logo jpeg

Newsletter - June 3, 2011

 
In This Issue
2010 Outlook Tips
Green Tips
Marketing Tips for FaceBook
Featured Web 2.0 Sites
Hackers
SEO Tip
Ask the Professor
Quick Links
__________________

Outlook Tips  

Outlook

Insert a Screenshot in an Outlook 2010 Message

When you want to save a thousand words by e-mailing a picture of a dialog box or browser screen or anything else that appears on your desktop,  begin writing your message, click on the Insert tab on the Ribbon, then click Screenshot.

 

A tiny dialog box shows you all the current windows open on your desktop so you can choose the one you want to insert, or click on Screen Clipping and click to draw a box on screen. Press Enter, and the contents of the box will be inserted into your message. 

 

GREEN TIPS

 green printer buttonLet's face it.  Most of us pay a pretty penny for our toner & ink car-tridges, and it seems they are constantly in need of being replaced. Not only is this a burden on your wallet, but consider the effect it has on our environment.  Fortunately, there are a number of things you can do to reduce your carbon footprint and save a couple of bucks in the process.

 

Ecofont is a typeface that allows you to ration your precious ink, saving as much as 20%. It's easy on the eyes - looks like the ubiquitous Arial font - but the letters are produced with tiny circles punched.out of them.  The result:  less ink is required to form a letter, which really adds up when you need to print out lengthy documents - like that best-selling novel you've been meaning to write. 

 

There's a free version available to download. Check it out! 

 

There are alternative ways to save the same amount of ink:

  • Print 20% fewer pages
  • Write 20% fewer words
  • Make the font size 20% smaller
  • Use lightweight fonts, Don't use bold anything.
  • Set font fill color to a 80% black

 

____________________ 

  Marketing Tips for FaceBook

 

1.  Keep it Personal

Facebook is about making and maintaining personal connections. When someone becomes a fan, you should welcome them.

  

2.  Create a Photo History

In creating a photo history, you'll be utilizing some very powerful aspects of your Facebook Fan Page. First, you'll be making strong visual statements that will be seen by everyone who comes to your page.

 

3.  Create a Contest

A contest, whether weekly, bi-weekly or monthly, can go a long way in keeping people involved in your Facebook Fan Page. Offer a prize of some sort associated with the contest and make it fun.

 

You can run a competition in which participants solve a problem, come up with a creative solution or find clues on your Fan Page that help them win. It may be trivia based or involve predicting some specific outcome.

 

 

 MARKETING TIPS

 

  

Cecile@ceocomputers.com

 

 __________________________________

 

web 2.0 graphic
Web 2.0 Sites

The following are the Web 2.0 sites we think you will enjoy using: 

 

eHow

 

WordPress.com

 

Try these sites and email us to let us know how you used them.  Send your comments to cecile@ceocomputers.com

 

 
client corner

It's all about you, our clients!

In these challenging times, we believe that any kind of exposure is helpful to your business.  We have therefore decided to dedicate this portion of our newsletter to serve as a platform to help promote our clients.

 

Greetings!

   

 Our June newsletters will have information about small business hacking.  In addition, we will continue our listing of Web 2.0 sites. We believe you will get more value from the Internet when you utilize some of these sites. 

 

Also, please notice the Client Corner section of the newsletter.  We are so happy to include your information, tips, and coupons in the newsletter. 

 

Jamshid Javidi, President, CEO Computers

and

Cecile Bendavid, Newsletter Editor

 

Please call us with any questions.

 

Los Angeles Time Article

Monday May 23, 2011

Companies find that size doesn't matter to hackers

 
HackersA very interesting article appeared in the Monday, May 23 L.A. Times by Cyndia Zwahlen stating that big firms aren't the only ones needing protection from cyber attacks. 
  
The article explains that it took only three minutes for a hacker to break into a small accounting firm's computer system.  The hacker had found one computer that was equipped with outdated software.  Through that access to the office network, the hacker was able to get files that included private financial information. 
  
Fortunately for the accounting firm, this was just a test to see if it could happen.  The hacker had been employed by a security company to test the accountants' digital defenses.  As a result, the firm put in new software and adopted new security. 
  
This alone should be enough to make companies realize that small businesses can be attacked and that the myth that "I am too small" is just a myth. 
  
Seventy-three percent of small and medium-size businesses surveyed by Symantec Corp in 2010 said they had been hit with at least mild forms of cyber intrusions. 
  
What can you do to protect yourself?  Make sure you have a firewall that is working properly.  Also, use up-to-date software and protection. 
  
Cyber insurance is available, but installing the proper software and an electronic firewall will go a long way to help. 
  

Search Engine Optimization (SEO) Tip

 

wwwThis is an easy and relatively inexpensive tip:  make sure you register your domain for more than one year.  That's it.   Register it for a minimum of three years or more if you can - particularly if you have a new website.

 

Why?  Because search engines like Google use your domain expiration date as a tool for predicting the legitimacy of your domain and the documents associated therewith - not unlike how the length of time you have lived at a residence figures into your credit rating.  A domain purchased a year at a time suggests that you don't expect to be there long.

 

Valuable (legitimate) domains are often paid for several years in advance, while doorway (illegitimate) domains rarely are used for more than a year. 
.
While this tip is not going to rocket you to the #1 position in the search engines, it can provide a quicker exit from the Google sandbox and may provide some boost in your ratings.  With so many contributing factors, why overlook one of the easiest fixes!

 

Cecile Bendavid

Ask the Professor - Cecile Bendavid

Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers.

 

How can I tell if my computer has been hacked?

 

Almost every remote hack involves leaving a program behind that will allow them to get back into your computer regardless of whether or not you fix the security problem that let them into your computer in the first place.

 

The only time a hacker does not leave something behind, is if they are hacking your computer for specific information or an item. Almost 99% of the time this is not the case.

The programs that they leave behind are files that they can control.   These files come in various forms such as spyware and viruses as well as a Backdoor/Trojan. 

Symptoms of a Hacked Computer

If your computer experiences any of the following symptoms below, you may be infected with an Internet Trojan and hackers may have the ability to invade your computer.

  • Computer suddenly starts running slow.
  • Settings were changed without your knowledge. Your web browser home page or file information.
  • Suddenly slow Internet access.
  • Additional Internet activity detected without you using any programs accessing the Internet.
  • Abnormal running files/processes in the task manager.

   For more information, call Cecile at CEO Computers at 818 501-2281.

we love referrals

product2

 

On-Line Backup

idrive

 

 Secure, Safe and Simple.

Get 5GB of full-featured on-line backup for FREEEEEEEE!

Backup exceeding 5GB is available at low monthly fees.

 

 

click here for link to I-Drive 

 

I hope you enoy reading the newsletter and will contribute to future issues. 
 
Sincerely,

 

Cecile Bendavid
 

CEO Computers, Inc.