Posted: December 22nd, 2011
The keyboard is filled with plenty of keys we don’t often use, and even more key combinations that we aren’t even aware of. Many of these can call up useful services or perform valuable functions. Here are 10 of the best ones you should commit to memory, as they’ll serve you well when the time comes.
Windows key + F = Search
The following three are very useful, as not all programs allow you to copy or paste data from them in any other way.
CTRL + C = Copy
CTRL + X = Cut
CTRL + V = Paste
[Alt] and [Esc] = Switch between running applications
There’s a running joke with this, where people will tell you that Alt+F4 will accomplish something great, usually in online games. Don’t fall for it; this command will close the current application.
[Alt] and [F4] = Quit active application or close current window
Windows+M = Minimize all open windows
Left ALT + left SHIFT + PRINT SCREEN = Switch High Contrast on and off.
ALT + ENTER = View the properties of the selected item.
And if you need to find out the shortcuts available for a particular window, use this one.
ALT + SPACEBAR = Opens the shortcut menu for the active window.
Happy Shortcutting!
Judy
Softarama team
Posted: December 15th, 2011
Not only are there greater threats out there than ever before, but we’re increasingly putting more and more of our own personal and private information online, on social networking sites such as Facebook, often without even knowing who has access to that information. We’re also entering our personal information and credit card information into more sites than ever, as we turn more often to the internet to purchase even common items.
Sites like Spokeo now collate data on just about every user on every social network they can,
and even augment that information with stuff like satellite images of your house, and give that information away to anyone willing to pay them $40 for it. You should truly only ever post something that is of no consequence to you if anyone else sees it. You now have to assume that anything you put online can and will be seen by anyone, so discretion is the key. Even posting seemingly innocent things like your general travel plans could leave your house open to theft, or your friends the victim of a common scam where they impersonate you and beg for money.
Recent statistics also show that as many as 25-30% of users are being affected by viruses and malware each year, issues which could be serious enough that they lead to a loss of data, or the theft of your banking information and personal identity. Keep yourself well protected while online, and always be aware of links you’re clicking, and sites you’re visiting.
The online realm is fraught with peril, but if you protect yourself adequately and always have an eye on your surroundings and a thought on your privacy, you should have no problems navigating it safely and securely.
Judy
Softarama team
Posted: November 20th, 2011
Many of us have trouble discarding items that are of limited use to us, and this leads to clutter in our homes. This same hoarding mentality is also prevalent on our hard drives, where we continually install programs on a whim, only to rarely use them, if at all. These programs are then left to idle and rot on our hard drives.
It used to be that our hard drives were quite limited in capacity, which gave us greater incentive to remove those useless programs. But with hard drives pushing the terabyte barrier now cheaper and more affordable than ever, the space alone isn’t enough to convince most people to delete.
Space isn’t the only reason to remove unused programs though. Programs can cause conflicts with other programs, which may be difficult to diagnose. Excess programs also clutter your registry with data, which can lead to further conflicts and a slowdown in performance.
You have two main methods of deleting programs. You can go into the program’s folder and find the uninstaller, and run that. An easier way is to go into your control panel and access the add/remove programs function. This will bring up a list of all of your installed programs, making it easy to see them all at a glance, and get rid of them with the press of a button.
So go ahead and delete some of those unused programs. Your computer and hard drive will thank you, and in the event you ever decide you need that program again, you can always simply go ahead and re-install it.
Dave,
Softarama team
Posted: May 22nd, 2011
We know that keeping our software and peripherals updated with the latest drivers is important for them to run properly. We also know how important it is for us to continually purge all the excess junk files and data that accumulate on our system, so it performs at maximum capacity. But how many of us actually consider the hardware itself, the computer tower which houses all of the intricate parts that fuel our ability to play games, surf the web, burn movies to DVD, and much more?
Our towers are often tucked away in shadowy corners of our computer desks where we rarely give them a second thought once set up. While not much can go wrong assuming no accident, one big issue does develop over time, and it’s prevalent no matter where we store our computers, and that is the build-up of dust both inside and outside of the system. This buildup can cause components to overheat, and can lead to slowdowns or outright failure of certain parts.
While it’s easy enough to wipe off the dust on the outside of the computer, particularly the dust covering the vents, you’ll also need to clean out the inside periodically. Firstly, shut down your computer and unplug all of the devices connected to it. You can now safely open the case, which is most often done via the side of the case, or at the back. Remove any screws holding the sides in place, and slide the side out.
Now take a can of compressed air and give your computer a good blasting. Target any dust you see, and pay particular attention to the CPU itself, and well as the internal fans. Alternatively, you can use a non-abrasive material like a cloth to gently clean off the inside of your PC.
Afterwards lock it up tight, get it all hooked back up and turned on, and you’ll have a better performing PC, and one that is safe from the threat of overheating; at least until the next dust storm blows through the house.
Judy
Softarama team
Posted: May 3rd, 2011
We connect to the internet through wi-fi connections at a higher rate than ever, yet despite many of us knowing the security risks of using these networks, we still aren’t taking all the precautions necessary to protect ourselves.
When it comes to using your own wi-fi network at home, you want to make sure of two things: that your data can not be intercepted by others, and that your network can not be accessed by others. The first step to take on both counts is to make sure your network is WPA2 compliant. WPA2 is the latest wi-fi security technology, and completely restricts access to your network, while also encrypting all data transmitted across it. It does require the use of compatible devices though, so only wi-fi certified products that are capable of being added to your setup should be used.
When accessing wi-fi hotspots, you’ll want to restrict your web use to the simplest of tasks, such as basic web viewing. Any function that requires you to access an account should be heavily considered before proceeding. If it’s a simple forum account, or even a free e-mail service, you may not need to be overly protective, but certainly anything related to banking or accessing other sensitive information should be avoided.
By taking these steps you’ll greatly increase your security and minimize your risks while using wi-fi networks both at home and abroad.
Dave
Softarama team
Posted: April 25th, 2011
The Cloud. We’ve been hearing a lot about it lately, but what exactly is it and what does it mean for you? Chances are you’re not sure, especially if your first introduction to the cloud is through those terrible Cloud vs. Claude commercials by Microsoft, which tell us more about how moronic and downright creepy Claude is, than actually telling us anything useful about cloud services.
Well in truth, cloud services can mean many different things, and even though the popularity of the term is just reaching its peak now, cloud services in one form or another have been around since the dawn of the internet. As an example, e-mail services such as Hotmail are considered a cloud service.
Essentially, any service that is performed directly online, on another company’s servers, is considered a cloud service. For individuals, this often means storage of files or data, or running programs through a remote server. These features can be useful for several reasons. In the case of storing files online, it provides you both with an easy way to share those files with friends, and also a backup copy of your files, in the event you lose the originals and don’t have another copy.
In the case of running different programs, you have the benefit of being able to access the program from any device, as opposed to software, which would need to be installed on each device. This is taking on much greater importance in our world of internet connected mobile devices. In addition, it allows you to run programs that would also be difficult for your computer or device to run on its own.
A great example of this type of service is the gaming service Onlive, which lets gamers play any game they want, directly on the Onlive servers, with no installation required. With many games pushing the power of most PC’s to their limits, and taking up scads of hard drive space, this service has been generating an appropriate amount of buzz.
For businesses, this type of service takes on even greater importance. Businesses are often required to maintain large databases and networks, and these often require constant upkeep and scrutiny from a team of IT specialists. The headache of maintaining these massive servers and repositories of bits and bytes cannot be cured with a simple Tylenol. It can however be cured by letting someone else deal with that headache (hopefully they also have Tylenol on the cloud).
Of course, cloud computing does present some of its own issues. One such issue is that should the service experience an outage, or even worse, should the service go completely under, it would leave those users in quite a bind. This has been one of the main reasons cited by gamers about Onlive; the fact that they don’t actually own anything, and it could all be taken away from them at any moment is a large detriment in their eyes.
Security on the cloud is another major issue. If you’re going to be putting personal files, or other important information on the cloud, especially in the case of large companies, you run the risk of that information being breached.
Despite these misgivings, the cloud is the wave of the future, and offers possibilities for just about every web user. So don’t hesitate to look into it and find those cloud services which could be of use to you. That is, unless you want to leave everything in the hands of that rascal Claude!
Dave
Softarama team
Posted: April 1st, 2011
In a recent annual report by Forrester Research detailing the online and offline media consumption habits of Americans, it was revealed that the internet has now caught up to television in terms of viewing time. Despite TV watching actually increasing 5% over the past 5 years, the internet has pulled even thanks to a gargantuan 121% increase over that same time span.
This rise in spent on the internet is not just relegated to the younger generation either. While it’s true that younger users actually use the internet more often than they watch TV, adults and young boomers are also using the internet just as much as they are watching TV.
There are several factors driving this explosive growth in internet usage. The first is probably the fact that broadband connections are now in 30% more homes than they were 5 years ago, which certainly lends to a more speedy, and thus enjoyable, online experience. Computer technology has also gotten much cheaper and more powerful, allowing us to do many things online at once, and run many programs with nary a hitch in performance.
As far as internet activities go, there are several notable areas eating up more of our time. Unsurprisingly, social networking has seen a large increase, with more than twice as many people engaging in it than they did just 3 years ago. The wheels of commerce are also turning faster than ever before online, as 23% more people shop online now as opposed to 3 years ago.
The power and reach of the internet is still just revealing itself, and it will be fun to see where things head in the years to come. This trend will surely continue, as more and more people spend time online and connect to friends and family, and the world at large, through their computer screens and mobile devices.
Dave,
Softarama team.
Posted: March 22nd, 2011
Online, there are plenty of simple things you can do to stop identity thieves in their tracks. Most of these are simple, common-sense steps.
When you select your passwords for websites that could give up your information, such as your bank, your school, or your email, choose something that nobody could guess. Pets’ names are notorious obvious, and far too easy for a potential thief to figure out. Choose something obscure, and don’t use the same password for every account.
Change you password frequently on highly sensitive accounts, such as your online bank account.
When you go online, your information is saved at almost every website you visit. This is why it’s a smart investment to use protective software. These software programs, such as Privacy Sentinel, prevent websites from saving and storing your information.
If you can, avoid typing in sensitive information while using computers at schools, libraries and coffee shops. It’s very easy for an identity thief to put keystroke-tracking software on these computers without anybody noticing. Once the person puts in their information, the thief has it on record, and can use it for themselves.
Consider creating a free email account that you use specifically for sensitive information. This way, if somebody happens to see you accessing your regular email in public, they won’t be able to find your financial information.
For more information on how to clean online traces click here.
In my next post, I’ll share some tips for staying safe from identity theft while offline.
Posted: November 4th, 2010
Have you ever wanted your mom and dad to be able to send emails to your kids?
More and more senior citizens are being introduced to computers, and we’ve set a goal to make it easier (and fun) for them!
We’re in the final stages of testing our new software for the elderly – called “Seniorama”.
No more frustration at trying to use the Internet, trying to see these tiny icons, or just looking for a way to turn off the computer..
With an easy and intuitive approach, older people (and young kids) can use Seniorama and communicate, share, and engage within minutes.
Stay tuned for more,
Softarama team.