Category: Instruction

  • Windows Defender – Good Enough?

    Windows Operating systems comes with an Anti-virus program called Defender. Is it enough? I have been using it for the last year and I have found it to be an excellent resource for protection. It scans as I go without interference It updates on its own without intervention or action from me It stops attacks…

  • CNN Video explains Hacking Via Phone

  • Which Password is MOST Important?

    The password that opens your email account is the most important password in your entire on-line activity. A typical hacking scenario goes something like this: A person uses their email on an unsecured site The site has been compromised and the email addresses for users are stolen The stolen emails are distributed across the Internet…

  • No, Social Security Does Not Call

    Social Security is not making calls to your home. You may have already gotten one, you may get one this week. But, when the caller says “This is Social Security calling…” hang up. If you have caller ID, make note of the calling number and do not answer that call. The caller states there is…

  • Microsoft is on the line, NOT

    Microsoft is on the line, NOT

    Hello, Microsoft is on the line… I find myself telling those who ask my advice for their computers that Microsoft does not make phone calls. No calls to tell the computer user that their system is infected. Microsoft does not have your phone number. They do not track your system day to day. Microsoft installs…

  • Your Digital Footprint – Minimize what is known about you

    I recently found this digital footprint article through Tech Radar Minimising the size of your digital footprint can be achieved easily if you take the time to do some housekeeping. There are a variety of techniques you can use to reduce the digital trail that you leave: 1. Check all your privacy settings Go to…

  • Twitter Passwords Compromised – Change yours today

    I get notifications from many sources and today I received one from Tech Crunch. 1. You should change your Twitter password right now Yesterday, Twitter revealed that a bug caused the platform to store user passwords in unmasked form. In this instance, it sounds like Twitter stored plain text passwords openly without any hashing on an…

  • Why Email Passwords Need to Be Very Strong and Different then Others You Use

    Why Email Passwords Need to Be Very Strong and Different then Others You Use

    Email Passwords Why do your email passwords need to be very strong and different than the others you use? Hacking is big business. Email is how a hacker gets to your banking and credit card information. Think about this. Every time you sign up for a banking login or you need to change your password,…

  • Update Regularly or Risk Attacks from Spectre, Meltdown or the Next One

    I Do Updates, and Why Update regularly. It is your primary defense against losing data, getting attacked and having your identity stolen, or worse. I believe many people do not update their computers because “it changes things.” Yes, that is true and sometimes it creates a time suck to fix those issues. That is because the…

  • Guys and Gals

    This study (“What’s the Password?”: The Surprising Results | EPC Group) says that men are almost three times as likely as women to include the word “password” in their passwords. This makes it easy to crack, while women are 1.5 times more likely to use the use of four words method. Their passwords are easy…