Instagram adds video

In a move to compete with Twitters Vine app, Facebook announced today that Instagram is adding a feature that allows you to take 15 second videos. Techcrunch breaks down the vine vs. Instagram in this handy graphic-



You can find the full article from Techcrunch here.

So how do videos work in the new Instagram app? Pressing the camera icon now gives you the choice to select photo or video, and videos are taken by pressing and holding down on the screen just like Vine.


All the photo filters are still available for use, plus 13 new filters which range from your typical black-and-white effect to blurring and brightening effects. Tapping each filter gives you a preview of your video with the filter applied.



Videos can be shared via social networks, and you can choose the cover frame that will be displayed as an icon when users look at the post.  There’s also a new feature called Cinema mode that stabilizes the video to make sure it isn’t shaky, but it’s currently available for Iphone users only.

Restore the Start Menu to Windows 8

Windows 8 users can finally get the start menu back by installing a great little program called Classic Start Menu, which is part of Classic Shell.  If you’re a Windows 7 user, you can use Classic Start Menu to return to the XP style of menu you may be more familiar with. Best of all, it’s FREE!

You have your choice of the “Classic” start button, the Windows XP version, or the Windows 7 start button.


The basic settings allow you to control things like whether you want the Computer, Control panel, Favorites or Recent places links to be displayed on the start menu. You have total control over which icons are shown on the start menu.

basic settings


As you can see below, the all settings button allows you to completely customize the look and feel of every setting in the start menu. Everything from the search box, to the sounds the menus use, to the number of columns in the menu and their width, can be customized.


You can also add skins to the menu to customize the look and feel. From the Classic Start page:



Classic shell also includes Classic Explorer. This part of the program fixes Windows Explorer annoyances by adding a toolbar with common operations (copy/paste, go to parent folder, etc.), showing the free disk space and the total size of the selected files in the status bar, disabling bread crumbs on the address bar, and more. Much like Classic Start Menu, it is very customizable, so you don’t have to use all of its features.

You can get Classic Start Menu and the rest of the Classic Shell software for the low low price of FREE here: Classic Shell.

Department of Justice Virus

This is yet another ransomware virus, very similar to the FBI virus. This kind of virus claims your internet activities have violated the law, so your computer has been locked down until you pay a fine. Don’t fall for this scam!  If you pay this $100 or $300 fine, you won’t have your computer unlocked and you will lose your money as well!


The Department of Justice virus is distributed in several different ways.  Legitimate websites (Facebook, Paypal, Ebay, etc.) that have been compromised may drop this trojan onto your computer. This “drive-by-download” often happens in the background without you noticing.

Another method used to spread this type of malware is spam email containing infected file attachments or links to malicious websites. Sometimes the emails come from friends, coworkers of family members who have also been infected. The virus may also be downloaded manually by tricking you into thinking you are installing a useful piece of software. For example, you may be prompted to update your Adobe Flash player before you can view a file, but you are actually downloading the virus.

The Department of Justice virus is also prevalent on peer-to-peer file sharing websites (Shareza, Bearshare, Limewire, BitTorrent)  and is often packaged with pirated or illegally acquired software. photos of objects

If you have been infected with this virus, please contact me today for virus removal service.

Carbonite Online Backup



What is Online Backup?

Online backup solutions provide protection for your computer files so you can get those files back in the event of a data disaster – saving you time, money and stress. Unlike other antiquated methods of data backup – such as external drives & CDs – there’s no hardware to buy, no cables to connect, no training or maintenance required.

Why Carbonite?

Carbonite gives you secure, automatic offsite backup that protects your files from accidental deletion, spills, theft and just about anything else that could harm your data. Once installed, Carbonite backs up your files to the cloud – so you can get them back when you need them most. Because Carbonite works continually, backing up new and changed files whenever you’re connected to the Internet, you can rest easy knowing your backed up files are always protected.

Since 2006, Carbonite has backed up over 200 billion files and today, backs up more than 300 million files each day!  Most importantly, Carbonite has restored over 7 billion files that otherwise would have been lost forever.

Safe, secure and completely automatic. Carbonite is The Better Backup Plan ™

Product Highlights:

  • Set it & forget it. Carbonite backs up your files automatically to the cloud – so you never have to remember to back up. No hardware required.
  • Continual backup. Whenever you’re connected to the Internet, Carbonite backs up your files – eliminating potentially costly backup gaps created by daily or weekly backups.
  • Secure transmission. Carbonite uses the same encryption technology used in online banking and e-commerce transactions.
  • Safe offsite storage. Your backed up files are stored in one of Carbonite’s highly secure state-of-the-art data centers which are guarded 24 hours a day, 7 days a week.
  • Easy file recovery. If anything happens to any file, Carbonite finds it in your backup and puts it back in its original location on your computer – in just a few, simple steps.
  • Anytime, Anywhere access. You can access your backed up files from any computer connected to the Internet — or even from your iPhone®, Android or BlackBerry® smartphone.


The Plans

With 5 plans to choose from, you can find the Carbonite subscription that’s right for you. From individuals, families and students to home office users and small business professionals, Carbonite has a plan to fit every backup need.



With the Home plan, you’ll enjoy all the essentials of unlimited online backup. Subscribe today and your irreplaceable files on your computer – like photos, documents and music – will be backed up automatically, and accessible at anytime, from any computer or smartphone.

Using the HomePlus plan you’ll receive all the benefits of the Home plan, PLUS additional features that make your backup more complete. With HomePlus, you can include your external hard drive in your online backup, so you can rest easy knowing that all of your important files are backed up safely, offsite. In addition, you also get Mirror Image backup, which creates a local backup of your entire hard drive – including your operating system and software programs.


HomePremier is the most comprehensive backup solution of the Carbonite Home plans. In addition to all the features of Home and HomePlus, you’ll also get automatic backup of your video files (instead of having to add them to your backup manually). In addition, you’ll have the option to use Courier Recovery – a Carbonite service reserved exclusively for HomePremier customers. Courier recovery allows you to have a copy of your entire backup shipped directly to you – which may be the fastest way to get your files back, when you need them most.



The Business plan is geared toward those looking to backup an unlimited number of computers, external hard drives and NAS devices. Using this plan, you receive 250 GB* of backup space.


Using BusinessPremier, you’ll experience all of the same benefits you receive from the Business plans. Now, in addition to backing up all of the computers, external hard drives and NAS devices in your business, you can also backup your Windows Server.  Using this plan, you receive 500GB* of backup space.

With the BusinessPermier plan, you’ll have the option to also purchase the Database Backup add-on. The add-on, which shares storage space with the BusinessPremier plan, allows users the ability to backup the following databases and live applications:

  • Microsoft SQL Server 2000, 2005, 2007, and 2010
  • Microsoft Exchange Server 2003, 2007 and 2010
  • Windows System State (including the registry, certificate server, and active directory information)
  • MySQL Server 5.x
  • Oracle Server 11i, 11g, or later
  • Hyper-V Server 2008, 2012
  • Windows NTFS files and folders

* Additional storage packs are available for both Carbonite Business plans

Please Contact Me for more information or to purchase a plan today!

NSA PRISM Privacy Tips

By now I’m sure you have heard the recent reports of the NSA collecting Verizon phone records (an operation codenamed BLARNEY) .Today’s news that a separate operation (called PRISM) gives the NSA access to e-mails, phone calls, and search information from Google, Apple, Microsoft, and others, has people wondering what they can do to maintain some privacy online.

Both Google and Facebook  issued denials, saying they haven’t given the government “direct” access or a “back door” to their servers as the Post and Guardian stories claim.

Either way, it appears the government has accessed your data. According to The Guardian and The Washington Post, the data collected included: “email, video and voice chat, videos, photos, voice-over-IP chats, file transfers, social networking details, and more.”

So what can you do to prevent your surfing habits and data from being viewed?

One thing you can do is use the Tor Browser.  The Tor Browser Bundle is a portable, self-extracting package that contains a special version of Mozilla’s Firefox web browser, along with an application for connecting to the Tor network.

Using Tor makes it more difficult to trace your Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the user. It’s intended to protect users’ personal privacy, freedom, and ability to conduct confidential business by keeping their internet activities from being monitored.

When you connect to the Tor network, all of your Internet traffic is encrypted and routed through a complex series of anonymous network nodes until it reaches its final destination. Tor is not 100% secure, but then again, no security solution is. Tor has been around since 2002, and has been field-tested in rough situations in Egypt, China, Iran and other oppressive regimes that restrict Internet access.

How to copy your contacts from Yahoo to Gmail

This will show you how to export the contacts out of your yahoo mail and move them to a new gmail account:

You’re going to follow these steps to export your contacts to a .CSV file.

How to export contacts from Yahoo! Mail:

Go to Yahoo! Mail and select the Contacts tab.


Select Actions Export All.


Choose from the programs listed on the page.Select Export Now.


How to export contacts from Yahoo! Mail Classic:

  1. Go to Yahoo! Mail and select the Contacts tab.
  2. Select Tools Export.
  3. Choose Yahoo CSV.
  4. Select Export Now.

Now you need to create your gmail account at

Once that’s done, Follow these steps to import that CSV file you created.

Sign in to your new Gmail account. Click Gmail at the top-left corner of your Gmail page, then choose Contacts.


From the More actions dropdown menu, select Import….


Click the Choose File button.


Select the CSV file you created from yahoo and click the Import button.




You’re done! Gmail will show you the contacts it has imported for you.

Koobface Virus Invading Social Networking Sites Now



McAfee labs are reporting that Koobface infections are spiking again.

Cybercriminals have come to appreciate that sensitive personal and organizational information are the currency of their ‘hacker economy,’” said Vincent Weafer, senior vice president, McAfee Labs. “The resurrection of Koobface reminds us that social networks continue to present a substantial opportunity for intercepting personal information. Within the enterprise, we see password-stealing Trojans evolving to become information-gathering tools for cyber-espionage attacks. Whether they target login credentials or intellectual property and trade secrets, highly-targeted attacks are achieving new levels of sophistication.”

Fake news stories used to spread malware

Most of us are suckers for the latest news, especially when it’s big news. Celebrity deaths, major weather events, political scandals… the list goes on and on. Malware and virus makers are using our interest in these stories to infect computers.  The attackers send out emails or instant messages with links to a video of one of these events, and users are infected when they go to the “news” site.


More on this method of malware attack can be found in this article at PC World.

As always, be careful what you click on and be sure to have updated antivirus software running at all times. If you do get infected with a virus, please feel free to contact me and I will remove it and get your computer back up and running as fast as possible.

How to Eliminate SMS Fees and Text for Free

From: HowToGeek:

SMS fees are pure profit for the cellular carriers. They’re basically free for carriers to send, but they can often cost ten cents or more per message. It costs more to send a text message on Earth than it does to transmit data from Mars.

Given these extortionate fees, it’s no surprise that a variety of apps are springing up that allow people to send text messages for free and avoid the carriers.

TextingThis article highlights some of the best free alternatives to texting through your wireless carrier, and they are all free so check them out!

How to text for free