the considerations whether to convert, and how to prepare for the upgrade.
- SHOULD I UPGRADE TO WINDOWS 10 – Addresses software and hardware considerations
- SIX MANDATORY STEPS TO PREPARE FOR WINDOWS 10 CONVERSION – Including absolutely essential backup of your records to a portable hard drive
- INFOWORLD “DEEPDIVE” REVIEW OF WINDOWS 10 – This is a lengthy but thoughtful review of the pro’s and con’s of Windows 10 features
In general, if you have a Windows 7 computer that is 3+ years old and you are reasonably satisfied with using Windows 7, you may find it more comfortable to continue using your Windows 7 machine until you are ready to replace that machine. If you have a Windows 8 or 8.1 computer that is less than 3 years old, you may find that getting rid of some of the Windows 8 navigation annoyances is worth the effort of conversion and experiencing change.
- HOW TO CONSERVE AND CONTROL DATA USAGE USING YOUR INTERNET CONNECTION – Tips for conserving your “limited” data plan.
- UNDERSTANDING E-MAIL CLIENTS – The main difference between e-mail clients is the user interface. Regardless of which software you decide to use, follow good security practices when reading or sending e-mail.
- BENEFITS OF BCC – Although in many situations it may be appropriate to list e-mail recpients in the To: or CC: fields, sometimes using the BCC: field may be the most desirable option.
- USE CAUTION WITH E-MAIL ATTACHMENTS – While e-mail attachments are a popular and convenient way to send documents, they are also a common source of viruses.
- REDUCING SPAM – Spam is a common, and often frustrating, side effect to having an e-mail account. Although you will probably not be able to eliminate it, there are ways to reduce it.
- EMAIL TIPS – Three page PDF with tips on e-mail etiquette.
- HOW TO USE A FLASH DRIVE – Two page PDF on the proper use of USB drives.
- USB FLASH DRIVES – THE FULL STORY – Two page PDF on what to look for when shopping for a USB drive.
- DIFFERENT TYPES OF FLASH DRIVES – Three page PDF on the many faces of a USB drive.
- TRANSFERRING PHOTOS WITH A FLASH DRIVE – One page PDF on transferring photos with a flash drive. A guide for getting photos from the computers in the PC room of the photographs taken at VDO’s various events to your flash drive.
SECURITY AND SAFE COMPUTING
- UNDERSTANDING ANTI-VIRUS SOFTWARE – Anti-virus software can identify and block many viruses before they can infect your computer. Once you install anti-virus software, it is important to keep it up-to-date.
- WHAT IS https: – Explains the difference between http: and https: for secure internet communications.
- EFFECTIVELY ERASING FILES – Think that your files are gone when you delete them. Read this article to really remove files of private information.
- PROTECTING YOUR PRIVACY – Before submitting your e-mail address or other personal information online, you need to be sure that the privacy of that information will be protected.
- GOOD SECURITY HABITS – There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
- SECURING WIRELESS NETWORKS – Because wireless networks do not require a wire between a computer and the Internet connection, it is possible for attackers who are within range to hijack or intercept an unprotected connection.
- CHOOSING & PROTECTING PASSWORDS – By choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.
- UNDERSTANDING FIREWALLS – When anyone or anything can access your computer at any time, your computer is more susceptible to being attacked. You can restrict outside access to your computer and the information on it with a firewall.
- RECOGNIZING AND AVOIDING SPYWARE – Because of its popularity, the Internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent.