Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Change Display Settings in Windows 10

Tip of the Week: Change Display Settings in Windows 10

One of the easiest ways you can customize your Windows 10 experience is by changing your device’s display settings. There are plenty of settings to change as per your specific needs, so this week’s tip will be dedicated to getting the most out of your displays, whether it’s a large new monitor you got over the holidays or an old one that has a little more life in it.

0 Comments
Continue reading

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

0 Comments
Continue reading

Tip of the Week: Follow These Steps to Prevent Telemarketers From Calling You

Tip of the Week: Follow These Steps to Prevent Telemarketers From Calling You

Here’s a common scenario: you’re relaxing at home with friends or family and all of a sudden, your cell phone starts ringing. You don’t recognize the number; in fact, your phone lists it as an out-of-state caller, so you don’t pick up. The call eventually ends and you’re back to relaxing. But then, your phone starts ringing again and it’s that same pesky solicitor trying to sell you on the virtues of auto loan refinancing or a free Caribbean vacation. Caller ID and voicemail have helped to curb the suffering over unwanted phone calls in the past, but what if you could just block a caller entirely?

0 Comments
Continue reading

How to Block and Unsubscribe from Users with Gmail’s New Features

b2ap3_thumbnail_hold_up_in_gmail_400.jpgWe all know how annoying spam and unwanted emails can be when you’re trying to navigate your inbox. While a quality spam filter can go a long way toward eliminating these irritating time-wasters, Gmail now has a feature that lets you dodge some of this pain. With the ability to block selected users and unsubscribe from email campaigns, you can reclaim plenty of time that you might have been wasting weeding out your inbox.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Backup Malware Hosted Solutions Network Security Microsoft Mobile Devices Software Data Windows 10 Innovation Internet User Tips Smartphones Business Email Browser Hardware Tech Term Efficiency Computer Business Continuity Disaster Recovery Smartphone Productivity VoIP Miscellaneous IT Services Workplace Tips Data Backup Ransomware Business Management communications Android Productivity Cybercrime Outsourced IT Network Office Cloud Computing Automation Chrome Alert Windows Data Recovery Computers Managed IT Services Router Save Money Internet of Things Managed IT Services Upgrade Server Artificial Intelligence Communication Telephone Systems Windows 10 Social Media Virtualization Money Law Enforcement Small Business Quick Tips Facebook Collaboration Cybersecurity Holiday Office Tips Passwords App IT Support How To Office 365 Spam Applications Wi-Fi Health Social Engineering Password Mobile Device Management Settings History Work/Life Balance Mobile Device Remote Computing Information BDR Two-factor Authentication Word Bandwidth Google Drive Bring Your Own Device Gadgets Gmail Operating System Mouse Managed Service Provider Vulnerability Entertainment Voice over Internet Protocol Phishing Marketing Private Cloud HaaS Networking Microsoft Office Hacking Scam Encryption Sports Application Recovery Data Management VPN Flexibility Managed Service Keyboard Data Security Safety Data Protection Mobility Connectivity Data Breach Apps Telephone System Telephony IT Plan Website eWaste Firewall Employer-Employee Relationship The Internet of Things Legal Fraud Remote Monitoring Blockchain Windows 7 Access Control Managed IT Battery Business Intelligence Mobile Computing Hiring/Firing Black Market Internet Exlporer Retail Unsupported Software Robot DDoS Update Patch Management Best Practice OneNote Botnet USB Government User Error Redundancy Training Social Public Cloud Human Resources Budget Servers Downtime IT Support BYOD Wearable Technology Cleaning Physical Security Data Storage Data storage Identity Theft Avoiding Downtime Big Data End of Support CES Infrastructure Paperless Office Comparison Saving Money Electronic Medical Records Spam Blocking Virtual Assistant Charger Software as a Service IT Management Google Docs Meetings PDF YouTube Content Management Machine Learning Digital Signature Windows 10s Audiobook Streaming Media SaaS Relocation Shortcuts Wireless Charging Wireless Internet Information Technology MSP Worker Reputation Microchip Devices Data loss Emergency Knowledge Advertising Virtual Reality Password Management Camera Music Lithium-ion battery Automobile Business Mangement Outlook Techology Accountants Skype Humor Vendor Cortana Wire Environment Smart Technology Going Green File Sharing Maintenance Rootkit Customers NarrowBand Search Engine Amazon Thought Leadership Screen Mirroring Network Congestion Worker Commute HIPAA NIST Flash Authentication IBM Files Education Recycling Frequently Asked Questions Millennials Employer Employee Relationship Netflix Solid State Drive Start Menu Risk Management Assessment Search Display Google Apps Smart Office Software Tips Multi-Factor Security Two Factor Authentication Laptop Uninterrupted Power Supply webinar Wireless Augmented Reality Cryptocurrency Distributed Denial of Service Wireless Technology Video Games Bing Amazon Web Services Cast Computer Care People IT Consultant Warranty Remote Work Nanotechnology Travel Troubleshooting Supercomputer Computing Infrastructure Criminal Excel Workforce Programming Biometrics Computer Accessories Practices Audit Tools Politics Television How to Security Cameras Workers Document Management Trending Customer Relationship Management Touchpad Conferencing Remote Worker Staff Safe Mode Sync Vendor Management Chromecast Scalability Help Desk Online Shopping Addiction WiFi Mobile Office Transportation Samsung Hybrid Cloud Bluetooth Printer Smart Tech Root Cause Analysis Notifications HVAC Tip of the week Telecommuting Hosted Computing Computer Fan Public Computer Apple Hacker Customer Service Tech Support Emails Wiring Content Shortcut Instant Messaging Evernote Cache Social Networking Benefits Leadership Monitor Administrator Credit Cards Books Current Events Internet exploMicrosoft Users Enterprise Content Management Windows Server 2008 Unified Threat Management Inventory FENG Value Experience IT solutions iPhone Smartwatch Password Manager HBO Specifications Fax Server Running Cable Save Time Shadow IT Company Culture IT solutions Compliance Thank You Printers Managing Stress Regulation Congratulations Twitter CrashOverride Webinar
QR-Code