Computer and Monitor Tips

Backing Up Yield Data

It’s very important to keep a copy of the original yield files from your yield monitor. If you ever need to re-process the original data, these files will be necessary. The following are some tips on how to store your data so it is easy to find in the future.

Creating folders

  1. Right-click the Microsoft® Windows Start menu, and then select Explore.
  2. Click the drive or folder you want to work with to turn it blue.
  3. Click on the folder where you want the data (“My Documents” is a good folder to select).
  4. Right click in the white area on the right side of the screen.
  5. Select New and then Folder.
  6. Type in the name for the new folder (ex Yield data 2004).
  7. Press the enter key.

Copying Files on to your hard drive

  1. Right-click the Microsoft® Windows Start menu, and then select Explore.
  2. Click the drive or folder you want to work with. (Card reader drive letter)
  3. Click the file or folder you want to copy or move.
  4. From the Edit menu, select Copy.
  5. Open the folder or disk where you want to copy or move the item.
  6. From the Edit menu, select Paste.

Note: These steps apply to Microsoft Windows 2000 and XP and may vary for other Windows versions. Please refer to Windows Help for specific instructions for your version

These same steps would be followed if you are putting the files onto a CD, zip disk, or external USB storage device (jump or flash drive).

Essential Security and Privacy Software

The frequency of privacy and security incidents is on the rise.
People who suffer computer damage, financial loss, or both from viruses, spyware, or “phishing” e-mail scams:   1 in 3
People whose computers are infected with a virus:  1 in 4
People whose computers are infected with spyware:  1 in 8
People who lost money ($850 average) from a phishing attack:  1 in 115
According to a 2006 ConsumerReports national study

Why You Need Security and Privacy Software

Without enabled, up-to-date antivirus and firewall protection, you’re an easy target for viruses, spyware, hackers and other threats. You can also spread these bad things to other computer users without your knowledge. You are also at risk of identity theft. These articles explain the very real risks.

We highly encourage using the following software programs to protect your computer’s security and privacy. Be careful when choosing security and privacy software – there are many bad software programs masquerading as good ones. Especially in spyware cleaners.

 

Anti-virus Software

We don’t recommend Norton AntiVirus because it eats up way too much system resources and can really slow your computer down compared to other AntiVirus programs. While these aren’t the only good ones out there, these are definitely a few of the best.

If budget is really tight, try AVG free version. It has the same scanning effectiveness as the paid version, but lacks some of the automation and advanced features (that, in our opinion, are well worth the cost).

 

Security/Privacy Suites

Both FSecure and ZoneAlarm offer good firewalls bundled with anti-virus, spyware cleaners, and a host of other very useful privacy and security utilities. Both are well worth the money, tightly integrated, and easy to use. They also offer free firewalls with fewer features for those on a limited budget. Compare the features to see which most closely matches your needs.

Without a firewall, anyone can – and will – look at your computer files and even install viruses or malicious software on your hard drive. Confidential information can be taken and used to steal your identity. You computer data can be destroyed.

Some people, including some computer consultants, will try to tell you that you don’t need a firewall if you are on dialup. Or that you don’t need a software firewall on each computer that connects to your network if you have a network router with firewall. Or that Windows includes a perfectly good firewall. WRONG, WRONG, WRONG. If you have a computer consultant who recommends you use the Windows firewall, get a new consultant – and fast! It has several weaknesses and hackers consider it easy to compromise. It’s better than nothing but not good.

It is absolutely essential that any computer that connects to the internet in any way be protected by at least anti-virus software and a software firewall. Once the software is installed, go through the tutorials to learn to use it. Also set a password so that no one else who uses your computer can turn the software off, accidentally or otherwise.

 

Smartphone/Mobile Phone Security Software

According to FSecure, “The first viruses for mobile phones have emerged and it is now possible to create malicious code that makes the phone unusable. A virus can cause false billing, unwanted disclosure of stored information, and deleted, corrupted, modified or stolen user data.”

 

Anti-Spyware

Spyware is malicious software (malware) that watches what users do with their computer and then sends that information over the internet to a waiting computer. No one spyware cleaner catches everything so we recommend using two.

It’s rare to find a computer without spyware these days unless you use a spyware scanner to clean it off. Most computers are sold with spyware or adware already installed, and installed spyware invites buddies in so you’ll often find dozens or hundreds of spyware programs on a single pc.

Be wary of ad-sponsored or “free” screen savers, games, utilities, videos, toolbars, and music or movie file-sharing programs. Those frequently include spyware that may slow down your PC. Shut off the computer or disconnect the modem when you don’t need to use it for an extended period.

Spyware cleaners will remove or disable the offending components. If that causes a problem with your software, consider finding another software option. Do you really want to use software that monitors your use, forces pop up ads on you, and probably shares your info with others?

Examples of spyware include Kazaa, Grokster, Weatherbug, FlashGet (free version), and Messenger Plus (if you agree to their “sponsor” program). Programs formerly distributed with spyware include AOL Instant Messenger and Wild Tangent, which were bundled on many, many computers for years.

 

Password Management Software

RoboForm is one of the most useful utilities available. It makes securely managing and using logins, credit cards, and other confidential information fast and easy. It takes a few days to get used to, but once you use it you will wonder how you ever got along without it.

 

Windows Updates

Set Windows to automatically download and install updates on a regular basis. In Internet Explorer, choose Tools, then Windows Update.

It’s critical to download patches to Windows operating system regularly. Hackers exploit weaknesses found in Windows so unless you download and install patches you will be vulnerable. Set Windows to automatically check for updates. If you are on dialup, you can set it to notify you of available updates but ask you when to download and install them. This allows you to schedule the download when it’s most convenient to you. Just be sure to install updates as soon as possible.

Can I use Farm Works software on my IPad?

No. Farm Works Office solutions and Farm Works Mobile run on Windows® OS (Operating Systems).  You can find apps for Remote software that would allow you to control your desktop computer remotely with a smart phone or mobile device like an IPad or other tablet (even another desktop PC).  Depending on what you want to accomplish this may work for you but there would be limitations.  Check out these links for a few remote software options:
http://www.splashtop.com/remote
http://www.parallels.com/products/mobile/

http://www.teamviewer.com/en/index.aspx

http://www.vmware.com/products/fusion/overview.html

 

Leave a Reply

Your email address will not be published. Required fields are marked *