Many thanks to SANS for their great tips. Many are not just about how you use your equipment, but what you do with it when you are not actually computing or talking on your phone. Hope you benefit from these great tips.
In an age when security on the internet is of the utmost importance, secure transmission of data is often an issue especially financial or other sensitive information.
That is why websites will begin with either http or https.
WHAT is HTTP and HTTPS?
HTTP stands for “Hypertext Transfer Protocol”. Add the “s” and you have “Hypertext Transfer Protocol Secure”.
HTTP is a request-response protocol. This means that the server is answering a request for information, and sends it without controlling how it gets there.
HTTPS uses a series of communications between the client (for example, your computer) and the server (the computer which will send you the information) to be sure that you are sending your information to only the server and to verify the source of the information and to ensure its security by using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL).
Many advancements in computer and internet security have been made. Anti-virus, anti-malware, firewalls, rootkits scanners, spam filters and much more have made it increasingly difficult for the bad guys to get into your computer and steal your information.
So they are the “confidence man” of the 21 century. The confidence man of the past would devise a scheme where he would get you to trust him, sometimes by posing as someone you already trust, like a friend, local official or business person, and then get you to give them what they want, whether it be money, information, or whatever.
Today they are using technology to fool people into giving them what they want, which is usually based on the ultimate desire to take your money.
One of the modern tools is social engineering. Here is a great video of how to avoid some of the snares used by these people.
Thanks to www.securingthehuman.org
You are THE WEAKEST LINK!
No. Its not an insult or a put down. But it is about you. You are the weakest link in the technology chain. Strengthening that link is our goal. Check back for tips, tricks and methods to protect yourself against cyber thieves. We’ll do our best to explain how to keep secure and what to avoid. Also check The Learning Curve where computer technology is explained in everyday terms you can understand.
Presently, the Cover photo upload size is 851 pixels by 315 pixels. Other sizes may not load. How can you change the image ratio so that it can be uploaded? Continue reading Facebook Cover Photo Size
Remote PC Support is a means of helping you care for your computer. By means of a remote support program, such as Teamviewer, a connection is made between your computer (the HOST) and the Remote PC Support computer. This tutorial should help you know what you are dealing with when you request remote pc support. Continue reading Remote PC Support for Computer Repair:
How Does It Work? Is It Safe?
February 8, 2013
A cheap way to avoid an expensive disaster
Backing up your files is a cheap way to avoid an expensive disaster. How much is it to buy a backup drive? About $75.00. Backup software? $30 or less. An hour of consultant’s time to install and show you how to use it? About $100. Not losing your data? Priceless.
Above quoted from: https://www.sans.org/tip_of_the_day.php
Think about everything on your computer. There is an operating system, which can be reinstalled. Then there are the programs you have installed. They also can be reinstalled. You may also have projects that you are working on, graphics or word processing files that have involved hours of work and may even be part of how you make a living. Continue reading Why Data Backup?
Apparently, the printer keeps track of the number of pages, regardless of how much toner is actually used, so sometimes user needs to manually Reset Toner low logic as follows: Continue reading Brother HL-3040CN manual toner reset