April 30th, 2013

Did you know this about the new Office?

There are two different types of Office software products available from Microsoft:

Office 365 – A one year subscription single product that allows you to install on up to 5 PC, Mac or Windows based tablets per license key.

Office for Mac or PC 2013 – A timeless version that can be installed on only one PC, Mac or tablet per version.   Sold separately as PC and Mac versions.


April 20th, 2013

How to setup parental controls on your computer and tablet

For years computers have been in classrooms and now tablets are becoming more popular. You have a computer and probably a tablet. You can let your children use a computer and tablet without giving them free access to the entire internet.

There’s parental controls available for all of todays connected devices. You can customize their access and even monitor them to suit your child’s unique level. You can use these same links if your phone is an Android or iPhone.

Here’s some useful links to help you understand and set up parental control:

Windows 7  – http://windows.microsoft.com/en-ca/windows7/set-up-parental-controls

Windows 8 – http://windows.microsoft.com/en-CA/windows-8/set-up-kids-accounts#1TC=t1

Mac with OSX Mountain Lion (10.8.X) – http://support.apple.com/kb/PH11354
Android – Add this app to your device: Norton Parental Control
iPad, iPod Touch, iPhone – http://support.apple.com/kb/ht4213
Feel free to ask a question by reaching out to us on Facebook, Twitter or in-store.
in @LD_Saskatoon for @LDComputers

March 6th, 2013

3 Things Skydrive Can Do

It’s been a buzz term so long I bet you’ve tuned it out already. I want to share with you three things I do with (insert booming voice here) THE CLOUD.

I’ve used web based cloud storage services since they first started. I love how easy it is to share files with others and get access to my stuff on whatever device I want. First I should explain what cloud storage is. READ MORE

March 4th, 2013

The new Office is here – Touch optimized

The new Office from Microsoft is here and it really encompasses what Office users, computer users and tablet users really want. Programs that are smart. That keep them connected to the files and documents they need at any time they want, no matter what device they use. The ability to continue to be productive when using touch. I am actually writing this entire blog using the touch screen keyboard on my Surface device and it’s excellent. READ MORE

January 22nd, 2013

Windows 8 Is Growing On Me Big Time

Christmas is time for family gatherings, presents; turkey dinners. It is also time for Nerds like me to have some time to play with new stuff. Now, I admit, I did not upgrade my system at exactly midnight October 26th to Windows 8, as Microsoft had hoped. Working in a retail environment during the holiday season really doesn’t allow much time and freedom to play and experiment. Well, I waited and through Christmas and New Year, I finally dove in and played to my nerdy delight.

Like many people I know, seeing the welcome screen on Windows 8 for the first time was downright scary. What did Redmond do with the “Start” button. The loss was profoundly and nerdily missed, but not for long. Once I got over the initial shock, I began to see the entire screen as my new “Start” button. Instead of clicking once to see the common apps, they are right there in front of me. Instead of clicking “All Programs” to find other apps and maybe another click or two to get to the actual applicaiotn, they are also there: all I had to do was swipe. How cool it is.

No more shock and dismay. A nerdy nod in the general direction of the designers in Redmond.

Mouse? What mouse. Now, I have an advantage over my colleagues. As an avid photographer, I was already using the Wacom Intuous 5 tablet. Since it worked fine with Windows 8, I had less of a shock than my friends who are still “mousing”. The fact is, while Windows 8 is perfectly fine with a mouse, it is the touch screen optimization that makes it the state-of-the-art Operating System. I have been using a Samsung Tablet PC, so the touch-screen and the Wacom Tablet are both used. When I am at home, Wacom is there on the desk. When I travel, the native touch screen is oh-so-nice. Swiping from one app to the next is brilliant and efficient.

The touch screen keyboard took a while to get used to, but because the Samsung tablet is wider, the spacing of the keys made it a lot more usable than your typical tablet. In fact, that part of it is different enough that I started calling my machine the Tablet PC, as opposed to just “the Tablet”. Somehow calling it a tablet was beginning to sound a tad inadequate.

Then, there are the apps. Not as robust a list as some other app stores, but it covers the major ones. I do have to remind myself to read the reviews before I download, though. I found one app I thought would be nice to try. It really sucked. I went back to the app store after hours of frustration only to find that the first string of reviews all said the same thing: IT SUCKED. Duh!!   

Since I had a Windows 8 Pro edition loaded, all my applications for work, home and play all loaded with zero problems. Security was the same as my old Windows 7 system. In fact, much of the “under the hood” stuff is pretty much all the same, only faster. With the instant on feature on the tablet, I haven’t had to re-boot for the past month. I have not had a single incompatibility issue switching my software from Windows 7 to Windows 8. Updates for the apps and the system were all done behind the cover, without any fussing about by me.

Of course, I cannot leave this blog without a comment on the live-tiles, or whatever name the Microsofties are calling them today. Those are the squares or rectangles that represent various apps on the Start Screen. Only they are more than just representations of the apps. They are, in many cases, actually live and running apps. I get news, weather, exchange rates, tweets and such like rolling through as I sit and look at the Start Screen.  This is before I even start the app. Pretty and cool, so I guess it is pretty cool.

Tripping? No, not that. I have been on three trips with my Windows 8 Tablet PC. Just loving it. It weighs a fraction of my old notebook. In one single package I managed to combine my tablet, notebook and ebook. Heck, since I used video conferencing, it even replaced my phone for a couple of meetings.

Well, that’s my first month with Windows 8.

Cedric Tetzel
@cedrictetzel for @LDComputers

January 14th, 2013

Java – How do I use it and stay safe?

Recently there was a story in the news that originated with the United States Department of Homeland Security advising everyone to turn Java off on their computer due to “a serious security vulnerability”. But there has been a patch released so you can protect yourself and keep using Java.

Here’s a Tech Talk explaining:

You may have some questions. Let me help.

What is Java?
Java is a widely used programming language in almost every current computer. Windows, Macs and others all use Java.
Curious if you have Java? Check your computer at this link: http://www.javatester.org/version.html

Who is affected?
The security issue is in the latest version 7 of the Java Runtime Environment in Windows, Mac and Linux systems. You most likely have your computer set to automatically check for updates and if you’re like most people you probably install them on a monthly basis. By default, Java checks itself every 30 days for updates. Therefore, you are likely only one update behind for a matter of days or weeks.

What is the risk?
If you haven’t updated to the latest version of Java which was released on January 13, 2013 then you are vulnerable. Your computer could be remotely controlled by an attacker through an infected website. They usually install a key logger and attempt to steal your identity silently through the hole in Java by monitoring you when you enter passwords.

What do I do?
Check which version of Java you have by going here: http://www.java.com/en/download/installed.jsp
If you aren’t running the latest version it will tell you. Follow the instructions there. Once you finish go back and check again that you have 7.11 or higher.

Once you finish making sure you have the latest version of Java running you should make sure you uninstall any old versions of Java. This is important for Windows users because it plugs any remaning holes.
Instructions on how to get rid of old versions of Java are here: http://www.java.com/en/download/faq/remove_olderversions.xml

Also run your operating systems built in update feature to make sure you have all the current patches and fixes installed.

Can I get someone to help me do this?
If you get stuck or don’t want to do it yourself see your nearest London Drugs and get us to do it for you – we have tech services in every store.

Julian Sanders @saskajules
in @LD_Saskatoon for @LDComputers

December 7th, 2012

12 Scams of Christmas

Don’t get hit by “Cyber Scrooges” this Christmas.  Digital threats don’t care that we all should be enjoying the holiday season.  McAfee, makers of security software for your digital devices, wants to help by identifying the 12 Scams of Christmas

1) Social Media Scams — Many consumers use social media sites to connect with family,friends and coworkers over the holidays, and cybercriminals use these channels to catchusers off guard. Here are some ways that criminals will use these avenues to obtain shopper’s gift money, identity or other personal information:

• Scammers use channels like Facebook and Twitter in the same way they use email and websites to scam consumers during the holidays. Be careful when clicking on or liking posts while taking advantage of contests, ads and special deals that you get from your “friends” that advertise the hottest holiday gifts, exclusive discounts at local stores and holiday-related job postings. Be on the lookout for your friends’ accounts being hacked and sending out fake alerts to all their connections.

• Twitter ads and special discounts for popular gifts are especially huge around Boxing Day, and they utilize blind, shortened links that may be malicious.

Criminals are getting savvier with authentic-looking social ads and deals that take consumers to legitimate-looking websites. In order to take advantage of the deals or contests, they ask users for personal information including their credit card number, email address, phone number and home address.

2) Malicious Mobile Apps — Earlier this year, both Apple® and GoogleTM announced that they had each garnered more than 25 billion downloads from their app stores. But as the popularity of mobile applications has grown, so has the chance that users could download a malicious application designed to steal their information or even send out premium-rate text messages from their phones without their knowledge.

3) Travel Scams — Before shoppers make holiday travel plans to visit family and friends, they need to keep in mind that scammers want to hook them with too-good-to-be-true deals. Phony travel webpages with beautiful pictures and rock-bottom prices are used to entice users to hand over their financial details.

4) Holiday Spam/Phishing — Many of the spam emails that shoppers are used to seeing will take on holiday themes. Cheap designer watches and pharmaceuticals may be advertised as the “perfect gift” for that special someone.

5) iPhone 5, iPad and Other Hot Holiday Gift Scams — The excitement and buzz surrounding Apple’s new iPhone® 5 and iPad® Mini create the perfect environment for cybercrooks to plot and carry out their scams. They mention must-have holiday gifts in dangerous links, phony contests and phishing emails to grab readers’ attention and entice them to reveal personal information or click on a dangerous link that could download malware onto their machines.

6) Skype Message Scare — People around the world will use Skype to connect with loved ones this holiday season, but they need to be aware of a new Skype message scam that attempts to infect their machines and even hold their files for ransom.

7) Bogus Gift Cards — Another tactic used by cybercriminals is to offer bogus gift cards online. Shoppers need to be wary of purchasing from third parties to avoid the risk being scammed.

8) Holiday SMiShing “SMiShing” is phishing via text message. Just like with email phishing, scammers pretend to represent legitimate organizations in order to lure shoppers into revealing information or performing an action they normally wouldn’t do.

9) Phony E-tailers — Phony e-commerce sites that appear real try to lure users into typing in their credit card number and other personal details, often by promoting great deals. But after giving this information, shoppers never receive the merchandise and their personal information is put at risk.

10) Fake Charities — This is one of the biggest scams of every holiday season. As holiday revelers open up their hearts and wallets, the criminals hope to take advantage of their generosity by sending spam emails advertising fake charities.

11) Dangerous e-Cards — E-cards are a popular way to send a quick “thank you” or holiday greeting, but some are malicious and may contain spyware or viruses that download onto users’ computers once they click on the link to view the greeting.

12)Phony Classifieds — Online classified sites may be a great place to look for holiday gifts and part-time jobs, but beware of phony offers that ask for too much personal information or ask for funds to be wired via Western Union, since these are most likely scams.


  • Join Us!

  • Tweets

  • Archives

  • Categories

All Rights Reserved © 2017 London Drugs Ltd.