the security of your computer and data is crucial for you and the success of your company. Lost or stolen information can reveal company secrets or expose your confidential or personal information. The more you do to keep your computer secure, the safer your information will be. Use these 10 tips to learn ways you can help protect your computer, your data, and your company"s network.
Make sure that you install all of the patches and updates that your IT department recommends. In addition to installing Windows and Office updates, your IT department might require you to install additional security software, such as a firewall or custom software to help you connect from remote locations. Making these regular installations will keep your computer and your company"s network as secure as possible.
Learn more about ways to manage your computer and devices at work.
Passwords provide the first line of defense against unauthorized access to your computer, and a good password is often underestimated. Weak passwords provide attackers with easy access to your computer and network. Strong passwords are considerably harder to crack, even with the latest password-cracking software.
A strong password:
Is at least eight characters long.
Does not contain your user name, real name, or company name.
Does not contain a complete dictionary word.
Is significantly different from previous passwords. Passwords that change just slightly—such as Password1, Password2, Password3—are not strong.
Contains characters from each of the following groups:
Uppercase and/or lowercase letters.
Numbers
Symbols (!,@,#,$,%, etc.)
Learn more about how to create strong passwords.
Make it mandatory for you—or someone else trying to access your computer—to enter your password on all operating system or application settings. If a dialog box prompts you about remembering the password, rather then requiring you to enter it, just choose no. Allowing the password to be saved negates having the password at all.
Rather than opening up your computer to co-workers, use network file shares to collaborate on documents. And restrict access to the network file share to only those who need it. If you"re working on a team, you have lots of other options—for example, Microsoft SharePoint Workspace 2010.
If you"re going to be away from your desk for a while, make sure your computer is locked.
To lock your computer:
On your keyboard, press CTRL+ALT+DELETE at the same time.
Click Lock this computer (Lock Computer if you"re running Windows XP).
To unlock your computer, press CTRL+ALT+DELETE and enter your password.
Sometimes you"re away from your desk for longer than you unexpected. Plan for those situations by setting up your computer so that it locks itself after a specified amount of time.
You keep valuable and sensitive data on your computer. You might have sensitive information about your company or clients, or your personal bank statements on a laptop you use at home and work. Encrypting your data keeps it as secure as possible. To help keep unauthorized people from accessing your data—even if your computer is lost or stolen—you should encrypt all sensitive data. In the Enterprise and Ultimate editions of Windows Vista, you can use BitLocker™ Drive Encryption to encrypt the entire volume. In Windows XP and all editions of Windows Vista, you can use the Encrypting File System (EFS) to protect important files. We highly recommend that you learn how to encrypt a file or folder to keep it safe.
Learn how to encrypt a file in Windows 7.
Learn how to encrypt a file in Windows Vista.
Learn how to encrypt a file in Windows XP.
If an email message just doesn"t look right, it probably isn"t. Forward the email message to your IT administrator to verify before you open it.
If you"re sending confidential or business-critical information, encrypt the email and any files attached to it. Only recipients who have the private key that matches the public key you used to encrypt the message can read it.
Learn how to encrypt your messages using Outlook 2010.
Learn how to encrypt your messages using Outlook 2007.
Learn how to encrypt your messages using Outlook 2003.
Receiving spam, or junk email messages, isn"t just annoying. Some spam can include potentially harmful viruses that can cause damage to your computer and your company"s network. The Junk Email Filter reduces the amount of junk email messages, or spam, you receive in your Inbox. Good news—if your junk mail filter is already active. But you can always change the settings.
Learn more about handling junk mail in Outlook 2010.
Learn more about handling junk mail in Outlook 2007.
Learn more about the Junk Email Filter in Outlook 2003.
Surprisingly, basic safety is often ignored by people using the web to research information quickly and efficiently. If you use the Internet for research of any kind, you could be exposing yourself and your company to hidden dangers such as the unauthorized transfer of confidential information. And no one wants to be the person responsible for a companywide computer network shutdown.
Whatever your reason for using the web, there is a smart way to conduct research on it: with an alert eye and a vigilant approach. Use these four tips to help protect yourself and your company from prying eyes and malicious programs.
Microsoft continually provides enhancements and security updates to all its products, including Internet Explorer. No program is completely safe from harm but as threats are discovered, Microsoft makes fixes, upgrades, and service packs for its products available. To maintain the highest level of security on your computer, you or your IT department must make sure to apply all service packs.
Before you venture onto the web, make sure you are using the latest version of Internet Explorer. At the time of this writing, the latest version is Internet Explorer 8.0.7. To see what version you are using, follow these steps:
In Internet Explorer, on the Help menu, click About Internet Explorer. There are three items you should notice in the window that is displayed:
Version: Internet Explorer 8.0.7 is the latest version.
Cipher Strength: This is the level of encryption that the browser can support. If you are going to be sending any confidential information over the Internet, you must make sure the cipher strength is 128-bit. If it is less than this value, it will be possible for a hacker to crack the encryption code and view confidential information.
Update Versions: Keep your version updated to ensure the balance between security and functionality is correct.
Click OK to close the window.
If your browser needs updating, go to the Microsoft Update website, where you can download the latest version of Internet Explorer.
By setting up Internet zones to meet your personal needs, your computer can help protect you as you surf the web. A zone is a logical region or grouping of websites, based on where they are physically located and how well you trust the source. These default zones are available in Internet Explorer 8.0.7:
Local Intranet — Websites located on your local network. These sites do not have to communicate over the Internet to be accessed.
Trusted Sites — A list of websites that you trust not to harm your computer, such as sites you have identified as properly encrypted.
Restricted Sites — A list of websites that are known or suspected to be harmful to your computer.
Internet — All other sites that don"t fall under the other three categories.
You can indicate how Internet Explorer should behave when it accesses a website within each of these zones. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Security tab.
When you select a web content zone, you can change the security levels. For all but the Internet zone, you can add specific sites to a zone based on your personal requirements. And Custom Level allows you to enable or disable a variety of options based on personal preference. For example, you may want to allow automatic logons only to websites that are located in your Intranet zone instead of everywhere on the Internet. The User Authentication section of the Custom Level zone allows you to set that preference. Or, you may want to ensure your Pop-up Blocker is enabled. Custom Level is where you can ensure your security settings allow your blocker to operate.
Follow the prompts in the Internet Options dialog box in the zone you want to customize by either clicking Sites or Custom Level.
Cookies are small files stored on your computer that contain information needed on certain websites. A cookie can be used to store user ID, password, preferences, personalization, or other information that is helpful to enhance your experience on that site. For example, suppose you visit a website that allows you to select a preferred language. So you don"t have to choose the language preference each time you enter the site, a text file on the site stores language preference directly on your computer as a file, or cookie.
Here"s the catch: you don"t know what the cookie has been programmed to collect. You don"t know if the cookie is malicious or not. If it"s malicious, you could quickly end up with a spiteful little program stored directly on your hard drive. A malicious cookie can collect and store almost any information that you may not want it to, such as your name, credit card information, address, or more. Cookies make it possible for unwanted information to be stored and accessed repeatedly when you visit a website.
By default in Internet Explorer, cookies are allowed for all zones except the Restricted Sites zone. However, if you want to limit cookies for a particular zone, here"s how you do it:
In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Privacy tab.
In the Settings section, move the slider up or down to adjust the settings.
Moving the slider up incrementally increases the Internet security on your computer, so that cookies are not accepted. Moving the slider down incrementally decreases the security, so that cookies are accepted. Check with the IT department for your organization if you are not sure which settings are appropriate to use.
Also in the Settings section, click Sites to explicitly set a cookie policy for individual websites. Here, you can specify which sites you want to allow or not allow to use cookies. Enter the desired website address in the Address of website text box. Click the Block button to block all cookies for the entered site, or the Allow button to allow all cookies for the entered site.
Continue entering settings for each specific website for which you want to set a cookie policy.
Click OK to return to the Internet Options dialog box. Click OK.
If you are concerned that you may already have cookies on your computer that contain personal information, you can delete cookies and other temporary Internet files by following these steps:
In Internet Explorer, on the Tools menu, click Internet Options.
Make sure the General tab is selected. (This is the default.)
In the Temporary Internet files section, click the Delete button. You will be prompted for confirmation before continuing.
The Temporary Internet files that you can delete are listed and selected for deletion by default, including Cookies. Clear the check box beside any temporary Internet file types that you do not want to delete.
Click OK.
Get more information on privacy features in Internet Explorer 8.
While surfing the Internet is less dangerous than finding an abandoned bag in an airport, security should still be taken seriously. Encryption is a method that website owners use to help protect sensitive information, such as user names, passwords, addresses, phone numbers, and credit card numbers. If a website you visit does not use encryption, any sensitive information you place on it is easily accessible to hackers who want that information for unsavory purposes.
There are two ways to ensure you are viewing an encrypted site.
Make sure you are using the latest version of Internet Explorer as outlined in Tip 1 ("Update, update, update!") above.
Make sure that a website uses encryption when you are entering or viewing sensitive information. There are two ways to see whether a site uses encryption. One is a small yellow "lock" icon on the status bar of Internet Explorer. The other is in the web address itself. If it begins with https:// (note the "s"), then the site is secure. If you ever visit a website without either of these encryption indicators, do not click a Submit, Save, or OK button, because sensitive information will be transmitted without being encrypted.
Your PC and mobile devices are critical to your job. Every day you rely on them to perform tasks, connect with people, and access resources. Maintaining your computer and keeping it running smoothly can even be closely tied to job performance.
At work, your computer and devices are part of a larger network. Keeping them running means you have to work closely with your IT department. Doing so can save you time, save your company money, and help enhance network security. This article offers tips and best practices for working with your IT department to help keep your computer and devices up to date and functioning properly.
You might take your work computer home, but it"s important to realize that your company owns the computer. As the owner, your employer has the right to install patches and updates on a regular basis. By installing updates and new Microsoft software, your employer can make sure your computer and the network run as smoothly as possible. A software update is usually a win-win event, even if it causes a minor inconvenience.
"It"s common for IT departments to get complaints about patches being put on computers," says Jim DuBois, a general manager for IT at Microsoft. "But it is the best way for companies to make sure the network and computers remain secure."
To further protect their computers and network security, many companies prevent users from altering software or even changing settings.
Use these best practices to help protect and maintain the computer you use at work. You should contact your IT department to determine specific policies.
Install all updates required by your IT department. Lacking the software updates required by your IT department can expose your company to viruses and other security risks, and some companies will block network access if patches aren"t installed by a set date. It’s a good idea to find out whether IT wants you to install software updates from Microsoft Update. If so, check for Microsoft updates regularly. Doing so can prevent the hassle of installing updates for IT when it"s not convenient for you, and you might avoid potentially costly and time-consuming damage-control measures, such as spyware removal.
Install only licensed programs. Make sure that you or your company has a license for any software you install on your work computer. Software for which you"ve bought a license is probably fine, but unlicensed software can trigger litigation, so installing that program your friend bought could pose a problem. Sometimes software bought for home use cannot legally be installed at work. It’s best to double-check licensing details and to get the IT department’s approval before you install.
Don"t install different versions of software. Even if you prefer the software version you use at home, don"t install it on your work computer. It could be incompatible with the software your coworkers use or with your specific line of business applications. Also, your IT department may not be able to make required updates or to provide technical support for unapproved software.
Let IT know when hardware isn"t working. Fixing a broken computer yourself could just cause more problems. Your fixes could, for example, result in network incompatibility. Most IT departments have a help desk or technical assistance program designed to diagnose and correct problems. In fact, your IT department may have already seen the problem and could have a known fix for it. By contacting IT, you can help them to track common problems and to make informed choices about which brand and model of device to order in the future.
Let IT know when you need something. Making reasonable requests and giving the IT department adequate time to plan can help them respond to your needs. Otherwise, you may end up with software or hardware you don"t want, which can hinder your effectiveness at work.
Don"t download programs from Internet sites you don"t trust. When you download programs that may not be secure, you jeopardize the entire network.
Be aware of suspicious emails. A computer virus may be disguised as a downloadable file attached to an email. If you receive an email from someone you don"t know, or if an email contains strange text or looks suspicious, contact your IT department. If you open it, you could cause problems for you and your coworkers. If it does contain a virus, IT can ask other employees to look for similar emails.
Use online support resources. Many IT departments have created internal help sites to provide solutions and advice to computer users, and yours probably has, too. Check there first, but if you don’t find answer for your question about a Microsoft product, or if your company doesn’t have an IT department, you can tap these resources:
If you work on the road, your company may provide you with a Windows Phone to stay in touch with the office. If you decide to buy your own, though, first check whether your IT department has a list of recommended devices. There are many options for phones and for data and voice plans. Your IT department may already support specific brands, models, and plans. Buying those can make it easier to connect to the network and to get support if you need it.
Whether you work in a small company that doesn’t have an IT department or you are self-employed, many of the best practices outlined above still make good sense. Wherever you work, up-to-date software contributes to the safety and efficiency of your computer, and no online computer should be without current antivirus software. If PC performance is an issue, most computer users are able to complete basic performance-enhancing tasks, such as defragmenting a hard drive, deleting unneeded programs, and emptying the Internet cache. Users who are more tech savvy can consider adding random access memory (RAM) to boost performance. You might also choose to automate your PC maintenance schedule. If you find yourself stumped, the Microsoft Knowledge Base, Troubleshooting 101, and Windows Help & How-to are excellent solutions resources.
Download our guide to learn how you can work more comfortably and help reduce your risk of repetitive stress injuries. Your workspace and peripherals make a difference.
Download our whitepaper for more detailed information on how to work more comfortably. Learn about reducing the incidence and cost of repetitive stress injuries.
Quickly review the benefits and products for having a healthier work environment in this quick reference guide.
Review information and tips on how to create a healthier working environment.
Visit Microsoft’s Hardware Blog to read more about Hardware and ergonomics.
Read an interview with Dr. Dan Odell, Certified Professional Ergonomist.
Wireless Mobile Mouse 4000
for Business
Part #: 4DH-00001
$39.95MSRP
Comfort Curve Keyboard 3000
for Business
Part #: 3XJ-00001
$21.95MSRP
Working on a slow, disorganized computer can be frustrating—and it happens to the best of us. This article will give you some easy-to-follow guidelines on how to keep your computer on the right track using tools in Windows 7, Windows Vista, Windows XP, and Microsoft Office 2010.
We all know how easy it is to dump files into the wrong folder when we"re in a hurry. But one way to make sure you keep your files organized is to remove the clutter with a filing system that makes sense for the way you use your computer. Here are a few tips to get you started:
Start clean.
Begin by deciding which files you no longer need on your hard disk drive.
Think it through.
Take the time to plan the best way to organize your files. How do you spend your time on the computer, and what do you create? Do you work with photos and image-editing software, surf the web, write short stories, research school projects, or play games? The folders you create in Documents (called “My Documents” in Windows XP) can be easily tailored to show you just the kind of data about your files that you need to track. For more tips about creating a well-organized filing system, see File organization tips: 9 tips to manage your files better.
Use subfolders.
After you have an idea of the kinds of items you produce and want to save, create folders and subfolders to store your files. Be sure to use logical, easy-to-understand names. For example, within Documents, you might create additional folders called Projects, HR Benefits, and Career. Then, within the Projects folder, you could create subfolders for each different project.
Clean your files periodically.
After you have set up your file system, inspect and clean it regularly. Routine maintenance tasks, such as deleting old or duplicate files and folders and making sure that important files are in the right folders, can save you a lot of time and frustration.
Email folders in particular tend to spiral out of control, so be sure to spend time ordering and maintaining them. Microsoft Outlook 2010 offers nifty features to help you stay on top of your Inbox. For more tips, see Get organized: 7 ways to better sort, store, and search your email.
Tips:
To create a new subfolder with Windows 7, Windows Vista, or Windows XP, right-click anywhere in the folder, click New, and then click Folder. Type the name for the new folder, and press ENTER. For more tips about creating a well-organized filing system, see File organization tips: 9 tips to manage your files better.
To create a new folder in Windows 7, in Windows Explorer, click New Folder at the top of any folder or library. Also in Windows 7, the new libraries make managing your files easier than ever. Learn more about working with libraries.
Now that you"ve organized your files and folders and cleaned up your desktop, you can organize the data itself. Windows includes two utilities—Disk Cleanup and Disk Defragmenter—that help you free up more space on your hard drive and help your computer work more efficiently.
Disk Cleanup compresses your old files to free up storage space.
Disk Defragmenter scans your hard drive and consolidates files that may be scattered across the disk.
It"s up to you to decide how often to run these utilities, but it"s a good idea to do so at least once a month. Windows Vista users take note: Disk Defragmenter is automatically scheduled to run once a week (Sunday at 4 A.M.). You can change the scheduled time for this feature or, if you prefer, turn it off.
Learn how to run Disk Cleanup
Learn how to run Disk Defragmenter
System Restore is one of those programs that can be a life-saver when you"ve been the unfortunate recipient of unstable software, a badly timed power outage, or a damaging thunderstorm. System Restore records important documents, settings, and preferences on your computer. If the unthinkable happens and your computer files are damaged or inaccessible, you can use System Restore to restore your computer to the same state it was in before the data was lost.
System Restore creates restore points daily and whenever you install device drivers, automatic updates, and some applications. But it"s a good idea to get into the habit of creating a system checkpoint (called a restore point) when you"re about to install new software or take any action you suspect might make your computer unstable. Then, if there"s any conflict at all, you can restore your computer to the point just before you began the installation.
Although System Restore can put your computer back in order, it’s prudent to periodically back up all the files on your computer. Whether you choose to use an external hard disk, DVDs, or a network location to back up your files, Windows 7 makes it easier than ever to safeguard the contents of your computer. You can back up your files if you’re running Windows Vista or Windows XP, too. Learn more about backing up your data.
Computer programs are continually improved based on customer feedback and regular product testing. As problems are resolved, you should benefit from those improvements. By checking Microsoft Update often, you can make sure you"ve got the most recent Windows and Microsoft Office improvements available to you.
Windows 7 and Windows Vista users don"t need to sign up for Microsoft Update: An account is automatically created for you during the registration process, and Windows Update is automatically installed on your computer with default settings that you can change later, if you wish.
Windows XP users must visit Microsoft Update to start the update process. First-time visitors might need to sign up for the service. After you"ve visited Microsoft Update, you should configure your computer running Windows XP to receive critical updates automatically. This free service is called Windows Update in Windows 7 and in Windows Vista, and it is called Automatic Updates in Windows XP.
Learn how to receive critical updates automatically in Windows 7, Windows Vista, and Windows XP:
Important: If you do not select the recommended automatic updating option, you must download and install every critical update. If you download the updates but forget to install them, your computer will not be protected with the latest enhancements.
Updating your Windows software is just the first step in keeping your computer safe. Next (if you haven’t already done so), you"ll want to install antivirus software from a reputable vendor, such as Microsoft, AVG, Norton, or McAfee. As is the case with Windows, it is critical that you keep your antivirus software up to date. Free antivirus software comes preinstalled on many computers, but after the trial period expires, you’ll be exposed to new and emergent threats. Be sure to renew your subscription or to secure alternative virus protection.
If your computer seems sluggish or if you begin to see lots of pop-up advertisements, even when you"re not surfing the web, your computer may be infected with spyware, adware, or other unwanted software. Learn more about spyware and what it can do to your computer.
Microsoft Security Essentials offers comprehensive protection against viruses, spyware, and other malicious software. You can download it for free. You can also download the free Windows Malicious Software Removal Tool.
If you’re like a lot of us, you get so much email every day that you might spend as little as 15 seconds scanning a message to determine how it applies to you. Now, imagine that other people are reading your email the same way. If they can"t quickly identify the purpose of your message, they’ll probably delete it or leave it in the Inbox for "later"— if later ever comes.
In this article, I give 6 tips to ensure that your email messages are read and get the attention they deserve.
When recipients receive your email message, they should be able to see at a quick glance how the message relates to them and why it’s important. They may be looking at a preview of your message in Microsoft Outlook or on a Windows phone or Windows Mobile device, such as a personal digital assistant (PDA). Or they may see only Subject lines in their Inbox. If your Subject line is confusing and irrelevant, your email will surely get deleted in a hurry. Here are some examples of what can be included in Subject lines to make sure the reader opens your mail:
A standard subject heading such as "Action Requested," "Response Requested," "FYI," or "Read Only," depending on the action indicated in the body of the message.
The meaningful objective or supporting project that the message relates to, for example, "FY "05 budget forecasting."
The required action if applicable, for example, "Consolidate departmental budget spreadsheets."
The due date if applicable, for example, "Due by July 7."
An example of an effective Subject line is "Action Requested—Consolidate all department spreadsheets for FY "06 budget and return to me by June 15th."
Be completely clear about the actions you want the recipients to take. Be specific and put all the material that is related to an action in one place. To get even faster responses, talk about how the action relates to the recipient"s objectives, and always give due dates. It"s also important to clarify what type of action you want the recipient to take. There are basically four types of actions you could request. If you make this level of detail clear, the recipient will be most likely to read the email and take the action right away. The four actions include:
Action: The recipient needs to perform an action. For example, "Provide a proposal for a 5% reduction in Travel & Entertainment expense."
Respond: The recipient needs to respond to your message with specific information. For example, "Let me know if you can attend the staff meeting at 9:00 A.M. on Friday."
Read only: The recipient needs to read your message to make sure they understand something. No response is necessary. For example, "Please read the attached sales plan before our next staff meeting on August 12th."
FYI only: The recipient should file your message for future reference. No response is necessary. In fact, even reading the message is optional. For example, "Enclosed for your records are your completed expense reports."
Make sure you give recipients all of the information they need to complete an action or respond successfully to your request. Your co-workers shouldn"t have to come back to you asking for information, whether it is a supporting document or a link to a file on a shared website. You can include supporting information in the body of the message, in an attached file, or in an attached email. In Windows Live Hotmail, you can use the Quick Add feature, which lets you search for and insert content such as images, video, restaurant details, maps, and movie times into your email messages, without ever leaving Hotmail. In addition, if you want recipients to fill out a form, it"s a good idea to attach a sample copy of the form that shows how it should be filled out.
Target your message to the appropriate audience. Only people who have to complete an action on the Subject line should receive your message. Be thoughtful and respectful when you enter names on the To line. People observe your thoughtfulness and the results are more effective. Here are two simple questions to help you filter the To line recipients:
Does this email relate to the recipient"s objectives?
Is the recipient responsible for the action in the Subject line?
It"s tempting to put loads of people on the CC line to cover your bases, but doing so is one of the fastest ways to create an unproductive environment. Here are some things to consider when using the CC line:
No action or response should be expected of individuals on the CC line. The recipient needs to only read or file the message.
Only those individuals whose meaningful objectives are affected by the email should be included on the message. If you are not sure that the information is related to a co-worker"s objectives, check with that person to see if they want to receive your email on that topic.
The final thing you want to do is check your work to be sure you are supporting meaningful actions. Sending clear, well-defined messages can reduce the volume of email you send and receive, encouraging correct action, saving time, and limiting email trails. Make sure you ask the following questions before you send the message:
Have I clarified purpose and actions?
Have I included supporting documents and written a clear Subject line?
Did I write the message clearly enough that it does not come back to me with questions?
Am I sending the message to the correct recipients?
Have I run the spelling checker and edited the message for grammar and jargon?
One of the quickest ways to get onto your recipients" "delete radar" is to overwhelm them with meaningless email. Responding to email with "I got your email, thanks," or sending out lots of irrelevant data that you think they might want to know about is a quick way to create a track record of sending unproductive mail.
To summarize, it is incredibly easy to create an unproductive culture using email. Follow these guidelines and you can be sure you and your team are able to keep focused on meaningful objectives and don"t create email overload.
At McGhee Productivity Solutions, we have consultants and employees located around the country. Because we work together on a lot of documents, we need a central location where we can store and edit these documents as well as keep track of our schedules. To work together as efficiently as possible, we use a team website created with Microsoft Windows SharePoint Services. Team sites work great if you have team members working in different locations, or even if your team is all in one office.
In this article, I"m going to give you 7 tips we"ve learned in setting up and using our team website. These tips can help you get up and running productively as quickly as possible with your site.
Note: Windows SharePoint Services is a great, and underused, tool for managing teams and team projects. You can use it to create a team website to track objectives and projects, as well as have a central location for storing and collaborating on documents.
Organize site folders by whatever makes the most sense for your team. The key is to be clear and, above all, consistent. For example you could choose to organize:
By department
By objective
Alphabetically
By clients
By project
We also create a new Document Library folder in SharePoint for each project. We can store all of our files related to a project in a Document Library. This not only helps keep our files organized, but makes it easier if a project is reassigned for the new owner to take ownership of all the associated materials. Learn how to add a new Document Library folder.
Decide as a team how you want to name your files. For example, you can insist that a date be attached to each file, or that the person who created the file put their initials in the file name. Also, you can take advantage of the fact that you can use long file names for files and SharePoint folders. Be sure to publish your naming structure so that everyone on the team knows what it is. Above all, be consistent in reinforcing and using this naming convention. This is critical. We’ve found that if you don’t, your team won’t know how find files and therefore won’t use the site effectively.
Develop an archive folder system for keeping previous versions of files for historical or version control needs. We keep only one current version in our “active” folders. This clears up any possible confusion over which version of a document should be used, particularly when your team members download files to their computer to work on while they"re traveling or working out of their office.
If your team members do copy files onto their computers, you need to take extra precautions to ensure you only have the most current versions of their files on the team website. If team members keep versions of files on their computer, they should change the file name. That way, if they upload the file at a later date, they will not overwrite something on the team website that might have been edited in the meantime.
Give each folder a single owner who can add files to it. We find that this ensures the integrity of naming and file structures within each section of the team website. Multiple people may edit documents in various folders, but we make sure no one else uploads new documents or creates new folders inside a folder owned by someone else.
You will probably have a number of files (like sales data) that are accessed and edited by several team members. While SharePoint won’t allow multiple people to save an open file, it is possible for a person to open a file while someone else is editing it. Unless the file is checked out, you run the risk of more than one person working on the same file. One or more people may end up doing work that can"t be properly saved. And if a user doesn’t check the file back in, then others can’t access it. Learn how to:
Ever notice how each PC has a personality of its own? Or maybe even multiple personalities? In the course of a week, your computer may act friendly, moody, and sometimes downright mean.
However, don"t take a hammer to your PC just yet. The following is a list of common symptoms and treatments to help even the most troublesome PCs. You don"t even have to be a psychologist (at least not yet) to deal with your PC"s neuroses.
Windows 7 and Windows Vista usually manage this automatically, but overall you"ll find that these tips work for all versions of Windows, from Windows 95 to Windows 7.
Perhaps you"re more than familiar with this scenario: You"re working on your PC and notice performance getting gradually slower and slower. Programs become harder to open and close. You wait forever for Web pages to be displayed. And then, you get some serious-sounding "virtual memory is too low" message, like the one in the following graphic.
Don"t worry: This message isn"t as scary as it sounds.
Virtual memory is the space your computer uses when it"s short of RAM (Random Access Memory), which is the memory used when running programs like Microsoft Office Word or Microsoft Office PowerPoint.
So what can you do to correct this problem and prevent this message from coming up in the future? The following are some solutions to keep your computer from displaying the "virtual memory minimum is too low" message.
Solution 1: Bump up the virtual memory size on your computer
The first solution is to increase your computer"s virtual memory settings. To do so, you first need to determine how much RAM you currently have.
Solution 2: Add more RAM to your computer
If you keep getting that dreaded "Your system is running low on virtual memory" message—even after you increase your computer"s virtual memory—then you may need to buy more memory for your computer. To really work well:
Windows 7 needs at least 1 GB of RAM to run. See more system requirements for Windows 7.
Windows Vista needs at least 512 MB of RAM to run, but for some applications (like gaming) 1 GB or more of RAM is recommended.
Windows XP needs a minimum of 256 MB of RAM.
The more RAM you have, the better.
If you"re at work, contact your company"s IT administrator before updating the memory on your computer. They may have some memory available and can help you install it.
If you do need to purchase some more memory, stop by your local computer shop. You can probably buy memory from them, and they"ll probably install it for you. Or, you can buy memory online.
We"re all familiar with moving program windows around the desktop. You can click-and-hold the window"s title bar to move it around. But what do you do when you accidentally move a window"s title bar off the desktop so you can"t grab it anymore? The window is stuck in that inconvenient position.
Solution: Use your keyboard to help move your window
The trick to moving these stubborn program windows is to use your keyboard.
The taskbar is that horizontal bar at the bottom or your computer screen that displays open programs on your desktop. The taskbar also contains the Start menu, which allows you to navigate to various programs installed on your computer. In many ways, it"s your command central.
Thus, there"s nothing more frustrating than going to start a program, only to find the taskbar gone. A computer without a taskbar will bring you to a grinding halt.
The good news is that the taskbar never disappears—it just hides. It may be hiding behind other open windows, or at the top or side of your screen. You can also (unintentionally) make the taskbar so thin that it seems invisible.
The following are possible reasons why your taskbar has vanished, as well as solutions to keep your taskbar from ever running away again.
This article covers three common PC problems. But if you"re still unable to find the solution to your particular PC problems, check out Microsoft support resources. There, you"ll find various self-support and assisted support solutions. You"ll find answers to cure even the most disturbed computer.
These days, it seems that just about everybody uses a laptop or notebook computer to get work done away from the office or on the road. Unfortunately, the pervasiveness of laptop computing has made portable systems an easy target for theft. If your laptop computer is stolen, or if someone gains access to your files while your back is turned, your company information—not to mention your personal and financial data—can be exposed.
Looking for information about security features you can use on your laptop to keep your data safe while you travel? This article covers some of the most pertinent. If you’d like more general security suggestions (whether on the road or at the office), check out 10 ways to work more securely.
Use these 10 tips to learn how you can help protect your laptop from theft when you"re on the road.
Computer bags can make it obvious that you"re carrying a laptop. Instead, try toting your laptop in something more common, like a padded briefcase or suitcase.
Strong passwords that are difficult to break or guess can thwart unauthorized access to individual files and even to the entire operating system. Learn how to create strong passwords:
You can also check the strength of your password by typing it into a password checker like this free one offered by Microsoft Security.
Learn how to password-protect your files:
Of course, the strongest password in the world won’t help if you give it away to a thief. Keeping your password with your laptop is like leaving your keys in the car. Without your password or important access numbers, it will be more difficult for a thief to access your personal and corporate information.
If someone should get your laptop and gain access to your files, encryption can give you another layer of protection. With the Windows operating system, you can choose to encrypt files and folders. Then, even if someone gains access to an important file, they can"t decrypt it and see your information. Learn more about how to encrypt your data:
These guards help prevent someone from seeing your screen—even if he or she peeks over your shoulder. They can be very useful if you need to work on sensitive information in a public place, and they are especially helpful when you"re traveling or need to work in a crowded area. The screen guard from Secure-It is just one example of a screen guard you could use.
Always take your laptop on the plane or train rather than checking it with your luggage. It"s easy to lose luggage and it"s just as easy to lose your laptop. If you"re traveling by car, keep your laptop out of sight. For example, lock it in the trunk when you"re not using it.
When you go through airport security, don"t lose sight of your bag. Hold your bag until the person in front of you has gone through the screening process. Many bags look alike, and yours can easily be lost in the shuffle.
Putting your laptop on the floor is an easy way to forget or lose track of it as you talk at a ticket counter or order your latte. If you have to set it down, try to place it between your feet or leaning against your leg, so you"re always aware of it.
If you need to leave your laptop in a room or at your desk, use a laptop security cable to securely attach it to a heavy chair, table, or desk. The cable makes it more difficult for someone to take your laptop. There are also programs and devices that will report the location of a stolen laptop. These work when the laptop connects to the Internet and can report the laptop"s exact physical location. Absolute Software’s LoJack and its line of Computrace products, for example, offer physical location tracing in addition to capabilities for remotely disabling a missing computer, retrieving or deleting data, and more. Search for more computer tracking and recovery solutions.
Too many things have been lost in hotel rooms. These rooms may not be completely secure. If you must leave your laptop in your room, put the "Do not disturb" sign on the door to keep hotel staff out. Don’t leave your laptop at the front desk, either.
Security experts advise that you affix your name and contact information, along with a promise of a "Reward if lost or stolen—no questions asked,” on the computer. These can help improve your odds of getting the computer back in the event of theft or a simple mix-up.
Change your network password to help secure access to corporate servers.
Report the theft to local authorities (such as the police) and to your company"s IT department.
If customer data was on the laptop, contact your account representative, legal representative, or appropriate person at your company so they can take the necessary actions.
WTM CD Protect یکی از بهترین نرم افزار هایی است که می توان برای قفل گذاری بر روی انواع CD و DVD استفاده کرد. برای یادگیری روش کار با این برنامه می توانید از راهنمای تصویری آن در خود برنامه با کلیک بر روی قسمت help استفاده کنید.