Monday, June 22, 2009

Sunrise Business Builders Promo Film

Click on the link to watch the Sunrise Business Builders promo.

A flash player is required.

http://xtranormal.com/watch?e=20090627195038391

Friday, June 19, 2009

Computer Tip of the Day "06-19"

Be very careful when downloading music!!!
--Jammie Thomas-Rasset Ordered to Pay US $1.92 Million in Music Downloading Case (June 18 & 19, 2009) On Thursday, a federal jury ruled that Minnesota mother Jammie Thomas-Rasset downloaded music files in "willful violation" of copyright law. The jury awarded the Recording Industry association of America
(RIAA) US $80,000 for each song Thomas downloaded, or US $1.92 million.
This is the second trial for Thomas-Rasset; the judge presiding at the first trial declared a mistrial because he said the instructions given to the jury had been incorrect. That trial had ended with a fine of US $9,250 for each of the 24 songs, a total of US $220,000.
http://www.crn.com/software/218100291;jsessionid=IWBPIKJBSN5BSQSNDLPSKH0CJUNN2JVN
http://www.pcmag.com/article2/0,2817,2349029,00.asp
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9134571

Wednesday, June 17, 2009

Computer Tip of the Day "06-17" Phishing

- - Facebook Login Phishing Scam
The email aims to trick recipients into providing their Facebook login details to Internet criminals. Those who click on the link in these messages will be taken to a bogus website designed to look like a genuine Facebook login page. The bogus sites have domain names such as "fbstarter.com" and "fbaction.net." If a user logs in to one of the fake pages, his or her Facebook account details will be revealed to scammers who can then logon to their victim's real Facebook account, steal personal information and use the account for fraudulent purposes.
More information: http://www.hoax-slayer.com/fake-facebook-login.shtml

Monday, June 15, 2009

Computer "Tip of the Day" 06-15

Kids and the Dangers of Social Networking Social networking. These sites have morphed into a mainstream medium for kids and adults. (See advice for adults in the forthcoming July OUCH!) These sites encourage and enable people to exchange information about themselves, share pictures and videos, and use blogs and messaging to communicate with friends and sometimes even the world-at-large. While parents may feel outpaced by their technologically savvy kids, there are security lessons that parents can teach their kids. Here are eight tips to make your kids safer social networkers.

* Help your kids understand what information should be private. Tell them why it's important to keep some information about themselves to themselves, such as their full name, Social Security number, street address, phone number, and personal and family financial information.
Screen names, too, should not give away personal information.

* Use privacy settings to restrict who can access and post on your child's website or Facebook page. Some social networking sites have strong privacy settings. Show your child how to use these settings.

* Explain that kids should post only information that both you and they are comfortable with others seeing. Even if privacy settings are turned on, some - or even all - of your child's profile may be seen by strangers. Encourage kids to think about the impression that screen names make.

* Remind your kids that once they post information online, they can't take it back. Even if they delete the information from a site, older versions may be stored on other people's computers or in Web archives and can be circulated online.

* Know how your kids are getting online. More and more, kids are accessing the Internet through their cell phones. Find out what limits you can place on your child's cell phone and how secure it is. Some cellular companies have plans that limit downloads, Internet access, and texting by quantity and time of day.

* Talk to your kids about bullying. Online bullying can take many forms, from spreading rumors online and posting or forwarding private messages without the sender's OK, to sending threatening messages. Encourage your kids to talk to you if they feel targeted by a bully.

* Talk to your kids about avoiding sex talk online. Recent research shows that teens who don't talk about sex with strangers online are less likely to come in contact with a predator.

* Tell your kids to trust their gut if they have suspicions. If they feel threatened by someone or uncomfortable because of something online, encourage them to tell you. You can then help them report concerns to the police and to the social networking site. Most sites have links where users can immediately report abusive, suspicious, or inappropriate online behavior.

* Read sites' privacy policies. Spend some time with a site's privacy policy, FAQs, and parent sections to understand its features and privacy controls. The site should spell out your rights as a parent to review and delete your child's profile.

More information: http://www.onguardonline.gov/topics/social-networking-sites.aspx
http://www.getnetwise.org/
http://www.cyberbully411.org/
http://www.ikeepsafe.org/

Thursday, June 11, 2009

Computer "Tip of the Day" 06-11

- - Scareware Turns into Ransomware
Security company McAfee reports finding a new version of "FakeAlert-CO,"
a bogus security application that its creators branded as "System Security 2009" on a bogus website. After FakeAlert-CO infects a PC, it either disables all active processes or gives instructions for a system reboot. Like other fake security programs, FakeAlert-CO displays bogus warnings to the computer user, indicating that stored files are infected by malware. The bogus software tells you that "to remedy the problem, you need to buy and install FakeAlert-CO".. But when you click on the warning message, you are taken to an official-looking website that reveals a wide range of subscriptions to choose from before entering your credit card number. The website offers two purchase options, one for two-year and another for a lifetime license along with, ironically, a rebate offer and a 30-day money back guarantee.
More information:
http://www.spamfighter.com/News-12432-McAfee-Scareware-Turns-into-Ransomware.htm

Wednesday, June 10, 2009

Computer "Tip of the Day" 06-10

Microsoft and Apple Security Updates
Microsoft and Apple provide free security updates for their software products.
Windows: Microsoft issues patches for all Microsoft products on the second Tuesday of each month as well as out-of-cycle patches on any day of the month. The scheduled release date is June 9th. This is a good occasion to check manually, a practice that you should follow once every two weeks, to make sure all of the updates have been installed.
More information: http://www.microsoft.com/athome/security/default.mspx
OS X: Updates are issued frequently, and their contents may differ depending on which processor is in your Mac (PPC or Intel).
More information: http://support.apple.com/kb/HT1338
iPhones & iPods: Must be updated manually:
http://docs.info.apple.com/article.html?artnum=305744
http://support.apple.com/kb/HT1483

Tuesday, June 9, 2009

Computer "Tip of the Day" 06-09

How to restore a folder’s previous version in Windows 7
In Windows 7 there is a new feature that will let you restore previous versions of the contents of a folder. For example, if you have a folder containing some files from last week, then you update the contents of the folder this week, you can still go back to the old version of the files.
This new feature is called restoring previous versions. Previous versions are either copies of files and folders created by Windows Backup or copies of files and folders that Windows automatically saves as part of a restore point.
This is a preview of How to restore a folder’s previous version in Windows 7. Read the full post (321 words, 4 images)

Monday, June 8, 2009

Computer "Tip of the Day" 06-08

Tip of the day: Keep your computer cool
Sometimes the cause of Windows problems isn’t software at all. If you suddenly begin experiencing mysterious crashes, pay attention to when they occur. Overheating inside your computer case can cause memory chips, CPUs, and other heat-sensitive parts to stop functioning properly. If your computer consistently begins crashing a short time after you power on, heat may be the problem. Here’s a short list of things you can do to diagnose and repair heat-related problems:
-Check the power supply fan and make sure air is blowing from the inside out. A broken fan will cause problems in no time.
-If your PC has a separate case fan, check to see that it’s operating properly as well.
-If your computer’s BIOS includes a temperature reading (many new models do), check it by restarting and going into the BIOS setup after you’ve been running for a while.
-Clean out those dust bunnies! Take your PC’s case off and use a can of compressed air to carefully blow out dust that may be clogging up ventilation ports.
-With the cover off, check your CPU fan. This device sits right on your CPU and blows heat away.
-If it stops working, your computer will, too.

Friday, June 5, 2009

Computer "Tip of the Day" 06-05

How to protect your privacy on Yahoo Messenger
Posted on April 24, 2009 - Filed Under Computer Tips Leave a Comment
Yahoo Messenger, also popularly known as it’s initial YM, is one of the most used messenger applications available today. But having said that, it has also become a platform for spammers and malicious users to spread unsolicited information containing links to web based promotional materials, spam blogs (also called splogs), web pages encoded with malware, and even real crooks that will try to take information from you.
This is a preview of How to protect your privacy on Yahoo Messenger. Read the full post (290 words, 5 images)

Thursday, June 4, 2009

Gray Lady's Angel Baby


Scenes from the play. Kimberlyn Austin as Angel Baby (L) and Kandyce Hughes (R) as Gray Lady. Directed by Charles St. Clair.



Remember, come see Jackie Marx's play, Gray Lady Angel Baby at the Scottsdale Center for the Performing Arts tomorrow night, Friday, June 5th. See 5-26-09 post for LINK ( ticket info and directions).

Computer "Tip of the Day" 06-04

How to use Windows without being registered in Windows XP
1.) Click­ o­n­ St­a­rt­ but­t­o­n­.
2.) C­l­ic­k on­ Run­ op­t­ion­.
3.) Ty­pe­ Re­ge­dit .
4.) Navig­at­e­ t­o­­,
[H­K­EY­_LO­C­AL_M­AC­H­INES­o­f­twar­eM­ic­r­o­s­o­f­tWindo­ws­C­ur­r­entV­er­s­io­n] .
5.) C­reate the stri­n­­g valu­e RegD­on­­e.
6.) Set its va­l­u­e to 1 .

Business "Tip of the Day" 06-04

Invest in advertising.
Though it may seem strange, many small business strategists agree that a soft economy makes a good time to advertise. Niche-specific competition tends to be a little less aggressive and consumers may be seeking new answers for their needs. This can make a branding campaign a smart way to focus your efforts and advertising dollars during an economic downturn.

Wednesday, June 3, 2009

Computer "Tip of the Day" 06-03

Change the Default File Location
Many users find that they tend to open workbooks from the same folder on their computer. If that Windows Vista folder isn't Documents (My Documents in Windows XP), you can change the folder that Microsoft Office Excel 2007 displays when you want to open or save a workbook. Here’s how:
1. Click the Office button.
2. Click Excel Options.
3. In the left column, click Save.
4. Type the desired location in the Default file location box.

Tuesday, June 2, 2009

Computer "Tip of the Day" 06-02

Microsoft Outlook 2007 Tip
Deal Efficiently with Nonessential E-Mail While You're
Out of the Office To create e-mail rules that apply only
when you're out of the office:
1. On the Tools menu, click Out of Office Assistant.
2. Click Add Rule. In the Edit Rule dialog box that opens,
you can set aside for later any nonessential messages you
receive while you're away.
Alternately, you can forward a copy of these
e-mail messages to someone else.

Monday, June 1, 2009

Hard of Hearing?

Looking for the perfect gift for a hard of hearing relative?
Amplified Phones & Speakerphones, Alerting Devices & Signalers,
Portable Phone Amplifiers, Amplified Alarm Clocks, Remote Control Wall Outlets,
Big Font Keyboards and much, much more.
DSI
5255 W Phelps Rd., Ste. 4
Glendale, AZ 85306
602-548-7003
www.dsi-hearingassist.com
www.dsi-usa.com

Computer "Tip of the Day" 06-01

- - Crooks' Bots Swarm Facebook and MySpace Scams and identity-theft programs that attack email accounts and users of social-networking sites such as Facebook and MySpace have become a new front in cybercrime. To carry out many of these automated attacks, cybercriminals first must overcome "captchas," the distorted letters and characters that users of an email or social-networking account are required to type to complete certain online forms. For years, captchas have helped to stop or bog down automated programs aimed at creating email accounts that promote scams such as fake computer virus protection and bogus accounts on social Web sites that can be used to collect personal information on legitimate users. Security specialists say a growing number of captcha-breaking groups are using real people to type in captcha responses for cybergangs around the world. This is allowing the gangs to create fake email and social-network accounts by the tens of thousands - and use them as the starting point for a variety of cyberscams spread by email and instant messages. MySpace and Facebook say that, so far, they have kept such attacks largely in check. But as long as captchas are a key security feature on networking Web sites, cyberattacks on such sites are likely to intensify.
More information:
http://www.tennessean.com/article/20090423/NEWS08/904230346/1025