• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Internet

Many Factors Influence Video Speed And Quality

August 30, 2010

Over the years I’ve been asked by a wide variety of different computer users about video streaming and overall video quality on a computer system.

Websites like YouTube, Flickr, and MetaCafe have taken the online video revolution and turned it upside down the last few years with advances in audio/video technologies and the affordability and availability of high speed Internet connections.

So you are on the Internet watching one of your favorite videos on YouTube, but the video does not play smoothly, seems to skip frames, and sometimes even just sits there and does nothing; why you might ask.

I will go over a few tips and tricks that can either fix the problem, or move you in the right direction to resolving those frustrating video issues.

As you can imagine, there are a number of reasons why this could be happening, but let’s start with your system before exploring other possibilities.

A good quick test is to play a video from either a CD or DVD that you have in your possession or one you have already downloaded onto your system’s hard drive.

If the media plays from your local system with no issue, the problem probably exists outside of your system and other options should be explored, but what if it’s not?

Memory
Ensure your computer has enough memory. If you’re not sure how much you have or you should have, give us a call to have your machine checked over for upgrade options.

Virus/Malware
If your system is infected with a virus or some type of malicious software, it could be consuming valuable resources that your system needs to stream videos.

Try running a scan with your antivirus software and again if you’re not sure we’re here to help with the virus removal.

Internet Speed
If your Internet connection is on the slow side, this could also cause a problem.

Remember when you’re accessing videos from the Internet, the data is transferred across the Internet to your system where it is played, unlike putting a DVD/CD into your disc drive and playing it right from your system. The data is all there and does not need to transferred, compiled, and played.

Congestion
If the video that you are trying to play is out on the Net and there are several hundred thousand other people attempting to stream the same video as you, this can cause the video to be slow.

Although this one isn’t as typical as the others’ it still happens, and the only way to check against this would be to try the video at a later time in the day.

Buffering
Again this applies to the users who are accessing content via the Internet, try pausing the video, and letting the progress bar on the video build up before playing. This is called buffering, which can stop choppy videos from stopping and playing.

These are going to be the top five reasons I’ve come across when diagnosing video quality issues on a computer and via Internet websites.

Remember there are several factors that affect the performance and quality of your video, and many times a combination of factors. But if you keep an eye on these five, your video experience should be a lot less frustrating.

How Does Google’s Personal Search Affect Your Business?

May 21, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Consider this statement: “On Friday afternoon, Google made the biggest change that has ever happened in search engines, and the world largely yawned.” That quote is from a December 7, 2009, post on Search Engine Land, a website that covers Google, Bing and the other Internet search engines.

Don’t worry if you didn’t read the post. Since it was early December when Google announced that it would start personalizing all search results, we were getting ready for the holidays.

It isn’t clear at first glance just how significant this change will be. A closer look, though, reveals nothing short of a revolution in the making.

Here is what Google did, according to Google: “Today we’re helping people get better search results by extending Personalized Search to signed-out users worldwide, and in more than forty languages. Now when you search using Google, we will be able to better provide you with the most relevant results possible.”

A real world example: I do a lot of searches for recipes, and often click on results from epicurious.com. Knowing this, Google might rank epicurious.com higher on the results page the next time I look for recipes.

Other times, when I’m looking for news about the University of Michigan’s football team, I search for “Michigan wolverines.”

Because I frequently click on http://www.mgoblue.com/, Google might show me this result first, instead of search results about the animal.

Google is able to do this because they are now cataloging all of your searches for over 180 days. It then uses your search history to customize your results.

If you’re not signed in to your Google account, a cookie on your browser keeps a record of your queries.

Sounds pretty innocuous, doesn’t it? Better search results? Tailored to exactly what I need? I like this change! Others, however, might squirm at the Orwellian aspect of an omniscient Google knowing exactly what you want. Whether the change is good or bad is debatable, but it’s certainly going to be big.

Until now, search engines have largely delivered the same results to everyone. Two different people could search for Barack Obama and get back the same set of results.

The days of “normal” search results that everyone sees are now over. Personalized results are the “new normal,” and the change is going to shift the search world and society in general in unpredictable ways.

How might this change shift the world? Here are a few scenarios:

Narrowing your Internet experience
This change could curtail what we’ll call “search-engine serendipity.” Search-engine serendipity happens when you search Google with a preconceived notion of what you’ll find, but instead you end up exploring new ideas and virgin territory. Personalized results may repeatedly channel you through the same grooves, limiting your exposure to things outside your experience.

Confirm your personal biases
Search Engine Land’s Dan Sullivan picks up on this possibility in his post: “Is a search for Michelle Obama showing a racist image? Maybe for one person, but not for another.”

For the xenophobic Googler, every search may reinforce his xenophobic worldview because personalization filters sites that don’t jibe with his tastes. Another example: Once Google has you pegged as a bleeding heart liberal, it may serve up Huffington Post for every query.

Polarize our political system
You can see where we’re going with this. If personalized results reinforce our beliefs, we’ll soon have Google red and Google blue. The folks in Mountain View have tried to comfort people by saying that it wants “diversity of results.” But that poses another troubling question: Who will define diversity? Google?

It could reduce the visibility of your website
Since no one but Google knows how its personalization algorithm works, it’s hard to know how far-reaching the change will be. But it’s plausible that a business’ website would no longer rank for certain keywords among certain prospects. If, for example, a person went on an Amazon.com book-buying spree, Google might take note and start displaying Amazon.com for a majority of product-related queries, which is great … if you’re Amazon.com.

It could skew your SEO efforts
Since there is no longer a ‘normal’ set of results, it becomes more difficult to optimize your website. There isn’t one bull’s eye to aim for anymore: there are millions of them and they’re moving all the time as Google refreshes its 180-day cache of your search terms.

Personalized Search for Everyone

Google’s Personalized Results: The “New Normal” That Deserves Extraordinary Attention


http://googleblog.blogspot.com/2009/12/personalized-search-for-everyone.html

New Phishing Schemes You Should Know About

June 28, 2009

I know growing up as a child, I loved to go fishing. I never caught very many fish, but just being out on the water “drowning worms” was good enough for me. As the years have passed, though, a new kind of “phishing” has emerged.

The term phishing refers to luring techniques used by identity thieves to fish for personal information in a lake of unsuspecting Internet users.

Their purpose is to take this information and use it for criminal objectives such as identity theft and fraud.

Phishing is a general term for the creation and use by criminals of emails and websites – designed to look like they come from well-known, legitimate and trusted businesses, financial institutions and government agencies – in an attempt to gather personal, financial and sensitive information.

These criminals deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords.

Today a new form of phishing appears to be spreading through social websites such as Facebook. This new scam works like this.

As soon as you login to the site, it will steal your email and password and then log you into Facebook. Within a short period of time the system will automatically switch your password and block you from the site. It then begins to send the same URL to all of your Facebook friend’s inboxes.

As this spreads, the criminals gather thousands of email addresses and passwords before Facebook can stop all references to the website.

The scammers have developed a method to duplicate the scam immediately and the next thing you know they have four or five phishing scams going on at the same time all over Facebook. This allows them to gather hundreds of thousands of victims very quickly.

It is not known yet what these people intend to do with all these addresses, but you can almost guarantee that they will result in a malicious worm at some point. The potential to access a user’s financial information and accounts could result in the loss of millions of dollars.

Another form of phishing is called “in session” phishing. This form does not use email nor does it rely on the user having to be tricked into clicking on a link.

It works like this. Let’s say you go to your banking website that is secure. You login and take care of your business, then leaving that browser window open you innocently go to another website that has been compromised. All of a sudden a pop-up asks you to validate your login to continue your banking session.

Remember two things must happen in order for this scam to work. First, a website must be compromised and infected—the higher traffic the better, obviously.

Second, the downloaded malware must be able to identify whether or not the unknowing user is logged into a relevant website.

Most banking institutions have taken steps to prevent this. One step is having a rapid disconnect of an idle session.

But in order to be safe we would recommend closing all browser windows after you have visited a secure banking website.

In addition it is very important to keep your system free of all spyware, malware and viruses.

Tech Experts has certified technicians that clean these types of infections and malware from computers every day. We urge you to take advantage of our system checkup and cleaning service to keep your identity to yourself.

7 Tips For Working Securely From Wireless Hotspots

March 28, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Wireless hotspots are changing the way people work.

These wireless networks provide high speed Internet access in public locations—as well as at home—and require nothing more than a notebook PC with a wireless card.

From coffee shops to restaurants, airports to hotel lobbies, hotspots are ubiquitous. They range from paid services, such as T-Mobile or Boingo, to free connections at your local restaurant or library.

But they all have one thing in common: These are all open networks that are vulnerable to security breaches. And that means it’s up to you to protect the data on your PC. Here are a few tips to make working in public locations more secure.

Encrypt your files.
You can protect your files by encrypting them, which requires a password to open or modify them. Because you must perform this procedure on one file at a time, consider password-protecting only the files that you plan to use while working in a public place.

Choose more secure connections.
It’s not always possible to choose your connection type—but when you can, opt for wireless networks that require a network security key. The information sent over these networks is encrypted, which can help protect your computer from unauthorized access.

The security features of different networks appear along with the network name as your PC discovers them.

Make sure your firewall is activated.
A firewall helps protect your mobile PC by preventing unauthorized users from gaining access to your computer through the Internet or a network. It acts as a barrier that checks all incoming information, and then either blocks the information or allows it to come through. All Windows operating systems come with a firewall.

Monitor your access points.
Chances are, there are multiple wireless networks anywhere you’re trying to connect. These connections are all access points, because they link into the wired system that gives you Internet access. So how do you make sure you’re connecting to the right one? Simple—by configuring your PC to let you approve access points before you connect.

Disable file and printer sharing.
File and printer sharing is a feature that enables other computers on a network to access resources on your computer. When using your mobile PC in a hotspot, it’s best to disable file and printer sharing because when enabled, it leaves your computer vulnerable to hackers. Remember, though, to turn this feature back on when you return to the office.

Make your folders private.
When the folders on your mobile PC are private, it’s more difficult for hackers to access your files.

Consider completely removing sensitive data from your PC.
If you’re working with extremely sensitive data, it might be worth taking it off your notebook PC altogether. Instead, keep it behind the corporate firewall and use your company’s VPN to access it when necessary. This way, you have multiple safeguards in place.

A few simple precautions can help make working in public places more secure. And by selecting the best connections and adjusting settings, you can enjoy productive and safe work sessions no matter where you are.

School is Back in Session

September 14, 2008

How to Keep Your Kids Safe Online

With school back in session, thousands of children will be surfing the Internet to conduct research, chat with their new classmates and complete homework assignments.

Although the Internet provides a tremendous learning tool for children, left unchecked it can also expose them to inappropriate material and unscrupulous individuals looking to exploit innocent children.

The Statistics of Online Abuse Towards Children Are Alarming

According to a survey conducted by NetAlert, nearly one child in every five has been approached online by a stranger, and 45% have been exposed to material that is pornographic, sexually explicit, violent, racist, or that encourages them to participate in dangerous or illegal activities.

One of the biggest threats are social networking sites like MySpace.com.

But MySpace isn’t the only threat.

According to Highlights of the Youth Internet Safety Survey conducted by the U.S. Department of Justice, one in five children received unwanted sexual solicitations online. There are a growing number of pedophiles using the Internet to gain a child’s confidence and arrange face-to-face meetings.

These cyber criminals are using everything from spam e-mails to online messaging, kid’s chat rooms, and misleading domain names to trap children. If your child uses the Internet, you must take measures to protect them from these dangers.

As part of our back-to-school newsletter edition, we’ve outlined 3 things you should be doing now to keep your kids safe online.

3 Things You Can Do Right Now To Protect Your Children Online

1. Install web and e-mail filtering software to prevent your children from viewing inappropriate material. We recommend using www.bsafeonline.com. Not only will this prevent your children from visiting inappropriate web sites, but it will also stop inappropriate spam.

2. Talk to your kids about online safety and proper Internet usage. Set limits and guidelines about when they can go online, what they can do, and how long they are allowed to be online. Explain why it is dangerous for them to “chat” with strangers online or download suspicious looking files.

3. Give your children specific online guidelines or rules to follow when using the Internet. It’s not enough to warn them about potential risks; pedophiles know how to cloak their identity and gain a child’s confidence to arrange face-to-face meetings.

Require Your Kids To Follow These Rules Online:

  • I will not give out personal information such as my address, telephone number, parents’ work addresses, or our e-mail address to anyone online.
  • I will tell my parents right away if I see a web site, e-mail, or message that makes me feel uncomfortable.
  • I will never send my picture to anyone online or upload my picture to any web site without my parent’s knowledge and permission.
  • I will never agree to meet someone face-to-face whom I met online without my parents’ knowledge and permission.
  • I will not respond to any messages that are mean or that make me feel uncomfortable in any way.
  • If I get a message like that, I will tell my parents right away so that they can contact the online service.
  • I will never give my parents’ financial information to anyone, especially their credit card information, bank account information, or social security number.

If you want more information on how to keep your children safe online or to report illegal, violent, or explicit acts towards children, go to www.cybertipline.com.

This site is run by the National Center for Missing & Exploited Children and is a great resource for parents, teachers, and guardians.

 

How To Keep Your Laptop Safe and Secure

May 11, 2008

You can’t beat the convenience of checking e-mail and hopping on the Internet at (Wi-Fi) hotspots found in airports, coffee shops, and bookstores. For the uninitiated, hotspots are areas where you can use your wireless laptop to surf the Web.

But the question you have to ask yourself is, just how safe are hotspots? With the proliferation of hackers, viruses and identity theft at an all time high, you’re smart to be concerned. Wi-Fi spots are very attractive to hackers because they can use what’s called an “evil twin” connection to access your laptop.

An evil twin is a hotspot set up by a hacker to lure people from a nearby, legitimate hotspot. For example, when you log in at your favorite coffee shop, you might actually be logging onto the evil twin Internet connection set up by the innocent-looking person working on a laptop at the next table. The most dangerous evil twins remain invisible and allow you to do business as usual. But in the background, they record everything you are typing. Buy something online and they are recording your credit card information. Log on to your bank account, and they can grab your password.

So what can you do to make sure you are not giving an evil twin access to your laptop?

First, know the name of the hotspot you’re going to use by asking someone who works there. Some businesses will give you printed instructions that include the hotspot name. But be careful. Hackers will name their evil twin network by a very similar name as the real hotspot, and may even show up as a stronger signal.

The best protection you can have is connecting via your company’s VPN (virtual private network). A VPN will protect your online information by encrypting your data and activity even if you’re connected through an evil twin.

If you don’t have a company VPN, you should assume that someone is looking over your shoulder and recording everything you type in. Therefore, the BEST protection without a VPN is to never type in information such as credit cards, passwords, or social security numbers when connected to a public Wi-Fi hotspot.

The Simple Document That Could Save Your Company From Complete Disaster

March 15, 2008

It’s official: end users are the weakest link in the IT security chain. You can set up a firewall, encryption, anti-virus software, and password protection up to your ears, but it won’t save you from the employee who posts his access information to a public website.

Most security breaches, viruses, spyware, and other network problems are a result of human error—an end user unknowingly downloading an infected file, emailing confidential information, or disabling their anti-virus, to name a few.

So what is a company to do? While there is no surefire way to keep end users from making mistakes, you can dramatically reduce the number of problems by creating an acceptable use policy (AUP) and training your employees on what is and what is NOT acceptable behavior.

But if you want your employees to actually adhere to your security policies, here are a few tips:

  • Keep it simple. A long, confusing policy that looks like a legal document is about as easy to read as the instruction manual for your digital camera. Make the policies clear and easy to read. Give examples and include screen shots where necessary.
  • Provide group training. Many companies make the mistake of distributing their AUP by e-mail and telling employees they must read it on their own. This gives the employees the option of NOT reading and simply signing and submitting. You don’t need hours of classroom training but a simple 15 or 20-minute session will force even the most reluctant users to learn a thing or two.
  • Keep employees updated. To add to the above tip, make sure you update employees on a regular basis to keep the policies fresh in their minds and to educate them about new threats.
  • Explain the consequences of not following the policy. This is both explaining the negative effects to the business as well as disciplinary actions that will be taken if they refuse to follow policy. Occasional violators should be warned, and habitual violators should be disciplined.
  • Monitor their behavior. The best policy in the world won’t work if it’s not enforced. There are many tools on the market that can do this for you automatically.

Need Help In Creating An Acceptable Use Policy and Training Your Staff?
Not only can we help you create a customized acceptable use policy for your staff, but we can also provide training on the topic and even install network monitoring software to make sure it is enforced, and that your
policy is working.

Call us at 734-457-5000 or visit us online at www.MyTechExperts.com for more info!

Net Security Purr-Fected: Pictures Of Kittens Are The Unlikely New Weapon Against Online Fraud And Spam

July 26, 2007

There’s a new way to combat internet fraud, prevent spam and keep online shopping secure. But your first impressions may be that it’s not exactly high tech. It takes the form of a simple question: From a gallery of fluffy-animal snaps, can you tell which are cats and which are dogs?

Your answer is enough to find out whether you are human or an automated spam program, designed to send unwanted email.

The dog/cat question is the latest example of a security device called a Captcha, a simple puzzle that usually takes the form of a string of distorted letters and numbers.

Captcha stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart.

The idea behind a Captcha is that users have to perform a task that is simple for a human but incredibly difficult for a computer. Distorting random letters and numbers makes them confusing to a computer but readable to the human eye.

Regular web users will be familiar with Captchas, as they are ubiquitous on shopping, email and networking sites; during initial registration and sometimes log-in, Captchas are used as an additional gateway to passwords.

Although a number of computer researchers have claimed that they invented the Captcha, it’s generally acknowledged that Carnegie Mellon University led the charge after being asked by Yahoo in 2000 to create a security tool to stop spammers using computer programs to set email accounts and then use these accounts to send millions of spam messages.

According to Luis von Ahn, a member of the original Carnegie Mellon team, “Captchas are still the best defence against many types of automated attacks, and I believe they will be used for the foreseeable future. The only ones that can be broken are the extremely primitive ones that use a constant font, and apply no distortion to the characters other than thin lines that are easy to remove automatically.”

But as programs are written that can read heavily distorted codes, the distortions become even more extreme. And as they do so, some of the Captchas are becoming too tricky for many humans to decipher at first attempt. More and more users are finding that they need two or three attempts before they can confirm their shopping orders or set up their new email account. So, creators of Captchas are exploring new avenues.

Von Ahn is the executive producer of a new project, Recaptcha.net, which uses old tomes to create new Captchas. While digitally scanning books to make them available online, character recognition software often fails to recognise a word, because of smudges or damaged paper. If von Ahn’s software can’t read it, he’s assuming that other computers will also struggle. “The words in my Captchas come directly from old books that were recently scanned, and we are using people’s answers to decipher what the words are.”

Picture recognition is an increasingly popular alternative. People are asked to look at a grid of images and pick the ones that have something in common – straightforward for humans but impossible for computers, as it’s difficult for computers to accurately classify images.

Pix Captcha (www.captcha.net), a Carnegie Mellon project, displays pictures of certain things – worms, babies and so on – and then asks people to select the corresponding noun from a drop-down menu.

Most altruistic is a Microsoft research project called Asirra (research.microsoft.com/asirra) – Animal Species Recognition for Restricting Access – that uses pictures of rescue-home dogs and cats from Petfinder.com. It asks you to click on the cats, rather than the shots of aardvarks, bears and dogs thrown in to baffle the computers.

It also helps find homes for domestic animals – each image has a tag reading “adopt me” on it.

Although still in the “beta” testing stage, Asirra has a database of over two million images with which it can create Captchas. It has the potential to change the way we stay secure online – and give animal lovers everywhere a dose of cuteness.

Adapted from The London Independent.

Parents More Worried About TV Time Than Children’s Internet Use

December 29, 2006

About 80 percent of children responding to a recent survey said the Internet is important for schoolwork, although three-quarters of the parents said their kids’ grades hadn’t gone up or down since they got Internet access.

Forty-seven percent of the adults said they have withheld Internet use as a form of punishment. Banning television is still more popular, though.

One in five American parents believe their kids are spending too much time on the Internet, though most say the online activities haven’t affected grades either way. In a study by the University of Southern California’s (USC) Center for a Digital Future, 21 percent of adult Internet users with children believe the kids are online too long, compared with 11 percent in 2000. Still, that’s less than the 49 percent who complain their kids watch too much TV.

Internet Use Peaking
The study, meanwhile, found that although only 27 percent of cell phone owners use them for text messaging, photo transmitting and other non-voice functions, the figure grows to 54 percent among those 18- to 24 years old and 45 percent among those under 18.

The study has been conducted most years since 2000. Over that time, researchers have seen Internet use grow to 78 percent from 67 percent. Access at home increased to 68 percent from 47 percent.

Net Dropouts
In one of the few surveys to look at why people are offline, the study found the lack of a working computer most often to blame. Of the 22 percent of Americans who do not currently use the Internet, more than a quarter are former users who dropped out.

“Almost nobody drops out out of dissatisfaction,” said Jeffrey Cole, director of USC’s Center for the Digital Future. “The reason most people drop off is they change jobs or their computer breaks.”

However, more than half the former users have no intention of returning online — the most ever. Overall, 60 percent of nonusers have no plans to go online within the next year.

Cole said the numbers raise the prospect of a permanent subclass of nonusers. “Internet penetration has largely plateaued,” he said.

Elderly Are Least Connected
Americans 66 years old and over remain the most disconnected, with only 38 percent online. For all other age groups, at least 74 percent are online, with penetration hitting 99 percent for those 18 and under, likely because most U.S. schools now have some form of publicly-usable Internet access.

On average, users spend 14 hours a week online, compared with 9.4 hours in 2000.

Thirty-seven percent of home Internet users still have dial-up accounts, compared with 26 percent for high-speed cable modems and 24 percent for DSL. Eleven percent of Internet users go online through mobile devices – not necessarily exclusively – averaging two hours a week.

Internet vs. Television
The study revealed little change in the effect on television. Thirty-six percent of home Internet users say they have spent less time watching TV since they started using the Internet, roughly the same as the 33 percent who said that in a 2001 survey.

Cole said the increased use of high-speed connections has a lot to do with that.

When people were on dial-up, they were accessing the Internet 20 or 30 minutes at a time – “generally time not spent watching television,” Cole said. “Broadband changed all that. They are on 30, 40, 50 times a day for two or three minutes at a time. It’s not a big bucket of time displacing television.”

People may be paying less attention to television commercials, though, fitting in online use during program breaks, he said.

That said, 41 percent of veteran users – those online for more than nine years – say they have spent less time watching television, compared with only 23 percent among those who have joined the Internet within the year.

The study found nearly a quarter of online users – especially newcomers to the Internet – say they spend less time reading.

The telephone survey of 2,269 U.S. households was conducted in English and Spanish from February to April and included follow-up interviews with respondents to previous USC studies.

The study has a margin of sampling error of plus or minus 3 percentage points.

Think Twice Before Posting Any Information Online

October 29, 2006

Whether it’s a chat group, forum, or even an email, take caution when giving out personal information or expressing your opinion about someone or something online.

Internet information is growing larger and more impossible to control every day. It’s not uncommon for people to lose their jobs because of what they wrote about their boss or their company, not realizing that it would remain as a permanent online record for the entire world.

One 22-year-old answered an Internet inquiry about whether anyone had ever had a bad drug trip. His reply was so interesting and colorful that years later it still ranks number seven out of a total of 92,600 Google hits that come up when you type in his name!

That’s why you should be very careful about what you post. Your boss or your future boss and head hunters can research your name online and pull up more information than you want them to have. They can also do continuous background checks on you, no disclosure required.

They not only can see what you’ve posted, they might be able to see your age, marital status, the value of your house, things you wrote as a teenager, liens, bankruptcies, and political affiliations.

Without the full story, a post or a question could be misinterpreted. For example, let’s suppose you are doing research for a friend or relative with a drug problem. If you post a question asking how to help someone beat a drug habit, others may assume the person with the habit is you.

To protect yourself, Business Week magazine gave the following recommendations:

  • Register with an online profile manager such as Ziggs or LinkedIn. They’re free.
  • If you must use MySpace, refrain from posting the risqué. Consider cloaking or using an avatar.
  • Order a background check from Zabasearch or Argali. Contact vendors if you find incorrect information.
  • Think before you blog. Anything personal that you post may come back to haunt you for years in the future.
  • Don’t send anything in an e-mail you would not want the world, and especially your mother, to read

As always, use common sense with the Internet. It is a very public place with a very long memory. It is fair to assume, Google never forgets anything.

« Previous Page

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.