tag:blogger.com,1999:blog-9326860262284786202024-02-08T06:09:58.595-05:00Technically Speaking...IT Operations Specialist, PC Consultant & Freelance Technology Writer Joel Michalec shares his knowledge and expertise in the areas of computing. Feel free to contact him for computer help or details on publishing his articles.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-932686026228478620.post-19031560171065357252023-11-14T10:36:00.005-05:002023-11-14T10:36:59.076-05:00Smart Holiday Shopping Online: Top Tips for a Joyful Experience<p> <!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="376">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Unresolved Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Link"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0in;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;
mso-font-kerning:1.0pt;
mso-ligatures:standardcontextual;}
</style>
<![endif]-->
</p><p><span style="font-size: 14.0pt;">The festive season is upon us, and as our
shopping lists grow, many of us are turning to online platforms for the perfect
gifts. With convenience, however, comes the need for caution. Here are some
quick tips to ensure a secure and pleasant online shopping experience this
holiday season:</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Trustworthy
Websites:</span></strong><span style="font-size: 14.0pt;"> Stick to reputable
online retailers. Look for "https://" in the URL and a padlock symbol
to ensure the site is secure.</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">2.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Avoid
Public Wi-Fi:</span></strong><span style="font-size: 14.0pt;"> Public networks
can be less secure. For transactions, use a secure, private internet
connection.</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Use
Credit, Not Debit:</span></strong><span style="font-size: 14.0pt;"> Credit cards
generally offer better fraud protection. If possible, use a virtual card number
for added security.</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">4.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Beware of
Deals Too Good to Be True:</span></strong><span style="font-size: 14.0pt;">
Extremely discounted items could be scams or counterfeit. If a deal seems too
tempting, research the website and product reviews.</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">5.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Set
Strong Passwords:</span></strong><span style="font-size: 14.0pt;"> Especially for
online retail accounts, use unique and complex passwords. Consider a password
manager to track them.</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">6.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Keep
Software Updated:</span></strong><span style="font-size: 14.0pt;"> Ensure your
computer, smartphone, and security software are updated. This helps protect
against potential threats.</span></p>
<p style="margin-left: .5in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;"><span style="font-size: 14.0pt;"><span style="mso-list: Ignore;">7.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><strong><span style="font-size: 14.0pt;">Review
Purchase Details:</span></strong><span style="font-size: 14.0pt;"> Before
confirming, double-check shipping details, return policies, and delivery dates.</span></p>
<p><span style="font-size: 14.0pt;">Remember, while hunting for the perfect gift,
your online safety is paramount. A dash of caution ensures your festive
shopping spree remains merry and bright!</span></p>
Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-11969283841421727022018-05-14T11:53:00.002-04:002018-05-14T11:53:50.954-04:00Protection Two-Step<br />
<div class="MsoNormal">
Hi Everyone. I am asked all the time about anti-virus, both
personally and professionally. The answer always starts the same; it makes no
difference how much you buy or how much you have. Nothing is 100%. With that
being said, I want to talk to you about your home protection.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
My suggestion is a two-part scenario that focuses on
prevention more so than remediation. Think about that. Certainly, it would be
more beneficial to your time and energy if you put a plan in motion that works
on being proactive, so you do not spend much time reacting to every threat, am
I right? Let’s have a look at this scenario.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Part One – There are dozens of anti-virus products out there
and they are essentially as effective as the flu shot; not very. So how do you
choose which one to get? Should you pay for protection or get the free
protection? Free protection is great if you are the type of person who will
scrutinize everything that happens to your system because of the horrors of the
Internet. However, if you ask what Joel does, I pay for the premium version of
MalwareBytes Anti-Malware. Here is why. MalwareBytes has a much different stand
on viruses; instead of remediation after infection, they focus on being
proactive and making sure the infection cannot harm your system and they do so
by stopping the two-way communication between the virus and the virus command
center.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Part Two – Take an extra step to protect your home network
and do it for free! Stop on over to OpenDNS.com and sign up for an account and
start protecting. Here at Reybold, we use Cisco Umbrella which is the
Enterprise version of OpenDNS. With this free personal service, you will either
change some settings in your computers or in your home router with their
incredibly easy-to-follow instructions and once done, you are under the umbrella
of protection by the service. Not only does OpenDNS provide a much faster
browsing service for your Internet, it also has the build-in protection that
Cisco offers by blocking bad elements from passing through the DNS to your
router and/or systems.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
So, this is my personal plan that somewhat follows the path
we use here at work. We deploy a strong Anti-Virus package on the computers and
then we add the outer layer of protection from Cisco to keep bad guys out to
begin with. Just remember, this is like anything else and not 100% effective.
All of these things cannot prevent the number one problem when it comes to
infections; the human element. You still have to be vigilant with where you are
browsing and what happens in your email.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<a href="http://www.malwarebytes.com/premium">http://www.malwarebytes.com/premium</a>
<br />
<a href="http://www.opendns.com/home-internet-security">http://www.opendns.com/home-internet-security</a><br style="mso-special-character: line-break;" />
<!--[if !supportLineBreakNewLine]--><br style="mso-special-character: line-break;" />
<!--[endif]--><o:p></o:p></div>
<br />Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-17521332993155581912017-06-13T09:47:00.000-04:002017-06-13T09:47:19.468-04:00Why Backup?<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="374">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Mention"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Smart Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hashtag"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<span style="font-size: small;"><span style="font-family: inherit;">I want to talk to you about backups and their importance in
today’s digital world. There are plenty of choices of software and hardware
that will do the job as well as cloud services. Let’s dive in.</span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: small;"><span style="font-family: inherit;">I still get asked the question “why backup”? Why would you
not backup is what I ask. There are no guarantees that your computer will last
forever and now with all the malicious bugs roaming the Internet the chances
have only increased that you will have a problem. The question is no longer “if”
you get infected; it is now a question of “when”.</span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: small;"><span style="font-family: inherit;">External hard drives are good for backups. However, the
potential for failure is greater than, say, cloud backups because this is a
piece of hardware, after all and therefore capable of the same mishaps of
mis-managed computer equipment. You must run diagnostics and maintenance on the
backup drive to ensure that the hardware is in top shape and preserving your
data. Also, if you choose this method, I recommend that you connect the device,
run your backup and then disconnect it from the computer. If you have an
unknown virus on the computer, you do not want it to affix itself to your
backup drive infecting it.</span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: small;"><span style="font-family: inherit;">Cloud backups are quickly becoming the popular trend in data
backup and for obvious reasons. When you do online backups through a service,
you set some parameters like time and what you want backed up and forget about
it. Your data is backed up onto servers that are maintained, kept safe from
viruses and ready when you are for recovery if necessary. You are putting your
data into someone else’s trust and many of these companies do a very good job
at cloud backup. This has become my method of backup with a twist. I manually
control my backups to the cloud then delete everything from my computer. If my
computer is compromised, hackers will be disappointed in their findings.</span></span></div>
<div class="MsoNormal">
<br /></div>
<span style="font-size: small;"><span style="font-family: inherit;"><span style="line-height: 115%;">The best defense against Ransomware is a good
backup. It pains me the amount of people I know who still do not have a backup
plan. Your most important documents and precious memories are extremely
important to you. Make a conscious effort to choose a method of backup and
stick with it. You’ll be better off if disaster strikes!</span></span></span>Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-47497951138327433392017-03-10T09:41:00.000-05:002017-03-10T09:41:06.402-05:00The Email Scam...Look Away!<span style="font-size: small;"><span style="font-family: inherit;">There is always a trigger that compels me to write a new editorial. Today's trigger is because I received two scams; one by phone and one by email. So today I would like to address the latter.</span></span><br />
<span style="font-size: small;"><span style="font-family: inherit;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: inherit;">An Email Scam is unsolicited emails that offer you the belief that you will receive something for nothing. This type of scam represents the classic phrase, "too good to be true". We all know what they say about that? If it is too good to be true then it probably is not. </span></span><br />
<span style="font-size: small;"><span style="font-family: inherit;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: inherit;">I actually know someone who is right in the middle of an email scam. The reason I say that is because I have warned him several times that it is a scam and he continues to email with this fella and send him money. If you haven't guessed yet, he has received nothing for his money. So far he is out nearly five hundred dollars and he still thinks he is going to receive $4.9 million from the other person.</span></span><br />
<span style="font-size: small;"><span style="font-family: inherit;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: inherit;">Let me share an email I received today to show you what a typical scam email might look like. This <span style="font-family: inherit;">is</span> not the one received by my acquaintance above however, it could have been mostly plagiarized because that is how close they are alike:</span></span><br />
<span style="font-size: small;"><span style="font-family: inherit;"><br /></span></span>
<br />
<div style="-webkit-text-stroke-width: 0px; background-color: white; color: #1d2129; display: block; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 6px 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<i><b><span style="font-size: small;"><span style="font-family: inherit;">Hello my dear friend,<br />How are you over there in your country or elsewhere? I believe you are fine and doing well. I hope my mail meets you in good health today. I am much delighted and privileged to contact you again, after all these time, it takes destiny and courage to remember good friends like you and at the same time, show gratitude to you despite circumstances that made us separate and disrupted o<span class="text_exposed_show" style="display: inline;">ur transaction, which ultimately did not work out as we had<br />projected then.</span></span></span></b></i></div>
<div class="text_exposed_show" style="-webkit-text-stroke-width: 0px; background-color: white; color: #1d2129; display: inline; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<div style="margin: 0px 0px 6px;">
<i><b><span style="font-size: small;"><span style="font-family: inherit;">I am happy to inform you that I have successfully transferred the fund with the cooperation of a new partner from Netherlands. I use this opportunity to inform you that the transaction has finally worked out and I am contacting you to let you know that I left a bank draft check worth of $1.5 million for your compensation, I registered the bank draft check with DHL Courier company before leaving the country, and I instructed him to deliver the check to you once you contact him.</span></span></b></i></div>
<div style="margin: 6px 0px;">
<i><b><span style="font-size: small;"><span style="font-family: inherit;">I will advise you now to contact DHL courier manager with your full delivery details so that they will process the delivery of your bank draft check to you immediately. Here is the contact info to contact DHL Manager.</span></span></b></i></div>
<div style="margin: 6px 0px;">
<i><b><span style="font-size: small;"><span style="font-family: inherit;">NAME: Dr Albert Godwin<br />EMAIL: officedhl99@gmail.com<br />PHONE: +229 9826 4001</span></span></b></i></div>
<div style="margin: 6px 0px;">
<i><b><span style="font-size: small;"><span style="font-family: inherit;">Please remember to fill your information as bellow when contacting Reverend Father John Mark ok.</span></span></b></i></div>
<div style="margin: 6px 0px;">
<i><b><span style="font-size: small;"><span style="font-family: inherit;">Full Name:----------<br />Home Address:----------<br />Your country:----------<br />Your phone number:----------<br />Acopy of your I dentity:......<br /></span></span></b></i></div>
<div style="margin: 6px 0px;">
<span style="font-size: small;"><span style="font-family: inherit;">Let's take a look at some facts about the email. This is a typical "Phishing Scam" email designed to convince you to divulge personal information by phone or website which would make stealing your identity very simple.<br /></span></span></div>
<div style="margin: 6px 0px;">
<span style="font-size: small;"><span style="font-family: inherit;">Look at the grammar in general. There will be spelling errors, run-on sentences, broken English and other things that should just not seem right (DHL has Gmail email addresses?).<br /></span></span></div>
<div style="margin: 6px 0px;">
<span style="font-size: small;"><span style="font-family: inherit;">Other variations of this type of scam could ask you for a small fee to assist in the cost of getting a larger sum of money into your American bank. Another may ask you to visit a website to enter "secure" information. You may be asked to establish a separate bank account in a different bank for this purpose for security.<br /></span></span></div>
<div style="margin: 6px 0px;">
<span style="font-size: small;"><span style="font-family: inherit;">US-CERT makes a few simple recommendations to help you from becoming a scammers next victim. They include:</span></span><br />
<ul>
<li><span style="font-size: small;"><span style="font-family: inherit;">Filter spam.<br />Don’t trust unsolicited email.<br />Treat email attachments with caution.<br />Don’t click links in email messages.<br />Install antivirus software and keep it up to date.<br />Install a personal firewall and keep it up to date.<br />Configure your email client for security. </span></span></li>
</ul>
<span style="font-size: small;"><span style="font-family: inherit;">Keep on the lookout for these types of email. If they show up in your inbox, mark them appropriately as SPAM so that your service provider can investigate and adjust. If they are delivered to your Spam folder already then no action is needed. If you are receiving these types of emails, do yourself a favor, <span style="font-family: inherit;">dump them in SPAM and walk away.</span> </span></span></div>
</div>
Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-55224297476813943012017-02-23T08:06:00.000-05:002017-02-23T08:06:26.207-05:00Ransomware Is Getting WorseAs I write this I am thinking, I am so sure that you probably encounter an article like this at almost every turn on the Internet. So you ask yourself why you would stop to read my article on Ransomware? Because, my articles are way cooler!<br /><br />First thing that we need to do is to identify what Ransomware is. Ransomware is an exploit in which the hacker encrypts the unsuspecting user's data demanding ransom for the decryption key payable in un-traceable funds. This is a true mess any way that you look at it and Ransomware has become a multi-billion dollar venture globally.<br /><br />Between January 2016 and November 2016, the distribution of ransomware increased by 267% (Source: 2017 State of Malware, MalwareBytes) and shows no signs of slowing down. In fact, it is predicted that ransomware will move beyond encrypting your files and begin to lock the boot partition of your hard drive, meaning that you will not so much as be able to load your operating system. <br /><br />So what do we do about this? Ladies and gentlemen, there is not much we can do about the problem. I'd like to say that if people stop paying the ransom monies, the business would go under. However, like Hollywood Presbyterian Medical Center in California, there are going to be organizations who find themselves in the position where they must pay. There will be senior citizens who are preyed upon by this attacks who feel there is no alternative than to pay up. This is not true. Let's continue our journey.<br /><br /><b>How Did I Get It?</b> - A very good question with a very bad answer. There are several ways that you can get it and it does not mean that you did it to yourself. The most common way to get ransomware is by opening an email attachment from an unsuspected sender. Many of these emails come in the form of IRS notifications, shipment receipts, important documents, etc. You can also receive the bug from an infected website and even now, it can be on a legitimate website embedded in an advertisement. Or, in today's advanced world of "always connected" high speed Internet, you could have received it through a drive-by payload.<br /><br /><b>Prevention is The Best Medicine</b> - Education is key here and lucky for you stopping by to read this, I am like a techie educator. Let's look at some things that you should do to try and prevent an infection on your device.<br /><br />
<ul>
<li>Keep your computer clean as far as making sure that your software and any Internet-connected devices are up to date. Be sure and run critical updates from all vendors on a regular basis or better yet, automatically.</li>
<li><br />Use strong passwords. Include letters, numbers, symbols, upper case and lower case characters and at least 8 in length. Try phrases, they work better.</li>
<li><br />If you have the opportunity to do so, use two-factor authentication with every service that you can. If your accounts are hacked, this will speed up the time it takes to gain control of your accounts again.</li>
<li><br />Never open email attachments from persons that you do not know. As a rule of thumb, the IRS will not contact you by telephone or email to discuss anything with you; they will snail mail you. No one will email or text you and ask you for personal information or passwords; if this happens do NOT respond. Shippers (UPS, USPS, FedEx, etc) will not send you shipping information or receipts in your email. It is the responsibility of the company with whom you placed your order to send that information to you. If ever in doubt, trash the email without opening it.</li>
</ul>
<br /><b>OK, But I Got Infected</b> - If I leave you with one piece of urgent information to take away from this article, it is <u><b>BACKUP BACKUP BACKUP</b></u>! If you become infected with Ransomware or any other extremely damaging malware, the best defense is to have a backup of your files because the only recourse that should be considered is to know that you have a recent backup so you can take a deep breath, relax and format your device and start over. You should never consider payment to these criminals. If you have a good backup then yourself or your technology professional will have you fixed in no time.<br /><br />There are many things that you can do, both free and monetary, to protect yourself from Ransomware. However, the truth is that there is no way of avoiding it. Hackers will work feverishly every day to find new and innovative ways to steal your money and that means that Ransomware will only get worse. Do yourself a favor for piece of mind and backup and do it regularly so that you are current. Do what I do. I keep my documents, pictures and other important stuff on cloud services and never on my computer. In the end, if infected, I've only lost the time to restore. I hope this gives you a little valuable information that keeps you a little bit safer on the Internet.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-78978982544324702212016-11-22T20:08:00.000-05:002016-11-23T07:06:09.370-05:00Holiday Scams; Protect Yourself!We truly live in the digital world. Everything has the potential to come faster. We live fast, we shop fast, we eat fast and we can be scammed fast. With the Christmas [shopping] holiday upon us it is a good idea to review some of the most notorious holiday scams and how to prevent them from taking you down.<br />
<br />
Fraudulent Charities - Public enemy number one, fake charities are at the top of my list during the holiday season. These scammers will solicit your money through phone calls, email or snail mail. They will attempt to tug at your heart strings in any fashion possible. Never give to a charity that you have any doubts about. If you are looking for a charity to donate money to and you want to verify their legitimacy, try some of these links:<br />
<ul>
<li>Charity Navigator (<a href="http://www.charitynavigator.org/">http://www.charitynavigator.org/</a>)</li>
<li>BBB - Give.org (<a href="http://www.give.org/">http://www.give.org</a>)</li>
</ul>
Phishing - If this were not the holidays, this would be at the top of the list. So at this giving time of year, it is second from the top. Phishing is the practice of defrauding an individual or company of financial information by posing as a legitimate company. This practice, much like fraudulent charities, is done through telephone, email, text and snail mail. These scammers will portray themselves as everything from a travel agency giving away "GREAT" deals to the "IRS" demanding back payment from your Christmas bonus. If it sounds too good to be real, then it most likely is not. Be vigilant and think before you respond. Do not open emails from unknown persons or suspicious looking email from friends or colleagues. <br />
<br />
Name A Star - Okay, I admit, I purchased a star for my wife many moons ago. I thought it was legitimate but now we have a fancy certificate a guide to her part of the universe and someone has my $49.99. So here is the truth; the International Astronomical Union is the only organization that names stars and they will not sell you the right to do so yourself. However, if you want a nice certificate, call me (wink..)<br />
<br />
Online Shopping - This is a difficult one to convey because we all love the convenience of shopping online and not dealing with the mobs in the malls. However, there is a rise in cyber crime so bad that legitimate websites are being "skimmed" so that they can capture your credit card information. In most cases, the websites do not know. Malware is being delivered in ads displayed on your favorite shopping sites. Be sure that you use additional verification steps, if possible, on all the websites that you use for shopping or otherwise to be sure that you are on the actual legitimate website. Using sites like PayPal adds extra protection by making sure that your transaction is secure.<br />
<br />
The holidays are a time for celebration, family and joyfulness. Take some extra precautions to keep yourself from getting snowbound by malicious thieves.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-89465502457762874732016-04-07T18:06:00.000-04:002016-04-07T18:12:45.444-04:00TECH SUPPORT SCAMS ON THE RISE My friends, I know that you might hear this from me a lot, but the
issue with these fake #tech #support #scams, which come by way of Pop-up
windows, pop-up windows with AUDIO and telephone calls is becoming ever
so more serious. I have been inundated with clients dealing with these
issues daily which tells me that they are on a steady rise. These scams
are not going to go away because it is a multi-billion dollar (annually)
industry.<br />
<br />
Here are some questions I am getting and I pass this
on to you. Feel free to pass this on to friends and family and SHARE my
page so folks can find me if they find themselves in peril with their
computers.<br />
<br />
<b>What did I do wrong to get this pop-up?</b> Likely,
nothing. These pop-ups are generated by scripts that are placed into
websites unknowingly by the website owner so it is passed to you when
you land on an otherwise legitimate website. One of the newer ways this
is happening is that the malicious code is tied to advertising on
webpages, which again, will auto-launch when you land on the page.<br />
<br />
<b>I
have a pop-up, what do I do?</b> The first thing to do is realize that it
is FAKE. No one from #Microsoft or any other company knows if you have
viruses or such. But you have to get this off your screen and fast,
right? So you might notice that you cannot just close the browser so you
have to open your Task Manager. To do this, Right-Click on the taskbar
that lays across the bottom of your screen. Select the Task Manager.
When that loads, you can click on the web browser that is open (Chrome,
Firefox, Internet Explorer...) and click End Process. That should close
the browser and all associated windows/pop-ups along with it. If that
fails, you can always hold your power button in until the computer shuts
down (NOTE – I DO NOT RECOMMEND THIS SHUTDOWN PROCEDURE).<br />
<br />
<b>Now am
I infected?</b> You might be. There is no guarantee that the pop-up did not
drop a drive-by downloader off when the pop-up activated. To be sure
you should check your system fully or have a qualified technician look
it over for you. If in doubt, have it checked out.<br />
<br />
Until we cut off the money supply these types of scams will not only
continue but they will continue to outsmart the human element to get
what they want. Using some common sense decisions will prevent the cyber
criminals from winning. <br />
Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-37744608234180982052016-02-10T12:50:00.000-05:002016-02-10T13:09:24.687-05:00"We don't need no stinking recovery discs"...Wait, I do?When I first began my career in the technology field, computer manufacturers would always send you set of recovery discs in the event that something drastic happened to your system and you needed to set things back to factory condition or far worse, change your hard drive. As years went by, they began placing this "system restore" on a separate partition of the hard drive and with a few commands, you could reset your computer back to factory condition. This was pretty convenient and they would still include the recovery discs so you had them. A little while later, the discs were no longer included but, if disaster struck, you could buy a set for $25 or $35.<br />
<br />
There is your quick history lesson.<br />
<br />
Recently, I had several clients who had hard drives that failed. This left them in that critical stage of "what do I do now". The good news is that all of the clients issues were worked out in a speedy and satisfactory manner but I want to discuss the importance of the recovery discs. Almost every computer will ship with an annoying blurb that returns now and again reminding you to create your recovery media. This is something that everyone should do. It is very convenient to have that recovery partition on your hard drive, but what will you do if your hard drive fails? You need the recovery discs. After the hard drive fails is not a good time to find this out. I recently learned that some manufacturers only maintain recovery libraries for their computers for a limited amount of time. That means after a few years, you may not be able to obtain the recovery media from your manufacturer.<br />
<br />
It is a simple process and worth the time spent doing this when you first setup a new computer. It is even more valuable now if you have had a computer for some time. Create the discs. Get yourself a couple of DVD writable discs and locate the "Backup and Recovery" section on your computer and start the process. The process will walk you through every step telling you what to do and when to do it. Once you are done, you will now be equipped with the recovery tools needed in the event of an UN-recoverable hard drive disaster. While you're at it, make sure that you are regularly backing up your important data (documents, pictures, etc.).<br />
<br />
Now, let's get started on that recovery, shall we?<br />
<br />
NOTE - There are other good options for making an exact image of your drive that I will discuss in a future article.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-8996921749122893952015-06-19T23:48:00.000-04:002015-06-19T23:48:12.003-04:00Still Using Windows XP? Then Read On!<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-pcArrUX634M/VYTiKKv6LII/AAAAAAAABWs/kll4MZnoX3M/s1600/windowsxp.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="149" src="http://4.bp.blogspot.com/-pcArrUX634M/VYTiKKv6LII/AAAAAAAABWs/kll4MZnoX3M/s200/windowsxp.png" width="200" /></a></div>
We've all heard the warnings and the techie nay-sayers scream from the data center rooftops, "Get rid of XP! Abandon XP!" From the standpoint of security, sure it is a good..no..great idea to move on to a more modern and/or more secure operating system. But there are a good handful of reasons why people cling to Windows XP and if you are one of the more than 25% of the operating system share that chose to do so then here are some tips for you.<br />
<br />
<u><b>Use Anti-Virus Protection:</b></u> It goes without saying that everyone should use a good anti-virus software. There are still a good number of free suites that are still supporting Windows XP, even if Microsoft is not. Take a look at AVG, Avast!, Comodo and Panda to name a few who have not announced end of Windows XP support dates as of yet.<br />
<br />
<b><u>Use Malware Protection:</u></b> A very good companion to any anti-virus protection is the use of a good malware scanner. Again, there are many free options. The thing about free versions is that it is completely manually invoked. If you can part with the few dollars for say MalwareBytes Anti-Malware, then the program can be setup to check for updates and scan the system on a schedule.<br />
<br />
<b><u>TIP:</u></b> While you are downloading MalwareBytes Anti-Malware, pick up the free MalwareBytes Anti-Exploit as well. Just one more layer of protection to help when you are browsing online.<br />
<br />
<b><u>Toss Internet Explorer:</u></b> Besides the fact that Internet Explorer is stuck in version 8 under Windows XP, it is slow, bogged down and everyone is trying to exploit its many vulnerabilities. Using alternatives like Chrome, Firefox or others is the best way to go because they are still supported, safe and they self update without so much as a normal restart of the browser which we do anyway when we are done browsing, right?<br />
<br />
<u style="font-weight: bold;">Do Not Use Outlook Express:</u> Like Internet Explorer, Outlook Express has been abandoned by Microsoft and therefore does not receive any love, or updates for that matter. So if you are not ready to abandon the application-style email client for the cloud-based solutions, then check out Mozilla Thunderbird, Windows Live Mail, IncrediMail, etc. Or, if you really like the Outlook experience, fork out $5 per month and get the Office 365 subscription.<br />
<br />
<b><u>Keep Checking Updates:</u></b> I know, it sounds crazy, right? Didn't Microsoft stop supporting Windows XP? Yes, they did but there may be other elements of Microsoft that have available updates. One such item is the Malicious Software Tool. Also, if there is a major update to any hardware that is still supported then you can get that downloaded too.<br />
<br />
So let's review. There are still plenty of users who have not yet given up the Windows XP platform. If you are still using it, all you have to do is be very careful and take some sensible precautions. Be sure that you are also self-monitoring where you go and that you are not being socially-engineered. You can still enjoy one of the greatest operating systems abandoned by Microsoft...at least for a couple more years.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-71511281366750529262015-02-03T11:18:00.000-05:002015-02-03T11:18:26.855-05:00Computer Support on a Stick? Hold That Thought!You’ve seen the ads on television; Everything from a USB flash drive to solve all of your computing woes to inexpensive remote service techs. These sound like great tools when you are watching a thirty second or sixty second ad because they squeeze a lot of fantastic words into the delivery and the end result is that this flash drive or service will solve your problems instantly and forever! Remember that anything that sounds too good to be true probably is not.<br /><br />So let’s break this down by the two different classes. The first class is the all-in-one USB stick. You purchase this product and insert it into a USB port and it is suppose to solve all the issues on your computer. There will be interaction by you, the consumer. This is a suite of tools that will need to be run individually to do certain functions of cleaning and disinfecting. But when you’re finished how do you truly know that the infections are gone? How do you know that your computer is actually clean? What if your infection was a root kit? Wait..what is a root kit? That is a lot of unanswered questions, right. Guess what, all you really paid for there was a glorified cookies and browser cache cleaner. It did nothing to eradicate the viruses, Trojans, spyware or anything else. <br /><br />The second class is the over-the-telephone experts. Call them now and get your computer running faster in 30 minutes only $19.99! Well, the $19.99 is apparently a fee you give them to allow an unknown person remote access to your computer. Once in they tell you that you have $300-$1000 worth of necessary work to be done to your computer. Believe it or not many people will fall for this and the headaches that ensue afterwards are anything from even slower computers to more viruses to have pictures and documents stolen from your computer. What is that worth to you? Scary isn’t it? The end result is that you have to hire a professional anyway to undo the damage that was done when you could have hired a qualified technician in the first place to take care of your needs. Several know cases to me on this are that after not allowing the additional work to be performed, strange things happen after the “tech” logs off the computer.<br /><br />So as you can plainly see there are problems with both of these classes of computer hope. The facts are that only a qualified technician can actually diagnose your computer and tell if you have a serious problem and how serious. No two viruses are the same; some keep regenerating after software or a tool gets rid of them. A USB stick will not tell you if you have legitimate problems lurking in your system. It takes the care and expertise of a professional who knows what to look for and the end result is that you are treated kindly and taking care of in a manner that is much more guaranteed than a flash drive you purchased off the television. Look into the guarantees that come with these other products and services. Trust your computer to an expert and develop a relationship with that individual or business. You will be much happier in the end.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-60210694029998959972013-09-20T15:13:00.001-04:002013-09-20T15:13:25.495-04:00Windows XP: End of an EraWell, my friends, now rather than later this has to be said. The End of Life (EOL) for Windows XP (all versions) is just around the corner on April 8, 2014.<br /><br />First of all, what is End of Life? This is a term used when companies assert that a product is at the end of its useful life and will no longer be marketing it, selling it or offering any support on the product. This is exactly what Microsoft is doing with their most successful operating system to date, Windows XP. Whether we agree or not, its their decision.<br /><br />So what does this exactly mean to you? What this means is that Microsoft will no longer making available any of the critical and security updates and patches that you may be used to seeing about every two to three days. These updates provide patches to the software when it becomes hacked and made vulnerable to malicious intent. This will no longer happen. Meanwhile, after the EOL happens, any vulnerability found will be exploited in high risk. That means that your computer, data, etc is open for anyone to attack, take over and confiscate.<br /><br />Sounds gloomy, right? Well ten or fifteen years ago, I might have had a different aspect on this and thought it would pretty safe to continue using for a few years...just so you can get comfortable with spending money for an upgrade. However, to paraphrase a great author's work, that was then and this is now. With cyber crime at unimaginable rates, I just cannot imagine there being a good reason to hang onto it...as good as it is.<br /><br />So my suggestion is that you start working your way to the next big thing. Now, many people who run out and buy from the shelf at a local retailer will definitely wind up with Windows 8. You do have a choice, you can get Windows 7 if you order from the manufacturer and tell them what you want. Microsoft has it out as orders that all retailers have to push Windows 8. Not everyone is falling for it; Windows 8 still has under a 4% market share...take that Microsoft. You could always opt for a Mac and why not; Mac have a near 0% reputation of coming under attack. However, for most people the cost in prohibitive.<br /><br />We here at Delaware Valley Tech Rescue are getting many calls from clients who are switching over now before the deadline so we are doing a good number of setups and we want to make that you are thinking about this now rather than later to avoid the rush.<br /><br />So like it or not, Windows XP closes the book on itself but keep in mind that there are choices. You just have to take a good look at all the prospects.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-68457400046791117062011-07-10T14:29:00.003-04:002011-07-10T15:02:07.356-04:00Free Tech SupportLet me tell you about my favorite word. This word jumps out at you. It calls your name. The word is <span style="font-weight: bold;">FREE</span>.<br /><br />Now let me tell you how you can get <span style="font-weight: bold;">FREE </span>tech support for your PC products. Starting Tuesday July 12th and every second Tuesday of each month you can listen to <a href="http://www.TheBehindTheMikeShow.com">The Behind The Mike Show</a> where I will be taking calls and answering your computer questions. You can call the toll free number (866) 417-4359 and check in with your questions regarding viruses, spyware, software and hardware. It's Tech Tuesday and the show runs from 9:00 - 10:00 PM Eastern.<br /><br />So come on and listen right on your computer at any of the following links:<br /><br /><a href="http://www.wbtm.info">WBTM Radio</a><br /><a href="http://www.wr1r.com">Reality 1 Radio</a><br /><a href="http://148.ca/one/">SRN One</a><br /><a href="http://www.tynefm.com">TyneFM</a><br /><a href="http://www.starradio.moonfruit.com/">Star Radio NY</a><br /><br />Hope to hear ya there!Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-79388342029764544712011-06-15T20:25:00.004-04:002011-06-15T20:33:11.741-04:00No Maintenance? Bad Idea..One of the absolute worse things that you could do for your computer is to not maintain it. Sure, we are all busy browsing, downloading, watching, listening, tweeting and more. If we do not keep these computers in top shape, they are liable to "unlike" you.<br /><br />Maintenance on a computer means that the system is kept both physically cleaned and virtually cleaned. The system should be checked for maintenance issues with the operating system (Windows) and make sure the hard drive is healthy and the system is free from viruses, Trojans, malware and all of the things that we are afraid of catching. Also the system needs to be loved inside by way of a good cleaning.<br /><br />Periodically is the answer. The computer can be maintained monthly, 3 months, 6 months or a year. The longer that you wait, the more at risk you become. If you are working on a laptop, then you can imagine how much faster such a small place becomes engulfed in heat and dust. I recommend that you do it or have it done. Of course, I can guide you on the cycle and even set you up with a maintenance plan. You can leave it to us to maintain it while you go and tweet about it to your heart's content.<br /><br />If you wait too long...well...you shouldn't wait. Your computer has needs too; service them.<br /><br />Call me for a special maintenance service for just $59! (302) 261-5397Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-18717634524968100242010-09-30T18:54:00.001-04:002010-09-30T18:55:48.782-04:00Computer Maintenance: Part ThreeWelcome to the final installment of the Computer Maintenance series. Part three will discuss a small battery of defenses that can be installed to help round out the protection to your computer. These are merely suggestions. Many IT professionals have patterns and techniques that work. This article lays out a plan that has proven successful in 99.4% of computers serviced by the author’s consultation firm, Delaware Valley Tech Rescue.<br /><br />The computer has been physically cleaned and firewall and anti-virus are installed and running. Now it’s time to place the finishing touches on the computer utilizing the following FREE utilities.<br /><br />SpywareBlaster – SpywareBlaster is an invaluable tool and is available through Java Cool Software (http://www.javacoolsoftware.com/). After installing the program, be sure and run the updater so that the definitions can be updated. Then be sure to enable protection for all items. SpywareBlaster does not need to be opened to run and it will work completely unnoticed by the user. It protects the computer from a database of malicious websites that contain content that could be harmful to the computer.<br /><br />Spybot Search & Destroy – Created by Safer-Networking (http://www.safer-networking.org/), Spybot S&D also maintains a database of big bad websites. Besides updating the database regularly, you also must run the immunization module to place the new databases into effect. This program also comes with a scanner so if you feel that you might be infected then you can scan the computer. The added bonus is that this program builds a HOSTS file automatically to be sure that the websites in the database cannot push their wares through to your environment.<br /><br />MalwareBytes Anti-Malware – MalwareBytes is a great addition to your protection scheme and like Spybot S&D, it needs to be updated regularly and then scanned if you feel there is a problem. It can be downloaded by the vendor (http://www.malwarebytes.org/). MalwareBytes has actually been known for finding issues that other scanners do not pick up and therefore has become an industry favorite. Keep in mind that MalwareBytes and Spybot S&D should be updated and scanned about once per week just to be sure that there are no issues brewing. There are many malicious packages out there that will not load immediately and can lay dormant.<br /><br />There are no guarantees that any program will win over all the malicious objects floating around the Internet and sometimes, it takes different combinations of resources to rid the computer of the infestation. If used properly, these three programs can aid the anti-virus and firewall in keeping the operating environment safe and efficient. If a more severe problem is discovered then consult with a professional computer technician as most cases, severe as they can be, are able to be cleaned without drastic measures.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-82555743070780740562010-09-27T21:06:00.002-04:002010-09-27T21:09:14.127-04:00Computer Maintenance: Part TwoComputer Maintenance Part One explained how to get the case of the computer cleaned and free of dust and debris. Now that the very essential of the project is complete, it is time to ensure that the system will be safe from the outside intruders. Part Two will focus on Anti-Virus programs and Firewalls.<br /><br />Looking first at firewalls, what exactly is a firewall? A firewall is a software utility or hardware device that limits outside network access to a computer or network by blocking ports. Though firewalls are very simple to use and plug and play ready, they can also be customized and tuned to block additional port requests or control every port if the user wishes to do so. Windows comes with a built in firewall that for most users, will do the job necessary without issues. When a program that you install, an instant messenger program for example, requests outbound or inbound traffic the firewall will notify you and also allow you to determine if you want to be notified each time the instance occurs. The only time it may be necessary to install a more comprehensive firewall is if you have very serious attacks on your system frequently. In that case, good recommendations would be Comodo, Sygate or Zone Alarm. These are the top rated firewalls and are also the simplest to use and the least demanding of your computer’s resources.<br /><br />The single most important piece of software that every user should have in the computer is anti-virus software. There is no excuse for not including this as a basic strategy to combating the horrors of the internet. When choosing a solution, be sure that the program has the most complete protection for your overall security but do not allow it to go overboard. Simply put, there are some products on the market that will run amok with the computer’s resources and that will slow the performance down. For the purpose of this article, look at AVG Anti-Virus Free available from Grisoft. AVG comes with a complete protection package including email scanning, link checking, real time scanning of downloads and basic spyware protection built in plus much more. The price of $0 makes it all the more attractive. AVG is extremely customizable and allows the user to select how often and when the computer is scanned. One very nice feature of the free version is that the program must update virus definitions everyday and cannot be customized; an easy feature to live with.<br /><br />Firewalls and anti-virus; two critical items in the computer maintenance department and should not be overlooked. Look for Part Three of this series which will square up on the balancing factor of protecting the computer, spyware and malware protection.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0tag:blogger.com,1999:blog-932686026228478620.post-30109323384066644582010-09-26T15:57:00.003-04:002010-09-26T16:10:21.665-04:00Computer Maintenance: Part OneWelcome to Part One of this three part series on maintaining your computer to keep it running smoothly and keep it protected from the worries of the Internet. The common factor in this series will be that the methods will cost you very little money or, in most cases, be completely free.<br /><br />Part One will deal with basic maintenance of the actual hardware of the computer. There are some differences in desktop cases as well as differences in laptop computers. The differences are far too numerous to break down here so I would suggest that almost every computer manufacturer maintains a great support site on the web that should supply you with a manual to show you how different components to the system come apart. Be sure to follow a few precautionary tips if you decide to do the maintenance yourself. Properly ground yourself using a ground strap, be sure that any static electricity is discharged from your body and use the proper tools.<br /><br />There are three main elements that are harmful to your computer; dust, smoke and food/liquids. The best advice here is to keep the computer in a well ventilated area free from tobacco smoke and avoid eating or drinking around the computer to avoid accidental spills.<br /><br />To clean the case, remove the side covers of the desktop and if the computer is a laptop, remove only covers recommended by the manufacturer. Using a can of compressed air (available at most electronic or computer superstores) in a sweeping motion, blow the dust and dirt out of the machine. Pay special attention to the heat sink and all fans in the case because this is where dust really gathers up. You can also spray the air through the slots of the power supply unit to move the dust out of the back side thus keeping the electrical components inside dust free. Use the same technique by opening the CD drives and spray in them as well as any floppy drives that you may have.<br /><br />Next, using electrical wipes, clean only the metallic surfaces in the case (for example the bottom). Use the wipes to clean the entire outside of the case as well. Finish up by using a vacuum with a brush attachment to gently vacuum the crevices, grills and other fine areas to get any hidden dust out. When completed, put the case back together or return the covers of the laptop.<br /><br />This is a good first step to maintaining the computer. As with any electrical device, keeping them free of the dangers of elements will help them last longer and operate more efficiently. The recommendation is to clean your computer case a minimum of once per 6 months. If you have pets or feel that your home or office generates more dust than usual, feel free to do this more often. Watch out for Part Two of the series which deals with Anti-Virus software and Firewalls.Joel Michalechttp://www.blogger.com/profile/05714863978273186760noreply@blogger.com0