Google's new Priority Inbox feature not only sorts your inbox, but it also figures out what's important based on what messages you reply to and read.
Tuesday, August 31, 2010
Monday, August 30, 2010
Five simple steps for Computing on the Road
So whether you are a small business, about to embark on the holiday of a lifetime, a short break or six months backpacking around the world, then make sure you follow these five simple steps.
Thursday, August 26, 2010
Un-Hide Friends from your Facebook feed
If you have hidden a friend from you Facebook feed and want to see them again just follow the steps below.
Wednesday, August 25, 2010
The 2 Biggest Security Threats: ScareWare & You
Without a doubt the largest threat to the security of your computer and consequently your identity, and bank account is YOU, followed closely by ScareWare. The best firewalls and most effective antivirus won't help a bit if you, the user, click on Rogue Security Software and fake warnings. Known also as Scareware, this thief is fooling you big time. When it knocks, do not open the door.
Posted by
BWS Technologies
at
8:00 AM
Read more:
Anti-Virus,
How To,
Identity Theft,
Internet,
Malware,
Security,
Spyware
Tuesday, August 24, 2010
How can I know if my computer is infected?
Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough.While many of today’s threats are designed specifically to go undetected, there are still some tell-tale signs that a system has been compromised.
Monday, August 23, 2010
Friday, August 20, 2010
Spam/Phishing Spreads Through Facebook Chat, Events & Messages
Recently, a new wave of spam messages, chat messages, and events requests have been flooding the site, and the volume has only surged in the past few days.
How to: Properly Coil Your MacBook's Power Cord
Apple's white power brick is pretty handy, what with the attached hooks for coiling it up and packing it away. If you do it wrong, though, you'll likely stress the cord and break it (or worse, create a fire hazard).
Thursday, August 19, 2010
How to Tag People in Your Facebook Status Updates
This was quite a big deal when it was announced this past September, but from the amount of searches on the topic “how can I make someone’s name go blue in a Facebook status?” it seems some people still have not found the answer.
Wednesday, August 18, 2010
"Funny T-Shirt Fails" scam costs victims a $5 weekly charge
Facebook users came under attack from a new clickjacking scam that could result in lost money as well as aggravation, spread by the social networking site's Share button. The scam culminates with a list of surveys, similar to those used in a 'Dislike' button clickware scam discovered earlier this week and a Like button scam uncovered in June, according to anti-virus developer Sophos, which uncovered the con.
Your Photos Can Your Reveal Secrets
You can easily find out where people live, what kind of things they have in their house and also when they are going to be away.
Posted by
BWS Technologies
at
8:00 AM
Read more:
Cell Phone,
Facebook,
How To,
Identity Theft,
iPhone,
Security,
Social Networking,
Tips
Tuesday, August 17, 2010
Wireshark Antivirus - Rogue Badware
Wireshark Antivirus is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue.
All indigoGUARD clients: The application has been added to your block list.
If you think you have been infected please contact us. CALL 358-6305
All indigoGUARD clients: The application has been added to your block list.
If you think you have been infected please contact us. CALL 358-6305
Is Your Copier A Security Threat? Other network Devices?
Any device attached to your network poses potential risks, in terms of stuff on the network, computers -- desktops, notebooks, and servers -- tend to get the lion's share of press as tempting cyberattack targets, along with unsecured web sites, gullible/careless users, CD/DVD-ROMs, USB flash drives, PDF files, smartphones, VoIP PBXs and a few other things, not all of which, to be sure.
Monday, August 16, 2010
New Facebook Dislike Button Is A Scam
Scammers are becoming pretty clever with a Facebook application which claims to enable a dislike button.
How to Protect Your Phone's Valuable Data
The loss of a smartphone wouldn't be so bad if it ended with merely a bit of embarrassment. Since many people now use smartphones for online banking, travel reservations, and storing sensitive business documents, however, a great deal of very private data ends up on the device.
Posted by
BWS Technologies
at
8:00 AM
Read more:
Cell Phone,
How To,
Identity Theft,
iPhone,
Security
Friday, August 13, 2010
Searching for "Virus Removal" Tools Can Lead to an Even Worse Outcome
Many people tend to trust well known companies such as Google and Yahoo, but sometimes these search companies serve up some troubling links in their search results. There are many people who use these search sites to find out information about how to remove viruses, etc., but if a user types in “Security Tool Removal,” they are served up dangerous links that go to malicious websites. These websites can create even more of a security risk without the user even knowing.
Posted by
BWS Technologies
at
8:00 AM
Read more:
Anti-Virus,
Firefox,
Google,
How To,
Internet,
Malware,
Microsoft,
Search Engines,
Tips
Thursday, August 12, 2010
Free Wi-Fi – Worth the risk?
Wi-Fi has become virtually a staple in our technologically-enhanced lives. Its convenience increases productivity in countless industries, academics and even the family home. Retail establishments such as Panera Bread, McDonald’s and Barnes & Noble offer free Wi-Fi in their stores as an amenity to get customers to browse and buy their products. While “free Wi-Fi” might seem like a no-brainer, customers should keep in mind the inherent risks of free Wi-Fi.
Wednesday, August 11, 2010
32-bit vs. 64-bit Computing?
Sixty four bit, has been around since the beginning of computing, but it wasn't in the mainstream marketplace until just a few years ago. You've probably seen that Windows® 7 comes in 32 and 64-bit version and wondered what the difference is. Trying not to get too technical, we will explain the difference.
Tuesday, August 10, 2010
College Tech Survival 101
It’s that time of the year again! Whether you’re a returning college student or a newbie freshman in the funky and crazy lifestyle called higher learning, we have some tips and tricks that can help you cash-strapped college students make the best of your academic experience.
Monday, August 9, 2010
Ways to Block Pop Ups
Pop ups and other intrusive types of advertising are now used to thrust an ad in your face that you have no choice but to at least acknowledge. Regardless of the nature of the ad, pop ups are a nuisance, and there are now many options available for keeping them off of your computer screen all together.
Subscribe to:
Posts (Atom)