Thursday, December 13, 2007

Friday, December 7, 2007

Windows Vista: freeware edition?



Microsoft is dumping WGA (Windows Genuine Advantage), and Vista will no longer totally deactivate itself with the release of Service Pack 1 http://www.informationweek.com/blog/main/archives/2007/12/introducing_win.html;jsessionid=2MS2BZUU2WVHWQSNDLRSKH0CJUNN2JVN

Monday, November 26, 2007

Vista listed in the top ten worst comsumer tech products of all time

Is Vista really as bad as one of the top ten worst consumer tech products of all time? You decide for yourself, but personal experience and that of my clients that want to do anything more that check email and surf the web would likely agree. Read the story

Thursday, November 15, 2007

Marketing Your Blog Is More Effective Than Advertising

First of all advertising is a component of the marketing process. You can look at advertising as the end result of marketing.

read more | digg story

Friday, October 26, 2007

Cost vs. Value

Occasionally I'll come across a small business owner that has a hard time understanding the value of a quality Technology Consultant. That's an attitude that normally changes as the business grows and the owner sees that when employees can't get to work that it's worth paying for good quality IT support.

But add to that save money at all costs approach with a cheap consultant you have a recipe for problems.

I've talked with business owners that really think that their last IT support person wasn't that bad. And now they having to pay more for their IT support. They say that hey the other guy didn't charge as much. Perhaps, the other guy was just:

- Unreliable

- Sold pirated software

- Rude

- Incompetent

I know first hand from not only speaking to business owners but also having limited dealings with the former support person and let me tell you, I'm not exaggerating.

So yes, you may pay a little more, but what do you get?

- Reliability

- Integrity

- Courtesy

- Competence

Quality doesn't cost more, it pays in the long run with reduced downtime and more productive personnel. It pays by having robust backup systems in place that protect your business' critical data. Cost in an expense, but Quality is an investment in true value.

Wednesday, October 24, 2007

Blogging on the go

You should be hearing from me more often, I just discovered a really great new web 2.0 tool called imified. It allows you to post to your blog, mini-blog, google calendar and more by using your IM client. Check it out at www.imified.com

Tuesday, October 9, 2007

Where's my RAM? or How I learned to work in 64 Bits Part 3

After much trial and error, I've finally gotten my x64 Windows XP Pro install completely stable (for Windows that is :)

One casualty in the war for system stability was unfortunately my brand new Nvidia graphics card. Shame on you, Nvidia!!! Why can't you write a stable driver that actually allows 3d to work on my x64? Alas, the onboard ATI fared better. I was able to resolved some BSOD issues on shutdown as well as random lockups by downloading the latest (not even beta!) ATI Cataylst drivers.

Unfortunately this sort of thing isn't limited to Windows XP x64. Join me into my jump into Windows Vista 64 bit.

Tuesday, October 2, 2007

Where's my RAM? or How I learned to work in 64 Bits Part 2

I haven't had much working from home time the past few days, and with the fall season of TV shows like Heroes, Chuck, and House 'playing' around time has been greatly reduced. I'm sad to report that I'm having driver stability issues. I was using the latest beta Nvidia drivers for x64 and now I'm having screen blanking and non responsiveness. At least they actually provide 3d graphics! But at the expense of system stability? No thanks.

So, I'm going to give up the option of running games on my x64 machine(for now anyway) and focus on Virtualization software and my productivity apps. So it's Microsoft Virtual PC, VMWare Server and the standard stuff, Office 2007, web and graphics apps.

To Be continued...

Friday, September 28, 2007

The reports of Windows XP's death are greatly exaggerated

Windows XP has officially received a stay of execution. You will still be able to purchase XP home and professional until June 30, 2008. OEM's and system builders will be able to keep bundling Microsoft's best OS until January 30, 2009.

So does this mean that Vista is a flop? Well, I can tell you that I get people asking me the question whether they should downgrade to XP, as they are having issues with Vista. Time will tell if Vista really is "ME2" or not.

Monday, September 24, 2007

Where's my RAM? or How I learned to work in 64 Bits Part 1

I built a new computer this month. It's got the most RAM of any system that I've personally owned. Here's the specs:

Amd Athlon 64 X2 4600+
4 Gigs Ram DDR2 800(4x1Gig)
gigabyte motherboard
PCI Express GeForce 8500GT 512 Meg
Misc hard drives I have laying around that I will be swapping out

I first installed Windows XP(32bit) Professional. I could only see 3.5 Gigs of ram, give or take a couple hundred meg. I was aware of this limitation, but it got me thinking about really wanting that extra RAM available. I am testing out some different Server Operating Systems on both VMWare Server and MS Virtual Server. So I decided to install Windows XP Profesional x64 Edition, the 64 bit version of Windows.

To be continued...

Sunday, September 2, 2007

No, the Better Business Bureau is not emailing you

Be aware, there's another phishing type email that is gaining momentum. It claims to come from the Better Business Bureau and advises you that there is a dispute involving YOUR business. So what's different about that? This phishing email is customized and actually targets your business by name and address. About 1400 people so far have taken the bait and gotten hit.

So NO, the BBB isn't emailing you so delete that email!

Read more details over at this article at SecurityFocus

Tuesday, August 21, 2007

New Gmail phishing email to avoid

There's a new phishing email going around that is targeting YOU, the unsuspecting Gmail user. You'll get an email that looks like this:


DON'T click on any of the links! Be safe, delete!

Saturday, August 18, 2007

Microsoft's Virtual Labs: Free training on Microsoft products

Whether you are planning a purchase or trying to brush up your admin skills, you need to do yourself a favor and check out a free resource from Microsoft. It's called Virtual Labs. Go to http://technet.microsoft.com/en-us/bb467605.aspx and signup. It won't cost you a dime, but Microsoft will call you to follow up as well as try and sell you something.

Once you sign up, you'll be able to download a manual, and 90 minutes of time in the virtual lab. Need more time than that? Just signup for another session. So give it a try, you have nothing to lose.

Monday, July 30, 2007

The Curse of the White Box

Sometimes when picking up a new client, I'll be asked to work on a computer that's having trouble. Well, right now you're saying “that's what you do, isn't it?” Of course, but this computer is not an ordinary computer. Wait, maybe that IS the problem, it's so ordinary that it's a “White Box.” I'm sure you may be scratching your head right now and saying, “what is a white box?”.

The White Box that I am referring to is a computer that is built from available off the shelf parts. It's usually put together by smaller computer builders, often known as “OEMs”. When done right, White Boxes can offer a good value. Many OEMs provide great product and great service, I'm not going to bad mouth all of them. Like any business, there are great companies and there are, well, not so great ones. I am not against OEM computers, but I am against small businesses buying them I think that small businesses are better off buying from larger computer manufacturers such as Dell or HP and here's why:

Warranty: While many OEMs do offer extended warranty, the warranty that's offered through someone like Dell or HP is more dependable. Why? Well, simple economies of scale. When Dell(or HP) puts together a business class system, they engineer for that system to have a certain life cycle. They also keep exchangeable parts on hand for a number of years to support the standard and extended warranties for those systems. With a white box there's no guarantee that you'll be able to find an exact replacement for critical components such as Processors or Motherboards if you're outside the OEM builder's warranty. Longer warranties are also usually more expensive with the white box than with a Dell or an HP system. And here's another REALLY big thing about warranties. A Dell or an HP can offer you next business day onsite warranties. I have yet to see a system builder that offers the same. Even if they can come onsite for service, can you really expect them to be out there the next business day? There's no reason that a business should not expect that any hardware problem with a single computer should not be corrected completely by the next business day, at least under normal circumstances. Now to be fair, all the big guys subcontract all their support out to smaller companies. And you can get some real jokers out to work on your system. But if your IT person or department has done their job to the best that they can in diagnosing what exactly needs replacing, many problems with repair techs can be minimized.

Price: For the most part, base prices are comparable. But because the bigger manufacturers buy in much larger quantities, they usually offer better specials and promotions. Things such as large LCD flat panel monitors bundled with the computer can save you some money. Also, add ons such as MS Office Suite costs you less when bought with a new system from a large manufacturer.

Easy of Support: If your small business has a larger number of desktops(20+), then your IT budget will be easier to swallow if you invest the time having all the same type of desktop. This will ease IT support costs, since all the systems are the same that makes troubleshooting easier. Drive imaging can also be a big help. With all the same model of PC, your IT help can create a disk image that will enable software problems to be quickly fixed by simply re-imaging the computer. This will save hours over the traditional method of reinstalling an Operating System, applications and installing all patches.

Keeping your business running smoothly is top priority. Anytime you or your employees are unable to do their job, money is lost. So getting computers back into a working condition should be a priority. Buy the systems that are going to help you meet that goal, whatever color they may be.

Friday, July 20, 2007

What Search Engines store about you

From Techworld.com

What if there were a giant database that contained your hidden insecurities, embarrassing medical questions, and the fact that you still think from time to time about your high-school romance? Well, such a data store does exist -- if you've ever plugged such private topics into a search engine.

The fact is, search engines like Google, Yahoo, and Microsoft Live Search all record and retain in their vast data banks any term that you query in addition to the date and time your query was processed, the IP address of your computer, and a cookie-based unique ID that -- unless you delete it -- enables the search engine to continue to know if requests are coming from that particular computer, even if the connection changes...... continue reading the full article here

Friday, July 13, 2007

More than you wanted to know about Viruses and other threats

Today, threats to your computer and IT systems are more widespread and varied than ever before. The damage can cost time, money and even destruction of your data. Nowadays with identity theft a big danger too, it becomes even more important to protect yourself against there threats. First let's take a look at the different kinds of viruses and threats.

First, let's look at some different types of Viruses and malware that is currently popular. Thanks to Wikipedia for the following descriptions.


Different Kinds of Threats

Virus: A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.


Worm: A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.


Spyware & Malware: Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, or diverting advertising revenue to a third party.


Trojans: A Trojan horse is a program that installs malicious software while under the guise of doing something else. A Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. There are two common types of Trojan horses. One is ordinary software that has been corrupted by a hacker. A hacker inserts malicious code into the program that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer-to-peer file sharing utilities. The other type of Trojan is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into running the program.


How you can protect your Computer & Network

So, now you know a wee bit more about viruses then you ever wanted. What can you do personally and at the company level to protect yourself and your IT systems?

One thing that will go a long way to protecting your PC is to purchase proven security software. My personal recommendation differs from your environment, depending on whether you are a networked office with server, or a small office with 3 computers.


Recommended Products

In a true client/server network, I recommend Trendmicro Client Server Security line of products. They are easy to administer and rock solid. Everything can be done at the server, allowing your IT person to manage updates and deal with discovered threats appropriately. Trendmicro also has a complementary anti-spyware program that works great as well.

In a small network of say 3 computers, you can't beat the value of Panda Internet Security. For around 60 bucks, you get complete protection for up to 3 computers. Got an old Windows 98 computer? No problem, as Panda is one of the few vendors that their current generation of Anti-virus supports it. Even the client is very lean, it doesn't drastically affect the performance on a tired old Windows 98 box.


If you're a home user, there is a good Anti-virus product that's free for home use. It's called Avast! It's free for personal use at your home(not free for business use). So there's no excuse to go without Security software.


Safe Computing

Stay one step ahead of spyware. Be careful what websites you visit. The less mainstream the websites, the greater the risk of getting spyware or a Trojan. Beware of contest websites, especially the ones that pop up in browser advertisements. "Warez" (illegally copied software) websites that promise to allow you to download all the latest software for free are havens for crooks who use them to distribute malicious software in an effort to steal your identity. Many "Adult" sites are also dangerous for you to visit, since they can expose your computer to the same threats of spyware and Trojans.


Very often when someone needs me to remove spyware, malware of a trojan from their system, it means that they've accidentally been sent to an adult website or a page full of advertising. Now they start to get pop-ups and before they know it they can't close all the windows without clicking on something that will actually install a malicious piece of spyware. The answer? If that happens to you, do the following. Don't try to close the Internet Explorer windows the regular way. Instead, press Ctrl-Alt-Del and bring up the task manager. From there, click on the processes tab, select every instance of "iexplore.exe" one by one and click on End Process. This way you will avoid accidentally clicking on a window that is just waiting to install something malicious.

Beware of suspicious attachments! If you don't know who it's from, don't open it! And especially be wary of any files that end in .pif, .exe, .bat, .com & .js.


Having good security software, being informed and staying safe will go along way to helping you stay virus free.

Saturday, July 7, 2007

IT - Expense or Investment?

For many small businesses, spending money on their computer systems is an incidental expense. I've seen business owners spend hours or even days of their own time trying to fix problems that could be solved much quicker by having a competent computer consultant work on their systems.

Reasoning that you should try to fix it yourself is flawed reasoning and I'll tell you why. I'll bet good money that you don't clean your own carpets, or take care of your own plumbing problems. Also, I'm sure a good number of you use an accountant or an accounting firm to help your company keep your books in order. So why should your IT systems be any different? The most important thing you can be doing as a business person is running your business. Whatever that entails, your time is best spent taking care of your business, NOT worrying about your IT systems. Here's a good article about the impact that downtime can have on your business, as well as how to minimize it.

Every small business faces growing pains, and your business is no different. You can benefit from skilled professionals that can assist you with areas of your business that you don't need to become an expert on. Instead, you can become an expert at doing what you do best, running your business.

Tuesday, July 3, 2007

Total Data Solutions, Computer Help, Networking IT Services for San Antonio & surrounding area Small Businesses

Hello, my name is Tim Cooling. I've been working in IT for the past ten years. I've been helping small businesses just like yours with their IT needs. I have clients in San Antonio, Kerrville & Fredericksburg and can help your business too.

What I'm doing now is reaching out by way of a new blog. My goal is to inform, educate and assist small business owners with their IT needs. Through tips, news, and advice it's my wish that you gain some nuggets of wisdom that will help you with your IT systems.