Monday, August 31, 2015

Mac vs. PC, Part 1

Those who have been reading my daily tips for some time probably already know that I am not a big fan of Apple's products, whether it be a Mac computer, an iPhone, or an iPad.  Therefore, I am very careful to give an answer when I am asked whether a Mac or PC--or an iPhone/iPad or Android--are better.  Determining which one is best for you is a matter of deciding what you need and choosing the device that best excels in those areas.  For me, that is my custom-built PC running Windows.  For others, that might be a Mac.  I am certainly not critical of those who choose to buy a Mac.  Had my life taken a different course, I would almost certainly be using a Mac because it would better fit my needs.

Over the next two days, I will attempt to answer this question as fairly as I can.  Today, I will write about the areas where PCs and Androids excel over Apple's devices, and tomorrow, I will cover the areas where Apple's devices excel.

Value
If you compare spec sheets for a PC laptop and a Macbook, you will find that the PC always gives you a better specs for your money.  I have no problem with Apple charging more for its products; if its customers are willing to pay more, I believe they should be able to charge whatever they want.  However, if you are looking to get the fastest and best components on the market, you will get them at a much better price from Dell or HP than from Apple.

The same is true for the iPad and iPhone compared to devices from Samsung or HTC.  Comparable specs tend to put the "i" Devices at a $100-200 premium.  Again, I have no problem with Apple charging as much as the market is willing to pay, but it is a factor you must consider in making your choice.

Variety
There is no doubt that Apple's products are more aesthetically pleasing overall (more on that tomorrow), but the truth is that with all of Apple's products, you are limited to just a few devices.  Because Windows and Android are distributed software, there are a large variety of devices from many manufacturers available to fit your needs.

Apple has further hurt this variety by limiting the number of options and the ability to upgrade a device.  When you buy an Apple device, you will have a difficult time changing any of the items inside it once you get it.  For example, if you want more storage space for your iPhone or iPad, you will have to upgrade to a new device with more storage.  (By contrast, Android allows you to add an SD card to your device.)

Desktop/Laptop Software
We will deal with software again tomorrow, but PCs definitely win in the software category.  Many important programs are not available for Macs, or they are only available at a premium price.  I recently set up a virtual machine inside a Mac for someone who discovered that the Mac versions of the programs she used did not have the features she needed.

While the virtual machine is one option and emulators have gotten better recently, software is still a major reason to choose a PC.  (It is also the reason why I switched back to Windows after being a Linux user for several years.)  Before considering a Mac, make sure that the software you use regularly is available for Mac (or that there is a suitable substitute program available).

Security, Part 1
You might be surprised to see security on a list of areas where PCs and Androids excel over Macs and iOS devices.  Yes, it is true that Apple's products are generally more secure, but PCs do have one security advantage over Macs.  Most PCs have security software on them that protect them from attacks that affect both types of devices.

Most attacks today are not the viruses that spread by installing a device (like a flash drive or external hard drive) on an infected computer and then bringing it back to your own computer.  They are social engineering attacks designed to get you to give up your personal information and passwords.  It doesn't matter if you are using a PC, a Mac, an iPhone, or a Galaxy Tab, if you click that link in the email you received from "your bank" and hand over your online password, your information will be in the wrong hands.

Fortunately, security software is recognizing this change and adapting to protect us.  However, security software does you no good if you do not have it installed on your system.  As a whole, PC users recognize these threats and install security software better than Mac users.  Yes, you may not need an antivirus program for your Mac, but software that helps you recognize shady sites and phishing schemes would be a plus.

Friday, August 28, 2015

Keep Your Privacy Online

It seems like not a day goes by where we do not hear about some privacy or security breach.  Whether it is an iCloud hack, a credit card breach, or a new way of gathering data about you, there is someone out there determined to gather your information.  This tracking can come from your internet history, your emails, your social networks, or your purchases.  If you are doing it online, there are companies out there trying to get it so they know more about you.

The major browsers have all created a "Do Not Track" option, but this is not effective because it is currently voluntary on the part of the marketers.  If a marketer wants to ignore this option, you can do nothing about it.

Fortunately, there is a free third-party tool that is effective:  Blur by Abine.  It will block many of the cookies designed to track you, and it will also protect your personal information.  At the bottom of the page is also a link that allows you to install a premium version for $5/month.  Blur is also available for Android and iOS.

While this program is not perfect, it is constantly being improved to protect your data.  We may never be able to have both perfect connection and perfect privacy, but this is one tool to help you in your battle to take back your privacy.

Thursday, August 27, 2015

Catch Wi-Fi Thieves

Securing your wireless network is important.  Your network uses your internet connection, which means that any activity will be traced back to you.  If you don't secure your network, someone sitting in their car could implicate you for trafficking drugs or child porn.  (Yes, it has happened.)  If you don't know how to secure your network, you can read the tip I wrote on this last year here.

However, what do you do if you think that someone is on your network (even if it is secured).  You can try logging into the router's home page, but my router's home page gives me very little information about the devices that are connected.  In order to determine which device is which, I have to disconnect each device and refresh the page to see what disappeared.  Plus, if you forget about a device (like I forgot about the Roku player when I tried doing this), you may think there is an intruder on your network.

Fortunately, there is an easier way.  SoftPerfect's WiFi Guard will scan your network and give you additional information about connected devices.  Looking at my network, I can clearly see my computer, my network printer, my MagicJack phone, and my Roku.  There is one other device that is not recognized, but I believe that it is probably a smartphone or tablet.

WiFi Guard will put a green or red light next to each connected device to show whether or not it recognizes it.  When I scanned the first time, only my computer and the router were listed as green.  If you recognize the device and want it to stop flagging it, simply double-click the device and check "I know this computer or device".

If you want to get even more advanced, you can set the program to email you when an unrecognized device connects to your network.  This is the perfect way to monitor your network when you're not around.

This program is NOT a substitute for a secure network.  Even if you quickly recognize and block an intruder, they still have had time to use your network for whatever nefarious purpose they might have.  However, it is good for keeping track of your connected devices and determining if someone is accessing your network without your permission.

This program is free for Windows and Linux users, but it costs $9.99 for Mac users.  You can download SoftPerfect's WiFi Guard using one of these links:
SoftPerfect WiFi Guard - Windows/Linux
SoftPerfect WiFi Guard - Mac

Wednesday, August 26, 2015

A Simple Fix That Solves Many Problems

If you have called tech support, one of the questions you will usually hear is "Have you tried restarting?"  Yes, turning your device off and back on may actually fix many of the problems you are having.

There are many reasons why a restart can fix a problem.  The data that your computer is actively using (in open programs and files) has to be refreshed by the computer regularly.  If data gets corrupted on a refresh, it can remain corrupted until you restart.  Depending on what got corrupted, this error might never cause a problem or it might crash the entire system.  (The most likely outcome is somewhere in between the two.)  Restarting your computer will force the computer to use the original data instead of constantly refreshing the corrupted data.

Memory leaks are another problem that can be solved with a restart.  A memory leak occurs when a program constantly requests more and more memory.  You may not be using that program anymore, but the memory may still be reserved for it.  This limits the memory available for other tasks.  (To visualize, think of memory like employees.  If you keep taking employees away from their regular duties to work on one project, you can accomplish fewer tasks with the remaining employees.)

Restarting can also be a diagnostic tool.  Even if the problem returns after a restart, you can use the restart to determine if a program is causing the problem.  When the problem appears, think about the last program you opened.  Then, test it by restarting and using only that program.  If the problem appears, restart again and try using your computer without opening that program.  If the problem does not surface, then you can check for updates or uninstall and reinstall that program.

Restarting even works on devices like routers and modems.  I have saved many phone calls to my internet provider by simply unplugging my router and modem for a few seconds.  Plug it back in, and the internet works fine again.

Tuesday, August 25, 2015

Performing Effective Backups

One of the most common things I am asked to do is to recover files from a computer that has failed.  Fortunately, many things happen to a computer that do not destroy your files, but occasionally, I encounter a failed hard drive.  When this happens, it will be costly to recover your data.

If you perform effective backups of your important files, then you will rarely have to worry about losing them.  If your hard drive crashes or your computer is melted in a fire, a backup will keep your files safe.  Here are some thoughts to consider when planning how you will backup your data:

1) Importance vs. Cost - How much time and money you want to invest in backing up your files should be proportional to the importance of those files.  If the only files on your computer are a few letters that you probably won't need, then backing them up is of little importance.  If your computer has the only copy of your wedding photos, then backing them up should be a little higher priority.  If recreating lost files could cost your business days or weeks of lost productivity, then backups need to be one of your top priorities.

2) What Can Happen? - Planning your backup needs to take into account everything that could happen to your computer.  A hard drive crash is the most common problem, but it is certainly not the only thing that can destroy your data.  A natural disaster--such as a fire or tornado--could also destroy your computer.  And if your only backup is on an external hard drive or flash drive sitting next to the computer, your backup will probably not survive either.  For this reason, some of your backups should be stored elsewhere:  either online, in a bank's safety deposit box, or at another location.  It could even be to occasionally trade backups with a friend who lives on the other side of town.  (Obviously, you would not want to trade any sensitive data.)

3) Automate It - No one usually thinks about performing a backup until it is too late.  Therefore, the best idea is to set up your computer automatic backups.  This can be programmed through Windows or using third-party software.

4) Consider the Cloud - Storing your backups online has become the latest trend in data security.  This keeps your files safe from just about any disaster, and it can be easily automated.  There are many options when backing up files to the cloud.  To start, I would recommend using Google Drive or Dropbox.  Both of these services offer a generous amount of space free, and you have the option to purchase more at a reasonable price.  Furthermore, both have programs you can download to your computer.  Simply place a file in the Google Drive or Dropbox folder, and the program automatically syncs it with the server.  Then, your "backup" happens every time a file is changed, not just when you schedule it.  There are also paid options available that will perform more comprehensive backups of your computer.  If you are considering this option, I would start with Carbonite.

5) Test, Test, Test - I was recently called to the site of a business that had suffered a server hard drive failure.  I asked if they had a backup, and they informed me that someone had installed a second hard drive to store backups and had set the server to backup automatically.  I began to work on recovering the backups, and I discovered that the second hard drive had become corrupted, and no backups were being performed.  If you have extremely valuable data (such as business data), then you need to schedule times for testing your backups!  If you do not test your backups, you have no idea if you are actually backing up your data properly.

For personal files, testing may be as simple as opening a few files off of the DVD to ensure they were copied correctly.  For businesses, testing may mean restoring a backup to an older machine to make sure everything works correctly.  As I mentioned in the first point, the amount of testing you do will be related to the importance of the files.

Monday, August 24, 2015

Find Out What Is In Your Computer

Have you ever wanted to upgrade your computer or needed information about exactly what components were inside it?  Regardless of the circumstances, there are times when you might need to know more information about what is inside your computer, and it is difficult to find exactly what you need.

Fortunately, this is where Speccy comes in handy.  Speccy will scan your system and provide you with plenty of information about your computer's individual components (probably more information than you could ever need to know!)  If you are looking to upgrade or just want to know what is inside, Speccy is a handy little tool.

Find out more about Speccy here.