N E W S L E T T E R
In This Issue
JUST FOR FUN #1
 
 
  
QUICK TIP
 Using your Tablet to Scan Documents or
Access your Home Computer
Information from Marc Saltman and Costco (edited by Cecile)
Many apps can turn your device into a portable scanner so you could digitize documents, receipts, business cards, or handwritten notes and pictures. 
  
The Handy Scanner Free app for Android has optical character recognition to make the text editable and searchable.
  
Access your home computer with your Tablet:
Your Internet connected tablet can log into your home computer.  Whether you left an important document on your desktop or want to see something from  your hard drive, you can use free apps such as Splashtop Remote Desktop to log in securely and move the mouse via your fingertips.
  
Avatron's Air Display is a $9.99 app that turns your tablet into a wireless display for your Windows PC or Mac to allow you to extend or mirror your computer screen.  Just prop up your tablet to the right or left of a computer monitor and your mouse smoothly scrolls between the two screens as if it were a dual-monitor setup.
  
Use it as a phone.  It could be smart to use a free VolP (via Internet) service on your tablet to make long-distant calls.  You can use your tablet to make phone calls with apps such as ePhone, magicJack, NetTALK, Viber and others.  Make free calls to any North American land line or mobile number.  Some apps require you to register to get an incoming number, voice mail, and more.
  
Access Microsoft Office Files:  Set up and use Dropbox to save your files and .pdf as well.  The work is stored locally in the Dropbox folder on all your computers.  It is also possible to collaborate and share files with others.
 Identity Theft - What is it?
 
Posted by:Vic Hargrave (Data Analytics) Trend Micro; Edited by Cecile Bendavid

 

 

 

 

Identify theft happens when your personal information is stolen by one or more cyber criminals and then is used to impersonate you. This is usually done to gain access to your credit card data,

bank accounts, and social networks to steal money from you. Thieves may also gain other data from your accounts to gain access to sensitive information about your close friends, family, and colleagues. In some cases, the criminals might use private messages they obtain from your

emails and social networks to embarrass you publicly and damage your reputation.

 

The Internet can be a dangerous place, but there is a lot you can do to protect yourself from possible identity theft and other web threats. There are four major components to identity theft

protection:

  • Managing your account password
  • Recognizing and handling phishing email
  • Avoiding bad websites and blocking web threats
  • Controlling your exposure on social networks

 

Managing Your Account Passwords

Theft of your identity can begin with obtaining your email address, which can be done fairly easily using Google searches and one of the many email look up services that can be found on

the Internet. For many of your online accounts your email address is also your user name. With just that information, a cybercriminal has only to guess your passwords to get into your accounts.

To combat password cracking, you should use a different password for each of your accounts and these passwords should be hard to guess. Most systems recommend using passwords that are

at least 10 characters in length and that include a mixture of letters (upper and lower case), numbers, and special characters. For "special" characters

use any of those that characters you get
when you hold down the SHIFT key and press any number. Note that, depending on the account, you may be limited on the length of your password or may not be able to use special characters.
  

If you have many Internet-based accounts, it may become impossible to remember all your passwords if you have different one for each account. You can manage your passwords with special apps your can download from your Internet or phone provider.

Trend Micro DirectPass ™

mobile smartphone then use them to login into your accounts without having to remember the password for each account. All you have to do is remember the password to your DirectPass

account. DirectPass will also help you identify easy to guess passwords you may have in your list and help you select stronger ones.

 

Recognizing and Handling Phishing Email

Armed with your email address(es) cyber criminals can also send you

phishing emails designed
to lure you to malicious websites with URLs that are contained in messages carefully disguised to look like they came from legitimate institutions. Once you arrive at these sites you can be maneuvered into entering personal information or immediately pick up malware that

compromises your system. There is a viable low-tech solution to this problem. Simply don't click on any link in an email .

 

Avoiding Bad Websites and Blocking Web Threats

 If you receive a link in an email that claims to come from a company with whom you have an account, send a separate email to the company in question to verify the authenticity of

By itself though, personal discipline is not enough. You need security software to help keep you away from malicious websites and block web threats that may try to attack your computer. In

future articles, the CEO newsletter will discuss software that will help you block bad websites

and web threats.

For immediate help, call Jamshid or Cecile at CEO Computers, 818-501-2281

VISIT OUR WEBSITE

logo jpeg   

Computers & Servers

logo jpeg  
Websites & Blogs
logo jpeg  

logo jpeg    

Computer & Network Security 

 

logo jpeg  
logo jpeg  

logo jpeg  

On-line Backup & BDR 

February 2014  
Smart Devices Susceptible to Hackers
(reprinted from The Wire.com)
A security firm has discovered that non-phone or non-computer smart devices such as refrigerators, smart thermostats, microwaves, security cameras, TV's gaming consoles, industrial machinery, etc., that are Internet capable are also susceptible to hacks.  Not only that, about 100,000 household devices - including at least one fridge - sent out tons of spam messages around Christmas-time last year. 

According to ProofPoint, more than 750,000 sketchy messages were sent out from a number of smart appliances:
Home-networking routers, connected multi-media centers, televisions, and at least one refrigerator had been compromised and used as a platform to launch attacks.  As the number of such connected devices is expected to grow to more than four times the number of connected computers in the next few years, proof of attacks has significant security implications for device owners.  

Poorly guarded devices can become infected by malware and create a "thingbot" that will function as a normal virus spreading as a computer would. 

What can you do about this:  changing your password regularly can help. Just be aware as you purchase and use more smart devices, most of these devices will connect to the Internet via your home network.  
 
ASK THE  
PROFESSOR


Cecile Bendavid
Cecile Bendavid

Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers. 

  
 Q.  How can I set up a program to backup my work to the cloud?
  
A. There are several programs available.  At CSUN, the students have been given a program called "mycsunbox" that is from box.com.  The students can create shared folders to save and transmit files in an encripted, save environment.   The advantage for the students is that they can save a file in a computer lab or library, and then retrieve that file from their home computer.  You can also go to box.com and sign up for a free account.
  
Another program that is very popular is dropbox.com.   You can save files in one location and then open them from another location.  I use a computer in my classroom lab, another in my CSUN office, another at CEO Computers, and another in my home office.  All my files are current as dropbox automatically updates my entries and does copy my pictures from my cell phone.   It is wonderful to have all my data and pictures available wherever I work.  

JUST FOR FUN #2

Enjoy the Winter Olympics
 

 

USEFUL TIPS

null
 

A few basic keyboard shortcuts you can use  but there are quite a few in there that, while not exactly intuitive, are incredibly useful just for navigating. They also come in handy when you want to refer back to previous commands.

  • Up/Down Arrows: The up and down arrows on your keyboard move through your last used commands. So, if you wanted to run the second to last command you ran, just hit the up arrow twice and hit Enter. You can also edit the command before you run it.
  • Ctrl+Left and Ctrl+Right: Hitting Ctrl and the left or right arrow keys jumps between arguments in your command. So, if you had a typo in the middle of the command, you could jump to it quickly with Ctrl and a few taps of the left arrow key. Note that on Mac OS X and Windows, this shortcut is Esc+B and Esc+F instead. 
  • Home and End: The Home and End buttons on your keyboard move your cursor to the beginning and the end of the currently typed command, respectively. This is useful if you've, say, typed in a command but realize that there's a typo in the first word. Instead of holding down the left arrow key, just hit home and correct it. You can also do the same thing with Ctrl+A and Ctrl+E, respectively (on Mac OS X, Ctrl+A and Ctrl+E are the only way to do this).
  • Ctrl+U: This clears the entire line so you can type in a completely new command.P
  • Ctrl+K: This deletes the line from the position of the cursor to the end of the line.
  • Ctrl+W: This deletes the word before the cursor only.
  • Ctrl+R: This lets you search your command history for something specific. For example, if you wanted to search for the recent commands that included
    nano, you would hit Ctrl+R and type
    nano. It would show your most recent command, and you could use the up and down arrows to cycle through your history of commands using
    nano in them.
  • Tab: One of everyone's favorite shortcuts employs Tab to autocomplete a line of text. So, say you wanted to type
    cd ~/Dropbox/, you could just type
    cd ~/Dr, hit Tab to autocomplete opbox, and continue.
  •   

 
  

CONTACT US

Our team is ready 
to help you!
818.501.2281
 
www.ceocomputers.com 

TELL A FRIEND
We appreciate your  
referrals so much...
 
 
...that if someone you
refer becomes a
client, 
lunch for you  
 & your staff  
is on US! 
 
CEO Computers, Inc. | 818-501-2281 | cecile@ceocomputers.com | http://www.ceocomputers.com
5435 Balboa Boulevard - Suite 120
Encino, CA 91316

Copyright © 20XX. All Rights Reserved.