Our Blog

Posted on

Windows 8 Update Feature and Internet Explorer Vulnerability

Windows 8

     This bog post has two parts. If you want, you may read the Part 2 first, but the second has a relationship with Part 1.

Part 1

     For people who want to take a little more “hands on” approach to updating their Windows 8 updates from Microsoft, here’s the easiest way to get you to where you need to be: Press the Windows key

Posted on

Free Local Marketing

Marketing

Are you looking for ways to market your business locally?  Local traffic is the bread and butter of most businesses.  Many shoppers use mobile devices when they are out shopping to check prices and look up nearby locations.  Here are some FREE ways to get a higher impact in the local market.

Posted on

The JAVA Exploit

JAVA

Welcome to another “tech blog.” I apologize for the delay in posting at least once a week. Sometimes the ‘local’ job takes over and doesn’t give me the time needed. This edition (Oops, I started to say ‘this week’s edition’) has a very important, urgent message pertaining to your computer’s safety.

Posted on

7 Ways Hackers Trick You

Caution

Very nice article by Stu Sjouwerman from knowbe4.com.

You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well? 

Posted on

The "problem" of Google using your photo and reviews in their ads - SOLVED!

For those of you worried about the new “problem” of Google using your Google account information (profile photo and reviews in ads) – click this link and then uncheck the box at the bottom (if checked) and click SAVE: https://plus.google.com/settings/endorsements?hl=en REMEMBER: This only affects you on Google products and ONLY if you have a Google…