An administrator has made changes to my account now what?

By sshaad On Tuesday, April 30, 2013 4:42 PM

I got a pop up window saying that an administrator made some changes to my email and I need to restart Outlook. I restarted Outlook and now I'm not getting emails. Is there a problem with my account?

Why does Outlook keep prompting for the password for my Hosted Exchange email?

By sshaad On Tuesday, April 30, 2013 4:40 PM

I have Hosted Exchange email and I'm getting a pop up box asking for the password for my account. I keep entering my password and it will not go away. Am I doing something wrong?

How do I change the signature on my phone?

By sshaad On Wednesday, April 24, 2013 8:50 AM

How to change the default signature on Android and iPhone.

What is a mobile optimized website and how is it different from a regular website?

By ISOC On Monday, January 21, 2013 12:53 PM

A mobile optimized website is a website that has been designed and formatted for mobile devices such as smartphones and tablets. Mobile websites should be easy to read and navigate on the small screens of mobile devices without having to zoom or scroll.

What’s the difference between an app and a mobile site?

By ISOC On Monday, January 21, 2013 12:51 PM

A mobile website is similar to any other website in that it consists of browser-based HTML pages that are linked together and accessed over the Internet. An app, or application, is downloaded and installed on your device rather than being pulled up in a browser. Both apps and mobile websites are accessed on mobile devices such as smartphones and tablets.

What are unnatural links and how do you know about unnatural links to your site?

By ISOC On Thursday, October 18, 2012 11:47 AM

Unnatural links are mainly purchased links that are intended to manipulate a page’s rankings. They can also be links that spammers have attached to your site under the radar that link to bad links or unrelated sites. Both Google and Bing have a program called Webmaster Tools that allows you, as the webmaster, to monitor your site.

How do you know if your site was penalized by Google Panda or Penguin?

By ISOC On Thursday, October 18, 2012 11:45 AM

There is no simple answer for determining if your site has been penalized by Google Panda or Penguin. Google has released 21 updates for Panda since its initial release in 02/2011. Therefore, unless you noticed a drastic drop in your rankings around the time it was released, there’s no real way to determine if your site has been hit.

Why are passwords getting so long?

By All-Knowing On Tuesday, July 10, 2012 5:31 PM

The first step to creating a secure password is the character length. The more characters in the password the better it is.

What should I do if I find my password has been compromised?

By All-Knowing On Tuesday, July 10, 2012 12:33 PM

Passwords are compromised everyday and as soon as you find out, you should take immediate action.

What is Business Critical Data?

By All-Knowing On Wednesday, April 4, 2012 8:46 PM

Business critical data is any kind of information or data that a business would not be able to recover if it was lost.

What is the difference in Disaster Recovery and a Business Continuity Plan?

By All-Knowing On Wednesday, April 4, 2012 8:19 PM

A Disaster Recovery Plan tends to refer to the process in which you resume business after a disastrous event, such as a tornado, terrorist attack, or a virus infection.

Do I need special software to sync my phone, home computer and work computer if I go to the Cloud?

By All-Knowing On Thursday, October 6, 2011 2:05 PM

Going to the Cloud has several benefits. One of the biggest benefits is the convenience of being able to access your files and applications from anywhere. How does one actually do that? Is special software needed in order to use the Cloud from anywhere? Generally speaking, most applications on the Cloud do not require any special software to sync between devices.

What are my options for taking my desktop to the cloud?

By All-Knowing On Thursday, October 6, 2011 2:03 PM

Back in the early days of computing, it was quite common to have several computer terminals (also known as thin clients) connected to a mainframe. The IT world has now come the full circle. Software and files once stored on each PC in an office are now being moved to offsite servers (otherwise known as "the Cloud"). Now even the entire desktop can also be moved to the Cloud. This means that the desktop settings, the applications used and all files are stored remotely on a server rather than on the local hard drive.

I'll update later... What could possibly go wrong?

By All-Knowing On Tuesday, August 2, 2011 12:36 PM

Updates for Reader, XP, Windows, Flash, Java, Firefox…..Updates, updates, updates! Tired of updating your PC all the time? Who needs them, right? Wrong.

To Encrypt or Not to Encrypt?

By All-Knowing On Tuesday, August 2, 2011 12:19 PM

Encrypting data on your home PC may seem like simply too much security…that is until it becomes time to throw that computer away. Most people do not realize that their hard drive retains all of their personal information even though they disposed of the computer years ago. Would it worry you if that one hard drive was in someone else's hands?

What are the security concerns with virtualization?

By All-Knowing On Tuesday, July 5, 2011 12:40 PM

Virtualization is the creation of a virtual server instead of a physical server. One physical server can host multiple virtual servers. Virtual machines are very easy to create. They don't require going out and purchasing and then putting together new equipment everytime someone needs a new server. So are there any security concerns with virtual servers and machines? As with all technology, security is always a concern.

I heard Virtualization is greener… Is it really?

By All-Knowing On Tuesday, July 5, 2011 12:39 PM

These days everyone is looking to "go green". To "go green" is to reduce the "carbon footprint" of a company or business. In other words, to lessen the impact on the environment. Of course, the added advantage to this in many cases, is to lower costs as well.

Do all websites work on my Smartphone?

By All-Knowing On Tuesday, May 31, 2011 1:39 PM

Viewing websites on a Smartphone is becoming increasingly common. However, while many websites can be viewed on a Smartphone, not all of them are designed to be used by cell phone users. So a user might be able to see and read a webpage on a Smartphone, but it may not look right, or may involve a lot of scrolling.

How safe is my Smartphone?

By All-Knowing On Tuesday, May 31, 2011 1:28 PM

At one time, the biggest worry about cell phones was losing one, or having it stolen. That was back when phones were used only as phones. These days, many people have Smartphones that are used for everything from sending text messages, to getting the weather forecast, to finding a restaurant to eat it. Smartphones are more like mini computers that can be used to call someone.

How do I maintain my privacy on the Internet?

By All-Knowing On Tuesday, May 3, 2011 12:29 PM

Facebook is used by millions of people worldwide to share information. That information could be anything from the latest family photos, personal interests or status updates. It's quick and easy and allows people to keep up with the lives of friends and families without necessarily keeping in constant contact with them. The problem with this is that the information being shared online is often available to anyone at anytime, and once something is posted onto the Internet, it can very difficult to have it permanently removed.

Are there risks to using Facebook?

By All-Knowing On Tuesday, May 3, 2011 12:17 PM

These days there are more than 500 million active users on Facebook. The average user has 130 friends and people spend over 700 billion minutes per month using it. There are also over 900 million objects that people interact with (pages, groups, events and community pages)*. That is a lot of people and a lot of activity on one site. Looking at these numbers, Facebook is certainly the place to be for social interactions. However, it also makes Facebook a big target for hackers and scammers.

Domains and DNS

By All-Knowing On Monday, March 28, 2011 10:35 AM

So you've just registered a domain name, now what?

What's in a (Domain) Name?

By All-Knowing On Monday, March 28, 2011 10:34 AM

When looking at a domain name, you will often see a .com on the end of it. However, it's not uncommon to see a .net, a .org or something else on the end.

Secrets to Secure Forms

By All-Knowing On Friday, February 25, 2011 8:52 AM

There are different ways to provide a method of contacting you through your website. Online forms are one of the most popular methods of contact.

How do you setup Google Analytics?

By All-Knowing On Friday, February 25, 2011 8:48 AM

Google Analytics is a free service offered by Google that provides web statistics for a website. They are aimed more at marketers than webmasters.

What is Form Hijacking?

By All-Knowing On Friday, February 25, 2011 8:48 AM

Form Hijacking is when an online form, such as a contact us form, is exploited to send out spam emails using the server that the form is on to send them. This can occur when an online form is not secure and can be used to send spam to anyone. When spammers do this, the spam looks like it originates from the online form rather than from the spammer.

How can I find what Keywords people are searching on Google?

By All-Knowing On Tuesday, February 1, 2011 7:35 AM

Millions of searches are conducted each day on popular search engines by people all around the world. The big question is "What are they looking for?"

How to find out a website's Meta Keywords, Descriptions, and Titles

By All-Knowing On Tuesday, February 1, 2011 7:23 AM

A website's meta data is used to improve the ranking of a website in a search engine, such as Google. Meta data are the tags used by a website that include a description and keywords for a website. This data is often used by the search engines when adding a page to their search index. Each webpage on a website usually has its own meta data.

Restoring Archived Emails in Outlook

By All-Knowing On Thursday, January 6, 2011 12:27 PM

If you have used Outlook for your email before, you may have been prompted at some point to archive your email. By default, Outlook will attempt to automatically archive emails in your Inbox and other folders after 6 months (for the Sent Items and Deleted Items it archives after 2 months). This archiving is great for reducing the amount of disk space being used.

Email signatures can cause your email to be filtered

By All-Knowing On Tuesday, December 28, 2010 2:39 PM

Not many people realize this but what is contained in your email signature can cause your email to start getting filtered as spam.

Email Blacklists

By All-Knowing On Thursday, December 23, 2010 8:17 AM

What is a blacklist and how does it work? What if my domain is blacklisted? How do I find out if I am blacklisted? How do I get removed from a blacklist?

How do you sync Google Calendar to Outlook?

By All-Knowing On Wednesday, November 24, 2010 11:52 AM

One of the services Google offers is the Google Calendar. The Google Calendar allows you to keep track of upcoming events, meetings or other important items. It can be used to send invitations and keep a track of RSVPs. You can even share your calendar with others.

Firefox Plugin Can Cause CMS Issues

By All-Knowing On Wednesday, November 10, 2010 10:48 AM

If you use a CMS (Content Management System) or any kind of web-based HTML editor for your website, you should be wary of a certain Firefox plugin that can potentially break the CMS or HTML editor.

Why does my PCI Security Check fail?

By All-Knowing On Monday, October 25, 2010 2:17 PM

Common reasons for PCI Security Check failures

How do I set up an SSL?

By All-Knowing On Monday, October 25, 2010 2:12 PM

Steps to set up an SSL

What's with these winmail.dat files??

By All-Knowing On Wednesday, October 13, 2010 9:19 AM

It is not uncommon to receive an email that has a winmail.dat file attached to it. Sometimes an attachment you are waiting to receive will come as a winmail.dat file.

What is a good FTP program for a beginner?

By All-Knowing On Wednesday, September 29, 2010 3:38 PM

So you want to FTP but not sure what program to use that isn't too complicated?

Email Attachment Sizes

By All-Knowing On Monday, September 27, 2010 4:47 PM

Email is used each day to send files to people. Using email to send files is fine for sending some pictures to Grandma or even a Word doc to a work colleague but when it comes to sending something more though you can end up having issues. The main issue with sending attachments over email is the size of the file.

Be aware before going beta!

By All-Knowing On Wednesday, September 15, 2010 4:20 PM

Today Microsoft released Internet Explorer 9 Beta. Before rushing out to download and install this it is important to note the keyword there "Beta".

Confirming email was received

By All-Knowing On Friday, September 10, 2010 9:01 AM

A common question from email users is "How can I tell if my email is received?".

What security holes should I look for in my remote connection?

By All-Knowing On Thursday, August 19, 2010 4:52 PM

How do you know your remote connection is secure?

What is a VPN and can I set one up?

By All-Knowing On Thursday, August 19, 2010 4:50 PM

What is a VPN and can I set one up?

Tip for Thunderbird Users

By All-Knowing On Thursday, August 12, 2010 10:55 AM

Did you know when you delete an email in Thunderbird, you don't really delete it?

Over quota? What's that all about?

By All-Knowing On Thursday, August 5, 2010 8:42 AM

Uh-oh someone just called you to say they sent you an email and got some message back about being over quota. What does this mean and how does one resolve such an issue?

Categories

Newsletter Signup


Full Name:

Email Address: