Page 1

13102 Palm Beach Blvd, Suite A Fort Myers, FL 33905 Phone: 239-344-7574 Fax: 239-236-0389 Email: info@itbythesea.com Office Hours: M-F 9am-6pm, Sat 10 am—6pm

Be Sure To Visit Us At: ITByTheSea.com FloridaInventoryServices.com

Services We Offer • Network Design • Network Support • Network Maintenance • Local and Remote Data Backup • Data Recovery • Upgrades and Repairs • Website Design and Hosting • Assets Inventories

Creating Guest Accounts For Visiting Relatives

The Perfect Gift For The Business Owner Who Has It All

Continued from Page 1... Windows Vista 1. Click on the Start button, Open Local Users and Groups, then type lusrmgr.msc in the search box, and press ENTER. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. 2. Click Users, and then double-click Guest. 3. Select or clear the Account is disabled check box

Trying to shop for a busy business owner who has it all? How about an I.T. By The Sea gift certificate? Your relative or business associate may use the gift certificate to purchase new hardware or software for their business, to cover an onsite service call or project, or may apply it towards our Network Lifeguards Service Plan. Certificates may be purchased in minimum amounts of $50 each and have a one year expiration date. Call 239-344-7574 now to order your I.T. By The Sea gift certificate.

Windows 7 1. Open the Control Panel (All Items View). 2. Click on the User Accounts icon. 3. Click on the Manage another account link. 4. If prompted by UAC, then click on Yes. 5. Click on the listed Guest account, or create a new account 6. Hit Set up Guest Mode and select Turn on Guest Mode 7. The guest account is now turned on. Close the User Accounts window. Windows 7 Guest Mode also further protects your computer by preventing your relatives from installing any software, prohibiting them from making any system setting changes, and deleting their data after the session is over or the computer reboots. Also, if your guest does manage to wreak havoc on your computer, Windows 7 can revert it back to how it was before your guest got his hands on it. 4 // Caloosa Tech Times

Network Design • Network Maintenance • Data Backup/Recovery • Assets Inventories • Upgrades/Repairs • Website Design/Hosting

WiFi Networking: What It Is, How It Works, And What You Need To Know WiFi, or wireless networking, is quickly becoming the preferred method for connecting to the Internet or other computers because of its simplicity. Using WiFi, you can connect anywhere in your home, office, or even your local cafe without the need for wires or Internet connections.

How It Works

“As a business owner, I know you don’t have time to waste on technical and operational issues. That’s where we shine! Call us and put an end to your IT problems finally and forever!” - Christine Roux, I.T. By The Sea

Volume II, Issue 12 December, 2009 Fort Myers, Florida

Inside This Issue... WiFi Networking....Pages 1 and 2 Creating Guest Accounts For visiting Relatives….Pages 1 and 4

How New Viruses Get Named…. Page 2

Great Technology Gifts Under $100... Page 3

Do you have an idea to make this newsletter better? Would you like to submit a story, article, or green tip? We’d love to hear from

Go Green Corner... Page 3 The Perfect Gift For The Business Owner Who Has It All....Page 4

you!

Call us at: (239) 344-7574 Or Email us: TechTimes@itbythesea.com www.ITByTheSea.com

Where To Connect

Finding a wireless (Wi-Fi) hookup (also called a hotspot) for your laptop is getting easier. Thousands of free Wi-Fi hotspots are springing up across the country including coffee shops, hotels, and public areas. Most of these establishments charge a fee for the access but with a little research, you won't have to pay a cent. For example, Shlotzsky's sandwich shops and Apple retail stores provide access for free to attract customers. Hotel chains like Best Western, Clarion, Comfort Inn and Omni hotels are also offering free Wi-Fiservice to their guests. To find free hotspots in your area or an area you will be traveling to, go to ConnectedHotel (http://www.connectedhotel.com) or Wi-Fi FreeSpot (continued on page 2)

Vita's Tips And Tricks….Page 2

Meet Our Client Of The Month: Charlie Potter, Owner of Hawk Enterprises….Page 3

We Want Your Input!

A simple way to understand wireless networking is to think about how walkie-talkies work. These small radios communicate by transmitting and receiving radio signals. When you talk into a Walkie-Talkie, your voice is picked up by a microphone, encoded onto a radio frequency and transmitted with the antenna to the other walkie-talkie which then converts that radio frequency back to your voice.

239-344-7574

Creating Guest Accounts For Visiting Relatives The holidays are right upon us and there's a good chance some of your relatives will want to use your computer while visiting. If you want to give them access but don't want them viewing your personal files, then you'll need to set up a guest account. This will give them access to your programs, but not your personal files. Here's how… Windows XP 1. Open Control Panel (Start -> Control Panel) 2 Open User Accounts in Control Panel. 3 Click Guest. 4. Click "Turn On Guest Account." Now your relative without a user account on your computer can log on to the computer at the Welcome screen. (continued on page 4) I.T. By The Sea

// Page 1


Vita's Tips And Tricks

Hi, I am Vita, I am very excited because this is going to be my first Winter ever. See, I was born on July 1st. I can't help but wonder what "cold" will feel like.

Ever try to save a file only to be told that the file name is "invalid" due to a character issue? This is because those characters have specific functions in Windows. Here is the list of characters to avoid: * Asterisk < >[ ] Brackets = Equal sign + Plus sign " Quotes \ / Slashes , . : ; Comma, Period, Colon, Semicolon

WiFi Networking: What It Is, How It Works, And What You Need To Know Continued from Page 1... (http://www.wififreespot.com). Wififreespot.com also lists libraries and public parks that offer free access. They are little bit harder to find but you may be delightfully surprised to find one in your area. If you can't find free service, you can pay for the access. T-Mobile (http:// www.t-mobile.com/hotspot/) has nearly 4,600 locations throughout the United States and has hotspots located in Starbucks coffeehouses, Borders Books & Music stores, airports and other areas.

Never, ever send a credit card number or personal information of any sort over a wireless Internet connection. The guy in the next car could grab it as easy as your neighbor. And if you set up a wireless network, remember that you must go the extra mile to ensure your network is secure. Police report a big business among criminals who use insecure networks to steal data like credit card numbers. To safeguard your computer, turn off all file sharing and avoid sending sensitive e-mail or making online purchases.

Internet users beware! Wi-Fi access is not as secure as your Internet connection at home or at work. Most free public wireless networks turn off all security functions by default to make it easier to connect.

If you want to join the thousands of other computer users who have gone wireless, give us a call. We can install and configure the necessary hardware and software to get you connected in no time flat!

Security Problems With Wi-Fi Hotspots

Want To Go Wireless? We Can Help!

How New Viruses Get Named Get More Free Tips, Tools, and Services At My Web Site:

www.ITByTheSea.com

2 // Caloosa Tech Times

Thousands of viruses are currently circulating on the Internet with more being discovered daily. So how does a virus get its name? There is no official government body or organization that names viruses. In most cases, the anti-virus company that discovers a virus gets to name it which means it is a very competitive race to see who can discover new viruses first! The criminals creating viruses like to leave clues as to what they want their virus to be named, but researchers who discover (and fight) them don’t give their authors the satisfaction of keeping the name. To hackers, creating a destructive, difficult to disable virus is a badge of honor. So instead of giving these cyber criminals the publicity they crave, virus researchers will name a virus based on the type of system it attacks, what it does, or other random reasons. For example, the Code Red virus got its name from an eEye Digital Security researcher's beverage of choice -- the cola variety of Mountain Dew soft drink. Apparently he was drinking this the night he cracked the corruptive code. Creativity aside, most anti-virus companies have policies and letter-number formulas for naming viruses because it’s becoming more and more difficult to come up with unique names for viruses. Symantec’s Norton anti-virus software currently has a catalogue of over 58,193 known viruses—and the number grows every day. www.ITByTheSea.com

Meet Our Client Of The Month! Charlie Potter, Owner of Hawk Enterprises Q: We are here with Mr. Charlie Potter from Hawk Enterprises LLC and we wanted to talk about what it is that Hawk Enterprises does. A: Hawk Enterprises is primarily an electrical contractor. We have experience in most all types of electricity. I have a lot of experience in industrial electricity and then I picked up some residential home electricity. We like trouble shooting, the harder the job or the bigger the problem the better we like it. We also got into generators. We do service on all Generacs, from the portables, RVs and the whole house units as well. Q: Do the clients get the generators directly through you? A: Yes, we are Generac authorized service dealer. Q: How do I go about contacting you? A: I have an email. It's HawkEnterprisesLLC@comcast.net. The phone number is (239) 770-2332 and I'll answer that one about 90% of the time. Q: I would like to talk a bit about how it is you know I.T. By The Sea. A: I.T. By The Sea come to me through location

actually, in some advertisement I think seen out which you guys had pushed it somewhere. I like to keep my business local and do business with local people and you were the closest people to me that did computer repair. I stopped in and we had a talk and I was impressed by your business like atmosphere and your ability to answer my questions. So I thought I'd give you guys a try and everything worked out very well. When I got a problem I pack up, I come down there, it's solved. I don't have to worry about what I did wrong or what I did. I just tell you what I did and you just fix what I had done. Q: Thank you. That is very nice of you to say. Well, it has been a pleasure speaking with you Charlie. A: Thank you very much. Hawk Enterprises is located in East Lee County Phone: (239)770-2832 Email: HawkEnterprisesLLC@comcast.net Listen to Charlie's Full Interview at: http://itbythesea.com/testimonials/hear.html

Great Technology Gifts Under $100 iPod Remote Control: From up to 30 feet away this device will allow you to forward or advance songs, adjust the volume, and even pause your music. Simply plug the transmitter into your iPOD, place it down and attached the water-resistant remote control to your arm. One drawback: You can't scroll through your music collection. You can, however, advance or replay playlists or albums. Pre-Paid Cell Phones are another great gift idea that can help your loved ones stay in touch. No new concepts here, but these phones are easy to purchase and provide one-size-fits all experience to its users. Muvi Micro Camcorder: At only2" x 0¾" x 0¾", it's the smallest camcorder in the world. Despite its size, it provides a resolution to match much larger units, while it's easy to use and even features voice activation i-Fish: Similar to last year's i-Dog, this plastic robotic-fishturned-iPod-speaker has a bunch of entertaining tricks, like reacting to sound or music, and "swimming" all over your desk. 239-344-7574

Go Green Corner If you have a laptop, make it a point to use it more often than your desktop. On the average, desktop computers use about 150 watts of power every time they are used. Compare that to the mere 25 watts that laptops consume. If you are still using CRT monitors, it's time to switch to LCD ones, should the opportunity arises. Prices have plummeted in the last couple of years, and LCDs certainly consume a lot less power than equivalentsized CRTs.

Got any green tips you’d like to share with our readers? Email them to TechTimes@itbythesea.com I.T. By The Sea

// Page 3


Vita's Tips And Tricks

Hi, I am Vita, I am very excited because this is going to be my first Winter ever. See, I was born on July 1st. I can't help but wonder what "cold" will feel like.

Ever try to save a file only to be told that the file name is "invalid" due to a character issue? This is because those characters have specific functions in Windows. Here is the list of characters to avoid: * Asterisk < >[ ] Brackets = Equal sign + Plus sign " Quotes \ / Slashes , . : ; Comma, Period, Colon, Semicolon

WiFi Networking: What It Is, How It Works, And What You Need To Know Continued from Page 1... (http://www.wififreespot.com). Wififreespot.com also lists libraries and public parks that offer free access. They are little bit harder to find but you may be delightfully surprised to find one in your area. If you can't find free service, you can pay for the access. T-Mobile (http:// www.t-mobile.com/hotspot/) has nearly 4,600 locations throughout the United States and has hotspots located in Starbucks coffeehouses, Borders Books & Music stores, airports and other areas.

Never, ever send a credit card number or personal information of any sort over a wireless Internet connection. The guy in the next car could grab it as easy as your neighbor. And if you set up a wireless network, remember that you must go the extra mile to ensure your network is secure. Police report a big business among criminals who use insecure networks to steal data like credit card numbers. To safeguard your computer, turn off all file sharing and avoid sending sensitive e-mail or making online purchases.

Internet users beware! Wi-Fi access is not as secure as your Internet connection at home or at work. Most free public wireless networks turn off all security functions by default to make it easier to connect.

If you want to join the thousands of other computer users who have gone wireless, give us a call. We can install and configure the necessary hardware and software to get you connected in no time flat!

Security Problems With Wi-Fi Hotspots

Want To Go Wireless? We Can Help!

How New Viruses Get Named Get More Free Tips, Tools, and Services At My Web Site:

www.ITByTheSea.com

2 // Caloosa Tech Times

Thousands of viruses are currently circulating on the Internet with more being discovered daily. So how does a virus get its name? There is no official government body or organization that names viruses. In most cases, the anti-virus company that discovers a virus gets to name it which means it is a very competitive race to see who can discover new viruses first! The criminals creating viruses like to leave clues as to what they want their virus to be named, but researchers who discover (and fight) them don’t give their authors the satisfaction of keeping the name. To hackers, creating a destructive, difficult to disable virus is a badge of honor. So instead of giving these cyber criminals the publicity they crave, virus researchers will name a virus based on the type of system it attacks, what it does, or other random reasons. For example, the Code Red virus got its name from an eEye Digital Security researcher's beverage of choice -- the cola variety of Mountain Dew soft drink. Apparently he was drinking this the night he cracked the corruptive code. Creativity aside, most anti-virus companies have policies and letter-number formulas for naming viruses because it’s becoming more and more difficult to come up with unique names for viruses. Symantec’s Norton anti-virus software currently has a catalogue of over 58,193 known viruses—and the number grows every day. www.ITByTheSea.com

Meet Our Client Of The Month! Charlie Potter, Owner of Hawk Enterprises Q: We are here with Mr. Charlie Potter from Hawk Enterprises LLC and we wanted to talk about what it is that Hawk Enterprises does. A: Hawk Enterprises is primarily an electrical contractor. We have experience in most all types of electricity. I have a lot of experience in industrial electricity and then I picked up some residential home electricity. We like trouble shooting, the harder the job or the bigger the problem the better we like it. We also got into generators. We do service on all Generacs, from the portables, RVs and the whole house units as well. Q: Do the clients get the generators directly through you? A: Yes, we are Generac authorized service dealer. Q: How do I go about contacting you? A: I have an email. It's HawkEnterprisesLLC@comcast.net. The phone number is (239) 770-2332 and I'll answer that one about 90% of the time. Q: I would like to talk a bit about how it is you know I.T. By The Sea. A: I.T. By The Sea come to me through location

actually, in some advertisement I think seen out which you guys had pushed it somewhere. I like to keep my business local and do business with local people and you were the closest people to me that did computer repair. I stopped in and we had a talk and I was impressed by your business like atmosphere and your ability to answer my questions. So I thought I'd give you guys a try and everything worked out very well. When I got a problem I pack up, I come down there, it's solved. I don't have to worry about what I did wrong or what I did. I just tell you what I did and you just fix what I had done. Q: Thank you. That is very nice of you to say. Well, it has been a pleasure speaking with you Charlie. A: Thank you very much. Hawk Enterprises is located in East Lee County Phone: (239)770-2832 Email: HawkEnterprisesLLC@comcast.net Listen to Charlie's Full Interview at: http://itbythesea.com/testimonials/hear.html

Great Technology Gifts Under $100 iPod Remote Control: From up to 30 feet away this device will allow you to forward or advance songs, adjust the volume, and even pause your music. Simply plug the transmitter into your iPOD, place it down and attached the water-resistant remote control to your arm. One drawback: You can't scroll through your music collection. You can, however, advance or replay playlists or albums. Pre-Paid Cell Phones are another great gift idea that can help your loved ones stay in touch. No new concepts here, but these phones are easy to purchase and provide one-size-fits all experience to its users. Muvi Micro Camcorder: At only2" x 0¾" x 0¾", it's the smallest camcorder in the world. Despite its size, it provides a resolution to match much larger units, while it's easy to use and even features voice activation i-Fish: Similar to last year's i-Dog, this plastic robotic-fishturned-iPod-speaker has a bunch of entertaining tricks, like reacting to sound or music, and "swimming" all over your desk. 239-344-7574

Go Green Corner If you have a laptop, make it a point to use it more often than your desktop. On the average, desktop computers use about 150 watts of power every time they are used. Compare that to the mere 25 watts that laptops consume. If you are still using CRT monitors, it's time to switch to LCD ones, should the opportunity arises. Prices have plummeted in the last couple of years, and LCDs certainly consume a lot less power than equivalentsized CRTs.

Got any green tips you’d like to share with our readers? Email them to TechTimes@itbythesea.com I.T. By The Sea

// Page 3


13102 Palm Beach Blvd, Suite A Fort Myers, FL 33905 Phone: 239-344-7574 Fax: 239-236-0389 Email: info@itbythesea.com Office Hours: M-F 9am-6pm, Sat 10 am—6pm

Be Sure To Visit Us At: ITByTheSea.com FloridaInventoryServices.com

Services We Offer • Network Design • Network Support • Network Maintenance • Local and Remote Data Backup • Data Recovery • Upgrades and Repairs • Website Design and Hosting • Assets Inventories

Creating Guest Accounts For Visiting Relatives

The Perfect Gift For The Business Owner Who Has It All

Continued from Page 1... Windows Vista 1. Click on the Start button, Open Local Users and Groups, then type lusrmgr.msc in the search box, and press ENTER. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. 2. Click Users, and then double-click Guest. 3. Select or clear the Account is disabled check box

Trying to shop for a busy business owner who has it all? How about an I.T. By The Sea gift certificate? Your relative or business associate may use the gift certificate to purchase new hardware or software for their business, to cover an onsite service call or project, or may apply it towards our Network Lifeguards Service Plan. Certificates may be purchased in minimum amounts of $50 each and have a one year expiration date. Call 239-344-7574 now to order your I.T. By The Sea gift certificate.

Windows 7 1. Open the Control Panel (All Items View). 2. Click on the User Accounts icon. 3. Click on the Manage another account link. 4. If prompted by UAC, then click on Yes. 5. Click on the listed Guest account, or create a new account 6. Hit Set up Guest Mode and select Turn on Guest Mode 7. The guest account is now turned on. Close the User Accounts window. Windows 7 Guest Mode also further protects your computer by preventing your relatives from installing any software, prohibiting them from making any system setting changes, and deleting their data after the session is over or the computer reboots. Also, if your guest does manage to wreak havoc on your computer, Windows 7 can revert it back to how it was before your guest got his hands on it. 4 // Caloosa Tech Times

Network Design • Network Maintenance • Data Backup/Recovery • Assets Inventories • Upgrades/Repairs • Website Design/Hosting

WiFi Networking: What It Is, How It Works, And What You Need To Know WiFi, or wireless networking, is quickly becoming the preferred method for connecting to the Internet or other computers because of its simplicity. Using WiFi, you can connect anywhere in your home, office, or even your local cafe without the need for wires or Internet connections.

How It Works

“As a business owner, I know you don’t have time to waste on technical and operational issues. That’s where we shine! Call us and put an end to your IT problems finally and forever!” - Christine Roux, I.T. By The Sea

Volume II, Issue 12 December, 2009 Fort Myers, Florida

Inside This Issue... WiFi Networking....Pages 1 and 2 Creating Guest Accounts For visiting Relatives….Pages 1 and 4

How New Viruses Get Named…. Page 2

Great Technology Gifts Under $100... Page 3

Do you have an idea to make this newsletter better? Would you like to submit a story, article, or green tip? We’d love to hear from

Go Green Corner... Page 3 The Perfect Gift For The Business Owner Who Has It All....Page 4

you!

Call us at: (239) 344-7574 Or Email us: TechTimes@itbythesea.com www.ITByTheSea.com

Where To Connect

Finding a wireless (Wi-Fi) hookup (also called a hotspot) for your laptop is getting easier. Thousands of free Wi-Fi hotspots are springing up across the country including coffee shops, hotels, and public areas. Most of these establishments charge a fee for the access but with a little research, you won't have to pay a cent. For example, Shlotzsky's sandwich shops and Apple retail stores provide access for free to attract customers. Hotel chains like Best Western, Clarion, Comfort Inn and Omni hotels are also offering free Wi-Fiservice to their guests. To find free hotspots in your area or an area you will be traveling to, go to ConnectedHotel (http://www.connectedhotel.com) or Wi-Fi FreeSpot (continued on page 2)

Vita's Tips And Tricks….Page 2

Meet Our Client Of The Month: Charlie Potter, Owner of Hawk Enterprises….Page 3

We Want Your Input!

A simple way to understand wireless networking is to think about how walkie-talkies work. These small radios communicate by transmitting and receiving radio signals. When you talk into a Walkie-Talkie, your voice is picked up by a microphone, encoded onto a radio frequency and transmitted with the antenna to the other walkie-talkie which then converts that radio frequency back to your voice.

239-344-7574

Creating Guest Accounts For Visiting Relatives The holidays are right upon us and there's a good chance some of your relatives will want to use your computer while visiting. If you want to give them access but don't want them viewing your personal files, then you'll need to set up a guest account. This will give them access to your programs, but not your personal files. Here's how… Windows XP 1. Open Control Panel (Start -> Control Panel) 2 Open User Accounts in Control Panel. 3 Click Guest. 4. Click "Turn On Guest Account." Now your relative without a user account on your computer can log on to the computer at the Welcome screen. (continued on page 4) I.T. By The Sea

// Page 1

Caloosa Tech Times - December 2009  

I.T. By The Sea's Newsletter - December 2009

Read more
Read more
Similar to
Popular now
Just for you