Adding a USB Printer to a Network so that you can print from multiple computers and laptops
Step 1. On the main computer that is connected to the printer. Go to Control Panel – The Printers and Faxes. Right Click on the printer that you want to share. Click on Share the Printer.
Step 2. On the computer or laptop that you want to add the printer, click on START the RUN and type in \\”computer name” of the computer that is connected to the printer. If you do not know the computer name, go to that computer and right click on “my computer” – left click on “properties” and click on “computer name.
Step 3. Right click on the shared printer that comes up and click on “connect”
As a general rule do not trust any link. There are a lot of scams going on that look very real. These may seem to be from/related to Facebook, a bank, or a shipping company like Fedex, UPS, or DHL. When you click on a link they take you to a different location and your computer end up with an infection. Instead of clicking on the link it is safer to go directly to the correct website and enter your search, tracking number etc
Do not trust attachments, especially .zip files. If you click on the attachment it will unzip the program and infect your computer with a virus. We see a lot of emails doing the rounds that are pretending to be from UPS, FEDEX or DHL that states that they have been unable to deliver a package and that you need to click on the attachment. Again, the best thing to do is go directly to UPS etc and enter your tracking number. DO NOT OPEN THE ATTACHMENT.
The email might also claim to be from a leading store and states that you have made a purchase. If you want to cancel the transaction then they want you to open the attachment. This is a scam and should be deleted. If you are unsure you should check directly with your bank.
FAKE ANTI VIRUSES are on the increase. These come in the form of spyware or pop-ups initially and make you beleive that your computer is infected. If you click on the OK, Scan or even the “x” or close button, your computer will be infected with a virus. Once they infect your computer it will try and scam you into giving them your credit card details to “fix” all of the “errors” that it has found.To try and avoid these problems, when you first get the pop up try pressing ALT and F4 or “CONTROL and W” to close the window, or shut the pc down. You can also hit CTRL-ALT-DEL at the same time, then go to the Task manager, Click on the Offending Program or App and hit End Task.
Next Clean your temporary internet files by doing a Disk Clean Up. To do this type “Disk Cleanup” in your Windows Search by the Windows Key. Check all boxes and click OK
WATCH THIS VIDEO ON FOLLOWING THE ABOVE STEPS
Keep your anti virus and anti spyware up-to-date and check on it periodically. We recommend using Vipreas it offers real-time monitoring, scans emails and scans facebook etc.
Stay away from “busy” site that have a lot of advertising on them. Avoid downloading Free Music, Free Video, Free Screensavers and site containing Adult Material.
Good, Safe internet usage is one of the best ways of staying Virus and Spyware Free
– Windows key + D – shows the desktop
– Windows key + M – minimizes all open windows…
– Windows key + Shift + M – maximizes all open windows
– Windows key + E – Runs Windows Explorer
– Windows key + R – shows the RUN dialog
– Windows key + F – shows Search window
– Windows key + Break – shows System Properties box
– Windows key + TAB – Go through taskbar applications
– Windows key + PAUSE Display the System Properties dialog box
– Windows key + U Open Utility Manager
– ALT + TAB – Cycle through opened applications
– Hold down CTRL while dragging an item to Copy it
– CTRL + ESC Display the Start menu
– ALT + ENTER View the properties for the selected item
– F4 key Display the Address bar list in My Computer or
– NUM LOCK + Asterisk (*) Display all of the subfolders that are under the selected folder
– Cntrl-Alt – Arrow Keys will rotate the screen
You can be surfing along and suddenly a window pops up in your browser telling you that you have all kinds of infections and to click here and they will make it all go away. Actually, they will make it worse. This is Rogue Security Software in action. There are two things you can do – first press ALT and F4 on your keyboard (at the same time) and do not click on the window. If this does not work, you want to do a manual shutdown of your computer. Go to the on/off button and press the button once. This should set the shut down in motion and may take a few minutes to switch off completely – do not do anything untiil it is completely off. Do not go near the pop-up with your mouse as this can activate the Rogue. Better safe than sorry.
I would then recommend starting your computer in safe mode (by hitting F8 when it is starting up), then doing a “disk cleanup”, followed by a deep scan with your anti virus software.
If you have any queries you should phone us on 281-647-9977
Here are 3 ways to increase IT Security that are easy to implement and could dramatically improve the security of the computer system.
Teach the team an easy way to structure “Strong Passwords” Strong passwords incorporate letters, numbers and other keyboard characters. Then Enforce strong passwords on the network
Implement a local user and local admin account for each computer user. The local account should not have permission to install software. Daily use should be under the “local user” account and the “local admin” account should only be used when it is necessary to install software.
Install A Firewall A firewall is a system that is designed to prevent unauthorized access to or from a private network. All communication between your computer and internet flows through the firewall since it lies between your computer network and the Internet. Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority. A firewall works as a barrier, or a shield, between your computer network and internet. When you are connected to the Internet, you are constantly sending and receiving information. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more