Windows is an incredibly powerful operating system, but most users are unaware of just how much it can do; this extra power is down to some hidden tools. 

If you take a look through the folders on your PC that contain Windows then it quickly becomes a bewildering spectacle. In among all the various Windows applications there are .dll files (don’t ask!) and text files full of binary code and gibberish. And that’s why most people spend little time sifting through the less explored corners of their PCs. But hidden within Windows are a number of innovative and helpful tools. These can boost your productivity and enhance your PC’s performance. 

The Built In Tools You Need  

It’s a rare individual who can afford to turn down increases in productivity and PC performance, so it’s time to familiarize yourself with: 

  • Startup: In Windows 10 you can find the Startup tool within Windows Task Manager. All you have to do is click the Startup tab to discover which applications begin loading as Windows starts booting. From here you can use the tick boxes to control what does and doesn’t load at startup. So, for example, you could ensure that valuable processing power is concentrated on loading up essential programs such as Windows Updates rather than Spotify.
  • System Information: It’s always important to know the basics about the PC you’re working with. This allows you to determine what your system is capable of as well as aiding IT professionals in diagnosing solutions. And System Information is the quickest way of gathering all this information together. This tool can be accessed in two ways: Firstly, you can type msinfo32 in to the ‘Run’ box when you hit the Windows key. And, secondly, you can access it by opening Administrative tools in control panel. Either way you are presented with a wealth of information on your system.
  • Task Scheduler: Workplaces are busy environments and it’s easy for simple tasks to be missed. But this doesn’t need to be a problem when you have Task Scheduler on your side. A simple but useful tool, Task Scheduler allows you to put automatic processes in place e.g. display alerts at specific times or schedule your antivirus program to scan.  Task Scheduler can be found within Administrative tools or by typing taskschd.msc in the ‘Run’ box.
  • Startup Repair: There’s nothing worse than a below-par startup process. Sometimes it can simply be slow and other times it can generate endless error messages. Thankfully, Startup Repair can help to eliminate this. If you’re in Windows then you need to hold the Shift key as you click on the Restart button to take you to your boot options. If your PC is failing to get as far as Windows it should present you with your boot options after two or three attempts. From boot options you should go to Troubleshoot > Advanced Options > Startup Repair. The process is automatic and any problems should be fixed by the tool. 

For more ways to secure and optimize your business technology, contact your local IT professionals. 

Read More


Times may change, but the humble printer is still an important tool in business. But, as with all technology, printers can fail and need repairing.

Luckily, some of the most common printer problems can be fixed without the help of a technician. However, understanding how to fix these problems is crucial to your success. And humans don’t come pre-programmed with a list of printer malfunction solutions. But, thankfully, you can learn how to solve these printer problems relatively quickly.

All you have to do is take a quick look at our guide on how to fix the most common printer problems.

Fixing Your Printer

It’s always frustrating when you hit the print button and your printer does nothing. The accompanying red error light serves only to compound this frustration. But you don’t need to remain frustrated for long. Some of the simplest solutions can be found below:

  • Paper Jams: There’s nothing worse than the sound of paper scrunching up in a printer. It’s even worse when you’re trying to print something urgently. We’re all familiar with having to carefully remove sheets of jammed paper from printers, but you can do a lot to avoid it in the first place. Start by making sure that your paper tray is not overfilled, in fact, try to always under fill its capacity by 5 – 10%. It’s also vital that your stack of paper is carefully squared as it’s put into the tray, loose sheets can soon cause havoc. 
  • Slow Printing Speeds: A printer which churns out pages at the speed of a sloth is a cause for concern. But it’s a problem you should be able to fix quickly. If you’re printing wirelessly then try moving closer to your router. It’s also possible that your printer simply isn’t able to meet your productivity needs, especially if you’re working with an older printer. However, by printing in draft mode you will be able to speed up the printing process until you have a new printer. 
  • Streaks and Lines on Printouts: It’s irritating when you print out a document only to find that it’s covered in streaks and lines. You want your document to look its best and not like something printed in the 1970s. The most common reason for these defects is down to a blocked print head. Luckily, many modern printers have an in-built ‘head cleaner’ function which can quickly be activated. Just check your printer manual for the best advice on cleaning the head. 
  • Printer Not Connecting to WiFi: The magic of WiFi has meant that wireless printing has never been easier. But when your printer fails to connect it’s enough to make you scream. You don’t have to fret too much though. Firstly, make sure your printer is within range of your router. Secondly, try resetting your devices in order to bring them back online. And, finally, check that your printer drivers are fully up to date. This strategy gives you the best change of solving any connectivity issues.

Not every printer problem can be solved in-house, otherwise there would be no need for technicians. Nonetheless, the advice above should prove invaluable in fixing the most common printer problems.

For more ways to secure and optimize your business technology, contact your local IT professionals.

 

 

Read More


The internet has connected us to each other in a way we would have thought impossible a few decades ago. But these massed connections can be very dangerous.

The beauty of the internet is that one PC can connect to another PC with relative ease. And these connections allow us to pool resources, share information and provide services. The foundations of almost every web service are based upon collections of PCs all working together to deliver an end result. These are often automated tasks that allow a website to continue operating correctly. But the fact that these PCs are generally left to their own devices means they aren’t actively monitored. And this situation makes them a security risk.

Known as botnets, these collections of PCs can have their cumulative power put to use for the gains of hackers.

What are Botnet Attacks?

While most botnets combine harmless coding with hardware, malicious botnets are another matter. A malicious botnet can gain access to your PC via two methods:

Regardless of the strategy involved, the end result is the same: an infection which adds your PC to the hacker’s botnet. Naturally, the more PCs added to the botnet, the more powerful it is. And, with the infection in place, the hacker will have full control of your PC. This allows them to carry out the following tasks:

  • Spread across the rest of your organization’s PCs by executing malware in order to swell the numbers of the botnet
  • Loading fake adverts in your internet browser designed to trick you into providing financial details to malicious websites
  • Use the cumulative processing power of all the PCs in a botnet to carry out DDoS campaigns in order to take websites down
  • Generating spam emails to be automatically sent from your organization’s email server

How Can You Protect Against Botnets?

As you can tell, a botnet attack will do your organization no favors and will cause untold damage to other businesses it targets. Therefore, you need to put these precautions into place:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Removing malware threats from your PC is the simplest way to keep it safe from the attentions of hackers. But what happens when you can’t delete it?

Anti-malware software is fantastic at providing you with a means of removing malware from a PC. It can quickly scan your PC for threats and delete them with the minimum of fuss. But the ease with which malware can be removed has provided hackers with an appetizing challenge. What if they could create a strain of malware which couldn’t be deleted? It’s been the holy grail for malware developers since the first virus was created. And it’s a quest which has now been achieved.

A form of malware that cannot be deleted presents many problems for PC users, so let’s take a look at what it consists of.

The Invincible Malware

The unnamed malware was recently discovered by security giants Kaspersky and has left even them scratching their heads at its origin and construction. What they do know is that it’s a highly persistent threat and one that has been designed to resist deletion. It succeeds with this strategy as, rather than targeting a PC’s hard drive, it focuses its attack on a PCs motherboard. In particular, this new malware targets PC’s Unified Extensible Firmware Interface (UEFI). The approach of exploiting the UEFI is novel as it is involved in booting up a PC. Therefore, it is separate from your hard drive and will remain untouched by any operating system reinstalls.

Once the UEFI malware is in place it acts much like any conventional malware. Its first task is to create a Trojan file in the Startup folder under the name of IntelUpdate.exe. Without some in-depth investigation, the average PC user is unlikely to know this is even present. But even if it is noticed, and a user decides to delete it, the IntelUpdate app will simply reinstall once the PC is rebooted. And it’s an app which will cause your PC further troubles. IntelUpdate will not only install further malware, but it will spy on your PC activity and transmit data and files back to a command and control server which appears to be located in China.

How Do You Defeat the Undeletable?

The prospect of a malware strain which cannot be deleted may leave you wondering how you can ever be protected from it. Thankfully, it can be deleted, but not by conventional means. Security tools are now available from firms such as Kaspersky and Microsoft which scan firmware on PCs. It’s recommended that you upgrade your anti-malware tools to include this option to counter this new attack strategy. The means by which this latest malware is spread is currently unknown, but it’s recommended that you follow these security tips to maximize your defenses:

· Install all updates and patches as soon as your PC prompts you to do so · Practice vigilance when dealing with incoming emails which contain attachments and links · Make sure that your workforce understand how to create strong passwords

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We take it for granted that every employee knows how to use a PC, but this isn’t always the case. Particularly if it’s a non-tech employee.

As our workplaces and industries have become more computerized, the need for PCs has increased. And this need is one which has spread to almost every corner of the workplace. Therefore, employees that haven’t previously needed to use a PC are now being asked to use one. For example, warehouse staff and engineers may now need to detail their workload digitally for other departments to access it quickly. However, for this to be achieved effectively, these new PC users need to learn how to use a PC.

This may sound like a mountain to climb, but if you know how to train them correctly then it becomes much easier.

Training Tips for Non-Tech Employees

Everyone learns at a different pace and responds to different techniques, but the following tips should help you get everyone off to a good start:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More