CEO Computers, Inc. Newsletter
Improve your day-to-day efficiency
February 19, 2010
In This Issue
How Cybercrime Threatens You
Internet Protocol Address Explained
Notebook Computer
 
PRODUCT OF THE MONTH
 
 ________________
 
For help in selecting your  new notebook, call CEO - (818) 501-2281 
 _______________
 
  Business Spotlight
 

 Accredited Family of Home Care Services

Since 1980, The Accredited Family of Home Care Services has built a solid reputation for providing quality home care services in Southern California. Through the years, we have grown our service lines and developed additional programs to meet the needs of our patients and their families.

Comprised of four integrated companies, Accredited is a true family business, owned and operated by its founder, Barry Berger and his wife of 20 years, Taffy Steinfield-Berger.

Together, the four companies provide skilled nursing and therapies; in-home attendant care; continuous care nursing for the developmentally disabled; and home delivery of durable medical equipment & supplies.  With its diverse offerings, Accredited is one of but a few local agencies that can service patients throughout the entire life cycle -spanning all ages from one's infancy through a patient's golden years.  For more information, visit www.accreditednursing.com

They welcome all of your questions, comments and concerns.  

 

Greetings!  

CyberCrime is growing - read the article from Symantec and protect your computers. 
 
This month we are featuring our client, Accredited Home Care Services in our business spotlight.  If you would like to have your business in the "spotlight," please send an email to cecile@ceocomputers.com with the business information - we would like to include your information in a future newsletter.
 
We are still welcoming guest columnists and would like to make this forum available to include articles relevant to computer users. We hope many of you will respond to our articles and offer to write for this newsletter.  As you know,  this newsletter is read by many businesspeople in the Valley.  Please send your article to cecile@ceocomputers.com
 
Sincerely,
 
Jamshid Javidi, President, CEO Computer

How Cybercrime Threatens You - Information from Symantec (edited by Cecile Bendavid) 

Cybercrime is on the rise. Identity theft now hits 1 in 5 of us. These are tough odds to beat unless you take the right precautions. Even U.S. Federal Reserve Chairman Ben Bernanke wasn't immune to being hit. Don't let yourself be the next target.

 

Who are these cybercriminals?

Maybe you think the majority of them are bored teenagers out for harmless kicks, hacking and cracking their way to bragging rights. Don't be fooled. Many of today's cybercriminals are Mafia-style hardened criminals living abroad. They've turned away from selling illegal drugs and set their sights on grabbing your financial information.

 

How do they access your private information?

Like hungry wolves lying in wait, these predators tend to hunt the easiest targets through the following:

- Here's a shocking statistic: 9 out of 10 of the world's emails are fraudulent. It's too easy a method for cybercriminals to ignore. Every spam message sent is essentially a lottery ticket to them. But you have to respond in order for them to cash out. 
 

Phishing through email refers to prompting you to enter private information (e.g., bank account, passwords, credit card, etc.) under false pretenses. Don't fall prey to this. Think first: Would your bank or credit card really need your password? Of course not. They already have it.

 

Pharming

- Pharming is another type of online sleight of hand. Here's how it works: You're directed to an Internet site. Perhaps it's an ecommerce store with fantastic prices. Maybe it's your bank or credit card's Web site. The URL checks out. Everything appears legit-but it isn't.

Once you send your credit card information, you've been had. And to make matters even worse, you probably won't even realize this until weeks later.

Trojans - Just like the name implies, these are applications that disguise themselves as something else. They often appear on peer-to-peer file sharing networks, targeting those seeking free MP3s, movies, or software. Once installed, the dirty work begins.
Beware of downloading from dubious sources. Instead of grabbing that hot new game, you may have unwittingly opened your computer and all of your personal information up to the bad guys. Is this worth it?
 

How can cybercrime damage my life?

Identity theft victims spend an average of 58 hours recovering losses.
To a cybercriminal, your private info is essentially just a commodity to be sold on the black market. There, its monetary worth can be quite an eye-opener. To check the value of yours, click here for
Norton's Risk Assessment Calculator. It's a free service we provide openly to you.

 

So how can I protect myself?

As we noted earlier, cybercriminals tend to target easy prey. Making it harder for them is your best defense.

·         Update all of your software applications often

·         Create strong, unique passwords and store them safely

·         Do not respond to emails asking for private information

·         Beware of "too good to be true" offers

·         Install strong security software and keep it current

Conclusion

The Internet can be a wonderful tool if you keep safety in mind. But as with most things, applying a little common sense can go a long way, too. If an offer online seems too good to be true, it probably is.   For help with the purchase or installation of Symantec products, call CEO Computers (818-501-2281).  

___________________________________________________

Internet Protocol Address:

This number is an exclusive number all information technology devices (printers, routers, modems, et al) use which identifies and allows them the ability to communicate with each other on a computer network.

There is a standard of communication which is called an Internet Protocol standard (IP). In laymans terms it is the same as your home address. In order for you to receive snail mail at home the sending party must have your correct mailing address (IP address) in your town (network) or you do not receive bills, pizza coupons or your tax refund. The same is true for all equipment on the Internet.
 
Without this specific address, information
cannot be received. IP addresses may either be assigned permanently for an Email server/Business server or a permanent home resident or temporarily, from a pool of available addresses (first come first serve) from your Internet Service Provider. A permanent number may not be available in all areas and may cost extra so be sure to ask your ISP.

Domain Name System (DNS): This allows the IP address to be translated to words. It is much easier for us to remember a word than a series of numbers. The same is true for email addresses.

For example, it is much easier for you to remember a web address name such as whatismyip.com than it is to remember 192.168.1.1 or in the case of email it is much easier to remember email@somedomain.com than email@192.168.1.1

Dynamic IP: One that is not static and could change at any time. This type of IP is issued to you from a pool of IP addresses allocated by your ISP or DHCP Server. This is for a large number of customers that do not require the same IP all the time for a variety of reasons. Your computer will automatically get this number as it logs on to the network and saves you the trouble of having to know details regarding the specific network configurations. This number can be assigned to anyone using a dial-up connection, Wireless and High Speed Internet connections. If you need to run your own email server or web server, it would be best to have a static IP.

Static IP: One that is fixed and never changes. This is in contrast to a dynamic IP which may change at any time. Most ISP's a single static IP or a block of static IP's for a few extra bucks a month.

IP version 4: Currently used by most network devices. However, with more and more computers accessing the internet, IPv4 IPs are running out quickly. Just like in a city, addresses have to be created for new neighborhoods but, if your neighborhood gets too large, you will have to come up with an entire new pool of addresses. IPv4 is limited to 4,294,967,296 IPs.

IP version 5: This is an experimental protocol for UNIX based systems. In keeping with standard UNIX (a computer Operating System) release conventions, all odd-numbered versions are considered experimental. It was never intended to be used by the general public.

IP version 6: The replacement for the aging IPv4. The estimated number of unique IPs for IPv6 is 340,282,366,920,938,463,463,374,607,431,768,211,456 or 2^128.

The old and current standard of IPs was this: 192.168.100.100 the new way can be written different ways but means the same and are all valid

_________________________________________________________

_______________________________________________________________________
I hope you enjoy reading the newsletter and will contribute to future issues. 
 
Sincerely,
Cecile Bendavid
CEO Computers, Inc.

 

If you would like to use our newsletter preparation and emailing service,  call for an appointment.  (818) 501-2281    Cecile