Tech Tips

Protect Your Data, Protect Your Business

Thursday, 14 September 2017 00:00
In Windows 10, you can select which folders get synced between OneDrive online and the OneDrive folder on your hard drive, but File Explorer won't show you the data that's stored only on the OneDrive cloud storage space. There's a workaround, however, that lets you see and access all of the files you have in OneDrive: Map it as a network drive.
Mapping OneDrive in Windows 10 will make it work similarly to the way OneDrive works in Windows 8.1. You'll see the full list of folders and files available, even the ones not stored locally on your computer. Once you map OneDrive, you can double-click a file that's stored online only to download it to your machine.
1. Log into
Choose OneDrive Personal or OneDrive for Business
2. Copy the CID number from the address bar. These are the digits and letters after the "cid=" part of the URL. Don't include any other characters that separate the CID, such as % or &.
3. In Windows Explorer, go to This PC.
4. Click on the Computer tab then "Map network drive".
5. In the Folder field, enter followed by the CID you copied in step 1.
6. Check the "Connect using different credentials" box.
7. Click Finish and enter your OneDrive login.
That's it.
You should now see all of your OneDrive folders and files under This PC in Windows Explorer--whether or not they are stored locally on your computer.
You can copy, rename, and open files from this mapped drive.
And, by the way, you can right-click on the drive name, which will likely be named with your OneDrive CID, and rename it to something more meaningful.
Friday, 23 June 2017 00:00

Since its release back in 2015, Windows 10 continues to see updates and new features. This time, users are greeted with some new keyboard shortcuts that will make life easier. So without further ado, here are our top picks that can be extremely helpful to your daily operations.

Saturday, 14 February 2015 01:59

SMTP (Simple Mail Transfer Protocol) is used when you set up an on-premises multi-function printer, scanner, fax, or line of business (LOB) application that needs to send email. If some or all of your mailboxes are in Office 365, there are a few options available: SMTP relay, client SMTP submission, or Direct Send.

Tuesday, 03 February 2015 19:13

Disable MS Office 2013 Start Screen & Always Open Blank Documents

MS Office 2013 is without argument the most polished face the productivity suit has ever had, to date. It’s an obvious outcome of it being around for years and being improved upon. That said, I don’t always like the new start screen in Office 2013 which stalls the actual program being launched. I use Word quite often and I’m still in the habit of launching it from the taskbar and immediately being able to start typing or at times, pasting text. The start screen is often an unnecessary extra step for me and at times very annoying. For anyone in the same boat, there is a simple solution to this problem and that is to disable the start screen. It’s an option that can be exercised on a per-app basis for the Office Suit and is very easily reversible.

Wednesday, 30 July 2014 15:07

Applies to: Outlook 2013

You can allow your calendar to be seen by others with Exchange. They have to open your calendar on their computers, however to see this. Learn how at "Open a shared calendar," in the next section.

Wednesday, 30 July 2014 14:51

Applies to: Outlook 2013

You can open a shared calendar and view others entries. First, they must share the calendar with you through Exchange.

Wednesday, 30 July 2014 14:47

Applies to: Outlook 2013

A public folder is a folder present in Outlook 2010 to share files with others. The information in the folder can be accessed by selected users or by all users present under same mail client. The level of privilege to use the public folder will be provided to users by the owner of the public folder. The public folder in Outlook 2010 can contain anything like calendars items, messages or contacts. Using outlook, you can share contacts, tasks calendars and you can even share files. By sharing the files, you can centralize the information in the file. The information in the files can be discussed and final output file can be shared through this public folder option. Once the permission is granted, then adding a public folder in Outlook 2010 is an easy task.

Wednesday, 30 July 2014 14:44

Applies to: Outlook 2013, Exchange 2007 - 2013

Outlook has two types of views, a global views that is available to all folders of a specific types and a folder-only view that is visible when you view only that folder. The global views (all folders) are stored in the default data files while the 'this folder only' views are stored in the folder. If you open a second .pst file in your profile, only the 'this folder only' views stored in it are accessible.

Wednesday, 30 July 2014 14:29

Applies to: Outlook 2013

You can't find out the Forms command until we show Developer tab in Outlook 2010 and 2013. Therefore, we will guide you through the process to show the Developer Tab on the Ribbon:

Wednesday, 30 July 2014 14:26

Applies to: Office 365

A disclaimer is text that's automatically added to e-mail messages. Disclaimers are typically used to provide legal information, warnings about unknown or unverified senders, or for other reasons as determined by an organization.

Tuesday, 13 May 2014 20:09

Not many people bother to maintain their computers free of dust nor do they consider the importance of keeping a clean computer.  The main factor in a clean computer is the benefit it provides. Computers have many little areas where dust can easily accumulate. Leaving the dust intact, can be a hazard to your computer. With the accumulated dust, the air flow is greatly reduced which will eventually lead to excessive heat. This heat has the potential to damage your computer's hardware. Taking a simple 15 minute task, such a cleaning/dusting, and putting it into practice can prolong the life of your computer by reducing the chances of hardware failure.

Wednesday, 06 June 2012 00:00

In days gone by, screen resolution (also called display resolution) wasn’t much of an issue. Windows came with a few preset options, and to get higher resolution or more colors (or both) you would install a driver for your video card. As time went on, you could choose better video cards and better monitors as well. Today we have lots of options when it comes to displays, their quality and the supported resolutions. In this article I would like to take you through a bit of history and explain all the important concepts.

Thursday, 12 April 2012 00:00


Do you have groups of contacts whom you keep sending emails and meeting requests? And do you re-type each mail address every time you wish to do so? Now, if you’re using MS Outlook 2010 as your email client and still doing the same thing, you are missing something really cool.

Outlook allows you to create Distribution Lists which are nothing but subsets of your contacts or customized groups as you may call them. So, next time you have a group of people to send frequent mails to, create a distribution list like one explained below.

Wednesday, 28 March 2012 00:00


Windows 7 provides several options for conserving power when you are not using your PC. These options include Sleep, Hibernate, and Hybrid Sleep and are very useful if you are using a laptop. Here’s the difference between them.


Wednesday, 07 March 2012 00:00

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination of all the characters that are available, must be unique for different applications and must not be a word commonly found in any dictionaries, in any language.

Monday, 13 February 2012 00:00

Email is an important and necessary part of your business. It provides an economical and instant means of communicating with staff, customers, and vendors – that’s both simple to use and enables increased efficiency. An email policy is required to protect this necessary business tool.

Wednesday, 25 January 2012 00:00

By Marte Brengle

I don’t think there’s anyone who’s never needed help with Windows. Since the DOS days, Microsoft has included Help in all its software. Luckily for us, the Help included in Windows 7 seems to be more versatile than ever. Let’s discover how it works, how to make it even better and use it to get information on how to work with Windows programs or to get help in solving problems.

Wednesday, 18 January 2012 00:00

By Tina Sieber

Does running your laptop on AC power damage the battery? Should you remove the battery to increase its lifetime? If you own a laptop, these questions have probably crossed your mind before. The short answer to both questions is: most likely yes. Curious to learn why? Continue reading for all the juicy details.

To support my arguments and recommendations made at the end of this article, I have to provide some background information. So let’s start with the basics…

Thursday, 01 December 2011 00:00


Do you want to search a file on your computer but don’t remember the name of it? But if you remember the dates before and after the file was created or modified, then you can find it easily using a simple syntax in Windows 7 and Vista. In Windows XP you can use the Search Companion to search for files created or modified between two given dates. This tutorial will focus on Windows 7 and Windows Vista only.


Tuesday, 15 November 2011 00:00


During the winter months, there are always more dead computers coming into our shop for repair. This is in direct correlation with the use of electric space heaters near computers, which is quite common. After all, to keep your entire home or office a bit cooler and then to run a small space heater near your computer work area is an effective way to save some money on heat.


Friday, 11 November 2011 00:00


Have you ever been the victim of identity theft? Ever been hacked? Here’s the first in a series of critical information to help you arm yourself against the surprisingly frightening world of hackers, phishers, and cybercriminals.


Tuesday, 16 August 2011 00:00

Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.


Tuesday, 09 August 2011 00:00


If you live in an apartment complex you’ve probably noticed more than just the passive-aggressive network IDs that your neighbors use—very likely you’ve had problems with your wireless connections dropping out, or just not being as fast as you’d like. Here’s a quick fix.


Friday, 05 August 2011 00:00


Even if you’re not much of a keyboard ninja, there are certain shortcuts that simply seem ridiculous not to know: Ctrl+V springs to mind as an obvious example. But even uber-geeks will agree that much of the time it really is a lot easier for the average user to just grab the mouse.

To this user, many shortcuts exist purely to confuse. Even the word-by-word Ctrl+Backspace combination seems mind boggling. Windows 7, however, provides us with some seriously useful shortcuts that just might seep into the keyboard vernacular of the mom-and-pop user. Here are seven (see what we’ve done there) of the most useful.


Tuesday, 02 August 2011 00:00


Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.


Tuesday, 26 July 2011 00:00


If you have a Netbook or Laptop that you would like to use on a Public Wi-Fi hotspot, there are security precautions you need to take. Here we look at keeping your computer secure at public Wi-Fi hotspots.


Monday, 16 May 2011 00:00

Users should be aware of potential email scams, fake antivirus, and phishing attacks regarding the Mississippi flooding disaster. Email scams may contain links or attachments that may direct users to phishing or malicious websites. Fake antivirus attacks may come in the form of pop-ups that flash security warnings and ask the user for credit card information. Phishing emails and websites requesting donations for bogus charitable organizations commonly appear after these types of natural disasters.


Friday, 18 March 2011 00:00


When I saw this I just needed to share.  I thought this was one of the coolest tips I had ever seen in awhile.  I have always hated logging on to RWW then selecting my workstation and connection.  I also have dual monitors and it has been great to be able to work from home exactly the way I work in the office.  It makes life easier and I can have a sick day and still be able to stay caught up at work.


Friday, 18 March 2011 00:00


It has been reported that even professional security researchers have been hacked. Poor password management has surpassed lack of antivirus protection as the biggest security concern.  Don’t let bad passwords cripple your business.  One bad, repetitive password can lead to someone hacking into many accounts.  ComTech recommends differentiating passwords between accounts, especially social vs. sensitive ones such as online banking. It seems obvious that passwords should be somewhat complex, but in reality we have seen the word "password" used!   


Wednesday, 16 March 2011 00:00


In the past, US-CERT has received reports of an increased number of phishing scams and malware campaigns that take advantage of the United States tax season. Due to the upcoming tax deadline, US-CERT reminds users to remain cautious when receiving unsolicited email that could be part of a potential phishing scam or malware campaign. 

These phishing scams and malware campaigns may include, but are not limited to, the following:


Wednesday, 26 January 2011 00:00


The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions.


Tuesday, 04 January 2011 00:00


We continue our series about the taskbar with a tutorial about the notification area. Although the notification area is present in the Windows graphical user interface since Windows 95, never before had it been so easy to customize as it is in Windows 7. This article shows you several tricks about configuring it and transforming it into something more appropriate to your needs. I will show: how to locate the notification area, control the display behavior of notification icons, turn on or off system icons, restore the default behavior of the notification area, set the notification icons to be always displayed, and change the position of individual notification icons.


Saturday, 04 December 2010 00:00


One of the things we noticed about some Windows 7 users is that they do not use the Shut down button from the Start Menu to shut down their computers.  They use the power button from the computer case instead. If you are such a user, you might want to change the default behavior of the Shut down button from the Start Menu into something else, which you are likely to use in a reasonably frequent manner: Log Off, Lock, Restart, Sleep or Switch User. This tutorial will show how.


Friday, 19 November 2010 00:00


Wish the program and shortcut icons on your desktop were a little bigger so you could see them better? Or want to make them a little smaller so you can fit more in? There’s no need to click through a bunch of windows to get to the right dialog box and then try to guess how the numbers correspond to the actual size. Here’s all you have to do to increase or decrease the size of those icons:


Monday, 15 November 2010 00:00


Cyber Security Tip ST05-018

              Understanding Voice over Internet Protocol (VoIP)

With the introduction of VoIP, you can use the internet to make telephone calls instead of relying on a separate telephone line. However, the technology does present security risks.


Microsoft Office 365


Learn More

Search the Blog

Posting History

« October 2017 »
Mon Tue Wed Thu Fri Sat Sun
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31