<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ProTech Computer Solutions, Inc.</title>
	<atom:link href="http://www.protechcomputersolutions.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.protechcomputersolutions.com</link>
	<description>ProTech Computer Solutions - Small Business IT support for the Northern Twin Cities metro area.</description>
	<lastBuildDate>Tue, 29 Apr 2025 20:09:17 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.40</generator>
	<item>
		<title>Insidious New IRS Social Engineering Attack</title>
		<link>http://www.protechcomputersolutions.com/blog/2016/10/insidious-new-irs-social-engineering-attack/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2016/10/insidious-new-irs-social-engineering-attack/#comments</comments>
		<pubDate>Wed, 12 Oct 2016 00:54:56 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=728</guid>
		<description><![CDATA[There is an insidious new IRS scam doing the rounds. They send you a phony IRS CP 2000 form and claim the income reported on your tax return does not match the income reported by your employer. This is meant &#8230; <a href="http://www.protechcomputersolutions.com/blog/2016/10/insidious-new-irs-social-engineering-attack/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>There is an insidious new IRS scam doing the rounds. They send you a phony IRS CP 2000 form and claim the income reported on your tax return does not match the income reported by your employer. This is meant to get you worried. To confuse you further, the bad guys claim this has something to do with the Affordable Care Act.</p>
<p>You might receive emails with attached phony forms, text messages and even live calls to your phone about this! You need to know that the IRS will never initiate contact with you to collect overdue taxes by an email, text message or phone call.</p>
<p>If you get any emails, text messages, old-time snail mail or even live calls about this, do not respond and/or hang up the phone. If you receive a &#8220;CP 2000&#8243; form in the mail and doubt this is legit, you can always call the IRS at 1-800-366-4484 to confirm it is a scam.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2016/10/insidious-new-irs-social-engineering-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Lastest iTunes Update Causing Problems</title>
		<link>http://www.protechcomputersolutions.com/blog/2014/02/lastest-itunes-update-causing-problems/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2014/02/lastest-itunes-update-causing-problems/#comments</comments>
		<pubDate>Tue, 04 Feb 2014 15:58:01 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=708</guid>
		<description><![CDATA[We&#8217;ve responded to a number of calls from clients experiencing issues with the latest iTunes update.  This is a known issue with update 11.1.4 released on or around January 22, 2014. Fortunately, there is a workaround (from the iTunes support &#8230; <a href="http://www.protechcomputersolutions.com/blog/2014/02/lastest-itunes-update-causing-problems/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>We&#8217;ve responded to a number of calls from clients experiencing issues with the latest iTunes update.  This is a known issue with update 11.1.4 released on or around January 22, 2014.</p>
<p>Fortunately, there is a workaround (from the iTunes support forums):</p>
<p>Go to <strong>Control Panel</strong> &gt; <strong>Add or Remove Programs</strong> (Win XP) or <strong>Programs and Features </strong>(later)</p>
<p>Remove all of these items in the following order:</p>
<ul>
<li>iTunes</li>
<li>Apple Software Update</li>
<li>Apple Mobile Device Support (if this won&#8217;t uninstall move on to the next item)</li>
<li>Bonjour</li>
<li>Apple Application Support</li>
</ul>
<p>Reboot, <a href="http://www.apple.com/itunes/download/">download iTunes</a>, then reinstall, either using an account with administrative rights, or right-clicking the downloaded installer and selecting <strong>Run as Administrator</strong>.</p>
<p>The uninstall and reinstall process will preserve your iTunes library and settings.</p>
<p><strong>Please note:</strong></p>
<p>Some users may need to follow all the steps in whichever of the following support documents applies to their system. These include some additional manual file and folder deletions not mentioned above.</p>
<p><a href="http://support.apple.com/kb/ht1925">HT1925: Removing and Reinstalling iTunes for Windows XP</a></p>
<p><a href="http://support.apple.com/kb/HT1923">HT1923: Removing and reinstalling iTunes for Windows Vista, Windows 7, or Windows 8</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2014/02/lastest-itunes-update-causing-problems/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Warning:  CryptoLocker &#8211; New Ransomware Variant</title>
		<link>http://www.protechcomputersolutions.com/blog/2013/09/warning-cryptolocker-new-ransomware-variant/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2013/09/warning-cryptolocker-new-ransomware-variant/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 18:11:57 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=701</guid>
		<description><![CDATA[We&#8217;ve been hearing about a nasty virus making the rounds that will encrypt a user&#8217;s files and attempt to solicit a ransom payment in order to regain access to the data.  Currently it&#8217;s been able to bypass most security and &#8230; <a href="http://www.protechcomputersolutions.com/blog/2013/09/warning-cryptolocker-new-ransomware-variant/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>We&#8217;ve been hearing about a nasty virus making the rounds that will encrypt a user&#8217;s files and attempt to solicit a ransom payment in order to regain access to the data.  Currently it&#8217;s been able to bypass most security and antivirus software and has primarily been spread as an email attachment.  As always, exercise caution when opening ANY email attachments.</p>
<p>There is no fix for the infection if it succeeds in encrypting your files.  The only way to recover the data is from a backup.  Make sure your backups are in place and working.</p>
<p>More info here: <a href="http://blog.emsisoft.com/2013/09/10/cryptolocker-a-new-ransomware-variant/"> http://blog.emsisoft.com/2013/09/10/cryptolocker-a-new-ransomware-variant/</a></p>
<p>&nbsp;</p>
<div id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;">CryptoLocker – a new ransomware variant</div>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2013/09/warning-cryptolocker-new-ransomware-variant/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Reminder: Support for Windows XP Ends April 2014</title>
		<link>http://www.protechcomputersolutions.com/blog/2013/07/695/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2013/07/695/#comments</comments>
		<pubDate>Wed, 17 Jul 2013 15:14:27 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=695</guid>
		<description><![CDATA[All good things must come to an end and unfortunately, that time is fast approaching for Windows XP. Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it&#8217;s no longer supported or &#8230; <a href="http://www.protechcomputersolutions.com/blog/2013/07/695/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>All good things must come to an end and unfortunately, that time is fast approaching for Windows XP. Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it&#8217;s no longer supported or sold. For Windows XP, that day is April 8, 2014.</p>
<p>End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. Without Microsoft support, you will no longer receive security updates that can help protect your PC from harmful viruses, spyware, and other malicious software that can steal your personal information.</p>
<p>Contact us for assistance in upgrading your systems today &#8211; 763-442-1275.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2013/07/695/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Safeguard Your Company&#039;s Online Bank Accounts</title>
		<link>http://www.protechcomputersolutions.com/blog/2012/11/662/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2012/11/662/#comments</comments>
		<pubDate>Tue, 06 Nov 2012 19:04:39 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=662</guid>
		<description><![CDATA[You&#8217;ve heard us speak to the issue of security for small businesses quite a bit lately and the risks continue to grow. Don&#8217;t think for a minute that just because you&#8217;re a smaller business that cyber criminals will overlook your &#8230; <a href="http://www.protechcomputersolutions.com/blog/2012/11/662/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>You&#8217;ve heard us speak to the issue of security for small businesses quite a bit lately and the risks continue to grow. Don&#8217;t think for a minute that just because you&#8217;re a smaller business that cyber criminals will overlook your business.</p>
<p>Here&#8217;s a great article on protecting your online bank account from fraud:</p>
<p><a href="You've heard us speak to the issue of security for small businesses quite a bit lately and the risks continue to grow.  Don't think for a minute that just because you're a smaller business that cyber criminals will overlook your business.  Here's a great article on protecting your online bank account from fraud:  http://bedtimesmagazine.com/2012/11/protecting-your-companys-online-bank-account-from-fraud/" target="_blank">http://bedtimesmagazine.com/2012/11/protecting-your-companys-online-bank-account-from-fraud/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2012/11/662/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Case for Business Class Email</title>
		<link>http://www.protechcomputersolutions.com/blog/2012/10/the-case-for-business-class-email/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2012/10/the-case-for-business-class-email/#comments</comments>
		<pubDate>Wed, 03 Oct 2012 16:00:09 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[business email]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[hosted exchange]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=650</guid>
		<description><![CDATA[The Case for Business Class Email For most small businesses, email is a critical part of their business.  In fact, in a recent Gartner and Symantec study, it was determined that up to 75% of a company’s intellectual property resides &#8230; <a href="http://www.protechcomputersolutions.com/blog/2012/10/the-case-for-business-class-email/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<h1>The Case for Business Class Email</h1>
<p>For most small businesses, email is a critical part of their business.  In fact, in a recent Gartner and Symantec study, it was determined that up to 75% of a company’s intellectual property resides in its email and other messaging applications.</p>
<p>As a mission-critical part of your business, email simply has to work, be fast, and always accessible from the office, on the road, or from home. Today, this means being able to access your email, contacts, and calendar directly from your computer, smartphone, tablet, or other mobile device, so you’re never out of touch with your business. It also means this critical data needs to be safeguarded against loss. Attending <a href="https://iotbusinessnews.com/2025/02/11/40900-must-attend-marketing-conferences-in-the-uk/">SEO conferences</a> can also help improve your overall business strategy, ensuring that your communication systems are efficient, secure, and integrated with your broader operations. To attract nearby customers and boost visibility in your area, <a href="https://rankingslab.com/white-label-local-seo/">Read more about ranking locally</a> and learn how local SEO strategies can give your business a competitive edge. A strong <a href="https://webdesignandmarketing.uk/">web design and marketing</a> strategy ensures that your communication systems are efficient, secure, and integrated with your overall business operations.</p>
<p>Unfortunately, many small businesses still rely on outdated email solutions to manage and access their email.  The most common are POP3 and IMAP.  Developed in the 1980’s, these email solutions are often included (read “free”) as part of a web hosting package or by your Internet Service Provider. Ensuring efficient management of critical functions like <a href="https://24ssports.com/the-sports-industrys-payroll-challenge-how-teams-and-organizations-handle-player-pay-stubs/">payroll</a> remains a challenge for businesses utilizing these outdated systems. When upgrading your business&#8217;s email infrastructure, consider modern solutions that offer enhanced security, scalability, and integration across various platforms, including different <a href="https://shop-front-fitters.co.uk/types/">types of shopfronts</a> to meet diverse operational needs. For more information on expert services, check out this site at <a href="https://shopfrontfitting.co.uk/">https://shopfrontfitting.co.uk/</a>.</p>
<p>&nbsp;</p>
<h2>POP &amp; IMAP – What’s the Difference?</h2>
<p>The main difference between POP &amp; IMAP is the way in which they control your email inbox. When you use IMAP, you are actually accessing your inbox on the mail server.   IMAP does not actually move messages onto your computer. You can think of an e-mail program using IMAP as a window to your messages on the server. Although the messages appear on your computer while you work with them, they remain on the central mail server.   The benefit of IMAP is that it makes it easier to view email from home, work, or your mobile device because all of your email is stored on the server.</p>
<p>POP does the opposite. Instead of just showing you what is in your inbox on your mail server, it checks the server for new messages, downloads all the new messages in your inbox onto your computer, and then deletes them from the server.  POP can create problems with duplicate &amp; missing emails when accessing your account from multiple devices.  Furthermore, because it downloads all of your email to your computer, you’re responsible for ensuring your email gets backed up.</p>
<p>Probably the biggest issue with POP and IMAP is that these technologies only support email and offer no provisions for calendar or contact information.</p>
<p>&nbsp;</p>
<h2>The Benefits of Hosted Exchange</h2>
<p>The major benefits of Hosted Exchange is not in what it can do better than free email solutions, but rather what it can do that free email can’t.  Starting with mobility and the built-in Exchange ActiveSync, any iPhone, Android, Blackberry, or Windows Phone can sync your email, calendar, and contacts.  This mobile connectivity means you and your employees can be productive wherever they are.</p>
<p>With Microsoft Outlook on your Windows or Mac computers, you’re able to take full advantage of the full collaboration functions of Microsoft Outlook, such as group calendars, contacts, task schedulers, and file-sharing.  Combine that with the Outlook Web App (OWA), which allows full Outlook functionality when the desktop version is not available, and the power of Hosted Exchange becomes clear.  With secure anytime, anywhere access to your email accounts along with consistency across all of your devices, means less time worrying about email and more time spent doing business.</p>
<p>As you can see, Microsoft Exchange offers a quantum leap over basic email solutions.  If you’re still using a POP or IMAP based email solution for your business, you’re missing out.</p>
<p>You can read more about our Hosted Exchange offerings <a href="http://www.protechcomputersolutions.com/services-solutions/hosted-exchange/">here</a>, or if you’re ready to get started, <a href="http://www.protechcomputersolutions.com/contact/">contact us</a> today to discuss Hosted Exchange as a solution for your business email needs.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2012/10/the-case-for-business-class-email/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Optimizing Battery Power on Your Laptop</title>
		<link>http://www.protechcomputersolutions.com/blog/2012/07/optimizing-battery-power-on-your-laptop/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2012/07/optimizing-battery-power-on-your-laptop/#comments</comments>
		<pubDate>Sun, 15 Jul 2012 14:00:49 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[laptop]]></category>
		<category><![CDATA[power tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=616</guid>
		<description><![CDATA[Business Computing Tip-of-the-Month: &#8220;Optimizing Battery Power on Your Laptop&#8221; The most basic step you can take to prevent power loss on your mobile PC is to invest in a high quality battery and always keep a spare on hand. Splurging &#8230; <a href="http://www.protechcomputersolutions.com/blog/2012/07/optimizing-battery-power-on-your-laptop/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<h1>Business Computing Tip-of-the-Month:</h1>
<p><em>&#8220;Optimizing Battery Power on Your Laptop&#8221;</em></p>
<p><img src="http://www.marketmeit.com/newsletter/images/battery-power.jpg" alt="Laptop Battery Power" width="211" height="211" align="left" hspace="10" vspace="10" />The most basic step you can take to prevent power loss on your mobile PC is to invest in a high quality battery and always keep a spare on hand. Splurging on a quality battery and spare can save you from hours of lost access to your mobile PC.</p>
<p><strong>Battery Care </strong></p>
<p>Once you&#8217;ve invested in a good battery, you need to take care of it. To clean your battery contacts, first turn off and unplug your mobile PC. Remove the battery and wipe its metal contacts and its contacts inside the device with a cotton swab dipped in rubbing alcohol. Let dry completely before reinstalling and reconnecting to a power source. Repeat every two to three months.</p>
<p>Modern lithium ion batteries can be recharged and partially discharged time and time again, but you should never fully discharge them. Nickel-metal hydride (NiMH) batteries common to older laptops should be completely drained and recharged every one to three months.</p>
<p>After mastering the basics of battery care, make sure you are utilizing your mobile PC&#8217;s built in energy saving features.</p>
<p><strong>Optimize Your Power Settings</strong></p>
<p>The hard disk and display on your mobile PC consume the most battery power. Choose a power plan, refered to as a power scheme in Windows XP, to reduce the use of power-hungry functions and lessen screen brightness.</p>
<p>Utilize the following battery-saving states:</p>
<ul>
<li><em>Sleep or Standby<br />
</em><br />
In a sleep state, your hard disk and display turn off, and all open programs and files are saved in Random Access Memory. In case of a crash or power loss, save your work before placing your system in sleep mode. Your mobile PC should wake up quickly from sleep, and your desktop and files should appear just as you left them.</li>
<li><em>Hibernation</em>When your computer hibernates, it saves everything to its hard disk before shutting down. When you restart, your desktop should be restored exactly as you left it. Hibernation takes a bit longer to wake up from than sleep, but it uses less power.</li>
</ul>
<p><strong>Further Tips for Lowering Your Energy Use:</strong></p>
<ul>
<li>Turn off your wireless device when you&#8217;re not connected to a wireless network but you&#8217;re using your mobile PC.</li>
<li>Turn off scheduled tasks.</li>
<li>Keep the use of tools in the notification bar minimal.</li>
<li>Limit power-intensive activities such as gaming, watching a DVD or listening to a CD.</li>
<li>Reduce power consumption by adding memory (RAM) to your mobile PC.</li>
</ul>
<p><!-- Generated using https://microdatagenerator.org/localbusiness-microdata-generator/ --></p>
<div itemscope itemtype="https://schema.org/LocalBusiness">
<div itemprop="name">Cell N Comp Repairs</div>
<div>Phone: <span itemprop="telephone">312-929-9807</span></div>
<div>Url: <span itemprop="url">https://www.cellncomprepairs.com/</span></div>
<div itemtype="http://schema.org/PostalAddress" itemscope="" itemprop="address">
<div itemprop="streetAddress">3416 W Diversey Ave</div>
<div><span itemprop="addressLocality">Chicago</span>, <span itemprop="addressRegion">IL</span> <span itemprop="postalCode">60647</span></div>
</p></div>
</div>
<p><iframe src="https://www.google.com/maps/embed?pb=!1m14!1m8!1m3!1d23745.39322657012!2d-87.712995!3d41.932109!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x880fcd29f07c1279%3A0x21688d1cc13920ed!2sCell%20N%20Comp%20Repairs!5e0!3m2!1sen!2sus!4v1744043957037!5m2!1sen!2sus" width="600" height="450" style="border:0;" allowfullscreen="" loading="lazy" referrerpolicy="no-referrer-when-downgrade"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2012/07/optimizing-battery-power-on-your-laptop/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What are Managed Services, and How Can They Save My Company Money?</title>
		<link>http://www.protechcomputersolutions.com/blog/2012/06/what-are-managed-services-and-how-can-they-save-my-company-money/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2012/06/what-are-managed-services-and-how-can-they-save-my-company-money/#comments</comments>
		<pubDate>Fri, 15 Jun 2012 14:00:28 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=606</guid>
		<description><![CDATA[Business Computing Tip-of-the-Month: &#8220;What are Managed Services, and How Can They Save My Company Money?&#8221; When a company subscribes to a managed servcie, the provider manages the network equipment and applications on the client&#8217;s premises according to the terms established &#8230; <a href="http://www.protechcomputersolutions.com/blog/2012/06/what-are-managed-services-and-how-can-they-save-my-company-money/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<h1>Business Computing Tip-of-the-Month:</h1>
<p><em>&#8220;What are Managed Services, and How Can They Save My Company Money?&#8221;</em></p>
<p><img src="http://www.marketmeit.com/newsletter/images/f3.jpg" alt="" width="297" height="176" align="right" hspace="10" vspace="10" />When a company subscribes to a managed servcie, the provider manages the network equipment and applications on the client&#8217;s premises according to the terms established to meet the client&#8217;s unique business needs.</p>
<p>For small and medium-sized businesses, managed services provide enterprise class capabilities for an affordable monthly fee-with no large initial capital investment required.</p>
<p>Subscribing to managed services will:</p>
<ol>
<li>Bring high levels of network support and availability.</li>
<li>Enable internal IT staff to focus on strategic activities instead of network support.</li>
<li>Allow you to pay only for those networking services that you need.</li>
</ol>
<p>Managed services bridge the gap by giving companies access to leading network technologies and management expertise without the need to invest in technology upgrades.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2012/06/what-are-managed-services-and-how-can-they-save-my-company-money/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Useful &amp; Quick Keyboard Shortcuts to Save You Time</title>
		<link>http://www.protechcomputersolutions.com/blog/2012/05/611/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2012/05/611/#comments</comments>
		<pubDate>Tue, 15 May 2012 14:00:14 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=611</guid>
		<description><![CDATA[Business Computing Tip-of-the-Month: &#8220;Useful &#38; Quick Keyboard Shortcuts to Save You Time&#8221; Just using your mouse to make computer commands takes more time than you think – keyboard shortcuts save both time and energy by reducing multiple clicks to a &#8230; <a href="http://www.protechcomputersolutions.com/blog/2012/05/611/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<h1>Business Computing Tip-of-the-Month:</h1>
<p><em>&#8220;Useful &amp; Quick Keyboard Shortcuts to Save You Time&#8221;</em></p>
<p><img src="http://www.windowsrenew.com/newsletter/images/shortcut.jpg" alt="Laptop Battery Power" width="213" height="252" align="left" hspace="10" vspace="20" /> Just using your mouse to make computer commands takes more time than you think – keyboard shortcuts save both time and energy by reducing multiple clicks to a single combination of keys.</p>
<p>Keyboard shortcuts are used for tasks that you do all the time, such as opening or saving files.  The table below offers only a fraction of the common standard-keyboard shortcuts, many of which work across Office applications—such as the following:</p>
<p>&nbsp;</p>
<ul>
<li>Outlook</li>
<li>Access</li>
<li>Visio</li>
<li>PowerPoint</li>
<li>Word</li>
<li>Excel</li>
</ul>
<p>A full list of built-in keyboard shortcuts can be found in the Help section of any particular computer-based application.</p>
<table border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td valign="top" width="125"><strong>Press this</strong></td>
<td valign="top" width="413"><strong>To do this</strong></td>
</tr>
<tr>
<td valign="top">F1</td>
<td valign="top">Open Help</td>
</tr>
<tr>
<td valign="top">F7</td>
<td valign="top">Check the spelling of titles or words in any Office application with the Spelling &amp; Grammar checker</td>
</tr>
<tr>
<td valign="top">Windows logo key</td>
<td valign="top">Open the Start menu</td>
</tr>
<tr>
<td valign="top">Alt+F4</td>
<td valign="top">Quit a program</td>
</tr>
<tr>
<td valign="top">Alt+Tab</td>
<td valign="top">Switch between open programs or windows</td>
</tr>
<tr>
<td valign="top">Ctrl+N</td>
<td valign="top">Open a new (blank) document</td>
</tr>
<tr>
<td valign="top">Ctrl+A</td>
<td valign="top">Select all content in a document, window, or text box</td>
</tr>
<tr>
<td valign="top">Ctrl+S</td>
<td valign="top">Save the current file or document (works in most programs)</td>
</tr>
<tr>
<td valign="top">Ctrl+C</td>
<td valign="top">Copy the selection</td>
</tr>
<tr>
<td valign="top">Ctrl+X</td>
<td valign="top">Cut the selection</td>
</tr>
<tr>
<td valign="top">Ctrl+V</td>
<td valign="top">Paste the selection</td>
</tr>
<tr>
<td valign="top">Ctrl+P</td>
<td valign="top">Print a document or webpage</td>
</tr>
<tr>
<td valign="top">Ctrl+Z</td>
<td valign="top">Undo an action</td>
</tr>
<tr>
<td valign="top">Ctrl+Y</td>
<td valign="top">Redo an action</td>
</tr>
<tr>
<td valign="top">Ctrl+F</td>
<td valign="top">Find text in a document</td>
</tr>
<tr>
<td valign="top">Ctrl+H</td>
<td valign="top">Find and replace text in a document</td>
</tr>
<tr>
<td valign="top">Ctrl+B</td>
<td valign="top">Boldface text</td>
</tr>
<tr>
<td valign="top">Ctrl+I</td>
<td valign="top">Italicize text</td>
</tr>
<tr>
<td valign="top">Ctrl+U</td>
<td valign="top">Underline text</td>
</tr>
<tr>
<td valign="top">Ctrl+G</td>
<td valign="top">Go to a page, line, or bookmark in a document</td>
</tr>
<tr>
<td valign="top">Windows logo key +F1</td>
<td valign="top">Display Windows Help and Support</td>
</tr>
<tr>
<td valign="top">Esc</td>
<td valign="top">Cancel the current task</td>
</tr>
<tr>
<td valign="top">Application key</td>
<td valign="top">Open a menu of commands related to a selection in a program (equivalent to right-clicking the selection)</td>
</tr>
</tbody>
</table>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2012/05/611/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Make Your Office Computer Run Faster</title>
		<link>http://www.protechcomputersolutions.com/blog/2012/04/how-to-make-your-office-computer-run-faster/</link>
		<comments>http://www.protechcomputersolutions.com/blog/2012/04/how-to-make-your-office-computer-run-faster/#comments</comments>
		<pubDate>Fri, 27 Apr 2012 15:40:26 +0000</pubDate>
		<dc:creator><![CDATA[ProTech]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.protechcomputersolutions.com/?p=597</guid>
		<description><![CDATA[Business Computing Tip-of-the-Month: &#8220;How to Make Your Office Computer Run Faster&#8221; The tools available in Windows 7, Windows Vista, and Windows XP Service Pack 3 help to make your computer faster, maintain your computer efficiency, and help safeguard your privacy &#8230; <a href="http://www.protechcomputersolutions.com/blog/2012/04/how-to-make-your-office-computer-run-faster/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<h1>Business Computing Tip-of-the-Month:</h1>
<p><em>&#8220;How to Make Your Office Computer Run Faster&#8221;</em></p>
<p><img src="http://www.windowsrenew.com/newsletter/images/faster-computer.jpg" alt="Laptop Battery Power" width="224" height="148" align="left" hspace="10" vspace="20" />The tools available in Windows 7, Windows Vista, and Windows XP Service Pack 3 help to make your computer faster, maintain your computer efficiency, and help safeguard your privacy when you&#8217;re online.</p>
<p><strong>Removing Spyware to Protect Your Computer From Viruses</strong></p>
<p>Spyware collects personal information from individuals without the user&#8217;s consent – the information often times includes websites visited, as well as usernames and passwords. With this confidential information, Spyware can potentially put individuals at risk of not only confidentiality violations, but also disrupting the computer&#8217;s performance.</p>
<p>In order to fight against Spyware, it is recommended that a PC safety scan from Windows Live One Care, which is a free scan service that assists in checking for and removing viruses. Additionally, downloading Microsoft Security Essentials or Microsoft Windows Malicious Software Removal Tool can help protect your computer&#8217;s operation system from the following: viruses, spyware, adware, and other malware.</p>
<p><strong>How to Free Up Disk Space</strong></p>
<p>In order to free up space on your hard disk, it is suggested that you use the Disk Cleanup tool, which locates files that can be safely deleted and then allows you to decide which files you would like to delete.</p>
<p><strong>Disk Cleanup Can be Used to Perform the Following Tasks:</strong></p>
<ul>
<li>Remove temporary Internet files.</li>
<li>Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.</li>
<li>Empty the Recycle Bin.</li>
<li>Remove Windows temporary files, such as error reports.</li>
<li>Delete optional Windows components that you don&#8217;t use.</li>
<li>Delete installed programs that you no longer use.</li>
<li>Remove unused restore points and shadow copies from System Restore.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.protechcomputersolutions.com/blog/2012/04/how-to-make-your-office-computer-run-faster/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
