Keyboard Shortcuts Everyone Should Know – Part 1
Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, to copy text, you can highlight text and press the Ctrl+C shortcut. The shortcut is faster than moving your hands from the keyboard, highlighting with the mouse, choosing copy from the file menu, and then returning to the keyboard. Below are some of the top keyboard shortcuts we recommend everyone memorize and use.
Ctrl+C or Ctrl+Insert and Ctrl+X
Both Ctrl+C and Ctrl+Insert will copy highlighted text or a selected item. If you want to cut an item instead of copying it, press Ctrl+X. This action removes the text or item and stores it in the clipboard for you, rather than just copying it to the clipboard while leaving the original behind.
Apple computer users can substitute the Ctrl key for the command (cmd) key on their computers. For example, pressing Cmd+C copies highlighted text.
Ctrl+V or Shift+Insert
Both the Ctrl+V and Shift+Insert will paste the text or object that's stored in the clipboard.
On Apple computers, use Cmd+V instead.
Malware Prevention– Part 2
There are several general best practices that organizations and individual users should follow to prevent malware infections. In Part 1, we discussed anti-malware and firewall software. Following are three more keys to malware prevention.
Malware Prevention– Part 1
There are several general best practices that organizations and individual users should follow to prevent malware infections. Some malware cases require special prevention and treatment methods, but following these recommendations will greatly increase a user’s protection from a wide range of malware:
Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. At the minimum, anti-malware software should protect against viruses, spyware, adware, Trojans, and worms. The combination of anti-malware software and a firewall will ensure that all incoming and existing data gets scanned for malware and that malware can be safely removed once detected.
Spam is the electronic sending of mass unsolicited messages. The most common medium for spam is email, but it is not uncommon for spammers to use instant messages, texting, blogs, web forums, search engines, and social media. While spam is not actually a type of malware, it is very common for malware to spread through spamming. This happens when computers that are infected with viruses, worms, or other malware are used to distribute spam messages containing more malware. Users can prevent getting spammed by avoiding unfamiliar emails and keeping their email addresses as private as possible.
Malware Symptoms - While types of malware differ greatly in how they spread and infect computers, they all can produce similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms:
Computer Tech Tip – February
A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs. Viruses can also spread through script files, documents, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisements, and more.
Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. Spyware often has additional capabilities as well, ranging from modifying security settings of software or browsers to interfering with network connections. Spyware spreads by exploiting software vulnerabilities, bundling itself with legitimate software, or in Trojans.
The first variety of Malware that we will discuss is called Adware. Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware. Most adware is sponsored or authored by advertisers and serves as a revenue generating tool. While some adware is solely designed to deliver advertisements, it is not uncommon for adware to come bundled with spyware that is capable of tracking user activity and stealing information. Due to the added capabilities of spyware, adware/spyware bundles are significantly more dangerous than adware on its own. Let me know if I can help with any malware issues you might be experiencing.
Internet service and prices have changed in recent years and it may be time to review and reconsider your provider. There are four options available, but not every service is available in your area. I will cover all the choices as well as giving you the pros and cons of each. First, most people are familiar with DSL service from the phone company. Speeds are limited but are available in most areas where there is phone service. Some old technology like phone lines and equipment are the reasons for these limits. DSL providers may also charge you a monthly fee to use their modem which you can buy yourself. Prices may have also changed and if you agree to a one or two year contract, you may get a better deal. In the coming months, I will discuss more options but if you can’t wait, give me a call.