N E W S L E T T E R
In This Issue
PRIZE GIVEAWAY!
Are you feeling lucky?

win
We've  randomly selected three names from among those on our mailing list, and we've hidden them somewhere in this newsletter. 
If you happen to see your name in print,  you're a winner!
It's that easy.
Call Alex @ 818.501.2281
or e-mail her
 @ alex@cecomputers.com
to  claim your prize. 

This month we're giving away the following three prizes:

1.  $25 gift certificate to Starbucks. 
2.  Logitech wireless keyboard  
& mouse  valued @ $70 
3.  $25 gift certificate to the Cheesecake Factory. 
First come, first serve! 

We welcome your suggestions about future prize giveaways.  

JUST FOR FUN #1
cookie monster

QUICK TIP #1
Want a quick way to enter
an Internet address
without having to 
click the mouse cursor
in the address bar? 

Just press Alt + D
in any major
internet browser.


TERMINOLOGY
What is a "filter bubble"?
A filter bubble is a result slate in which a website algorithm selectively guesses what information a user would like to see based on information about the user (such as location, past click behavior and search history) and, as a result, users become separated from information that disagrees with their viewpoints, effectively isolating them in their own cultural or ideological bubbles. 

filter bubble


Check out our
Quick Tip #3 for a solution.


FUN FACTS #1
There are approximately 6,000 new
computer viruses
released every month.
CONGRATULATIONS

We are happy to announce 
that CEO's   
Ross Gordnia
and his
wife Sara 
 
 have good news: 
their son Kooshawn  
has been accepted
at the University of
 
Colorado, at Boulder
and will be starting
classes in the fall.

Our best wishes to all!  
ross family 2


QUICK TIP #3

Check out the search engine
DuckDuckGo.
Why Because you might be interested in their policy, which is to protect privacy and not record user information like other search engines do.
Yes, you really did read that correctly! 
duckduckgo2
Because users are not profiled, the "filter bubble" can be avoided, and all users are shown the same exact search results for a given search term.  (See above Terminology for "filter bubble".)

Once you've opened Duck Duck Go, just click on their logo, and you'll see all the other features this search engine has to offer.

Note:  we actually tested this and found new websites that we had never come across before in other searches on more popular search engines. 
 
 CLIENT FOCUS
reliable logo
Reliable Resources, Inc. is a
one-stop employment service,
specializing in light
industrial labor.
 

(800) 733.3358  

 

www.reliable

resources.com 

 

 

Note to all of our readers:  If you would like the focus on your business in one of our up-coming issues, just e-mail us a copy of your logo and your web address.
Our sincere apologies to
Saxe, Roth, Dokovna.
Schwartz & Lynskey
Certified Public
Accountants
our featured client for last
month's
Client Focus.
 The web address we displayed for them was incorrect.  It should have been
srdscpas.com

FUN FACTS #3
 
While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
TELL A FRIEND
We appreciate your  
referrals so much...
 
picnic  
...that if someone you
refer becomes a
client, 
lunch for you  
 & your staff  
is on US! 
 
VISIT OUR WEBSITE

logo jpeg   

Computers & Servers

logo jpeg  
Websites & Blogs
logo jpeg  

logo jpeg    

Computer & Network Security 

 

logo jpeg  
logo jpeg  

logo jpeg  

On-line Backup & BDR 

September  2013 
SECURITY THREATS
WARNING:  SPYWARE CAN BE INSTALLED REMOTELY ONTO YOUR CELL PHONE!  

Mobile spyware isn't new.  Most of us have heard stories of people who have unwittingly 
had spyware installed on their phones.   It's been touted as a powerful tool for detecting a cheating spouse or just for keeping track of kids, and all it required was access to the individual's phone for a quick install.
The best defense against it was to never allow unsupervised access to your cell phone.        

Well, those good ole days are over! 
Now you can supervise your cell phone all you want and still have some unscrupulous individuals - strangers, people you don't even necessarily know! - tap into your phone with remote cell phone spying programs.
 
 

 

ASK THE
PROFESSOR


Cecile Bendavid
Cecile Bendavid

Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers. 

  
 Q.  What is a v-Card in Outlook, and how do I use the feature?  
 
A.  A vCard is an electronic business (or personal) card.  You may have seen a vCard attached to an e-mail note someone has sent you.  Basically it retains information, including contact's name, address, phone number and e-mail address. Some even include images and sounds in addition to text.  And it's not there just to look pretty!  The great thing about them is they can be tremendous time savers.

Instead of having to manually enter all the data into your system yourself - which can be tedious if you have a lot of contacts - you can automatically enter it into a supported program like Outlook with just a couple of clicks.  You'll soon be asking everyone to send you their vCards!    
How to create a Vcard:  

JUST FOR FUN #2
CAN YOU SOLVE THIS PUZZLE?
 
deep thought
Joe loves to create confusion.  One Tuesday he sent an e-mail memo to his secretary that said, "I'll be back in the office three days before one week after the day after tomorrow."

When would he be back? 
 Click here for the answer. 
 
KEYBOARD SHORTCUT

Windows 7
How to
Enlarge the Text on
the Screen

magnify
Press CTRL and +
on your keyboard
to enlarge text while using
Internet Explorer,
Google Chrome, or
Firefox. 
Press CTRL and -
to reduce
 the size again.
 To go back where you started,
just press CTRL and 0 (zero).


QUICK TIP #2
Save Time With Google Searches

google
To quickly find out the weather or locate a movie:    Typing "weather" followed by a zip code will yield the weather conditions in the area.  Likewise, typing "movie" with the zip code will provide you with the local movie theaters and information on what's playing.
To quickly find a business in your area:  Visit Google Local, enter the area you want to search and the keyword of the place you want to find.  For example, typing "Encino restaurants" will display local restaurant information, including reviews and a map.

USEFUL TIPS
Tip #3:  Think before you click "unsubscribe".

5 Simple
Tips to Help Protect Against
Spam E-mail and Phishing  



1.  It's a good idea to set up at least two e-mail addresses.
Private e-mail address:  This should only be used for personal correspondence.  Because spammers build lists of possible e-mail addresses - by using combinations of obvious names, words and numbers - you should try to make this address difficult for a spammer to guess.  Your private address should not simply be your first and/or last name, and you should protect the address by doing the following.

Click here to continue reading.
FUN FACTS #2
    TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard. 

USING TECHNOLOGY  
COSTLY, BUT COMMON I.T. MISTAKES - PART II

We have been in the IT service business for over 35 years, and we have noticed several mistakes or oversights that many small businesses tend to make.  Whether it is the result of misinformation (being sold the wrong solution) or the lack of information (simply not knowing what you need), the consequences are the same, and they can be costly.  we will cover our list of 10 items - in no particular order or priority - over the course of the next several issues.  So without further ado, on to item #2.


#2 - Many businesses make the mistake of skimping on security.

These days the majority of service calls we receive are not computer-repair related; the largest percentage actually  involve security issues.  And they run the gamut, from the all-too familiar viruses, Trojans, worms, and adware that can infect  computers & e-mail, servers and websites to actual hacking issues (malewares & spywares) that can involve the accessing of confidential corporate information and/or identity theft through software & hardware modification (like key-logging).   And it isn't just the unknown, faceless hacker who is the culprit.  Sometimes it's a lot closer to home:  a dishonest or disgruntled employee who has all the passwords and access he needs to wreak havoc or someone else who has access to computers after hours - like the cleaning crew.

What is the most surprising is to find just how many small businesses think they are immune to these issues.  They have not bothered to arm themselves with even minimal security protection to circumvent the risks that are often much more costly to remedy in terms of time and money  than the protection itself.

What is key logging?  Often referred to as key stroking or keyboard capturing, it is the action of recording (or logging) the keys struck on a keyboard - which might include passwords and other sensitive material - typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.      

 

CONTACT US

contact us 2
Our team is ready 
to help you!
818.501.2281
 
www.ceocomputers.com 

CEO Computers, Inc. | 818-501-2281 | cecile@ceocomputers.com | http://www.ceocomputers.com
5435 Balboa Boulevard - Suite 120
Encino, CA 91316

Copyright © 20XX. All Rights Reserved.