Online PC Support

OPS Technical Solutions : +1 315-226-4249


How to Improve Your Password Strength

As most of us work on computer these days not only everything has become online but everything is confidential, like project document and bank details. You name it and you realize it is confidential may be that is why all the application and software that we use these days has password on it. Even our computer comes with a password. But with so many passwords is it not at time difficult to remember them all, it is and we all know it. Password for email, password for the internet company account, password for bank account, password for computer, password for social network website and the list goes on. The password that I mentioned is just the basic one which does not include your work application just the basic one which all of us have. Now we come to a common conclusion of making similar password for all these account. Something like our last name and then 123, few may also dare to make password like Password123. Well if you are of those I would suggest you to read the following steps to improve the password so that it will not only improve the security of your password but will help you to avoid your from being compromised.

Step 1: First let’s check if your account has been compromised. Hacker often makes account public once they hack your password. There are few known database where you can check if your account has been compromised. You can check it for such websites where if you check with your email address it can tell you if your account is safe or not.

Step 2: Visit Microsoft website to check the strength of your password i.e. Microsoft Password Checker in Safety and Security Center. It will help you determine the strength of your password. If it is termed as weak please change it as soon as possible. We would recommend you to add symbol and try combination of uppercase and lowercase letters to make it strong.

Step 3: In case you are facing difficulty making your password strong just remember to add symbols like “!,@,#,$,%,^,^,&,*”  it will help you to make your password strong as it is believed that symbols are difficult to guess and gives hackers tough time to break in to your account.

Step 4: Many organization also practice to change password after 30, 60 or 90 days. We would also recommend you to change your password after some time as it will help you to make it more secure as the hacker will have to try new guess again. Also we recommend keeping a track of account history which would say when did you last logged in. In case you find that your account was logged in and you are not aware of it please change it as soon as possible. To end with we would suggest you not to save password in your browser memory as adware can send it to their owner without your permission. Clear browsing history if you are using a public computer.

Technological innovations

Whether it is your personal life or your professional life, it is the survival of the fittest. You need to know every step of your rival. It is just a comparison between your life and the business world. It is all about the survival of the fittest. There are things known and unknown and the person who manages to know the unknown of the rival outshines as a winner in this battle.

This time it is a battle in the business world. It is a battle which is all about different computers launched and the other advanced ones. It is all about how research and development team works in the laboratory and what is the investment made. It counts and it is the major cause of concern. Several new computers and processors have been launched in the market with advanced features. There are so many companies in the market that if you are not aware what is the latest version of the computer, you are for sure going to loose and going to take an old version and outdated one as well. The battle has entered into a new phase with tablet PCs unveiled by many companies.

It can be remembered easily what the first screen looked like. Those were the cathode ray screens. Those screens were very heavy but still they were in demand and after that came a new kind of screen and it was CRT with flat screen and this made people crazy about it. After flat screen CRTs, it was the turn of LCD screens. They have proven to be a great success. After that plasma screens were launched, which offer a great visual experience. These technologies are like a game changer and nothing can stop it as there are researches on and everyday there is a new launch of computing device somewhere in the world.

It is must for the telecom companies and the computer manufacturers to keep themselves aware about all the developments taking place on the technological front. For example now there are laptops and tablets which have a never before face recognition software and with that it is possible to set a log in password which is your face. It is a fool proof security measure.

How to stop people from stealing your online information

Most of our personal or professional work is done on computers. We keep important files, data and other sorts of crucial and critical information on the computers. We keep many of our personal photographs on our computers and much more stuff which is likely to be very personal in nature. In today’s world computer information theft is becoming a pain with each passing day as the hackers are coming up with new technologies and ways to steal one’s personal information to get something out of it. It is said that precaution is better than cure, and this fits in this situation also. It is always good to have adequate security measures on your computer so that no one steals your information and use it incorrectly.

In this post I will give you some steps and ideas to keep your information safe on the computer and protect it from Internet theft.

Step 1: The first and the foremost thing is not to share your personal information on the Internet. Trust me this is the best way. We often end up entering our information like name, age, location, phone number etc on many websites which require us to register before accessing the content. Try entering fake information here so that nobody knows about your personal details.

Step 2: Limit access to your personal information on social networking sites like Facebook, Orkut etc., so that not everybody can view the details about you. It is good if you not even let everything displayed in front of your friends as they might forward it to someone else.

Step 3: If you work on any public computer, never ever save your passwords in the browser. Browsers offer the user to save the password when they login to any website, but make sure that you do not save any password. If possible then always clear the history and temporary files while leaving the computer after work. Also make sure that you do not have auto fill feature turned on your computer because it still can save the information which you enter on various websites

Step 4: Always keep good firewalls running on your computer. Firewall is one of the best means of keeping your computer safe from intruders and it lets you know if someone tries to access your computer from somewhere. Installing a Firewall and keeping it running is not enough because you need to keep it updated as well. Always update your firewall and the antivirus software updated because they might miss on the new infections if not fully updated.

Step 5: When it comes to online purchasing, make sure that you shop from trusted websites only. If you shop from any unauthentic website then they might steal your card information and misuse it without your consent. Credit card information should not be given on any other site except the ones which use legitimate payment gateways for processing the transactions.

How to Change the Welcome Screen from Simple to Advanced

Have you ever noticed the difference in the way you login on your computer in your office and at home? You must be entering your username and password in your office computer in a small login window and you must just be clicking on your user name in your home computer to login. You may not be able to change the login style on your office computer because there the settings and such features are controlled by the system administrators.

In this post I will describe how to change the login screen style. Simple style is the one in which you see the names of all the accounts listed on one screen and you can login to them by simply clicking on the username. Advanced login screen is the one which gives you small login box and you have to enter both username and the password to login. Advanced login screen is required in offices because if your office computers are running on a domain then this is the only login screen which can be applied. This is the main reason why you don’t see the interactive login screen in office computers.

Now let us go through the steps for toggling between these login styles on a stand-alone computer.

Step 1: Click on the ‘Start’ Menu and then open ‘Control Panel’.

Step 2: In ‘Control Panel’ look for ‘User Accounts’ and then open the same.

Step 3: In ‘User Accounts’ window look for an option called ‘Change the way user log on and off’.

Here you will find a check box titled ‘Use Welcome Screen’. This is the option which controls the visibility of either of the two login styles. If the box is checked then you will get an interactive login screen which will give you an iconic display of usernames on the login screen. If the box is unchecked then you will get the advanced screen for typing the username and the password manually to login.

Step 4: Since in this post we have to change the login screen to advanced style, so we need to uncheck the option called ‘Use Welcome Screen’ and apply the changes.

There are few other settings which indirectly control the behaviour of login screens. For example if your computer is connected to a domain then you cannot apply simple interactive welcome screen on it. If you have turned the offline files feature of your computer ON even then you cannot turn the interactive welcome screen ON. You cannot turn ON the advanced login screen if Switch User feature of Windows is ON. So if you are trying to make such a change but it is not working, or if the options are greyed out, then check for the settings mentioned above as they might be controlling the same.

Things You Can Use to Protect Your Computers From Hackers

Computers can easily be affected by malicious programs and are open to several kinds of security vulnerabilities. In this post I will discuss some very important computer security aspects which should always be kept in mind and adhered to.

Firewall: Firewall is one of the best ways to keep your computer protected from outside world. As the name suggests, it works exactly like a wall of fire and does not let the outside infections, intrusions come inside your computer. However, since new infections and hacking techniques are coming into existence day by day, so it is very important that you keep the firewall updated so that it easily detects and stops such attacks.

Antivirus: An antivirus is an application which has only one purpose, and that is to detect and remove virus infections. It offers several levels of protection for keeping your computer safe and sound. If it is enabled and resident in the memory, it scans the incoming data and checks if it has traces of virus infections or not. If found it straight away intimates you about the same so that the transfer of such data can be stopped. Many antiviruses automatically block such infected data from entering your computer. Another task of an antivirus software is to scan the entire hard drive from time to time and look for any infected file which could have come in to the computer system by external means like CD, Flash drive, e-mail attachment etc. But in order for an antivirus to work properly, it is very important to keep it updated with the virus definitions, otherwise your security software would not be able to detect the infections.

Antispyware: Spyware has the capability of seriously harming data or stealing confidential information. Spyware silently spies the data entered by you and can even steal your bank and other financial information. This kind of program can attach itself with any legitimate system file so that they start when the system starts and always stay resident in the memory spying your activities. One should always install a good quality antispyware on their computers and should also keep the same updated regularly.

Password: Users should always keep strong passwords for their Windows accounts, e-mails, financial sites, and almost everywhere. Your passwords should not contain your name because it is very easy to guess. The password should always contain some numbers and special characters. A password comprising of few numbers and some special characters makes it very difficult to be cracked. As a calculation a 14 character long password which consists of both lower-case and upper-case alphabets, numbers, and some special characters will require several years in getting decoded.

Locking the computer: ‘Windows logo’ key and ‘L’ is the shortcut for locking the computer and one should always remember it, rather make it a habit. Never ever leave your system open, because if you do so it will be very easy for anyone to access your information without leaving any traces. If you tend to forget locking the computer then set it in the screensaver of your computer with a timeout of 1 minute.

How to Create a Microsoft Access Field for Hyperlinks

MS Access stores all database tablets, queries, reports, forms, macros and modules in the Access Jet database as a simple file.

For query development MS Access offers a Query Designer a graphical user interface that allows users to build queries without knowledge of the SQL programming language, in the Query Designer users can show the data sources of the query and select the field  they want returned by clicking and dragging them into the grid, one can set up joins by clicking and dragging fields in tables to field in other tables, Access allows users to view and manipulate the SQL code if desired, any Access table including linked tables from different data sources can be used in a query.

It offers several ways to secure the application while allowing users to remain productive.

Most basic is a database password, once entered then user has full control of all database objects, this is a relatively weak form of protection which can be easily cracked, a higher level of protection is use of workgroup security requiring a user name and a password. Users and groups can be specified along with their rights at that object type or individual object level, this can be used to specify people with read-only or data entry rights but may be challenging to specify.

If you want to create a Microsoft Access Field for Hyperlinks then following are steps to that.

Step 1:

You can open a table in Design view then click in the field directly underneath the location that is to contain your new hyperlink field.

Step 2:

Now you can click on the Insert Row icon in the Toolbar or you can open the Insert menu and then choose Row after that a new Row appears. Now, in this new Row window, select the Hyperlink option.

Step 3:

You can also open the table in Data sheet view for that you can open Hyperlink Column and a new column will appear, when columns appear move your column to the location you want. You can now just enter Hyperlinks in your new fields.

Above mentioned steps is to create a Microsoft Access Field for Hyperlinks.

Call Now: +1 315-226-4249
Call Now: +1 315-226-4249
Call Now: +1 315-226-4249