Tuesday, May 31, 2011

How To Fix and Avoid Printer Paper Jams

Printer jams occur when the paper feeding through the printer goes awry. Sometimes the printer ignores the problem, soldiers onward, and extrudes a crumpled mess into the output tray; on other occasions, the printer stops in midjob, and the crumpled mess--or part of it--remains trapped somewhere inside the machine.

When a paper jam occurs, some printers flash lights at you and scream for help. Others sense where the jam is and provide guidance on clearing the blockage. If your printer offers diagnostic advice, follow it. Also, take time to check the printer's documentation for help in clearing jams.

Read more over @ PCWorld...


Image Hosted by ImageShack.us
By Friendly Computers
Copyright: 2010-01-28


Give us a call today: 281-554-5500 or visit Friendly Computers to schedule an appointment.

Monday, May 23, 2011

One in fourteen Internet downloads is Windows malware

Yes. It’s true. For the first time, Mac users have a significant malware problem. But, hey, it could be worse. You could be running Windows. After all, Microsoft, not some third-party anti-virus company trying to drum up business, has just admitted that based on analysis gained from IE 9 use, “1 out of every 14 programs downloaded is later confirmed as malware.”

If I may quote from Matthew 7:5, the King James Bible, “First cast out the beam out of thine own eye; and then shalt thou see clearly to cast out the mote out of thy brother’s eye.”

Window PCs has far, far more malware trouble than Macs, and I can’t resist mentioning that after in twenty-years of Linux, we’ve not seen a real-world example of Linux malware–not counting the Android malware mess. Ironically, these latest appalling Windows malware numbers are shared in a Microsoft blog about how well SmartScreen Application Reputation is working in IE9.

Read more @ ZDNet. Call Friendly Computers today at 281-554-5500 to learn more about how you can protect yourself from Windows malware and potential threats!

Wednesday, May 18, 2011

Protect Your Kids Online

Parents need to protect their kids from all sorts of technological dangers. There are pornographic web sites, scams, hate groups, violent video games, and online predators pretending to be age-appropriate harmless flirts.

And even if your kids visit only safe sites, you still have to worry about all the time they waste on their computers. Every hour they spend starring at a glowing screen is an hour not spent getting exercise, playing out-of-doors, sleeping, or interacting with people in the real world.

Your approach to monitoring your children's cyberlives is as important as the software you use. You want to protect them and impart values, not explain to them after the fact that you've been invading their privacy. Discuss the issues with them, let them know that their surfing and other PC use will be monitored, but that you expect them to make wise choices. They'll gripe and complain, of course, but it will be easier and more productive in the long run.

Read more about how to protect your kids online over @ PCWorld.

Monday, May 16, 2011

Five Microsoft Word Nightmares--and How You Can Fix Them

Microsoft Word can keep you up all night, and not only because you've got writer's block. You change the font, and Word changes it back. The columns don't line up. The program freezes up, taking your work with it.

Here are five common Word disasters that can ruin a good night's sleep--and what you can do to fix them. The advice below works in both Word 2007 and Word 2010.

Read more about it over @ PCWorld...


Give us a call today: 281-554-5500 or visit Friendly Computers to schedule an appointment.

Tuesday, May 10, 2011

Secure Your Life in 12 Steps!

Good security advice can be hard to find. Lots of security experts offer help, but not all of their tips are accurate or up-to-date, and many address PC security only. So even if you follow their advice, you may be more vulnerable than you think. That's where we come in. We've assembled a dozen simple but essential tips--a 12-step security program--to keep your PC, smartphone, gadgets, and identity safe. The steps are practical and fairly easy to perform, so you can strengthen your security without losing your mind in the process.

Read more about the 12 easy steps Friendly Computer can help you with over @ PCWorld!

Give us a call today: 281-554-5500 or visit Friendly Computers to schedule an appointment.

Monday, May 9, 2011

11 Free Microsoft Tools You're Overlooking

Microsoft has a virtual monopoly on desktop operating systems with Windows and on office productivity with its Office suite--as well as a dominant share of the Web browser market with Internet Explorer.

For many, though, Microsoft is the big, evil corporation robbing the defenseless masses, while Google is the Robin Hood of the Web, altruistically delivering free goods and services. However, although you might not realize it, Microsoft also offers many of the same tools and services as Google--and also for free.

Read more about it here @ PCWorld.

Call Friendly Computers today at 281-554-5500 and let us help you make use of these powerful, free tools!

Saturday, May 7, 2011

Cyber Crime Story on CNBC - Wireless Security

Saw a program the other day on CNBC about criminals driving around Los Angeles with computer equipment in their car that allowed them to find unencrypted/unsecured wireless connections. In several cases, the hackers were able to gather credit card information from local retailers as unknowing consumers were paying for their purchases!

An unsecured or improperly secured wireless network opens your entire home or business to unauthorized access. With an unsecured wireless network, not only could someone be “stealing” your internet access, they could be stealing your computer files, your passwords, and the credit card numbers you use for online purchases. Friendly Computers can evaluate your wireless network and implement security measures to keep the “bad guys” out.

Give us a call today: 281-554-5500 or visit Friendly Computers to schedule an appointment. We can help secure your wireless connection today!


Friendly Computers - Computer Repair - Clear Lake by FriendlyComputers178

Like it? Create your own at GoAnimate.com.

Friday, May 6, 2011

Edit Your Browser's AutoFill or AutoComplete--and Protect Your Credit Card!

I love the way that modern browsers automatically fill in these fields, although some fields I'd rather they left unfilled. I don't trust a browser with the password for a retail or banking site, and I'm certainly not happy when one offers to fill in my credit card number.

And sometimes they want to fill in information that's out-of-date or just plain wrong.

Luckily, you can delete AutoFills. To find out how, read more over @ PCWorld...

Thursday, May 5, 2011

Free Android tethering apps blocked by most carriers!

Free Android phone tethering apps found in Android Market are reportedly being blocked by AT&T, Verizon Wireless and T-Mobile.

Sprint continues to support the tethering apps, possibly because it continues to offer unlimited voice, text and data plans.

The other carriers charge $15 to $20 per month to use a smartphone as a portable modem for a tablet or PC. The free tethering apps available in the Android Market, like PdaNet, represent a free or cheap alternative to those charges.

According to Technologizer and other blogs, T-Mobile has long opposed free tethering apps, while Verizon and AT&T have only recently begun the bans.

Related Blog

JR Raphael:
Verizon's Android tethering block: What really happened and why
When users attempt to install tethering apps on the phones of those carriers, they get an on-screen notice that reads, "This item is not available on your carrier."

Read more about this free use infringement over @ ComputerWorld...

Tuesday, May 3, 2011

How to Turn Your Computer Into the Ultimate Remote Access Media Server

If you're out of the house a lot but still want access to files on your home computer, one of the best ways to solve that problem involves setting up your computer as a remotely accessible home media server. Here's a look at how to not only access your files (and control your computer) remotely, but also share files with others, stream music and video, access your photo library, and a whole lot more.
Below we'll walk through how to turn your home computer into a remote-access media server on Windows, Mac, and Linux. When you're done, you'll be able to remote control your computer from anywhere (as though you're sitting in front of it), access any of your files, and stream video, music, and photos to any other computer or nearly any mobile device.

Before we get started, let's take a look at what you'll need over @ LifeHacker...

Monday, May 2, 2011

Google faces $50 million lawsuit over Android location tracking

Google and Apple have both been in the news lately over details of how both companies' mobile operating systems store and transmit geolocation data. Following a class-action suit brought by two Tampa men targeting Apple over alleged user tracking, Google is facing a similar class action lawsuit filed in Detroit on Wednesday.

Last week it was revealed that iOS devices cache a large amount of location data in a file that is backed up to users' computers. The file is hidden from normal access on iPhones and iPads, but is unencrypted, and unless users also opt to encrypt iOS backups in iTunes, the file is also unencrypted. While someone would need physical access to either device to get the information, concerns were raised that the information could be used to track individuals, thereby compromising their privacy.

Read more over @ ArsTechnica