Friday, June 16, 2017

Welcome to Computer-Ease corner, 1st thank you for the opportunity to serve you.
Been a full mobile computer shop you benefit by not having to break down the computer and bring it to the shop. We bring the shop to you so we get to see the full scope of the problem (so many times when you bring the computer to the shop it works perfectly). With over 30 years in computer's we will provide you with the best professional & repair service with out breaking your wallet. 

If you are viewing this blog in IExplore the page wont display right!  Firefox and Google Chrome will display it right. This is just a another case of MS IExplore incompatibility, the side bar information is on the sale page. The blogger team on Google are working on this, so, if you have a blog on blogger relax----your good! 

On the Run and need computer work done! You can text us to 219-225-8372 (no phone calls) this line will be open from 8 am to 9 pm 7 days a week. Keep your computer problem brief and leave your name and phone number. We will get hold of the same day or the next if after 10 pm
Our business cell line is 219-379-2719 open from 8am to 6pm


Visit our FB @
Our download site is up and running! 
We are still adding more articles, and  How to's, The Hard to find utility programs page is still under construction. Examples of modifying pictures, colorizing old black and white pictures are now available for viewing.

Our sale page is up and running on this web site. Check out our new item's for sale!

Here are some Corel Photo-Paint 12 examples on the side bar.

We have left on our site Microsoft Patch's for all you users out there.

Keep tab on us on your mobile phone/pda!
Type this or click on it in your mobile browser and bookmark it;
This new feature is formatted for all mobile phones

Have a question about our service, prices or want to schedule a appointment for us to come out, then e-mail us at;

or call us at:

mobile phone:  219-379-2719 

If e-mail then make sure to include your name, were you live and phone number if you want a return call.

Hey! While you are at it, go to Di'Mon ( our Corporate site to see the rest of the services we offer.

secure mailing address;

P.O. Box 8619
Michigan City In 46360


iPhone Homemade Wallpaper

Here is a simple way to create your lock screen wallpaper for the iPhone (in this case for a iPhone 4s) using Paint in Windows 7.

1: open paint and select Resize. In the menu unclick "Maintain Aspect Ratio" and change to Pixels. Now enter the pixels size shown in the picture.

2: select your picture and right click on it and on menu that will pop up select Edit.

 3: Windows will open a second Edit, go to View and click one or two times (depend on size of picture and monitor size)

4: Click on select (as shown in picture 4) what you want and select Crop. Now at this point you can reselect and copy then paste to Paint window 1 or do the resize as described in step 1
Special note... You can open another windows paint with out loosing whats on windows paint 1

5: When done click at the lil icon on the top left hand side (above the tablet icon) select “Save as” then select JPEG picture. A window will pop up name it then save it.

After up loading it to the your iPhone this is how it looks!

Note.... In your iPhone wallpaper you will have room to adjust your new wallpaper as shown on my iPhone below.

 I use 4Shared to transfer to and from my iPhone, it is on iTunes Apps, go to for windows version

Are  you been spyed on??

article by Posted on July 19, 2015 by Sean Adl-Tabatabai in Technology

If you’re worried about your privacy, here’s a list from EPIC that can help you audit your chances of staying anonymous.
Google Chrome

The browser is reportedly able to remotely install code that allows the software to listen to users without their knowledge. The code was originally designed to support Chrome’s new “OK, Google” hotword detection, which activates a computer response when you talk to it. However, some users claim the code was installed and activated on their computers without them giving their permission.

Google responded to these complaints on its Chromium developer boards. “While we do download the hotword module on startup, we do not activate it unless you opt in to hotwording,” the company wrote. Some developers question this claim.

Samsung SmartTV

The Samsung SmartTV has a built-in microphone that is equipped with voice recognition technology that allows users to give verbal commands to the TV. In order for Samsung to convert your speech to text, the voice commands are sent over the Internet to a third-party for interpretation.

However, since the TV is “always on,” the microphone is recording every word you’re saying at all times. Even in its SmartTV privacy policy, Samsung acknowledges that all spoken words, including personal or other sensitive information, are sent unencrypted to the third party.

Nest Cam

This Internet-streaming home security camera is a product of Nest Labs, which is now owned by Google. The camera comes with a microphone and streams video and sound directly to a consumer’s smart phone in real time. With the Nest “Aware” app, Google can record and save up to 30 days of video and audio.

Using the recording, the camera has the ability to alert users when an “unusual sound” is detected. Nest has the capability of distinguishing between unknown or known voices, which is an important security feature. But privacy advocates are fearful because the company does not disclose how the technology works or how much information the company collects.

Canary Connect

Canary Connect is another company that develops Internet-connected home security systems. The security device can store audio and video recordings from inside a user’s home for 90 days and can be set to one of three modes — “armed,” “disarmed” and “privacy.” Unless the device is in “privacy” mode, it will automatically begin to record when triggered by motion.

Users have complained that there isn’t an easy way to determine what mode the device is in. In addition, the interface doesn’t notify consumers when it is switching modes.

Microsoft’s Kinect

Microsoft has installed its “always on” voice and motion recorder, called Kinect, in its Xbox videogame consoles. When users say the word “Xbox,” the Kinect tracks and records the users’ voice and hand gestures in order to follow commands. In order for the device to know when to turn on, the console monitors conversations at all times.

Amazon Echo

Amazon Echo, like other voice-activated computer programs, is triggered awake by the word “Alexa.” The device is constantly listening in on household conversations for the word, which then triggers the system to record and stream the recording to Amazon’s cloud for processing and storage. Amazon has not revealed what data the system collects and if it saves conversations or words said before “Alexa.” In addition, various companies are in the process of incorporating Alexa into their Internet-connected devices. Amazon has not revealed how much information it will have access to once these other companies begin to collect their own data.

Mattel’s “Hello Barbie”

A new high-tech Barbie has sparked a furious outcry from the advocacy group Campaign for a Commercial-Free Childhood. Through a Wi-Fi connection and a built-in microphone, the new Barbie is able to hold conversations with a child. Critics, in addition to the privacy concerns, are worried that Mattel is exploiting the children and using them for financial gain because they can learn the child’s likes and dislikes. Mattel counters that there are safety precautions put in place and that the toy fills a niche for children who want to be able to speak with their Barbie.

Well, just had my 1st encrypted computer come to my bench and what a mess. This particular one all so had a relentless virus with it, the victim of the attack were documents and pictures (mainly JPG’s). The program tells were to go on the internet to pay for the release key and yes my client has been extorted for money. So, what did I had to do? Salvage as many pictures that were not encrypted and wipe to whole hard drive clean and install windows from scratch. The educated guess is my client go it through an e-mail. So some DO’s and DONT'S

Do not open emails you don’t recognize
Do not download “FREE SOFTWARE” for that free game.
Do not download music, pictures or software from sites like Frostwire, Torrents sites, etc

 Do back up your pictures,documents and passwords on a regular basis, so, in case of computer doom you have not lost anything.
Do have a good antivirus that will scan the internet when your on it, scan email and any and all installs, downloads and pictures. Some good ones are Avast, Avg, Bullgard are free.
Do download your music from solid reputable web sites like Amazon,, (if your in karaoke it ranges from $1 to $3 a track, downloads are in bin files) just to name a few
Do consult with your tech if the game you want to download is safe and what safety measures you need to take on the install.

We techs across the country take pride in our profession and we care for our customers.


In today's world when it comes to Computers & Smartphones one has to be very careful. "Why?" You ask! there is a scammer in every turn of the corner. The following you might get it in your E-Mail....

"Dear Sir/Madam,

I am Joseph, Business
Development Manager.

We are an India based Website designing/application development company with our primary focus on making websites that are easy to update and manage, such as Shopping carts and Content Management Systems.

We have our competency in CMS (Joomla, Modx, Mambo and other quality Content Management System) and e-commerce website.

We offer dedicated developers for as low cost. The developers would assist you to get desired web solutions with impeccable standards of work. You can hire developer from us Web Development, AJAX Development, XML Development, Wordpress Development, Joomla Development, CMS Development, eCommerce Development, Magento Development, X-Cart Development and Mambo Development, PSD To HTML/XHTML/HTML5 Designing, Template Design, Landing Page, Jquery, Emailer Design and Flash Logo Design.

As many as 90% websites do not bring business to their potential because they do not appeal to the target audience. And the reason most visitors leave a website is because of a complex design and navigation

With an experience of developing more than 2500 websites successfully, we can help you earn more business from your website if you are ready to redesign your website. Most of our clients have benefited from our expertise. Most firms from UK, USA, Canada and Australia overseas have achieved a significant amount of savings by outsourcing either complete or part of their work to us in India.

With more than 50 developers working for us, we offer:

- Reduced cost
- Flexibility
- Freedom
- Assured deliverability
- Ease of communication
- Greater control over time management.

We wish you the best of luck and looking forward to a long and healthy business relationship with you.

Contact us today to know more about our Web design, re-design, development and CMS Services and about our past work details, Client Testimonials, Packages?

Getting started is easy. Just mail us at and we will definitely help you to achieve your business goals and objectives.

Please share your Skype id and contact number to make the communication easily assessable.

I look forward to your reply.

Best regards

Designing & Development Department

If you do get something like this, then look for the disclaimer below the email. If you see one most likely then it is a scam, even thou it may look legit. These email disclaimer's are tag on by your email provider like the example below.



  The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those, who send commercial email, spells out penalties for spammers, and companies whose products are advertised in spam if they violate the guidelines, and gives consumers the right to ask emailers to control it. The above mail and we ensure you will not receive any such mails.

If you need a web site, blog site or some sort of computer repair then 'PLEASE' do get hold of your local computer tech.

Any questions? Then post your questions on our Facebook page or click on Herb!


Cruising The Net....



Some keyboard’s have a very nice feature, A Shut Down Key! Well. If you are running Windows 8 or 7 you can program any key on any keyboard to be a shut down key. The following article By Greg Shultz from TechRepublic shows you how to do it. I test it out on my Windows 7 home edition computer and it works great.

This a edited version, for the full article click the link below………….

Since not everyone has a keyboard with programmable hot keys, I’ll start with the shortcut method. In the article
about integrating a Shut Down menu into the Desktop context menu, I showed you a table containing eight command
lines that perform all the options typically associated with terminating an active session. For your convenience, these
eight command lines are shown in Table A.

Table A: Command lines that perform all the options typically associated with terminating an active session

Command Command line

Restart                            Shutdown -r -f -t 00
Shut Down                      Shutdown -s -f -t 00
Hybrid Shut Down        Shutdown -s -f -t 00 -hybrid
Sleep                               Rundll32.exe powrprof.dll,SetSuspendStateSleep
Hibernate                       Shutdown -h
Lock                                Rundll32 User32.dll,LockWorkStation
Sign Off                          Shutdown -l
Switch Users                  Tsdiscon.exe
While you can use any or all of those command lines with this technique, I’ll just stick with the Shut Down command for this example. So, if you right-click on the Desktop and select the New | Shortcut command, you can create a shortcut using Shut Down command line, as shown in Figure A.

Figure A

Shut down Windows 8 from the keyboard

When the Create Shortcut wizard prompts you, enter the command line to shut down window.
Once you have created the shortcut, right-click on it and select the Properties command. When you see the Properties dialog box, select the Shortcut key text box and press the key(s) that you want to use to shut down your Windows 8 system. Of course, you’ll want to use an odd keystroke combination that won’t interfere with other existing keyboard shortcuts and will not be easy to accidentally press. As you can see in Figure B, I have used [Ctrl] + [F12].

Well I hope this help you in some way, got a question or remark then please e-mail us


Mounting a Acer R1600 to a Monitor -- The Frugal Way!

I have been told I'm cheap! Raised by a Jewish step Mom the proper word is FRUGAL! I have this Acer R1600 that I up graded to windows 7, bump up the memory to 4 gb and installed a laptop wireless card with a interior antenna. And wanted to mount it behind a LCD Monitor, but, the mounts made for Acer R1600 series range from $19 to  $45 (plus shipping) and frankly money is tight, so.....  I went to the bench and let the mind juices work.
After a few "prototypes" came up with the most easy way to mount it... Blank PC Case Brackets!

As you see by the pictures its straight forward, just place the bend of the bracket in the faceplate grove and mark it. Bend it, drill a hole (as seen in the 1st picture) and screw it in. Angle it as seen in picture one & two then slide the Acer in.


Re-Posted by popular demand! 

You can send text messages from your computer by doing the following steps:

1. From any email account, in the To field, enter the email address as the 10 digit phone number of the person you want to send a message to followed by the carrier's address. If they reply, their message will go straight to your email inbox. Some examples are below:

[10-digit phone number]


AT&T (formerly Cingular)

[10-digit phone number]

[10-digit phone number] (MMS)

[10-digit phone number]


Boost Mobile

Nextel (now Sprint Nextel)

[10-digit telephone number]


Sprint PCS (now Sprint Nextel)

[10-digit phone number]

[10-digit phone number] (MMS)



[10-digit phone number]


US Cellular

[10-digit phone number] (SMS)

[10-digit phone number] (MMS)



[10-digit phone number]

[10-digit phone number] (MMS)


Virgin Mobile USA

[10-digit phone number]


____________________________________________________ _____
8 free wifi hotspots in Michigan City

Lakeshore Coffee & Specialties
444 Wabash St
Michigan City, IN 46360

Michigan City Campground
1601 US 421
Michigan City, IN 46360

Comfort Inn Michigan City
I-94 & Hwy 421
Michigan City, IN 46360

Comfort Inn Michigan City
I-94 & Hwy 421
Michigan City, IN 46360

800 N Flynn Rd
Westville, IN 46391
McDonald's restaurants are one of the easiest spots to

find free WiFi, with over 11,000 M...

Bob Evans Restaurant
3936 Frontage Rd
Michigan City, IN 46360

Microtel Inn & Suites Michigan City
9834 W 400 N
Michigan City, IN 46360

5816 S Franklin St
Michigan City, IN 46360

Buffalo Wild Wings Grill & Bar
5000 S Franklin St
Michigan City, IN 46360

Hampton Inn Michigan City
4128 S Franklin St
Michigan City, IN 46360

Michigan City Franklin & Rte 20 Starbucks
4103 S Franklin St
Michigan City, IN 46360

As we find more hotspots in Michigan City we will post them and if you find one not listed here, please do let us know

We now have a
download site! We will be adding past how to articles, pictures and tips. Look at the side bar and click on Josh!
Don't forget to do
wnload our Rolodex card for your file.

When Lightning Strikes! 

Publishers note:

I have been in this business for over 20 yrs and I can emphatically say “LIGHTNING HAS A MIND OF ITS OWN!” I have seen systems with 4 power surge protectors and lightning came trough the electrical socket jump all 4 protectors and fry the computer. When a thunderstorm rolls in and there is lightning with it, the only sure protection is to unplug the whole system.
A picture is worth a thousands words!

Do you have sensitive data on that old computer you are trashing!

If you do then call us for full wipe of the hard drive! A mere format or delete of the hard drive will not wipe clean or permanently. There are programs that allow you to lift up data from a hard drive even if it has been formatted! The software we use is used in the security field for it's permanent clean. The hard drive will be just like it came from factory, with nothing in it.
$25 will get your old computer's hard drive permanently wiped!

Call or email us today!
If you would like to purchase a ready made CD of Ubuntu, Debian or Puppy Linux for $4.99 (plus shipping and handling) contact me at
Order your Puppy Linux on a flash drive and take it on the road! Just plug it in any usb port! Email us for prices.
Prices may vary on the cost o
f the usb flash drives

Our Sale Catalog link is in the sidebar. All the items listed are trade-ins or taking off other computers. All are priced to be easy on your wallet, if any installation cd is available we will included it with the hardware.

Got a pair of 3-D glasses? You know the kind left eye is red and right eye blue if you do put them on and look our 2nd 3D picture below. 
You can do this with Callipygian 3D