Two River Computer Logo
CALL US
732-747-0020 
VISIT US
120 Fair Haven Road
Fair Haven, NJ 07704
  • Home
  • About
  • Services
    • For Business
    • At Home
    • TV, Sound and Smart Home
  • Blog
  • Remote Help!
  • Testimonials
  • Contact
  • Latest News

How “smart” is your home?

October 19, 2018 by Tom Bull

The whole movement kind of started with devices we could plug into the wall and add a lamp to it.  Then we could add that device to our wifi (albeit painfully) and install an app on our smartphone to turn it on and off.  Amazing stuff!  You could create a schedule where it turned on and off at the same time each day.  Wow, that’s progress!

 

Fast forward to 2018 and there’s loads of devices that work using our in-home wifi to control our stuff.  Maybe it’s a Nest thermostat, the front door lock, garage door opener, holiday lights, outdoor spotlights, smoke and CO detectors or a video camera or two that you were able to get working in your home…with a little finesse and some patience.  But things have gotten better and easier.

 

There’s still a few unrelated technologies that allow these items to work in our home.  They are considered protocols and go by the names of Z-wave, Zigbee and Thread to name a few.  Then there’s the ones we already know, like ethernet, wifi and Bluetooth.

 

The idea is to integrate some needed tech into our homes and make it easy to control and manage it.  That’s not always how it goes.  I started doing this a while ago when Verizon actually had their own solution which included a video camera, thermostat and smartplugs.  It was good, but not great and didn’t really grow beyond the initial offering and eventually fizzled and they abandoned it.  Short of buying something really expensive and high-end, I was forced to cobble together something that suited my needs.  I did loads of research and decided I was going to settle on Nest.

 

First, I added their thermostat.  That’s an amazing device!  It saves money, gives you feedback by learning your habits and one of the best things is the ability to raise or lower the temp from my smartphone…from ANYWHERE in the world!  Nothing better than cranking the heat or the AC when you’re in the airport and come home to perfect temperature.

 

Then I added Nest cameras.  I put one inside aimed at the front door and one outside aimed at the same front door.  When I’m away I can put the motion detection on and know when the kid comes to feed the cat or when a package may get delivered because I get an alert on my phone.  The quality is great and it is in the same app as the thermostat.  I love it when the items play nice together!

 

Nest also has some other products, so I added the Smoke/CO detectors.  I have 2 and know from the same Nest app on my phone if there’s a smoke condition (Alex, stop putting the cast iron pan on so high when cooking your steaks!) or if the batteries need changing.  I also have the door lock, which has a keycode system so I can see who comes and goes.  I can give separate codes for each person and even give out temporary codes to allow one-time access.  Nest has even more products, like video doorbells, an alarm system and more.  I want to do more in my home, but Nest doesn’t have ALL the stuff I need and want, so now what?

 

Enter Alexa.

 

Actually, it’s the Amazon Echo, but we all just call it Alexa.  Since Nest can work with Alexa, I can simply say, “Alexa, lower the temperature to 72 degrees” or “Alexa, is the front door locked?”.  Alexa has these “skills” that can be added to control the other devices in my home that are not Nest products.  I have light switches and smartplugs that control all kids of things like the island lights in the kitchen, table lamps in the living room and family room, outdoor lights for my deck and pergola and even the Christmas tree.  “Alexa, turn on the Christmas tree”.  Or better yet, create a “routine” where items can be set to turn on or off at certain times…all controlled with your smartphone app or asking Alexa.  When I come down in the morning, I say, “Alexa, good morning” and she turns on a few lights and tells me the weather report for the day.  I even have a Sonos wireless sound system that Alexa can control.  “Alexa, play Grateful Dead on the deck” or “Alexa, play my party playlist in the whole house”.  The possibilities are almost endless.

 

There are many smarthome devices out there to make your home more efficient, more convenient or just more fun!  The idea should be to create an easy to manage collection of devices that can be controlled with your smartphone or your voice.  I see almost no need for a permanent wall-mounted control panel solution that will become outdated.  I avoid anything that requires a control panel.

 

Think about the things you could control or monitor; temperature, lights, TVs, security system, door locks, cameras, sprinklers, water spill or high/low temperature alarms, robot vacuums, window shades, garage door openers and more coming each day!  To get going with this in your home, start small with a thermostat or video doorbell and then start adding on.  Try to stick with devices that use wifi and work with Alexa to make things easier.

 

Have fun with it and in the end you and your home will be smarter.  Plus, it’s really fun to show off to family and friends!

Filed Under: Smart Home

Share:

Free Wifi is great…or is it?

September 13, 2018 by Tom Bull

Free is me!  I hear this a lot.  Not the best practice when it comes to wifi and your computer.

 

We get this a lot in our computer repair shop…

 

Valued Customer:  ”my email was hacked” or “my credit card got hacked”

Technician: “how do you know?”

Valued Customer: ”my email is sending out spam” or “I got a call from my credit card company!”

Technician: “have you been traveling”

Valued Customer: ”yes”

Technician: “did you use free wifi”

Valued Customer: ”yes”

Technician: “uh-oh”

 

I’m using this as an illustration so get my point across.  Free wifi, like the ones in coffee shops, airports, hotels, etc. are ripe for bad guys to poach your login information as you enter you email address, bank or shopping account.  They lurk on the same wifi as you and try to gain access to your computer.  If they are successful, they can install a keylogger program that will record your movements, including the login information to critical sites you go to.  Not cool.

 

“But what about the fancy hotel I’m staying in?  That wifi is only for paying customers and it requires a password”.

 

If I was a bad guy and wanted to try to steal info from high-income earners, I would check into an expensive hotel and hang out in the lobby, bar or even just in my room.  I would do a widespread attack and try to see if I could get in and grab any juicy stuff.

 

When traveling abroad, free wifi becomes important because of the restrictions and cost of your US carriers phone/text/internet service when traveling outside of North America.  Many have decided to not call or text and use apps that will use data instead, hence the use of the free wifi.  “I’ll just hop on the free wifi in the coffee shop and do a quick facetime back home”.  I get it.  I might even do it.  I just won’t stay on for long and hop right off.  The fact is, bad guys could be lurking here too and actually setup a wifi router and call it “Free Coffee Shop WiFi”.  You login and they grab your stuff.  Even in your fancy hotel, the bad guys could be broadcasting a stronger wifi network with the same name as the hotel and you jump on that.  Well, guess what?  It’s not the hotel, it’s the bad guy and he’s stealing your stuff!

So what can you do to be safe?  You have a couple of options.

  1. Don’t do it
  2. Don’t do it
  3. Use your cell phone (not connected to free wifi, just cell data) and it’s built-in wifi hotspot feature and connect your laptop to that
  4. Use your cell phone and NEVER connect to wifi
  5. Use a VPN. Once connected to a (gulp) free wifi network, you would launch a program called a VPN.  That will allow you to surf safely away from prying eyes.  Follow this link to our website to get a list – https://www.top10vpn.com/best-vpn-for-usa
  6. Use a travel router, which will convert a wired connection you get in the hotel room into wifi

 

Remember what dad used to say.  “There’s no such thing as free wifi”.  Something like that.

Filed Under: Wifi and Networking

Share:

Computer Scams on the Rise

August 9, 2018 by Tom Bull

More than ever, the bad guys are trying to get you to part with your money.

 

Scenario #1 – the phone rings.  Either a recorded voice or a live person with a foreign accent tells you that your computer is infected with viruses and your data and banking transactions are at risk.  They claim to be with Microsoft, Windows, Apple, iCloud, Verizon, Comcast and others.  They will say anything to give themselves enough credibility that you don’t hang up on them!

 

Scenario #2 – you’re surfing the web or fiddling on social media.  Maybe you simply mistyped a web address, but you end up on a website you did not intend.  Then it happens.  A scary screen shows up saying you’re infected and your data and banking transaction are at risk.  Sometimes it even talks to you or a siren begins blaring.  It says to call the 800 number or really bad things will happen.  So you call.

 

Scenario #3 – you’re struggling with some tech item.  Maybe a printer or your wifi.  So you google “tech support phone number XYZ company” and you see the number and call.  The only problem is that’s not the company you were looking for and the bad guys with money advertise so heavily on Google that they appear at the top of the search results.  You call and speak to the pleasant sounding bad guys.

 

Scenario #4 – like #3 above, you’re having a tech problem, but this time you know the right number to call.  You have it printed on the manual or some other documentation.  You call and speak to a tech from the right company.  During the conversation, maybe it’s discovered you have some malware or other bad software installed on your computer causing you problems, so the tech gives you another number to call.  A number that IS NOT for the company you called in the first place!  It’s his buddy somewhere else who’s trying to get money from you.

 

With any of the above scenarios, the bad guys convince you to allow them to connect remotely to your computer so they can show you the problem.  Many people smell a rat at this point, but others remain concerned their data may actually be at risk or that they are spreading a virus and they let the bad guys in.  They point you to a website and have put in a code and click a few buttons, and voila!  They are on your computer and moving your mouse around.  It’s fascinating.  To a point.  To watch the mouse move, letters being typed and windows popping up is oddly…well, fascinating!  Also, very dangerous if the one’s moving the mouse are the bad guys.

They show you some scary things that they pawn off as viruses.  The fact is, every computer has scary looking stuff on it.  The key here is scary “looking”.  If you don’t know what you’re looking at, it can be scary for sure.  At this point the bad guys convince you they can clean up the infections and make it all better.  They install some programs (which are all legitimate by the way) to clean-up some junk files that all computers have.  They may even install an anti-virus program and sell you on a subscription.  They want your credit card info so they overcharge you for the software and their services.  Sometimes as much as $1000 for “lifetime” protection.  They may even tell you to go to Walgreens or CVS and get some gift cards to pay for the items.  This is the second point where people smell a rat.  Some will just hang up the phone.  The bad guys call back and maybe you yell at them or hang up again.  That’s when they put a password on your computer so you can’t get back in again.  Terrible stuff.  They keep calling you back and then you pack up your computer and bring it to your local computer repair shop.

 

We see this so often here at Two River Computer that we gave it a name; Unauthorized Access.  Read more about it by clicking here.  If this happens to you, just turn the computer off or close the lid if it’s a laptop.  Then call your local computer repair shop for help.  Don’t be too quick to cancel all your bank accounts and credit cards, but if you’re genuinely concerned ask them to put a “watch” on the accounts for suspicious activity.

 

Trust your instincts when it comes to this stuff.  If you’re on the phone with someone and you don’t feel right about what they are asking you to do, just hang up!

Filed Under: Security

Share:

Can you “cut the cord” and not bleed?

July 9, 2018 by Tom Bull

Maybe yes, maybe no.

 

Cutting the cord means cancelling all your cable TV services and only using internet-based programming and old-school antennas to watch traditional TV and movies.

 

The “cut the cord” movement has been going on for some time now, likely close to 8 years or so, but slowly for existing TV watchers.  Kids out of college are going straight toward this service and not getting cable TV when they get their first apartment.  The movement comes as a result of NetFlix and other streaming services like Hulu and Amazon Prime providing TV shows and movies over the internet.  Homes all over the country have been turning in their cable boxes and just watching streaming media instead.  They may use the “guts” of their Smart TV or they use a streaming device like Apple TV, Roku or Amazon Fire Stick and others to watch this content. You can also use your smartphone, tablet or computer to stream content, but it’s not the best answer for the den!

 

To get TV shows and movies over the internet (referred to as “streaming” or “video streaming”), you need a streaming device and decent internet/wifi service.  Many Smart TVs have this feature built in to their internal circuitry.  Like a smartphone or tablet, these TVs have apps to deliver the streaming content.  Almost all of them have NetFlix, Hulu and Amazon Prime built in and some offer options to download even more streaming apps, like YouTube TV (my favorite), Crackle, Sling, PlayStation Vue and more.

 

If you don’t have a Smart TV, or one that’s new enough to support the latest apps, you will need a streaming device.  The most popular are Roku, Apple TV, Amazon Fire Stick and Google Chromecast.  Most newer Blue Ray and DVD players have streaming service apps embedded, like a Smart TV, so you could use that if you like, but watching DVDs is becoming passé for sure.

 

Some people have found additional success using an external antenna to acquire OTA (Over The Air) content to keep the cost of monthly service even lower.  Many places sell these antennas that plug directly into your TV and can pickup HD channels within range of the antenna.

 

So if you decide to cut the cord, TV watching as you know it will change forever.

 

First, you won’t have a cable box, so no more channel surfing.  You know, you turn the TV on, change the channel to 2 and then start hitting the channel UP or DOWN to see everything that’s on right now.

 

Second, the “channels” are different.  Not necessarily the content, but there’s no actual number and you can basically watch whatever you want, whenever you want.  The hard part is adjusting our thinking and trying to figure out exactly what to watch.  We are so conditioned that we are used to watching certain programs on certain days or time of day.  Basically this is like a huge DVR of all the shows of a particular series that you can call up anytime you want.  As an example, you can open NetFlix and watch every episode of The West Wing, which was 7 seasons long.  If you sit down and watch many episodes in a row, you are officially “binge-watching”.  You can also search for the actor Rob Lowe and find West Wing, Parks and Recreation, Friends as well as a bunch of movies he was in.  If you have ever used On Demand from Comcast or Verizon, you’ll grasp the concept easily, but this is more than just movies like you may be used to.

 

Third, your “collection” of channels will be different.  You will be looking at the actual network to determine your “channel lineup”.  Here’s an example of what I have in my house:

$40/month – YouTube TV – I get the NY channels (CBS, NBC, FOX, ABC, WPIX) plus another 45 or so channels like ESPN, USA, SNY, Bravo, CNN, Fox News and more.  There is also a DVR for recording the current season TV shows that you might miss.

$15/month – NetFlix – primarily I use this for movies, certain TV series like Law & Order, Breaking Bad, Friends and more.  Plus, they have original content, like House of Cards and Stranger Things.

$15/month – Hulu – We mostly got this for their original series, Handmaid’s Tale, but it has a different collection of TV shows and movies versus NetFlix, including some duplication.

$15/month – HBO add-on to Hulu

FREE – Amazon Prime – since we’re already members of Amazon Prime to get free 2-day shipping, we also get access to their amazing Prime Video service, which includes an additional cache of movies and TV shows.

The monthly cost is $85/month for all this…a lot less than our previous Verizon FiOS service, which was closer to $200/month.

 

I think the OTA antennas have to come a long way before they are a viable option and can’t give you all the content you need or want.  If you focus on streaming you will be happier, but a little lighter in the wallet or pocketbook.

 

If you do decide to “cut the cord” you will be calling the cable provider and telling them you no longer want the cable TV service or the boxes and DVR.  The cost savings won’t be as much as you hope I’m afraid, but your overall cost will be lower.  It would not hurt to ask how much it is to increase the internet speed now that you will be streaming more.

 

And finally, you will need fast and powerful internet/wifi to support the streaming devices.  Make sure you have that before you get started or you’ll be unhappy right away.

Filed Under: TV and Sound

Share:

Did the Russians hack your router?

June 11, 2018 by Tom Bull

It’s possible, but probably not based on what we know at this moment.

 

However, like many stories in the headlines of the newspapers, TV and social media the numbers and facts can change.  It’s true.  How many times have you read about a tragedy only to find it’s actually 10 times worse than originally reported.  Likely because it’s more important to be first, than to be accurate.  It was originally reported that Russian hackers had attacked some internet routers.  Now they are saying that even more countries were targeted than initially thought, though the Ukraine was notably the largest. And the number of affected routers is growing.

 

So here’s what we know right now.

 

On Friday May 25, 2018 the FBI reported that hundreds of thousands of home and small office routers had been compromised by Russian computer hackers with malware called VPNFilter.  Their goals are typically to collect user data (browsing habits, identity info, passwords), shut down your network or attack another network using your devices.

 

Scary to be sure.

 

The original suspected intent of this attack was to target all those devices inside your home that connect to the internet and don’t have a person sitting at them.  Video cameras, nanny-cams, thermostats, speakers, alarms, personal assistants (Amazon Echo, Google Home), smart TVs and more can all become an army of robots that can attack and bring down websites and servers.

 

Now they are saying that the attack can alter info you see on the internet if your network is compromised.  Imagine seeing your bank balance at a steady number, but the bad guys are siphoning off your money?  You could even be making a purchase at a familiar place, but your payment is going somewhere else and you never get your item.

 

They are also saying even more countries were targeted than initially reported…and the total number of targeted routers now exceeds 700,000.  And the number of manufacturers named in the router list has expanded greatly from initial reports.

 

So now what?

 

We are all concerned, even if only mildly, that our money will get stolen or our identity will get hijacked while surfing.  My opinion is that I think we are all pretty safe.  The same safe feeling you get when you get in your car and you buckle up and see that airbag light on.  But that doesn’t mean some idiot won’t hit us because they’re updating their Instagram while driving!  We need to always be diligent even if we feel safe.

 

The fact is there’s loads of safeguards to protect our online surfing.  Your local computer has protection, your bank has protection, the Amazon web servers all the big companies use all have military-grade firewalls for protection and Google is always on-guard to secure its traffic.  And even if something did happen to you, it can and will be fixed.  It may be a colossal pain in the butt, but even an identity theft can be undone.

 

What we were told to do to fight this attack was to reboot (restart) our routers.  Yup, simply unplug them from power, wait 30 seconds and then plug them back in.  That action will “flush out” any malicious code that was injected into your router.  For the time being.  There’s software that runs on your router, called firmware.  It should be updated if your router is on the list.  And perhaps more importantly, the default administrative password that came with your router needs to be changed NOW!  You may even want to consider performing a “factory reset” of your router, or better yet, a new router if this whole thing makes you nervous.

 

List of affected routers

 

You can contact the router manufacturer for assistance in upgrading firmware and changing the default password.  You can also call your local computer repair folks.  They can handle this for you.

 

PLEASE NOTE: as of this writing, Verizon FiOS and Comcast/Xfinity routers ARE NOT AFFECTED.  Primarily because they have unique default passwords and firmware upgrades are handled directly by them.

 

So, will the list of affected routers get bigger?  Will the attack be more widespread?  The FBI actually seized the server that started all this, but they believe the bad code is still out there and may even have a delayed payload and attack later on.  We feel that it’s better to be safe than sorry and you should do something if your router is on the list.  Maybe even if it isn’t.

 

Heed the warnings and carry on.

Filed Under: Security

Share:

Keep your computer out of the landfill

May 8, 2018 by Tom Bull

Recycling and upcycling are noble and worthy of our best efforts as humans.  Keeping plastic, glass and aluminum out of the regular landfill has been a huge step to keeping this planet healthier.  Taking old wooden pallets and turning them into usable furniture is furthering that pursuit.  There’s communities, magazines, websites and TV shows dedicated to the idea of upcycling.

 

Don’t throw it out…keep it alive a while longer.

 

That’s what we should be doing with our computers.  As many are painfully aware, most electronics seem to have a shorter lifespan than when we were growing up.  I remember the same copper-colored refrigerator my entire life until I moved out of my parents’ house at 19.  Sure, we had the repair guy over from time to time, but my parents kept that baby running until the point where ice just never formed in the ice trays.  OK, time for a new one.  22 years in total.  Not a bad run.  Since I’ve been in my own house, I’ve had 4 over a span of 26 years.

 

What the heck?

 

Sure, I could have called the repair man to fix our first broken fridge, but the cost of the service call and the parts were almost ½ of the replacement cost.  “Maybe we should just get a new one”, I ask my wife.  So we did.  We could have gotten a repair man to fix our 2nd broken fridge, but we hated the 2nd one.  It wasn’t made very well and we felt like they were all made that way and 5-6 years was a good run.

 

We are a disposable society and we all keep the cycle of buying and trashing electronics and home appliances alive and well.  All the repair places are gone as we all just simply replace what we have instead of prolonging its life.

 

Except when it comes to your computer.

 

In previous articles, I’ve mentioned how a new computer will last 1 year for every $200 you spend on it.  A $1000 computer will last 5 years and a $400 computer will only last 2 years before you get tired of how slow it is.

 

Unlike a fridge, dishwasher or clothes dryer, your computer has a personality.  The programs that are installed, where the icons are located, the saved logins for all the websites you visit and even how the left shift key sticks sometimes.  Each one is unique and while not perfect, they work for us.  The idea of getting a new computer, while exciting, is also fraught with anxiety; do I need to buy those programs again?  Where are my icons?  No, I don’t remember my passwords for the bank, Amazon, eBay, Facebook or the community website!  Arghhhhh.

 

What if you could keep that computer running a few more years?  What if everything was where you like it and you didn’t have to change a thing?  What if it was the same…but ran 8-10 times faster?  That’s what happens when you upgrade your computer using the not-so-new-but-now-affordable Solid State Drive (SSD).

 

An SSD is a non-mechanical hard drive that replaces the old, spinning hard drive…the cause of your computer’s slowness.  For those old enough to remember floppy disks, when flash drives came along the speed difference over floppies was staggering.  Same thing with SSD drives.  Your existing hard drive can be literally cloned onto the newer, faster SSD and the results are…well, staggering.

 

Laptops, desktops, PCs or Macs can all be upgraded to SSD to squeeze another 2-4 years out of them…or to just give the computer a major boost of adrenaline.  We have taken computers as old as 7-9 years and made it possible for them to continue to serve their owners.  And now running better than ever.  Not all computers are candidates for this upgrade; they need to have “good bones”.  That is, a good Intel or AMD processor and be in general good health.

 

So think about it…are you ready for a new computer, but really would just prefer to keep the existing one running longer?  Consider upgrading what you have and keep it out of the landfill for now.

Filed Under: Uncategorized

Share:

How much control can parents have over the internet?

April 3, 2018 by Tom Bull

Looking at this as a parent myself, and a technologist, I say “just enough” control is all I really need.

 

I want something that will lessen my own anxiety and make me feel like I’m in charge…not my kids.  I’m one of the few parents I know that actually knows more than their kids about technology.  So I can only imagine some of the genuine fear that some may have when the kids are behind closed doors or little Johnny’s friend brings over his laptop or iPad for a playdate.  What are they watching?  Why do they keep hiding the screen when I walk in the room?

 

As I am prone to say, “the fun never stops”.

 

There have been many approaches to the concept of “parental controls” since computers began appearing in kitchens and family rooms in the mid-1990s.  Some of the early players were software programs that got installed into a computer and could filter internet requests.  It was sometimes tedious to work with because you often had to create your own “black list” of websites or keywords that you didn’t want your kids to see.  And then came the “white list” when good things got blocked.

 

We saw a lot of this being applied when classrooms full of computers started appearing.  Products like NetNanny, SafeEyes and K9 were popular and did the job.  In homes, some parents would put the computer with the screen pointing into an open area so they could see everything.  That was a great deterrent.  The software helped too, but kids are curious.  Naturally.  It’s normal.

 

Next, we saw some internet routers that had some of this web-filtering capability built-in already.  That was helpful in homes with more than 1 computer, which started in the early 2000s.  It was a great start to what I call “whole-house” protection.  Anything that connected to the router to get internet access had the parental controls applied.  Sounds good, but it was cumbersome.  Again, you had to create white and black lists of websites and keywords.

 

As time marched on, these products got better.  Then the websites themselves got classified based on content, which helped a lot.  Like the movie or video game rating system; G, PG, MA, R, etc.  The software installed on the computer or built-in to the router could filter by category.  You could easily block things like guns, drugs, sex, hate and more.  They also started using their own database of dirty words and phrases so you didn’t have to make your own lists.  Some of those words…wow!

 

These days with each person having 2 or more devices (and some of those persons are under the age of 5!) managing the internet access and content allowed has become a real job to manage.  Software and apps can do a lot, but they are device-dependent.  If the software gets removed or another device is used, then it doesn’t work.  I run into parents all the time that tell me about the best app they just put on their kids’ phone and how they feel so safe knowing they are being protected.  Until I show them the workaround that kids can usually find a few hours after you put something on the device.  I often say, “install something at breakfast and they found a workaround by dinner”.  This is not true for all, but I see this a lot.

 

So what’s a concerned parent to do?

 

I prescribe to the idea that in life there is “an acceptable amount of abuse”.  This may not be popular, and abuse is a strong word, but somehow fitting.  In the 1980s it was using the work phone to talk to your sister in Indiana.  In the 1990s it was using AOL instant messenger to chat with your friends.  In the 2000s it was using company internet to sell your Beanie Babies on eBay.  Now it’s social media and texting while working.  It’s OK to do these things a little.  We sometimes need to look the other way…but not for long.  I think the same thing applies to the kids and internet access.  We hope they make good choices based on how we raised them.

 

Back to the “whole-house” solutions.  The concept here is that ANY device that enters your home can have filters applied.  Individual profiles can be created for each family member and their respective devices to allow the proper amount of access.  A 5 year-old shouldn’t have the same access as a 15 year-old.  The bigger bonus these days is how much control we can actually have.  Things like a “bedtime” when the internet will cutoff for a user and ALL their devices.  You can even assign an amount of time per day they can spend on their devices; even how much time per app can be assigned also.  Some devices even allow for a PAUSE the WHOLE HOUSE for when it’s dinner time.  Game changer!

 

In the end, parental controls are good.  They can help us feel better about what our kids our seeing and how much they are seeing. But it’s no substitute for good parenting.  Tell your kids why the internet can be bad…or addictive…or hurtful…or helpful.  Teach them about time.  Good time.  Bad time.  Wasted time.  Time well spent.  You get the idea.

Filed Under: Security

Share:

Cyber Security…much ado about nothing?

March 8, 2018 by Tom Bull

It depends if you like to gamble or not.

It seems that not a week goes by when we are not reading about some kind of cyber security breach at a big-name retailer or corporate giant. Every news site’s Homepage would have a piece of news about the cyber security breach and the ways to tackle it once in a week at least.  Sometimes they can be attacks by a rogue government, or even by a teenager in the Ukraine. The fire barrier construction provides the best cyber security services that was acknowledged by all of its users.

 

But what about me?  Am I safe?  Surely these problems won’t ever affect me, will they?

 

Well, that depends on a lot of things.  Cyber security requires that we adhere to same basic rules even when it is for cyber threats to manufacturing industry and other industries as well:

  1. limit physical access to our device(s)
  2. have strong passwords in place to access our information
  3. keep devices and operating system software up to date
  4. use a good security program
  5. have a plan if things go bad

 

Allow me to elaborate a little on each of the rules.

Rule 1 – Limiting physical access.  This may seem really basic, but its importance cannot be stressed too much.  Lock your doors, keep your phone in your purse or pocket and don’t let other people use your stuff.

Rule 2 – Strong passwords are always a must.  Here’s some things to help you make them.  Use special characters to replace letters; use a $ instead of an S, how about a 3 instead of an E, or maybe a ! instead of a 1.  Those can definitely help make the password stronger.  A phrase “sandwiched” between some numbers, like 19BornToRun75! As a Springsteen fan you would easily remember that this album came out in 1975 and adding the ! at the end makes it stronger.

Rule 3 – If the hardware or software manufacturer issues you an update, you need to install it.  We all need to be sure we have a proper backup before installing the update (also referred to as a patch) in case something goes wrong.  Microsoft and Adobe routinely release updates, but not so for Apple.  We sigh when we see the pop-up about even more Microsoft updates, but they are all still important.  And when Apple releases a security update, it’s usually pretty serious so do it right away.

Rule 4 – Have a good security program installed on your computer.  And yes Virginia, Macs so get infected.  And don’t forget about backup.  The best plan is 3-pronged; the original data on your computer, a local backup device like a USB external drive or even a flash drive, and also a cloud copy using a service like Carbonite or CrashPlan. The malware detection and prevention of cyber attack is important.

Rule 5 – What if my device is compromised, now what?  First, we need to assess what it really means.  Most of our devices are not that important to be attacked.  Nor is the data on them…at least not to anyone but ourselves.  The best plan is prevention.  That and have a someone to call for help, whether that’s your neighborhood computer folks, banker, attorney or kid brother.  Don’t panic, just ask for help.

 

For business, cyber security has an enormous and scary downside if the data gets compromised.  They even sell insurance now in case your data gets stolen.  But for consumers, it’s really about identity theft.  Long gone are the days when our contact list was stolen and emails about Viagra, Low-Interest Mortgages and Weight-Loss were sent out.  Embarrassing to be sure, but pretty harmless in the end.

 

Now the bad guys are more surgical.  They are hijacking your email and looking for conversations between you and your brokerage house; searching for terms like “wire transfer” and other things that will allow them to see a pattern and try to have money re-routed to their account instead of yours.  We witnessed it enough because the protocols of the bank or broker are not followed precisely, but it shouldn’t have happened in the first place, right?

 

Right.

 

And identity theft…this can be the worst.  Accounts opened in your name or tax returns filed on your behalf are obvious signs your identity has been stolen.  You have resources to help you at the Federal Trade Commission – www.identitytheft.gov.  Go there to report an event if it ever happens to you.

 

Keep your devices near you.  Have strong passwords.  Install software updates.  Use a security program.  Know what to do if something does go wrong.

Filed Under: Security

Share:

Treat your email like it’s 1960

February 2, 2018 by Tom Bull

It really makes sense…you’ll see what I mean in a minute.

 

Many people we come across often have 1,000s or even 10,000s of emails in their INBOX.  That’s a ton of email, don’t you think?  Many users just look at the number and say, “wow, I have a lot of email”, when the number the see only represents the number of emails that are UNREAD.  The total number is often far greater.  How did this happen and what can we do to manage our email better?

 

Pretend like you’re a desk worker from 1960, that’s what you can do.  It works, I swear!

 

Look into your minds’ eye and imagine what your desk would look like.  A large steel desk, probably gray, with a chair also made of steel and covered in green vinyl on the seat and the back.  Now look at the top of the desk.  A blotter covers most of the area, but then there’s a pencil cup, a stapler, a tape dispenser, a bowl with paperclips in it and maybe even a plaque with your name on it.  Perhaps a photo of your family in a nice frame.  Getting the picture?

 

Many of the desks for a typical worker had an INBOX on the left and an OUTBOX on the right.  Supervisors and other co-workers would put things in your INBOX for you to complete.  You would work on them and shift them to the OUTBOX for your supervisor or other co-workers to take the next time they came around to your desk.  Old-school to be sure, but very efficient and effective.  You could easily see your workload at a glance.  A full INBOX meant you had lots to do and a full OUTBOX meant you got a lot accomplished.  If your INBOX was piling up and not enough items were making it your OUTBOX, you probably got a visit from your supervisor complaining about your lack of efficiency.

 

Your email INBOX must be treated the same way as your 1960 INBOX.  Consider it more of a TO-DO list of things you need to accomplish.  Once the emails get answered they move to the OUTBOX and then get sent out to the recipient.  But you know the emails don’t actually leave your INBOX.  A copy remains there until you do something about it.  Here’s where we time travel back to 1960 again.

 

Two other items that are at your desk include your file drawers and trash can.  The file drawers might have those green hanging folders, called Pendaflex, that you can put nice clear plastics strips with the name of a client or a project.  Inside those we put manila folders of specific things within that client or project that needed to be kept separate from the rest of the items.  And the trash can was probably the same color as your desk and was right under your feet.  No recycling cans back in those days…everything went in there; papers, food, soda cans, you name it.

So now we head back to our email.  You know about the trash can or Deleted Items folder.  Get in the habit of deleting items once you’ve answered the email.  It’s a good method of keep things tidy, even if the email thread is still ongoing.  Getting rid of the latest email after you’ve responded keeps your INBOX lean.  If you need to keep it in your INBOX as a reminder, use the FLAG or FOLLOW-UP option.  Don’t forget to delete it when it’s resolved to keep things in order.

 

Many times we need to keep emails for one reason or another.  Perhaps there’s some important info that you’ll need to access later, like airline or hotel reservations for a flight 3 months from now.  I don’t want that getting buried in my INBOX.  I put in a folder called TRAVEL so I can easily find it later.  There are many times when we need to save emails, so think like a 1960 file drawer.  Label your folders for easy sorting and retrieval later.  As an example, I have a folder called PERSONAL and under that I have folders named TRAVEL, COLLEGE, INSURANCE, TENNIS, GOLF and ’73 NOVA (a sweet hot rod I work on with my kids).  At the end of a project, I’ll locate the last sent item from that email thread and save that in a folder.  It will have all the info I need (except attachments so keep those emails too as they arrive) and it’s all in a nice, neat package.

 

So bottom line…go back in time to realize some new-age efficiencies.  Keep your INBOX lean by deleting the emails you’ve answered via the OUTBOX or the ones you don’t want at all (mark the ones as SPAM if necessary).  Consider your INBOX your TO-DO list and you’ll be happy.  Sort and save the ones that are important so you can get back to them later.

Filed Under: Uncategorized

Share:

A computer costs $200 a year?

January 5, 2018 by Tom Bull

Yup, it’s true.

 

The facts behind this are based on over 30 years of experience installing and repairing computers.  If we look at typical usage, by the typical person in a typical environment; a computer costs about $200 a year.  Your results may vary based on workload, but generally this rule applies to almost everyone.

 

If you purchased a computer for $1000, expect it to last about 5 years.  Many people who put down $1500 or more on a Mac or high-end PC will have a good experience for 7-8 years.  It’s the same on the low-end.  You will be frustrated and will end up ditching that $400 laptop you bought at the big box store after just 2 years because it will become so slow as to be unusable.  Your smartphone is faster, so why not use that instead!

 

This continues after the life-cycle of the computer is reached and you are faced with an upgrade or repair situation.  If after 5 years, your $1000 computer is limping along then upgrade it instead of buying a new one.  Keep those computers out of the landfill please!  An upgrade can preserve the environment…and your well-being.  Sort of.

 

All of our computers have a unique “personality” that’s all our own.  We like the way the screen is laid out and where the icons are.  The programs all work the way we like (or tolerate) and all the accounts are properly logged into for email and websites.  We know where everything is, and it works the way we expect.  My mom used to say, “the devil you know is the devil you can deal with”.  The same thing applies here.  While the computer may not be perfect, we know exactly what to do to make it work and get what we need.

 

To recreate that personality on a new computer can be tough.  There are programs that exist to move programs and data from old computers to new ones, but sometimes any sluggishness or bad behavior can move over at the same time.  And why would we want to slow down our new computer?  The reason we bought it was because the old one was slow!  So, if you’re over 40 and not a proponent of change, upgrade that computer instead and use the same $200/year rule.

 

Upgrades to the operating system can often improve performance, but not typically.  If your computer was frozen in time and you didn’t need that new gadget or software feature and never upgraded anything, your computer would run well.  It may not have all the security benefits of the new software, but it will run well.  As soon as we start upgrading the operating system to accommodate new software or new gadgets, we will likely need to upgrade the computer to keep running well. Keep the $200 rule in mind when upgrading.  If you spend $300 for an upgrade, that PC better run for another year and a half or it was not worth it.

 

One revolutionary upgrade that is being performing daily is swapping out the old, slow hard drive in your computer for a new Solid-State Drive (SSD).  There are no moving parts in SSD drives and they generally increase performance by a factor of 7.  That’s right…your computer will run 7 times faster!  Everything from the old hard drive can move to an SSD.  The process is called cloning and it’s just like it sounds.  We can move every little nuance of your computers’ personality to the faster hard drive.

 

We continue to be stunned at how well these upgrades work.  We can easily take any computer; laptop, desktop, PC or Mac and make it run better than it ever did if it has one of the old hard drives.  Computers that are 8 or 9 years old get upgraded and run as fast as one you can buy today…sometimes faster!  Even here the $200/year rule applies.  While these upgrades can cost between $300-$600, users are getting another 2-3 years out of there aging, but devilishly comfortable, computer.  After all, if you’re over 40 you don’t like change…unless it’s a change in speed!

Filed Under: Uncategorized

Share:

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15

Two River Computer

732-747-0020
120 Fair Haven Road
Fair Haven, NJ 07704

VISIT US

Get Tech Tips Direct to Your Inbox

Sign up for our monthly newsletter below to get tips on how to stay protected and make the most of your technology!

Copyright © 2022 · Two River Computer · 120 Fair Haven Road, Fair Haven, NJ 07704 · Powered by Tech Site Builder

Our Privacy Policy