Give Up Those Seven Bad Technology Habits

You go for a walk, pray everyday, brush your teeth twice a day, and pay the taxes due in time. In simpler terms, you are brimming up with good habits. However, when technology comes into the picture, we seem to be going the other way around. Are you aware of the fact that cluttering your desktop with different icons, saving your passwords in a notepad, and making incomplete backup once in a month, are actually some of the bad technology habits? There are a number of more bad technology habits that people tend to be going on with it, without realizing the harm that you are doing to your personal computer.

The good news is that you can always fix your bad technology habits for managing your desktop computer with the same amounts of care and acumen that you practice while taking care of your body.

Bad Technology Habit #1: Cluttering Your Desktop With Too Many Icons

Ever seen the desktop of your computer appearing to be the interior of a scrapped drawer, with icons scattered from one edge of the monitor to another? Do you feel you would be able to find a single program in such a mess? Well, if you really need something worth for organizing the desktop of your computer, a try needs to be given to Fences of Stardock. This free of charge utility allows you to enclose all the icons in semitransparent kinds of pens of desktop, thus, helping you to minimize the mess and enhancing the arrangement of the icons. Fences provide a consistent platform to you to sort and arrange the icons in an automated manner. It is more like having a maid sweeping and cleaning the entire desktop of your computer.

To find the best option for avoiding the clutter completely from the desktop of your computer, double click on the open space on the desktop and see how the Fences conceals all the icons and leaves behind only the useful ones to be viewed. A repetition of double-click would everything back in its place. Hence, it is now possible for you to view your elegant wallpaper of the desktop without the need to sending all the unwanted icons to the Recycle Bin.

Bad Technology Habit #2: Shutting The System Down By Means of The Power Button

When you are through with the entire tasks on your computer or laptop, you generally use power key for shutting it down, isn’t it? Here you need to go to a little slow. On a number of systems, the default function of the power key is to get the system to the sleep mode. That is however, not a bad practice always: it takes a few seconds for a sleeping system to resume operation, which is generally considered to be extremely handy. Apart from this, if you are relying solely on sleep mode, your personal computer would hardly get an opportunity to reboot your computer and rebooting are extremely imperative to help your system function effectively.

For banishing this bad technology habit, you just need to alter the function of the power key of your system so that whenever you press it shuts the system down instead of getting it into the sleep mode.

(Ideally, if your system has been locked and there is no other option to reset it, only then you should hold the power key for turning your system off.)

Bad Technology Habit #3: Saving All Your Passwords In A Notepad

People are generally of the habit that they at first come up with a password that is hackproof for using it to login in the website of their bank and then save the copy of the password in a notepad, or in an excel spreadsheet, in a word document, outlook note, etc. Doing this, they end up with the entire protection process.

A password manager is needed here instead. A password manager is a dynamic database to record in private and confidential data like PINs, social security numbers and passwords. We generally tend to be partial to the LastPass that offers secured passwords and executes them when you visit different websites, organizes some or the entire data which you want to store, and synchronizes different devices and platforms thereby, giving you maximum access to your passwords no matter what time it is or where you are located at the moment. LastPass is amazingly free of cost; however, you would have to upgrade the Pro edition on a monthly basis at a charge of one dollar per month in case you want to have the iPhone, Blackberry, Windows Mobile, Android or Palmpre apps.

Bad Technology Habit #4: Launching The Programs With The Mouse

This is one of the most common habits that people resort to every time they want to run a particular program on their computer. There is a better option to this, though it has been rarely known by the people. You can simply launch almost any program in Windows 7 going to the rightmost end of the Start button by means of a certain number and the windows key.

For instance, that icon there in the taskbar which is nearest to the button of Start is generally connected to number 1. Hence, by pressing the windows key with 1, you can easily launch the program directly with the help of your keyboard. Pressing the windows key with number 2 on the other hand, would be for clicking on the next icon and so on and so forth.  This procedure works at the best for the very first 9 icons that are linked to the taskbar of Windows 7.

Bad Technology Habit #5: Quipping Your System With A Decoded Flash Drive

Flash drives stand to be excellent for transferring data from one system to another, but you can very easily lose the data stored on them, which would lead you into serious trouble. This vulnerability can, however, be fixed if you deploy TrueCrypt on your system. TrueCrypt is actually an open-source utility for encryption that helps you to protect your data on the flash drive with the help of a password.

TrueCrypt functions on-the-fly, which means that it encodes and decodes the data while you are accessing it. (The software functions with single files as well along with complete hard drives if you extend to your laptop with your bad technology habits.) In case of providing the wrong encryption key or password, your data would stay locked due to being coded with different safe encryption algorithms. TrueCrypt is extremely user-friendly and exhibits complete transparency as soon as it starts functioning.

Bad Technology Habit #6: Constantly Clicking the “Next” Button At The Time Of Deploying Some Kind Of Software

Ever thought that how do some unknown and new icons get on to your desktop? How come some mysterious toolbars are there in your browser? How on earth some spyware had managed to get into your system? This all happened because you let them happened.

In case you have deployed more than a handful of softwares from the time you are using systems, you have possibly got into the habit of clicking the “Next” button automatically whenever some software has been thrown to your way. During the entire process of installation, a number of programs give you the option whether you want to install them or not, let us take for example, the trial version of some games, or may be a new toolbar for your browser. If you keep on clicking across the installation screens blindly, approving for different programs every now and then, it is possible that you would miss the opportunity to get something out of these offers, and you would end up getting the things on your system which you possibly don’t want to have.

Bad Technology Habit #7: Running The System On One Backup System

A number of users who bear the problem of relying on a sole backup system, and that too the one that is not in a good condition, like transferring the items stored into My Documents to a blank CD, or running a particular backup software without having the knowledge of how to get the files back in case the system crashes.

All you need to have is a versatile backup method that would encompass all the bases of your system. For copying the contents of the primary drive, you need to take the help of an external hard disk and combine it with a program that would perform the function consistently. Thereafter sign up for an online version of a backup program that in an automated manner record all the crucial data in the backdrop while you are busy working.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.