The single most visible change in Windows 7 is the new “dock style” taskbar, which shows icons instead of buttons, with all application windows combined within a single button. The first question many people will have is “How do I turn it off?” – and this article will show you how. Contact us with any [...]
Entries from June 2010
June 30th, 2010 · No Comments
Tags: Network Solutions
June 29th, 2010 · No Comments
ShoreTel Universal CRM Connector is a desktop screen pop “helper” application that executes a particular user-defined program, batch file, or URL when an incoming call arrives and/or an outgoing call is placed. This helps speed the development of proprietary screen pop applications by insulating the user from having to perform the phone system side of [...]
June 28th, 2010 · No Comments
A survey conducted by the Messaging Anti-Abuse Working Group or MAAWG reveals that almost half of computer users in North America and Western Europe not only open spam emails, but also click on the links and open attachments found within these messages intentionally. This not only invites more spam, but potentially exposes them to a large [...]
June 25th, 2010 · No Comments
Do you use the Energizer DUO USB battery charger? If so, you’ll be interested to know that the United States Computer Emergency Response Team (US-CERT) has warned that software included in this charger contains a software “backdoor” or Trojan that allows hackers to remotely access vulnerable systems.
In its advisory, the US-CERT warned that the installer [...]
June 24th, 2010 · No Comments
McAfee posted on its blog recently news about e-mail purportedly coming from Facebook urging recipients to open an attachment to get their new password on the site. Unfortunately the email is a scam to get not only users’ password of the popular social networking website, but potentially any accounts they use while using their computer [...]
June 23rd, 2010 · No Comments
Users beware of ransomware: malicious software that extorts money from users in exchange for freeing the user’s computer or data. One particularly nasty version was recently discovered by researchers at CA which came bundled with a software download called uFast Download Manager. The malware blocks Internet access for users until they pay the publisher a [...]
June 22nd, 2010 · No Comments
Businesses are constantly changing. Is your disaster recovery plan changing, too? It should be.
Every company can experience a business-altering event at any time: floods, explosions, accidents, computer malfunctions—the list is endless.
If you have a disaster recovery plan, you’re prepared to prevent such events from disrupting your normal operations—or at least you were at the time [...]
June 21st, 2010 · No Comments
For many people, learning begins by understanding the basic principles that drive a certain concept. Whether in technology or science or society, the world is filled with so many complex and complicated subjects that affect our lives, but remain largely misunderstood by the general public.
This is where commoncraft.com comes in. Owned and maintained by husband [...]
June 18th, 2010 · No Comments
In today’s tough market environment, many businesses are turning to Managed Services. But is the up-front cost worth it? We say yes—and think you’ll agree when we explain why.
With Managed Services, an IT consultant constantly manages your network, typically from afar. In other words, someone will prevent many IT problems—and fix those that do occur [...]
June 16th, 2010 · No Comments
You expect your computer to work when you turn it on. The last thing you want is to waste valuable time trying to get your email running or wrestling with a web browser that won’t load.
These are frustrations you surely have experienced, and chances are you will again. But you don’t have to. Or, at [...]