Category Archives: Computers

Performing a Clean Windows Install …

without losing your files, settings and tweaks.

The key lies in preparation.  Here a couple of things you want to do:

Image representing Windows as depicted in Crun...

Image via CrunchBase

First make sure you know what current programs you want to re-install.

Before you do anything else, it’s handy to have a list of all your currently installed programs so you know what settings to back up, and which programs you want to reinstall later on.

Next backup …

Windows settings

Back up any Windows settings you can so you don’t have to do too much tweaking after you reinstall. The best way to do this is with Windows Easy Transfer, Windows’ built-in migration program for just such occasions.

Documents and files

Just copy these to an external drive or move them with Windows Easy Transfer as described above, though if you back up your computer regularly (which you should), you can always just restore them from your backup later on as well.

Then after completing the Windows re-install it’s time for the restore process.  Basically it’s the opposite of what you did during the backup process.  However what you may not have known is that there are tools out there that can help make re-installs of applications quick and easy.  Keep in mind though that these tools won’t have all the programs you want to re-install.

Ninite

Just check off all the programs you want, and Ninite will create an all-in-one package to install them in one fell swoop.

Chocolatey

 If you’re more of a command line geek, Chocolatey is a handy utility that brings Linux-style package management to Windows. With a few well-placed commands, you can install a ton of programs at once, bypassing the need for all those separate installers.

Portable Apps

Portable apps essentially let you carry all your programs and settings over to another computer with no installation required. You’ll still have to search out each app yourself, but after you do it once, you’ll never have to do it again—every clean install from here on out will be much quicker because you’ll already have half your apps ready to go.

Head over to the source for all the details involved with performing a clean install of Windows.

 

“Consumers backing up information more frequently”

 

Do you backup your data on a regular basis?

A new survey from a leading online backup provider found that PC and Mac users are backing up sensitive files and documents more regularly than they have in the past. Approximately 10 percent of computer users now back up their systems daily, compared to only 6 percent in 2011.

“These are the best results we’ve seen since we started tracking data backup five years ago,” online backup expert Gleb Budman said.

While not everyone backs up his or her computer on a daily basis, many people are doing so more frequently than in the past. The study noted that approximately 20 percent of computer users back up sensitive documents and applications roughly once a week, compared to only 14 percent in 2011 and 2 percent in 2008. Another 36 percent of survey respondents said they duplicate sensitive files roughly once a month, compared to only 26 percent who did so in 2008.

“It’s great to see that the desire to protect photos, videos, music and other data is becoming an everyday part of using a computer,” Budman said.

The survey also revealed, however, that roughly 29 percent of U.S. computer users have never used online backup tools to bolster data protection and minimize the chances of unnecessary data loss. The study noted that this trend varies between age groups, as roughly 35 percent of individuals older than 55 never use remote backup, while only 24 percent of 18- to 34-year-olds neglect to duplicate sensitive documents.

Source: Consumers backing up information more frequently – Online Backup News.

If you are backing up your data, what tool(s) do you use?

 

When Making a Wi-Fi connection …

Some great advice and tips to follow when connecting your computer via Wi-Fi.

It’s a good idea to connect to public networks that require passwords when possible, as they tend to be more secure. Many public networks have a legal disclaimer stating network use and security. It pays to read these before connecting.

Turn Wi-Fi off We don’t mean you should turn your Wi-Fi off permanently, rather, when you’re not using your device, or are connected to another network, e.g., mobile data, turn your Wi-Fi connection off. If you have Wi-Fi on while connected to another network, your device can and will actively search for networks to connect to and often connect to an unsecure network, unintentionally exposing your information.

Use HTTPS when possible HTTPS stands for Hypertext Transfer Protocol with Secure Sockets Layer SSL. In layman’s terms this is a website that has been built with security of user’s data in mind. Many popular websites have a HTTPS version that can be accessed by typing in https://www.sitename.com. Using HTTPS makes websites a lot harder to hack, and it’s a good idea to get into the habit of using them when on a public network or connected to Wi-Fi outside of the office.

Use data not public hotspots Hotspots are public Wi-Fi connections usually provided by a company e.g., many coffee shops have Wi-Fi, this is a hotspot. These can be unsafe, so it’s much better to invest in a data connection for your device, or a mobile Internet stick, which are considerably safer as the data is encrypted before it’s transferred from the cell tower to your device.

Use a VPN A Virtual Private Network – VPN – connects multiple computers in different locations to the same network via the Internet. Many companies use this to connect and share data with satellite offices, as the data is encrypted and secure. The main benefit to VPNs is that you can connect to a public Wi-Fi network, and transfer data securely using the network’s bandwidth. Many businesses use some form of VPN, which makes it easy for you to keep your business data secure while out of the office.

There are also VPNs that allow you to securely access the Internet via a public Wi-Fi connection, while encrypting all data sent and making your computer anonymous.

Source: Beware when connecting to Wi-Fi – Wausau, Eau Claire, Green Bay | Network Solutions of Wisconsin.

The key is to make it as difficult as possible for someone to hack into your computer.

Tablets to Surpass Notebook Growth in 2016

Image representing iPad as depicted in CrunchBase

Image via CrunchBase

Interesting, but not surprising.

The demand for tablet computers such as the iPad is growing so quickly that shipments of them are projected to surpass notebook shipments by 2016.According to market research firm NPD DisplaySearch, the mobile PC category is poised to soar from 347 million units in 2012 to more than 809 million by 2017. Tablets will be leading the way for that massive growth in the next few years.Tablet shipments are expected to grow from 121 million units to 416 million units by 2017, compared to 208 million shipments in 2012 to 393 million shipments in five years. Tablets will likely surpass notebook shipments in 2016.

Source: Tablets to Surpass Notebook Growth in 2016.

%d bloggers like this: