Every Sunday @12 Noon

Tech Tips

Tech Tips Brought To You By:

Cable TV, Internet, Phone

ALL 3 For $79 Per Month Includes HD Box

Check With Your Pinellas County Rep, Call Steve @ 727-329-9131


Cell Phone RepairCracked Screen Repair Starting @ $49.95″

Iphone, Ipad, Ipod, Samsung, HTC, MotorRolla, Blackberry

Call Now For Fast Cell Phone Repair 813-408-1953 / 727-441-8798



Video How To Tech Tips

TIP- You’ll Need:

Adobe Flash (Click To Download)

Or Quick Time Player (click To Download)

To View Videos 


Tech Tips, Picasa, 6-19-12

Tech Tips, Google Chrome, 6-19-12.

Tech Tips, Blogging, 6-19-12

Tech Tips, Security, 6-19-12.


Tmobile- Flex Pay-VS AT&T Go Phone

T-Mobile’s Flex Pay and AT&T’s Go Phone both have advantages.

With credit scores challenged in the economic slowdown, prepaid cellular phone plans have been a solid arrangement for many customers.

T-Mobile’s FlexPay and AT&T’s Go Phone are two popular options in pay-as-you-go cellular phone service.

Both have options suitable for many customers, at a price most can afford.

Rate Plans

FlexPay is a prepaid version of the regular T-Mobile postpaid phones. Simply signup to pay your bill in advance and your rate is the same as a postpaid phone.

You can purchase Whenever Minutes at a rate of 20 cents per minute in advance — in bundles of $10, $25, $50 or $100. Rate plans start at $39.99 for 500 Whenever minutes and unlimited talk-time on nights and weekends. Unlimited calling and text is only $20 more.



Steal these Android tips and tricks

By Marc Saltzman

You don’t need a degree in software engineering to get more out of your Android smartphone.

Regardless of the kind of Android phone you’re packing — be it from Samsung, HTC, LG, Motorola or Sony, to name a few makers — we’ve got a handful of helpful ways to unlock the capabilities of your favorite handset.

Unless otherwise specified, it also shouldn’t matter what version of Android you’re running on your smartphone, with the most popular today being Android 2.3 (“Gingerbread”) or the latest release, Android 4.0 (“Ice Cream Sandwich”). To figure out what version you’re running, go to the About section of your device, under Settings.

Many of these tips and tricks will work on Android-based tablets (including those powered by Android 3.x, a.k.a. “Honeycomb”) as well as phone-tablet hybrids like the Samsung Galaxy Note and its built-in stylus pen.

Oh, and if you have any tips of your own, feel free to share them with others below in the Comments section.

Text or talk

If you’re getting a call on your Gingerbread or Ice Cream Sandwich (ICS) device, you can swipe the screen to the right to answer, swipe to the left to ignore or swipe up to quickly respond with a text message —  READ MORE>>>>

Listen to Message-From Compu-tek_050512


7 Ways to Help Prevent Identity Theft

 Stay on Top of Your Credit Report

 Just like semi-annual teeth cleanings, consumers should make a point to check their credit score on a regular basis — ideally every three to four months, says Gail Cunningham, spokeswoman for the National Foundation for Credit Counseling.

 You can get a free credit report every 12 months from each of the major credit bureaus, Equifax (EFX: 46.25, 0.17, 0.37%), Experian and TransUnion.

 To request a report, go to annualcreditreport.com. Look for any questionable accounts like a credit card or a car loan that you never signed up for and contact the credit bureaus immediately to report them.

 Pay Attention to Credit-Card Statements

 Consumers should be just as vigilant about combing through their monthly credit-card statements.



Chrome to Phone: Interact with your mobile Android device from your desktop

By Jack Wallen
The free Chrome to Phone application is the easiest way to send URLs and pasted text from your desktop to your Android phone.

If you’re a hardcore Android and Chrome user, I’ve got a nifty application for you. I stumbled across this while searching for ways to get a vanilla Android launcher on a Motorola Droid X.

The tool is called Chrome to Phone, and it allows you to:

Send browser links from Chrome to your phone with a single click

  • Launch specific applications on Android with specific links (such as Google Maps and YouTube links)

  • Send phone numbers that automatically launch the dialer

  • Send text on a Web page that copies the clipboard to Android

It’s very handy — especially when you don’t want to type out long URLs or text on your Android handset.

You can also associate Chrome to Phone with any phone or tablet that’s currently connected to your Google account.

Let’s walk through the process of setting up and using this awesome tool.





1-Speed”Speed Test” Checking Your Internet Connection

2-System Restore-Create A Restore Point, If system needs Windows restored.

3-MS Config- Make Windows Boot Up Faster Removing Unwanted Apps and programs.

4-Task Manager: Unfreeze Windows Apps and Programs When Windows Hangs or Locks Up.

                                            5-Dust Management. Hardware Maintenance

Scroll Down To Bottom Page To Watch Videos


How to Fix a Windows Infection Using Linux

By Katherine Noyes, PCWorld

If you use Linux on your company’s desktop or server computers, you’re already familiar with many of the security advantages the open source operating system offers over its Windows and Mac rivals.

What many people don’t realize, however, is that Linux can also be used to rescue a computer that has been crippled by malware.

1. Get a LiveCD or Live USB

LiveCDs and USBs are a wonderful thing in the Linux world because they let you boot a machine directly from the CD or USB stick without ever having to access the computer’s boot records.

Not only are they a great way to take Linux for a test-drive, but they can also be put to work when Windows can’t.



How to Keep Your PC Safe With Sandboxing

Setting up your PC to run important apps in a sandbox can help you avoid malware infections.
Sandboxing is a form of software virtualization that lets programs and processes run in its isolated virtual environment.
Typically, programs running within the sandbox have limited access to your files and system, and they can make no permanent changes.
That means that whatever happens in the sandbox stays in the sandbox.
Here’s how to do it.

  • Automatically or manually run unknown programs in the sandbox in case they contain viruses, spyware, or other malware.
  •  Run your Web browser within the sandbox to prevent damage from any infections you pick up while browsing, which is the most common origin of malware…



How to Root Your Kindle Fire

No Android device is really yours unless you have root access.

Here’s how to install the Android SDK and root your Kindle Fire.
 Read More Click Here


How To Avoid Paying High PC & Laptop Service Charges

There’s more to computer upkeep than just cleaning your monitor and keyboard. Everyone knows you need to perform some sort of maintenance in order to ensure a computer runs smoothly. But many people either don’t know what to do or end up putting it off until the last minute (or even later).

Don’t wait until you have a problem to perform maintenance on your system. Here’s our list of must-do maintenance items for those of you who put it off for a once-a-year spring cleaning. Doing this all at once isn’t optimal, but it’s better than not doing any at all!

(Note: This article is for Windows PC owners. Mac users, check out our Mac hub, or some of our other Apple-centric guides and how-to articles.)


 Click On Links Below & Watch Tech Tips On Video

“2012 Video How To Tech Tips”

“You May need To Download  Quick Time or Adobe Flash”

Adobe Flash            Apple Quick Time           Microsoft Media Player 11

Tech Tips, Firefox Sync

Tech Tips, icloud

Tech Tips, Microsoft Exchange

Tech Tips, Passwords

Tech Tips, Wi Fi Cap


Tech Tips 2011

#1-Tech Tips, Speed Test, 9-21-11..

#2-Tech Tips, System Restore, 9-21-11

#3- Tech Tips, MS Config Tool, 9-21-11

#4Tech Tips, Task Manager, 9-21-11

#5-Tech Tips, Dust, 9-21-11


Facebook Privacy: 10 Settings Every User Needs to Know

Facebook’s privacy settings are extremely detailed, giving you the ability to fine-tune the privacy aspects of almost every little part of your Facebook account.

Unfortunately, for most users, this level of micromanagement makes Facebook’s privacy settings a convoluted mess.




Best Wireless Security Tech Tip

Watch this Video, and you decide if It is OK to steal your neighbors Wireless Internet Access, find out why it is dangerous using a neighbors Open Wireless Access.

Hilarious Video To Watch!



How to Install the Android Market on Your Kindle Fire

By Alex Wawro, PCWorld Nov 28, 2011 4:30 pm

Want to try downloading and installing apps on your Kindle Fire aside from the ones that Amazon offers?

Follow these steps to add Google’s Android Market.


28 iPad 2 Tips and Tricks

Master your new iPad 2 with these quick tips and convenient shortcuts.

By Patrick Miller, PCWorld Mar 15, 2011 9:00 pm

Your new iPad 2 might not be as full-featured (or as complicated) as a laptop or desktop PC, but a few neat tricks are still hidden between the surface.

Download the free iPad User’s Guide: You may have noticed that your iPad didn’t come with a big printed manual–that’s not Apple’s style. However, you can download the PDF version of the iPad User’s Guide from Apple’s Web site, or you can read it in iBooks if you have that installed (iBooks is available as a free download in the App Store). Make sure to download the manual for iOS 4.3.



Video How To’s 2010

 Blast From The Past 820 Am Radio

Mac Vs PC: Windows 7 Vs Snow Leopard

Free Windows 7 Beta Software


Windows Side By Side

SOS Talk Show Demo

5 Tips Before Upgrading to Windows 7

Linux ,Ubuntu Free Software

Watch TV With Your Laptop or PC

I.E 8 Surf the internet Securely and Safely No More Pop Ups

Power Surges Destorys Dell & Hp Laptops

Tech Tips, Lost Software, Hardware Drivers

Connect to the Internet Using XBOX 360

Watch Movies Free on Playstation

Vista Easy Backup of Data

Save on Computer Repairs

1. Vista Parental Controls

2. MySpace tip for Parents

3. Lighting Protection Tip

4. Security

5. Online Gaming


The 8 Security Steps Keeping Your Computer Safe


#1 Keep your computer software up to date

Keep all software (including your web browser) current with automatic updates.

If you are not already running Internet Explorer 8, the latest version of our web browser, click the button to the right to get it.

#2 Defend your computer

Use firewall, antivirus, antispam, and antispyware software. For an added layer of protection on your PC, you can download Microsoft Security Essentials for free or find other antivirus solutions.

#3 Avoid phishing scams and malware.

By default Internet Explorer 8 runs SmartScreen Filter to help block and warn you of malicious software or phishing threats. SmartScreen Filter alerts you if a site you are trying to open has been reported as unsafe and allows you to report any unsafe sites you find.

#4 Protect yourself from emerging threats

Cross-site scripting attacks are one of the increasingly sophisticated methods online criminals use to get your personal information.
By default Internet Explorer 8 helps protect you against these attacks with a built-in Cross Site Scripting (XSS) Filter that is always on.

#5 Identify fake Web addresses.

Internet Explorer 8 helps you avoid deceptive websites that can trick you with misleading addresses .
The domain name in the address bar is highlighted in black to make it easier to identify a site’s true identity.

#6 Browse more privately.

When you’re using a public computer to check e-mail or you’re shopping for a “surprise” gift on a family PC, it’s a good idea to use InPrivate Browsing—a feature that helps prevent your browsing history, cookies, and other information from being retained on your computer.

#7 Make sure payment websites use encryption.

To confirm that a website uses encryption when processing credit card information, look for:

  • An “s” after http in the Web address—it should read https:
  • A tiny closed padlock in the address bar, or at the lower-right corner of the window.
  • A green address bar—Internet Explorer 8 uses this to indicate a trustworthy site.

#8 Never respond to unsolicited requests to update your account information.

These e-mail messages might be scams for stealing your identity.
Most legitimate companies never send unsolicited e-mail or instant message requests for your passwords or other personal information.
And remember, if it sounds too good to be true, it probably is.


10 commandments of the Home and Office

Computer Security

Step by step guide to improve computer protection in home, office and small business networks using computer security software and… a bit of common sense.

What are the most important steps to secure a Microsoft Windows home/office computer?

Here is a checklist to increase your overall computer protection.

It will make life very difficult for hackers trying to penetrate and control your computer and you will avoid much stress and panic, if and when things go wrong.

1 Anti-Virus.

  • The first thing to do, after installing/reinstalling your Windows operating system or purchasing a new computer, is to immediately install an antivirus software to protect your computer when you first connect to the Internet.
  • Most modern antiviruses automatically update themselves, more or less frequently, but whatever you choose, make sure to configure it to run a full scan weekly, or daily for the “free” versions.
  • You might want to read our antivirus reviews, before choosing one.

SOS Computer Talk Show Host and Co-Host Recommend downloading AVG http://www.download.com or Microsoft Security Essentials http://www.microsoft.com/security_essentials/

2 Update Windows.

  • Once you have your anti-virus installed, you should connect to the Internet and click on Windows Update.
  • If you bought a copy of Microsoft Office, it would be better to upgrade to Microsoft Update, should Microsoft’s website offer to do so.
  • It will make sure that not only Windows, but any other Microsoft’s programs are updated with the latest functional and security “patches”.
  • To preserve your computer protection, configure Automatic Updates to download and install any update at a certain time of the day, preferably when you are less likely to work on your computer.
  • This will ensure that you don’t leave for lunch and come back to see that your machine had restarted while you were away!

3 Firewall.

  • Microsoft Windows has a built-in basic firewall, which has one big “flaw”: it assumes that every software “running” on your computer is legitimate and entitled to connect to the Internet.
  • It is therefore essential to install a “two-way” firewall software, either stand-alone, or as part of an Internet security suite, which will monitor both inbound and outbound connections.
  • That together with a broadband router with a built-in firewall, will create a very powerful line of protection for your home or small office computer network.
  • You can find some suggestions for a “best-of-breed” or integrated solution in our firewall reviews.

4 Antispyware.

  • Installing an effective antispyware has become as important as installing an antivirus. Either as a stand-alone product, or as part of an Internet security suite, it is essential to get a real-time computer protection, to monitor any changes being made to the Windows registry or Internet Explorer.
  • Real-time protection is never part of “free” versions though and the quest for a “freebie” can actually land a tough spyware straight onto your machine, because one of the most effective ways to spread spyware is to camouflage it as a “free” antispyware.
  • By purchasing a reputable antispyware software you will get a solid computer protection, which includes a memory resident program, i.e. a real-time shield, and you won’t be installing any spyware with your own hands.
  • For recommendations on what to use, you could either have a look at MalwareBytes/Spyware Terminator.

5 Wireless Security.

  • If you have a wireless home network, please make sure to use a WPA-PSK wireless encryption, if possible, to prevent any unauthorized connections to your network or Internet.
  • Even an old WEP key is better than nothing, though, because leaving your wireless network completely “open” provides free access to the Internet to anybody wanting to use someone else’s identity, “yours”, in the form of your Internet address.

6 Backup.

  • Sensible backup is never too much.
  • Buy an external hard drive and use it to backup all your music, video, pictures and office documents.
  • It will come in very handy, not only if your PC becomes infected with a virus and crashes the operating system, but also when your hard disk breaks and you need to re-install Windows.
  • You will be relieved, while painlessly retrieving all your files, without the thought of having lost any of them.

7 Encryption.

  • You might keep sensitive data on your PC, like your bank or brokerage account details, employees payroll information, social security numbers, or any other confidential information that you wouldn’t want to fall into the wrong hands.
  • Another way to think of this problem is: how would you feel if one day, back home or to your office, you found that your computer had been stolen?
  • Backups would have addressed the panic of retrieving those details for yourself, but what if that info had been accessed by criminals?
  • If that is a disturbing thought, then a solid but easy to use encryption software will make it virtually impossible for someone else to view the content of your important documents.

We Recommend Using Coversurfer for Websurfing and encrypting all of your files, and other sensitive data.

8 Passwords.

  • Despite the temptation (and the convenience) of using always the same, easy to remember password, try using one which is not easy to guess and make it unique.
  • You can do so by adding uppercase letters, numbers and sometimes special punctuation characters to the word, which makes your password much more difficult to crack.
  • This little effort will greatly increase your computer protection withouth even requiring any special computer security software.

9 Email Spam.

Be sure to set up an email spam filter on your email account.

  • If your email service provider offers you such a filter, please activate it. In its most basic incarnation, an email program like Outlook, will have a Junk filter, which you have to configure.
  • Remember that no software filter can be 100% correct and that the more aggressive the filter, the higher the chances that a legitimate message will be caught in the filter.
  • That’s the reason why we recommend that whatever spam filter you use, it should always make it easy for you to check all messages, at any time.
  • If you are a victim of heavy spamming, you might want to consider some more sophisticated filters, which are able to be “trained” and learn from previous messages to discern the good from the bad.
  • Those filters are either available as stand-alone products or as integral part of Internet security suites.

10 Software, Music and Video Downloading.

  • If you use Peer to Peer networking programs like Limewire or Kazaa to download music, video and software, you should be aware that a large percentage of those files can contain viruses or spyware.

  • It would be advisable not to connect to those networks, if you haven’t installed the best of the best computer security software available on the market.
  • Even so, you would need to keep your eyes wide open, while connected.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>