IT Knowledge Base - Common Issues

The IT Knowledge Base offers solutions to common computer problems, providing step-by-step guidance and troubleshooting tips to help users resolve technical issues quickly and effectively. Click on the item in the tab to learn more about these topics.

Library Issues Website

Why Online Security is Important

Online security is crucial for protecting your personal and financial information, your identity, and even your physical safety. With so much of our lives connected to the internet—from banking and shopping to social connections—it’s essential to take precautions to keep yourself and your data safe from cybercriminals. Without proper security, you’re at risk of identity theft, financial loss, privacy breaches, and other serious problems that can affect your well-being.

Basic Rules to Stay Safe Online

  • Use Strong Passwords: A strong password is one of your first lines of defense against hackers. Make sure your passwords are complex, include upper and lower case letters, numbers, and special characters. Avoid using easily guessed passwords like your name or "12345". For more tips, see the Passwords tab.
  • Don’t Click on Unknown Links: Always be wary of clicking on links from unknown sources. Whether it’s an email, a text, or a website popup, links can be used to install malware on your device or direct you to fake login pages that steal your credentials.
  • Be Careful with Email Links: Emails are a common way that scammers try to get your personal information. Never click on a link in an email from an unknown sender. If it looks suspicious, delete it or mark it as spam. For more on email safety, see the Emails tab.
  • Download Carefully: Be cautious when downloading anything from the internet. Pop-up messages that say things like "Warning! Download Now to Fix Issues!" are often scams designed to trick you into installing malware. Scammers frequently use fake warnings to pressure people into downloading harmful software.
  • Avoid Pop-up Scams: You may encounter pop-ups claiming your computer is infected or has issues that need fixing immediately. These are typically scams. Never click on these pop-ups or download anything they suggest. If you’re worried, use your own antivirus software to scan your computer, not the link provided.

Common Scams Targeting Older Adults

Cybercriminals often target older adults with scams that are designed to look legitimate. Here are some examples:

  • Fake Technical Support: A scammer may call or email you claiming to be from a well-known company, like Microsoft or Adobe, and say they’ve detected a problem on your computer. They may ask you to download something or give them remote access. This is a scam—real companies will never contact you this way about issues you haven't reported.
  • Pop-up Warning Scams: You might see a pop-up message saying "Warning: Your Computer is Infected!" and urging you to click a link to fix the issue. This is usually a scam designed to get you to download malware. Close the pop-up immediately and avoid interacting with it.
  • Phishing Emails: Phishing emails often look like they come from trusted organizations, such as your bank or a government agency. They might say that you need to verify your information or take urgent action. Always verify the sender, and avoid clicking on any links. Instead, go to the official website directly.

General Tips for Staying Safe

  • Keep Software Up to Date: Regularly update your computer’s operating system and applications. Security patches are released frequently to protect against newly discovered threats.
  • Use Antivirus Software: Reliable antivirus software can help detect and remove malware. Make sure it’s updated and run regular scans.
  • Think Before You Click: If something seems too good to be true, it probably is. Whether it’s an unbelievable offer or a promise of quick riches, avoid clicking or providing information.

(This is an exmaple of a common scare tactic to get you to download something)

Common Issues with Emails

Emails are an essential part of our daily communication, but sometimes we encounter issues that can be confusing and frustrating. Below are some common problems related to emails and how to solve them.

Spam Emails

Spam emails are unsolicited messages often sent to a large number of recipients. They can be annoying and sometimes dangerous if they contain phishing links. To avoid spam, be cautious about sharing your email address online, and use the spam filter provided by your email provider.

Phishing Attacks

Phishing emails attempt to trick you into providing personal information, such as passwords or credit card numbers, by pretending to be from a legitimate source. Here are some steps to protect yourself:

  • Verify the Sender: Always double-check the sender's email address. Phishing emails often come from addresses that look legitimate at first glance but may have slight misspellings or extra characters.
  • Do Not Click on Suspicious Links: If you receive an email asking you to click on a link, be cautious. Hover over the link to see where it leads before clicking. If the link looks suspicious, do not click it.
  • Contact the Company Directly: If you receive an email from a company that seems suspicious, do not click on any links in the email. Instead, go directly to the company's official website and contact them through their verified channels.

Forgotten Passwords

If you forget your email password, most providers have a "Forgot Password" feature. Use this feature to reset your password, but make sure you use a strong and unique password that you haven't used elsewhere. Consider using a password manager to help you create and store complex passwords securely.

Attachment Issues

Sometimes you might have trouble attaching files to your email. This could be due to the file size exceeding the email provider's limit. To solve this problem:

  • Compress the File: Use file compression tools to reduce the size of the file before attaching it.
  • Use Cloud Storage: If the file is too large, consider uploading it to a cloud storage service, such as Google Drive or Dropbox, and share the link in your email instead.

Email Not Sending

If your email isn't sending, here are some potential solutions:

  • Check Your Internet Connection: Ensure you have a stable internet connection before attempting to send the email again.
  • Verify the Recipient's Address: Double-check the recipient's email address for typos or mistakes. An incorrect address can cause your email to bounce back.
  • Check Outbox and Security Settings: Verify that your outbox is not being blocked by any security software or firewall settings. Some antivirus programs may mistakenly flag outgoing emails as a threat.

Common Issues with Phone and Text Scams

Phones and text messages are essential for communication, but they can sometimes expose us to scams and fraud. Below are some common phone and text scams and ways to stay safe.

Phone Scams

Fake Tech Support Scams (Microsoft, Google, etc.)

Some scammers pose as tech support from companies like Microsoft, Google, or Apple, claiming to have detected a problem with your computer or account. These scams often use scare tactics, saying your device is infected or your data is at risk. Keep in mind:

  • Companies Rarely Call You First: Most companies will not call you unless you’ve previously contacted them. If you receive a call out of the blue, especially from a large tech company, do not assume it is legitimate.
  • Hang Up and Contact the Company Directly: If you receive a suspicious call, don’t give any information over the phone. Hang up, look up the official customer service number on the company’s website, and call them to confirm if they initiated the call.
  • Never Use Gift Cards: Scammers often ask for payment in the form of gift cards, as these are difficult to trace and easy to cash out. Legitimate companies will never ask you to pay for services or fees with gift cards.
  • Be Wary of Screen-Sharing Requests: Many phone scams involve using screen-sharing tools to gain control over your computer. While legitimate tech support may occasionally use screen-sharing to assist you, they will never black out your screen or navigate through your files without explaining each action and asking for consent. If someone tries to gain access or blacks out your screen, it is a red flag for a scam.
  • Protect Personal Information: Never share sensitive information, like your Social Security number, home address, credit card details, or passwords. Legitimate companies will not request this information over the phone without prior authorization.

Common Phone Scam Topics

Phone scammers often use similar themes to try and deceive victims. Here are some of the most common topics:

  • “There’s an issue with your bank or credit card”
  • “You owe back taxes to the IRS”
  • “Your social security number has been suspended”
  • “You’ve won a prize or free vacation”
  • “We need your help to confirm your account details”

Examples of Phone Scam Scripts

Scammers often use similar language to sound convincing. Here are a few common examples:

  • Bank or Credit Card Scam: "Hello, this is your bank calling to notify you of suspicious activity on your account. To confirm your account, please provide your card number and full name." (Legitimate banks will never ask for sensitive information over the phone.)
  • IRS Tax Scam: "This is the IRS calling. We have detected back taxes owed, and if you don’t pay immediately, you will face arrest. You must settle your debt using a gift card or wire transfer." (The IRS never uses phone calls or gift cards for payments.)
  • Tech Support Scam: "Hi, this is Microsoft Support. We've detected a virus on your computer and need remote access to fix it. Just follow our instructions to set up screen-sharing." (Genuine tech support will not cold-call you for issues you haven’t reported.)

Text Scams

Text scams are common and can come in the form of fake prize notifications, phishing links, or impersonation attempts. Here’s how to recognize and avoid them:

  • Verify the Sender: Many text scams come from unknown or suspicious numbers. Official organizations will use verified numbers, not random or unusual sequences.
  • Avoid Clicking on Links: Scammers may send links claiming to lead to a prize or special offer. Avoid clicking these links, as they can lead to malware or phishing sites. If unsure, go directly to the official website instead.
  • Ignore Giveaway Messages: Fake giveaways claim you’ve won a prize and ask you to “claim” it by providing personal information. Avoid interacting with these messages, as they are typically scams.
  • Common Types of Text Scams: Be aware of texts claiming to be from banks, government agencies, or retailers asking for payment or information. Real companies won’t make urgent requests for sensitive information via text.

Common Text Scam Topics

Text scams often use enticing or urgent language. Here are some common types of text scams:

  • “You’ve won a prize, claim now!”
  • “There’s a problem with your account, click here to resolve it”
  • “Get a free gift, click here to redeem”
  • “Urgent: Verify your information to prevent account suspension”
  • “Limited time offer on credit/loan approval”

Examples of Text Scam Scripts

Here are a few examples of common text scam messages:

  • Fake Prize Notification: “Congratulations! You’ve won a $1000 gift card. Claim your prize now by clicking [link].” (Legitimate prizes won’t require you to click a link to claim.)
  • Account Issue Scam: “Your account has been compromised. Click here to verify your details and prevent suspension: [link].” (Avoid clicking links and verify directly with the company instead.)
  • Loan Approval Scam: “You’re pre-approved for a loan! Apply now and receive funds instantly by clicking [link].” (These scams are often used to steal personal information or money.)

How to Stay Safe

  • Use Spam Filters: Many phones and carriers offer spam filtering to help screen unwanted calls and messages.
  • Report Suspicious Messages and Calls: Reporting scams to your carrier or a regulatory body helps protect others and prevents future incidents.
  • Trust Only Verified Contacts: If you didn’t initiate the call or message, remain cautious and verify any requests directly with the company.

How to Connect to Wi-Fi on Different Devices

Wifi Connection Mac vs. Windows Computers

Mac

  1. Click the Wi-Fi icon in the top-right corner of the screen.
  2. Select the network you want to join from the dropdown list.
  3. Enter the Wi-Fi password if prompted, then click Join.

Windows

  1. Click the Wi-Fi icon in the bottom-right corner of the taskbar.
  2. Select the network you want to join from the list.
  3. Click Connect and enter the password if required.

Connecting on Mobile Devices

Follow these steps to connect to Wi-Fi on iPhone or Android devices

IPhone

  1. Go to Settings and select Wi-Fi.
  2. Find the network you want to join and tap its name.
  3. Enter the password if prompted, then tap Join.

Android

  1. Open Settings and select Connections or Network & Internet.
  2. Tap on Wi-Fi, then choose the network you want to join.
  3. Enter the password if needed and tap Connect.
:

Common Wi-Fi Issues and Solutions

Wi-Fi Not Connecting

If your device is unable to connect to a Wi-Fi network, try these troubleshooting steps:

  • Check Your Password: Ensure you’re entering the correct Wi-Fi password. Check with the network provider if you're unsure of the password.
  • Restart Your Device: Sometimes, a simple restart can solve connection issues.
  • Reset the Router: If you have access, restart the router by turning it off for 10-15 seconds, then turning it back on.

Slow Wi-Fi Connection

Slow internet speeds can be frustrating, especially when streaming or downloading. Here are some ways to improve your connection:

  • Check for Interference: Other electronic devices (like microwaves or cordless phones) can interfere with Wi-Fi signals. Move your device closer to the router, and avoid obstacles like walls and furniture.
  • Limit Devices on the Network: Too many devices connected to the same network can slow down speeds. Disconnect any devices not in use.
  • Check for Updates: Ensure your router firmware and device software are up to date, as updates can improve performance and connectivity.

Wi-Fi Keeps Dropping

If your Wi-Fi connection frequently disconnects, try the following solutions:

  • Move Closer to the Router: Distance from the router can cause disconnections. Position your device closer to the router to maintain a stable connection.
  • Restart the Router and Device: Restarting both your router and device can often fix intermittent connection issues.
  • Check Router Placement: Place your router in a central location, elevated from the floor, to maximize coverage and signal strength.

Can’t Find Wi-Fi Network

If your Wi-Fi network isn’t showing up on your device, try these steps:

  • Check Network Visibility: Ensure that the network is broadcasting its SSID (network name). You may need to enable this setting in the router’s admin page.
  • Verify Device Compatibility: Make sure your device supports the frequency (2.4 GHz or 5 GHz) of the Wi-Fi network you’re trying to join.
  • Restart Your Device and Router: Restarting can help refresh the network list on your device.

Forgot Wi-Fi Password

If you’ve forgotten the Wi-Fi password, try these options:

  • Check on Connected Devices: If you have another device connected to the network, you may be able to view the saved password in the Wi-Fi settings.
  • Log into Router Admin Page: You can often view or reset the Wi-Fi password by logging into your router’s admin page (usually accessible at 192.168.1.1 or 192.168.0.1). Refer to your router manual for login details.

Password Security Best Practices

Strong passwords are essential to protecting your accounts and personal information from unauthorized access. Below are some best practices for creating and managing passwords securely.

Creating Strong Passwords

When setting up a password, use these tips to increase security:

  • Use a Mix of Characters: Create passwords that include upper and lower case letters, numbers, and special characters (e.g., @, #, $) to make them harder to guess.
  • Avoid Common Words: Avoid using simple words or easily guessed phrases like “password” or “12345.” Opt for unique combinations that aren’t dictionary words.
  • Use Long Passwords: Passwords should be at least 12 characters long. Longer passwords are more secure and harder to crack.
  • Do Not Reuse Passwords: Avoid using the same password for multiple accounts. Unique passwords per account help prevent one breach from affecting multiple accounts.
  • Consider Passphrases: Use a series of random words as a password (e.g., “BlueSkyRiver7@!”). Passphrases are easier to remember and more secure when they include varied characters.

Managing Passwords

It can be challenging to remember multiple strong passwords. Here are some tips for managing your passwords effectively:

  • Use a Password Manager: A password manager stores and encrypts your passwords securely, so you only need to remember one master password. It can also generate strong, unique passwords for each account.
  • Enable Two-Factor Authentication (2FA): 2FA adds an extra layer of security by requiring a second form of verification, like a code sent to your phone. Use 2FA wherever possible, especially for important accounts like email and banking.
  • Avoid Writing Down Passwords: Refrain from writing passwords on paper or in easily accessible documents. A password manager is a much more secure option.
  • Update Passwords Regularly: Regularly change your passwords, particularly for accounts that store sensitive information.

Using Built-In Password Managers on Apple and Android

Both Apple and Android devices come with built-in password managers that securely store, manage, and even suggest strong passwords. Here’s how to make the most of these features:

  • Auto-Fill Passwords: Both iOS and Android automatically fill in saved passwords when you log into apps or websites, making it easy to use strong, unique passwords without needing to remember each one.
  • Password Suggestions: When creating new accounts, both systems can suggest complex passwords and save them directly to their password managers for future use.
  • Password Monitoring: Apple and Android password managers can alert you if any of your saved passwords have been compromised in a security breach, so you can update them promptly.
  • Accessing Saved Passwords:
    • On iOS: Go to Settings > Passwords (or open the standalone Passwords app on iOS 18 and later) to view and manage your saved passwords, secured by Face ID, Touch ID, or your device passcode.
    • On Android: Go to Settings > Google > Manage your Google Account > Security > Password Manager. Access to this section is secured by your device’s PIN, fingerprint, or facial recognition.

Common Password Mistakes to Avoid

Be aware of these common password mistakes, which can leave your accounts vulnerable:

  • Using Personal Information: Avoid using easily accessible information, like your name, birthdate, or pet’s name, as part of your password.
  • Repeating Passwords Across Accounts: Reusing passwords increases the risk of a security breach affecting multiple accounts.
  • Ignoring Password Alerts: Many services will notify you if a password appears in a data breach. Always take these alerts seriously and update the affected passwords promptly.

Benefits of Using Strong Passwords

Adopting strong password practices helps to:

  • Protect Personal Information: Strong passwords safeguard sensitive data, such as financial and medical records.
  • Reduce the Risk of Unauthorized Access: Longer, complex passwords are more resistant to attacks like brute force and dictionary attacks.
  • Enhance Online Security: Using a unique password for each account helps prevent one breach from spreading to others. Consider refering to the 2-Factor-Authenication(2FA) information in the Other tab.

Examples of Weak Passwords

  • mypassword123
  • mypetsname2015
  • sarahjosh2020
  • newyork01

These passwords include easily guessed information like pets names, children or family member, a year, or a simple string of numbers. Password crackers are programs that attempt to guess your password using a massive database of all the most common passwords trying hundreds of passwords every few seconds. Today, passwords like "John2017" are easily guessed by programs. Consider trying a tougher password inclusing "@, $, %, !, *, or &."

Examples of Strong Passwords

  • Th3B3$tP@$sw007dz810
  • e8$_`-Q82]@c:f-81-0IDLr
  • esPEaliCksbedYe

Consider using a password manager to generate secure passwords for you, just rememeber to write it down in a safe location or add it to your password manager application

Other Safety and Privacy Tips

Extra Protection with Two-Factor Authentication (2FA)

Two-Factor Authentication (2FA) is an extra layer of security for your accounts. With 2FA, you not only enter your password but also confirm your identity with a code sent to your phone or email. This keeps your accounts safe even if someone else knows your password.

Here’s how to set it up:

Each link above takes you to a simple guide on how to turn on 2FA for that account.

Why Use 2FA?

2FA gives you extra security because a hacker would need both your password and access to your phone or email to log into your account. This makes it much harder for anyone to get in without your permission.


Protecting Your Device

  • Use a Lock Screen: Set up a password, PIN, or fingerprint lock on your phone or computer. This helps keep your information safe if someone else tries to use your device.
  • Back Up Important Information: Save copies of your important files or photos. On most phones, this is called a "backup," and it keeps your data safe in case you lose your device.
  • Turn On Security Features: Phones and computers have built-in tools that can protect you from threats. Look in the “Settings” under “Security” to make sure these are turned on.

Staying Safe on Social Media

  • Be Careful Who You Friend: Only accept friend requests from people you know. Some fake profiles try to trick you into sharing personal information.
  • Watch What You Share: Avoid sharing personal information, like your address, birthdate, or family details on social media.
  • Use Privacy Settings: You can choose who sees your posts. Go to "Settings" in each app to make sure only friends or family can see your information.

Managing Cookies and Tracking

  • What are Cookies? Cookies are small files that websites use to remember you. They help websites work better but can also track what you do online.
  • Clear Cookies Often: Regularly clear cookies in your browser settings to help protect your privacy.
  • Turn Off Tracking: Many browsers let you turn off tracking in the settings. Look for "Privacy" or "Tracking" options in your browser’s settings.

Shopping Online Safely

  • Look for a Secure Site: Only shop on websites that start with "https://" or have a lock symbol in the address bar. This shows the site is secure.
  • Use Trusted Payment Options: Pay with credit cards or PayPal, which offer extra security. Avoid paying directly from your bank account unless it’s a trusted site.
  • Avoid Shopping on Public Wi-Fi: Public Wi-Fi (like in a coffee shop) isn’t secure. Avoid entering personal information when on public Wi-Fi.

Downloading Apps and Software

  • Download Only from Trusted Sources: Only install apps from trusted sources, like the Apple App Store or Google Play Store.
  • Check Permissions: When installing an app, make sure it doesn’t ask for unnecessary access (like your contacts or photos) unless it’s required.
  • Avoid Fake Apps: Scammers sometimes make apps that look like real ones. Be sure you’re downloading the right app by checking reviews and ratings.
Free IT Support Appointments

Free IT Support at the Library

Need help with your computer, phone, or tablet? Our library offers free IT support appointments!

Come in and get personalized assistance with troubleshooting, software setup, and more.

Appointments are available during library hours. Book your session today and get the help you need! Located at 1 N High St, Selinsgrove, PA 17870

Book an Appointment