Website Redesign Checklist to Download

I am a big fan of Sam Richter, whose “Know More” web site offers great ideas for using the web as a research tool to improve marketing and increase sales.  In a recent email he offered a link to a downloadable whitepaper that is a 10 step checklist for anyone who is contemplating a web site redesign.

Designing a new website is hard enough, but redesigning an existing website can have repercussions on page rank and traffic ...

Continue Reading →
0

Using Twitter to Automate Posts to LinkedIn? Not Anymore!

Until this weekend , it was possible to post a tweet on Twitter and have that post automatically appear in your LinkedIn updates.  For those of us that were using that feature to send blog article publication announcements, this creates a bit of a wrinkle.  What was an automated process for me, thanks to a couple of Windows Live Writer plug-ins, now requires an extra step.  You can get more of the details on LinkedIn.   I may have ...

Continue Reading →
0

How Much Time Do You Spend On Social Media?

According to a recent article published in the Wall Street Journal, and recapped on MediaBistro.com, the average user spends a lot of time on the social networks.  just how much time?  Well for the month of January 2012:

  • Facebook – 405 minutes or 6 hours 45 minutes
  • tumblr – 89 minutes or an hour and a half
  • Pinterest – 89 minutes as well
  • Twitter – 21 minutes
  • LinkedIn – 17 minutes
  • MySpace – 8 minutes
  • Google+ – 3 minutes ...
Continue Reading →
0

A Strategy for Blogging More Effectively

Some of you are bound to have noticed a distinct uptick in the amount of blogging we have been doing lately.  My goal is to have one article to share every day.  I am accomplishing this by writing my blog articles in Windows Live Writer.  I write several of them at the same time, up to a week’s worth, and saving them as drafts, and then publish one a day in the morning.  I have also installed a couple of ...

Continue Reading →
0

Fraudulent Wire Transfer Emails Carry Malware

Wire transfer emails from the Habbo Hotel, LinkedIn and UPS are scams that carry a Trojan horse program that can allow the attackers to take over your computer remotely.  The attached .ZIP file contains the executable program.  The full story can be found on Sophos.

Email malware

Scams like these work because people want to believe that the unexpected “gift” of money is real.  Fortunately, the Trojan horse appears to be easily removed by most ...

Continue Reading →
0

Apple Security Via Gatekeeper

Apple’s next operating system, Mountain Lion, is coming with a new feature called Gatekeeper, which is being touted as a way to keep malware from running on your Mac.  Basically, if you have not specifically authorized an application in Gatekeeper, it shouldn’t run, and this would included malware applications.  This seems like a revision of Windows User Account Control (UAC), which is the annoying little box the pops up with a “bonk” sound, graying out your screen, as asking if ...

Continue Reading →
0

Useful Windows 7 Keyboard Shortcuts

Occasionally, you may find that the windows controls are weirdly located off the top of the screen, or for some other reason, launching commands from a menu with the mouse is not going to work.  in those situations, using keyboard shortcuts can help.  These are hold-overs from the old pre mouse DOS and Unix days of computing, when the keyboard was the only input device, but they continue to be part of all operating systems.  Thanks to Tech ...

Continue Reading →
0

Top 5 Android Malware “Apps”

Hey, smartphone users!  It is time to get some malware protection for your smartphone.  According to Sophos, these are the top 5 malware exploits written for the Android platform.

1. Andr/PJApps-C. When Sophos Mobile Security for Android detects an app as Andr/PJApps-C it means that we have identified an app that has been cracked using a publicly available tool. Most commonly these are paid for apps that have been hacked. They are not necessarily always malicious, but are ...

Continue Reading →
0

Did the CIA Infiltrate Microsoft to Deploy Stuxnet, Duqu, and Flame?

There is buzz on the Internet that the three very successful cyber-war programs that the US and Israel launched against the Iranian Nuclear (Power?  Weapons?)Program, had be distributed, at least in part, by masquerading as a standard Windows Update.  For this to work, it makes sense that someone would have to be positioned inside Microsoft to assist in that part of the deployment.  There is a longer article on IT World today that is worth the read if ...

Continue Reading →
0
Page 117 of 141 «...90100110115116117118119...»