SOCIAL MEDIA LINKS
SEARCH THE ADELAIDE TECHGUY SITE
PUBLISHED ARTICLES
10 minute mail 3D 3G 4G 4K 5AA A Current Affair accidents account recovery Acer Adelaide Adelaide Techguy adobe Adobe Flash adobe reader ADSL Airplane Mode Alternative To Amanda Blair Amazon American Express Android anivirus software ANZ app apple Apple Support Apps Art Of Rap Ask Asus ATO Autoruns Autosaver av AVG Awesome Duplicate Photo Finder Backup Banking battery BB Flashback Express Belarc Big Picture Xbox bigpond Blueberry PDF Form Filler blu-ray bookmarks boot up Broadband broadband speed browsers bsod Bump business butterscotch buying hints cable Call Of Duty Camcard Cameras Camtasia Ccomputer hardware cd burner xp Christmas Chrome Clone Spy cloud Cnet Codec Codeplex Commonwealth Bank Comodo compression computer Computer Cleaning computer hardware Computer Issues Computer Repairs computer safety Computer Security Computers Css Cute PDF Dark Knight data recovery David Pogue deleted files delicious Dial A Fix digital Digital Television disk disk cleanup Disk Defragmenter display display.wallpaper DNS Changer do it yourself Docx domain Domains Download downloads Draw Free Dream It Drive Image XML drive snapshot DriveImage xml dropbox dropdown menu Dummies Duplicate Cleaner duplicates Dvd DVD Burning easeus e-card education email Email newsletters eset Eset smart security Eudora evernote Exact Duplicate Finder Excel F Secure Facebook Facebook Downloader fake fake email FBI Feeds File File Conversion file syncing file viewer Fill Any PDF Form find my iPhone Firefox firesheep Flashback Flipboard format Fox it foxit Game Booster Game Boy Advance Gimp github Gizmodo Glasses Gmail Google Google Docs GRC guides Handbrake hard drive image Hardware Test

Entries in Google (32)

Wednesday
Jul182012

Power FM Spot For 18th July

On This Week In Technology

Amazon.com opened for business in 1995

The Dark Knight was released in 2008

Discussion Point

Did you know Google has a built in word processor , spreadsheet and presentation program built in 

You will find it in Google Drive

App Of The Week

London 2012 Official Results App

Wednesday
Jul042012

Power FM Spot For 4th July

On This Week In Technology
In 1996 Hotmail was introduced 
Discussion Points
In Michigan they have "motion activated" urinal cakes which broadcast a message urging you "not to drink and drive , call a friend or a taxi to take you home."
If you are using Outlook Express for your email , let it go and move to something better
App Of The Week
Type a phrase into your phone and have Barack Obama repeat the phrase

 

Tuesday
Jul032012

5AA Segment For 3rd July

On todays segment we discussed " Google"
Here are the key points:
  • We all use Google for search but remember it is an advertising company
  • Your search is designed for you , dependent on your viewing habits from Google 
  • The ads that appear are based on your viewing and searching on Google
  • Google Chrome the internet browser is fast challenging as the most used internet browser and is a lot more user friendly to tech challenged people.
  • When in Google and your not sure what to type , ask a question “ How do I “ “Who is “
  • Use quotation marks in Google to refine your search “”
  • A Gmail account ( Google’s email solution ) can be your default email account and receive and send emails from your current email address
  • If you don’t have office software on your computer don’t worry , Google has a full office suite built in , they have a word processer , spreadsheet etc ( it’s free)
  • If you have never used Google maps to find an address you are missing out
  • Google own You Tube 
  • Google have operating systems on phones , tablets and computers ( Android ) just like Microsoft and Apple 
Tuesday
Jun262012

5AA Segment For 26th June 

News Of The Week
Google are discovering 9500 infected sites a day
Explanation Of The Week
What is malware ? What are virus’s ?
Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
Discussion Point Of The Week
10 Steps To Safe Online Shopping 
Step 1
Understand what a safe shopping site is with the “green”padlock and https in the address bar Hypertext Transfer Protocol Secure (HTTPS) provide encrypted communication
Use secure websites with lock icons and site seals.
The green display that you see at the top means that the site has an extended validation certificate which means that if your computer is safe it is safe to shop here.
Step 2
Be cautious when providing your personal details online, including credit card details 
Only give sites that you shop from the ” minimal ” information that is required to complete the transaction
Consider using payment intermediaries which can often be a safer alternative , Paypal
Check your credit card every couple of days for irregular transactions
Step 3
If you have any suspicions about the site you are using, don’t proceed with the payment - Google for information on the site
Step 4
Use strong passwords, at least 12 characters, including letters, numbers and symbols - and change it regularly
Step 5
If you have been infected with virus’s / malware and are not completely certain that the infections have been removed and or when you were infected you did not format your drive and reload your operating system then don't shop online.
Step 6
Next is have an anti-virus solution that is updated with the latest signature files.
This will reduce the chance of key logging software and or malicious code being run on your computer which sends your details over the internet.
Step 7
Do not click links in emails to go to shopping sites as this is one of the main ways to get infected and or transmit your personal information.
Never access internet banking from a link in an email 
Delete suspect emails
Step 8
Don't let your browser save your password when surfing the internet , as if you have an infected computer you will be transmitting your personal information.
Your computer saves this information then if you have been infected , the infection will go into your computer and find these passwords. Also if you use a laptop and it is stolen or someone else use’s it then all your passwords will go with your laptop.
Step 9
If you are shopping from a laptop or a computer that accesses a wireless network and have no wireless security or anything less than WPA2 (WEP,WPA) on your router then don’t ,as your computer and your information is at risk.
Step 10
Make sure your firewall is turned on
If this is not the case you can be transmitting your data to the internet. 
Finally remember
If you suspect any criminal activity, contact your financial institution 

 

 

Wednesday
Jun132012

Power FM Spot For 13th June 

 

On This Week In Technology

1997 , In Japan the Tamapittchi, a cellular phone with a Tamagotchi built into it, is released in Japan. We all remember the tamagotchi don't we?

Discussion Point

You don't have to use Internet Explorer to browse the internet , try Google Chrome , Firefox

Google Chrome is safer to use the internet with as it has Adobe Flash built in and pre scans webpages for vulnerabilities , such as virus / malware infection.

Firefox are known for the add ons to enhance your web browsing experience.

App Of The Week

Dream It , capture and record your dreams