The Microsoft Small Business Center offers Products & Demos, Security & Support, Articles & Research.
Http://microsoft.com/smallbusiness/hub.mspx
Checkout the Microsoft Business Productivity Online Suite.
The Sunrise Business Builders meetings are open to everyone. For those who have never attended, we have a round table discussion about the chosen topic with the purpose of helping each other build our businesses by sharing needs and sharing knowledge. It is our hope that when a person leaves our meeting they are able to say: I learned something of value. I was able to sharesome of my knowledge. I enjoyed myself.
Monday, April 12, 2010
Tuesday, April 6, 2010
Microsoft Business Resource Center!
Because there is such an abundance of information on this site I am going to post the next link on Monday the 12th of April.
Again here isd the link for the resource center.
http://www.microsoft.com/business/mycenter/?qstr=CR_CC10033264&CR_ID=
Again here isd the link for the resource center.
http://www.microsoft.com/business/mycenter/?qstr=CR_CC10033264&CR_ID=
Monday, April 5, 2010
Microsoft Business Resource Center!
In todays business world just about every company large or small uses computers. This site is free to join and offers everything from Self Help Resources to Training and Events.
Here is the link.
http://www.microsoft.com/business/mycenter/?qstr=CR_CC=100332641&CR ID=
Here is the link.
http://www.microsoft.com/business/mycenter/?qstr=CR_CC=100332641&CR ID=
Monday, March 29, 2010
For your Information!
Starting on April 1st I am going to provide links to different Microsoft pages where you can get free training for Microsoft products and information about Microsofts newest version of Windows "Windows 7".
I hope these links and information will be useful to everyone.
David
I hope these links and information will be useful to everyone.
David
Thursday, December 10, 2009
Computer "Tip of the Day" 12-10-09
Software update locations
- - Patches and Updates
Windows & PC Office: http://update.microsoft.com and http://www.microsoft.com/security/updates/bulletins/200911.aspx
OS X: http://support.apple.com/kb/HT1338
Mac Office:
http://www.microsoft.com/mac/help.mspx?CTT=PageView&clr=99-0-0&ep=7&target=ffe35357-8f25-4df8-a0a3-c258526c64ea1033
iPhone/iPod: http://support.apple.com/kb/HT1414
iPod: http://support.apple.com/kb/HT1483
Windows Acrobat Reader:
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows
OS X Acrobat Reader:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh
Flash Player: http://get.adobe.com/flashplayer/
Firefox: http://www.mozilla.com/en-US/firefox/update/
Safari:
http://www.apple.com/downloads/macosx/apple/application_updates/safari.html
Opera: http://www.opera.com/
Chrome: http://googlechromeupdate.com/updates.html
Java: http://www.java.com/en/download/manual.jsp
iTunes:
http://www.tuaw.com/2009/09/22/itunes-9-0-1-now-in-software-update/
Symantec:
http://service1.symantec.com/SUPPORT/sharedtech.nsf/docid/2002021908382713
Norton:
http://www.symantec.com/business/security_response/definitions/download/detail.jsp?gid=n95
McAfee: http://www.mcafee.com/apps/downloads/security_updates/dat.asp
Kaspersky: http://www.kaspersky.com/avupdates
Sophos: https://secure.sophos.com/support/updates/
Panda: http://www.pandasecurity.com/homeusers/downloads/clients/
BitDefender:
http://www.bitdefender.com/site/view/Desktop-Products-Updates.html
Microsoft Security Essentials:
http://www.microsoft.com/security/portal/Definitions/HowToMSE.aspx
- - Patches and Updates
Windows & PC Office: http://update.microsoft.com and http://www.microsoft.com/security/updates/bulletins/200911.aspx
OS X: http://support.apple.com/kb/HT1338
Mac Office:
http://www.microsoft.com/mac/help.mspx?CTT=PageView&clr=99-0-0&ep=7&target=ffe35357-8f25-4df8-a0a3-c258526c64ea1033
iPhone/iPod: http://support.apple.com/kb/HT1414
iPod: http://support.apple.com/kb/HT1483
Windows Acrobat Reader:
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows
OS X Acrobat Reader:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh
Flash Player: http://get.adobe.com/flashplayer/
Firefox: http://www.mozilla.com/en-US/firefox/update/
Safari:
http://www.apple.com/downloads/macosx/apple/application_updates/safari.html
Opera: http://www.opera.com/
Chrome: http://googlechromeupdate.com/updates.html
Java: http://www.java.com/en/download/manual.jsp
iTunes:
http://www.tuaw.com/2009/09/22/itunes-9-0-1-now-in-software-update/
Symantec:
http://service1.symantec.com/SUPPORT/sharedtech.nsf/docid/2002021908382713
Norton:
http://www.symantec.com/business/security_response/definitions/download/detail.jsp?gid=n95
McAfee: http://www.mcafee.com/apps/downloads/security_updates/dat.asp
Kaspersky: http://www.kaspersky.com/avupdates
Sophos: https://secure.sophos.com/support/updates/
Panda: http://www.pandasecurity.com/homeusers/downloads/clients/
BitDefender:
http://www.bitdefender.com/site/view/Desktop-Products-Updates.html
Microsoft Security Essentials:
http://www.microsoft.com/security/portal/Definitions/HowToMSE.aspx
Wednesday, December 9, 2009
Computer "Tip of the Day" 12-09-09
BAD GUYS
HACKERS AND CRACKERS: Individuals who break into systems with malicious intent, destroy data, steal copyrighted software or confidential information, and perform other destructive or illegal acts with computers and networks.
VULNERABILITIES AND EXPLOITS: Your computer is vulnerable when a hardware or software flaw makes it possible to compromise its security and smooth operation. An exploit is a software application or program that takes advantage of a vulnerability to attack your system.
SNIFFING: Listening in on a network in order to capture and steal sensitive information.
SPOOFING: An attack in which a person or program you shouldn't trust masquerades as a person or program you do trust. For example, an attacker forges an email address in order to make you believe it's from someone you know and trust.
PHISHING: A widespread form of Internet fraud that aims to steal valuable information such as credit card and social security numbers and usernames and passwords, by sending you misleading emails designed to lure you into visiting phony or rigged websites.
IDENTITY THEFT: Cybercriminals steal identities by overhearing conversations on cellphones, intercepting faxes and emails, hacking into computers, employing telephone and email scams, and phishing the users of online services.
SOCIAL ENGINEERING: Deceptions by criminals posing as someone you trust in order to get you to divulge sensitive information.
HACKERS AND CRACKERS: Individuals who break into systems with malicious intent, destroy data, steal copyrighted software or confidential information, and perform other destructive or illegal acts with computers and networks.
VULNERABILITIES AND EXPLOITS: Your computer is vulnerable when a hardware or software flaw makes it possible to compromise its security and smooth operation. An exploit is a software application or program that takes advantage of a vulnerability to attack your system.
SNIFFING: Listening in on a network in order to capture and steal sensitive information.
SPOOFING: An attack in which a person or program you shouldn't trust masquerades as a person or program you do trust. For example, an attacker forges an email address in order to make you believe it's from someone you know and trust.
PHISHING: A widespread form of Internet fraud that aims to steal valuable information such as credit card and social security numbers and usernames and passwords, by sending you misleading emails designed to lure you into visiting phony or rigged websites.
IDENTITY THEFT: Cybercriminals steal identities by overhearing conversations on cellphones, intercepting faxes and emails, hacking into computers, employing telephone and email scams, and phishing the users of online services.
SOCIAL ENGINEERING: Deceptions by criminals posing as someone you trust in order to get you to divulge sensitive information.
Tuesday, December 8, 2009
Computer "Tip of the Day" 12-08-09
Information: - - Getting Connected
BROADBAND: Broad bandwidth networking. High-speed Internet connections, like DSL (Digital Subscriber Line), Cable Internet, and 3G (Third
Generation) cellular services.
DSL: Digital Subscriber Line. One of the most common ways to bring Internet to homes and small businesses over a telephone line at up to
12 Megabits/second.
CABLE OR CABLE INTERNET: The other most common way to bring Internet to homes over cable TV lines at speeds ranging from 1.5 to 50 Megabits/second.
FiOS: Fiber-Optic Service. An emerging technology that provides Internet to homes and offices over fiber-optic cables at speeds from 15 to 50 Megabits/second.
WI-FI: Wireless Fidelity. The most common kind of short-range wireless networking--about 300 feet--at speeds of up to 108 Megabits/second.
EDGE or EVDO: An older kind of wide-area wireless networking-like a whole city--based on first and second generation cellphone technology with speeds ranging from 300 to 400 kilobits/second.
3G: Third Generation cellular service. Enhanced wide-area wireless networking at speeds of up to 14 Megabits/second.
4G: Fourth Generation cellular service or WIMAX. An emerging wide-area networking technology that promises a range of 10 miles and speeds of up to 100 Megabits/second.
ETHERNET: A way of connecting computers to networks using a cable at speeds ranging from 10 to 10,000 Megabits/second.
FIREWALL: Software or hardware that prevents outsiders from accessing a computer or network.
ROUTER: A device that finds the best route for sending information between networks.
IP ADDRESS: Internet Protocol Address. Every computer on the Internet is identified by a unique set of numbers known as an Internet Protocol address--usually four numbers separated by dots, for example:
74.125.53.100. These numerical addresses are normally invisible to users and are translated into familiar Web addresses, like http://www.google.com.
BROADBAND: Broad bandwidth networking. High-speed Internet connections, like DSL (Digital Subscriber Line), Cable Internet, and 3G (Third
Generation) cellular services.
DSL: Digital Subscriber Line. One of the most common ways to bring Internet to homes and small businesses over a telephone line at up to
12 Megabits/second.
CABLE OR CABLE INTERNET: The other most common way to bring Internet to homes over cable TV lines at speeds ranging from 1.5 to 50 Megabits/second.
FiOS: Fiber-Optic Service. An emerging technology that provides Internet to homes and offices over fiber-optic cables at speeds from 15 to 50 Megabits/second.
WI-FI: Wireless Fidelity. The most common kind of short-range wireless networking--about 300 feet--at speeds of up to 108 Megabits/second.
EDGE or EVDO: An older kind of wide-area wireless networking-like a whole city--based on first and second generation cellphone technology with speeds ranging from 300 to 400 kilobits/second.
3G: Third Generation cellular service. Enhanced wide-area wireless networking at speeds of up to 14 Megabits/second.
4G: Fourth Generation cellular service or WIMAX. An emerging wide-area networking technology that promises a range of 10 miles and speeds of up to 100 Megabits/second.
ETHERNET: A way of connecting computers to networks using a cable at speeds ranging from 10 to 10,000 Megabits/second.
FIREWALL: Software or hardware that prevents outsiders from accessing a computer or network.
ROUTER: A device that finds the best route for sending information between networks.
IP ADDRESS: Internet Protocol Address. Every computer on the Internet is identified by a unique set of numbers known as an Internet Protocol address--usually four numbers separated by dots, for example:
74.125.53.100. These numerical addresses are normally invisible to users and are translated into familiar Web addresses, like http://www.google.com.
Subscribe to:
Posts (Atom)