<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3748428670008741402</id><updated>2024-10-10T10:56:46.545-07:00</updated><title type='text'>computer safety tips</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://computers-safety-tips.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>19</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-8374380427356790012</id><published>2007-09-08T18:55:00.001-07:00</published><updated>2007-09-08T20:02:06.947-07:00</updated><title type='text'>Try it free today!(projects and save a lot of money)</title><content type='html'>&lt;span style=&quot;;font-family:trebuchet ms;font-size:100%;&quot;  &gt;&lt;strong&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;color: rgb(204, 204, 204);font-size:130%;&quot; &gt;Outsourcing is the process of subcontracting network operations and support to an&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(204, 204, 204);font-size:130%;&quot; &gt;organization outside your own company. Try it free today! Web Development doesn&#39;t have to be expensive.&lt;/span&gt;&lt;br /&gt;Outsourcing will cut your expenses by more than 50%. Outsourcing is hiring an outside organization to perform services such as information processing and applications development. Our mission is to find the best possible workers at the best possible price. helps webmasters, web designers, programmers, software developers and business owners to develop .&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;projects and save a lot of money. Getting affordable freelance work, freelancer your choice programing&lt;span class=&quot;blsp-spelling-corrected&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;&lt;/span&gt; and custom web design done for your website has never been easier.&lt;br /&gt;&lt;br /&gt;Our site is global and we have freelancers from India, Romania, Russia, Ukraine, United States, UK and many other parts of the world. We have thousands of satisfied clients&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt; around the world. Buy services with help from our secure escrow system.&lt;br /&gt;Find &lt;/strong&gt;&lt;/span&gt;&lt;a href=&quot;http://www.getafreelancer.com/users/all.php&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;strong&gt;and &lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;translator&lt;/span&gt;. We provide a safe escrow environment and you don&#39;t release the money until project is completed&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;.NET &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;ASP   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Audio Services   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Banner Design   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;C/C++   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Cold Fusion   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Copy writing   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Data Entry   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Data Processing&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Delphi   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Electronics   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Engineering   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Flash   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Graphic Design   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Handhold / PDA   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;J2EE   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Java   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;JavaScript   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;JSP   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Legal Advice   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Link Building   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Linux   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Logo Design   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Market Research   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Perl/CGI&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Photography   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;PHP   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Project Management   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Proofreading   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Python   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Script Installation&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;SEO&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;System Ad min.   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Telemarketing   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Training   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Translation   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Virtual Reality   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Visual Basic   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Web Promotion   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Website Design   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Website Security   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Windows   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;Wireless&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(102, 102, 102);font-family:arial;font-size:100%;&quot;  &gt;XML&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;a href=&quot;http://youwantmoney.blogspot.com/&quot;&gt;&lt;span style=&quot;color: rgb(204, 204, 204);font-size:130%;&quot; &gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Get More&gt;.........&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/8374380427356790012'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/8374380427356790012'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/outsourcing-is-process-of.html' title='Try it free today!(projects and save a lot of money)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-701909844913836533</id><published>2007-09-08T16:43:00.000-07:00</published><updated>2007-09-08T16:59:29.808-07:00</updated><title type='text'>Keep Your Data Safe Behind a Firewall</title><content type='html'>&lt;div id=&quot;body&quot;&gt;&lt;p  style=&quot;font-weight: bold; color: rgb(204, 204, 204); font-family: trebuchet ms;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Firewalls....&lt;br /&gt;Computer viruses! Worms! E-mail viruses! Trojan Horses! The media is always full of stories about computer viruses infecting computers all over the world, or companies scrambling to fix security holes in their software by releasing security updates. What can businesses or individuals to protect their computer? Installing a firewall may be one answer.&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family:Verdana;&quot;&gt;&lt;span style=&quot;font-family:Arial Unicode MS;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;What is a firewall?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1]At its most basic level, a firewall acts as a barrier between your home network  and the Internet. Just like a physical firewall was designed to stop fire  spreading to certain parts of a building, a software firewall is designed to  prevent viruses and out harmful software from spreading from the Internet onto  your home network.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;2]The firewall itself is a piece of software that is usually run by a piece of  hardware like your cable modem or router. That way it can act as the first line  of defense for your home network. I&lt;br /&gt;&lt;br /&gt;3]f the firewall was only contained on your own  computer, if you have other computers set up on a wireless network it would not  be able to protect them.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;4]The firewall’s primary function is to act as a gateway for all Internet traffic  coming into your home network. Whenever the firewall receives any traffic, also  known as a network packet, it will first analyze its contents to make sure it is  safe.&lt;br /&gt;&lt;br /&gt;5]If the firewall determines that the traffic is not dangerous, it will  redirect it to your computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:130%;&quot;  &gt;The Importance of Having a Firewall&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;1]While the first computer viruses were transported from computer to computer by floppy disks, computer viruses today can cover the globe in the blink of an eye over the Internet.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;2]And they’ve probably made it to your computer. You have likely had to deal with the consequences of spy ware and other malicious programs that had have crawled onto your computer while you were browsing the Internet.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;3] And as a consequences, you’ve probably spent hours and hours trying to get rid of all the spy ware and other malicious programs that have taken up residence on your computer.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2]Even if you think your computer is virus free, you are probably wrong. That is why spy ware and viruses are so dangerous; you could be using your computer with no idea that they’re there.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4]Firewalls Will Protect your Computer&lt;br /&gt;A firewall puts a wall between your home network and the Internet. Just like a real firewall keep fire from spreading from one area to another, a software firewall tries to keep computer viruses from spreading from the Internet onto your home computer or home network.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;5]The firewall itself is a piece of software that is usually run on your router or cable modem. By attaching itself to this hardware, the firewall is the first thing any incoming traffic from the Internet meets.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;6]The firewall’s job is to act to filter all of the traffic from the Internet that comes onto your home network. Whenever a network packet tries to come onto your home network, it has to make it by the firewall first. The firewall will analyze the packet to make sure it isn’t a viruses or some other undesirable communication.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;7] If the firewall gives it the all clear, it will let the packet continue on its journey to your home network.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How does a firewall works&lt;/span&gt;&lt;br /&gt;1]How does the firewall determine what traffic is safe and what traffic is  dangerous? The first way is user-defined parameters. You could, for instance,  block traffic from specific IP addresses or Internet domains. However, this is  of only limited use, since you can’t be expected to keep track of and list the  thousands and even millions of sites on the Internet that could harm your  computer.&lt;br /&gt;&lt;br /&gt;2]More useful is the work the firewall can do itself by screening incoming traffic  to make sure it corresponds to the kind of traffic you would want to receive.  For instance, while the firewall would let traffic sent from a website through  to your computer, it would block someone trying to log on to your computer  remotely.&lt;br /&gt;&lt;br /&gt;3]Connecting your computer will always expose your home network to some risk, no  software or hardware can remove the problem completely. By using a firewire,  however, you can limit the risk to a large extent and allow you to use the  Internet without worrying about infecting your home computers.&lt;/span&gt;   &lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:130%;&quot;  &gt;How does a Firewall Know what Traffic is Good?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;1]The firewall will use user-defined parameters and automatic parameters to decide whether the traffic should be let through or la belled dangerous and blocked. As the user, you could configure the firewall to block all traffic coming from a specific IP address. Obviously, you won’t be able to do this for all the malicious sites on the Internet – this list would be far, far too long!&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2]For this reason, the firewall will automatically screen incoming traffic to make sure it corresponds to the kind of traffic you would want to receive by running it through a set of predetermined parameters. For instance, the firewall will usually let traffic sent from a website through to your computer, but it will not let someone remotely login to your computer.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3]No matter what software or hardware you use, you will always be putting your computer at risk when you connect it to the Internet.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4]You can limit this risk as much as possible, however, by using a firewall. A firewall will let you access all the wonderful resources of the Internet without staying awake all night worrying about your home network.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/701909844913836533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/701909844913836533'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/keep-your-data-safe-behind-firewall.html' title='Keep Your Data Safe Behind a Firewall'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-169223817746316390</id><published>2007-09-08T16:26:00.000-07:00</published><updated>2007-09-08T16:40:48.490-07:00</updated><title type='text'>Spam Control Solutions</title><content type='html'>&lt;div style=&quot;font-family: arial; font-weight: bold;&quot; id=&quot;body&quot;&gt;&lt;p style=&quot;font-family: trebuchet ms; color: rgb(204, 204, 204);&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Approximately 98% of all email is spam. To most people that’s a frighteningly huge number, but also makes sense to most of us given all the garbage that flows into our inboxes.When I talk with clients about spam, their number one request is “Make it go away.” People just don’t want to ever see it, let alone have to deal with it. Sure it’s a nuisance, but what effect can it really have on the bottom line?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Studies have shown that the average computer user will spend 20-40 minutes each day dealing with spam. For a small business with just 15 employees, that would equate to 7-1/2 hours of lost productivity each and every day. It’s like having nearly one full-time employee on staff just to deal with spam. How would that look on the bottom line?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This number doesn’t even take into account the other destructive things that spam can bring along with it like viruses, trojans, worms, hijacks and phishing. If any of these make it through, it could cause untold amounts of damage in terms of lost productivity and cost for repairs.One important fact to understand is that spam cannot be 100% eliminated, no matter what hardware and software you install. However, with the right solution, spam can be dramatically reduced, practically eliminating its negative effect on productivity.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;So what options do businesses have? There are basically three choices when dealing with spam: control by the hosting provider, control on each individual computer, or a custom solution that specifically addresses the needs of all users.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;u&gt;Spam Control by the Email Hosting Provider&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;1]Typically email hosting providers offer some sort of spam control which is either ON or OFF. ON means you never see any of the messages the host determines as spam. OFF means you get everything.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2]The main problem with this type of control is that there are too many “false positives.” A false positive occurs when a legitimate email gets marked as spam and is deleted before the recipient ever gets to see it. Some examples of false positives are occur in email blasts (for example, “Your bank statement is ready” or “You have an invoice”), or html-based or graphic-rich emails.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3]Because the recipient never gets to see it, he or she cannot control it at a granular, or individual email, level.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;u&gt;Spam Control on Each Individual Computer&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;1]On an individual computer, there is software available for Microsoft Outlook and other email programs that controls spam at a more granular level.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2]This level of control is fine for a single computer, but not a good solution for multiple computers.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3]The difficulty with this approach is that each user is responsible for determining what spam is. Imagine the labor that is duplicated with an office of 10, 20 or 50 people all managing the same spam, but doing it individually.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4]You can see how the wasted time can add up in a hurry.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;5]So what is the best possible solution?  Stopping this stuff from ever getting to the computer in the first place.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;u&gt;A Custom Solution Creates the Ideal Spam Control&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;1]The ideal spam control setup is a custom solution comprised of three main components: an Exchange Server, a Firewall, and an Email Filter.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2] These can be configured to address the needs of all users while also protecting the company. &lt;i&gt;(Please note that for this article I will use the term “Exchange Server.” Microsoft also builds a Small Business Server, of which Exchange is a part. A qualified IT consultant should be able to help you decide which solution is best for your business.)&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3]For any businesses of at least five users or more connected to the Internet, you must start by having an Exchange Server. An Exchange Server stores messages and effectively manages the processing of incoming and outgoing emails.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4] An Exchange Server also adds other benefits like providing Outlook Web access for increased productivity, and allowing users to share contact information and calendars with others throughout the network.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;5]For an Exchange Server to operate optimally, connectivity has to be persistent (consistent?), or always up. To get this type of connectivity, a T-1 line is the best connection.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;6]Next, you must have a Firewall. We recommend a Unified Threat Management Appliance (UTM) which is a hardware firewall and then some.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;7]To turn a plain firewall into a UTM, it is necessary to add security software at your gateway, or the “front door” where your network connects to the Internet. This software includes anti-spyware, anti-virus, intrusion prevention, and standard content filtering software.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;8]This complete Firewall solution basically builds a “wall” which secures the entire network, effectively stopping viruses and other destructive programs from finding their way in via attached files and emails. It also is configured to prevent dubious websites from putting spy ware, aware and other things on your computer which can dramatically slow down performance.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;9]Once the network is secure, the next step would be to add an Email Filter appliance, which is hardware that allows you to set granular level filtering for the entire network.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;10]The email filter will allow you to set characteristics ONCE for the network, and it can even learn preferences of your users over time (if you choose).&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;11]Also, this filter adds valuable anti-phishing capabilities, protecting your company and employees at a much deeper level by keeping scam artists away from financial data and confidential information.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;12]This setup takes the responsibility away from employees to manage spam on their own, and immediately increases productivity for each employee. Bottom line benefits can be seen right away, and for most companies, a measurable return on investment can be achieved in a few months.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;u&gt;You Can Control Spam&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;1]After reviewing these solutions, clients often say, “You can really make all of these problems go away?” The answer is YES, but the best solution for each business does not lie in an “off-the-shelf” or canned package.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2]The best solution is a custom solution, including a thorough analysis leading to a phase-in plan of the appropriate hardware and software over a period of a few months. This approach also allows the business to smooth the financial investment (which will vary) over the implementation timeframe.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;font-size:85%;&quot; &gt;3]Jim Kerr is President and Founder of CRU Solutions, which is celebrating their 25th year in business, and 15th year as an Intel partner.&lt;br /&gt;&lt;br /&gt;4]CRU is a comprehensive IT systems solution provider of exclusive, industry-leading hardware, software, connectivity, expertise and a unique approach to customer service. CRU’s intelligentTM brand of desktops, laptops and servers are custom built in Northeast Ohio exclusively with matched Intel components. You can reach Jim Kerr directly at jim.kerr@crusolutions.com. Additional information is available at&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/169223817746316390'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/169223817746316390'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/spam-control-solutions.html' title='Spam Control Solutions'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-953057242064500845</id><published>2007-09-04T23:41:00.000-07:00</published><updated>2007-09-08T17:52:17.839-07:00</updated><title type='text'></title><content type='html'>&lt;span style=&quot;color: rgb(204, 204, 204);font-size:100%;&quot; &gt;&lt;span style=&quot;font-family: trebuchet ms; font-weight: bold;&quot;&gt;Natural Keyboard shortcuts You can use the following keyboard shortcuts with a Microsoft Natural Keyboard or any other compatible keyboard that includes the Windows logo key and the Application key. &lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center; font-family: arial; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Shortcut Keys Function&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Windows logo key +BREAKDisplay &lt;/span&gt;&lt;br /&gt;or hide the Start menu.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;  Windows logo key +D&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the System Properties dialog box.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    Windows logo key +M&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Minimizes all Windows and shows the Desktop&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;   Windows logo key +E&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Minimize or restore all windows.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;  Windows logo key +F&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Open My Computer.  &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;CTRL+  +F&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Search for a file or folder.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Windows logo key +F1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Search for computers.    &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Windows logo key +L Locks the desktop&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display Windows 2000 Help.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Windows logo key +R&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Open the Run dialog box.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Windows logo key +TAB&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch between open items.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the shortcut menu for the selected item.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Windows logo key +U&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Open Utility Manager&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Accessibility Options keyboard shortcuts&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Shortcut Keys Function &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt; Right SHIFT for eight seconds&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch Filter Keys on and off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Left ALT +left SHIFT +PRINT SCREEN&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch High Contrast on and off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Left ALT +left SHIFT +NUM LOCK&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch MouseKeys on and off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;SHIFT five times&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch Sticky Keys on and off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    NUM LOCK for five seconds&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch Toggle Keys on and off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Windows logo key  +U&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Open Utility Manager&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;If your mouse is unavailable or if you prefer using your keyboard, you can use the following keyboard commands to navigate within the Help Viewer. To expand the headings below using the keyboard, press F6 to switch from the Help navigation pane to the topic pane. Press TAB to select the desired keyboard shortcut heading, and then press ENTER to expand the listing.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Shortcut Keys&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Function &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+SPACE BAR&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the system menu.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;SHIFT+F10&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the Help Viewer shortcut menu.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+TAB&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch between the Help Viewer and other open windows.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+O&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the Options menu.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+O, and then press T&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Hide or show the navigation pane.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;CTRL+TAB&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch to the next tab in the navigation pane.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;CTRL+SHIFT+TAB&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch to the previous tab in the navigation pane.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;UP ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move up one topic in the table of contents, index, or search results list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;DOWN ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move down one topic in the table of contents, index, or search results list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;PAGE UP&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move up one page in the table of contents, index, or search results list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;PAGE DOWN&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move down one page in the table of contents, index, or search results list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;F6&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Switch focus between the navigation pane and the topic pane.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+O, and then press R&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Refresh the topic that appears in the topic pane.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;UP ARROW or DOWN ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Scroll through a topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;CTRL+HOME&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move to the beginning of a topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;CTRL+END&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Mo&lt;span style=&quot;font-size:85%;&quot;&gt;ve to the end of a topic.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;CTRL+A&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Highlight all text in the topic pane.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+O, and then press P&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Print a topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+O, and then press B&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move back to the previously viewed topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+O, and then press F&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Move forward to the next (previously viewed) topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+F4&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Close the Help Viewer.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Contents tab keyboard shortcuts Shortcut Keys Function &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+C&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the Contents tab.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;RIGHT ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Open a book.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;LEFT ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Close a book.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;BACKSPACE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Return to the previous open book.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;UP ARROW or DOWN ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Select a topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ENTER&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the selected topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Index tab keyboard shortcuts Shortcut Keys Function &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+N&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the Index tab.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;UP ARROW or DOWN ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Select a keyword in the list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+D or ENTER&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the associated topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Search tab keyboard shortcuts Shortcut Keys Function&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+S&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the Search tab.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+L&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Start a search.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+D or ENTER&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the selected topic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Favorites tab keyboard shortcuts Shortcut Keys Function &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+I&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display the Favorites tab.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+A&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Add a topic to the Topics list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+P&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Select a topic in the Topics list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+R&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Remove a topic from the Topics list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;ALT+D&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Display a topic from the Topics list.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Customizing Shortcut Keys&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Shortcut key combinations make it easier to complete common tasks. For example, Carl+C allows you to quickly copy a selected item to the clipboard. You can select from a predefined list of mappings, such as Visual Studio 6.0, or you can create own unique mapping.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left; font-family: arial; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;To select a predefined mapping &lt;/span&gt;&lt;br /&gt;1]On the Tools menu, select Options.&lt;br /&gt;2]In the Options dialog box, open the Environment folder, and choose Keyboard.&lt;br /&gt;3]In Keyboard mapping scheme drop-down list, select the scheme you want to use.&lt;br /&gt;If you want to create custom mapping scheme, you will get the best results, by basing the new scheme on an existing scheme. Whereas system shortcuts in default keyboard mapping schemes cannot be modified, custom mapping schemes can.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;To create a custom mapping scheme &lt;/span&gt;&lt;br /&gt;1]On the Tools menu, select Options, open the Environment folder, and choose Keyboard.&lt;br /&gt;2] On the Keyboard page select a Keyboard mapping scheme and then choose Save As to create a             mapping scheme that you can customize.&lt;br /&gt;3] In the Save Scheme dialog box, type a name for your new scheme.&lt;br /&gt;        Note :Until modified, custom keyboard mapping schemes retain the shortcut assignments of the scheme on which they were based.&lt;br /&gt;&lt;br /&gt;4]On the Tools menu, select Options, open the Environment folder, and choose Keyboard.&lt;br /&gt;5] On the Keyboard page select a Keyboard mapping scheme.&lt;br /&gt;6] In the Show commands containing text box, type a command-related keyword to locate the command you want in the list box.&lt;br /&gt;For example, if you want to create a shortcut that opens a new solution, you might type &quot;solution&quot; in this text box.&lt;br /&gt;7]In the scrolling list box, select the command you want the shortcut to execute.&lt;br /&gt;8] On the Use new shortcut in drop-down list, select the environment in which you want to use the shortcut. Choose Global if you want the shortcut to work in all contexts.&lt;br /&gt;9]Place your cursor in the Press shortcut key(s) text box and then press and hold a non-text key or combination of non-text keys (Alt, ctr l, or Shift, for example) and type the text key of your choice.&lt;br /&gt;10]  Choose Assign.&lt;br /&gt;            Note: You can overwrite the current shortcut assignment when a custom scheme is selected.&lt;/span&gt;      &lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/953057242064500845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/953057242064500845'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/more-keybord-short-cut-keys.html' title=''/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-7498862204215452264</id><published>2007-09-04T22:47:00.000-07:00</published><updated>2007-09-08T17:21:55.377-07:00</updated><title type='text'>keyboard shortcuts keys</title><content type='html'>&lt;span style=&quot;font-weight: bold; color: rgb(204, 204, 204);font-family:trebuchet ms;&quot; &gt;Learning a few useful Keyboard shortcuts doesn&#39;t seem like a big productivity booster, but you may be surprised how fast you can perform common tasks once you break the &quot;mouse&quot; habit. This is especially useful when working on a rack mounted server that either doesn&#39;t have a functioning mouse, or had an ill conceived trackball. Nothing will elevate your tech status to guru faster than being able to fly through the Windows 2000 menus without ever touching your mouse! One of our Lab Mice actually unplugged his mouse from his PC for a week to force himself to use the shortcut keys!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 204, 204);font-family:trebuchet ms;font-size:130%;&quot;  &gt;Note: &lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 204, 204);font-family:trebuchet ms;&quot; &gt;Some keyboard shortcuts may not work if Sticky Keys is turned on in Accessibility Options. If you are connected to Windows 2000 through Microsoft Terminal Services Client, some shortcuts have changed. For more information, see the online documentation for Terminal Services Client.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Common Keyboard Shortcuts&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;            Shortcut keys(&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Windows button&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;               function(&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Display or hide the Start menu.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;     &lt;span style=&quot;font-size:100%;&quot;&gt; Windows button&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;                Display or hide the Start menu.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+BREAK&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;                Display the System Properties dialog box.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+D&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;                Minimizes all Windows and shows the Desktop&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+E&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;                Open Windows Explorer&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+F&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;                                                               Search for a file or folder.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+F+CTRL&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Search for computers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+F1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Dsplay Windows 2000 Help.i&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+L&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Locks the desktop&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+M&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Minimize or restore all windows.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+R&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Open the Run dialog box.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+TAB&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Switch between open items.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Windows button+U&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Open Utility Manager&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+- (ALT+hyphen)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Displays the Multiple Document Interface (MDI) child window&#39;s System menu.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+ENTER&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    View properties for the selected item.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+ESC&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Cycle through items in the order they were opened.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+F4&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Close the active item, or quit the active program.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+SPACEBAR&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Display the System menu for the active window.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+TAB&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Switch between open items.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ALT+Underlined letter in a menu name&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Display the corresponding menu.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;BACKSPACE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    View the folder one level up in My Computer or Windows Explorer.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+A&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Select all.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+B&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Bold&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+C&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Copy.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+I&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Italics&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+O&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Open an item.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+U&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Underline&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+V&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Paste.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+X&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Cut.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+Z&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Undo.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+F4&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Close the active document in programs that allow you to have multiple documents open simultaneously.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL while dragging an item&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Copy selected item.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+SHIFT while dragging an item&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Create shortcut to selected item.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+RIGHT ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Move the insertion point to the beginning of the next word.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+LEFT ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Move the insertion point to the beginning of the previous word.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+DOWN ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Move the insertion point to the beginning of the next paragraph.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+UP ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Move the insertion point to the beginning of the previous paragraph.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+SHIFT with any of the arrow keys&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Highlight a block of text.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;DELETE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Delete.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;SHIFT+DELETE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Delete selected item permanently without placing the item in the Recycle Bin.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;ESC&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Cancel the current task.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Displays Help&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F2&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Rename selected item.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F3&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Search for a file or folder.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F4&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Display the Address bar list in My Computer or Windows Explorer.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F5&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Refresh the active window.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F6&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Cycle through screen elements in a window or on the desktop.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;F10&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Activate the menu bar in the active program.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;SHIFT+F10&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Display the shortcut menu for the selected item.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;CTRL+ESC&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Display the Start menu.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;SHIFT+CTRL+ESC&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Launches Task Manager&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Underlined letter in a command name on an open menu&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Carry out the corresponding command.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;RIGHT ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Open the next menu to the right, or open a sub menu.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;LEFT ARROW&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Open the next menu to the left, or close a sub menu.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;SHIFT with any of the arrow keys&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Select more than one item in a window or on the desktop, or select text within a document.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;SHIFT when you insert a CD into the CD-ROM drive&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;    Prevent the CD from automatically playing.&lt;br /&gt;&lt;br /&gt;                                                                                                                           &lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;a href=&quot;http://computers-safety-tips.blogspot.com/2007/09/more-keybord-short-cut-keys.html&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; More keyboard short cut keys&gt;&gt;.......&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7498862204215452264'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7498862204215452264'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/learning-few-useful-keyboard-shortcuts_04.html' title='keyboard shortcuts keys'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-3524400980399151281</id><published>2007-09-04T22:30:00.000-07:00</published><updated>2007-09-04T22:45:51.503-07:00</updated><title type='text'>Good anti virus purchaseTips&amp;Computer Virus</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;color: rgb(204, 204, 204);font-size:100%;&quot; &gt;&lt;span style=&quot;font-family: trebuchet ms; font-weight: bold;&quot;&gt;Getting a good anti virus rating before spending your hard earned cash on buying an anti virus is crucially important these days, with the sea of anti virus software available, and with all of them claiming to be the product to end all troubles. However, like they say, there are ratings and there are ratings. How do you get to know if an anti virus or software product rating is genuine, unbiased, and worth wasting your time even considering? Here are 3 quick tips to help you be sure as you use an anti virus rating to get the product you desire.&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; How many products does it mention and recommend?&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This is almost a no-brainier. Some ratings are specifically tailored to sell a specific product, and you can easily notice this if there is just one product recommended by the review/rating agency, while it belittles all others.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;However, you have to be a bit careful when making this particular observation as sometimes, a unbiased product reviewer finds that it is just one product out of a couple he is reviewing which fits in with what, in his belief, would make a customer who gets and uses it happy. In a case like this, the reviewer might similarly recommend just one or two products, and you&#39;d still be on the smarter side by listening to him.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;                  &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Are you going for just one view?&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;With product ratings and reviews, it is always better to go for what are termed &quot;review of reviews&quot;. This type of product rating does not just test and publish reviews, but collates the results of professional tests and ratings, reviews, and consumer &lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Eports on each particular product to get a more general and unbiased assessment of it. This kind of rating is always much better than one individual or company testing a product and giving just its own personal evaluation of it.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; also gives you a much less risky recommendation, as too many people cannot be wrong: while, with just one opinion, you might be looking at something written by someone whose tastes/preferences differ considerably from yours; and thus on getting the recommended product, you could be hugely disappointed on discovering that the product is not so superior, and that the reviewer(s) probably just liked some of the features, which are not really important to you.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;            &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Do they cite any reputable rating agencies as sources?&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;With this kind of rating, you can determine just how good the rating or review is by examining the quality of the sources quoted in the piece.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;This could be a bit difficult for you to determine, but in the software review category in general, and anti virus reviews in particular, some of the more highly regarded rating outfits are: PC World, PC Magazine, CNet.com, Scott&#39;s Newsletter and Federal Computer Week. Others are Computer Shopper of the UK, PC Pro and Amazon.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;                      &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ensure that at least some among this list are mentioned as some of the sources for the research material used in writing the report/rating.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;These are just 3 tips to ensure you get the best from using a rating before making your anti virus purchase.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Good luck in your purchase!&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size: 18pt; font-family: arial; font-weight: bold;&quot;&gt;Computer Virus&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;In order to understand what a computer virus is, you must first understand what a virus is. It is actually a small organism that can only reproduce within a living cell or body. As such, it is usually harmful to the cell or body in which it lives. This is why a virus can make you sick or cause you to have a disease.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;This relates to computers because a computer virus is actually a harmful computer program that can damage your computer&#39;s files. It is even possible for it to damage your computer. This is because a computer virus is able to duplicate and spread itself within a computer or computer network. However, you may not even know that your computer has a virus because it can usually hide itself really well within a program, file or document.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;So, who would want to create a computer virus? A criminal who creates a computer virus would need to be somewhat talented and have nothing better to do with their time. Their only purpose for creating a computer virus is to cause both trouble and damage.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;                &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Today there are many different names that are used to describe a computer virus. The names that are used to describe these various viruses include Macro Viruses, Email Viruses and Trojan Horses. Of course, each of these different viruses has a slightly different description but they all act in very similar ways. Each of these viruses is able to spread through your computer and infect its files and documents. A computer virus can also spread itself throughout the Internet and local computer networks or removable storage devices. However, since the virus is hidden, it is hard to detect and easily spread.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Once a virus enters your computer it can either be very harmful or simply annoying.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What you can do to protect your Computer and important data.&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;                            &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Install Anti virus Software.&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What is Antivirus Software - Antivirus or Anti-Virus software is computer program, the roll of antivirus is to protect computer against viruses and worms. This program actively guards computer from getting infected with Viruses and worms, it will stop people trying to heck your computer or stop viruses from deleting important data. The Antivirus software helps in protecting your personal data, corporate data from attacks on your personal computer or on servers. Like taking medicine helps in curing body virus, similarly by installing antivirus software helps in protecting computer and data. Apart from installing Antivirus software you should also install firewall on your computer, this helps stop malicious attack on your computer from people who are looking personal and credit card information, they steel your personal and financial information. Good antivirus software will scan your hard disk for viruses, scan your incoming email attachments and stop pop up ads appearing on screen etc.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;If you don&#39;t have antivirus software installed on computer, you can buy one of several companies.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Microsoft has product called Windows Live OneCare - Usually starts from $50 per year.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Symantec has Norton product&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;MacAfee&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;PC Doctor&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Kaspersky Antivirus Personal&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Panda Anti-Virus Titanium &amp; Platinum&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;NOD32 Anti-Virus&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Command Antivirus&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;McAfee Antivirus Virus Scan Online&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/3524400980399151281'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/3524400980399151281'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/good-anti-virus-purchasetips-virus.html' title='Good anti virus purchaseTips&amp;Computer Virus'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-7600929887764140223</id><published>2007-09-04T18:49:00.000-07:00</published><updated>2007-09-04T19:11:18.926-07:00</updated><title type='text'>Computer Keyboarding Safety Tips.</title><content type='html'>&lt;span style=&quot;font-family: trebuchet ms; font-weight: bold; color: rgb(204, 204, 204);&quot;&gt;We know that you or your employees or students are going to greatly benefit from our software, but we&#39;d also like to ensure that you are aware of basic keyboarding safety issues.  People that start out learning to touch type without a basic knowledge of Occupational Health and Safety Issues put themselves at risk of problems in the long term such as Carpal Tunnel Syndrome and back problems. The following are some basic guidelines that should be followed by not just people learning to touch type, but anyone who uses a keyboard for extended periods. Please consult an Occupational Health and Safety specialist for more complete information.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms; font-weight: bold; color: rgb(204, 204, 204);&quot;&gt;Sitting at the computer&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;   1)Your feet should not be dangling, but flat on the floor.  If this is not possible, a footrest is recommended. Your knees should be slightly higher than your hips.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;   2)A chair with lumbar support is the optimum arrangement, if this is not available, back cushions can be obtained - even a rolled up towel can offer some support.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    3)Your back should be firmly supported by the back rest.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    4)Adjust the seat so that you can fit 3 fingers between the front of your seat and the back of your legs&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    5)When extending your arms to the keyboard, your wrists should be parallel with your elbow, this minimizes strain on the muscles of your arm.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    6)The top of your monitor should be level with your eyes, or just slightly below eye level. The monitor should be approximately 50 - 70cm (19&quot; - 27&quot;) from your eyes.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    7)Rest your wrists and hands when you are not typing, don&#39;t keep them in a typing position while reviewing work etc.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    8)Use document holders where possible. These should be placed at the same height beside the monitor and the same distance away as the monitor.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;    9)It is recommended by many health professionals that a mini-break should be taken every 30 minutes for one or two minutes.  During this mini-break you should try to focus your eyes on a distant object and carry out gentle stretching exercises.  This could be as simple as getting out of your chair and walking a short distance and stretching your neck and arms.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;font-size:130%;&quot; &gt;Typist&#39;s chairs&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    1)A good looking chair isn&#39;t necessarily the best choice.  If possible, your new chair should be fully adjustable i.e., controls for height, swivel, tilt.  A gas lift chair is the best choice as it offers some shock absorption.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    2)While armrests can be a very attractive option, they can sometimes get in the way while typing. Buy a chair that will at least allow you to remove the armrests.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    3)Try and test the chair out in a &quot;real-life&quot; situation i.e. with a desk and keyboard in the showroom and try &quot;air-typing&quot; for a while.  Most better office furniture stores will be equipped to allow this. If the chair feels even slightly uncomfortable after sitting in it for a minute, imaging what it will feel like after a couple of hours!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    4)Sometimes a chair may look and feel comfortable in the showroom, but after extended sitting may reveal incompatibilities.  Before you purchase a chair, enquirer about a returns policy. Good quality stores will give you around 7 days to &quot;test drive&quot; a chair.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;Computer Table&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    1)The best kind of desk is the type with an adjustable keyboard/mouse area.  If this feature is not available on your desk, special clip on trays can be purchased.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    2)Organize your desk so that your most used pieces of equipment and paperwork are within arms reach.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-family: arial;&quot;&gt;Keyboard/Mouse&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    1)Ensure that the retractable legs on your keyboard are pulled back, allowing the keyboard to lay flat.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    2)Use a keyboard with a wrist rest - these can also be purchased separately - these wrist rests really do work and greatly decrease fatigue and strain.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    3)Your mouse should fit comfortably and naturally in your hand without any need to move any of your fingers to reach a button.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    4)Ensure that the contacts inside your mouse are clean to allow for smooth use&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    5)Keyboards and mice should be regularly disinfected as they are a breeding ground for all sorts of bacteria.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    6)Using the seating guidelines above, your keyboard should be the correct distance from you.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;font-family: arial;&quot;&gt;System&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1)Your monitor screen should be regularly wiped over.  Fingerprints can cause slight picture distortions that will fatigue your eyes.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    2)Even a small amount of glare can cause serious eye fatigue as your vision will be constantly drawn towards the glare.  &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    3)Using the seating guidelines above, your monitor should be the correct distance from your eyes.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;    4)Most modern monitors allow for various presets.  As the light in many office environments will change throughout a day, you should have a preset for morning/midday/afternoon/evening. small pains to follow under tips (A&amp;B)&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;&lt;br /&gt;DO NOT DO THESE EXERCISES IF THEY CAUSE PAIN. CONSULT YOUR DOCTOR!&lt;br /&gt;WRIST AND FOREARM STRETCHES:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A: Upper forearm stretch&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. Sit with feet flat on floor.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Extend both arms in front of you, palms down.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Make a light fist with your left hand, thumb tucked in.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;4. Grab hold of knuckles of your left hand so that your right thumb crisscrosses over your left&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;thumb.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5. Bending, pull left hand down with your right hand, keeping both elbows straight.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;6. Rotate your arms counter clockwise.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;7. Rotate your arms clockwise.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;8. Open the fingers of your left hand and gently stretch more.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;9. Follow steps 1-8 above with the right hand.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Keep your shoulders relaxed.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Keep your shoulders relaxed.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;DO NOT DO THESE EXERCISES IF THEY CAUSE PAIN. CONSULT YOUR DOCTOR!&lt;br /&gt;WRIST AND FOREARM STRETCHES:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial;font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;B: Under forearm stretch&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. Sit with feet flat on floor.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Extend your lest arm in front of you, palm up.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Using the fingers of your right hand, pull left hand down with your right hand, keeping both&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;elbows straight.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;4. Rotate your arms counter clockwise.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5. Rotate your arms clockwise.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;6. Follow steps 1-6 above with the right hand.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Keep your shoulders relaxed.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7600929887764140223'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7600929887764140223'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/computer-keyboarding-safety-tips.html' title='Computer Keyboarding Safety Tips.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-3037830348838797078</id><published>2007-09-03T22:31:00.000-07:00</published><updated>2007-09-03T22:53:02.048-07:00</updated><title type='text'>Clean up registry to speed up your pc</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:10;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color: rgb(204, 204, 204); font-weight: bold;font-family:trebuchet ms;font-size:85%;&quot;  &gt;The Windows Registry is a system of storing configuration information for computers running the Windows operating system. It keeps all of the settings information for the hardware, software, and user and system preferences for a computer. Using such a system deletes the random storage of INI files scattered throughout the computer. However, in spite of its usefulness, the Windows Registry causes some major problems for many users.&lt;/span&gt;&lt;o:p style=&quot;color: rgb(192, 192, 192); font-weight: bold; font-family: trebuchet ms;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:10;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:Arial;font-size:85%;&quot;  &gt;Step:1When you install software, uninstall software, or make any changes whatsoever to your computer that affect the control panel, system policies, file associations, or any of the software already on the system, an entry appears in the Windows Registry. So, the more you use your computer, especially if you&#39;re the type of user who makes a lot of changes, the more entries your registry will accumulate.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;o:p&gt;Step:2&lt;/o:p&gt;As with all information on your computer, registry entries require the use of memory. And, the more entries you have in your registry, the more space the registry takes up. A good number of the entries in the registry are unnecessary and even erroneous. All these entries can slow the system down to a snail&#39;s pace. Worse yet, they can cause the system to become unstable and crash.&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;o:p&gt;&lt;/o:p&gt;Step:3While it is possible for users to manually edit the registry, it&#39;s far from advisable for all but the expert user. And, even the expert user needs to make a back up of the registry before making any changes. Making an error in editing the registry can render the system unusable, and possibly even irreparable.&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;Step:4Fortunately, there are things you can do to clean up your registry and speed up your system. There are many third-party registry cleaners available for cleaning up unnecessary and erroneous registry entries. In fact, for a short time, Microsoft even made an unsupported tool called Regclean available to users running any of the Windows 9x systems.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;o:p&gt;&lt;/o:p&gt;Step:5The older versions of Windows experience more problems with the registry than the newer NT and XP versions do. The newer versions don&#39;t crash as easily as the older systems did. However, they are still susceptible to slowing and, with severely affected registries, it is still possible for these versions to crash.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;o:p&gt;&lt;/o:p&gt;Step:6One situation in which NT and XP systems can benefit from using a registry cleaner is when a computer running Windows 9x is upgraded to NT or XP. When this occurs, the system keeps all the registry entries from the old system &quot;just in case.&quot; Although this is meant to guarantee that the upgrade works, it does mean that the new operating system will run more slowly than it should.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;o:p&gt;&lt;/o:p&gt;Step:7Though there are many registry cleaners out there, they certainly aren&#39;t all equal. Some of them aren&#39;t even legitimate. There are some cleaners that don&#39;t accurately report the number of entries that could be removed. Some of them show numbers that just don&#39;t add up when the program is run back-to-back.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;&lt;o:p&gt;&lt;/o:p&gt;Step:8For example, you might run it the first time and come up with 600 errors, which the program will claim to clean up. If you then run it again immediately, it might report that there are still 300 errors, and the third time it might show 400 errors. In other words, it&#39;s either not cleaning up anything, it&#39;s not accurately identifying errors, or it&#39;s inflating the numbers to make you think it&#39;s doing some good.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:10;&quot;  &gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;Step:9&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;To ensure you&#39;re purchasing a registry cleaner that&#39;s worth the money you&#39;re spending, take the time to do some research. Check out review sites and look for software sold by reputable companies. Don&#39;t be drawn in by free trials or outlandish claims.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Use this option before be care full good luck and enjoy your system.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/3037830348838797078'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/3037830348838797078'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/clean-up-your-registry-to-speed-up-your.html' title='Clean up registry to speed up your pc'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-5820721106781412038</id><published>2007-09-02T22:25:00.000-07:00</published><updated>2007-09-02T22:54:03.705-07:00</updated><title type='text'>How to Choose a Secure Password</title><content type='html'>&lt;div  style=&quot;font-weight: bold;font-family:arial;&quot; id=&quot;body&quot;&gt;&lt;p  style=&quot;color: rgb(204, 204, 204); font-family: arial; font-weight: bold;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Choosing a safe password is the key to protecting your computer data and/or your online activities.Here are some tips for choosing and managing your passwords.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Do NOTs:&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT use a password which is the same as your login or screen name.  Most hackers try this first!&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT use your girlfriend/boyfriend/partner&#39;s name. Most hackers try this second. You are especially vulnerable if you partner happens to have a common name…&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT use an easily guessable piece of information about you (like part of your AOL or online profile) as your password&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT use a common English word as you password. Preferably do NOT use a English word at all. Hackers have access to dictionaries, and automated programs can work through these dictionaries, trying every single word!&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT use a sequence of keys on your keyboard, such &#39;qwerty&#39; or &#39;asdf&#39;.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT store your passwords on your computer. If you need to write them down to remember them, then write them down on paper, and keep it as safe as you would keep your other personal information/assets (like cash or credit cards).&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Do NOT fall for: Fraudsters often send out official-looking emails to request your confidential information - one of their most common tactics is to use such emails to send people to a fake web site (that looks exactly like the official web site) and get people to &quot;log-in&quot;, thus capturing their account user ID and password information.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Do:&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Change your password regularly.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Use a mix of letters and digits in your password. Preferably use a mix of upper and lower case letters, if the computer/service in question allows it.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Change your password(s) regularly.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;- Use different passwords for difference services.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Use this points&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial,Verdana;font-size:85%;&quot;  &gt;  Identity thieves sometimes used spoofs and trickery to obtain  personal information. Identity thieves using these spoofing methods  pretend to be an official authority, bank or company in order to  build up your trust, and may go to considerable lengths to reproduce  company logos, correspondence and web sites so that they appear  to be the real official organization.&lt;br /&gt;&lt;br /&gt;It is particularly common for thieves to take advantage of telephone,  mail surveys or emails, as this minimizes their risk of being caught  by the authorities, and because it allows them to catch people off-guard.    However, you should be aware that these methods of communication  are not secure, and are not generally used by  governments, banks or companies to obtain personal identity information.  Any approach by these means ought to raise a &quot;Scam!&quot;  warning in your mind.&lt;br /&gt;&lt;br /&gt;One such scam that has become common in the internet age are  so-called &quot;phishing&quot; scams.  These campaigns use official-looking  emails to request your confidential information.  A particularly  common tactic is to use such emails to send people to a fake web site  (that looks exactly like the official web site) and get people to  &quot;log-in&quot; (thus capturing their account user ID and password).&lt;br /&gt;&lt;br /&gt;For trusting people encountering them for the first time, these  phishing emails can be difficult to deal with, because they  usually imply threats of account closure or similar consequences  if no action is taken. They have become a routine part of using email for most of us &quot;old hands&quot;, and it is easy to overlook  how credible they may appear to people who are new to using emails  and who have had few exposures to identity thieves  in the &quot;off line&quot; world. &lt;br /&gt;&lt;br /&gt;Some simple methods of reducing your risk of being  taken by such phishing scams are:- &lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;span style=&quot;;font-family:Arial,Verdana;font-size:85%;&quot;  &gt;&lt;li&gt;Be suspicious of &lt;b&gt;all&lt;/b&gt; emails that you receive  purporting to be from your bank, credit card company or  other financial institutions.  Sender addresses can  easily be faked! If you have any doubt at all about any such email, contact the  relevant organization directly, and confirm the email is  genuine, &lt;b&gt;before&lt;/b&gt; responding&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Many of the spoofing operations are carried out  from non-English speaking countries, and so look out  for spelling or grammar errors which give the game away.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Do not click on links in emails.  Instead manually  type in the bank of financial institution&#39;s URL into your  web browser&#39;s address bar.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Before entering personal information  (especially logging in), &lt;b&gt;carefully&lt;/b&gt; check  your web browser contains the correct company&#39;s URL  in the address bar. Phishers will often try to use URL s  that look superficially similar to the real company&#39;s,  for example, the number 0 instead of the letter O. &lt;/li&gt;&lt;/span&gt;&lt;/ul&gt; &lt;span style=&quot;;font-family:Arial,Verdana;font-size:85%;&quot;  &gt;Identity thieves do target the more trusting and  innocent of us, and perhaps those of us who are more  naive or gullible. For a long time business has been  built on trust and honest face-to-face dealings, but  the internet particularly has opened up opportunities for  identity thieves to reach out to us anonymously across  international borders. People new to the internet have to  learn to manage these risks.&lt;br /&gt;&lt;br /&gt;Another way that you can also lose your credit card  details is by unintentionally giving away your personal details to an  identity thief. Make sure you have confidence in vendors you deal  with over telephone or internet. Ensure the transaction is through a reputable company, and in the case of  internet transactions, make sure it uses a secure transaction page (beginning &lt;b&gt;https://&lt;/b&gt;)?&lt;br /&gt;&lt;br /&gt;Merchants accepting credit card  have their reputation to take care of, as well needing to perform honestly  if they are to continue to deal with the card issuing companies,  so they have strong incentives take a lot of care over providing  a secure and honest service. By far the majority can be trusted.  The risk is greatest if you are not dealing with a genuine merchant but  with an identity thief pretending to be a merchant.       &lt;/span&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/5820721106781412038'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/5820721106781412038'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/how-to-choose-secure-password.html' title='How to Choose a Secure Password'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-7511617275454510713</id><published>2007-09-02T22:18:00.000-07:00</published><updated>2007-09-02T22:25:01.726-07:00</updated><title type='text'>Dangerous Internet, Be Safe</title><content type='html'>&lt;p  style=&quot;font-weight: bold; font-family: trebuchet ms; color: rgb(204, 204, 204);font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The Internet can be a pretty dangerous place with nasties lurking round every corner. While you are enjoying the benefits of Internet shopping, subscription websites, free downloads and Internet banking, there are unscrupulous people out there just waiting to pounce.Hackers, fraudsters, identity thieves and many others would love to get hold of your personal details or take hold of your computer. What stands between you them and certain disaster?&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;A little knowledge!&lt;/span&gt;&lt;br /&gt;1)Here&#39;s a few tips to keep relatively safe, remember, most of these people are looking for easy targets so don&#39;t make yourself one..&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Your password&lt;/span&gt;&lt;br /&gt;1)Avoid the obvious and never use dictionary words, these can be brute forced in minutes.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2)Names, DOB or any other forms of personal information can be easily guessed so avoid them too.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3)A secure password is one which is over 8 chars long, contains UPPER and lower case letters and has non alphabetical characters such as $ ^ - &quot; etc.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4)A good example would be F$a4%Cm*--d32.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;5)Now this may seem difficult to remember and you are right, it is, you could devise a formula in your mind to remember yours.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;6)In the long run it may save you a whole lot of trouble.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;7)You may want to use a secure password storage facility if you have many passwords like this.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Secure your PC&lt;/span&gt;&lt;br /&gt;1. Make sure you have a firewall installed. Many hackers scan IP addresses for ports that host known access points into your PC, a firewall can hide these and the hackers won&#39;t even know you are there. If you are invisible to them then what can they do to harm you?&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2. Have an Anti-Virus application running at all times and make sure it is scheduled to update itself daily. These cannot protect you from unknown viruses but a virus that has been doing the rounds for a day or more will be detected by &quot;most&quot; AV applications. Some run on what is called heuristics and can detect new Viruses of similar designs..&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3. Keep your Operating System up to date. Hackers are always finding new ways of breaking into an O/S. When they do, the O/S manufacturers release a patch to make sure the hackers cannot get in, always update your O/S and make sure you are fully patched against any new holes into your system.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Be wary of email&lt;/span&gt;&lt;br /&gt;1)If you receive an email from someone you don&#39;t know, asking you to download a greetings card, a PD F file or visit a site, then beware. Check it over carefully, do you know this person, were you expecting something like this?&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2)If the website address they are asking you to visit looks like this http://172.232.124.432 then it is more than likely to be a site hosting malware&#39;s, just itching to exploit your computer and fill it full of nasty. Sometimes they will try to fool you be using a dynamic redirect or simply by making the link as text, Click here to see my photos hover the mouse over the link and see where it leads. If it looks suspicious then do not click on it.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3)Check over all files sent to you, if what looks like a PDF/Word/Excel file lands in your in box and it ends in .exe .com .scr .pif (there are many more but these are some of the most common) then avoid it like the plague, these are executable files and more than likely to contain a virus/worm/Trojan just waiting for you to launch it.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;You may even receive email from a colleague which contains a virus, someone may have hijacked/spoofed their email address and sent you a very plausible message, laden with viruses. Always have a think. Were you expecting it? Is the attachment an executable one? Does the link look dubious in any way?&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Watch what you download&lt;/span&gt;&lt;br /&gt;Peer 2 Peer (P2P) applications such as Lime wire, Kazza and e mule are FULL of viruses, if you use these programs then always check the following.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;1. If you are downloading music, say an mp3, make sure it has the mp3 extension (nirvana.mp3). Never download a music file that has .exes .zip .com .pif .scr etc. Nirvana.exe = BAD NEWS.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2. Movies, the same goes. I will include a list of extensions to watch out for.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3. Applications. NEVER download an application using Peer 2 Peer, hackers regularly update their viruses and launch them on P2P and many of them will easily avoid your Anti Virus, 90% of applications on P2P are laden with viruses.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4.If you follow these tips, and are always on the lookout, aware of what you are doing, downloading, browsing etc then you should be relatively safe. These things should come to you naturally after time and just be a daily part of your safe Internet experience.&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;font-weight: bold; font-family: arial;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;List of dubious executable extensions.&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-weight: bold; font-family: arial;font-size:85%;&quot; &gt;ADE - Microsoft Access Project Extension&lt;br /&gt; ADP - Microsoft Access Project&lt;br /&gt; BAS - Visual Basic Class Module&lt;br /&gt; BAT - Batch File&lt;br /&gt; CHM - Compiled HTML Help File&lt;br /&gt; CMD - Windows NT Command Script&lt;br /&gt; COM - MS-DOS Application&lt;br /&gt; CPL - Control Panel Extension&lt;br /&gt; CRT - Security Certificate&lt;br /&gt; DLL - Dynamic Link Library&lt;br /&gt; DO* - Word Documents and Templates&lt;br /&gt; EXE - Application&lt;br /&gt; HLP - Windows Help File&lt;br /&gt; HTA - HTML Applications&lt;br /&gt; INF - Setup Information File&lt;br /&gt; INS - Internet Communication Settings&lt;br /&gt; ISP - Internet Communication Settings&lt;br /&gt; JS - JScript File&lt;br /&gt; JSE - JScript Encoded Script File&lt;br /&gt; LNK - Shortcut&lt;br /&gt; MDB - Microsoft Access Application&lt;br /&gt; MDE - Microsoft Access MDE Database&lt;br /&gt; MSC - Microsoft Common Console Document&lt;br /&gt; MSI - Windows Installer Package&lt;br /&gt; MSP - Windows Installer Patch&lt;br /&gt; MST - Visual Test Source File&lt;br /&gt; OCX - ActiveX Objects&lt;br /&gt; PCD - Photo CD Image&lt;br /&gt; PIF - Shortcut to MS-DOS Program&lt;br /&gt; POT - PowerPoint Templates&lt;br /&gt; PPT - PowerPoint Files&lt;br /&gt; REG - Registration Entries&lt;br /&gt; SCR - Screen Saver&lt;br /&gt; SCT - Windows Script Component&lt;br /&gt; SHB - Document Shortcut File&lt;br /&gt; SHS - Shell Scrap Object&lt;br /&gt; SYS - System Config/Driver&lt;br /&gt; URL - Internet Shortcut (Uniform Resource Locator)&lt;br /&gt; VB - VBScript File&lt;br /&gt; VBE - VBScript Encoded Script File&lt;br /&gt; VBS - VBScript Script File&lt;br /&gt; WSC - Windows Script Component&lt;br /&gt; WSF - Windows Script File&lt;br /&gt; WSH - Windows Scripting Host Settings File&lt;br /&gt; XL* - Excel Files and Templates&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7511617275454510713'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7511617275454510713'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/dangerous-internet-be-safe.html' title='Dangerous Internet, Be Safe'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-5971453394963568423</id><published>2007-09-02T21:24:00.000-07:00</published><updated>2007-09-02T21:39:18.271-07:00</updated><title type='text'>Computer Security Tips&amp;Backup Problems</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color: rgb(204, 204, 204); font-family: trebuchet ms;&quot;&gt;Computer security is important and one shouldn&#39;t take it lightly. Every time you go online without taking any security measure, you&#39;re increasing the risk of leaking your private information stored in your computer to an outsider. In this article, I will explain four basic computer security tips that you should know.&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;New Computer&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;1)When buying a new computer, it is important for you to turn the firewall on.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;2)For example, you&#39;re buying a Windows XP operating system computer, what you need to do is turn on the Windows Firewall first before going online.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;3)Even though it cannot protect you completely, but it is good enough to protect your PC before you buy a new firewall.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Email&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;1)Attachments in unknown emails are usually a threat.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;2)Never open any attachment from an unknown email. Sometimes, the email subject said something about you getting a greeting card and ask you to click the link inside that email.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;3)I&#39;ve opened this type of email and was attacked by a Trojan horse.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;4)Luckily my anti virus aborted the connection.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;            &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Update Your Virus Definition&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;1)Installing an anti virus will not be enough.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;2)Constant update is needed so you can receive new virus definition.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;3)New threats are being created everyday and updating your virus definition on regular basis is crucial to detect newer threats.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;            &lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Don&#39;t Surf Suspicious Sites&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;1)Opening a porn site or a warez site will also increase your risk of getting a virus.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;2)Application such as cracks and patches from warez sites will also increase your risk.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;3)Furthermore, it&#39;s illegal.&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;Using these tips will decrease the risk of getting your private information stolen by an outsider.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;4)However, these tips are not enough to protect your computer as this is only a basic computer security tips.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;5)Learn more so you can create a virtual wall around your computer.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;  &lt;/p&gt;                  &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 18pt; font-family: Arial; font-weight: bold;&quot;&gt;A Solution to Computer Backup Problems&lt;/span&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)I have only backed up one thing on my computer—my i pod library. This is because my computer suggested that I back up my i pod music.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2)I did it because I had bought numerous songs on i tunes and I wanted to have my songs backed on CDs in case a virus ruined my computer.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3)However, after taking the time to burn a stack of CDs, I decided not to take the time to back up my whole computer because I knew it would take too long.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;4)Who wants to sit in front of their computer for a few days to insert CDs and remove burned CDs? However, after my virus protection expired, I decided to look into finding a better back up plan for my computer files.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5)My friend suggested that I buy an external hard drive, but it seemed too expensive on my student budget.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;6)I began searching for other options and I found an online backup system that sounded easy to use. Luckily, it was free too! Since I don’t have a lot of time or money, &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;7)I quickly downloaded the software, installed it, and backed up my files right then.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;8)It backed up 2 GB and stored it for as long as I wanted. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;9)I decided that I would go to unlimited storage for about $5 per month if I needed to.&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;10)At first I was a little hesitant about my data being stored on the internet, but there is a private key encryption and a locked file to prevent others from stealing my data (somebody may not want my boring bio paper, but they may think my finances are interesting).&lt;/span&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;11)After finishing my back up, I spent the rest of the day doing more important tasks rather than burning back up CDs.&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/5971453394963568423'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/5971453394963568423'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/computer-security-tips-problems.html' title='Computer Security Tips&amp;Backup Problems'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-9152099552277594328</id><published>2007-09-02T21:03:00.000-07:00</published><updated>2007-09-02T21:21:55.662-07:00</updated><title type='text'>Top Tips to Learn Before Downloading</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 20pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 204, 204); font-family: trebuchet ms;font-size:100%;&quot; &gt;Are you searching for an i phone download service? I know I was! Now you need to find your favorite media files to upload into your i phone. Many download sites have been created on the internet over the past months, some amazing and some just downright horrible. Learning to choose the best i phone download site is very important. Most of these sites charge approximately the same fee, and it is quite impossible to know which are the good and which are the bad unless you join their service. In order to find the best i phone download service, the following 7 factors are a good indicator of whether the download service is of good quality or not.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt; Huge database of media&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;1)This is especially essential for any i phone download site, and surprisingly, there are several poor i phone sites that simply have a very limited range of media.&lt;br /&gt;2)The best i phone download sites will allow you to find a large collection of media from different genres. 3)It should also provide a wide range of media, like music, TV shows, movies and games all with a one time membership.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p style=&quot;font-weight: bold;&quot;&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;High speed and quality downloads&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)Being able to download media at a fast speed is important too. Several poor i phone download sites have a download speed limit to allow more people to download at the same time.&lt;br /&gt;2)Downloading files from these sites often produce a lot of problems because of the small size of their server, causing many interruptions and errors during download.&lt;br /&gt;3)Good i phone download sites have very large server space and therefore are able to cope with a large amount of downloads at the same time, and not causing any interruptions.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Service Fees&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)Most good i phone download services charge a reasonable price for unlimited downloads.&lt;br /&gt;2)If you are considering to download large number of files for your i phone, you should join a one time fee membership site.&lt;br /&gt;3)Another option that you may choose is the pay per download plan.&lt;br /&gt;4)The more media you download from these sites, the more money you will have to pay.&lt;br /&gt;5)We do not advise that you join pay per download sites, since your costs can accumulate very quickly and you never know how many files you may want to download next.&lt;br /&gt;6)Getting good value for money is very important here.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Support and converter software&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)Some files that you download from the i phone membership sites may not be fully compatible with your i phone. Luckily, most quality i phone download sites provide converter software, whereas the poor quality ones will expect you to get the software yourself.&lt;br /&gt;2)Software that allow you to transfer the files to your i phone easily should also be provided.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Technical support&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)Occasionally you might encounter problems with the software that the download sites provide you. A good technical support team will quickly help you resolve any issues that you have.&lt;br /&gt;2)If you join a poor quality i phone download site, you may be stuck with technical issues and have to wait days before you can even get into contact with their staff.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Security of files&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)High quality i phone download sites will scan files before you download them to ensure that they are free of spy ware and ad ware.&lt;br /&gt;2)You should not put your computer at risk by downloading files from poor i phone download sites.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;        &lt;p class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size: 10pt; font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Legal or no?&lt;/span&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1)The top i phone download sites respect copyright laws and ensure that all its media files are safe and legal for download.&lt;br /&gt;2)Thus by downloading from top i phone sites, you do not have to worry about getting into trouble with the law.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/9152099552277594328'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/9152099552277594328'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/09/top-tips-to-learn-before-downloading.html' title='Top Tips to Learn Before Downloading'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-6522945393750977436</id><published>2007-08-26T23:20:00.000-07:00</published><updated>2007-08-26T23:34:26.018-07:00</updated><title type='text'>Windows Antivirus&amp; free software</title><content type='html'>&lt;span style=&quot;;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 204, 204);font-family:trebuchet ms;font-size:130%;&quot;  &gt;Anti virussoftware is must-have protection. This review picks the best antivirus software based on its virus detection abilities, features, and breadth of protection. Whether you&#39;re seeking total system coverage or an ala carte solution, each of the following products provides superb virus protection for Windows-based PCs. Because every system is unique, evaluate several of these antivirus products to find the software best suited for your PC and your level of experience.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;1. Avira AntiVir PersonalEdition Premium&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;AntiVir is a consistent leader in independent antivirus tests. Avira&#39;s AntiVir PersonalEdition Premium is a low-impact, easy to use virus scanner that also includes rootkit detection and phishing protection. Five euros of each purchase is automatically donated to the Auerbach Foundation, a non-profit that supports various charity and community-related services. AntiVir PersonalEdition Premium should be used in conjunction with a firewall.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;2. Kaspersky Anti-Virus Personal&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Kaspersky Anti-Virus Personal offers excellent antivirus protection, perhaps unsurpassed in its ability to unpack and scan compressed files - something that trips up a lot of other vendors. Should be used in conjunction with a firewall.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Compare Prices&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;3. BitDefender Antivirus Plus&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Softwin&#39;s BitDefender Professional protects against viruses, spyware, and instant messaging threats, as well as offering firewall rules to block undesirable traffic and a privacy gateway to keep your identity and preferences private while surfing the Internet.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Compare Prices&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;4. McAfee VirusScan Plus&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;McAfee VirusScan Plus is an ideal candidate for those seeking an antivirus/firewall combination without all the bloat of traditional Internet security suites. McAfee VirusScan Plus makes an easy job of removing adware and spyware, something not all antivirus products deliver.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Compare Prices&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;5. Panda Antivirus 2007&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Panda Antivirus 2007 combines antivirus, antispyware, and antiphishing with its highly touted behavior-based TruPrevent Technology. License covers use on two computers and includes free tech support via email (telephone support options are also available).&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Compare PricesRead Review&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;6. F-PROT Antivirus&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;F-PROT Antivirus for Windows offers a feature that&#39;s increasingly harder to find - it includes a command-line scanner that can be used to create a rescue CD for scanning the system in Safe Mode. This is a particularly effective way to remove stubborn resuscitators. Firewall not included.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Buy Direct&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;7. G Data AntiVirusKit (AVK)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;AntiVirusKit (AVK) provides a double layer of protection, bundling two of the best antivirus engines - Kaspersky and BitDefender - under a single, easy-to-use console. Like Nod32, you&#39;ll also want to bolster G Data&#39;s AVK with a firewall.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Buy DirectRead Review&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;8. AVG Anti-Malware&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;AVG Anti-Malware combines traditional virus protection with adware and spyware scanning, in a low impact footprint ideal for resource-strained PCs or those who just want the best performance possible out of their computers. Free tech support is available via email and the standard license includes two years of protection. Should be used in conjunction with a firewall.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Buy Direct&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;9. Eset Nod32&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Nod32 features a small footprint, low performance hit, and fast scan speeds, providing focused virus protection ideal for gamers or those with an older PC. Should be used in conjunction with a firewall.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/6522945393750977436'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/6522945393750977436'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/windows-antivirus-free-softw.html' title='Windows Antivirus&amp; free software'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-919393806043014103</id><published>2007-08-26T22:21:00.000-07:00</published><updated>2007-08-26T23:08:28.523-07:00</updated><title type='text'>Internet  Web Site Safety</title><content type='html'>&lt;span style=&quot;font-weight: bold; color: rgb(204, 204, 204); font-family: trebuchet ms;font-family:arial;font-size:130%;&quot;  &gt;However, that said, many people have found love online so, if you&#39;re still interested in trying to find your soul mate,&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;OK, your anti-virus is current and constantly updated and you run a firewall. You never open e-mails or attachments from an unknown source and you’d rather eat worms that reply to spam. You have an anonymous nickname, you don’t use any of your personal details in your profile online and you never send e-mails, texts or IM ’s that contain your telephone number or real name. Good - you have your online safety completely covered…don’t you? Well, hang on there just a minute. What about your Web site?&lt;br /&gt;For adults&lt;br /&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Cyberdating&lt;/span&gt;&lt;br /&gt;How to have fun, but stay safe&lt;br /&gt;1)CyberdatingSo many of us work too hard, or spend so much time with our families that we don&#39;t have time to get out and meet people.&lt;br /&gt;2)While the most optimistic among us expect prince charming or princess charming to knock on our front door between our favorite TV shows, or online chats, most of us realize that this won&#39;t happen.&lt;br /&gt;3) As more people are getting online, more are turning to cyberdating services or cyberdating chats.&lt;br /&gt;Caber romance.&lt;br /&gt;4)Before we start...you need to recognize that the only way to stay truly safe in a dating situation is to not date, period! There are always risks in dating, especially when you date strangers (blind dates, first dates and cyder-dates). In addition, teens should not be cyberdating.&lt;br /&gt;5)There are special rules for teens online.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;6)Cyberdating is a little different from the other first dates, though. When you first meet a cyberdate in person, off line, you feel as though you know them - the normal first date precautions are often tossed to the wind. You know their favorite actors, authors and foods.&lt;br /&gt;7)You know everything they have told you, but they may not have been telling you the truth.&lt;br /&gt;8)You do not really know them. So treat them as strangers, use all the normal precautions you use with strangers, even cute ones. You should not give any more information to a first cyberdate than you would to a stranger you meet on a plane, or in a club, or in a bar.&lt;br /&gt;9)Women tend to lie about their weight or age, while men tend to lie about their income, level of baldness and athletic condition.&lt;br /&gt;10)Teenagers pretend to be older than they are. The one rule you can count on is that everyone lies a little. So, keep an open mind.&lt;br /&gt;11)That photo they sent you may be five years old, heavily doctored up with a graphics program, from when they used to be thin or when they had hair, or of someone else altogether. The best thing about the Internet is also the most dangerous - a person&#39;s personality can show through, what you are inside gets a chance to shine without getting overpowered by what you are outside. But, the cues we use in life; body language, dress, personal hygiene, tone of voice...the way we judge the truth of statements...are lost in cyberspace.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;How behavior in internet&lt;/span&gt;&lt;br /&gt;1)You can be anything or anyone you want to be online. I keep trying to get people to believe that I am tall, blond and gorgeous! (So far, no takers...).&lt;br /&gt;2)That cute brunette 24-year-old guy may not be cuter, may not be 24 and most importantly, may not be a guy. There is not truth in advertising protection when you date online.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Do not give out personal information online&lt;/span&gt;&lt;br /&gt;1)Personal information that would let someone find you off line would never be shared online. Your full name, where you work, where you live, your phone number (see my note on giving out your phone number), your fax number...these should not be shared online.&lt;br /&gt;2)Use an online dating service that uses an anonymizer or re-mailer to mask your real e-mail, or set up a Hot mail or other free account just for dating online.&lt;br /&gt;3)Caber romance can quickly turn to cyberstalking - it is better to be able to terminate that particular account than to have to set up a new main account, and notify everyone you know.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Take your time - do not rush into things&lt;/span&gt;&lt;br /&gt;1)Take your time to try to get to know the person online first. Everyone can put their best caber-foot forward in the first couple of e-mails. Being consistent is tougher.&lt;br /&gt;2)Make sure you keep the old e-mails to compare the information they give you. In one e-mail, they might tell you they work for the postal service, in another that they are a student - make sure you check out these inconsistencies.&lt;br /&gt;3)They could be taking night classes, or they could just as easily be lying.Do not be rushed, and do not rush the other person. Let the relationship develop online until you are comfortable with each other - take your time.4)Ask your friends - sometimes they are not blinded by the same rose-colored glasses you might be. What you considered cute might ring differently to them. This might seem like dating by committee, but it helps you keep perspective.&lt;br /&gt;5)Especially when we have been hurt before, we think that we have now found the perfect checklist for a partner.&lt;br /&gt;6)When we see these points in the other person, we forget to explore the other points. Life is more than satisfying a &quot;how tall are you, where do you live (geographically-desirable), if they want or don&#39;t want children, or have or don&#39;t have children, how much they earn, what religion they are and whether they like romantic movies and Touched by an Angel...&quot; checklist. Values, experience and all the baggage we carry needs to be explored - this takes time. Give it the time it deserves.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Honesty is the best policy&lt;/span&gt;&lt;br /&gt;1)When you go to one of those dating site, they ask you your height, weight, religion, income...lots of personal stuff. In addition, maybe you are not as thin, tall or make as much money as you want to.&lt;br /&gt;2)Maybe you have not been to church or a temple or mosque in thirty years. Maybe you are afraid that if you tell them your mother is living with you (or even more embarrassing, that you are still living with your mother...) no one will want you.&lt;br /&gt;3)However, if you start out lying, you will be caught, eventually. If you want to shave a few pounds off, or use an older picture...Tokay. Nevertheless, confess once you think the person might be more than a one-time romance.&lt;br /&gt;4)Do not bait and switch, it&#39;s the surest way to end a promising relationship.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Start with a phone call&lt;/span&gt;&lt;br /&gt;1)You should move from fantasies and chatting online to a phone call before you meet off line in person. The safest way to do this is by using a public phone. .&lt;br /&gt;2)Set up a time for the call, and give the other person the telephone number of the public phone.&lt;br /&gt;3)Once you are comfortable enough, you can share real phone numbers, but make sure you have caller ID service. If things go sour, you can always block their calls.&lt;br /&gt;4)It also lets you know what their number really is. If they block your caller ID, do not accept their calls.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Meet,with a friend and in a very public place&lt;/span&gt;&lt;br /&gt;1)The first time you meet in person, bring a friend. Meet in a mall, or fast food restaurant. Plan for a short first time get together - coffee or a soda. Tell them in advance that it will just be for a few minutes, so they will understand.&lt;br /&gt;2)Treat this as a blind date, only with more care.&lt;br /&gt;3)In a blind date someone you know knows this person, in a cyberdating situation, no one really knows this person. If they insist on meeting you alone, do not go.&lt;br /&gt;4)Then compare what this person told you about himself or herself online - does it match reality? If not, find someone else.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Tell a friend&lt;/span&gt;&lt;br /&gt;1)Make sure someone knows whom you are meeting, where you are going and when you are coming back. (Someone other than the person you take with you.)&lt;br /&gt;2)Store all of the e-mail conversations, and let your friend know where to find them.&lt;br /&gt;3)If anything goes wrong, they will be the source of information on how to locate the person you have been chatting with.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Never leave or go home with them&lt;/span&gt;&lt;br /&gt;1)You can extend the meeting to dinner or anything else in a public place. However…PUBLIC is the operative word here. 2)Remember when your mother told you never to get into a car with a stranger? Do not go home with them, to a private place of any kind...not for a while.&lt;br /&gt;3)Take this slow, even if you are not used to taking dating slow...this is special.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Report any attacks or threats to law enforcement&lt;/span&gt;&lt;br /&gt;1)If things go wrong, whether you followed the rules or not, do not be embarrassed to go to the police. Give them all the facts. 2)If you do not report this person, they in all likelihood will do it again.&lt;br /&gt;2)You are allowed to say &quot;no&quot; and have it respected. If anything goes wrong, it is not your fault.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Learn more about protecting yourself and your privacy online and off line&lt;/span&gt;&lt;br /&gt;1)We have a lot of information at our Web site, and many classes you can attend online to teach you how to enjoy cyberspace safely. If you have a special question you need answered, feel free to write to Parry directly.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Make sure you&#39;re using a reputable online dating service or chat&lt;/span&gt;&lt;br /&gt;1)Most will give you a free trial period. Make sure that you can use all of their service during that free trial. Make sure they use anonymities or re-mailers, to mask your real e-mail address.&lt;br /&gt;2)Some people at the end of the free trial give out their e-mail address to allow the other person to find them when the free trial is over - make sure it&#39;s an e-mail account you have set up just for this purpose.&lt;br /&gt;3)Do not give out your Web site address if it contains personal information, or personal e-mail address.&lt;br /&gt;If someone makes you uncomfortable, report it to your dating service right away.&lt;br /&gt;4)Make a copy of the message, and keep copies of anything you found offensive so they can check it out. Many also have an e-overlooking feature to keep you from being harassed from someone.&lt;br /&gt;5)Try not to make your essays provocative.&lt;br /&gt;6)Flirtation&#39;s escalates quickly and it is almost impossible to step back to a less amorous level.&lt;br /&gt;7)If you have a problem with your service, contact them. If they will not help you, contact us.&lt;br /&gt;8)We do not endorse any services, but have found that match.com and matchmaker.com seem reputable and have a safe cyberdating area.&lt;br /&gt;9)wired safety hosts one of the leading cyberstalking help groups online. If you need our help, visit our Deerstalking&#39;s Self-help area or just send an e-mail to our Deerstalking&#39;s and Harassment Division via our contact form.&lt;br /&gt;10)Do not respond when the deerstalker&#39;s contacts you. Just ignore them - most of the time they go away. Never share a photo with anyone online you would not want broadcast to 120 million people all over the world.&lt;br /&gt;11)Often caber romances end in one party cyberstalking the other.&lt;br /&gt;12)Do not give them any ammunition.&lt;br /&gt;13)When the old-fashioned &quot;for a good time, call Sally&quot; is posted on one bathroom wall, the results can be horrible, when it is posted on the Internet&#39;s cyberwall of sexual UseNet groups and chats, it can be very dangerous!&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Remember&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;These tips are just for those over 18 years old.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Take your time, use your head and be careful!&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Do not believe everything you read online,&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Therefore, have fun, but be smart...and do it safely!&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt; Remember the honesty thing Use your head - you might be lonely, but you are still safe.&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/919393806043014103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/919393806043014103'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/internet-web-site-safety.html' title='Internet  Web Site Safety'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-7754022849084470362</id><published>2007-08-24T07:53:00.002-07:00</published><updated>2007-08-24T07:56:46.359-07:00</updated><title type='text'>Internet safety tips</title><content type='html'>&lt;div style=&quot;font-family: arial; text-align: justify; color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;     &lt;br /&gt;&lt;span style=&quot;color: rgb(204, 204, 204); font-family: trebuchet ms;font-size:100%;&quot; &gt;This Information is useful for Internet Surfers.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;1)D&lt;span style=&quot;font-size: 180%;&quot;&gt;&lt;/span&gt;on&#39;t save your login information. Alwa&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;ys log out of Web sites by clicking &quot;log out&quot; on the site. It&#39;s not enough to simply close the browser window or type in another address.&lt;br /&gt;Many programs (especially instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;2)Don&#39;t leave the computer unatten&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;ded with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;3)Erase your tracks. Web browsers such as Internet Explorer keep a re&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;cord of your passwords and every page you visit, even after you’ve closed them and logged out.&lt;br /&gt;&lt;br /&gt;&quot;To disable the feature that stores passwords&lt;br /&gt;Before you go to the Web, turn off the Internet Explorer feature that &quot;remembers&quot; your passwords.&quot;&lt;br /&gt;&lt;br /&gt;            1. In Internet Explorer, click Tools, and then click Internet Options.&lt;br /&gt;&lt;br /&gt;            2. Click the Content tab, and then click auto complete.&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYwYwXlq3EXRPaUzvz7EtynKEIePrCv48KtBlm8TcyxGnMGrKUBQUbtudbibqJ6g9idz1bJaA_iXwb6cBRj6cEMzSe7o7gFH1ASuVlxNQ8NFWzacIf_ZUIjeEV_rlQFgVPjjGKeKMwHV57/s1600-h/5998.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 320px; height: 240px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYwYwXlq3EXRPaUzvz7EtynKEIePrCv48KtBlm8TcyxGnMGrKUBQUbtudbibqJ6g9idz1bJaA_iXwb6cBRj6cEMzSe7o7gFH1ASuVlxNQ8NFWzacIf_ZUIjeEV_rlQFgVPjjGKeKMwHV57/s320/5998.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5079252058890139746&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;            3. Click to clear both check boxes having to do with passwords.&lt;br /&gt;&lt;br /&gt;&quot;To delete your temporary Internet files and your history&lt;br /&gt;When you finish your use of a public computer, you should delete all the temporary files and your Internet history.&quot;&lt;br /&gt;&lt;br /&gt;            1. In Internet Explorer, click Tools, and then click Internet Options.&lt;br /&gt;&lt;br /&gt;            2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies.&lt;br /&gt;&lt;br /&gt;            3. Under History, click Clear History.&lt;br /&gt;&lt;br /&gt;&quot;To delete other files saved by corporate portals, such as Share point Portal Server&lt;br /&gt;If you&#39;re using a corporate Web site that allows you to view internal corporate documents, you may be inadvertently storing sensitive documents on the public computer.&quot;&lt;br /&gt;&lt;br /&gt;1. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\user name\Local Settings\Temp.&lt;br /&gt;&lt;br /&gt;2. If your company uses Microsoft Office share point Portal Server, empty the temporary folder (My Documents\share point Drafts).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;4)Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;5)Don&#39;t enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have.&lt;br /&gt;But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief.&lt;br /&gt;&lt;br /&gt;Then it doesn&#39;t matter if you haven&#39;t saved your information or if you&#39;ve erased your tracks. They still have access to this information.&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7754022849084470362'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7754022849084470362'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/internet-safety-tips_24.html' title='Internet safety tips'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYwYwXlq3EXRPaUzvz7EtynKEIePrCv48KtBlm8TcyxGnMGrKUBQUbtudbibqJ6g9idz1bJaA_iXwb6cBRj6cEMzSe7o7gFH1ASuVlxNQ8NFWzacIf_ZUIjeEV_rlQFgVPjjGKeKMwHV57/s72-c/5998.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-234608828990784184</id><published>2007-08-23T08:11:00.000-07:00</published><updated>2007-08-24T07:22:22.399-07:00</updated><title type='text'>How to repair small problems(software&amp;hard wear)</title><content type='html'>&lt;p style=&quot;font-family: arial; color: rgb(0, 0, 0); font-weight: bold;&quot; class=&quot;style5&quot;&gt; &lt;/p&gt;                                                                  &lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;  &lt;/p&gt;                                                                        &lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;  &lt;/p&gt;            &lt;p style=&quot;color: rgb(0, 0, 0); font-family: arial; font-weight: bold;&quot; class=&quot;style5&quot;&gt; &lt;/p&gt;            &lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Symptom:&lt;/span&gt;&lt;br /&gt;You hear a clicking noise coming from the computer.&lt;br /&gt;&lt;span style=&quot;font-weight: normal;font-size:130%;&quot; &gt;&lt;strong&gt;&lt;em&gt;&lt;span&gt;Reason:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;The reason for this issue in many cases is a head crash or bad head alignment that causes the HD to fail to initialize.&lt;br /&gt;It can happen to a new as well as an old HD, with older drives being more prone to head crashes and head failures.&lt;br /&gt;&lt;span style=&quot;font-weight: normal;font-size:130%;&quot; &gt;Action:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Turn off the computer immediately and bring the HD to a data recovery expert.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;The longer you continue to work with the computer attempting to access the HD, the lower the chances that you will have a successful recovery.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;&lt;em&gt;Media:&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;HD 2.5”,1.8” (Laptop), HD 3.5” (Server), RAID Array.(Server)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Symptom:&lt;/span&gt;&lt;br /&gt;In many cases a hard drive crash is followed by reduced or slow computer performance.&lt;br /&gt;&lt;em&gt;&lt;/em&gt;&lt;span style=&quot;font-weight: normal;font-size:130%;&quot; &gt;&lt;strong&gt;&lt;em&gt;Reason:&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;The reason for this issue is in many cases caused by overheating.&lt;br /&gt;It can happen to a new as well as an old HD, with older HD being more prone to overheating issues.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Action:&lt;/span&gt;&lt;br /&gt;In cases where you experience these symptoms, and you don’t have access to your operating system. STOP! Do not continue to use the computer.&lt;br /&gt;Turn off the computer and immediately bring the HD to a data recovery expert.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Media:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;HD 2.5”,1.8” (Laptop), HD 3.5” (Server), RAID Array.(Server)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;em&gt;&lt;strong&gt;symptom:&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;You deleted a file and emptied the recycle bin/trash can.&lt;/span&gt;Reason:&lt;/p&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Human Error.&lt;/span&gt;&lt;br /&gt;&lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: normal;font-size:130%;&quot; &gt;Action:&lt;/span&gt;&lt;br /&gt;STOP! Shut down the computer immediately using the physical power button, in order for the system to stop writing any data the HD and bring it to data recovery expert.&lt;/span&gt;&lt;/p&gt;      &lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If you continue to use the computer after the file/folder got deleted you can lower the chances that you will have a successful recovery of the lost files or folders.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Media:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;em style=&quot;font-weight: bold;&quot;&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;HD 2.5”, 1.8” (Laptop), HD 3.5” (Server, Desktop), RAID Array.(Server)&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;;font-family:arial;font-size:85%;&quot;  &gt;&lt;/span&gt;      &lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;  &lt;/p&gt;&lt;span style=&quot;;font-family:arial;font-size:130%;&quot;  &gt;&lt;strong&gt;&lt;em&gt;symptom:&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;You formatted a HD with important dat&lt;/span&gt;a.&lt;/span&gt;&lt;strong  style=&quot;font-family:arial;&quot;&gt;&lt;em&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Reason&lt;/span&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Human Error.&lt;/span&gt;&lt;span style=&quot;;font-family:arial;font-size:130%;&quot;  &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Action:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Stop working on the computer, shut down the computer and bring it to a data recovery expert.&lt;/span&gt;                        &lt;p  style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;&quot;&gt;  &lt;/p&gt;                                          &lt;p style=&quot;color: rgb(0, 0, 0); font-weight: bold; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;the more actions you will do to that specific HD, the lower the chances that you will have a successful recovery.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Media:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;font-family:arial;font-size:85%;&quot;  &gt;HD 2.5”, 1.8” (Laptop), HD 3.5” (Server, Desktop), RAID Array.(Server)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;&lt;em&gt;Symptom:&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;You deleted pictures in your digital camera.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Reason:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Human Error.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Action:&lt;/span&gt;&lt;br /&gt;Stop working immediately with the camera and take the memory card out.&lt;/span&gt;&lt;/p&gt;      &lt;p style=&quot;color: rgb(0, 0, 0); font-weight: bold; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Bring it to a data recovery expert. We can help recover the deleted pictures.&lt;/span&gt;&lt;/p&gt;                        &lt;p face=&quot;arial&quot; style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;  &lt;/p&gt;                                          &lt;p face=&quot;arial&quot; style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The longer you will use the camera after the pictures got deleted, the lower the chances that you will have of a successful recovery.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Media:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;All digital camera memory cards.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Symptom:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;You formatted the memory card on the digital camera.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Reason:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Human error.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Action:&lt;/span&gt;&lt;br /&gt;Stop working immediately with the camera and take the memory card out.&lt;/span&gt;&lt;/p&gt;      &lt;p face=&quot;arial&quot; style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Bring it to a data recovery expert., We can help recover the formatted memory card.&lt;/span&gt;&lt;/p&gt;                        &lt;p face=&quot;arial&quot; style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;  &lt;/p&gt;                                          &lt;p face=&quot;arial&quot; style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The longer you will use the camera after the memory card was formatted, the lower the chances that you will have a successful recovery.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Media:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;All digital camera memory cards.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Symptom:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;One or more of a RAID array drives failed or the RAID array failed to initialize and you no longer have access to the array data.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Reason:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;One or more of the HD failed or the array controller failed.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Action:&lt;/span&gt;&lt;br /&gt;Stop working immediately with the server, number the order of the HD (0,1,2…) and bring that array preferably with the array controller to a data recovery expert.&lt;/span&gt;&lt;/p&gt;      &lt;p face=&quot;arial&quot; style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If the array failed to load, do not try to replace a HD, in case the array did not initialize it would not help and might cause the rebuilding on the array and you could lose the data completely.&lt;/span&gt;&lt;/p&gt;                              &lt;p style=&quot;color: rgb(0, 0, 0); font-weight: bold; font-family: arial;&quot;&gt;  &lt;/p&gt;                                          &lt;p style=&quot;color: rgb(0, 0, 0); font-weight: bold; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Do not try to replace a controller – it doesn’t have the raid information structure of the old one and you might accidentally initialize the RAID array and delete the existing information.&lt;br /&gt;Be advised that most RAID array data losses are caused by human errors.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;media:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;RAID array (SCSI + ATA + SATA)&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Symptom:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Backup Tape couldn’t be read by the tape drive or the backup software while performing a restore of a backup.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Reason:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Magnetic Tape might be old and has some surface problem.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Action:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bring the Tape for a diagnosis to a data recovery expert.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;                  &lt;p style=&quot;color: rgb(0, 0, 0); font-weight: bold; font-family: arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Please be advised that in some cases it’s easier and cost effective to recover data from damaged HD than a tape. In cases where you are restoring data because of other failed media we would like to evaluate both backup tapes and hard drive.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;media:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Magnetic Tape.&lt;/span&gt;&lt;/p&gt;      &lt;p style=&quot;font-family: arial; color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;  &lt;/p&gt;                                                               &lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;font-size:180%;&quot;  &gt;Safety tips to avoid data loss&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;1)Always back up your data. Make sure that copies of your most important data are being kept off site.&lt;br /&gt;2)Always turn off your computer using the operating system shut down process.&lt;br /&gt;3)Never upgrade your system if you don’t have a backup.&lt;br /&gt;4))Always use up-to-date hardware and software utilities for data security, such as virus protections and firewalls.&lt;br /&gt;5)Laptops should be operated on a hard and flat surface to allow proper ventilation and to avoid over heating.&lt;br /&gt;6)Servers should have fans, ventilation or portable air conditioning systems as close as possible to avoid operating in high temperatures.&lt;br /&gt;7)Allow enough space around the external drive’s cooling fans and remove any items that may block air flow.&lt;br /&gt;8)Drives should be stable and stationary when operating. If you have to move your computer – turn it off first.&lt;br /&gt;9)When touching or handling the media, make sure static electrical charges will not occur.&lt;br /&gt;10)Always test your backup before you reformat your drive.&lt;br /&gt;11)In case you hear unusual sounds coming from your computer, turn it off immediately to avoid further damage.&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/234608828990784184'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/234608828990784184'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/how-to-repair-small-problemssoftware.html' title='How to repair small problems(software&amp;hard wear)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-2095472783783156827</id><published>2007-08-23T06:51:00.000-07:00</published><updated>2007-08-24T07:47:00.869-07:00</updated><title type='text'>Laptop Safety Tips</title><content type='html'>&lt;span style=&quot;font-weight: bold; color: rgb(192, 192, 192); font-style: italic;font-family:arial;font-size:130%;&quot;  &gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Laptop Security password tips&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic; color: rgb(192, 192, 192);font-family:arial;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Do NOT leave your Laptop unattended. Laptops should not be stored in student lockers.Purchase a locking security cable to attach to your laptop around an immovable object.Set your BIOS password. The BIOS is required to boot the computers. If the BIOS is password protected, the computer will not boot (or you will not be able to enter or change the BIOS settings.) Check your laptop manual on how to set your BIOS password. (This is a separate password than a windows password).Regularly change access passwords (both BIOS and e-mail passwords).&lt;br /&gt;1.Never use any option that “remembers” your password so that you do not have to re-enter it the next time you connect&lt;br /&gt;2.Back up key data onto floppy disks. Carry all disks separately from the laptop.&lt;br /&gt;3.Make hard copies of important files and documents.&lt;br /&gt;4.Keep the amount of data stored on your machine to a minimum.&lt;br /&gt;Write down the laptop model type, model number, serial number and specs.Mark your laptop to make it unique and easy to identify (i.e. engraved).&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Laptop advanced safe tips:&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;1.Always back up your files.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;Any file saved to your file server account (Explore, Learn, Reflect, or Discover) will be backed up daily by Computing Services. However, backing up files on your laptop is your responsibility. With a laptop, you are not only at risk for losing work due to a hard drive failure, but also at risk for losing all your files due to loss or theft. &lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;1.We purchase insurance for all new laptops, but this will only help replace your laptop; your files will be gone permanently.&lt;br /&gt;2.This can be devastating if your laptop is the only place you&#39;re storing your dissertation, a grant proposal, your tax records, or any other personal or confidential files.There are several ways to back up files from a laptop.&lt;br /&gt;3.You can save a copy to a floppy or zip disk. If you have a modem, you can e-mail files to your office computer.&lt;br /&gt;4.If you have a network card, you can plug your laptop into the LRDC network and save your files to your file server account.&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;2.Don&#39;t save your passwords  on your laptop.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;remember&lt;/span&gt; e-mail and dial-up software allow users to save their passwords. Although this makes using your laptop convenient and easy, if your laptop is lost or stolen, complete strangers will have total access to your e-mail messages and Internet access.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;3.Be careful when placing your laptop on an airport .&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;1.The most common laptop theft scam involves two people working together to steal your laptop directly from the security convener belt. After spotting your laptop carrying case, they get in line for the metal detector directly in front of you.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;2.The first thief walks through the security check with no problem.&lt;br /&gt;The second thief has a great deal of trouble, emptying pockets and checking for jewelry several times, which distracts you and the security personnel. At this point, you may have already placed your luggage on the conveyor belt.&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;3.This allows the first thief to walk away with your laptop, while the second prevents you from walking through the metal detector. To prevent this from happening to you, wait until the last possible moment to put your laptop on the conveyor belt to assure you will be the only person able to pick it up at the other end.&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;4.Label your laptop and all accessories.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;1.Many people at LRDC have identical laptops. Label or tape your business card to the top of your laptop and to all of your laptop accessories to help prevent someone from accidentally taking your equipment.&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;5.use a laptop carrying cases&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;2.In addition to being designed to carry all your laptop accessories, laptop carrying cases are designed to provide protection. Newer laptops are more robust, but it&#39;s still easy to crack the screen. &lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;3.Replacement screens can cost almost as much as the laptop itself and are not covered by warranties or insurance. Also, repair time will typically be 1-2 weeks.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;6.Be careful when plugging your laptop.&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;1.The modem and 10BaseT connections on your laptop look similar. A 10BaseT cable allows you to attach to a local area network. It is wider than a phone line and will not fit into your modem. However, a phone line will easily fit into a 10BaseT connection.&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;2.This of course will not work and if the phone rings while you have it plugged in, the voltage will be enough to potentially cause severe damage to your laptop. Also, when traveling to other sites, make sure you use an analog line.&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;3.Digital lines carry more electricity than analog lines and can also irreparably damage your modem.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;7.Never allow other people to use your laptop.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;1.When traveling to another site, it can be very tempting to allow someone to make changes to your network settings in order to allow you to connect to their local area network. This can result in them accidentally wiping out your current dial-up and LRDC network settings.&lt;br /&gt;2.Allowing your children to use your laptop also puts you at risk.&lt;br /&gt;3.If they install programs—especially games, shareware, and screen-savers—you are at risk for software incompatibilities, which can result in computer crashes.&lt;br /&gt;4.This also puts you at an increased risk for computer viruses. Either situation can result in a full-days repair.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;8&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;.How to maintain laptop&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;(In weather)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It’s that time of year again in North America where temperatures climb and weather becomes erratic. Add to that the possibility of power outages and you have new challenges to face when using your laptop. Take care in warm and hot weather to follow these tips to ensure you use your laptop safely and don’t have any problems with it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;1.Heat  Range&lt;/span&gt;&lt;br /&gt;1.Most laptop computers operate properly in the safe temperature range of 50 to 95 degrees Fahrenheit or 10 to 35 degrees Celsius.&lt;br /&gt;2.Keep in mind that when bringing a laptop in from the warm hot air, the laptop must cool down to the interior temperature before you use it.&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;3.By the same token if you use your laptop outdoors, then let the laptop warm up to the outside temperature before starting it up.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;2.In Cars&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;4.Just as you wouldn’t leave people or animals in a car in hot weather, you should not leave your laptop and other mobile gear either.&lt;br /&gt;5.Leaving your laptop closed in a vehicle in hot temperatures will cause damage to your laptop.&lt;br /&gt;6.The heat is not good for the internal components or the external casings.&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;3.sharp Sun&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;1.Never leave your laptop where it is exposed to direct sunlight, whether it is in use or shut down.&lt;br /&gt;2.If you must use your laptop outside in bright conditions you can use either:&lt;br /&gt;a laptop glare screen which cuts down on the glare caused by the sun&lt;br /&gt;a laptop hood which cuts down on the amount of light directed at the laptop display.&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;4.Humidity&lt;/span&gt;&lt;br /&gt;1.In warm weather people are fond of saying it’s not the heat itself that bothers them but the dreaded humidity.&lt;br /&gt;2.Humidity is the amount of moisture in the air and the recommended safe range of relative humidity is 10-80%.&lt;br /&gt;3.Moisture can cause damage to the internal components of a laptop and you may not even realize that the damage has occurred.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;5.Take it Out&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;1.If you use your laptop in hot temperatures consider using a removable hard drive to store your data on. This way you can help protect your data and ensure that your removable hard drive stays protected from exposure to heat and the sun.&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;6.Weather Watching&lt;/span&gt;&lt;br /&gt;1.In warm, hot weather there are more storms, often with little or no warning and more severe weather occurrences which mobile professionals must face when traveling.&lt;br /&gt;2.Equipment to help protect your mobile gear includes having surge protectors, power investors and spare batteries.&lt;br /&gt;3.External battery charges that don’t require an electrical connection are another wise investment.&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;7.t Cool&lt;/span&gt;&lt;br /&gt;1.Use a laptop stand to disperse heat that your laptop generates.&lt;br /&gt;2.Laptop stands are available in a variety of styles to suit your working needs.&lt;br /&gt;3.There are laptop stands which include fans to help dissipate the heat and keep your laptop working at its best.&lt;br /&gt;Note :Laptop Desks &amp; Laptop Stands&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;8.Pack it Wisely&lt;/span&gt;&lt;br /&gt;1.Using a properly fitted and well-padded laptop case for your mobile gear will help keep it insulated against heat, moisture and direct sunlight.&lt;br /&gt;2.When buying your laptop case make sure all your mobile gear will fit securely and be protected from the effects of weather&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;9. on the road&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3.The newest laptops are powerful, light, and thin enough to fit easily into the slenderest of carry-on baggage. *This makes them a great accessory for flying or any other mode of travel, but also easier to lose or have stolen.&lt;br /&gt;4.It pays to be extra vigilant at airport security checkpoints where thieves know people can be flustered.&lt;br /&gt;5.You should also store your laptop in the seat in front of you, instead of in the overhead compartment when you fly.&lt;br /&gt;6.But even if you&#39;re extra careful, it&#39;s still possible to lose your laptop.&lt;br /&gt;7.If you spend some time securing your laptop before you go on the road, you could help keep your personal or financial information from falling into the wrong hands.&lt;br /&gt;8.Here are our top tips to help you secure the information on your laptop.&lt;br /&gt;Protect your information If you keep a lot of personal or financial information on your computer, invest in an operating system that includes file protection.&lt;br /&gt;9.Windows Vista and Windows XP Professional have the tools to protect your information through a process called encryption.&lt;br /&gt;10.To learn more, see Encrypt Your Data to Keep It Safe .&lt;br /&gt;11.Protect your laptop with a strong password If you travel with your laptop frequently, you should secure it with a strong password.&lt;br /&gt;12.Check your computer&#39;s Help and Support service to learn how to add or change your system password.&lt;br /&gt;13.To find out how to create passwords that are tough for hackers to crack, but easy for you to remember, see Strong passwords: How to create and use them.&lt;br /&gt;14.Back up before you go Always back up your information before you take your laptop on a trip.&lt;br /&gt;15.You can&#39;t always avoid the financial loss of your equipment, but you can avoid losing all your information in the process.&lt;br /&gt;16.To learn how to make copies of all of your information using Windows XP, see How to back up    manually or by using the Windows XP Backup utility.&lt;br /&gt; For Windows Vista, see Windows Vista: Windows Backup.&lt;br /&gt; If you use Windows Live one care, see Windows Live one care Backup and Restore. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Remember&lt;/span&gt; :-&lt;br /&gt;Delete&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt; e-mails from your in box folder and save important e-mails to a different folder.&lt;br /&gt;Set your Identification: Under settings, choose control Panel. Click Network Icon and click Identification tab. Computer name: Type your Suffolk e-mail address (first 3 letters of last name followed by first 5 digits of your Suffolk ID number) Work group: law laptop Computer Description: your Suffolk e-mail address.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/2095472783783156827'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/2095472783783156827'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/laptop-safety-tips.html' title='Laptop Safety Tips'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-4019748641833029205</id><published>2007-08-23T05:32:00.000-07:00</published><updated>2007-08-23T07:56:08.891-07:00</updated><title type='text'>Security for  your computer</title><content type='html'>&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt; good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined below can provide a good measure of security in very little time.&lt;br /&gt;Use anti virus software and keep it updated. You should check for new definition updates daily. Most anti virus software can be configured to do this automatically.&lt;br /&gt;                                 {Top Anti virus Software}&lt;br /&gt;                                 {Top Spy ware Scanners}&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Anti virus 100% Free Norton Anti virus Free ! Delete all Viruses - 100% Free!Norton.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Install security patches.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Vulnerabilities in software are constantly being discovered and they don&#39;t discriminate by vendor or platform. It&#39;s not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;     &lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;For Windows updates, visit the Windows Update Center&lt;br /&gt;Use a firewall. No Internet connection is safe without one.&lt;br /&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;most use full tips your computer:-&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Download Panda Anti virus Kill all Viruses &amp; Spy wares with the latest Panda Anti virus software&#39;s.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a a non-firewall ed computer to be infected.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt; Free zone alarm Firewall&lt;br /&gt;Using the Windows Firewall&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Secure your browser. If you use Internet Explorer, you will be able to take advantage of the security zones settings to ensure optimum browsing safety. Not only will you enjoy safer browsing, you&#39;ll be able to eliminate unwanted pop-ups as well.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;Securing Internet Explorer&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Remember that most worms and Trojan-laden spam try to spoof the sender&#39;s name. And make sure your email client isn&#39;t leaving you open to infection.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt; (Plain(text) is Better)&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;How To Secure Your Email:-&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Avoid P2P and distributed file sharing.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Torrent, Kazan, Untellable, Morpheus and at least a dozen other file sharing networks exist.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:130%;&quot;  &gt;*&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;Most are free. And all are rife with Trojans, viruses, worms, aware, spy ware, and every other form of malicious code imaginable.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;There&#39;s no such thing as safe anonymous file sharing. Avoid it like the plague.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Keep abreast of Internet scams.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Criminals think of clever ways to separate you from your hard earned cash.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Don&#39;t get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings.&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Likewise, beware of email masquerading as a security concern from your bank or other commerce site.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Don&#39;t fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Remember:-&lt;/span&gt;&lt;br /&gt;There&#39;s far more good than bad on the Internet. The goal isn&#39;t to be paranoid. The goal is to be cautious, aware, and even suspicious. By following the tips above and becoming actively engaged in your own security, you&#39;ll not only be protecting yourself, you&#39;ll be contributing to the protection and betterment of the Internet as a whole.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/4019748641833029205'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/4019748641833029205'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/security-for-your-computer.html' title='Security for  your computer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3748428670008741402.post-7375780173503201634</id><published>2007-08-23T05:25:00.000-07:00</published><updated>2007-08-23T08:09:51.608-07:00</updated><title type='text'>safety tips for using a all computer&#39;s</title><content type='html'>&lt;span style=&quot;;font-family:trebuchet ms;font-size:85%;&quot;  &gt;&lt;span style=&quot;font-weight: bold; color: rgb(192, 192, 192); font-style: italic;font-size:130%;&quot; &gt;Are public computers at libraries, schools,house, office, internet cafes, airports, and copy shops safe?&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;color: rgb(255, 153, 102);font-size:130%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;span style=&quot;font-family: arial; color: rgb(0, 0, 0);font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;1).Update your virus software weekly - there are always      new viruses. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;ol style=&quot;font-weight: bold; color: rgb(0, 0, 0); font-family: arial;&quot; start=&quot;1&quot; type=&quot;1&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;u1:p&gt;&lt;/u1:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/ol&gt;&lt;span style=&quot;font-family: arial; color: rgb(0, 0, 0);font-size:85%;&quot; &gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;u3:p&gt;&lt;/u3:p&gt;&lt;u2:p&gt;&lt;/u2:p&gt;2)Scan for viruses every night      - you have to do it these days.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;3)Back up all your data files      at least weekly to a tape drive&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt; - lots of people lose everything!&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial; color: rgb(0, 0, 0);font-size:85%;&quot; &gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;4)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial; color: rgb(0, 0, 0);font-size:85%;&quot; &gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;Take one copy of your back-up disk to a second location in case of emergency - many people have thanked me for this advice.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;u3:p&gt;&lt;/u3:p&gt;&lt;u2:p&gt;&lt;/u2:p&gt;5)Use a firewall if you have      DSL or a Cable Modem connection - or you will&lt;u&gt;&lt;/u&gt; become infected with      a virus or harmful file.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;ol style=&quot;font-weight: bold; color: rgb(0, 0, 0); font-family: arial;&quot; start=&quot;1&quot; type=&quot;1&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;u1:p&gt;&lt;/u1:p&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;u1:p&gt;&lt;/u1:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/ol&gt;&lt;span style=&quot;font-family: arial; color: rgb(0, 0, 0);font-size:85%;&quot; &gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;u3:p&gt;&lt;/u3:p&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;/span&gt; &lt;span style=&quot;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;ol style=&quot;font-weight: bold; color: rgb(0, 0, 0); font-family: arial;&quot; start=&quot;1&quot; type=&quot;1&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;u1:p&gt;&lt;/u1:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/ol&gt;&lt;span style=&quot;font-family: arial; color: rgb(0, 0, 0);font-size:85%;&quot; &gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;6)Upgrade to Windows2000 or XP      for more security and less reboots!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;7)Keep a back-up of all you      files on another hard disk - easy to retrieve&lt;br /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;u1:p&gt;&lt;/u1:p&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;u3:p&gt;&lt;/u3:p&gt;&lt;u2:p&gt;&lt;/u2:p&gt;&lt;/span&gt;&lt;span style=&quot;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt; &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;8)Don&#39;t DEFRAG more then once a      month - too often wears on your hard disk.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;9)Don&#39;t fill your hard disk      with too many MP3 files - keep a min. of 300 MB available. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-size: 100%;&quot;&gt;10)Get a good back-up battery -      Just a surge protector is not enough.     &lt;br /&gt;&lt;br /&gt;11)&lt;u3:p&gt;&lt;/u3:p&gt;Despite what others have told you, it is better for your computer (not server) to be shut down every night.&lt;br /&gt;&lt;br /&gt;12)Windows 95 and 98 particularly likes to be restarted. Windows 2000 and XP are better designed to be on all the time, however, your system may still heat up and reduce the life of your hard drive if you leave it on all the time.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;point 1&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;    &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Don&#39;t save your login information. Always log out of Web sites by clicking &quot;log out&quot; on the site. It&#39;s not enough to simply close the browser window or type in another address.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Many programs (especially instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;point&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt; 2    &lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Don&#39;t leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;point&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:180%;&quot;  &gt; 3    &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Er&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;ase your tracks. Web browsers such as Internet Explorer keep a record of your passwords and every page you visit, even after you’ve closed them and logged out.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;To disable the feature that stores passwords.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Before you go to the Web, turn off the Internet Explorer feature that &quot;remembers&quot; your passwords.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;1. In Internet Explorer, click Tools, and then click Internet Options.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;2. Click the Content tab, and then click auto complete.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;3. Click to clear both check boxes having to do with passwords.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;To delete your temporary Internet files and your history&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;When you finish your use of a public computer, you should delete all the temporary files and your Internet history.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;1. In Internet Explorer, click Tools, and then click Internet Options.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;3. Under History, click Clear History.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;To delete other files saved by corporate portals, such as Share point Portal Server&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;If you&#39;re using a corporate Web site that allows you to view internal corporate documents, you may be inadvertently storing sensitive documents on the public computer.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;1. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\user name\Local Settings\Temp.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;2. If your company uses Microsoft Office share point Portal Server, empty the temporary folder (My Documents\share point Drafts).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;point&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:180%;&quot;  &gt; 4    &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;point&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:180%;&quot;  &gt; 5    &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Don&#39;t enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;*&lt;/span&gt;Then it doesn&#39;t matter if you haven&#39;t saved your information or if you&#39;ve erased your tracks.&lt;br /&gt;&lt;br /&gt;They still have access to this information.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7375780173503201634'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3748428670008741402/posts/default/7375780173503201634'/><link rel='alternate' type='text/html' href='http://computers-safety-tips.blogspot.com/2007/08/safety-tips-for-using-all-computers.html' title='safety tips for using a all computer&#39;s'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry></feed>