Windows 10 – End of Support

Article (PSA-0028)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Windows 10 – End of Support

Microsoft has announced that it will officially end support for the Windows 10 operating system on October 14, 2025. This means you will need to upgrade to Windows 11 or switch to another operating system, if you have not already. For many people switching to another operating system, such as Apple Macintosh or Linux, is not possible and so I will not be addressing that option in this article. In this article we will take a look at the challenges related to the Windows 11 upgrade from Windows 10.

When considering the upgrade to Windows 11 you must first determine whether your computer hardware meets system requirements. Just because your computer runs really well with Windows 10 does not mean it will run Windows 11. So lets go over the most significant requirements likely to cause you issues.

First up is your CPU. The basic requirements are not overly burdensome and most computers will meet these basics: 1Ghz or faster and 2 cores or more. The real issue is that your CPU must have been “approved” by Microsoft and appear on their list which can be found here: https://learn.microsoft.com/en-us/windows-hardware/design/minimum/windows-processor-requirements. Not all CPUs running 1Ghz or faster and that have 2 cores or more are on their list. If your CPU does not appear on their list, your upgrade to Windows 11 will fail.

The next significant requirement which may prevent you from upgrading to Windows 11 is related to the System Firmware. It must be UEFI. The Unified Extensible Firmware Interface, which is a modern version of the PC BIOS, supports “Secure Boot”. Secure Boot must be enabled to upgrade to Windows 11.

The final significant requirement which may cause issues is TPM 2.0. The Trusted Platform Module 2.0 chip is a secure crypto-processor and is required to upgrade to Windows 11.

So, you may be asking yourself – does my PC meet these requirements? To find out, simply search for “PC Health Check” from the Windows 10 search bar. If the app is already installed on your computer, it will appear in your search results. If it is not, you will see a link to a Microsoft site where you can download the PC Health Check app. Here is the direct link to download the app: https://aka.ms/GetPCHealthCheckApp. Once the app is installed, run it. At the top you will see a button to “Check now”. The app will scan your system to see if you meet the requirements for Windows 11. If not, it will let you know what you are lacking.

Ultimately, if your current PC can not be upgraded … you will need a new computer to run Windows 11. I understand this is problematic for many people, especially in todays economy when must of us are struggling to put food on the table, but it is a choice Microsoft made and one we all will have to live with for now.

You can reach PSA Computer Services at (707) 506-6802 or check us out on the web at https://psa-2.com/

A Brief Introduction to AI

Article (PSA-0027)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: A Brief Introduction to AI

It’s pretty much all you hear about in the world of technology anymore, AI. As AI continues to be developed, it is expected to have a significant impact on many aspects of our lives, from healthcare and education to transportation and entertainment. If it is expected to be such an integral part of our lives, it seems important to have a basic understanding of what AI actually is. And so, without further ado, lets ask AI what it is. (The following answer was generated by asking the Brave browser AI “What is AI?”. I have adjusted the formatting of the information, very slightly, for readability.)

Artificial intelligence (AI) is the simulation of human intelligence processes by machines, especially computer systems. It involves the development of algorithms and statistical models that enable machines to perform tasks that typically require human intelligence, such as:
• Expert Systems: AI applications that mimic human decision-making and problem-solving abilities.
• Natural Language Processing (NLP): AI’s ability to understand, interpret, and generate human language.
• Speech Recognition: AI’s ability to recognize and interpret spoken language.
• Machine Vision: AI’s ability to interpret and understand visual data from images and videos.

AI is an interdisciplinary field that combines computer science, mathematics, and engineering to build machines that can:
• Reason: Make decisions based on data and logic.
• Learn: Adapt to new information and improve performance over time.
• Act: Perform tasks and make decisions autonomously.

AI has numerous applications across various industries, including:
• Industrial Automation: AI-powered machines and robots that can perform tasks with precision and speed.
• Scientific Research: AI-assisted data analysis and discovery.
• Creative Industries: AI-generated art, music, and writing.

There are several types of AI, including:
• Reactive Machines: These machines can carry out specific commands and requests, but they cannot store memory or rely on past experiences to inform their decision making in real time.
• Limited Memory AI: These systems have the ability to store previous data and predictions when gathering information and making decisions.
• Self-Aware AI: These systems have the ability to understand their own existence and can make decisions based on their own goals and motivations.

Examples of AI in Action:
• AI-powered software can analyze CT scans and alert neurologists to suspected strokes.
• Online virtual health assistants and chatbots can provide general medical information, schedule appointments, and complete other administrative tasks.
• AI-powered software can analyze images and identify objects, such as human faces, animals, and vehicles.

In Simple Terms:
AI is a way to develop systems that can think and learn like humans, but it’s not meant to replace human intelligence. The goal is to create systems that can take over tasks that are too menial, dangerous, or time-consuming for humans, freeing us up to focus on more important things.

You can reach PSA Computer Services at (707) 506-6802 or check us out on the web at https://psa-2.com/

Scams and Scammers – Email

Article (PSA-0026)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Scams and Scammers – Part 3 (Email)

There are many types of scams and scammers you may encounter throughout your life. In the last article we talked a little bit about “Phone Scams” and what you can do when it happens to you. In this article we will address “Email Scams”.

Like the other scams, the purpose of an email scam is to trick you into giving the scammer your personal information or allowing them to install malicious software on your device. The personal information they want will be important things, such as login passwords, user names, account numbers or your social security number. The malware they install will be used to gather information from your device and/or hijack your device in what is called a ransomware attack. Ransomware attacks render your device unuseable until you pay the fee required by the attackers. Even then it is highly unlikely they will actually remove the ransomware after you pay. Knowledge and a healthy dose of common sense will prevent them from accomplishing their goal.

Scammers attempt to get information from you by crafting clever emails that may make emotional plees for help, or emails which look like password reset notifications, or emails that appear to be from institutions you may be familiar with, such as the Government, IRS or banks.

For businesses it can get even more complicated as the scammers can get a lot of information about your business from publically accessible resources which enables them to craft very specific emails which can add to the “believability” of these messages. So what can you do to protect yourself and your business?

First, you must develop a distrust of all email. According to research conducted by Symantec, nearly 85% of all emails are spam or malicious. Their research indicates that almost 9 out of 10 emails were not considered legitimate messages and most of these emails contained malicious links or attachments designed to infect your computer.

Next, make sure you have all the basics covered. Keep your devices updated with security updates, make sure you have working antivirus and firewall software and ensure spam prevention settings have been configured for your email address.

Finally, be prepared to examine any email requesting information. If you’re to busy at the moment, do nothing with the email until you have time to examine it. What are you looking for in the email? Ask yourself, does this email make sense, do I have this service, this account, or this software? If not mark it as spam (or junk). Take a look at the From email address, does it make sense? Let’s say this is an email claiming to be from Netflix, and you have a Netflix account. As you examine the From address you notice its admin@netflix.ru. What would you do with this email? You should mark it as spam and delete it immediately. Look at the address closely: notice the address after the @ symbol … netflix.ru, that’s not right. We would expect something like admin@netflix.com. How about this From address – admin@netflex.com, how’s that look to you? Look closely at the domain portion of the email (everything after the @ symbol). It says netflex.com which is not netflix.com. Again mark as spam and delete.

It can take some time and practice, but be patient and thorough and you will be better protected from email scams.

If you have questions about email give PSA Computer Services a call at (707) 506-6802 or check us out on the web at https://psa-2.com/

Scams and Scammers – Phones

Article (PSA-0025)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Scams and Scammers – Part 2 (Phones)

There are many types of scams and scammers you may encounter throughout your life. In the last article we talked a little bit about “Browser Hijacks” and what you can do when it happens to you. In this article we will address “Phone Scams” and in the next article we will cover email scams, better known as “phishing” emails.

In the world of scams and scammers, your personal information is the prize. Whether its your identity, bank account number or credit card number – they want it. The scammers’ intent is to sell your stolen information for money, extort you for money or steal your money directly from your accounts.

On the phone they will sound professional, helpful, kind and courteous. But their is nothing respectable about them. They are thieves pure and simple. For them the “Ends Justify the Means”. You are simply the next revenue stream to them.

You may be thinking all of this sounds rather harsh – knowledge can be powerful. You need to know what you’re up against. The solution to avoid getting scammed is going to sound rude, because you are going to need to be rude. Here is the big solution … hang up on them! Don’t engage in conversation. Once you realize that the caller is pumping you for information or attempting to get you to “go to their website” – hang up. The longer you stay on the line with them, the greater the risk. If they call you back repeatedly, hang up repeatedly. These people get paid when they talk you into giving something to them, and they can be very good at their jobs.

Microsoft is not going to call you about your computer or laptop. The bank is not going to call you to verify your account number or passwords and the state or federal government is not going to call you to verify your social security number. If your unsure whether the caller is valid, simply hang up. Then look up an official number for the organization or business and call them directly to inquire if they were trying to contact you. That’s it. Pretty simple right?

In this article we talked about phone scams, which are very easy to deal with, once you know what you’re up against. In the next article we’ll discuss email scams and what you can do to protect yourself from them.

If you have questions give PSA Computer Services a call at (707) 506-6802.

Scams and Scammers

Article (PSA-0024)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Scams and Scammers

There are many types of scams and scammers you may encounter throughout your life. Over the next three articles I would like to talk to you about three different types of scams you may encounter while browsing the web, answering the phone or checking your email.

In this article we will discuss “Browser Hijacks”.

This is a common type of scam/attack and can happen when you are using your computer to browse the web. Here’s how the scam works: when you visit a webpage, the scammers will have some type of “trigger” embedded in the webpage. These triggers are usually in the form of a link, image or ad. Have you ever heard of the term “clickbait”? That’s what these are: typically phrases, or pictures that many people cannot resist clicking on or rolling their mouse over. If you do click on them or roll over them with your mouse it will trigger a routine (execute code) which can then pop-up a dialog box with some kind of alarming text, such as “Virus Alert!”. Sometimes it will even be accompanied by alarming sounds, voices warning you that you have been infected or hacked and may even look like an antivirus software performing a scan and finding thousands of infections! Note – until you click something or call that number on the screen, YOU ARE OKAY. What you do next will determine the outcome of this browser hijack scam. Do they get what they want – your money, control of your computer and perhaps you via extortion or does it simply cost you a few minutes of your time … its up to you. So relax and ignore everything you see and hear on your computer in this moment. It’s all geared to induce a state of panic. Panicking makes it difficult for us to think clearly and more susceptible to making bad decisions and this is the goal of the scammers. Now that you’re relaxed, we have two tried and true methods of ending this “Browser Hijack” scam without actually being scammed. One is for computer savvy users, the other is for the rest of us. You’ll need to decide which one is right for you.

First way – perform a [CTRL]-[ALT]-[DELETE] key combination press and then select “Task Manager” from the displayed menu. This will, as the name states, open the Task Manager utility. This utility lists all the currently running processes on your computer. It can be configured to show “More details” or “Fewer details” by toggling the option in the lower left of the dialog status bar. Either view will work for our purposes. Scan the list of processes for the name of the browser you are using to browse the web. Common browser names are: Google Chrome, Firefox and Microsoft Edge. Right-click the browser name to display a shortcut menu. From the shortcut menu select the option “End task”. This should close your browser AND the alarming virus message. Now open the same web browser you just closed and if asked to “Restore pages … ” decline. If you restore the pages, you’ll be looking at the fake virus alert page again and starting over. If this process seems a bit complex for you, then on to the second way.

The second way. Warning – this process can cause data loss for any documents, currently open on your computer, which have not been saved. If you have data which needs to be saved, I encourage you to work through the “First way”. If you absolutely can not accomplish the first way, give me a call – the number is at the end of this article.

Okay, we are going to perform what is called a “hard stop” of your computer. Press and hold your power button for 4-6 seconds, until you hear it power off. This effectively closes all programs running on your computer – including the browser hijack. This is not ideal and should only be used as a last resort to deal with the browser hijack. Once it has powered off, simply power it back on and open the same web browser. If asked to “Restore pages … ” decline. If you restore the pages, you’ll be looking at the fake virus alert page again and starting over.

In this article we talked about browser hijack scams, which are pretty straight forward to deal with. In the next article we’ll discuss some basic phone scams and what you can do to protect yourself from them.

If you have questions give PSA Computer Services a call at (707) 506-6802.

Computer Security Software Considerations

Article (PSA-0023)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Computer Security Software Considerations
Original release date: June 10, 2023

Is more security really necessary? When is enough enough? Antivirus, spyware protection, malware protection, browser protection and firewalls, where does it all end? As we dive into this issue remember each case is different and depends on where, what and how the computer is used. So, for our discussion we will break computer security up into two categories: “online computers” and “always offline computers”.

Online Computers:
(1) If your computer is connected to a network or the internet, you should have a functioning, properly licensed and updated antivirus program. The antivirus software you choose should offer “Real Time” scanning, “Scheduled” scanning and “Manual: scanning. “Real Time” scanning allows the antivirus program to continually scan files as they move to and from your computer, and will notify you if any of the file(s) are suspicious. Think of this as “preventive protection”. “Scheduled” scanning allows you to schedule a recurring scan of all existing files (or selected files) on your computer hard disk in a systematic effort to locate suspicious files. “Manual” scanning allows you to scan a particular file or files anytime you feel it is necessary.

In the past Antivirus software was purchased and installed on your computer. This usually required an annual subscription and could become quite pricey. For those of us using a modern Windows operating system, antivirus protection is built into the operating system at no additional cost. You can still purchase antivirus protection from a third party vendor such as Symantec, McAfee and AVG, but be aware these programs have become quite expensive and massive. Worse yet, they can often render your computer unuseable.

(2) If your computer is connected to the internet, you should have a functioning, properly licensed and updated firewall. A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer using a list of rules. Some of these rules are generated automatically and others are rules we make. A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through your local network or the internet.

A “Software” firewall is installed directly on your computer. Microsoft operating systems have shipped with a software firewall built-in since the release of Windows XP service pack 2. A “Hardware” firewall, in most homes and small businesses, will be your router. With a hardware firewall there’s nothing to install on your computer. There are “paid for” firewall products available, but I would recommend taking a close look at the built in firewall of the operating system you are currently using (if it offers one) before running out and purchasing the newest firewall product. For the majority of computer users the built in firewall is more than adequate.

Non-Internet Connected Security Considerations:
If your computer will NEVER be connected to a network or the internet, EVER, then you are at liberty to relax your protection considerably, allowing more of your systems resources to be used on applications. However, there are still some very important considerations. If you will be using storage media containing files from other computers which are connected to the internet, then there is still the possibility of infection. If your computer will never be connected to the Internet, and you will never load files from another machine onto your computer, then you can bypass antivirus security software all together. If your computer will be using files from another computer then you should have an antivirus program installed.

Is More Protection Really Necessary?
In short, for a computer connected to the Internet, a single antivirus program, a single configured firewall and a healthy dose of common sense is adequate. Installing more than one antivirus program can generate a few notable issues. Let’s take a moment to look at the most critical of these issues.

(1) RAM Depletion. Each program running on your computer is using some of your system memory (RAM). The more programs running, the more RAM is used. When there is no more RAM available, your computer will begin to use your hard disk as a “type” of RAM. Hard disk access is not as fast as RAM access, and when your system has to start using the hard disk as RAM it degrades the performance of your entire system – TREMENDOUSLY!

(2) Software Conflicts. Having more than one antivirus program running on your system may result in a software conflict. If both programs are scanning your computer for “viral activity” there is a high probability they will see each other as “viral activity”, causing a software conflict. This particular problem can be extremely frustrating and can lead to the next very challenging issue.

(3) System Corruption. Files necessary to the other antivirus program can often be identified as “malicious”, and will be quarantined (made inaccessible) or removed, leaving the antivirus program corrupted. Trying to uninstall or repair a program in this state can be problematic, to say the least.

If you are unsure of your “Security” status – give PSA Computer Services a call at (707) 506-6802.

IC3 Annual Report – 2022 Internet Crime Report

Dear Reader,

Today’s cyber landscape has provided ample opportunities for criminals and adversaries to target U.S. networks, attack our critical infrastructure, hold our money and data for ransom, facilitate large-scale fraud schemes, and threaten our national security. At the FBI, we know “cyber risk is business risk” and “cyber security is national security.” There is no shortage of recent examples showing the wide-ranging economic and national security effects of cyber crimes. We have seen cyber threats emanate from around the world and witnessed the scope and sophistication of these scams and attacks deepen. As these threats increase, we continue to encourage victims to report cyber incidents and cyber-enabled frauds to the FBI so that we may impose risks and consequences on malicious cyber actors.

Because cyberattacks and cyber-enabled frauds continue to affect our everyday lives, the FBI’s Internet Crime Complaint Center (IC3) is critical to combatting the cyber threat. The IC3 serves as a public resource to submit reports of cyberattacks and incidents, which allows us to collect data, identify trends, and pursue the threat at hand. In 2022, the IC3 received 800,944 complaints, which is a 5 percent decrease from 2021. However, the potential total loss has grown from $6.9 billion in 2021 to more than $10.2 billion in 2022.

While the number of reported ransomware incidents has decreased, we know not everyone who has experienced a ransomware incident has reported to the IC3. As such, we assess ransomware remains a serious threat to the public and to our economy, and the FBI and our partners will remain focused on disrupting ransomware actors and increasing the risks of engaging in this activity. In concert, the public can play a crucial role by taking proactive measures to prevent and prepare for a potential cyber attack and, if there is an incident, by reporting it to the FBI through the IC3. Though cybercriminals are continuously seeking to make their attacks more resilient, more disruptive, and harder to counter, public reporting to the IC3 helps us gain a better understanding of the threats we face daily.

The FBI’s commitment to assisting victims of cyber crimes and cyber-enabled frauds, as well as our dedication to working with partners to combat these crimes, allows for continued success through programs such as the IC3’s Recovery Asset Team (RAT). Established in 2018, RAT streamlines communications with financial institutions and FBI field offices to assist freezing of funds for victims. In 2022, RAT initiated the Financial Fraud Kill Chain (FFKC) on 2,838 Business Email Compromise (BEC) complaints involving domestic-to-domestic transactions with potential losses of over $590 million. A monetary hold was placed on approximately $433 million, which represents a 73 percent success rate. In 2022, RAT saw a 64 percent increase in FFKCs initiated compared to 2021.

While the cyber threat is ever-growing, the FBI remains appreciative of those individuals and entities who report cyber incidents to the IC3, as that valuable information helps fill in gaps that are crucial to advancing our investigations. Your efforts are critical to our ability to pursue the perpetrators and share intelligence to protect your fellow citizens. Cyber is the ultimate team sport, and we are in this fight together. The FBI is relentlessly focused on promoting safety, security, and confidence into our digitally connected world, and we are eager to continue working with the American public to bring cybercriminals to justice around the globe.

Timothy Langan
Executive Assistant Director
Federal Bureau of Investigation

Read the full report here: https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf

Backup, Backup, Backup!

Article (PSA-0022)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Backup, Backup, Backup!
Original release date: March 10, 2023

Reliable backups are the backbone of your IT “Disaster Recovery Plan” and “Business Continuity Plan”. Catastrophe can hit any business, no-matter how small or big you are, and catastrophe can come in many forms such as: fire, hardware failure or “ransomware”. The more data lost, the greater the impact on your business. Part of getting your business back up and running after a disaster, is being able to restore operations to where they were before the problem occurred. Businesses who have learned the value of backups employ the 3-2-1-0 backup rule. Lets take a quick look at each one of these rules.

Rule 3: Maintain at least three copies of your data and applications. That’s the one copy you’re using and two backups. This way, if one of your backups is unavailable for any reason, you can still recover what you need in a reasonable amount of time.

Rule 2: Store your backups on at least two different types of media. One reason for this is each type of media has its own vulnerabilities, and you don’t want both of your backups susceptible to the same problem. By utilizing different media, you can reduce your exposure to the same incident preventing access to both of your backups.

Rule 1: Keep one of the backups in a different location. Consider a catastrophe at your business, such as a break-in, fire or natural disaster. If all of your backups are at the same location, they will all be affected. This can result in total data loss for your business.

Rule 0: Verify your recovery plan has zero errors. It is not uncommon for businesses to implement a backup plan but fail to verify it is performing as expected. Regular testing is critical to ensuring you can recover your business data and applications in the event of a disaster.

It doesn’t matter if you are a business or home computer user, if you have anything on your computer that matters to you, it is your responsibility to make sure you have a backup plan in place. In my 20+ years of experience in the IT industry I have seen brand new hard drives fail within 90 days of purchase. I have seen years of family pictures vanish by accidental deletion and I have seen “un-tested” backups fail to restore important business files – files which everybody “thought” were being backed up.

If you are unsure of your backup status, give PSA Computer Services a call at (707) 506-6802.

Additional information on backups:
High availability – following the backup rule
The Importance of Effective Data Backup

Printer Installation 101 – (WiFi)

Article (PSA-0021)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Printer Installation 101 – (WiFi)
Original release date: December 10, 2022

In our last article, Printer Installation 101 – (USB and Ethernet), we discussed the basic process on how to setup a printer via USB connection and Ethernet connection. In this article we will address setting up a WiFi enabled printer on your WiFi network.

Basic preparation for installing most WiFi printers will include: knowing your WiFi network name (SSID) and having your WiFi connection password. Also, on initial configuration you will want your WiFi printer close to your WiFi router (or access point). Within four feet with clear line of sight will be fine for our purposes. In addition to having the printer installation software available for your make and model of printer, ensure your computer(s) are connected to the same WiFi network you will be connecting the printer too.

There are two common WiFi printer setups you are most likely to encounter – printers “with a touchscreen” and printers “without a touchscreen”.

1. Setting up a printer with a “touchscreen”.
If your WiFi printer has a touchscreen you will need to go into the menu system to access and configure the printers WiFi connection properties. Most of the menu systems are pretty intuitive but can vary greatly – so at this point you may need to refer to your printer user manual for specifics on where to enter your WiFi connection information. Once you are in the correct menu for configuring your printers WiFi connection settings, you will either select your network from a list offered by the printer menu or you will need to enter in the name of your WiFi network manually. If you have to enter it in, make sure it matches exactly! Next, you will be prompted to enter your WiFi connection key (password). Again, make sure you enter it exactly … passwords are case sensitive. If all went well, your printer should now be connected to your WiFi network. You can now unplug your WiFi printer and move it to any location you want, as long as it is within your WiFi network coverage range. There is still more to do before you can print to it though … but for those of you who have successfully completed this step – please skip to step 3.

2. Setting up a printer without a “touchscreen”.
If your WiFi printer does not have a touchscreen, then it will attempt to connect to your WiFi network using technology called WiFi Protected Setup or (WPS). Your WiFi router (or access point) will need to offer this technology for you to successfully connect your printer. If you are unsure whether your WiFi router offers WPS, please refer to your router user manual. Assuming your router offers WPS, the first step is to put your printer in WPS mode. This is usually accomplished by pushing a button on your printer (refer to your printer manual). Next you will need to put your router in WPS mode within two minutes by pushing the provided WPS button. Each WPS enabled printer will offer a visual queue to indicate whether it has successfully connected to your WiFi network or not. Please refer to your printer manual for specifics. Most printers will usually have a blinking light while connecting – which then turns solid once connected. If all went well, your printer should now be connected to your WiFi network. You can now unplug your WiFi printer and move it to any location you want, as long as it is within your WiFi network coverage range.

3. Finally, setting up your computer to print to your WiFi printer.
Run the installation software that came with your printer (or you downloaded from the manufacturers website) on your computer. Each installation setup can be slightly different. If asked what type of installation your are performing (USB, Ethernet or WiFi), choose WiFi. The software will use your computers WiFi network connection to look for your WiFi printer. That is why it is critical that your printer be on the same WiFi network as your computer(s). If all goes well, the installation software should present you with the option to choose your printer from a list. Once you select your printer the installation should proceed with minimal input from you. If there are multiple printers on your WiFi network, you may be asked to choose the correct printer from a list. The printer you want will usually be distinct based on the make and model. Once the installation is completed you can open up Notepad (or the text editor of your choice) type a word or two and hit print. If all went well your printer should jump to life and produce a copy of your document.

Setting up a printer can be challenging if technology is not your thing. This walkthrough is very generalized and may not be sufficient to help with all installation scenarios. If you run into a problem installing your new WiFi printer and feel you need some help, give PSA Computer Services a call at (707) 506-6802.

Printer Installation 101 – (USB and Ethernet)

Article (PSA-0020)
Submitted by: Billy Joe Long
Company: PSA Computer Services
Titled: Printer Installation 101 – (USB and Ethernet)
Original release date: September 12, 2022

So you got that new printer and your thinking … now what? Well don’t panic, depending on how you want to use your printer this should be pretty straight forward. Let’s take a look at the two most common printer setups.

1. You will use your printer on one and only one computer (desktop or laptop).

When you buy a consumer grade printer today it will usually provide, at a minimum, one of these three connection methods: USB, Ethernet or WiFi (or some combination of those three or all three). There are other connection methods, but we will only be addressing these three methods over the next couple of articles.

Setting up your printer directly connected to your computer using USB is the easiest setup, but comes with limitations on where you can put your printer. Typically the USB cable that comes with your printer will be 3 to 6 feet long. That’s not much length to work with, but if that works for you then simply pop the installation disk into your computer (or go online and download the drivers to your computer – the web address will be in the instructions – yes, you should review them as well!). Then run the setup program. The most common software setup routine will be to run the printer setup software BEFORE PLUGGING YOUR USB CABLE INTO THE COMPUTER. At some point in the printer software installation you will be instructed to plug the provided USB cable into the printer and your computer. The software installation will continue once the printer is detected. From there follow the on-screen instructions and once completed you should have the ability to print – congratulations!

(Note on USB printers. USB printers can be shared to other users located on the same network. This setup can produce setup issues and is therefore not covered in this walkthrough. If you would like more information on this type of setup, please give us a call.)

The setup process for a network printer will be the same whether it’s for one or many computers to access it – so we will just skip to section 2 for the ethernet network walkthrough.

2. You will use your printer on one or more computers (desktop or laptop).

Network printer installation is a little more involved. Network printers offer flexibility on where you can put your printer – especially the WiFi variety, but can require a little more work to setup. In this article I will cover ethernet installation only. WiFi installation will be more involved and we’ll take a look at that in my next article.

Setting up your printer on your ethernet network consists of first connecting your printer to an ethernet cable which is connected to your router. Now pop the installation disk into your computer (or go online and download the drivers to your computer – the web address will be in the instructions – yes, you should review them as well!). Then run the setup program. At some point in the printer software installation you will be instructed to choose a printer from a list of available network printers (unless there is only one). The software installation will continue once your new printer is selected. From there follow the on-screen instructions and once completed you should have the ability to print from this computer – congratulations! Run the exact same setup process on any other computer, on the same network, you want to have the ability to print. Congratulations again! Tune in next time as we tackle setting up a WiFi printer.