Tech Bytes: Find your clipboard history easily

If you’re like me, you copy and paste text and images all day long. It’s annoying when you accidentally copy over your last selection. That’s where Clipboard history comes in. You can store up to 25 entries so you can go back and grab your recent selections. To enable Clipboard history: Click Start > Settings (the gear icon) > System […]

Tech Bytes: Protect Your Privacy on YouTube

Step 1: Hiding Viewing Preferences and Likes The first step to improve the privacy of your YouTube account is to prevent others from seeing your video watching habits and likes. Go to your YouTube homepage. Click on your avatar icon and select “Settings” then “Privacy.” The screen shows whether your liked videos, your subscriptions, and […]

Tech Bytes: How to Manage Online Ads

Want to stop all the ads you get for things you just bought or things suggested for you to buy? Go to Google’s home page like you are doing a search and log in to your account. Click or tap the circle in the upper corner with your initial inside or your picture and a […]

Tech Bytes: Safe Internet Purchases

We know security breaches are common these days, and it’s hard to avoid sharing credit card information with companies you interact with daily. Think about online shopping and banking or even companies you don’t interact with online; they can all be breached and expose your personal and financial information. Protect yourself with good password habits […]

Tech Bytes: Check your snail mail on email

The United States Postal Service, UPS, and FedEx all offer online dashboards where you can see exactly what mail and packages are scheduled to arrive at your address. They will email and send you text message notifications. These are all free services, although UPS and FedEx have a few additional paid features. For example, you […]

Tech Bytes: Beware of Hackers

I just repaired a PC that had been taken over by a hacker.  The user said he got a call from a guy that said he represented a software vendor and he had used their software at one time.  It appears this hacker got phone numbers including cell numbers from the vendor and was calling […]