• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

Firewalls – First Line Filtration

June 28, 2016 by Andy Thompson

If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry. Most of us associate firewalls with large network corporations and sophisticated security systems. You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks. This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.

We’ll begin with a definition of what a firewall is and then move into some basic questions and answers.  After that we’re going to provide information for those that might want to beef up their firewall protection.

The Firewall Basics

Effectively a firewall is a filter.  It is designed to prevent dubious programs and Internet services from establishing a connection or gaining access to your computer.

Firewall Defined: A firewall is hardware or software technology designed to monitor and filter incoming and outgoing traffic to your PC.  It is a network security function that effectively acts as a barrier.  The data that passes through depends on the pre-determined set of rules which are configured in the firewall settings.

A Little Q and A

Now that we know basically what it is, we can answer some questions.

  1. Why do I need one?

A firewall tries to screen out incoming Internet streams of data from unwanted sources and it also prevents programs on your PC to access the Internet without authorization.  The purpose is to prevent unwanted and malicious programs from communicating to, or from, your computer.

  1. Who makes firewalls?

Microsoft includes a firewall with Windows – we’ll cover this in more detail below.  There are also a significant number of known makers of free and paid solutions.  The best known names would include Norton, McAfee, BitDefender, Kaspersky, as well as Zone Alarm, Webroot, and Comodo.  Some routers also have firewalls built into them.  While we are not recommending any specific option, selecting one of the manufacturers listed above should provide greater security.

  1. When do I need one?

Quite simply – you need a firewall when you connect to the Internet. This is why you should also consider a solution for your smart phone or mobile device.  Most malware programs these days attempt to get money from you and your mobile devices are also targets of malware attacks and cyber crime.

  1. Doesn’t Windows already come with a firewall?

Yes, it does, and it may be all you need.   It blocks unwanted connections and will prompt you if you want to allow a connection or not.  There is a list of programs to block and you can enter exceptions to identify programs you deem safe.

Windows Firewall is equipped to monitor traffic, but lacks in the area of program control.  Despite shortcomings, Windows Firewall may be all you need.   Other tools will provide additional functions such as the ability to create activity logs.  In this way you can review what was happening in terms of attempted connections so you can fine tune the security parameters.  The bottom line is that the Windows Firewall will suffice for most users and should not be regarded as providing insufficient security.

If you find surfing the net is slow, begin by optimizing the browsers and Windows configuration for accessing the Internet.  We recommend looking at the articles: Improve Internet Speed and Restore Browser Speed.  After this, if you are more certain that the firewall is affecting performance, you may want to replace it.  If your PC is encountering issues with viral infections then first look at your antivirus protection, and if you have a top notch AV solution and are still getting breaches, that too would be a reason for looking for a new firewall.

  1. Is a firewall all the protection I need?

In a previous article we covered some myths about antivirus protection and this came up.  We can review briefly here.  As we have described, firewalls can filter nefarious traffic.  However, they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not able to scan for infected files – you need an antivirus solution specific to this purpose.

Cyber criminals exploit potential security holes and look for ways to openly connect with your PC.  A firewall can minimize this risk and offer the first line of defense.  However, it is not sufficient in blocking the myriad of virus and malware threats that are prevalent.  Malware creators are very clever in disguising data and can even disable your firewall in an effort to steal private or personal data.

Antivirus Protection:In a nutshell… we are pleased to offer CompuClever Antivirus PLUS, an AV solution that delivers 100% protection against both known and unknown viruses, comparable to any first-tier antivirus software like Norton, Kaspersky, Bitdefender, and MacAfee.  As a matter of fact, an independent third-party lab test revealed that our antivirus product not only delivers a high level of protection, it also creates a very low impact to PC performance.

For more information about CompuClever Antivirus PLUS click here: Are You Well Protected?

Turning Windows Firewall On and Off

Microsoft states: “You only need one firewall app on your PC (in addition to the firewall that’s probably built into your network router).  Having more than one firewall app on your PC can cause conflicts and problems.” [1]  It is also good practice to NOT turn off a firewall unless you have another one turned on.

With these safe practices in mind, you can view the status of Windows Firewall and you can turn it off or on.  The easiest way to begin is to type “firewall” in the Search field located in the Start menu.  For more information and instructions specific to your operating system follow one of these links:

Windows 10  / Windows 8 / Windows 7 / Windows Vista / Windows XP

What to Consider if Seeking an Alternative

Here is our list to help you better decide on alternatives to the built-in firewall for Windows.

  1. You need to consider how accurately a firewall solution will identify threats to your system. You do not want it to miss threats but you also do not want it blackball safe and known programs.  No one wants an unending stream of warnings from their firewall for no valid reason.  The very best firewalls handle unknown programs by monitoring them closely for suspicious activity and signs of improper network activity behaviour.
  2. The fewer resources it requires the better. This will allow your system to run programs faster and dedicate resources to perform duties related to regular day-to-day activities.
  3. Supply only the functions you need. Some “suite” applications will include antivirus and performance tools.  If you already have these areas covered by other applications there is no need to pay for bloated software that is inadequate in these other areas.
  4. You will also need to know what kind of coverage you require in terms of the devices you are needing to protect (desktop, laptop, tablet, or phone), and if your solution will suffice.

Other Considerations

Now to finish off with some final points related to installing a new firewall solution.

Install Your Firewall 

There isn’t any one “right” place to install a firewall; it comes down to the devices you use and the programs you run.  If you are looking for a firewall for your business then the normal firewall is not what you need; you need what is known as a “Next Generation Firewall” or, “NGFW’.  These are more sophisticated and expensive, ranging from $500 to $80,000, and are beyond what we will discuss here.

Also, some routers have firewalls built right into them, meaning any system behind them does not need a firewall.  This is useful as it means that there is no performance loss for Windows as a result of a firewall performing checks on data streams.  However, if you have a portable device (like a laptop, tablet, or phone), then you need a firewall installed to the device that can be turned on whenever you connect to the Internet when away from home.

Common Problems

The most common problem in using a firewall is blocking a program you know is good.  When this happens you need to create an “exclusion” or “exception” (search the program help files for those terms).  Effectively, this provides you the ability to override what the firewall would normally do.  Firewalls are designed to run in the background so most people have little to no interaction with these programs once they are installed and exceptions are generated.

Summary

While we haven’t gone into detail about hardware and software firewall technologies and the various viral threats to firewalls, we have covered the basics.  Standard coverage should get you started and you have the option of customizing the onboard Windows Firewall.  As an alternative to Windows, you can follow our introductory guidelines for taking on an alternative firewall solution.  In either event, remember that an effective antivirus solution is part of your fortress of protection.

We would like to thank Richard from our Tech Support team for his first wave of research on this subject.  We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


[1] http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish

Filed Under: Antivirus, Blog, online security, Windows tips Tagged With: antivirus, firewall, privacy, security, windows tips

4 Useful Tips for Improving Windows 10

June 16, 2016 by Charles Edward

Microsoft is no longer offering Windows 10 as a free upgrade as of July 29th, 2016. If you have already upgraded to Windows 10 or have recently bought a computer device with the latest operating system from Microsoft, you need to know that the new operating system is missing some pretty important features. Here are four tips for improving the default Windows 10 installation.

Keep in mind that you can still upgrade to Windows 10 but you will have to pay the full cost.

Why upgrade?

Windows 10 is a dramatic improvement over Windows 8. The new OS not only looks nice, the desktop software is intended to seamlessly integrate with tablet apps.  CNN’s review of Windows 10 provides a quick snapshot of what’s new in Windows 10. As well, with the upcoming consumer release of the first service pack for the operating system it may be a good time to reconsider upgrading. On top of that, Microsoft will eventually stop issuing security patches for Windows 7 and 8, so you’re going to want to upgrade someday anyway.

If your PC is not powerful enough for Windows 10, don’t upgrade. However for everyone else now is the time to upgrade to Windows 10. As well, many people are starting to consider purchasing a system pre-installed with Windows 10.

So, for upgraders and new purchasers alike, there are some things we have learned about the default Windows 10 installation settings that need to be addressed to keep your system and data as safe as possible.

Tip 1: What to Do When Windows 10 Upgrade Process Fails

windows update fix

While purchasers of a computer that comes installed with Windows 10 will never have to worry about this, sometime there is an error during the actual process of upgrading to Windows 10 and everything grinds to a halt.  Happily, PC TuneUp Maestro does have a tool for addressing a number of Windows Update errors and should be the first thing to try if you have the program installed.

To use PC TuneUp Maestro’s Windows Update Tool to recover from this problem simply:

  • Open PC TuneUp Maestro on your computer
  • Click “Fix & Clean”
  • Click “Windows Update Tool”
  • Run the tool and see if that fixes the issue. Should the issue persist:
    • Go to the “About” panel (from the main menu of the program)
    • Click “Get product support”
    • Click “Send error report”

We can then look at the issues to see what can be done to resolve the issue.

Another approach is to use the installer service from Microsoft and, just to be safe, bypass the automatic update process entirely. You can download the Microsoft Update Installer here.

Tip 2: How to Create a Recovery Disk

windows update installer

Your new system most likely comes with Windows 10 preinstalled, which means you don’t have to worry at all about upgrading from Windows 7 or Windows 8. However, what you might not realize is that Windows 10 does not come with CD’s to reinstall the OS if your hard drive crashes.

To be on the safe side, you will need to create restore disks.

To do this, you’ll need:

  • USB thumbdrive with 4 GB of space or more
  • Your computer running Windows 10

How to create a recovery disk:

  • In Windows 10, click Start and type: create recovery
  • Hit “Enter” on your keyboard
  • Open “Recovery”
  • Click “Create Recovery drive”
  • Make sure your thumbdrive is connected
  • Click “Next”
  • Wait while the wizard prepares to copy files to your thumbdrive
  • Again, make sure your thumbdrive is at 4 GB, click “Next”
  • Creating the recovery drive can take some time—you can do something else while it is prepared.
  • When complete, click “Finish”

When you need to use the recovery drive, simply connect it to your computer and boot from it. For more help, use this Microsoft link and follow the directions.

Tip 3: How to Enable “System Restore” on Windows 10

windows 10 system restore

In Windows 10, for some reason the System Restore function is disabled in the final set up of the install — this is as baffling as the Safe Mode being removed! We recommend re-enabling System Restore. It’s a quick fix that can be done in just a couple of minutes.

To enable System Restore:

  • Click in the “Search Windows” area of the Task Bar
  • Type in “Create a restore point”
  • In the panel that appears, click the circle beside “Turn on system protection”
  • For system protection, 5-10 GB should be ample space
  • Click “OK”

You will now have a System Restore disk installed on your USB. This makes recovering from a serious crash quick and simple to do.

Tip 4: How to Play Videos on Windows 10

windows 10 dvd player

This may seem absolutely crazy, but Windows 10 does not come with a video player. Microsoft does offer a video player on their version of the app store, but what’s even nuttier is they want US$14.99 for it!

There are a couple of free solutions:

  1. If you already have PC TuneUp Maestro we recommend using Ultra File Opener to play videos—you can download Ultra File Opener and get a free license number for it by installing the program and opening it.
  2. If you do not have PC TuneUp Maestro the a program like the VLC Media player is free and also an excellent way to play videos and even Blu-rays.

In Conclusion

Windows 10 is a powerful new operating system, and it’s here to stay. While you may decide not to upgrade and stay with Windows 7 or Windows 8, if you do buy a new computer you are now prepared to get the most out of it. If you have any questions or tips of your own about installing Windows 10, send us an email at newsletter[at]compuclever.com.

Filed Under: Blog, computer fixes, Windows 10

Antivirus Software – 7 Myths Debunked

June 8, 2016 by Andy Thompson

Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world. Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free. Nevertheless, there are some common myths about antivirus applications. Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.

Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.

The Top 7:

Here are the myths that we cover in this article along with the real truths about each.

1. Authentication and encryption offers me all the protection I need.

It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.

Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.

Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.

While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to ransomware and other debilitating viruses.

2. I don’t download files so I am safe from virus attacks.

You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.

Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.

There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.[1] For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.

Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.

These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.

3. Firewalls protect me from malicious activities.

A Firewall… is a network security feature that can allow or deny incoming and outgoing PC communications based on a predetermined set of rules.  The firewall rules are a standard preset configuration or can be modified by you or your administrator.  The Windows firewall is by default configured to block incoming threats – you need to change the settings to deal with outgoing threats.

Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.

It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.

A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.

4. Viruses and malware are written by AV companies.

There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?

There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.

The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, holding an infected PC ransom, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.

5. You can get good protection from free AV programs.

There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.

Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.

Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.

Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.

We are pleased that CompuClever AV PLUS has been certified by Virus Bulletin (VB100).  You can find the review on this virus bulletin site (search for “CompuClever”).  More on this later…

6. AV applications are not equipped to deal with APT attacks.

Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.

APT attacks are generally designed to target and penetrate companies, government agencies, or even political organizations.  If you want additional insights about APTs, please read the article: Setting the Record Straight: What’s an Advanced Persistent Threat?

Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: Ashley Madison hackers were motivated as a result of outrage due to the activities of the targeted website.

AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.

Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?

For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.

7. I can get good information about AV app comparisons from the AV vendor.

The simple answer to this is: make sure you get independent reviews.

Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.

All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.

One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.[2] Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.

An Independent Review: CompuClever Antivirus PLUS

We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”[3]

VB100 had this to say about CompuClever Antivirus PLUS:

“The design is slick and attractive, with a good range of options available and intuitive deployment of controls.”

“Stability was perfect throughout testing, with not the slightest shake even under heavy stress. Performance impact was decent too, with RAM use perhaps a little above average but CPU usage and impact on our set of tasks both pretty low.”

“Detection was as excellent as one would expect, with good scores everywhere. The WildList and clean sets were handled with pinpoint accuracy, earning CompuClever its first VB100 award on its debut.”

Check out the virus bulletin full review.

For more information about CompuClever AV PLUS click here: Are You Well Protected?

Summary:

With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.

We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


 

[1] https://en.wikipedia.org/wiki/Man-in-the-middle_attack
[2] How to Properly Evaluate an APT Security Solution
[3] https://www.virusbulletin.com/testing/

Filed Under: Antivirus, Blog, CompuClever Antivirus PLUS, online security, PC security

How to Turn Your Old Computer Into a Media Server

May 25, 2016 by Charles Edward

Many of us have one old — but still usuable — computer sitting in a closet somewhere around the house. Here’s a quick and easy way to convert it into a home media server.

Everyone loves getting a new computer. Switching on a brand-new and more powerful PC is a bit like playing in freshly-fallen snow. For a little while at least, a lightning-fast new computer offers endless possibilities.

However, there is one nagging question that everyone has when purchasing a new computer: what do you do with the old one?

Today we’re going to explain how to extend the life of your old computer by turning it into a media server.

How to Access Movies, Music and Photos Stored on Your Old Computer

Most people have at least one old computer gathering dust in a cupboard or the bedroom closet. Old PC’s can be recycled, but it’s a bit of a pain to lug them out to the car and drop them off at the dump. As well, many people are fearful about throwing out a hard drive with its accumulated passwords and sensitive banking information that can be retrieved by crooks.

The hard drive also provides another clue about why so many people avoid recycling their computers: old computers are often filled with priceless photos as well as priceless music and video collections. And it can take some work to transfer all of these precious files to your newly purchased computer, so a lot of people just put the whole thing off, saying they’ll retrieve those photos and movies “someday.”

There is one relatively quick and easy way to quickly access and view all of these old files without ever having to do the hard work of getting them off your computer. By turning your old computer into a media server you can access your files anytime and virtually anywhere you have an internet connection.

Turn Your Old Computer Into A Media Server

Until recently it was challenging to turn an old computer into a media server. In theory it should be easy to access any Windows computer on your home WiFi network, find the file you want, and then watch it on a different computer, a device such as a smartphone, or even on your WiFi-connected TV. In practice, however, the Windows file system is not particularly intuitive, making it confusing to find and play the files you want. On top of that, trying to play a movie  can be a real challenge, depending on the codec that’s being used.

This is where media server software comes in handy. This open source software can transform your PC into a media server that can stream your content anywhere over the internet. And the content such as movies and music doesn’t necessarily have to reside on your old computer either: a media server will allow you to send content from your newer computer or device to it to stream onto your TV or home theater.

One minor caveat here: setting up a media server can be challenging. In theory you can take advantage of Windows’ native DNLA capability, but it takes a bit of effort and some trial-and-error to make it work properly. There is free media server software to choose from, such as Universal Media Server or Serviio, but these are often difficult to set up and may lack some important features.

This is why Plex is such a great choice.

How to Install Plex as Your Media Server

how to set up a home media server

Plex is probably the most popular media server platform available. The basic version of Plex is free, it’s easy to installand set up, it works on older computers, and even has smartphone apps that let you access your files just about anywhere. In a nutshell, Plex will let you set up your old computer as a central media server from which you’ll stream content to your tablet, phone, set-top box, game console or television.

What You’ll Need to Set Up Plex

You’ll need a few basic things to set up with Plex on an old computer, including:

  • A home WiFi network
  • A working computer with a functional keyboard, mouse and monitor
  • Some way of connecting your television to your home network

For this last requirement, while Plex will allow you to connect your old computer to the internet, you’ll still have to figure out how to connect your television to your WiFi network and Plex.

Luckily, the paid version Plex works with a number of third-party devices including:

  • Roku
  • Chromecast
  • Amazon Fire TV stick

These three devices are pretty handy because they all have apps that allow you to turn your smartphone or tablet into a remote control for your television. On the downside, if you have a smartphone or tablet you’ll have to purchase these apps for a nominal fee.

You can also connect your old computer to your television using an HDMI cable or even a VGA connection if both your computer and a TV have those ports. You can then send content from other devices and computers to your media server to play on your TV.

Plex Download Options

When you check out the Plex downloads page, you’ll want to download the download the Plex Home Theater option. This will allow your old computer to act as the base station for everything else on the network, storing media and distributing it to any other device that runs the application. As part of the installation process, you’ll set up your Plex account, allowing you to register all of your devices and server together.

Final Notes

The performance of your old computer may affect playback quality on your television. For example, an older computer with an older chip and less RAM may have a bit more difficulty streaming HD files. However, Plex should be able to handle the job with flair.

As well, if you’re going to use your old computer as a media server, it’s going to need tobe left on. Computers tend to “run hot” when streaming media, so this means that you’ll have to choose a well-ventilated spot to keep things cool. As well, cooling fans can be noisy and distracting, so keep this in mind when deciding where to locate your old computer-turned media server.

Let us know how things turn out!

If you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: newsletter@compuclever.com.

 

Filed Under: Blog

Office 365 Versus Office 2016: What’s the Difference?

May 13, 2016 by Charles Edward

It can be confusing when trying tell the difference between Office 365 and Office 2016. In this informative blog post, we explain how they’re different so you can determine which one is best for you.

If you have purchased a new Windows computer over the past year or so, you have likely been puzzled when trying to decide which version of Microsoft Office is right for you.

A quick search online for Microsoft Office shows at least three choices: Office 2016, Office 365 and Office Online (sometimes called OneDrive).

What’s the difference, and which version should you get?

Office 365 Versus Office 2016: What's the Difference?

First, let’s untangle the differences between these three choices by taking a look at Office Online, the free, basic version of Microsoft’s Office suite.

Office Online is a great place to start since it offers so many of the features that make the current version of Microsoft Office so powerful, including mobile apps, online storage and online editing from any device.

What is Office Online?

Office Online is the completely free, and completely web-based version of Microsoft Office (and, just to confuse things, Microsoft sometimes calls this free service OneDrive—also the name of its cloud storage service).

Just by signing in with your free Microsoft account you can access basic, stripped-down versions of Word, Excel, PowerPoint and several other productivity apps from any Internet browser on any computer.

Office 365 features

A main selling point of this free service is that Office Online also saves your documents automatically, as you work on them. So, you won’t lose everything you’ve typed if you lose your internet connection.

Office Online also includes several free web-based services including:

Outlook.com

Office Online is also integrated with Outlook.com. Not to be confused with the more powerful Microsoft Outlook email and calendar software program, Outlook.com is Microsoft’s simple, free web-based email app. It’s the successor to the popular Hotmail and Windows Live Mail webmail services.

As a free service, Outlook.com is simple to use compared to the more complicated Gmail, Google Inbox or the full version of Microsoft Outlook. Outlook.com also features a smartphone app which allows you to send email from any mobile device.

OneDrive

Office Online and Outlook.com are both integrated with OneDrive, Microsoft’s cloud storage service. The free version of OneDrive comes with a somewhat paltry 5GB of online storage, which should be enough to store any Office Online documents you create… but not much else compared to other online services.

Office 365 features

You can also easily insert Word or other Office Online documents from OneDrive as attachments to emails sent from Outlook.com—you don’t have to search around for and upload a document from your computer as an attachment.

Smartphone Apps

And, once again, there is a useful, free smartphone app for OneDrive that allows you to easily find and quickly share Office documents. Even as a free software suite, Office Online is a handy tool for quickly getting tasks done.

Office Online: Too Basic?

Despite all its features, if you’re looking for a suite of true productivity applications, the free version of Office Online is probably just not powerful enough. Besides the rather miniscule 5GB of complementary online storage offered by OneDrive, the free versions of Word, Excel and PowerPoint included with Office Online, are, in a word, basic.

Office online features

These no-cost versions offer none of the powerful features of their paid counterparts. Still, as a free service Office Online does provide a way to create and share basic documents, slide decks and spreadsheets, or edit existing ones… but that’s about it.

If you want to design nice-looking Word documents or use any of Excel’s more sophisticated features, such as macros, Office Online will leave you disappointed.

Instead, you’re going to have to pay for either Office 2016 or Office 365.

So, Which is Better: Office 2016 or Office 365?

This leads to the next question: is it better to pay for Office 2016, or subscribe to Office 365?

While Office Online is free, you will have to pay to purchase both Office 2016 and Office 365. Both Office 2016 and Office 365 include the powerful, fully-featured versions of Word, Excel, PowerPoint and other Office applications.

The main difference between the two is that Office 2016 is a one-time purchase, while Office 365 is a subscription-based service—you must pay every month, or every year, to renew your subscription (this chart explains the differences between the basic versions of Office 2016 and Office 365).

However both Office 2016 and Office 365 must be downloaded and installed on your computer to get them to work—despite its status as a subscription service, Office 365 still resides on your Windows PC or your Mac as a software program.

The Basics of Office 365

Office 365 is the subscription-based version of the full Microsoft Office suite. You can pay a monthly subscription of about US$10, but the annual subscription, at about US$100, is cheaper. While renewing the Office 365 subscription will cost you more from year to year, it also comes with some compelling features that may make it a better choice than Office 2016.

Office online features

For example, Office 365 subscribers receive 1TB of OneDrive online storage (Office 2016 purchasers generally do not) that can be accessed on any device. Office 365 also comes with monthly recurring Skype minutes.

Most importantly, Office 365 Home can be installed on five different PC’s or Macs as part of the subscription. This feature is ideal if your family has several computers.

There is also a cheaper Office 365 Personal subscription as well that can be installed on just one computer.

Since the Office 365 Home subscription can be shared with other members of your family, or even your friends, each person gets 1TB of storage of their own for as long as you continue to subscribe to Office 365.

That’s not a bad deal for a hundred bucks a year!

What You Get By Purchasing Microsoft Office 2016

The main selling point of Office 2016 seems to be that you only pay once for the software and after that Office is yours to keep.

microsoft office download

The basic version, Office Home & Student 2016, costs about US$150 and can be installed on just one PC. This basic version includes Word, Excel, PowerPoint and OneNote, but none of the other Office programs, which must be purchased separately, or as part of a more expensive package.

For example, the more expensive Microsoft Office Home & Business 2016 includes the powerful Microsoft Outlook email and calendar program.

The benefit of purchasing and downloading Office Home & Student 2016 is that you only have to pay for the software once, and after that you own it. With Office 365 you are forced to renew your subscription once a year for around US$100, or risk losing access.

The Downsides of Purchasing Office 2016

So, you’ll have Office as long as you own your computer, and you’ll never have to worry about Microsoft suddenly upping the price of a subscription.

On the downside, Office 365 is regularly updated with new features, while Office 2016 only receives security updates. The subscription service also comes with 1TB of OneDrive storage, while Office 2016 usually does not—OneDrive online storage will cost extra for Office 2016 purchasers.

Besides that, the basic version of Office 2016 can only be installed on just one computer. Office 365 Home, on the other hand, can be installed on at least 5 PC’s.

Still, many computer owners are still getting used to the idea of subscribing to a software program or online service. It’s hard to get used to simply “renting” a software program rather than purchasing it outright.

But the benefits of subscribing to Office 365, especially if you own a number of computers, cannot be underestimated.

Which do you prefer? Paying for a subscription, or paying to actually own your own software? Let us know by emailing info@compuclever.com.

A Simple Cheat Sheet for Understanding the Difference Between Office Live, Office 365 and Office 2016

  • Office Live is the free online version of Microsoft Office; Office 365 is an annual subscription service, while Office 2016 is a one-time purchase.
  • Both Office 365 and Office 2016 are installed on your computer.
  • If you stop subscribing to Office 365 you will no longer be able to use Office on your computer; Office 2016 is forever.
  • Office Live offers use of free, simple versions of Word, Excel and PowerPoint.
  • Office 365 includes 1TB of online storage, while the basic version of Office 2016 does not.
  • Office 365 Home can be installed on 5 computers; Office 2016 can be installed on one computer.

Filed Under: Blog, cloud storage, Windows tips

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 30
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.