Add a Start Menu to Windows 8

Windows 8 introduced some significant changes to the user interface, most significantly replacing the Start Menu and Start Button with the tile-laden Start Screen.

Just want your Start Button and Start Menu back?  Try the free download from Classic Shell.  I’ve used it and it works pretty well.  You can choose from the classic Windows 95-98 menu, the two column Windows XP menu, or the newer Windows 7 menu.  Download from www.ClassicShell.net

Slovenian Cyber-crooks Target Small Business Bank Accounts

Small business owners need to be on their guard for email frauds like the one described in this article on Sophos.  This is a must read, and must share with your controller, bookkeeper, or office manager.

Slovenian police on Thursday raided 12 homes and arrested five Slovenian citizens in connection with sending malware-packed email to small and medium businesses’ accounting departments.

The email was spoofed to look like it came from a local bank or, in one case, the ...

Continue Reading →
0

PYDA–Passwords

Yes Virginia, you do need a password. And because passwords are being cracked by high-end machines running sophisticated password cracking programs, it need to be both long and complex, and ideally, unique to each site or device. How long? At least ten, to maybe as many as fifteen characters is ideal. A six or seven character password can be cracked in hours or days; a password of ten or more characters requires decades or centuries. A strong password cannot be ...

Continue Reading →
0

Secrets of Windows 8 (and Windows 7)

Microsoft introduced Windows 8 last October, and we have developed a brand new class to address the major changes that it brings to the computer user experience.  Because this is a transition period between Windows 8 and Windows7, some of the districts are still offering Windows 7.  You can register by clicking through on the link below.  Choose carefully so you get the Windows 8 or Windows 7 class you want.

Secrets of Windows 8

Who moved my cheese! Windows 8 is ...

Continue Reading →
0

You Are Invited to a Business Networking Event


http://www.bnimn.com/eventdetails.php?eventId=29656

Visitor Day – Woodbury – Pinnacle Referrals

Date: 04/04/2013 to: 04/04/2013

Time: 7:30 AM to: 9:30 AM

Our Mission
The mission of BNI is to help members increase their business through a structured, positive, and professional "word-of-mouth" program that enables them to develop long-term, meaningful relationships with quality business professionals.

Last year alone, members of BNI passed 6.5 million referrals…
…which generated over $2.8 billion dollars ...

Continue Reading →
0

PYDA–Data Security

This is the third article in the Protecting Your Digital Assets (PYDA) series.  This time we are focusing on data security.

Your data – the files, documents, spreadsheets, presentations, images, emails, videos, plans, designs, and financial and client information that represent your work product and records – need to be protected not just from malicious attack, but also from random hazards. Everything from a simple hard drive failure to transient electrical surges, lightning and storms, fire, flood, and theft can result ...

Continue Reading →
0

The Bulletproof Computer

For the next three weeks I will be teaching a course designed to help computer users secure their computers and networks from Internet attacks.

The Bulletproof Computer

Fully updated for 2013.  Learn how to harden your computer from Internet threats. Computer Security is not just virus protection any more. You could be infected with a "Trojan Horse" or spyware, which is recording your keystrokes or has turned your computer into a Zombie Host for e-mail spammers. Hear about the basic risks associated ...

Continue Reading →
0

Make Your Web Site Googlicious

For the next two weeks I will be teaching a course designed to help small business owners improve their page rank and traffic on their web site.

So you own or manage a web site, but nothing’s happening. How can you improve your results in the major search engines, increase your page rank, and drive traffic to your web site that results in more business? In this class you will learn about online strategies you can do yourself for free that ...

Continue Reading →
0

PYDA–Internet Security

Everyone needs to be protected from Internet-borne threats and exploits. The two most common attack vectors are emails with malicious links, or web sites with malicious embedded downloads. In many cases the email link takes you to a cleverly crafted look-alike web page, but there are plenty of examples of well-known and well trafficked legitimate web sites that have been hacked and for a time were hosting malicious downloads unaware.

The first rule of email security is NEVER click on ...

Continue Reading →
0

PYDA–Physical Security

This is the first part of the Protecting “Your Digital Assets” series of articles.  Today we are focusing on the simplest and most overlooked part of computer security, the physical security of the device itself.  If your computer or smartphone is stolen, well, it can be game over for your personal information.

Back when I was in computer school, we were admonished to “start at the physical level” when troubleshooting a computer problem. You know – is it plugged in, is ...

Continue Reading →
0
Page 80 of 112 «...5060707879808182...»