Mike's PC Support

onsite and in home computer repair and support Melbourne Fl, Viera, Suntree Rockledge and merritt Island
  • Facebook
  • Google+
  • Twitter
  • RSS
  • Home
  • About Mike’s PC Support
    • Residential computer repair
    • Computer and notebook repair
    • Small Business Services
  • Customer Reviews
  • labor rates
  • Service Area
    • Computer repair Melbourne FL
    • Computer Repair Palm Bay
    • Computer Repair Rockledge
    • Cocoa Beach Computer Repair
    • computer repair cocoa fl
    • computer repair Merritt Island Fl
  • Computer Tips and Tricks
  • Remote Support
  • Contact

Problem with Gmail Attachments showing up as zip files – solved

May 7, 2015 / Mike Odom / Computer Repair, email, gmail, Information Technology, Technology, zip files

The following desribes how the problem was solved. If you want to jump to the solution, just scroll down.

I recently had a customer call me complaining that his Gmail account had a problem were all email with attachments showing up as zip files. That is, any email that had an attachment, the attachment(s) were showing up as a text file attached. The text file was meaningless and if you downloaded the attachment, it would show as a zip file. Of course this can be very frustrating when you know that there should be some pictures or some type of a document attached, but you cannot get to it. We made an appointment for in home computer service because he also wanted me to optimize his system and clean up some programs that he no longer wanted.
A lot of my clients make lists for me so that when I arrive onsite, we can go down the list of computer problems and solve them one at a time. When I sat down at his computer desk, we went over the list, the Gmail issue was at the top of the computer solutions needed. He also noted that he had searched about this Gmail attachment problem and found several forums where people were having the exact same problem; one of these pages was the Gmail help forum. However, none of these pages seemed to have a solution to the problem. This customer had recently purchased the computer and he was not happy with Windows 7. His conclusion was that it had to be related to the new operating system. I assured him that it was not related to Windows 7 as I have been using it for over a year and I did not have the attachment problem with my Gmail. Reading over the forums quickly, I found that there were many others that had the same problem, but not everyone. This points to something wrong with these particular Gmail user settings.

To solve computer problems, you have to make deductions until you pinpoint the exact thing that is causing the user to have different results than others. I began to dissect the problem beginning with the browser. We downloaded and tried Mozilla Firefox browser, in which the problem was still occurring. To try my customer’s theory that is was the Windows 7 operating system causing the problem, I brought in my notebook which has VMware and XP Mode installed on it. This allowed me to quickly let my customer login to his Gmail account using Internet Explorer 6 on Windows XP. Again, we were looking at the same Gmail problem where attachments show up as zip files.
We have now ruled out any possibility of it being the operating system or browser. As I suspected, this will lead us to believe that it must be in one of the Gmail settings. Still, I could not help but feel that the solution had to be something deeper than just a mere setting. Otherwise the Google help team would have discovered what setting was wrong and posted the answer to all the cries for help on the web. Looking closely over all of the different tabs for Gmail account settings, I was still not able to come up with a reason why this was only happening to a few of the people out there. Trying different search terms brought us the same as before. No results with a solution to the problem and it appeared that not even Google had an answer. Reluctantly, I had to set the problem aside as I had never run into this Gmail zip attachment problem before. I made a promise to my customer that I would look into the issue and try to come up with a solution. After all, the oldest post asking for help on this was dated back to 2008 with no clear resolution in any of the following posts and this problem was being discussed in more than one place on the web.
After correcting the other minor issues on his computer and as I was preparing to leave, I reaffirmed that I would somehow get to the bottom of this for him. It was at this moment that my customer mentioned that he had used the Gmail software to setup the forwarding from his ISP POP email account. That was it. He said the magic term in order for me to understand where this problem was coming from. There had to be a glitch in the format that Google was using to pull email from the pop server. I sat back down and quickly corrected a problem that had been causing this man a problem receiving any emails with attachments for over a year. For those in the Gmail help forum, it had been close to two years. The short of it was simply to delete the forwarded email account from Gmail and then go in and forward the ISP pop mail from the web based account. I sent a test email with a picture attached and within a couple of moments his Gmail account had a new email from my IPhone with a picture attached. This time we could see the attachment and it would later be downloaded to his desktop as a image in .jpg format just as I had sent it. This clearly shows why it was only some of the Gmail users experiencing this problem and not all. Problem solved!
For those who have arrived at this page by either searching for the Gmail problem where you are receiving email attachments showing as zip files or from the Gmail help forum the solution is below. I will make an instructional video in the next day or so, but for now I have laid out a simple text explanation on how to fix this issue. Though I have in short terms described the problem and how to fix it above, it gives me great pleasure to give you step by step “how to” instructions.
Problem: your Gmail inbox is full of worthless email with attachments that you cannot see or download because they are visible on the web only as a text file and can be downloaded only as a zip file containing no more than a .dat file that does not contain the file sent to you.
Cause: the problem appears to have been caused by forwarding email from your ISP pop server account using the Gmail wizard to pull your email.
Solution: you will need to go to the web based email control panel and manually setup your POP email account to be forwarded to your Gmail account. This will normally be under your web based account tools or options. There will be a check box to enable email forwarding and then there will be a text box for you to input the email account you wish to forward it to. In this case, of course you will need to insert your Gmail account fully using the xxxxx@gmail.com. Next you will need to go to your Gmail account click on settings and then click on the tab labeled “accounts and import”. In the first section look for the email account you set up using the Gmail POP email wizard and delete it. You will not lose any of your inbox by doing so and on the same hand this will only work for future email received. Unfortunately, it will not correct any of the emails you have received prior to this correction. However, while you are in your ISP POP email web based account have a look and maybe you were lucky enough to have left a copy on their server that you will be able to see. Also, it will now be possible to forward those emails to your Gmail account individually and you will now be able to view them from within the Gmail side.
Note: this solution will only work if you have used the Gmail account wizard to forward your email into your Gmail. If you have not used this tool there is another problem all together for you.
Hope this helps all of those who have been waiting for Google to supply you with a solution.
Disclaimer: I do not give any guarantees on this solution and it is up to you to properly follow directions. If you cannot find the setting to forward your email from your pop server, please contact them before attempting this solution. If you are not clear on the instructions I have given, please wait for the video or you can contact me for remote support. I will be happy to help at my low remote support fee. Mike’s PC Support is not affiliated with Google and I do not work for Google. This solution has been provided as a guide to help and I cannot be held responsible for the outcome. Always have back up all of your important data before attempting any computer repair. Thanks for visiting!

[tags]gmail,pop server,email problem,attachments,zip files,computer help,how to article,remote support,mikes pc support,mike odom,melbourne,florida,computer repair,onsite,in home,brevard county,google[/tags]

email

Passwords are a necessary pain

May 7, 2015 / Mike Odom / Computer Repair, computer security, Information Technology, Technology

Security begins from the moment you boot your computer into the operating system. You have to enter a password to get on your computer desktop. You do have the security installed right? If not, we will be covering how to set up user accounts and password protect them in another article.

Okay, so now you have logged on to your computer desktop and you are ready to go to the Internet. Many sites require that you enter a user name and password to gain entry and identify yourself before proceeding. All secure web sites such as banks, credit card services and other financial institutions require strong passwords. Strong passwords contain at least 8 characters or more and must contain a upper case letter and a number in them. Even popular game sites such as Pogo or Cash Break require a password in order to play their free games. To make matters even more complicated, most financial sites require that you change your password every 60 days to prevent password theft.

A bit of password advice.

Never use the same password more than once
Never use passwords that are easy to guess, such as phone number or pet names
When possible use totally random letters and numbers
Use passwords that contain at least one special character such as @ or $
Always write you passwords down and keep them in a safe place away from prying eyes.
If you store your passwords on your computer in text file make sure to encrypt the document

So, now you are probably wondering how to perform all of these steps and keep your sanity. When I first started keeping my passwords at a level of higher security, I used a password generator and recorded them all in a password book. Today, I still have that very same password book with hundreds of pages and all organized alphabetically. The passwords I keep on my computer are all encrypted using a free program called axcrypt

However, I once found a program that had a master password and it would store all my passwords in one tidy spot. This program would even bring up the web site and input the information into the proper areas. The program was call autologon, but has no planned support for Vista. Recently I found a new program that does all of the things listed above and then some. Sticky Password will generate strong passwords for you, store them in a highly encrypted file and input the information on the site automatically. You can’t get much easier than that! The software sells for 24.95 and has a free trial download. If you have a lo of passwords to keep, I suggest you give this useful software a try.

Prevent the spread of viruses and infections

May 7, 2015 / Mike Odom / Computer Repair, Information Technology, onsite computer repair

31sanitizer_533

 

We have discussed the ways to keep your computer or laptop free of infections using quality anti virus software in the past and that is not what this article is about. Instead, I want to give you some food for thought about protecting yourself and family when it comes to having your computer serviced or repaired. During the course of a day, the IT Technician can easily come into contact with hundreds of items that have been handled by, moved, sneezed or coughed on that have active germs on them. He or she will also shake hands with customers, use telephones, keyboards and mice or come into contact with pets that can also spread germs. A question that probably never crosses your mind as the technician enters your home to work on your personal computer might be important; Do you know where his hands have been? As a matter of fact, I have learned by watching other technicians work, that this question never crosses their minds either. It should, be of concern for both you, the customer and the technician.

This issue can easily be addressed as I do it by habit. I carry a small bottle of hand sanitizer with me in my automobile and also have one on my work bench. It is a easy process to put a few drops on my hands before and after each job I complete throughout the day. I do this for your protection and mine. The process of hand sanitation is a simple, but important factor of caring about my customer. It goes unnoticed, but I think it is essential and hand sanitizer should be part of every good computer technician’s tool box. Rest assured that it is and will remain an important step that I take before I work on your computer in your home or at my work bench.

[tags]cleanliness, computer repair, customer care, IT Technician, computer service[/tags]

To be a Geek

May 7, 2015 / Mike Odom / Computer Repair, Geek, Information Technology, Technology

It is amusing some days to see the expression on a person’s face when I show up at their door for a on-site computer service call. Many times, these same people say “You don’t look like a geek” and to this I simply respond Thank You! I did not attend hundreds of hours in training along with the thousands of hours I have on the job to report to work wearing a name badge. I am a trained, professional and certified IT Technician, in simple terms I work on computers, notebooks and other items that fall under the class of information technology. It makes me feel good upon meeting a client for the first time that they do not see me as a geek.

It amazes me further to see so many companies today referring to their employees as a geek and then even push it further to require them to play dress up as part of an advertising gimmick. These people may as well have a job standing on a corner holding a sign and waving at cars. When it comes down to it folks, do you really want a geek working on your computer? Would you not feel better knowing that you have a qualified IT Technician troubleshooting your computer problems? Of course you would. This is not a trick question and the correct answer should have flashed in your mind before you even finished reading the sentence. I need to make it clear that this article is not aimed at any one person that may be or may have been employed as a geek. Furthermore, this article’s primary purpose is to educate the consumer while the possible danger of humour with even a chuckle or two. With that said, let’s proceed with a look into the world of the geek?

First off, let’s start with the definition of a geek. To be fair, I will use several different sources that define the English language as well as one that defines urban and slang versions of the same.

Webster’s Dictionary defines the word Geek:
“Function: noun
Etymology: probably from English dial. geek, geck fool, from Low German geck, from Middle Low German
Date: 1914

1 : a carnival performer often billed as a wild man whose act usually includes biting the head off a live chicken or snake
2 : a person often of an intellectual bent who is disliked
3 : an enthusiast or expert especially in a technological field or activity”

There are those that will argue that the only true dictionary of the English language is the Oxford. So, for my friends across the oceans here is the definition of Geek from the Oxford:

“• noun informal, chiefly N. Amer. 1 an unfashionable or socially inept person. 2 an obsessive enthusiast.

— DERIVATIVES geeky adjective.

— ORIGIN from the related English dialect word geck ‘fool’.”

Now as promised, we take a look at how the Urban Dictionary defines being a Geek:

“The term “geek” originally referred to the carnival performers whose act consisted of biting the heads off chickens and eating glass. Over time it came to be applied to anyone who got paid to do work considered odd or bizarre by mainstream society.

The term now enjoys a special status within the technical community, particularly among particularly knowledgeable computer programmers. To identify oneself as a “geek” indicates a recognition that most people still consider programming computers to be a bizarre act, along with a certain fierce satisfaction in being very good at their inglorious profession.

That most software geeks now easily earn twice as much as the average laborer just sweetens their defiant embrace of the term.

Note: Unlike the word “nerd,” which is always pejorative, “geek” often carries a positive connotation when used by one of the group. The use of the term by outsiders is considered insulting.”

Given all of the previous, I am sure you can understand why I prefer not to be referred to as a geek. I remain proud of the fact that time after time I am told that I do not look like a geek. Still, one has to wonder why there are so many companies that use this word in their name! I can not begin to list them all, but just naming a few with the most famous first: Geek Squad, Geeks To Go, Geeks On Call, Rent A Geek, Geeks Orlando and Geeks R Us. Soon all of the geeky names were gone and companies moved down to the lower level of desciptives using Guru and Nerd.

Another interesting fact is the amount of negative feedback toward the most popular of the geek business name, yet accordingly the money continues to roll in for the Geek Squad. I do not promote my business by jabbing others, however in this case the sources are unlimited and again I will point out that this is to educate the consumer.

Now in all fairness this is not the only video out there. It is just one that I randomly picked out of the may. Notice that most of the computer repair companies that they speak of have the word “geek” in their business name. Do you need a geek? Do you really want a geek working on your computer? I am not just picking on the squad here, I am in amazement of the multitudes of businesses that use the title or refer to their employees as a geek, nerd or guru. Once more, there are articles on web sites such as the rip off report where an ex-geek (is that a word?) tells that his role was to be a salesman first and admittedly only knew how to repair a computer by watching what the other geeks were doing.

Another point is that even to do these investigative reports, they had to lug this computer from shop to shop. This is how I created the slogan “pick up your phone, not your computer” tm. Why unplug your computer , load it in the car and drive half way around town to get your computer repaired? Having Mike’s PC Support come to your home or business to do the repairs just makes good cents. You save time and money, quite frankly you save money. We all know time is money. Next time you are in need of computer repair, don’t put yourself at the mercy of any of the geek stores. Look for a qualified and certified computer repair technician. Don’t pay unreasonable fees to companies that pay large advertising fees to be labeled as a geek, you don’t need a geek to get in home computer repair.

Now a quick look at the humorous side of the word geek

Call Mike at 321-652-5630 to speak to a IT professional.

Dell says math class over taxed their computers- the calculator Vs. the Dell Optiplex

July 7, 2013 / Mike Odom / Computer Repair, Information Technology, Technology

A news story that originally broke in the NY Times, has the tech world of blogs buzzing about the possible failing of a one time giant company. While the law suit is over three years old and Dell has attempted to pass it off as “old news”. Recently, documents have been unsealed that disclose that Dell employee’s may have known about the faulty computers that were being shipped. Many of the computers where customers complained enough were fixed. However, it appears that Dell chose to use the same faulty motherboards to replace the old ones.

The math department at the University of Texas noticed many of the computers they were using were failing. Enough so, that they brought the complaint to Dell. Dell’s answer was that they had over taxed the computers by working them to hard on big math calculations. Meanwhile, back at the corporate headquarters there was talk of the possibility of these particular Optiplex models shipped between 2003 and 2005 having issues with bad capacitors, but only a small percentage of those shipped were suspected to fail. Private investigation and recent audits point to the fact the Dell may have miscalculated the percentage.

Adding gas to the fire, even the company that was hired to defend Dell in the lawsuit were using said machines. To their surprise, Dell even “balked” them when they enlightened the company that they may just have a real problem on their hands. Seriously though, over 11 million machine were said to have been shipped out during this time frame and at this point we may not be able to rely on Dell to tell us exactly how may of them were the faulty Optiplex model. A quick check over at the Dell web site shows that the Optiplex is the model the company suggests for business use. It may not be recommended for an accountant though.

Many of the unsealed documents and emails have brought forward the inner workings of a one time respected company, after reading some of the documents and memos…Dell may be a long time recovering their reputation.

Is free music worth it? It can be by playing safe

September 7, 2010 / Mike Odom / computer security, Information Technology, Technology

It is a sad but realistic fact that over 70% of my on-site computer calls are trojan and virus related. One common item that is present over 60% of the time is the popular file sharing program LimeWire. Is LimeWire the carrier of hostile attacks on the home user computer? I think the numbers here speak for themselves. This is also obvious by doing a search on Google for limeWire trojan where you will see the many complaints of people that have either downloaded software infected with trojans or a trojan was installed with the program during installation. It should be noted that most of the complaints regarding the LimeWire software bundling adware with the program are of the older versions.

LimeWire claims to not have any type of spyware or adware bundled with their software and I would have to agree with that statement as of the latest version 4.18.6. However, LimeWire gives very good advice on how to safely use any type of P2P file sharing program. That being said, I want to clarify that I am not picking on LimeWire as a program. LimeWire is a very popular program for file sharing and along with this popularity comes many risks by using it. This program as well as any other P2P file sharing program can be used in a safe manor and can enable the home user to download many enjoyable hours of music and programs.

If you are going to use any type of P2P file sharing programs or download torrent files, there are some very strict security policies that you will need to put into place before using the program. As with all of my lessons in these pages I will try to keep the instructions as understandable to the common home computer user. If you have any questions or comments, please feel free to ask.

First, you must have installed, update and actively scan with good anti-virus and anti-spyware programs. The original concept of these type of programs were to share files by people over a network of friends. The files being shared were shared with others that you knew and could trust. However, today popular programs like these can have way over 1 million users, so there is just no way that you can know all of these users.

Before you even download any type of P2P program please be sure to have an anti-virus program installed and updated. I recommend webroot however their is also a free home version available. You can easily set this program to update automatically. Scan all of your download folders after each session and before using any of the files. This is especially true of program files. Best practice to use for program files is to copy them to a folder outside the program and scan that folder. Most of the file sharing programs will not let you install any other programs from within for just this reason. Program files are described as any file having the .exe, .vbs, .lnk, .bat, .sys, or .com.

Next, be sure to have anti-spyware programs installed and updated. I have two software recommendations to help protect your computer from the hostile attacks of trojans, spyware, adware and malware. The latest version (1.6.x) of Spybot Search & Destroy has seen much improvement over an already well written PC pest remover. If a machine I work on does not have this software installed on it when I get there, it does when I leave! That is how much I believe in this free product. Spybot S & D is user friendly for the home user, yet also has an advanced mode where certain options can be set to define how the program will interact with the owner after the initial setup. One of the big features of this program is that it allows the user to read about each of the problems found explaining what harm it can cause. I especially enjoy pointing this out when I am training my customers on the use of the security software that I install. Unlike many of the other techs in our area that just install the software, I make it a point to teach my clients how to update and use all of the anti-harm software I install on their computer. Make sure to use the update and immunize button on a regular basis when using this program for best practice. Note that this software is free, but does have a donation button. If you like the way it performs on your computer you might consider clicking that button. Unlike many other free programs, this one does not have or require any type of an upgrade and you will never see any type of an advertisement or nag asking you for money.

The next software I suggest works well with the two products above to create a computer security package that will not bog your computer down by using up precious resources. Download and install SuperAntiSpyware professional. This software has a free trial of the professional version or a free home user version. While both work well, the professional version has many advantages to it and is well worth the one time fee for the license. Real time protection and scheduled scanning with SuperAntiSpyware will help keep keep your computer free of trojans and spyware and is strongly suggested if you are going to be using any P2P programs.

Bottom line folks, you need this type of protection on your computer just being connected to the internet, but if you are using a file sharing program without them you are headed for disaster. The safest way to download music is through a paid program such as iTunes or Napster. If you want to go for the free stuff with programs like LimeWire, you are going to be at risk. The only way to lower the risk is to have good anti-harm software installed, keep it updated and scan often.

anti-harmware, computer security, file sharing, privacy, risk, trojans, virus