Secrets of Windows 8 (and Windows 7)

Microsoft introduced Windows 8 last October, and we have developed a brand new class to address the major changes that it brings to the computer user experience.  Because this is a transition period between Windows 8 and Windows7, some of the districts are still offering Windows 7.  You can register by clicking through on the link below.  Choose carefully so you get the Windows 8 or Windows 7 class you want.

Secrets of Windows 8

Who moved my cheese! Windows 8 is ...

Continue Reading →
0

You Are Invited to a Business Networking Event


http://www.bnimn.com/eventdetails.php?eventId=29656

Visitor Day – Woodbury – Pinnacle Referrals

Date: 04/04/2013 to: 04/04/2013

Time: 7:30 AM to: 9:30 AM

Our Mission
The mission of BNI is to help members increase their business through a structured, positive, and professional "word-of-mouth" program that enables them to develop long-term, meaningful relationships with quality business professionals.

Last year alone, members of BNI passed 6.5 million referrals…
…which generated over $2.8 billion dollars ...

Continue Reading →
0

PYDA–Data Security

This is the third article in the Protecting Your Digital Assets (PYDA) series.  This time we are focusing on data security.

Your data – the files, documents, spreadsheets, presentations, images, emails, videos, plans, designs, and financial and client information that represent your work product and records – need to be protected not just from malicious attack, but also from random hazards. Everything from a simple hard drive failure to transient electrical surges, lightning and storms, fire, flood, and theft can result ...

Continue Reading →
0

The Bulletproof Computer

For the next three weeks I will be teaching a course designed to help computer users secure their computers and networks from Internet attacks.

The Bulletproof Computer

Fully updated for 2013.  Learn how to harden your computer from Internet threats. Computer Security is not just virus protection any more. You could be infected with a "Trojan Horse" or spyware, which is recording your keystrokes or has turned your computer into a Zombie Host for e-mail spammers. Hear about the basic risks associated ...

Continue Reading →
0

Make Your Web Site Googlicious

For the next two weeks I will be teaching a course designed to help small business owners improve their page rank and traffic on their web site.

So you own or manage a web site, but nothing’s happening. How can you improve your results in the major search engines, increase your page rank, and drive traffic to your web site that results in more business? In this class you will learn about online strategies you can do yourself for free that ...

Continue Reading →
0

PYDA–Internet Security

Everyone needs to be protected from Internet-borne threats and exploits. The two most common attack vectors are emails with malicious links, or web sites with malicious embedded downloads. In many cases the email link takes you to a cleverly crafted look-alike web page, but there are plenty of examples of well-known and well trafficked legitimate web sites that have been hacked and for a time were hosting malicious downloads unaware.

The first rule of email security is NEVER click on ...

Continue Reading →
0

PYDA–Physical Security

This is the first part of the Protecting “Your Digital Assets” series of articles.  Today we are focusing on the simplest and most overlooked part of computer security, the physical security of the device itself.  If your computer or smartphone is stolen, well, it can be game over for your personal information.

Back when I was in computer school, we were admonished to “start at the physical level” when troubleshooting a computer problem. You know – is it plugged in, is ...

Continue Reading →
0

Protecting Your Digital Assets

I was asked to write a guest blog for the Secure 360 organization, and it ended up be published in two sections on their blog.  When I was writing it I realized that I could have written much more on this subject.  And so I have, and I will be release the six major parts in a series of blog articles over the next week or so.

Why?  Because many computer criminals are targeting small and medium size businesses because they ...

Continue Reading →
0

Facebook, LinkedIn and Google+ for Business

We are back in the class room, and our first offering through area Community education Programs is Facebook, LinkedIn and Google+ for Business.  If you are interested in learning how to leverage social media and social networking sites to grow your business and attract new customers, this class is for you.

This course takes a look at the new web trends in social networking such as Facebook, LinkedIn, and Google +, with a Look at Twitter. Students will learn about the ...

Continue Reading →
0

Recovering Deleted Data on a Hard Drive

We recently started working with a data recovery company to augment the data recovery services that we already offer.  They sent us an email with come great tips that we wanted to share with our reader and clients.  Here they are:

  1. When you delete files from a hard drive, the information is not actually deleted, it is just removed from the file directory.  The space on the hard drive is marked as “available”, but the data lives on until it is ...
Continue Reading →
0
Page 200 of 232 «...170180190198199200201202...»