Many keyboard shortcuts come built into Windows. Some are gimicky, like the “Aero” view in Windows 7 that shows a real-time view of open programs and allows you to quickly flip between them (Alt+Tab). Other key combinations are more practical, allowing you to quickly “lock” your computer from unwanted access, or easily zoom in for a better view of a webpage.Details
Think worms are the malware of yesteryear? Not so. A new worm has been spreading rapidly. This worm spreads via RDP (remote desktop connection).
This worm does not seem to be exploiting any new vulnerabilities in the RDP protocol. Rather, it gets its foothold in the internal network through other means, such as Adobe flash or Reader vulnerabilities or general phishing attacks.
Thou shall use e-mail to convey only ideas and factual or logistical information, not emotions. To express emotions and sentiment, take time for a one-on-one meeting or telephone conversation rather than sending an e-mail. The sound, tone, timber, and quality of your voice will help to better communicate your message and avoid misunderstandings.Details
If you are using Outlook (any version), and you have managed to reset the security level for e-mails, There are two things you need to do to help prevent malicious emails from affecting your computer. The first step is to turn the ‘Reading Pane’ ‘Off’, then turn the ‘Auto-Preview’ on, which will only displays the first three lines of the message, which should be enough to tell if the email is safe to read or simply junk.Details
Are you concerned about identity theft? They should be. Most of us are.
Half of all identity theft occurs in the workplace. Think about it. Your employer has your name, address, phone number, Social Security / Social Insurance / National Identification number, and more personal information on file. Few SMEs have tight security internally.
Cyber-criminals do not just target large businesses. SMEs often have fewer resources for fighting crime and less expertise in doing so. The first step in a cyber-attack is often just an automated scan of the network perimeter – to look for known vulnerabilities that have not been patched.Details
17 (yes SEVENTEEN) identities are stolen every single minute, according to FTC estimates, which estimates 9 million identities are stolen per year. There are many methods that thieves use, including online contests. If you sign up, you may unwittingly be participating in the still-growing problem of identity theft. Here’s an example of a contest that…Details
Due to the popularity of this question, we are reposting our recommended email settings for clients that use our service: POP SETTINGS Incoming Mail Server: mail.nerdsisp.com SSL: yes Port: 995 IMAP SETTINGS Incoming Mail Server: mail.nerdsisp.com SSL: yes Port: 993 SMTP SETTINGS Outgoing Mail Server: mail.nerdsisp.com SSL: yes Port: 465 Outgoing authentication must be turned…Details