Google Chrome Tip: How To Open A Search In A New Tab When Using The Omnibox

In Google Chrome, where you type in a web address, you can also perform a search. This is called the “omnibox”. Many folks I assist in the home environment are quite surprised when I show them this feature. When typing in the omnibox, whatever it is you are searching for, you will also notice relevant suggestions to assist you with performing the search.

Now that you know how to search from the omnibox there is another tip that will improve your productivity when performing that search. If you type in the omnibox, whatever it is you are searching for, and hold down the “Alt” key on your keyboard and then hit the “Enter” key, your search result will open in a separate tag.  To me, this is a “must know” tip that will allow you to stay on your current page tab (without losing it), perform a search, and get the results on another page tab.


Preventing and Responding to Identity Theft – You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts, or apply for loans…. READ MORE

Google Photos rolling out Archive feature to hide images in the main feed – With Archive, you can remove images from the main Photos tab without deleting them from your library. Those who already have the feature should see a new Archive option in the navigation drawer just above Trash… READ MORE


HTTrack Website Copier for Windows – HTTrack is an offline browser utility that allows you to download a website from the Internet to a local directory, building recursively all directories, getting html, images, and other files from the server to your computer. It arranges the original site’s relative link-structure… READ MORE

Sneaky teen texting codes: what they mean, when to worry – If your teen has a smartphone, chances are they spend several hours a day on text and social media. If you ever look at what they’re actually doing on there, you’ll likely see a lot of innocent “Snapstreaking,”… READ MORE


All the movies and TV shows hitting Amazon Prime in June 2017 – The sixth month of the year brings a bunch of new movies to Amazon’s streaming video service. Sure, there are plenty of household names, such as “Apocalypse Now,” “Star Trek Beyond” and “Magnolia.”… READ MORE


Hot New Releases in Data Storage

Thank You For Visiting


Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)

Leave A Comment

Identity Theft – Here is what to do if someone is using your information to open new accounts or make purchases…

If you are a victim of identity theft or know someone that is, the Federal Trade Commission has an identity theft website setup ( where you can report an event. The site provides streamlined checklists and sample letters to guide you through various recovery plans and processes based on the type of identity theft you have been exposed to. Note: I also encourage victims to contact and file a report with their State Police so that there is record of the event (at the local level) and to alert the police to a trend that may be occurring in their jurisdiction.

Identify theft can occur through breaches of your credit card account; telephone, mobile or utility accounts; debit, checking or savings accounts; employment or taxes; government benefits or IDs (such as your Social Security Number); loans or leases; AND, other accounts such as internet accounts, medical accounts, insurance accounts, investment accounts, etc…

Clues that someone stole your information are:

  • You see withdrawals from your bank account that you can’t explain.
  • You don’t get your bills or other mail.
  • Merchants refuse your checks.
  • Debt collectors call you about debts that aren’t yours.
  • You find unfamiliar accounts or charges on your credit report.
  • Medical providers bill you for services you didn’t use.
  • Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit.
  • A health plan won’t cover you because your medical records show a condition you don’t have.
  • The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
  • You get notice that your information was compromised by a data breach at a company where you do business or have an account.

Source: Federal Trade Commission – Identity Theft Recovery Steps


MusicWire – Portable App to search for and download music. All downloads are in the MP3 format… READ MORE


Chrome to More Aggressively Highlight Insecure Sites – Starting with Chrome 62, the browser will show the “not secure” warning when users type any data into HTTP sites… READ MORE

How to snooze your Wi-Fi in the Windows 10 Creators Update – Click on the Wi-Fi icon in your taskbar, and when the panel listing all the available Wi-Fi connections appears, click the Wi-Fi tile in the lower-left corner. Next, the panel as pictured here appears. By default, your Wi-Fi will only be restored if you activate it manually by clicking the Wi-Fi tile. If you want it to turn on automatically after a set time, click the drop-down menu under Turn Wi-Fi back on. Here you’ll see options for turning it back on in an hour, four hours, or one day… READ MORE


Schedule web pages to open automatically with Open Me Later! for Chrome – Open Me Later! is a free Chrome extension which enables scheduling a page to open automatically, as the date and time you specify… READ MORE


Amazon Echo – The Echo may be the closest thing we’ll have to a Star Trek computer at home… READ MORE

What is Echo?

Thank You For Visiting


Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)

Leave A Comment

Today’s Geek Squeaks – October 15, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (FREE Windows 8.1 ebook): Windows 8.1 is to be released this week. If you are an IT Professional, get a “heads up” on Windows 8.1’s upgrade path and the new features (SEE BELOW);

Squeak #2 – (Freemake Video Converter): This converter is a “must have” on your PC and the best out there (SEE BELOW);

Squeak #3 – (Did you know your profile name and photo might appear in Google products?): Google recently revamped their “Terms of Service” where your profile name and photo may appear in products that they endorse (including in reviews, advertising and other commercial contexts). Important that you read this to see how it will affect you (SEE BELOW); and,

Squeak #4 – (Create Digital Art With The Wacom Cintiq 22HD): See how Tech and Art can come together to create extraordinary results (SEE BELOW)…


Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]

Free ebook: Introducing Windows 8.1 for IT Professionals


Goal in this book is to help you on that upgrade path by presenting the facts and features about Windows 8.1 … GET THE BOOK HERE

Freemake Video Converter Updated


Freemake Video Converter is designed without any limitations and hidden costs. This is freeware of new level, which offers a quality alternative to paid products. Convert video free to AVI, MP4, WMV, MKV, SWF, 3GP, DVD, MPEG, MP3, iPod, iPhone, PSP, Android, rip & burn DVD, convert online videos directly from 40+ sites, burn Blu-ray, and upload to YouTube with our free video converter!!! GET IT HERE

Google Terms of Service Update – How your Profile name and photo may appear (including in reviews and advertising)


Your friends, family and others may see your Profile name and photo, and content like the reviews you share or the ads you +1’d. This only happens when you take an action (things like +1’ing, commenting or following) – and the only people who see it are the people you’ve chosen to share that content with. On Google, you’re in control of what you share. This update to our Terms of Service doesn’t change in any way who you’ve shared things with in the past or your ability to control who you want to share things with in the future… READ MORE

Wacom Cintiq 22HD Touch Interactive Pen Display


The Cintiq 22HD touch features a 21.5-inch display with a wide viewing angle and a widescreen aspect ratio, ideal for large-format work. With professional levels of pen-pressure sensitivity and pen-tilt recognition, the Cintiq 22HD touch provides the same responsiveness and ability to create artistic brush effects as using an actual paintbrush or marker… CHECK IT OUT HERE

Be Sure To Visit

Today’s Geek Squeaks – October 12, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (A Complete List of Google Search Engine Tips & Tricks): Google has a site up called Inside Search that not only provides information on how search works, search stories by people like you and me, and a search playground; but, also provides a complete list of Google search engine tricks. I often refer to Google as my second brain (SEE BELOW);

Squeak #2 – (Best FREE Computer Optimization and Cleaning Utility):  CCleaner has been around for ages and has developed into a premiere computer optimization and cleaning utility. If you are not using CCleaner, then you do not know what you are missing (SEE BELOW);

Squeak #3 – (Imagine if, one day, you log into Facebook and your account is gone.): Facebook has become a very powerful entity that has made your identity its’ central mission (SEE BELOW); and,

Squeak #4 – (An Intel Solid State Drive ): Intel is now making its’ mark in SSD’s (SEE BELOW)…


Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]

Google Inside Search



Web history

Start simple

Ignore spelling

Use web friendly words

Less is more

Search with an exact phrase

Use descriptive words

Don’t worry about cases

Search within a specific site

Don’t worry about punctuation

Search by file type

Include or ignore words and characters in your search

Find related pages

Find recipes

Search numbers in a range

Get number conversions

Get the time

Get currency conversions

Search the web in all languages

Check the weather

Get realtime stock quotes

Check sport scores and schedules

Search with Goggles

Track your packages

Get definitions

Search by advanced image search

Calculate anything

Locate earthquake activity

Search by location

Search locations by zip and area codes

Shop and compare

Get local sunrise/sunset times

Discover local business

Get movie times

Read public domain books

Hone in on a particular range

Check flight schedules

Research health conditions

Check flight times

Get world news

Search for an address

Similar terms

Search by voice

Examine public data

Get interactive financial info

Find medication information

Instant on mobile

Use instant preview on mobile

Search by location

Get interactive weather

Optimization and Cleaning



CCleaner removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run) and contains NO Spyware or Adware!… GET IT HERE

What if Facebook stole your identity?

@ ZDNet


No one company (and possibly no government) has ever had the power to shut off an individual’s personal connections like Facebook does today… YOU MUST READ MORE

Intel 530 180GB 2.5-Inch Internal Solid State Drive


As a high-performance hard drive alternative, Intel Solid-State Drives boost your PC to the next level in storage performance and reliability. Improved PC responsiveness… CHECK IT OUT HERE

Be Sure To Visit

Increase Your Productivity By Adding Tabs To Windows Explorer

If there is a way to increase productivity when performing file management operations, you can always count me in. I guess this is something I inherited from the Norton Commander days.

Today I stumbled on a find that I consider a “real find” that you may be interested in; especially if you are someone that is proficient in working Windows Explorer to perform file and folder operations. It is a third party application, called TabExplorer.

What TabExplorer does is simply this: it adds tabs to Windows Explorer.


The beauty of a tabbed file manager is that you can toggle between the tabs to perform file operations in a much more effiicient (and quicker manner).  TabExplorer needs some polishing, but I think you will find it makes for a great add-on for Windows Explorer that can be toggled on or off.



Technology News, Software, Apps, Wallpapers, Tech Products
and MORE…

Windows Essentials 2012 arrives and adds features to Windows Movie Maker and Photo Gallery

10 Steps To Boost Multimedia Performance of Your PC (Part 2)

College Students: Avoid Identity Theft At School


Gold Box: New Deals. Every Day.


Bookmark and Share


Three Ways to Securely Wipe Files from Your PC

TuneUp Blog What’s On My PC welcomes the following Guest Article, “Three Ways to Securely Wipe Files from Your PC” by Christoph Laumann, President & Managing Director, TuneUp.

The TuneUp blog is written by a team made up of certified Microsoft experts, authors, and editors from major computer magazines. The people behind this blog also head up one of the most successful tuning suites around, called  TuneUp Utilities.

Three Ways to Securely Wipe Files from Your PC

If you’re one of the many people who upgraded their PCs this holiday season, you’ll likely want to donate or dispose your old ones. However, it’s important to securely wipe critical files that contain personal or sensitive information from your computer before doing so. Windows alone cannot wipe data. Even if sensitive files are deleted using the Recycle Bin, they can easily be restored using various data recovery programs. Here are three simple steps to help you ensure your files are wiped once and for all.

Step 1: Delete Volume Shadow Copies.

Windows creates Volume Shadow Copies of system files and some of your personal data (i.e. files residing in C:\Users\Username). Normally, it’s a great way to restore previous versions of files that may be accidentally deleted. Unfortunately, it’s also a potential liability as these files can be restored.

On a PC soon to be decommissioned, you’ll want to get rid of these Volume Shadow Copies by right-clicking on “Computer” and selecting “Properties”. Go to “System Protection”, select your system drive and click on “Delete”. This will delete all of the previous versions of files kept by Windows.

But beware! The next time your PC is idle, these Volume Shadow Copies will be recreated. If you’re in the habit of safely deleting files, you might just want to turn them off altogether by clicking on “Turn off system protection”. Be careful doing this because it will not only disable the previous version restoration feature—it also disables System Restore and can affect some backup tools (such as Macrium and Paragon) which rely on Volume Shadow Copies.

Step 2: Safely delete files.

To safely destroy data, we’ve created a wiping mechanism called TuneUp Shredder. It uses several algorithms that comply with data security standards and render files unrecoverable.

Here’s how TuneUp Shredder works:

  1. Grab the trial version of TuneUp Utilities 2012. This will add a new context menu item (TuneUp Shredder) to your Windows explorer. Simply right-click on the folder or file you’re trying to securely wipe from your machine, and select this menu item.
  2. Next, choose your algorithm. Keep in mind that it is next to impossible to recover the data, even with the “Fast delete” option, since you’ll essentially be overwriting it. However, if you want to be absolutely sure that this data is rendered irreparable, go with one of the more advanced methods.
  1. Hit “Yes” to delete the file.

Step 3: Completely wipe a drive.

If you’re going to donate your PC, it’s wise to perform a complete wipe of the entire hard disk. In the past, I’ve used and recommend either Active@ KillDisk 5.5 (the Pro version creates a bootable KillDisk USB key that you can use to destroy the data) or Darik’s Boot And Nuke. These tools overwrite your entire hard disk with zeroes or multiple writes of different characters (much like TuneUp Shredder).

Now, while this works well on mechanical hard disks, you’re out of luck if you have an SSD. SSDs’ data gets written and deleted in a very scattered fashion, and neither the user nor the operating system has control over where the actual data is stored—it’s all done by the SSD controller. This whitepaperproves that while some data can be destroyed (either by using some of the built-in mechanisms or third-party tools), in many cases, the data was still intact.

The only SSDs that can be safely wiped are those that include the ATA Secure Erase command. If it does, the Kingston Red Tech Blog provides detailed steps on how to perform a secure wipe of the hard disk using HDDErase (which issues the ATA Secure Erase command to your SSD firmware). If your drive doesn’t support this mechanism, you should try to fully encrypt your hard disk and delete the encryption key. Windows’ own BitLocker (available in higher Windows Vista and 7 editions) is one possible way. If all fails, physically destroy the drive—pure brute force or some pyrotechnics might do the trick.

For additional tips and tricks on securely wiping files from your PC and maintaining system performance, I invite you to visit the TuneUp Blog about Windows.



Just In – Deals at TigerDirect

Bookmark This (#19) – Sumatra PDF

FREE Today Only – Math Training for Kids (Android App)

A Best Seller at Amazon – HP 2711x 27-Inch LED Monitor

Bookmark This (#18) – TSR Watermark

Hot Hot Hot – The Dangers of Geotagging @ TTC Shelbyville

Gold Box: New Deals. Every Day.


Bookmark and Share



Powered by

Up ↑