Facebook, LinkedIn and Google+ for Business

We are back in the class room, and our first offering through area Community education Programs is Facebook, LinkedIn and Google+ for Business.  If you are interested in learning how to leverage social media and social networking sites to grow your business and attract new customers, this class is for you.

This course takes a look at the new web trends in social networking such as Facebook, LinkedIn, and Google +, with a Look at Twitter. Students will learn about the ...

Continue Reading →
0

Recovering Deleted Data on a Hard Drive

We recently started working with a data recovery company to augment the data recovery services that we already offer.  They sent us an email with come great tips that we wanted to share with our reader and clients.  Here they are:

  1. When you delete files from a hard drive, the information is not actually deleted, it is just removed from the file directory.  The space on the hard drive is marked as “available”, but the data lives on until it is ...
Continue Reading →
0

SMBs in Cyber-Crime Crosshairs

SMBs (Small and Medium Sized Businesses) are in the unenviable position of becoming the major target of cyber crime groups.  Why is this?  There are a couple factors in play that may make your company more susceptible to this emerging threat.

First, the SMB probably has more money in their bank checking and savings accounts than a typical consumer target would have, meaning that for roughly the same amount of effort, an exploit against an SMB will yield many times more ...

Continue Reading →
0

Chinese Telecom Manufacturers Are A Security Threat?

At the beginning of October the House of Representatives Intelligence Committee released a report that accused Chinese telecom manufacturers Huawei Technologies and ZTE of being a potential security threat to computer networks and the Internet in the United States and worldwide.  There are concerns about the companies’ close ties to the Chinese government and the Chinese Communist Party.  The concern is that using the switches, routers, and other telecom gear manufactured by these companies could compromise network security, through software ...

Continue Reading →
0

7 Secrets of Windows 7 (&8)

Starting on Thursday of this week, and then resuming on November 19, I will be offering a class that takes a look at the Windows 7 and the new Windows 8 operating systems, to give newer users of either operating system a look at some of the special features each has to offer.

7 Secrets of Windows 7 (&8)

Windows 7 is the latest Microsoft operating system, and the replacement for Windows Vista and Windows XP. In this class, we will look ...

Continue Reading →
0

The Bulletproof Computer

For the next two weeks I will be teaching a course designed to help computer users secure their computers and networks from Internet attacks.

The Bulletproof Computer

Learn how to harden your computer from Internet threats. Computer Security is not just virus protection any more. You could be infected with a "Trojan Horse" or spyware, which is recording your keystrokes or has turned your computer into a Zombie Host for e-mail spammers. Hear about the basic risks associated with your Internet connection. ...

Continue Reading →
0

Barnes & Noble Store PIN Pads Compromised

63 B&N stores in California, Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania, and Rhode Island were discovered to have PIN pads at the checkout that sent credit card information to unknown recipients.   It appears the the software in the PIN pads themselves had been reprogrammed somehow by the perpetrators to accomplish this feat.  The breach has been under investigation by the FBI for some time prior to the announcement to give them time to track down the cyber-criminals.

The ...

Continue Reading →
0

Security Software to Avoid

Many people already know that I am not a fan of McAfee security products, due to the number of unusual networking issues I have come across that were resolved by removing McAfee and installing anything else.

Well, I have another product to add to my short list of security products to avoid.  One of my clients was having problems getting all his Internet connection speed.  He had F-Secure Online Protection from CenturyLink.  When we removed it we got a 10 fold ...

Continue Reading →
0

Event Boundaries: Why We Forget

I read an interesting blurb in the Sunday Oct 14th edition of the St Paul Pioneer Press on “event boundaries.”  If you have ever had the experience of going on a mission to another part of your house only to have forgotten why you went there, your memory lapse was most likely triggered by walking through the doorway of the new room.  It turns out our minds pack up and store our thoughts when leaving one room or entering another.  ...

Continue Reading →
0

Make Your Web Site Googlicious

For the next two weeks I will be teaching a course designed to help small business owners inprove their page rank and traffic on their web site.

So you own or manage a web site, but nothing’s happening. How can you improve your results in the major search engines, increase your page rank, and drive traffic to your web site that results in more business? In this class you will learn about online strategies you can do yourself for free that ...

Continue Reading →
0
Page 26 of 49 «...10202425262728...»