Your daily technology class with Professor Randy!!

Randy The Tech Professor

December 11, 2009 at 4:35 am

How To Optimize Your Website (Part 1): Mechanics

search-engine-optimization

Hello Everyone,

In the process of setting up this WordPress blog, I have learned some interesting facts about improving “the volume or quality of traffic to a website from the various search engines”. Today I would like to teach you five ways to optimize your website for the search engines or, as it’s commonly called: SEO (Search Engine Optimization).

1) The First 1500 Characters:

Google scans the first 1500 characters (not words!) of what you have written, looking for keywords and phrases so it knows how to index your article in searches. Be sure to include and repeat the keywords and phrases you have within the first 1500 characters so that your article will rank higher in Google search.

2) Google Looks At What Is Sent To A Browser:

What does Google see? Or more importantly how does a webpage look to Googlebot and how will it rank a website in its search engine? Check out the SEO Text Browser (http://www.domaintools.com/seo-score). The SEO Text Browser “tells the user what things could be improved with the current web page they are browsing. The browser allows even the newest webmaster to easily view a detailed and customized list of tasks to fix while giving easy step by step instructions on how to improve the web page the user is surfing”.

3) Especially Important What Is Inside The “Title Tag”:

Google itself tells you to  A) Accurately describe the page’s content.  B) Create unique title tags for each page.  C) Use brief, but descriptive titles.

4) Don’t Use Key Word Tags:

Many people think it is still important to use key word metatags, but Google ignores them! It’s much less about tags and code, and much more about content and links. Check out the video below by Google’s own Matt Cutts.

5) Get To The Page (Body) Content As Soon As Possible:

Web surfers hate to wait for slow loading web pages. If your web pages don’t load fast enough, many web surfers will go away without taking a look at them. No matter how great your content is, if your web site is not fast enough, web surfers won’t see it. Fast loading web pages are crucial if you want people to view your site on the Internet.

Professor Randy says: It’s helpful to know how the search engines work, but the best way to optimize your site is to provide great content for your readers by being knowledgeable and passionate about your subject!

.

Tags:
comments Comments (0)    -
December 8, 2009 at 11:39 pm

A Day In The Life Of Randy The Tech Professor

Questions & AnswersHello everyone,

I’m still visiting the home of my parents and today I would like to tell you about two of the many tech issues that seem to come up every day when the word gets out that you “understand” computers.

I received this email from my sister yesterday:

Randy…It’s wonderful to have a computer expert in the family! So, here’s the question…I can’t open any of the pictures mom and dad forward to me. Surely they get them or they wouldn’t be sending them on to me. We both have Comcast as our internet provider, but whenever the emails have pictures as part of the story, all I get are boxes with little x’s in each corner and when I click on them nothing happens. What gives??

Thanks, Lanie

My reply to my sister:

Hi Lanie,

It has nothing to do with either you or Comcast. Mom and Dad still use Outlook Express and when they send pictures they need to do the following:

“Because images can increase the size of your emails, many email programs allow you to select whether or not images should be sent with your email at all! In Outlook Express, as you compose a message, you’ll find an option labeled Send Pictures with Message on the Format menu. Make sure that’s selected to include any pictures with your outgoing messages. Other email programs may have similar or related options”.

Mom and Dad usually just forward the email and don’t select the above option. You can’t see any pictures because there are none (just the blank spaces where they used to be!). I’ll tell them about this.

See you soon,
Randy

My sister also asked me to recommend a good but inexpensive computer that she could buy as a Christmas gift for her son. I recommended the Toshiba L455-S5975 ($300.00) found here (http://tinyurl.com/ye6vyyc).

Professor Randy says: There’s never a dull moment in the life of a geek!! I don’t mind because I love to help people out with their questions/problems. Please email me if you would like me to help you out with any question that you might have.

comments Comments (2)    -
December 4, 2009 at 1:29 am

My Parents Computer

SpeedHello everyone,

I’ve been traveling the past few days and I’m now at the home of my parents where I will be staying for a week or so. My parents have (and use) a computer, and I’m absolutely thrilled that, at their age (mom 82, dad 84), they have not shied away from technology. They certainly don’t understand everything about the computer, but they are making an effort to understand and use email, word processing, the internet, etc. Good for them!!

Shortly after I arrived my father mentioned that he had switched from DSL to Comcast cable. He told me that the computer was running slow and asked me if I would take a look at it. Well, the computer (Dell Dimension 2400, Windows XP, Pentium 4 CPU, 256MB of RAM!) was running incredibly slow all right, so today I would like to tell you what I found and what I did:

1) Full scan with CCleaner and removed thousands of junk files.
2) Full scan with the CCleaner registry cleaner and deleted the many obsolete registry entries.
3) Full scan with PureRa and removed many more files that CCleaner didn’t see.
4) Removed many unneeded programs with Revo Uninstaller.
5) Full scan with the Revo “Junk Files Cleaner” and removed even more unfound files.
6) Full scan with Malwarebytes’ Anti-Malware. System came up clean.
7) Full scan with Windows Malicious Software Removal Tool. System came up clean.
8) Removed all of the Comcast software (Desktop Doctor, Tool Bar, Email program, etc.).
9) Opened Windows Firewall (which was enabled) and unchecked (closed) any exceptions.
10) Full defragmentation and optimization with MyDefrag (formerly JKDefrag).
11) Removed Avast AntiVirus Software and replaced with Windows Security Essentials.
12) Tuned and optimized the Internet connection with “TCP Optimizer”.
13) Ordered two 512MB sticks of  SDRAM memory from Crucial.com  (will work wonders for the Dell 2400).

The computer is now running quite fast even when you consider the paultry 256MB of Random Access Memory. My mom & dad are amazed and happy!! I’m happy too because it was great to be able to do something nice for my parents!

Professor Randy says: Do something nice for your parents too – fix their computer!!!

comments Comments (0)    -
November 30, 2009 at 1:19 pm

How To Keep Your Computer Safe And Secure (Part 4)

LimewireHello everyone,

Wow – this is the fourth post on this topic and we’re still going strong! Today I want to tell you about “the mother of all computer infectors”………Files Downloaded Over Peer-To-Peer Programs (P2P)!! This is a nasty one!! Stay with me now!

I have two older sisters and one younger brother. When I was growing up, my mother taught us to share our things with each other and I came to see that sharing was a good thing. My brother, sisters and I, all sharing and benefiting from each others possessions. One big, unselfish, happy family – ah, how perfect! Truly: “to err is human, to share is divine”!!

Well, that’s what Peer-To-Peer programs allow you to do – share. P2P technology enables millions of computer users around the world to find, trade and share digital files with each other. P2P enables the transfer of billions of files among millions of people without knowledge of identity or even location. Everyone benefitting from each others possessions – one big, unselfish, happy world. Ah, how perfect right?

Well, actually no. To share is divine but to use P2P is to err for sure!!

There is nothing wrong with P2P programs such as uTorrent, BitComet, Limewire, Azureus, etc. in and of themselves. Like I said, these free P2P clients allow easy swapping of music, video and other files over the Internet. By using a P2P computer program, a user can scan the hard drives of millions of people and instantly acquire (download) content with the click of a mouse.

Herein lies the problem:

1) Do you really want the entire world scanning your computers hard drive? If you are not careful you will share files and directories which contain potentially sensitive information such as passwords or licenses. What to do?

A) Carefully go through the program configuration options to make sure you are sharing only the files that you really intend to share. Disable any automatic downloading features (require at least a prompt) before any file can be downloaded.

B) Create a new empty folder and only allow download and upload access to this folder. Then place copies (not originals) of all the files you wish to share into that folder, and disallow access to any other directory or drive on your system.

2) Do you really want to download and install a file that you know nothing about? There is absolutely no indication or guarantee that the actual contents of the file(s) you are downloading are legitimate or safe until you download and attempt to open them. What to do?

A) Scan any P2P downloaded file with multiple scanners (one each of a virus, trojan and spyware scanner) before opening them.

B) Look to see how many people are sharing a file. If not many people are sharing the file then it may be fake, not what it purports to be, or even worse, contain some type of “poison”. If the file is being freely shared by a large number of people it has a better chance of being safe but there is still no guarantee that it is.

C) Always keep your User Account Control (UAC in Vista and Windows 7) enabled. In Windows XP, change your account type from Computer Administrator to a Limited account. For any OS manually scan your computer quite often.

Please see part 1 of this series

Please see part 2 of this series

Please see part 3 of this series

Professor Randy says: Sharing is wonderful but not when it comes to certain P2P files! If you must share files be smart, extremely alert and do all that you can to stay safe and secure!

comments Comments (0)    -
November 27, 2009 at 3:17 pm

Ten Great Computer Technician Products That I Recommend

Computer TechnicianHello everyone,

I love all things “tech” and I love to buy tech products! Since I have an “obsessive-compulsive” personality, I thoroughly investigate every product that I am considering, always looking for the best combination of quality and price. Sometimes weeks will go by before I make my final buying decision because I cannot “pull the trigger” until I have left “no stone un-turned.”

We all need to buy tech products but not everybody has the time to do the proper research. Today I would like to give you ten great products that I recommend (these products are aimed much more towards computer technicians). I don’t expect everyone to agree, but I can assure you that I have definitely “done my homework” on these products and you can buy them with total confidence. I hope this helps someone!

1) Canned Air: Belkin Blaster Canned Air 12 oz. (http://tinyurl.com/yclraot).When you need to use canned air. Highly pressurized with a variable pressure control. Blow out all the junk from your computer and CPU fan.

2) Electric Duster: Metro Vacuum ED500 DataVac 500-Watt, 0.75-HP (http://tinyurl.com/yzuqost). I like this much more than canned air (safer, more effective & economical)! Incredibly powerful 500-Watt motor that gets rid of all dust and debris! Light, many different nozzles, runs on AC only (12′ power cord).

3) Pocket Tool Kit: Victorinox CyberTool 34 (http://tinyurl.com/j3abs). 34 useful tools in your pocket!     There are four different models but I like the 34 tool model. Unbeatable!!

4) Secure USB Flash Drive: Ridata 4GB EZ Twister USB 2.0 Thumb Drive (http://tinyurl.com/ygshy9k). Protect against a virus transfer with the data lock switch. Partition and password security functions. The write protect capability makes this very valuable!

5) Backlit Keyboard: Saitek Eclipse II Keyboard PK02AU (http://tinyurl.com/yhs5qlq). You have to see it to believe it! Great keys, backlighting in three colors, well made. So cool!!!

6) Screwdriver/Drill Kit: Eazypower 81964 12-Inch to 17-Inch Push Pull Click Click Screwdriver/Drill Kit with 1/4-Inch Hex, Power Bits and Hexbit Drill Bit (http://tinyurl.com/yh7ygb7). Great manual screwdriver. Great for narrow spaces, no battery, can drill through thin metal. Comes in various sizes/models.

7) Portable Network Switch: TRENDnet 5-Port 10/100Mbps Switch (Plastic) (http://tinyurl.com/ygz3s5l). Man this thing is great! Less than $12! Spread out your internet connection!!

8) Clamp Flashlight: Blackfire BBM888 65-Lumens LED Clamplight (http://tinyurl.com/yk8zzvs). I HAVE NOT TRIED THIS PRODUCT YET but I will soon. It just looks so cool!!! If you try it let me know your thoughts.

9) HDD Docking Station: Thermaltake BlacX eSATA USB Docking Station (http://tinyurl.com/ykhe2p9). These “toasters” are the best! Supports USB and eSATA!! 2.5″ & 3.5″ drives. eSATA is so much faster than USB 2.0.

10)USB to PS2 Adapter: BYTECC BT-2000 USB to PS2 Adapter (http://tinyurl.com/32y9lg) When you have to connect a PS/2 mouse and/or keyboard to a USB port. Great and very cheap!

Professor Randy says: Quality computer repair is an art! Enjoy your craft and be more productive with these great tools!!

comments Comments (1)    -
November 23, 2009 at 3:03 pm

How To Keep Your Computer Safe And Secure (Part 3)

online securityHello everyone,

In a previous post, I showed you that just as “insects” can enter into your beautiful house through a torn and punctured door screen, Internet “bugs” can enter into your beautiful computer through holes in the Windows Operating System (Solution #1 = Microsoft Windows Update).

Then, in another post, I told you that since Internet “bugs” have been locked out of your computer by Windows Update, these “bugs” now need your cooperation to get into your system and they will do everything possible to trick you into letting them in! How will they get in now? You will open the door, you will unwittingly let them in!! You will accidentally allow them to install! They will fool you into letting them in!! (Solution #2 = Enable Windows Firewall & #3 =  Correct Email Procedures).

Today in this third post, I would like to alert you to another way that you can be tricked into allowing “bugs” to enter and infect your system, and also one way in which you can keep your sensitive, personal data totally invisible from online criminals. If you are aware of these “tricks”, you will not be fooled by them and will therefore be able to keep your computer safe and secure.

4) Browsing The Internet: You can infect your computer just by visiting “bad” (malicious) web pages. These pages run Flash (Flash adds animation and interactivity to a web page. It’s content can be crafted to look like many different file types, such as Microsoft Word or Excel documents, image files or ZIP files). Web pages will also run JavaScript (JavaScript enhances the user interface and web site appearance. JavaScript provides the potential for malicious authors to deliver scripts to run on a client computer via a web page). Not all Flash & JavaScript are bad but they can be used to run any code they wish on the user’s system. What to do?

A) Run the latest version of: The Firefox browser (install the NoScript or Flashblock extension).

B) Download and install the latest versions of: Adobe Flash Player, Sun Microsystems Java Runtime Environment Standard Edition, and Adobe ShockWave Player. I get 95% of my software from FileHippo (http://filehippo.com). FileHippo is simply my favorite software site!

C) Run your programs in Sandboxie (http://www.sandboxie.com). Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer. “Bad” software is “trapped” in the sandbox. How cool is that!

5) Online Financial Transactions: Legitimate online banking sites and shopping sites are always  secure which of course allows you to enter sensitive personal information without risk. But many time these sites aren’t legitimate at all, but are phony and insecure – trying to fool you into giving them your personal data. How to know? What to do?

A) Look in your browser address bar: Make sure you see https:// (not http://) in front of the site address. HTTPS is a combination of certain protocols which provide encryption and secure identification of the server your connected to. Look for the “s” after http!!

B) Double click on the padlock icon: Look down at the status bar (lower right hand corner of the screen) and find the padlock icon. Double-click on the padlock icon and make sure that the certificate is in fact issued to the web address or company name that you think it to be.

If you see no https:// and no padlock icon you have accessed an insecure site and you should not enter any sensitive, personal information!

Professor Randy says: You’re no fool!! Be aware of the online tricks and don’t allow the “bad guys” to infect your system or obtain any of your personal information!

comments Comments (1)    -
November 20, 2009 at 7:20 am

Hey You (Microsoft) Get Off Of My Cloud!!

microsoftgoogleHello everyone,

There’s something happening here – what it is, is exactly clear!

When Google Apps first appeared on the scene in August 2006 I didn’t take it very seriously because I was (like everybody else) a Microsoft Office “guy”. Microsoft Word, Excel, Outlook, etc. had always been, and would always be.

Little by little (mainly because students “went nuts” over Gmail), Google convinced many colleges and universities to adopt Google Apps Education Edition (Gmail, Calendar, Talk, Docs, Administrative Tools, etc.). Free, running exclusively in the browser, outsourced servers, no software or hardware to buy. Wow – colleges and universities were now free to concentrate on the classroom!

Then, many small and medium businesses adopted Google Apps Premier Edition. It kind of made sense – those companies couldn’t buy, install and maintain hardware. Not free ($50 per user per year) but hundreds of dollars less than the traditional Microsoft Exchange setup. Why not try the cloud based model?

Over time, larger enterprises stated to fall. Motorola moved their handset division (approx. 20,000 users) from their installed Exchange, Outlook setup to Google Apps. Luxury hotel chain Morgans Hotel Group also moved their entire user base over to Google Apps. Much less expensive, outsource to Google, no muss, no fuss! What’s up here?

A few days ago, Mary-Jo Foley reported in her ZDNet blog that “Microsoft Office, one of Microsoft’s biggest cash cows took a hit in Microsoft’s first quarter”, and that “the Server division’s revenues were relatively flat for the quarter”.

About the same time, AP Technology writer Jessica Mintz reported in Yahoo Tech that “many consumers are passing on buying Microsoft’s Office, which contributed to a 14% total decline in the quarter” and that “companies that have cut workers are ordering fewer copies of Office and other Microsoft software commonly used at work”.

And just recently “the big one”: The Los Angeles City Council voted to adopt Web-based Google Apps (running in the GovCloud which is separate from the standard cloud) as the replacement for the city government’s aging e-mail and Internet services. Folks, this includes all city offices and officials –  some 30,000 employees! The first major U.S. city to fully entrust it’s communication and productivity system to the world of cloud computing!

This is huge!! Microsoft lobbied extremely hard to prevent the L.A. adoption of Google Apps. but Google had the final say: “Hey Microsoft Get Off Of My Cloud”.

Professor Randy says: There’s something happening here! The cloud shift in computing grows stronger every day. How long before other cities follow Google into the cloud?

comments Comments (1)    -
November 18, 2009 at 1:03 pm

How To Keep Your Computer Safe And Secure (Part 2)

SecurityHello everyone,

In this post, I showed you that just as “insects” can enter into your beautiful house through a torn and punctured door screen, Internet “bugs” can enter into your beautiful computer through holes in the Windows Operating System.

In the case of the screen door, a repairman comes and closes up the tears and punctures and the “insects” can no longer get into your beautiful house. Your house is once again safe and secure!

In the case of the computer, Microsoft Windows Update comes on the second Tuesday of each month and “patches” the “holes” in your Operating System. The Internet “bugs” can no longer get into your beautiful computer and wonderful OS. Your computer is once again safe and secure!

Microsoft Windows Update has done it’s duty and you are now secure from outside security exploits and vulnerabilities – how cool!! Nothing can get into your beloved computer now – right?? Surf away!, click away!, Microsoft has closed the door and nobody will open it – right??

WRONG!!!    MICROSOFT WON’T OPEN THE DOOR BUT YOU WILL!!!!!

Since Internet “bugs” have been locked out of your computer by Windows Update, these “bugs” now need your cooperation to get into your system and they will do everything possible to trick you into letting them in! How will they get in now? You will open the door, you will unwittingly let them in!! You will accidentally allow them to install! They will fool you into letting them in!!

In my next few posts I want to tell you how “bad bugs” (viruses, worms, trojans, spyware, adware, rootkits, browser hijackers, phishing deceivers, etc.) will try to enter your system. I’ll tell how you can be aware of their tricks, and what you should do to prevent them from entering (and it’s not by running antivirus/ antispyware/antimalware programs!). Many times it’s “too little too late” by then!

1) Enable Windows Firewall: (Start > Control Panel > Windows Firewall > Turn On Windows Firewall). The built in Windows Firewall is very good and will prevent your system from external invasion from the Internet or Network. Don’t open up any ports nor allow exceptions unless it can’t be avoided. Adding a hardware router is even better (I’ll talk about it in my next post).

2) Email Procedures (If you don’t know the sender):

A) Don’t open an email (just opening won’t infect your system but why do it? – there could be something malicious attached which you may accidentally open).

B) Don’t click on any links inside the email (the links are phony, they will take you to another site, the text will actually be an image which contains malware or a bad program which will be downloaded onto your computer. Many links are just an IP address (like http:// 75.455.30.78) which will take you to a bogus site waiting to deceive you!).

C) Don’t open any email attachment (you will accidentally install malicious software!).

D) Don’t give out important personal details (no legit business institution will ask for personal information by email. Don’t click on any link – it will take you to a phony login site that looks legit but isn’t – there you will give your credit card # and other personal information).

E) Don’t install software from any company ( No legit company will ask you to install programs, updates, fixes, etc. through an email notification or email link. You will actually install infectious, malicious software).

F) Never reply to spam emails (when spammers email you they really don’t know if their email is getting to you or not. If you reply by clicking a link that “will remove you from their mailing list” they will now know that someone indeed is at the address and will send you even more spam. Use your email program to filter spam but never reply to it).

G) Don’t fall for “unbelievable” offers (If someone offers you a lot of money, free products or great reward in exchange for your personal information – don’t “bite”. They want your email address, phone number or more in order to use it against you! It’s a scam!!).

Professor Randy says: Don’t be your own worst enemy! “Bad bugs” can’t enter your computer unless YOU allow them to!! Keep your system safe and secure by knowing the tactics of the enemy and by not letting him in!!

comments Comments (0)    -
November 15, 2009 at 8:04 pm

Windows 7 Rising!

Hello everyone,

I thought y’all might get a “kick” out of this one. This is 10 year old Will Smith from Texas. He loves computers, he loves Bill Gates, and of course he loves Microsoft.

When he grows up he wants to be a computer programmer or work for the “Geek Squad”. The “Geek Squad” could certainly use a kid like this but I think we may be seeing the next Bill Gates (he even looks like Bill!!) or the next Steve Jobs!

Professor Randy says: Enjoy, and let the passion of this kid inspire you!!

comments Comments (0)    -
November 13, 2009 at 3:14 pm

Ten Great Tech Products That I Recommend

bargainsHello everyone,

I love all things “tech” and I love to buy tech products! Since I have an “obsessive-compulsive” personality, I thoroughly investigate every product that I am considering always looking for the best combination of quality and price. Sometimes weeks will go by before I make my final buying decision because I cannot “pull the trigger” until I have left “no stone unturned”

We all need to buy tech products but not everybody has the time to do the proper research. Today I would like to give you ten great tech items that I recommend (there’s a little something for everyone). I don’t expect everyone to agree, but I can assure you that I have definitely “done my homework” on these products and you can buy them with total confidence. I hope these recommendations help someone!

1) Operating System (OS) : Windows 7 (Home Premium Edition). The no.1 “no brainer” for the home market segment.

2) Netbook: Samsung NC20. A little more expensive than some others but it’s a 12.1″ full sized netbook. I don’t like the “normal” netbooks because they’re too small and so “underpowered”. Can run Windows XP or Windows 7.

3) HDMI Cables: Buy them online from (http://www.monoprice.com/home/index.asp). You will save literally hundreds of dollars compared to the outrageous “rip offs” that you will encounter at the big-box stores (Wal-Mart, Target, Best Buy, etc.). Get version 1.3a.

4) Rechargeable Batteries: Sony 2500 mAh AA Rechargeable Nimh Batteries. These AA batteries are simply superb and very inexpensive! Use them with the Sony BCG-34HRMF4 Battery Charger with LCD Display. Please don’t continue buying non-rechargeable batteries!!

5) Mini LED Flashlight: MAGLITE SP2301H 3-AA Cell. Incredibly bright beam (much more than 2AA model), great long battery life and very inexpensive!

6) Computer Tool Kit: Belkin 36-Piece Demagnatized Computer Tool Kit with Case (Black). A great basic tool kit for computer/electronic maintenance jobs – you probably won’t need anything more!

7) Stereo Multimedia Headset (music and voice) : Plantronics DSP400 Multimedia Headset. Foldable, USB connect, very good mic, great quality for the price!

8) HD Pocket Video Camera: Kodak Zi8. I reviewed this in an earlier post here (https://randythetechprofessor.com/video-in-your-pocket-flip-ultra-hd-vs-kodak-zi8). High Defenition video AND external microphone jack!

9) Point & Shoot Digital Camera: Canon PowerShot SD780IS 12.1 MP Digital Camera. Great still photos, great HD movie shooting, HDMI output, 2.5″ widescreen, under $200. Wow!!!

10) USB Soundcard: Behringer UCA202. Great sound, USB powered, no drivers needed, many advanced features for an inexpensive price!

Professor Randy says: You can still get great tech products at great prices if you will only have the time and patience to “search them out” !!

comments Comments (0)    -