Are you feeling lucky?

We've randomly selected three names from among those on our mailing list, and we've hidden them somewhere in this newsletter. If you happen to see your name in print, you're a winner! It's that easy. Call Alex @ 818.501.2281 or e-mail her @ alex@cecomputers.com
to claim your prize. This month we're giving away the following three prizes: 1. $25 gift certificate to Starbucks. 2. Logitech wireless keyboard & mouse valued @ $70 3. $25 gift certificate to the Cheesecake Factory.
First come, first serve!
We welcome your suggestions about future prize giveaways.
|
Want a quick way to enter an Internet address without having to
click the mouse cursor in the address bar?
Just press Alt + D in any major internet browser.
|
|
What is a "filter bubble"?
| A filter bubble is a result slate in which a website algorithm selectively guesses what information a user would like to see based on information about the user (such as location, past click behavior and search history) and, as a result, users become separated from information that disagrees with their viewpoints, effectively isolating them in their own cultural or ideological bubbles.
|  |
Check out our Quick Tip #3 for a solution.
|
|
There are approximately 6,000 new computer viruses released every month.
|
|
We are happy to announce
that CEO's
Ross Gordnia and his wife Sara
have good news: their son Kooshawn
has been accepted at the University of
Colorado, at Boulder and will be starting classes in the fall. Our best wishes to all!
|  |
|
Check out the search engine
DuckDuckGo.
|
Why? Because you might be interested in their policy, which is to protect privacy and not record user information like other search engines do.
|
Yes, you really did read that correctly!
|
|
Because users are not profiled, the "filter bubble" can be avoided, and all users are shown the same exact search results for a given search term. (See above Terminology for "filter bubble".)
Once you've opened Duck Duck Go, just click on their logo, and you'll see all the other features this search engine has to offer.
Note: we actually tested this and found new websites that we had never come across before in other searches on more popular search engines.
|
|
|
Reliable Resources, Inc. is a
one-stop employment service,
specializing in light
industrial labor.
|
(800) 733.3358
www.reliable
resources.com
|
Note to all of our readers: If you would like the focus on your business in one of our up-coming issues, just e-mail us a copy of your logo and your web address.
|
Our sincere apologies to
Saxe, Roth, Dokovna.
Schwartz & Lynskey
Certified Public
Accountants
our featured client for last
month's
Client Focus. The web address we displayed for them was incorrect. It should have been
srdscpas.com
|
|
While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
|
|
We appreciate your
referrals so much...
|
|
...that if someone you refer becomes a client,
lunch for you
& your staff
is on US!
| |
|
|
 |
|
WARNING: SPYWARE CAN BE INSTALLED REMOTELY ONTO YOUR CELL PHONE!
Mobile spyware isn't new. Most of us have heard stories of people who have unwittingly had spyware installed on their phones. It's been touted as a powerful tool for detecting a cheating spouse or just for keeping track of kids, and all it required was access to the individual's phone for a quick install. The best defense against it was to never allow unsupervised access to your cell phone.
Well, those good ole days are over!
Now you can supervise your cell phone all you want and still have some unscrupulous individuals - strangers, people you don't even necessarily know! - tap into your phone with remote cell phone spying programs.
|
Cecile Bendavid
Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers.
Q. What is a v-Card in Outlook, and how do I use the feature?
A. A vCard is an electronic business (or personal) card. You may have seen a vCard attached to an e-mail note someone has sent you. Basically it retains information, including contact's name, address, phone number and e-mail address. Some even include images and sounds in addition to text. And it's not there just to look pretty! The great thing about them is they can be tremendous time savers.
Instead of having to manually enter all the data into your system yourself - which can be tedious if you have a lot of contacts - you can automatically enter it into a supported program like Outlook with just a couple of clicks. You'll soon be asking everyone to send you their vCards!
How to create a Vcard:
|
 |
CAN YOU SOLVE THIS PUZZLE?
|
Joe loves to create confusion. One Tuesday he sent an e-mail memo to his secretary that said, "I'll be back in the office three days before one week after the day after tomorrow."
When would he be back?
| Click here for the answer. |
|
How to Enlarge the Text on the Screen
|
 | Press CTRL and + on your keyboard to enlarge text while using Internet Explorer, Google Chrome, or Firefox. Press CTRL and - to reduce the size again. To go back where you started, just press CTRL and 0 (zero). |
|
|
Save Time With Google Searches
|
|
To quickly find out the weather or locate a movie: Typing "weather" followed by a zip code will yield the weather conditions in the area. Likewise, typing "movie" with the zip code will provide you with the local movie theaters and information on what's playing.
|
To quickly find a business in your area: Visit Google Local, enter the area you want to search and the keyword of the place you want to find. For example, typing "Encino restaurants" will display local restaurant information, including reviews and a map.
|
|
|
 |
Tip #3: Think before you click "unsubscribe".
|
5 Simple Tips to Help Protect Against Spam E-mail and Phishing
1. It's a good idea to set up at least two e-mail addresses.
Private e-mail address: This should only be used for personal correspondence. Because spammers build lists of possible e-mail addresses - by using combinations of obvious names, words and numbers - you should try to make this address difficult for a spammer to guess. Your private address should not simply be your first and/or last name, and you should protect the address by doing the following. Click here to continue reading.
|
TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard.
|
|
COSTLY, BUT COMMON I.T. MISTAKES - PART II
We have been in the IT service business for over 35 years, and we have noticed several mistakes or oversights that many small businesses tend to make. Whether it is the result of misinformation (being sold the wrong solution) or the lack of information (simply not knowing what you need), the consequences are the same, and they can be costly. we will cover our list of 10 items - in no particular order or priority - over the course of the next several issues. So without further ado, on to item #2.
#2 - Many businesses make the mistake of skimping on security.
These days the majority of service calls we receive are not computer-repair related; the largest percentage actually involve security issues. And they run the gamut, from the all-too familiar viruses, Trojans, worms, and adware that can infect computers & e-mail, servers and websites to actual hacking issues (malewares & spywares) that can involve the accessing of confidential corporate information and/or identity theft through software & hardware modification (like key-logging). And it isn't just the unknown, faceless hacker who is the culprit. Sometimes it's a lot closer to home: a dishonest or disgruntled employee who has all the passwords and access he needs to wreak havoc or someone else who has access to computers after hours - like the cleaning crew.
What is the most surprising is to find just how many small businesses think they are immune to these issues. They have not bothered to arm themselves with even minimal security protection to circumvent the risks that are often much more costly to remedy in terms of time and money than the protection itself.
What is key logging? Often referred to as key stroking or keyboard capturing, it is the action of recording (or logging) the keys struck on a keyboard - which might include passwords and other sensitive material - typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
|
|
|
Our team is ready
to help you! 818.501.2281
www.ceocomputers.com
|
|
|
|