Pressing Ctrl+F opens the Find field, which allows you to search the text currently displayed in any program that supports it. For example, Ctrl+F can be used in your Internet browser or word processor to find text on the current page.
On Apple computers, use Cmd+F for find.
Ctrl+Z and Ctrl+Y
Pressing Ctrl+Z will undo any change. For example, if you cut text, pressing this key combination will undo the cut. These shortcuts can also be pressed multiple times to undo or redo multiple changes. Pressing Ctrl+Y would redo the undo.
On Apple computers, use Cmd+Z and Cmd+Y to undo and redo.
Keyboard Shortcuts Everyone Should Know – Part 1
Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, to copy text, you can highlight text and press the Ctrl+C shortcut. The shortcut is faster than moving your hands from the keyboard, highlighting with the mouse, choosing copy from the file menu, and then returning to the keyboard. Below are some of the top keyboard shortcuts we recommend everyone memorize and use.
Ctrl+C or Ctrl+Insert and Ctrl+X
Both Ctrl+C and Ctrl+Insert will copy highlighted text or a selected item. If you want to cut an item instead of copying it, press Ctrl+X. This action removes the text or item and stores it in the clipboard for you, rather than just copying it to the clipboard while leaving the original behind.
Apple computer users can substitute the Ctrl key for the command (cmd) key on their computers. For example, pressing Cmd+C copies highlighted text.
Ctrl+V or Shift+Insert
Both the Ctrl+V and Shift+Insert will paste the text or object that's stored in the clipboard.
On Apple computers, use Cmd+V instead.
Malware Prevention– Part 2
There are several general best practices that organizations and individual users should follow to prevent malware infections. In Part 1, we discussed anti-malware and firewall software. Following are three more keys to malware prevention.
Malware Prevention– Part 1
There are several general best practices that organizations and individual users should follow to prevent malware infections. Some malware cases require special prevention and treatment methods, but following these recommendations will greatly increase a user’s protection from a wide range of malware:
Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. At the minimum, anti-malware software should protect against viruses, spyware, adware, Trojans, and worms. The combination of anti-malware software and a firewall will ensure that all incoming and existing data gets scanned for malware and that malware can be safely removed once detected.
Spam is the electronic sending of mass unsolicited messages. The most common medium for spam is email, but it is not uncommon for spammers to use instant messages, texting, blogs, web forums, search engines, and social media. While spam is not actually a type of malware, it is very common for malware to spread through spamming. This happens when computers that are infected with viruses, worms, or other malware are used to distribute spam messages containing more malware. Users can prevent getting spammed by avoiding unfamiliar emails and keeping their email addresses as private as possible.
Malware Symptoms - While types of malware differ greatly in how they spread and infect computers, they all can produce similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms:
Computer Tech Tip – February
A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs. Viruses can also spread through script files, documents, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisements, and more.
Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. Spyware often has additional capabilities as well, ranging from modifying security settings of software or browsers to interfering with network connections. Spyware spreads by exploiting software vulnerabilities, bundling itself with legitimate software, or in Trojans.
The first variety of Malware that we will discuss is called Adware. Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware. Most adware is sponsored or authored by advertisers and serves as a revenue generating tool. While some adware is solely designed to deliver advertisements, it is not uncommon for adware to come bundled with spyware that is capable of tracking user activity and stealing information. Due to the added capabilities of spyware, adware/spyware bundles are significantly more dangerous than adware on its own. Let me know if I can help with any malware issues you might be experiencing.