At this point we’ve all been hearing too much about this new Heartbleed Open SSL’s encryption flaw.
To be honest, the more I heard about it, the harder it became to understand what it means and most of all, how do I protect myself???
First of all lets set it straight. “Heartbleed is an encryption flaw which affects Open SSL’s 1.0.1 and the 1.0.2-beta release, 1.01 which is used widely across the web and in a number of popular web services. The flaw can theoretically be used to view apparently-secure communication across HTTPS, usually denoted by a small closed padlock in a browser’s address bar.
The data potentially at risk includes everything from passwords and encryption keys to financial details and personal identifiable information — allowing a hacker to dip in, swipe data, and leave no trace of their existence.”
After a few days of the world going crazy over Heartbleed, we get to a point where, if your favorite websites, bank, online merchant, etc., haven’t yet fixed the problem. Then you should kiss them goodbye and walk away.
On the other hand, even if they did fix it and made an effort to keep your personal information protected, there’re definitely some steps on your end that you shouldn’t avoid.
- Change all your passwords! I know it does sound like a hassle, and it probably is, given the amount of online shopping we are used to do these days.
Even if the websites are already fixed, go ahead and change your passwords anyways! I say this because these sites were vulnerable at some point. That means your private information was already compromised.
- If your favorite sites or services support two-factor authentication, use it. Everybody understands it’s usually a lot more trouble to set up than a simple password. But if this had taught us a lesson, is that extra security measures are worth it!
- You should also clear all your Web browsers’ cache, cookies, and history. That’s never a bad idea anyway. You don’t want old memorized passwords walking into trouble at an untrustworthy site.
- And last but not least. Check your bank and credit-card statements very carefully. If you’ve been compromised, chances are all too good that you’ll find out by finding suspicious charges on your credit cards.
After you’ve done all this, you should be no longer vulnerable to Heartbleed’s nightmare. But beware; no solution is easy when it comes to this one. So if you start getting emails or calls offering to fix the problem, don’t buy it! It will probably be a scam…
If you need help, we’ll be happy to assist you. Otherwise, Good Luck!
Have you heard of the Blackphone? If you haven’t, they’ve probably done half of their job right!
This is the new Android based cell phone that is built and designed around protecting your privacy. Some tech analysts even called it the NSA-proof phone! But, what does it do? Why is that relevant? And more importantly, how much does it cost me?
Well, to start answering that last question, this new marvel of modern technology costs $630. That includes a 4.7 inches HD screen, 16 GB of storage, LTE capabilities and a 8 megapixels camera, with flash. It also includes a year subscription to its security/privacy service, which is frankly the main attraction here. After the first year, you’ll have to cough up $10 a month to maintain the encryption service, or go back to the world of surrendering your personal information unknowingly.
You may ask yourself, why do I want pay an extra $120 dollars a year when I can get privacy apps on my phone for free?
This is where the Blackphone makes the first small difference, because the truth is that if a privacy program or app is free, then it doesn’t really work. Paying for an encryption service will guarantee a level of protection that free apps and programs can’t offer.
It’s estimated that a mobile phone was lost in the U.S. every 3.5 seconds – and that nearly all who found lost devices tried to access the information on the phone. That alone is a great reason to encrypt your personal information from the get go. We love to browse the web on the go, but did you know this activity opens up phones to serious security risks? The problem is that users cannot see the full URL or link, much less verify whether the link or URL is safe. That means that users could easily browse their way into a phishing-related attack. Last year alone, for example, the number of malicious software aimed at mobile devices has reportedly risen from about 14,000 to 40,000 or about 185%.
So, what does it do? The Blackphone’s service includes a wide array of privacy features. These goes preventing designated apps from connecting to the internet at will and transmitting information without any warning, encrypted contacts, texts, emails and calls, firewall options and even a smart WiFi manager.
Finally, while Blackphone is the first security and privacy focused smart phone, you shouldn’t expect it to be the only one for long, and I wouldn’t be surprised to see bigger players making their way in.
On top of that, this is a new handset running a new operating system, which makes the scope for teething troubles and bugs high at this stage. So, if you have any doubt or concerns about your smartphone’s or your computer’s security features, don’t hesitate to get in touch with us!
What do I do with my old Windows XP?
Nowadays, 38 % of all computers use Windows XP. That includes the U.S. military, NASA, 40 to 50% of all businesses in the US and 95% of all ATMs.
Maybe we should start thinking of a solution, since this represents a big problem for most computer users in this country.
Microsoft is ending all tech support for this operating system after April 2014. This doesn’t mean that your computer will cease to function after this deadline, but in the event of a problem or any bugs appearing after April, you’re on your own. This will make a strong case for migrating to a different operating system.
At a first glance, you might think that Windows 7 or Windows 8 are the obvious choices for replacing your old Windows XP operating system. After all, it’s the same manufacturer, and you’ll carry forward the system’s compatibility. But there are other options that might be more suitable for your needs and you should consider them all.
Newer Windows versions
If you’re committed to staying in the Windows world because of software requirements or just sticking with what you know, Windows 7 looks and behaves like Windows XP and it’s also cheaper. Depending on your level of tech expertise, sticking with Windows will reduce the compatibility and re-skilling burden. You certainly won’t be left behind moving to Windows 7, but take into account that this one is already a four-year-old technology.
If your hardware’s also that old, you can’t take advantage of the latest tech that computing can offer; and Windows 8 is more closely stitched to the hardware it runs on when it comes to security and performance.
On the other hand, Windows 8 is good, but it’s not for everyone.
Enterprises are more stable today and will find more interoperability on Windows 7.
If compatibility is not an issue for you, and you want to get out there and see what the world has to offer you, there are a series of options you might want to consider.
Linux is a free Operating System that will probably save you a few dollars and make your day a little better, but its lack of available software and official tech support will quickly send that new found happiness down the drain.
Also, it won’t help compatibility with other computers that run on Windows.
You can also try the newer and friendlier Android, but you’ll encounter the same compatibility issues, and a slightly better, and bigger, choice of software available.
If you end up crossing the street to one of Microsoft’s fiercest competitors, Apple, and switch to OS X Mavericks; you will find that this is an extremely easy to use operating system.
Friendly customer support, instinctive interface, and with a rather small learning curve. Compatibility between Windows and Mac OS is not a big issue anymore, and the software available is almost the same for both. The problem here is that you would have to buy one of those notoriously more expensive Macs.
If you still don’t know what to do, and need further information on this subject, don’t hesitate to get in touch with us. We can always do the job!
Remember, you should UPGRADE your OPERATING SYSTEM BEFORE APRIL 2014!!!
Nowadays, walking around the house with your tablet, or using your laptop in bed, is considered sort of a given. But this can quickly become annoying when your internet stops working the way it’s supposed to.
Then, what do you do when your internet appears to be slow?
The first thing you have to do, is check the speed.
To begin with, you should try to find out precisely how fast your connection is. You can do this at a website called speedtest.net.
In order to do this right, you have to restart your computer. There might be number of factors affecting your internet or your computer performance, for instance, too many windows open, or any other task that’s taking resources from your computer and your internet.
After you’ve restarted your computer, plug it straight the modem with a Ethernet cable. This will show you how fast your internet goes without any interference, straight from the source. Write these numbers down and check you’re getting what your provider is charging you for.
Then, plug back your router and run the test again, through your wireless network. Compare both results. If there’s no big difference, then your WiFi is fine and you should talk to your internet provider. Either, you need to upgrade to a better plan, or you let them know you’re not getting what you’re paying for.
Now, if your WiFi makes your internet significantly slower, you have an issue on your hands. But there’s a few things you can do.
Go and check your router.
Your problem might be here. One of the last standards in routers technology is the 802.11n wireless networking standard. What’s important here is the “n” at the end. If you pay attention to your router, you’re going to see that it’s labeled 802.11 and b, g, or n. It’s fine if your router belongs to this last group, but if you see a “b” or a “g” after this numbers, maybe it’s about time you get a new one. If this is the case, and you do buy a new router, you’ll be able to see your internet speed climb up pretty drastically.
But even if you already own an “n” router, there’s something you can do to improve its response. Updating the firmware might increase your internet’s overall performance. Every router is different, so in order to update the firmware correctly, you should check the manual or the company’s website for instructions.
Who else is using your WiFi?
Bandwidth is not that hard to fill up. Online gaming, video and, specially, file sharing, can take up all your resources pretty quickly diminish the speed and condition of your connection.
There’s something else you can do.
If your house is big enough to keep your router too far from your computer, or the walls are too thick, then you might have a week signal.
In this case, you can get a wireless extender. It takes your router’s signal and sends it again to the parts of the house that the router can’t reach, using the same frequency.
This is not a great solution because, since it has to obtain the signal and then resend it, you make your WiFi, at least, twice as slow as it was. So, before buying one of this devices, try placing the router in a better location, and situate it as high as possible, away from your fridge and any thick (and/or) metallic furniture.
If you keep having problems or any doubts, don’t hesitate to contact us!
It’s important to keep your sensitive data safe. Nowadays, you can password protect any document or folder that you deem relevant by following a few simple steps.
But first, let me give you a little tip. Before password protecting any document you may wish to create a backup of the non-password protected folder and files in case you forget the password in the future.
If you are using Windows XP professional edition on a computer that has different accounts, this are the steps you have to follow:
- Select the folder you wish to encrypt.
- Right-click the folder and click Properties.
- Click the Advanced button.
- Check “Encrypt contents to secure data” option.
- Click Apply and then Ok.
After you are done, the encrypted data should be grayed out. If you are using Windows XP home edition, this should also be a fairly easy process. Here are the steps:
- Select the folder you wish to encrypt.
- Right-click the folder and click Properties.
- Click the Sharing tab.
- Check the box Make this folder private
- Click Apply and then Ok.
Like in the previous example, the encrypted folder should be grayed out. There are a couple requirements that you need to follow, in order to be able to encrypt and safe guard those files and folders.
- The hard drive must be formatted in NTFS and not FAT32 File System.
- The folder you’re attempting to encrypt must be in your own personal folder. For example, if your name is bob, you must be encrypting a folder that is or that is contained within the below folder: C:Documents and SettingsBob
Files and folders not frequently used
Now, if you need to password protect files or folders that you do not frequently use, one of the simplest ways is to compress the folder and files with a compression utility and password protect the compressed file. However, each time you wish to work or modify the files you will need to uncompress the files using the password.
Windows ME and Windows XP users – Microsoft Windows ME and Windows XP come with their own compression utility. This utility can also be used to compress and password protect files.
You should know that when a file is compressed, users can still view a listing of the files in the compressed file. If you wish for both your file names and the contents to be hidden, move all the files into a single folder and password protect that folder.
File and folders frequently used or accessed
If you need to password protect or encrypt data you frequently use, you will need to install a third-party program that will enable you to protect your files and folders. Below are some free and commercial solutions.
- AxCrypt – An excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a passphrase (password) is known.
- WinCry – A freeware utility that enables your files to be encrypted, secure deletion, as well as other helpful methods of protecting your files.
- Folder Guard – A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.
Anyway, there are a few other things you should know too. It’s important to keep in mind that there is no such thing as a 100% protected file. There are numerous tools, utilities, and instructions for how to break a lot of the encryption and passwords on files. However, the protection methods listed above will protect your files from the majority of users who may encounter them. If you’re working with really sensitive data we suggest a commercial product for protecting your files and data. Also, even though a file or folder may be password protected it still can be deleted (unless the program supports the ability to protect files from being deleted). Always remember to backup all your files, even those protected by passwords. And last, but not least, if you forget the password, unless you’re willing to spend the time attempting to break it or pay someone else to break the password, all your file data will be lost. Unless you’ve made a backup of the non-password protected data. If you need any further help to protect your files, don’t hesitate to get in touch with us. We can help you!
The new year is starting folks! And, as usual, people make their predictions for the next one. These are ours:
What will happen with Windows 8.1 and the Microsoft franchises?
The big question: Will people buy Windows machines en masse? If not, what does that mean for the future Microsoft franchises such as Office? We’ll know how this one turned out early in 2014 when tech giants start reporting their results. There are more than a few reasons why Windows worries are warranted. Chromebooks have sold pretty well and there’s a good chance you’re going to see PC makers diversify their OS options. You may even see some Android running PCs.
But there’re also some other trends worth noting. 3D printing is going mainstream. A lot of the coverage around 3D printing will revolve around consumer applications. The real revolution is already about to happen and that will be in the supply chain in 2014. As 3D printing bolsters the supply chain and creates parts on demand there could be a manufacturing renaissance ahead. We’ll all be makers.
For cell phone users and gamers. I mean, everybody!
Should Windows Phone continue gaining market share, app developers will have to start giving the platform its fair share of attention, while at the same time, a group of upstarts in the guise of Firefox OS, Jolla, and Samsung will be looking to steal their piece of the cake from the lower end of the mobile market.
We should also pay attention to Valve’s Steam Machines — not only because it has the opportunity to overturn the PC gaming industry, but also because it is the first reason in a long time that many developers have had to take a second look at building for Linux-based platforms.
Gaming was one of the reasons why Microsoft got into the household, and it could be one of the reasons why it disappears from it too.
What cell-phone am I wearing today?
Today, everybody’s got a smartphone. Tablet prices are crashing and the biggest consumer tech companies are trying to figure out what they can make next to keep the profit rolling in. As such, we’re going to see through 2014 renewed attempts to make wearable technologies – glasses, watches and others – into desirable and useful consumer devices. The devices we’ve seen so far are at best intriguing but flawed; marred by limited capabilities, clunky designs and poor battery life. And they’re being anxiously pushed by hardware manufacturers on a mostly underwhelmed public. But they hold promise – whether that’s in health monitoring or just allowing us to check messages without digging out a smartphone. So next year we will, hopefully, see better versions of these devices.
If you have any doubts, questions or just feel a little curious; don’t hesitate to get in touch with us. We can help you out!
Computers have become a part of our everyday life. As a result, computer sales have gone through the roof. But despite their growing numbers, most people are unaware of the requirements needed in order to achieve the expected performance.
With the holidays in mind, here are some tips on how you can choose the appropriate parts yourself when you’re going to buy a new computer.
Customer service is everything, and the first choice you’ll make in this matter, is where you want to buy your computer. You should choose a store with a good reputation and good reviews on their customer service. You can easily find used hardware on the market. I wouldn’t recommend doing this, especially if you are not an expert. In fact, I would strongly recommend to get your processor, main board, RAM, ODD and casing from the same store. They can also assemble it for you and configure it properly.
Here are some things you should keep in mind when you choose your computer’s hardware.
This is the most important piece of hardware in your computer. Intel and AMD are the two brands you have available today. Both are good, but Intel processor is more advanced, and therefore popular. Always try to buy the latest version. The most recent version of Intel processors is Intel Core i7.
Depending on your budget your needs, you can make some concessions, but again, always go for the most up to date processor you can get.
Here’s a brief explanation of the processor series available:
Pentium, Celeron, Core and Core i are the main models.
From Pentium 1 through 4, and up to Core i7 extreme, always look at the core and thread number. You will get better performance if the core and thread numbers are higher.
Also pay attention to the Cache Memory. More Cache Memory means better performance and more speed. The latest type of Cache memory is L3 Cache Memory. Turbo boost technology is also available on Intel processors, and is something you should consider.
Main board / Motherboard:
This is the board where all hardware is connected. Intel, Gigabyte and Asus are some of the most reliable brands in this area. You should also consider buying the latest model available in this case.
Be aware of much RAM memory you want in your computer, and choose a motherboard that can support that, along with your processor.
USB ports are also a fundamental part of your motherboard. Try to buy a motherboard with the latest USB version, which in this case is USB 3.0.
The monitor is the main output device of a computer. Now, you have a wide array of choices. From old CRT monitors, to LED and LCD. When you choose a monitor, you should look at the contrast ratio, response time, and of course, image quality. LED monitors are the latest in technology, and have the best image quality. Dell, Samsung, Asus and Phillips are among the best brands.
RAM means Random access memory, and it’s function is to keep data while your computer performs a complicated process. So the more RAM you have available, the faster your computer will perform. The latest type of RAM is DDR-3. Keep in mind that the RAM you want must be supported by your motherboard. Your RAM will also perform better if the BUS frequency is higher.
Hard Disk Drive (HDD):
Your hard drive is where all of your files are stored.
Today, hard drives can store from 160 GB to 3 TB of files, and sometimes even more. -If RPM of your hard drive is higher, you will get a better data transfer rate. If your motherboard specifies that it has a SATA port, you have to buy a hard drive for this kind of port.
Casing is the body of your computer, if you will. All your hardware goes inside the casing. Casing prices depend, mainly, on Watt of Power Supply wattage. You should choose PSU wattage according to your needs. If you have a big monitor and your computer deals with more graphics, you have to buy a casing with more PSU wattage. The ventilation system of the casing is very important, because this is what keeps your computer cool.
ODD means Optical Disk Drive. This is the unit where you pop discs in, and you have a few different options in this area. A CD-R unit can only read CDs but it can’t write on them. A CD-RW unit can read and record data on a cd. A DVD-RW can read and record on CDs or DVDs. The best brands of ODD’s are Samsung, Asus and Lite-On. If the speed of your ODD is higher, it can read and write data in less time
Keyboard and Mouse:
Keyboard and mouse are both very important input devices. It’s always better to buy a keyboard with bangle interface support. Nowadays optical mice are better than ball point mice. Look up that the mouse’s DPI. The higher DPI, the more efficient your mouse is. Best keyboard and mice brands are A4-Tech, Deluxe, Mercury and Logitech
If this article didn’t quite make it for you, Call Us! We will help you make the best decision!
Most people believe that the majority that computer invasions and problems are caused by hackers, but that’s not the case. Truth is; it is more common for a computer to be hijacked than hacked. Well, I’ll tell you how to spot a hacked or hijacked computer, and what you can do to prevent both from happening.
1 – New programs installed
Sometimes you may see new programs or files to the computer. If you are the only user on the computer and new programs are installed, this could be an indication of a hacked computer. However, there are also several legitimate reasons why a new program may appear on the computer, such as operating system updates, plugins and free programs that usually encourage you to try their toolbar.
In any case, there’s always the chance that a hacker may have broken into your computer. Backdoors and Trojans are by far the most common programs to be installed on the computer after it has been hacked. These programs allow the hacker to gain access to the computer. Spyware, rogue antivirus programs, and malware can be an indication of a hacker. However, are more commonly a sign that your computer has been hijacked while on the Internet.
2 – Online passwords
Sometimes, after an online account is hacked, the attacker changes the password to your account. Try using the “forgot password” feature to reset it. If your e-mail address has changed or this feature does not work, contact the company who is providing the service, they are the only ones who can reset your account.
3 – Spam e-mail being sent
When an e-mail account is hacked or taken over, the attacker almost always uses that account to spread spam and viruses. If your friends, family, or coworkers are receiving e-mail from you advertising something like Viagra, this means that your e-mail is compromised. You can fix this just by logging into your e-mail and changing your password.
Tip: E-mail addresses can also be spoofed without hacking the e-mail account. After changing the e-mail password, if your friends continue to get e-mails you have not sent, it is likely someone is spoofing your e-mail address.
5 – Increased network activity
For any attacker to take control of a computer, they must remotely connect to that computer. When someone is remotely connected to your computer, your Internet connection will be slower. Also, after the computer is hacked, it’s common that it starts to attack other computers.
Installing a bandwidth monitor program on your computer can help determine what programs are using bandwidth and how. Windows users can also use the netstat command to determine remote established network connections and open ports.
Please keep in mind that there are also dozens of other legitimate reasons why your Internet connection may also be slow, so don’t panic over a slow internet day
6 – Unknown programs wanting access
Computer security programs and firewalls help restrict access to programs on a network or Internet. If the computer asks for access to programs you do not know, rogue programs may be installed, or it may have been hacked. If you do not know why a program needs access to the Internet, we recommend blocking access to that program. If you later discover these blocks cause problems, it can be removed later.
Tip: A firewall prompting you for access may also just be someone trying to probe your network, looking for open or available ports in your network. Undesirable as is it, it may not be a hacker.
7 – Security programs uninstalled
If the computer’s antivirus, anti-malware, or firewall has been uninstalled or disabled, it can also be an indication of a hacked computer. A hacker may disable these programs to help hide any warnings that would appear while they are on the computer.
8 – Computer doing things by itself
When someone is remotely connected to a computer they can remotely control any device. For example, a mouse cursor could be moved or something could be typed. If you see the computer doing something as if someone else was in control, this can be an indication of a hacked computer.
9 – Internet browser home page changed or new toolbar
Internet browser changes such as your home page changing to a different web page, a new toolbar being added, your search engine changing, web pages getting redirected. These are all signs of a browser getting hijacked and not a computer hacker.
You now have the tools to spot a hacker that’s trying to get into your computer. Sometimes we can avoid them, but when you can’t, we come to the rescue. Call us Now!
Are you worried about your PC laptop’s battery life? You want to roam free around the room without having to plug your computer unless it’s absolutely necessary? Here are a few tips you can follow to max out the juice you can get out of your laptop’s battery before having to resource to the electric cord.
- Change your power plan. This is the easiest way to save battery life. On the bottom right corner, you can left click on the battery icon and go for the balanced option. Or, if you really feel like saving, right click on the icon and go to power options. There, you can choose a better power plan or make your own.
- Nowadays, most laptops have LCD screens. These are great because they allow a better definition and a sharper image, but they are responsible for 43% of your computer’s energy usage. Don’t worry though. There are ways you can save some battery life just by tweaking on your screen settings a little bit. First of all, adjust the screen brightness. Of everything you can tweak to improve your battery life, this one change alone can dramatically improve your battery life. Also, try to avoid any fancy screensavers that overuse the graphics capabilities of your laptop.
- Bluetooth and USB devices are also an unwanted power drain when extra minutes of battery life are precious. Each of these devices consumes power just by being enabled, and if you aren’t using them, you may as well disable them.
- Avoid overheating your computer. Laptop batteries are always going to slowly lose their ability to charge over time, but when a laptop is constantly overheating or used in a very hot environment, your battery is going to die very quickly.
- Today’s laptops use Lithium batteries instead of nickel, but there’s a lot of incorrect information about how to charge or drain your batteries, so let’s set the record straight. Nickel batteries required being fully drained before a recharge to optimize your battery life, but Lithium batteries are the opposite—you do not need to fully discharge it before recharging, and in fact, if you fully deplete a lithium battery and don’t recharge for a while, it can become incapable of holding a charge.
- You’ll also want to make sure that your battery is not always fully charged. If your lithium battery is fully charged all the time, you will lose up to 20% of your capacity every year, no matter what you do. Make sure to discharge the battery sometimes, and if you spend most of your time plugged in at a desk, you would be better off running the battery down to half, and then simply removing the battery and storing it in a cool place.
Now that you are better informed, start taking actions towards a healthier computer. If it’s too late, We Are Here To Help You! Call Us Today!
The New York Times number one tech columnist, David Pogue gave quite an interesting TED talk to simplify our interaction with technology. Here are the top 10 time saving tech tips he shared with us:
1- Don’t scroll with your mouse. Use the space bar on any browser. Every time you hit it, your browser scrolls down one page. If you hold the shift key while you press the space bar, it will scroll up.
2- When you’re filling out forms on the web, you can hit the tab key to jump from box to box. Now, when you get to the popup menu where you put your state, you don’t have to actually open that menu. Just hit type the first letter of your state over and over until it gets to the one you need. This also works for months of the year and everything you have in those popup menus.
3- If the text on the website you’re reading is too small, there’s a very quick solution. Just hold the crtl key while you press the plus sign and it will make the text bigger. To get the opposite effect, just hold ctrl key and press the minus sign.
4- Texting takes you longer than you’d like? This tip will definitely help you! Just hit space twice after you are done typing the sentence and forget about period and capital letters. The phone will do it for you!
5- Want to re dial your last call? Just hit the call button to get the number of your last call into the dial box, and then hit call again to make the call.
6- How tired are you of getting instructions on how to leave a message on your friend’s phone? There’s a way of bypassing those instructions and go straight to the beep. Every carrier has a different key, but you can learn them and save yourself from being annoyed one more time.
For Verizon, you just have to press *. For Sprint, press 1. For AT&T and T-mobile press the universal # key.
7- You can throw away your oxford dictionary now. Google can be your new dictionary! Just type “define”, followed by the word you are looking for and Google will show you the definition. You don’t even have to click on anything. It will just show you the definition as you type. You can also type in any airline flight and it will show you the status and other useful data as gate, ETA and such. And finally, you can also use it as a unit and currency converter.
8- On every word processor, there’s no need to drag the mouse over a word with the right button clicked and slide over it. You only have to click over the desired word to highlight it. After that, you don’t even have to delete it. You can just type over it!
9- Do you know what shutter lag is? You sure know it’s annoying, but do you know how to get rid of it? Shutter lag is the time your camera uses to calculate focus and exposure before it actually takes the picture. You can forget about it by half pressing the shutter a few seconds before taking the shot. That way, the camera will pre-focus and you can kiss shutter lag goodbye!
10- A useful tip for your presentations. In order to momentarily stop your presentation and black out the screen, you only have to press the “b” key. Hit it again and the screen will go back to where it was. Hit the “w” key instead, and you’ll white out the screen. This works on Keynote, PowerPoint and every presentation program.
If you need more tips to help you skate through your usual tech related problems, contact PcMac Express Today!