<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[Computer Tech - Computer Repair in Kalispell, Bigfork, Lakeside - Tech Tip]]></title><link><![CDATA[http://www.computertechmt.com/techtip]]></link><description><![CDATA[Tech Tip]]></description><pubDate>Mon, 06 Apr 2026 07:34:25 -0600</pubDate><generator>Weebly</generator><item><title><![CDATA[Tech Tip - January]]></title><link><![CDATA[http://www.computertechmt.com/techtip/tech-tip-january]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/tech-tip-january#comments]]></comments><pubDate>Tue, 15 Jan 2019 03:46:31 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/tech-tip-january</guid><description><![CDATA[Ctrl+Tab &ndash; Part 2&nbsp;Press Ctrl+Tab to switch between tabs in a program. For example, if you have multiple tabs open in your Internet browser, (Firefox, Chrome, etc.) press Ctrl+Tab to switch between them. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">Ctrl+Tab &ndash; Part 2&nbsp;Press <strong>Ctrl+Tab</strong> to switch between <a href="https://www.computerhope.com/jargon/t/tab.htm">tabs</a> in a program. For example, if you have multiple tabs open in your Internet browser, (Firefox, Chrome, etc.) press Ctrl+Tab to switch between them.<br /></div>]]></content:encoded></item><item><title><![CDATA[Tech Tip - December]]></title><link><![CDATA[http://www.computertechmt.com/techtip/tech-tip-december]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/tech-tip-december#comments]]></comments><pubDate>Thu, 20 Dec 2018 03:14:43 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/tech-tip-december</guid><description><![CDATA[Alt+Tab or Ctrl+TabPressing Alt+Tab switches between open programs moving forward. For example, if you have your browser window open and other programs running in the background press and hold Alt and then press the tab key to cycle through each open program.On Apple computers instead of using the Alt key use the Command (Cmd) key. For Example, Cmd+Tab to switch between open programs. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong>Alt+Tab or Ctrl+Tab</strong><br />Pressing <strong>Alt+Tab</strong> switches between open programs moving forward. For example, if you have your browser window open and other programs running in the background press and hold Alt and then press the tab key to cycle through each open program.<br />On Apple computers instead of using the Alt key use the Command (Cmd) key. For Example, <strong>Cmd+Tab</strong> to switch between open programs.</div>]]></content:encoded></item><item><title><![CDATA[Tech Tip - November]]></title><link><![CDATA[http://www.computertechmt.com/techtip/tech-tip-november]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/tech-tip-november#comments]]></comments><pubDate>Thu, 01 Nov 2018 06:00:00 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/tech-tip-november</guid><description><![CDATA[Ctrl+FPressing Ctrl+F opens the Find field, which allows you to search the text currently displayed in any program that supports it. For example, Ctrl+F can be used in your Internet browser or word processor to find text on the current page.On Apple computers, use Cmd+F for find. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong>Ctrl+F</strong><br />Pressing <strong>Ctrl+F</strong> opens the Find field, which allows you to search the text currently displayed in any program that supports it. For example, Ctrl+F can be used in your Internet browser or word processor to find text on the current page.<br />On Apple computers, use <strong>Cmd+F</strong> for find.</div>]]></content:encoded></item><item><title><![CDATA[Tech Tip - October]]></title><link><![CDATA[http://www.computertechmt.com/techtip/tech-tip-october]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/tech-tip-october#comments]]></comments><pubDate>Tue, 23 Oct 2018 14:39:25 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/tech-tip-october</guid><description><![CDATA[Ctrl+Z and Ctrl+YPressing Ctrl+Z will undo any change. For example, if you cut text, pressing this key combination will undo the cut. These shortcuts can also be pressed multiple times to undo or redo multiple changes. Pressing Ctrl+Y would redo the undo.On Apple computers, use Cmd+Z and Cmd+Y to undo and redo. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong>Ctrl+Z and Ctrl+Y</strong><br />Pressing <strong>Ctrl+Z</strong> will <u>undo</u> any change. For example, if you cut text, pressing this key combination will undo the cut. These shortcuts can also be pressed multiple times to undo or redo multiple changes. Pressing <strong>Ctrl+Y</strong> would <u>redo</u> the undo.<br />On Apple computers, use <strong>Cmd+Z</strong> and <strong>Cmd+Y</strong> to undo and redo.<br /></div>]]></content:encoded></item><item><title><![CDATA[Tech Tip – August]]></title><link><![CDATA[http://www.computertechmt.com/techtip/tech-tip-august]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/tech-tip-august#comments]]></comments><pubDate>Tue, 14 Aug 2018 03:21:12 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/tech-tip-august</guid><description><![CDATA[Keyboard Shortcuts Everyone Should Know &ndash; Part 1Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, to copy text, you can highlight text and press the Ctrl+C shortcut. The shortcut is faster than moving your hands from the keyboard, highlighting with the mouse, choosing copy from the file menu, and then returning to the keyboard. Below are some of the top keyboard shortcuts we recommend everyone memorize and use [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong>Keyboard Shortcuts Everyone Should Know &ndash; Part 1</strong><br />Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, to copy text, you can highlight text and press the Ctrl+C shortcut. The shortcut is faster than moving your hands from the keyboard, highlighting with the mouse, choosing copy from the file menu, and then returning to the keyboard. Below are some of the top keyboard shortcuts we recommend everyone memorize and use.<br />Ctrl+C or Ctrl+Insert and Ctrl+X<br />Both Ctrl+C and Ctrl+<a href="https://www.computerhope.com/jargon/i/insert.htm">Insert</a> will copy <a href="https://www.computerhope.com/jargon/h/highligh.htm">highlighted</a> text or a selected item. If you want to <a href="https://www.computerhope.com/jargon/c/cut.htm">cut</a> an item instead of copying it, press Ctrl+X. This action removes the text or item and stores it in the clipboard for you, rather than just <a href="https://www.computerhope.com/jargon/c/copy.htm">copying</a> it to the clipboard while leaving the original behind.<br /><a href="https://www.computerhope.com/comp/apple.htm">Apple</a> computer users can substitute the Ctrl key for the <a href="https://www.computerhope.com/jargon/c/commkey.htm">command (cmd) key</a> on their computers. For example, pressing Cmd+C copies highlighted text.<br />Ctrl+V or Shift+Insert<br />Both the Ctrl+V and Shift+Insert will <a href="https://www.computerhope.com/jargon/p/paste.htm">paste</a> the text or object that's stored in the <a href="https://www.computerhope.com/jargon/c/clipboar.htm">clipboard</a>.<br />On Apple computers, use Cmd+V instead.<br /></div>]]></content:encoded></item><item><title><![CDATA[July Tech Tip]]></title><link><![CDATA[http://www.computertechmt.com/techtip/july-tech-tip4546145]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/july-tech-tip4546145#comments]]></comments><pubDate>Fri, 06 Jul 2018 22:17:44 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/july-tech-tip4546145</guid><description><![CDATA[Malware Prevention&ndash; Part 2There are several general best practices that organizations and individual users should follow to prevent malware infections. In Part 1, we discussed anti-malware and firewall software. &nbsp;Following are three more keys to malware prevention.Keep software and operating systems up to date with current vulnerability patches. These patches are often released to patch bugs or other security flaws that could be exploited by attackers.Be vigilant when downloading file [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong>Malware Prevention&ndash; Part 2</strong><br />There are several general best practices that organizations and individual users should follow to prevent malware infections. In Part 1, we discussed anti-malware and firewall software. &nbsp;Following are three more keys to malware prevention.<br /><ul><li>Keep software and operating systems up to date with current vulnerability patches. These patches are often released to patch bugs or other security flaws that could be exploited by attackers.</li><li>Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or are from an unfamiliar source often contain malware.<br /></li><li>Backup, Backup, Backup!&nbsp; Create a routine backup of your files either on an external drive or preferably offsite via the cloud.<br /></li></ul></div>]]></content:encoded></item><item><title><![CDATA[June Tech Tip]]></title><link><![CDATA[http://www.computertechmt.com/techtip/june-tech-tip]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/june-tech-tip#comments]]></comments><pubDate>Wed, 06 Jun 2018 23:19:57 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/june-tech-tip</guid><description><![CDATA[Malware Prevention&ndash; Part 1There are several general best practices that organizations and individual users should follow to prevent malware infections. Some malware cases require special prevention and treatment methods, but following these recommendations will greatly increase a user&rsquo;s protection from a wide range of malware:Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multip [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong>Malware Prevention&ndash; Part 1</strong><br />There are several general best practices that organizations and individual users should follow to prevent malware infections. Some malware cases require special prevention and treatment methods, but following these recommendations will greatly increase a user&rsquo;s protection from a wide range of malware:<br />Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. At the minimum, anti-malware software should protect against viruses, spyware, adware, Trojans, and worms. The combination of anti-malware software and a firewall will ensure that all incoming and existing data gets scanned for malware and that malware can be safely removed once detected.</div>]]></content:encoded></item><item><title><![CDATA[May Tech Tip]]></title><link><![CDATA[http://www.computertechmt.com/techtip/may-tech-tip]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/may-tech-tip#comments]]></comments><pubDate>Mon, 07 May 2018 13:06:22 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/may-tech-tip</guid><description><![CDATA[Spam is the electronic sending of mass unsolicited messages. The most common medium for spam is email, but it is not uncommon for spammers to use instant messages, texting, blogs, web forums, search engines, and social media. While spam is not actually a type of malware, it is very common for malware to spread through spamming. This happens when computers that are infected with viruses, worms, or other malware are used to distribute spam messages containing more malware. Users can prevent gettin [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">Spam is the electronic sending of mass unsolicited messages. The most common medium for spam is email, but it is not uncommon for spammers to use instant messages, texting, blogs, web forums, search engines, and social media. While spam is not actually a type of malware, it is very common for malware to spread through spamming. This happens when computers that are infected with viruses, worms, or other malware are used to distribute spam messages containing more malware. Users can prevent getting spammed by avoiding unfamiliar emails and keeping their email addresses as private as possible.</div>]]></content:encoded></item><item><title><![CDATA[April Tech Tip]]></title><link><![CDATA[http://www.computertechmt.com/techtip/april-tech-tip]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/april-tech-tip#comments]]></comments><pubDate>Tue, 27 Mar 2018 03:06:48 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/april-tech-tip</guid><description><![CDATA[Malware Symptoms - While types of malware differ greatly in how they spread and infect computers, they all can produce similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms:Increased CPU usageSlow computer or web browser speedsProblems connecting to networksFreezing or crashingModified or deleted filesAppearance of strange files, programs, or desktop iconsPrograms running, turning off, or reconfiguring themselves (malware will often reconfigure or t [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">Malware Symptoms - While types of malware differ greatly in how they spread and infect computers, they all can produce similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms:<br /><ul><li>Increased CPU usage</li><li>Slow computer or web browser speeds</li><li>Problems connecting to networks</li><li>Freezing or crashing</li><li>Modified or deleted files</li><li>Appearance of strange files, programs, or desktop icons</li><li>Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs)</li><li>Strange computer behavior<br /></li></ul>Emails/messages being sent automatically and without user&rsquo;s knowledge (a friend receives a strange email from you that you did not send)</div>]]></content:encoded></item><item><title><![CDATA[February Tech Tip]]></title><link><![CDATA[http://www.computertechmt.com/techtip/february]]></link><comments><![CDATA[http://www.computertechmt.com/techtip/february#comments]]></comments><pubDate>Tue, 27 Feb 2018 03:52:32 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.computertechmt.com/techtip/february</guid><description><![CDATA[Computer Tech Tip &ndash; FebruaryA virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs. Viruses can also spread through script files, documents, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal mone [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">Computer Tech Tip &ndash; February<br />A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs. Viruses can also spread through script files, documents, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisements, and more.</div>]]></content:encoded></item></channel></rss>