NEARBY COMPUTER SERVICES:
- Henry at VDO – makes house calls! Space 958, phone 480-357-7162
- S.O.S. Computer Services – 480 218-4960, 3820 E. Main Street, Suite 3, Mesa, AZ 85205 www.mesasos.com
- SoftQue Premier Computer Services – 480 832-4600, 801 S. Power Road, Suite 108, Mesa, AZ 85206 www.softque.com
OLD COMPUTER EQUIPMENT DISPOSAL
- No equipment donations accepted at the PC Room – absolutely DO NOT leave donations at the door!
- If you have old printers, computers or other electronic devices, we encourage you to donate to “Students Recycling Used Technology” – www.AZStRUT.org
- Two drop-off points are: Red Mountain High School, 7301 Brown Road (just east of Power Road), phone 480-472-8000 or Batteries Plus Bulbs, 1145 S. Power, Suite 102, Mesa, AZ, phone 480-654-3870
- 5 THINGS TO DO – As soon as you purchase a new computer
- SIMPLE COMPUTER JARGON – Definition for common internet terms
- DONATING YOUR COMPUTER – Before you give away or donate an older machine, be sure to follow these five steps first.
- WHY DO INSTALL PROGRAMS ASK YOU TO CLOSE EVERYTHING FIRST – When installing software, here’s why you should close down all running applications.
- 7 REASONS WHY COMPUTERS RUN SLOWER AS THEY GET OLDER – Unfortunately as the computer got older, problems started occurring. Crashes became more frequent, web pages took longer to load, games appeared slightly jerky, and the overall computing experience lost its luster. Why did this happen?
- HOW TO CONSERVE AND CONTROL DATA USAGE USING YOUR INTERNET CONNECTION – Tips for conserving your “limited” data plan.
- UNDERSTANDING E-MAIL CLIENTS – The main difference between e-mail clients is the user interface. Regardless of which software you decide to use, follow good security practices when reading or sending e-mail.
- BENEFITS OF BCC – Although in many situations it may be appropriate to list e-mail recpients in the To: or CC: fields, sometimes using the BCC: field may be the most desirable option.
- USE CAUTION WITH E-MAIL ATTACHMENTS – While e-mail attachments are a popular and convenient way to send documents, they are also a common source of viruses.
- REDUCING SPAM – Spam is a common, and often frustrating, side effect to having an e-mail account. Although you will probably not be able to eliminate it, there are ways to reduce it.
- EMAIL TIPS – Three page PDF with tips on e-mail etiquette.
- HOW TO USE A FLASH DRIVE – Two page PDF on the proper use of USB drives.
- USB FLASH DRIVES – THE FULL STORY – Two page PDF on what to look for when shopping for a USB drive.
- DIFFERENT TYPES OF FLASH DRIVES – Three page PDF on the many faces of a USB drive.
- TRANSFERRING PHOTOS WITH A FLASH DRIVE – One page PDF on transferring photos with a flash drive. A guide for getting photos from the computers in the PC room of the photographs taken at VDO’s various events to your flash drive.
SECURITY AND SAFE COMPUTING
- UNDERSTANDING ANTI-VIRUS SOFTWARE – Anti-virus software can identify and block many viruses before they can infect your computer. Once you install anti-virus software, it is important to keep it up-to-date.
- WHAT IS https: – Explains the difference between http: and https: for secure internet communications.
- EFFECTIVELY ERASING FILES – Think that your files are gone when you delete them. Read this article to really remove files of private information.
- PROTECTING YOUR PRIVACY – Before submitting your e-mail address or other personal information online, you need to be sure that the privacy of that information will be protected.
- GOOD SECURITY HABITS – There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
- SECURING WIRELESS NETWORKS – Because wireless networks do not require a wire between a computer and the Internet connection, it is possible for attackers who are within range to hijack or intercept an unprotected connection.
- CHOOSING & PROTECTING PASSWORDS – By choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.
- UNDERSTANDING FIREWALLS – When anyone or anything can access your computer at any time, your computer is more susceptible to being attacked. You can restrict outside access to your computer and the information on it with a firewall.
- RECOGNIZING AND AVOIDING SPYWARE – Because of its popularity, the Internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent.