N E W S L E T T E R
In This Issue

logo jpeg   

Computers & Servers

logo jpeg  
Websites & Blogs
logo jpeg  

logo jpeg    

Computer & Network Security 

 

logo jpeg  
logo jpeg  

logo jpeg  

On-line Backup & BDR 

 
Our team is ready
to help you!

818.501.2281
 CLIENT FOCUS

 

     


McKently Malak Architects  
is a full-service  
Architectural, Planning and Design firm specializing in  
Retail, Hospitality,  
Mixed-Use, Housing  
and Urban Rehabilitation
projects. 

     

35 Hugus Alley

Suite 200 

Pasadena, CA  91103

626.583.8348

 

www.mckently.com

 

 

 

Note to all of our readers:  If you'd like the focus on your business in one of our up-coming issues, just e-mail us a copy of your logo and your web address.
A referral is the greatest compliment.

We appreciate your referrals...

..so much
that if someone you refer becomes a client,
lunch for you
and your staff is on us!



TERMINOLOGY
What is a Firewall?

The term "firewall" originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next.  They were typically made of brick, steel, or another type of inflammable material
that would effectively limit the spread of the fire.  In the IT world, firewalls do not
 
 

""The computer says I need to upgrade my brain to be compatible with the new software."

Side Heading
July 5, 2013
INTERNET SECURITY THREATS

Reveton Ransomware aka The FBI Moneypak Virus Locks Computers, Demands Payment

Several of our clients have been infected with a new "drive-by" virus on the Internet.  It carries a fake message - and a fine - and purports to be from the FBI.

The FBI MoneyPak virus can install itself when users simply click on a compromised website.
The virus, known as Reveton ransomware or FBI Moneypak, is designed to extort money from its victims.  It is described as drive-by malware because unlike many viruses - which activate when users open a file or an attachment - this one can install itself when users simply click on a compromised website.
ASK THE PROFESSOR

Cecile Bendavid
Cecile Bendavid

Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers. 

  
  
Q.  Should I remove the battery from my laptop when the AC is plugged in?

A.  The answer is  Yes - and No

While having a battery fully charged and the laptop plugged in is not harmful - as soon as the charge level reaches 100% the battery stops receiving charging energy and this energy is bypassed directly to the power supply system of the laptop - heat from the running computer can shorten the battery's life.  For that matter, the heat from the battery doesn't   CLICK HERE TO CONTINUE READING
 
USEFUL TIPS
It's not just about privacy.  Private browsing can save you money on airline tickets, too!
What is In-Private Browsing? 

Microsoft has added a new feature to Internet Explorer called In-Private Browsing, which helps prevent Internet Explorer from storing data about your browsing session.  This includes cookies, temporary Internet files, history and other data.   

 CLICK HERE TO CONTINUE READING 

USING TECHNOLOGY   
COSTLY, BUT COMMON I.T. MISTAKES - PART I

We have been in the IT service business for over 35 years, and we have noticed several mistakes or oversights that many small businesses tend to make.  Whether it is the result of misinformation (being sold the wrong solution) or the lack of information (simply not knowing what you need), the consequences are the same, and they can be costly.   We will cover our list of 10 items - in no particular order or priority - over the course of the next several issues.

 

#1 - Many businesses make the mistake of either having no firewall or having one that is inadequate.

 
Some rely on the low-end modems that their internet service provider has installed for them, or they opt for the inexpensive routers they picked up on sale at Office Depot, Best Buys, etc. or even the free software they downloaded on-line, never realizing that cyber-criminals and hackers have already created counter measures to circumvent many of these firewalls without the computer user even ever realizing that they have been compromised.  
CLICK HERE TO CONTINUE READING 
 

 


 

I hope you enjoy reading the newsletter and will contribute to future issues.  Please let us know what you like - and what you don't like - so that we can tailor our newsletter to better suit you, our readers.  Cecile@ceocomputers.com  

 

Sincerely,

 

Cecile Bendavid

CEO Computers, Inc.

CEO Computers, Inc. | 818-501-2281 | cecile@ceocomputers.com | http://www.ceocomputers.com
5435 Balboa Boulevard - Suite 120
Encino, CA 91316

Copyright © 20XX. All Rights Reserved.